text
stringlengths
2.85k
2.55M
label
class label
11 classes
arXiv:1604.04973v1 [math.GR] 18 Apr 2016 Factorization numbers of finite rank 3 abelian p-groups Marius Taฬ†rnaฬ†uceanu March 22, 2016 Abstract In this short note we give a formula for the factorization number F2 (G) of a finite rank 3 abelian p-group G. This extends a result in our previous work [9]. MSC (2010): Primary 20D40; Secondary 20D60. Key words: factorization number, subgroup commutativity degree, Moฬˆbius function, finite abelian p-group. 1 Introduction Let G be a finite group, L(G) be the subgroup lattice of G and H, K be two subgroups of G. If G = HK, then G is said to be factorized by H and K and the expression G = HK is said to be a factorization of G. Denote by F2 (G) the factorization number of G, that is the number of all factorizations of G. The starting point for our discussion is given by the papers [6, 1], where F2 (G) has been computed for certain classes of finite groups. Then, in [9], we have obtained explicit formulas for the factorization numbers of an elementary abelian p-group and of a rank 2 abelian p-group. These are based on the connection between F2 (G) and the subgroup commutativity degree sd(G) of G (see [7, 8]), namely sd(G) = X 1 F2 (H). |L(G)|2 Hโ‰คG 1 Obviously, by applying the well-known Moฬˆbius inversion formula to the above equality, one obtains X (1) F2 (G) = sd(H)|L(H)|2ยต(H, G). Hโ‰คG In particular, if G is abelian, then we have sd(H) = 1 for all H โˆˆ L(G), and consequently X X (2) F2 (G) = |L(H)|2ยต(H, G) = |L(G/H)|2 ยต(H). Hโ‰คG Hโ‰คG This formula will be used in the following to calculate the factorization number of a rank 3 abelian p-group. First of all, we recall a theorem due to P. Hall [2] (see also [4]), that permits us to compute explicitly the Moฬˆbius function of a finite p-group. Theorem 1. Let G be a finite p-group of order pn . Then ยต(G) = 0 unless n G is elementary abelian, in which case we have ยต(G) = (โˆ’1)n p ( 2 ) . We also need to know the total number of subgroups of a finite rank 3 abelian p-group. It has been determined by using different methods in [3, 5, 10]. Theorem 2. The total number of subgroups of Zpฮป1 ร—Zpฮป2 ร—Zpฮป3 , where ฮป1 โ‰ฅ ฮป2 โ‰ฅ ฮป3 โ‰ฅ 1, is (3) f (ฮป1 , ฮป2 , ฮป3 ) = (p2 A , โˆ’ 1)2 (p โˆ’ 1) where A =(ฮป3 +1)(ฮป1 โˆ’ฮป2 +1)pฮป2 +ฮป3 +5 +2(ฮป3 +1)pฮป2 +ฮป3 +4 โˆ’2(ฮป3 +1)(ฮป1 โˆ’ฮป2 )pฮป2 +ฮป3 +3 โˆ’2(ฮป3 +1)pฮป2 +ฮป3 +2 +(ฮป3 +1)(ฮป1 โˆ’ฮป2 โˆ’1)pฮป2 +ฮป3 +1 โˆ’(ฮป1 +ฮป2 โˆ’ฮป3 +3)p2ฮป3 +4 โˆ’2p2ฮป3 +3 +(ฮป1 +ฮป2 โˆ’ฮป3 โˆ’1)p2ฮป3 +2 +(ฮป1 +ฮป2 +ฮป3 +5)p2 +2pโˆ’(ฮป1 +ฮป2 +ฮป3 +1). We are now able to give the main result of our note. 2 Theorem 3. The following equality holds F2 (Zpฮป1 ร—Zpฮป2 ร—Zpฮป3 )=โˆ’p3 f 2 (ฮป1 โˆ’1, ฮป2 โˆ’1, ฮป3 โˆ’1)+p(f 2 (ฮป1 โˆ’1, ฮป2 โˆ’1, ฮป3 ) +pf 2 (ฮป1 โˆ’1, ฮป2 , ฮป3 โˆ’1)+p2 f 2 (ฮป1 , ฮป2 โˆ’1, ฮป3 โˆ’1)) โˆ’(f 2 (ฮป1 โˆ’1, ฮป2, ฮป3 )+pf 2 (ฮป1 , ฮป2 โˆ’1, ฮป3 ) +p2 f 2 (ฮป1 , ฮป2 , ฮป3 โˆ’1))+f 2 (ฮป1 , ฮป2 , ฮป3 ), where the quantities f (ฮป1 , ฮป2 , ฮป3 ) are given by (3). We remark that for ฮป3 = 0 the above equality leads to the formula in Theorem 3 of [9]. It simplifies in the particular case ฮป1 = ฮป2 = ฮป3 = ฮป. Corollary 4. We have F2 (Zpฮป ร—Zpฮป ร—Zpฮป )=โˆ’p3 f 2 (ฮปโˆ’1, ฮปโˆ’1, ฮปโˆ’1)+p(1+p+p2 )f 2 (ฮป, ฮปโˆ’1, ฮปโˆ’1) โˆ’(1+p+p2 )f 2 (ฮป, ฮป, ฮปโˆ’1)+f 2 (ฮป, ฮป, ฮป). However, even in this case, an explicit formula for the factorization number is too difficult to be written, but we can do it for small values of ฮป1 , ฮป2 , ฮป3 . Examples. a) F2 (Zp3 ร—Zp2 ร—Zp ) = 9p6 + 15p5 + 21p4 + 16p3 + 20p2 + 11p + 13. b) F2 (Zp2 ร—Zp2 ร—Zp2 ) = 5p8 +7p7 +16p6 +15p5 +21p4 +16p3 +20p2 +11p+13. 2 Proof of Theorem 3 It is well-known that G = Zpฮป1 ร—Zpฮป2 ร—Zpฮป3 has a unique elementary abelian subgroup of order p3 , say M, and that G/M โˆผ = Zpฮป1 โˆ’1 ร—Zpฮป2 โˆ’1 ร—Zpฮป3 โˆ’1 , = ฮฆ(G) โˆผ where ฮฆ(G) is the Frattini subgroup of G. Moreover, all elementary abelian subgroups of G are contained in M. Denote by Mi , i = 1, 2, ..., p2 + p + 1, the subgroups of order p and by Miโ€ฒ , i = 1, 2, ..., p2 + p + 1, the subgroups of order p2 in M. Then every quotient G/Mi is isomorphic to a maximal subgroup of G, which are: p2 of type (ฮป1 , ฮป2 , ฮป3 โˆ’ 1), p of type (ฮป1 , ฮป2 โˆ’ 1, ฮป3), and 3 1 of type (ฮป1 โˆ’ 1, ฮป2 , ฮป3 ). Similarly, every quotient G/Miโ€ฒ is isomorphic to a subgroup of index p2 of G that contains ฮฆ(G), and these are: p2 of type (ฮป1 , ฮป2 โˆ’1, ฮป3 โˆ’1), p of type (ฮป1 โˆ’1, ฮป2 , ฮป3 โˆ’1), and 1 of type (ฮป1 โˆ’1, ฮป2 โˆ’1, ฮป3 ). In this way the equality (2) becomes X p2 +p+1 F2 (G) =|L(G/M)|2 ยต(M) + |L(G/Mi )|2 ยต(Mi ) i=1 X p2 +p+1 + |L(G/Miโ€ฒ )|2 ยต(Miโ€ฒ ) + |L(G)|2 ยต(1), i=1 in view of Theorem 1. Since we have ยต(M) = ยต(Z3p ) = โˆ’p3 , ยต(Mi ) = ยต(Zp ) = โˆ’1, ยต(Miโ€ฒ ) = ยต(Z2p ) = p, โˆ€ i = 1, 2, ..., p2 + p + 1, and ยต(1) = 1, one obtains F2 (G)=โˆ’p3 |L(Zpฮป1 โˆ’1 ร—Zpฮป2 โˆ’1 ร—Zpฮป3 โˆ’1 )|2 +p(|L(Zpฮป1 โˆ’1 ร—Zpฮป2 โˆ’1 ร—Zpฮป3 )|2 +p|L(Zpฮป1 โˆ’1 ร—Zpฮป2 ร—Zpฮป3 โˆ’1 )|2 +p2 |L(Zpฮป1 ร—Zpฮป2 โˆ’1 ร—Zpฮป3 โˆ’1 )|2 ) โˆ’(|L(Zpฮป1 โˆ’1 ร—Zpฮป2 ร—Zpฮป3 )|2 +p|L(Zpฮป1 ร—Zpฮป2 โˆ’1 ร—Zpฮป3 )|2 +p2 |L(Zpฮป1 ร—Zpฮป2 ร—Zpฮป3 โˆ’1 )|2 )+|L(Zpฮป1 ร—Zpฮป2 ร—Zpฮป3 )|2 . Under the notation of Theorem 2 this leads to the desired formula. References [1] M. Farrokhi D.G., Factorization numbers of finite abelian groups, Int. J. Group Theory 2 (2013), 1-8. [2] P. Hall, A contribution to the theory of groups of prime-power order, Proc. London Math. Soc. 36 (1933), 29-95. [3] M. Hampejs and L. Toฬth, On the subgroups of finite abelian groups of rank three, Annales Univ. Sci. Budapest., Sect. Comp., 39 (2013), 111124. [4] T. Hawkes, I.M. Isaacs and M. Oฬˆzaydin, On the Moฬˆbius function of a finite group, Rocky Mountain J. Math. 19 (1989), 1003-1033. [5] J.M. Oh, An explicit formula for the number of subgroups of a finite abelian p-group up to rank 3, Commun. Korean Math. Soc. 28 (2013), 649-667. 4 [6] F. Saeedi and M. Farrokhi D.G., Factorization numbers of some finite groups, Glasgow Math. J. 54 (2012), 345-354. [7] M. Taฬ†rnaฬ†uceanu, Subgroup commutativity degrees of finite groups, J. Algebra 321 (2009), 2508-2520. [8] M. Taฬ†rnaฬ†uceanu, Addendum to โ€Subgroup commutativity degrees of finite groupsโ€, J. Algebra 337 (2011), 363-368. [9] M. Taฬ†rnaฬ†uceanu, On the factorization numbers of some finite p-groups, accepted for publication in Ars Combin., arXiv:1502.04778. [10] M. Taฬ†rnaฬ†uceanu and L. Toฬth, On the number of subgroups of a given exponent in a finite abelian group, accepted for publication in Publ. Inst. Math. Beograd, arXiv:1507.00532. Marius Taฬ†rnaฬ†uceanu Faculty of Mathematics โ€œAl.I. Cuzaโ€ University Iasฬงi, Romania e-mail: [email protected] 5
4math.GR
On deep-holes of Gabidulin codes arXiv:1711.11202v2 [cs.IT] 28 Feb 2018 Weijun Fanga Li-Ping Wangbโ€  Daqing Wanc a Chern Institute of Mathematics and LPMC, Nankai University, Tianjin 300071, China Email: [email protected] bโ€  Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China Data Assurance and Communications Security Research Center, Chinese Academy of Sciences, Beijing 100093, China, University of Chinese Academy of Sciences, Beijing, China, Email: [email protected] c Department of Mathematics, University of California, Irvine CA 92697, USA, Email: [email protected] Abstract In this paper, we determine a class of deep holes for Gabidulin codes with both rank metric and Hamming metric. Moreover, we give a necessary and sufficient condition for deciding whether a word is not a deep hole for Gabidulin codes, by which we study the error distance of two special classes of words to certain Gabidulin codes. Keywords: Gabidulin codes, rank metric, deep holes, covering radius, error rank distance 1 Introduction Let q be a power of a prime p, m โ‰ฅ 1 an integer and let Fnqm be an n-dimensional vector space over the finite field Fqm . In this paper we only consider the case when n โ‰ค m. Let ฮฒ = (ฮฒ1 , . . . , ฮฒm ) be a basis of Fqm over Fq . Let Fi be the map from Fqm to Fq where Fi (u) is the i-th coordinate of u in the basis ฮฒ. To any u = (u1 , . . . , un ) in Fnqm , we associate the matrix uฬ„ โˆˆ Mm,n (Fq ) in which uฬ„i,j = Fi (uj ). The rank weight of a vector u can be defined as the rank of the associated matrix uฬ„, denoted by wR (u). Thus we can define the rank distance between two vectors u and v as dR (u, v) = wR (u โˆ’ v). We refer to [18] for more details on codes for the rank distance. For integers 1 โ‰ค k โ‰ค n, a rank code C of length n and dimension k over Fqm is a subspace of dimension k of Fnqm embedded with rank metric. The minimum rank distance of the code C, denoted by dR (C), is the minimum rank weight of the non-zero vectors in C. A k ร— n matrix is called the generator matrix of C if its rows span the code C. A rank code of length n and dimension k over Fqm is called a maximum rank distance separable (MRDS) code if dR (C) = n โˆ’ k + 1. The error rank distance of any word u โˆˆ Fnqm to C is defined as dR (u, C) = min{dR (u, c)|c โˆˆ C}. The error rank distance plays an important role in the decoding of rank codes. The maximum error rank distance ฯR (C) = max{dR (u, C)|u โˆˆ Fnqm } is called the covering radius of C. If the rank distance from a word to the code C achieves the covering radius of the code, the word is called a deep hole of the code C. Covering radius and deep holes of linear code embedded with Hamming metric were studied extensively [1, 2, 3, 4, 5, 10, 12, 14, 16, 21, 22, 23, 24, 25, 26], in which MDS codes such as generalized Reed-Solomon codes, standard Reed-Solomon codes and projective Reed-Solomon codes were explored deeply. Gabiduli codes were first introduced by Gabidulin in [7] and independently by Delsarte in [6]. Gabidulin codes can be seen as the q-analog of Reed-Solomon codes. Furthermore, Gabidulin codes are MRDS codes. Over the last decade there has been increased interest in Gabidulin codes, mainly because of their relevance to network coding [15, 19]. Covering radius for Gabidulin codes also were studied in [8, 9, 20]. However, little is known about the deep holes for such codes. In this paper we determine a class of deep holes for Gabidulin codes with both rank metric and Hamming metric. Meanwhile we also obtain the covering radius by our method. Moreover, we give a necessary and sufficient condition for deciding whether a word is not a deep hole for Gabidulin codes, by which we study the error rank distance of a special class of words to certain Gabidulin codes. Note that we refer to rank metric if Hamming metric is not explicitly pointed out in this paper. 2 Linearized polynomials Gabidulin codes exploit linearized polynomials instead of arbitrary polynomials and so we recall some results about linearized polynomials. A q-linearized polynomial over Fqm is defined to be a polynomial of the form L(x) = d X i ai xq , ai โˆˆ Fqm , ad 6= 0 i=0 where d is called the q-degree of f (x), denoted by degq (f (x)). Note that L(x) has no constant term. One can easily check that L(x1 + x2 ) = L(x1 ) + L(x2 ) and L(ฮปx1 ) = ฮปL(x1 ) for any x1 , x2 โˆˆ Fqm and ฮป โˆˆ Fq , from which the name stems. In particular, L(x) induces an Fq -linear endomorphism of the Fq -vector space Fqm . The set of all q-linearized polynomials over Fqm is denoted by Lq (x, Fqm ). The ordinary product of linearized polynomials need not be a linearized polynomial. However, the composition L1 (x) โ—ฆ L2 (x) = L1 (L2 (x)) is also a linearized polynomial. The set Lq (x, Fqm ) forms a non-commutative ring under the operations of composition โ—ฆ and ordinary addition. It is also an Fq -algebra. Lemma 1. [17] Let f (x) โˆˆ Lq (x, Fqm ) and Fqs be the smallest extension field of Fqm that contains all roots of f (x). Then the set of all roots of f (x) forms an Fq -linear vector space in Fqs . 2 Let U be an Fq -linear subspace of Fqm . Then polynomial of U . Q gโˆˆU (x โˆ’ g) is called the q-annihilator Lemma 2. [17] Let U be an Fq -linear subspace of Fqm . Then polynomial over Fqm . Let ฮฒ1 , . . . , ฮฒn โˆˆ Fqm and denote the k ร— n Moore ๏ฃซ ฮฒ1 ฮฒ2 ๏ฃฌ ฮฒ1q ฮฒ2q ๏ฃฌ Mk (ฮฒ1 , . . . , ฮฒn ) := ๏ฃฌ .. .. ๏ฃญ . . q kโˆ’1 q kโˆ’1 ฮฒ1 ฮฒ2 Q gโˆˆU (xโˆ’g) is a q-linearized matrix by ... ... .. . ฮฒn ฮฒnq .. . kโˆ’1 . . . ฮฒnq ๏ฃถ ๏ฃท ๏ฃท ๏ฃท. ๏ฃธ Furthermore, if g1 , . . . , gn is a basis of U , one can write Y (x โˆ’ g) = ฮป det(Mn+1 (g1 , . . . , gn , x)) gโˆˆU for some non-zero constant ฮป โˆˆ Fqm . Clearly, its q-degree is n. In addition, we have the notion of q-Lagrange polynomials. Let g = {g1 , . . . , gn } โŠ‚ Fqm and r = {r1 , . . . , rn } โŠ‚ Fqm , where g1 , . . . , gn are Fq linearly independent. For 1 โ‰ค i โ‰ค n, we define the matrix Di (g, x) as Mn (g1 , . . . , gn , x) without the ith column. The q-Lagrange polynomial with respect to g and r is defined to be n X det(Di (g, x)) (โˆ’1)nโˆ’i ri ฮ›g,r (x) = โˆˆ Fqm [x]. det(Mn (g)) i=1 Proposition 1. [13] The q-Lagrange polynomial ฮ›g,r (x) is a q-linearized polynomial in Fqm [x] and ฮ›g,r (gi ) = ri for i = 1, . . . , n. Proposition 2. [13] Let L(x) โˆˆ Lq (x, Fqm ) be such that Q L(gi ) = 0 for all i. Then there exists an H(x) โˆˆ Lq (x, Fqm ) such that L(x) = H(x) โ—ฆ gโˆˆ<g> (x โˆ’ g), where < g > is the Fq -vector space spanned by g. 3 Deep holes of Gabidulin codes Let g1 , . . . , gn โˆˆ Fqm be linearly independent over Fq , which also implies that n โ‰ค m. Let g = {g1 , . . . , gn } and < g > is the Fq -vector space spanned by g. A Gabidulin code G โІ Fnqm is defined as the linear block code with generator matrix Mk (g1 , . . . , gn ), where 1 โ‰ค k โ‰ค n. Using the isomorphic matrix representation, we can interpret G as a matrix . The rank distance is defined as above. code in Fmร—n q The Gabidulin code G with length n has dimension k over Fqm and minimum rank distance n โˆ’ k + 1, and so G is an MRDS code [7]. The Gabidulin code G can also be defined as follow: G = {(m(g1 ), . . . , m(gn )) โˆˆ Fnqm | m(x) โˆˆ Lq (x, Fqm ) and degq (m(x)) < k}. 3 (1) Note that this interpretation of the code G will be used throughout the rest of the paper. It is the q-analogue of the generalized Reed-Solomon code. Let Y Y ( (x โˆ’ g)) = Lq (x, Fqm ) โ—ฆ (x โˆ’ g) gโˆˆ<g> gโˆˆ<g> Q be the left ideal generated by the element gโˆˆ<g> (x โˆ’ g) in the non-commutative ring Q Lq (x, Fqm ) with respect to the composition product. In particular, ( gโˆˆ<g> (x โˆ’ g)) is an Q m m Fq -linear additive subgroup of Lq (x, Fq ). It follows that Lq (x, Fq )/( gโˆˆ<g> (x โˆ’ g)) is an Fq -vector space. Define an Fq -linear evaluation map Y ฯƒ : Lq (x, Fqm )/( (x โˆ’ g)) โˆ’โ†’ Fnqm gโˆˆ<g> given by ฯƒ(f (x)) = (f (g1 ), . . . , f (gn )). We have the following property. Proposition 3. The above defined map ฯƒ is an Fq -vector space isomorphism. Q Proof. First, ฯƒ is well-defined since the polynomial gโˆˆ<g> (x โˆ’ g) vanishes at every gi . Second, if f (gQ i ) = 0 for all i = 1, . . . , n, then there exists H(x) โˆˆ Lq (x, Fq m ) such that f (x) = H(x)โ—ฆ gโˆˆ<g> (xโˆ’g) by Proposition 2 and so ฯƒ is one-to-one. Third, we show that ฯƒ is surjective. For a given r = (r1 , . . . , rn ) โˆˆ Fnqm , we have the q-Lagrange polynomial ฮ›g,r (x) satisfying ฮ›g,r (gi ) = ri for i = 1, . . . , n by Proposition 1. The result is proved. Q The q-linearized polynomial gโˆˆ<g> (xโˆ’g) has q-degree n. It follows that any element f (x) โˆˆ Lq (x, Fqm ) can be written uniquely in the form Y f (x) = h(x) โ—ฆ (x โˆ’ g) + r(x), gโˆˆ<g> where h(x), r(x) โˆˆ Lq (x, Fqm ) and r(x) has q-degree smaller than n. This is the q-division algorithm inQthe non-commutative ring Lq (x, Fqm ). As Fq -vector spaces, the quotient Lq (x, Fm q )/( gโˆˆ<g> (x โˆ’ g)) is thus represented by all q-linearized polynomials of q-degree less than n. That is, Y Lq (x, Fqm )/( (x โˆ’ g)) = {f โˆˆ Lq (x, Fqm )| degq (f ) < n}. gโˆˆ<g> Using the isomorphism ฯƒ, we can identify any word u โˆˆ Fnqm with ฯƒ(f ) for a unique polynomial f (x) โˆˆ Lq (x, Fqm ) with degq (f ) < n. When degq (f ) โ‰ค k โˆ’ 1, it is easy to see that the error distance dR (ฯƒf , G) = 0 by the definition. Thus, when k โ‰ค degq (f ) < n, we provide the following upper and lower bounds for dR (ฯƒf , G). 4 Theorem 1. Let f (x) โˆˆ Lq (x, Fqm ) with degq (f ) < n and let ฯƒf = ฯƒ(f ) โˆˆ Fnqm be the corresponding word. If k โ‰ค degq (f ) < n, then n โˆ’ degq (f ) โ‰ค dR (ฯƒf , G) โ‰ค n โˆ’ k. Furthermore, we suppose f is monic, then dR (ฯƒf , G) = n โˆ’ degq (f ) if and only if there exists a degq (f )-dimensional subspace H of < g > such that f (x) โˆ’ v(x) = Y (x โˆ’ h), hโˆˆH for some v(x) โˆˆ Lq (x, Fqm ) with degq (v) โ‰ค k โˆ’ 1. Proof. Applying the q-division algorithm, we can write Y f (x) โˆ’ r(x) = h(x) โ—ฆ (x โˆ’ g), gโˆˆ<g1 ,ยทยทยท ,gk > for some unique r(x) with degq (r) < k. This implies that dR (ฯƒf , G) โ‰ค n โˆ’ k. The right hand of the inequality holds. For the lower bound, let u(x) be any q-polynomial over Fqm . We consider the Fq -linear map defined by ฯ€u : < g1 , ยท ยท ยท , gn >โ†’< u(g1 ), ยท ยท ยท , u(gn ) > n n n X X X ฮพi gi ). ฮพi u(gi ) = u( ฮพi gi 7โ†’ i=1 i=1 i=1 It is clear that the map ฯ€u is surjective and ker(ฯ€u ) โІ Root(u) (the set of roots of u(x)). So dimFq ker(ฯ€u ) โ‰คdimFq Root(u) โ‰ค degq (u). Then dimFq < u(g1 ), ยท ยท ยท , u(gn ) > = dimFq < g1 , ยท ยท ยท , gn > โˆ’dimFq ker(ฯ€u ) โ‰ฅ n โˆ’ degq (u). Thus dR (ฯƒf , G) = = โ‰ฅ min rank((f โˆ’ v)(g1 ), ยท ยท ยท , (f โˆ’ v)(gn )) min dimFq < (f โˆ’ v)(g1 ), ยท ยท ยท , (f โˆ’ v)(gn ) > degq (v)<k degq (v)<k min (n โˆ’ degq (f โˆ’ v)) = n โˆ’ degq (f ). degq (v)<k The last equality holds since degq (f โˆ’ v) = degq (f ) for any q-polynomial v(x) with degq (v) < k. 5 Furthermore, from the above proof, we know that dR (ฯƒf , G) = n โˆ’ degq (f ) if and only if dimFq Root(f โˆ’ v) = dimFq ker(ฯ€f โˆ’v ) = degq (f โˆ’ v) = degq (f ) for some q-polynomial v(x) with degq (v) < k, which is equivalent to f (x) โˆ’ v(x) = Y (x โˆ’ h), hโˆˆH for some degq (f )-dimensional subspace H of < g1 , ยท ยท ยท , gn >. The theorem is proved. By Theorem 1, we immediately deduce the following two corollaries. Corollary 1. For the Gabidulin code G, the covering radius of G is n โˆ’ k. This corollary had also been obtained in [9]. Corollary 2. The set {ฯƒf : degq (f (x)) = k, f (x) โˆˆ Lq (x, Fqm )} are deep holes of the Gabidulin code G and so the number of deep holes of G is at least (q m โˆ’ 1)q mk . According to the definition in (1), we may also study the Gabidulin codes under the Hamming metric. It was showed that the Gabidulin codes are MDS codes in [7]. We use dH (u, v) and dH (u, G) to denote Hamming distance between vectors u and v and Hamming distance of a word u to G, respectively. Similarly, we have the following theorem. Theorem 2. Let f (x) โˆˆ Lq (x, Fqm ) with degq (f ) < n and let ฯƒf = ฯƒ(f ) โˆˆ Fnqm be the corresponding word. If k โ‰ค degq (f ) < n, then n โˆ’ degq (f ) โ‰ค dH (ฯƒf , G) โ‰ค n โˆ’ k. Furthermore, suppose f is monic, then dH (ฯƒf , G) = n โˆ’ degq (f ) if and only if there exists a subset E = {gi1 , . . . , gidegq (f ) } of {g1 , ยท ยท ยท , gn } such that f (x) โˆ’ v(x) = Y (x โˆ’ g), gโˆˆ<E> for some v(x) โˆˆ Lq (x, Fqm ) with degq (v) โ‰ค k โˆ’ 1. Proof. The proof of dH (ฯƒf , G) โ‰ค n โˆ’ k is same as Theorem 1. Let now t = n โˆ’ dH (ฯƒf , G). By definition of the Hamming distance, there exists some v(x) and non-zero H(x) โˆˆ Lq (x, Fqm ) with degq (v) < k such that f (x) โˆ’ v(x) = H(x) โ—ฆ Y gโˆˆ<gi1 ,...,git > 6 (x โˆ’ g) for some indices 1 โ‰ค i1 < ยท ยท ยท < it โ‰ค n. Comparing the q-degrees of both sides, we deduce that t โ‰ค degq (f ). This proves that n โˆ’ degq (f ) โ‰ค dH (ฯƒf , G). Furthermore, if f is monic, the equality t = degq (f ) holds if and only if H(x) = x, in which case, we obtain Y f (x) โˆ’ v(x) = (x โˆ’ g) gโˆˆ<gi1 ,...,git > The theorem is proved. By Theorem 2, we deduce the results in Corollaries 1 and 2 still hold under Hamming metric. 4 The error distance of a special class of words to certain Gabidulin codes We hope to obtain more deep holes of Gabidulin codes and so consider monic f (x) of k k+dโˆ’2 k+dโˆ’1 k+d +ยท ยท ยท+(โˆ’1)d ad xq +ยท ยท ยท . +a2 xq degq (f ) = k +d, d โ‰ฅ 1, where f (x) = xq โˆ’a1 xq Q k k+dโˆ’1 k+d + ยท ยท ยท + (โˆ’1)d hd xq + ยท ยท ยท and โˆ’ h1 xq In Theorem 1, if we write hโˆˆH (x โˆ’ h) = xq let ฮฒ1 , ฮฒ2 , . . . , ฮฒk+d โˆˆ Fqm be a basis of H, then dR (ฯƒf , G) = n โˆ’ degq (f ) is equivalent to ai = hi = det(Rk+dโˆ’i (ฮฒ1 , ยท ยท ยท , ฮฒk+d )) , for all 1 โ‰ค i โ‰ค d, det(Mk+d (ฮฒ1 , ยท ยท ยท , ฮฒk+d )) where Rk+dโˆ’i (ฮฒ1 , ยท ยท ยท , ฮฒk+d ) denotes the matrix Mk+d+1 (ฮฒ1 , ยท ยท ยท , ฮฒk+d ) deleting the row k+dโˆ’i q k+dโˆ’i ). As a result, we have dR (ฯƒf , G) = n โˆ’ (k + d) if and only if there (ฮฒ1q , ยท ยท ยท , ฮฒk+d exist k + d linearly independent elements ฮฒ1 , ฮฒ2 , . . . , ฮฒk+d of < g1 , ยท ยท ยท , gn > such that ai = det(Rk+dโˆ’i (ฮฒ1 , ยท ยท ยท , ฮฒk+d )) , for all 1 โ‰ค i โ‰ค d, det(Mk+d (ฮฒ1 , ยท ยท ยท , ฮฒk+d )) where Rk+dโˆ’i (ฮฒ1 , ยท ยท ยท , ฮฒk+d ) denotes as the above. When d = 1 i.e., degq (f ) = k + 1, then by Theorem 1, ฯƒf is not a deep hole of G if and only if dR (ฯƒf , G) = n โˆ’ (k + 1). Thus, we have k+1 k โˆ’ a1 xq + ยท ยท ยท . Then ฯƒf is not a deep hole of G if and Proposition 4. Let f (x) = xq only if there exist k + 1 linearly independent elements ฮฒ1 , ฮฒ2 , . . . , ฮฒk+1 of < g1 , ยท ยท ยท , gn > such that det(Rk (ฮฒ1 , ยท ยท ยท , ฮฒk+1 )) , a1 = det(Mk+1 (ฮฒ1 , ยท ยท ยท , ฮฒk+1 )) k where Rk (ฮฒ1 , ยท ยท ยท , ฮฒk+1 ) denotes the matrix Mk+2 (ฮฒ1 , ยท ยท ยท , ฮฒk+1 ) without the row (ฮฒ1q , ยท ยท ยท , qk ). ฮฒk+1 7 Similar to the above discussion, we get the result for Hamming metric case by Theorem k k+dโˆ’2 k+dโˆ’1 k+d + ยท ยท ยท + (โˆ’1)d ad xq + ยท ยท ยท . Then dH (ฯƒf , G) = + a2 x q โˆ’ a1 x q 2. Let f (x) = xq n โˆ’ (k + d) if and only if there exist k + d distinct elements gi1 , gi2 , . . . , gik+d of {g1 , ยท ยท ยท , gn } such that det(Rk+dโˆ’i (gi1 , ยท ยท ยท , gik+d )) ai = , for all 1 โ‰ค i โ‰ค d, det(Mk+d (gi1 , ยท ยท ยท , gik+d )) where Rk+dโˆ’i (gi1 , ยท ยท ยท , gik+d ) denotes as the above. k+1 k โˆ’ a1 xq + ยท ยท ยท . Then ฯƒf is not a deep hole of G with Proposition 5. Let f (x) = xq Hamming metric if and only if there exist k + 1 distinct elements gi1 , gi2 , . . . , gik+1 of {g1 , ยท ยท ยท , gn } such that det(Rk (gi1 , ยท ยท ยท , gik+1 )) a1 = , det(Mk+1 (gi1 , ยท ยท ยท , gik+d )) k where Rk (gi1 , ยท ยท ยท , gik+d ) denotes the matrix Mk+2 (gi1 , ยท ยท ยท , gik+d ) without the row (giq1 , ยท ยท ยท , k giqk+1 ). In the following we discuss the error distance of a special class of words to certain Gabidulin codes by using the above results. Before that, we give two lemmas. Lemma 3. [17] Let a be in a finite field Fq and p be the characteristic of Fq . Then the trinomial xp โˆ’ x โˆ’ a is irreducible in Fq [x] if and only if TrFq /Fp (a) 6= 0. For a finite field Fq , the integer-valued function v on Fq is defined by v(b) = โˆ’1 for b โˆˆ Fโˆ—q and v(0) = q โˆ’ 1. Lemma 4. [17] For even q, let a โˆˆ Fq with trFq (a) = 1 and b โˆˆ Fq , then the number of solutions of the equation x21 + x1 x2 + ax22 = b is q โˆ’ v(b). We first consider the finite field F2m . Let h(x1 , x2 ) = x21 + x1 x2 + x22 . For any b โˆˆ F2m , let the set S(h(x1 , x2 ) = b) = {(c1 , c2 ) โˆˆ F2m ร— F2m |h(c1 , c2 ) = b, c1 6= c2 , ci 6= 0, i = 1, 2} and N (h(x1 , x2 ) = b) = |S(h(x1 , x2 ) = b)|. We consider two cases: Case 1: m is odd, which implies that Tr2m (1) = 1. If b = 0, the number of solutions of the equation h(x1 , x2 ) = b is 2m โˆ’ v(b) = 1 by Lemma 4. Since (0, 0) is a solution, S(h(x1 , x2 ) = b) = โˆ… and N (h(x1 , x2 ) = b) = 0. If b 6= 0, the number of solutions of the equation h(x1 , x2 ) = b is 2m + 1 by Lemma 4. Thus, N (h(x1 , x2 ) = b) = 2m + 1 โˆ’ 2 since any element in F2m is a square. We also obtain the corresponding S(h(x1 , x2 ) = b). 8 Case 2: m is even, which implies that Tr2m (1) = 0. By Lemma 3, x2 + x + 1 is reducible over F2m and so it can be written as x2 + x + 1 = (x + ฮฑ)(x + ฮฒ) where ฮฑ, ฮฒ โˆˆ F2m , ฮฑ 6= 1, ฮฒ 6= 1 and ฮฑ 6= ฮฒ. Thus, x21 + x1 x2 + x22 = (x1 + ฮฑx2 )(x1 + ฮฒx2 ) = b and so the number of solutions of h(x1 , x2 ) = b is 2m + 2m โˆ’ 1 if b = 0 or 2m โˆ’ 1 if b 6= 0. If b = 0, then N (h(x1 , x2 ) = b) = 2m+1 โˆ’ 2 and also we get S(h(x1 , x2 ) = b). If b 6= 0, N (h(x1 , x2 ) = b) = 2m โˆ’ 1 โˆ’ 2 since any element in F2m is a square. We also get S(h(x1 , x2 ) = b). From the above discussion, we get the following result. Proposition 6. Let G be the Gabidulin code over F2m with g = {g1 , . . . , gn }, dimension k = 1 and 3 โ‰ค n โ‰ค m. Let f (x) = x4 + bx2 + cx, where b, c โˆˆ F2m . Then ฯƒf is not a deep hole of G if and only if there are two elements ฮฒ1 and ฮฒ2 in < g1 , ยท ยท ยท , gn > such that (ฮฒ1 , ฮฒ2 ) โˆˆ S(h(x1 , x2 ) = b). In particular, if n = m, then ฯƒf is a deep hole of G if and only if b = 0 and m is odd. Proof. Note that two nonzero elements ฮฒ1 and ฮฒ2 are linearly independent over F2 if and only if ฮฒ1 6= ฮฒ2 . Thus, by Proposition 4, ฯƒf is not a deep hole of G if and only if there are two distinct nonzero elements ฮฒ1 and ฮฒ2 in < g1 , ยท ยท ยท , gn > such that b = ฮฒ12 + ฮฒ1 ฮฒ2 + ฮฒ22 , i.e., (ฮฒ1 , ฮฒ2 ) โˆˆ S(h(x1 , x2 ) = b). In particular, if n = m, then < g1 , ยท ยท ยท , gn >= F2m . By the above discussion, ฯƒf is a deep hole only when b = 0 and m is odd. For the other cases, N (h(x1 , x2 ) = b) is at least 1. Therefore, the desired result is obtained. Remark 1. Proposition 6 may not hold for the case of Hamming metric by Proposition 5 since it is possible that h(x1 , x2 ) = b has no solutions in {g1 , ยท ยท ยท , gn } when b 6= 0 although h(x1 , x2 ) = b always has solutions in F2m . Proposition 7. Let G be the Gabidulin code over Fqm where m is odd, 3 โ‰ค n โ‰ค m, any 2 linearly independent set g = {g1 , . . . , gn } and dimension k = 1. Let f (x) = xq + cx with c โˆˆ Fqm . Then ฯƒf is a deep hole of G. Proof. Suppose that ฯƒf is not a deep hole of G. By Proposition 4, there are two linearly 2 2 independent elements ฮฒ1 and ฮฒ2 in < g1 , ยท ยท ยท , gn > such that b = 0 = ฮฒ1 ฮฒ2 (ฮฒ2q โˆ’1 โˆ’ ฮฒ1q โˆ’1 ). 2 Thus, (ฮฒ2 ฮฒ1โˆ’1 )q โˆ’1 = 1. Since m is odd, gcd(q 2 โˆ’ 1, q m โˆ’ 1) = q โˆ’ 1. So we have (ฮฒ2 ฮฒ1โˆ’1 )qโˆ’1 = 1, which implies that ฮฒฮฒ21 โˆˆ Fq i.e., ฮฒ1 and ฮฒ2 are linearly dependent over Fq . This contradicts with the assumption of ฮฒ1 and ฮฒ2 . Finally, we consider the deep holes of the Gabidulin codes with large dimension k = n โˆ’ 2 and m = n. 9 Proposition 8. Let G be the Gabidulin code over Fqn with linearly independent set g = nโˆ’1 + fโ‰คnโˆ’3 , where fโ‰คnโˆ’3 is a q{g1 , . . . , gn } and dimension k = n โˆ’ 2. Let f (x) = xq linearized polynomial over Fqn of degree less than or equals to n โˆ’ 3. Then ฯƒf is a deep hole of G. Proof. Suppose that ฯƒf is not a deep hole of G. By Proposition 4, there are n โˆ’ 1 linearly independent elements ฮฒ1 , . . . , ฮฒnโˆ’1 in < g1 , ยท ยท ยท , gn > such that det(Rnโˆ’2 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 )) = 0. det(Mnโˆ’1 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 )) (2) For any matrix A = (aij ), denote by A(q) the matrix (aqij ). Then ๏ฃซ ฮฒ1q 2 ฮฒ1q .. . ๏ฃฌ ๏ฃฌ ๏ฃฌ (q) Rnโˆ’2 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 ) = ๏ฃฌ ๏ฃฌ ๏ฃฌ qnโˆ’2 ๏ฃญ ฮฒ1 n ฮฒ1q ฮฒ2q 2 ฮฒ2q .. . nโˆ’2 ฮฒ2q n ฮฒ2q ... ... .. . q ฮฒnโˆ’1 q2 ฮฒnโˆ’1 .. . nโˆ’2 q . . . ฮฒnโˆ’1 qn . . . ฮฒnโˆ’1 ๏ฃถ ๏ฃท ๏ฃท ๏ฃท ๏ฃท. ๏ฃท ๏ฃท ๏ฃธ n Note that ฮฒiq = ฮฒi . Thus ๏ฃซ ฮฒ1q 2 ฮฒ1q .. . ๏ฃฌ ๏ฃฌ ๏ฃฌ (q) Rnโˆ’2 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 ) = ๏ฃฌ ๏ฃฌ ๏ฃฌ qnโˆ’2 ๏ฃญ ฮฒ1 ฮฒ1 ฮฒ2q 2 ฮฒ2q .. . nโˆ’2 ฮฒ2q ฮฒ2 ... ... .. . q ฮฒnโˆ’1 q2 ฮฒnโˆ’1 .. . nโˆ’2 q . . . ฮฒnโˆ’1 . . . ฮฒnโˆ’1 ๏ฃถ ๏ฃท ๏ฃท ๏ฃท ๏ฃท, ๏ฃท ๏ฃท ๏ฃธ (q) and det(Rnโˆ’2 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 )) = (โˆ’1)nโˆ’1 det(Mnโˆ’1 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 )). It is easy to see that det(A(q) ) = (det(A))q , for any matrix A over finite field with characteristic p. Thus (q) (det(Rnโˆ’2 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 )))q = det(Rnโˆ’2 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 )) = (โˆ’1)nโˆ’1 (det(Mnโˆ’1 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 )))q 6= 0, i.e., det(Rnโˆ’2 (ฮฒ1 , ยท ยท ยท , ฮฒnโˆ’1 )) 6= 0, which contradicts to Eq. (2). Thus ฯƒf is a deep hole of G. The proposition holds. Remark 2. Indeed, according to the process of the above proof, the conclusion of Proposinโˆ’2 nโˆ’1 + fโ‰คnโˆ’3 over Fqn , โˆ’ axq tion 8 still holds for any q-linearized polynomial f (x) = xq nโˆ’1 1โˆ’q โˆ— where a 6= (โˆ’1) b for all b โˆˆ Fqn . Propositions 7 and 8 still hold for Hamming metric after similar analysis. 10 5 Conclusions In this paper, we study the deep-holes of Gabidulin codes with both Hamming metric and rank metric. The general results for Hamming metric case (see Theorem 2 and Proposition 5) depend on the choice of the set {g1 , . . . , gn }, while the results for rank metric case (see Theorem 1 and Proposition 4) only depend on the subspace of Fqm spanned by g1 , . . . , gn . In particular, when n = m, the latter case does not depend on the choice of g1 , . . . , gn since < g1 , . . . , gn > equals to the whole space Fqm . Hence the problem about deep-holes of Gabidulin codes with Hamming metric seems more complicated than the rank metric case. On the other hand, for generalized Reed-Solomon codes, it has been proved that the problem of determining if a received word is a deep hole is NP-hard [11]. For Gabidulin codes, the problem seems more complicated although we give a necessary and sufficient condition for this problem. So we state it as a conjecture. Conjecture 1. Deciding deep holes of the Gabidulin code is NP-hard. References [1] D. Bartoli, M. Giulietti and I. Platoni, On the covering radius of MDS codes, IEEE Transactions on Information Theory, vol. 6, No. 2, pp. 801-811, 2015. [2] Q. Cheng and E. Murray, On deciding deep holes of Reed-Solomon codes, Lecture notes in Computer Science, vol. 4484, pp. 296-305, 2007. [3] Q. Cheng and D. Wan, On the list and bounded distance decodability of Reed-Solomon codes, SIAM Journal on Computing, vol. 37, no. 1, pp. 195-209, 2007. [4] G. Cohen, M. Karpovsky, H. Mattson and J. Schatz, Covering radiusโ€“survey and recent results, IEEE Transactions on Information Theory, vol. 31, No. 3, pp: 328-343, 1985. [5] G. Cohen, A. C. Lobstein and N. Sloane, Further results on the covering radius of codes, IEEE Transactions on Information Theory, vol. 32, no. 5, pp: 680-694, 1986. [6] P. Delsarte, Bilinear forms over a finite field with applications to coding theory, Journal of Combinatorial Theory, Series A, vol. 25, No.3, pp: 226-241, 1978. [7] E. M. Gabidulin, Theory of codes with maximum rank distance, Problemy Peredachi Informatsii, vol. 21, No. 1, pp: 3-16, 1985. [8] M. Gadouleau and Z. Yan, Packing and covering properties of rank metric codes, IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 3873-3883, 2008. [9] M. Gadouleau and Z. Yan, Properties of codes with the rank metric, in Proc. IEEE Globecom 2006, San Francisco, CA, 2006. 11 [10] R. Graham and N. Sloane, On the covering radius of codes, IEEE Transactions on Information Theory, vol. 31, no. 3, pp: 385-401, 1985. [11] V. Guruswami and A. Vardy, Maximum-likelihood decoding of Reed-Solomon codes is NP-hard, In Proceeding of SODA, pp. 2249-2256, 2005. [12] T. Helleseth, T. Klove and J. Mykkeltveit, On the covering radius of binary codes, IEEE Transactions on Information Theory, vol. 24, no. 5, pp: 627-628, 1978. [13] A. Horlemann-Trautmann and M. Kuijper, Gabidulin decoding via minimal bases of linearized polynomial modules, Mathmatics, 2014. [14] M. Keti and D. Wan, Deep holes in Reed-Solomon codes based on Dickson polynomials, Finite Fields & Applications, Vol. 40, pp: 110-125, 2016. [15] R. Koฬˆtter and R. R. Kschischang, Coding for errors and erasures in random networking coding, IEEE Transactions on Information Theory, vol. 54, No. 8, pp. 3579-3591, 2008 . [16] Q. Liao, On Reed-Solomon codes, Chinese Annals of Mathematics, no. 1, pp. 89-98, 2011. [17] R. Lidl and H. Niederreiter, Finite fields, Cambridge University Press, Cambridge, London. [18] P. Loidreau, Properties of codes in rank metric, http://arxiv.org/abs/cs/ 0610057. [19] D. Silva, F. R. Kschischang and R. Koฬˆtter, A rank-metric approach to error control in random network coding, IEEE Transactions on Information Theory, vol. 54, No.9, pp: 3951-3967, 2008. [20] W. B. Vasantha, N. Suresh Babu, On the covering radius of rank-distance codes. Gaita Sandesh 13 (1999), no. 1, 4348. [21] D. Wan and Y. Li, On error distance of Reed-Solomon codes, Science in China, vol. 51, no. 11, pp: 1982-1988, 2008. [22] R. Wu and S. Hong, On deep holes of standard Reed-Solomon codes, Science China Mathematics, vol. 55, no. 12, pp. 2447-2455, 2012. [23] J. Zhang, F.-W. Fu and Q. Liao, New deep holes of generalized Reed-Solomon codes, Scientia Sinica, vol. 43, no. 7, pp. 727-740, 2013. [24] J. Zhang and D. Wan, On deep holes of projective Reed-Solomon codes, International Symposium on Information Theory, pp: 925-929, 2016. [25] J. Zhang and D. Wan, Explicit Deep Holes of Reed-Solomon Codes, arXiv:1711.02292. [26] J. Zhuang, Q. Cheng and J. Li, On determining deep holes of generalized ReedSolomon codes, IEEE Transactions on Information Theory, vol. 62, no. 1, pp. 199-207, 2016. 12
7cs.IT
ASYMPTOTIC BOUNDS ON THE GLOBALLY OPTIMAL POSITIONS OF ORTHOGONAL STIFFENERS FOR RECTANGULAR PLATES IN ELASTOSTATIC BENDING Nathan Perchikovโˆ— School of Mechanical Engineering, Faculty of Engineering, Tel Aviv University, Ramat Aviv, Tel Aviv 69978, Israel Abstract The present paper treats the problem of finding the asymptotic bounds for the globally optimal locations of orthogonal stiffeners minimizing the compliance of a rectangular plate in elastostatic bending. The essence of the paper is the utilization of a method of analysis of orthogonally stiffened rectangular plates first presented by Mazurkiewicz in 1962, and obtained herein in a closed form for several special cases in the approximation of stiffeners having zero torsional rigidity. Asymptotic expansions of the expressions for the deflection field of a stiffened plate are used to derive limit-case globally optimal stiffening layouts for highly flexible and highly rigid stiffeners. A central result obtained in this work is an analytical proof of the fact that an array of flexible enough orthogonal stiffeners of any number, stiffening a simply-supported rectangular plate subjected to any lateral loading, is best to be put in the form of exactly two orthogonal stiffeners, one in each direction. Keywords Elastic plate bending; Orthogonal stiffeners; Fredholm's 2nd kind integral equation; Asymptotic analysis; Globally optimal positions 1 INTRODUCTION This paper addresses the well-known problem of optimal positioning of straight, uniform, orthogonal beam-stiffeners of a given number or, integrally attached to a thin, rectangular, isotropic and homogeneous plate subjected to lateral, elastic, quazistatic loading, in a layout minimizing the total work done by the loads, in a formulation resembling an earlier version by Dems et al. (1989). Herein, as in a majority of previous works, it is assumed that the neutral lines of the stiffeners coincide with the neutral surface of the plate. Both the analysis and the optimal design problems have gained substantial attention in the literature. The early papers of Nowacki (1954a,1954b) and Mazurkiewicz (1962a,1962b) solved the analysis problem by assuming the stiffeners positioned symmetrically about the neutral surface of the plate and enforcing geometric compatibility between the plate and the stiffeners as well as the static equilibrium of both the stiffeners (the Euler-Bernoulli equation) and the plate (the Love-Kirchhoff equation). In the work of Mazurkiewicz (1962), the case of a simply-supported plate was treated and the influence of the stiffeners was viewed as effective distributed line loads expressed as double sine series. The procedure employed by Mazurkiewicz for bidirectional stiffening with beams having non-negligible torsional rigidity produced infinite sets of linear algebraic equations that had to be cut off and solved simultaneously. A proof of the convergence of such algebraic systems is given by Fletcher and Thorne (1955), within the context of the analysis of unstiffened plates having arbitrary boundary conditions. In the work of Dems et al. (1989), the equilibrium equations for the plate and the stiffeners are replaced by the use of the Green functions of the bending of simply-supported plate and beams, and the compatibility equation is formulated as Fredholm's integral equation of the 1st kind, which is solved numerically by assuming that the stiffeners are attached to the plate in a finite number of points and the effective point loads corresponding to geometric compatibility at those points are computed, again by the simultaneous solution of cut infinite linear algebraic equations. Various aspects of the analysis of quazistatic bending, free vibrations and buckling of orthogonally stiffened rectangular simply-supported plates using double sine series representations were examined (Konchkovskii 1984; Savin et al. 1964; Grigolyuk et al. 1980; Andrianov et al. 1985; Kalamkarov 1992). The (sometimes called inverse) optimization problem, of optimal positioning of stiffeners has gained not less an extensive coverage. In the work of Dems et al. (1989) the locations of the stiffeners are varied to decrease the work done by a given quazistatic lateral loading, where the optimization procedure utilizes an optimality criterion derived variationally. In their work, Grayhack and Mahar (1990) consider highly flexible stiffeners positioned in a layout increasing the minimum buckling load and obtain an analytic form of the equations determining the optimal locations. The objective of the present paper is the derivation of a closed-form expression for the elastic strain โˆ— E-mail: [email protected] 1 energy in a simply supported thin rectangular plate stiffened with a single set of parallel stiffeners and subjected to a harmonic loading, an asymptotic expansion of the elastic strain energy with respect to a nondimensional parameter representing the ratio of the bending rigidity of the stiffeners and the plate, and analytical globally optimal minimization of the compliance with respect to the locations of the stiffeners. In addition, a closed form, globally optimal bound for the optimal layout of asymptotically flexible stiffeners is derived for the case of bidirectional stiffening. The essence of the results presented herein is the explicitness, simplicity and global optimality of the expressions for the optimal layouts of highly flexible and highly rigid stiffeners. In the present work, in contrast to the procedure followed by Dems et al. (1989), the geometric compatibility equation (between the plate and the stiffeners) is formulated as Fredholm's 2nd kind integral equation, which, unlike the 1st kind equation can be solved analytically for the case of a double-sine expressible Green's kernel function. This method is equivalent to the method used by Nowacki (1954) and Mazurkiewicz (1962) with the exception that here a closed form expression is obtained, mainly (but not solely) due to the restriction to unidirectional stiffening. A thorough review of solutions of contact problems in plate and shell bending by reformulation of the governing equations into 2nd kind Fredholm's equations can be found in the work of Grigolyuk et al. (1980). A different approach is described in the books of Andrianov et al. (1980) and Kalamkarov (1992), where the method of homogenization is applied. Finding an anisotropic plate structurally equivalent to a ribstiffened isotropic plate is widely used in development of finite elements, topological optimization and analysis of uniformly stiffened panels. Although obviously advantageous in the aforementioned cases, the method of homogenization is not necessarily more suitable for the purpose of finding the globally optimal locations of asymptotically rigid stiffeners. A discussion on certain mathematical aspects of the method is given by Andrianov et al. (1980). A review of applications of the method is carried out by Kalamkarov (1992). The outline of the present paper is as follows. In section 2, the deflection field of a stiffened plate is derived self-consistently, assuming continuous interfaces between the plate and the stiffeners, resulting in a closed form expression for a unidirectionally stiffened simply supported plate subjected to bisinusoidal loading, and in double-sine series for general loading cases. In section 3, the solution is generalized to account for bidirectional stiffening. In section 4, torsional rigidity is taken into account for the simpler case of unidirectional stiffening. In section 5, on the basis of the results of sections 2, 3 and 4, asymptotic, explicit and globally optimal bounds for the optimal locations of highly flexible and highly rigid uni- or bidirectional stiffeners with or without torsional rigidity are obtained analytically. 2 ANALYSIS OF UNIDIRECTIONALLY STIFFENED PLATES This section outlines the procedure of derivation of the linear elastic deflection field of a thin, rectangular, homogenous, isotropic, simply supported plate of a uniform thickness, subjected to a prescribed lateral loading and stiffened with straight uniform parallel open-section beams, all perpendicular to one of the sides of the plate, and having locations specified parametrically. Graphical representation of the problem follows in Fig. 1, where ฮพ and ฮท denote the planar Cartesian coordinates, a, b and t the dimensions of the plate, p(ฮพ,ฮท) the distribution of the lateral loading and x1, x2 the locations of the stiffeners. The bending rigidities of the plate and the stiffeners are denoted by D, E1I1 and E2I2, respectively. Fig. 1 Representation of the problem (the lower half of a plate stiffened symmetrically with respect to its neutral surface) 2 The Love-Kirchhoff model is used to describe the bending of the plate. The stiffeners are assumed to behave as Euler-Bernoulli beams, positioned symmetrically with respect to the neutral surface of the plate and having the same deflection as the neutral surface, along their longitudinal axes. The influence of the ith stiffener on the plate is represented by a distributed force per unit length, qi(xi,ฮท), defined as positive when acting upwards. The stiffeners and the plate are assumed to have the same boundary conditions. In the case considered in the present section the beams are all simply supported. Each beam is assumed to be subjected to a distributed force per unit length qi(xi,ฮท), defined as positive acting when downwards, as shown in Fig. 2. (a) (b) Fig. 2 (a) The distributed force that the plate applies on the ith stiffener and (b) The distributed force that the ith stiffener applies on the plate The solution procedure presented here is based on the infinitesimal deformation assumption, according to which the deflection of the plate is small relatively to its thickness, and the thickness, in turn, is small relatively to the (say, geometric) average of the lengths of the edges of the plate. According to this assumption, the bending of the plate is uncoupled with the in-plane stretch and can therefore be described by a single force balance equation for the static equilibrium deflection of the neutral surface (usually the middle surface) of the plate, and the appropriate boundary conditions. This paper treats the problem of small-strain elastic bending of a thin, simply supported plate. This means that the plate is treated as if it had a line of hinges on each of two of its adjacent edges and a line of moving supports, say, moving bearings, on each of the other two edges. Accordingly, the deflection field of the plate would follow from the Love-Kirchhoff assumptions. The derivation of the elastic infinitesimal deflection field will follow from linear superposition: N w(ฮพ ,ฮท , x) = w p (ฮพ ,ฮท ) + โˆ‘ wqi (ฮพ ,ฮท , x) = (2.1) i =1 =โˆซ b โˆซ a 0 0 N a i =1 0 p (ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท ,ฮฑ , ฮฒ )dฮฒdฮฑ +โˆ‘ โˆซ qi ( xi , ฮฒ , x) w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ where w(ฮพ,ฮท,x) is the total deflection of the stiffened plate at a point which coordinates are denoted by ฮพ and ฮท, namely, at (ฮพ,ฮท), wp(ฮพ,ฮท) is the deflection of the plate alone due to the external load alone at (ฮพ,ฮท), w1(ฮพ,ฮท,ฮฑ,ฮฒ) is the deflection of the unstiffened plate at (ฮพ,ฮท) due to a unit lateral force acting at (ฮฑ,ฮฒ), p(ฮพ,ฮท) is the function describing the distribution of the given external lateral load, x is the vector of the ฮพ coordinates of the stiffening beams and q(ฮพ,ฮท,x) is the vector of the distributed forces per unit length representing the forces acting between the plate and the stiffeners (due to the external load) when the system is in equilibrium, each of which components corresponds to each of the N stiffeners. Equation (2.1) assumes that p(ฮพ,ฮท) is everywhere small enough for the deflection of the plate to be small relatively to its thickness. According to Newton's third law, qi ( xi ,ฮท , x ) = โˆ’ qiB ( xi ,ฮท , x ) (2.2) where the superscript B represents the fact that the distributed force is applied at the beams representing the stiffeners. It is now due to geometric compatibility, representing the fact that the stiffeners are considered integrally attached to the plate, that the deflection fields of the stiffeners are equal to the deflection field of the stiffened plate, along their interfaces, namely: w( xi ,ฮท , x) = wiB ( xi ,ฮท , x ) (2.3) Next, assuming that the stiffeners can be treated as Euler-Bernoulli beams, one can write: qiB ( xi ,ฮท , x) = Ei I i โˆ‚ 4 wiB ( xi ,ฮท , x) โˆ‚ฮท 4 Substituting equations (2.2) and (2.3) into the above relation, results in: 3 (2.4) q i ( xi , ฮท , x ) = โˆ’ E i I i โˆ‚ 4 w( xi ,ฮท , x) โ‰ก โˆ’ Ei I i wฮท( IV ) ( xi ,ฮท , x) โˆ‚ฮท 4 (2.5) Next, substituting equation (2.5) into equation (2.1) produces the integro-differential equation for the deflection field of the stiffened plate (which can be turned into a standard Fredholm integral equation of the 2nd kind โ€“ and solved using the standard procedure โ€“ either by differentiating or by performing integration by parts four times consecutively): w(ฮพ ,ฮท , x) = โˆซ b a โˆซ 0 0 N a i =1 0 p(ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท ,ฮฑ , ฮฒ )dฮฒdฮฑ โˆ’ โˆ‘ Ei I i โˆซ wฮฒ( IV ) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ ) dฮฒ (2.6) Here, use is made of Greenโ€™s function for the bending of a Love-Kirchhoff simply-supported plate as obtained by Navier (Szilard (1974)): โˆž 4 sin(nฯ€ฮฑ / b)sin( sฯ€ฮฒ / a )sin(nฯ€ฮพ / b)sin( sฯ€ฮท / a ) โˆ‘ 4 ฯ€ abD n,s =1 ( n 2 / b2 + s 2 / a 2 ) 2 w1 (ฮพ ,ฮท , ฮฑ , ฮฒ ) = (2.7) and uniform beams are assumed: E j I j (ฮท ) = E j I j โˆ€ 1โ‰ค j โ‰ค N (2.8) Next, taking a double-sine transform of the loading, 4 b a p(ฮฑ , ฮฒ ) sin(nฯ€ฮฑ / b) sin( rฯ€ฮฒ / a )d ฮฒ dฮฑ ab โˆซ0 โˆซ0 Pnr = (2.9) and introducing the auxiliary function: ฮป jn โ‰ก E j I j sin(nฯ€ x j / b) (2.10) the deflection field of a unidirectionally stiffened simply supported plate for a general loading becomes: w(ฮพ ,ฮท , x) = T 1 โˆž sin(mฯ€ฮพ / b) sin(rฯ€ฮท / a) ๏ฃซ 2r 4 ๏ฃฑ โˆž ฮป m sin(nฯ€x / b) ๏ฃฎ 2r 4 ๏ฃฌ P + ร— ๏ฃฒ โˆ‘ โˆ‘ mr ๏ฃฏ a 4 bD ๏ฃณ n =1 (n 2 / b 2 + r 2 / a 2 ) 2 ๏ฃฐ a 4 bD ฯ€ 4 D m, r =1 (m 2 / b 2 + r 2 / a 2 ) 2 ๏ฃฌ๏ฃญ โˆž ๏ฃซ ฮป ยต sin( ยตฯ€x / b) 2r sin(nฯ€x T / b)๏ฃฌ 1 + 4 โˆ‘ ๏ฃฌ a bD ยต =1 ( ยต 2 / b 2 + r 2 / a 2 ) 2 ๏ฃญ T 4 ๏ฃถ ๏ฃท ๏ฃท ๏ฃธ โˆ’1 โˆž โˆ‘ (ฮฝ ฮฝ =1 (2.11) ๏ฃน ๏ฃผ๏ฃด ๏ฃถ โˆ’ Pnr ๏ฃบ ๏ฃฝ ๏ฃท /b +r /a ) ๏ฃป ๏ฃด๏ฃพ ๏ฃท๏ฃธ ฮป ฮฝ Pฮฝr 2 2 2 2 2 The elastic strain energy stored in the deformed structure, consistent of the energy stored in the stiffened plate and the energy stored in the stiffeners, is equal to the work done by the external loads, and can be obtained accordingly as: U= 1 a b p (ฮพ ,ฮท ) w(ฮพ ,ฮท , x)dฮพdฮท 2 โˆซ0 โˆซ0 (2.12) Next, if one assumes a sinusoidal loading distribution, p(ฮพ ,ฮท ) = Pgh sin( gฯ€ฮพ / b) sin(hฯ€ฮท / a) โ‡’ Pkr = Pghฮด gk ฮด hr (2.13) The deflection field of the stiffened plate becomes: w(ฮพ ,ฮท , x) = + Pgh sin( gฯ€ฮพ / b) sin(hฯ€ฮท / a) + ฯ€ 4 D (g 2 / b 2 + h 2 / a 2 ) 2 4h 8 Pgh ฯ€ a b D 4 8 2 โˆž 3 โˆ‘ m =1 ฮป Tm sin(mฯ€ฮพ / b) sin(hฯ€ฮท / a) (m / b + h / a ) 2 2 2 2 2 โˆž โˆ‘ (n n =1 2 โˆ’1 sin(nฯ€x / b) ร— / b2 + h2 / a2 )2 T ๏ฃซ ฮปg 2h 4 โˆž ฮป ยต sin( ยตฯ€x / b) ๏ฃถ๏ฃท ร— sin(nฯ€x T / b)๏ฃฌ 1 + 4 โˆ‘ 2 2 2 2 2 2 2 ๏ฃฌ a bD ยต =1 ( ยต / b + h / a ) ๏ฃท ( g / b + h 2 / a 2 ) 2 ๏ฃญ ๏ฃธ 4 T 2h Pgh โˆž ฮป sin(mฯ€ฮพ / b) sin(hฯ€ฮท / a) sin( gฯ€x / b) โˆ’ 4 4 2โˆ‘ m 2 2 2 2 2 2 ฯ€ a bD m =1 (m / b + h / a ) (g / b 2 + h 2 / a 2 ) 2 4 (2.14) Hence, more compact a form of the deflection field of a stiffened plate can be obtained. First, using a well-known trigonometric identity: โˆž โˆ‘ n =1 2 sin( nฯ€x j / b) sin( nฯ€xi / b) (n / b + r / a ) 2 2 2 2 2 โˆž =โˆ‘ n =1 cos[ nฯ€ ( x j โˆ’ xi ) / b] (n / b + r / a ) 2 2 2 2 2 โˆž โˆ’โˆ‘ cos[ nฯ€ ( x j + xi ) / b] (n 2 / b 2 + r 2 / a 2 ) 2 n =1 (2.15) the double sine sums in (2.14) can be written as a difference between two single cosine sums. Then, summing the cosine series analytically by relating them to a function that produces a known sine series, the following result is obtained (this matter is further addressed in section 5.2): โˆž d โˆž cos(nฯ€x / b) ( nฯ€ / b) sin( nฯ€x / b) = โˆ’ = โˆ‘ โˆ‘ 2 2 2 2 2 dx n =1 ( n 2 / b 2 + r 2 / a 2 ) 2 n =1 ( n / b + r / a ) = (2.16) ab 2 sinh(ฯ€rx / a ) โˆ’ abx sinh(ฯ€rb / a ) cosh(ฯ€r[b โˆ’ x ] / a ) 4ฯ€ โˆ’3 r sinh 2 (ฯ€rb / a ) By integrating (2.16) and substituting the result into (2.14), an expression with no infinite sums is obtained. Defining, component-wise, the following quantities (i and j being the indices related to the numbers of the stiffeners): B jir = cosh(ฯ€r[b โˆ’ x j โˆ’ x i ] / a) r 2 E j I j ๏ฃฑ cosh(ฯ€r[ x j โˆ’ x i ] / a) โˆ’ cosh(ฯ€r[ x j + x i ] / a ) +a ๏ฃฒb 3 2 2 ฯ€r sinh(ฯ€rb / a) 2ฯ€ a D ๏ฃณ sinh (ฯ€rb / a) (2.17) cosh(ฯ€r[b โˆ’ xi โˆ’ x j ] / a) x j โˆ’ x i sinh(ฯ€r[b โˆ’ x j โˆ’ x i ] / a) โˆ’ ( x j + x i ) sinh(ฯ€r[b โˆ’ x i โˆ’ x j ] / a) ๏ฃผ๏ฃด โˆ’a + ๏ฃฝ ฯ€r sinh(ฯ€rb / a) sinh(ฯ€rb / a) ๏ฃด๏ฃพ cosh(ฯ€h[b โˆ’ x j โˆ’ ฮพ ] / a) Pgh h 2 sin( hฯ€ฮท / a) E j I j ๏ฃฑ cosh(ฯ€h[ x j โˆ’ ฮพ ] / a ) โˆ’ cosh(ฯ€h[ x j + ฮพ ] / a ) +a ๏ฃฒb 3 2 2 ฯ€h sinh(ฯ€hb / a) 2ฯ€ a D sinh (ฯ€hb / a ) ๏ฃณ (2.18) cosh(ฯ€h[b โˆ’ ฮพ โˆ’ x j ] / a) x j โˆ’ ฮพ sinh(ฯ€h[b โˆ’ x j โˆ’ ฮพ ] / a) โˆ’ ( x j + ฮพ 0 ) sinh(ฯ€h[b โˆ’ ฮพ โˆ’ x j ] / a) ๏ฃผ๏ฃด โˆ’a + ๏ฃฝ ฯ€h sinh(ฯ€hb / a) sinh(ฯ€hb / a) ๏ฃด๏ฃพ s jh = S jih = ๏ฃฑ๏ฃด cosh(ฯ€h[ x j โˆ’ x i ] / a ) โˆ’ cosh(ฯ€h[ x j + x i ] / a ) cosh(ฯ€h[b โˆ’ x j โˆ’ x i ] / a ) h2 +a ๏ฃฒb 3 2 2 ฯ€h sinh(ฯ€rb / a ) 2ฯ€ a D ๏ฃด sinh (ฯ€hb / a ) ๏ฃณ (2.19) cosh(ฯ€h[b โˆ’ x i โˆ’ x j ] / a ) x j โˆ’ x i sinh(ฯ€h[b โˆ’ x j โˆ’ x i ] / a ) โˆ’ ( x j + x i ) sinh(ฯ€h[b โˆ’ x i โˆ’ x j ] / a ) ๏ฃผ๏ฃด โˆ’a + ๏ฃฝ ฯ€h sinh(ฯ€rb / a ) sinh(ฯ€hb / a ) ๏ฃด๏ฃพ the deflection field for a bisinusoidal loading in a closed form โ€“ although not totally explicitly, as a solution of a finite linear system of equations is required โ€“ becomes: Pgh sin( gฯ€ฮพ / b) sin( hฯ€ฮท / a ) + s Th [S h (1 + B h ) ฮป g โˆ’ sin( gฯ€x / b)] โˆ’1 wgh (ฮพ ,ฮท , x) = ฯ€ 4 D( g 2 / b 2 + h 2 / a 2 ) 2 (2.20) Having the deflection field corresponding to a bisinusoidal loading, the deflection field for a general loading (expressible as a double sine series) can be derived by superposition: w(ฮพ ,ฮท , x) = โˆž โˆ‘ g , h =1 Pgh sin( gฯ€ฮพ / b) sin(hฯ€ฮท / a) + s Th [S h (1 + B h ) ฮป g โˆ’ sin( gฯ€x / b)] โˆ’1 ฯ€ 4 D( g 2 / b 2 + h 2 / a 2 ) 2 (2.21) Numerical verification of the presented method is omitted here, as an equivalent method has been presented before by Nowacki (1954) and Mazurkiewicz (1962). The analytical summations performed here can only improve convergence and help avoid the Gibbs phenomena. However, in the present paper, the above operations are needed in order to obtain closed-form asymptotic expansions rather than in order to produce a better numerical analysis module. Therefore, no comparison of deflections and stresses of stiffened plates for various loading cases (calculated once with the employed method and once with commercial software tools), is given here. 5 3 GENERALIZATION OF THE ANALYSIS FOR BIDIRECTIONAL STIFFENING The treatment of bidirectional stiffening is not much different from that of the unidirectional one. The deflection field can be obtained using linear superposition: N b i =1 0 w(ฮพ ,ฮท , x) = w p (ฮพ ,ฮท ) + โˆ‘ wqi (ฮพ ,ฮท , x) = โˆซ Nฮท a + โˆ‘ โˆซ qi ( xi , ฮฒ , x) w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ + 0 i =1 โˆซ a p(ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ + 0 Nฮท + N ฮพ (3.1) โˆ‘โˆซ b qi (ฮฑ , xi , x) w1 (ฮพ ,ฮท , ฮฑ , xi )dฮฑ 0 i = Nฮท +1 where qi are the distributed forces per unit length exerted on the plate by the stiffeners, N is the total number of the stiffeners, Nฮท is the number of ฮท-axis aligned stiffeners, and Nฮพ is the number of ฮพ -axis aligned stiffeners. Denoting the interaction forces applied on the ฮพ-axis aligned stiffeners by the ฮท-axis aligned stiffeners by fij, one can write the following relations: Ei I i Nฮท โˆ‚ 4 wi 's Beam (ฮพ ) โˆ‚ 4 w(ฮพ , xi ) = E I = q ( ฮพ ) = โˆ’ q ( ฮพ , x ) + f ij ฮด (ฮพ โˆ’ x j ) โˆ‘ i i on i ' s i i โˆ‚ฮพ 4 โˆ‚ฮพ 4 Beam j =1 (3.2) where the first equality sign is due to the assumption that the neutral axes of the stiffeners coincide with the neutral surface of the plate, the second is due to the Euler-Bernoulli beam theory for uniform beams and the third is obtained by summing up all the forces exerted on the iโ€™s, ฮพ-axis aligned stiffener. The first term after the third equality sign is the distributed force per unit length exerted by the plate on the iโ€™s, ฮพ-axis aligned stiffener, as arises from Newtonโ€™s third law. The function ฮด(x) denotes Diracโ€™s Delta function. For the ฮท-axis aligned stiffeners one can write: Ei I i Nฮท + Nฮพ โˆ‚ 4 w( xi ,ฮท ) = โˆ’ q ( x , ฮท ) + โˆ‘ (โˆ’ f ij )ฮด (ฮท โˆ’ x j ) i i โˆ‚ฮท 4 j = Nฮท +1 (3.3) using the same arguments as before and having (โ€“ fij) instead of fij this time, due to Newtonโ€™s third law. Next, deriving qi from (3.2) and (3.3) and substituting them into (3.1), one has: w(ฮพ ,ฮท , x) = โˆซ b 0 Nฮท โˆ’ โˆ‘โˆซ i =1 + a 0 Nฮท + N ฮพ Nฮพ 0 Nฮพ p (ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ โˆ’ โˆ‘ โˆซ Ei I i wฮฒ( IV ) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ โˆ‘ f ฮด (ฮฒ โˆ’ x ij j )w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ โˆ’ i = Nฮท +1 Nฮท b 0 ij i =1 Nฮท + N ฮพ i =1 + ฮด (ฮฑ โˆ’ x j )w1 (ฮพ ,ฮท , ฮฑ , xi )dฮฑ = โˆซ 0 โˆ‘ โˆ‘f Nฮท Nฮท + N ฮพ ij b 0 a i = Nฮท +1 i =1 0 โˆ‘โˆซ i = Nฮท +1 โˆ’ โˆ‘ โˆซ Ei I i wฮฒ( IV ) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ ) dฮฒ โˆ’ Nฮท + N ฮพ Nฮท a i =1 Nฮท + N ฮพ โˆ‘ โˆซ โˆ‘f i = Nฮท +1 โˆซ a w1 (ฮพ ,ฮท , x j , xi ) โˆ’ โˆ‘ โˆ‘f ij โˆซ b 0 a 0 Ei I i wฮฑ( IV ) (ฮฑ , xi , x)w1 (ฮพ ,ฮท , ฮฑ , xi ) dฮฑ + p (ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ Nฮท + N ฮพ โˆ‘โˆซ i = Nฮท +1 b 0 (3.4) Ei I i wฮฑ( IV ) (ฮฑ , xi , x)w1 (ฮพ ,ฮท , ฮฑ , xi )dฮฑ w1 (ฮพ ,ฮท , xi , x j ) i =1 i = Nฮท +1 Owing to the fact that the influence function for the bending of a simply-supported plate, w1, is symmetric (insensitive to an interchange of the arguments), as one can learn from (2.7), the last two terms in (3.4) cancel each other. Therefore, in deriving the compatibility equation for the bending of an orthogonally stiffened simply-supported plate, one can disregard the interaction forces between the stiffeners, as they cancel out in the final governing equation. Consequently, the governing equation becomes: w(ฮพ ,ฮท , x) = โˆซ b 0 โˆซ a 0 Nฮพ a p (ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ โˆ’ โˆ‘ โˆซ E i I i wฮฒ( IV ) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ i =1 โˆ’ Nฮท + N ฮพ โˆ‘โˆซ i = Nฮท +1 b 0 0 Ei I i wฮฑ( IV) (ฮฑ , xi , x)w1 (ฮพ ,ฮท , ฮฑ , xi ) dฮฑ 6 (3.5) Hence, using expressions (2.7)-(2.10) and the orthogonality of the sine functions, and following the strategy for the solution of integro-differential equations mentioned in section 2, one obtains two sets of compatibility equations for the distributed forces between the stiffeners and the plate, one for each stiffening direction. Making use of (2.17) and introducing the following quantities: b a 0 0 z in โ‰ก Ei I i โˆซ wฮฑ( IV) (ฮฑ , xi , x) sin(nฯ€ฮฑ / b) dฮฑ ; vis โ‰ก Ei I i โˆซ wฮฒ( IV ) ( xi , ฮฒ , x) sin( sฯ€ฮฒ / a)dฮฒ u jr โ‰ก ฮป jn Pnr ยต js Pms r4 โˆž bm 4 โˆž ; y jm โ‰ก 4 โˆ‘ 2 2 ; ยต js โ‰ก E j I j sin( sฯ€x j / a) โˆ‘ 3 2 2 2 2 2 2a D n =1 (n / b + r / a ) 2a D s =1 (m / b + s 2 / a 2 ) 2 C jirn โ‰ก 2r 4 ฮป jn sin(rฯ€xi / a) a 4 bD(n 2 / b 2 + r 2 / a 2 ) ; D jims โ‰ก 2 2m 4 ยต js sin(mฯ€xi / b) a 5 D(m 2 / b 2 + s 2 / a 2 ) โˆž ; F jim โ‰ก โˆ‘ 2 s =1 (3.6) 2m 4 ยต js sin( sฯ€xi / a) a 5 D( m 2 / b 2 + s 2 / a 2 ) 2 and (analytically) decoupling the two sets of compatibility equations mentioned above, one gets a single system defined by the quantities: โˆž ๏ฃฎ ๏ฃน g n โ‰ก (1 + Fn ) โˆ’1 ๏ฃฏy n โˆ’ โˆ‘ D ns (1 + B s ) โˆ’1 u s ๏ฃบ s =1 ๏ฃฐ ๏ฃป (3.7) โˆž ฮœ nm โ‰ก โˆ‘ (1 + Fn ) โˆ’1 D ns (1 + B s ) โˆ’1C sm s =1 which are, respectively, the vector and matrix infinite sets representing the final form of the compatibility equation for the bidirectionally stiffened simply supported thin rectangular plate: โˆž z n = g n + โˆ‘ M nm z m (3.8) m =1 Equation (3.8) is an infinite inhomogeneous linear system of equations in which every equation is by itself a finite system of equations where the number of equations is equal to the number of the stiffeners in the direction parallel to the ฮพ axis. Obviously the relation M nm = M nฮด mn does not hold for any Mn and therefore the infinite system cannot be solved exactly and one has to truncate it in order to solve it. Thus, the system that would have to be solved would be: mf z n = g n + โˆ‘ M nm z m ; 1 โ‰ค n โ‰ค m f << โˆž (3.9) m =1 In order to solve the system, it is necessary to write the finite systems of equations one beneath the other, resulting in a total number of mTot = N y m f unknowns and equations. That is if one has 17 stiffeners in the direction parallel to the ฮพ axis and they taking 100 harmonics in the Fourier series representation of the Green influence function of the bending of the plate, then one would write the first 17 equations for m = 1, and then the 17 equations for m = 2 and so forth up to m = 100, so that eventually they would have 1700 equations or rows in the representing matrix. Similarly, in the vectors one would have 17 components for m = 1 and then 17 components for m = 2 and so forth, with resultant vectors of 1700 components, corresponding to 1700 columns in the representative matrix. Naturally, one could have written the 100 equations corresponding to the 1st stiffener first and have 17 bunches of 100 and not 100 bunches of 17. However, it is better to keep the equations corresponding to the different stiffeners in bunches so that the truncation error will affect them as similarly as possible, so that no stiffener is represented worse than the other. Of course, there still remains the order within each bunch, but this is a smaller effect, there has to be some order anyway. Now, if the solution of the system of equations is achieved by Gauss elimination, then the last equations will have the smallest round-off error as the first to be solved, so that it would be beneficiary to put the first, more important harmonics in the end, that is, to reverse the order described above. Anyhow, defining: 7 ๏ฃฎ M m f ,m f ๏ฃซ gmf ๏ฃถ ๏ฃซ z mf ๏ฃถ ๏ฃท ๏ฃฌ ๏ฃท ๏ฃฌ ๏ฃฏM ๏ฃฌ z m f โˆ’1 ๏ฃท ๏ฃฌ g m f โˆ’1 ๏ฃท ๏ฃฏ m f โˆ’1,m f ๏ฃฌg ๏ฃท ๏ฃฌz ๏ฃท ๏ฃฏM m f โˆ’ 2 , m f z โ‰ก ๏ฃฌ m f โˆ’2 ๏ฃท ; g โ‰ก ๏ฃฌ m f โˆ’2 ๏ฃท ; M โ‰ก ๏ฃฏ . ๏ฃฌ . ๏ฃท ๏ฃฌ . ๏ฃท ๏ฃฏ ๏ฃฌ . ๏ฃท ๏ฃฌ . ๏ฃท ๏ฃฏ . ๏ฃท ๏ฃฌ ๏ฃท ๏ฃฌ ๏ฃฏ ๏ฃฌ z ๏ฃท ๏ฃฌ g ๏ฃท ๏ฃฏ๏ฃฐ M 1,m f ๏ฃญ 1 ๏ฃธ ๏ฃญ 1 ๏ฃธ M m f ,m f โˆ’1 M m f โˆ’1,m f โˆ’1 M m f ,m f โˆ’ 2 M m f โˆ’1,m f โˆ’ 2 M m f โˆ’ 2 ,m f โˆ’1 . . . . . M 1,m f โˆ’1 . . . M m f ,1 ๏ฃน . . M m f โˆ’1,1 ๏ฃบ๏ฃบ . . . ๏ฃบ ๏ฃบ . . . ๏ฃบ . . . ๏ฃบ ๏ฃบ . . M 1,1 ๏ฃป๏ฃบ (3.10) every component in the vectors being a column vector itself and every component in the matrix being a matrix itself, results in the equation: (3.11) z = g + M z โ‡’ (1 โˆ’ M ) z = g m ร—m where the unit matrix is 1 โˆˆ R f f . The solution of equation (3.8) would produce a series of the approximate values of a finite number of the necessary integrals for the evaluation of the deflection field. If the matrix (1 โˆ’ M ) is regular and the system is convergent, then the solution can be written as: z = (1 โˆ’ M ) โˆ’1 g (3.12) Obviously, this is only formal writing. The solution of a system of equations is not achieved by taking the inverse of a large matrix. The system can be solved with the Matlab solver based on LU factorization and Gauss elimination. Next, the question of convergence can be addressed in a two-fold way. First, a proof by Fletcher and Thorne [2] guarantees that a system equivalent to (3.8)-(3.11) is convergent and may be solved to any desired degree of accuracy (unlike, say, an asymptotic system, which can only be solved to a certain, limited degree of accuracy). Second, the system in (3.11) was solved by the author for realistic problem parameters, showing monotonic convergence upon increase in the number of considered harmonics and correlating well with a FEM solution. Now, whereas the solution of a unidirectionally stiffened plate presented in section 2 can be considered analytical and exact, the solution of a bidirectionally stiffened plate may be considered exact and semianalytical. โ€˜Exactโ€™ due to the convergence of the above series, since exactness of a solution is oneโ€™s ability to have it up to any desired degree, which is possible in the present case and โ€˜semi-analyticโ€™ due to the truncation of the infinite series. The procedure one has to follow in order to obtain a solution after (3.12) is not discussed thoroughly here. Shortly, one has to solve (3.11)-(3.12) and substitute the solution into (3.5) using definitions (3.10) and (3.6) and (2.7), thus obtaining the third row in (3.5). For the second row in (3.5) one has to substitute the solution of (3.11) along with the definitions in (3.6) into the following relation, obtained from the analytical decoupling of (3.5): mf ๏ฃซ ๏ฃถ v r = (1 + B r ) โˆ’1 ๏ฃฌ๏ฃฌ u r โˆ’ โˆ‘ C rn z n ๏ฃท๏ฃท n =1 ๏ฃญ ๏ฃธ 4 (3.13) UNIDIRECTIONAL STIFFENERS WITH NON-NEGLIGIBLE TORSIONAL RIGIDITY One can account for the torsional rigidities of the stiffeners (which are relevant especially for the case of stiffeners having closed cross-sections). The torques that the stiffeners apply on the plate can be related to the twisting angles of the plate along the plate-stiffeners interfaces, as follows: for each stiffener, one can employ the constitutional relation of a linear elastic shaft, denoting the torque applied on the plate by T, the shear modulus and the geometric torsion rigidity parameter by G and C respectively, the coordinate changing along the stiffener being ฮท and the perpendicular being ฮพ, assuming small twisting angles. The superscript b implies that a quantity is related to the stiffener. Ti ( xi ,ฮท , x) = โˆ’ Ti b ( xi ,ฮท , x) = โˆ’ C i Gi Newton 3rd Law Shaft Law โˆ‚ฮธ ib โˆ‚ฮธ โ€ฒโ€ฒ ( xi ,ฮท , x) = โˆ’ C i Gi i = โˆ’ C i Gi wฮพฮท โˆ‚ฮท wb = w โˆ‚ฮท ฮธ i <<1 Superimposing, the deflection field of the (for simplicity, unidirectionally) stiffened plate becomes: 8 (4.1) N N b i =1 i =1 0 0 w(ฮพ ,ฮท , x) = w p (ฮพ ,ฮท ) + โˆ‘ wqi (ฮพ ,ฮท , x) + โˆ‘ wTi (ฮพ ,ฮท , x) = โˆซ N a N a i =1 0 i =1 0 โˆซ a p(ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท ,ฮฑ , ฮฒ ) dฮฒdฮฑ + (4.2) + โˆ‘ โˆซ qi ( xi , ฮฒ , x) w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ + โˆ‘ โˆซ Ti ( xi , ฮฒ , x) wT =1 (ฮพ ,ฮท , xi , ฮฒ ) dฮฒ Substituting (4.1) and (2.5) into (4.2) one gets the following integro-differential equation for the deflection field, where only the deflection due to a unit couple, wT =1 , is yet to be determined: w(ฮพ ,ฮท , x) = โˆซ b 0 โˆซ a 0 N a i =1 0 p(ฮฑ , ฮฒ ) w1 (ฮพ ,ฮท , ฮฑ , ฮฒ )dฮฒdฮฑ โˆ’ โˆ‘ Ei I i โˆซ wฮฒ( IV) ( xi , ฮฒ , x)w1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ N a i =1 0 (4.3) โ€ฒโ€ฒ ( xi , ฮฒ , x)wT =1 (ฮพ ,ฮท , xi , ฮฒ )dฮฒ โˆ’ โˆ‘ Gi Ci โˆซ wฮพฮฒ By Bettiโ€™s theorem, the deflection of an elastic structure due to a unit couple at a point is equal to the rotation angle (in the direction of the couple โ€“ perpendicular to the stiffeners, in the present case) โ€“ or the slope, for small rotation angles โ€“ due to a unit force at that point, namely: โˆ‚w (ฮพ ,ฮท , ฮฑ , ฮฒ ) (4.4) wT =1 (ฮพ ,ฮท , xi , ฮฒ ) = 1 โˆ‚ฮฑ ฮฑ =x i Substituting (4.4) into (2.7) this yields: wT =1 (ฮพ ,ฮท , x i , ฮฒ ) = โˆž n cos( nฯ€xi / b ) sin( sฯ€ฮฒ / a ) sin( nฯ€ฮพ / b ) sin( sฯ€ฮท / a ) 4 โˆ‘ 2 (n 2 / b 2 + s 2 / a 2 ) 2 ฯ€ ab D n , s =1 3 (4.5) Substituting (2.7) and (4.5) into (4.3) produces a fully defined integro-differential equation for the deflection field. Naturally, similar steps can be taken if a second, perpendicular, stiffening array is present. Treating the obtained integro-differential equation in a manner similar to the one described in the previous sections, and introducing the following quantities (referring to definition (2.10) again): ฯ„ jn โ‰ก G j C j cos( nฯ€x j / b) , Tr โ‰ก 2ฯ€r 4 โˆž nฮป n cos( nฯ€x T / b) โˆ‘ a 4 b 2 D n =1 ( n 2 / b 2 + r 2 / a 2 ) 2 (4.6) one obtains a first set of compatibility equations: v r = u r โˆ’ B r v r โˆ’ Tr t r (4.7) where use is made of the definitions of Br from (2.17) and ur and vr from (3.6) and: a โ€ฒโ€ฒ ( xi , ฮฒ , x) sin(sฯ€ฮฒ / a)dฮฒ t is โ‰ก Gi Ci โˆซ wฮพฮฒ (4.8) 0 The equation in (4.7) is obtained by calculating the distributed forces-induced deflections at the platestiffeners interfaces from the left-hand side of (4.3). Calculating the distributed torques-induced deflections at the plate-stiffeners interfaces from (4.3) results in a second set of compatibility equations: โˆž โˆž s =1 s =1 t r = ฯ… r โˆ’ โˆ‘ ฮ› rs v s โˆ’ โˆ‘ โ„ฆ rs t s (4.9) where the following definitions have been made: ฯ…r โ‰ก 1 โˆž rs โˆ’ (โˆ’1) r + s s 2 โˆ‘ r2 โˆ’ s2 ฯ€ 3 bD s =1 ฮ› rs โ‰ก โ„ฆ rs โ‰ก โˆž โˆ‘ (n n =1 r+s 2 r+s 2 4 rs โˆ’ (โˆ’1) s 3 2 ฯ€ ab D r2 โˆ’ s2 4 rs โˆ’ ( โˆ’1) s 2 3 ฯ€ ab D r2 โˆ’ s2 โˆž nฯ„ n Pns / b2 + s 2 / a2 )2 nฯ„ n sin(nฯ€x T / b) 2 / b2 + s 2 / a2 )2 โˆ‘ (n n =1 n 2 ฯ„ n cos(nฯ€x T / b) 2 / b2 + s 2 / a2 )2 n =1 โˆž โˆ‘ (n One can decouple the two systems (4.7) and (4.9) analytically. 9 2 (4.10) Defining the following auxiliary quantities: โˆž ฮจ rs โ‰ก โ„ฆ rs โˆ’ ฮ› rs (1 + B s ) โˆ’1 Ts + ฮด rs 1 , ฯ† r โ‰ก ฯ… r โˆ’ โˆ‘ ฮ› rs (1 + B s ) โˆ’1 u s (4.11) s =1 where ฮดrs is Kroneckerโ€™s Delta, the following infinite set of equations is obtained for tr: โˆž โˆ‘ฮจ t = ฯ†r rs s (4.12) s =1 Now, naturally, in order to be solved, this system has to be truncated. If the system is convergent, and we assume that it is, as we had assumed for the other systems in this paper (relying on a proof of convergence by Fletcher and Thorne (1955)), then an approximate solution with any desired degree of accuracy, can be obtained from: sf โˆ‘ฮจ t = ฯ† r ; 1 โ‰ค r โ‰ค s f << โˆž rs s (4.13) s =1 Next, applying the argumentation from section 3 and denoting by t the truncated vector (t1T , t T2 ,..., t Tsf ) T and doing the same for the other quantities in (4.13), one can write the last form of the compatibility equation for a rectangular, simply supported plate stiffened with a single set of uniform stiffeners, parallel to one of the sides of the plate, taking the torsional rigidity of the stiffeners into account, as follows: ฮจt = ฯ† (4.14) This system would have to be solved numerically, after defining the auxiliary quantities introduced above. Hence, (4.15) ฮธ r โ‰ก (1 + B r ) โˆ’1 u r ; ฮ˜ r โ‰ก (1 + B r ) โˆ’1 Tr and denoting by a corresponding symbol but with an upper bar the truncated vectors ( v1T , v T2 ,..., v Ts f ) T and (ฮธ1T , ฮธ T2 ,..., ฮธ Ts f ) T and constructing the truncated matrix ฮ˜ in a manner similar to the one employed in equation (3.10) in section 3, we obtain the second set of unknowns required for the solution: v = ฮธ โˆ’ ฮ˜t (4.16) And the solution becomes: f 4 sin(nฯ€ฮพ / b) sin( sฯ€ฮท / a) ๏ฃฎ ab nฯ€ ๏ฃน Pns โˆ’ sin(nฯ€x T / b) v s โˆ’ cos(nฯ€x T / b)t s ๏ฃบ โˆ‘ 4 b ฯ€ abD n ,s =1 ( n 2 / b 2 + s 2 / a 2 ) 2 ๏ฃฏ๏ฃฐ 4 ๏ฃป s w(ฮพ ,ฮท , x) = (4.17) Last, in order to be substituted into (4.17), the solutions of (4.14) and (4.16) should be separated into the appropriate sub-vectors again, in a way similar to the way they were constructed. 5 ASYMPTOTIC ANALYSIS: GLOBALLY OPTIMAL LAYOUTS OF HIGHLY FLEXIBLE AND HIGHLY RIGID STIFFENERS This section is concerned with the determination of the optimal layout of stiffeners in the limit case where the stiffeners are much less or much more rigid than the ground structure. The examination of this limit case is important for the estimation of the correct asymptotic behavior of the optimal locations of stiffeners with respect to their rigidities and the determination of the bounds for the optimal positions of realistic stiffeners. The derivation assumes a thin, isotropic, homogenous, rectangular plate in elastostatic bending, subjected to a lateral pressure and stiffened with two sets of straight, parallel uniform stiffeners. 10 5.1 Highly flexible bidirectional stiffeners with no torsional rigidity โ€“ 1st order asymptotics The linear elastostatic strain energy for the case can be derived, using the results of sections 2 and 3, as follows. Introducing the small parameter ฮต โ‰ก EI /(aD) and deriving the auxiliary quantities required for the calculation of the strain energy for the asymptotic case, one gets: โˆž โˆž ๏ฃฎ ๏ฃน g n = (1 + Fn ) โˆ’1 ๏ฃฏy n โˆ’ โˆ‘ D ns (1 + B s ) โˆ’1 u s ๏ฃบ โ†’ y n โˆ’ โˆ‘ D ns u s โ†’ y n  ๏ฃฏ    ฮต <<1  ( 3.7 ) ๏ฃบ๏ฃป ฮต <<1O s =1 s =1 O (ฮต ) O (ฮต ) (ฮต ) O (ฮต ) O (ฮต ) ๏ฃฐ  O (ฮต ) (5.1.1) O (ฮต 2 ) ฮœ nm = โˆž ( 3.7 ) โˆ‘ (1 + F ) โˆ’1 n s =1 O (ฮต ) โˆž D ns (1 + B s ) โˆ’1C sm โ†’ โˆ‘ D ns C sm = O(ฮต 2 )   ฮต <<1 s =1 O (ฮต ) O (ฮต ) O (ฮต ) โˆ’1 โ‡’ z = (1 โˆ’ M g โ†’ y โ‡’ zn โ†’ yn  ) g ฮตโ†’ ( 3.9 ) <<1 ฮต <<1 ฮต <<1 (5.1.2) O (ฮต 2 ) mf mf mf v r = (1 + B r ) โˆ’1 (u r โˆ’ โˆ‘ C rn z n ) โ†’ u r โˆ’ โˆ‘ C rn z n โ†’ u r โˆ’ โˆ‘ C rn y n โ†’ u r โ‡’ v r โ†’ u r    ฮต <<1 ( 3.13) ฮต <<1 ฮต <<1  ฮต <<1 n =1 n =1 n =1 O (ฮต ) O (ฮต ) (5.1.3) O (ฮต ) O (ฮต ) Recalling the expression for the deflection (which is not given explicitly in section 3 but can easily be derived): w(ฮพ ,ฮท , x) = mf Nฮท Nฮท + N ฮพ ๏ฃน 4 sin( nฯ€ฮพ / b )in ( sฯ€ฮท / a ) ๏ฃฎ abPns โˆ’ sin( n ฯ€ x / b ) v โˆ’ sin( sฯ€xi / a ) z in ๏ฃบ ๏ฃฏ โˆ‘ โˆ‘ โˆ‘ i is 4 2 2 2 2 2 ฯ€ abD n, s =1 (n / b + s / a ) ๏ฃฐ๏ฃฏ 4 i =1 i = Nฮท +1 ๏ฃป๏ฃบ (5.1.4) integrating it multiplied by half the loading, thus obtaining an expression for the work or the strain energy, U ( x, N ฮพ , N ฮท ) = 1 2ฯ€ 4 mf โˆ‘ (n D n , s =1 Pns 2 2 / b + s 2 / a 2 )2 Nฮท + N ฮพ ๏ฃฎ abPns Nฮท ๏ฃน โˆ’ โˆ‘ sin( nฯ€xi / b)vis โˆ’ โˆ‘ sin( sฯ€xi / a ) z in ๏ฃบ ๏ฃฏ i =1 i = Nฮท +1 ๏ฃฏ๏ฃฐ 4 ๏ฃบ๏ฃป (5.1.5) and substituting (5.1.3) into (5.1.5), one gets an explicit expression for the strain energy of the stiffened plate: m Nฮท + N ฮพ ๏ฃฎ abPns Nฮท ๏ฃน Pns 1 U (x, N ฮพ , Nฮท ) โ†’ โˆ’ n x b u โˆ’ s x a y sin( / ) sin( / ) ฯ€ ฯ€ ๏ฃฏ ๏ฃบ โˆ‘ โˆ‘ โˆ‘ i is i in 2 2 2 2 2 min{ E I }<< aD 2ฯ€ 4 D n , s =1 ( n / b + s / a ) ๏ฃฏ i =1 i = Nฮท +1 ๏ฃบ๏ฃป ๏ฃฐ 4 f j j j mf m f abPns2 Pns 1 = โˆ’ โˆ‘ โˆ‘ 4 2 2 2 2 2 4 2 2 2ฯ€ D n ,s =1 4( n / b + s / a ) 2ฯ€ D n ,s =1(n / b + s 2 / a 2 ) 2 1 โˆ’ 1 2ฯ€ 4 1 mf โˆ‘ (n D n , s =1 1 โˆ’ 4 2ฯ€ D 2a 2 2 Pns / b + s 2 / a 2 )2 2 Nฮท + N ฮพ โˆ‘ sin( sฯ€x i / a ) y in = i = Nฮท +1 ๏ฃซ m f P sin( nฯ€xi / b) ฮต i โˆ‘ s ๏ฃฌ๏ฃฌ โˆ‘ 2ns 2 โˆ‘ 2 2 2 i =1 s =1 ๏ฃญ n =1 (n / b + s / a ) Nฮท mf 4 ( 3..3), ( 2.1.10 ) 2 1 2ฯ€ 4 Nฮท โˆ‘ sin(nฯ€x mf โˆ‘ 4( n D ๏ฃถ 1 b ๏ฃท โˆ’ 4 ๏ฃท 2ฯ€ D 2a 3 ๏ฃธ i / b)u is (5.1.6) i =1 n , s =1 2 ns 2 abP / b2 + s 2 / a 2 )2 ๏ฃซ m f Pns sin( sฯ€x j / a) ฮต j โˆ‘ n ๏ฃฌ๏ฃฌ โˆ‘ 2 2 โˆ‘ 2 2 2 j = Nฮท +1 n =1 ๏ฃญ s =1 (n / b + s / a ) Nฮท + N ฮพ mf 4 ๏ฃถ ๏ฃท ๏ฃท ๏ฃธ 2 This asymptotic expansion obtained for the energy, U, consists of a constant term, U0, from which two other terms are subtracted. Naturally then the energy, U, attains a minimum if and only if the terms that are subtracted from the constant, U0, attain maxima with respect to x. As the domain is unconstrained, obviously, the subtracted sums of squares attain their maxima when each of the squares in the sums attains its maximum. As the first sum in the rightmost part of (5.1.6) is symmetric with respect to i and the second sum is symmetric with respect to j, clearly: (5.1.7) xi = xฮท โˆ€ 1 โ‰ค i โ‰ค Nฮท ; x j = xฮพ โˆ€ Nฮท + 1 โ‰ค j โ‰ค Nฮท + N ฮพ is a globally optimal solution. In other words, the energy of a bidirectionally stiffened plate attains a global minimum with respect to the locations of two orthogonal sets of straight, parallel, uniform, infinitesimally rigid stiffeners, for the case of a general lateral loading distribution, if all of the stiffeners in each of the two sets are located at the same place. Knowing the optimal layout one can calculate the energy at the global optimum, substituting (5.1.7) into (5.1.6): 11 U min ( N ฮพ , Nฮท ) โ†’ min ฮต i << 1 i mf 1 2ฯ€ 4 โˆ‘ 4(n D n , s =1 2 abPns2 / b2 + s 2 / a2 )2 ๏ฃซ Pns sin(nฯ€xฮพ / b) 1 1 โˆ’ s 4 ๏ฃฌ๏ฃฌ โˆ‘ 2 2 4 2 โˆ‘ 2ฯ€ D 2a s =1 ๏ฃญ n =1 (n / b + s 2 / a 2 ) 2 mf mf ๏ฃถ ๏ฃท ๏ฃท ๏ฃธ (5.1.8) 2 N ฮท ๏ฃซ m f Pns sin( sฯ€xฮท / a ) 1 b 4 ฮต โˆ’ n โˆ‘ โˆ‘ ๏ฃฌโˆ‘ i 2ฯ€ 4 D 2a 3 n =1 ๏ฃฌ๏ฃญ s =1 (n 2 / b 2 + s 2 / a 2 ) 2 i =1 mf ๏ฃถ ๏ฃท ๏ฃท ๏ฃธ 2 N +N ฮท ฮพ โˆ‘ฮต j j = Nฮท +1 The same energy corresponds to a plate stiffened with one "horizontal" stiffener and one "vertical" stiffener having, respectively, the following bending rigidities: Nฮท Nฮท + N ฮพ i =1 j = Nฮท +1 Eฮท Iฮท โ‰ก aD โˆ‘ ฮต i ; Eฮพ I ฮพ โ‰ก aD โˆ‘ฮต (5.1.9) j Therefore if one has a certain amount of material in the form of two orthogonal sets of parallel highly flexible stiffeners that can be integrally attached to a given plate to minimize the work done by external loads, a globally optimal way to use this material is to split it between exactly two orthogonal beams. For the special case of a symmetric loading, Pns=Psn, and a square plate, a = b, the result given in (5.1.8) shows that for flexible enough stiffeners, stiffening with two orthogonal beams is energetically equivalent to stiffening with a single beam, having twice the bending rigidity. This analytically obtained result coincides with numerical observation concerning the same matter, given in the work of Dems et al. (1989). The power of this result is that a globally optimal stiffening layout is determined analytically for bidirectional stiffening for an arbitrary number of stiffeners having arbitrary cross-sectional parameters and for a general loading case. The limitation of this result is that it is only relevant for highly flexible stiffeners and that it does not say for what actual bending rigidities it is true, for what relative bending rigidities does it cease to be true, and what happens to the optimal positions of the stiffeners for stiffeners having higher bending rigidities. The reason for this shortcoming is the fact that first order asymptotics with respect to the stiffeners do not capture the โ€˜splitโ€™ of the stiffeners as an optimal stiffening topology. The relative stiffness for which the first order approximation is valid is not high enough for it to be optimal for the stiffeners to be positioned separately. The following section shows that, at least for the special case of a bisinusoidal loading and unidirectional stiffening, with two beams positioned symmetrically with respect to the mid-span of the plate, even for a second order asymptotic expansion of the energy of the stiffened plate with respect to the relative stiffness of the beams, the degenerated layout given in (5.1.7) is still globally optimal. A comparison between the first and the second order expansions of the energy enables one to determine for what actual rigidities it is still optimal to place the stiffeners together. 5.2 Highly flexible unidirectional stiffeners with no torsional rigidity โ€“ 2nd order asymptotics Repeating the procedure shown in the preceding subsection and retaining terms up to the order of O(ฮต2), โˆž โˆž ๏ฃฎ ๏ฃน g n = (1 + Fn ) โˆ’1 ๏ฃฏy n โˆ’ โˆ‘ D ns (1 + B s ) โˆ’1 u s ๏ฃบ โ†’ y n โˆ’ Fn y n โˆ’ โˆ‘ D ns u s  ๏ฃฏ    s =1   ( 3.7 ) ๏ฃบ๏ฃป ฮต <<1O s =1 O (ฮต ) O (ฮต ) (ฮต ) O (ฮต ) O (ฮต ) O (ฮต ) O ( ฮต ) ๏ฃฐ ฮœ nm = ( 3 .7 ) โˆž โˆ‘ (1 + F ) n s =1 O (ฮต ) โˆ’1 D ns (1 + B s ) โˆ’1C sm โ†’ โˆ‘ D ns C sm   ฮต <<1 s =1 O (ฮต ) O (ฮต ) O (ฮต ) โˆž โˆ’1 โ‡’ z = (1 โˆ’ M (1 + M g +M y n โˆ’ Fn y n โˆ’ โˆ‘ D ns u s  ) g ฮตโ†’  ) g ฮตโ†’ g โ†’ g โ‡’ z n ฮตโ†’ (3.9 ) <<1 <<1  <<1 2 2 s =1 O (ฮต ) (5.2.1) โˆž O (ฮต ) O (ฮต ) O (ฮต ) O (ฮต 3 ) (5.2.2) O (ฮต ) mf mf โˆž ๏ฃซ ๏ฃถ v r = (1 + B r ) โˆ’1 ๏ฃฌ๏ฃฌ u r โˆ’ โˆ‘ C rn z n ๏ฃท๏ฃท โ†’ u r โˆ’ B r u r โˆ’ โˆ‘ C rn z n โ†’ u r โˆ’ B r u r โˆ’ โˆ‘ C rn y n  ( 3.13) ฮต <<1 ฮต <<1 n =1 n =1 n =1 ๏ฃญ ๏ฃธ O (ฮต ) (5.2.3) and substituting them into the expression for the work done by the external loads given in (5.1.5), one gets: 12 1 โ‡’ U ( x, N ฮท , N ฮพ ) โ†’ ฮต <<1 2ฯ€ 4 mf โˆ‘ (n D n , s =1 Nฮท + Nฮพ ๏ฃฎ abPns Nฮท ๏ฃน Pns โˆ’ โˆ’ sin( n x / b ) u sin( sฯ€xi / a) yin ๏ฃบ + ฯ€ ๏ฃฏ โˆ‘ โˆ‘ i is 2 2 2 2 2 / b + s / a ) ๏ฃฐ๏ฃฏ 4 i =1 i = Nฮท +1 ๏ฃป๏ฃบ + Nฮท + Nฮพ ๏ฃฎ Nฮท ๏ฃน Pns sin( n x / b ) B u + sin( sฯ€xi / a) Fijn y jn ๏ฃบ + ฯ€ ๏ฃฏ โˆ‘ โˆ‘ i ijs js 4 2 2 2 2 2 โˆ‘ 2ฯ€ D n ,s =1( n / b + s / a ) ๏ฃฐ๏ฃฏi , j =1 i , j = Nฮท +1 ๏ฃป๏ฃบ + Pns โˆ‘ 4 2 2 2ฯ€ D n ,s =1( n / b + s 2 / a 2 ) 2 1 1 mf mf (5.2.4) m f Nฮท + N ฮพ Nฮท ๏ฃฎ m f Nฮท Nฮท + Nฮพ ๏ฃน sin( n ฯ€ x / b ) C y + sin( sฯ€xi / a ) Dijnk u jk ๏ฃบ ๏ฃฏโˆ‘โˆ‘ โˆ‘ โˆ‘ โˆ‘ โˆ‘ i ijsr jr k =1 i = Nฮท +1 j =1 ๏ฃฏ๏ฃฐ r =1 i =1 j = Nฮท +1 ๏ฃบ๏ฃป Next, recalling (3.6) and rearranging, results in the following 2nd order asymptotic expansion of U: ab โˆž Pns2 โˆ‘ 2 2 2 22 ฮต <<1 8ฯ€ 4 D n ,s =1 ( n / b + s / a ) โ‡’ U (x, N ฮพ , Nฮท ) โ†’ 1 โˆ’ 4 3 2 4ฯ€ a D + + 1 2ฯ€ 4 a 7bD 3 b 4 9 3 2ฯ€ a D 1 + 4 8 3 2ฯ€ a D + 1 2ฯ€ 4 a 8 D 3 2 ๏ฃฎ โˆž s 2 sin(nฯ€x / b) P ๏ฃน b Ei I i โˆ‘ ๏ฃฏโˆ‘ 2 2 i 2 2 ns2 ๏ฃบ โˆ’ 4 4 2 โˆ‘ 4ฯ€ a D i =1 s =1 ๏ฃฐ n =1 ( n / b + s / a ) ๏ฃป Nฮท Nฮท โˆž โˆž โˆž โˆ‘โˆ‘ โˆ‘ sin( ยตฯ€xi / b) sin( ยตฯ€x j / b) (ยต 2 / b2 + s 2 / a 2 )2 i , j =1 s =1 ยต =1 Nฮท + Nฮพ โˆž โˆž โˆ‘ โˆ‘โˆ‘ i , j = Nฮท +1 n =1 w=1 Nฮท Nฮท + Nฮพ โˆ‘โˆ‘ โˆ‘ i =1 j = Nฮท +1 r ,s =1 Nฮท Nฮท + Nฮพ โˆž โˆ‘โˆ‘ โˆ‘ j =1 i = Nฮท +1 n ,k =1 โˆž sin( wฯ€xi / a) sin( wฯ€x j / a) (n 2 / b 2 + w2 / a 2 ) 2 (r 2 / b 2 + s 2 / a 2 ) 2 sin(nฯ€x j / b) sin(kฯ€xi / a) (n 2 / b 2 + k 2 / a 2 ) 2 2 ๏ฃฎ โˆž n 2 sin( sฯ€x / a) P ๏ฃน Ei I i โˆ‘ ๏ฃฏโˆ‘ 2 2 i 2 2 ns2 ๏ฃบ + โˆ‘ i = Nฮท +1 n =1 ๏ฃฐ s =1 ( n / b + s / a ) ๏ฃป โˆž 4 Ei I i s 4 sin(nฯ€xi / b) Pns โˆž E j I j s sin(mฯ€x j / b) Pms + โˆ‘ โˆ‘ ( n 2 / b 2 + s 2 / a 2 ) 2 m=1 ( m 2 / b 2 + s 2 / a 2 ) 2 n =1 sin(rฯ€xi / b) sin( sฯ€x j / a) โˆž Nฮท + Nฮพ โˆž โˆ‘ s =1 (5.2.5) 4 Ei I i n 4 sin( sฯ€xi / a) Pns โˆž E j I j n sin(qฯ€x j / a) Pnq + โˆ‘ (n 2 / b 2 + s 2 / a 2 ) 2 q=1 (n 2 / b 2 + q 2 / a 2 ) 2 4 Ei I i s 4 sin(nฯ€xi / b) Pns โˆž E j I j r sin(qฯ€x j / a) Prq + โˆ‘ โˆ‘ (n 2 / b 2 + s 2 / a 2 ) 2 q =1 (r 2 / b 2 + q 2 / a 2 ) 2 n =1 โˆž โˆž โˆ‘ E j I j k 4 sin(mฯ€x j / b) Pmk (m 2 / b 2 + k 2 / a 2 ) 2 m =1 Ei I i n 4 sin( sฯ€xi / a) Pns โˆ‘ (n 2 / b 2 + s 2 / a 2 ) 2 s =1 โˆž At this point, as the result is anyway an asymptotic one, several assumptions are made in order to get an analytic form of the solution of the optimal stiffening problem. First, the loading is assumed to be bisinusoidal, with half-periods equal to the lengths of the sides of the plate. Second, for simplicity and clarity of illustration, unidirectional stiffening is assumed, with only two stiffeners, positioned symmetrically with respect to the center of the plate (the a priori symmetry of the stiffening layout seems justified in view of the symmetry of the loading). With these assumptions, the work done by the loading becomes: abp 2 p02ฮต {sin 2 (ฯ€ [1 / 2 + ฮด ]) + sin 2 (ฯ€ [1 / 2 โˆ’ ฮด ])} 1 U (ฮด , ฮต , p0 , a, b, D) โ†’ 4 0 โˆ’ + ฮต <<1 8ฯ€ D (1 / b 2 + 1 / a 2 ) 2 4ฯ€ 4 a 2 D (1 / b 2 + 1 / a 2 ) 4 + p02ฮต 2 sin 2 (ฯ€ [1 / 2 + ฮด ]) โˆž sin 2 (nฯ€ [1 / 2 + ฮด ]) + โˆ‘ 2ฯ€ 4 a 5bD (1 / b 2 + 1 / a 2 ) 4 n=1 (n 2 / b 2 + 1 / a 2 ) 2 + p02ฮต 2 sin(ฯ€ [1 / 2 + ฮด ]) sin(ฯ€ [1 / 2 โˆ’ ฮด ]) โˆž sin(nฯ€ [1 / 2 + ฮด ]) sin(nฯ€ [1 / 2 โˆ’ ฮด ]) + โˆ‘ ฯ€ 4 a 5bD (1 / b 2 + 1 / a 2 ) 4 (n 2 / b 2 + 1 / a 2 ) 2 n =1 + p02ฮต 2 sin 2 (ฯ€ [1 / 2 โˆ’ ฮด ]) โˆž sin 2 (nฯ€ [1 / 2 โˆ’ ฮด ]) โˆ‘ 2ฯ€ 4 a 5bD (1 / b 2 + 1 / a 2 ) 4 n=1 (n 2 / b 2 + 1 / a 2 ) 2 (5.2.6) where ฮด is the distance of each of the stiffeners from the center of the plate divided by b, ฮต โ‰ก EI / aD and a is the length of each of the stiffeners. Employing trigonometric identities and recalling the definition: ฮฒ โ‰ก b / a one can obtain a simpler expression for the (non-dimensionalized) elastic strain energy of the loaded structure, consistent of the plate and the stiffeners: โˆž โˆž cos 2 (ฯ€ฮด ) ๏ฃฎ 1 cos(2nฯ€ฮด ) ๏ฃน ๏ฃผ๏ฃด (5.2.7) ฮฒ 5 ๏ฃฑ๏ฃด Uห† (ฮด , ฮต , ฮฒ ) โ†’ 2 1 โˆ’ (4ฮฒ 3ฮต ) 2 1 + 2ฮฒ 3ฮต โˆ‘ + 2ฮฒ 3ฮต โˆ‘ ๏ฃฒ ๏ฃฏ 2 2 2 2 2 2 2 2 ๏ฃบ๏ฃฝ ฮต <<1 ( ฮฒ + 1) ๏ฃด ( ฮฒ + 1) ๏ฃฐ n =1,3, 5 ( ฮฒ + n ) n =1, 3, 5 ( ฮฒ + n ) ๏ฃป ๏ฃด ๏ฃณ ๏ฃพ where the actual energy can be obtained from the non-dimensional form by: U (ฮด , ฮต , ฮฒ , a, p0 , D ) = 13 a 6 p02 ห† U (ฮด , ฮต , ฮฒ ) 8ฯ€ 4 D (5.2.8) Next, the series in (5.2.7) can be expressed in terms of the Fourier cosine series of coshz and zsinhz, z being a linear function of |ฮด|. Thence, substituting these functions instead of their Fourier series representations, one obtains: Uห† (ฮด , ฮฒ , ฮต ) โ†’ ฮต <<1 ฮฒ5 ( ฮฒ + 1) 2 2 โˆ’ 4 ฮฒ 8ฮต cos 2 (ฯ€ฮด ) ( ฮฒ 2 + 1) 4 โˆ’ 8ฮฒ 11ฮต 2 cos 2 (ฯ€ฮด ) ๏ฃฎ ฯ€ coth(ฯ€ฮฒ ) ฯ€ 2 coth 2 (ฯ€ฮฒ ) ฯ€ coth(ฯ€ฮฒ / 2) ฯ€ 2 coth 2 (ฯ€ฮฒ / 2) 3ฯ€ 2 ๏ฃน + โˆ’ โˆ’ โˆ’ ๏ฃฏ ๏ฃบ 3 ( ฮฒ 2 + 1) 4 4ฮฒ 2 8ฮฒ 3 16 ฮฒ 2 16 ฮฒ 2 ๏ฃป ๏ฃฐ 4ฮฒ โˆ’ 8ฮฒ 11ฮต 2 cos 2 (ฯ€ฮด ) ๏ฃฑ๏ฃดฯ€ cosh[ฯ€ฮฒ (1 โˆ’ 2 ฮด )] ฯ€ cosh(ฯ€ฮฒ ) cosh[ฯ€ฮฒ (1 โˆ’ 2 ฮด )] ฯ€ (1 โˆ’ 2 ฮด ) sinh[ฯ€ฮฒ (1 โˆ’ 2 ฮด )] + โˆ’ ๏ฃฒ 3 ( ฮฒ 2 + 1) 4 4ฮฒ 2 sinh 2 (ฯ€ฮฒ ) 4 ฮฒ 2 sinh(ฯ€ฮฒ ) ๏ฃด๏ฃณ 4 ฮฒ sinh(ฯ€ฮฒ ) 2 (5.2.9) 2 ฯ€ cosh[ฯ€ฮฒ (1 / 2 โˆ’ 2 ฮด )] ฯ€ 2 cosh(ฯ€ฮฒ / 2) cosh[ฯ€ฮฒ (1 / 2 โˆ’ 2 ฮด )] ฯ€ 2 (1 โˆ’ 4 ฮด ) sinh[ฯ€ฮฒ (1 / 2 โˆ’ 2 ฮด )] ๏ฃผ๏ฃด โˆ’ โˆ’ + ๏ฃฝ 8ฮฒ 3 sinh(ฯ€ฮฒ / 2) 16 ฮฒ 2 sinh 2 (ฯ€ฮฒ / 2) 16 ฮฒ 2 sinh(ฯ€ฮฒ / 2) ๏ฃด๏ฃพ Differentiating with respect to ฮด one gets: 4ฯ€ฮฒ 8 ฮต sin( 2ฯ€ฮด ) โˆ‚ ห† U (ฮด , ฮฒ , ฮต ) โ†’ + ฮต <<1 โˆ‚ฮด ( ฮฒ 2 + 1) 4 + [ 4 coth(ฯ€ฮฒ ) + 4ฯ€ฮฒ coth 2 (ฯ€ฮฒ ) โˆ’ 2 coth(ฯ€ฮฒ / 2) โˆ’ ฯ€ฮฒ coth 2 (ฯ€ฮฒ / 2) โˆ’ 3ฯ€ฮฒ ] + โˆ’ โˆ’ + ฯ€ 2 ฮฒ 8 ฮต 2 sin( 2ฯ€ฮด ) + 2( ฮฒ 2 + 1) 4 ฯ€ 2 ฮฒ 8 ฮต 2 sin(2ฯ€ฮด ) ๏ฃฑ 4[sinh(ฯ€ฮฒ ) + ฯ€ฮฒ cosh(ฯ€ฮฒ )] cosh[ฯ€ฮฒ (1 โˆ’ 2 ฮด )] 4ฯ€ฮฒ (1 โˆ’ 2 ฮด ) sinh[ฯ€ฮฒ (1 โˆ’ 2 ฮด )] โˆ’ ๏ฃฒ (5.2.10) sinh(ฯ€ฮฒ ) 2( ฮฒ 2 + 1) 4 sinh 2 (ฯ€ฮฒ ) ๏ฃณ [2 sinh(ฯ€ฮฒ / 2) + ฯ€ฮฒ cosh(ฯ€ฮฒ / 2)] cosh[ฯ€ฮฒ (1 / 2 โˆ’ 2 ฮด )] sinh (ฯ€ฮฒ / 2) 2 + ฯ€ฮฒ (1 โˆ’ 4 ฮด ) sinh[ฯ€ฮฒ (1 / 2 โˆ’ 2 ฮด )] ๏ฃผ ๏ฃฝ sinh(ฯ€ฮฒ / 2) ๏ฃพ 3 3 ฮฒ 10 ฮต 2 cos 2 (ฯ€ฮด ) ๏ฃฑ๏ฃด 4ฯ€ (1 โˆ’ 2 ฮด ) cosh[ฯ€ฮฒ (1 โˆ’ 2 ฮด )] 4ฯ€ cosh(ฯ€ฮฒ ) sinh[ฯ€ฮฒ (1 โˆ’ 2 ฮด )] โˆ’ + ๏ฃฒ sinh(ฯ€ฮฒ ) ( ฮฒ 2 + 1) 4 sinh 2 (ฯ€ฮฒ ) ๏ฃด๏ฃณ ฯ€ 3 cosh(ฯ€ฮฒ / 2) sinh[ฯ€ฮฒ (1 / 2 โˆ’ 2 ฮด )] sinh 2 (ฯ€ฮฒ / 2) โˆ’ ฯ€ 3 (1 โˆ’ 4 ฮด ) cosh[ฯ€ฮฒ (1 / 2 โˆ’ 2 ฮด )] ๏ฃผ๏ฃด ๏ฃฝ sgn(ฮด ) sinh(ฯ€ฮฒ / 2) ๏ฃด๏ฃพ Now, in order to determine whether placing the stiffeners together is optimal, one could have examined whether the second derivative of the energy with respect to ฮด at ฮด =0 changes its sign as ฮต increases. Such a change of sign would have indicated that unified stiffeners cease to correspond to a global minimum of the energy and start to correspond to its local maximum as their rigidity is increased. This would imply that a second order asymptotic expansion of the energy enables one to find a critical relative rigidity, ฮต, above which the stiffeners are best to be split and that this critical relative rigidity is small enough for the second order approximation to be a good one. However, the second derivative with respect to ฮด of the second order expansion of the energy with respect to ฮต is undefined at ฮด =0 due to the non-continuousness of the sign function. Therefore, instead, one can check whether the first derivative vanishes anywhere besides at ฮด =0 as ฮต increases. In fact, it is enough to check the sign of lim ฮด โˆ’1โˆ‚Uห† / โˆ‚ฮด . If the sign is positive for every positive ฮต, ฮด โ†’0 + then placing the stiffeners together never corresponds to a local maximum of the second order expansion of the energy. Section 5.1 shows that placing the stiffeners together is globally optimal in the limit of a small positive ฮต. Therefore if ฮด =0 happens to be a local minimum of the energy for every ฮต in the range of the validity of the second order asymptotics and there is another, global, minimum elsewhere then, due to the continuity of the energy with respect to both ฮด and ฮต there has to be a local maximum between these two local minima. Numerical examination shows that when ฮต is high enough such that ฮด =0 ceases to be the global optimum, the globally optimal solution corresponds to ฮด continuously increasing with ฮต. Therefore in the limit case where ฮต is only infinitesimally higher than its critical value, the energy would have three extrema (two local minima and a local maximum in between) located at a line segment with a length tending to zero. This would imply infinite derivatives and therefore contradict with the fact that the energy is Hรถlder continuous in the vicinity of zero (as one can show by expanding ฮด โˆ’1โˆ‚Uห† / โˆ‚ฮด as a Taylor series around ฮด = 0. By expanding 14 ฮด โˆ’1โˆ‚Uห† / โˆ‚ฮด rather than โˆ‚Uฬ‚ / โˆ‚ฮด one eliminates the non-continuous functions). This contradiction can only be avoided by the assumption that wherever ฮด =0 is a local minimum of the energy, it is also a global minimum and that in order for it not to be a global minimum it has to be a local maximum. Also, a function Hรถlder continuous in the vicinity of zero behaves as a power function near zero and thus cannot have three extrema within a line segment starting at zero and having an arbitrarily small length. Hence, by proving that lim ฮด โˆ’1โˆ‚Uห† / โˆ‚ฮด is positive for every ฮต for which the second order expansion of the ฮด โ†’0 + energy is valid, one proves that placing the stiffeners together is globally optimal (within the abovementioned range of rigidities). Next, expanding the hyperbolic functions of ฮด in (5.2.10) using the identities of hyperbolic trigonometry, dividing by ฮด and computing the limits, recalling that: sinh( 2ฯ€ฮฒ ฮด ) sgn(ฮด ) /[ 2ฯ€ฮฒฮด ] = sinh( 2ฯ€ฮฒฮด ) /[ 2ฯ€ฮฒฮด ] โ†’ 1 ฮด โ†’0 (5.2.11) the following result is obtained: 8ฯ€ 2 ฮฒ 8ฮต (1 โˆ’ ฮต / ฮต cr ) ฮต <<1 ( ฮฒ 2 + 1) 4 lim+ ฮด โˆ’1โˆ‚Uห† / โˆ‚ฮด โ†’ ฮด โ†’0 (5.2.12) where ฮต cr โ‰ก 4 ฯ€ {2(1 + ฮฒ )[coth(ฯ€ฮฒ / 2) โˆ’ 2 coth(ฯ€ฮฒ )] + ฯ€ฮฒ ( ฮฒ 2 โˆ’ 1)[4 coth 2 (ฯ€ฮฒ ) โˆ’ coth 2 (ฯ€ฮฒ / 2) โˆ’ 3]} 2 (5.2.13) Obviously, the limit in (5.2.13) is positive if ฮตcr is negative for every positive ฮฒ. Asymptotic expansions of ฮตcr(ฮฒ) show that this is indeed the case for the limit cases of ฮฒ <<1, ฮฒ >>1 and |1โ€“ฮฒ| <<1: ฮต cr โ†’ โˆ’ ฮฒ >>1 2 ฯ€ (1 + ฮฒ 2 ) < 0 , ฮต cr โ†’ โˆ’ ฮฒ <<1 ๏ฃด๏ฃฑ ๏ฃฎ 24 ฯ€ 2 ฮฒ 3[12 + 5ฯ€ 2 ฮฒ (1 โˆ’ ฮฒ )] ฮต cr โ†’ โˆ’ ฯ€ โˆ’1[2 coth(ฯ€ ) โˆ’ coth(ฯ€ / 2)]โˆ’1 ๏ฃฒ1 + ๏ฃฏ1 + ฯ€ 1โˆ’ ฮฒ <<1 ๏ฃด๏ฃณ ๏ฃฐ โ‰… โˆ’0.8831(1 โˆ’ 0.6069ฮฒ ) < 0 (โˆ€ ฮฒ < 1.6477) <0 ๏ฃผ๏ฃด 3 + coth 2 (ฯ€ / 2) โˆ’ 4 coth 2 (ฯ€ ) ๏ฃน ๏ฃบ (1 โˆ’ ฮฒ ) ๏ฃฝ โ‰… 2 coth(ฯ€ ) โˆ’ coth(ฯ€ / 2) ๏ฃป ๏ฃด๏ฃพ (5.2.14) (5.2.15) Numerical verification shows that ฮตcr(ฮฒ) is negative for all positive finite values of ฮฒ. Therefore the limit in (5.2.12) is positive and thus for small enough positive finite values of ฮต it is globally optimal to stiffen a simply supported thin rectangular plate in elastostatic bending under a lateral bisinusoidal loading with two stiffeners positioned at the same place, in the geometric center of the plate, in parallel to one of the edges of the plate. The fact that the global optimality of this stiffening layout holds for finite values of ฮต, at least for the specified loading, is due to the fact that this result is true for both the first and the second order asymptotic expansions of the elastic energy of the stiffened plate, and it is the essence of the present subsection. The (non-dimensionalized) structural strain energy corresponding to the globally optimal layout discussed above can be obtained in a second order approximation with respect to ฮต by setting ฮด =0 in (5.2.9): Uห† opt ( ฮฒ , ฮต ) โ†’ ฮต <<1 ฮฒ5 ( ฮฒ + 1) 2 2 โˆ’ 4ฮฒ 8ฮต [1 + f ( ฮฒ )ฮต ] ( ฮฒ 2 + 1)4 (5.2.16) where: f ( ฮฒ ) โ‰ก [4 coth(ฯ€ฮฒ ) + 4ฯ€ฮฒ coth 2 (ฯ€ฮฒ ) โˆ’ 2 coth(ฯ€ฮฒ / 2) โˆ’ ฯ€ฮฒ coth 2 (ฯ€ฮฒ / 2) โˆ’ 3ฯ€ฮฒ ]ฯ€ / 4 (5.2.17) Both the first and the second order approximations of the energy hold for small enough values of ฮต, formally, when f(ฮฒ)ฮต = ฮณ = o(1). Then the higher orders contribute negligibly to the first and second order approximations of the energy for which the degenerated stiffening layout is proven herein to be globally optimal for general and bisinusoidal loadings, respectively. Recalling the definition of the relative bending rigidity and assuming blade stiffeners with cross-sectional width d and static height h and a plate with thickness t and Poisson's ratio ฮฝ, and that the plate and the stiffener have the same Young modulus, one can obtain an approximation for the maximal static height of the stiffener for which it is still globally optimal not to split it. Hence, assuming that the cross-sectional width of the stiffener is much smaller than its length, as one might expect from a beam, namely that d/a = ฮถ = o(1), and making the approximation ฮณ~ ฮถ based on the fact that both these quantities should be smaller than unity and are compliant to no additional restrictions (the values of ฮณ and ฮถ can each be, say, 0.01), and, last, taking ฮฝ to be 1/3, which is typical for structural materials, one obtains the following approximation: 15 1/ 3 h 1๏ฃฎ 9 ๏ฃน < t 2 ๏ฃฏ๏ฃฐ f ( ฮฒ ) ๏ฃบ๏ฃป (5.2.18) Taking the limit of (5.2.17) for ฮฒ>>1 one obtains the result that for a short stiffener the critical static height is hmax ~ [9 /(4ฯ€ )]1/ 3 t โ‰… 0.9t . For a square plate, ฮฒ = 1, hmax ~ t. That is, if the stiffener is not relatively long, it can have about the same static height as the thickness of the plate and it would still be flexible enough for it to be globally optimal not to split it. This result is impractical, since the stiffener is assumed to be placed symmetrically with respect to the mid-surface of the plate and thus if its static height is equal to the thickness of the plate and Youngโ€™s modulus of the plate and the stiffener are the same, then it is as having no stiffener at all, and it does not matter whether it is split or not. However, if the stiffener is longer, its length makes it more flexible such that its static height can be larger for the optimality of stiffening with a single stiffener yet to hold. For example, it follows from (5.2.17) and (5.2.18) that for the case ฮฒ = 1/2 the critical static height is hmax ~ 1.5t, for ฮฒ = 1/3, hmax ~ 2t and for ฮฒ = 1/6, hmax ~ 4t. This simple calculation shows that, at least for long stiffeners, the degenerated stiffening layout is globally optimal for rather realistic parameters and not only, as one could presume, for stiffeners of absolutely negligible bending rigidity. In the results obtained above, the globally optimal layout corresponds to a thin plate with thin stiffeners. The fact that the bending rigidity of the stiffeners normalized by the bending rigidity of the plate is small does not imply that for the stiffeners to be realistic the plate should be thick, since a stiffener of width and height of the order of the thickness of the plate has a much smaller bending rigidity than that of the plate, as it appears from the definition of the relative rigidity, ฮต โ‰ก EI / aD , which is proportional to the ratio of the width of the stiffener and the breadth of the plate, which is usually a small number. Thus the above derivations do not contradict with the assumptions of the first order Love-Kirchhoff plate bending theory. The following subsection examines the opposite case, where the stiffeners are highly rigid compared to the plate. If flexible stiffeners have an asymptotically optimal layout in which they are combined to form a single stiffener, then, as is it turns out, highly rigid stiffeners have their own asymptotically optimal layout, where they are optimally spread, and to which they tend as their rigidities increase. 5.3 Highly rigid unidirectional stiffeners with no torsional rigidity โ€“ 1st order asymptotics The present subsection examines the case where the stiffeners are highly rigid with respect to the plate. By means of a first order asymptotic analysis with respect to the flexibilities of the stiffeners, it is shown that rigid enough stiffeners are best to be positioned separately, in locations determined by the functionality of the loading. It is shown that the optimal positions of the stiffeners approach their asymptotic limits as the rigidities of the stiffeners approach infinity. The functionality of this approach is given analytically for bisinusoidal loading with half-periods equal to the lengths of the edges of the plate, unidirectional stiffening with two stiffeners positioned symmetrically with respect to the mid-span of the plate and the condition that the stiffeners are relatively long. Substituting the expression for the deflection field for the case, as given in (2.20) into (2.12) and making use of (2.9), employing the definitions of ฮฒ and ฮต used in the previous subsections, and defining xห† โ‰ก x / b one obtains the strain energy of the stiffened plate, as follows: ( ) โˆ’1 P 2 a 6 sin(ฯ€ xห† T ) ฮต โˆ’11 + Bห† sin(ฯ€ xห† ) ฮฒ P2a6 ห† U ( x) = 4 โˆ’ 8ฯ€ D ( ฮฒ โˆ’2 + 1) 2 4ฯ€ 4 D ( ฮฒ โˆ’2 + 1) 4 (5.3.1) where xห† = ( xห† ,1 โˆ’ xห† )T . Evaluating expression (2.17) for the abovementioned assumptions and dividing it by ฮต, the coefficients defining the matrix in (5.3.1) can be readily obtained: 1 ๏ฃฑ 1 โˆ’ cosh(2ฯ€ฮฒ xห† ) cosh(ฯ€ฮฒ ) โˆ’ cosh(ฯ€ฮฒ [1 โˆ’ 2 xห† ]) xห† sinh(ฯ€ฮฒ [1 โˆ’ 2 xห† ]) ๏ฃผ Bห†11 = 3 ๏ฃฒ ฮฒ + โˆ’ 2ฮฒ ๏ฃฝ 2 ฯ€ sinh(ฯ€ฮฒ ) 2ฯ€ ๏ฃณ sinh (ฯ€ฮฒ ) sinh(ฯ€ฮฒ ) ๏ฃพ 1 ๏ฃฑ 1 โˆ’ cosh(2ฯ€ฮฒ [1 โˆ’ xห† ]) cosh(ฯ€ฮฒ ) โˆ’ cosh(ฯ€ฮฒ [1 โˆ’ 2 xห† ]) [1 โˆ’ xห† ]sinh(ฯ€ฮฒ [1 โˆ’ 2 xห† ]) ๏ฃผ Bห† 22 = 3 ๏ฃฒ ฮฒ + + 2ฮฒ ๏ฃฝ 2 2ฯ€ ๏ฃณ sinh (ฯ€ฮฒ ) sinh(ฯ€ฮฒ ) ฯ€ sinh(ฯ€ฮฒ ) ๏ฃพ 1 ๏ฃฑ cosh(ฯ€ฮฒ [1 โˆ’ 2 xห† ]) โˆ’ cosh(ฯ€ฮฒ ) cosh(2ฯ€ฮฒ xห† ) โˆ’ 1 (1 โˆ’ 2 xห† ) sinh(2ฯ€ฮฒ xห† ) ๏ฃผ Bห†12 = Bห† 21 = 3 ๏ฃฒ ฮฒ + +ฮฒ ๏ฃฝ 2ฯ€ ๏ฃณ sinh 2 (ฯ€ฮฒ ) sinh(ฯ€ฮฒ ) ฯ€ sinh(ฯ€ฮฒ ) ๏ฃพ 16 (5.3.2) Considering ฮต large enough for the spectral norm of ฮต โˆ’1Bห† โˆ’1 to be much smaller than unity and expanding the expression for the energy in (5.3.1) into a first order Taylor series of the relative flexibility of the stiffeners, ฮตโ€“1, one obtains the following asymptotic relation: ฮฒ P2a6 P 2 a 6 [sin(ฯ€ xห† T )Bห† โˆ’1 sin(ฯ€ xห† ) โˆ’ ฮต โˆ’1 sin(ฯ€ xห† T )Bห† โˆ’2 sin(ฯ€ xห† )] โˆ’ ฮต >>1 8ฯ€ 4 D ( ฮฒ โˆ’2 + 1) 2 4ฯ€ 4 D ( ฮฒ โˆ’2 + 1) 4 U ( xห† ) โ†’ (5.3.3) Noting the symmetry of the sine function, inverting the 2x2 matrices in (5.3.3) analytically, and introducing the auxiliary variables, (5.3.4) Bij โ‰ก 2ฯ€ 4 sinh 2 (ฯ€ฮฒ ) Bห† ij one gets the following representation of the energy: 2 2 ฮฒP 2 a 6 P 2 a 6 sinh 2 (ฯ€ฮฒ ) ๏ฃฎ B22 โˆ’ 2 B12 + B11 โˆ’1 ( B22 โˆ’ B12 ) + ( B11 โˆ’ B12 ) ๏ฃน 2 โˆ’ โˆ’ ฮต ๏ฃฏ ๏ฃบ sin (ฯ€xห† ) (5.3.5) ฮต >>1 8ฯ€ 4 D ( ฮฒ โˆ’ 2 + 1) 2 2 D( ฮฒ โˆ’ 2 + 1) 4 ๏ฃฐ B11 B22 โˆ’ B122 ( B11 B22 โˆ’ B122 ) 2 ๏ฃป U ( xห† ) โ†’ Taking a Taylor series expansion with respect to ฮฒ of the Bij components for a small ฮฒ and retaining only the first non-vanishing powers of ฮฒ results in: B12 = B21 = โ†’ 2(ฯ€ฮฒ )5 xห† 2 (1 โˆ’ 2 xห† 2 ) / 3 , B22 โ†’ B11 โ†’ 4(ฯ€ฮฒ )5 xห† 2 (1 โˆ’ xห† )2 / 3 ฮฒ <<1 ฮฒ <<1 ฮฒ <<1 (5.3.6) Substituting (5.3.6) into (5.3.5), one gets an asymptotic representation of the energy for ฮฒ<<1 (which, due to the high order of the expansion, is a fair approximation for any ฮฒ<1): ฮฒ P 2a6 P 2 a 6 sinh 2 (ฯ€ฮฒ ) โˆ’ ฮต >>1 8ฯ€ 4 D ( ฮฒ โˆ’2 + 1) 2 2 D ( ฮฒ โˆ’2 + 1) 4 (ฯ€ฮฒ )5 ฮฒ <<1 U ( xห† ) โ†’ ๏ฃฎ 3sin 2 (ฯ€ xห† ) 9sin 2 (ฯ€ xห† ) ๏ฃน โˆ’5 โˆ’1 โˆ’ ( ) ฯ€ฮฒ ฮต ๏ฃฏ ห†2 ๏ฃบ 3 2(3 xห† 2 โˆ’ 4 xห† 3 ) 2 ๏ฃป ๏ฃฐ 3 x โˆ’ 4 xห† (5.3.7) The asymptotic limit for the optimal location of long rigid stiffeners can be obtained by minimization of the limit of (5.3.7) for ฮต โ†’ โˆž,0 < ฮฒ << 1, ฮฒ 5ฮต โ†’ โˆž (that is finitely long and infinitely rigid stiffeners): ๏ฃฎ 12ฯ€ sin 2 (ฯ€xห† ) ๏ฃน as xห†opt = arg min lim U ( xห† ) = arg min ๏ฃฏ1 โˆ’ ๏ฃบ โ‰… 0.3445 3xห† 2 โˆ’ 4 xห† 3 ๏ฃป xห†โˆˆ[ 0 ,1 / 2 ] ฮต โ†’โˆž xห†โˆˆ[ 0 ,1 / 2 ] ๏ฃฐ ฮฒ <<1 (5.3.8) ฮฒ 5ฮต โ†’โˆž as Next, substituting the definition ฮด โ‰ก xห† โˆ’ xห†opt into (5.3.7), performing a 2nd order asymptotic expansion with respect to ฮด around zero, and differentiating with respect to ฮด, noting that this derivative should vanish for ฮด , ฮต โˆ’1 โ†’ 0 , one obtains an asymptotic expansion of โˆ‚U (ฮต โˆ’1 , ฮฒ , ฮด << 1) / โˆ‚ฮด (which in this case becomes a linear function of ฮด). Finding the single root of the abovementioned derivative produces an expression for the globally optimal location of a stiffener (the one closer to the origin of the coordinate system) in a nondimensional form, xฬ‚ , as a function of ฮต and ฮฒ for ฮฒ , ฮต โˆ’1 , ฮฒ โˆ’5ฮต โˆ’1 << 1 , as follows: 1 / 2 โˆ’ xห†opt as 1 / 2 โˆ’ xห†opt โ†’ 1 โˆ’ qฮฒ โˆ’5ฮต โˆ’1 ฮต โˆ’1 ,ฮฒ ,ฮฒ โˆ’5ฮต โˆ’1 <<1 (5.3.9) where q is: as ๏ฃฎ cot(ฯ€xห† opt ๏ฃน ) 12 โˆ’ as ๏ฃฏ 5 as 2 as as ๏ฃบ 2ฯ€ ( xห† opt ) ๏ฃฐ๏ฃฏ (1 / 2 โˆ’ xห†opt ) xห† opt (3 โˆ’ 4 xห† opt ) ๏ฃป๏ฃบ q= โ‰… 0.268 as as as 12 xห†opt โˆ’ 3 1 / 2 โˆ’ xห†opt 1 / 2 โˆ’ xห† opt as 2 as as โˆ’ 12 + (3 โˆ’ 4 xห†opt )[cot (ฯ€xห†opt ) โˆ’ 1] โˆ’ 24 cot(ฯ€xห†opt ) as 2 as as ( xห†opt ) xห†opt xห†opt 3 1 (5.3.10) As an illustration of the result obtained above, one might consider the following stiffening parameters: ฮฒ = 0.9 (which seems acceptable due to the high order of the expansion with respect to ฮฒ), ฮฝ =1/3, d/a = 0.01 and h/t = 10, which imply ฮต = 11.25. According to (5.3.9) and (5.3.10), the corresponding optimal position is: xห†opt โ‰… 0.35 . It is therefore established that the globally optimal stiffening layout for even moderately long stiffeners consists of a single stiffener for a finite range of rigidities, and that for a certain value of the relative rigidity, ฮต, the stiffener should be split into two. Then, for two rigid stiffeners in an optimal layout, the distance between the stiffeners should increase (hyperbolically) with their rigidities until it approaches its asymptotic limit. The rate of this increase would in case of an optimal layout be approximately proportional 17 to the 5th power of the aspect ratio of the plate, defined as the length of the stiffeners divided by the length of the edge of the plate perpendicular to the stiffeners. 5.4 Highly flexible unidirectional stiffeners with non-negligible torsional rigidity โ€“ 1st order asymptotics The linear elastostatic strain energy for the case can be derived, using the results of sections 3 and 4, as follows. Introducing the small parameters ฮต โ‰ก EI /(aD) , ฮณ โ‰ก GC /(bD) and deriving the auxiliary quantities required for the calculation of the strain energy for the asymptotic case, one gets: โˆž โˆž ฯ† r โ‰ก ฯ…r โˆ’ โˆ‘ ฮ› rs (1 + B s ) โˆ’1 u s โ†’ ฯ…r โˆ’ โˆ‘ ฮ› rs (1 โˆ’ B s ) u s โ†’ ฯ…r    ฮต <<1    ฮต <<1 ( 4.11) s =1 s =1 O (ฮณ ) O (ฮณ ) O (ฮต ) O (ฮณ ) O (ฮต ) O (ฮณ ) O (ฮณ ) O ( ฮต ) O (ฮต ) (5.4.1) โˆ’1 ฮจ rs โ‰ก โ„ฆ rs โˆ’ ฮ› rs (1 + B s ) Ts + ฮด rs 1 โ†’ โ„ฆ rs โˆ’ ฮ› rs (1 โˆ’ B s ) Ts + ฮด rs 1 โ†’ ฮด rs 1       ( 4.11)  ฮต << 1 ฮต << 1 O (ฮณ ) O (ฮณ ) O (ฮต ) O (ฮต ) O (ฮณ ) O (ฮณ ) O (ฮต ) O (ฮต ) โˆ’1 ฮธ r โ‰ก (1 + B r ) u r โ†’ (1 โˆ’ B r ) u r โ†’ u r ; ฮ˜ r โ‰ก (1 + B r ) โˆ’1 Tr โ†’ (1 โˆ’ B r ) Tr โ†’ Tr   ฮต <<1   ฮต <<1    ฮต <<1   ฮต <<1  ( 4.15 ) ( 4.15) O (ฮต ) O (ฮต ) O (ฮต ) O (ฮต ) โˆž O (ฮต ) O (ฮต ) O (ฮต ) O (ฮต ) O (ฮต ) O (ฮต ) โˆž โ‡’ ฯ… r โ† ฯ† r = โˆ‘ ฮจ rs t s โ†’ โˆ‘ (ฮด rs 1)t s = t r โ‡’ t s โ†’ ฯ… s  ฮณ <<1 ( 4.12) s =1 ฮณ <<1 ฮณ <<1  s =1 O (ฮณ ) (5.4.2) O (ฮณ ) โˆ’1 โ‡’ v r = (1 + B r ) ( u r โˆ’ Tr t r ) โ†’ (1 โˆ’ B r )( u r โˆ’ Tr t r ) โ†’ u r โˆ’ Tr ฯ… r โ†’ u r         ฮต <<1  ( 4.7 ) ฮต <<1 ฮต <<1  O (ฮต ) O (ฮต ) O (ฮต ) O (ฮต ) O (ฮต ) O (ฮต ) O (ฮต ) O ( ฮต ) O (ฮณ ) O (ฮต ) Then, substituting (5.4.1) and (5.4.2) into the expression for the deflection field given by (4.17), gives: โˆž 4 sin(nฯ€ฮพ / b) sin( sฯ€ฮท / a) ๏ฃฎ ab nฯ€ ๏ฃน Pns โˆ’ sin( nฯ€x T / b)u s โˆ’ cos(nฯ€x T / b) ฯ… s ๏ฃบ โˆ‘ 4 2 2 2 2 2 ๏ฃฏ ฮต ,ฮณ <<1 ฯ€ abD 4 b ( n / b + s / a ) ๏ฃฐ ๏ฃป n , s =1 w(ฮพ ,ฮท , x) โ†’ (5.4.3) Integrating it multiplied by half the loading (thus obtaining the expression for the external work or the total structural strain energy), โˆž Pns 1 nฯ€ ๏ฃฎ ab ๏ฃน U ( x) โ†’ Pns โˆ’ sin( nฯ€x T / b)u s โˆ’ cos( nฯ€x T / b)ฯ… s ๏ฃบ (5.4.4) โˆ‘ 4 2 2 2 2 2 ๏ฃฏ ฮต ,ฮณ <<1 2ฯ€ D 4 b + ( n / b s / a ) ๏ฃฐ ๏ฃป n , s =1 and recalling definitions (2.10, (3.6), (4.6) and (4.10), produces the following asymptotic expression: ๏ฃฑ๏ฃด abN โˆ’1 U ( x) โ†’ โˆ‘ ๏ฃฒ 4 ฮต i ,ฮณ <<1 i =1 ๏ฃด 8ฯ€ D ๏ฃณ N โˆ’ โˆž ๏ฃฎ โˆž s 2 Pns sin( nฯ€xi / b) ๏ฃน ฮตi Pns2 โˆ’ โˆ‘ 2 2 2 2 2 4ฯ€ 4 a 2 D โˆ‘ ๏ฃฏโˆ‘ 2 2 2 2 2 ๏ฃบ n , s =1 ( n / b + s / a ) s =1 ๏ฃฐ n =1 ( n / b + s / a ) ๏ฃป โˆž 2 (5.4.5) โˆž ฮณj s โˆ’ q (โˆ’1) s + q โˆž nPns cos(nฯ€xi / b) โˆž mPmq cos(mฯ€xi / b) ๏ฃผ q ๏ฃฝ โˆ‘ โˆ‘ โˆ‘ 6 2ฯ€ bD s ,q =1 ( s โˆ’ q )( s + q ) n =1 ( n 2 / b 2 + s 2 / a 2 ) 2 m =1 (m 2 / b 2 + q 2 / a 2 ) 2 ๏ฃพ As before, if the expression in the curved brackets attains its global minimum for a certain i at xi = x0, there is no reason why for different values of i, xi should not be equal x0 if one wishes to find a global minimum point of U. This is true whenever, N k N i =1 j =1 i =1 N k U (x) = โˆ‘U i ( xi ) = โˆ‘โˆ‘U i j ( xi ) = โˆ‘โˆ‘U i j ( xi ) (5.4.6) i =1 j =1 and there is no additional equality constraint on the variables. Then the principle of separation of variables holds and the minimum of the sum is the sum of the minima (due to linearity, which always holds for a 1st order asymptotics). Then, all the minima are attained at the same point due to the fact that U i j ( xi ) is the same function of its argument for every i. Hence, for flexible enough stiffeners โ€“ and small enough bending rigidity necessarily implies small enough torsional rigidity, since E and G are usually of the same order of magnitude and I and C for closed, thin-walled sections are both approximately proportional to the smaller dimension and to the third power of the larger dimension of the cross section โ€“ the optimal layout, in the since of minimal structural compliance, is a single stiffener. That is, there should be no splitting of stiffeners before a critical bending rigidity is supplied. This phenomenon was shown for bidirectional stiffening when neglecting torsional rigidity and for unidirectional stiffening when accounting for it. It is reasonable to believe that this should be at least 18 approximately true for bidirectional stiffening with beams of non-negligible torsional rigidity (when the torsional rigidity is non-negligible with respect to the bending rigidity). Moreover, in order to emphasize that the obtained result is not absolutely trivial, it should be noted that the 2nd order expansion in section 5.2 showed coupling between the variables implying that the objective function cannot be written as in (5.4.6). In the case examined there, it is not obvious that the stiffeners should not be split. However, subsection 5.2 proves that this is still true even if not by the argument shown in (4.6), but by a more delicate reasoning. The combination of the results of sub-sections 5.1, 5.2, and 5.4 thus makes it not unreasonable to believe that for realistic bidirectional stiffening with closed cross-sections of non-negligible torsional rigidity, it may still be optimal to use only two orthogonal major stiffeners, for various loading distributions. Beyond the abovementioned, numerical analysis of stiffened plates performed with the use of commercial software, showed that the effect of torsional rigidity, at least for the blade stiffeners examined in section 5.2, corresponds to no significant change in the total work done by the external loading. Numerical optimization also showed that when the optimal layout consists of one or two perpendicular stiffeners, it is true for various cross-sections, both when accounting for and neglecting the effect of torsional rigidity. Last, in order to illustrate the result in (5.4.5), it should be pointed out that for a symmetric loading, xi = 1/2 makes the 2nd term in (5.4.5) maximal in absolute value and the third term zero. This coincides with the understanding that for symmetric loading, the mid-span would not twist and therefore a stiffener placed there would apply no torque and torsional rigidity would not contribute to the strain energy of the structure. 6 CONCLUSIONS This paper presented several results of an investigation in the subject of optimal stiffening of rectangular plates in elastostatic bending. A previously published method for the analysis of stiffened plate was obtained in more compact forms in sections 2, 3 and 4 herein and utilized to derive globally optimal stiffening layouts for limit-case parameters. It was shown that the optimal layout of each of two orthogonal sets of parallel, highly flexible stiffeners with negligible torsional rigidity consists of two orthogonal beams having increased rigidities positioned perpendicularly. In addition, the asymptotically globally optimal layouts for long stiffeners were obtained for both highly flexible and highly rigid stiffeners, to the 1st and 2nd orders of approximation for the former and the latter, respectively. The effect of the interaction of perpendicular stiffeners was shown to cancel out for stiffeners of negligible torsional rigidity. The effect of torsional rigidity was examined from the perspective of its ability to influence the optimal layout of asymptotically flexible stiffeners and was found to be insufficient, at least for a 1st order asymptotic expansion of the structural compliance with respect to the rigidities of the stiffeners, and for the special case of unidirectional stiffening. In addition, it should be mentioned that, although not shown here, the structural compliance minimization problem was solved for beams of different cross-sectional parameters, producing the result that the higher the bending rigidity of the stiffeners with respect to that of the plate, the more unidirectional the stiffening becomes in the optimum. Further noteworthy results correlating with the present work can be found in the works of Schade (1940), Clarckson (1965), Mrรณz and Rozvany (1975), Fuchs (1976), Samsonov (1978), Fuchs and Brull (1979), Cheng and Olhoff (1981), Oโ€™Leary and Harari (1985), Lam and Santhikumar (2003), Lagaros et al. (2004), Perchikov and Fuchs (2006) and Szczepanik (2006). The essence of the contribution of this work to the existing body of knowledge is the utilization of a method of solution enforcing continuous interfaces between a plate and a set of stiffeners, including a derivation of a compact form of the strain energy of the structure, based on the method, for the purpose of the derivation of globally optimal positions of uniform stiffeners, at least for the asymptotic cases of highly flexible and highly rigid stiffeners and under the simplifying assumptions that the loading is harmonic and the stiffeners are at least relatively long. The obtained results seem to give insight into the structural behavior of such widely used structural elements as stiffened panels. As globally optimal layouts are hard to obtain either in geometric or in topological optimization, and even more so when it comes to the determination of the symbolic dependence of the optimal layouts on the parameters, asymptotic analysis, together with a closed form of the solution of the elastostatic bending problem, are what it seems that might shed additional light on the area. Although asymptotic approach to the optimal stiffening problem has been employed before, the specific combination of assumptions and the results presented herein seem not too marginal to contribute to the understanding of the subject. On another subject, the deflection field of a thin rectangular plate subjected to arbitrary boundary conditions and a general double-sine-series-expressible loading is given by Fletcher and Thorne (1955) and discussed by Goriupp (1947) and Timoshenko (1959). As the solution procedure given by Fletcher and Thorne produces the deflection field of a plate having arbitrary boundary conditions given the deflection 19 field of a simply-supported plate subjected to a prescribed loading, clearly all one has to do is to supply the solution procedure given by these authors with the deflection field of a simply-supported stiffened plate instead of that of an unstiffened one. In this paper, the effect of the torsional rigidity of the stiffeners was accounted for in a way similar to the way it is done by Mazurkiewicz (1962). More compact expressions for the entities representing the solution in the case where torsional rigidity is non-negligible can be obtained using analytic summation of the series in section 4 in the same manner in which it is done in sections 2 and 3 and in the work of Fletcher and Thorne (1955). Acknowledgments The present work was partly supported by the Israeli Science Foundation under grant No. 13/05. REFERENCES 1. Andrianov IV, Lesnichaya VA, Manevich LI (1985) Metod usrednienia v statikie i dinamike rebristikh obolochek. Moskva , Nauka 2. Cheng KT, Olhoff N (1981) An investigation concerning optimal design of solid elastic plates. Int J Solids Struct 17:304-323 3. Clarkson J (1965) The Elastic Analysis of Flat Grillage. Cambridge University Press, Cambridge 4. Dems K, Mrรณz Z, Szelag D (1989) Optimal design of rib-stiffeners in disks and plates. Int J solids Struct 25:973-998 5. Fletcher HJ, Thorne CJ (1955) Bending of thin rectangular plates. In: Proceedings of the 2nd U.S. National Congress on Applied Mechanics, Ann Arbor, Michigan, 1954 6. Fuchs MB (1976) Substitute function methods in structural optimization and their application to continuous beams. Sc.D. dissertation, Technion 7. Fuchs MB, Brull MA (1979) A new strain energy theorem and its use in the optimum design of continuous beams. Comput Struct 10:647-657 8. Goriupp K (1947) Die dreiseitig gelagerte Rechteckplatte. Arch Appl Mech 16:153โ€“163 9. Grayhack WT, Mahar TJ (1990) Buckling of rib-stiffened plates: an asymptotic approach. SIAM J. appl. Math. 50:1126-1133 10. Grigolyuk EI, Tolkachev VM (1980) Kontaktnyie zadachi teorii plastin i obolochek. Moskva, Mashinostroenie 11. Kalamkarov AL (1992) Composite and reinforcement elements of construction. Wiley, New York 12. Konchkovskii Z (1984) Plity. Staticheskie raschety. Moskva, Stroiizdat 13. Lagaros ND, Fragiadakis M, Papadrakakis M (2004) Optimum design of shell structures with stiffening beams. AIAA J 42:175-184 14. Lam YC, Santhikumar S (2003) Automated rib location and optimization for plate structures. Struct Multidisc Opt 25:35-45 15. Mazurkiewicz Z (1962) Bending and buckling of rectangular plate reinforced transversely by ribs with variable rigidities. Bull Acad Polon Sci Ser Sci Tech 10: 231-239 16. Mazurkiewicz Z (1962) Buckling of rectangular plate obliquely reinforced by ribs with variable flexural rigidity. Bull Acad Polon Sci Ser Sci Tech. 10:329-339 17. Mrรณz Z, Rozvany GIN (1975) Optimal design of structures with variable support conditions. J Optim Theory Applic 15:85-101 18. Nowacki W (1954) Statecznosc plyt prostokatnych wzmocnionych zebrami. Arch Mech Stos. 6:317342 19. Nowacki W (1954) Zagadnienia statyki i dynamiki plyt wzmocnionych zebrami. Arch Mech Stos 6:601-638 20. Oโ€™Leary JR, Harari I (1985) Finite element analysis of stiffened plates. Comput Struct 21:973-985 21. Perchikov N, Fuchs MB (2006) Optimal layouts of stiffeners for plates in bending โ€“ Topology optimization approach. Paper presented at the 3rd European conference on computational mechanics, solids, structures and coupled problems in engineering, LNEC, Lisbon, 5-8 June 2006 22. Samsonov AM (1978) The Optimal Location of a Thin Rib for an Elastic Plate. Izv Acad Nauk USSR, MTT (Mechanics of Solids) No.1, 132-138 23. Savin GN, Fleishman NP (1964) Plastinki i obolochki s rebrami zhestkosti. Kiev, Naukova Dumka 24. Schade HA (1940) The orthogonally stiffened plate under uniform lateral load. J Appl Mech 7 25. Szczepanik M (2006) Optimization of topology and stiffener locations in 2D structures using evolutionary methods. Paper presented at the 3rd European conference on computational mechanics, solids, structures and coupled problems in engineering, LNEC, Lisbon, 5-8 June 2006 26. Szilard R (1974) Theory and Analysis of Plates: Classical and numerical methods, Prentice Hall 27. Timoshenko SP, Woinowsky-Krieger S (1959) Theory of Plates and Shells, 2nd edn. McGraw Hill, New York 20
5cs.CE
arXiv:1712.05181v2 [cs.CL] 15 Dec 2017 Rasa: Open Source Language Understanding and Dialogue Management Tom Bocklisch Rasa [email protected] Joey Faulkner Rasa [email protected] Nick Pawlowski Rasa [email protected] Alan Nichol Rasa [email protected] Abstract We introduce a pair of tools, Rasa NLU and Rasa Core, which are open source python libraries for building conversational software. Their purpose is to make machine-learning based dialogue management and language understanding accessible to non-specialist software developers. In terms of design philosophy, we aim for ease of use, and bootstrapping from minimal (or no) initial training data. Both packages are extensively documented and ship with a comprehensive suite of tests. The code is available at https://github.com/RasaHQ/ 1 Introduction Conversational systems are becoming pervasive as a basis for human computer interaction as we seek more natural ways to integrate automation into everyday life. Well-known examples of conversational AI include Appleโ€™s Siri, Amazonโ€™s Alexa and Microsoftโ€™s Cortana but conversational systems are becoming widespread with platforms like Facebook Messenger opening up to chatbot developers. Common tasks for conversational systems include scheduling meetings1 , booking flights2 and customer support tasks3 . Modern open source libraries are held to a high standard of professionalism, and this extends to implementations of machine learning algorithms. There is a large amount of non-research work involved in maintaining a widely used project, and code produced by research groups often falls short of expectations4 . Rasa NLU and Core aim to bridge the gap between research and application, bringing recent advances in machine learning to non-experts who want to implement conversational AI systems. We introduce Rasa NLU and Core as easy to use tools for building conversational systems, since until now there was no widely-used statistical dialogue system intended for non-specialists. Rasa is already used by thousands of developers worldwide. As with many other conversational systems, our tools are split into natural language understanding (Rasa NLU) and dialogue management (Rasa Core). Section 3 describes the code architecture, in 4 we outline the developer experience, and in 5 demonstrate an example application. 1 e.g. Meekan, see https://meekan.com e.g. KLMs BlueBot, see https://bb.klm.com/en 3 see http://rasa.ai/enterprise/case-studies/ 4 see https://www.reddit.com/r/MachineLearning/comments/6l2esd/d_why_cant_you_guys_ comment_your_fucking_code/ 2 NIPS 2017 Conversational AI workshop, Long Beach, CA, USA. 2 Related Work Rasa takes inspiration from a number of sources. Rasaโ€™s API uses ideas from scikit-learn [8] (focus on consistent APIs over strict inheritance) and Keras [4] (consistent APIs with different backend implementations), and indeed both of these libraries are (optional) components of a Rasa application. Text classification is loosely based on the fastText approach [5]. Sentences are represented by pooling word vectors for each constituent token. Using pre-trained word embeddings such as GloVe [9], the trained intent classifiers are remarkably robust to variations in phrasing when trained with just a few examples for each intent. Braun et al [3] show that Rasa NLUโ€™s performance compares favourably to various closed-source solutions. Custom entities are recognised using a conditional random field [6]. Rasa Coreโ€™s approach to dialogue management is most similar to [13], but takes a different direction from many recent research systems. There is currently no support for end-to-end learning, as in [12] or [2], where natural language understanding, state tracking, dialogue management, and response generation are all jointly learned from dialogue transcripts. Rasaโ€™s language understanding and dialogue management are fully decoupled. This allows Rasa NLU and Core to be used independently of one another, and allows trained dialogue models to be reused across languages. For language generation, we encourage developers to generate a variety of responses by authoring multiple templates for each response. This is currently easier and more reliable than using (for example) a neural network to generate grammatically coherent and semantically correct responses as in [11]. Rasa Core also does not account for uncertainty in voice transcription and NLU, as would typically be achieved with Partially Observable Markov Decision Processes (POMDP) [15]. While there is support for training via reinforcement learning (currently in alpha), we do not emphasise this for new users. Rather than implementing a reward function and a simulated user, or immediately placing humans in the loop, we encourage developers to train the dialogue policy interactively (see section 4.2). Recent work by Williams follows a similar machine teaching approach [14], one difference being that in that work the dialogue policy is directly exposed to the surface form of the user utterances, whereas in Rasa Core the dialogue policy only receives the recognised intent and entities. 2.1 Related Software Libraries As mentioned in the introduction, the large body of high-quality research into statistical dialogue systems from the last decades has not translated into widely used software libraries. A notable contribution is to this end is PyDial [10], a recently released toolkit for dialogue research. Compared to PyDial, Rasa Core emphasises the needs of non-specialist software developers over those of researchers in the field. Other open toolkits include OpenDial [7] and RavenClaw [1]. There are a number of general-purpose natural language processing (NLP) libraries in widespread use, and it is not necessary to mention them all here. There are also a number of online services for natural language understanding (NLU), as the term is understood in the dialogue research community: converting short user messages into dialogue acts comprising an intent and a set of entities. Like the online services, Rasa NLU hides implementation details from new users, but with the advantage that slightly more experienced users can fully customise their NLU system. Language understanding is performed by a number of components implementing a common API, and is therefore easily configurable to suit the needs of a particular project. 3 Description of the Code Rasaโ€™s architecture is modular by design. This allows easy integration with other systems. For example, Rasa Core can be used as a dialogue manager in conjunction with NLU services other than Rasa NLU. While the code is implemented in Python, both services can expose HTTP APIs so they can be used easily by projects using other programming languages. 3.1 Architecture Dialogue state is saved in a tracker object. There is one tracker object per conversation session, and this is the only stateful component in the system. A tracker stores slots, as well as a log of all the 2 events that led to that state and have occurred within a conversation. The state of a conversation can be reconstructed by replaying all of the events. When a user message is received Rasa takes a set of steps as described in figure 1. Step 1 is performed by Rasa NLU, all subsequent steps are handled by Rasa Core. Figure 1: 1. A message is received and passed to an Interpreter (e.g. Rasa NLU) to extract the intent, entities, and any other structured information. 2. The Tracker maintains conversation state. It receives a notification that a new message has been received. 3. The policy receives the current state of the tracker. 4. The policy chooses which action to take next. 5. The chosen action is logged by the tracker. 6. The action is executed (this may include sending a message to the user). 7. If the predicted action is not โ€˜listenโ€™, go back to step 3. 3.2 Actions We frame the problem of dialogue management as a classification problem. At each iteration, Rasa Core predicts which action to take from a predefined list. An action can be a simple utterance, i.e. sending a message to the user, or it can be an arbitrary function to execute. When an action is executed, it is passed a tracker instance, and so can make use of any relevant information collected over the history of the dialogue: slots, previous utterances, and the results of previous actions. Actions cannot directly mutate the tracker, but when executed may return a list of events. The tracker consumes these events to update its state. There are a number of different event types, such as SlotSet, AllSlotsReset, Restarted, etc. The full list is in the documentation at https: //core.rasa.ai. 3.3 Natural Language Understanding Rasa NLU is the natural language understanding module. It comprises loosely coupled modules combining a number of natural language processing and machine learning libraries in a consistent API. We aim for a balance between customisability and ease of use. To this end, there are pre-defined pipelines with sensible defaults which work well for most use cases. For example, the recommended pipeline, spacy_sklearn, processes text with the following components. First, the text is tokenised and parts of speech (POS) annotated using the spaCy NLP library. Then the spaCy featuriser looks up a GloVe vector for each token and pools these to create a representation of the whole sentence. Then the scikit-learn classifier trains an estimator for the dataset, by default a mutliclass support vector classifier trained with five-fold cross-validation. The ner_crf component then trains a conditional random field to recognise the entities in the training data, using the tokens and POS tags as base features. Since each of these components implements the same API, it is easy to swap (say) the GloVe vectors for custom, domain-specific word embeddings, or to use a different machine learning library to train the classifier. There are further components for handling out-of-vocabulary words and 3 many customisation options for more advanced users. All of these are detailed in the documentation at https://nlu.rasa.ai. 3.4 Policies The job of a policy is to select the next action to execute given the tracker object. A policy is instantiated along with a featurizer, which creates a vector representation of the current dialogue state given the tracker. The standard featurizer concatentates features describing: โ€ข what the last action was โ€ข the intent and entities in the most recent user message โ€ข which slots are currently defined The featurization of a slot may vary. In the simplest case, a slot is represented by a single binary vector element indicating whether it is filled. Slots which are categorical variables are encoded as a one-of-k binary vector, those which take on continuous values can specify thresholds which affect their featurisation, or simply be passed to the featurizer as a float. There is a hyperparameter max_history which specifies the number of previous states to include in the featurisation. By default, the states are stacked to form a two-dimensional array, which can be processed by a recurrent neural network or similar sequence model. In practice we find that for most problems a max_history value between 3 and 6 works well. 4 Usage 4.1 Training Data Formats Both Rasa NLU and Core work with human-readable training data formats. Rasa NLU requires a list of utterances annotated with intents and entities. These can be specified either as a json structure or in markdown format. The markdown syntax is especially compact and easy to read and can be rendered by many text editors and web applications like GitHub. ## intent: restaurant_search - show me [chinese](cuisine) restaurants The json format is slightly more cumbersome to read, but is not whitespace sensitive and more suitable for transmission of training data between applications and servers. { "text": "show me chinese restaurants", "intent": "restaurant_search", "entities": [ { "start": 8, "end": 15, "value": "chinese", "entity": "cuisine" } ] } Rasa Core employs markdown to specify training dialogues (aka โ€˜storiesโ€™). ## story_07715946 * greet - utter_ask_howcanhelp * inform{"location":"rome","price":"cheap"} - utter_on_it 4 - utter_ask_cuisine * inform{"cuisine":"spanish"} - utter_ask_numpeople * inform{"people":"six"} - action_ack_dosearch A story starts with a name preceeded by two hashes ## story_03248462 The choice of name is arbitrary but can be helpful for debugging. The body of a story is a sequence of events, separated by newlines. An event such as * inform{"location":"bombay", "price":"expensive"} is a user utterance, annotated as a dialogue act. The general format is * intent{"entity_name": "entity_value"} where entities are key-value pairs separated by commas. System actions are also events and are specified by lines starting with a dash. The end of a story is denoted by a newline. 4.2 Machine Teaching In addition to supervised learning, Rasa Core supports a machine teaching approach where developers correct actions made by the system. We find that this is a practical approach for generating training data, and exploring the space of plausible conversations efficiently. 5 Here is an example of a user engaged in machine teaching of a restaurant recommender system (described in Section 5) . The user is presented with the following prompt5 : -----Chat history: bot did: [] bot did: action_listen user said: /greet whose intent is: greet we currently have slots: cuisine: None, people: None, price: None, location: None -----The bot wants to [utter_ask_howcanhelp] due to the intent. Is this correct? 1. 2. 3. 0. Yes No, intent is right but the action is wrong The intent is wrong Export current conversations as stories and quit >> If the user inputs 2, indicating that the action is wrong, they will be provided with a prompt as below which lists the possible actions and the probability assigned to them by the dialogue policy: -----what is the next action for the bot? 0 action_listen 0.12 utter_ask_cuisine utter_ask_helpmore utter_ask_howcanhelp utter_ask_location utter_ask_moreupdates utter_ask_numpeople action_search_restaurants 0.03 0.03 0.19 0.04 0.03 0.05 0.03 ... 8 9 10 11 12 13 14 ... >> Choosing the correct action creates a new training data point. Rasa Core then partially trains the dialogue policy and moves the conversation forward to the next step. Once completed, the trained model is persisted and the newly generated training data is saved to a file. 4.3 Visualisation of Dialogue Graphs Rasa Core also has the capability to visualise a graph of training dialogues. A story graph is a directed graph with actions as nodes. Edges are labeled with the user utterances that occur in between the execution of two actions. If there is no user interaction between two consecutive actions, the edge label is omitted. Each graph has an initial node called START and a terminal node called END. Note that the graph does not capture the full dialogue state and not all possible walks along the edges necessarily occur in the training set. To simplify the visualization a heuristic is used to merge similar nodes. A generated graph before and after running the simplification is shown in Figure 2. During the simplification two nodes are merged by replacing them with a single node that inherits all the 5 In Rasa a conversational system is referred to as a โ€˜botโ€™ 6 incoming and outgoing edges, removing duplicates in the process. This makes the resulting graphs easier to interpret. Nodes are merged if these two conditions are met: โ€ข they represent the same action โ€ข the previous max_history turns are identical for all dialogues leading to the nodes. START greet utter_ask_howcanhelp START greet greet utter_ask_howcanhelp utter_ask_howcanhelp inform{"location": "rome", "price": "cheap"} inform{"cuisine": "spanish"} inform{"location": "rome", "price": "cheap"} inform{"cuisine": "spanish"} utter_ask_cuisine utter_ask_location utter_ask_cuisine utter_ask_location inform{"cuisine": "spanish"} inform{"location": "rome", "price": "cheap"} inform{"cuisine": "spanish"} action_ack_dosearch action_ack_dosearch inform{"location": "rome", "price": "cheap"} action_ack_dosearch END END (a) Example story graph without simplification (b) Example story graph with simplification Figure 2: Minimal example illustrating how story graphs are simplified. The training data contains two stories with the same first interaction. These nodes are therefore considered equivalent and merged. 4.4 Deployment in a Production Environment The repositories for Rasa NLU and Core both contain Dockerfiles for producing static virtual machine (VM) images. This aids in reproducibility and ease of deployment to a variety of server environments. The web servers running the HTTP API support both thread-based and process-based parallelism, allowing them to handle large request volumes in a production environment. 5 Demonstration To demonstrate the usage of Rasa Core, we use the BAbl dialogue dataset [2]. This is a simple slot-filling exercise where the system is asked to search for a restaurant and has to fill several slots before being able to perform a successful search. The system may ask the user for their preference for any slot. The available slots are location, the number of people, the cuisine and the price range. This is an interesting dataset due to the inherent non-linearity of the problem - there are multiple ways to get the same information so there isnโ€™t a single โ€˜correctโ€™ action in every case. Accuracy and precision are therefore not the most appropriate metrics for evaluating a dialogue policy. Instead we consider how the system chooses actions depending on what information is already available. It should attempt to fill slots which are empty. In Figure 3 we can see the probabilities which Rasa Core attaches to each action given the slots it already knows. We see that Core follows a rough pattern of asking about cuisine, followed by location, followed by number of people - as it does in the training data. However it recognises that it could also ask about the other unfilled slots by attributing a non-zero probability to each one. The filled slots (the lower diagonal of the โ€˜gridโ€™) are given vanishingly small probability. This illustrates how Rasa Core can use contextual clues to learn non-linear conversations. 6 Outlook Both Rasa NLU and Core are under active development. They serve as a platform for making applied research in conversational AI usable by non-specialist developers, and as such will never be โ€˜finishedโ€™. A number of topics are under active development, including improved support for reinforcement learning, making NLU robust to typos and slang, and supporting more languages. We also plan to 7 Figure 3: Here we plot the probabilities of choosing actions for the bAbl example (Section 5) . We sequentially inform the system of the correct (top-bottom): cuisine, location, number of people and price, and the system chooses the next action based on the information it already has (which is listed in the box on the top left). The system favours asking about slots it has not been informed of, until all of the slots are filled and it searches for the restaurant. release real-world datasets for comparing the performance of different models. The authors welcome external contributions to the project, the specifics of which can be found in the repositories on GitHub. Acknowledgements The authors are indebted to the users of both libraries for providing invaluable feedback and creating a supportive community around these tools. Special acknowledgement is owed to the external contributors to both libraries. Up-to-date lists of contributors may be viewed at https:// github.com/RasaHQ/rasa_nlu/graphs/contributors and https://github.com/RasaHQ/ rasa_core/graphs/contributors. References [1] D. Bohus and A. I. Rudnicky. The ravenclaw dialog management framework: Architecture and systems. Comput. Speech Lang., 23(3):332โ€“361, July 2009. [2] A. Bordes and J. Weston. Learning end-to-end goal-oriented dialog. CoRR, abs/1605.07683, 2016. [3] D. Braun, A. Hernandez-Mendez, F. Matthes, and M. Langen. Evaluating natural language understanding services for conversational question answering systems. In Proceedings of the 18th Annual SIGdial Meeting on Discourse and Dialogue, pages 174โ€“185, 2017. [4] F. Chollet et al. Keras, 2015. 8 [5] A. Joulin, E. Grave, P. Bojanowski, and T. Mikolov. Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759, 2016. [6] J. Lafferty, A. McCallum, and F. C. Pereira. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. 2001. [7] P. Lison and C. Kennington. Opendial: A toolkit for developing spoken dialogue systems with probabilistic rules. ACL 2016, page 67, 2016. [8] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, et al. Scikit-learn: Machine learning in python. Journal of Machine Learning Research, 12(Oct):2825โ€“2830, 2011. [9] J. Pennington, R. Socher, and C. Manning. Glove: Global vectors for word representation. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pages 1532โ€“1543, 2014. [10] S. Ultes, L. M. R. Barahona, P.-H. Su, D. Vandyke, D. Kim, I. Casanueva, P. Budzianowski, N. Mrkลกicฬ, T.-H. Wen, M. Gasic, et al. Pydial: A multi-domain statistical dialogue system toolkit. Proceedings of ACL 2017, System Demonstrations, pages 73โ€“78, 2017. [11] T.-H. Wen, M. Gasic, N. Mrksic, P.-H. Su, D. Vandyke, and S. Young. Semantically conditioned lstm-based natural language generation for spoken dialogue systems. arXiv preprint arXiv:1508.01745, 2015. [12] T.-H. Wen, D. Vandyke, N. Mrksic, M. Gasic, L. M. Rojas-Barahona, P.-H. Su, S. Ultes, and S. Young. A network-based end-to-end trainable task-oriented dialogue system. arXiv preprint arXiv:1604.04562, 2016. [13] J. D. Williams, K. Asadi, and G. Zweig. Hybrid code networks: practical and efficient end-to-end dialog control with supervised and reinforcement learning. arXiv preprint arXiv:1702.03274, 2017. [14] J. D. Williams and L. Liden. Demonstration of interactive teaching for end-to-end dialog control with hybrid code networks. In Proceedings of the 18th Annual SIGdial Meeting on Discourse and Dialogue, pages 82โ€“85, 2017. [15] S. Young, M. Gaลกicฬ, B. Thomson, and J. D. Williams. Pomdp-based statistical spoken dialog systems: A review. Proceedings of the IEEE, 101(5):1160โ€“1179, 2013. 9
2cs.AI
SENATE: A Permissionless Byzantine Consensus Protocol in Wireless Networks Zhiyuan Jiang1 , Bhaskar Krishnamachari2 , Sheng Zhou1 , Zhisheng Niu1 , arXiv:1803.08694v1 [cs.IT] 23 Mar 2018 1 {zhiyuan, sheng.zhou, niuzhs}@tsinghua.edu.cn, Tsinghua University, Beijing, China 2 [email protected], University of Southern California, Los Angeles, USA Abstractโ€”The blockchain technology has achieved tremendous success in open (permissionless) decentralized consensus by employing proof-of-work (PoW) or its variants, whereby unauthorized nodes cannot gain disproportionate impact on consensus beyond their computational power. However, PoWbased systems incur a high delay and low throughput, making them ineffective in dealing with real-time applications. On the other hand, byzantine fault-tolerant (BFT) consensus algorithms with better delay and throughput performance have been employed in closed (permissioned) settings to avoid Sybil attacks. In this paper, we present Sybil-proof wirelEss Network coordinAte based byzanTine consEnsus (SENATE), which is based on the conventional BFT consensus framework yet works in open systems of wireless devices where faulty nodes may launch Sybil attacks. As in a Senate in the legislature where the quota of senators per state (district) is a constant irrespective with the population of the state, โ€œsenatorsโ€ in SENATE are selected from participating distributed nodes based on their wireless network coordinates (WNC) with a fixed number of nodes per district in the WNC space. Elected senators then participate in the subsequent consensus reaching process and broadcast the result. Thereby, SENATE is proof against Sybil attacks since pseudonyms of a faulty node are likely to be adjacent in the WNC space and hence fail to be elected. Index Termsโ€”Byzantine fault-tolerant consensus, Sybil attack, wireless network, permissionless blockchain, distance geometry 1. Introduction Recent years have witnessed an explosive development in digital cryptocurrency, both in academic fields and financial markets. Behind its tremendous success, the key enabling technology of digital cryptocurrency is the blockchain [1], [2] which combines several judiciously designed techniques to facilitate trusted distributed ledgers such that intermediary can be eliminated during transactions. In particular, the Bitcoin blockchain ingeniously adopts the proof-of-work (PoW) for mining to, among other purposes, deal with identity attacks (Sybil attacks) in open (permissionless) systems wherein the identities of participating nodes are not assumed to be known a priori. Specifically, each node, whether it is authentic or a pseudonym, must solve a cryptographic puzzle to participate in the block generation process and obtain rewards (mining). Therefore, the impact of a mining Figure 1. Time-critical application scenarios, e.g., autonomous driving systems wherein vehicles and pedestrians go through intersections based on distributed consensus (left); Internet-of-Things where terminals (drones, sensors and actuators) act based on coordinated and synchronized behavior (right). node is directly tied to its computational power, irrespective of the number of identities it has. According to the necessity of a prior identity authorization procedure, blockchain technologies can be categorized by permissionless and permissioned blockchains. Permissionless blockchains, such as Bitcoin [1] and Ethereum [3], are applied in open systems wherein faulty nodes may apply Sybil attacks, the counteraction of which usually involves enforcing a strict coupling between the consensus impact of a node and the computational power (PoW for Bitcoin) or the resources (proof-of-stake for Ethereum Casper) of the node. Despite the robustness against Sybil attacks, a price is payed that permissionless blockchains usually suffers from high processing delay (6 blocks are recommended in Bitcoin which amounts to one hour) and low throughput (at most 7 transactions per second [4] for Bitcoin). Many existing works try to remedy this issue [4], [5], however, the inherent mining based probabilistic consensus reaching technique is the key limiting factor. On the other hand, permissioned blockchains, such as Hyperledger Fabric [6], need not be wary of Sybil attacks since all participating nodes have gone through an explicit authentication process such that they can be trusted. Adopting a long line of existing research on byzantine fault-tolerant (BFT) protocols [7]โ€“[9], the processing delay and throughput of permissioned blockchains can be dramatically improved; a nice comparison between traditional BFT protocols and permissionless blockchains is presented by Vukolicฬ [10]. In this paper, a large-scale dense wireless network scenario is considered, which is likely to be encountered in the future in Internet-of-Things deployments as well as in TABLE 1. C OMPARISONS WITH BLOCKCHAIN TECHNOLOGIES Open system Delay Permissionless blockchain Yes Large Permissioned blockchain No Small SENATE Yes Small the context of vehicle networks and intelligent transportation (Figure 1). We come up with a solution for Sybil-proof BFT consensus which offers the benefits of both permissioned and permissionless blockchains (cf. Table 1 for details), i.e., low-delay and high-throughput BFT consensus in permissionless systems. The proposed protocol, namely Sybilproof wireless network coordinate (WNC) based byzantine consensus (SENATE), consists of three major phases: sortition, senator selection and byzantine agreement. SENATE thwarts the Sybil attack by exploiting the fact that even a faulty node cannot forge its wireless channel to other nodes such that a unique wireless fingerprint can be leveraged to identify nodes; a fully decentralized approach is proposed to achieve this. Notations: Throughout the paper, we use boldface uppercase letters, boldface lowercase letters and lowercase letters to designate matrices, column vectors and scalars, respectively. The transpose of a matrix is denoted by (ยท)T . Xi,j and xi denotes the (i, j)-th entry and i-th element of matrix X and vector x, respectively. The `p and nuclear norm of a matrix are denoted by kยทkp and kยทkโˆ— , respectively. The vector consisting of the diagonal entries of a square matrix is denoted by diag[ยท]. The trace of a matrix is denoted by tr[ยท]. The matrix with all entries being one is denoted by 1, and likewise zero matrix is denoted by 0. 1.1. Related Work The idea of only allowing selected nodes to participate in BFT consensus reaching is shared by, e.g., NEO [11] and Algorand [4]. NEO is a delegated BFT consensus based blockchain in which a small number of servers are statically configured to run consensus on behalf of a larger open network. Similar with SENATE, Algorand counteracts Sybil attacks by adopting a sortition phase; the difference is that a random verifiable function based solution combining with proof-of-stake (PoS) is leveraged by Algorand, whereas SENATE is based on the underlying wireless channels. Because SENATE is not employing PoS, it is not tied to a digital currency and thus can be applied more broadly to achieving consensus in wireless systems; moreover, it avoids the unfairness introduced by PoS which intentionally favors participants with more resources. Proof-of-location (PoL) in wireless networks is adopted by Dasu et al. [12] to replace PoW for faster transactions. The PoLs are generated by authorities such as wireless network operators and hence some notion of centralization is introduced. SENATE also uses the concept of PoL whereas, on a high level, nodes generate PoLs in a fully-decentralized manner without any trusted authority. There have been some work where wireless channel fingerprints are utilized to protect against Sybil attacks (cf. [13] for a survey and [14], [15] for a signalprint-based approach). However, most existing work relies on a trusted authority to verify the wireless channels of nodes [14], or pre-distribute encrypted keys [13]. In [15], a wireless ad hoc network of commodity 802.11 devices is considered; a view selection policy based on signalprint observations is proposed. Our work considers a fully decentralized wireless network and a novel WNC based protocol (SENATE) is proposed; compared with existing work, SENATE has much lower running time and better understandability and hence more favourable for real-world implementations. 2. System Model We consider a wireless network consisting of N geographically distributed nodes with full connectivity, namely any pair of nodes in the network are within each otherโ€™s radio communication range. The system is open, or permissionless, in the sense that any node can join the system without prior identity authentication. The objective is for the good nodes to reach a valid (the definition for validity is addressed later) consensus on a set of values over a certain time period such that deterministic concerted actions can be carried out, in the meantime, subject to malicious behaviors by faulty nodes. Note that the considered scenario distinguishes from the state machine replication wherein a log is proposed by a client and different nodes agree on the same log record; here different nodes may have different set of initial values, e.g., sensory data from environment, and hence a reasonably good (valid) consensus needs to be reached. Unlike existing work on byzantine consensus which mainly adopts the Internet as the overlay network, a wireless overlay is considered. In this regard, the behavior of a faulty node should be clarified. Specifically, the following assumptions are made in this paper. โ€ข โ€ข โ€ข The objective of a faulty node is to rig the consensus reaching process to benefit itself, rather than halting the process. To achieve its purpose, possible malicious behaviors include: (1) Byzantine node [7], namely it does not comply with the protocol and can report arbitrary messages; (2) Sybil attack [16]: it can generate pseudonyms to gain inappropriate power in the process of reaching consensus. In the overlay wireless network, a faulty node does not block or interfere with other nodesโ€™ transmissions and messages. The first assumption describes the motive of a faulty node and therefore has implications on the other two assumptions. The second assumption simply states that, on a message level, there is no restriction on the behavior of a faulty node, both from the perspectives of the message content and the identity of the message sender. In most existing byzantine agreement protocols with the Internet as overlay [7], the third assumption is also implied which limits the malicious behavior of a node to itself; whereas in wireless networks with the broadcast nature of electromagnetic waves, this assumption has more implications, meaning that a faulty node is assumed to comply with the communication protocol. For instance, a faulty node would not transmit when another node is scheduled (by the consensus protocol). This assumption stems in large part from the first assumption, since messing with the communication protocol, e.g., transmitting with a high power and thus blocking other nodes, leads to retransmissions and hence halting the consensus reaching process. Besides, the following two reasons also justify the assumption: (1) an attack becomes trivially devastating without this assumption, namely a faulty node with sufficient transmit power can block other transmissions all the time to prevent reaching consensus; (2) a node not complying with the communication protocol is obviously malicious and easy to spot. In this work, we assume nodes can obtain ranging estimations based on othersโ€™ pilot signals. However, we do not focus on specific methods to obtain the distance estimations; they can be based on receive signal strength (RSS), time of arrival (ToA) or other approaches which have been studied extensively [17]. The net effect of ranging estimations is considered by a statistical model, i.e., dห†ij = ฯƒij dij + nij , where dij denotes the geographic distance between node-i and node-j and hence dji = dij , the distance estimation at node-j from node-i is denoted by dห†ij , the estimation error is introduced by multiplicative and additive random coefficients ฯƒij and nij , respectively. In the wireless localization literature, it is usually assumed that โ€ข โ€ข For ToA-based ranging estimations, ฯƒij = 0 and nij is modeled as a Gaussian distributed variable. For RSS-based ranging estimations, the shadow fading is modeled as ฯƒij which is assumed to be Gaussian distributed; it is often termed as log-normal shadow fading by taking logarithm on both sides. Considering the ranging estimation error, it is observed thereby that the RSS-based approach is effective with short distances since there is a multiplicative error component; the ToA-based approach applies to a more wide range of distances although it may require a central node to calibrate the clocks of terminals to ensure synchronization. In the ALOHA game, a critical requirement is that every good player (node) knows the total number of users (including faulty nodes) in the system to determine its action; in the considered scenario, this requirement poses a challenge in the presence of faulty nodes, namely faulty nodes can let good nodes believe there are fewer nodes in the system such that good nodes may behave more conservatively and hence benefit faulty nodes. To prevent this, a chorus procedure is proposed which leverages the unique pattern of channel power delay profile (PDP) to estimate the total number of participating nodes. The key observation is that a faulty node cannot forge multi-path components (MPCs) and hence this feature can be utilized, especially with line-of-sight (LoS) transmission environment, to estimate the node quantity. Chorus: In this procedure consisting of T time slots, each node is supposed to randomly select one time slot to receive and, on the other hand, transmit pilot symbols in the remaining T โˆ’ 1 time slots. An analysis in Section 4 shows that even in the presence of faulty nodes, this procedure is robust. In the receive time slot of, e.g., nodei, it estimates the PDP of receive signal and calculates the number of MPCs. In an LoS environment, this measurement gives an accurate estimation of the number of transmitters in the system; moreover, even a faulty node cannot generate multiple MPCs given its location. This is analogous to let all nodes perform chorus first such that every node can have an estimation of the population based on nodesโ€™ unique timbre. The procedure lasts T time slots since we assume that nodes cannot operate in the full-duplex mode; otherwise the procedure can be shortened to one time slot wherein every node transmit and receive simultaneously. The detailed procedure, as well as the analysis for appropriate T , is given in Section 4. ALOHA game based sortition: Given each nodeโ€™s estimations about the total number of nodes in the system, we let every node be selfish in the ALOHA game to prevent faulty nodes from gaining advantages; this all-be-selfish methodology is essentially identical with the blockchain technology which allows all miners to compete for the opportunity to register a block. In particular, an ALOHA random access game with selfish users is implemented. It is roughly described as follows. โ€ข 3. Overview SENATE consists of three major phases: sortition, senator selection and byzantine agreement. 3.1. Sortition In the sortition process, the objective is to prevent faulty nodes to generate arbitrarily many pseudonyms; note that this does not mean we eliminate the Sybil attack by sortition completely. The key to achieve this is by developing an ALOHA game with selfish users [18] such that no one can cheat based on the Nash equilibrium arguments. โ€ข Every node is selfish, in the sense that they all want to transmit as soon as possible in a collision-free time slot. However, after a successful transmission, a good node would stop competing whereas a faulty node might keep on transmitting to launch Sybil attacks. Once a node successfully transmits in a time slot (collision-free), it is selected as the s-th candidate where s โˆˆ {1, ..., S} denotes the s-th successful transmission in the ALOHA game; then it transmits a pilot signal for ranging estimations immediately afterwards. By this definition, it can be shown (Section 4) that a Nash equilibrium exists based on which every node adopts the same mixed-strategy [18]: transmit in each time slot with a probability p with 0 < p < 1, and no one can benefit by changing the strategy unilaterally. After a quorum of S candidates is reached, the sortition phase terminates with S candidates going into the senator selection in the next phase. Note that a Sybil attack is still possible; a faulty node may occupy several seats among the candidates. 3.2. Senator Selection This phase is dedicated to further removing the pseudonyms generated by faulty nodes, by cross-checking the ranging estimations among nodes in a fully distributed manner. After S candidates are selected, they no longer follow the ALOHA-based random access protocol. Instead, each candidate is assigned a unique time slot to transmit in a frame of S time slots in this phase. Since every candidate has transmitted a pilot signal, every candidate has obtained the distance estimations from other candidates. For candidate-i, its distance estimations are denoted by a vector h iT dฬ‚i = dห†1i , ..., dห†(iโˆ’1)i , 0, dห†(i+1)i , ..., dห†Si , i = 1, ..., S. (1) The estimated Euclidean distance matrix (EDM) [19] with squared norm is hence h 2 i 2 Dฬ‚ , dฬ‚1 , ..., dฬ‚S . (2) Distance feedback and symmetry verification: Each candidate feeds back its dฬ‚i in its dedicated time slot. Afterwards, every candidate obtains the distance estimations between any pair of candidates (double-directional) in the network. Note that dij = dij , โˆ€i, j , and thereby every node can remove suspicious distance feedback based on checking the estimated EDM (here we assume the feedback is perfect) dห†2ij โˆ’ dห†2ji <  (3) where  is a constant related to ฯƒij and nij . In this case, as long as (3) does not hold, both dห†ij and dห†ij are removed since we cannot tell if node-i or node-j is lying. Robust WNC generation: Despite the fact that the symmetry verification can, to some extent depending on distance estimation error, eliminate untruthful distance feedback, a faulty node can still launch what we refer to as a โ€œshout attackโ€1 . Definition 1 (Shout Attack). A shout attack is that a faulty node pretends to be further away to other nodes, by synchronously adding to the distance estimations to other nodes. In particular, for ToA-based ranging estimations, a faulty node can purposely transmit pilot signals later than supposed, and, accordingly, feed back tampered 1. Likewise, a โ€œwhisper attackโ€ can be defined by which the faulty node pretends to be nearer to other nodes. For ease of exposition, we use the shout attack for illustration henceforth. (larger) distance estimations; for RSS-based ranging estimations, a faulty node can purposely amplify its pilot signal power and, accordingly, feed back tampered (larger) distance estimations.  By definition, a shout attack cannot be detected by symmetry verification and gives a faulty node arbitrarily many fake geographical locations that are arbitrarily far from its real one. The purpose of a shout attack is hence to create pseudonyms and facilitate the Sybil attack, which causes a severe challenge to SENATE since SENATE uses the location information for Sybil protection. To thwart the shout attack, we introduce the seesaw test based on the following intuition. In the real world with (at most) 3-dimensional space, it is increasingly unlikely that a faulty node, which launches the shout attack, is further away to other nodes proportionally, as the number of nodes grows. This is analogous to placing elastic sticks between each pair of nodes in the system, with the lengths of sticks given by the distance estimations. The circumstance for a faulty node launching shout attack in the 2-dimensional space is illustrated in Figure 2; its related sticks are bent dramatically and hence the elastic force levers it out (screened out by the seesaw test), like being on the lighter side of seesaws. This argument is mathematically formalized in Theorem 2 which states the local error is proportional to the number of good nodes. Good Node Node 1 Faulty Node Node 4 Node 2 Node 3 Figure 2. A seesaw test. A faulty node launching the shout attack would be โ€œlevered outโ€. An iterative WNC calculation with seesaw tests is proposed, the essence of which can be illustrated as follows. In each round of the iteration, every node, e.g., node-i, uses the distance estimation to another node-j to push (resp. pull) node-j if the distance estimation is larger (resp. smaller) than the predicted distance between the two nodes by the current WNC; then node-j moves accordingly. At the end of each round, the node with the largest local error, i.e., its related seesaws are bent the most, is identified as a faulty node and therefore removed; note that a termination criterion (specified later) is added such that the WNC calculation terminates when the system has small prediction error. K -means clustering. After obtaining the coordinates of all candidates, a K -means clustering algorithm [20] is applied to the coordinates such that all candidates are divided into K clusters. Then K representatives, each from one cluster, are selected as senators; this prevents Sybil attacks because pseudonyms of one faulty candidate are likely to fall into the same cluster. 3.3. Byzantine Agreement The K senators run a byzantine agreement protocol to reach consensus. We primarily consider the median validity for consensus, which is defined as follows [21].2 Assume a single consensus value is to be reached upon. Denote by G the sorted array of the initial values of good nodes. Among n nodes, f nodes are faulty and it is assumed that f โ‰ค t and hence G = [G[0], ..., G[n โˆ’ f โˆ’ 1]]. Definition 2 (Median Validity). We call a value x medianvalid, if it holds that       nโˆ’f nโˆ’f โˆ’1โˆ’t โ‰คxโ‰คG โˆ’ 1 + t . G 2 2 (4) Thereby, we adopt the Jack algorithm [21] which ensures the following properties, as long as the number of faulty senators, i.e., f , satisfies K โ‰ฅ 3f + 1. โ€ข โ€ข โ€ข Agreement: For every selection of input values and every selection of faulty senators, all good senators can decide on the same value. Termination: Every good senator can decide on a value in finite time. Median Validity: The decision is median-valid. Upon agreement, every senator broadcasts its consensus value, and every good node in the system adopts the majority value. Since consensus is reached in the senate, the majority value can reflect the consensus value and ensures safety and agreement among all nodes. Algorithm 1: Sortition Input: Node-1, ..., N ; Output: Candidate-1, ..., S ; 1 Chorus Procedure 2 Every node (node-i) uniform-randomly selects 1 โ‰ค ti โ‰ค T . 3 for t=1:T do 4 if t = ti then 5 Node-i transmits a pilot symbol in the t-th time slot. 6 else 7 Node-i receives signals and estimates the number of transmitting nodes based on the receive PDP; the estimation is denoted by ฯƒi . 8 The total number of nodes estimated by node-i is Nฬ‚i = 1 + T Tโˆ’1 ฯƒi . 9 10 11 12 13 ALOHA Game based Sortition Every node can transmit in every time slot. for s=1:S do The s-th candidate is selected when a new successful transmission happens and the corresponding node is candidate-s; afterwards, it transmits a pilot signal. return Candidate-1, ..., S . all faulty nodes can conjure is by always transmitting, and thereby, 4. Sortition Nฬ‚i โ‰ค 1 + The sortition phase is described in Algorithm 1. We elaborate on several details as follows. 4.1. Analysis on Chorus Duration When a node, e.g., node-i, receives signals, assuming its estimation on the number of transmitting nodes is correct, the probability of a good node transmitting in this time slot is 1 pj = 1 โˆ’ , node-j is a good node and j 6= i. (5) T Therefore, the unbiased estimate should be T qi , (6) T โˆ’1 where qi denotes the estimation of transmitting node in node-iโ€™s receive time slot. The optimal attack a faulty node can launch is to let good nodes believe there are more nodes in the system such that the transmission strategy of the latter would be more conservative. Therefore, the worst effect Nฬ‚i = 1 + 2. Nevertheless, basically any BFT protocol can be plugged in to SENATE in this phase, and works well in an open system since we have achieved Sybil-proof in the previous phases. T T F+ T โˆ’1 T โˆ’1 N โˆ’F Xโˆ’1 mn , (7) n=1 where mn is a Bernoulli random variable with parameter 1 โˆ’ T1 . By letting T be sufficiently large compared with N , then   T N Nฬ‚i โ‰ค 1 + F + (N โˆ’ F โˆ’ 1) + O T โˆ’1 T   F N =N+ +O ,F โ‰คN (8) T โˆ’1 T where O (ยท) denotes infinitesimal. In an LTE system with time slot of 0.5 ms and 100 nodes, a chorus procedure lasting 1 s yields N T = 0.05. 4.2. Nash Equilibrium of ALOHA Game An ALOHA game is described as follows. Every node participates in the game. โ€ข In a time slot a node successfully transmits (collision-free), the node receives a payoff of 1 โˆ’ c where c โˆˆ [0, 1] denotes the one-time transmission cost and leaves the game.3 3. A faulty node may otherwise stay in the game and keep playing. โ€ข In a time slot if a collision happens, every transmitting node receives a payoff of โˆ’c. A detailed payoff function is described in Table A. Every nodeโ€™s goal is to maximize its payoff in a single time slot and the game is repeated. Based on the game setting, we can prove the existence of Nash equilibrium. Theorem 1. There exists a Nash equilibrium that every node adopts the same mixed-strategy: transmit with probability p(c, N ) in each time slot, where โˆš (9) p(c, N ) = 1 โˆ’ N โˆ’1 c. Algorithm 2: Senator Selection Input: Candidate-1, ..., S ; Output: Senator-1,...,K ; validSenate. 1 Distance estimation and feedback 2 for i=1:S do 3 Based on the pilot signals received in the sortition phase, candidate-i estimtes its distance to other candidates and feeds back its distance vector dฬ‚i . 4 EDM symmetry verification T 5 6 Proof: The proof is based on [18]. See Appendix A for details. Remark 1. Theorem 1 indicates that by allowing every node to be selfish, a symmetric equilibria exists, namely even a faulty node cannot improve its payoff by changing its transmission probability unilaterally. Specifically, if it increases its transmission probability, there would be more collisions and the payoff decreases due to cost c; if it decreases its chance then its success chance also decreases. The transmission cost per time slot c clearly plays a critical role here, which denotes the relative cost per transmission as compared with one successful transmission. In practice, we propose that, aside from the power and resource cost due to wireless transmissions, an economic approach can be applied whereby a small fee is charged for every sortition transmission to enhance the robustness of the process. 7 8 9 10 11 12 13 14 15 ฮฃ , |Dฬ‚ โˆ’ Dฬ‚ |. for Every element Dij in Dฬ‚ do if ฮฃij > โˆ†d then Dฬ‚ij โ† invalidValue. Robust WNC generation At every terminal, generate the WNC simultaneously based on the same following procedure: terminate โ† false; X , [x1 , ..., xS ]T โ† 0Sร—2 ; e โ† 0S . while terminate = false do for {i, j} โˆˆ {1, ..., S} ร— {1, ..., S} do if Dij 6= invalidValue or 0 then i w โ† ei e+e ; j ei โ† fโ† xi โ† xi + ฮณf . 16 maxError โ† maxi {ei }; errIndex โ† arg P maxi {ei }. if maxError > ฮฒ Sei then Remove candidate-errIndex, and its corresponding entries in X , e and Dฬ‚ ; S โ† S โˆ’ 1. else terminate โ† true 17 5. Senator Selection 18 In this phase, the S candidates transmit in a round-robin fashion. The detailed algorithm description of the phase is presented in Algorithm 2, and some explanations follow. 19 20 5.1. Robust WNC Generation 21 The rationale for robust WNC generation is as follows. In the face of EDM estimation error introduced by faulty nodes, i.e., denote 22 Dฬ‚ = D + E, 25 (10) where the entries of E can be arbitrarily large considering malicious behavior, our goal is to recover D . Towards this end, two structures can be exploited: (a) although the faulty nodes can cause arbitrarily large error, the error is sparse in terms of entries of E , i.e., majority is still good; (b) the EDM stems from space of limited dimensionality4 and hence there are mature tools in distance geometry [19] that can be utilized to verify its authenticity. Thereby, considering 2dimensional space, the EDM can be written as  T   D = โˆ’2XX T + 1diag XX T + diag XX T 1T , (11) 4. We use 2-dimensional space for ease of exposition in this paper. However, the generalization to 3-dimensional is considered straightforward. 23 24 |kxi โˆ’xj k2 โˆ’dห†ij | ฮดw + (1 โˆ’ ฮดw)ei ;  dห†ij  |kxi โˆ’xj k2 โˆ’dห†ij | w (xi โˆ’ xj ); ห† dij K -means clustering if S < K then validSenate โ† false. 26 else S โ† Kmeans(X, K); validSenate โ† true 27 return S ; validSenate. where X โˆˆ RSร—2 is the geographical location coordinates T of candidates, i.e., X , [x1 , ..., xS ] . We then formulate the WNC generation problem as follows, exploiting the sparse error property. P1: minimize kEk0 , subj. (10), (11) and rank(X) = 2. X,E (12) 0 The ` norm based formulation in P1 is notoriously nonconvex and in fact NP-complete based on compressive sensing theory. Therefore, the `0 norm in P1 is relaxed to `1 norm which often exhibits near optimal performance [22], i.e., P2: minimize kEk1 , subj. (10), (11) and rank(X) = 2. X,E (13) We adopt a data-driven gradient-descend-based method to solve P2. Based on an estimation dห†ij , we can update xi (or xj ) based on the gradient of the objective function in P2: xi โ† xi + ยต โˆ‚ kxi โˆ’ xj k22 โˆ’ dห†2ij โˆ‚xi , (14) which corresponds to the 15-step in Algorithm 2. Also note that in the algorithm, we keep track of the local error array e whose element ei represents the squared distance error related to candidate-i; that is how much candidate-i is levered in the seesaw test (Figure 2). Therefore in the 15-step, we take into account the fact that a candidate with small error should not be updated based on the location of a candidate with large error; the latter is likely to be a faulty node. Based on this argument, we remove the candidate with the largest error at the end of each round, until the error is evenly distributed among candidates which means the error is introduced by ranging estimation instead of faulty nodes. In the case that the selected senators do not reach a quorum of K , Algorithm 2 returns validSenate = false. Intriguingly, this method is similar with the spring network based method where any pair of nodes are connected by a spring in, e.g., [17], [23]; the objective in those works is to minimize the elastic potential energy of the system (equivalent with the total square error (TSE) of distance prediction) given the current lengths of springs (distance estimations) by placing the nodes (the distances among nodes are the rest lengths of the springs) on a plane. Although the objective in P2 is not minimizing the TSE, the presented data-driven gradient-descend-based method turns out to be similar with the Vivaldi algorithm [23], except for the faulty detection. 5.2. Analysis on Seesaw Test The seesaw test is based on the rationale that a faulty node implementing the shout attack can be detected because its resultant location would be out of the 2D space. A question arises accordingly: how out-of-space the faulty node is given a certain strength of its shout attack, and moreover the effect of the number of good nodes. This question is important because its answer can quantitatively characterize the effectiveness of the seesaw test against forged locations. In seeking for a concise and illustrative answer, we consider a simplified scenario where there is one faulty node, without loss of generality located at x0 = (0, 0), who is trying to launch a shout attack to M good nodes located at xm = (xm , ym ), โˆ€m โˆˆ 1, ..., M . Concretely, we consider that the faulty node adds an arbitrary (independent with real node-locations) error vector to the entries in the EDM that are related to it; note that this is more general than the shout attack whereby the error is added synchronously. The arbitrary error is written based on (10) as   0 eT E= . (15) e 0M ร—M Note that no ranging estimation error is considered in this subsection to focus on the synthetic error by the faulty node. The level of out-of-space of the faulty node is measured by    2 h(ฯ‚ 2 ) , EX min min 2 Xฬ‚ โˆ’ Z , Z, rank(Z)=2 e, kek1 =M ฯ‚ 2 (16) where Xฬ‚ denotes the reconstructed coordinates of nodes given the tempered EDM in (10) and (15). In other words, the level is quantified by the minimum squared Euclidean distance from the reconstructed coordinate space to its projection into any 2D space, given that the faulty node implements the attack that minimizes this distance. It is essential to note the sequence of minimization, meaning that the faulty node first chooses the error then the closest 2D space is selected. Since this quantity is affected by the locations of good nodes by noting that closer good nodes produce stronger lever force in the seesaw test given the same strength of shout attack, the expectation in (16) is taken over a given location distribution. In the following theorem, we adopt the 2D Gaussian distribution for ease of exposition. Theorem 2. Assume that the faulty node is at (0, 0) with the attack strength of kek1 = M ฯ‚ 2 , and the good nodesโ€™ coordinates are i.i.d. generated based on a Gaussian distribution with zero mean and variance of ฯƒ 2 , i.e., (xm , ym ) โˆผ (0, ฯƒ 2 I), โˆ€m โˆˆ 1, ..., M . When the error e is independent with (xm , ym ), โˆ€m โˆˆ 1, ..., M , then  h(ฯ‚ 2 ) = min (M โˆ’ 1)ฯƒ 2 , (M โˆ’ 2)ฯ‚ 2 . (17) Proof: See Appendix B. Remark 2. It is shown that a faulty node cannot conceal its lie by noting that h(ฯ‚ 2 ) scales with the attack strength ฯ‚ 2 , until ฯ‚ 2 is comparable with the squared distance measurement (ฯƒ 2 ) whereby the attack becomes quite obvious. In addition, the effect is amplified by approximately M times; this is intuitive since it becomes increasingly more difficult to lie to more good nodes when they form a concrete 2D space. Another note is that h(ฯ‚ 2 ) > 0 as long as M โ‰ฅ 3, because at least 3 nodes can determine a 2D space. Remark 3. The theorem assumes that the error matrix E is independent with the coordinates of good nodes, which requires that a faulty node is not aware of the coordinates of other nodes (assumed mostly good nodes) in the sortition phase; this is reasonable because the coordinate information is not accessible in the sortition phase before any distance feedback occurs. Corollary  1. In L-dimensional space, min (M โˆ’ L + 1)ฯƒ 2 , (M โˆ’ L)ฯ‚ 2 . h(ฯ‚ 2 ) = 1 Byzantine consensus w/o Sybil attack SENATE 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 10 20 30 40 50 60 70 80 90 100 Figure 3. The probability a valid consensus is reached with 100 nodes. Remark 4. This corollary generates the effectiveness of the seesaw test to higher dimensions, e.g., 3D scenarios with applications for, e.g., drone swarms. 6. Byzantine Agreement In this phase, since we have removed Sybil nodes from the selected senators to a great extent, basically any byzantine agreement protocol can be implemented among the K senators. In particular, we adopt the Jack scheme proposed in [21] which consists of the following two major stages: โ€ข โ€ข Setup stage: Each senator broadcasts its initial value and receives other senatorsโ€™ initial values. Thereby, each senator broadcasts its acceptable values and a proposed value, jointly considering its and other senatorsโ€™ initial values. Search stage: Rotating among (t + 1) predetermined leaders, in each round a leader receives proposals from other senators and accordingly proposes a value based on its acceptable values; if an agreement is reached based on proposals, the leader would propose the agreed value. It is proved that as long as one leader among the (t + 1) leaders is a good node, a valid agreement would be reached. Therefore, at most t faulty nodes are allowed in this phase. The validity is assured by the median validity specified in Section 2. The termination and agreement properties are also proved in [21]. In fact, this protocol achieves the optimum safety and 2-approximate of the optimum median validity. 7. Simulations We run a computer simulation to test the performance of SENATE. The ranging estimations at nodes are assumed to be perfect, and the information exchange is simulated by direct modifications of data arrays for nodes. In Figure 3, where there are N = 100 nodes and SENATE selects S = 50 candidates and K = 7 senators, the number of faulty nodes is shown by x-axis and the performance of consensus probability is shown which is obtained by running the algorithms for 1000 episodes. The node locations are randomly generated in a square with a side length of 200 meter in each episode. The faulty nodes are assumed to always launch Sybil attacks and propose randomly generated values which are deviating from the true values; specifically, the good and faulty nodesโ€™ initial values are uniformly randomly generated from interval [โˆ’1, 1] and [99, 101], respectively. In the figure, we also simulate the Jack algorithm [21] without faulty nodes launching Sybil attacks for comparisons; the Jack algorithm under this scenario and attack assumptions can ensure consensus when the number of faulty nodes does not reach majority (50%), and cannot otherwise; this is direct consequences of the design of the Jack algorithm and the definition of median validity. It is observed that SENATE perform close-to the conventional BFT protocol as if there is no Sybil attack; this verifies that SENATE is Sybil-proof. We also observe that SENATE perform better when faulty nodes reach majority, which is because the SENATE randomly selects the senators such that there is a probability that the selected senators are dominated by good nodes; the Jack algorithm can also perform, at least, as well as SENATE if a sortition phase is added, but the effect is not shown in the figure to be in line with the original Jack algorithm. 8. Conclusion SENATE is a real-time distributed BFT protocol which is applicable to fully-connected wireless-networked systems without prior identity authentication. In order to prevent malicious nodes to generate an arbitrary number of pseudonyms, SENATE leverages the wireless signals transmitted by nodes to cross-verify their identities in a fully-decentralized (no-trust) manner, based on the fact that pseudonyms are likely to be adjacent geographically. Thereby, only selected nodes, i.e., senators, participate in the final consensus reaching process. Computer simulations show that SENATE is Sybil-proof, by comparing the consensus probabilities between systems wherein faulty nodes launch and do not launch Sybil attacks, respectively. Acknowledgement This work is sponsored in part by the Nature Science Foundation of China (No. 61701275, No. 91638204, No. 61571265, No. 61621091), the China Postdoctoral Science Foundation, and Hitachi Ltd. Appendix A. Proof of Theorem 1 First, we invoke the following lemma which ensures the existence of a Nash equilibrium. Lemma 1 ( [24]). A finite symmetric game has a symmetric mixed-strategy equilibrium. The finite symmetric game in Lemma 1 denotes a game wherein every player has the same finite action set, and the payoff received by each player given the same action (and other playersโ€™ actions) is identical, irrespective with the specific player. A mixed strategy is in contrast with a pure strategy; the latter employs a fixed action each time whereas the former can be viewed as a mix (randomized strategy) of the latter. The proof of Lemma 1 is based on the Brouwer fixed point theorem and is omitted for brevity. Provided the existence of symmetric equilibria, we are ready to derive the transmission probability p for every node. Due to symmetry, it suffices to consider a single node, whose game choice is shown in Table A. TABLE 2. PAYOFF FUNCTIONS All other nodes are silent (p1 ) 1โˆ’c 0 Transmit Silent Some other node transmits (p2 ) โˆ’c 0 T T rank(Xฬ‚ Xฬ‚ ) โ‰ค rank(Xฬ„ Xฬ„ ) + rank(1eT ) + rank(e1T ) = 4. (21) In addition, the eigenspace is spanned by T eigenspace(Xฬ‚ Xฬ‚ ) = span{x, y, 1, e}, (22) where x , [x1 , ..., xK ]T and y , [y1 , ..., yK ]T ; this can be seen from the following equation.  1 1eT + e1T 2  I 0 = [x, y, 1, e] [x, y, e, 1]T . 0 12 I T Xฬ„ Xฬ„ + (23) Expected payoff (1 โˆ’ c)p1 โˆ’ cp2 0 N โˆ’1 p1 = Pr{success} = (1 โˆ’ p) ; p2 = Pr{collision} = 1 โˆ’ (1 โˆ’ p)N โˆ’1 . Note that we assume E is independent with Xฬ„ , and that the power of the error is ฯ‚ 2 , i.e., 1eT + e1T 2 The probability of each event is (18) Based on the principle of indifference [25], both expected payoffs should be zero, which yields (9) and concludes the proof. Appendix B. Proof of Theorem 2 Based on (11), the EDM without error can be written as  T   D = โˆ’2XX T + 1diag XX T + diag XX T 1T h i h iT T = โˆ’2XX T + 1 0, ฮฒ T + 0, ฮฒ 1T , (19) 0 0  2 T = where ฮฒ 0 , d , ..., d2M 0 , and X  T 10 0 x1 ยท ยท ยท xM T T , [0, Xฬ„ ] . The attack is 0 y1 ยท ยท ยท yM implemented on EDM and we can derive the resultant coordinate covariance, which is tampered by the attack, based on [19]: T T First, we notice that the eigenspace of Xฬ‚ Xฬ‚ in (20) is at most 4-dimensional (the other eigenvalues are zeros) by the rank inequality Xฬ‚ Xฬ‚  1 T T T T T =โˆ’ D + E โˆ’ 1[0, ฮฒ T + e ] โˆ’ [0, ฮฒ + e ] 1 0 0 2 " # " #! T 0 0T 0 0 1 T + = XX + 2 0 1eT 0 e1T " # 0 0T = (20)  . T 0 Xฬ„ Xฬ„ + 12 1eT + e1T = ฯ‚ 2 M. (24) โˆ— Since the error is assumed to be independent with the coordinates and that i.i.d. Gaussian coordinate vectors are uniformly directed in space, a constant share of the error power is leaked out of the coordinate eigenspace spanned by [x, y]. Considering the objective of the faulty node is to minimize the leakage power beyond any 2D space, which in this case is equivalent to maximizing the power in the 2D space given that the total power is fixed, the best attack the faulty node can implement is to concentrate its error power to the same linear space spanned by 1, i.e., eopt = ฯ‚ 2 1. (25) Note that the solution e = โˆ’eopt also satisfies the conditions, T however, it results in a negative eigenvalue of Xฬ‚ Xฬ‚ . This violates with [26, Theorem 2] which proves an important T property of EDM that if Xฬ‚ Xฬ‚ is not positive-semi-definite, then there exists at least three distance measurements violating the triangle inequality. In other words, a shout attack may put the faulty node in a higher-dimensional space whereas a whisper attack would lead to violation of the triangle inequality which is much easier to spot. Let us consider the minimization inside the expectation in (16), this is an optimal low-rank approximation problem whose solution is well known to be the dominant 2dimensional singular space of Xฬ‚ , i.e., the eigenspace of T Xฬ‚ Xฬ‚ . Denoting the singular value decomposition (SVD) T of Xฬ‚ as Xฬ‚ = Uฬ‚ ฮฃฬ‚Vฬ‚ (singular values are always arranged in non-increasing order), then T Z opt = Uฬ‚ 2 ฮฃฬ‚2 Vฬ‚ 2 , (26) wherein Uฬ‚ 2 and Vฬ‚ 2 denote the first two columns of Uฬ‚ and Uฬ‚ , respectively, and ฮฃฬ‚2 contains the two dominant singular values. It follows that the minimum projection error is 2 min ZโˆˆRM ร—M , rank(Z)=2 Xฬ‚ โˆ’ Z 2 2 = Xฬ‚ โˆ’ Z opt = 2 M X ฮฃ2i,i , i=3 (27) which is the coordinate power leakage beyond 2D space due to tampered EDM. To solve for this quantity, we adopt the Gramโ€“Schmidt orthogonalization process on the set {x, y, |ฯ‚|1} (given the optimal attack derived in (25)). Based on symmetry that x and y are both i.i.d. Gaussian distributed, it is clear that the direction of the third vector isโˆšnot relevant and hence it is replaced by w where w , ฯ‚ 2 M [1, ..., 0]T with the same power. For brevity, the detailed process is omitted as the orthogonal basis vectors and the expected leakage power h(ฯ‚ 2 ) are given as below: u1 = x; uT y u2 = y โˆ’ 1 2 u1 ; ku1 k2 uT w uT w u3 = w โˆ’ 1 2 u1 โˆ’ 2 2 u2 ; ku1 k2 ku2 k2 h(ฯ‚ 2 ) = min {E[uT u ]} i i i={1,2,3} = min {M ฯƒ 2 , (M โˆ’ 1)ฯƒ 2 , (M โˆ’ 2)ฯ‚ 2 }, (28) i={1,2,3} [9] R. Guerraoui, N. Kneลพevicฬ, V. Quรฉma, and M. Vukolicฬ, โ€œThe next 700 BFT protocols,โ€ in Proceedings of the 5th European Conference on Computer Systems, ser. EuroSys โ€™10. New York, NY, USA: ACM, 2010, pp. 363โ€“376. [10] M. Vukolicฬ, โ€œThe quest for scalable blockchain fabric: Proof-ofwork vs. BFT replication,โ€ in Open Problems in Network Security, J. Camenisch and D. Kesdogฬ†an, Eds. Cham: Springer International Publishing, 2016, pp. 112โ€“125. [11] Online; accessed 20-Mar-2018; https://neo.org/. [12] T. Dasu, Y. Kanza, and D. Srivastava, โ€œUnchain your blockchain,โ€ in Proc. Symposium on Foundations and Applications of Blockchain, vol. 1, 2018, pp. 16โ€“23. [13] J. Newsome, E. Shi, D. Song, and A. Perrig, โ€œThe Sybil attack in sensor networks: Analysis & defenses,โ€ in Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, ser. IPSN โ€™04. New York, NY, USA: ACM, 2004, pp. 259โ€“268. [14] D. B. Faria and D. R. Cheriton, โ€œDetecting identity-based attacks in wireless networks using signalprints,โ€ in Proceedings of the 5th ACM Workshop on Wireless Security. New York, NY, USA: ACM, 2006, pp. 43โ€“52. [15] M. Demirbas and Y. Song, โ€œAn RSSI-based scheme for sybil attack detection in wireless sensor networks,โ€ in Proceedings of the International Symposium on on World of Wireless, Mobile and Multimedia Networks, Washington, DC, USA, 2006, pp. 564โ€“570. [16] J. R. Douceur, โ€œThe Sybil attack,โ€ in International Workshop on Peerto-Peer Systems. Springer, 2002, pp. 251โ€“260. [17] N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses, and N. S. Correal, โ€œLocating the nodes: cooperative localization in wireless sensor networks,โ€ IEEE Signal Process. Mag., vol. 22, no. 4, pp. 54โ€“69, Jul 2005. and the conclusion follows immediately. [18] A. B. MacKenzie and S. B. Wicker, โ€œSelfish users in Aloha: a gametheoretic approach,โ€ in IEEE Veh. Tech. Conf., vol. 3, 2001, pp. 1354โ€“ 1357. References [19] I. Dokmanic, R. Parhizkar, J. Ranieri, and M. Vetterli, โ€œEuclidean distance matrices: Essential theory, algorithms, and applications,โ€ IEEE Signal Process. Mag., vol. 32, no. 6, pp. 12โ€“30, Nov 2015. [1] S. Nakamoto, โ€œBitcoin: A peer-to-peer electronic cash system,โ€ 2008. [2] F. Tschorsch and B. Scheuermann, โ€œBitcoin and beyond: A technical survey on decentralized digital currencies,โ€ IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp. 2084โ€“2123, thirdquarter 2016. [20] J. MacQueen et al., โ€œSome methods for classification and analysis of multivariate observations,โ€ in Proc. the fifth Berkeley symposium on mathematical statistics and probability, vol. 1, no. 14. Oakland, CA, USA., 1967, pp. 281โ€“297. [3] I. Bentov, C. Lee, A. Mizrahi, and M. Rosenfeld, โ€œProof of activity: Extending Bitcoinโ€™s proof of work via proof of stake,โ€ SIGMETRICS Performance Evaluation Review, vol. 42, no. 3, pp. 34โ€“37, 2014. [4] Y. Gilad, R. Hemo, S. Micali, G. Vlachos, and N. Zeldovich, โ€œAlgorand: Scaling byzantine agreements for cryptocurrencies,โ€ in Proceedings of the 26th Symposium on Operating Systems Principles. New York, NY, USA: ACM, 2017, pp. 51โ€“68. [5] I. Eyal, A. E. Gencer, E. G. Sirer, and R. V. Renesse, โ€œBitcoinNG: A scalable blockchain protocol,โ€ in 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, 2016, pp. 45โ€“59. [21] D. Stolz and R. Wattenhofer, โ€œByzantine agreement with median validity,โ€ in International Conference on Principles of Distributed Systems (OPODIS), 2016, pp. 1โ€“14. [22] E. J. Candรจs et al., โ€œCompressive sampling,โ€ in Proc. international congress of mathematicians, vol. 3. Madrid, Spain, 2006, pp. 1433โ€“ 1452. [23] F. Dabek, R. Cox, F. Kaashoek, and R. Morris, โ€œVivaldi: A decentralized network coordinate system,โ€ SIGCOMM Comput. Commun. Rev., vol. 34, no. 4, pp. 15โ€“26, Aug. 2004. [24] J. F. Nash, โ€œEquilibrium points in n-person games,โ€ Proceedings of the national academy of sciences, vol. 36, no. 1, pp. 48โ€“49, 1950. [6] C. Cachin, โ€œArchitecture of the Hyperledger blockchain fabric,โ€ in Workshop on Distributed Cryptocurrencies and Consensus Ledgers, 2016. [25] S. fen Cheng, D. M. Reeves, Y. Vorobeychik, and M. P. Wellman, โ€œNotes on equilibria in symmetric games,โ€ in International Workshop On Game Theoretic And Decision Theoretic Agents (GTDT), 2004, pp. 71โ€“78. [7] M. Castro and B. Liskov, โ€œPractical byzantine fault tolerance,โ€ in OSDI. Berkeley, CA, USA: USENIX Association, 1999, pp. 173โ€“ 186. [26] J. C. Gower, โ€œEuclidean distance geometry,โ€ Math. Sci, vol. 7, no. 1, pp. 1โ€“14, 1982. [8] D. Ongaro and J. Ousterhout, โ€œIn search of an understandable consensus algorithm,โ€ in 2014 USENIX Annual Technical Conference (USENIX ATC 14). Philadelphia, PA: USENIX Association, 2014, pp. 305โ€“319.
7cs.IT
IEEE TRANSACTIONS ON SIGNAL PROCESSING 1 Estimation and Mitigation of Channel Non-Reciprocity in Massive MIMO arXiv:1706.04626v1 [cs.IT] 14 Jun 2017 Orod Raeesi, Student Member, IEEE, Ahmet Gokceoglu, Member, IEEE, and Mikko Valkama, Senior Member, IEEE Abstractโ€”Time-division duplex (TDD) based massive MIMO systems rely on the reciprocity of the wireless propagation channels when calculating the downlink precoders based on uplink pilots. However, the effective uplink and downlink channels incorporating the analog radio front-ends of the base station (BS) and user equipments (UEs) exhibit non-reciprocity due to non-identical behavior of the individual transmit and receive chains. When downlink precoder is not aware of such channel non-reciprocity (NRC), system performance can be significantly degraded due to NRC induced interference terms. In this work, we consider a general TDD-based massive MIMO system where frequency-response mismatches at both the BS and UEs, as well as the mutual coupling mismatch at the BS large-array system all coexist and induce channel NRC. Based on the NRC-impaired signal models, we first propose a novel iterative estimation method for acquiring both the BS and UE side NRC matrices and then also propose a novel NRC-aware downlink precoder design which utilizes the obtained estimates. Furthermore, an efficient pilot signaling scheme between the BS and UEs is introduced in order to facilitate executing the proposed estimation method and the NRC-aware precoding technique in practical systems. Comprehensive numerical results indicate substantially improved spectral efficiency performance when the proposed NRC estimation and NRC-aware precoding methods are adopted, compared to the existing state-of-the-art methods. Index Termsโ€”Beamforming, channel non-reciprocity, channel state information, frequency-response mismatch, linear precoding, massive MIMO, mutual coupling, time division duplexing (TDD). I. I NTRODUCTION M ASSIVE MIMO is one of the key potential technologies for upcoming 5G systems [1] where base stations (BSs) deploy very large antenna arrays, e.g., several tens or hundreds of antenna units per array, to facilitate high beamforming and spatial multiplexing gains. In such systems, it is not feasible to transmit downlink pilots from each BS antenna in order to estimate the corresponding spatial channels at user equipments (UEs) and feedback the channel state information (CSI) to BS, as the amount of overhead in such approach is proportional to the number of antennas in the BS side [2]. Massive MIMO O. Raeesi, A. Gokceoglu, and M. Valkama are with the Department of Electronics and Communications Engineering, Tampere University of Technology, Tampere 33720, Finland (e-mail: [email protected]; [email protected]; [email protected]). This work was supported by the Finnish Funding Agency for Technology and Innovation (Tekes) under the project โ€œ5th Evolution Take of Wireless Communication Networks (TAKE-5)โ€, by the Academy of Finland under the projects 284694 and 288670 and TUT Graduate School. This work has been submitted to IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. systems are thus envisioned to primarily deploy time-division duplex (TDD) based radio access and rely on the reciprocity of the physical uplink and downlink channels when obtaining CSI at BS. This, in turn, requires substantially smaller pilot or reference signal overhead being only proportional to the number of UEs [3]. While it is a common assumption in TDD systems that the physical propagation channels are reciprocal within a coherence interval [2], [3], the impacts of the BS and UE side transceiver analog front-ends on the effective downlink and uplink channels are not reciprocal. This hardware induced phenomenon is often referred to as the channel non-reciprocity (NRC) problem [4], [5]. Typically, the mismatches in the frequency-responses (FRs) of both the BS and UE side radio front-ends at transmit and receive modes are seen as the main cause of NRC. Another source of NRC considered in literature is the differences in mutual coupling (MC) of BS antenna units and associated RF transceivers under transmit and receive modes [6], [7]. The impacts of the NRC on the achievable system performance have been studied in various works in the recent literature. To this end, [5] provides downlink sum-rate analysis for a general multi-user MIMO system with zero-forcing (ZF) and eigen-beamforming types of precoding under NRC due to FR mismatch. Then, specifically focusing on massive MIMO systems, [8], [9] study achievable downlink sum-rates for maximum-ratio transmission (MRT) and ZF precoding schemes, demonstrating significant performance degradation under practical values of the NRC parameters. There is also a large amount of work reported in the literature addressing the estimation and mitigation of NRC in TDD based MIMO systems [2], [4], [6], [10]โ€“[16]. These studies can be divided into three main categories as follows: i) BS carries out โ€œself-calibrationโ€ using a reference antenna with the help of additional circuitry [4], [6]. This method is capable of estimating BS side NRC only. ii) BS carries out โ€œself-calibrationโ€ without additional circuitry. Mutual coupling between antennas is utilized when exchanging pilot signals with the reference antenna [2], [10]โ€“[13]. Similar to i), also this method estimates only the BS side NRC, and also commonly neglects the mutual coupling mismatch. iii) BS transmits specific pilot signals to UEs and UEs send back the received signals in certain properly precoded forms to facilitate BS side NRC parameter estimation, which is often referred to as over-the-air (OTA) approach [6], [14]โ€“[16]. 2 In this work, we focus on OTA-based estimation and mitigation of NRC in a multi-user massive MIMO system context deploying MRT or ZF precoding. The novelty and contributions of this paper can be summarized as follows: IEEE TRANSACTIONS ON SIGNAL PROCESSING element-wise and return real and imaginary parts of complexvalued arguments, respectively. The element in the iโ€™th row and jโ€™th column of matrix V is represented by vij , whereas the iโ€™th element on the main diagonal of a diagonal matrix C is shown by ci . The complex-valued zero-mean circularly symmetric Gaussian distribution with variance ฯƒ 2 is denoted  2 as CN 0, ฯƒ . Finally, In and 0n denote the n ร— n identity and all-zero matrices, respectively. 1) We consider generalized NRC induced by coexisting FR mismatches of all associated radio transceivers at UE and BS sides as well as the mutual coupling mismatches in the BS side large-array antenna system, unlike many of the earlier works that consider only FR mismatch such as II. S YSTEM M ODEL AND P ROBLEM F ORMULATION [2], [4], [10]โ€“[16]. In this respect, only [6] reports similar We consider a TDD based single-cell multi-user downlink modeling, however, the proposed mitigation scheme in transmission scenario where the BS with a large number of [6] is suitable mainly for small scale MIMO systems, e.g., antenna units, denoted by N , transmits to K single-antenna UEs 2-4 BS antennas. simultaneously in the same time-frequency resource, where 2) We address the estimation and mitigation of the NRC N  K. All signal and system models are written for an sources of both the UE and BS sides, unlike many other arbitrary subcarrier of the underlying orthogonal frequency works that address only BS side NRC, e.g., [2], [4], [10]โ€“ division multiplexing/multiple access (OFDM/OFDMA) wave[13], [15]. As shown in [17], with popular assumption of form, that is, before IFFT and after FFT on the TX and RX not having downlink demodulation pilots, UE side NRC sides, respectively. can be a major cause of performance degradation in multiIn an ideal TDD massive MIMO system, the effective uplink user massive MIMO systems, thus strongly motivating and downlink channels consist of only the reciprocal physical to incorporate such effects in the NRC estimation and channels. Building on that, the downlink transmission is done mitigation processes. by beamforming the multi-user downlink data based on the 3) Unlike other massive MIMO NRC mitigation works [2], estimated channels from uplink pilot sequences of length ฯ„u [10]โ€“[13] which all assume the availability of downlink symbols [2], [3]. In this work, we assume the same procedure pilots in the UE side, we consider the appealing massive for the downlink transmission, however, we consider more MIMO scenario in which there are no downlink pilots generalized uplink and downlink effective channel models and thus UEs rely on the statistical properties of the which are non-reciprocal due to radio front-end mismatches beamformed channels to decode the received downlink and non-idealities. In this respect, the uplink model for channel signals [8], [18]โ€“[21]. estimation phase [18] and the corresponding downlink received 4) We demonstrate the performance of our proposed scheme signal model in beamformed data transmission phase under under imperfect uplink CSI, unlike other works which the non-reciprocal effective channels can be expressed as commonly rely on the perfect uplink CSI assumption [4], โˆš [11]โ€“[13], [15]. Uplink Training : Y = ฯu ฯ„u G + Zu (1) โˆš The organization of the paper is as follows. Fundamental Downlink Transmission : r = ฯd Hx + zd , signal models of the considered massive MIMO system with where x denotes the precoded user data, whereas G and H MRT and ZF-based precoding schemes under NRC are first are the effective non-reciprocal uplink and downlink multipresented in Section II. Then, the NRC-aware downlink user MIMO channels, respectively, which will be elaborated in precoding approach is formulated for given NRC estimates. In detail later in Section II-A. Zu is the processed noise matrix at Section III, novel pilot signaling method between the BS and the BS, while zd denotes the UE side multi-user thermal noise UEs is introduced which is followed by the proposed novel vector, both assumed to consist of i.i.d. CN (0, 1) elements. iterative estimation of BS and UE side NRC matrices. The The average signal to noise ratios (SNRs) in the uplink and results of empirical performance evaluations in terms of the downlink are denoted as ฯu and ฯd , respectively. This basic achievable system spectral efficiency are presented in Section system framework is largely based on and following the seminal IV, incorporating the proposed estimation-mitigation scheme towork by Marzetta in [18], [22] where reciprocal channels were gether with existing state-of-the-art NRC estimation/mitigation assumed. methods for reference. Finally, conclusions are drawn in Section V. A. Effective and Relative Uplink and Downlink Channels Notations: Throughout the paper, vectors and matrices are As illustrated in Fig. 1, the complete description of the denoted with lower and upper case bold letters, respectively, โˆ— T H uplink and downlink effective channels appearing in (1) can e.g., vector x, matrix Y. The superscripts (.) , (.) , (.) , and โ€  be expressed as (.) indicate complex-conjugation, transposition, Hermitian) transpose, and Moore-Penrose pseudo inverse operations, G = Er PFt โ‡’ H 6= GT , (2) respectively. Expectation operator is shown by E[.], while H = Fr PT Et Tr (.) represents the trace operator. diag (.) operator transforms a vector v to a diagonal matrix with the elements of v at with Er = Lr Mr and Et = Mt Lt . In above, F is the joint its diagonal, and vice versa, reads the diagonal elements of frequency-response matrix of the UEs, L is the frequencythe input matrix into a column vector. <{.} and ={.} work response matrix of the BS, M is the mutual coupling matrix MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS UE #1 f1TX f 2TX l1RX RX m21 mNRX1 UE #2 Multi-user MIMO Propagation Channels P UE #K f KTX B = IN + B0 , where B0 accounts for the deviation of diagonal and off-diagonal entries from the ideal reciprocal response. The detailed modeling of the entries of the above matrices is based on the practical NRC modeling introduced in [6], in which ฯƒF2 is denoting the variance of diagonal elements in Ft and Fr , while the corresponding variance of diagonal elements in Lt and Lr is denoted by ฯƒL2 . The power of elements in Mt and Mr is controlled by input reflection coefficients which 2 have the variance ฯƒM . The characterization as given in (2) and/or (3) is generally referred to in literature as channel non-reciprocity [5], [6]. The ideal reciprocal channel model is a special case where A = B = I, i.e., A0 = B0 = 0. Base Station m11RX Mutual Coupling l2RX m12RX mNRX2 RX m22 m1RNX m2RNX 3 lNRX RX mNN (a) Base Station l1TX l2TX lNTX B. Channel Estimation and Beamforming under NRC Mutual Coupling m11TX UE #1 f1RX TX m21 mTNX1 m12TX mTNX2 UE #2 Multi-user MIMO Propagation Channels TX m22 f 2RX PT m1TNX m2TXN First, we shortly address the influence of NRC when the downlink transmission is carried out without any processing against the NRC, i.e., NRC-blind precoding is adopted. In this respect, the required downlink channel estimate in BS is obtained from the orthogonal uplink training signals, with the observation model given already on the first line of (1), complemented, e.g., with LMMSE channel estimator as described in [18], [22]. This yields formally UE #K Hฬ‚ = Gฬ‚T , f KRX TX NN m (b) Fig. 1. Basic system models for (a) uplink and (b) downlink transmission and reception including physical propagation channels, transceiver frequency responses and antenna mutual coupling in the devices. (4) where Hฬ‚ and Gฬ‚ are the estimated downlink and uplink effective channels, respectively. Using the estimated downlink effective channel in (4), T the user data vector s = [s1 , ..., sK ] โˆˆ CK which is assumedh to have element-wise power normalization of the i 2 form E |sk | = 1, is precoded as of the BS, P is the reciprocal physical channel, while the x = Us, (5) subscripts t and r denote the transmitting and receiving modes, respectively. Note that the frequency-response matrices, F and where the NRC-blind linear precoding matrix U reads [22] ๏ฃฑ L, are diagonal, while the mutual coupling matrix M in general ๏ฃฒฮฒ Hฬ‚H , for MRT has both non-zero diagonal and off-diagonal entries.  โˆ’1 U= (6) In general, the effective channels with above assumptions ๏ฃณฮฒ Hฬ‚H Hฬ‚Hฬ‚H , for ZF. and modeling are clearly non-reciprocal, i.e., H 6= GT , due to differences in the TX and RX modes of the radio front-end In above, without loss of generality, the scalar ฮฒ can be chosen and array responses, i.e., Ft 6= Fr , Lt 6= Lr and Mt 6= MT r . to satisfy unit average transmit power constraint as [18] Hence, the effective uplink and downlink channels can be q โˆ’1 described relative to each other as ฮฒ= E[Tr (UH U)] . (7) H = AGT B, (3) C. Received Signal at UE under NRC  โˆ’1 T โˆ’1 where, A = Fr Fโˆ’1 and B = L M M L . t t t r r The multi-user received downlink signal vector is given by In general, A is a diagonal matrix and the kโ€™th diagonal the second line of (1). Plugging the precoded symbol vector entry, denoted as ak , corresponds to the frequency-response expression in (5) into (1), the received signal for kโ€™th user ratio of kโ€™th UE at TX and RX modes. In the following, corresponding to the kโ€™th element of r can be written as similar to [5], [6], [8], we will use the decomposition of the K X form A = IK + A0 , where the diagonal matrix A0 measures โˆš โˆš rk = ฯd ฮฒhT u s + ฯ ฮฒ hT (8) d k k k k ui si + zd,k , the deviation from unity frequency-response ratio. The kโ€™th i=1,i6 = k diagonal entry of A0 is denoted as a0k , such that ak = 1 + a0k . In (3), B is a full matrix that incorporates both the frequency- where uk and hT k denote the kโ€™th column and row vectors of the responses and mutual coupling at the BS side. In the following, precoder and effective downlink channel matrices, respectively. for notational convenience, we will use the decomposition Notice that by denoting the kโ€™th column of the uplink effective 4 IEEE TRANSACTIONS ON SIGNAL PROCESSING channel matrix as gk , the effective downlink channel towards the kโ€™th user can be expressed as T hT k = ak gk B. (9) In general, conventional MIMO systems employ downlink pilots to acquire downlink CSI for detection purposes. However, in massive MIMO systems, as shown in [8], [18]โ€“[21], it is generally assumed that UEs employ only the statistical  properties of the beamformed channel, namely E ฮฒhT k uk , as the downlink CSI to decode the received signal. This assumption is justified by the law  of large numbers which T implies that hT u โ†’ E h u k k k k , commonly known as the channel hardening concept [22], [23]. Utilizing such approach in acquiring downlink CSI in UEs eliminates the need for sending downlink pilots which directly reduces downlink overhead. Building on this and plugging (9) into (8), the received signal under NRC can be re-written in a general form as   โˆš (10) rk = ฯd E ฮฒhT k uk sk + zSI,k + zIUI,k + zd,k , where the self-interference (SI), zSI,k , and inter-userinterference (IUI), zIUI,k , are given by   โˆš zSI,k = ฯd ฮฒ ak gkT Buk โˆ’ E hT sk k uk zIUI,k = โˆš ฯd ฮฒ K X ak gkT Bui si . (11) i=1,i6=k Based on (11), it can be clearly observed that the NRCblind precoder u which is constructed based on the estimated uplink effective channel Gฬ‚, through Hฬ‚ = Gฬ‚T , cannot take into account the NRC effects from ak and B, which results into increased interference levels and thus reduced downlink spectral efficiency. This is illustrated through an elementary system spectral efficiency evaluation in Fig. 2, with the detailed evaluation assumptions being described in Section IV. It can be noticed that in particular in the ZF precoder case, NRC-blind precoding results into substantial performance degradation, hence strongly motivating to develop efficient NRC estimation and mitigation techniques. D. NRC-Aware Downlink Precoding Principle As shown in Section II-C above, if MRT and/or ZF precoders are applied naively without accounting for NRC, there are additional SI and IUI terms that can substantially degrade the quality of the received signal at the UE side. Here, we introduce a novel NRC mitigation approach, called NRC-aware precoding, which seeks to cancel out the effects of NRC by properly modifying the precoder. Assuming that the BS has already estimates of the NRC matrices A and B, denoted by Aฬ‚ and Bฬ‚, the NRC-aware precoding approach transforms the basic linear precoders given in (6) as Unrc = Bฬ‚โˆ’1 UAฬ‚โˆ’1 . (12) Note that, in the special case where the NRC estimation method is capable of estimating the BS side NRC only, (12) reduces to Unrc = Bฬ‚โˆ’1 U. Fig. 2. Spectral efficiency vs. downlink SNR (ฯd ) for N = 100, K = 20, ฯ„u = K, ฯu = 0 dB, T = 250. The system spectral efficiency performance with the NRCaware precoder, assuming ideal NRC estimates, is shown in Fig. 2. As can be observed, the NRC-aware precoder achieves the ideal system performance, i.e., the performance with fully reciprocal channels. The evaluation setup and details of spectral efficiency calculations will be described in Section IV. III. P ROPOSED E STIMATION OF NRC M ATRICES The NRC mitigation method, i.e., the NRC-aware precoder described in Section II-D requires the knowledge of the matrices A and B at the BS. The information about these matrices is not readily available, hence calling for efficient estimation approaches. Thus, in this section, we will propose a novel iterative OTA estimation framework for acquiring accurate estimates of A and B, based on a novel pilot signaling concept between the BS and UEs. 2 In general, the NRC variances ฯƒF2 , ฯƒL2 , ฯƒM , and the corresponding realizations of the elements of A and B depend on hardware characteristics and operating conditions, e.g., temperature, which vary slowly in time. Thus, the NRC characteristics and the corresponding realizations of A and B can be assumed to stay constant over many propagation channel coherence intervals [14]. Therefore, it is sufficient to perform the NRC estimation very infrequently, e.g, once in every 10 minutes or once a day [2], [10], which makes the estimation overhead negligible, when compared to signaling and pilot overhead that commonly rises from channel estimation procedures. A. Proposed Pilot Signaling In order to estimate the matrices A and B, we propose the following round-trip pilot signaling approach: 1) BS transmits an N ร— N orthonormal pilot matrix Xnrc . 2) Upon reception, without decoding, UEs send back the conjugated versions of the received signals. Based on the above scheme, the received multi-user signal matrix at UE side can be written as p Rnrc = ฯฬƒd HXnrc + Zฬƒd , (13) MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS 5 CSI and NRC estimation ( test ) CSI acquisition Uplink pilots ttra test NRC acquisition Downlink pilots Uplink pilots Downlink Uplink Downlink Uplink Fig. 3. Assumed radio frame or sub-frame structure incorporating CSI and NRC estimation as well as actual data transmission phases. where ฯฬƒd is the downlink SNR and Zฬƒd is the K ร— N multiuser receiver noise matrix with i.i.d. CN (0, 1) entries. The tilde sign is used in above and what follows to distinguish these variables between the actual data transmission and pilot signaling phases. Then, the corresponding received signal at BS with the UEs sending back the conjugated version of (13) reads p Ynrc = ฯฬƒu GRโˆ—nrc + Zฬƒu p p (14) = ฯฬƒu ฯฬƒd GHโˆ— Xโˆ—nrc + Zฬƒtot , processed received signal in (15) and the corresponding UL channel estimate are available at multiple parallel sub-carriers in an OFDM/OFDMA based radio system. Hence, the above iterative estimation scheme can be carried out in a per subcarrier manner as well. Furthermore, as mentioned in [6], transceiversโ€™ baseband-to-baseband behavior can be modeled by allpass-like transfer functions, therefore it is reasonable to assume that the NRC matrices A and B are largely similar over a set of adjacent subcarriers Csc where typically Csc โ‰ค 10, whereas G is subject to variations depending on the frequency selectivity of the propagation channels. Based on these assumptions, the estimates Aฬ‚ and Bฬ‚ can be obtained by averaging the per subcarrier estimates over Csc neighboring subcarriers, i.e., where ฯฬƒu is the uplink SNR and Zฬƒu is the N ร— N BS receiver noise matrix with i.i.d. CN (0, 1) entries. Theโˆštotal effective noise matrix seen at BS is denoted as Zฬƒtot = ฯฬƒu GZฬƒโˆ—d + Zฬƒu . In above, the duration of the described overall NRC-related Csc 1 X pilot signaling is 2N symbols where the uplink and downlink Aฬ‚ = Aฬ‚l channels are assumed to be fixed. The coherence time of the Csc l=1 (16) physical channels is typically in the order of several hundred Csc X 1 symbol intervals, determined mostly by the mobility of the Bฬ‚ = Bฬ‚l , Csc UEs and the system center-frequency. Hence, we assume l=1 a scenario where the coherence time is at least 2N + K where l denotes the subcarrier index. Next we will present the symbols, taking into account both NRC-related pilot signaling actual proposed methods to obtain the estimates for A and B. and uplink channel estimation. As mentioned in the previous To simplify the notation, we will drop the subcarrier index l. section, matrices A and B are expected to change very slowly compared to channel coherence time and hence it is assumed that their values are fixed during the above pilot signaling. C. Proposed Estimation of B Fig. 3 illustrates the overall assumed radio frame or subAs described earlier, Bฬ‚ is iteratively refined using the current frame structure of the considered massive MIMO TDD system estimate of A. The proposed estimator builds on solving the including the proposed NRC estimation phase. matrix equation in (15) based on minimizing the Frobenius norm criterion. With this setting, the refined estimate of B can be formulated as B. Overall Estimation Framework 2 p p โˆ— T As the initial step in estimating A and B, the BS processes Bฬ‚(m + 1) = argmin Q โˆ’ ฯฬƒ ฯฬƒ Gฬ‚ Aฬ‚(m) Gฬ‚ B , u d โˆ— F the received signal Ynrc in (14) as Q = Ynrc XH B nrc . Since (17) the pilot matrix Xnrc has the property XH nrc Xnrc = IN , the where the subscript F denotesโˆšthe โˆš Frobenius norm. processed signal can be expressed as Next, by denoting T(m) = ฯฬƒu ฯฬƒd Gฬ‚โˆ— Aฬ‚(m)Gฬ‚T , we have p p Q = ฯฬƒu ฯฬƒd Gโˆ— AGT B + V, (15) the following identity K where the processed noise matrix is given by V = Zฬƒโˆ—tot XH X nrc . 2 2 ||Q โˆ’ T(m)B||F = ||qj โˆ’ T(m)bj || , (18) Now the target is to estimate A and B from (15) assuming j=1 that the BS has the uplink channel estimate Gฬ‚. In this respect, denoting the estimates at mโ€™th iteration as Aฬ‚(m) and Bฬ‚(m), where qj and bj denote the jโ€™th column of Q and B, we propose the following iterative estimation framework: respectively. Since the jโ€™th term in the sum depends only 1) Initialize, Aฬ‚(0) = IK , obtain the estimate Bฬ‚(1). on bj , minimizing the total sum is equivalent to separately 2) Substitute Bฬ‚(1) for B in (15) and obtain estimate Aฬ‚(1). minimizing each term ||qj โˆ’ T(m)bj ||2 . Thus, the estimation 3) Successively refine the estimates Aฬ‚ and Bฬ‚ by fixing the of matrix B is eventually simplified to estimation of each current value of one and solving for the other from (15). column of B, independently. In above, IK is used for initialization since the deviation As mentioned earlier, the BS NRC matrix incorporates both matrix A0 in A = IK + A0 is in practice small. Notice that the the frequency-responses and mutual coupling at the BS side. 6 IEEE TRANSACTIONS ON SIGNAL PROCESSING ๏ฌ /2 The solution to (20) is then given by ๏ฌ /2 โ€  red bฬ‚red j (m + 1) = Tj (m) qj . ๏€ญ D ๏€ฝ 0, C ( D ) ๏€ฝ 0 ๏€ญ D ๏€ฝ 1, C ( D ) ๏€ฝ 4 ๏€ญ D ๏€ฝ 2, C (D) ๏€ฝ 8 corresponding antenna unit Fig. 4. Illustration of sparsity threshold D on 10 ร— 10 rectangular BS antenna grid with ฮป/2 antenna spacing. The power of mutual coupling between two different antenna units is related to their physical distance, thus the off-diagonal elements in B become smaller as the distance between the two corresponding antenna units increases. Here, in estimating the BS NRC matrix B, we treat those off-diagonal entries which are corresponding to two antennas with a distance larger than a pre-defined threshold, called sparsity threshold D, as zeros, yielding a sparse matrix structure for Bฬ‚. We also define the maximum number of coupled neighboring antenna elements as C(D). In Fig. 4 an example 10 ร— 10 rectangular antenna layout with ฮป/2 antenna spacing between the neighboring elementsโˆšis shown with 3 different values of D, namely D = 0, 1 and 2, measured as multiples of ฮป/2. When D = 0, it is assumed that there is noโˆšmutual coupling and C(D) = 0, whereas for D = 1 and D = 2, the central antenna elements are coupled with at most C(D) = 4 and C(D) = 8 closest neighboring antenna elements. Note that, the antenna elements close to the edges of the grid are coupled with less number of antenna units. This is illustrated in Fig. 4 where for D = 1, the bottom left antenna element is assumed to be coupled with only 2 โ‰ค C(1) = 4 antennas. The following column-wise estimator will build on the assumption that B has a sparse structure and the number of non-zero row entries in any column j, denoted as Rj , satisfies Rj โ‰ค R (D) , (19) where R(D) = C(D)+1. It is further assumed that the index of non-zero entries of bj are known, which is directly determined by the antenna system architecture and geometry, and the assumed pre-defined coupling threshold discussed above. With these assumptions, we define a reduced vector of dimension Rj ร— 1, bred j , that contains the non-zero entries of bj . If the jโ€™th row is kept when constructing bred j , then similarly, the jโ€™th column is kept to construct Tred (m). Based on these, we j can formulate the estimation of columns of Bฬ‚(m + 1) through a reduced system of equations as red red bฬ‚red j (m + 1) = argmin qj โˆ’ Tj (m)bj bred j 2 . (20) (21) Once the bฬ‚red j (m + 1) is solved from (21), then bฬ‚j (m + 1) can be obtained straightforwardly by appending zeros to the appropriate rows. Note that, when A โ‰ˆ IK , we also have Gโˆ— AGT โ‰ˆ Gโˆ— GT , โˆ— where the matrix Gโˆ— GT = GGH is positive semi-definite matrix and of rank K if G is of rank K. The obtained bฬ‚red j and the corresponding minimum expression from (20) depend on the corresponding values of K and D. The column space of Tred j (m) has higher dimensionality for larger K. Thus, when D is fixed, for larger K one can solve for bฬ‚red from (21) j red 2 which yields smaller values of qj โˆ’ Tred (m)b . j j D. Proposed Estimation of A Next, given Bฬ‚(m) from (17), the (refined) estimate of A can be formulated based on minimizing the Frobenius norm criterion as 2 p p Aฬ‚(m) = argmin Q โˆ’ ฯฬƒu ฯฬƒd Gฬ‚โˆ— AGฬ‚T Bฬ‚(m) . (22) F A For diagonal A, the solution to (22) can be obtained as   Aฬ‚(m) = diag ฮพฬ‚ . (23) where ฮพฬ‚ = [IK , iIK ] ฯˆฬ‚ and the vector ฯˆฬ‚ is given as ๏ฃซ ๏ฃถโˆ’1 N N X X ฯˆฬ‚ = ๏ฃญ Wฬ„jT Wฬ„j ๏ฃธ Wฬ„jT qฬ„j . j=1 (24) j=1   T T In above, qฬ„j = <{qT and defining the N ร— j }, ={qj } ,  h i  โˆš โˆš N matrix Wj = ฯฬƒu ฯฬƒd Gฬ‚โˆ— diag Gฬ‚T Bฬ‚(m) , with j h i Gฬ‚T Bฬ‚(m) being the jโ€™th column of Gฬ‚T Bฬ‚(m), Wฬ„j is given j as " # <{Wj }, โˆ’={Wj } Wฬ„j = . (25) ={Wj }, <{Wj } Proof: See Appendix. IV. N UMERICAL E VALUATIONS AND A NALYSIS A. Basic Evaluation Settings and Performance Measures In this section, by using extensive computer simulations, we evaluate the performance of the proposed NRC estimation and mitigation scheme. We also compare its performance to the performance of two other existing schemes in literature, namely the direct-path based least squares (LS) known as โ€œArgosโ€ [2] and the generalized neighbor LS [11]. The latter is the optimized version of the generalized LS method presented in [10] and is shown in [11] to have the best performance amongst several existing NRC estimation methods. Both LS based methods estimate the BS NRC by the means of mutual coupling between BS antennas, while they depend on the downlink pilots to compensate the NRC in the UE side. where the expectation is over different NRC realizations and channel coherence intervals. The length of downlink pilots in symbols is denoted by ฯ„d and T is the total number of symbols in a channel coherence interval. SINR is the instantaneous signal to interference and noise ratio (SINR), which can be written, based on (8), as โˆš 2 ฯd ฮฑฬ‚k sk SINR = (27) โˆš 2, rk โˆ’ ฯd ฮฑฬ‚k sk where ฮฑฬ‚k is the scaling of the useful signal term available at the receiver of the kโ€™th UE. In the context of the proposed NRC estimation and mitigation method, no DL CSI pilots are used.  Hence, for the proposed estimation method, ฮฑฬ‚k = E ฮฒhT k uk . On the contrary, the other two estimation methods utilizes ฯ„d โ‰ฅ K downlink pilots for DL CSI acquisition as described in [22]. The other relevant performance metric is the normalized mean squared error (MSE) for NRC estimation which is defined as ๏ฃฑ 2 ๏ฃด ๏ฃด B โˆ’ Bฬ‚ ๏ฃด ๏ฃด F ๏ฃด ๏ฃด , for BS side ๏ฃฒ 2 ||B||F 2   (28) ฮดe = 2 ๏ฃด ๏ฃด diag (A) โˆ’ diag Aฬ‚ ๏ฃด ๏ฃด F ๏ฃด ๏ฃด , for UE side. ๏ฃณ 2 ||diag (A)||F 10!1 Proposed method - D = 0 Proposed method - D = 1p Proposed method - D = 2 BS 10!2 UE 10!3 -40 -35 -30 -25 -20 -15 -20 -15 2 <M (dB) (a) 120 Spectral E/ciency (bits/s/Hz) We consider the DL spectral efficiency as the key performance metric, which is defined as   ฯ„u + ฯ„d ฮทs = K 1 โˆ’ E [log2 (1 + SINR)] , (26) T 7 NRC Estimation Normalized MSE (/e2 ) MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS 100 Reciprocal Channel ZF p Proposed method - D = 2 Proposed method - D = 1 Proposed method - D = 0 No NRC mitigation 80 60 40 -40 MRT -35 -30 -25 2 <M (dB) (b) Fig. 5. (a) NRC estimation normalized MSE and (b) system spectral efficiency 2 ) for different values of the sparsity vs. input reflection coefficients variance (ฯƒM threshold D with N = 100, K = 20, ฯ„u = K, ฯu = 0 dB, T = 250. As a baseline simulation scenario, we consider a BS which is equipped with N = 100 infinitely thin ฮป/2 dipole antennas in a 10 ร— 10 square layout with ฮป/2 spacing as illustrated in Fig. 4. The input and the mutual impedances are computed based subcarriers, Csc = 10, over which the NRC realizations are on [24] for the assumed carrier-frequency of fc = 3.5 GHz. assumed to be constant. Finally, the variances of transceivers The impedances are assumed to be frequency-independent, as frequency-responses in both BS and UE side are assumed to the modulated signal RF bandwidth is much smaller than the be โˆ’20 dB, i.e., ฯƒL2 = ฯƒF2 = โˆ’20 dB. These are the baseline carrier frequency. The uplink channel matrix G is assumed simulation settings, while some of the parameter values are to have i.i.d. CN (0, 1) elements. The BS serves K = 20 also varied in the evaluations. single-antenna UEs simultaneously on the same time-frequency resource through either ZF or MRT precoding. We assume a scenario where each coherence interval contains T = 250 B. Numerical Results OFDM symbols. The number of uplink pilots sent by each UE 1) Effect of Sparsity Distance Threshold D: Here, we in each coherence interval is equal to the number of scheduled will study the effect of D on the normalized MSE and the UEs, ฯ„u = K, and the uplink SNR in this phase is assumed to system spectral efficiency. In this respect, Fig. 5a illustrates be ฯu = 0 dB. In the scenarios where UEs rely on downlink the normalized MSE of UE and BS NRC estimation under the 2 pilots for decoding purposes, i.e., direct-path based LS and baseline system settings, with the value of ฯƒM being varied. It generalized neighbor LS methods, the number of downlink can be seen that the choice of D = 0, i.e., estimating only the pilots in each coherence interval is set to be ฯ„d = K [22], and diagonal elements of B, yields the lowest MSE for UE NRC their SNR is equal to the downlink SNR in data transmission estimation. Note that, in the proposed NRC estimation method, phase which is assumed to be ฯd = 20 dB. The SNR of the the choice of D influences the UE side estimation as well since coupling channel between two neighboring antennas is set to A and B are estimated iteratively as described in Section III-B. be 80 dB for the two mentioned NRC mitigation methods [11]. On the other hand, the highest BS NRC estimation accuracy is 2 The uplink and downlink SNRs for the pilot signaling in the achieved for D = 0 only when ฯƒM โ‰ค โˆ’21 dB, whereas higher 2 proposed NRC estimation framework are set to be ฯฬƒu = 0 estimation accuracy is obtained for D = 1 when ฯƒM > โˆ’21 dB and ฯฬƒd = 10 dB, respectively. In the proposed method, dB. Following that, the spectral efficiencies plotted in Fig. 5b the estimated NRC matrices are averaged over 10 neighboring illustrate the combined effect of UE and BS NRC estimation. 100 Proposed method - D = 0 Proposed method - D = 1p Proposed method - D = 2 10!1 BS 10!2 10!3 UE !4 10 10 20 30 40 50 60 Number of UEs (K) 70 80 NRC Estimation Normalized MSE (/e2 ) IEEE TRANSACTIONS ON SIGNAL PROCESSING NRC Estimation Normalized MSE (/e2 ) 8 100 2 <F2 = <L2 = <M = !15 dB 2 <F2 = <L2 = <M = !20 dB 10!1 BS 10!2 UE !3 10 0 1 2 3 4 5 Iteration Number (a) Fig. 7. NRC estimation normalized MSE vs. NRC estimation iteration number for N = 100, K = 20, ฯ„u = K, ฯu = 0 dB, T = 250. Spectral E/ciency (bits/s/Hz) 250 sufficient amount of iterations such that convergence is obtained. This is commonly in the order of 4 iterations, as illustrated more specifically next. 150 ZF 2) Effect of the Number of Iterations: Fig. 7 illustrates 100 the reduction in NRC estimation normalized MSE over NRC p estimation iteration steps. It is shown in Fig. 7 that, even with Proposed method - D = 2 2 high NRC levels of ฯƒL2 = ฯƒF2 = ฯƒM = โˆ’15 dB, having 4 50 Proposed method - D = 1 Proposed method - D = 0 iteration rounds is sufficiently good for the proposed NRC MRT No NRC mitigation estimator to converge. Therefore, in the continuation, we set 0 10 20 30 40 50 60 70 80 the number of iteration rounds to 4. Number of UEs (K) 3) Effect of Number of Scheduled Users K: In Fig. 8, the (b) NRC estimation normalized MSE and the system spectral Fig. 6. (a) NRC estimation normalized MSE and (b) system spectral efficiency efficiency are plotted against the number of scheduled UEs K vs. number of UEs (K) for N = 100, ฯ„u = K, ฯu = 0 dB, T = 250. 2 for ฯƒM = โˆ’20 dB. Fig. 8a shows that while direct-path based LS has the worst performance, the proposed method is the โ‰ฅ 20 with a high As can be seen, the highest spectral efficiency is achieved for best option for estimating BS NRC for Kโˆ’3 accuracy where MSE is in the order of 10 . For direct-path 2 2 D = 0 when ฯƒM โ‰ค โˆ’22 dB and for D = 1 when ฯƒM > โˆ’22 based LS [2] and generalized neighbor LS [11], the normalized dB. MSE for UE side NRC is not shown. It is mentioned in [2] 2 2 2 For fixed NRC characteristics of ฯƒL = ฯƒF = ฯƒM = โˆ’20 and [11] that additional downlink pilot signaling per coherence dB, Fig. 6 evaluates the normalized estimation MSE and the system spectral efficiency for different values of D and against interval can be used together with UE side estimation for the number of scheduled UEs K. Fig. 6a shows that higher UE side NRC acquisition. However, no detailed description UE and BS NRC estimation accuracy is achieved for D = 0 is provided on the actual pilot signal structure or the actual when K < 20, whereas when the number of scheduled users estimation method. The corresponding system spectral efficiency performances exceeds K โ‰ฅ 20 the choice of D = 1 yields the highest BS are evaluated and shown in Fig. 8b. The proposed NRC NRC estimation accuracy. For K โ‰ฅ 20, UE NRC estimation estimation and mitigation scheme clearly outperforms the directperformances are largely similar for all three choices of D. path based LS and generalized neighbor LS methods. The Following these, Fig. 6b illustrates that from spectral efficiency difference between the performance of the proposed method perspective, the optimum sparsity distance threshold is D = 0 and the other two methods increases as K grows. Remarkably, for K < 20 and D = 1 for K โ‰ฅ 20. Thus, in the continuation for K = 70, the difference between the proposed method and D = 0 and D = 1 will be used under the settings of K < 20 the other two methods is already in the order of 100 bits/s/Hz. and K โ‰ฅ 20, respectively. As discussed in the previous section, โˆ— T Another advantage in utilizing the proposed NRC estimation when A โ‰ˆ IK , G AG which is used in the estimation scheme is that the optimum number of UEs Kopt , which is process is of rank K. Therefore, having higher number of defined as the number of scheduled UEs which maximizes the K increases the accuracy of the BS NRC estimation in the spectral efficiency, is higher compared to the other two NRC proposed method which facilitates the estimation of more nonestimation methods. For instance under ZF precoding Kopt is diagonal elements in B, i.e., higher values for D. between 60 and 70 for the proposed method whereas for LS It should be noted that for all the cases in Fig. 5 and based methods K is only around 50. opt Fig. 6, the proposed iterative NRC estimator is executed over a 200 9 10!1 120 Spectral E/ciency (bits/s/Hz) NRC Estimation Normalized MSE (/e2 ) MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS 10!2 10!3 10!4 10 Direct-path based LS [2] - BS Generalized neighbor LS [11] - BS Proposed method - BS Proposed method - UE 20 30 40 50 60 70 100 ZF 80 Proposed method Generalized neighbor LS [11] Direct-path based LS [2] 60 40 -40 80 MRT -35 -30 -25 -20 -15 2 <M (dB) Number of UEs (K) (a) 2 ) for Fig. 10. Spectral efficiency vs. input reflection coefficients variance (ฯƒM N = 100, K = 20, ฯ„u = K, ฯu = 0 dB, T = 250. Spectral E/ciency (bits/s/Hz) 250 Proposed method Generalized neighbor LS [11] Direct-path based LS [2] 200 ZF 150 100 50 MRT 0 10 20 30 40 50 60 70 80 Number of UEs (K) (b) Fig. 8. (a) NRC estimation normalized MSE and (b) system spectral efficiency vs. number of UEs (K) for N = 100, ฯ„u = K, ฯu = 0 dB, T = 250. Spectral E/ciency (bits/s/Hz) 120 100 MRT 60 40 20 โ€ข ZF 80 under ZF precoding. 5) Effect of Input Reflection Coefficient: Fig. 10 shows the impact of the variance of the input reflection coefficients on the achievable spectral efficiency. The proposed estimation and mitigation method again outperforms the other two LS based methods. The difference between the proposed method and the 2 other two methods increases as ฯƒM grows, which is due to the ability of the proposed method to estimate the non-diagonal elements in BS NRC matrix. It should be noted that D = 1 is used for obtaining the results in Fig. 10, and there is still room for improving the performance of the proposed method by adaptively selecting the optimum D according to the level 2 of ฯƒM as shown already in Fig. 5b. 6) Summary of the Obtained Results: Overall, as observed through extensive numerical evaluations in various scenarios, the proposed NRC estimation method outperforms the other two state-of-the-art methods. Selected technical aspects can be summarized as follows: Proposed method Generalized neighbor LS [11] Direct-path based LS [2] 0 5 10 15 20 25 30 โ€ข SNR (dB) Fig. 9. Spectral efficiency vs. downlink SNR (ฯd ) for N = 100, K = 20, ฯ„u = K, ฯu = 0 dB, T = 250. 4) Effect of Downlink SNR: In Fig. 9, the system spectral 2 efficiency is plotted against the downlink SNR when ฯƒM = โˆ’20 dB. The results show clear advantage in employing the proposed method in estimating NRC for all SNR values. The proposed estimation and mitigation method outperforms the LS based methods for both low and high SNR regions. Especially, the performance difference is most visible for high SNR region โ€ข Employing the proposed NRC estimation method eliminates the need to send downlink demodulation pilots since the proposed OTA framework facilitates estimating both the BS side and UE side NRC characteristics in the base station. Therefore, more time-frequency resources can be allocated in each coherence interval for actual downlink data transmission purposes which improves the spectral efficiency. The proposed NRC estimation method is more and more superior over the two reference methods when the number of scheduled UEs K grows. The reason is that increasing K is forcing the other two NRC estimation methods to spend more time for downlink pilot transmission in each coherence interval, while a larger number of scheduled users improves the accuracy of the proposed NRC estimation method. Due to the ability to estimate also non-diagonal elements of the BS NRC matrix, the difference between the performance of the proposed NRC estimation method and the other two methods increases as the power of BS antenna mutual coupling mismatch grows. 10 IEEE TRANSACTIONS ON SIGNAL PROCESSING V. C ONCLUSION In this work, we proposed an efficient NRC estimation and mitigation framework for multi-user massive MIMO TDD networks to compensate the jointly coexisting BS and UE side NRC. In general, even relatively modest NRC levels can cause significant performance loss in the achievable spectral efficiency when only standard NRC-blind MRT or ZF downlink precoding is employed. A novel OTA-based approach incorporating a dedicated round-trip pilot signaling with small pilot overhead together with sparsity-aided efficient iterative estimation techniques were proposed for the acquisition of NRC matrices at BS. Unlike the existing state-of-the-art methods, the proposed NRC estimation method acquires both the UE transceiver NRC as well as the BS transceiver NRC, and does not rely on downlink pilot transmission during the actual data transmission phase to compensate the NRC in the UE side. Therefore, it can be efficiently employed in massive MIMO systems that rely only on the statistical knowledge of the beamformed downlink channels at terminals for data decoding with very low system pilot overhead. The extensive computer simulations showed that for practical values of the NRC levels, SNRs and the number of spatially multiplexed users, the proposed estimation and mitigation method clearly outperforms the existing state-of-the-art methods in terms of the system spectral efficiency. A PPENDIX P ROOF FOR ESTIMATION OF A Let โˆ† L= Qโˆ’ p p ฯฬƒu ฯฬƒd Gฬ‚โˆ— AGฬ‚T Bฬ‚(m) 2 . (29) F Then, L= N X qj โˆ’ p ฯฬƒu p h i ฯฬƒd Gฬ‚โˆ— A Gฬ‚T Bฬ‚(m) j=1 2 j h N i  X p p T โˆ— qj โˆ’ ฯฬƒu ฯฬƒd Gฬ‚ diag Gฬ‚ Bฬ‚(m) = ฮพ 2 , j j=1 (30) โˆ† T where ฮพ = [a1 , a2 , ยท ยท ยท , aK ] . h i  โˆš โˆš โˆ— T By using Wj = ฯฬƒu ฯฬƒd Gฬ‚ diag Gฬ‚ Bฬ‚(m) , (30) j can be re-written as L= N X 2 ||qj โˆ’ Wj ฮพ|| j=1 = N X (31) qฬ„j โˆ’ Wฬ„j ฯˆ 2 โˆ† = Lฬ„ (ฯˆ) , j=1 T โˆ†  where ฯˆ = <{ฮพ T }, ={ฮพ T } . Therefore, the solution Aฬ‚(m) can be obtained by   Aฬ‚(m) = diag [IK , iIK ] ฯˆฬ‚ , (32) where ฯˆฬ‚ = argmin Lฬ„ (ฯˆ) . ฯˆโˆˆRK (33) Since Lฬ„ (ฯˆ) is convex, (33) can be solved from the partial derivative equation โˆ‚ Lฬ„(ฯˆ) โˆ‚ฯˆ = 0, which finally yields the solution given by (24). ACKNOWLEDGMENT The estimation of A is building on the work presented in [25]. The proof in Appendix A is a result of discussion with the authors of [25], H. Q. Ngo and E. G. Larsson, whose technical guidance is greatly acknowledged. R EFERENCES [1] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, โ€œFive disruptive technology directions for 5G,โ€ IEEE Communications Magazine, vol. 52, no. 2, pp. 74โ€“80, February 2014. [2] C. Shepard, H. Yu, N. Anand, E. Li, T. Marzetta, R. Yang, and L. Zhong, โ€œArgos: Practical many-antenna base stations,โ€ in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, ser. Mobicom โ€™12. New York, NY, USA: ACM, 2012, pp. 53โ€“64. [3] E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, โ€œMassive MIMO for next generation wireless systems,โ€ IEEE Communications Magazine, vol. 52, no. 2, pp. 186โ€“195, February 2014. [4] A. Bourdoux, B. Come, and N. Khaled, โ€œNon-reciprocal transceivers in OFDM/SDMA systems: Impact and mitigation,โ€ in Radio and Wireless Conference, 2003. RAWCON โ€™03. Proceedings, Aug 2003, pp. 183โ€“186. [5] Y. Zou, O. Raeesi, R. Wichman, A. Tolli, and M. Valkama, โ€œAnalysis of channel non-reciprocity due to transceiver and antenna coupling mismatches in TDD precoded multi-user MIMO-OFDM downlink,โ€ in 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), Sept 2014, pp. 1โ€“7. [6] M. Petermann, M. Stefer, F. Ludwig, D. Wubben, M. Schneider, S. Paul, and K. D. Kammeyer, โ€œMulti-user pre-processing in multi-antenna OFDM TDD systems with non-reciprocal transceivers,โ€ IEEE Transactions on Communications, vol. 61, no. 9, pp. 3781โ€“3793, September 2013. [7] H. Wei, D. Wang, and X. You, โ€œReciprocity of mutual coupling for TDD massive MIMO systems,โ€ in Wireless Communications Signal Processing (WCSP), 2015 International Conference on, Oct 2015, pp. 1โ€“5. [8] W. Zhang, H. Ren, C. Pan, M. Chen, R. C. de Lamare, B. Du, and J. Dai, โ€œLarge-scale antenna systems with UL/DL hardware mismatch: Achievable rates analysis and calibration,โ€ IEEE Transactions on Communications, vol. 63, no. 4, pp. 1216โ€“1229, April 2015. [9] F. Athley, G. Durisi, and U. Gustavsson, โ€œAnalysis of massive MIMO with hardware impairments and different channel models,โ€ in 2015 9th European Conference on Antennas and Propagation (EuCAP), May 2015, pp. 1โ€“5. [10] R. Rogalin, O. Y. Bursalioglu, H. Papadopoulos, G. Caire, A. F. Molisch, A. Michaloliakos, V. Balan, and K. Psounis, โ€œScalable synchronization and reciprocity calibration for distributed multiuser MIMO,โ€ IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 1815โ€“ 1831, April 2014. [11] J. Vieira, F. Rusek, and F. Tufvesson, โ€œReciprocity calibration methods for massive MIMO based on antenna coupling,โ€ in 2014 IEEE Global Communications Conference, Dec 2014, pp. 3708โ€“3712. [12] H. Wei, D. Wang, H. Zhu, J. Wang, S. Sun, and X. You, โ€œMutual coupling calibration for multiuser massive MIMO systems,โ€ IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 606โ€“619, Jan 2016. [13] H. Wei, D. Wang, J. Wang, and X. You, โ€œTDD reciprocity calibration for multi-user massive MIMO systems with iterative coordinate descent,โ€ Science China Information Sciences, vol. 59, no. 10, p. 102306, 2015. [14] M. Guillaud, D. T. M. Slock, and R. Knopp, โ€œA practical method for wireless channel reciprocity exploitation through relative calibration,โ€ in Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005., vol. 1, August 2005, pp. 403โ€“406. [15] Y. Zou, O. Raeesi, and M. Valkama, โ€œEfficient estimation and compensation of transceiver non-reciprocity in precoded TDD multi-user MIMOOFDM systems,โ€ in 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), Sept 2014, pp. 1โ€“7. [16] M. Guillaud and F. Kaltenberger, โ€œTowards practical channel reciprocity exploitation: Relative calibration in the presence of frequency offset,โ€ in 2013 IEEE Wireless Communications and Networking Conference (WCNC), April 2013, pp. 2525โ€“2530. MITIGATION OF CHANNEL NON-RECIPROCITY IN MASSIVE MIMO SYSTEMS [17] O. Raeesi, A. Gokceoglu, Y. Zou, and M. Valkama, โ€œPerformance analysis of multi-user massive MIMO downlink under channel non-reciprocity and imperfect CSI,โ€ submitted to IEEE Transactions on Communications, 2016. [Online]. Available: http://arxiv.org/abs/1610.06769 [18] H. Yang and T. L. Marzetta, โ€œPerformance of conjugate and zero-forcing beamforming in large-scale antenna systems,โ€ IEEE Journal on Selected Areas in Communications, vol. 31, no. 2, pp. 172โ€“179, February 2013. [19] J. Jose, A. Ashikhmin, P. Whiting, and S. Vishwanath, โ€œChannel estimation and linear precoding in multiuser multiple-antenna TDD systems,โ€ IEEE Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2102โ€“2116, Jun 2011. [20] J. Jose, A. Ashikhmin, T. L. Marzetta, and S. Vishwanath, โ€œPilot contamination and precoding in multi-cell TDD systems,โ€ IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2640โ€“2651, August 2011. [21] E. G. Larsson and H. V. Poor, โ€œJoint beamforming and broadcasting in massive MIMO,โ€ IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 3058โ€“3070, April 2016. [22] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, โ€œMassive MU-MIMO downlink TDD systems with linear precoding and downlink pilots,โ€ in Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference on, Oct 2013, pp. 293โ€“298. [23] B. M. Hochwald, T. L. Marzetta, and V. Tarokh, โ€œMultiple-antenna channel hardening and its implications for rate feedback and scheduling,โ€ IEEE Transactions on Information Theory, vol. 50, no. 9, pp. 1893โ€“1909, Sept 2004. [24] S. A. Schelkunoff and H. T. Friis, Antennas Theory and Practice. New York: John Wiley & Sons, 1952. [25] H. Q. Ngo and E. G. Larsson, โ€œEVD-based channel estimation in multicell multiuser MIMO systems with very large antenna arrays,โ€ in 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), March 2012, pp. 3249โ€“3252. 11
7cs.IT
Concept Formation and Dynamics of Repeated Inference in Deep Generative Models arXiv:1712.04195v1 [stat.ML] 12 Dec 2017 Yoshihiro Naganoa,d , Ryo Karakidab,d , Masato Okadaa,b,c,โˆ— a Graduate School of Frontier Sciences, The University of Tokyo, 5-1-5 Kashiwanoha, Kashiwa, Chiba 277-8561, Japan b Artificial Intelligence Research Center, National Institute of Advanced Industrial Science and Technology, 2-3-26 Aomi, Koto-ku, Tokyo 135-0064, Japan c Brain Science Institute, RIKEN, 2-1 Hirosawa, Wako, Saitama 351-0198, Japan d Research Fellow of the Japan Society for the Promotion of Science, Chiyoda, Tokyo 102-0083, Japan Abstract Deep generative models are reported to be useful in broad applications including image generation. Repeated inference between data space and latent space in these models can denoise cluttered images and improve the quality of inferred results. However, previous studies only qualitatively evaluated image outputs in data space, and the mechanism behind the inference has not been investigated. The purpose of the current study is to numerically analyze changes in activity patterns of neurons in the latent space of a deep generative model called a โ€œvariational auto-encoderโ€ (VAE). What kinds of inference dynamics the VAE demonstrates when noise is added to the input data are identified. The VAE embeds a dataset with clear cluster structures in the latent space and the center of each cluster of multiple correlated data points (memories) is referred as the concept. Our study demonstrated that transient dynamics of inference first approaches a concept, and then moves close to a memory. Moreover, the VAE revealed that the inference dynamics approaches a more abstract concept to the extent that the uncertainty of input data increases due to noise. It was demonstrated that by increasing the number of the latent variables, the trend of the inference dynamics to approach a concept can be enhanced, and the generalization ability of the VAE can be improved. โˆ— Corresponding author Email addresses: [email protected] (Yoshihiro Nagano), [email protected] (Ryo Karakida), [email protected] (Masato Okada) Preprint submitted to Neural Networks December 13, 2017 Keywords: Deep Generative Models, Variational Auto-Encoder, Inference, Concept Formation 1. Introduction Research on deep generative models, which extract essential features from an unlabeled dataset, is currently an active area. Deep generative models have been reported to be useful in a broad range of applications such as generating images [13, 24, 7, 23], movies [32, 33, 26], and text [34, 16, 28]. In particular, the conventional bidirectional network structure for recognition and generation of images has made it possible to eliminate noise from cluttered images and smoothly interpolate between different images. In detail, recognition is the process of mapping from a data point to a latent variable, and generation is the inverse of that process. Several studies have qualitatively highlighted the importance of repeated inferences between data space and latent space. In the present study, repeated inferences are defined as a process by which a deep generative model repeats the recognition and generation of images. It was shown that using noise-containing images as initial values, deep generative models can eliminate noise by repeating recognition and generation several times [24]. Moreover, compared to generating an output image from latent space to smoothly morph one image into another, repeating inferences several times improves the quality of the output image [3]. However, most of these studies only qualitatively evaluate output data. To fill that gap in the literature, we quantified the dynamics of repeated inferences in latent space to investigate why repeating inferences is effective for a wide range of applications. In this study, we focused on the dynamics of repeated inferences in a โ€œvariational auto-encoderโ€ (VAE) [13, 24], which is a typical type of deep generative model. First, noise-containing images are presented as initial inputs to the VAE, which denoises the images and generates clean outputs by using repeated inferences. Various factors, such as noise in real environments, cause the data to deviate from the original distribution. According to the manifold hypothesis, most data (e.g., natural images) widely used in typical applications are โ€œlikely to concentrate in the vicinity of non-linear sub-manifolds of much lower dimensionalityโ€ rather than the high dimensional space the data actually presented [25]. Therefore, it is suggested that the inference begins outside the sub-manifolds of the training data when noise was added to the initial inputs. However, little works have paid attention to how the activity patterns of neurons are drawn into the original sub-manifolds from the initial point in latent space. To understand the patterns 2 of repeated inferences, we used a dataset with clear cluster structures which could be intuitively grasped by our eyes (e.g., numeric characters). To examine how a VAE expresses the cluster structures in latent space, we utilized a mathematical notion known as the concept. First introduced in the study of associative memory models [1], the concept was referred as the centroid of multiple correlated data points (memories), and it was analytically demonstrated to spontaneously evolve to an equilibrium state [1]. This phenomenon is called concept formation. Furthermore, the dynamics of neural activity patterns has also been studied in terms of the associative memory model with multiple correlated memories [18]. It was revealed that the dynamics of neural activity patterns first approach the concept and then move toward each memory pattern [18]. In summary, there are four major findings in our study. First, consistent with these reports, we demonstrated that the dynamics of repeated inferences is drawn to a unique memory via a corresponding concept, which is the center of each cluster in the latent space. Second, by averaging all clusters in the latent space, we defined the abstract concept; now by definition, memories, concepts, and the abstract concept are hierarchically related in ascending order. We found that the inference dynamics approaches the abstract concept, to the extent that the uncertainty of input data increases due to noise. The result suggested that the model selects appropriate inference strategies in accordance with the fraction of the noise added to the input data. Third, we identified the approximate necessary number of latent variables to map all memories in the latent space. As the number of latent variable increases, the internal representations of the clusters tend to become orthogonal and it makes the dynamics of repeated inferences approaches each corresponding concept. Finally, we checked the generalization error of the VAE. The result demonstrated that the generalization performance of the model has been improved, to the extent the concept is observed to attract the dynamics of repeated inferences. 2. Method A variational auto-encoder (VAE) is a generative model consisting of two neural networks, namely, an encoder and a decoder [13, 24]. An encoder sends a mapping from data such as natural images to a latent variable space, and the decoder gives an inverse mapping. The objective function of the VAE is obtained by P finding the variational lower bound of log-likelihood i log p(x(i) ) for N training n oN data X = x(i) . In the following, parameter ฮธ that maximizes log-likelihood i=1 3 log pฮธ (x(i) ) at each data point is considered. Using latent variable z and its conditional probability distribution qฯ† (z | x(i) ) and taking the variational lower bound of the log-likelihood gives the following objective function:   h i log pฮธ (x(i) ) โ‰ฅ โˆ’DKL qฯ† (z | x(i) ) p(z) + Eqฯ† (z|x) log pฮธ (x(i) | z) = L(ฮธ, ฯ†; x(i) ). (1) (2) In the above equation, p(z) is the prior distribution of latent variable z, and DKL (qkp) is the Kullback-Leibler divergence [14] of probability distributions q and p. The first term of the objective function corresponds to the regularization, and the second term corresponds to the reconstruction error. The VAE models conditional distributions pฮธ (x(i) | z) and qฯ† (z | x(i) ) by using respective neural networks. To optimize parameters ฮธ and ฯ† by backpropagation, samples are generated by a method called reparameterization trick with encoder qฯ† (z | x(i) ). The latent variable is modeled as z = gฯ† (, x) = ยต + ฯƒ , (3) (4) to decompose z into random variable  and deterministic variables ยต and ฯƒ. Giving  as a sample from the standard Gaussian distribution eliminates the need for a complicated integral during training. If are assumed, and the h the above conditions i expected reconstruction error Eqฯ† (z|x) log pฮธ (x(i) | z) is approximated by sample average, eq. (2) can be rewritten as J L    1X 1 X (i) 2 (i) 2 2 ) + 1 + log (ฯƒ(i) ) โˆ’ (ยต ) โˆ’ (ฯƒ log pฮธ (x(i) | z(i,l) ). L(ฮธ, ฯ†; x ) ' j j j 2 j=1 L l=1 (5) The outputs of the encoder are ยต and ฯƒ. Parameter ฯ† for determining them and parameter ฮธ of the decoder were trained by the gradient ascent method to maximize eq. (5). The output of the decoder was set as the probability of the Bernoulli distribution, and the expectation of the conditional probability, namely, the second term of the objective function, was approximated by average of L samples. A separate three-layer fully-connected neural network was used for encoder qฯ† (z | x(i) ) and decoder pฮธ (x(i) | z) mentioned above. The number of units in the (i) 4 middle layer was set to 1,024, the number of samples for calculating the reconstruction error was set to L = 2, and the activation function was set as tanh. Adam [12] was used as a parameter optimization algorithm, and the learning rate was reduced in descending order: 0.0005, 0.0001, and 0.00005. The number of units of latent variable Nz was set to 100 unless otherwise noted. The Modified National Institute of Standards and Technology (MNIST) database (which consists of 28 ร— 28-pixels โ€˜0โ€™-โ€˜9โ€™ handwritten images with 60,000 training data and 10,000 test data) was used as the dataset for training. These data are considered to have cluster structures consisting of 10 types of labels, namely, โ€˜0โ€™-โ€˜9โ€™. In this study, noisy MNIST data were inferred by using the trained network according to the following procedure, and the time evolution of latent variable z(t) was obtained. First, noise was added to an image of the training dataset. Pixels with probability p were selected from 784 pixels, the image intensities of the selected pixels were swapped, and that image was set as x0 . Next, the data variable in step t = 0 was taken as x(0) = x0 . Finally, generation and recognition were repeated T times according to the following two equations, x(t + 1) = E pฮธ (x|z(t)) [x], z(t) = Eqฯ† (z|x(t)) [z], (6) (7) to obtain the time evolution of data variable x(t) and latent variable z(t). The dynamics of x(t) and z(t) were numerically analyzed as shown below. The deep learning framework Keras [6] version 2.0.2 on Theano [30] backend version 0.9.0, running on CUDA 8.0 with CuDNN v5.1 on NVIDIA Tesla K80, was used for all numerical simulations. 3. Results 3.1. Dynamics of inference trajectory: approach to a concept In our first analysis, we demonstrate that the transient dynamics of inference in latent space of the VAE is first attracted to the concept, which is the center of the memorized patterns, and then moves to each memory. The representation in the latent space of the VAE captures the cluster structures hidden behind the MINIST data, and the VAE displays corresponding clusters in its latent space (fig. A.1). The details of the expression in the latent space of the VAE are given in Appendix A. Since the cluster structure exists in the data and the latent variable of the VAE 5 reflects it, the time evolution of inference also seems to reflect the cluster structure. The center of the cluster of each numerical label, namely, ฮพฬ„num = 1 N num X Nnum i ฮพ(i) num , (8) was therefore defined as a concept, where ฮพ(i) num means the activity pattern of the latent variable for i-th training data having label num ฮพ(i) [z]. num = Eqฯ† (z|x(i) num ) (9) The definition of the concept is based on two studies on an associative memory model [1, 18]. The relationship between the time development of inference and the concept of each label (โ€˜0โ€™-โ€˜9โ€™) represented in the MNIST data is numerically analyzed in the following sections. Figure 1: Consecutive samples in data space (from left to right, one row after the other). The image of โ€˜6โ€™ with p = 0.2 noise applied was used as an initial value. The image generated by concept E pฮธ (x|ฮพฬ„6 ) [x] is shown on the right. Here, it is numerically demonstrated that the transient dynamics of the activity pattern are first attracted to the concept, which is the center of the memorized patterns, and then moves to each memory. Figure 1 expresses the consecutive samples in data space. The time development of the activity pattern in data space x(t) is aligned from left to right, one row after the other. The upper left image corresponds to the initial value, x0 . The image of โ€˜6โ€™ with p = 0.2 noise applied was used as an initial value. The image generated by the concept, E pฮธ (x|ฮพฬ„6 ) [x], is shown on the right. From the figure, the VAE removes the noise contained in the image in the first few steps, and then it gradually shifts to the specific image of โ€˜6โ€™. It is qualitatively suggested that the result of the VAE inference approaches the concept of โ€˜6โ€™ once. The gradual changes of output images in the data space were quantitatively evaluated in the latent space. The time evolution of the Euclidean distance, namely, 6 15.1 18.6 16.1 1 15.8 2 17.5 3 4 Distance ||z(t) num||2 0 6.7 0 17.5 8.2 80 0 16.7 5 0 5.4 80 7.1 80 0 80 17.1 6 0 10.2 80 6.9 0 15.7 7 0 7.2 80 7.4 80 0 16.6 8 0 8.4 80 6.3 80 9 0 80 Step Figure 2: Time development of the distance from concepts ฮพฬ„num for all labels of the MNIST data. Shades represent ยฑ1 standard error of the mean (300 trials). All figures were generated with noise fraction p = 0.2. z(t) โˆ’ ฮพฬ„num 2 , (10) between neural activity patterns and concepts for every label of MNIST data (fig. 2) in the latent space was evaluated. The distance between the concept and 300 different initial images was calculated. Each figure corresponds to each label, which is used as the initial input for the VAE. The x-axis expresses the time step t of repeated inference, and the y-axis expresses the Euclidean distance (eq. (10)). It was clarified that the trajectory of the VAEโ€™s inference first rapidly approaches the concept, and then moves away from it. This result is qualitatively consistent with all other labels of MINIST data. The VAE makes the latent space in which the activity patterns are orthogonal in relation to another cluster and correlated with the same cluster in a lowdimensional space. The relationships between concepts of each label are shown in fig. 3. The activity patterns in the latent variable space of each numerical concept are shown in fig. 3a. The heat map expresses the activity pattern of each neuron, which corresponds to the latent variable, where the x-axis represents the neuronโ€™s index, and the y-axis represents the label. Only a few neurons out of 100 contribute to information representation, and many neurons are pruned and not active. According to our observation, 14 out of 100 neurons were active. The dimensions of the latent space were examined by using the cumulative contribution ratio determined by the principal component analysis. The cumulative contribution ratio of each principal component when the training images are given to the VAE is shown in fig. 3b. The variance of the latent space was explained entirely 7 (c) 10 20 30 40 50 z index 60 70 80 0 0.8 0.8 2 0.4 0.6 4 0.0 0.4 6 Input label 0 1.0 0.2 90 0.4 8 9 8 7 6 5 4 3 2 1 0 1.0 0.5 0.0 0.5 1.0 Cumulative ratio (b) (a) 0 10 20 Components 30 0.8 0 2 4 6 8 Figure 3: (a) Activity pattern in the latent variable space of each concept. The x-axis represents the neuron index of the latent variable, the y-axis represents the label, and the heat map shows the activity pattern of each neuron. (b) Cumulative contribution ratio of principal components. (c) Cosine similarity between activity patterns of each label. by 14 dimensions, and 70% of that was explained by nine dimensions. To examine the relationships between concepts, the cosine similarity between the activity patterns of each concept i and j (fig. 3c) was obtained as Ci j = ฮพฬ„i ยท ฮพฬ„ j ฮพฬ„i 2 ฮพฬ„ j . (11) 2 By definition, the cosine similarity between concepts of the same label (shown in diagonal terms in the figure) is 1. On the other hand, the cosine similarity between concepts of different labels in non-diagonal terms is minimal, namely, near zero. The figure shows that the concepts of each label are orthogonal in the latent space. It is suggested that the activity patterns corresponding to different training data of the same label are correlated and those of the different label are orthogonal to each other in the latent space of the VAE. 3.2. Relationship between data hierarchy and inference Previously, we arbitrarily determined the amount of noise added to the initial input images. In our second analysis, to examine the effect of noise on the dynamics of repeated interferences, we modulated the amount of noise. Since noise in input images causes the data to deviate from the original distribution, we created another class, the abstract concept, which averaged all the labelsโ€™ concepts, in addition to concept and memory. By respectively measuring the distance between the trajectory of each neural activity pattern and its corresponding classes in the 8 latent space, which one of these classes attracts respective neural activity patterns the most is identified. The abstract concept is defined as ฮพฬ„all = 9 1 X ฮพฬ„ . 10 num=0 num (12) The three classes (memories, concepts, and the abstract concept) are in a hierarchical relationship (from detailed to coarse information) in the order ฮพ(i) num , ฮพฬ„ num , and ฮพฬ„all . We calculated the minimum distances between respective neural activity patterns z(t) and corresponding classes, min kz(t) โˆ’ ฮพk2 . (13) t Figure 4 shows those minimum distances according to the noise fraction. In the figure, the x-axis represents noise fraction p, which is the probability that the image intensities of the pixels are swapped. For every noise fraction, the minimum distances between firing pattern z(t) and hierarchical concepts were calculated by changing the initial image 500 times. The dots in the figure express the mean of the minimum distance, and the bars are ยฑ1 standard error of the mean (500 trials). Parameter regions are divided into three stages, I, II, and III, which correspond to the minimum distance between firing pattern z(t) and hierarchical concepts, ฮพ6(i) , II III mint  z(t) โˆ’ ฮพ  2 I ฮพฬ„all ฮพฬ„6 ฮพ6(i) Noise fraction p Figure 4: Minimum distances from concepts according to noise fraction p. 9 ฮพฬ„6 , and ฮพฬ„all , respectively. In stage I, the firing activity is closest to original pattern ฮพ(i) 6 with a small amount of noise. Interestingly, the closest concept was ฮพฬ„ 6 with moderate noise in stage II. And the activity came close to concept ฮพฬ„all in stage III. In stages I and II, the memory was successfully retrieved because the inference path is close to the cluster to which the input data belongs; however, in stage III, the model could not determine the original cluster, so the recall failed. We discovered that when a noisy environment makes recognizing objects difficult, the neural activity pattern wanders around the center of all memories. Accordingly, the model achieves the inference dynamics depending on the input uncertainty. Non-numeric space ฮพฬ„all Num eric spa Concept ฮพฬ„ 6 ce ฮพ6(i) Figure 5: Schematic diagram of firing patterns in latent state space As shown in section 3.1 and above, the VAE extracts the cluster structures inherent in MNIST data and infers images through the center of each cluster. The dynamics of this inference is shown as a schematic diagram in fig. 5. It is considered that adding noise to an image corresponds to moving the initial value in a direction orthogonal to the original data space. Results from our first analysis suggest that when the inference starts from the position orthogonal to the space expressing the MNIST data, the activity patterns first approach the corresponding concepts at high speed and then transitions to the corresponding memories. Approaching a concept in repeated inferences indicates that the concept formation 10 occurs in the latent space of the VAE. In neuroscience, the activities in the visual cortex of a macaque monkey [29, 5] and the human brain measured by MEG [17] have been reported to process global information before detailed information. The previous studies on associative memory models explain these behaviors by spontaneous stabilization of the concept and its effect on memory retrieval [1, 18]. The VAE also recalled the concept before each memory pattern in the inference phase. Our results in the VAE are consistent with these findings in studies on the associative memory models, and the cerebral cortex. 3.3. Effect of Model Architecture on Internal Representations In our third analysis, the mechanism by which the trajectory of VAEโ€™s inference approaches the concept is clarified as follows. First, the following question must be answered: How does the tree-like memory structure mentioned above affect the time evolution of inference? In other words, how such a memory structure is changed by controlling a hyperparameter of the VAE was verified, and the trajectory of inference in the five circumstances was examined respectively (fig. 6). The time evolution of distance from the concept of โ€˜6โ€™ with different model hyperparameters are compared in figs. 6a to 6e. The number of neurons in latent variable Nz was controlled in the order 2, 5, 10, 20, and 100. Under the condition 2 4 6 8 2 4 6 8 6 |2 6 |2 0.8 2 4 6 8 |z 80 0 0.8 0 0.8 0.4 2 0.4 0.0 4 (j) 0.0 0.4 6 0.4 Step 0 2 0.0 2.3 4 0 0.4 0 80 0.8 8 0.8 Step 0 6 0.4 0.8 2 4 0.0 1.9 (i) 4 0 2 0.4 0 80 6 0.8 0.8 6 0.4 Step 0 (h) 8 0 2 4 0.0 6 0.4 8 0.8 1.9 8 80 4.0 |z 6 |2 Step 0 (g) (f) 0 1 Nz = 100 (e) 3.3 |z 6 |2 80 Nz = 20 (d) 3.3 |z 6 |2 Step 0 Nz = 10 (c) 3 |z 0 Nz = 5 (b) 1 8 Nz = 2 (a) 0 2 4 6 8 0.4 0.8 0 2 4 6 8 Figure 6: (a-e): Time development of distance with the concept of โ€˜6โ€™. The number of elements of the latent variable is written as Nz . (f-j): Cosine similarity between memory patterns of each concept in the corresponding model of (a-e). 11 Nz = 10, 20, 100, the trajectory approached the concept of โ€˜6โ€™ once, whereas under condition of Nz = 2, 5, it did not approach the concept. Also, between Nz = 5 and Nz = 10, the trajectory gradually approached its corresponding concept from Nz = 6 (the figure is omitted). The cosine similarity (eq. (11)) between the concepts of each label in the above parameters is shown in figs. 6f to 6j. For Nz = 100, the similarity of the off-diagonal term is approximately zero. On the other hand, as the number of the latent variables decreases, the orthogonality of each concept decays. These results in our third analysis suggest that orthogonality between concepts is necessary for the trajectory of inference to be drawn into the concept. Since the number of latent variables decreases, it is necessary to express data in fewer dimensions, and the orthogonality between concepts is lost. The reduction in the number of latent variables is considered to cause instability of the memory patterns corresponding to each training data, and stabilize only the concepts. As a result, the trajectory of inference goes straight to a stable point. We also numerically assessed whether other labels confused the repeated inferences in the VAE (e.g., although an inference starts from the label โ€˜1โ€™, it is incorrectly attracted to the concept associated with the label โ€˜7โ€™). The result of this assessment is shown in Appendix B. 3.4. Engineering significance of concept in the latent representation In our fourth analysis, the engineering significance of the attraction to the concept is explained as follows. Figure 7 is the generalization performance of the model according to Nz . The performance of the model was evaluated using the variational lower bound (eq. (2)) of the log-likelihood for the test MNIST data. In each Nz , parameters that minimize the generalization error at epoch 100 with a total of nine conditions were selected from learning rates of 0.01, 0.001, and 0.0001 and mini-batch size of 50, 100, and 200. The generalization error was the minimum value in the vicinity of Nz = 14, and it did not change significantly after that. Fourteen of 100 latent variable neurons express training data under condition Nz = 100 (fig. 3a), and the number of neurons that minimize the generalization error was consistent with this result. These results suggest that about 14 latent neurons are required to express MNIST data in the network structure used in this study. Moreover, in the vicinity of Nz = 14, the cluster structure appears in the representation of the latent variable space, and the trajectory of an inference is drawn into the concept. These results suggest that it is possible to judge the generalization performance of the model without computing generalization error or 12 Validation loss 150 140 130 120 110 0 20 40 Nz 60 80 100 Figure 7: Generalization error for the number of elements of latent variables Nz . The y-axis represents the variational lower bound of the log-likelihood for test data. orthogonality of the internal representations by simply observing the dynamics of repeated inference. 4. Conclusion & Future Work It was found that a VAE extracts the cluster structures inherent in MNIST and infers images via the center of each cluster. Our results in first analysis suggest that when the inference starts from a point far away from the original data distribution, the repeated inferences first approach the concept at high speed and then slowly move toward each memory pattern. The learning and inference of multiple memory patterns has been widely studied by using associative memory models [9, 2, 22]. In an associative memory model with embedded multiple correlated patterns, the centroid of those correlated patterns spontaneously evolves to a fixed point [1], and the time evolution of activity patterns approaches the concept [18]. The results of our first and second analyses are qualitatively consistent with these findings, suggesting that the mechanism underlying dynamics of repeated inferences in the VAE is related to the traditional associative memory model. Originally, Matsumoto et al. proposed a model to explain the dynamics of the neural activities in macaque monkeyโ€™s visual cortex studied by Sugase et al. [29]. Although the VAE investigated in this study, the model proposed by Matsumoto et al., and the experiment conducted by Sugase et al. have different architectures by nature, our results infer that they share the universal working principle 13 at the abstract level. The behavior of the repeated inferences in the VAE was qualitatively consistent with the time evolution of firing patterns observed in neuroscience literature [29, 17, 5]. In our current study, we used a VAE to study a simple hierarchical deep generative model. Taking account that the VAE exhibits patterns similar to biological activities, our future work will further examine the dynamics of repeated inferences introducing biologically plausible mechanisms such as short-term plasticity [11, 19], common noise [10], and spontaneous firing based on log-normal weight [20]. This future investigation will be useful both for neuroscience and engineering applications. Previously, several studies demonstrated that repeated inferences successfully denoise [24] and improve the quality of inferred images [3]. Our study suggests that the dynamics of repeated inferences approaching the center of the cluster inherent in the data leads to denoising and improving the quality of output images, which were quantitatively observed in data space. It is critical to take a sufficient number of the latent variables to precisely represent the concept inherent in the data; if the number of the latent variables is not sufficient, the cluster structures will not be realized in the latent space, so the concept will be hardly identified. Our results suggest that stage II in fig. 4 appears only when the number of latent variables is sufficiently large, and the number of latent variables qualitatively changes the dynamics of repeated inferences. In this study, we introduced hierarchical concepts ฮพ(i) num , ฮพฬ„ num , and ฮพฬ„ all , which reflect a hierarchical structure of the MNIST dataset. Previous works have discussed the relationship between the hierarchy of data and deep neural networks. For example, deep neural networks are claimed to express abstract information in deeper layers [15, 4]. In particular, Bengio et al. stated that deep layers speed up the mixing of Markov chains by using their ability to manifest abstract information. On the other hand, Saxe et al. analytically showed that deep neural networks learn the data in order from large to small modes, and the internal representations branch accordingly [27]. These hypotheses and previous studies pointed out that the representations and the learning dynamics of deep neural networks reflect the dataโ€™s hierarchy. Our study suggests that the inference process of the deep generative model is also related to the hierarchy of the data. Recently, researchers are actively working on models that can capture features inherent in data as forms of internal representations [8, 31, 21]. The VAE used in this study embeds the data points in a simple isomorphic Gaussian distribution. As a next step to expand on these works, using other deep generative models, we aim to further investigate what factors influence the behavior of repeated inferences approaching the concept. Likewise, we will analyze the dynamics of the repeated 14 inferences in another model, in which we used training datasets with more and various hierarchies. Acknowledgements This work was supported by a Grant-in-Aid for JSPS Fellows (grant number: 17J08559) and a Grant-in-Aid for Research Activity Start-up (grant number: 17H07390) from the Japan Society for the Promotion of Science (JSPS). Appendix A. PCA embedding of the latent representations Here, we show that the VAE can extract the cluster structure hidden behind data. Activity patterns of the latent variable using principal component analysis (PCA) are shown in fig. A.1. The results of principal component analysis using all of the data are shown in fig. A.1a, and the result of using only three labels is shown in fig. A.1b. The color of each point represents the label of the data. MNIST is considered to have a cluster structure consisting of 10 types of labels, i.e., โ€˜0โ€™-โ€˜9โ€™. The figures show that latent variables of VAE can extract this cluster structure. (a) (b) Figure A.1: (a) Two-dimensional PCA embedding of the representations in the latent variable space. The color of each point represents the label of the data. (b) PCA embedding with only data corresponding to three labels. 15 Appendix B. Verifying the effect of moving to other numbers The possibility that other labels confused the repeated inferences in the VAE was numerically tested. It was showed that the trajectory of inference approaches the concept by the orthogonality of the representation in the latent space. On the other hand, it is also conceivable that the escape from the concept is caused by the attraction of another cluster. To eliminate this possibility, a discriminative neural network was constructed separately from the VAE, and the final state of inference of the VAE was classified. In the following analysis, a model having a structure of Input-ConvolutionConvolution-Pooling-Dropout1-FullyConnected-Dropout2-SoftMax was constructed as the discriminative neural network. Kernel size of the convolution was set to three, the size of the pooling was to two, and the probability of dropout was set to 0.25, 0.5 in order from the input side. ReLU was used as the activation function. This model recorded a discrimination ability of 99.25% against test data included in the MNIST dataset. The result of classifying the final state of inference using the above-mentioned discriminative neural network is shown in fig. B.2a. The x-axis represents a trial of each inference with various initial images, and the y-axis represents the number label. The heat map indicates the classification probability for each number label. (b) 1.0 9 8 7 6 5 4 3 2 1 0 0 100 Trials 200 300 Only 6 All 3.5 0.6 6 |2 0.4 |z 0.8 0.2 2.0 Prob. Number (a) 0.0 0 Step 80 Figure B.2: (a) The result of classification of the final state T = 80 of the inference for the image of โ€˜6โ€™. (b) The time evolution of the distance from the concept of โ€˜6โ€™. The condition excluding trials that the activity pattern switched to different numbers is expressed in red, and condition containing all trials is expressed in gray. 16 An image of โ€˜6โ€™ was used as the initial value of the inference. The discriminator classified the final state of 193 trials out of 300 trials as โ€˜6โ€™. We consider the effect of other labels as the cause of the neural activity patterns approaching mismatched concepts. Taking an example of the label โ€˜6โ€™, we first measured the distances between each neural activity pattern and the concept of โ€˜6โ€™ in two conditions. We included only neural activity patterns reminded inside the cluster of โ€˜6โ€™ in one condition, and all neural activity patterns in the latent space in the other. Then, we averaged these distances in each condition and compared their means. The average trajectories are compared in fig. B.2b. Red shows the average of only the trial with the final state identified as โ€˜6โ€™, and gray shows the average of all trials. As shown in the figure above, the neural activity patterns in both conditions approached to the concept before moving to the corresponding memories. This result suggests that the presence of other labels doesnโ€™t cause the neural activity patterns to move away from the concept. References [1] Amari, S. (1977). Neural theory of association and concept-formation. Biological Cybernetics, 26, 175โ€“185. [2] Amit, D. J., Gutfreund, H., & Sompolinsky, H. (1985). Spin-glass models of neural networks. Physical Review A, 32, 1007. [3] Arulkumaran, K., Creswell, A., & Bharath, A. A. (2016). Improving sampling from generative autoencoders with markov chains. arXiv preprint arXiv:1610.09296, . [4] Bengio, Y., Mesnil, G., Dauphin, Y., & Rifai, S. (2013). Better mixing via deep representations. In Proceedings of the 30th International Conference on Machine Learning (pp. 552โ€“560). [5] Brincat, S. L., & Connor, C. E. (2006). Dynamic shape synthesis in posterior inferotemporal cortex. Neuron, 49, 17โ€“24. [6] Chollet, F. et al. (2015). Keras. https://github.com/fchollet/keras. [7] Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2014). Generative adversarial nets. In Advances in Neural Information Processing Systems 27 (pp. 2672โ€“2680). 17 [8] Higgins, I., Matthey, L., Pal, A., Burgess, C., Glorot, X., Botvinick, M., Mohamed, S., & Lerchner, A. (2017). ฮฒ-vae: Learning basic visual concepts with a constrained variational framework. In Proceedings of the 6th International Conference on Learning Representations. [9] Hopfield, J. J. (1982). Neural networks and physical systems with emergent collective computational abilities. Proceedings of the National Academy of Sciences, 79, 2554โ€“2558. [10] Karakida, R., Igarashi, Y., Nagata, K., & Okada, M. (2013). Inter-layer correlation in a feed-forward network with intra-layer common noise. Journal of the Physical Society of Japan, 82, 064007. [11] Katori, Y., Otsubo, Y., Okada, M., & Aihara, K. (2013). Stability analysis of associative memory network composed of stochastic neurons and dynamic synapses. Frontiers in Computational Neuroscience, 7. [12] Kingma, D., & Ba, J. (2014). Adam: A method for stochastic optimization. In Proceedings of the 3rd International Conference on Learning Representations. [13] Kingma, D. P., & Welling, M. (2013). Auto-encoding variational bayes. In Proceedings of the 2nd International Conference on Learning Representations. [14] Kullback, S., & Leibler, R. A. (1951). On information and sufficiency. The Annals of Mathematical Statistics, 22, 79โ€“86. [15] Lee, H., Grosse, R., Ranganath, R., & Ng, A. Y. (2009). Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations. In Proceedings of the 26th Annual International Conference on Machine Learning (pp. 609โ€“616). [16] Li, J., Monroe, W., Shi, T., Ritter, A., & Jurafsky, D. (2017). Adversarial learning for neural dialogue generation. In The 2017 Conference on Empirical Methods on Natural Language Processing.. [17] Liu, J., Harris, A., & Kanwisher, N. (2002). Stages of processing in face perception: an meg study. Nature Neuroscience, 5, 910โ€“916. 18 [18] Matsumoto, N., Okada, M., Sugase-Miyamoto, Y., & Yamane, S. (2005). Neuronal mechanisms encoding global-to-fine information in inferiortemporal cortex. Journal of Computational Neuroscience, 18, 85โ€“103. [19] Murata, S., Otsubo, Y., Nagata, K., & Okada, M. (2014). Oscillations in spurious states of the associative memory model with synaptic depression. Journal of the Physical Society of Japan, 83, 124004. [20] Nagano, Y., Karakida, R., Watanabe, N., Aoyama, A., & Okada, M. (2016). Input response of neural network model with lognormally distributed synaptic weights. Journal of the Physical Society of Japan, 85, 074001. [21] Nickel, M., & Kiela, D. (2017). Poincareฬ embeddings for learning hierarchical representations. In Advances in Neural Information Processing Systems 30. [22] Okada, M. (1996). Notions of associative memory and sparse coding. Neural Networks, 9, 1429โ€“1458. [23] Radford, A., Metz, L., & Chintala, S. (2015). Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, . [24] Rezende, D. J., Mohamed, S., & Wierstra, D. (2014). Stochastic backpropagation and approximate inference in deep generative models. arXiv preprint arXiv:1401.4082, . [25] Rifai, S., Dauphin, Y. N., Vincent, P., Bengio, Y., & Muller, X. (2011). The manifold tangent classifier. In Advances in Neural Information Processing Systems 24 (pp. 2294โ€“2302). [26] Saito, M., Matsumoto, E., & Saito, S. (2017). Temporal generative adversarial nets with singular value clipping. In 2017 IEEE International Conference on Computer Vision. [27] Saxe, A. M., McClelland, J. L., & Ganguli, S. (2014). Exact solutions to the nonlinear dynamics of learning in deep linear neural networks. In Proceedings of the 3nd International Conference on Learning Representations. [28] Serban, I. V., Sordoni, A., Lowe, R., Charlin, L., Pineau, J., Courville, A. C., & Bengio, Y. (2017). A hierarchical latent variable encoder-decoder model for generating dialogues. In AAAI (pp. 3295โ€“3301). 19 [29] Sugase, Y., Yamane, S., Ueno, S., & Kawano, K. (1999). Global and fine information coded by single neurons in the temporal visual cortex. Nature, 400, 869. [30] Theano Development Team (2016). Theano: A Python framework for fast computation of mathematical expressions. arXiv e-prints, abs/1605.02688. URL: http://arxiv.org/abs/1605.02688. [31] Tomczak, J. M., & Welling, M. (2017). VAE with a VampPrior. arXiv preprint arXiv:1705.07120, . [32] Vondrick, C., Pirsiavash, H., & Torralba, A. (2016). Generating videos with scene dynamics. In Advances In Neural Information Processing Systems 29 (pp. 613โ€“621). [33] Walker, J., Doersch, C., Gupta, A., & Hebert, M. (2016). An uncertain future: Forecasting from static images using variational autoencoders. In The 14th European Conference on Computer Vision (pp. 835โ€“851). [34] Yu, L., Zhang, W., Wang, J., & Yu, Y. (2017). Seqgan: Sequence generative adversarial nets with policy gradient. In AAAI (pp. 2852โ€“2858). 20
9cs.NE
Optimal choice among a class of nonparametric estimators of the jump rate for piecewise-deterministic Markov processes arXiv:1506.07722v2 [math.ST] 23 May 2016 Romain Azaฤฑฬˆsโˆ— and Aureฬlie Muller-Gueudinโ€  Inria Nancy-Grand Est, Team BIGS, Institut Eฬlie Cartan de Lorraine, Vandoeuvre-leฬ€s-Nancy, France Abstract A piecewise-deterministic Markov process is a stochastic process whose behavior is governed by an ordinary differential equation punctuated by random jumps occurring at random times. We focus on the nonparametric estimation problem of the jump rate for such a stochastic model observed within a long time interval under an ergodicity condition. We introduce an uncountable class (indexed by the deterministic flow) of recursive kernel estimates of the jump rate and we establish their strong pointwise consistency as well as their asymptotic normality. We propose to choose among this class the estimator with the minimal variance, which is unfortunately unknown and thus remains to be estimated. We also discuss the choice of the bandwidth parameters by cross-validation methods. Keywords: Cross-validation ยท Jump rate ยท Kernel method ยท Nonparametric estimation ยท Piecewisedeterministic Markov process Mathematics Subject Classification (2010): 62M05 ยท 62G20 ยท 60J25 Contents 1 Introduction 2 2 Problem formulation 2.1 Definition and notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4 6 3 Estimation procedure 3.1 Inference for the inter-jumping times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Optimal estimation of the jump rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 How to choose bandwidth parameters ฮฑ and ฮฒ? . . . . . . . . . . . . . . . . . . . . . . . . 7 7 9 11 4 Simulation study 4.1 Estimation algorithm . . . 4.2 TCP-like process . . . . . 4.3 Bacterial motility . . . . . 4.4 Fatigue crack propagation 13 13 14 15 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A Ergodicity and invariant measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 B Proof of Theorem 3.3 19 B.1 Sketch of the proof . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 B.2 Remainder term . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 B.3 Martingale term . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 C Proof of Proposition 3.14 โˆ— Electronic โ€  Electronic 26 address: [email protected]; Corresponding author address: [email protected] 1 1 Introduction Piecewise-deterministic Markov processes (PDMPโ€™s in abbreviated form) have been introduced in the literature by Davis in [17] as a general class of continuous-time non-diffusion stochastic models, suitable for modeling deterministic phenomena in which the randomness appears as point events. The motion of a PDMP may be defined from three local characteristics: the flow ฮฆ(x, t), the jump rate ฮป(x) and the transition measure Q(x, dy). Starting from some initial value X0 , the process evolves in a deterministic way following ฮฆ(X0 , t) until the first jump time T1 which occurs either when the flow reaches the boundary of the state space or before, in a Poisson-like fashion with non homogenous rate ฮป(ฮฆ(X0 , t)). In both cases, the post-jump location of the process at time T1 is governed by the transition distribution Q(ฮฆ(X0 , T1 ), dy) and the motion restarts from this new point as before. This family of stochastic models is well-adapted for tackling various problems arising for example in biology [9, 16, 30, 31, 32, 33, 34], in neuroscience [22] or in reliability [7, 14, 13, 18]. Indeed, most of applications involving both deterministic motion and punctual random events may be modeled by a PDMP. Typical examples are growth-fragmentation models composed of deterministic growths followed by random losses. For example [33], the size of a cell grows exponentially in time, next the cell divides into two offsprings whose size is about half size of the parent cell, and so on. Proposing efficient statistical methods for this class of stochastic models is therefore of a great interest. Nevertheless, the very particular framework involving both deterministic motion and punctual random jumps imposes to consider specific methods. For instance, the authors of [5] have shown that the wellknown multiplicative intensity model developed by Aalen [1] for estimating the jump rate function does not directly apply to PDMPโ€™s. Alternative approaches should be thus proposed. In the present paper, we focus on the recursive nonparametric estimation of the jump rate of a PDMP from the observation of only one trajectory within a long time interval. More precisely, the purpose of this work is to show how one may obtain by kernel methods a class of consistent estimators for the jump rate, and how one may choose among this class in an optimal way. To the best of our knowledge, the nonparametric estimation of the jump rate in a general framework has never been investigated. As PDMPโ€™s may model a large variety of problems, some methods have been developed by many authors for their statistical inference. As presented before, the randomness of a PDMP is governed by two characteristics: the transition kernel Q(x, dy) and the jump rate ฮป(x). As a consequence, two main questions arise in the estimation problem for such a process, namely the statistical inference for both these features. On the one hand, a few papers investigate some nonparametric methods for estimating the transition function of a PDMP either for a specific model [13] or in a more general setting for a d-dimensional process [3]. On the other hand the estimation of the jump rate ฮป(x) or of the associated density function has been more extensively studied by several authors. Without attempting to give an exhaustive survey of the literature on this topic, one may refer the reader to [5, 19, 20, 25, 28] and the references therein. In the book [25], the author studies likelihood processes for observation of PDMPโ€™s which could lead to inference methods in a parametric or semi-parametric setting. The papers [19, 20] deal with the nonparametric estimation for some PDMPโ€™s used in the modeling of a size-structured population observed along a lineage tree. In both these articles, the authors rely on the specific form of the features of the process of interest in order to derive the asymptotic behavior of their estimation procedure. These techniques have been generalized in [28] to introduce a nonparametric method for estimating the jump rate in a specific class of one-dimensional PDMPโ€™s with monotonic motion and deterministic breaks, that is to say when the transition measure Q(x, dy) is a Dirac mass at some location depending on x. The procedures developed in these papers [19, 20, 28] are obviously of a great interest but strongly use the particular framework involved in the investigated models and are thus not well adapted in a more general setting. In [5], the authors show that the famous multiplicative intensity model only applies for estimating the jump rate of a modified version of the underlying PDMP. This leads to a statistical method for approximating the conditional density associated with the jump rate for a process defined on a bounded metric state space. A main difficulty throughout the present paper and the articles [3, 5] is related to the presence of deterministic jumps when the path reaches the boundary of the state space. This feature is often used for modeling a deterministic switching when the quantitative variable rises over a certain threshold [2, 24]. In a statistical point of view, the interarrival times are therefore right-censored by a deterministic clock depending on the state space, which leads to some technical difficulties. We would like to emphasize that the techniques developed in the references [19, 20, 25, 28] do not take into account the likely presence of 2 forced jumps in the dynamic. One may also find in the literature a few papers [6, 8, 10, 11] which focus on the estimation of various functionals for this family of stochastic models. More precisely, the authors of [10, 11] provide numerical methods for the expectations and for the exit times of PDMPโ€™s. In addition, the article [8] deals with a PDMP introduced for modeling the temporal evolution of exposure to a food contaminant and consider a simulation-based statistical inference procedure for estimating some functionals such as first passage times. Plug-in methods have been studied in [6] for a non-ergodic growth-fragmentation model which is absorbed under a certain threshold. In many aspects our approach and these papers are different and complementary. Indeed they are devoted to the estimation of some functionals of PDMPโ€™s while we focus on the direct estimation of the primitive data of such a process. In this article, we introduce a three-dimensional kernel estimator computed from the observation of the embedded Markov chain of a PDMP composed of the post-jump locations Zn and the travel times Sn+1 along the path ฮฆ(Zn , t). We establish its pointwise consistency as well as its asymptotic normality in Theorem 3.3. The estimate that we consider is recursive: it may be computed in real-time from sequential data, which may be relevant in many applications. We deduce from this result two first corollaries about the nonparametric estimation of the conditional density f (x, t) of the interarrival time Sn+1 at time t conditionally on the event {Zn = x} (see Corollary 3.8) and its survival function G(x, t) = P(Sn+1 > t | Zn = x) (see Corollary 3.9). We also investigate in Corollary 3.10 the asymptotic behavior of an estimator for the composed function ฮป โ—ฆ ฮฆ(x, t) obtained as the ratio f (x, t)/G(x, t). We derive in (18) an uncountable class (indexed by the states ฮพ hitted by the reverse flow ฮฆ(x, โˆ’t) for some time t) of consistent estimates of the jump rate ฮป(x). In other words, for each ฮพ = ฮฆ(x, โˆ’t), we get a good estimate of ฮป(x). We show how one may choose among this class of estimators by minimizing their asymptotic variance. We state in (19) that this procedure is equivalent to maximize the criterion ฮฝโˆž (ฮพ)G(ฮพ, ฯ„x (ฮพ)) along the curve ฮฆ(x, โˆ’t), i.e. ฮพ = ฮฆ(x, โˆ’ฯ„x (ฮพ)), where ฮฝโˆž (ฮพ) denotes the invariant measure of the post-jump locations Zn and ฯ„x (ฮพ) is the only deterministic time to reach x following ฮฆ(ฮพ, t). The choice of this criterion is far to be obvious without precisely computing the limit variance in the central limit theorem presented in Corollary 3.10. Indeed, a naive criterion to maximize is the invariant distribution ฮฝโˆž (ฮพ) along ฮฆ(x, โˆ’t): the larger ฮฝโˆž (ฮพ) is, the larger the number of data around ฮพ is and the higher the quality of the estimation should be. Nonetheless, this simple criterion does not take into account that the estimate also depends on the time of interest ฯ„x (ฮพ) (see Remark 3.11). This question is also investigated from a numerical point of view in Subsection 4.2 where we show on synthetic data that the choice of the criterion ฮฝโˆž (ฮพ)G(ฮพ, ฯ„x (ฮพ)) is better than the naive one ฮฝโˆž (ฮพ). The bandwidths in kernel methods are free parameters that exhibit a strong influence on the quality of the estimation. We discuss the choice of the bandwidth parameters by a classic procedure that consists in minimizing the Integrated Square Error, computed here along the reverse flow ฮฆ(x, โˆ’t): we introduce a cross-validation procedure in this Markov setting and we prove its convergence in Propositions 3.14 and 3.15. Finally, we would like to highlight that the regularity conditions that we impose are non restrictive. In particular, neither the deterministic exit time from the state space is assumed to be a bounded function, nor the transition kernel is supposed to be lower-bounded, as is the case in [5] (see eq. (2) and Assumptions 2.4). In addition, the forms of the transition measure and of the deterministic flow are not specified. The sequel of the paper is organized as follows. We begin in Section 2 with the precise formulation of our framework (see Subsection 2.1) and the main assumptions that we need in this article (see Subsection 2.2). Section 3 is devoted to the presentation of the statistical procedure and the related results of convergence. More precisely, a three-dimensional kernel estimator for the inter-jumping times is introduced and investigated in Subsection 3.1. We derive a class of estimators of the jump rate and propose how to choose among it in Subsection 3.2. The crucial choice of the bandwidth parameters is studied in Subsection 3.3. Finally, a self-contained presentation of the whole estimation procedure is provided in Subsection 4.1, then illustrated in the sequel of Section 4 on three different application scenarios, with various sample sizes and state space dimensions, involving both simulated and real datasets. More precisely, we focus on the TCP window size process used for modeling data transmission over the Internet in Subsection 4.2. Estimation of bacterial motility is tackled in Subsection 4.3, while acceleration of fatigue crack propagation is considered in Subsection 4.4. The proofs and the technicalities are postponed in Appendix A, B and C at the end of the paper. 3 2 Problem formulation This section is devoted to the definition of the PDMPโ€™s and to the presentation of the main assumptions that we impose in the paper. List of notations: In this paper B(Rd ) denotes the Borel algebra of Rd endowed with the Euclidean norm | ยท |. In addition, the Lebesgue measure on B(Rd ) is denoted by ฮปd (dx), with the particular notation in the one-dimensional case ฮป1 (dx) = dx. The ball of Rd with radius r and center x is denoted by Bd (x, r). The closure of a set E is denoted by E while โˆ‚E stands for its boundary. 2.1 Definition and notation The motion of a PDMP may be described as the solution of an ordinary differential equation ฮฆ punctuated at random times by random jumps governed by a transition kernel Q (see Figure 1). The random jumps occur either when the deterministic motion hits the boundary of its state space, or before, with non homogeneous rate ฮป taken along the curve defined by the differential equation ฮฆ. Figure 1: Schematic path of a PDMP. This paper is devoted to the nonparametric estimation of the statedependent rate ฮป, that governs the spontaneous generation of jumps, from a long-time trajectory. More precisely, a PDMP (Xt )tโ‰ฅ0 on (Rd , B(Rd )) is defined from its three local characteristics (ฮป, Q, ฮฆ): โ€ข ฮฆ : Rd ร— R โ†’ Rd is the deterministic flow. It satisfies the semigroup property, โˆ€ x โˆˆ Rd , โˆ€ t, s โˆˆ R, ฮฆ(x, t + s) = ฮฆ(ฮฆ(x, t), s). โ€ข ฮป : Rd โ†’ R+ is the jump rate. โ€ข Q : (Rd , B(Rd )) โ†’ [0, 1] is the transition kernel. We define the deterministic exit times of E for the flow and for the reverse flow as, for any x โˆˆ E, t+ (x) = inf {t > 0 : ฮฆ(x, t) โˆˆ โˆ‚E} and tโˆ’ (x) = inf {t > 0 : ฮฆ(x, โˆ’t) โˆˆ โˆ‚E} . (1) In all the sequel, we consider a PDMP (Xt )tโ‰ฅ0 evolving on an open subset E of Rd . In this context, we impose as usual [17, (24.8) Standard conditions] that, Z ฮต โˆ€ x โˆˆ E, โˆƒ ฮต > 0, ฮป(ฮฆ(x, t)) dt < +โˆž, 0 and โˆ€ x โˆˆ E, Q(x, E \ {x}) = 1. (2) In addition, we restrict ourselves to the case where the transition kernel Q admits a density with respect to the Lebesgue measure, Z โˆ€ x โˆˆ Rd , โˆ€ A โˆˆ B(Rd ), Q(x, A) = Q(x, y) ฮปd (dy). (3) A This assumption is natural when one considers multivariate real-valued PDMPโ€™s, and is satisfied in various problems arising in biology [9], population dynamics [6] or in insurance [17, (21.11) An insurance model]. 4 Starting from any initial condition X0 = x, the motion of (Xt )tโ‰ฅ0 may be described as follows. The distribution of the first jump time T1 is given by,  R  ( t exp โˆ’ 0 ฮป(ฮฆ(x, s)) ds if t < t+ (x), โˆ€ t โ‰ฅ 0, P(T1 > t | X0 = x) = (4) 0 else. In other words, the process jumps either when the flow hits the boundary of the state space at time t+ (x) or in a Poisson-like fashion with rate ฮป โ—ฆ ฮฆ before. Next the post-jump location Z1 at time T1 is defined through the transition kernel Q: for any test function ฯ•, we have Z   E ฯ•(Z1 ) T1 , X0 = x = ฯ•(u) Q(ฮฆ(x, T1 ), du). The path between 0 and the first jump time T1 is given by,  ฮฆ(x, t) โˆ€ 0 โ‰ค t โ‰ค T1 , Xt = Z1 if t < T1 , else. Now starting from the post-jump location XT1 , one chooses the next inter-jumping time S2 = T2 โˆ’ T1 and the future post-jump location Z2 in a similar way as before, and so on. One obtains a strong Markov process with (Tn )nโ‰ฅ0 as the sequence of the jump times (where T0 = 0 by convention). The inter-jumping times are defined by S0 = 0 and, for any integer n โ‰ฅ 1, Sn = Tn โˆ’ Tnโˆ’1 . Finally (Zn )nโ‰ฅ0 denotes the stochastic sequence of the post-jump locations of (Xt )tโ‰ฅ0 , with for any n, Zn = XTn . All the randomness of the PDMP (Xt )tโ‰ฅ0 is contained in the stochastic sequence (Zn , Sn+1 )nโ‰ฅ0 which is a Markov chain. In addition, the post-jump locations (Zn )nโ‰ฅ0 also form a discrete-time Markov process on the state space E because of the condition (2). In this paper, ฮฝn denotes the distribution of the nth post-jump location Zn for any integer n โ‰ฅ 0, while P denotes its Markov kernel, โˆ€ x โˆˆ E, โˆ€ A โˆˆ B(Rd ), P(x, A) = = P(Zn+1 โˆˆ A | Zn = x) Z S(x, dt) Q(ฮฆ(x, t), A), R+ (5) where S stands for the conditional distribution of Sn+1 given Zn for any n, โˆ€ x โˆˆ E, โˆ€ t โ‰ฅ 0, S(x, (t, +โˆž)) = = P(Sn+1 > t | Zn = x)  R  ( t exp โˆ’ 0 ฮป(ฮฆ(x, s))ds 0 if t < t+ (x), (6) else, in light of (4). We would like to highlight that the conditional distribution S(x, ยท) is absolutely continuous with respect to the unidimensional Lebesgue measure on (0, t+ (x)) with sometimes a singular component at t+ (x), Z f (x, t) dt + S(x, A โˆฉ {t+ (x)}), โˆ€ A โˆˆ B(R+ ), S(x, A) = (7) Aโˆฉ(0,t+ (x)) where the conditional density f may be obtained by deriving (6),  Z โˆ€ x โˆˆ E, โˆ€ 0 < t < t (x), f (x, t) = ฮป(ฮฆ(x, t)) exp โˆ’ + t  ฮป(ฮฆ(x, s))ds . (8) 0 In all the sequel G stands for the conditional survival function associated with f , that is, โˆ€ x โˆˆ E, โˆ€ 0 < t < t+ (x), G(x, t) = S(x, (t, +โˆž)), (9) where S is defined in (6). As highlighted before, the process (Zn , Sn+1 )nโ‰ฅ0 forms a Markov chain on the set F defined by [ F = {x} ร— [0, t+ (x)]. (10) xโˆˆE R denotes the transition kernel of this process, โˆ€ (x, t) โˆˆ F, โˆ€ A ร— B โˆˆ B(Rd ร— R+ ), R((x, t), A ร— B) = = P(Zn+1 โˆˆ A, Sn+2 โˆˆ B | Zn = x, Sn+1 = t) Z Q(ฮฆ(x, t), dฮพ) S(ฮพ, B), (11) A and, for any n, ยตn denotes the distribution of the couple (Zn , Sn+1 ). 5 2.2 Assumptions The main assumption that we impose in the present paper is a condition of ergodicity on the Markov chain (Zn )nโ‰ฅ0 . This property is often a keystone in statistical inference for Markov processes and may be directly imposed [3, 5] or established [28] from the primitive features of the data. Assumption 2.1 There exists a distribution ฮฝโˆž on E such that, for any initial distribution ฮฝ0 = ฮด{x} , x โˆˆ E, lim kฮฝn โˆ’ ฮฝโˆž kT V = 0, nโ†’+โˆž where k ยท kT V stands for the total variation norm. This assumption may be checked directly on the Markov kernel P of (Zn )nโ‰ฅ0 from the existence of a Foster-Lyapunovโ€™s function or Doeblinโ€™s condition for instance [29, Theorem 16.0.2]. In the following remark we establish a first property of the sequence (ฮฝn )nโ‰ฅ0 and of its limit ฮฝโˆž . Remark 2.2 Since the transition kernel Q is assumed to be absolutely continuous with respect to the Lebesgue measure (3), the kernel P given by (5) of the post-jump locations (Zn )nโ‰ฅ0 also admits a density. As a consequence, for any integer n, the distribution ฮฝn of Zn and thus the invariant measure ฮฝโˆž introduced in Assumption 2.1 admit a density on the state space E. For the sake of clarity, we write ฮฝโˆž (dx) = ฮฝโˆž (x)ฮปd (dx) with a slight abuse of notation. We add some regularity conditions on the main features of the process to show the convergence of the estimates in Theorem 3.3. Assumptions 2.3 โ€ข The sup-norms kQkโˆž and kf kโˆž are finite. These conditions are used in the proof of Theorem 3.3 to find an upper bound of the non diagonal terms of some square variation process of interest. โ€ข The functions Q and f are Lipschitz, โˆ€ x, y โˆˆ E, โˆ€ 0 < s < t < t+ (x) โˆง t+ (y), |f (x, t) โˆ’ f (y, s)| โ‰ค [f ]Lip (|t โˆ’ s| + |y โˆ’ x|), โˆ€ x โˆˆ E, โˆ€ y, z โˆˆ E, |Q(x, y) โˆ’ Q(x, z)| โ‰ค [Q]Lip |y โˆ’ z|. These conditions are used in the proof of Theorem 3.3 to control the diagonal terms of the same variation process and to study the convergence of some remainder terms. โ€ข The survival function G is Lipschitz, โˆ€ x, y โˆˆ E, โˆ€ 0 < t < t+ (x) โˆง t+ (y), |G(x, t) โˆ’ G(y, t)| โ‰ค [G]Lip |x โˆ’ y|. This condition is used in the proof of Theorem 3.3 to investigate the convergence of the remainder terms. โ€ข The deterministic exit time t+ is continuous. This condition is used to find some admissible initial bandwidths v0 and w0 . Finally, we consider an additional condition on both the transition kernels P and Q and the flow ฮฆ in order to ensure the Lipschitz mixing property of the Markov chain (Zn )nโ‰ฅ0 . This will be sufficient to establish the almost sure convergence to 0 of the remainder term with the adequate rate in the proof of Theorem 3.3. Assumptions 2.4 The transition kernel P of the Markov chain (Zn )nโ‰ฅ0 satisfies, for some a1 โ‰ฅ 1 and a2 < 1, Z 2 โˆ€ (x, y) โˆˆ E , |u โˆ’ v|a1 P(x, du)P(y, dv) โ‰ค a2 |x โˆ’ y|a1 . Rd ร—Rd In addition, the composed function Q(ฮฆ(ยท, ยท), ยท) belongs to the regularity class Li(r1 , r2 ) defined by |Q(ฮฆ(x1 , t1 ), y1 )โˆ’Q(ฮฆ(x2 , t2 ), y2 )| = O (|(x1 , t1 , y1 ) โˆ’ (x2 , t2 , y2 )|r2 (|(x1 , t1 , y1 )|r1 + |(x2 , t2 , y2 )|r1 + 1)) , for some positive numbers r1 and r2 satisfying 2(r1 + r2 ) โ‰ค a1 . 6 3 Estimation procedure 3.1 Inference for the inter-jumping times n For any integer n, we introduce the ฯƒ(Z0 , S1 , . . . , Znโˆ’1 , Sn )-measurable functions ฮฝbโˆž defined on E, and n n b b F and G defined on the interior FฬŠ (let us recall that the set F is given in (10)), by, โˆ€ (x, t) โˆˆ FฬŠ , Fbn (x, t) = โˆ€ (x, t) โˆˆ FฬŠ , Gbn (x, t) = n โˆ€ x โˆˆ E, ฮฝbโˆž (x) =     nโˆ’1 Si+1 โˆ’ t 1X 1 Zi โˆ’ x K , K 1 d n i=0 vid wi vi wi   nโˆ’1 1X 1 Zi โˆ’ x 1{Si+1 >t} , K d n i=0 vid vi   nโˆ’1 1X 1 Zi โˆ’ x , Kd n i=0 vid vi (12) (13) where Kp denotes a kernel function on Rp , p โˆˆ {1, d}, and the bandwidths are defined for any integer k by vk = v0 (k + 1)โˆ’ฮฑ and wk = w0 (k + 1)โˆ’ฮฒ for some ฮฑ, ฮฒ > 0 and initial positive values v0 and w0 . It should be already noted that these quantities are of a great interest in the statistical study of the inter-jumping times of the PDMP (Xt )tโ‰ฅ0 . Indeed, we will see that: โ€ข The ratio b n (x,t) F n (x) ฮฝ bโˆž estimates the conditional density f (x, t) defined in (8). โ€ข The ratio bn (x,t) G n (x) ฮฝ bโˆž estimates the conditional survival function G(x, t) defined in (9). โ€ข The ratio b n (x,t) F bn (x,t) G estimates the composed function ฮป(ฮฆ(x, t)). n In addition, as the name suggests, we will state that ฮฝbโˆž (x) is a good estimate of the density ฮฝโˆž (x) of the unique invariant distribution of the post-jump locations, which is relevant in the estimation problem for PDMPโ€™s but has already been investigated in [3, Proposition A.11]. In all the sequel, we impose a few assumptions on both the kernel functions K1 and Kd . Assumptions 3.1 For any p โˆˆ {1, d}, the kernel function Kp is assumed to be a nonnegative smooth function satisfying the following conditions: โ€ข The sup-norm kKp kโˆž is finite. R โ€ข Rp Kp dฮปp = 1. โ€ข supp Kp โŠ‚ Bp (0p , ฮด). Together with well-chosen initial bandwidths, this condition avoids to compute the kernel estimator from data located at the boundary of the state space F (see also Remark 3.4). โ€ข Only for p = d. The function Kd is Lipschitz, โˆ€ x, y โˆˆ Rd , |Kd (x) โˆ’ Kd (y)| โ‰ค [K]Lip |x โˆ’ y|. This condition is used to show eq. (57) in the proof of Proposition 3.14. R Remark 3.2 In particular, Assumptions 3.1 ensure that, for any p โˆˆ {1, d}, ฯ„p2 = Rp K2p dฮปp is finite. This is used to find an upper bound ofRthe non diagonal terms of the variation process in the proof of Theorem 3.3. In addition, the integral Rp |u|Kp (u)dฮปp (u) is also finite, which is needed to establish the almost sure convergence of the remainder terms in the proof of the same result. In the sequel the admissible set for the bandwidth parameters ฮฑ and ฮฒ is given by  A = (ฮฑ, ฮฒ) โˆˆ R2 : ฮฑ > 0, ฮฒ > 0, ฮฑd + ฮฒ < 1, ฮฑd + ฮฒ + 2 min(ฮฑ, ฮฒ) > 1 . In this part, our main result is obtained from the use of vector martingales and is stated in the following theorem. 7 Theorem 3.3 For any couple (x, t) โˆˆ FฬŠ such that ฮฝโˆž (x)f (x, t) > 0, for any (ฮฑ, ฮฒ) โˆˆ A and (v0 , w0 ) such that t+ (ฮพ), (14) t + w0 ฮด < inf ฮพโˆˆBd (x,v0 ฮด) where ฮด appears in the third item of Assumptions 3.1, we have the almost sure convergence, ๏ฃน ๏ฃฎ n ๏ฃฎ ๏ฃน Fb (x, t) ฮฝโˆž (x)f (x, t) a.s n ๏ฃฐ Gb (x, t) ๏ฃป โˆ’โ†’ ๏ฃฐ ฮฝโˆž (x)G(x, t) ๏ฃป n ฮฝโˆž (x) ฮฝbโˆž (x) and the asymptotic normality, ๏ฃซ๏ฃฎ n ๏ฃน ๏ฃฎ ๏ฃน๏ฃถ Fb (x, t) ฮฝโˆž (x)f (x, t) 1โˆ’ฮฑdโˆ’ฮฒ d ๏ฃญ๏ฃฐ Gbn (x, t) ๏ฃป โˆ’ ๏ฃฐ ฮฝโˆž (x)G(x, t) ๏ฃป๏ฃธ โˆ’โ†’ n 2 N (03 , ฮฃ(x, t, ฮฑ, ฮฒ)), n ฮฝโˆž (x) ฮฝbโˆž (x) where the variance-covariance matrix ฮฃ(x, t, ฮฑ, ฮฒ) is degenerate with only one positive term at position (1, 1). ฮฃ(x, t, ฮฑ, ฮฒ) is defined in (52). 2 Proof. The proof is stated in Appendix B. Remark 3.4 The existence of a couple (v0 , w0 ) satisfying (14) is obvious whenever the exit time t+ is continuous (see Assumptions 2.3). This condition ensures that all the inter-jumping times used in the calculus of Fbn and Gbn are not obtained from forced jumps when the process reaches the boundary of the state space. In the case where t+ (x) = โˆž, it is obvious that no interarrival times are right-censored. The consistency and the asymptotic normality are therefore still accurate without any condition on (v0 , w0 ). Remark 3.5 In Theorem 3.3, the choice (14) of the initial bandwidths v0 and w0 is locally dependent on the point of interest. This may appear restrictive but may be avoided by considering the elements of n o C = C ร— [0, T ] : C is a compact subset of E and T < inf t+ (x) . (15) xโˆˆC Indeed, for any C ร— [0, T ] โˆˆ C, there always exists a couple (v0 , w0 ) such that T + w0 ฮด < inf inf xโˆˆC ฮพโˆˆBd (x,v0 ฮด) t+ (ฮพ). Thus, (v0 , w0 ) satisfies (14) for any point (x, t) โˆˆ C ร— [0, T ]. Remark 3.6 The variance-covariance matrix appearing in the asymptotic normality presented in Theorem 3.3 is degenerate with only the component (1, 1) positive. It means that the rate of the estimators n ฮฝbโˆž and Gbn is faster than the one of Fbn . This is straightforward because Fbn is obtained by smoothing n the empirical distribution of the data both in the spatial and temporal directions contrary to ฮฝbโˆž and Gbn . The proof of the previous result may be adapted to show the two-dimensional central limit theorem, with ฮฑ such that ฮฑd < 1 and ฮฑ(d + 2) > 1:  n    1โˆ’ฮฑd ฮฝโˆž (x)G(x, t) d Gb (x, t) โˆ’ โˆ’โ†’ N (02 , ฮฃ0 (x, t, ฮฑ)), n 2 n ฮฝโˆž (x) ฮฝbโˆž (x) where ฮฃ0 (x, t, ฮฑ) is a diagonal 2 ร— 2-matrix. The keystone to state this convergence is the behavior given in (50) of the hook of a vector martingale. If we assume the geometric ergodicity of the Markov chain (Zn )nโ‰ฅ0 , one may also obtain the rate of n convergence of the variances of the estimates Fbn , Gbn and ฮฝbโˆž uniformly on any compact subset of FฬŠ such that the parameters v0 and w0 may be uniformly chosen (see Remark 3.5). 8 Proposition 3.7 Let us assume that there exists b > 1 such that kฮฝn โˆ’ฮฝโˆž kT V = O(bโˆ’n ). The geometric ergodicity is in particular ensured by Doeblinโ€™s condition (see [29, Theorem 16.0.2]). Then, for any set C ร— [0, T ] โˆˆ C and for any couple (ฮฑ, ฮฒ) such that 2(ฮฑd + ฮฒ) < 1, we have sup Var(Fbn (x, t)) = O(n2(ฮฑd+ฮฒ)โˆ’1 ), = O(n2ฮฑdโˆ’1 ). (x,t)โˆˆC sup   n Var(Gbn (x, t)) + Var(b ฮฝโˆž (x)) (x,t)โˆˆC Let us recall that C has been defined in (15). The rate of convergence for Fbn is faster than the one given in Theorem 3.3 whenever 3(ฮฑd + ฮฒ) < 1. Proof. The proof is similar to the demonstrations of Proposition B.5 and Corollary B.6 of [3] and relies on the control of the covariance process of functionals of a geometrically ergodic Markov chain (see [29, Theorem 16.1.5]). 2 We present in the sequel some corollaries of Theorem 3.3 that are of interest in the estimation problem for the inter-jumping times. First, we define the estimator fbn (x, t) of f (x, t) by, Fbn (x, t) โˆ€ (x, t) โˆˆ FฬŠ , fbn (x, t) = n , ฮฝbโˆž (x) with the usual convention 0/0 = 0. We have the following result of convergence. Corollary 3.8 For any couple (x, t) โˆˆ FฬŠ such that ฮฝโˆž (x)f (x, t) > 0, for any (ฮฑ, ฮฒ) โˆˆ A and (v0 , w0 ) satisfying (14), we have     1โˆ’ฮฑdโˆ’ฮฒ ฯ„12 ฯ„d2 f (x, t) a.s. d and n 2 fbn (x, t) โˆ’โ†’ f (x, t) fbn (x, t) โˆ’ f (x, t) โˆ’โ†’ N 0, . (1 + ฮฑd + ฮฒ)ฮฝโˆž (x) Proof. This result is a direct application of Theorem 3.3 and Slutskyโ€™s lemma. 2 Another feature of interest for the inter-jumping times is the survival function G. One may estimate this quantity by, bn b n (x, t) = G (x, t) , โˆ€ (x, t) โˆˆ FฬŠ , G n (x) ฮฝbโˆž with the convention 0/0 = 0. Some properties of convergence are stated in the following corollary. Corollary 3.9 For any couple (x, t) โˆˆ FฬŠ such that ฮฝโˆž (x)f (x, t) > 0, for any ฮฑ such that ฮฑd < 1 and ฮฑ(d + 2) > 1, and any v0 , we have     1โˆ’ฮฑd ฯ„d2 G(x, t) a.s. d n n b b 2 and n G (x, t) โˆ’โ†’ G(x, t) . G (x, t) โˆ’ G(x, t) โˆ’โ†’ N 0, (1 + ฮฑd)ฮฝโˆž (x) Proof. The almost sure convergence is a direct application of Theorem 3.3. The central limit theorem is a consequence of the asymptotic normality established in Remark 3.6 and Slutskyโ€™s lemma. 2 3.2 Optimal estimation of the jump rate n We propose to estimate the composed function ฮป โ—ฆ ฮฆ by the ratio ฮป[ โ—ฆ ฮฆ defined by, n Fbn (x, t) โˆ€ (x, t) โˆˆ FฬŠ , ฮป[ โ—ฆ ฮฆ (x, t) = , Gbn (x, t) (16) again with the convention 0/0 = 0. Pointwise convergence and asymptotic normality are again a consequence of Theorem 3.3. 9 Corollary 3.10 For any couple (x, t) โˆˆ FฬŠ such that ฮฝโˆž (x)f (x, t) > 0, for any (ฮฑ, ฮฒ) โˆˆ A and (v0 , w0 ) satisfying (14), we have n a.s. ฮป[ โ—ฆ ฮฆ (x, t) โˆ’โ†’ ฮป โ—ฆ ฮฆ(x, t), and n 1โˆ’ฮฑdโˆ’ฮฒ 2    n d ฮป[ โ—ฆ ฮฆ (x, t) โˆ’ ฮป โ—ฆ ฮฆ(x, t) โˆ’โ†’ N 0, ฯ„12 ฯ„d2 ฮป โ—ฆ ฮฆ(x, t) (1 + ฮฑd + ฮฒ)ฮฝโˆž (x)G(x, t)  . Proof. This result is a direct application of Theorem 3.3 and Slutskyโ€™s lemma together with (6), (8) and (9). 2 In all the sequel, we focus on the estimation of the rate ฮป (and not on the composed function ฮป โ—ฆ ฮฆ) n from the estimate ฮป[ โ—ฆ ฮฆ defined in (16). In particular, for some fixed value x โˆˆ E, we introduce a n bฮพ (x) of ฮป(x) indexed by the elements ฮพ of the curve Cx described by the reverse class of estimators ฮป flow ฮฆ(x, โˆ’t), t โ‰ฅ 0, and we propose to choose an estimate from this class in an optimal way. Before proceeding further we define the notation Cx as Cx = {ฮฆ(x, โˆ’t) : 0 โ‰ค t < tโˆ’ (x)}. By definition (1) of tโˆ’ (x) we have Cx โŠ‚ E. In addition, for any ฮพ โˆˆ Cx , we define ฯ„x (ฮพ) as the unique time satisfying ฮฆ(ฮพ, ฯ„x (ฮพ)) = x, ฮพ โˆˆ Cx . Thus we have the following trivial result, โˆ€ ฮพ โˆˆ Cx , ฮป โ—ฆ ฮฆ(ฮพ, ฯ„x (ฮพ)) = ฮป(x). As a consequence, we propose to define a class of estimators of ฮป(x) by n o n bn [ ฮ›n (x) = ฮป ฮพ (x) = ฮป โ—ฆ ฮฆ (ฮพ, ฯ„x (ฮพ)) : ฮพ โˆˆ Cx , (17) (18) n where ฮป[ โ—ฆ ฮฆ estimates ฮป โ—ฆ ฮฆ (see Corollary 3.10) and has already been defined in (16). By virtue of Corollary 3.10 and only using (17), one has, as n goes to infinity,    1โˆ’ฮฑdโˆ’ฮฒ a.s. d 2 bn bn and n 2 โˆ€ ฮพ โˆˆ Cx , ฮป ฮป ฮพ (x) โˆ’โ†’ ฮป(x) ฮพ (x) โˆ’ ฮป(x) โˆ’โ†’ N 0, ฯƒฮพ,ฮฑ,ฮฒ (x) , where the asymptotic variance is given by 2 ฯƒฮพ,ฮฑ,ฮฒ (x) = ฯ„12 ฯ„d2 ฮป(x) , (1 + ฮฑd + ฮฒ)ฮบx (ฮพ) with ฮบx (ฮพ) = ฮฝโˆž (ฮพ)G(ฮพ, ฯ„x (ฮพ)). (19) n bn In this paper, we choose to approximate ฮป(x) by the element ฮป ฮพ (x) โˆˆ ฮ› (x) minimizing the asymptotic 2 variance ฯƒฮพ,ฮฑ,ฮฒ (x). In other words, our optimal estimator of the jump rate ฮป(x) is obtained as bn bn ฮป โˆ— (x) = ฮปฮพโˆ— (x), where ฮพโˆ— = arg max ฮบx (ฮพ). ฮพโˆˆCx Remark 3.11 A good criterion should be to maximize the invariant measure ฮฝโˆž (ฮพ), ฮพ โˆˆ Cx . Indeed, if ฮฝโˆž (ฮพ) is large, a large frequency of post-jump locations around ฮพ may be available in the dataset. Nevertheless, roughly speaking, the quantities of interest f (ฮพ, ฯ„x (ฮพ)) and G(ฮพ, ฯ„x (ฮพ)) are well estimated if a large number of post-jump locations are around ฮพ together with inter-jumping times around ฯ„x (ฮพ). This naive criterion may be corrected by including the quality of the estimation at time ฯ„x (ฮพ), that is to say, by maximizing the product ฮฝโˆž (ฮพ)G(ฮพ, ฯ„x (ฮพ)). We also refer the reader to the simulation study presented in Section 4 and more precisely to Figure 8. The criterion ฮบx (ฮพ), ฮพ โˆˆ Cx , is generally uncomputable from the known features of the PDMP and thus remains to be estimated. In light of Theorem 3.3 and by definition (19) of ฮบx (ฮพ), we naturally propose to approximate this quantity by, bn โˆ€ ฮพ โˆˆ Cx , ฮบ bn x (ฮพ) = G (ฮพ, ฯ„x (ฮพ)). 10 (20) As a consequence, we propose to estimate the jump rate ฮป(x) by its statistical approximation in ฮ›n (x) maximizing the estimated criterion ฮบ bx (ฮพ). More precisely, n b bโˆ— (x) = ฮป bnbn (x), ฮป ฮพ โˆ— where ฮพbโˆ—n = arg max ฮบ bn x (ฮพ). (21) ฮพโˆˆCx The high oscillations or alternatively the high smoothness of a kernel estimator with a ill-chosen bandwidth suggest that the choice of the parameter ฮฑ appearing in ฮบ bn x (see eq. (12) and (20)) is crucial at this maximization step. 3.3 How to choose bandwidth parameters ฮฑ and ฮฒ? This part is devoted to the choice of the bandwidth parameters ฮฑ and ฮฒ. The criteria that we introduce in this part to choose these features are defined as line integrals along the curve Cx . As a consequence, we need to ensure that this kind of quantity is well defined in our setting. Assumption 3.12 For any starting condition ฮพ โˆˆ E, the reverse flow t 7โ†’ ฮฆ(ฮพ, โˆ’t) defines a change of variable, that is to say, is a diffeomorphic mapping. It is common in the literature to minimize the Integrated Square Error (ISE) to choose the optimal bandwidths of a kernel estimator, in particular from dependent data: one may refer the reader to [23, 26, 27]. Another classical solution is to investigate the behavior of the Mean Integrated Square Error (MISE). In the framework of Gaussian dependent data, the authors of [15] have shown that the optimal bandwidths obtained by minimizing the ISE and the MISE are very close if the dependence is of short range, that is to say, if the covariance function is integrable (see [15, Theorem 2.2]). It should be noted that a geometric ergodic Markov chain satisfies this kind of condition (see [29, Theorem 16.1.5]). Let us recall that ฮฑ appears at first in the computation of the estimated criterion ฮบ bn x which we need n n b to maximize along the curve Cx . Indeed ฮบ bx is computed (20) from the estimate G which implicitly depends on ฮฑ. We propose to choose the bandwidth parameter ฮฑ by minimizing the ISE associated with ฮบ bx and defined by Z 2 ISEn = (b ฮบn ฮบ (ฮฑ) x (ฮพ) โˆ’ ฮบx (ฮพ)) dฮพ Cx Z = ฮบx (ฮพ)2 dฮพ + ฮตn (22) ฮบ (ฮฑ), Cx where the function ฮตn ฮบ is given by Z ฮตn (ฮฑ) = ฮบ Gbn (ฮพ, ฯ„x (ฮพ))2 dฮพ โˆ’ 2 Z Gbn (ฮพ, ฯ„x (ฮพ)) ฮบx (ฮพ)dฮพ. (23) Cx Cx One may remark that here the ISE is unusually computed along a curve of interest. In (22) the dependency on ฮฑ only holds through the function ฮตn ฮบ . As a consequence the optimal parameter ฮฑ minimizing this stochastic function (23) also minimizes the ISE. The function ฮตn ฮบ is generally not computable since the unknown quantity ฮบx appears in its definition. As a consequence, we propose to estimate ฮตn ฮบ by cross-validation which is a popular technique for selecting the bandwidth that minimizes the ISE. The authors would like to highlight that cross-validation involves here two main difficulties. First the estimators are computed from dependent data which are not identically distributed. In addition, there is almost surely no data on the set of integration Cx whenever the dimension d is larger than 2. That is why we propose a specific procedure adapted to this framework. Before defining our cross-validation estimate of ฮตn ฮบ , we need to introduce the quantities Tx,ฯ and ฮธx . First Hx denotes the hyperplane orthogonal to Cx at x, that is, n o Hx = y โˆˆ Rd : y โˆ’ x โŠฅ โˆ‡t ฮฆ(x, 0) . In addition, for any ฯ > 0, we introduce the notation Dx,ฯ for Dx,ฯ = Bd (x, ฯ) โˆฉ Hx . 11 Furthermore Tx,ฯ denotes the tube around Cx with radius ฯ, [ Tx,ฯ = Cy . (24) D yโˆˆ x,ฯ Finally, for any ฮพ โˆˆ Tx,ฯ , ฮธx (ฮพ) denotes the unique time such that ฮฆ(ฮพ, ฮธx (ฮพ)) โˆˆ Dx,ฯ . In particular, โˆ€ ฮพ โˆˆ Cx , ฮธx (ฮพ) = ฯ„x (ฮพ). (25) It should be noted that, for ฯ small enough, Tx,ฯ โŠ‚ E. We focus now on a cross-validation method for estimating the quantity ฮตn bฮบn,en,ฯ of ฮตฮบn ฮบ . The estimate ฮต e e et )tโ‰ฅ0 is defined from the observation of the embedded Markov chain (Zk , Sk+1 )kโ‰ฅ0 of another PDMP (X (independent on the first one (Xt )tโ‰ฅ0 and distributed according to the same parameters), by ฮตbฮบn,en,ฯ (ฮฑ) = Z Cx 2 ฮบ bn x (ฮพ) dฮพ โˆ’  ne โˆ’1  + 1 X bn e ek ) 1Tx,ฯ (Z ek ) 1 e G Z k , ฮธ x (Z ek ),+โˆž) (Sk+1 ), dโˆ’1 (ฮธx (Z n e ฯ€ 2 ฯdโˆ’1 k=0 2ฮ“ dโˆ’1 2 (26) where ฮ“ denotes as usually the Euler function. Some regularity conditions are necessary to investigate the asymptotic behavior of the cross-validation estimate ฮตbฮบn,en,ฯ in Proposition 3.14. Assumptions 3.13 โ€ข The sup-norm kฮฝโˆž kโˆž is finite and ฮฝโˆž is Lipschitz, โˆ€ x, y โˆˆ E, |ฮฝโˆž (x) โˆ’ ฮฝโˆž (y)| โ‰ค [ฮฝโˆž ]Lip |x โˆ’ y|. โ€ข The deterministic exit time for the reverse flow tโˆ’ is Lipschitz, โˆ€ x, y โˆˆ E, |tโˆ’ (x) โˆ’ tโˆ’ (y)| โ‰ค [tโˆ’ ]Lip |x โˆ’ y|. โ€ข The flow ฮฆ is Lipschitz, โˆ€ x, y โˆˆ E, โˆ€ t โˆˆ R, |ฮฆ(x, t) โˆ’ ฮฆ(y, t)| โ‰ค [ฮฆ]Lip |x โˆ’ y|. โ€ข The sup-norm kโˆ‡t ฮฆkโˆž is finite and โˆ‡t ฮฆ is Lipschitz, โˆ€ x, y โˆˆ E, โˆ€ t โˆˆ R, |โˆ‡t ฮฆ(x, t) โˆ’ โˆ‡t ฮฆ(y, t)| โ‰ค [โˆ‡t ฮฆ]Lip |x โˆ’ y|. Proposition 3.14 Conditionally to ฯƒ(Z0 , S1 , . . . , Znโˆ’1 , Sn ), we have lim ฮตbฮบn,en,ฯ (ฮฑ) = ฮตn ฮบ (ฮฑ) n e โ†’โˆž ฯโ†’0 a.s. 2 Proof. The proof is stated in Appendix C. By virtue of Proposition 3.14, one may obtain an estimate of the optimal bandwidth parameter ฮฑ arising in ฮบ bn bฮบn,en,ฯ for some small enough ฯ and large enough n e. In addition, x by minimizing the quantity ฮต n bn by (16), (18) and (20), the quantity ฮบ bx also appears in the calculus of the estimator ฮป ฮพ (x). In particular, bn the same choice of ฮฑ may be done for computing the denominator ฮบ bn x (ฮพ) of ฮปฮพ (x). As a consequence it remains to choose in an optimal way the bandwidth parameters ฮฑ and ฮฒ arising in the formula (16) of bn the numerator Fbn (ฮพ, ฯ„x (ฮพ)) of ฮป ฮพ (x) (18). In a similar way as before, we propose to choose ฮฑ and ฮฒ by minimizing the ISE associated with Fbn (ยท, ฯ„x (ยท)) and computed along the curve Cx , Z  2 ISEn = Fbn (ฮพ, ฯ„x (ฮพ)) โˆ’ F (ฮพ, ฯ„x (ฮพ)) dฮพ F (ฮฑ, ฮฒ) Cx Z F(ฮพ, ฯ„x (ฮพ))2 dฮพ + ฮตn F (ฮฑ, ฮฒ), = Cx 12 (27) where Fbn implicitly depends on ฮฑ and ฮฒ, F(ฮพ, ฯ„x (ฮพ)) stands for ฮฝโˆž (ฮพ)f (ฮพ, ฯ„x (ฮพ)) and ฮตn F is given by Z Z ฮตn Fbn (ฮพ, ฯ„x (ฮพ))2 dฮพ โˆ’ 2 Fbn (ฮพ, ฯ„x (ฮพ))F(ฮพ, ฯ„x (ฮพ))dฮพ. F (ฮฑ, ฮฒ) = Cx Cx As in the previous part we propose to estimate ฮตn F by cross-validation from the observation of the ek , Sek+1 )kโ‰ฅ0 of another PDMP (X et )tโ‰ฅ0 . We define our estimate ฮตbn,en,ฯ1 ,ฯ2 of ฮตn embedded chain (Z F by F Z ฮตbFn,en,ฯ1 ,ฯ2 (ฮฑ, ฮฒ) = Fbn (ฮพ, ฯ„x (ฮพ))2 dฮพ Cx โˆ’ 2ฮ“ dโˆ’1 2 n e ฯ2 ฯ€ dโˆ’1 2  n e โˆ’1 X ฯdโˆ’1 1 k=0 +1   e ek , ฮธx (Z ek ) 1Tx,ฯ (Z ek ) 1 Fbn Z 1 (ฮธx (Zek )โˆ’ ฯ2 ,ฮธx (Zek )+ ฯ2 ) (Sk+1 ). (28) 2 2 The convergence of ฮตbFn,en,ฯ,ฮด is investigated in Proposition 3.15. Proposition 3.15 Conditionally to ฯƒ(Z0 , S1 , . . . , Znโˆ’1 , Sn ), we have lim ฮตbFn,en,ฯ1 ,ฯ2 (ฮฑ, ฮฒ) = ฮตn F (ฮฑ, ฮฒ) n e โ†’โˆž ฯ1,2 โ†’0 a.s. Proof. The proof is similar to the demonstration of Proposition 3.14 stated in Appendix C. 4 2 Simulation study In this section, we provide a self-contained presentation of the estimation procedure, as well as three application scenarios on both simulated and real datasets. 4.1 Estimation algorithm The sequel is devoted to the self-contained presentation of the estimation procedure provided in this paper. Precisely, we are interested in the estimation of ฮป(x) for some x โˆˆ E โŠ‚ Rd . 4.1.1 Preliminary computations These preliminary computations only require to manipulate the flow ฮฆ and the state space E. โ€ข Compute the curve Cx = {ฮฆ(x, โˆ’t) : t โ‰ฅ 0} โˆฉ E. โ€ข Choose ฯ > 0 and compute Dx,ฯ = Tx,ฯ = Bd (x, ฯ) โˆฉ {y โˆˆ Rd : y โˆ’ x โŠฅ โˆ‡t ฮฆ(x, 0)}, [ Cy . D yโˆˆ x,ฯ โ€ข For any ฮพ โˆˆ Tx,ฯ compute ฮธx (ฮพ) as the unique solution of ฮฆ(ฮพ, ฮธx (ฮพ)) โˆˆ Dx,ฯ . The mapping ฯ„x is only defined on Cx โŠ‚ Tx,ฯ by ฯ„x (ฮพ) = ฮธx (ฮพ). 4.1.2 Preliminary estimates These preliminary computations require to choose kernel functions K1 and Kd on R and Rd , as well as two positive values v0 and w0 . โ€ข For any couple (ฮฑ, ฮฒ), compute n Fbฮฑ,ฮฒ (ฮพ, t) =     nโˆ’1 X Zi โˆ’ ฮพ 1 Si+1 โˆ’ t ฮฑd+ฮฒ (i + 1) K K . 1 d vi wi nv0d w0 i=0 โ€ข Compute   nโˆ’1 1 X Zi โˆ’ ฮพ ฮฑd Gbฮฑn (ฮพ, t) = (i + 1) K 1{Si+1 >t} . d vi nv0d i=0 13 4.1.3 Choice of bandwidth parameters by cross-validation ei , Sei+1 )0โ‰คiโ‰คenโˆ’1 , From the observation of two independent embedded chains (Zi , Si+1 )0โ‰คiโ‰คnโˆ’1 and (Z with n e  n, one determines the optimal bandwidth parameters appearing in the preceding estimates. In practice, from only one trajectory of the underlying PDMP, one may divide the data into two categories: the largest one is used for the estimation, while the cross-validation step relies on the other one. โ€ข Compute ฮฑG = arg max ฮฑ>0 Z  ne โˆ’1  2 ฮ“ dโˆ’1 + 1 X bn e 2 ek ) 1Tx,ฯ (Z ek ) 1 e Gbฮฑn (ฮพ, ฯ„x (ฮพ))2 dฮพโˆ’ Gฮฑ Zk , ฮธx (Z ek ),+โˆž) (Sk+1 ). dโˆ’1 (ฮธx (Z Cx n eฯ€ 2 ฯdโˆ’1 k=0 โ€ข Choose ฯ2 > 0 and compute Z n (ฮฑF , ฮฒ F ) = arg max Fbฮฑ,ฮฒ (ฮพ, ฯ„x (ฮพ))2 dฮพ ฮฑ,ฮฒ>0 โˆ’ Cx 2ฮ“ dโˆ’1 2 n e ฯ2 ฯ€ 4.1.4 dโˆ’1 2  n e โˆ’1 X ฯdโˆ’1 k=0 +1   n ek )1 ek , ฮธx (Z ek ) 1Tx,ฯ (Z e Fbฮฑ,ฮฒ Z (ฮธx (Zek )โˆ’ ฯ2 ,ฮธx (Zek )+ ฯ2 ) (Sk+1 ). 2 2 Estimation of ฮป(x) Finally, we compute the best estimate of ฮป(x) from all the preceding computations. โ€ข Compute ฮพbโˆ—n = arg max GbฮฑnG (ฮพ, ฯ„x (ฮพ)). ฮพโˆˆCx F F G โ€ข From (ฮฑ , ฮฒ ), ฮฑ and ฮพbโˆ—n , compute   bnF F ฮพbโˆ—n , ฯ„x (ฮพbโˆ—n ) F ฮฑ ,ฮฒ b bโˆ— (x) =  .  ฮป GbnG ฮพbโˆ—n , ฯ„x (ฮพbโˆ—n ) n ฮฑ Remark 4.1 The time complexity of this algorithm depends on several parameters, namely the number n of observed jumps, the number n e of observed data for the cross-validation steps, and also the numbers Nฮพ , Nฮฑ and Nฮฒ for discretizing the state spaces of ฮพ, ฮฑ and ฮฒ at each maximization procedure. It is easy to see that the cross-validation step is the most complex but remains polynomial, precisely in O(nNฮฑ Nฮฒ (Nฮพ + n e)). 4.2 TCP-like process The application on which we focus in this part is a variant of the famous TCP window size process appearing in the modeling of the Transmission Control Protocol used for data transmission over the Internet and presented in [12]. This protocol has been designed to adapt to the traffic conditions of the network: for a connection, the maximum number of packets that can be sent is given by a random variable called the congestion window size. At each time step, if all the packets are successfully transmitted, then one tries to transmit one more packet until a congestion appears. The model presented in this part is two dimensional. For the sake of clarity, we will use the following notation: for any x โˆˆ R2 , x1 and x2 denote the components of x. We consider a PDMP (Xt )tโ‰ฅ0 evolving on the state space E = (0, 1)2 . The deterministic part of the model is defined from the flow ฮฆ given by, โˆ€ x โˆˆ R2 , โˆ€ t โˆˆ R, ฮฆ(x, t) = (x1 + t, x2 ). The jump rate ฮป is defined by, โˆ€ x โˆˆ R2 , ฮป(x) = x1 + x2 . The transition kernel Q is defined by, Z โˆ€ x โˆˆ E, โˆ€ A โˆˆ B(E), Q(x, A) โˆ A 14 u(1 โˆ’ u)2/x1 โˆ’1 v(1 โˆ’ v) du dv. Starting from (x1 , x2 ), the process evolves in the unit square, always to the right, until a jump appears either when the motion hits the boundary {(ฮพ1 , ฮพ2 ) : ฮพ1 = 1} or with the non homogeneous rate x1 +x2 +t before, that is according to a Weibull distribution. The two components of the post-jump location are independent and both governed by a Beta-distribution, in such a way that the process tends with a high probability to jump to the left of the location just before the jump. One obtains a TCP-like process (see Figure 2) for which the second dimension models the quality of the network (upper the second component is, higher the probability of a congestion is). [ Figure 2 approximately here ] The asymptotic behavior of the process may be represented by the invariant distribution ฮฝโˆž of the n post-jump locations. Since this quantity is unknown, we propose to show in Figure 3 its estimate ฮฝbโˆž defined by (13) and computed from n = 20 000 observed jumps. [ Figure 3 approximately here ] We present here all the procedure for estimating the jump rate ฮป at the location x = (0.75, 0.5) for which the quality of the network is average. In this context, the class of estimators of ฮป(x) is indexed by the elements ฮพ โˆˆ Cx = (0, 0.75] ร— {0.5}. It should be noted that the invariant distribution at x is quite low (see Figure 3). Nevertheless our method is expected to work pretty well even in this unfavorable framework. In this simulation study, we assume that we observe the embedded Markov chain (Zn , Sn+1 )nโ‰ฅ0 until the 10 000th jump. The cross-validation procedure is computed from an additional chain, independent on the first one, and observed until the 1 000th jump. When boxplots are presented, they have been computed over 100 replicates. bn We begin with the choice of the bandwidth parameter ฮฑ appearing in ฮบ bn x (ฮพ) = G (ฮพ, ฯ„x (ฮพ)). The cross-validation procedure relies on the minimization of the estimate ฮตbฮบn,en,ฯ (ฮฑ) which depends on the positive parameter ฯ. We present in Figure 4 this quantity as a function of ฮฑ and from different values of ฯ. Fortunately, this new parameter seems to have little influence over the behavior of the estimation of the ISE along Cx . [ Figure 4 approximately here ] Now, from this ฮฑ (denoted in the sequel ฮฑG ), we maximize the estimated criterion ฮบ bn x (ฮพ) along the n b curve Cx (see Figure 5): we obtain the optimal point ฮพโˆ— at which we will compute our estimator of ฮป(x). The crucial role of ฮฑ at this maximization step is illustrated in Figure 6. [ Figure 6 approximately here ] We continue with the choice of the couple (ฮฑ, ฮฒ) implicitly appearing in the estimator Fbn (ฮพ, ฯ„x (ฮพ)). The optimal parameters (denoted in the sequel (ฮฑF , ฮฒ F )) are obtained by minimizing the estimate ฮตbFn,en,ฯ1 ,ฯ2 (ฮฑ, ฮฒ) of the related ISE (see Figure 7). [ Figure 7 approximately here ] We compute the estimators for different values of ฮพ โˆˆ Cx and with the optimal bandwidths ฮฑG F F and (ฮฑ , ฮฒ ). The related boxplots are presented in Figure 8. The procedure makes us able to choose the best index ฮพbโˆ—n which most of the time corresponds with the estimate with least bias and variance. This proves the strong interest of the estimation algorithm developed in this paper. bn ฮป ฮพ (x) [ Figure 8 approximately here ] 4.3 Bacterial motility We present here a model of bacterial motility. Most motile bacteria move by the use of a flagellum or several flagella. The bacteria moves in the direction of the flagellum. A flagellum behaves like a rotary motor. Periodically, the flagellum changes its direction and results in reorientation of the bacteria. This allows bacteria to change direction. Bacteria can sense nutrients and move towards them. Additionally, they can move in response to temperature, light, etc. If the bacteria is in a favorable environment, the frequency of changes in direction is low. This intelligent behavior is allowed by the fact that the jump rate of the direction depends on the environment. For example, [30, 31, 34] propose models for 15 the trajectory of the bacteria E. Coli. In particular, the author of [30] uses PDMPโ€™s to describe the movement of bacteria under the influence of an external attractive chemical signal. We present here a variant of the model presented in [30]. The path of the bacteria is described by a PDMP (Xt )tโ‰ฅ0 evolving in the three-dimensional space state E = D ร— [0, 2ฯ€) with D the unit disk of R2 . For the sake of clarity, we will use the following notation: for any x โˆˆ R3 , x1 , x2 and x3 denote the components of x. In our case, (x1 , x2 ) is the position of the bacteria in the unit disk, and x3 is the direction of its flagellum. The bacteria moves in the direction of its flagellum. In other words, the flow is given by, โˆ€ x โˆˆ R3 , โˆ€ t โˆˆ R, ฮฆ(x, t) = (x1 + t cos x3 , x2 + t sin x3 , x3 ). The bacteria changes its direction according to a jump rate function ฮป(x) = ฮป(x1 , x2 ) which depends on the environment only through the position (x1 , x2 ) and not on the current angle. The jump rate describes the interaction between the bacteria and its environment. When the bacteria changes its direction, the new direction is chosen preferentially in the direction of a more favorable environment. The transition kernel Q(x, ยท) models this change of direction. In our case, we suppose the bacteria has no information a priori on the quality of the environment around itself. Thus, Q can be defined by, Z 1 โˆ€ x โˆˆ E, โˆ€A โˆˆ B([0, 2ฯ€[), Q(x, (x1 , x2 ) ร— A) = du. 2ฯ€ A Starting from the position (x1 , x2 ) in D, the bacteria evolves in the direction x3 โˆˆ [0, 2ฯ€), until a jump appears either when the bacteria hits the boundary โˆ‚D of its environment or with the rate ฮป (ฮฆ(x, t)) = ฮป(x1 + t cos x3 , x2 + t sin x3 ) before. The post-jump direction is next randomly chosen in [0, 2ฯ€), and the bacteria continues its path in this new direction, and so on. A possible path of this model is presented in Figure 9. [ Figure 9 approximately here ] In this simulation study, the jump rate is taken constant equal to ฮป = 1. In other words, there is no interaction between the bacteria and its environment. Of course, this assumption is not taken into account in the estimation. Our goal is to estimate the jump rate ฮป in different points of E in order to check if it depends on the position. Actually, this provides an estimate of the influence of a likely external attractive signal on the bacteria. The estimation algorithm presented in this paper yields an estimate of the jump rate at the threedimensional state (x1 , x2 , ฮธ). Nevertheless, one should take into account that the jump rate do not depend on the angle ฮธ. We explain here the procedure to reduce the dimension and estimate the jump rate at the location (x1 , x2 ) โˆˆ D. bnbn (xฮธ ) at the โ€ข Let ฮธ โˆˆ [0, 2ฯ€) be a fixed angle. Estimate the best index ฮพbโˆ—n (ฮธ) and the jump rate ฮป ฮพโˆ— (ฮธ) location xฮธ = (x1 , x2 , ฮธ). bnbn (xฮธ ) estimates ฮป(x1 , x2 ). We reproduce the preceding step for any ฮธ โˆˆ [0, 2ฯ€). We โ€ข For any ฮธ, ฮป ฮพโˆ— (ฮธ) obtain both a connected trajectory around (x1 , x2 )  Cx1 ,x2 = ฮพbโˆ—n (ฮธ) : ฮธ โˆˆ [0, 2ฯ€) , (29) and a class of optimal estimators  n b bn Lx ,x = ฮป 1 2 ฮพโˆ— (ฮธ)  n bฮพ : ฮพ โˆˆ Cx ,x (xฮธ ) : ฮธ โˆˆ [0, 2ฯ€) = ฮป 1 2 indexed by elements of Cx1 ,x2 . โ€ข As the jump rate does not depend on the direction ฮธ, we aggregate the estimators in Lx1 ,x2 to obtain the following jump rate estimate Z 2ฯ€ bnbn (xฮธ ) dฮธ. b 1 , x2 ) = 1 ฮป (30) ฮป(x ฮพโˆ— (ฮธ) 2ฯ€ 0 16 We investigate the estimation of the jump rate at the following 9 target points, (x1 , x2 ) โˆˆ {(0, 0), (โˆ’0.5, 0), (โˆ’0.5, 0.5), (โˆ’0.5, โˆ’0.5), (0, 0.5), (0, โˆ’0.5), (0.5, 0), (0.5, 0.5), (0.5, โˆ’0.5)}, from a trajectory of n = 100 000 changes of direction. In the sequel, the aggregated estimator (30) is approximated from a discretization of the interval [0, 2ฯ€) with step ฯ€/8. For each of the 9 target points, bnbn (xฮธ ) for ฮธ in the discretization grid. we present in Figure 10 the boxplot of the estimates ฮป ฮพ (ฮธ) โˆ— [ Figure 10 approximately here ] As shown in Figure 11, the trajectories Cx1 ,x2 defined in (29) are very similar and close to the boundary โˆ‚D. We explain this fact as follows. For each target state x = (x1 , x2 , ฮธ), the optimal point bn ฮพbโˆ—n (ฮธ) maximizes ฮบ bn x (ฮพ) = G (ฮพ, ฯ„x (ฮพ)) along Cx = {(x1 โˆ’ t cos ฮธ, x2 โˆ’ t sin ฮธ, ฮธ) : t โ‰ฅ 0} โˆฉ D, where ฯ„x (ฮพ) satisfies x1 โˆ’ฯ„x (ฮพ) cos ฮธ = ฮพ1 and x2 โˆ’ฯ„x (ฮพ) sin ฮธ = ฮพ2 . Recall that Gbn (ฮพ, ฯ„x (ฮพ)) is an estimator of ฮบx (ฮพ) = ฮฝโˆž (ฮพ)G(ฮพ, ฯ„x (ฮพ)). On the first hand, G(ฮพ, t) = exp(โˆ’t) for t small enough, then the only point that maximizes G(ฮพ, ฯ„x (ฮพ)) is ฮพ = x itself. On the other hand, there is an important number of data that are very close to the boundary โˆ‚D (due to the fact that the bacteria jumps when it hits the boundary โˆ‚D). Then the maximization of Gbn (ฮพ, ฯ„x (ฮพ)) is a compromise between ฮพ = x and ฮพ near the boundary. b 1 , x2 ) at the 9 target points are close together, and close to the true value Finally, the estimates ฮป(x ฮป = 1 with a small variance, which is a good indicator of a constant jump rate (see Figure 11). [ Figure 11 approximately here ] Now, we investigate the effect of the size n of the dataset on the quality of the estimation. We compare results of simulations from n = 100 000, n = 50 000 and n = 20 000 observed data. When n = 20 000, the trajectories Cx1 ,x2 are not all the time close to the boundary. It is due to the fact that, in this case, some areas of the state space are not well-covered by the observed post-jump locations. Then, if the target point is x = (x1 , x2 , ฮธ), the optimal point ฮพbโˆ—n (ฮธ) โˆˆ Cx is obtained at the location x itself (see Figure 12). In addition, the estimated curves Cx1 ,x2 obtained from n = 50 000 data are very close to the ones computed from n = 100 000 observed jumps. [ Figure 12 approximately here ] Of course, the larger the number of data n is, the better the estimations (see Figures 13 and 14). In particular, it is difficult to conclude that the jump rate is constant from only n = 20 000 observed jumps because the variance of the estimates is too large. Nevertheless, a dataset of size 50 000 may be sufficient to conclude that the jump rate does not depend on the location. [ Figures 13 and 14 approximately here ] 4.4 Fatigue crack propagation Fatigue crack propagation is a stochastic phenomenon due to the inherent uncertainties originating from material properties and cyclic mechanical loads. As a consequence, stochastic processes offer an appropriate framework for modeling crack propagation. Fatigue life may be divided into crack initiation and two crack growth periods, namely the linear or stable regime described by Parisโ€™ equation da = C (โˆ†K(a))m , dN and the acceleration or unstable regime modeled by Formanโ€™s equation C (โˆ†K(a))m da = , dN (1 โˆ’ R)Kc โˆ’ โˆ†K(a) where a is the crack length, N is the time measured in number of loading cycles, R is the stress ratio, Kc represents the maximal value of the stress intensify factor required to induce failure and โˆ†K(a) is the range of the stress intensity factor given by  ฯ€a โˆ’1/2 โˆš โˆ†K(a) = โˆ†ฯƒ cos ฯ€a, ฯ‰ 17 where ฯ‰ is the size of the test specimen and โˆ†ฯƒ is the stress range. In addition, m and C are two unknown material parameters. In this context, regime-switching models have been proposed to analyze fatigue crack growth data [7, 14]. The authors of [7] propose to estimate the transition time between Parisโ€™ and Formanโ€™s regimes assuming that the crack propagation follows the trajectory of some piecewisedeterministic Markov process. The estimation procedure is performed on Virklerโ€™s dataset [35] in which 62 identical centre-cracked aluminium alloy specimens (ฯ‰ = 152 mm) were tested under constant amplitude loading โˆ†ฯƒ = 48.28 MPa at a stress ratio R = 0.2. The number of loading cycles for the crack tip to advance a predetermined increment โˆ†a was recorded from an initial crack length of a0 = 9 mm to a final length of 49.8 mm. 68 crack growth histories were obtained from these tests (see Figure 15). [ Figure 15 approximately here ] In this paper, we assume that the crack growth propagation follows Parisโ€™ equation with random parameters m and C before switching to Formanโ€™s equation with another set of parameters m and C distributed according to some transition measure. The transition occurs at a random time T1 given by its survival function  Z t    ฮป ฮฆP P(T1 > t | a0 = 9 mm, m, C) = exp โˆ’ m,C (a0 , s) ds , 0 ฮฆP m,C where is the deterministic flow of Parisโ€™ equation with parameters m and C. In the sequel, ฮฆP m,C will be computed from the Runge-Kutta method because there is no explicit solution to this differential equation. We propose to estimate the jump rate of this stochastic model from real crack growth data. It should be noted that the jump times are not directly observed in Virklerโ€™s dataset but have been estimated in [7]. The jump rate is of significant importance in understanding the transition between the stable and unstable regimes of crack propagation, and has never been estimated in the framework of PDMPโ€™s. We emphasize that Virklerโ€™s dataset is composed of 68 independent experiments and thus does not directly follow the theoretical framework developed in this manuscript. Nevertheless, our estimation procedure is expected to perform pretty well in this more favorable context (independent curves instead of only one Markov path). Material parameters m and C are unobserved but have also been estimated from Virklerโ€™s experiments in [7]. It is well-known in the literature that there is a strong linear relationship between these features. This characteristic has again been highlighted in [7] and is shown in Figure 16. In order to reduce the dimension and thus simplify the model, we propose to parametrize Parisโ€™ equation with only one parameter, say m, while log(C) is obtained from this linear relationship. [ Figure 16 approximately here ] We focus on the estimation of ฮป(a) for some crack length a. For each parameter m of Parisโ€™ equation there exists a unique deterministic time ฯ„m (a) such that Parisโ€™ flow reaches a at time ฯ„m (a) starting from a0 = 9 mm. Criterion ฮบa (m) and its maximum have been estimated for different values of a (see Figure 17). In particular, one may observe that the larger the target length a is, the larger the optimal parameter m. [ Figure 17 approximately here ] For each crack length a, we estimate the jump rate ฮป(a) from the parameter m maximizing the estimated criterion ฮบa (m). We obtain the estimated function displayed in Figure 18. This curve is increasing as expected and describes the transition rate from the stable region of propagation towards the acceleration regime that leads to fracture. This makes us able to detect conditions of crack growth instability and could be used to predict the critical length in fatigue crack propagation with a given level of confidence. [ Figure 18 approximately here ] A Ergodicity and invariant measures In this section we present some preliminary and technical results about the invariant distributions of the underlying Markov chains. We begin with some properties of the Markov chain (Zn )nโ‰ฅ0 of the post-jump locations of the PDMP of interest. In particular, under Assumption 2.1, one may state the following result. 18 Proposition A.1 We have the following statements: โ€ข (Zn )nโ‰ฅ0 is ฮฝโˆž -irreducible, positive Harris-recurrent and aperiodic. โ€ข ฮฝโˆž is the unique invariant distribution of (Zn )nโ‰ฅ0 . Proof. The proof is similar to the demonstration of Proposition 4.2 of [4]. 2 These properties make us able to apply the law of large numbers to the Markov chain (Zn )nโ‰ฅ0 (see [29, Theorem 17.1.7]). Now we propose to focus on the sequence (Zn , Sn+1 )nโ‰ฅ0 which also forms a Markov process whose transition kernel is given by R in (11). Let us recall that ยตn denotes the distribution on the state space F defined by (10) of the couple (Zn , Sn+1 ), n โ‰ฅ 0. We define the measure ยตโˆž by, Z โˆ€ A โˆˆ B(Rd ), โˆ€ t โ‰ฅ 0, ยตโˆž (A ร— (t, +โˆž)) = ฮฝโˆž (dx) S(x, (t, +โˆž)), (31) A where the conditional distribution S is given by (6). In particular, ยตโˆž is the unique invariant distribution of (Zn , Sn+1 )nโ‰ฅ0 . Proposition A.2 We have the following statements: โ€ข For any initial distribution ยต0 = ฮด{x,t} , (x, t) โˆˆ F , we have lim kยตn โˆ’ ยตโˆž kT V = 0. nโ†’โˆž โ€ข (Zn , Sn+1 )nโ‰ฅ0 is ยตโˆž -irreducible, positive Harris-recurrent and aperiodic. โ€ข ยตโˆž is the unique invariant distribution of (Zn , Sn+1 )nโ‰ฅ0 . Proof. The proof is similar to the demonstrations of Lemma 4.4 and Proposition 4.5 of [4]. 2 We are able again to apply the law of large numbers to the Markov chain (Zn , Sn+1 )nโ‰ฅ0 by virtue of this result. It should be noted that the measures ยตn , n โ‰ฅ 0, and ยตโˆž do not share with ฮฝn , n โ‰ฅ 0, and ฮฝโˆž the property of absolute continuity with respect to the Lebesgue measure presented in Remark 2.2. Remark A.3 For any n, ยตn and thus the limit ยตโˆž admit a density only on the interior FฬŠ of the state space F because of the expression (7) of S and thanks to Remark 2.2. Finally, we would like to highlight that the link between the measures ฮฝโˆž and ยตโˆž may be expressed in another way than (31). Indeed, for any x โˆˆ E, we have Z Q(ฮฆ(y, s), x)ยตโˆž (dy ร— ds) = ฮฝโˆž (x), (32) F by the expression (5) of the transition kernel P of (Zn )nโ‰ฅ0 and because ฮฝโˆž P = ฮฝโˆž by virtue of Proposition A.1. The formula (32) of ฮฝโˆž will be useful in our investigations. B Proof of Theorem 3.3 In all this section we use the notation Fn for the ฯƒ-algebra ฯƒ(Z0 , S1 , . . . , Zn , Sn+1 ), n โ‰ฅ 0. In addition, the classical symbols โˆผ, o and O must be understood to hold here in the almost sure sense. B.1 Sketch of the proof The proof of Theorem 3.3 relies on the following decomposition. For any integer n โ‰ฅ 1, we have ๏ฃฎ n ๏ฃน ๏ฃฎ ๏ฃน Fb (x, t) ฮฝโˆž (x)f (x, t) n ๏ฃฐ Gb (x, t) ๏ฃป โˆ’ ๏ฃฐ ฮฝโˆž (x)G(x, t) ๏ฃป = Mnโˆ’1 + Rn , n n ฮฝโˆž (x) ฮฝbโˆž (x) (33) where the sequence (Mn )nโ‰ฅ0 is a (Fn )nโ‰ฅ0 -vector martingale defined by (37) and studied in Appendix B.3, and Rn is a remainder term defined by (34) and studied in Appendix B.2. 19 In Appendix B.2, we establish that the remainder term almost surely goes to 0 when n tends to infinity. This is a first step to show the almost sure convergence presented in Theorem 3.3. In addition we investigate the rate of convergence of the remainder term in Appendix B.2 under an additional Lipschitz mixing condition stated in Assumption 2.4. This is enough to prove the asymptotic normality given in Theorem 3.3. The rest of the proof deals with the study of the martingale term. We prove in Appendix B.3 that the process (Mn )nโ‰ฅ0 is a vector martingale. We investigate its asymptotic behavior by studying its square variation process (hMin )nโ‰ฅ0 in Appendix B.3. Thanks to these results we state the law of large numbers and the central limit theorem for (Mn )nโ‰ฅ0 in Appendix B.3. Finally the almost sure convergence presented in Theorem 3.3 is a direct application of (33) and (35) together with (51), while the asymptotic normality is obtained from (33), (36) and (54). B.2 Remainder term This part of the paper is devoted to the asymptotic study of the remainder term sequence (Rn )nโ‰ฅ1 appearing in (33). B.2.1 Definition of the remainder term i h (k) For any n, one may write Rn = Rn , where each of the components is defined by 1โ‰คkโ‰ค3 (1) Rn = 4 X (1,j) Rn , j=0 (2) Rn = 3 X (2,j) Rn j=0 and (3) Rn = 2 X (3,j) Rn . (34) j=0 (1) The five terms that define Rn are given by     1 Z0 โˆ’ x S1 โˆ’ t (1,0) Rn = K K , 1 d v0 w0 nv0d w0 nโˆ’1 Z 1X (1,1) Rn = f (x + uvj , t + vwj )Kd (u)K1 (v) (Q (ฮฆ (Zjโˆ’1 , Sj ) , x + uvj )โˆ’Q (ฮฆ (Zjโˆ’1 , Sj ) , x)) du dv, n j=1 Rd ร—R (1,2) Rn = (1,3) Rn = (1,4) Rn = Z nโˆ’1 1X Q (ฮฆ (Zjโˆ’1 , Sj ) , x) [f (x + uvj , t + vwj ) โˆ’ f (x, t + vwj )] Kd (u)K1 (v) du dv, n j=1 Rd ร—R Z nโˆ’1 1X Q (ฮฆ (Zjโˆ’1 , Sj ) , x) [f (x, t + vwj ) โˆ’ f (x, t)] Kd (u)K1 (v) du dv, n j=1 Rd ร—R " nโˆ’1 # 1X Q (ฮฆ (Zjโˆ’1 , Sj ) , x) โˆ’ ฮฝโˆž (x) f (x, t). n j=1 (2) The four terms that define Rn are given by   1 1 Z0 โˆ’ x (2,0) Rn = K 1{S1 >t} , d n v0d v0 nโˆ’1 Z 1X (2,1) Rn = [Q (ฮฆ (Zjโˆ’1 , Sj ) , x + uvj ) โˆ’ Q (ฮฆ (Zjโˆ’1 , Sj ) , x)] G(x + uvj , t)Kd (u) du, n j=1 Rd (2,2) Rn = (2,3) Rn = Z nโˆ’1 1X Q (ฮฆ (Zjโˆ’1 , Sj ) , x) [G(x + uvj , t) โˆ’ G(x, t)] Kd (u) du, n j=1 Rd " nโˆ’1 # 1X Q (ฮฆ (Zjโˆ’1 , Sj ) , x) โˆ’ ฮฝโˆž (x) G(x, t). n j=1 20 (3) Finally, the three terms that define Rn are given by   Z0 โˆ’ x 1 1 (3,0) K , Rn = d n v0d v0 nโˆ’1 Z 1X (3,1) Rn = [Q (ฮฆ (Zjโˆ’1 , Sj ) , x + uvj ) โˆ’ Q (ฮฆ (Zjโˆ’1 , Sj ) , x)] Kd (u) du, n j=1 Rd (3,2) Rn B.2.2 = nโˆ’1 1X Q (ฮฆ (Zjโˆ’1 , Sj ) , x) โˆ’ ฮฝโˆž (x). n j=1 Almost sure convergence (1) We only investigate the first component (Rn )nโ‰ฅ1 since the other terms may be treated with similar (1,0) arguments. First, it is obvious that the sequence (Rn )nโ‰ฅ1 almost surely tends to 0. In addition, (1,4) the term (Rn )nโ‰ฅ1 converges to 0 by virtue of the ergodic theorem applied to the Markov chain (Zn , Sn+1 )nโ‰ฅ0 (thanks to Proposition A.2) together with (32). Because both the functions Q and f are Lipschitz and bounded (see Assumptions 2.3), we have Z nโˆ’1 [Q]Lip kf kโˆž X (1,1) Rn โ‰ค vj |u|Kd (u)du, n Rd j=1 (1,2) Rn โ‰ค Z nโˆ’1 kQkโˆž [f ]Lip X |u|Kd (u)du, vj n Rd j=1 (1,3) Rn โ‰ค Z nโˆ’1 kQkโˆž [f ]Lip X wj |v|K1 (v)dv, n R j=1 which are some Cesaฬ€ro means because both the sequences (vn )nโ‰ฅ0 and (wn )nโ‰ฅ0 tend to 0. Thus, a.s. Rn โˆ’โ†’ 03 . B.2.3 (35) Rate of convergence Under the first item of Assumptions 2.4, the Markov chain (Zn )nโ‰ฅ0 and thus the two-dimensional process (Zn , Sn+1 )nโ‰ฅ0 satisfy the contraction assumption given in Theorem 6.3.17 of [21]. By applying this theorem to the function ฯ• = Q(ฮฆ(ยท, ยท), ยท) โˆˆ Li(r1 , r2 ) (see second item of Assumptions 2.4), we obtain that, for any ฮณ โˆˆ (0, 1) and x โˆˆ E, nโˆ’ 1+ฮณ 2 nโˆ’1 X a.s [Q (ฮฆ (Zjโˆ’1 , Sj ) , x) โˆ’ ฮฝโˆž (x)] โˆ’โ†’ 0, j=1 because 2(r1 + r2 ) โ‰ค a1 . Therefore, we have for any couple (k, j) in the set {(1, 4), (2, 3), (3, 2)}, n 1โˆ’ฮฑdโˆ’ฮฒ 2 a.s. (k,j) Rn โˆ’โ†’ 0. The same result is obvious for the other couples (k, j) with the condition ฮฑd + ฮฒ + 2 min(ฮฑ, ฮฒ) > 1. Finally we obtain, when n goes to infinity, n B.3 B.3.1 1โˆ’ฮฑdโˆ’ฮฒ 2 a.s. Rn โˆ’โ†’ 03 . (36) Martingale term (Mn )nโ‰ฅ0 is a vector martingale h i (k) Let (Mn )nโ‰ฅ0 be the three-dimensional process defined for any n by Mn = Mn , where each 1โ‰คkโ‰ค3 component is defined as Mn(k) = n X (k) Aj (k) โˆ’ Bj , k โˆˆ {1, 2, 3}, j=1 21 (37) (k) and the terms Aj (1) = (1) = Aj Bj (2) = (2) = (3) = (3) = Aj Bj Aj Bj (k) and Bj 1 Kd vjd Z  are given by    1 Sj+1 โˆ’ t Zj โˆ’ x , K1 vj wj wj Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )f (x + uvj , t + vwj ) Kd (u)K1 (v) ฮปd (du) dv,   Zj โˆ’ x 1 1{Sj+1 >t} , K d vj vjd Z Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )G(x + uvj , t) Kd (u) ฮปd (du), Rd   Zj โˆ’ x 1 , K d vj vjd Z Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj ) Kd (u) ฮปd (du). Rd ร—R Rd We claim that the process (Mn )nโ‰ฅ0 is a (Fn )nโ‰ฅ0 -martingale. The keystone is to show that, for any n and k, we have h i (k) Fnโˆ’1 = Bnโˆ’1 . E A(k) n The proof presents no particular difficulty except for the first component k = 1 for which we provide some details. Let us recall that R denotes the transition kernel of the Markov chain (Zn , Sn+1 )nโ‰ฅ0 (see Subsection 2.1). We have     Z i h 1 sโˆ’t ฮพโˆ’x F = E A(1) K R ((Znโˆ’1 , Sn ), dฮพ ร— ds) K 1 nโˆ’1 d n vnd wn Rd ร—R+ vn wn     Z sโˆ’t 1 ฮพโˆ’x = K Q (ฮฆ(Znโˆ’1 , Sn ), dฮพ) S(ฮพ, ds), (38) K 1 d vnd wn Rd ร—R+ vn wn with (11). Let us recall that the bandwidth sequence (vn )nโ‰ฅ0 is decreasing. Together with the third item of Assumptions 3.1, we obtain     ยทโˆ’x ยทโˆ’x โŠ‚ supp Kd โŠ‚ Bd (x, v0 ฮด). supp Kd vn v0 With similar arguments, we obtain       ยทโˆ’t ยทโˆ’t supp K1 โŠ‚ supp K1 โŠ‚ B1 (t, w0 ฮด) โŠ‚ โˆ’โˆž, inf t+ (ฮพ) , ฮพโˆˆBd (x,v0 ฮด) wn w0 (39) with the condition (14) on the couple (v0 , w0 ). By (38), (39) together with the expression (7) of S we obtain     Z h i 1 ฮพโˆ’x sโˆ’t E A(1) Fnโˆ’1 = d Kd K1 Q (ฮฆ(Znโˆ’1 , Sn ), dฮพ) f (ฮพ, s) ds. n vn wn Rd ร—R+ vn wn One may conclude by a change of variable and (3). B.3.2 Predictable square variation process The asymptotic behavior of the martingale (Mn )nโ‰ฅ0 may be investigated by studying its predictable square variation process that we denote as usual (hMin )nโ‰ฅ0 . At any time n, hMin is the 3ร—3 symmetric matrix defined by n h h i i X (i) (j) (i) (j) hMin = E Mk Mk Fkโˆ’1 โˆ’ Mkโˆ’1 Mkโˆ’1 . 1โ‰คi,jโ‰ค3 k=1 Now, we calculate each coefficient of this matrix by beginning with the diagonal terms and the first of (1,1) these hMin . One has hMi(1,1) = n Tn(1) โˆ’ Tn(2) , n 22 (1) (2) where the terms Tn and Tn are defined by n 1X 1 Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )f (x + uvj , t + vwj )K2d (u)K21 (v)du dv, n j=1 vjd wj Rd ร—R 2 n Z X Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )f (x + uvj , t + vwj )Kd (u)K1 (v)du dv . Z Tn(1) = Tn(2) = j=1 Rd ร—R Since the functions Q and f are bounded (see Assumptions 2.3), we easily obtain that Tn(2) = O(n). (40) Let us introduce the additional notation, Ten(1) = TฬŒn(1) = = n Z 1X Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )f (x + uvj , t + vwj )K2d (u)K21 (v)du dv, n j=1 Rd ร—R Z n 1X Q(ฮฆ(Zjโˆ’1 , Sj ), x)f (x, t) K2d (u)K21 (v)du dv n j=1 Rd ร—R n ฯ„d2 ฯ„12 X Q(ฮฆ(Zjโˆ’1 , Sj ), x)f (x, t), n j=1 by Remark 3.2 on the kernel functions K1 and Kd . Since both Q and f are Lipschitz and bounded (see Assumptions 2.3), together with supp Kp โŠ‚ Bp (0p , ฮด) (see Assumptions 3.1), the stochastic sequences (1) (1) (Ten )nโ‰ฅ0 and (TฬŒn )nโ‰ฅ0 have the same limit thanks to n (kQkโˆž [f ]Lip + [Q]Lip kf kโˆž ) ฮดฯ„d2 ฯ„12 X Ten(1) โˆ’ TฬŒn(1) โ‰ค (vj + wj ), n j=1 (41) which is a Cesaฬ€ro mean. In addition, by the almost sure ergodic theorem (see Proposition A.2) together with (32), we obtain a.s. TฬŒn(1) โˆ’โ†’ ฯ„d2 ฯ„12 ฮฝโˆž (x)f (x, t). (42) By (41) and (42) and by virtue of Lemma 7.1.5 of [21], we obtain (1) 2 2 Tn a.s. ฯ„ ฯ„ ฮฝโˆž (x)f (x, t) โˆ’โ†’ d 1 . ฮฑd+ฮฒ n 1 + ฮฑd + ฮฒ Together with (40), as n goes to infinity, (1,1) 2 2 hMin a.s. ฯ„ ฯ„ ฮฝโˆž (x)f (x, t) โˆ’โ†’ d 1 = 41 . 1+ฮฑd+ฮฒ n 1 + ฮฑd + ฮฒ (43) The second diagonal term of the predictable variation process may be studied in a similar way as before. We obtain " Z n X 1 (2,2) hMin = Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )G(x + uvj , t)K2d (u)du d v d R j j=1 Z 2 # โˆ’ Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )G(x + uvj , t)Kd (u)du , Rd and, as n goes to infinity, (2,2) hMin n1+ฮฑd a.s. โˆ’โ†’ ฯ„d2 ฮฝโˆž (x)G(x, t) = 42 . 1 + ฮฑd 23 (44) The third and last diagonal term may also be investigated in the same way. We have " Z n X 1 (3,3) Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )K2d (u)du hMin = d v Rd j j=1 2 # Z Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )Kd (u)du , โˆ’ Rd and, when n goes to infinity, (3,3) 2 hMin a.s. ฯ„d ฮฝโˆž (x) โˆ’โ†’ = 43 . (45) n1+ฮฑd 1 + ฮฑd Now we focus on the non diagonal terms. For any integer n, we have "Z n X (1,2) hMin = Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )2 f (x + uvj , t + vwj )G(x + uvj , t)K2d (u)K1 (v)du dv Rd ร—R j=1 Z ร— hMi(1,3) n = n X  Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )f (x + uvj , t + vwj )Kd (u)K1 (v)du dv Rd ร—R Z # โˆ’ Rd "Z Rd ร—R j=1 Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )G(x + uvj , t)Kd (u)du , Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )2 f (x + uvj , t + vwj )K2d (u)K1 (v)du dv Z โˆ’ = Rd "Z n X R j=1  Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )f (x + uvj , t + vwj )Kd (u)K1 (v)du dv Rd ร—R Z # ร— hMi(2,3) n Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )Kd (u)du , ร— (47) Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )2 G(x + uvj , t)K2d (u)du d  Z โˆ’ (46) Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )G(x + uvj , t)Kd (u)du Rd Z # Rd Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )Kd (u)du . (48) From (46), (47) and (48), and because Q and f are bounded (see Assumptions 2.3) together with the R fact that the integral K2p dฮปp is finite (see Remark 3.2), we easily obtain that, for any i 6= j, hMi(i,j) = O(n). n (49) As a conclusion, by (43), (44), (45) and (49), one may sum up the asymptotic behavior of the predictable variation process (hMin )nโ‰ฅ0 by the following formula, ๏ฃฎ ฮฒ ๏ฃน n 41 0 0 hMin โˆผ๏ฃฐ (50) 0 42 0 ๏ฃป. n1+ฮฑd 0 0 43 It should be noted that the coefficients 4i , 1 โ‰ค i โ‰ค 3, are positive because we assume that ฮฝโˆž (x) > 0 and f (x, t) > 0 in the statement of Theorem 3.3. B.3.3 Limit theorems for the vector martingale Law of large numbers. We propose to apply the law of large numbers for vector martingales (see [21, Theorem 4.3.15]) to the process of interest (Mn )nโ‰ฅ0 . In the sequel, for any n, Tn denotes the trace of the matrix hMin , while En stands for its minimum eigenvalue. First, in light of (50), the trace (Tn )nโ‰ฅ0 24 almost surely tends to infinity. Thus we are able to apply the third item of Theorem 4.3.15 of [21] with any function a(t) = t1+ฮท , ฮท > 0, and we obtain,   2 log(Tn )1+ฮท hMiโˆ’1/2 Mn = o . n En By (50) again, we have, when n goes to infinity,   Tn = O n1+ฮฑd+ฮฒ and En โˆผ min(42 , 43 ) n1+ฮฑd . As a consequence, using that n1+ฮฑd+ฮฒ = o(n2 ) whenever ฮฑd + ฮฒ < 1 together with (50), we have the law of large numbers, as n tends to infinity, kMn k a.s. โˆ’โ†’ 0. (51) n Central limit theorem. We now investigate the asymptotic normality of the vector martingale (Mn )nโ‰ฅ0 . We apply Corollary 2.1.10 of [21] with the sequence (an )nโ‰ฅ0 defined by an = n1+ฮฑd+ฮฒ . The first assumption of this result is obviously satisfied: the sequence (aโˆ’1 n hMin )nโ‰ฅ0 almost surely converges to some positive semi-definite matrix. Indeed, by (50), ๏ฃฎ 2 2 ๏ฃน ฯ„d ฯ„1 ฮฝโˆž (x)f (x,t) 0 0 1+ฮฑd+ฮฒ a.s. ๏ฃฏ ๏ฃบ nโˆ’1โˆ’ฮฑdโˆ’ฮฒ hMin โˆ’โ†’ ๏ฃฐ (52) 0 0 0 ๏ฃป = ฮฃ(x, t, ฮฑ, ฮฒ), 0 0 0 where ฮฃ(x, t, ฮฑ, ฮฒ) is a degenerate variance-covariance matrix. As a consequence, we only have to check Lindebergโ€™s condition in order to establish the central limit theorem for (Mn )nโ‰ฅ0 . In other words, we have to prove that, for any  > 0, # " n X 1 P 2   (53) E |Mj โˆ’ Mjโˆ’1 | 1 Fjโˆ’1 โˆ’โ†’ 0. 1+ฮฑd+ฮฒ 2 n1+ฮฑd+ฮฒ j=1 |Mj โˆ’Mjโˆ’1 |โ‰ฅn (k) (k) For any 1 โ‰ค j โ‰ค n and 1 โ‰ค k โ‰ค 3, we study the three components Mj โˆ’ Mjโˆ’1 . We have     (j + 1)ฮฑd+ฮฒ Zj โˆ’ x Sj+1 โˆ’ t (1) (1) Mj โˆ’ Mjโˆ’1 = K K 1 d vj wj v d w0 Z 0 โˆ’ Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )f (x + uvj , t + vwj ) Kd (u)K1 (v) ฮปd (du) dv, Rd ร—R (2) = (3) = (2) โˆ’ Mjโˆ’1 (3) โˆ’ Mjโˆ’1 Mj Mj   (j + 1)ฮฑd Zj โˆ’ x K 1{Sj+1 >t} d vj v0d Z โˆ’ Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj )G(x + uvj , t) Kd (u) ฮปd (du), Rd  Z  (j + 1)ฮฑd Zj โˆ’ x โˆ’ Q(ฮฆ(Zjโˆ’1 , Sj ), x + uvj ) Kd (u) ฮปd (du). K d vj v0d Rd Thus, we obtain (1) โ‰ค (n + 1)ฮฑd+ฮฒ kKd kโˆž kK1 kโˆž + kQkโˆž kf kโˆž , v0d w0 (2) โ‰ค (n + 1)ฮฑd kKd kโˆž + kQkโˆž , v0d (1) โˆ’ Mjโˆ’1 | (2) โˆ’ Mjโˆ’1 | |Mj |Mj (n + 1)ฮฑd kKd kโˆž + kQkโˆž . v0d  1+ฮฑd+ฮฒ  Together with the condition ฮฑd + ฮฒ < 1, |Mj โˆ’ Mjโˆ’1 | = o n 2 . As a consequence, there exists n o 1+ฮฑd+ฮฒ an integer N such that for any n โ‰ฅ N , the event |Mj โˆ’ Mjโˆ’1 | โ‰ฅ n 2 is almost surely empty. (3) |Mj (3) โˆ’ Mjโˆ’1 | โ‰ค This shows Lindebergโ€™s condition (53). Finally, by (52) and (53), we obtain, as n tends to infinity, nโˆ’ 1+ฮฑd+ฮฒ 2 d Mn โˆ’โ†’ N (03 , ฮฃ(x, t, ฮฑ, ฮฒ)) . 25 (54) C Proof of Proposition 3.14 en , Sen+1 )nโ‰ฅ0 , we By virtue of the ergodic theorem (see Proposition A.2) applied to the Markov chain (Z have, as nฬƒ tends to infinity, Z Z 2 ฮ“ dโˆ’1 +1 a.s. n,e n,ฯ n 2 2 Gbn (ฮพ, ฮธx (ฮพ)) 1(ฮธx (ฮพ),+โˆž) (t)ยตโˆž (dฮพ ร— dt), ฮตbฮบ (ฮฑ) โˆ’โ†’ ฮบ bx (ฮพ) dฮพ โˆ’ dโˆ’1 dโˆ’1 2 Cx Tx,ฯ ร—R+ ฯ€ ฯ conditionally to ฯƒ(Z0 , S1 , . . . , Znโˆ’1 , Sn ). Together with the definition of ยตโˆž (31), the expression (9) of S(x, ยท) and Remark 2.2, we obtain Z Z 2 ฮ“ dโˆ’1 +1 a.s. n,e n,ฯ n 2 2 ฮตbฮบ (ฮฑ) โˆ’โ†’ ฮบ bx (ฮพ) dฮพ โˆ’ Gbn (ฮพ, ฮธx (ฮพ)) G(ฮพ, ฮธx (ฮพ))ฮฝโˆž (ฮพ)ฮปd (dฮพ), (55) dโˆ’1 dโˆ’1 2 Cx Tx,ฯ ฯ ฯ€ conditionally to ฯƒ(Z0 , S1 , . . . , Znโˆ’1 , Sn ). By definition (24) of Tx,ฯ we have Z Tx,ฯ Gbn (ฮพ, ฮธx (ฮพ)) G(ฮพ, ฮธx (ฮพ))ฮฝโˆž (ฮพ)ฮปd (dฮพ) = ! Z Z Dx,ฯ Gbn (ฮพ, ฮธy (ฮพ)) G(ฮพ, ฮธy (ฮพ))ฮฝโˆž (ฮพ)dฮพ ฮปdโˆ’1 (dy). (56) Cy In addition, one has Z Gbn (ฮพ, ฮธy (ฮพ)) G(ฮพ, ฮธy (ฮพ))ฮฝโˆž (ฮพ)dฮพ = Cy tโˆ’ (y) Z Gbn (ฮฆ(y, โˆ’t), t)G(ฮฆ(y, โˆ’t), t)ฮฝโˆž (ฮฆ(y, โˆ’t)) |โˆ‡t ฮฆ(y, โˆ’t)| dt. 0 As a consequence, under Assumptions 3.13, a conscientious calculus together with eq. (25) shows that Z Gbn (ฮพ, ฮธy (ฮพ)) G(ฮพ, ฮธy (ฮพ))ฮฝโˆž (ฮพ)dฮพ โˆ’ Cy Z Gbn (ฮพ, ฯ„x (ฮพ)) G(ฮพ, ฯ„x (ฮพ))ฮฝโˆž (ฮพ)dฮพ = O(|x โˆ’ y|). (57) Cx We obtain the expected result from (55), (56) and (57) and by remarking that the normalizing constant is ฮปdโˆ’1 (Dx,ฯ ). Remark C.1 In order to prove (57), one may split the integral of interest into two terms: an integral between 0 and tโˆ’ (x)โˆงtโˆ’ (y) and a remainder term integrated between tโˆ’ (x)โˆงtโˆ’ (y) and tโˆ’ (x)โˆจtโˆ’ (y). The first one is clearly upper bounded by the integral of a Lipschitz function between 0 and tโˆ’ (x)+|xโˆ’y|[tโˆ’ ]Lip , thus bounded by an integral between 0 and tโˆ’ (x) + ฯ[tโˆ’ ]Lip . The second integral is obviously bounded by kGbn kโˆž kฮฝโˆž kโˆž kโˆ‡t ฮฆkโˆž [tโˆ’ ]Lip |x โˆ’ y|. References [1] Odd Olai Aalen. Statistical inference for a family of counting processes. ProQuest LLC, Ann Arbor, MI, 1975. Thesis (Ph.D.)โ€“University of California, Berkeley. [2] Terje Aven and Uwe Jensen. Stochastic models in reliability, volume 41 of Applications of Mathematics (New York). Springer-Verlag, New York, 1999. [3] Romain Azaฤฑฬˆs. A recursive nonparametric estimator for the transition kernel of a piecewisedeterministic Markov process. ESAIM: Probability and Statistics, 18:726โ€“749, January 2014. [4] Romain Azaฤฑฬˆs, Francฬงois Dufour, and Anne Geฬgout-Petit. Nonparametric estimation of the jump rate for non-homogeneous marked renewal processes. Ann. Inst. H. Poincareฬ Probab. Statist., 49(4):1204โ€“ 1231, 11 2013. [5] Romain Azaฤฑฬˆs, Francฬงois Dufour, and Anne Geฬgout-Petit. Non-parametric estimation of the conditional distribution of the interjumping times for piecewise-deterministic markov processes. Scandinavian Journal of Statistics, 41(4):950โ€“969, 2014. [6] Romain Azaฤฑฬˆs and Alexandre Genadot. Semi-parametric inference for the absorption features of a growth-fragmentation model. TEST, 24(2):341โ€“360, 2015. 26 [7] Anis Ben Abdessalem, Romain Azaฤฑฬˆs, Marie Touzet-Cortina, Anne Geฬgout-Petit, and Monique Puiggali. Stochastic modelling and prediction of fatigue crack propagation using piecewise-deterministic markov processes. Accepted for publication in Journal of Risk and Reliability, 2016. [8] Patrice Bertail, Stephan Clemencฬงon, and Jessica Tressou. A storage model with random release rate for modelling exposure to food contaminants. Mathematical Bioscience and Engineering, 5(1):35โ€“60, 2008. [9] Patrice Bertail, Stephan Clemencฬงon, and Jessica Tressou. Statistical analysis of a dynamic model for dietary contaminant exposure. Journal of Biological Dynamics, 4(2):212โ€“234, 2010. [10] Adrien Brandejsky, Benoฤฑฬ‚te de Saporta, and Francฬงois Dufour. Numerical method for expectations of piecewise-determistic markov processes. CAMCoS, 7(1):63โ€“104, 2012. [11] Adrien Brandejsky, Benoฤฑฬ‚te De Saporta, and Francฬงois Dufour. Numerical methods for the exit time of a piecewise-deterministic markov process. Adv. in Appl. Probab., 44(1):196โ€“225, 03 2012. [12] Djalil Chafai, Florent Malrieu, and Katy Paroux. On the long time behavior of the TCP window size process. Stochastic Processes and their Applications, 120(8):1518โ€“1534, April 2010. [13] Julien Chiquet and Nikolaos Limnios. A method to compute the transition function of a piecewise deterministic Markov process with application to reliability. Statist. Probab. Lett., 78(12):1397โ€“1403, 2008. [14] Julien Chiquet, Nikolaos Limnios, and Mohamed Eid. Piecewise deterministic markov processes applied to fatigue crack growth modelling. Journal of Statistical Planning and Inference, 139(5):1657 โ€“ 1667, 2009. [15] Gerda Claeskens and Peter Hall. Effect of dependence on stochastic measures of accuracy of density estimations. The Annals of Statistics, 30(2):431โ€“454, 2002. [16] Alina Crudu, Arnaud Debussche, Aureฬlie Muller, Ovidiu Radulescu, et al. Convergence of stochastic gene networks to hybrid piecewise deterministic processes. The Annals of Applied Probability, 22(5):1822โ€“1859, 2012. [17] Mark H. A. Davis. Markov models and optimization, volume 49 of Monographs on Statistics and Applied Probability. Chapman & Hall, London, 1993. [18] Benoฤฑฬ‚te de Saporta, Francฬงois Dufour, Huilong Zhang, and Charles Elegbede. Optimal stopping for the predictive maintenance of a structure subject to corrosion. Journal of Risk and Reliability, 226 (2):169โ€“181, 2012. [19] Marie Doumic, Marc Hoffmann, Nathalie Krell, and Lydia Robert. Statistical estimation of a growth-fragmentation model observed on a genealogical tree. Bernoulli (to appear), 2015. [20] Marie Doumic, Marc Hoffmann, Patricia Reynaud-Bouret, and Vincent Rivoirard. Nonparametric estimation of the division rate of a size-structured population. SIAM Journal on Numerical Analysis, 50(2):925โ€“950, 2012. [21] Marie Duflo. Random iterative models. Applications of Mathematics. Springer-Verlag, Berlin, 1997. [22] Alexandre Genadot and Micheฬ€le Thieullen. Averaging for a fully coupled piecewise-deterministic markov process in infinite dimensions. Adv. in Appl. Probab., 44(3):749โ€“773, 09 2012. [23] Jeffrey D. Hart and Philippe Vieu. Data-driven bandwidth choice for density estimation based on dependent data. The Annals of Statistics, pages 873โ€“890, 1990. [24] Jianghai Hu, Wei-Chung Wu, and Shankar Sastry. Modeling subtilin production in bacillus subtilis using stochastic hybrid systems. In R. Alur and G.J. Pappas, editors, Hybrid Systems: Computation and Control , number 2993 in LNCS, Springer-Verlag, Berlin, 2004. [25] Martin Jacobsen. Point Process Theory and Applications: Marked Point and Piecewise Deterministic Processes. Probability and its Applications. Birkhaฬˆuser, Boston-Basel-Berlin, 2006. [26] Tae Yoon Kim. Asymptotically optimal bandwidth selection rules for the kernel density estimator with dependent observations. Journal of statistical planning and inference, 59(2):321โ€“336, 1997. [27] Tae Yoon Kim and Dennis D. Cox. Bandwidth selection in kernel smoothing of time series. Journal of Time Series Analysis, 17(1):49โ€“63, 1996. 27 [28] Nathalie Krell. Statistical estimation of jump rates for a specific class of piecewise deterministic markov processes. arXiv:1406.2845, March 2015. [29] Sean Meyn and Richard L. Tweedie. Markov chains and stochastic stability. Cambridge University Press, Cambridge, second edition, 2009. [30] N.R. Norris. Exploring the optimality of various bacterial motility strategies: a stochastic hybrid systems approach. PhD thesis, Massachusetts Institute of Technology, 2013. [31] H. G. Othmer, X. Xin, and C. Xue. Excitation and adaptation in bacteria. a model signal transduction system that controls taxis and spatial pattern formation. International journal of molecular sciences, 14(5):9205โ€“9248, 2013. [32] Ovidiu Radulescu, Aureฬlie Muller, and Alina Crudu. Theฬoreฬ€mes limites pour les processus de markov aฬ€ sauts. Technique et Science Informatiques, 26(3-4):443โ€“469, 2007. [33] Lydia Robert, Marc Hoffmann, Nathalie Krell, Stephane Aymerich, Jerome Robert, and Marie Doumic. Division in escherichia coli is triggered by a size-sensing rather than a timing mechanism. BMC Biology, 12(1):17, 2014. [34] M. J. Tindall, P. K. Maini, S. L. Porter, and J. P. Armitage. Overview of mathematical approaches used to model bacterial chemotaxis ii: bacterial populations. Bulletin of mathematical biology, 70(6):1570โ€“1607, 2008. [35] D. Virkler, B. Hillberry, and P. Goel. The statistical nature of fatigue crack propagation. J Engng Mater Technol, 101(2):148 โ€“ 153, 1979. 28 1.0 0.6 0.0 0.2 0.4 First dimension 0.8 1.0 0.8 0.6 0.4 Second dimension 0.2 0.0 0.0 0.2 0.4 0.6 0.8 1.0 0 1 2 First dimension 3 4 5 6 Time on 0.6 1.0 0.5 0.2 Secon asure d dime nsion e iant m t dim ensi 1.5 0.2 Invar Firs Second dimension Figure 2: Two representations of the same simulated path of the TCP-like model of interest until the 10th jump. A vector field graph is given on the left, while we observe the trajectory of the first component versus time on the right. 0.4 0.6 0.8 First dimension Figure 3: Estimation of the invariant distribution of the post-jump locations computed from the 20 000 first jumps of the TCP-like model. 29 0.1 0.2 0.3 0.4 0.5 โˆ’0.2 โˆ’0.3 โˆ’0.4 โˆ’0.5 โˆ’0.7 โˆ’0.6 Estimated ISE (up to an additive constant) โˆ’0.6 โˆ’0.7 โˆ’0.9 โˆ’0.8 Estimated ISE (up to an additive constant) โˆ’0.5 โˆ’0.6 โˆ’0.7 โˆ’0.8 โˆ’0.9 โˆ’1.0 Estimated ISE (up to an additive constant) โˆ’1.1 0.0 0.0 Parameter ฮฑ 0.1 0.2 0.3 0.4 0.5 0.0 0.1 Parameter ฮฑ 0.2 0.3 0.4 0.5 Parameter ฮฑ 1.5 0.5 1.0 Estimated ฮบ criterion 1.2 1.0 0.8 0.6 0.4 Estimated ฮบ criterion 1.4 2.0 Figure 4: The choice of the bandwidth parameter ฮฑ appearing in the criterion ฮบ bnx is obtained by minimizing the cross-validation estimate ฮตbฮบn,en,ฯ (ฮฑ) of the related ISE. The parameter ฯ seems to have only a small influence over the minimization: the estimated error is computed from ฯ = 0.005, ฯ = 0.01 and ฯ = 0.02 from left to right. 0.1 0.2 0.3 0.4 0.5 0.6 0.05 0.7 0.15 0.25 0.35 0.45 0.55 0.65 0.75 Deterministic path Deterministic path Figure 5: The optimal index ฮพbโˆ—n is calculated by maximizing the criterion ฮบ bnx (ฮพ), ฮพ โˆˆ Cx , computed with the optimal parameter ฮฑ. On the left side of the figure, we compare the estimate ฮบ bnx (ฮพ) (full line) with n ฮฝbโˆž (ฮพ)G(ฮพ, ฯ„x (ฮพ)) (dashed line) both computed from ฮฑ = 0.1, which confirms that the estimation performs pretty well. This quantity seems to admit one and only one absolute maximum. 30 6 5 4 3 2 Estimated ฮบ criterion 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 Deterministic path ha alp 0.25 โˆ’3.20 โˆ’3.25 โˆ’3.30 โˆ’3.35 โˆ’3.40 โˆ’3.45 โˆ’3.50 0.15 Parameter ฮฒ ISE ta be 0.35 Figure 6: The parameter ฮฑ plays a crucial role in the estimation of ฮบ bnx . We compare here the curves computed from ฮฑ = 0.1 and already presented in Figure 5 (full and dashed lines) with the too oscillating estimate obtained from ฮฑ = 0.4 (dotted line). 0.10 0.12 0.14 0.16 0.18 0.20 Parameter ฮฑ Figure 7: The optimal bandwidth parameters ฮฑ and ฮฒ implicitly appearing in Fbn (ฮพ, ฯ„x (ฮพ)), ฮพ โˆˆ Cx , are obtained by minimizing the cross-validation estimate ฮตbFn,en,ฯ1 ,ฯ2 (ฮฑ, ฮฒ), computed from ฯ1 = ฯ2 = 0.1 here, of the related ISE. The parameter ฮฒ seems to have only little influence over the estimation error in comparison to ฮฑ. 31 3.0 2.5 2.0 1.5 1.0 Estimation of ฮป(0.75,0.5) 0.5 0.0 0.05 0.15 0.25 0.35 0.45 0.55 0.65 0.75 Deterministic path 0.0 โˆ’1.0 x2 1.0 bn (x) is computed from different values of the index ฮพ โˆˆ Cx , and from the optimal Figure 8: The estimator ฮป ฮพ bandwidth parameters ฮฑG and (ฮฑF , ฮฒ F ). Over the 100 replicates, the optimal points ฮพbโˆ—n are most of the time located at 0.55 and more than 90 times between 0.5 and 0.6 (enhanced by gray colors), which seems to correspond with the estimators with least bias and variance. In particular, we obtain a better result than n (index around 0.35), see Remark 3.11. by maximizing the estimated invariant measure ฮฝbโˆž โˆ’1.0 โˆ’0.5 0.0 0.5 1.0 x1 Figure 9: Simulated trajectory of the bacteria in the unit disk until the 100th jump. 32 1.5 0.5 Estimated jump rate 1 2 3 4 5 6 7 8 9 bn (xฮธ ) for ฮธ Figure 10: For each of the 9 target points (x1 , x2 ), the boxplot of the optimal estimators ฮป ฮพbn (ฮธ) โˆ— 1.05 0.95 1.02 0.95 1.07 0.96 1.06 โˆ’1.0 โˆ’0.5 0.0 0.5 1.4 1.0 1.03 0.6 0.0 1.06 โˆ’1.0 x2 1.0 Estimated jump rate taken in a uniform discretized grid of [0, 2ฯ€] with step ฯ€/8 is presented. The black thick lines in the boxplots b 1 , x2 ) defined in (30), while the dashed line represents the true correspond to the aggregated estimate ฮป(x jump rate. 1.0 x1 b 1 , x2 ) have been Figure 11: For each of the 9 target points, the curve Cx1 ,x2 as well as the estimate ฮป(x computed from n = 100 000 observed data and are provided (left). The boxplot of these 9 estimates is also given (right) and presents no bias and a small dispersion. 33 0.98 0.96 1.2 1.1 1.43 โˆ’1.0 โˆ’0.5 0.0 0.5 1.4 1.24 1.0 1.4 0.6 Estimated jump rate 1.0 0.0 0.98 โˆ’1.0 x2 1.37 1.0 1.24 0.98 0.96 1.2 1.1 1.43 โˆ’1.0 โˆ’0.5 0.0 0.5 1.4 1.4 1.0 0.98 0.6 0.0 1.37 โˆ’1.0 x2 1.0 Estimated jump rate x1 1.0 x1 1.4 1.0 0.6 Estimated jump rate b 1 , x2 ) have been Figure 12: For each of the 9 target points, the curve Cx1 ,x2 as well as the estimate ฮป(x computed from n = 20 000 (top) and n = 50 000 (bottom) observed data and are provided (left). The boxplots of these 9 estimates are also given in both cases (right). n=100 000 n=50 000 n=20 000 2 4 6 8 b 1 , x2 ) Figure 13: For each of the 9 target point (x1 , x2 ) indexed from 1 to 9, estimated jump rates ฮป(x computed from different datasets. 34 1.4 1.0 0.6 Estimated jump rate n=20000 n=50000 n=100000 30 20 0 10 Crack length (mm) 40 50 b 1 , x2 ) computed from datasets of different sizes. Figure 14: Boxplots of the 9 estimated jump rates ฮป(x 0 50000 100000 200000 300000 Time (number of cycles) โˆ’25 โˆ’26 โˆ’27 โˆ’28 Parameter log(C) โˆ’24 โˆ’23 Figure 15: Virklerโ€™s dataset contains 68 independent crack growth histories starting from a0 = 9 mm. 2.4 2.6 2.8 3.0 3.2 Parameter m Figure 16: Material parameters m and log(C) are strongly linked by a linear relationship used to reduce the dimension of the underlying model: log(C) = โˆ’9.25 โˆ’ 5.89 ร— m + ฮต. 35 0.8 0.7 0.6 0.5 0.3 0.4 Estimated criterion at 35mm 0.9 1.0 1.4 1.2 1.0 0.8 Estimated criterion at 25mm 0.6 2.4 2.6 2.8 3.0 3.2 2.4 2.6 2.8 3.0 3.2 40 45 2.95 2.90 2.80 2.85 0.15 0.20 0.25 Best parameter m in the estimation 0.30 Parameter m 0.10 Estimated criterion at 45mm Parameter m 2.4 2.6 2.8 3.0 3.2 25 30 Parameter m 35 Crack length 8eโˆ’05 6eโˆ’05 4eโˆ’05 2eโˆ’05 0e+00 Jump rate to unstable region Figure 17: Estimation of the criterion ฮบa (m) for different values of the target length a: a = 25 mm (top, left), a = 35 mm (top, right) and a = 45 mm (bottom, left). The relationship between the optimal parameter m maximizing ฮบa (m) and the target crack length a is also presented (bottom, right). 25 30 35 40 45 Crack length (mm) Figure 18: Estimation of the jump rate ฮป(a) for different crack lengths a between 25 mm and 45 mm in the stochastic model of fatigue crack propagation from Virklerโ€™s dataset. 36
10math.ST
Classification of Major Depressive Disorder via Multi-Site Weighted LASSO Model Dajiang Zhu1, Brandalyn C. Riedel1, Neda Jahanshad1, Nynke A. Groenewold2,3, Dan J. Stein3, Ian H. Gotlib4, Matthew D. Sacchet5, Danai Dima6,7, James H. Cole8, Cynthia H.Y. Fu9, Henrik Walter10, Ilya M. Veer11, Thomas Frodl11,12, Lianne Schmaal13.14,15, Dick J. Veltman15, Paul M. Thompson1 1 Imaging Genetics Center, USC Stevens Neuroimaging and Informatics Institute, Keck School of Medicine of the University of Southern California, CA, USA; 2 BCN NeuroImaging Center and Department of Neuroscience of the University of Groningen, University Medical Center Groningen, The Netherlands; 3 Dept of Psychiatry and Mental Health, University of Cape Town, South Africa; 4 Neurosciences Program and Department of Psychology, Stanford University, CA, USA; 5 Department of Psychiatry and Behavioral Sciences, Stanford University, CA, USA; 6 Dept of Neuroimaging, Institute of Psychiatry, Psychology and Neuroscience, Kingโ€™s College London, UK; 7 Dept of Psychology, School of Arts and Social Science, City, University of London, UK; 8 Department of Medicine, Imperial College London, UK; 9 Department of Psychological Medicine, Kingโ€™s College London, UK; 10 Dept of Psychiatry and Psychotherapy, Charitรฉ Universitรคtsmedizin Berlin, Germany; 11 Department of Psychiatry, Trinity College Dublin, Ireland; 12 Dept of Psychiatry and Psychotherapy, Otto von Guericke University Magdeburg, Germany; 13 Dept of Psychiatry and Neuroscience Campus Amsterdam, VU University Medical Center, The Netherlands; 14 Orygen, The National Centre of Excellence in Youth Mental Health, Australia; 15 Center for Youth Mental Health, The University of Melbourne, Australia Abstract. Large-scale collaborative analysis of brain imaging data, in psychiatry and neurology, offers a new source of statistical power to discover features that boost accuracy in disease classification, differential diagnosis, and outcome prediction. However, due to data privacy regulations or limited accessibility to large datasets across the world, it is challenging to efficiently integrate distributed information. Here we propose a novel classification framework through multi-site weighted LASSO: each site performs an iterative weighted LASSO for feature selection separately. Within each iteration, the classification result and the selected features are collected to update the weighting parameters for each feature. This new weight is used to guide the LASSO process at the next iteration. Only the features that help to improve the classification accuracy are preserved. In tests on data from five sites (299 patients with major depressive disorder (MDD) and 258 normal controls), our method boosted classification accuracy for MDD by 4.9% on average. This result shows the potential of the proposed new strategy as an effective and practical collaborative platform for machine learning on large scale distributed imaging and biobank data. Keywords: MDD, weighted LASSO 1 Introduction Major depressive disorder (MDD) affects over 350 million people worldwide [1] and takes an immense personal toll on patients and their families, placing a vast economic burden on society. MDD involves a wide spectrum of symptoms, varying risk factors, and varying response to treatment [2]. Unfortunately, early diagnosis of MDD is challenging and is based on behavioral criteria; consistent structural and functional brain abnormalities in MDD are just beginning to be understood. Neuroimaging of large cohorts can identify characteristic correlates of depression, and may also help to detect modulatory effects of interventions, and environmental and genetic risk factors. Recent advances in brain imaging, such as magnetic resonance imaging (MRI) and its variants, allow researchers to investigate brain abnormalities and identify statistical factors that influence them, and how they relate to diagnosis and outcomes [12]. Researchers have reported brain structural and functional alterations in MDD using different modalities of MRI. Recently, the ENIGMA-MDD Working Group found that adults with MDD have thinner cortical gray matter in the orbitofrontal cortices, insula, anterior/posterior cingulate and temporal lobes compared to healthy adults without a diagnosis of MDD [3]. A subcortical study โ€“ the largest to date โ€“ showed that MDD patients tend to have smaller hippocampal volumes than controls [4]. Diffusion tensor imaging (DTI) [5] reveals, on average, lower fractional anisotropy in the frontal lobe and right occipital lobe of MDD patients. MDD patients may also show aberrant functional connectivity in the default mode network (DMN) and other task-related functional brain networks [6]. Fig. 1. Overview of our proposed framework. Even so, classification of MDD is still challenging. There are three major barriers: first, though significant differences have been found, these previously identified brain regions or brain measures are not always consistent markers for MDD classification [7]; second, besides T1 imaging, other modalities including DTI and functional magnetic resonance imaging (fMRI) are not commonly acquired in a clinical setting; last, it is not always easy for collaborating medical centers to perform an integrated data analysis due to data privacy regulations that limit the exchange of individual raw data and due to large transfer times and storage requirements for thousands of images. As biobanks grow, we need an efficient platform to integrate predictive information from multiple centers; as the available datasets increase, this effort should increase the statistical power to identify predictors of disease diagnosis and future outcomes, beyond what each site could identify on its own. In this study, we introduce a multi-site weighted LASSO (MSW-LASSO) model to boost classification performance for each individual participating site, by integrating their knowledge for feature selection and results from classification. As shown in Fig. 1, our proposed framework features the following characteristics: (1) each site retains their own data and performs weighted LASSO regression, for feature selection, locally; (2) only the selected brain measures and the classification results are shared to other sites; (3) information on the selected brain measures and the corresponding classification results are integrated to generate a unified weight vector across features; this is then sent to each site. This weight vector will be applied to the weighted LASSO in the next iteration; (4) if the new weight vector leads to a new set of brain measures and better classification performance, the new set of brain measures will be sent to other sites. Otherwise, it is discarded and the old one is recovered. 2 Methods 2.1 Data and demographics For this study, we used data from five sites across the world. The total number of participants is 557; all of them were older than 21 years old. Demographic information for each siteโ€™s participants is summarized in Table 1. Sites 1 2 3 4 5 Total Total N of Total N of Age of Controls N MDD Controls (%) (Mean ยฑ SD; y) patients (%) Groningen 45 22 (48.89%) 23 (51.11%) 42.78 ยฑ 14.36 38.17 ยฑ 9.97 Stanford 110 54 (49.09%) 56 (50.91) 51.72 ยฑ 7.94 BRCDECC 130 69 (53.08%) 61 (46.92%) 172 101 (58.72%) 71 (41.28%) 41.09 ยฑ 12.85 Berlin 100 53 (53%) 47 (47%) 38.49 ยฑ 12.37 Dublin Combined 557 299 (53.68%) 258 (46.32$) Age of MDD (Mean ยฑ SD; y) 43.14 ยฑ 13.8 37.75 ยฑ 9.78 47.85 ยฑ 8.91 41.21 ยฑ 11.82 41.81 ยฑ 10.76 % Female MDD 72.73 57.41 68.12 64.36 62.26 % Female Total 73.33 60.00 60.77 60.47 57.00 Table 1. Demographics for the five sites participating in the current study. 2.2 Data preprocessing As in most common clinical settings, only T1-weighted MRI brain scans were acquired at each site; quality control and analyses were performed locally. Sixty-eight (34 left/34 right) cortical gray matter regions, 7 subcortical gray matter regions and the lateral ventricles were segmented with FreeSurfer [8]. Detailed image acquisition, pre-processing, brain segmentation and quality control methods may be found in [3, 9]. Brain measures include cortical thickness and surface area for cortical regions and volume for subcortical regions and lateral ventricles. In total, 152 brain measures were considered in this study. 2.3 Algorithm overview To better illustrate the algorithms, we define the following notations: 1. ๐น๐‘– : The selected brain measures (features) of Site-i; 2. ๐ด๐‘– : The classification performance of Site-i; 3. W: The weight vector; 4. w-LASSO (W, ๐ท๐‘– ): Performing weighted LASSO on ๐ท๐‘– with weight vector โ€“ W; 5. SVM (๐น๐‘– , ๐ท๐‘– ): Performing SVM classifier on ๐ท๐‘– using the feature set - ๐น๐‘– ; The algorithms have two parts that are run at each site, and an integration server. At first, the integration server initializes a weight vector with all ones and sends it to all sites. Each site use this weight vector to conduct weighted LASSO (Section 2.6) with their own data locally. If the selected features have better classification performance, it will send the new features and the corresponding classification result to the integration server. If there is no improvement in classification accuracy, it will send the old ones. After the integration server receives the updates from all sites, it generates a new weight vector (Section 2.5) according to different feature sets and their classification performance. The detailed strategy is discussed in Section 2.5. Algorithm 1 (Integration Server) Initialize W (with all features weighted as one) Send W to all sites while at least one site has improvement on A update W (Section 2.5) Send W to all sites end while Send W with null to all sites 1. 2. 3. 4. 5. 6. 7. Table 2. Main steps of Algorithm 1. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Algorithm 2 (Site-i) ๐น๐‘– โ† โˆ…, ๐ด๐‘– โ† 0 while received W is not null ๐น๐‘–โ€ฒ โ† w-LASSO (W, ๐ท๐‘– ) (Section 2.6) if ๐น๐‘–โ€ฒ โ‰  ๐น๐‘– ๐ดโ€ฒ๐‘– โ† SVM (๐น๐‘–โ€ฒ, ๐ท๐‘– ) if ๐ดโ€ฒ๐‘– > ๐ด๐‘– send ๐น๐‘–โ€ฒ and ๐ดโ€ฒ๐‘– to Integration Server ๐น๐‘– โ† ๐น๐‘–โ€ฒ, ๐ด๐‘– โ† ๐ดโ€ฒ๐‘– else send ๐น๐‘– and ๐ด๐‘– to Integration Server end if end if end while Table 3. Main steps of Algorithm 2. 2.4 Ordinary LASSO and weighted LASSO LASSO [11] is a shrinkage method for linear regression. The ordinary LASSO is defined as: ฮฒฬ‚(LASSO) = arg min โ€–y โˆ’ โˆ‘ni=1 xi ฮฒi โ€–2 + ฮปโˆ‘ni=1|ฮฒi | (1) Y and x are the observations and predictors. ฮป is known as the sparsity parameter. It minimizes the sum of squared errors while penalizing the sum of the absolute values of the coefficients - ฮฒ. As LASSO regression will force many coefficients to be zero, it is widely used for variable selection [11]. However, the classical LASSO shrinkage procedure might be biased when estimating large coefficients [12]. To alleviate this risk, adaptive LASSO [12] was developed and it tends to assign each predictor with different penalty parameters. Thus it can avoid having larger coefficients penalized more heavily than small coefficients. Similarly, the motivation of multi-site weighted LASSO (MSW-LASSO) is to penalize different predictors (brain measures), by assigning different weights, according to its classification performance across all sites. Generating the weights for each brain measure (feature) and the MSW-LASSO model are discussed in Section 2.5 and 2.6. 2.5 Generation of a Multi-Site Weight In Algorithm 1, after the integration server receives the information on selected features (brain measures) and the corresponding classification performance of each site, it generates a new weight for each feature. The new weight for the ๐‘“ ๐‘กโ„Ž feature is: ๐‘Š๐‘“ = โˆ‘๐‘š ๐‘ =1 ๐›น๐‘ ,๐‘“ ๐ด๐‘  ๐‘ƒ๐‘  โ„๐‘š (2) 1, ๐‘–๐‘“ the ๐‘“ ๐‘กโ„Ž feature was selected in site โˆ’ s ๐›น๐‘ ,๐‘“ = { 0, ๐‘œ๐‘กโ„Ž๐‘’๐‘Ÿ๐‘ค๐‘–๐‘ ๐‘’ (3) Here m is the number of sites. ๐ด๐‘  is the classification accuracy of site-s. ๐‘ƒ๐‘  is the proportion of participants in site-s relative to the total number of participants at all sites. Eq. (3) penalizes the features that only โ€œsurvivedโ€ in a small number of sites. On the contrary, if a specific feature was selected by all sites, meaning all sites agree that this feature is important, it tends to have a larger weight. In Eq. (2) we consider both the classification performance and the proportion of samples. If a site has achieved very high classification accuracy and it has a relatively small sample size compared to other sites, the features selected will be conservatively โ€œrecommendedโ€ to other sites. In general, if the feature was selected by more sites and resulted in higher classification accuracy, it has larger weights. 2.6 Multi-Site weight LASSO In this section, we define the multi-site weighted LASSO (MSW-LASSO) model: ฮฒฬ‚MSWโˆ’Lasso = arg min โ€–y โˆ’ โˆ‘ni=1 xi ฮฒi โ€–2 + ฮปโˆ‘ni=1(1 โˆ’ โˆ‘๐‘š ๐‘ =1 ๐›น๐‘ ,๐‘– ๐ด๐‘  ๐‘ƒ๐‘  โ„๐‘š )|ฮฒi | (4) Here xi represents the MRI measures after controlling the effects of age, sex and intracranial volume (ICV), which are managed within different sites. y is the label indicating MDD patient or control. n is the 152 brain measures (features) in this study. In our MSW-LASSO model, a feature with larger weights implies higher classification performance and/or recognition by multiple sites. Hence it will be penalized less and has a greater chance of being selected by the sites that did not consider this feature in the previous iteration. 3 Results 3.1 Classification improvements through the MSW-LASSO model In this study, we applied Algorithm 1 and Algorithm 2 on data from five sites across the world. In the first iteration, the integration server initialized a weight vector with all ones and sent it to all sites. Therefore, these five sites conducted regular LASSO regression in the first round. After a small set of features was selected using similar strategy in [9] within each site, they performed classification locally using a support vector machine (SVM) and shared the best classification accuracy to the integration server, as well as the set of selected features. Then the integration server generated the new weight according to Eq. (2) and sent it back to all sites. From the second iteration, each site performed MSW-LASSO until none of them has improvement on the classification result. In total, these five sites ran MSW-LASSO for six iterations; the classification performance for each round is summarized in Fig. 2 (a-e). Fig. 2. Applying MSW-LASSO to the data coming from five sites (a-e). Each subfigure shows the classification accuracy (ACC), specificity (SPE) and sensitivity (SEN) at each iteration. (f) shows the improvement in classification accuracy at each site after performing MSW-LASSO. Though the Stanford and Berlin sites did not show any improvements after the second iteration, the classification performance at the BRCDECC site and Dublin continued improving until the sixth iteration. Hence our MSW-LASSO terminated at the sixth round. Fig. 2f shows the improvements of classification accuracy for all five sites the average improvement is 4.9%. The sparsity level of the LASSO is set as 16% which means that 16% of 152 features tend to be selected in the LASSO process. Section 3.3 shows the reproducibility of results with different sparsity levels. When conducing SVM classification, the same kernel (RBF) was used, and we performed a grid search for possible parameters. Only the best classification results are adopted. 3.2 Analysis of MSW-LASSO features In the process of MSW-LASSO, only the new set of features resulting in improvements in classification are accepted. Otherwise, the prior set of features is preserved. The new features are also โ€œrecommendedโ€ to other sites by increasing the correspond- ing weights of the new features. Fig. 3 displays the changes of the involved features through six iterations and the top 5 features selected by the majority of sites. Fig. 3. (a) Number of involved features through six iterations. (b-f) The top five consistently selected features across sites. Within each subfigure, the top showed the locations of the corresponding features and the bottom indicated how many sites selected this feature through the MSW-LASSO process. (b-c) are cortical thickness and (d-f) are surface area measures. At the first iteration, there are 88 features selected by five sites. This number decreases over MSW-LASSO iterations. Only 73 features are preserved after six iterations but the average classification accuracy increased by 4.9%. Moreover, if a feature is originally selected by the majority of sites, it tends to be continually selected after multiple iterations (Fig. 3d-e). For those โ€œpromisingโ€ features that are accepted by fewer sites at first, they might be incorporated by more sites as the iteration increased (Fig. 2b-c, f). 3.3 Reproducibility of the MSW-LASSO Selected Improvement, in % Selected Improvement, in % Features ACC SPE SEN features ACC SPE SEN 3.1 1.8 4.4 2.6 3.1 2.5 13% 33% 3.9 1.4 6.0 1.7 2.1 1.5 20% 36% 3.8 2.9 4.4 2.5 4.1 1.4 23% 40% 4.3 3.4 5.2 3.1 1.1 5.0 26% 43% 2.9 3.0 2.9 2.8 3.9 1.9 30% 46% Table 4. Reproducibility results with different sparsity levels. The column of selected features represents the percentage of features preserved during the LASSO procedure, and the average improvement in accuracy, sensitivity, and specificity by sparsity. For LASSO-related problems, there is no closed-form solution for the selection of sparsity level; this is highly data dependent. To validate our MSW-LASSO model, we repeated Algorithm 1 and Algorithm 2 at different sparsity levels, which leads to preservation of different proportions of the features. The reproducibility performance of our proposed MSW-LASSO is summarized in Table 4. 4 Conclusion and Discussion Here we proposed a novel multi-site weighted LASSO model to heuristically improve classification performance for multiple sites. By sharing the knowledge of features that might help to improve classification accuracy with other sites, each site has multiple opportunities to reconsider its own set of selected features and strive to increase the accuracy at each iteration. In this study, the average improvement in classification accuracy is 4.9% for five sites. We offer a proof of concept for distributed machine learning that may be scaled up to other disorders, modalities, and feature sets. 5 References 1. World Health Organization. World Health Organization Depression Fact sheet, No. 369. (2012). Available from: http://www.who.int/mediacentre/factsheets/fs369/en/. 2. Fried, E.I., et al. "Depression is more than the sum score of its parts: individual DSM symptoms have different risk factors." Psych Med. 2067-2076 (2014). 3. Schmaal, L., et al. "Cortical abnormalities in adults and adolescents with major depression based on brain scans from 20 cohorts worldwide in the ENIGMA Major Depressive Disorder Working Group." Mol Psych. doi: 10.1038/mp.2016.60 (2016). 4. Schmaal, L., et al. "Subcortical brain alterations in major depressive disorder: findings from the ENIGMA Major Depressive Disorder working group." Mol Psych 806-812 (2016). 5. Liao, Y., et al. "Is depression a disconnection syndrome? Meta-analysis of diffusion tensor imaging studies in patients with MDD." J Psych & Neurosci. 49 (2013). 6. Sambataro, F., et al. "Revisiting default mode network function in major depression: evidence for disrupted subsystem connectivity." Psychl Med. 2041-2051 (2014). 7. Lo, A., et al. "Why significant variables arenโ€™t automatically good predictors." PNAS. 13892-13897 (2015). 8. https://surfer.nmr.mgh.harvard.edu/ 9. Zhu, D., et al. Large-scale classification of major depressive disorder via distributed Lasso. Proc. of SPIE, 10160 (2017). 10. Tibshirani, R., โ€œRegression shrinkage and selection via the LASSO.โ€ Journal of the Royal Statistical Society. 58: 267โ€“288 (1996). 11. Li, Qingyang, et al., "Large-Scale Collaborative Imaging Genetics Studies of Risk Genetic Factors for Alzheimerโ€™s Disease Across Multiple Institutions." MICCAI. 335-343 (2016). 12. Zou, H., โ€œThe adaptive LASSO and its oracle properties.โ€ J. Amer. Statist. Assoc 101(476):1418-1429 (2006). 13. Koutsouleris, N., et al. Individualized differential diagnosis of schizophrenia and mood disorders using neuroanatomical biomarkers. Brain, 138(7), 2059-2073 (2015). * * Supported in part by NIH grant U54 EB020403; see ref. 3 for additional support to coauthors for cohort recruitment.
5cs.CE
A CRITERION FOR I-ADIC COMPLETENESS arXiv:1312.3908v1 [math.AC] 13 Dec 2013 PETER SCHENZEL A BSTRACT. Let I denote an ideal in a commutative Noetherian ring R. Let M be an R-module. The I-adic completion is defined by Mฬ‚ I = lim ฮฑ M/I ฮฑ M. Then M is called I-adic complete โ†โˆ’ whenever the natural homomorphism M โ†’ Mฬ‚ I is an isomorphism. Let M be I-separated, i.e. โˆฉฮฑ I ฮฑ M = 0. In the main result of the paper it is shown that M is I-adic complete if and only if Ext1R ( F, M ) = 0 for the flat test module F = โŠ•ri=1 R xi where { x1 , . . . , xr } is a system of elements such that Rad I = Rad xR. This result extends several known statements starting with C. U. Jensenโ€™s result (see [9, Proposition 3]) that a finitely generated R-module M over a local ring R is complete if and only if Ext1R ( F, M ) = 0 for any flat R-module F. 1. I NTRODUCTION Let R denote a commutative Noetherian ring. For an ideal I โŠ‚ R we consider the I-adic completion. For an R-module M it is defined by lim ฮฑ M/I ฮฑ M = Mฬ‚ I . In the case of ( R, m) โ†โˆ’ a local ring and a finitely generated R-module M it was shown (see [13]) that the following conditions are equivalent: (i) M is m-adic complete. (ii) Ext1R ( F, M ) = 0 for any flat R-module F. (iii) Ext1R ( F, M ) = 0 for F = โŠ•ri=1 R xi , where x1 , . . . , xr โˆˆ m are elements that generate an m-primary ideal. Here R x denotes the localization of R with respect to { xฮฑ |ฮฑ โˆˆ N โ‰ฅ0 }. This is an extension (in the local case) of a result of C. U. Jensen (see [9, Proposition 3]) who proved the equivalence of the first two conditions. The main result of the present paper is an extension to the case of I-adic completion. More precisely we prove the following result: Theorem 1.1. Let I be an ideal of a commutative Noetherian ring R. Let M denote an arbitrary Rmodule that is I-separated, i.e. โˆฉฮฑ I ฮฑ M = 0. Then the following conditions are equivalent: (i) (ii) (iii) (iv) M is I-adic complete. ExtiR ( F, M ) = 0 for all i โ‰ฅ 0 and any flat R-module F with F โŠ— R R/I = 0. Ext1R ( R x , M ) = 0 for all elements x โˆˆ I. Ext1R (โŠ•ri=0 R xi , M ) = 0 for a system of elements x = { x1 , . . . , xr } such that Rad xR = Rad I. Note that in his paper (see [9, Proposition 3]) C. U. Jensen proved the following: Let R denote a semi local ring and M a finitely generated R-module. Then M is complete if and only if Ext1R ( F, M ) = 0 for all flat (resp. countably generated flat) R-modules F. A different proof for the vanishing of ExtiR ( F, M ) for all i โ‰ฅ 1, all flat R-modules and M a complete R-module follows by results of R.-O. Buchweitz and H. Flenner (see [5, Theorem 2]). 2010 Mathematics Subject Classification. Primary: 13J10 ; Secondary: 13C11, 13D07. Key words and phrases. adic completion, flat module, Ext. 1 2 PETER SCHENZEL Moreover another criterion for I-adic completeness was shown by A. Frankild and S. SatherWagstaff. Let I โŠ‚ R an ideal contained in the Jacobson radical of R. Let M be a finitely generated R-module. In their paper (see [7]) they proved that M is I-adically complete if and only if ExtiR ( Rฬ‚ I , M ) = 0 for all 1 โ‰ค i โ‰ค dimR M, where Rฬ‚ I denotes the I-adic completion of R. Whence, the main result of the present paper is the construction of a simple flat test module F for the completeness of M in the I-adic topology in terms of the vanishing of Ext1R ( F, M ). This generalizes the case of the maximal ideal proved in [13]. Instead of Matlis Duality used in [13] (not available in the case of I-adic topology) here we use some homological techniques. 2. P RELIMINARY R ESULTS In the following R denotes a commutative Noetherian ring. For an ideal I โŠ‚ R we consider the I-adic completion. For an R-module M it is defined by lim ฮฑ M/I ฮฑ M = Mฬ‚ I . We say that M โ†โˆ’ I : M โ†’ Mฬ‚ I (induced by is I-adically complete whenever the natural homomorphism ฯ„ = ฯ„M ฮฑ the natural surjections M โ†’ M/I M) is an isomorphism. It implies that M is I-separated, i.e. โˆฉฮฑ I ฮฑ M = 0. We begin with a few preparatory results needed later on. Proposition 2.1. Let I โŠ‚ R denote an ideal. Let M denote an R-module such that M โŠ— R R/I = 0. Then M โŠ— R X = 0 for any R-module X with SuppR X โІ V ( I ). Proof. The assumption M โŠ— R R/I = 0 implies that M = I ฮฑ M for all ฮฑ โ‰ฅ 1, or in other words M โŠ— R R/I ฮฑ = 0. First of all let X be a finitely generated R-module. Then I ฮฑ X = 0 for a certain ฮฑ โˆˆ N. Therefore M โŠ— R X = M โŠ— R X/I ฮฑ X = ( M โŠ— R R/I ฮฑ ) โŠ— R X = 0. If X is not necessarily a finitely generated R-module, then X โ‰ƒ lim Xฮฑ for a direct system of โˆ’โ†’ finitely generated submodules Xฮฑ โŠ‚ X ordered by inclusions. Whence SuppR Xฮฑ โІ V ( I ) and M โŠ— R X = lim( M โŠ— R Xฮฑ ) = 0, โˆ’โ†’ as required.  Let I โŠ‚ R denote an ideal. For an R-module X the left derived functors ฮ›iI ( X ), i โˆˆ Z, are defined by Hi (lim ฮฑ ( R/I ฮฑ โŠ— R Fยท )), where Fยท denotes a flat resolution of X. The functors โˆ’โ†’ ฮ›iI (ยท) were first systematically studied by Greenlees and May (see [8]) and by A.-M. Simon (see [14]) and more recently in [1] and [11]. Note that there is a natural surjective homomorphism ฮ›0I ( X ) โ†’ Xฬ‚ I . Since R is Noetherian it follows that M/I ฮฑ M โ‰ƒ Mฬ‚ I /I ฮฑ Mฬ‚ I for all ฮฑ โ‰ฅ 1 for any R-module M (see [16, Section 2.2]). Whence the completion Mฬ‚ I is I-adically complete. In the following we will discuss the assumption on the R-module M in Proposition 2.1. It provides a certain kind of a Nakayama Lemma. Its proof is known (see [14, 5.1] and also [15, 1.3, Lemma (ii)]). Here we add these arguments. Proposition 2.2. Let I denote an ideal in a commutative Noetherian ring R. Let M denote an arbitrary R-module. Then M โŠ— R R/I = 0 if and only if Mฬ‚ I = 0 and if and only if ฮ›0I ( M ) = 0. Proof. If M โŠ— R R/I = 0, then M/I ฮฑ M = 0 for all ฮฑ โ‰ฅ 1 and Mฬ‚ I = lim ฮฑ M/I ฮฑ M = 0. Conโ†โˆ’ versely, suppose that Mฬ‚ I = 0. Then 0 = Mฬ‚ I /I Mฬ‚ I โ‰ƒ M/I M, as required. If ฮ›0I ( M ) = 0, then clearly Mฬ‚ I = 0. Let F1 โ†’ F0 โ†’ M โ†’ 0 denote a free presentation of M. If ฮ›0I ( M ) = 0, then  Fฬ‚1I โ†’ Fฬ‚0I is onto. Therefore F1 /IF1 โ†’ F0 /IF0 is onto too, i.e. M/I M = 0 as required. A CRITERION FOR I-ADIC COMPLETENESS 3 In the following let x = { x1 , . . . , xr } denote a system of elements of R such that Rad xR = Rad I. Then we consider the CฬŒech complex CฬŒx of the system x (see e.g. [11, Section 3]). Note that this is the same as the complex Kโˆž ( x) introduced in [1] as the direct limit of the Koszul complexes Kยท ( xn ). There is a natural morphism CฬŒx โ†’ R. In our context the importance of the CฬŒech complex is the following result. It allows the expression of the right derived functors ฮ›iI (ยท) in different terms. Theorem 2.3. Let I โŠ‚ R denote an ideal of a commutative Noetherian ring R. Let M denote an R-module. Then there are natural isomorphisms ฮ›iI ( M ) โ‰ƒ Hi (HomR (CฬŒx , ER ( M )ยท )) for all i โˆˆ Z, where ER ( M )ยท denotes an injective resolution of M. Proof. This statement is one of the main results of [11, Section 4]. In the formulation here we do not use the technique of derived functors and derived categories. (For a more advanced exposition based on derived categories and derived functors the interested reader might also consult [1].)  Let us summarize a few basic results on completions used in the sequel. The following results are well-known. Proposition 2.4. Let J โŠ‚ I denote ideals of a commutative Noetherian ring. Let x = { x1 , . . . , xr } denote a system of elements of R. Let M denote an R-module. (a) Suppose that M is I-adic complete. Then it is also J-adic complete. (b) Suppose that Rad I = Rad xR. Assume that M is complete in the xi R-adic topology for i = 1, . . . , r and M is I-separated. Then M is I-adic complete. Proof. For the proof of (a) see [16, 2.2.6]. Let Mฬ‚ I denote the I-adic completion of M. Because the I-adic topology and the topology defined by {( x1ฮฑ , . . . , xrฮฑ ) R}ฮฑโ‰ฅ0 are equivalent it follows Mฬ‚ I โ‰ƒ lim ฮฑ M/( x1ฮฑ , . . . , xrฮฑ ) M. Therefore an element m โˆˆ Mฬ‚ I has the form m = โˆ‘ฮฑโ‰ฅ0 โˆ‘ri=1 xiฮฑ mฮฑ,i โ†โˆ’ with mฮฑ,i โˆˆ M. Since M is xi R-adically complete M โ‰ƒ lim ฮฑ M/xiฮฑ M and mi = โˆ‘ฮฑ xiฮฑ mฮฑ,i for โ†โˆ’ some mi โˆˆ M. Then mโ€ฒ = โˆ‘ri=1 mi โˆˆ M maps to m under ฯ„ : M โ†’ Mฬ‚ I . Because M is I-separated it is I-adically complete. This proves (b).  The following result is helpful in order to compute projective limits of Ext-modules. Here lim 1 denotes the first right derived functor of the projective limit (see [17]). โ†โˆ’ Let M denote an R-module and x โˆˆ R. We consider the following projective system { M, x}, x where Mฮฑ = M for all ฮฑ โˆˆ N and the transition map Mฮฑ+1 โ†’ Mฮฑ is the multiplication by x. Lemma 2.5. With the previous notation it follows that lim i { M, x} โ‰ƒ ExtiR ( R x , M ) for i = 0, 1 and ExtiR ( R x , M ) = 0 for all i โ‰ฅ 2. โ†โˆ’ If M is xR-separated, then lim { M, x} = HomR ( R x , M ) = 0. โ†โˆ’ Proof. Let { R, x} denote the direct system with Rฮฑ = R for all ฮฑ โˆˆ N and the transition map x Rฮฑ โ†’ Rฮฑ+1 is the multiplication by x. Then R x โ‰ƒ lim ฮฑ { R, x} as it is well known. Therefore, โˆ’โ†’ HomR ({ R, x}, M ) โ‰ƒ { M, x}. Now, by [12, Lemma 2.6] (see also Lemma 4.1) there are short exact sequences 0 โ†’ lim 1 {ExtiRโˆ’1 ( R, M ), x} โ†’ ExtiR ( R x , M ) โ†’ lim{ExtiR ( R, M ), x} โ†’ 0 โ†โˆ’ โ†โˆ’ for all i โˆˆ Z. Whence the results of the first part follow. If M is xR-separated, the vanishing of HomR ( R x , M ) is easy to see.  4 PETER SCHENZEL The previous result is a slight modification of Lemma [13, Lemma 2.7]. Remark 2.6. A morphism of two complexes X ยท โ†’ Y ยท of R-modules is called a quasi-isomorphism (or homology isomorphism) whenever the induced homomorphisms on the cohomology modules H i ( X ยท ) โ†’ H i (Y ยท ) are isomorphisms for all i โˆˆ Z. For the definitions of HomR ( X ยท , Y ยท ) and X ยท โŠ— R Y ยท we refer to [17] and [2]. For the details on homological algebra of complexes of modules we refer to [2]. 3. O N I- ADIC C OMPLETIONS Let I โŠ‚ R denote an ideal of a commutative Noetherian ring R. In the first main result we shall prove a vanishing result for a certain Ext-module for an I-adic complete R-module. Theorem 3.1. Let M denote an arbitrary R-module. Let F denote a flat R-module satisfying F โŠ— R R/I = 0. Then ExtiR ( F, Mฬ‚ I ) = 0 for all i โˆˆ Z. Proof. For the proof we use the techniques summarized in Theorem 2.3. To this end we fix a few notation. Let x = { x1 , . . . , xr } denote a system of elements of R such that Rad xR = Rad I. Let CฬŒx denote the CฬŒech complex with respect to x as defined in [11, Section 3]. It is a bounded complex of flat R-modules with a natural morphism CฬŒx โ†’ R of complexes. Let Eยท denote an injective resolution of Mฬ‚ I as an R-module. By applying HomR (ยท, Eยท ) it induces a morphism of complexes Eยท โ†’ HomR (CฬŒx , Eยท ). Next we investigate the complex HomR (CฬŒx , Eยท ). It is a left bounded complex of injective Rmodules. Moreover, by virtue of Theorem 2.3 it follows that ฮ›iI ( Mฬ‚ I ) โ‰ƒ Hi (HomR (CฬŒx , Eยท )) for all i โˆˆ Z. Therefore Hi (HomR (CฬŒx , Eยท )) = 0 for all i 6= 0 and H0 (HomR (CฬŒx , Eยท )) โ‰ƒ Mฬ‚ I since Mฬ‚ I is I-adic complete and ฮ›iI ( Mฬ‚ I ) = 0 for all i > 0 (see [14, 5.2]). Therefore, the morphism Eยท โ†’ HomR (CฬŒx , Eยท ) is a quasi-isomorphism. Now we consider the complexes HomR ( F, HomR (CฬŒx , Eยท )) โ‰ƒ HomR ( F โŠ— R CฬŒx , Eยท ). We claim that they are homologically trivial complexes. For that reason it will be enough to show that F โŠ— R CฬŒx is homologically trivial since Eยท is a bounded below complex of injective R-modules. Since F is a flat R-module it yields that H i ( F โŠ— R CฬŒx ) โ‰ƒ F โŠ— R H i (CฬŒx ) = 0 for all i โˆˆ Z. For the vanishing apply Proposition 2.1 with H i (CฬŒx ) โ‰ƒ H Ii ( R) for all i โˆˆ Z and SuppR H Ii ( R) โІ V ( I ). As shown above Eยท โ†’ HomR (CฬŒx , Eยท ) is a quasi-isomorphism of left bounded complexes of injective R-modules. Applying the functor HomR ( F, ยท) induces a quasi-isomorphism HomR ( F, Eยท ) โ†’ HomR ( F, HomR (CฬŒx , Eยท )). The complex at the right is cohomologically trivial, while the cohomology of the complex at  the left is ExtiR ( F, Mฬ‚ I ). Therefore, the Ext-modules vanish, as required. In the following result we prove another behaviour of certain Ext-modules in respect to the I-adic completion. Theorem 3.2. Let I โŠ‚ R denote an ideal. Let M, X be arbitrary R-modules with ฯ„ : M โ†’ Mฬ‚ I the natural map. Suppose that SuppR X โІ V ( I ). Then (a) ExtiR ( X, Mฬ‚ I /ฯ„ ( M )) = 0 and (b) the natural homomorphism ExtiR ( X, M ) โ†’ ExtiR ( X, Mฬ‚ I ) is an isomorphism for all i โˆˆ N . A CRITERION FOR I-ADIC COMPLETENESS 5 Proof. Let x = { x1 , . . . , xr } denote elements of R such that Rad xR = Rad I. Let CฬŒx denote the CฬŒech complex with respect to x. Then there is a short exact sequence of complexes 0 โ†’ Dx [โˆ’1] โ†’ CฬŒx โ†’ R โ†’ 0, where Dx is the global CฬŒech complex. That is Dxi = CฬŒxi+1 for i โ‰ฅ 0 and Dxi = 0 for i < 0. Now let Eยท denote an injective resolution of M. By applying the functor HomR (ยท, Eยท ) to the short exact sequence of complexes it provides a short exact sequence 0 โ†’ Eยท โ†’ HomR (CฬŒx , Eยท ) โ†’ HomR ( Dx [โˆ’1], Eยท ) โ†’ 0 of left bounded complexes of injective R-modules. The complex in the middle is an injective resolution of Mฬ‚ I as follows by 2.3 and the fact that Mฬ‚ I is I-adic complete (see [14, 5.2]). Therefore the complex at the right is quasi-isomorphic to Mฬ‚ I /ฯ„ ( M ) considered as a complex concentrated in homological degree zero. In order to prove the statement in (a) let Lยท denote a projective resolution of X. Then ExtiR ( X, Mฬ‚ I /ฯ„ ( M )) โ‰ƒ H i (HomR ( Lยท , HomR ( Dx [โˆ’1], Eยท ))) (see [2]) and it will be enough to show that the last modules vanish for all i โˆˆ Z. To this end consider the isomorphism of complexes HomR ( Lยท , HomR ( Dx [โˆ’1], Eยท )) โ‰ƒ HomR ( Lยท โŠ— R Dx , Eยท )[1]. Now Dx is a bounded complex of flat R-modules. Therefore there is the quasi-isomorphism Lยท โŠ— R Dx โ†’ X โŠ— R Dx . It will be enough to show that the complex X โŠ— R Dx is homologically trivial. But this is true since X โŠ— R Dxi = 0 for all i โˆˆ Z because of SuppR X โІ V ( I ). This proves the statement in (a). By view of the above investigations there is a quasi-isomorphism Eยท โ†’ HomR (CฬŒx , Eยท ) where the second complex is an injective resolution of Mฬ‚ I . This proves the statement in (b).  We will continue with a result on the vanishing of certain Ext-modules. As a step towards to our main result we shall prove a partial result in order to characterize the completion. Theorem 3.3. Let R denote a commutative Noetherian ring. Let M denote an arbitrary R-module. Let x โˆˆ R be an element such that 0 : M xฮฑ = 0 : M x ฮฒ for all ฮฑ โ‰ฅ ฮฒ. Then the following conditions are equivalent: (i) M is xR-adic complete. (ii) ExtiR ( R x , M ) = 0 for i = 0, 1. Proof. Let N = โˆชฮฑโ‰ฅ1 0 : M xฮฑ . Then N = 0 : M x ฮฒ as follows by the definition of ฮฒ. That is, in both of the statements we may replace x by x ฮฒ without loss of generality. That is, we may assume that xN = 0. Then there is a commutative diagram with exact rows: x ฮฑ +1 0 โ†’ M/N โˆ’โ†’ M โ†’ M/xฮฑ+1 M โ†’ 0 โ†“x k โ†“ xฮฑ 0 โ†’ M/N โˆ’โ†’ M โ†’ M/xฮฑ M โ†’ 0. By passing to the inverse limit it provides an exact sequence 0 โ†’ lim { M/N, x} โ†’ M โ†’ Mฬ‚ x โ†’ lim 1 { M/N, x} โ†’ 0. โ†โˆ’ โ†โˆ’ By view of Lemma 2.4 it yields that lim i { M/N, x} โ‰ƒ ExtiR ( R x , M/N ) for i = 0, 1. Furthermore, โ†โˆ’ the short exact sequence 0 โ†’ N โ†’ M โ†’ M/N โ†’ 0 induces an isomorphism ExtiR ( R x , M ) โ‰ƒ ExtiR ( R x , M/N ). This follows by the long exact cohomology sequence and ExtiR ( R x , N ) = 0 for 6 PETER SCHENZEL all i โˆˆ Z. For this vanishing note that the multiplication by x acts on R x as an isomorphism and on N as the zero map. That is, the homomorphism M โ†’ Mฬ‚ x is an isomorphism, if and only if ExtiR ( R x , M ) = 0 for i = 0, 1 which proves (i) โ‡โ‡’ (ii).  Proof of Theorem 1.1. The implication (i) =โ‡’ (ii) is a consequence of Theorem 3.1. Moreover, the implications (ii) =โ‡’ (iii) is trivial and (iii) =โ‡’ (iv) is easy to see. In order to prove (iv) =โ‡’ (i) we first note that Ext1R ( R xi , R) = 0 for all i = 1, . . . , r. By Theorem 3.3 this implies that M is xi Radically complete for i = 1, . . . , r. Since x = { x1 , . . . , xr } generates I up to the radical it follows that M is I-adic complete by Proposition 2.4 since M is I-adic separated. This completes the proof.  4. A N ALTERNATIVE PROOF OF T HEOREM 3.1 In this section there is an alternative proof of Theorem 3.1 based on some results on inverse limits. The results of the following two lemmas might be also of some independent interest. These statements are particular cases of certain spectral sequences on inverse limits (see [10]). Here we give an elementary proof based on the description of lim 1 as discussed in [17]. โ†โˆ’ Lemma 4.1. Let R denote a commutative ring. Let { Mฮฑ }ฮฑโˆˆN be a direct system of R-modules. Let N denote an arbitrary R-module. Then there is a short exact sequence 0 โ†’ lim 1 ExtiRโˆ’1 ( Mฮฑ , N ) โ†’ ExtiR (lim Mฮฑ , N ) โ†’ lim ExtiR ( Mฮฑ , N ) โ†’ 0 โ†โˆ’ โˆ’โ†’ โ†โˆ’ for all i โˆˆ Z. Proof. This result was proved in ([12, Lemma 2.6]) for a Noetherian ring. The same arguments work in the general case.  In the following we need a certain dual statement of Lemma 4.1. In a certain sense it will be the key argument for the second proof of Theorem 3.1. Lemma 4.2. Let R denote a commutative ring. Let M denote an arbitrary R-module. Let { Nฮฑ }ฮฑโˆˆN be an inverse system of R-modules with lim 1 Nฮฑ = 0. Then there is a short exact sequence โ†โˆ’ 1 iโˆ’1 0 โ†’ lim ExtR ( M, Nฮฑ ) โ†’ ExtiR ( M, lim Nฮฑ ) โ†’ lim ExtiR ( M, Nฮฑ ) โ†’ 0 โ†โˆ’ โ†โˆ’ โ†โˆ’ for all i โˆˆ Z. Proof. Because of lim 1 Nฮฑ = 0 there is a short exact sequence โ†โˆ’ 0 โ†’ lim Nฮฑ โ†’ โˆ Nฮฑ โ†’ โˆ Nฮฑ โ†’ 0, โ†โˆ’ where the third homomorphism is the transition map (see [17]). It induces a long exact cohomology sequence f ยท ยท ยท โ†’ โˆ ExtiRโˆ’1 ( M, Nฮฑ ) โ†’ โˆ ExtiRโˆ’1 ( M, Nฮฑ ) โ†’ ExtiR ( M, lim Nฮฑ ) โ†โˆ’ g i i โ†’ โˆ ExtR ( M, Nฮฑ ) โ†’ โˆ ExtR ( M, Nฮฑ ) โ†’ ยท ยท ยท . To this end recall that Ext transforms direct products into direct products in the second variable and cohomology commutes with direct products (see e. g. [6]). Now it is known (see e.g. [17]) that Coker f โ‰ƒ lim 1 ExtiRโˆ’1 ( M, Nฮฑ ) and Ker g = lim ExtiR ( N, Nฮฑ ). โ†โˆ’ โ†โˆ’ This completes the proof.  A CRITERION FOR I-ADIC COMPLETENESS 7 Remark 4.3. The assumption that lim 1 Nฮฑ = 0 is fulfilled whenever the projective system { Nฮฑ } โ†โˆ’ satisfies the Mittag-Leffler condition. That is, for instance when the transition map Nฮฑ+1 โ†’ Nฮฑ is surjective for all ฮฑ โ‰ฅ 1. Note that the proof of the following Theorem is motivated by some arguments done by Buchweitz and Flenner (see [5]). Theorem 4.4. Let R denote a commutative ring. Let M denote an R-module. Let F denote a flat R-module satisfying F โŠ— R R/I = 0. Then ExtiR ( F, Mฬ‚ I ) = 0 for all i โˆˆ Z. Proof. By definition we have Mฬ‚ I = lim ฮฑ M/I ฮฑ M. By Lemma 4.2 there is a short exact sequence โ†โˆ’ 0 โ†’ lim 1 ExtiRโˆ’1 ( F, M/I ฮฑ M ) โ†’ ExtiR ( F, Mฬ‚ I ) โ†’ lim ExtiR ( F, M/I ฮฑ M ) โ†’ 0. โ†โˆ’ โ†โˆ’ i I In order to show the vanishing of ExtR ( F, Mฬ‚ ) for all i โˆˆ Z it will be enough to show the vanishing of Exti ( F, M/I ฮฑ M ) for all i โˆˆ Z and all ฮฑ โ‰ฅ 1. We claim that ExtiR ( F, M/I ฮฑ M ) โ‰ƒ ExtiR/I ฮฑ ( F/I ฮฑ F, M/I ฮฑ M ) for all i โˆˆ Z and all ฮฑ โ‰ฅ 1. In order to show these isomorphisms let Lยท be a projective resolution of F as an R-module. As F is flat as an R-module ToriR ( F, R/I ฮฑ ) = 0 for all i > 0 and Lยท โŠ— R R/I ฮฑ is a projective resolution of F/I ฮฑ F as an R/I ฮฑ -module. By adjunction there are isomorphisms of complexes HomR/I ฮฑ ( Lยท โŠ— R R/I ฮฑ , M/I ฮฑ M ) โ‰ƒ HomR ( Lยท , M/I ฮฑ M ). By taking cohomology it proves the above claim. The vanishing follows now because of F/I ฮฑ F = 0 as a consequence of the assumption F โŠ— R R/I = 0.  Remark 4.5. In fact Theorem 4.4 is a slight sharpening of Theorem 3.1. To this end recall that for an R-module M and an ideal I โŠ‚ R the I-adic completion Mฬ‚ I is not necessarily I-adic complete (as used in the proof of Theorem 3.1). For an explicit example see J. Bartijnโ€™s Thesis [3, I, ยง3, page 19]. Note that in this example the ring is not Noetherian. It grows out of [4, III, ยง2, Exerc. 12]. See also A. Yekutieli (see [18, Example 1.8]). A CKNOWLEDGEMENTS The author thanks Anne-Marie Simon and the reviewer for a careful reading of the manuscript and suggesting some comments. R EFERENCES [1] L. A LONSO TARR Iฬ‚O , A. J EREMIAS L OฬPEZ , J. L IPMAN : โ€˜Local homology and cohomology of schemesโ€™, Ann. scient. Eฬc. Norm. Sup., 4e seฬr. 30 (1997), 1-39. 2, 3 [2] L. L. AVRAMOV, H.-B. F OXBY: โ€˜Homological dimensions of unbounded complexesโ€™, J. Pure Appl. Algebra 71 (1991), 129-155. 4, 5 [3] J. B ARTIJN : โ€˜Flatness, completions, regular sequences, un meฬnage aฬ€ trois, Thesis, Utrecht, 1985. 7 [4] N. B OURBAKI : โ€˜Algebreฬ€ commutativeโ€™, Hermann, Paris, 1961. 7 [5] R.-O. B UCHWEITZ , H. F LENNER : โ€˜Power series rings and projectivityโ€™, Manuscripta math. 119 (2006), 107114. 1, 7 [6] E. E. E NOCHS , O. J ENDA : โ€˜Relative Homological Algebraโ€™, 2nd revised ed., Walter de Gruyter, Berlin, 2011. 6 [7] A. F RANKILD , S. S ATHER -WAGSTAFF : โ€˜Detecting completeness from Ext-Vanishingโ€™, Proc. Amer. Math. Soc. 136 (2008), 2303-2312. 2 [8] J. P. C. G REENLEES , J. P. M AY: โ€˜Derived functors of the I-adic completion and local homologyโ€™, J. Algebra 149 (1992), 438-453. 2 [9] C. U. J ENSEN : โ€˜On the vanishing of lim ( i) โ€™, J. Algebra 15 (1970), 151-166. 1 โ†โˆ’ 8 PETER SCHENZEL [10] C. U. J ENSEN : โ€˜Les foncteurs deฬriveฬs de lim et leurs applications en theฬorie des modulesโ€™, Lecture Notes in โ†โˆ’ Math. 254, Springer, 1972. 6 [11] P. S CHENZEL : โ€˜Proregular sequences, local cohomology, and completionโ€™, Math. Scand. 92 (2003), 181-180. 2, 3, 4 [12] P. S CHENZEL : โ€˜On the structure of the endomorphism ring of a certain local cohomology moduleโ€™, J. Algebra 344 (2011), 229-245. 3, 6 [13] P. S CHENZEL : โ€˜A criterion for completenessโ€™, to appear. 1, 2, 4 [14] A.-M. S IMON : โ€˜Some homological properties of complete modulesโ€™, Math. Proc. Cambr. Phil. Soc. 108 1990, 231-246. 2, 4, 5 [15] A.-M. S IMON : โ€˜Adic - completion and some dual homological resultsโ€™, Publ. Matematiques Univ. Autonoma de Barcelona 36, No. 2, 1992, 965-979. 2 [16] J. S TROOKER : โ€˜Homological questions in local algebraโ€™, London Math. Lect. Note Ser. 145, Cambridge Univ. Press, 1990. 2, 3 [17] C. W EIBEL : โ€˜An introduction to homological algebraโ€™, Cambridge Univ. Press, 1994. 3, 4, 6 [18] A. Y EKUTIELI : โ€˜On flatness and completion for infinitely generated modules over noetherian ringsโ€™, Comm. Algebra 39, No. 11, 2011, 4221-4245. 7 M ARTIN -L UTHER -U NIVERSIT AฬˆT H ALLE -W ITTENBERG , I NSTITUT (S AALE ), G ERMANY E-mail address: [email protected] F UฬˆR I NFORMATIK , D โ€” 06 099 H ALLE
0math.AC
Real-Time Localization and Tracking of Multiple Radio-Tagged Animals with an Autonomous UAV arXiv:1712.01491v4 [cs.SY] 14 Feb 2018 Hoa Van Nguyen, Michael Chesser, Fei Chen, S. Hamid Rezatofighi and Damith C. Ranasinghe School of Computer Science The University of Adelaide, SA 5005, Australia Email:{hoavan.nguyen,michael.chesser,fei.chen,hamid.rezatofighi,damith.ranasinghe}@adelaide.edu.au Abstractโ€”Autonomous aerial robots provide new possibilities to study the habitats and behaviors of endangered species through the efficient gathering of location information at temporal and spatial granularities not possible with traditional manual survey methods. We present a novel autonomous aerial vehicle system to track and localize multiple radio-tagged animals. The simplicity of measuring the received signal strength indicator (RSSI) values of very high frequency (VHF) radio-collars commonly used in the field is exploited to realize a low cost and lightweight tracking platform suitable for integration with unmanned aerial vehicles (UAVs). Due to uncertainty and the nonlinearity of the system based on RSSI measurements, our tracking and planning approaches integrate a particle filter for tracking and localizing; a partially observable Markov decision process (POMDP) for dynamic path planning. This approach allows autonomous navigation of a UAV in a direction of maximum information gain to locate multiple mobile animals and reduce exploration time; and, consequently, conserve on-board battery power. We also employ the concept of a search termination criteria to maximize the number of located animals within power constraints of the aerial system. We validated our real-time and online approach through both extensive simulations and field experiments with two mobile VHF radio-tags. I. I NTRODUCTION Understanding basic questions of ecology such as how animals use their habitat, their movements and activities are necessary for addressing numerous environmental challenges ranging from invasive species to diseases spread by animals and saving endangered species from extinction. Conservation biologists, ecologists as well as natural resource management agencies around the world rely on numerous methods to monitor animals. The most predominant, cost-effective tool suitable for a wide range of animal sizes is very high frequency (VHF) radio collar tagging and subsequent radio telemetry measurements to locate spatiotemporal information of concerned species [10, 20]. However, the traditional method of radio tracking typically requires researchers to trek long distances in the field, armed with cumbersome VHF radio receivers with handheld antennas and battery packs to manually home in on radio signals emitted from radio-tagged or collared animals. Consequently, the precious spatial data acquired through radio tracking comes at a significant cost to researchers in terms of manpower, time and funding. The problem is often compounded by other challenges, such as low animal recapture rates, equipment failures, and the inability to track animals that move into inaccessible terrain. Furthermore, many of our Fig. 1. An overview of the UAV tracking platform with its sensor system. most endangered species also happen to be the most difficult to track due to their small size, inconspicuousness, and location in remote habitats. Automated tracking and location of wildlife with autonomous unmanned aerial vehicles (UAVs) can provide new possibilities to better understand ecology and our native wildlife to safeguard biodiversity and manage our natural resources cost-effectively. We present a low-cost approach capable of realization in a lightweight payload for transforming existing commodity drone platforms into autonomous aerial vehicle systems as shown in Fig. 1 to empower conservation biologists to track and localize multiple radio-tagged animals. The main contribution of our work is a new autonomous aerial vehicle system for simultaneously tracking and localizing multiple mobile radio-tagged animals using VHF radiocollars, commonly used in the field. In particular: i) our system is realized in a 260 g payload suitable for a multitude of low-cost, versatile, easy to operate multi-rotor UAVs without a remote pilot license. Our lightweight realizationโ€”of less than 2 kg system massโ€”is achieved through a new sensor design that exploits the simplicity of a software defined radio architecture for capturing received signal strength indicator (RSSI) value from multiple VHF radio tags and a compact, lightweight VHF antenna geometry; ii) due to the noisy, complex and nonlinear characteristics of RSSI data we integrate a sequential Monte Carlo implementation of a Bayesian filter, also known as particle filter (PF), for real-time tracking and localization jointly with a partially observable Markov decision process (POMDP) with Rรฉyni divergence between prior and posterior estimates of animal locations for autonomy and dynamic online path planning to minimize flight time while maximizing number of located animals. Further, our formulation considers the trade-off between location accuracy and resource constraints of the UAV, its maneuverability, and power constraints to develop a practical solution; and iii) we validate our method through extensive simulations and field experiments with mobile VHF radio-tags. II. R ELATED W ORK Since this application is related to locating animals, we will focus on progress made towards the autonomous localization and tracking of multiple radio-tagged animals here. Off-line estimations of a radio beacon from data logged from a UAV have been demonstrated in [8, 23]. Pioneering achievements in autonomous wildlife tracking have been made through simulation studies [14] and experimentally demonstrated systems [4, 11, 21, 22] in recent years. In particular, the first demonstration of a UAV for proved in [4]. The recent approaches [4, 22] for real-time localization of a static target (assuming stationary wildlife) used wireless signal characteristics captured by a receiver to estimate location; in particular, the angle-of-arrival (AoA) of a radio beacon was determined using an array of antennas with the information related to a ground-based receiver for location estimations. Although the approach can conveniently manage topological variations in terrain, AoA systems require a large bulky receiver system and multiple antenna elements as well as long observation times; 45 seconds per observation as reported in [4]. Moreover, the antenna systems being mounted on top of the UAV [4] is likely to lead to difficulty in tracking terrestrial animals although being suitable for locating avian species dwelling in trees. We can see that there are few investigations that have studied the problem of locating radio-collared animals using autonomous robots. Although a system based on angle-ofarrival was recently evaluated to locate a stationary animal, the development of a low-cost and lightweight autonomous system capable of long-range flights and localization of multiple mobile radio-collared animals still remains. This is especially significant in the realization of a system that is widely accessible to conservation biologists in the field where a very small UAVโ€”of less than 2 kgโ€”can be flown without a formal pilot license and with fewer restrictions given the exclusion of this category of UAVs from regulatory regimes [3, p.18]. We present an alternative approach exploiting RSSI based range only measurements because of the ability to use a simpler sensing system on board commodity UAVs to realize lower cost and longer flight range UAVs for tracking and localizing multiple animals. Together with a strongly principled approach for joint tracking and planning, our lightweight autonomous aerial robot platform provides a cost-effective method for wildlife conservation and management. III. T RACKING AND P LANNING P ROBLEM F ORMULATION Real-time tracking requires an online estimator and a dynamic planning method. This section presents our tracking and localizing formulation under a principled framework of a Bayesian filter for tracking and POMDP for planning strategy. A. Tracking and localizing For tracking, we use a Bayesian filter. It is an online estimation technique which deals with the problem of inferring knowledge about the unobserved state of a dynamic systemโ€” in our problem, wildlifeโ€”which changes over time, from a sequence of noisy measurements. Suppose x โˆˆ X and z โˆˆ Z are respectively the system (kinematic) state vector in the state space X and the measurement (observation) vector in the observation space Z. The problem is estimating the state x โˆˆ X from the measurement z โˆˆ Z or calculating the marginal posterior distribution p(xk |z1 :k ) sequentially through prediction Z(1) and update (2) steps. p(xk |z1 :k โˆ’1 ) = p(xk |xk โˆ’1 )p(xk โˆ’1 |z1 :k โˆ’1 )d xk โˆ’1 (1) p(xk |z1 :k ) = R p(zk |xk )p(xk |z1 :k โˆ’1 ) p(zk |xk )p(xk |z1 :k โˆ’1 )d xk (2) In the case of a nonlinear system or non-Gaussian noise, there is no general closed-form solution for the Bayesian recursion and p(xk |z1 :k ) generally has a non-parametric form. Therefore, in our problem, we use a particle filter implementation as an approximate solution for the Bayesian filtering problem due to our highly nonlinear measurement model. Particle Filter (PF): A particle filter uses a sampling approach to represent the non-parametric form of the posterior density p(xk |z1 :k ). The samples from the distribution are represented by a set of particles; each particle has a weight assigned to represent the probability of that particle being sampled from the probability density function. Then, these particles representing the nonparametric form of p(xk |z1 :k ) are propagated over time. In the simplest version of the particle filter, known as the bootstrap filter first introduced by Gordon in [5], the samples are directly generated from the transitional dynamic model. Then, to reduce the particle degeneracy, resampling and injection techniques are implemented; a detailed algorithm can be found in [17]. Measurement model: The update process of a PF requires the derivation of a likelihood of measurements. In our problem, based on estimating a targetโ€™sโ€”VHF radio tagโ€™sโ€”range from the receiver, we require a realistic signal propagation model to obtain the likelihood of receiving a given measurement. We employ two VHF signal propagation models suitable for describing RSSI measurements in non-urban outdoor environments. Denoting h(x, u) as the RSSI measurement function between target x and observer (UAV) state u, we have: i) Log Distance Path Loss Model (LogPath): The received power is the only line of sight power component transmitted from a transmitter subjected to signal attenuation such as through absorption and propagation loss: h(x, u) = Prd0 โˆ’ 10n log10 (d(x, up )/d0 ) + Gr (x, u) (3) where t t t T is the targetโ€™s position; up = โ€ข x = [px , py , pz ] u u u T [px , py , pz ] is the observerโ€™s (UAV) position in Cartesian coordinates; u = [up ; ฮธu ] is the UAVโ€™s state which includes its heading angle ฮธu . โ€ข โ€ข โ€ข โ€ข d(x, up ) is the euclidean distance between the targetโ€™s position and UAVโ€™s position. Gr (x, u) is the UAV receiver antenna gain which depends on its heading, its position, and targetโ€™s position. Prd0 is received power at distance d0 . n is the path-loss exponent that characterizes the signal losses such as absorption and propagation losses and this parameter depends on the environment with typical values range from 2 to 4. ii) Log Distance Path Loss Model with Multi-Path Fading (MultiPath): The received power is composed of both line of sight power component transmitted from a transmitter and the multi-path power component reflected from the ground plane subjected to signal attenuation such as through absorption and propagation loss: [24, p. 81]: h(x, u) = Prd0 โˆ’ 10n log10 (d(x, up )/d0 ) + Gr (x, u) + 10n log10 (|1 + ฮ“(ฯˆ)eโˆ’j4ฯ• |) (4) where, in addition to terms in 3 โ€ข ฯˆ is the contact angle of the reflected path and ground. p ฮตg โˆ’ cos2 (ฯˆ)]/[sin(ฯˆ) + โ€ข ฮ“(ฯˆ) = [sin(ฯˆ) โˆ’ p 2 ฮตg โˆ’ cos (ฯˆ)] is the ground reflection coefficient with ฮตg is the relative permittivity of the ground. โ€ข 4ฯ• = 2ฯ€4d/ฮป is the phase difference between two waves where ฮป is the wave length and 4d = ((ptx โˆ’ pux )2 + (pty โˆ’ puy )2 + (ptz + puz )2 )1/2 โˆ’ d(x, u). In non-urban environments, received power is usually corrupted by environmental noise, with the assumption that the noise is white, the total received power z = Pr (x, u) [dB] is: z = h(x, u) + ฮทP (5) N (0, ฯƒP2 ) where ฮทP โˆผ is Gaussian white noise with covariance ฯƒP2 . Notably, even if RSSI noise is not completely characterized by a white noise model, we can still model it as Gaussian noise by using a higher covariance ฯƒP2 to account for the unknown uncertainty. We use data captured in experiments using our sensor system to validate the physical sensor characteristics Gr (x, u) (see Sec. IV) and n defined by environmental characteristics, as well as estimate the propagation model reference power parameter Prd0 and noise ฯƒP (see Sec. VI-B). Measurement likelihood: Based on (5) with Gaussian noise ฮทP , the likelihood of measurement zk , given target and sensor position are xk and uk , respectively, at time k is p(zk |xk , uk ) โˆผ N (zk ; h(xk , uk ), ฯƒP2 ) where N (z; ยต, ฮฃ) is a normal distribution with mean ยต and covariance ฮฃ. B. Path Planning The UAV planning problem is similar to the problem of an agent computing optimal actions under partially observable Markov decision process (POMDP) to maximize its reward. Kaelbling et al. [9] have shown that a POMDP framework implements an efficient and optimal approach based on previous actions and observations to determine the true world states. POMDP in conjunction with a particle filter provides a principled approach for evaluating planning decision to realize an autonomous system for tracking. In general, a POMDP is described by the 6-tuple (S, A, T , R, O, Z) where S is set of both UAV and target states (s = {x, u} โˆˆ S), A is set UAV of actions, T is state-transition function T (s, a, s0 ) = p(s0 |s, a), R(s, a) is reward function, O is set of observations and Z is observation function Z(s, a, o) = p(o|s, a) with s, s0 โˆˆ S is current state and next state respectively, a โˆˆ A is taken action and o โˆˆ O is the observationโ€”i.e measurement. The goal of a POMDP is to find P an optimal policy to maximize the total k+H expected reward E[ t=k ฮณ kโˆ’t R(st , at )] where H is lookahead horizon steps, ฮณ โˆˆ (0, 1) is the discount factor which serves as the value difference between the current reward versus the future reward; st , at is state and action at time step t and E[ยท] is the expectation operator [7]. The reward function can be calculated using different methods such as task-driven or information-driven strategies. When uncertainty is high, the information gain approach is preferable to reduce a targetโ€™s location uncertainty [2]; hence, we used this method to calculate our reward function. There are several approaches to evaluate information gain in robotic path planning such as Shannon entropy [4], KullbackLeibler (KL) divergence or Rรฉnyi divergence [6]. We adapted the approach in [15, 16] to implement Rรฉnyi divergence as our reward function since it fits naturally with our MonteCarlo sampling method. Here, Rรฉnyi divergence calculates the distance between prior and posterior densities [2, 16]: Z  ฮฑ 1 (i) log Rk+H (a) = p(xk+H |z1:k ) ฮฑโˆ’1 (6) h i1โˆ’ฮฑ (i) ร— p(xk+H |z1:k , zk+1:k+H (a)) dx where the prior density p(xk+H |z1:k ) is calculated by propagating current posterior particles sampled from p(xk |z1:k ) to time k +H using the prediction step (1). The posterior density (m) (m) p(xk+H |z1:k , zk+1:k+H (a)) where zk+1:k+H (a) is the future measurement set that will be observed if action a โˆˆ Ak is taken; this is calculated by applying both prediction (1) and update steps (2) up to time k + H. However, using Bayes update procedure is computationally expensive and prohibitive in a real-time setting. Instead, we implement a computationally efficient approach using a black box simulator proposed in [19] along with the Monte Carlo sampling approach. Hence, the problem transforms to find an optimal action a โˆˆ Ak to maximize total expected reward: k+H Ms 1 X X (m) ฮณ kโˆ’t Rt (a) (7) ak โ‰ˆ arg max aโˆˆAk Ms m=1 t=k where Ms is the number of future measurements. C. Multi-targets Tracking The particle filter proposed in Sec. III-A can be extended to multi-target tracking (MTT). However, MTT normally deals with the complex data association problem where it is difficult to determine which measurement belongs to which target. In contrast, for our system, each target can be estimated from the measurement based on the signal frequency and tracked independently. Thus, we do not need to solve the data association problem. Notably, not all of the targets are detected due to, for example, the UAV movements, the measurement range limits imposed by propagations losses and receiver sensitivity. Therefore, if the target is not detected, the solver does not update its estimated position. Besides maximizing the number of targets localized and tracked, we formulated a termination condition for each target to conserve UAV battery power; a target is considered localized if its location uncertaintyโ€”as determined by its particle covarianceโ€”is sufficiently small (<NT h ). Then, those found targets are forgotten to aid the solver prioritize its computing resources on those targets with high uncertainty. IV. S YSTEM I MPLEMENTATION We implemented an experimental aerial robot system based on our tracking and planning formulation. An overview of the complete system is described in Fig. 2a. Our experimental system used a 3DR IRIS+ UAV platform and a new sensor system built with: i) a compact directional VHF antenna design; and ii) a software defined signal processing module capable of simultaneously processing signals from multiple targets and remotely communication with a ground control system for tracking and planning. In our system, the ArduPilotMega (APM) on the IRIS+ UAV transmits back its global positioning system (GPS) location to the Telemetry Host tool developed by our group to communicate with the APM module using MAVLink protocol over a 915 MHz full duplex radio channel. The sensor system together with the Antenna, SDR receiver and the embedded compute delivers targetsโ€™ RSSI data through a 2.40 GHz radio channel to the ground control system. GPS and targetsโ€™ RSSI data are delivered to our tracking and planning algorithmโ€”solverโ€”through the Telemetry Host using a RESTful web service. The solver estimates target locations and calculates new control actions per each POMDP cycle to command the UAV through MAVLink to fly to a new location. In order to ensure safety and meet University regulatory requirements we also employ QGroundControlโ€” a popular cross-platform flight control and mission planning softwareโ€”to monitor and abort autonomous navigation. We detail our Sensor System below. Signal Processing Module: In contrast to previous work [4], we propose using a software defined radio (SDR) receiver to implement the signal processing components. The key advantages of our choice are the ability to: i) reduce the weight of the receiver; ii) rapidly scan a large frequency spectrum to track multiple animals beaconing on different VHF frequency channels; and iii) because the signal processing chain is defined in software, we have the ability to reconfigure the system on the fly. In this work, we use the HackRF One SDRโ€”an open source platform developed by Ossmann [13] capable of directly converting radio frequency (RF) signals to digital signals using an analog-to-digital converter (ADC)โ€”together with an Intel Edison board as our embedded compute module. We implemented a Discrete Fourier Transform (DFT) filter to isolate, from multiple signals, each unique VHF frequency channel associated with an animal radio collar and measure the signal strength of the received signal. Antenna: A lightweight folded 2-element Yagi antenna was specially designed for our sensor system. Our design achieves a low profile antenna capable of being within the form factor of low-cost commodity UAVs suitable for easy operation in the field. Similar to a standard 2-element Yagi antenna, the folded design has one reflector and one driven element as shown in Fig. 2b. The antenna operates in the frequency range from 145 to 155 MHz (a typical range for wildlife radio tags), and a center frequency of f = 150 MHz. The length of driven and reflector elements are Dd = 0.3975ฮป and Dr = 0.402ฮป, respectively, while d1 = 0.1ฮป, d2 = 0.03ฮป and the inductive loading ring diameter is d3 = 0.015ฮป. Here, the wavelength ฮป = c/f = 2 (m) with c = 3ยท108 (m/s). The antenna gain model calculated for the the design is shown in Fig. 5b. A. Planning implementation for a real-time system Implementing planning algorithms on any real-time systems is always challenging because of its high computational demand. Thus, in this section, we present a few approaches to minimize the planning computational time while not scarifying the overall localization performance. i) Notably, for RSSI data, the uncertainty in the estimation of a targetโ€™s location is reduced when the maximum gain of the directional antenna mounted on the UAV points toward the target position. Hence, to increase the localization accuracy, the UAV heading angle ฮธku must be controlled during the path planning process, although the multi-rotor UAV can be maneuvered without changing its heading. We adopted a set of discrete UAV rotation angles for the control actions Ak in [16] as this helps reduce the computational complexity of the POMDP planning process by limiting the number of possible actions to evaluate. ii) The solver performs planning in every Np observation cycles with Np > 1 instead of every observation. This approach helps to ensure that the solver prioritizes its limited computational resource on tracking targets instead of only performing planning steps. iii) A coarse planning interval tp in the planning procedure is implemented to minimize the computational time by reducing number of look-ahead steps while still having the same look-ahead horizon. For example, we want to estimate the targetโ€™s state in a 10 second horizon, we can use the normal interval tp = 1(s) and estimate the targetโ€™s state 10 times or use the coarser interval tp = 5(s) and perform the estimation twice; the latter approach is computationally less expensive. iv) Instead of selecting the best action from the possible action space Ak , the domain knowledge of the receiver antenna gain is used to select a subset of actions that gives the highest received gain using Alg. 1. Fig. 2. a) The full communication channels between UAV and the ground control system with its main softwares and protocols. b) Folded 2-element Yagi antenna used in our sensor system for observations Algorithm 1 Calculate the control action subset Input: Number of preferred actions NA,s , Ak , the antenna gain Gr , the targetโ€™s position xk+H Output: Ask 1: for l = 1 : NA,k do 2: Get ulk+H โˆˆ Ak (l) 3: Calculate Glr = Gr (xk+H , ulk+H ) 4: end for 5: Ask = Ak (Glr โ‰ฅ Top NA,s of Gr ) Following the above implementation approach, UAV motion includes two modes: i) changing its heading angle while hovering; and ii) moving forward to its direct location. In one planning procedure with Np cycles, the UAV needs b|4ฮธ|/ฮธmax c cycles to rotate, and spends the remaining cycles Np โˆ’ b|4ฮธ|/ฮธmax c to move forward without changing its heading. Here bยทc and | ยท | are the floor and absolute operator respectively, and ฮธmax is the UAV maximum rotation angle in one cycle . The sign of 4ฮธ decides the rotation direction (+ for the clockwise, and โˆ’ for the counter-clockwise). V. S IMULATION E XPERIMENTS Implementing on a real system is time-consuming and difficult. Hence, we want to validate our systems firstly through several simulation experiments to: i) verify our tracking and planning algorithms; ii) investigate how our planning parameters such as different ฮฑ values of the Rรฉnyi divergence or number of discrete actions NA,s = |Ask | created in Alg. 1 contribute to the overall algorithm performance; and iii) compare our proposed Rรฉnyi divergence based planning technique with other well-known methods, and the impact of the look-ahead horizon parameters on computational time and localization accuracy. All of the simulation experiments were processed on a PC with an Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz, 32GB RAM and MATLAB-2016b. A. Tracking and Planning Simulation This simulation was implemented to validate our approach. In this experiment, the UAV attempted to search and localize 10 moving targets randomly located in an area of 500 m ร— 500 m. The following are list of parameters used in this simulation: the sampling time step is 1 second since the tag emits pulse signals every 1 second. The solver performed a planning procedure every Np = 5 s, and the look-ahead horizon parameters: H = NH tp = 5 s with number of horizon NH = 1 and the planning interval tp = 5 s. The UAV started from its home location at u1 = [0, 0, 20, 0]T , moved under the constant velocity vu = 5 m/s with its maximum heading rotation angle ฮธmax = ฯ€/6 rad/s. Number of particles for each target were capped at Ns = 10, 000, with the future sample measurement Ms = 50, Rรฉnyi divergence parameter ฮฑ = 0.5, number of actions NA,s = 5. In addition, a target is considered localized if its location uncertainty determined by its particles covariance is small enoughโ€”NT h = 10, 000 was chosen as the limit. The LogPath measurement model with Prd0 = โˆ’22.3 dB, n = 3.1, ฯƒP = 4.22 was used to verify our proposed algorithm. To demonstrate that our algorithm was able to localize mobile targets, a wombatโ€”an animal that usually wanders around its area was considered. Hence, a random walk model was used to to describe its behavior with a single targetโ€™s transitional density: p(xk |xkโˆ’1 ) = N (xk ; Fxkโˆ’1 , Q) (8) where F = I3 with In is n ร— n identity matrix , Q = 2 ฯƒQ diag([1, 1, 0]T ), ฯƒQ = 2 m/s. Fig. 3 shows localization results for 10 mobile targets where the estimation details are annotated next to the targetโ€™s position with two indicators: RMS and flight timeโ€”see Sec. V-B for definitions. In summary, for this scenario, it took the UAV 587 seconds to localize all ten moving targets with the maximum error distance less than 15 m, except for the outlier, target #2 (RMS = 26.3 m). At flight time 587 s, after finishing localizing the last target (target #7), the UAV was sent a command to fly back to its original station. In this case, the total UAV travel distance was 1.93 km. The results demonstrate that our algorithm can search and accurately localize multiple numbers of targets in real time (about 10 minutes) at the travel distance 1.93 km that most commercial off the shelf drones can do. B. Monte Carlo simulations For this experiment, all of Monte Carlo setup parameters were kept the same as in Sec. V-A, except for the investigated ones. In addition, to ensure the results were not random, all of the conducted experiments were performed over 100 Monte Carlo runs. The tracking algorithm was evaluated based on the following criterion: โ€ข Estimation Error is the absolute distance between ground truth and estimated target location Drms = P Ntg j j j j 2 j=1 drms /Ntg with drms = [(xtruth โˆ’ xest ) + j j (ytruth โˆ’ yest )2 ]1/2 . โ€ข Flight time (s) for UAV to localize all of the targets which includes hovering time when the UAV waits for commands from the solver to take an action. โ€ข UAV travel distance distance to find all of target positions y (m) 400 5 RMS: 8.1 Flight time: 244 300 RMS: 11.2 10 Flight time: 101 RMS: 4.8 1 200 Flight time: 88 6 2 RMS: 26.3 RMS: 7.3 Flight time: 155 Flight time: 129 100 RMS: 10.8 Flight time: 419 RMS: 13.6 Flight time: 517 3 7 RMS: 14.2 Flight time: 587 0 0 100 200 300 400 500 x (m) Fig. 3. Simulation results with 10 moving targets localized using a single UAV by Particle Filter and POMDP. TABLE I L OCALIZATION PERFORMANCE FOR DIFFERENT ALPHA VALUES RMS (m) Flight time (s) UAV travel distance (km) ฮฑ = 0.1 12.35 724 2.38 ฮฑ = 0.5 12.77 741 2.41 ฮฑ = 0.9999 12.96 727 2.34 Computational cost: calculated for 2 scenarios: i) execution time for the solver to perform the tracking algorithm only (called non-planning time), and ii) the execution time for the solver to select the best action (planning step) as well as conduct tracking (called planning time). Firstly, our search and localization algorithms were evaluated using different ฮฑ values for Rรฉyni reward function in (6). Table I presents the Monte Carlo results for ฮฑ = {0.1, 0.5, 0.9999}. In general, the ฮฑ values do not significant impact the overall performance. However, applying ฮฑ = 0.1 provides the best localization results in terms of estimation error and search duration. Applying ฮฑ = 0.5 proposed in [16, 18] results in the worst performance, it increases flight time and travel distance necessary to complete the localization task. Using ฮฑ = 0.9999 (considered as using KL divergence) which is popular in information gain helps to save UAV travel distance while sacrificing location accuracy. One explanation for this scenario is that our noisy measurement causes the (m) predicted posterior p(xk+H |z1:k , zk+1:k+H (a)) in (6) to be less informative due to high uncertainty. Therefore, the reward function should pace more emphasis more on the current posterior instead by using a small ฮฑ value or setting ฮฑ โ†’ 1 to completely ignore the future posterior. It also explains why selecting ฮฑ = 0.5 (equally weighting the current and the future posterior) result in the worst localization performance. Equally important, we conducted experiments to understand how the action space set NA,s created by Alg. 1 affects to our tracking performance in term of planning time and localization error. Table II shows Monte Carlo results for NA,s = {2, 3, 4, 5, 6, 7}. It presents an interesting result that applying NA,s = 4 provides the best localization performance โ€ข Number of actions NA,s RMS (m) Flight time (s) UAV travel distance (km) Planning time (s) 15 14 13 12 11 10 9 8 7 6 5 1 2 3 4 5 6 7 14.18 840 12.64 781 12.17 693 12.27 723 12.83 756 12.63 799 2.62 2.53 2.39 2.50 2.52 2.70 1.16 1.19 1.23 1.27 1.36 1.47 RMS (m) Flight time (s) Travel Distance (km) 2 3 4 5 6 7 8 Number of Targets 9 944 844 744 644 544 444 344 244 144 10 2.5 2 1.5 1 Travel Distance (km) 4 RMS: 9.5 Flight time: 393 Flight time (s) 8 9 RMS (m) 500 TABLE II L OCALIZATION PERFORMANCE FOR DIFFERENT NUMBER OF ACTIONS Real position of Target Estimated position of Target UAV Trajectory RMS: 9.5 Flight time: 288 0.5 Fig. 4. Localization performance for different number of targets Ntg increase from 1 to 10. in terms of estimation error, flight duration and travel distance; a desirable result for realizing real time planning with limited computational resources. Another aspect that we want to examine is how our proposed algorithm performs when a maximum number of targets Ntg change from 1 to 10. As depicted in the Fig. 4, our algorithmโ€™s estimation error was stable and invariant to the number of targets. Moreover, it is reasonable that the flight time and the travel distance increased linearly with target numbers because it took more time and power to track more targets. Lastly, we examined how Rรฉnyi divergence performs in different look-ahead horizons H = NH tp compared to: i) the Shannon entropy [4]; ii) a naive approach that moves UAV to the closest estimated target location; and iii) a uniform search with predefined path used in [18]. Table III shows the Monte Carlo comparison results among various planning algorithms. All of parameters were reused from the Sec. V-A, except for ฮฑ = 0.1 and NA,s = 4 were updated based on the previous experimental results. The result has demonstrated that Rรฉnyi divergence reward function is superior to other planning strategies in term of localization accuracy, including the Shannon entropy with the same horizon settings. For Rรฉnyi reward function itself, the large look ahead horizon number NH > 1 helps to improve the localization accuracy; however, it requires higher computational power (planning) and causes the UAV to travel further. Using NH = 1; tp = 5 provides the best trade-off between computational time and accuracy. Summary: According to the above simulation results, we select ฮฑ = 0.1, NA,s = 4, and NH = 1, tp = 5 s as the planning parameters for the field experiment since these parameters provides the lowest computational cost, best performance in term of location estimation error, travel distance and flight time. Fig. 5. a) Waterfall plot for rotor noise experiment when four motors at full rotation speed; b) Normalized antenna gain in E-plane G(ฯ†). The red line is gain modeled pattern and black line is the normalized measured gain pattern from 30 measurements collected by rotating the UAV heading at 15โ—ฆ intervals; c) Plot of measured RSSI data points and its estimated models over a distance from 10 m to 320 m at 10 m intervals. TABLE III L OCALIZATION PERFORMANCE FOR DIFFERENT PLANNING ALGORITHM NH tp (s) RMS (m) Flight time (s) UAV travel distance (km) Plan Time (s) Non Plan Time (s) Uniform N/A N/A 18.8 921 Closest Target N/A N/A 13.4 799 Shannon [4] 1 5 12.6 774 1 5 12.5 699 Rรฉnyi 3 1 12.4 889 5 1 12.0 811 10 1 11.6 822 3.72 2.29 2.54 2.27 2.99 2.82 2.42 1.58 1.11 1.38 1.28 1.53 1.65 2.71 1.58 1.03 0.99 0.97 0.96 0.97 0.96 VI. F IELD E XPERIMENTS We describe here our extensive experiments regime to validate our approach and evaluate the performance of our aerial robot system in the field. Our aim is to: i) investigate the possibility for signal interference from spinning motors of a UAV on RSSI measurements; ii) estimate the model parameters in the sensor model and validate the proposed model; and iii) conduct field trials to demonstrate and evaluate our system capabilities. A. Rotors noise We investigated the rotor noise to confirm that our system is not affected by the electromagnetic interference from the UAVโ€™s motors. It also helps to clear the concern raised in [4] that the rotor noise may affect the RSSI measurements. Four motors of the 3DR IRIS+ quad-copter shown in Fig.1 were used in this experiment. The RSSI data of a radio collar were measured across 149 MHz to 151 MHz frequency spectrum when four motors were operating at 20%,50%,100% of its maximum speed of 10, 212 rounds per minute. Fig 5a shows the frequency spectrum of the received signal. We can see that there was no difference in the frequency characteristics when the rotors were in ON and OFF states. This result confirms that the rotors do not spin fast enough to generate high-frequency interference to impact to our RSSI measurements. B. Sensor model validation and parameter estimation Antenna Gain: The antenna gain pattern was measured to verify its directivity compared to the antenna gain model Gr (x, u) = Gr (ฯ†) calculatedโ€”following [12, p.1252]โ€”based on the physical design as discussed in Sec. IV. Fig. 5b shows the measured and modeled radiation patterns Gr (ฯ†) , here ฯ† is the angle between the UAV heading and the direction from its position to targetโ€™s position on 0xy plane. The result shows that the front-to-back ratio is smaller (2 dB) than expected and this is an artifact of folding the reflector on our design. Signal propagation model parameter validation: We collected RSSI data points over a range from 10 m to 320 m between the UAV and a VHF radio tag. The tag and UAV were kept at a height of 5 m above ground during this experiment. The tag was stationary at all times, while the UAV was directed to move away in a straight line from the tag at 10 m intervals whilst hovering at each location to allow the collection of approximately 30 measurements. The UAV heading was maintained to ensure consistent antenna gain during the experiment. Since we operated in an open terrain over a grassland, we selected the path loss exponent n = 2 suitable for modeling free space path loss. Fig. 5c shows the measured RSSI and the propagation models obtained using a nonlinear regression algorithm to estimate model parameters; we have the following results for reference power Prd0 in (3), (4) at the reference distance d0 = 1 m, and measurement noise variance ฯƒP in (5): d0 โ€ข LogPath model : Pr = โˆ’45.69 ; ฯƒP = 4.21 (dB). d0 โ€ข MultiPath model : Pr = โˆ’45.28 ; ฯƒP = 2.31 (dB). The results show that both models, as expected, derived a similar reference power Prd0 whilst providing a reasonable fit to measurement data and this affirms the validity of our propagation model. Although LogPath model is reasonable, MultiPath model is more accurate and yields a smaller measurement noise variance. The results confirms the impact of ground reflections, especially close to the signal source. C. Field Trials We present two sets of field experiments to validate the two measurement models and conducted a total of 16 autonomous flights to demonstrate our system capabilities. Our experiments were designed around Anonymous University regulations governing the conduct of experimental UAV research. Given the need to operate in autonomous mode, our flight zone as well as the scope of the experiment was restricted to University owned property designated for UAV flight tests. Therefore: i) the UAV task was set to search and localize two mobile targets in a search area 75 m ร— 300 m; and ii) instead of wildlife, we relied on two people, each wearing a VHF radio tag on their forearm, and a mobile phone based GPS data logger on TABLE IV C OMPARISON OF L OCALIZATION PERFORMANCE Model LogPath MultiPath Cliff [4] Target Type Mobile Mobile Stationary Trials RMS (m) 8 8 6 30.1 ยฑ 12.8 22.7 ยฑ 13.9 23.8 ยฑ 14.0 Total Flight Time (s) 255 ยฑ 104 138 ยฑ 53 8381 Travel Distance (m) 549 ยฑ 167 286 ยฑ 121 N/A their hands to obtain ground truth; with two extra personnel stationed to maintain constant sight of the UAV and people in the field and abort the autonomous mode to transfer control to manual operations by a pilot. The volunteers with the radio tags were asked to walk randomly and no other instructions were given. Fig. 6 shows the tracking and localization results along with UAV trajectories based on the two different measurement models. Table IV presents the summary comparison results of location estimates between the two measurement models. Smaller RMS (root mean square) estimation error values suggest a higher accuracy, while shorter flight times and travel distance to localize all targets are highly desirable for a practicable system given the power constrained nature of commodity UAVs. The result confirm that the MultiPath model is superior to the standard LogPath model since it has been able to account for ground reflections and the UAV is not required to approach the target as closely when using the LogPath model to reduce its measurement uncertainty. D. Discussion We also summarise results from Cliff et al. [4] for comparison in Table IV while Table V presents a complete comparison between our proposed system and Cliff et al. [4] system. Notably, our search area is smaller compared to Cliff et al. [4] (75 m ร— 300 m v.s 1000 m ร— 1000 m) due to our test flight zone restrictions, however, we have set up our initial distance from the UAV home position to its farthest targetโ€™s position (target #2 in this case) to be equivalent to the distance of the stationary target in [4]; approximately 300 m. The results in Table IV demonstrate that our proposed method can localize two mobile targets in a shorter flight time (the flight time of MultiPath model is one-sixth of that in Cliff et al. [4]) with better accuracy. Moreover, we search and locate two mobile targets; in contrast, Cliff et al. [4] method was implemented to locate a single and stationary target. In general, as shown in Table V, our system is more compact, lighter, and has a payload that is one-third of that in [4] and consequently capable of longer flight times on any given UAV. Although, our reliance on an SDR without a preamplifier has resulted in a shorter detection range, our total system mass being under 2 kg is significant since it enables ecologists to operate our system without a remote pilot licenses (RePL). Moreover, the ability to instantly collect range-only measurements also helps reduce flight time significantly compared to the bearing-only method, requiring full rotations of 1 Information regarding the total flight is not reported in Cliff et al. [4], however, as shown in Fig. 9 in Cliff et al. [4], one observation took 76.21s and one trial needed 11 observations, hence total flight time is 11 ร— 76.21 = 838.31s Fig. 6. Field experiment results to search, track and localize two mobile tags for the two different measurement models. a) Standard LogPath. b) MultiPath. TABLE V C OMPARISON BETWEEN OUR SYSTEM AND C LIFF ET AL . [4] SYSTEM . Ours 260 1,280 Quadcopters (smaller drone) Software defined radio (digital-based,rapidly scan multiple frequencies to support multiple frequencies) Cliff et al. [4] 750 2,200 Octocopters (relatively larger drone) Detection range (m) 320 500 Measurement model Range-only (exploiting the simplicity of a range-only measurement system) Payload (g) Total mass (g) Drone type Receiver Architecture Filtering method Planning Nature of targets Particle filter (O(N ) operations per iteration) Rรฉnyi divergence multiple mobile target tracking Analog filtering circuit (analog-based, difficult to re-configure for a new frequency) Bearing-only (antenna array, and UAV rotation at grid points with a phase difference measurement system) Grid-based filter (O(N 2 ) operations per iteration) Shannon entropy A single stationary target localization a UAV at each observation point, as shown in the Table IV. Furthermore, as discussed in [1], the computational cost for grid-based methods used in [4] increases dramatically, with the number of cells whilst the grid must be dense enough to achieve accurate estimations; e.g. , a grid-based filter with N cells conducts O(N 2 ) operations per iteration, while a similar particle filter with N particles only requires O(N ) operations. Hence, the grid-based filter method only works in case of stationary targets as in [4] where the most expensive computational step, the prediction step, is skipped. Moreover, as shown in Table. III, our planning algorithm based on Rรฉnyi divergence is superior to the Shannon entropy approach in [4] in both important metrics: accuracy and flight time. VII. C ONCLUSION We have developed and demonstrated an autonomous aerial vehicle system for range only tracking and localization of VHF radio-tagged animals under RSSI based measurement uncertainty and mobility of targets during their discovery in the field. The joint particle filter and POMDP with Rรฉnyi divergence based reward function provided an accurate method to explore, track and locate multiple animals while considering the resource constraints of the underlying UAV platform. In addition, we have realized a UAV system under 2 kg to ensure both the practicability and the accessibility of the technology to conservation biologists. While we have demonstrated a successful system, we have only formulated our approach as a two-dimensional tracking problem that is ideally suitable for tracking endangered species in largely flat terrains and grasslands. Consequently, the current approach is not suitable for tackle tracking wildlife in hills or mountainous areas and it would require: i) a UAV capability to maintain a fixed relative altitude above the ground; or ii) formulating a 3D tracking problem to extend our method to all topographical conditions. We leave the latter for future work. VIII. ACKNOWLEDGMENTS This work was jointly supported by the Western Australia Parks and Wildlife, the Australian Research Council (LP160101177), the Defense Science and Technology Group, and the University of Adelaideโ€™s Unmanned Research Aircraft Facility. R EFERENCES [1] M Sanjeev Arulampalam, Simon Maskell, Neil Gordon, and Tim Clapp. A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking. IEEE Transactions on signal processing, 50(2):174โ€“188, 2002. [2] Michael Anthony Beard, Ba-Tuong Vo, Ba Ngu Vo, and Sanjeev Arulampalam. Void probabilities and cauchy-schwarz divergence for generalized labeled multibernoulli models. IEEE Transactions on Signal Processing, 65, 2017. [3] CASA. AC 101-01 v2.0 - Remotely piloted aircraft systems, 2018. [Online; accessed 14-February-2018]. [4] Oliver M Cliff, Robert Fitch, Salah Sukkarieh, Debbie Saunders, and Robert Heinsohn. Online Localization of Radio-Tagged Wildlife with an Autonomous Aerial Robot System. In Robotics: Science and Systems, 2015. [5] Neil J Gordon, David J Salmond, and Adrian FM Smith. Novel approach to nonlinear/non-Gaussian Bayesian state estimation. IEE Proceedings F - Radar and Signal Processing, 140(2):107โ€“113, 1993. [6] Alfred O Hero, Christopher M Kreucher, and Doron Blatt. Information theoretic approaches to sensor management. Springer US, 2008. [7] David Hsu, Wee Sun Lee, and Nan Rong. A point-based POMDP planner for target tracking. In Proc. of IEEE ICRA, pages 2644โ€“2650, 2008. [8] Austin M Jensen, David K Geller, and YangQuan Chen. Monte Carlo simulation analysis of tagged fish radio tracking performance by swarming unmanned aerial vehicles in fractional order potential fields. Journal of Intelligent & Robotic Systems, 74(1-2):287โ€“307, 2014. [9] Leslie Pack Kaelbling, Michael L. Littman, and Anthony R. Cassandra. Planning and acting in partially observable stochastic domains. Artificial Intelligence, 101(1):99 โ€“134, 1998. [10] Roland Kays, Sameer Tilak, Margaret Crofoot, Tony Fountain, Daniel Obando, Alejandro Ortega, Franz Kuemmeth, Jamie Mandel, George Swenson, Thomas Lambert, et al. Tracking animal location and activity with an automated radio telemetry system in a tropical rainforest. The Computer Journal, pages 1931โ€“1948, 2011. [11] Fabian Kรถrner, Raphael Speck, Ali Haydar Gรถktogan, and Salah Sukkarieh. Autonomous airborne wildlife tracking using radio signal strength. In Proc. of IEEE/RSJ IROS, pages 107โ€“112, 2010. [12] Sophocles J Orfanidis. Electromagnetic waves and antennas. Rutgers University New Brunswick, NJ, 2002. [13] Michael Ossmann. Software Defined Radio with HackRF, 2015. [14] Andrรฉ Posch and Salah Sukkarieh. UAV based search for a radio tagged animal using particle filters. In Australasian Conference on Robotics and Automation (ACRA), Sydney, Australia, Dec, pages 2โ€“4, 2009. [15] Branko Ristic. Particle Filters for Random Set Models. Springer-Verlag New York, 2013. [16] Branko Ristic and Ba-Ngu Vo. Sensor control for multiobject state-space estimation using random finite sets . Automatica, 46(11):1812 โ€“ 1818, 2010. [17] Branko Ristic, Sanjeev Arulampalam, and Neil (chercheur) Gordon. Beyond the Kalman filter : particle filters for tracking applications. Artech House, 2004. [18] Branko Ristic, Mark Morelande, and Ajith Gunatilaka. Information driven search for point sources of gamma radiation. Signal Processing, 90(4):1225โ€“1239, 2010. [19] David Silver and Joel Veness. Monte-Carlo planning in large POMDPs. In Advances in neural information processing systems, pages 2164โ€“2172, 2010. [20] Bindi Thomas, John D Holland, and Edward O Minot. Wildlife tracking technology options and cost considerations. Wildlife Research, 38(8):653โ€“663, 2012. [21] Pratap Tokekar, Deepak Bhadauria, Andrew Studenski, and Volkan Isler. A robotic system for monitoring carp in Minnesota lakes. Journal of Field Robotics, 27(6): 779โ€“789, 2010. [22] Joshua Vander Hook, Pratap Tokekar, and Volkan Isler. Cautious Greedy Strategy for Bearing-only Active Localization: Analysis and Field Experiments. Journal of Field Robotics, 31(2):296โ€“318, 2014. [23] Neeti Wagle and Eric Frew. Spatio-temporal characterization of airborne radio frequency environments. In IEEE GLOBECOM Workshops, pages 1269โ€“1273, 2011. [24] Jakes WC Jr. Microwave mobile communications. Wiley, New York, 1974.
3cs.SY
Moonshine: Distilling with Cheap Convolutions arXiv:1711.02613v1 [stat.ML] 7 Nov 2017 Elliot J. Crowley, Gavin Gray, Amos Storkey School of Informatics The University of Edinburgh Abstract Model distillation compresses a trained machine learning model, such as a neural network, into a smaller alternative such that it could be easily deployed in a resource limited setting. Unfortunately, this requires engineering two architectures: a student architecture smaller than the first teacher architecture but trained to emulate it. In this paper, we present a distillation strategy that produces a student architecture that is a simple transformation of the teacher architecture. Recent model distillation methods allow us to preserve most of the performance of the trained model after replacing convolutional blocks with a cheap alternative. In addition, distillation by attention transfer provides student network performance that is better than training that student architecture directly on data. 1 Introduction Despite advances in deep learning for a variety of tasks [LeCun et al., 2015], deployment of deep learning into embedded devices e.g. mobile phones, digital cameras, vehicle navigation systems, has been relatively slow due to resource constraints under which these devices operate. Big, memory-intensive neural networks donโ€™t fit on these devices, but do these networks have to be big and expensive? The dominant run-time memory cost of neural networks is the number of parameters that need to be stored. Can we have networks with substantially fewer parameters, without the commensurate loss of performance? It is possible to take a large pre-trained teacher network, and use its outputs to aid in the training of a smaller student network [Ba and Caruana, 2014] through some distillation process. By doing this the student network is more powerful than if it was trained solely on the training data, and is closer in performance to the larger teacher. The lower-parameter student network typically has an architecture that is more shallow, or thinner โ€“ by which we mean its filters have less channels [Romero et al., 2014] โ€“ than the teacher. While it is not possible to arbitrarily approximate any network with another [Urban et al., 2017], the limit in neural network performance is at least in part due to the training algorithm, rather that its representational power. In this paper, we take an alternative approach in designing our student networks. Instead of making networks thinner, or more shallow, we take the standard convolutional block such networks possess and replace it with a cheaper convolution block, keeping the original architecture. For example, in a ResNet [He et al., 2016a] this standard block is a pair of sequential 3ร—3 convolutions. We show that for a comparable number of parameters, student networks that retain the architecture of their teacher but with cheaper convolutional blocks outperform student networks with the original blocks and smaller architectures. As a model compression strategy, this is very effective. At the same time this transformation is easy to implement in any deep learning framework; replacing convolutional blocks is a simple substitution into any existing architecture. Furthermore, the optimisation scheme used on the teacher network can be repeated on the student, making another round of hyperparameter optimisation unnecessary. The cheap convolutional blocks we suggest are described in Section 3 as well as an overview of the methods we employ for distillation. In Section 4 we train a number of student networks for the task of image classification on the CIFAR-10 and CIFAR-100 [Krizhevsky, 2009] datasets and demonstrate that those with cheap convolutions perform better than traditional student networks for a given parameter cost. This level of parameter reduction is competitive with much more complicated methods in the literature [Howard et al., 2017]; and some of these methods may be complementary [Han et al., 2015]. Though it is possible to train the resulting architectures directly, this is demonstrably less effective than distilling them from the larger teacher model. 2 Related Work The parameters in deep networks have a great deal of redundancy; it has been shown that many of them can be predicted from a subset of parameters [Denil et al., 2013]. However the challenge remains to find good ways to exploit this redundancy without losing model accuracy. This observation, along with a desire for efficiency improvements has driven the development of smaller, and less computationally-intensive convolutions. One of the most prominent examples is the depthwise separable convolution [Sifre, 2014] which applies a separate convolutional kernel to each channel, followed by a pointwise convolution [Lin et al., 2014] over all channels; depthwise separable convolutions have been used in several architectures [Ioffe and Szegedy, 2015, Chollet, 2016, Xie et al., 2017], and were explicitly adapted to mobile devices in Howard et al. [2017]. However, separating the spatial and channel-wise elements is not the only way to simplify a convolution. In Jin et al. [2015] the authors propose breaking up the general 3D convolution into a set of 3 pointwise convolutions along different axes. The authors of Wang et al. [2016] start with separable convolutions and add topological subdivisioning, a way to treat sections of tensors separately, and a bottleneck of the spatial dimensions. Both of these methods demonstrate models that are several times smaller than the original model while maintaining accuracy. In a separable convolution, the most expensive part is the pointwise convolution, so it has been proposed that this operation could also be grouped over sets of channels. However, to maintain some connections between channels, it is helpful to add an operation mixing the channels together [Zhang et al., 2017]. More simply, a squared reduction can be achieved by applying a bottleneck on the channels before the spatial convolution [Xie et al., 2017, Iandola et al., 2016]. In this paper we examine the potency of a separable bottleneck structure. The work discussed thus far in this section involves learning a compressed network from scratch. There are clear alternatives to this such as retraining after reducing the number of parameters [Han et al., 2015, Li et al., 2017]. We are interested in learning our smaller network as a student through distillation [Ba and Caruana, 2014, BuciluaฬŒ et al., 2006] in conjunction with a large pre-trained teacher network. How small can our student be? The complex function of a large, deep teacher network can, theoretically, be approximated by a network with a single hidden layer with enough units [Cybenko, 1989]. The difficulty in practice is learning that function. Knowledge distillation [Ba and Caruana, 2014, Hinton et al., 2016] proposes to use the information in the logits of a learnt network to train the smaller student network. In early experiments, this 2 was shown to be effective; networks much smaller than the original could be trained with small increases in error. However, modern deep architectures prove harder to compress. For example, a deep convolutional network cannot be trivially replaced by a feedforward architecture [Urban et al., 2017]. Two methods have been proposed to deal with this. First, in Romero et al. [2014] the authors use a linear map between activations at intermediate points to produce an extra loss function. Second, in attention transfer [Zagoruyko and Komodakis, 2017], the authors choose instead to match the activations after taking the mean over the channels. In the context of this paper, we found attention transfer to be effective in our experiments, as described in Section 4. 3 Model Compression with Cheap Convolutions Given a large, deep network that performs well on a given task, we are interested in compressing that network so that it uses fewer parameters. A flexible and widely applicable way to reduce the number of parameters in a model is to replace all its convolutional layers with a cheaper alternative. Doing this replacement invariably impairs performance when this reduced network is trained directly on the data. Fortunately, we are able to demonstrate that modern distillation methods enable the cheaper model to have performance closer to the original large fully-convolutional network. 3.1 Distillation For this paper, we utilise and compare two different distillation methods for learning a smaller student network from a large, pre-trained teacher network: knowledge distillation [Hinton et al., 2016, Ba and Caruana, 2014] and attention transfer [Zagoruyko and Komodakis, 2017]. We briefly explain these methods below: Knowledge Distillation P Let us denote the cross entropy of two probability vectors p and q as LCE (p, q) = โˆ’ k pk log qk . Assume we have a dataset of elements, with one such element denoted x, where each element has a corresponding one-hot class label: denote the one-hot vector corresponding to x by y. Given x, we have a trained teacher network t = teacher(x) that outputs the corresponding logits, denoted by t; likewise we have a student network that outputs logits s = student(x). To perform knowledge distillation we train the student network to minimise the following loss function (averaged across all data items):      t s 2 LKD = (1 โˆ’ ฮฑ)LCE (y, ฯƒ(s)) + 2T ฮฑLCE ฯƒ ,ฯƒ , (1) T T where ฯƒ(.) is the softmax function, T is a temperature parameter and ฮฑ is a parameter controlling the ratio of the two terms. The first term is a standard cross entropy loss penalising the student network for incorrect classifications. The second term is minimised if the student network produces outputs similar to that of the teacher network. The idea being that the outputs of the teacher network contain additional, beneficial information beyond just a class prediction. Attention Transfer Consider some choice of layers i = 1, 2, ..., NL in a teacher network, and the corresponding layers in the student network. At each chosen layer i of the teacher network, collect the spatial map of the activations for channel j into the vector atij . Let Ati collect atij for all j. Likewise for the student network we correspondingly collect into asij and Asi . 3 Now given some choice of mapping f (Ai ) that maps each collection of the form Ai into a vector, attention transfer involves learning the student network by minimising: LAT = LCE (y, ฯƒ(s)) + ฮฒ NL X i=1 f (Ati ) f (Asi ) โˆ’ t ||f (Ai )||2 ||f (Asi )||2 , (2) 2 where ฮฒ is a hyperparameter. Zagoruyko and Komodakis [2017] recommended using PNA f (Ai ) = (1/NAi ) j=1i a2ij , where NAi is the number of channels at layer i. In other words, the loss targeted the difference in the spatial map of average squared activations, where each spatial map is normalised by the overall activation norm. Let us examine the loss (2) further. The first term is again a standard cross entropy loss. The second term, however, ensures the spatial distribution of the student and teacher activations are similar at selected layers in the network, the explanation being that both networks are then paying attention to the same things at those layers. 3.2 Cheap Convolutions As large fully-connected layers are no longer commonplace, convolutions make up almost all of the parameters in modern networks.1 It is therefore desirable to make them smaller. Here, we present several convolutional blocks that may be introduced in place of a standard block in a network to substantially reduce its parameter cost. First, let us consider a standard two dimensional convolutional layer that contains Nout filters, each of size Nin ร— k ร— k (assuming square convolutions). Nout is the number of channels of the layer output, Nin is the number of channels of the input, and k ร— k is the kernel size of each convolution. In modern neural networks it is almost always the case that Nin 6 Nout . Let N = max(Nin , Nout ). Then the parameter cost of this layer is Nin Nout k 2 , and is bounded by N 2 k 2 . In a typical residual network, a block contains two such convolutions. We will refer to this as a Standard block S, and it is outlined in Table 1. One alternative to full convolutions, with parameters that scale approximately as N 2 , is to break each convolution into g groups, as shown in Figure 1. By restricting the convolutions to only mix channels within each group and not between groups, we obtain a substantial reduction in the number of parameters for a grouped computation: for example, for Nin = Nout = N the cost changes from N 2 k 2 for a standard layer to g groups of (N/g)2 k 2 parameter convolutions, hence reducing the parameter cost by a factor of g. We can then provide some cross-group mixing by following each grouped convolution with a pointwise convolution, with a N 2 parameter cost (when Nin 6= Nout the change in channel size occurs across this pointwise convolution). We refer to this substitution operator as G(g) (grouped convolution with g groups), and illustrate it in Figure 2. In the original ResNet paper [He et al., 2016a] the authors introduce a bottleneck block which we have parameterised, and denoted as B(b) in Table 1: the input first has its channels decreased by a factor of b via a pointwise convolution, before a full convolution is carried out. Finally, another pointwise convolution brings the representation back up to the desired Nout . We can reduce the parameter cost of this block even further by replacing the full convolution with a grouped one; the Bottleneck Grouped + Pointwise block is referred to as BG(b, g) and is illustrated in Figure 2. These substitute blocks are compared in Table 1 and their computational costs (for simplicity we take the case where Nin = Nout = N ) are given. In practice, by varying the bottleneck size and the number of groups, network parameter numbers may vary over two orders of magnitude; enumerated examples are given in Tables 3 and 4. 1 The parameters introduced by batch normalisation are negligible compared to those in the convolutions. However, they are included for completeness in Table 1. 4 N/g Figure 1: Grouped convolutions operate by passing independent filters over the tensor after it is separated into g groups over the channel dimension. Consider a grouped convolution where the input and and output both have N channels: each of the g filters only needs to operate over N/g channels. This reduces the parameter cost of the convolution by a factor of g. Standard G(g) BG(b,g) Figure 2: The Grouped + Pointwise (G(g)) block substitutes all full k ร— k convolutions in the Standard block with a grouped convolution followed by a pointwise (1 ร— 1) convolution. To reduce parameters further, a pointwise Bottleneck can be used before the Grouped + Pointwise convolution (BG(b, g)). 5 Using grouped convolutions and bottlenecks are common methods for parameter reduction when designing a network architecture. Both are easy to implement in any deep learning framework. Sparsity inducing methods [Han et al., 2015], or approximate layers [Yang et al., 2015], may also provide advantages, but these are complementary to the approaches here. More structured reductions such as grouped convolutions and bottlenecks can be advantageous over sparsity methods in that the sparsity structure does not need to be stored. The claim of this paper is that structured parameter reductions are sufficient to achieve model compression results in line with state of the art when using effective model distillation. Block S G(g) B(b) BG(b, g) Structure BN+ReLU Conv BN+ReLU Conv BN+ReLU GConv (g) BN+ReLU Conv1x1 BN+ReLU GConv (g) BN+ReLU Conv1x1 BN+ReLU Conv1x1(N โ†’ Nb ) BN+ReLU Conv BN+ReLU Conv1x1( Nb โ†’ N ) BN+ReLU Conv1x1(N โ†’ Nb ) BN+ReLU GConv(g) BN+ReLU Conv1x1( Nb โ†’ N ) 2N 2 k2 2N 2 ( kg + 1) N 2 ( kb2 + 2b ) k 2 N 2 ( gb 2 + b) 8N 16N N (4 + 8b ) N (4 + 8b ) Conv Params BN Params 2 2 2 Table 1: Convolutional Blocks used in this paper: a standard block S, a grouped + pointwise block G, a bottleneck block B, and a bottleneck grouped + pointwise block BG. All blocks use pre-activations [He et al., 2016b]. Conv refers to a kร—k convolution. GConv is a grouped k ร— k convolution and Conv1x1 is a pointwise convolution. BN+ReLU refers to a batchnorm layer followed by a ReLU activation. We assume that the input and output to each block has N channels and that channel size does not change over a particular convolution unless written out explicitly as (x โ†’ y). Where applicable, g is the number of groups in a grouped convolution and b is the bottleneck contraction. We give the parameter cost of the convolutions in each block in terms of these parameters. The batch-norm parameter cost (assuming running mean/variance are kept for normalisation) is also given, but is markedly smaller. 4 Experiments In this section we train and evaluate a number of student networks, each distilled from the same large teacher network. We distil with (i) knowledge distillation and (ii) attention transfer. We also train the networks without any form of distillation to observe whether the the distillation process is necessary to obtain good performance. In this way we demonstrate that the high performance comes from the distillation, and cannot be achieved by directly training the student networks using the data. For comparison we also study student networks with smaller architectures (i.e. fewer layers/filters) than the teacher. This enables us to test if the block transformations we propose are key, or it is simply a matter of distilling networks with smaller numbers of parameters. We compare the smaller student architectures with student architectures implementing cheap, substitute convolutional blocks (but with the same architecture as the teacher). The different convolutional blocks are summarised in Table 1 and the student networks are described in detail in Section 4.1. Experiments are conducted for both the CIFAR-10 and CIFAR-100 datasets. Results for 6 group output size structure conv1 conv2 conv3 conv4 pool fc 16 ร— 32 ร— 32 16k ร— 32 ร— 32 32k ร— 16 ร— 16 64k ร— 8 ร— 8 64k ร— 1 ร— 1 classes 1ร— Conv3x3(N = 16) nร— Block(N = 16k) nร— Block(N = 32k) nร— Block(N = 64k) 8 ร— 8 avg-pool 64k ร— classes fully connected Table 2: Summary of the Wide ResNet structures used in experiments; matching those in Zagoruyko and Komodakis [2017]. The bulk of the parameters are in {conv2, conv3, conv4} which each consist of n blocks with channel width N controlled by k. We explore the effect of substituting these blocks with cheaper alternatives. classes refers to the number of object classes which is, perhaps unsurprisingly, 10 for CIFAR-10 and 100 for CIFAR-100. CIFAR-10 are given in Table 3 and Figure 3. Results for CIFAR-100 can be found in Table 4 and Figure 4. These results are discussed in detail in Section 4.2. 4.1 Network Descriptions For our experiments we utilise the competitive Wide Residual Network (WRN) architecture [Zagoruyko and Komodakis, 2016], which is briefly summarised in Table 2. The bulk of the network lies in the {conv2, conv3, conv4} groups and the network depth d determines the number of convolutional blocks n in these groups as n = (d โˆ’ 4)/6. The network width, denoted by k, affects the channel size of the filters in these blocks. Note that when we employ attention transfer the student and teacher outputs of groups {conv2, conv3, conv4} are used as {A1 , A2 , A3 } in the second term of Equation (2) with NL = 3. For our teacher network we use WRN-40-2 (a WRN with depth 40 and width 2) with standard (S) blocks. 3 ร— 3 kernels are used for all non-pointwise convolutions in our student and teacher networks unless stated otherwise. For our student networks we use: โ€ข WRN-40-1, 16-2, and 16-1 with S blocks. These are student networks that are thinner and/or more shallow than the teacher and represent typical student networks most works employ. โ€ข WRN-40-2 with S blocks where the 3 ร— 3 kernels have been replaced with 2 ร— 2 dilated kernels (as described in [Yu and Koltun, 2016]). This allows us to see if it possible to naively reduce parameters by effectively zeroing out elements of each kernel. โ€ข WRN-40-2 using a bottleneck block B with 2ร— and 4ร— channel contraction (b). โ€ข WRN-40-2 using a grouped + pointwise block G for group sizes (g) {2, 4, 8, 16, N/16, N/8, N/4, N/2, N} where N is the number of channels in that block. This allows us to explore the spectrum between full convolutions (g = 1) and fully separable convolutions (g = N ). โ€ข WRN-40-2 with a bottlenecked grouped + pointwise block BG. We use b = 2 with groups sizes of {2, 4, 8, 16, M/16, M/8, M/4, M/2, M} where M = N/b is the number of channels after the bottleneck. We use this notation so that (g = M ) represents fully separable convolutions and we can easily denote divisions thereof. BG(4, M ) is also used to observe the effect of extreme compression. Implementation Details Experiments were conducted in PyTorch [Paszke et al.]. For training we used minibatches of size 128. Before each minibatch, the images were padded 7 by 4 ร— 4 zeros, and then a random 32 ร— 32 crop was taken. Each image was left-right flipped with a probability of a half. Training was conducted for 200 epochs using SGD with standard momentum fixed at 0.9 with an initial learning rate of 0.1. The learning rate was reduced by a factor of 0.2 at the start of epochs 60, 120, and 160. For knowledge distillation we set ฮฑ to 0.9 and used a temperature of 4. For attention transfer ฮฒ was set to 1000. 4.2 Analysis and Observations Figure 3 compares the parameter cost of each student network (on a log scale) against the test error on CIFAR-10 obtained with attention transfer. On this plot, the ideal network would lie in the bottom-left corner (few parameters, low error). What is fascinating is that almost every network with the same architecture as the teacher, but with cheap convolutional blocks (those on the blue, green, and cyan lines) performs better for a given parameter budget than the reduced architecture networks with standard blocks (the red line). BG(2, 2) outperforms 16 โˆ’ 2 (5.57% vs. 5.66%) despite having considerably fewer parameters (292K vs. 693K). Several of the networks with BG blocks both significantly outperform 16 โˆ’ 1 and use less parameters. Figure 3: Test Error vs. No. parameters for student networks learnt with attention transfer on CIFAR-10. Note that the x-axis is logarithmically scaled. Points on the red curve correspond to networks with S convolutional blocks and reduced architectures. All other networks have the same WRN-40-2 architecture as the teacher but with cheap convolutional blocks: G (green), B (blue), and BG (cyan). The blocks are described in detail in Table 1. Notice that the student networks with cheap blocks outperform those with smaller architectures and standard convolutions for a given parameter budget. 8 It is encouraging that significant compression is possible with only small losses; several networks perform almost as well as the teacher with considerably less parameters โ€“ G(N/8) (blue) has an error of 5.06%, close to that of the teacher, but has just over a fifth of the parameters. BG(2, M/8) has less than a tenth of the parameters of the teacher, for a cost of 1.15% increase in error. With a similar change in error, these compression rates exceed those found in contemporary papers, such as Cohen and Welling [2016]. Even simply switching all convolutions with smaller, dilated equivalents S โˆ’ 2 ร— 2 allows one to use half the parameters for a similar performance. An important lesson can be learnt regarding grouped + pointwise convolutions. They are often used in their depthwise-separable [Chollet, 2016] form (when the number of groups is equal to N , the total number of channels in the convolution). However, the networks with half, or quarter that number of groups perform substantially better for a modest increase in parameters. G(N/4) has 374K parameters compared to the 304K of G(N ) but has an error that is 1.26% lower. As we make the number of groups smaller the performance gets close to that of the teacher as the network structure is getting closer and closer to the original convolutions in the teacher (neglecting the pointwise component). The number of groups is an easy parameter to tune to trade some performance for a smaller network. Grouped + pointwise convolutions also work well in conjunction with a bottleneck of size 2, although for large bottlenecks the error increases rather significantly โ€“ as can be seen for BG(4, M ). Despite this, it is still of comparable performance to 16 โˆ’ 1 with half the parameters. We observe similar trends for CIFAR-100 in Figure 4. Figure 4: Test Error vs. No. parameters for student networks learnt with attention transfer on CIFAR-100. Points on the red curve correspond to networks with S convolutional blocks and reduced architectures. All other networks have the same WRN-40-2 architecture as the teacher but with cheap convolutional blocks: G (green), B (blue), and BG (cyan). 9 We also observe that attention transfer from the teacher network is substantially better than knowledge distillation or than training a network structure directly on the data. Consider Table 3, which shows the attention transfer errors of Figure 3 (the AT Error column) alongside those of networks trained with knowledge distillation (KD Error), and no distillation (Error) for CIFAR-10. In all cases, the student network trained with attention transfer is better than the student network trained by itself โ€“ a distillation process appears to be necessary. Some performances are particularly impressive โ€“ for G(2) blocks the error is only 0.08% higher than the teacher despite the network having under half as many parameters. It is also noticeable that knowledge distillation gives similar, or even worse performance than if the student network was trained by itself. These conclusion are mirrored for CIFAR-100 training (Table 4). Romero et al. [2014] note that the performance issues with knowledge distillation occur in networks with a depth of more than 7 layers. Zagoruyko and Komodakis [2017] also observe that experiments training a CNN on Imagenet would not converge when using knowledge distillation. 5 Conclusion After training a large, deep model it may be prohibitively time consuming to design a model compression strategy in order to deploy it. On many problems, it may also be more difficult to achieve the desired performance with a smaller model. We have demonstrated a model compression strategy that is fast to apply, and doesnโ€™t require any additional engineering. Furthermore, the optimisation algorithm of the larger model is sufficient to train the cheaper student model. The cheap convolutions used in this paper were chosen for their ease of implementation. Future work could investigate more complicated approximate operations, such as those described in Moczulski et al. [2015]; which could make a difference for the 1ร—1 convolutions in the final layers of a network. One could also make use of custom blocks generated through a large scale black box optimisation as in [Zoph et al., 2017]. Equally, there are many methods for low rank approximations that could be applicable [Jaderberg et al., 2014, Garipov et al., 2016, Sainath et al., 2013]. We hope that this work encourages others to consider cheapening their convolutions as a compression strategy. Acknowledgements. This project has received funding from the European Unionโ€™s Horizon 2020 research and innovation programme under grant agreement No. 732204 (Bonseyes). This work is supported by the Swiss State Secretariat for Educationโ€š Research and Innovation (SERI) under contract number 16.0159. The opinions expressed and arguments employed herein do not necessarily reflect the official views of these funding bodies. 10 Depth-Width Block Teacher 40-2 16-2 40-1 16-1 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 S S S S S-2x2 G(2) G(4) G(8) G(16) G(N/16) G(N/8) G(N/4) G(N/2) G(N) B(2) B(4) BG(2,2) BG(2,4) BG(2,8) BG(2,16) BG(2,M/16) BG(2,M/8) BG(2,M/4) BG(2,M/2) BG(2,M) BG(4,M) No. Params Error KD Error AT Error 2248954 693498 566650 175994 1012474 1369530 825210 553050 416970 651834 466362 373626 327258 304074 437242 155002 292090 219514 183226 165082 234704 195322 171130 159034 152986 85450 4.79 6.53 6.48 8.81 5.89 5.30 5.50 5.92 6.65 5.72 6.07 6.93 7.12 8.51 6.36 7.94 6.12 6.75 6.94 6.77 6.26 6.75 7.06 7.45 7.95 9.04 โ€“ 6.03 6.39 8.75 6.03 5.37 5.81 5.72 6.38 5.72 5.61 6.45 6.83 8.01 6.28 7.83 6.25 6.75 6.98 6.97 6.50 6.49 7.15 7.47 7.99 8.61 โ€“ 5.66 5.50 7.72 5.09 4.87 5.00 5.05 5.13 5.12 5.06 5.31 5.98 6.57 5.37 6.93 5.57 6.05 6.09 6.19 6.02 5.94 6.03 6.17 6.67 7.87 Table 3: Student Network test error on CIFAR-10. Each network is a Wide ResNet with its depth-width given in the first column, and with its block type in the second. S is a standard convolutional block. S โˆ’ 2 ร— 2 is a standard block with dilated 2x2 kernels. G(g) is a grouped + pointwise block with g groups. B(b) is a bottleneck block with contraction b. BG(b, g) is a bottleneck block with contraction b and a grouped convolution with g groups. N refers to the channel width of each block, and M refers to the channel width after the bottleneck where applicable. The total parameter cost of the network is given in the third column. Errors are reported for (i) learning with no distillation (Error), (ii) knowledge distillation with a teacher (KD Error), and attention transfer with a teacher (AT Error). The same teacher is used for training, and is given in the first row. This table shows that (i) through attention transfer it is possible to cut the number of parameters of a network, but retain high performance and (ii) for a similar number of parameters, students with cheap convolutional blocks, outperform those with expensive convolutions and smaller architectures. 11 Depth-Width Block Teacher 40-2 16-2 40-1 16-1 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 40-2 S S S S S-2x2 G(2) G(4) G(8) G(16) G(N/16) G(N/8) G(N/4) G(N/2) G(N) B(2) B(4) BG(2,2) BG(2,4) BG(2,8) BG(2,16) BG(2,M/16) BG(2,M/8) BG(2,M/4) BG(2,M/2) BG(2,M) BG(4,M) No. Params Error KD Error AT Error 2260564 705108 572500 181844 1024084 1381140 836820 564660 428580 663444 477972 385236 338868 315684 448852 166612 303700 231124 194836 176692 255316 206932 182740 170644 164596 97060 23.85 27.63 29.64 34 27.2 25.94 26.20 26.49 28.85 27.08 27.85 28.91 30.24 31.84 28.27 31.63 28.51 29.39 30.21 30.57 29.69 29.09 30.42 30.44 30.90 33.64 โ€“ 27.97 30.21 37.28 26.98 24.92 25.48 26.64 27.10 26.11 27.05 27.93 28.89 29.99 28.08 33.63 28.82 29.25 29.34 30.54 28.69 29.13 30.28 30.66 31.18 37.34 โ€“ 27.24 28.24 33.74 26.09 24.45 25.30 25.71 26.34 25.78 26.15 26.85 28.54 30.06 26.68 30.56 28.28 28.54 28.89 29.46 29.05 28.16 28.60 29.51 30.03 32.89 Table 4: Student Network test error on CIFAR-100. Each network is a Wide ResNet with its depth-width given in the first column, and with its block type in the second. These blocks are described in detail in Section 3.2. The total parameter cost of the network is given in the third column. Errors are reported for (i) learning with no distillation (Error), (ii) knowledge distillation with a teacher (KD Error), and attention transfer with a teacher (AT Error). The same teacher is used for training, and is given in the first row. 12 References Lei Jimmy Ba and Rich Caruana. Do deep nets really need to be deep? In Advances in Neural Information Processing Systems, 2014. Cristian BuciluaฬŒ, Rich Caruana, and Alexandru Niculescu-Mizil. Model compression. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006. Franรงois Chollet. Xception: Deep learning with depthwise separable convolutions. CoRR, abs/1610.02357, 2016. URL http://arxiv.org/abs/1610.02357. Taco Cohen and Max Welling. Group equivariant convolutional networks. In Maria Florina Balcan and Kilian Q. Weinberger, editors, Proceedings of The 33rd International Conference on Machine Learning, volume 48 of Proceedings of Machine Learning Research, pages 2990โ€“2999, New York, New York, USA, 20โ€“22 Jun 2016. PMLR. URL http://proceedings.mlr.press/v48/cohenc16.html. George Cybenko. Approximation by superpositions of a sigmoidal function. Mathematics of Control, Signals, and Systems (MCSS), 2(4):303โ€“314, 1989. Misha Denil, Babak Shakibi, Laurent Dinh, Marcโ€™Aurelio Ranzato, and Nando de Freitas. Predicting parameters in deep learning. In Advances in Neural Information Processing Systems, 2013. Timur Garipov, Dmitry Podoprikhin, Alexander Novikov, and Dmitry P. Vetrov. Ultimate tensorization: compressing convolutional and FC layers alike. CoRR, abs/1611.03214, 2016. URL http://arxiv.org/abs/1611.03214. Song Han, Huizi Mao, and William J. Dally. Deep compression: Compressing deep neural networks with pruning, trained quantization and Huffman coding. CoRR, abs/1510.00149, 2015. URL http://arxiv.org/abs/1510.00149. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016a. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Identity mappings in deep residual networks. In European Conference on Computer Vision, 2016b. Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. Distilling the knowledge in a neural network. CoRR, abs/1503.02531, 2016. URL http://arxiv.org/abs/1503.02531. Andrew G. Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. MobileNets: Efficient convolutional neural networks for mobile vision applications. CoRR, abs/1704.04861, 2017. URL http://arxiv.org/abs/1704.04861. Forrest N. Iandola, Matthew W. Moskewicz, Khalid Ashraf, Song Han, William J. Dally, and Kurt Keutzer. SqueezeNet: AlexNet-level accuracy with 50ร— fewer parameters and < 1MB model size. CoRR, abs/1602.07360, 2016. URL http://arxiv.org/abs/ 1602.07360. Sergey Ioffe and Christian Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International Conference on Machine Learning, pages 448โ€“456, 2015. Max Jaderberg, Andrea Vedaldi, and Andrew Zisserman. Speeding up convolutional neural networks with low rank expansions. In British Machine Vision Conference, 2014. Jonghoon Jin, Aysegul Dundar, and Eugenio Culurciello. Flattened convolutional neural networks for feedforward acceleration. In International Conference on Learning Representations, 2015. 13 Alex Krizhevsky. Learning multiple layers of features from tiny images. Masterโ€™s thesis, University of Toronto, 2009. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553): 436โ€“444, 2015. Zhe Li, Xiaoyu Wang, Xutao Lv, and Tianbao Yang. SEP-Nets: Small and effective pattern networks. CoRR, abs/1706.03912, 2017. URL http://arxiv.org/abs/1706. 03912. Min Lin, Qiang Chen, and Shuicheng Yan. Network in network. In International Conference on Learning Representations, 2014. Marcin Moczulski, Misha Denil, Jeremy Appleyard, and Nando de Freitas. ACDC: a structured efficient linear layer. CoRR, abs/1511.05946, 2015. URL http://arxiv. org/abs/1511.05946. Adam Paszke, Sam Gross, Soumith Chintala, and Gregory Chanan. PyTorch: Tensors and dynamic neural networks in Python with strong GPU acceleration. https://github. com/pytorch/pytorch. Accessed: 31st October 2017. Adriana Romero, Nicolas Ballas, Samira Ebrahimi Kahou, Antoine Chassang, Carlo Gatta, and Yoshua Bengio. FitNets: Hints for thin deep nets. CoRR, abs/1412.6550, 2014. URL http://arxiv.org/abs/1412.6550. Tara N. Sainath, Brian Kingsbury, Vikas Sindhwani, Ebru Arisoy, and Bhuvana Ramabhadran. Low-rank matrix factorization for deep neural network training with high-dimensional output targets. In IEEE International Conference on Acoustics, Speech and Signal Processing, 2013. Laurent Sifre. Rigid-Motion Scattering for Image Classification. PhD thesis, ร‰cole Polytechnique, 2014. Gregor Urban, Krzysztof J. Geras, Samira Ebrahimi Kahou, Ozlem Aslan, Shengjie Wang, Rich Caruana, Abdelrahman Mohamed, Matthai Philipose, and Matt Richardson. Do deep convolutional nets really need to be deep and convolutional? In International Conference on Learning Representations, 2017. Min Wang, Baoyuan Liu, and Hassan Foroosh. Factorized convolutional neural networks. CoRR, abs/1608.04337, 2016. URL http://arxiv.org/abs/1608.04337. Saining Xie, Ross Girshick, Piotr Dollรกr, Zhuowen Tu, and Kaiming He. Aggregated residual transformations for deep neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017. Zichao Yang, Marcin Moczulski, Misha Denil, Nando de Freitas, Alex Smola, Le Song, and Ziyu Wang. Deep fried convnets. In Proceedings of the IEEE International Conference on Computer Vision, 2015. Fisher Yu and Vladlen Koltun. Multi-scale context aggregation by dilated convolutions. In International Conference on Learning Representations, 2016. Sergey Zagoruyko and Nikos Komodakis. Wide residual networks. In British Machine Vision Conference, 2016. Sergey Zagoruyko and Nikos Komodakis. Paying more attention to attention: Improving the performance of convolutional neural networks via attention transfer. In International Conference on Learning Representations, 2017. X. Zhang, X. Zhou, M. Lin, and J. Sun. ShuffleNet: An extremely efficient convolutional neural network for mobile devices. CoRR, abs/1707.01083, 2017. URL http:// arxiv.org/abs/1707.01083. Barret Zoph, Vijay Vasudevan, Jonathon Shlens, and Quoc V. Le. Learning transferable architectures for scalable image recognition. CoRR, abs/1707.07012, 2017. URL http: //arxiv.org/abs/1707.07012. 14
1cs.CV
1 R. Serra et al. arXiv:1407.8508v1 [q-bio.MN] 30 Jul 2014 A stochastic model of catalytic reaction networks in protocells Roberto Serra1,2 , Alessandro Filisetti2 , Marco Villani1,2 , Alex Graudenzi3 , Chiara Damiani3,4 , and Tommaso Panini5 1 Dept. of Physics, Informatics and Mathematics, Modena and Reggio Emilia University 2 European Centre for Living Technology, ECLT, University Caโ€™ Foscari of Venice, Italy 3 Dept. of Informatics, Systems and Communication, University of Milan Bicocca, Italy 4 SYSBIO - Centre for Systems Biology, Piazza della Scienza 2, 20126 Milano, Italy 5 University of Turin, Department of Economics and Statistics "Cognetti de Martiis", Torino February 27, 2018 Abstract Protocells are supposed to have played a key role in the self-organizing processes leading to the emergence of life. Existing models either (i) describe protocell architecture and dynamics, given the existence of sets of collectively self-replicating molecules for granted, or (ii) describe the emergence of the aforementioned sets from an ensemble of random molecules in a simple experimental setting (e.g. a closed system or a steady-state flow reactor) that does not properly describe a protocell. In this paper we present a model that goes beyond these limitations by describing the dynamics of sets of replicating molecules within a lipid vesicle. We adopt the simplest possible protocell architecture, by considering a semi-permeable membrane that selects the molecular types that are allowed to enter or exit the protocell and by assuming that the reactions take place in the aqueous phase in the internal compartment. As a first approximation, we ignore the protocell growth and division dynamics. The behavior of catalytic reaction networks is then simulated by means of a stochastic model that accounts for the creation and the extinction of species and reactions. While this is not yet an exhaustive protocell model, it already provides clues regarding some processes that are relevant for understanding the conditions that can enable a population of protocells to undergo evolution and selection. 1 2 R. Serra et al. Keywords: Autocatalytic Sets of Molecules, Catalytic Reaction Sets, Origin of Life, Stochastic Simulations, Protocell 1 Introduction It is widely believed that the origin of life required the formation of sets of molecules able to collectively self-replicate, as well as of compartments able to undergo fission and proliferate, i.e.protocells [36, 37, 49]. In particular, in order to observe a lifelike behavior it was necessary that some of the chemical reactions were coupled to the rate of proliferation of the compartments. Several protocell architectures have been proposed [3, 12, 15, 27, 29, 30, 34, 37, 38, 39, 41, 44, 48, 49], most of them identifying the compartment with a lipid vesicle that may spontaneously fission under suitable circumstances. On the other hand, many distinct models were proposed to describe sets of reactions involving randomly generated molecules [1, 10, 20, 26]. In many cases, although this is not in principle required, it is assumed that only catalyzed reactions take place at a significant rate, therefore these sets are also termed catalytic reaction sets (briefly, CRSs). It is worth noting that the appearance of new molecules implies the appearance of new reactions involving those new molecules, so that both the set of molecular types and the set of reactions change in time. Hence, it is possible that at a certain time a set of molecules able to catalyze each otherโ€™s formation emerges [10, 20, 26], and we will refer to it as an autocatalytic set (ACS). It can be noticed that a CRS can contain one or more ACSs, or none. Even though some models of protocell actually describe the coupling between reaction networks and the dynamics of a lipid container, they consider only a fixed set of molecular species and reactions [3, 28, 40, 52], hence providing an incomplete representation of this complex interplay. Conversely, while there are several studies on collectively self replicating sets of molecules in a continuously stirred open-flow tank reactor, CSTR [1, 19, 23, 45, 46, 47] including our own [11, 13, 42], they provide only limited information about the behavior of a protocell. Therefore, in order to develop a framework that may unify the CRSs and the protocell modeling approaches, it is necessary i) to analyze the behavior of CRSs in a vesicle, and ii) to investigate the coupling of the evolving chemical population with the growth of the lipid container and its fission. In this paper we propose a step towards the first goal, while deferring the second one to a further work. In particular, we here analyze the behavior of a dynamical model of CRSs in a simplified model of a non-growing vesicle. To the best of our knowledge this is a novel approach. A few important remarks. Let us first observe that the CSTR is not an a-priori good model of a protocell for at least two reasons: i) in general, in protocells there is no constant inflow and ii) protocells have semipermeable membranes, which allow the inflow/outflow of some, but not all, molecular types. 2 3 R. Serra et al. On the contrary, in open flow reactors all that is contained in the inflow enters the reactor and all that is dissolved in the reactor can be washed out in the outflow.1 Another important limit of the CSTR concerns its evolvability. It has been argued [31, 51] that the presence of different asymptotic dynamical states and the ability to shift between them may be essential to achieve the viable evolution of the first forms of life. Recent works [50] have found that, in models of catalytic reaction networks in CSTRs, generally only one of these states is found, apart from fluctuations [5]. Furthermore, in order to accomplish the goal of this work, we need to better specify both the model of catalytic reactions sets and that of the protocell. As far as the former is concerned, we have studied the dynamics of random sets of molecules by revisiting a model by Kauffman, who proposed an interesting way to build new molecular species from the existing ones (see section 2 for a description). The original version of the model relied on purely graph-theoretical arguments [26], which are important, but fail to appreciate the effects of the dynamics, including noise, fluctuations and small-number effects. The dynamics has been later introduced by Farmer et al. [1, 10], who described the kinetics by using ordinary differential equations. However, this formalism does not account for the chance of a species to become extinct in a finite amount of time, as it may instead well happen (so the reaction graph may grow but never shrinks). In order to overcome these limitations, Bagley proposed an empirical correction by setting to zero the concentration values that happen to fall below a certain threshold [1]. In our works we rather use from the very beginning a stochastic approach to analyze the dynamics, the well-known Gillespie algorithm [16, 17], in order to deal in a rigorous way with low concentrations and with their fluctuations. Note that the Kauffman model largely relies upon randomness. In particular, every polymer in the system has a fixed probability (that may vanish) to catalyze any possible reaction. Therefore, in different simulations the same species can catalyze different reactions leading to the formation of different โ€œchemistriesโ€. Thus, this is exactly the language we choose: a set of tuples {species, catalysis, reaction}, where the species catalyzes the reaction, will be called โ€œchemistryโ€, because it describes a possible artificial world.2 We can then simulate different chemistries and look for generic properties of the set of chemistries; but in a different series of experiments we can also keep the chemistry fixed, and simulate various time histories. In principle, these may differ, since the discovery of a given catalyst at an early phase in a finite system might channel the following evolution in a way or another. Since the number of molecules of some species may be very small, it is not in principle legitimate 1 Limitations on the outflow can be modeled in a chemostat e.g. by supposing that all the molecules that are larger than a certain size precipitate and cannot be washed away. 2 It is worthwhile to notice that the presence of the โ€œcatalysisโ€ within the tuple allows the possibility for a species to catalyze more than one reaction and for a reaction to be catalyzed by more than one species. 3 4 R. Serra et al. to ignore this aspect, and our stochastic model is particularly well suited to analyze it, as it will be shown in Section 2. Of course, there can be conditions where all the simulations of a given chemistry converge asymptotically to the same chemical mixture. Moving now to the protocell model, note that they are usually based on lipid vesicles, i.e. approximately spherical structures with an aqueous interior and a membrane composed by a lipid bilayer, which spontaneously form when lipids are mixed with water under certain conditions [2, 7, 18, 27, 32, 34, 35]. Even though different protocell architectures have been proposed, we will here consider the simplest model, namely that in which all the key reactions take place in the aqueous phase inside the protocell. It would be indeed straightforward to model the coupling between some of these molecules and the growth of the protocell following an approach similar to that of our previous studies [3, 12, 40]. Yet, the main objective of the present work is that of studying the dynamics of CRSs embedded in a vesicle, so we will simplify our treatment by ignoring the growth dynamics of the protocell, and keeping its volume fixed. This implies that our study will be limited to time intervals that are short with respect to those describing the growth of the whole protocell. The selective character of membranes is a key ingredient of our model: we will suppose for simplicity that all (and only) the molecules that are shorter than a certain length can cross the membrane. The transmembrane motion of the permeable species is here supposed to be driven by the difference of their concentrations in the internal aqueous volume of the protocell and in the external aqueous environment. We will assume that transmembrane diffusion is extremely fast, so that there is always equilibrium between the concentrations of the species that can cross the membrane; this adiabatic hypothesis could be easily relaxed in the future. Furthermore, we assume that protocells are turgid, so that the constant-volume approximation implies that we will also neglect issues related to osmotic pressure. Another related aspect of the model is that, since it is assumed that the permeable species are at equilibrium, while the non-permeable ones never cross the barriers, infinite concentration growth is possible; this is obviously a nonphysical behavior, so the model validity is limited in time. All these simplifications, which will be removed in subsequent studies, are also justified by the fact that our main goal is that of studying how the dynamics of CRSs are affected by being embedded in a vesicle. This model can be used in order to investigate the behavior of the system in different conditions and to address some important questions. The first and perhaps most important one is the reason why compartments seem to be necessary for life. Indeed, the very first studies on self-replicating molecules [8, 9, 24, 26] were not interested in this aspect, so the CRSs were supposed to exist, e.g., in a pond or in a beaker. Yet life seems to require compartments, that are ubiquitous. It is then important to understand whether there are major differences between what may happen in a protocell and what happens in the bulk phase. 4 5 R. Serra et al. It would be unconvincing to postulate a priori that the internal and external environments are different. It is indeed more likely to assume that the vesicles form in a pre-existing aqueous environment, so the average internal milieu is essentially the same as the external one.3 Then, if a membrane surrounds a portion of the fluid, what can happen that makes a difference? Let us first observe that protocells are small (their typical linear dimensions ranging from 0.1 to 10ยตm). If we imagine that a population of protocells exists, and they are not โ€œovercrowedโ€, their total internal volume will typically be much smaller than the total external volume (this is a fortiori true for an isolated one). Moreover, every point in the interior of a protocell is not allowed to be far away from the surface of the protocell that contains it. These observations imply that the effect of surfaces will be much larger within protocells then outside them. Suppose for example that the membrane hosts some catalytic activities, so that important molecules are synthesized close to its boundaries, both inside and outside, and diffuse freely. If the membrane width is much smaller than the protocell radius, then the internal and external surface areas are very close to each other, but the external volume is much larger than the external one: therefore the internal concentrations will be much higher than those in the external environment. In this case, the system behavior in the interior can be significantly different from the external one [43]. Note also that this effect may be different for different molecules: the formation of some of them might be catalyzed by the membrane, while others might be unaffected: so even the relative concentrations of different chemicals may differ in the two cases. Indeed, there are important protocell models that are based on such an active catalytic role of the membrane [37]. In these cases it is easy to understand what the role of the protocell is, since it provides essential catalysts and a way to keep their products closer. But protocells might be able to give rise to an internal environment different from the bulk even if the catalytic activity is absent. The reason for this seemingly counterintuitive behavior is, once again, the smallness of the protocells. Note that we are considering a case where new molecules are formed (from those that are already in the interior of the protocell plus those that can cross the semipermeable membrane). If the concentrations are not too high, it is likely that the total numbers of newly formed molecules are quite low, so that different protocells might host different groups of molecules. It might even happen that a molecular type is present in some protocells and not in others. In order to get a feeling for this possibility, let us provide some realistic estimates of the number of molecules of different types that can be present in a protocell. Let us consider typical vesicles (linear dimension about 1ยตm) and small ones (0.1ยตm). Typical concentrations of macromolecules may be in the 3 It has been observed that some superconcentration phenomena can take place under particular circumstances [6, 43] but we will neglect them here. 5 6 R. Serra et al. Typical (1ยต3 ) Small (10โˆ’3 ยต3 ) 1M 108 105 1mM 105 102 0.1mM 104 10 1ยตM 102 0.1 1nM 0.1 10โˆ’4 Table 1: excepted number of molecules of a given species in a given protocell; rows refer to protocell volumes, columns to concentrations. millimolar to nanomolar range; the excepted numbers of molecules in a single protocell are therefore given in table 1. Let us recall that these numbers refer to the excepted values, but there are fluctuations that may be relevant when small numbers are involved. For example, in the case of a 1ยตM concentration in small vesicles, there will be on average 1 molecule every 10 cells: it is apparent that different protocells will have widely different initial compositions. We therefore come to the conclusion that the creation of small compartments can allow the formation of a population of different individuals out of the fluctuations of an environment that looks macroscopically homogeneous. While not yet sufficient, this is definitely a necessary condition for darwinian evolution to take place (obviously supposing that the compartments can divide and that their division rate depends upon composition). Moreover, in small stochastic systems it may also happen that there are different trajectories stemming from the same initial conditions, due to the order in which new molecules are synthesized. These aspects of protocell dynamics are very important and our model, in spite of its current limitations, is well suited to explore the related phenomena. It is indeed possible to analyze the different possible stochastic effects, that include: (i) the path dependency induced by the random order in which new molecules are generated, with particular regard to the low concentration effects: if a catalyst is discovered in advance with respect to another, the system evolution may be different; this can be studied by comparing different simulations referring to the same chemistry, starting from the same initial conditions; (ii) the differences induced by different initial conditions, randomly generated from the same distribution; (iii) the different behaviors of distinct chemistries: in the real world the rules of the chemistry are given, but in the kind of analysis performed here it is also interesting to understand how different chemistries may affect the behavior of the system and the diversity of a population of protocells. As, for example, the role of RAF sets [20, 21, 22] in the overall dynamics. In Section 3 we present the results of the simulations on the model. In the concluding Section 4 we will discuss the main findings of this paper, and we will propose further analysis and refinement of the models. 6 7 2 R. Serra et al. Main features of the model Entities and interactions. The model describes an open system in which simple molecules interact with each other through elementary catalyzed reactions. The basic entities of the system are monomers and polymers, identified by ordered strings of letters oriented from left to right taken from a finite alphabet (e.g. A, B, C, . . .). We will refer to the โ€œlettersโ€ also as bricks, while the term monomer will be reserved to those molecular types that are composed of a single brick. Every species xi , i = 1, 2, . . . , N composing the entire set of species X = [x1 , x2 , . . . , xN ] is characterized by its specific amount (either quantity or concentration), denoted by xฬ‚i . The number of copies of a specific species defines its number of molecules. The two basic reactions are: i) cleavage, i.e. the cutting of a species composed of more than one brick into two shorter species (e.g. ABBA โ†’ A+BBA) and ii) condensation, i.e. the concatenation of two species in a longer one (e.g. BBA + AAB โ†’ BBAAAB). A key assumption of the model is that any reaction occurs only if catalyzed by one of its specific catalysts; hence we exclude the presence of spontaneous reactions by assuming sufficiently high activation energy for each reaction. In particular, condensation requires an intermediate reaction in which a temporary complex between the catalyst and the substrate is formed. A further restriction regarding catalysis imposes that only species that are composed of at least a minimum number of bricks can be catalysts. Additionally, we neglect the presence of backward reactions (exception made for the dissociation reaction of intermediate complexes) by hypothesizing that the Gibbs energy โˆ†G for any reaction is sufficiently large. A schematic representation of the various reaction types is given in Fig. 1. The reaction network. Provided that a catalyst for the reaction exists, each species in the system could condensate with any other species in the system, or be split at any cutting point into smaller species. The cardinality of the set R of all the conceivable reactions for the system, at a given time, is therefore given by: N X Rฬ‚ = (L(xi ) โˆ’ 1) + N 2 (1) i=1 where N is the cardinality of X and L(xi ) is the length of xi (i.e. the number of bricks of that specific species). The first term of Eq. 1 refers to the conceivable cleavages and the second one to the conceivable condensations. Hence, the set of reactions that are actually allowed, i.e. the โ€œchemistryโ€ of the system, is determined by the catalysts involved in the various reactions. Following Kauffman, we define the chemistry of the system at random. In this regard, any species xi has a finite fixed probability pi of being chosen as catalyst 7 8 R. Serra et al. CONDENSATION K comp S1 + C โ†’ S1C A K decomp K cond S1C โ†’ S1 + C S1C + S2 โ†’ P + C A B B A A A B B B B A B B A A A B B A B B A B B A B B B A A B B A A B A A A B B B A B CLEAVAGE K cleav S + C โ†’ P1 + P2 + C A A B B A B B B B A A A B B B A B B B A A B A B Figure 1: Schematic representation of the two possible reaction types, namely condensations and cleavages. S, S1 and S2 represent the substrates of a reaction, C is a species with catalytic function, S1 C is the transient complex that is formed in the first step of the condensation and P, P1 and P2 stand for the products of a reaction. Kcleav , Kcomp , Kdiss and Kcond respectively stand for the kinetic rates of cleavage, complex formation, complex dissociation and final condensation. of a randomly chosen reaction among those belonging to Rฬ‚. It is worth stressing that, although the reaction network is built probabilistically, it remains invariant in time; in other words, once a species is chosen to be the catalyst of a given reaction, that species will always be catalyst for that reaction. Further details concerning the structures of the model can be found in [11, 14]. The dynamics. The systemโ€™s dynamics is simulated by means of an extension of the well-known Gillespie algorithm [16, 17] for the stochastic simulation of chemical reaction systems, in which we allow the appearance of novel species and reactions that are not present in the system in the initial conditions. In fact, cleavage and condensation of elements either present within the protocell or entering it from the external environment can generate new species, which, in turn, can be involved in new reactions, both as catalysts and substrates. The container: the introduction of the protocell. In its classical formulation [1], the catalytic reaction network is modeled within a continuous stirred-tank reactor (CSTR), in which the ingoing and outgoing fluxes could be adjusted according to the experimental needs. In this work, we introduce a major modification of the model by introducing a semi-permeable membrane that separates the catalytic reaction network from the external environment (see Fig. 2). The semi-permeable membrane is here modeled by allowing only some species to enter and leave the protocell, namely those that are shorter than an arbi- 8 9 R. Serra et al. Figure 2: Schematic representation of the semi-permeable membrane as conceived in our model of protocell. The membrane is here represented as a lipid bilayer that shapes a spherical vesicle. In this example, only the species shorter than 3 letters can cross the membrane, entering or leaving the internal compartment, the dynamics of which is actually simulated in our model of catalytic reaction networks. On the opposite, longer species are confined either inside or outside the vesicle. trary length Lperm . All the species that are longer than Lperm either remain entrapped within the protocell or never enter it from the outside. Another important assumption is that the concentration of the permeable molecules is homogeneous both inside and outside the protocell, and that they take the same value. That is, we assume infinitely fast diffusion both in the bulk phases and across the membrane, so that the chemical potentials of the permeable species are the same. The species that can cross the membrane will be also defined, from now on, as the buffered species. In this work, we consider the volume of the protocell to be constant, while it is planned to introduce protocell size and duplication dynamics in further developments of the model. We also remark that in this model the transport processes in a vesicle are treated in a way that, albeit simplified, parallels their actual dynamics. While small flow reactors have also been proposed as protocell models [22, 50], they are indeed not well suited, since they require a constant inflow that has no physical analogue in a vesicle, and usually also allow the outflow of all the solutes. 9 10 R. Serra et al. Algorithm 1 Formal definition of the model as multiset-rewriting system. 1: let ฮจ be the alphabet of symbols denoting monomers, A, B, C...; 2: the ฮ˜โˆ— and ฮžโˆ— be the (infinite) set of all finite-length non-empty polymers and substrate-catalyst complexes over ฮจ, and let us denote by P ยท Q (resp. P _Q, substrate-catalyst) the polymer (resp. complex) obtained by concatenating polymers P and Q; 3: let the state of the system be multiset ฮฆ โ‰ก P1 | P2 | ... | Pn counting the occurrences of each polymer/complex Pi โˆˆ {ฮ˜โˆ— โˆช ฮžโˆ— }; 4: consider the following reaction schema with variables X, Y and Z, in a multiset-rewriting notation: โ€ข [A: Cleavage] Rcl : X ยท Y | Z 7โ†’ X | Y | Z {Z is the catalyst, X ยท Y is the polymer breaking to X and Y } โ€ข [B1: Complex formation] Rcf : X|Y 7โ†’ X_Y โ€ข [B2: Complex dissociation] Rcd : X_Y 7โ†’ X | Y โ€ข [B3: Final condensation] Rf c : X_Y | Z 7โ†’ X ยท Z | Y {X and Z are substrates, Y is the catalyst, X_Y is the substratecatalyst complex, X ยท Z the polymer composed by X and Z} Variable polymers (X ยท Y ) take values in ฮ˜โˆ— , whereas complexes (X_Y ) in ฮžโˆ— . 5: (Reactions generation) an instantiation map ฯ• is evaluated via standard pattern matching to transform the above schema in all the possible rewriting rules ฮฆ ฮฆ ฮฆ Rฯ• = Rcl โˆช Rcf โˆช Rcd โˆช Rfฮฆc for multiset ฮฆ. The map ฯ•, which assigns values to X, Y and Z, is required to be maximal and univocal, i.e. it must yield all the possible rewriting rules applicable in ฮฆ and instantiated consistently (via deterministic association) for any of its evaluation. 6: ฮฆ and Rฯ• yield a Continuous-time Markov Chain. By firing a reaction in Rฯ• via the classical Gillespie algorithm a new state of the system is generated. In this particular implementation of the model, polymers shorter than 3 are fed and cannot be instantiated as catalysts (see Appendix A). The simulation proceeds with the new state from previous step. 3 Results of the simulations The preliminary experiments on the protocell model were performed by keeping fixed some key structural parameters (see the Appendix for the details) and 10 11 R. Serra et al. creating different random chemistries. In particular, we here present the details of two specific chemistries, which were specifically selected among many (on a total of 10 simulated chemistries) because they exhibit very specific dynamical properties. In this regard, it is first important to introduce the concept of RAF set, which be fundamental in the description of these systems. Following Hordijk et al. [20, 21, 22], given the entire chemistry, a subset of reactions R is: (i) Reflexively autocatalytic (RA) if every reaction in R is catalyzed by at least one other reaction belonging to R, (ii) Food-generated (F) if every substrate in R can be produced from the food set F by means of the reactions belonging to R, (iii) Reflexively autocatalytic and F-generated (RAF) if both the previous conditions are satisfied. The chemistries of the two presented protocells differ for the presence/absence of a RAF set (RAF in short from now on): in particular, in the first protocell (CH1) no RAFs are present, whereas in the second protocell (CH2) a RAF formed by an autocatalysis consuming molecules from the food set is present. In order to assess the behavior of the system, a method to measure the similarity between two different states of the system is that proposed by Kaneko [25] and is based on the comparison of the vectors that describe their chemical compositions. Let us define the k-dimensional vectors Cj (t) = [cj,1 (t), cj,2 (t), ..., cj,N (t)] and Ck = [ck,1 (t), ck,2 (t), ..., ck,N (t)] whose components are the concentrations of the species present at time t in systems j and k respectively. Same positions in vectors refer to same species, hence species present in system j that are not present in k have concentration equal to 0 and viceversa. The similarity between the two systems is then computed by means of the normalized inner product: ! C~j (t) ยท C~k (t) โˆ’1 (2) ฮ˜t = cos ||Cj (t)|| ยท ||Ck (t)|| where ฮ˜t is the angle between the two vectors measured at the time t. Throughout this paper, angles will be measured in degrees. 3.1 Low concentration effects In this section we investigate the low concentration effects in protocells. To this end, the selected chemistries are tested with respect to 4 different initial uniform concentrations of the chemical species present inside the vesicle: in detail, the initial concentration of all the non-buffered species is equal to: 1mM , 0.1mM , 0.01mM and 1ยตM . Conversely, the amount of each buffered species is always fixed to 1mM . Notice that, in general, the protocell model presented here does not lead to stationary chemical distributions. Indeed, situations are possible where some particular species indefinitely increases its concentration: an example is the RAF set in CH2, where a particular species catalyses its own formation using two buffered species as substrates: in this case an exponential growth is achieved. Another simple case could be the linear growth of a species produced directly from the buffered species by means of a catalyst not involved in other reactions, 11 12 R. Serra et al. Conc Molarity (Cond.1) 1mM (Cond.2) 0.1mM (Cond.3) 0.01mM (Cond.4) 1ยตM Molecules per species Average 600 60 6 1 CH1 ฮ˜3000 (mean) 0.41 2.34 7.71 11.15 CH2 ฮ˜3000 (max.) 0.68 5.86 15.28 19.35 ฮ˜3000 (mean) 0.06 0.18 9.69 3.67 CH2 (no RAF) ฮ˜3000 (max.) 0.19 0.52 21.86 11.91 ฮ˜3000 (mean) 0.57 1.69 6.48 9.44 ฮ˜3000 (max.) 0.96 2.78 11.21 15.35 Table 2: In the table the average and the maximum values of ฮ˜3000 relative to 10 distinct simulations of each of the 4 different initial conditions (rows in the table) are shown. The measures are reported for the 2 different chemistries: the one without RAFs and the one with RAFs, for which they are also computed without taking into account the species belonging to the RAF, column โ€œCH2 (no RAFs)โ€. The 4 conditions differ in the average magnitude of the initial concentrations of the initial set of molecular species not belonging to the buffered flux (the food set). A realization of each of the 4 initial concentration is drawn at random from a Poisson distribution, according to the given parameters, and is maintained invariant across the 10 different runs. i.e. present in constant concentration. Of course, more complex situations are possible, even not directly originating from the food set. Yet, many simulations show a transient in which the chemicals distribution rapidly change followed by a long quasi-equilibrium, where changes are limited to small adjustments. By applying the parameters adopted in the present work, such a state is already achieved in 2500 seconds, except for the case of very low concentrations (1ยตM ). Diversity. In table 2 some statistics on how ฮ˜ varies according to the different cases are shown and, in particular, it is possible to appreciate an increase of the dissimilarity among protocells in correspondence with a decrease on the initial concentration, as indicated by the average and the maximum value of ฮ˜ between all the runs of each specific chemistry and specific initial condition, computed at time t = 3000.4 Since these runs are characterized by identical chemistries and identical initial conditions, the angle reported here is indeed the result of dynamical evolutions that differ only for the simulation random seed. It is worth remarking that the lower is the concentration profile, the higher is the distance among the final distributions,5 i.e. the angle ฮ˜ reaches its maximum 4 Exceptionally for the case 1ยตM , ฮ˜ is not computed after 3000 second but when at least 5000 reactions have occurred within the simulation. The reason for this is that the low concentrations involve a so slow dynamics that 3000 seconds are not enough in order to observe significant chemical changes. 5 In regard to CH2 we are here considering the value of ฮ˜ excluding the species belonging to the RAF set (last columns of the table). Since the molecules belonging to the RAF set reach a concentration much greater with respect to the other molecules, considering them in the angle computation would misrepresent the distance among the simulations. 12 13 R. Serra et al. value with regard to very low initial concentrations (e.g. 1 molecule per species on average). It is interesting to notice that the displayed low concentration effects with respect to the overall similarity of the system are found in both chemistries, hinting at a generic property of such systems, independently of the possible presence of RAF sets. The influence on RAF set dynamics. The asynchronous framework implies that only one reaction occurs at the time. Given that RAFs in general involve more than one reaction, in order to detect their presence we analyze the system in a time interval (i) sufficiently large to let a significant number of reactions to occur, yet (ii) not embracing the whole simulation (in order to avoid the presence of too rare reactions); It is worth stressing that since the analysis are made ex post with respect to the simulation of the system, they do not affect the simulated dynamics, but just the way of representing it. In fig. 3, we show the presence (or the absence) of the RAF of CH2 every 10 seconds, by using a time window of 5 seconds,6 with respect to the 4 aforementioned different average concentrations. Note that in all the initial conditions the autocatalytic species has a concentration higher than zero, thus the corresponding RAF is always able to achieve its own growth viability. From Fig. 3 it is possible to observe the strong correlation between the average concentration of the species within the protocell and the presence of RAFs. As long as the concentration decreases, so does the probability of detecting a RAF, yet in the long run in most of the simulations RAFs eventually emerge. 3.2 Sensitivity to initial conditions We here analyze the effects of variations in the initial concentrations of the single species present within the protocells, while maintaining their average concentration fixed. We simulate 10 different variations of the single species concentrations for both the case of average concentration equal to 0.01mM (condition 3) and average concentration 1ยตM (condition 4). In Fig. 4 we display the variation of the similarity in time for each couple of simulations, with respect to both conditions, in order to provide a picture of the sensitivity of the overall diversity to the initial conditions. Note that the very low concentrations of condition 4 (in average, only one molecule for each species) imply that in certain protocell realizations some species are missing: in particular, each simulation starts from a different set of species composed of, on average, 40 species, on the possible 62. This may explain the very high values of ฮ˜0 with respect to condition 4 (Fig. 4). Besides, one can see that condition 4 shows an evident bifurcation (Fig. 4b). Given that in some simulations, because of the low concentration effects, the 6 We set the sampling frequency and the time threshold of the windows by taking advantage from several initial model threads, not essential to the comprehension of this article. 13 14 R. Serra et al. Figure 3: From the top to the bottom the four traces, accounting for conditions 1, 2, 3 and 4 of the chemistry 2, i.e. the one containing the RAF set, depicting the presence of the RAF during the simulation (time flows from left to right, each row represents a different run of the same condition). The black zones stands for the absence of the RAF set, while gray zones denote the presence of the RAF. It is important to remark that RAFs are searched in a dynamic network created with the reactions occurred in a mobile time window of 5 seconds. autocatalytic species (and so the RAF) can be present or absent in the initial condition, the system can indeed reach different regions of the state space, leading to deeply different histories. On the opposite, condition 3 shows the aforementioned regulatory activity of the always active RAF. (a) (b) Figure 4: The angles between each couple of different simulations in time, for condition 3 (0.01mM - left panel) and condition 4 (1ยตM - right panel). Finally, it is important to remark that during each simulation many species disappear and many other appear, so a compact way to follow the process is that of monitoring, during each run, the variation of the angle ฮ˜T 0 โ†’T t between the initial and the current chemical setting (Fig. 5a). The graph indicates that ฮ˜0โ†’3000 approaches a value close to 80 degrees, which means a quasiorthogonality of the system with respect to the initial condition. 14 15 R. Serra et al. The dynamics of the system, in term of molecular concentrations, leading to such a divergence from the beginning is shown in Fig. 5b. It is reasonable to hypothesize that the clear inversions in the trajectories of the concentrations of certain species may be responsible for this phenomenon. (a) (b) Figure 5: On the left panel the average angle (and the standard deviation) ฮ˜T0 โ†’Tt measured from T0 to Tt for each chemical distribution, within each single run of conditions 1 (average molarity 1mM ) and 2 (average molarity 0.1mM ), is shown. It is worthwhile to remark that ฮ˜ = 90 stands for a complete orthogonality between the chemical distributions. In order to appreciate the convergence towards a quasi-orthogonality, on the right panel the concentration of the species in time of a particular simulation are shown (Simulation: CH2, condition 1, run 1). The exponential growth concentration of the autocatalytic species is shown with a limit of 3mM . 4 Conclusion and further developments In this paper we introduced a simplified model of a non-growing protocell and we investigated the behavior of a stochastic model of catalytic reaction networks in such an environment. To the best of our knowledge this is a novel approach. The crucial importance of the small size of the protocell has been stressed, and the effects of the fact that some chemicals can be present in low numbers have been investigated. While a broader analysis is ongoing, we have here shown that it is possible to reach different compositions of the chemical species, in the particular case in which some species are present in the bulk at low concentrations. We have also shown that there are two different, possibly overlapping reasons for this diversity: (i) the random sequence of molecular events involving those species and (ii) the random differences in their initial concentrations. We have also stressed the importance of RAF sets in influencing the overall dynamics. There are several ways in which this work might seed further research. The most obvious is that of relaxing the physical limitations that have been considered, e.g. infinitely fast diffusion, yet we do not except that this may change the major conclusions summarized above. 15 16 R. Serra et al. Obviously, a very interesting direction is that of considering a protocell that is able to grow and divide. The processes involved in protocell growth and replication are indeed complex and, in particular, a necessary condition for its existence and replication is the coupling between the rates of molecules replication and cell growth. We have shown elsewhere [3, 12, 40] that the very existence of this coupling suffices to guarantee (under very general conditions) that, in the long run, the rate of cell division and that of duplication of the replicating molecules converge to the same value, thereby allowing sustainable growth of a population of protocells.7 However, those results were achieved by supposing a fixed set of genetic memory molecules, with some possible extinction. It could be sound to extend this approach to the case where there are evolving chemical reaction sets and to verify whether synchronization occurs. An important aspect to be addressed in the case of growing vesicles is also the effect of volume growth on the concentrations of the various chemicals: a preliminary investigation can be found in [4]. Besides, we have not here explicitly considered the possibly catalytic role of membranes that, as it has been discussed in section 1, might be a major cause of the difference between the intracellular environment(s) and the bulk. In a fixed volume model this effect can be lumped in the effective reaction rates, but if we consider a growing protocell we have to take into account the differences between surfaces and volumes. This might also lead to interesting phenomena that will be analyzed in future developments. To conclude, different protocells may host different mixtures of molecular species, even if they share the same chemistry (i.e., they โ€œinhabit the same worldโ€). It might be extremely interesting to model the behavior of populations of different protocells of this kind, which may show different growth rates, but may also undergo phenomena like coalescence, exchange of material, etc. Thus, further investigations will be indeed necessary to assess different generations of protocell populations and their possible evolution pathways. Last but not least, it will be interesting to extend these studies to other protocell architectures like e.g. the Los Alamos bug, Gard models, and others. 5 Acknowledgements Stuart Kauffman, Norman Packard and Wim Hordijk kindly shared with us their deep understanding of autocatalytic sets in several useful discussions. Useful discussions with Ruedi Fรผchslin, Davide De Lucrezia, Timoteo Carletti, Andrea Roli and Giulio Caravagna are also gratefully acknowledged. The authors are also grateful to Giulia Begal for kindly drawing the image of Fig. 2. C.D. wishes to acknowledge the project SysBionet (12-4-5148000-15; Imp. 611/12; CUP: H41J12000060001; U.A. 53) for the financial support of the work. The final publication is available at Springer via http://dx.doi.org/10.1007/s11047014-9445-6 7 This property was proved earlier by Munteanu et al. for the Los Alamos bug mode [33]. 16 17 R. Serra et al. A Appendix 1 - Simulation environment and parameter settings Simulations were performed with the CaRNeSS simulator8 developed by the research group. In the following, the baseline setting of the system used in the simulations is reported (for the parameters that were variated in the different experiments please refer to the text): (โ€ข) Alphabet: A, B, (โ€ข) Volume = = 1e โˆ’ 18dm3 = 1ยต3 , (โ€ข) Average catalysis probability = 1 catalyzed reaction for species, (โ€ข) Maximum length of the species, Lmax = 6, (โ€ข) Lperm = 2, (โ€ข) Monomers and dimers do NOT catalyze, (โ€ข) Kcleav = 25M โˆ’1 secโˆ’1 , (โ€ข) Kcomp = 50M โˆ’1 secโˆ’1 , (โ€ข) Kdiss = 1M โˆ’1 secโˆ’1 , (โ€ข) Kcond = 50M โˆ’1 secโˆ’1 . References [1] R.J. Bagley and J D Farmer. Spontaneous emergence of a metabolism. Artificial Life II. Santa Fe Institute Studies in the Sciences of Complexity, X:93โ€“141, 1992. [2] Ann-Sofie Cans, Meghan Andes-Koback, and Christine D Keating. Positioning lipid membrane domains in giant vesicles by micro-organization of aqueous cytoplasm mimic. J Am Chem Soc, 130(23):7400โ€“7406, 2008. [3] T Carletti, R Serra, M Villani, I Poli, and A Filisetti. Sufficient conditions for emergent synchronization in protocell models. J Theor Biol, 254(4):741โ€“751, 2008. [4] Timoteo Carletti and Alessandro Filisetti. The Stochastic Evolution of a Protocell: The Gillespie Algorithm in a Dynamically Varying Volume. Computational and Mathematical Methods in Medicine, 2012(Article ID 423627):1โ€“13, 2012. [5] Xiaofeng Dai, Olli Yli-Harja, and Andre S Ribeiro. Determining noisy attractors of delayed stochastic gene regulatory networks from multiple data sources. Bioinformatics (Oxford, England), 25(18):2362โ€“8, September 2009. [6] Tereza Pereira de Souza, Pasquale Stano, Frank Steiniger, Erica Dโ€™Aguanno, Emiliano Altamura, Alfred Fahr, and Pier Luigi Luisi. Encapsulation of Ferritin, Ribosomes, and Ribo-Peptidic Complexes Inside Liposomes: Insights Into the Origin of Metabolism. Origins of life and evolution of the biosphere : the journal of the International Society for the Study of the Origin of Life, October 2012. [7] Lisa M Dominak and Christine D Keating. Polymer encapsulation within giant lipid vesicles. Langmuir, 23(13):7148โ€“7154, 2007. [8] Freeman J Dyson. Origins of life. Cambridge: Cambridge University Press, 1985. [9] M Eigen and P Schuster. The hypercycle. A principle of natural self-organization. Part A: Emergence of the hypercycle. Die Naturwissenschaften, 64(11):541โ€“65, November 1977. [10] JD Farmer and SA Kauffman. Autocatalytic replication of polymers. Physica D: Nonlinear Phenomena, 220:50โ€“67, 1986. 8 https://github.com/paxelito/carness 17 18 R. Serra et al. [11] A Filisetti, A Graudenzi, R Serra, M Villani, D De Lucrezia, and I Poli. The role of energy in a stochastic model of the emergence of autocatalytic sets. In Lenaerts T, Giacobini M, H Bersini, P Bourgine, M Dorigo, and R Doursat, editors, Advances in Artificial Life, ECAL 2011 Proceedings of the Eleventh European Conference on the Synthesis and Simulation of Living Systems, pages 227โ€“234. MIT Press, Cambridge, MA, 2011. [12] A. Filisetti, R. Serra, T. Carletti, M. Villani, and I. Poli. Non-linear protocell models: synchronization and chaos. The European Physical Journal B, 77(2):249โ€“256, June 2010. [13] Alessandro Filisetti, Alex Graudenzi, Roberto Serra, Marco Villani, Davide De Lucrezia, Rudolf M Fuchslin, Stuart A Kauffman, Norman Packard, and Irene Poli. A stochastic model of the emergence of autocatalytic cycles. Journal of Systems Chemistry, 2(1):2, 2011. [14] Alessandro Filisetti, Alex Graudenzi, Roberto Serra, Marco Villani, Rudolf M Fรผchslin, Norman Packard, Stuart a Kauffman, and Irene Poli. A stochastic model of autocatalytic reaction networks. Theory in biosciences = Theorie in den Biowissenschaften, pages 1โ€“9, October 2011. [15] T Ganti. Chemoton Theory, Vol. I: Theory of fluyd machineries: Vol. II: Theory of livin system. New York: Kluwer Academic/Plenum, 2003. [16] Daniel T Gillespie. Exact Stochastic Simulation of Coupled Chemical Reactions. The Journal of Physical Chemistry, 81(25):2340โ€“2361, 1977. [17] Daniel T Gillespie. Stochastic Simulation of Chemical Kinetics. Annual Review of Physical Chemistry, 58(1):35โ€“55, 2007. [18] Martin M Hanczyc, Shelly M Fujikawa, and Jack W Szostak. Experimental models of primitive cellular compartments: encapsulation, growth, and division. Science (New York, N.Y.), 302(5645):618โ€“622, October 2003. [19] Wim Hordijk and Jose F Fontanari. Catalytic Reaction Sets, Decay, and the Preservation of Information, 2002. [20] Wim Hordijk, Jotun Hein, and Mike Steel. Autocatalytic Sets and the Origin of Life. Entropy, 12(7):1733โ€“1742, June 2010. [21] Wim Hordijk and Mike Steel. Detecting autocatalytic, self-sustaining sets in chemical reaction systems. Journal of theoretical biology, 227(4):451โ€“461, April 2004. [22] Wim Hordijk, Mike Steel, and Stuart Kauffman. The Structure of Autocatalytic Sets: Evolvability, Enablement, and Emergence. page 12, May 2012. [23] S Jain and S Krishna. A model for the emergence of cooperation, interdependence, and structure in evolving networks. Proc Natl Acad Sci U S A, 98(2):543โ€“547, 2001. [24] Sanjai Jain and Sandeep Krishna. Autocatalytic set and the growth of complexity in an evolutionary model. Phys Rev Lett, 81:5684โ€“5687, 1998. [25] Kunihiko Kaneko. Life: An Introduction to Complex Systems Biology (Understanding Complex Systems). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2006. [26] S A Kauffman. Autocatalytic sets of proteins. J Theor Biol, 119(1):1โ€“24, 1986. [27] P.L. Luisi, F. Ferri, and P. Stano. Approaches to semi-synthetic minimal cells: a review. Naturwissenschaften, 93(1):1โ€“13, 2006. [28] Sheref S Mansy. Model Protocells from Single-Chain Lipids. International Journal of Molecular Sciences, 10(3):835โ€“843, 2009. 18 19 R. Serra et al. [29] Sheref S Mansy, Jason P Schrum, Mathangi Krishnamurthy, Sylvia Tobรฉ, Douglas A Treco, and Jack W Szostak. Template-directed synthesis of a genetic polymer in a model protocell. Nature, 454(7200):122โ€“125, 2008. [30] Harold J. Morowitz, Bettina Heinz, and David W. Deamer. The chemical logic of a minimum protocell. Origins of Life and Evolution of the Biosphere, 18(3):281โ€“287, September 1988. [31] Simon Conway Morris. Lifeโ€™s Solution, Inevitable Humans in a Lonely Universe. University of Cambridge, 2003. [32] O G Mouritsen. Life - As a Matter of Fat. The Emerging Science of Lipidomics. Springer, Berlin, first edition, 2005. [33] A Munteanu, C S Attolini, Steen Rasmussen, H Ziock, and R V Solรฉ. Generic Darwinian selection in protocell assemblies. DOI: SFI-WP 06-09-032, SFI Working Papers, Santa Fe Institute, 2006. [34] Andreea Munteanu and Ricard V Solรฉ. Phenotypic diversity and chaos in a minimal cell model. J Theor Biol, 240(3):434โ€“442, 2006. [35] Alla Polozova, Xingong Li, Tong Shangguan, Paul Meers, Daniel R Schuette, Nozomi Ando, Sol M Gruner, and Walter R Perkins. Formation of homogeneous unilamellar liposomes from an interdigitated matrix. Biochimica et Biophysica Acta (BBA) Biomembranes, 1668(1):117โ€“125, 2005. [36] Steen Rasmussen, Liaohai Chen, David Deamer, David C.Krakauer, Norman H Packard, Peter F Stadler, and Mark A Bedau. Transitions from Nonliving to Living Matter. Science, 303, 963-965, 2004. [37] Steen Rasmussen, Liaohai Chen, Martin Nilsson, and Shigeaki Abe. Bridging nonliving and living matter. Artificial life, 9(3):269โ€“316, January 2003. [38] Tristan Rocheleau, Steen Rasmussen, Peter E Nielsen, Martin N Jacobi, and Hans Ziock. Emergence of protocellular growth laws. Philos Trans R Soc Lond B Biol Sci, 362(1486):1841โ€“1845, 2007. [39] D Segrรฉ and D Lancet. Composing life. EMBO reports, 1(3):217โ€“22, September 2000. [40] Roberto Serra, Timoteo Carletti, and Irene Poli. Syncronization phenomena in surfacereaction models of protocells. Artificial life, 123(2):123โ€“38, 2007. [41] Roberto Serra, Timoteo Carletti, Irene Poli, Marco Villani, and Alessandro Filisetti. Conditions for emergent synchronization in protocell. In In J. Jost and D. Helbing (eds): Proceedings of ECCS07: European Conference on Complex Systems. CD-Rom, paper n.68, 2007. [42] Roberto Serra, Alessandro Filisetti, Marco Villani, Chiara Damiani, Alex Graudenzi, and Tommaso Panini. A stochastic model of catalytic reaction networks in protocells. Submitted to Artificial Life, 2013. [43] Roberto Serra and Marco Villani. Mechanism for the formation of density gradients through semipermeable membranes. Physical Review E, 87(6):062814, June 2013. [44] R.V. Ricard V Solรฉ, Andreea Munteanu, Carlos Rodriguez-Caso, Javier Macรญa, and J. Mac\โ€™\ia. Synthetic protocell biology: from reproduction to computation. Philos Trans R Soc Lond B Biol Sci, 362(1486):1727โ€“1739, 2007. [45] P F Stadler. Dynamics of autocatalytic reaction networks. IV: Inhomogeneous replicator networks. Bio Systems, 26(1):1โ€“19, January 1991. 19 20 R. Serra et al. [46] P F Stadler and P Schuster. Dynamics of small autocatalytic reaction networksโ€“I. Bifurcations, permanence and exclusion. Bulletin of mathematical biology, 52(4):485โ€“508, January 1990. [47] Peter F. Stadler, Wolfgang Schnabl, Christian Forst, and Peter Schuster. Dynamics of Small Autocatalytic Reaction Networks II : Replication, Mutation and Catalysis, 1995. [48] Pasquale Stano and Pier Luigi Luisi. Achievements and open questions in the selfreproduction of vesicles and synthetic minimal cells. Chemical communications (Cambridge, England), 46(21):3639โ€“53, June 2010. [49] J W Szostak, D P Bartel, and P L Luisi. Synthesizing life. Nature, 409(6818):387โ€“390, 2001. [50] Vera Vasas, Chrisantha Fernando, Mauro Santos, Stuart Kauffman, and Eors Szathmary. Evolution before genes. Biology Direct, 7(1):1, January 2012. [51] R. Wesson. Beyond Natural Selection. MIT Press, Cambridge, MA, 1991. [52] Ting F Zhu and Jack W Szostak. Coupled Growth and Division of Model Protocell Membranes. Journal of the American Chemical Society, 131(15):5705โ€“5713, 2009. 20
5cs.CE
1 Adaptive Delivery in Caching Networks Seyed Ali Saberali, Hamidreza Ebrahimzadeh Saffar, Lutz Lampe, and Ian Blake arXiv:1707.09662v1 [cs.IT] 30 Jul 2017 Abstract The problem of content delivery in caching networks is investigated for scenarios where multiple users request identical files. Redundant user demands are likely when the file popularity distribution is highly non-uniform or the user demands are positively correlated. An adaptive method is proposed for the delivery of redundant demands in caching networks. Based on the redundancy pattern in the current demand vector, the proposed method decides between the transmission of uncoded messages or the coded messages of [1] for delivery. Moreover, a lower bound on the delivery rate of redundant requests is derived based on a cutset bound argument. The performance of the adaptive method is investigated through numerical examples of the delivery rate of several specific demand vectors as well as the average delivery rate of a caching network with correlated requests. The adaptive method is shown to considerably reduce the gap between the non-adaptive delivery rate and the lower bound. In some specific cases, using the adaptive method, this gap shrinks by almost 50% for the average rate. Index Terms Adaptive delivery algorithm, average delivery rate, coded caching, correlated requests, placement optimization, redundant demands. I. I NTRODUCTION Local content caching is a promising technique to meet the unprecedented traffic demands in the next generation communication networks [1]โ€“[6]. Caching networks take advantage of the usersโ€™ contextual information to predict the future user demands. This enables the network to store the popular content at storage nodes, also known as caches, close to the end users and satisfy the user requests locally [3]. 2 Caching networks operate in two phases, which are commonly referred to as placement and delivery phases. In the placement phase, the caches fill their memories with parts of the popular files up to their storage capacity. This phase takes place when the network traffic is low. In contrast, the delivery phase is performed when the network is congested. In this phase, upon the usersโ€™ requests, each cache provides its users with the parts of the files that it has available. The remaining parts of the files are conventionally delivered to the users through separate unicast transmissions performed by a central server on a channel that is shared by the users. In a more recent caching approach [2], known as coded caching, the central server uses simultaneous coded-multicasting to deliver the requested content to the users to further reduce the network congestion. An information-theoretic formulation of coded caching was developed in [2]. The authors defined the delivery rate as the total traffic on the shared communication link due to the serverโ€™s messages, such that the usersโ€™ requests are satisfied. Moreover, they proposed a centralized coded-caching scheme to reduce the delivery rate. In a later work [1], a decentralized caching scheme was proposed that did not require any coordination between the caches to operate. The decentralized nature of this method made it the building block of several caching schemes that were designed later for more complicated scenarios [6]โ€“[11]. Both [1], [2] used the peak delivery rate as the figure of merit of the caching network. The peak rate results from the worst-case demand vector, where all the users request distinct files. However, the average delivery rate is also a significant performance metric of a caching network. Average delivery rate depends on the statistics of the user requests. Thus, the statistical patterns in the user demands can significantly affect the design of the caching scheme. One statistical property of user demands is the popularity distribution of the files. The caching schemes of [1], [2] can be used if the popularity distribution is uniform. On the other hand, [5]โ€“[8] have proposed different caching schemes to account for non-uniform popularities. In particular, the caching schemes of [6], [7] are designed based on grouping of the files into several popularity 3 groups, with the files in each group having relatively close popularity levels. They provide more storage resources to the files in the more popular groups. Then, they use the decentralized caching scheme of [1] within each group separately. Also, [8] groups the library of files into two groups of popular and unpopular files. The requests for popular files are delivered through the delivery algorithm of [1], while the requests of unpopular files are delivered through uncoded messages. The same problem is investigated in [5], assuming a Zipf popularity distribution and independent and identically distributed user requests. The placement of [5] is based on the partitioning of each file into equal length packets and randomly distributing the packets (not bits) over the caches. Unlike the other schemes, the delivery of [5] is not based on the delivery algorithm of [1], but on chromatic number index coding. In contrast to [6]โ€“[8], this scheme does not restrict the coding opportunities to the requests within each popularity group. However, its implementation is more complicated as it requires vertex coloring of a conflict graph. The statistics of the usersโ€™ requests can further affect the design of caching networks through increasing the chance of multiple identical requests. In such a scenario, one might be able to modify the delivery algorithm to benefit from the redundancies in the user demands, to further reduce the average delivery rate. Redundant demands are likely to be made when the files have significantly different popularity levels or when there are positive correlations among the requests of different users. For the case of non-uniform file popularities, the schemes in [6]โ€“[8] do not take the effect of identical requests into account during the delivery phase. This is because the delivery in all these schemes is based on the delivery of [1], which is designed for the demand vectors with distinct requests. In addition to non-uniform popularity levels, correlated user requests are likely in many practical scenarios. A considerable amount of multimedia requests are made through the social networks like Facebook, Twitter and Instagram and movie providing websites like Netflix. In such scenarios, the users with overlapping circles of friends, the ones who follow the same people or pages, and those who live in the same geographical area or have common personal, social and professional interests are likely to get suggestions for the same content in 4 their media feeds, and therefore, request the same files. In this paper, we investigate the delivery of redundant demands in caching networks. We study a model where placement is fixed, yet the requests are changing by the time and the delivery adapts to the requests. We propose an adaptive delivery scheme based on message selection to minimize the delivery traffic. Specifically, upon receiving a demand vector from the users, the server exploits the redundancy pattern in the user demands to decide whether to use uncoded messages or the coded messages of [1] to deliver each part of the files requested. We assume that the placement phase is accomplished through the placement schemes of [1], [2]. This ensures that the peak delivery rate does not exceed the delivery rates of [1], [2], so the link capacity constraints are satisfied. Further, if the file popularities are relatively uniform or little prior knowledge about the popularity distribution is available during the placement time, it is natural to accomplish the placement as in [1], [2]. In the delivery phase, however, the users reveal their demands to the server. The server can use this knowledge as a side information and adapt its choice of coded and uncoded messages accordingly to benefit from the possible redundancies in the requests. To the best of the authorsโ€™ knowledge, this paper is the first work in the literature to consider this scenario and to specifically design a scheme for the delivery of redundant requests. Although we use the placement schemes in [1], [2], our proposed delivery method is based on an optimization formulation of the content placement problem. Namely, we use a modified version of this problem to optimize the choice of coded and uncoded messages in our proposed delivery scheme. A side result of the placement optimization problem is the generalization of the centralized placement of [2] to arbitrary cache sizes. In particular, we derive the parameters of the centralized caching analytically for cases where the total cache capacity is not an integer multiple of the total size of the files in the library. We show the superiority of our adaptive method through numerical examples for several specific demand vectors. We derive a lower bound on the delivery rate of the redundant requests 5 based on a cutset bound argument, and compare the rate of the proposed delivery method with the lower bound. Moreover, we study the dynamics of a caching system with correlated user demands. We apply Gibbs sampling [12], [13], to generate sample demand vectors based on a stochastic modeling of the dependencies among the user requests. It is shown that the proposed method is superior to the conventional non-adaptive method in terms of the average delivery rate. In some specific cases, the adaptive method decreases the gap between the average rate of the non-adaptive scheme and the lower bound by almost 50%. The remainder of this paper is organized as follows. In Sec. II, we present the network model and review the caching schemes of [1], [2]. We formulate the rate minimization problem in Sec. III. In Sec. IV, we propose the adaptive delivery scheme and derive a lower bound on the delivery rate. Sec. V presents numerical examples and simulation results. Finally, we conclude the paper in Sec. VI. II. P ROBLEM M ODEL AND R EVIEW In this section, we explain the problem model and briefly review the caching schemes of [1], [2]. Assume a network with a central server and K caches, where the server is able to communicate with the caches through a broadcast link (see Fig. 1). We denote the set of all caches in the network by K. A library of N โ‰ฅ K popular files is given, where each file is F bits long. We assume that all files are available at the central server and that each cache has a memory capacity of M ร— F bits. q , M/N represents the ratio of the cache size to the library size. Placement Phase: In the placement phase, the caches fill their memories with parts of the popular files based on a placement algorithm. We assume that placement takes place only once and remains unchanged during the delivery phase. The resulting distribution of bits in the caches can be described as follows. For a given file n and a given subset of caches S โŠ‚ K, denote by VSn the subset of bits of file n that are exclusively 6 Server Cache 1 Cache 2 Cache K โˆ’1 Cache K ยทยทยท Fig. 1. A network with K caches and a central server. stored at the caches in S. Note that the resulting subsets of bits partition the set of all the bits of every file into 2K partitions. Define s , |S| and xs , |VSn |/F (1) as the portion of the bits of file n that are exclusively stored at each subset S of caches with cardinality s. Here, we have assumed that |VSn | only depends on s. In particular, it neither depends on n nor on the particular choice of caches in S as long as the cardinality of S is s. This holds because of symmetry, as we assume a uniform distribution over file popularities. The placement phase can be performed through either the centralized scheme of [2] or the decentralized scheme of [1]. The centralized caching scheme of [2] can be used only when  t , KM is an integer. For the centralized placement, split each file into Kt non-overlapping N  subfiles of the same length F/ Kt . Assign each one of these subfiles to a subset of caches S : s = t, in a one-to-one manner. Store the bits belonging to each subfile in all the caches in 7 the corresponding S. This results in xcen s = ๏ฃฑ ๏ฃด ๏ฃด ๏ฃฒ1/ K s  ๏ฃด ๏ฃด ๏ฃณ0 For the decentralized placement, each cache stores s=t . (2) s 6= t M F N bits of each file uniformly at random. It can be shown that for large F [1] xdecen โ‰ˆ q sโˆ’1 (1 โˆ’ q)Kโˆ’s+1 , s s = 0, ..., K (3) with high probability. Delivery Phase: In the delivery phase, the network serves one user of every cache at a time. Denote the requests of the users of caches 1, ..., K with d1 , ..., dK , respectively. We refer to the vector [d1 , ..., dK ] as the demand vector. Note that the demand vector evolves with time during the delivery phase. We represent the number of distinct files in the demand vector by L, where 1 โ‰ค L โ‰ค K. We call the demand vector redundant if L < K. In addition, denote by ki , the number of requests for the i-th most requested file in the current demand vector. Thus ki โ‰ฅ kj for i > j and i, j โˆˆ {1, ..., L}. We call (k1 , ..., kL ) the redundancy pattern of the demand vector. For a demand vector [d1 , ..., dK ], we define the delivery rate R(M, [d1 , ..., dK ]) as the traffic on the shared broadcast link due to the serverโ€™s messages, such that all the caches successfully recover the files they requested. We express the rate in terms of the equivalent total number of files that must be transferred on the shared link. So, a rate of R files is equivalent to R ร— F bits. To construct file dk , cache k needs to receive VSdk for all S โŠ‚ K\{k}. The server, delivers these bits to the caches through the coded delivery messages given by Algorithm 1 proposed in [1]. Notice that the delivery method for the centralized caching in [2] is a special case of Algorithm 1. n Note that if file n is requested by multiple users, including user k, Algorithm 1 embeds VS\{k} into several messages. If s > 1, user k has the side information to decode only one of those messages. As a result, the server needs to send all the messages with s > 1, even though the 8 Algorithm 1 Delivery algorithm of [1] Require: {VSn }n=1,...,N, SโŠ‚K # From the placement phase Procedure Delivery(d1 , ..., dK ) for s = K, K โˆ’ 1, ..., 1 do for S โŠ‚ K : |S| = s do dk server sends โŠ•kโˆˆS VS\{k} end for end for demand vector is redundant. This is not the case for the messages with s = 1, i.e., S = {k}. In dk these cases, โŠ•kโˆˆS VS\{k} = Vโˆ…dk . Such uncoded messages deliver the bits that are not stored at any cache in the system. All the users that request file n can decode Vโˆ…n , so it needs to be sent only once. As a result, the traffic due to the uncoded messages is Lx0 instead of Kx0 . Thus, the total delivery rate will be Lx0 + Kโˆ’1 X s=1  K xs . s+1 Note that when L = K, substitution of (2) and (3) in (4) gives   M 1 K 1โˆ’ N 1+KM N as the peak rate of the centralized caching scheme [2], and   M (1 โˆ’ (1 โˆ’ M/N ))K K 1โˆ’ N KM/N (4) (5) (6) as the peak rate of the decentralized caching scheme [1]. From (4), one notes that for the redundant demand vectors, the actual rate of Algorithm 1 is smaller than (5) and (6) for the centralized and decentralized caching schemes, respectively. This observation is the basis of our analysis in Sec. IV. 9 III. O PTIMALITY OF THE C ENTRALIZED P LACEMENT WITH DELIVERY BASED ON A LGORITHM 1 As was formerly discussed, we use either of the methods in [1] or [2] for the placement phase of our caching scheme. In this section, we show that the centralized placement scheme of [2] is the optimal placement to minimize the peak rate of delivery Algorithm 1. We also generalize the application of the centralized placement to the cases that t = KM/N is not an integer. The optimal placement is characterized by the optimal parameters xs that lead to the smallest peak delivery rate of Algorithm 1. Based on (4), the peak rate minimization problem can be formulated as Kโˆ’1 X  K minimize xs xs s+1 s=0 K   X K subject to xs = 1 s s=0  K  X K โˆ’1 M xs โ‰ค sโˆ’1 N s=1 (7) xs โ‰ฅ 0, s = 0, 1, ..., K. The first constraint in (7) ensures that the resulting subsets partition the bits of each file. It also guarantees that xs โ‰ค 1. The second constraint represents the storage capacity constraint. The objective function of (7) is the the worst-case delivery rate of Algorithm 1. We now present the analytical solution of (7) in Proposition 1. Proposition 1 (Optimal Placement for the Worst-Case Demand): Let t = K M . The solution N of (7) is xโˆ—s = ๏ฃฑ ๏ฃด ๏ฃด ๏ฃฒ1/ ๏ฃด ๏ฃด ๏ฃณ0, K t  , s=t (8a) otherwise 10 M/N xโˆ—0 xโˆ—1 xโˆ—2 xโˆ—3 xโˆ—4 xโˆ—5 t = KM/N 0.1 0.5 0.1 0 0 0 0 0.5 0.2 0 0.2 0 0 0 0 1 0.3 0 0.1 0.05 0 0 0 1.5 0.5 0 0 0.05 0.05 0 0 2.5 0.8 0 0 0 0 0.2 0 4 0.9 0 0 0 0 0.1 0.5 4.5 TABLE I. Optimal file placement parameters for K = 5. if t is an integer, and is xโˆ—s = ๏ฃฑ ๏ฃด ๏ฃด ๏ฃด(dte โˆ’ t)/ ๏ฃด ๏ฃด ๏ฃด ๏ฃฒ (t โˆ’ btc)/ ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃณ0, K btc  , s = btc K dte  , s = dte (8b) otherwise if t is not an integer. btc and dte denote the largest integer smaller than t and the smallest integer larger than t, respectively. Proof. See Appendix A. Proposition 1 shows that the centralized placement of [2] is optimal for Algorithm 1 when t is an integer. Further, it generalizes the centralized placement scheme to the caching systems with non-integer t. Table I shows the optimal placement parameters for a system of K = 5 caches and a library of N = 1000 files for various storage capacities. Note that two xโˆ—s values are non-zero when t is non-integer. IV. A DAPTIVE C ACHING S CHEME We now design an adaptive delivery method that benefits from the redundancies in the user requests without changing the cache content. Further, we derive a lower bound on the delivery rate of the redundant demand vectors. 11 A. Adaptive Delivery Method For the adaptive method, we introduce an extra step to the delivery phase, which takes place after receiving each request vector and before the transmission of the server messages to the users. In this step, the server decides whether to send each part of the requested files through the corresponding coded message in Algorithm 1 or through an uncoded message. The use of uncoded messages instead of coded messages to deliver file n is equivalent to transferring bits from VSn : s > 0 to Vโˆ…n . Notice that by such a transfer, the cache only ignores parts of its content and it does not change the actual placement of files. Let Vฬ‚Sn represent the subset of the bits of file n exclusively cached at S after the transfer is done, and ySn , |Vฬ‚Sn |/F. (9) In our delivery method, the server first optimizes ySn . Then, it arbitrarily picks ySn F bits of VSn to form Vฬ‚Sn , and adds the rest of the bits to Vฬ‚โˆ…n . Finally, it uses Algorithm 1 for delivery based on the resulting subsets Vฬ‚Sn instead of VSn . We now find the optimal lengths of the updated partition sets Vฬ‚Sn to minimize the sum of dk the lengths of messages โŠ•kโˆˆS Vฬ‚S\{k} over all the subsets S โŠ‚ K. Assume that the caches have requested L โ‰ค K distinct files in the current demand vector. Denote by D, the set of the distinct files requested in the current demand vector. Note that |D| = L, and both D and L evolve with time. For a fixed demand vector (the current demand vector), the rate minimization problem is given by minimize d ySk subject to X S:SโŠ‚K X dk max yS\{k} kโˆˆS ySdk = 1, โˆ€ dk โˆˆ D (10) S:SโŠ‚K 0 โ‰ค ySdk โ‰ค x|S| , โˆ€ dk โˆˆ D, โˆ€S โŠ‚ K : |S| > 0 0 โ‰ค yโˆ…dk โ‰ค 1, โˆ€ dk โˆˆ D. 12 In (10), x|S| = |VSn | are known from the placement phase, and are given by (3) and (8) for dk is the length of the the decentralized and centralized placements, respectively. maxkโˆˆS yS\{k} dk . Thus, the objective function is the rate of Algorithm 1 operating based on message โŠ•kโˆˆS Vฬ‚S\{k} the adjusted subsets Vฬ‚Sn . Similar to (7), the equality constraint of (10) is the partition constraint. Also, the constraints on the ranges of the parameters let the server to use uncoded messages instead of coded messages, but not vice versa. Problem (10) can be posed as a linear programming problem by the standard technique of defining ancillary variables dk zS = max yS\{k} (11) kโˆˆS and adding the extra constraints dk dk , , zS โ‰ค โˆ’yS\{k} zS โ‰ฅ yS\{k} kโˆˆS (12) for all S โˆˆ K : |S| > 0 [14, Sec. 4.3]. The resulting linear programming problem can be solved numerically for ySโˆ—dk . Algorithm 2 shows the adaptive delivery scheme. B. Simplified Adaptive Delivery A simplified version of the message selection step can be formulated by only taking the number of distinct requests L into account, and ignoring the redundancy pattern of the demand vector. Then, because of the symmetry, we set ySn = ys for all n and all S : |S| = s. This leads to minimize ys Ly0 + Kโˆ’1 X s=1  K ys s+1 K   X K subject to ys = 1 s s=0 0 โ‰ค ys โ‰ค xs , s = 1, ..., K 0 โ‰ค y0 โ‰ค 1 as the simplified message selection problem. (13) 13 Algorithm 2 Original Adaptive Delivery Algorithm Require: {VSn }n=1,...,N, ,SโŠ‚K 1: # From the placement phase Procedure AdaptiveDelivery(d1 , ..., dK ) # Message Selection Step 2: D โ† unique(d1 , ..., dK ) # set of distinct files requested 3: {ySโˆ— dk }dk โˆˆD,SโŠ‚K โ† Solution of Problem (10) 4: for dk โˆˆ D do 5: Vฬ‚โˆ…dk โ† โˆ… 6: for S โŠ‚ K do # initialization of Vฬ‚โˆ…dk 7: Vฬ‚Sdk โ† {first ySโˆ— dk F bits of VSdk } 8: Vฬ‚โˆ…dk โ† Vฬ‚โˆ…dk โˆช { last (1 โˆ’ ySโˆ— dk )F bits of VSdk } 9: 10: end for end for # Message Construction Step 11: 12: 13: 14: 15: for s = K, K โˆ’ 1, ..., 1 do for S โŠ‚ K : |S| = s do dk server sends โŠ•kโˆˆS Vฬ‚S\{k} end for end for c. Optimal parameters for the simplified message selection Proposition 2: Let sฬ‚ = b Kโˆ’L L+1 problem of (13) are given by ysโˆ— = ๏ฃฑ P ๏ฃด ๏ฃด ๏ฃด ๏ฃด i=1,...,sฬ‚ ๏ฃด ๏ฃด ๏ฃฒ 0, ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃณx s , K i  xi , s=0 s = 1, ..., sฬ‚ . (14) s = sฬ‚ + 1, ..., K Proof: If we transfer bits from the subsets VSn : |S| = s to Vโˆ…n , the resulting change in the rate 14 will be L K s  xs โˆ’ K s+1  xs . We transfer the bits only if this difference is negative. This is the case when s โ‰ค sฬ‚. This results to the parameters of (14). Algorithm 3 shows the simplified adaptive delivery scheme. Algorithm 3 Simplified Adaptive Delivery Algorithm Require: {VSn }n=1,...,N, SโŠ‚K 1: # From the placement phase Procedure SimplifiedAdaptiveDelivery(d1 , ..., dK ) # Message Selection Step 2: L = size(unique(d1 , ..., dK )) # number of distinct requests 3: c sฬ‚ โ† b Kโˆ’L L+1 4: for dk โˆˆ D do 5: Vฬ‚โˆ…dk โ† โˆชS:sโ‰คsฬ‚ VSdk # corresponds to the first rule of (14) 6: for S โŠ‚ K : |S| > 0 do 7: 8: 9: 10: 11: 12: 13: if |S| โ‰ค sฬ‚ then Vฬ‚โˆ…dk โ† โˆ… # corresponds to the second rule of (14) else Vฬ‚Sdk โ† VSdk # corresponds to the third rule of (14) end if end for end for # Message Construction Step 14: 15: 16: 17: 18: for s = K, K โˆ’ 1, ..., 1 do for S โŠ‚ K : |S| = s do dk server sends โŠ•kโˆˆS Vฬ‚S\{k} end for end for 15 C. Lower Bound Let RLโˆ— (M ) denote the smallest rate that is achievable for every possible demand vector with L distinct requests. Proposition 3 gives a lower bound on RLโˆ— (M ) based on a cutset bound argument. Proposition 3 (Cutset Bound): Assume that K caches request L โ‰ค K distinct files. Then, RLโˆ— (M ) must satisfy RLโˆ— (M )  โ‰ฅ max sโˆˆ{1,...,L} s sโˆ’ M bN/sc  . (15) Proof. See Appendix B. V. N UMERICAL E XAMPLES AND S IMULATION R ESULTS In this section, we investigate the performance of the proposed adaptive delivery method through numerical examples and computer simulations. A. Numerical Examples for Specific Demand Vectors We first consider the performance of the adaptive methods for specific instances of the demand vector. Fig. 2 shows the delivery rates of the non-adaptive delivery scheme of Algorithm 1, the simplified and the original adaptive schemes, and the lower bound in Proposition 3, for a network of K = 9 caches. The placement in all cases is identical and is accomplished through the centralized scheme with the parameters in (8). Also, we calculate the rate of the non-adaptive scheme by (4). In this example, we have considered four redundancy patterns for the demand vector, all with L = 3 distinct file requests. As shown in Fig. 2, the rate of the non-adaptive scheme, the simplified adaptive scheme and the lower bound only depend on L and not the specific redundancy pattern. In contrast, the rate of the original adaptive method depends on the redundancy pattern which has led to different rates for the different patterns. In Fig. 2, we observe a considerable improvement in the delivery rate for M N โ‰ค 0.25 when the adaptive methods are used. Table II shows the reduction in the gap between the nonadaptive delivery rate and the lower bound when the adaptive schemes are used. At some storage 16 4 Non-Adaptive Simplified Adaptive Adaptive: (3,3,3) Adaptive: (5,2,2) Adaptive: (4,4,1) Adaptive: (7,1,1) Lower Bound * โ–ฒ 3.5 โ–  โ— * *โ–ฒโ—†โ— Rate (files) โ–  3โ–ฒ โ— โ—† โ—† *โ–ฒ โ–  โ–ฒ โ— โ–  * โ—† โ— โ–  2.5 *โ–ฒ โ–  โ— โ—† *โ–ฒโ— โ–  โ—† 2 *โ–ฒโ— โ—† โ–  โ—† *โ–ฒโ—†โ— โ–  1.5 1 0.5 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 q=M/N Fig. 2. Comparison of the rate of different delivery schemes for a system with K = 9 caches. In all cases, centralized placement is used and the users only request L = 3 distinct files. (k1 , k2 , k3 ) shows the number of users requesting each file. M/N Delivery Redundancy Method Pattern 0.025 0.1 0.15 0.2 Simplified Adaptive All 49% 52% 37% 13% Adaptive (3, 3, 3) 49% 52% 37% 13% Adaptive (5, 2, 2) 61% 61% 45% 17% Adaptive (4, 4, 1) 66% 66% 51% 25% Adaptive (7, 1, 1) 78% 76% 64% 43% TABLE II. Improvement of the performance gap to the lower bound in Fig. 2. capacities, we observe 50% and 75% reduction in the gap for redundancy patterns (3, 3, 3) and (7, 1, 1), respectively. Also, we notice that for the symmetric redundancy pattern (3, 3, 3), both adaptive methods led to the same delivery rate. As the redundancy pattern gets more asymmetric, the gap between the rate of the original and the simplified adaptive methods increases. Further, we observe that unlike the adaptive schemes, the delivery rate of the non-adaptive method increases 17 4.5 โ—Š 4โ—Š โ–ฒ โ—Š * * Rate (files) 3โ—Š โ–ฒ * โ–ฒ โ–ฒ โ—Š 3.5 * โ—Š * โ—Š โ–ฒ *โ–ฒ Non-Adaptive Simplified Adaptive Adaptive Lower Bound โ—Š * โ— โ— โ–ฒ *โ–ฒ *โ–ฒ L = 4: (3, 2, 2, 2) L = 3: (4, 3, 2) โ—Š * โ–ฒ 2.5 *โ–ฒ โ—Š *โ–ฒ 2 โ—Š *โ–ฒ 1.5 1 0.5 0 0.05 0.1 0.15 0.2 0.25 0.3 q = M/N (a) Centralized Placement 4โ—Š โ–ฒโ—Š โ–ฒ ** โ—Š * โ—Š โ–ฒ 3.5 โ—Š 3โ—Š โ–ฒโ–ฒ Rate (files) ** โ—Š *โ–ฒ โ–ฒ โ–ฒ โ—Š *โ–ฒ โ—Š *โ–ฒ โ—Š * โ–ฒ 2.5 Non-Adaptive Simplified Adaptive Adaptive Lower Bound * โ—Š * โ— โ— โ—Š *โ–ฒ โ—Š *โ–ฒ โ—Š *โ–ฒ โ—Š *โ–ฒ 2 L = 4: (3, 2, 2, 2) L = 3: (4, 3, 2) โ—Š โ—Š *โ–ฒ *โ–ฒ โ—Š *โ–ฒ *โ–ฒ 1.5 โ–ฒ โ—Š *โ–ฒ * 1 0.5 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 โ–ฒ โ—Š *โ–ฒ 0.45 0.5 q=M/N (b) Decentralized Placement Fig. 3. Comparison of the rate of different delivery schemes for a system with K = 9 caches. 18 4.5 โ–ฒ โ—Š * 4 Rate (files) 3.5 3โ—Š โ—Š โ—Š โ—Š * โ–ฒ โ—Š * โ–ฒ โ—Š * โ–ฒ โ—Š * โ–ฒ * โ–ฒ โ—Š 2.5 โ—Š * โ–ฒ 2 โ–ฒ * โ–ฒ 1.5 ยฐ 1โ–ฒ * ยฐยฐ 0.5 โ—Š 1 ยฐ โ—Š * โ–ฒ โ—Š โ–ฒ * โ–ฒ โ—Š * ยฐ ยฐ ยฐ โ–ฒ โ—Š * ยฐ โ–ฒ โ—Š * ยฐ M/N = 0.1 M/N = 0.2 ยฐ ยฐ ยฐ 2 3 4 โ—Š * โ–ฒ ยฐ Non-adaptive Simplified Adaptive Adaptive (Average) Lower Bound 5 6 7 ยฐ 8 L (a) Centralized Placement 5.5 โ–ฒ โ—Š * 5 โ–ฒ โ—Š * 4.5 โ–ฒ โ—Š * Rate (files) 4 โ–ฒ โ—Š * 3.5 โ—Š * โ–ฒ โ—Š 3 2.5 โ—Š 2 โ—Š โ—Š * โ–ฒ โ—Š * โ–ฒ โ— โ— โ–ฒ * * โ–ฒ โ—Š 1.5 * 1โ–ฒ * 0.5 โ–ฒ โ—Š * โ–ฒ โ—Š * โ—Š * โ–ฒ 1 โ–ฒ 2 3 4 5 โ–ฒ โ—Š * โ–ฒ โ—Š * M/N = 0.1 M/N = 0.2 Non-adaptive Simplified Adaptive Adaptive (Average) Lower Bound 6 7 8 L (b) Decentralized Placement Fig. 4. The effect of the number of distinct files requested on the delivery rate. Here K = 8 and N = 103 . with the storage capacity for small M/N . This shows the inefficiency of Algorithm 1 to deliver the redundant requests. Fig. 3 compares the performance of the delivery methods for two different redundancy levels 19 L = 3 and L = 4. The results are shown in Figs. 3a and 3b for the cases where the centralized and decentralized placement schemes are used, respectively. For L = 4, the rate is improved only by the original adaptive method. In general, the simplified method requires higher redundancy levels (smaller L) compared to the original adaptive method, to be able to improve the rate. This fact is shown in Fig. 4, where the delivery rates are plotted versus L. For the original adaptive method, the delivery rate is averaged over all the redundancy patterns with L distinct requests. One notices that the reduction in the delivery rate of the non-adaptive method is more considerable for smaller M/N . This is because when M/N is small, a large number of bits are in Vโˆ…n subsets and need to be delivered through uncoded messages. Based on Algorithm 1, the number of uncoded messages decreases by decreasing L. So, the reduction in the rate is larger when M/N is small. B. Simulation of the Network Dynamics We now investigate the average rates of the different delivery methods through a stochastic modeling of the dynamics of a caching network. Consider a graph representation of the network where vertices represent the caches. An (undirected) edge between two vertices shows that the requests of the corresponding caches are correlated. To model the correlation between the requests, we assume that each cache k requests a file, either based on its neighbours previous requests with probability r or independently with probability 1 โˆ’ r. In the former case, k chooses a file from the set of the last files requested by its neighbours uniformly at random. However, when choosing independently, cache k picks a file n from the library of N files based on the popularity distribution of the files pn . In our simulations, we mainly use uniform popularity distribution, as it is the focus of this paper. We also consider a scenario where the file popularities are assumed to be uniform during the placement phase, but the actual demands in the delivery phase follow a non-uniform distribution. We use Zipf distribution with parameter ฮธ to model the non-uniform file popularities. This gives 20 r = 0.7 r = 0.9 r = 0.9 ฮธ=0 ฮธ=0 ฮธ = 0.75 Maximum ฯij 0.19 0.34 0.34 Average ฯij 0.16 0.32 0.31 Average L 4.80 3.41 3.18 TABLE III. Empirical correlation coefficients and the resulting number of distinct files per demand vector for the simulations in Fig. 5. ฯij is the correlation coefficient between the requests of caches i and j, i 6= j. pn = (1/n)ฮธ PN ฮธ m=1 (1/m) [15]. The larger ฮธ is, the more non-uniform is the popularity distribution. Typical values of ฮธ are between 0.5 and 2 [7]. ฮธ = 0 corresponds to uniform distribution. The model described above completely determines the conditional probabilities of the usersโ€™ requests. The chance of requesting file n by cache k can be written as ๏ฃฑ ๏ฃด ๏ฃด ๏ฃฒ |N 1(k)| r + pn (1 โˆ’ r), n โˆˆ N (k) pฬ‚n,k = ๏ฃด ๏ฃด ๏ฃณpn (1 โˆ’ r), otherwise (16) where N (k) is the set of the last files requested by the neighbour caches. We use Gibbs sampling [12, Sec. 24.2], [13, Sec. 3] to generate sample vectors from the joint distribution of the user demands based on the network graph and (16). In our simulations, we set K = 8 and N = 103 . We assume a complete graph for the network, i.e., each vertex is of degree K โˆ’ 1. We use r to control the dependency level of the usersโ€™ requests. We also control the popularity distribution by ฮธ. To use Gibbs sampling, we need to give the underlying Markov chain enough burn-in time to reach its stationary distribution. We use the estimated potential scale reduction (ESPR) convergence criterion in [12, Sec. 24.4.3.1] with 5 chains, to determine the burn-in time required. Ignoring the first 150 sample vectors, i.e., 8 ร— 150 samples, suffices to get |ESPR โˆ’ 1| โ‰ค 0.01, which shows that the stationary distribution is reached. We use 103 sample vectors after the burn-in time to evaluate the average rate of the different delivery schemes. Table III presents more details about the correlation coefficients and the redundancy levels obtained empirically for each simulation. 21 5 โ–ฒ โ—Š * 4.5 ยฐ Average Rate (files) 3 * โ–ฒ ยฐ 4 3.5 โ—Š โ—Š โ–ฒ * โ–ฒ โ—Š *ยฐ โ–ฒ โ—Š * ยฐ ยฐ โ—Š * โ–ฒ * โ–ฒ * ยฐ ยฐ โ–ฒ * r = 0.7, ฮธ = 0 r = 0.9, ฮธ = 0 r = 0.9, ฮธ = 0.75 โ—Š โ—Š โ—Š โ—Š โ–ฒ * โ—Š โ–ฒ * โ–ฒ * ยฐ โ—Š * * โ–ฒ โ–ฒ โ–ฒ * ยฐยฐ 2.5 Non-Adaptive Simplified Adaptive Adaptive Lower Bound * โ–ฒ โ–ฒ โ—Š โ–ฒ * โ–ฒ * โ–ฒ ยฐยฐ 2 โ–ฒ โ—Š โ–ฒ * 1.5 ยฐ ยฐ 1 0.5 0 0.05 0.1 0.15 0.2 ยฐ 0.25 โ–ฒ โ—Š โ–ฒ * ยฐ 0.3 M/N Fig. 5. Performance of the different delivery schemes in terms of their avergae delivery rates. Here, K = 8, N = 1000 and the central placement is used. Fig. 5 shows the resulting average delivery rates. It also shows a lower bound on the average rate that is calculated by taking the average of the lower bounds of (15) for the sample demand vectors used. We observe that as requests become more correlated (larger r) and the file popularities get more non-uniform (larger ฮธ), the adaptive method makes larger improvements in the rate. Also, the adaptive schemes are effective in decreasing the average delivery rate for M/N < 0.25. The improvement in the performance gap to the lower bound is shown in Table IV. VI. C ONCLUSION We proposed a new delivery scheme for caching networks that exploits the redundancies in the usersโ€™ demand vector to reduce the delivery traffic. The proposed scheme allows the server to decide between the use of coded messages of [1] or uncoded messages for the delivery of each part of the files requested. This choice is made based on the redundancy pattern of the requests in the current demand vector. The serverโ€™s decision making process is formulated as a linear programming problem which must be solved numerically. To facilitate the decision 22 a) M/N = 0.075 r = 0.7 r = 0.9 r = 0.9 Delivery Method ฮธ=0 ฮธ=0 ฮธ = 0.75 Adaptive 14% 41% 47% Simplified Adaptive 5% 28% 36% b) M/N = 0.125 r = 0.7 r = 0.9 r = 0.9 Delivery Method ฮธ=0 ฮธ=0 ฮธ = 0.75 Adaptive 16% 41% 48% Simplified Adaptive 5% 28% 36% TABLE IV. Improvement in the performance gap to the lower bound in Fig. 5. making process, a simplified decision rule is also derived analytically. Further, we derived a lower bound on the delivery rate of redundant demands based on a cutset bound argument. The proposed adaptive schemes are shown to significantly improve the delivery rate through several numerical examples. They decreased the performance gap of the non-adaptive method to the lower bound by up to 80% for highly redundant demand vectors. We also investigated the dynamics of a caching network through Markov chain Monte-Carlo simulations and reported the average delivery rate of the adaptive schemes. The adaptive methods considerably outperform the non-adaptive methods in terms of the resulting average delivery rates when M/N < 0.25. We also generalized the application of the centralized placement scheme of [2] to caching networks with non-integer KM/N . A PPENDIX A P ROOF OF P ROPOSITION 1 Proof: By the Karush-Kuhn-Tucker (KKT) conditions [14, Sec. 5.5.3] for optimization problem (7), we get       K K โˆ’1 0 K โˆ’ ฮปs + ฮป +ฮฝ = 0, s = 0, ..., K s+1 sโˆ’1 s (17) 23 where ฮปs โ‰ฅ 0 is the Lagrange multiplier for the inequality constraint xs โ‰ฅ 0, and ฮป0 โ‰ฅ 0 and ฮฝ are the Lagrange multipliers for the capacity inequality constraint and the partition equality constraint, respectively. KKT conditions require ฮปs xโˆ—s = 0. As a result, xโˆ—s > 0 requires ฮปs = 0. From (17), we can have ฮปs = 0 for at most two s indices. This is because ฮป0 and ฮฝ provide only two degrees of   0  K K freedom to set s+1 + Kโˆ’1 ฮป + ฮฝ = 0 and the coefficient matrix given by these linear sโˆ’1 s equations is rank 2. As a result, we have either one or two xโˆ—s values greater than zero. We consider each case separately. First, assume that only xโˆ—s0 is non-zero. Then, the equality constraint and the capacity constraint  require xโˆ—s0 = 1/ sK0 and s0 = K M , respectively. If t = K M is an integer, the optimal solution N N is achieved, as is given by (8a). Otherwise, not all the storage capacity is used and the solution is not optimal, i.e., the optimal solution has more than one non-zero xโˆ—s . So, as the second case, let xโˆ—s > 0 for exactly two values of s, namely s1 and s2 > s1 . From the storage and partition constraints we get Kโˆ’1 K โˆ’ s2 M/N s2 โˆ’1    Kโˆ’1 K Kโˆ’1 K โˆ’ s1 s2 s1 โˆ’1 s2โˆ’1   Kโˆ’1 K โˆ’ M/N s1 โˆ’1  s1 K  Kโˆ’1 . K Kโˆ’1 โˆ’ s1 s2โˆ’1 s2 s1 โˆ’1  xโˆ—s1 = xโˆ—s2 =  (18a) (18b) Since xโˆ—s1 , xโˆ—s2 > 0, (18) requires s1 โ‰ค K Given (18), the objective function K s1 +1  M , N xโˆ—s1 + K โˆ’ (K + 1) s2 โ‰ฅ K K s2 +1  M . N (19) xโˆ—s2 simplifies to KM/N + s1 s2 . (s1 + 1)(s2 + 1) (20) The function in (20) is decreasing in s1 and increasing in s2 in the region specified by (19). Therefore, to minimize the objective function, s1 must take its largest value bK M c, and s2 must N take its smallest value dK M e. Substitution of these values in (18) gives the optimal parameters N in (8b). This completes the proof of Proposition 1. 24 A PPENDIX B P ROOF OF P ROPOSITION 3 Proof: We modify the cutset bound argument of [2, Sec. VI] to bound the minimum delivery rate of the demand vectors with L โ‰ค K distinct requests. Let S be a subset of caches with |S| = s, such that there are no two caches in S with identical user requests. Assume that these caches have requested files 1, ... , s from the library of N files. Let X1 denote the serverโ€™s input to the shared link which determines files 1, .., s. Similarly, assume that the same users request files (i โˆ’ 1)s + 1, ..., is and the server input Xi determines the files requested. Let i = 1, ..., bN/sc. Consider the cut separating X1 , ..., XbN/sc and the caches in S from the corresponding users (see Fig. 6). Since we assume that the coded caching scheme works and all files are perfectly decoded, the total information available to the users in the cut should be more than or equal to the total information requested by them. In other words, bN/scRLโˆ— (M ) + sM โ‰ฅ sbN/sc. Since s can accept any value between 1 and L, (15) results. R EFERENCES [1] M. A. Maddah-Ali and U. Niesen, โ€œDecentralized coded caching attains order-optimal memory-rate tradeoff,โ€ IEEE/ACM Trans. Networking, vol. 23, pp. 1029โ€“1040, Aug. 2015. [2] M. A. Maddah-Ali and U. Niesen, โ€œFundamental limits of caching,โ€ IEEE Trans. Inf. Theory, vol. 60, pp. 2856โ€“2867, May 2014. [3] E. Bastug, M. Bennis, and M. Debbah, โ€œLiving on the edge: The role of proactive caching in 5G wireless networks,โ€ IEEE Commun. Mag., vol. 52, pp. 82โ€“89, Aug. 2014. [4] K. Shanmugam, N. Golrezaei, A. G. Dimakis, A. F. Molisch, and G. Caire, โ€œFemtocaching: Wireless content delivery through distributed caching helpers,โ€ IEEE Trans. Inf. Theory, vol. 59, pp. 8402โ€“8413, Dec. 2013. [5] M. Ji, A. M. Tulino, J. Llorca, and G. Caire, โ€œOn the average performance of caching and coded multicasting with random demands,โ€ in Proc. 11th International Symposium on Wireless Communications Systems (ISWCS), pp. 922โ€“926, Aug. 2014. [6] J. Hachem, N. Karamchandani, and S. Diggavi, โ€œContent caching and delivery over heterogeneous wireless networks,โ€ in IEEE Conference on Computer Communications (INFOCOM), pp. 756โ€“764, Apr. 2015. 25 Server X1 X2 ยทยทยท XbN/sc cache cache cache cache cache 1 2 3 4 5 Fig. 6. An example of a cutset separating the caches and the server from the users of the caches in S = {1, 2, 4}. Solid (dashed) lines represent the information flow to the users selected (not selected) in the cutset. Here s = 3 and there are b Ns c server messages. Users with the same color have identical requests. Notice that no two users with the same request are picked in S. Here K = 5. [7] U. Niesen and M. A. Maddah-Ali, โ€œCoded caching with nonuniform demands,โ€ in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 221โ€“226, Apr. 2014. [8] J. Zhang, X. Lin, and X. Wang, โ€œCoded caching under arbitrary popularity distributions,โ€ in Proc. Information Theory and Applications Workshop (ITA), Feb. 2015. [9] R. Pedarsani, M. A. Maddah-Ali, and U. Niesen, โ€œOnline coded caching,โ€ in Proc. IEEE Int. Conf. Communications, pp. 1878โ€“1883, June 2014. [10] J. Hachem, N. Karamchandani, and S. N. Diggavi, โ€œEffect of number of users in multi-level coded caching,โ€ in Proc. IEEE Int. Symp. Information Theory, pp. 1701โ€“1705, June 2015. [11] N. Karamchandani, U. Niesen, M. A. Maddah-Ali, and S. Diggavi, โ€œHierarchical coded caching,โ€ in Proc. IEEE Int. Symp. Information Theory, pp. 2142โ€“2146, June 2014. [12] K. P. Murphy, Machine Learning: A Probabilistic Perspective. The MIT Press, 2012. [13] A. Fischer and C. Igel, โ€œAn introduction to restricted Boltzmann machines,โ€ in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, pp. 14โ€“36, Springer, 2012. [14] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY, USA: Cambridge University Press, 2004. [15] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, โ€œWeb caching and Zipf-like distributions: evidence and implications,โ€ in IEEE Conference on Computer Communications (INFOCOM), pp. 126โ€“134, Mar. 1999.
7cs.IT
1 A High-Gain Nonlinear Observer with Limited Gain Power arXiv:1501.04330v3 [cs.SY] 7 Oct 2016 Daniele Astolfi and Lorenzo Marconi Abstractโ€”In this note we deal with a new observer for nonlinear systems of dimension n in canonical observability form. We follow the standard high-gain paradigm, but instead of having an observer of dimension n with a gain that grows up to power n, we design an observer of dimension 2n โˆ’ 2 with a gain that grows up only to power 2. ฮฝ(t) โ‰ก 0, estimating the state x can be addressed by means of a high-gain nonlinear observer of the form Index Termsโ€”Observability, nonlinear observers, high-gain observers.   Dn (โ„“) = diag โ„“ , . . . , โ„“n , I. I NTRODUCTION In this note we consider the problem of state observation for nonlinear systems of the form ยฏ , zฬ‡ = f (z) + d(t) y = h(z) + ฮฝ(t) (1) where z โˆˆ Z โІ Rn is the state, y โˆˆ R is the measured output, ยฏ โˆˆ Rn is f (ยท) and h(ยท) are sufficiently smooth functions, d(t) a bounded disturbance and ฮฝ โˆˆ R is the measurement noise. Among the different techniques for observer design available in literature (see [12], [6]) we are particularly interested to the so-called high-gain methods that have been shown to be effective in many control scenarios. In this respect we assume that the pair (f (ยท), h(ยท)) fulfils an uniform observability assumption (see Definition 1.2 in [12]), which implies the existence of a diffeomorphism ฯ† : Z โ†’ Rn such that the dynamic of the new state variable x = ฯ†(z) is described by the canonical observability form (see Theorem 4.1 in [12]) xฬ‡ = An x + Bn ฯ•(x) + d(x, t) , y = Cn x + ฮฝ(t) , (2) where ฯ•(ยท) is a locally Lipschitz function, d(x, t) := dฯ†(z) dz ยฏ , d(t) z=ฯ†inv (x) with ฯ†inv (ยท) the inverse of ฯ†(ยท) (namely ฯ†inv โ—ฆ ฯ†(z) = z for all z โˆˆ Z), and (An , Bn , Cn ) is a triplet in โ€œprime formโ€ of dimension n, that is     0(nโˆ’1)ร—1 0(nโˆ’1)ร—1 Inโˆ’1 , Bn = An = , 0 01ร—(nโˆ’1) 1  1 01ร—(nโˆ’1) . Cn = (3) System (2) is defined on a set X := ฯ†(Z) โІ Rn . For the class of systems (2), it is a well-known fact ([7]) that the problem of asymptotically, in case d(x, t) โ‰ก 0 and D. Astolfi is with CASY-DEI, University of Bologna, Italy and with MINES ParisTech, PSL Research University, CAS, Paris, France, ([email protected]). L. Marconi is with the CASY-DEI, University of Bologna, Italy, ([email protected]). Work supported by the European project SHERPA (ICT 600958). xฬ‚ห™ = An xฬ‚ + Bn ฯ•s (xฬ‚) + Dn (โ„“) Kn (Cn xฬ‚ โˆ’ y) (4) with Kn =  c1 ยท ยท ยท cn โŠค , where โ„“ is a high-gain design parameter taken sufficiently large (i.e. โ„“ โ‰ฅ โ„“โ‹† with โ„“โ‹† โ‰ฅ 1), the ci โ€™s are chosen so that the matrix (A + KC) is Hurwitz (i.e. all its eigenvalues are on the lefthalf complex plane), and ฯ•s (ยท) : Rn โ†’ R is an appropriate โ€saturatedโ€ version of ฯ•(ยท). As a matter of fact, it can be proved that if d(x, t) โ‰ก 0 and ฮฝ(t) โ‰ก 0, if ฯ•(ยท) is uniformly Lipschitz in X , namely there exists a ฯ•ฬ„ > 0 such that kฯ•(xโ€ฒ ) โˆ’ ฯ•(xโ€ฒโ€ฒ )k โ‰ค ฯ•ฬ„kxโ€ฒ โˆ’ xโ€ฒโ€ฒ k โˆ€ xโ€ฒ , xโ€ฒโ€ฒ โˆˆ X , (5) and ฯ•s (ยท) is chosen bounded and to agree with ฯ•(ยท) on X , the observation error e(t) = x(t) โˆ’ xฬ‚(t) originating from (2) and (4) exponentially converges to the origin with an exponential decay rate of the form kx(t) โˆ’ xฬ‚(t)k โ‰ค ฮฑ โ„“nโˆ’1 exp(โˆ’ฮฒโ„“t)kx(0) โˆ’ xฬ‚(0)k , where ฮฑ and ฮฒ are positive constants, for all possible initial condition xฬ‚(0) โˆˆ Rn as long as x(t) โˆˆ X . In particular, note that the exponential decay rate may be arbitrarily assigned by the value of โ„“ with a polynomial โ€peakingโ€ in โ„“ of order nโˆ’1. It is worth noting that the uniform Lipschitz condition (5) is automatically fulfilled if X is a compact set. In case d(x, t) or ฮฝ(t) are not identically zero, as long as they are bounded for all t โ‰ฅ 0 and for all1 x โˆˆ X , the observer (4) guarantees a bound on the estimation error that depends on the bound of d(ยท, ยท), of ฮฝ(ยท) and on the value of โ„“. In particular, the following asymptotic bounds can be proved lim sup kx(t) โˆ’ xฬ‚(t)k โ‰ค   1 ฮณ max lim sup k ฮ“(โ„“) d(x(t), t)k , lim sup kโ„“nโˆ’1 ฮฝ(t)k tโ†’โˆž tโ†’โˆž โ„“ tโ†’โˆž where ฮณ is a positive constant and ฮ“(โ„“) = diag(โ„“nโˆ’1 , . . . , โ„“, 1) . (6) As above the previous asymptotic bound holds for all possible xฬ‚(0) โˆˆ Rn as long as x(t) โˆˆ X . Note that a high value of โ„“ leads to an arbitrarily small asymptotic gain on the n-th component of the disturbance d(ยท, ยท). On the other hand, a 1 boundedness of d(x, t) is automatically guaranteed if X is compact. This, in turn, is the typical case when such observers are used in semiglobal output feedback stabilisation problems, [17]. 2 large value of โ„“ is, in general, detrimental for the sensitivity of the asymptotic estimate to the sensor noise and to the first n โˆ’ 2 disturbance components. Observers of the form (4) are routinely used in many observation and control problems. For instance, the feature of having an exponential decay rate and an asymptotic bound on the last component of d that can be arbitrarily imposed by the value of โ„“ is the main reason why the above observer plays a fundamental role in output feedback stabilisation and in setting up semiglobal nonlinear separation principles ([17], [4]). In that case the set X is an arbitrarily large compact set which is made invariant by the design of the state feedback stabilisation law and of the high-gain observer. We observe that, although the asymptotic gain with respect to ฮฝ increase with โ„“nโˆ’1 , the observer is anyway able to guarantee ISS with respect to the sensor noise ([14]). The main drawback of observers of the form (4), though, is related to the increasing power (up to the order n) of the high-gain parameter โ„“, which makes the practical numerical implementation an hard task when n or โ„“ are very large. Motivated by these considerations, in this note we propose a new observer for the class of systems (2) that preserves the same high-gain features of (4) but which substantially overtakes the implementation problems due to the high-gain powered up to the order n. Specifically, we present a highgain observer structure with a gain which grows only up to power 2 (instead of n), at the price of having the observer state dimension 2n โˆ’ 2 instead of n. II. M AIN R ESULT We start by presenting a technical lemma instrumental to the proof of the main result presented in Proposition 1. Let Ei โˆˆ R2ร—2 , Qi โˆˆ R2ร—2 , i = 1, . . . , n โˆ’ 1, and N โˆˆ R2ร—2 be matrices defined as       โˆ’ki1 1 0 0 0 ki1 Ei = , N= , Qi = โˆ’ki2 0 0 ki2 0 1 where (ki1 , ki2 ) are positive coefficients, and let M โˆˆ R(2nโˆ’2)ร—(2nโˆ’2) be the block-tridiagonal matrix defined as ๏ฃซ ๏ฃถ E1 N 0 ... ... 0 .. ๏ฃฌ ๏ฃท .. ๏ฃฌ Q2 E2 N ๏ฃท . . ๏ฃฌ ๏ฃท ๏ฃฌ ๏ฃท . . . . . .. .. .. .. .. ๏ฃฌ 0 ๏ฃท ๏ฃฌ ๏ฃท ๏ฃฌ .. ๏ฃท .. .. .. M = ๏ฃฌ . ๏ฃท . . . Q E N . i i ๏ฃฌ ๏ฃท ๏ฃฌ . ๏ฃท . . . . .. .. .. .. ๏ฃฌ .. 0 ๏ฃท ๏ฃฌ ๏ฃท ๏ฃฌ . ๏ฃท .. ๏ฃญ .. . Qnโˆ’2 Enโˆ’2 N ๏ฃธ 0 ... ... ... 0 Qnโˆ’1 Enโˆ’1 (7) It turns out that the eigenvalues of M can be arbitrarily assigned by appropriately choosing the coefficients (ki1 , ki2 ), i = 1, . . . , n โˆ’ 1, as claimed in the next lemma. Lemma 1 Let P(ฮป) = ฮป2nโˆ’2 + m1 ฮป2nโˆ’3 + ... + m2nโˆ’3 ฮป + m2nโˆ’2 be an arbitrary Hurwitz polynomial. There exists a choice of (ki1 , ki2 ), i = 1, . . . , n โˆ’ 1, such that the characteristic polynomial of M coincides with P(ฮป). The proof of this Lemma is deferred to the appendix where a constructive procedure for designing (ki1 , ki2 ) given P(ฮป) is presented. The structure of the proposed observer has the following form ฮพห™i = A ฮพi + N ฮพi+1 + D2 (โ„“) Ki ei i = 1, . . . , nโˆ’2 .. . ฮพห™nโˆ’1 = A ฮพnโˆ’1 + B ฯ•s (xฬ‚โ€ฒ ) + D2 (โ„“) K(nโˆ’1) enโˆ’1 (8) where (A, B, C) is a triplet in prime form of dimension 2, T ฮพi โˆˆ R2 , Ki = (ki1 ki2 ) , D2 (โ„“) = diag(โ„“, โ„“2 ), xฬ‚โ€ฒ = L1 ฮพ L1 = blkdiag ( C, . . . , C , I2 ) | {z } (nโˆ’2) times ฮพ = col(ฮพ1 , . . . , ฮพnโˆ’1 ) โˆˆ R2nโˆ’2 , e1 = y โˆ’ Cฮพ1 , ei = B T ฮพiโˆ’1 โˆ’ Cฮพi i = 2, . . . , n โˆ’ 1 , and ฯ•s (ยท) is an appropriate saturated version of ฯ•(ยท). The variable xฬ‚โ€ฒ represents an asymptotic estimate of the state x of (2). It is obtained by โ€œextractingโ€ n components from the state ฮพ according to the matrix L1 defined above. As clarified next, the redundancy of the observer can be used to extract from ฮพ an extra state estimation that is xฬ‚โ€ฒโ€ฒ = L2 ฮพ L2 = blkdiag (I2 , B T , . . . , B T ) . | {z } (nโˆ’2) times The following proposition shows that the observer (8) recovers the same asymptotic properties for the two estimates xฬ‚โ€ฒ and xฬ‚โ€ฒโ€ฒ of the โ€œstandardโ€ high-gain observer (4). In the statement of the proposition we let xฬ‚ = col(xฬ‚โ€ฒ , xฬ‚โ€ฒโ€ฒ ) , x = col(x, x) . Proposition 1 Consider system (2) and the observer (8) with the coefficients (ki1 ki2 ) fixed so that the matrix M defined in (7) is Hurwitz (see Lemma 1). Let ฯ•s (ยท) be any bounded function that agrees with ฯ•(ยท) on X , and assume that d(x, t) is bounded for all x โˆˆ X and for all t โ‰ฅ 0. Then there exist ci > 0, i = 1, . . . , 4, and โ„“โ‹† โ‰ฅ 1 such that for any โ„“ โ‰ฅ โ„“โ‹† and for any ฮพ(0) โˆˆ R2nโˆ’2 , the following bound holds kxฬ‚(t) โˆ’ x(t)k โ‰ค max{c1 โ„“nโˆ’1 exp(โˆ’c2 โ„“ t) kxฬ‚(0) โˆ’ x(0)k , 1 c3 k ฮ“(โ„“) d(ยท)kโˆž , c4 โ„“nโˆ’1 k ฮฝ(ยท)kโˆž } (9) โ„“ where ฮ“(โ„“) is as in (6), for all t โ‰ฅ 0 such that x(t) โˆˆ X . Proof: Consider the change of variables ฮพi 7โ†’ ฮพฬƒi := ฮพi โˆ’ col (xi , xi+1 ) i = 1, . . . , n โˆ’ 1 , by which system (8) transforms as ฮพหœห™1 = H1 ฮพหœ1 + N ฮพหœ2 โˆ’ dยฏ1 (t) + D2 (โ„“)K1 ฮฝ(t) ฮพฬƒห™i ฮพหœห™nโˆ’1 = Hi ฮพฬƒi + N ฮพหœi+1 + D2 (โ„“) Ki B T ฮพฬƒiโˆ’1 โˆ’ dยฏi (t) i = 2, . . . , n โˆ’ 2 = Hnโˆ’1 ฮพหœnโˆ’1 + D2 (โ„“) Knโˆ’1 B T ฮพหœnโˆ’2 + หœ x) โˆ’ dยฏnโˆ’1 (t) B โˆ†ฯ•(ฮพ, 3 where dยฏi (t) = (di (x(t), t), di+1 (x(t), t))T , Hi = Aโˆ’D2 (โ„“) Ki C , for i = 1, . . . , n โˆ’ 1, with di (t) the i-th element of the vector d(t), ฮพฬƒ = col(ฮพหœ1 , . . . , ฮพหœnโˆ’1 ), and หœ x) = ฯ•s (L1 ฮพหœ + x) โˆ’ ฯ•(x) . โˆ†ฯ•(ฮพ, Rescale now the variables ฮพหœi as follows ฮพหœi 7โ†’ ฮตi := โ„“2โˆ’i D2 (โ„“)โˆ’1 ฮพฬƒi i = 1, . . . , n โˆ’ 1 . By letting ฮต = col(ฮต1 . . . ฮตnโˆ’1 ), an easy calculation shows that ฮตฬ‡ = โ„“M ฮต + โ„“โˆ’(nโˆ’1) (B2nโˆ’2 โˆ†ฯ•โ„“ (ฮต, x) + ฯ…โ„“ (t) + nโ„“ (t)) , (10) where B2nโˆ’2 is the zero column vector of dimension 2n โˆ’ 2 with a 1 in the last position, and ฯ…โ„“ (t) = โˆ’col โ„“n D2 (โ„“)โˆ’1 dยฏ1 , . . . , โ„“nโˆ’i+1 D2 (โ„“)โˆ’1 dยฏi , . . . ,  โ„“2 D2 (โ„“)โˆ’1 dยฏnโˆ’1 , nโ„“ (t) = โ„“n Kฬ„1 ฮฝ(t) , Kฬ„1 = col(K1 , 0, . . . , 0) , and โˆ†ฯ•โ„“ (ฮต, x) = ฯ•s (L1 S(โ„“)ฮต + x) โˆ’ ฯ•(x) , where S(โ„“) = diag( 1โ„“ , 1 , โ„“ , . . . , โ„“nโˆ’3 ) โŠ— D2 (โ„“). Being ฯ•(ยท) uniformly Lipschitz in X and ฯ•s (ยท) bounded, there exists a ฮด1 > 0, ฮด2 > 0 and ฮด3 > 0 such that kโ„“โˆ’(nโˆ’1) โˆ†ฯ•โ„“ (ฮต, x)k โ‰ค ฮด1 kฮตk , kโ„“โˆ’(nโˆ’1) ฯ…โ„“ (t)k โ‰ค ฮด2 kโ„“ Dn (โ„“)โˆ’1 d(x(t), t)k , kโ„“โˆ’(nโˆ’1) nโ„“ (t)k โ‰ค ฮด3 kโ„“ ฮฝ(t)k , for all ฮต โˆˆ R2nโˆ’2 , x โˆˆ X and โ„“ โ‰ฅ 1. The rest of the proof follows standard Lyapunov arguments that, for sake of completeness, are briefly recalled. Let P = P T be such that P M + M T P = โˆ’I and consider the Lyapunov function V = ฮตT P ฮต. Taking derivative of V along the solutions of (10), using the previous bounds and letting โ„“โ‹† = 4 ฮด1 kP k, one obtains that there exist positive constants a1 , a2 , a3 such that for any โ„“ โ‰ฅ โ„“โ‹†  kฮตk โ‰ฅ max a1 kDn (โ„“)โˆ’1 d(x(t), t)k, a2 kฮฝ(t)k โ‡’ Vฬ‡ โ‰ค โˆ’a3 โ„“ kฮตk2 . As P is symmetric and definite positive, it turns out that ฮปkฮตk2 โ‰ค V (ฮต) โ‰ค ฮปฬ„kฮตk2 where ฮป and ฮปฬ„ are respectively the smallest and the highest eigenvalue of P . By using these bounds, the previous implication leads to conclude that, as long as  V โ‰ฅ ฮปฬ„ max a21 kDn (โ„“)โˆ’1 d(x(t), t)k2 , a22 kฮฝ(t)k exp(โˆ’ aฮปฬ„3 โ„“ t)V (0). By using again the bound on then V (t) โ‰ค V in terms of ฮป and ฮปฬ„, the following estimate on ฮต(t) can be easily obtained kฮต(t)k โ‰ค max{ a4 exp(โˆ’a5 โ„“ t) kฮต(0)k , a6 kDn (โ„“)โˆ’1 d(x(t), t)k , a7 kฮฝ(t)k} p p where p a4 = ฮปฬ„/ฮป, a5 = a3 /2ฮปฬ„, a6 = ฮปฬ„/ฮป a1 , ฮปฬ„/ฮป a2 . Now, using the fact that, for all โ„“ > 1, a7 = หœ โ‰ค kฮตk โ‰ค kฮพk, หœ the previous bound leads to the โ„“โˆ’(nโˆ’1) kฮพk หœ following estimate on ฮพ(t) หœ หœ kฮพ(t)k โ‰ค max{ a4 โ„“nโˆ’1 exp(โˆ’a5 โ„“ t) kฮพ(0)k , a6 โ„“nโˆ’1 kDn (โ„“)โˆ’1 d(x(t), t)k , a7 โ„“nโˆ’1 kฮฝ(t)k} by which the claim of the proposition immediately follows by bearing in mind the definition of ฮ“(โ„“), xฬ‚, x, and by noting หœ โ‰ค kxฬ‚ โˆ’ xk โ‰ค 2kฮพk. หœ that kฮพk III. A BOUT THE SENSITIVITY OF THE OBSERVER TO HIGH FREQUENCY NOISE IN THE LINEAR CASE The trade-off between the speed of the state estimation and the sensitivity to measurement noise is a well-known fact in the observer theory. In this respect, high-gain observers tuned to obtain fast estimation dynamics are necessarily very sensitive to high-frequency noise. Bounds on the estimation error in presence of measurement noise for the standard high-gain observers have been studied, for instance, in [18] and [5], and different techniques have been developed in order to improve rejection, mainly based on gain adaptation (see, among others, [1], [16]). In this section we compare the properties of the standard high-gain observer (4) and the proposed observer (8) with respect to high-frequency measurement noise by specialising the analysis to linear systems. In particular we consider systems of the form (2) with ฯ•(ยท) a linear function of the form ฯ•(x) = ฮฆ x where ฮฆ is a row vector of dimension n. Moreover, in this contest, we consider d(t) โ‰ก 0 and ฮฝ(t) = aN sin(ฯ‰N t + fN ) (11) where aN > 0, ฯ‰N > 0, and fN are constants. It is shown that the ratio between the asymptotic estimation error on the i-th state variable provided by the new observer (8) and the one provided by the standard observer (4) is a strictly decreasing polynomial function of the noise frequency for i = 2, . . . , n. In this regard the new observer has better asymptotic properties with respect to high-frequency noise as far as the state estimation variables are concerned (except for the first one). This is formalised in the next proposition. Proposition 2 Let n โ‰ฅ 1. Let Kn โˆˆ Rn , Ki โˆˆ R2 , i = 1, . . . , n โˆ’ 1 and โ„“ โˆˆ R be fixed so that the error dynamics of the observers (4) and (8) are Hurwitz. Moreover, with ฯ โˆˆ {1, 2, . . . , n} denoting the position index of the first non zero coefficient of the vector ฮฆ (and ฯ = n if ฮฆ is the zero vector), let riโ€ฒ โ‰ฅ 1 be the constants defined as riโ€ฒ = min { i , (n โˆ’ 1) , (ฯ + n โˆ’ i + 1)} i = 1, . . . , n . โ‹† โ‹† There exist ฯ‰N > 0 and cฬ„i > 0 such that for all ฯ‰N > ฯ‰N , aN > 0 and fN we have lim sup |xฬ‚โ€ฒi (t) โˆ’ xi (t)| tโ†’+โˆž lim sup |xฬ‚i (t) โˆ’ xi (t)| tโ†’+โˆž โˆ’(riโ€ฒ โˆ’1) โ‰ค cฬ„i ฯ‰N โˆ€ i = 1, . . . , n. 4 Proof: Consider system (2) and the standard high-gain observer (4). By letting e = โ„“ Dn (โ„“)โˆ’1 (xฬ‚โˆ’x), the e-dynamics read as  (12) eฬ‡ = โ„“ An + Kn Cn e + Bn ฮฆ ฮ˜n (โ„“) e + โ„“Kn ฮฝ(t) 1 where ฮ˜n (โ„“) = n Dn (โ„“) with Dn (โ„“) defined in (4). It is a โ„“ linear system that is Hurwitz by the choices of Kn and โ„“. Similarly, consider system (2) and the new observer (8). With ฮต defined as in the proof of Proposition 1 we obtain system (10) compactly rewritten as ฮตฬ‡ = โ„“M ฮต + B2nโˆ’2 ฮฆ ฮ˜n (โ„“)L1 ฮต + โ„“Kฬ„1 ฮฝ(t) . (13) It is an Hurwitz system by the choices of Ki , i = 1, . . . , nโˆ’ 1, and โ„“. We consider now the n systems given by the dynamics (12) with input ฮฝ and with outputs xฬ‚i โˆ’ xi = โ„“iโˆ’1 ei , and we denote by Fiโ€ฒ : R โ†’ C, i = 1, . . . , n, the harmonic transfer functions of these systems. Simple computations show that these systems have relative degree riโ€ฒ , for all i = 1, . . . , n, with riโ€ฒ defined in the statement of the proposition. By definition of harmonic transfer function and by the fact that systems (12) and (13) are Hurwitz, it turns out that = |Fi (ฯ‰N )| aN ๏ฃซ โˆ’z ฮฅ(z[0,3] ) = ๏ฃญโˆ’zฬ‡ โˆ’zฬˆ tโ†’+โˆž = |Fiโ€ฒ (ฯ‰N )| aN for any ฯ‰N โ‰ฅ 0 and โˆ€ i = 1, . . . , n. Furthermore, by the fact that Fi (ฯ‰) and Fiโ€ฒ (ฯ‰) have, respectively, relative degrees ri = 1 and riโ€ฒ , i = . . . , n, it turns out that there exist positive โ‹† > 0 such that ci , cโ€ฒi and ฯ‰N |Fi (ฯ‰)| |Fiโ€ฒ (ฯ‰)| โ‰ฅ ci ฯ‰ โˆ’1 โ€ฒ โ‰ค cโ€ฒi ฯ‰ โˆ’ri โ‹† โˆ€ ฯ‰ โ‰ฅ ฯ‰N , by which the result immediately follows. IV. E XAMPLE : O BSERVER FOR THE UNCERTAIN VAN D ER P OL O SCILLATOR Let consider the uncertain Van der Pol oscillator zฬˆ = โˆ’ฮฑ2 z + ฮฒ(1 โˆ’ z 2 )zฬ‡ , y = z + ฮฝ(t) , ๏ฃถ (1 โˆ’ z 2 )zฬ‡ ๏ฃธ zฬˆ โˆ’ 2y zฬ‡ 2 โˆ’ z 2 zฬˆ (3) z โˆ’ 2zฬ‡ 3 โˆ’ 6z zฬ‡zฬˆ โˆ’ z 2 z (3) and ฯ(z[0,4] ) = z (3) , z (4) (1 โˆ’ z 2 ) โˆ’ 12zฬ‡ 2 zฬˆ โˆ’ 6z zฬˆ 2 โˆ’ 8z zฬ‡z (3) with (see [9]) (14) where y โˆˆ R is the measured output and ฮฑ, ฮฒ are uncertain constant parameters. We let ยต = (ฮฑ2 , ฮฒ)โŠค and we assume that ยต โˆˆ U, with U a compact set of R2 not containing the origin. The state (z, zฬ‡) belongs to a compact invariant set W โŠ‚ R2 , which is the limit cycle of the Van Der Pol oscillator. We observe that W depends on ยต. Following [3], system (14) extended with ยตฬ‡ = 0 can be immersed into a system in the canonical observability form (2) with n = 5. As a matter of  for all z[0,4] โˆˆ X . Hence, by letting ฯ•(z[0,4] ) = ฯ(z[0,4] ) ยตฬ‚(z[0,3] ) with ยตฬ‚(z[0,4] ) = ฮฅโ€  (z[0,4] ) z[2,4] , where ฮฅโ€  (ยท) is the left-inverse of ฮฅ(ยท), and letting x = z[0,4] , it is immediately seen that system (14) and ยตฬ‡ = 0 restricted to W ร— U is immersed into the system xฬ‡ = A5 x + B5 ฯ•(x) , y = C5 x + ฮฝ(t) , (15) where A5 , B5 , C5 is a triplet in prime form of dimension 5. By following the prescriptions of Section II, we implemented the proposed observer (8) as ฮพฬ‡1 = .. . A ฮพ1 + N ฮพ2 + D2 (โ„“1 )K1 (y โˆ’ Cฮพ1 ) ฮพฬ‡4 = A ฮพ4 + B ฯ•s (xฬ‚โ€ฒ ) + D2 (โ„“1 )K4 (B โŠค ฮพ3 โˆ’ Cฮพ4 ) tโ†’+โˆž lim sup |xฬ‚โ€ฒi (t) โˆ’ xi (t)| z (5) = ฯ(z[0,4] ) ยต where rankฮฅ(z[0,3] ) = 2 = โ„“iโˆ’1 ฮตi,1 i = 1, . . . n โˆ’ 1, = โ„“nโˆ’1 ฮตnโˆ’1,2 , lim sup |xฬ‚i (t) โˆ’ xi (t)| z[2,4] = ฮฅ(z[0,3] ) ยต , i = 1, . . . n , and we denote by Fi : R โ†’ C, i = 1, . . . , n, the harmonic transfer functions of these systems. A simple computation shows that these systems have relative degree ri = 1, for all i = 1, . . . , n. Similarly, we consider the n systems given by the dynamics (13) with input ฮฝ and outputs xฬ‚โ€ฒi โˆ’ xi xฬ‚โ€ฒn โˆ’ xn fact, let z[i,j] := col (z (i) , . . . , z (j) ) be the vector of time derivatives of z, with 0 โ‰ค i < j, and let X be the compact set of R5 such that z[0,1] โˆˆ W โ‡’ z[0,4] โˆˆ X . Simple computations show that (16) where ฯ•s (ยท) is any locally Lipschitz bounded function that agrees with ฯ•(ยท) on X , ฮพi = (ฮพi1 , ฮพi2 ) and the coefficients of Ki are k11 = 0.6, k12 = 0.3, k21 = 0.6, k22 = 0.111, k31 = 0.6, k32 = 0.0485, k41 = 0.6, k42 = 0.0178, such that the roots of P(ฮป) are โˆ’0.1, โˆ’0.2, โˆ’0.2, โˆ’0.3, โˆ’0.3, โˆ’0.4, โˆ’0.4, โˆ’0.5. With the same notation of (8) we have ฮพ = (ฮพ1 , ฮพ2 , ฮพ3 , ฮพ4 ), xฬ‚โ€ฒ = L1 ฮพ and xฬ‚โ€ฒโ€ฒ = L2 ฮพ. In the simulations we fixed ฮฑ = 1, ฮฒ = 0.5, gain โ„“1 = 100 and initial conditions (z, zฬ‡) = (1, 0) for (14) and ฮพ = 0 for (16). Figures 1 and 2 show the error state estimate |xฬ‚โ€ฒ โˆ’ x| and |xฬ‚โ€ฒโ€ฒ โˆ’ x| of the proposed observer (16) for the first two components (namely the estimation of the state of (14)) when there is not sensor noise. By following Section III we compared the observer (16) with a standard high-gain observer in presence of high-frequency sensor noise, numerically taken as ฮฝ(t) = 10โˆ’2 sin(103 t). The high-gain observer has been implemented as xฬ‚ห™ = A5 xฬ‚ + B5 ฯ•s (xฬ‚) + D(โ„“2 )K5 (y โˆ’ C5 xฬ‚) (17) where K5 = (1.5, 0.85, 0.225, 0.0274, 0.0012)T so that the eigenvalues of (A5 + K5 C5 ) are โˆ’0.1, โˆ’0.2, โˆ’0.3, 5 โˆ’0.4, โˆ’0.5, and โ„“2 = 100. Table 1 shows the normalized asymptotic error magnitudes of the proposed observer (16) and the standard high-gain observer (17), where the normalized asymptotic error for the i-th estimate is defined as kxฬ‚i โˆ’xi ka = lim sup kxฬ‚i (t)โˆ’xi (t)k/aN . Although the result tโ†’โˆž in Section III is given just for linear systems, the numerical results shown in the table show a remarkable improvement of the sensitivity to high-frequency measurement noise of the new observer with respect to the standard high-gain observer. Standard High Gain Observer xฬ‚ kxฬ‚1 โˆ’ x1 ka kxฬ‚2 โˆ’ x2 ka kxฬ‚3 โˆ’ x3 ka kxฬ‚4 โˆ’ x4 ka kxฬ‚5 โˆ’ x5 ka = 0.15 =8 = 2 ยท 102 = 2.5 ยท 103 = 104 Modified Observer xฬ‚โ€ฒ = L1 ฮพ Modified Observer xฬ‚โ€ฒโ€ฒ = L2 ฮพ kxฬ‚โ€ฒ1 kxฬ‚โ€ฒ2 kxฬ‚โ€ฒ3 kxฬ‚โ€ฒ4 kxฬ‚โ€ฒ5 kxฬ‚โ€ฒโ€ฒ 1 โˆ’ x1 ka kxฬ‚โ€ฒโ€ฒ 2 โˆ’ x1 ka โ€ฒโ€ฒ kxฬ‚3 โˆ’ x3 ka kxฬ‚โ€ฒโ€ฒ 4 โˆ’ x4 ka kxฬ‚โ€ฒโ€ฒ 5 โˆ’ x5 ka โˆ’ x1 ka โˆ’ x2 ka โˆ’ x3 ka โˆ’ x4 ka โˆ’ x5 ka = = = = = 0.06 0.2 0.2 0.1 0.3 = = = = = 0.06 3 3 2 0.3 Table 1: Normalized asymptotic errors in presence of noise. numerically simulated in the previous section. A complete characterisation of the sensitivity to sensor noise of the new observer is an interesting research topic are that is now under investigation. The peaking phenomenon due to wrong initial conditions and fast convergence that is typical of high-gain observers is not prevented by our proposed structure. However, other techniques to deal with peaking (such as saturations, timevarying gains [16], gradients techniques [2], and others) are available and can be adopted to improve the proposed observer structure. In this work we didnโ€™t consider the multioutput case. For the specific class of multi-output systems which are diffeomorphic to a block triangular form in which each block is associated to each output and it has a triangular dependence on the states of that subsystem (see [4]), the proposed structure can be simply applied block-wise to obtain a high-gain observer. Apart this case, a complete extension to the multi-output case is not immediate and under investigation. Acknowledgment. We wish to thank Laurent Praly for suggesting the design procedure presented in Appendix A. 0.5 0 A PPENDIX A. Procedure to assign the eigenvalues of M โˆ’0.5 โˆ’1 0 0.2 0.4 0.6 0.8 Consider the matrices Mi โˆˆ R2iโˆ’2 ร— R2iโˆ’2 recursively defined as   Miโˆ’1 Nฬ„i , i = 2, . . . , nโˆ’1 M1 = E1 , Mi = Qฬ„i Ei 1 t (s) Fig. 1: Error state estimate |xฬ‚โ€ฒโ€ฒ1 โˆ’ x1 |, |xฬ‚โ€ฒ1 โˆ’ x1 |. where Nฬ„i = col(02(iโˆ’2)ร—2 , N ), Qฬ„i = (02(iโˆ’2)ร—2 , Qi ) and Ei , i = 1, . . . , n โˆ’ 1, Qi , i = 2, . . . , n โˆ’ 1, and N are defined as in the definition of M . Note that M = Mnโˆ’1 and, by letting Ki = (ki1 ki2 )T , note that Qi and Ei depend on Ki , while Mi depends on K1 , . . . , Ki . We let PMi (ฮป) = ฮป2i + mi1 ฮป2iโˆ’1 + 2iโˆ’3 + . . . + mi2iโˆ’1 ฮป + mi2i and PMiโˆ’1 (ฮป) = ฮป2iโˆ’2 + miโˆ’1 1 ฮป iโˆ’1 iโˆ’1 . . .+m2iโˆ’3 ฮป+m2iโˆ’2 the characteristic polynomials of Mi and Miโˆ’1 , and we use the notation mi[1,j] = col(mi1 , . . . , mij ) โˆˆ iโˆ’1 iโˆ’1 k Rj , miโˆ’1 [1,k] = col(m1 , . . . , mk ) โˆˆ R for some j โ‰ค 2i and k โ‰ค 2i โˆ’ 2. The characteristic polynomial of PMi (ฮป) is computed as 30 20 10 0 โˆ’10 0 0.2 0.4 0.6 0.8 1 PMi (ฮป) t(s) Fig. 2: Error state estimate (red line). |xฬ‚โ€ฒโ€ฒ2 โˆ’ x2 | (blue line) and |xฬ‚โ€ฒ2 โˆ’ x2 | V. C ONCLUSIONS We presented a new observer design based on high-gain techniques with a tunable state-estimate convergence speed. With respect to standard high-gain observers the state dimension is larger (2n โˆ’ 2 instead of n) with a clear benefit in the observer implementation due to the power of the highgain which is only 2 and not n. Moreover, when specialised to linear systems, we showed the benefit of the proposed observer with respect to the standard high-gain observer in terms of high-frequency noise rejection. Benefits that are clearly confirmed also for the nonlinear Van-der Pol example = ฮป(ฮป + ki1 )PMiโˆ’1 (ฮป)   +ki2 PMiโˆ’1 (ฮป) โˆ’ ฮป(ฮป + k(iโˆ’1)1 )PMiโˆ’2 (ฮป) . Hence, simple, although lengthy, computations show that the coefficients mi[1,2i] of PMi (ฮป) and miโˆ’1 [1,2iโˆ’2] of PMiโˆ’1 (ฮป) are related as follow mi[1,2iโˆ’2] = (I2iโˆ’2 + ki1 F )miโˆ’1 [1,2iโˆ’2] + ki1 v1 mi2iโˆ’1 = ki1 miโˆ’1 2iโˆ’2 mi2i ki2 miโˆ’1 2iโˆ’2 = 2iโˆ’2 (18) where v1 โˆˆ R is the zero vector with a 1 in the first position, and F โˆˆ R(2iโˆ’2)ร—(2iโˆ’2) is the zero matrix with the identity matrix I2iโˆ’3 in the lower left block. Note that (I2iโˆ’2 + ki1 F ) is invertible for all ki1 . Hence, from the first of (18), one obtains i miโˆ’1 [1,2iโˆ’2] = ฮ›(m[1,2iโˆ’2] , ki1 ) 6 where ฮ›(mi[1,2iโˆ’2] , โˆ’1 ki1 ) = (I2iโˆ’2 + ki1 F ) (mi[1,2iโˆ’2] โˆ’ ki1 v1 ) , which, embedded in the second and in the third of (18), yield the relations ฯƒ1 (mi[1,2iโˆ’1] , ki1 ) = 0 , ki2 = ฯƒ2 (mi[1,2i] , ki1 ) where ฯƒ1 (mi[1,2iโˆ’1] , ki1 ) = ki1 v2T ฮ›(mi[1,2iโˆ’2] , ki1 ) โˆ’ mi2iโˆ’1 ฯƒ2 (mi[1,2i] , ki1 ) = v2T mi2i i ฮ›(m[1,2iโˆ’2] , ki1 ) in which v2 โˆˆ R2iโˆ’2 is the zero vector with a 1 in the last position. We observe that ฯƒ1 (ยท, ยท) is a polynomial in ki1 of odd order 2i โˆ’ 1. As a consequence, for any mi[1,2iโˆ’1] there always exists at least one real ki1 fulfilling ฯƒ1 (mi[1,2iโˆ’1] , ki1 ) = 0. The previous results can be used to set up a โ€basic assignment algorithmโ€ that is then used iteratively to solve the eigenvalues assignment of the matrix M . Basic assignment algorithm. Let Pฬ„i (ฮป) = ฮป2i + mฬ„i1 ฮป2iโˆ’1 + . . . + mฬ„i2i be an arbitrary polynomial. Then, there exist a real Kฬ„i = (kฬ„i1 , kฬ„i2 )T and a polynomial Pฬ„iโˆ’1 (ฮป) = ฮป2iโˆ’1 + 2iโˆ’2 mฬ„iโˆ’1 + . . . + mฬ„iโˆ’1 1 ฮป 2iโˆ’2 such that Ki PMiโˆ’1 = Kฬ„i = Pฬ„iโˆ’1 (ฮป) โ‡’ PMi (ฮป) = Pฬ„i (ฮป) . As a matter of fact, by letting mฬ„i[1,2iโˆ’1] the coefficients of Pฬ„i (ฮป), it is possible to take kฬ„i1 as a real solution of ฯƒ1 (mฬ„i[1,2iโˆ’1] , ki1 ) = 0, kฬ„i2 = ฯƒ2 (mฬ„i[1,2i] , kฬ„i1 ), and to take the coefficients mฬ„iโˆ’1 [1,2iโˆ’2] of the polynomial Pฬ„iโˆ’1 (ฮป) as i mฬ„iโˆ’1 = ฮ›( mฬ„ [1,2iโˆ’2] , kฬ„i1 ) . โŠณ [1,2iโˆ’2] With the previous algorithm in hand, the design of K1 , . . . , Knโˆ’1 to assign an arbitrary characteristic polynomial to M , can be then immediately done by the following steps: 1) With Pฬ„nโˆ’1 (ฮป) the desired characteristic polynomial of M , compute (Kฬ„nโˆ’1 , Pฬ„nโˆ’2 (ฮป)) by running the basic assignment algorithm with i = n โˆ’ 1. 2) Compute iteratively (Kฬ„i , Pฬ„iโˆ’1 (ฮป)) by running the basic assignment algorithm for i = n โˆ’ 2, . . . , 2. 3) Compute Kฬ„1 = (kฬ„i1 , kฬ„i2 )T so that ฮป2 + ki1 ฮป + ki2 = Pฬ„1 (ฮป). R EFERENCES [1] J. H. Ahrens and H. K. Khalil, โ€œHigh-gain observer in the presence of measurement noise: a switched-gain approachโ€, Automatica vol. 45, pp 936-943, 2009. [2] D. Astolfi and L. Praly, โ€œOutput feedback stabilization for SISO nonlinear systems with an observer in the original coordinatesโ€, IEEE 52nd Conference on Decision and Control, pp. 5927-5932, December 2013. [3] D. Astolfi, L. Praly and L. Marconi, โ€œA note on observability canonical forms for nonlinear Systemsโ€, IFAC, 9th Symposium on Nonlinear Control Systems, pp 436-438, September 2013. [4] A. N. Atassi and H. K. Khalil, โ€œA separation principle for the stabilization of a class of nonlinear systemsโ€, IEEE Transactions on Automatic Control, 44, pp 1672-1687, 1999. [5] A. A. Ball and H. K. Khalil, โ€œHigh-gain observer tracking performance in the presence of measurement noiseโ€, American Control Conference, pp 4626-4627, 2009. [6] G. Besancฬงon, Nonlinear observers and applications, Springer, 2007. [7] G. Bornard and H. Hammouri, โ€œA high gain observer for a class of uniformly observable systemsโ€, IEEE, 30th Conference on Decision and Control, December 1991. [8] F. Deza, E. Busvelle, J.P. Gauthier, D. Rakotopara, โ€œHigh gain estimation for nonlinear systemsโ€, Systems & Control Letters vol. 18, pp 295-299, April 1992. [9] F. Forte, A. Isidori, L. Marconi, โ€œRobust design of internal models by nonlinear regressionโ€, IFAC, 9th Symposium on Nonlinear Control Systems, pp 283-288, September 2013. [10] M. T. J. Gajicฬ, The Lyapunov matrix equation in system stability and control, Academic Press, 1995. [11] J. P. Gauthier, G. Bornard, โ€œObservability for any u(t) of a class of nonlinear systemsโ€, IEEE Transactions on Automatic Control, Vol. AC26, No. 4, August 1981. [12] J.P. Gauthier and I. Kupka, โ€œDeterministic observation theory and applicationsโ€, Cambridge University Press, 2004. [13] H Hammouri, G. Bornard and K. Busawon, โ€œHigh gain observer for structured multi-input multi-output nonlinear systemsโ€, IEEE Transaction on Automatic Control vol. 55, no. 4, pp 987-992, April 2010. [14] H. K. Khalil and L. Praly, โ€œHigh-gain observers in nonlinear feedback controlโ€, Robust and Nonlinear Control, 24, pp 993-1015, 2014. [15] M. Maggiore, K.M. Passino, โ€œA separation principle for a class of non uniformly completely observable systemsโ€, IEEE Transactions on Automatic Control, vol. 48, no. 7, pp 1122-1133, July 2003. [16] R. G. Sanfelice and L. Praly, โ€œOn the performance of high-gain observers with gain adaptation under measurement noiseโ€, Automatica Vol. 47, pp 2165-2176, 2011. [17] A. Teel and L. Praly, โ€œGlobal stabilizability and observability imply semi-global stabilizability by output feedbackโ€, Systems and Control Letters, 22, pp 313-325, 1994. [18] L. K. Vasiljevic and H. K. Khalil, โ€œDifferentiation with high-gain observers the presence of measurement noiseโ€, IEEE 45th Conference on Decision and Control, pp 4717-4722, December 2006.
3cs.SY
arXiv:1711.06855v1 [cs.SY] 18 Nov 2017 A PROBABILISTIC CHARACTERIZATION OF RANDOM AND MALICIOUS COMMUNICATION FAILURES IN MULTI-HOP NETWORKED CONTROL A. CETINKAYA, H. ISHII, AND T. HAYAKAWA Abstract. The control problem of a linear discrete-time dynamical system over a multi-hop network is explored. The network is assumed to be subject to packet drops by malicious and nonmalicious nodes as well as random and malicious data corruption issues. We utilize asymptotic tail-probability bounds of transmission failure ratios to characterize the links and paths of a network as well as the network itself. This probabilistic characterization allows us to take into account multiple failures that depend on each other, and coordinated malicious attacks on the network. We obtain a sufficient condition for the stability of the networked control system by utilizing our probabilistic approach. We then demonstrate the efficacy of our results in different scenarios concerning transmission failures on a multi-hop network. 1. Introduction Network control systems incorporate communication networks to facilitate the exchange of measurement and control data between the plant and the controller [1]. Recently, multi-hop networks have been utilized in networked control operations [2, 3, 4, 5, 6, 7]. A multi-hop network such as a wireless ad hoc network consists of a number of nodes that are connected with a number of communication links. Ensuring orderly operation of a multi-hop networked control system can be challenging, as packets may sometimes fail to be transmitted at different parts of the network due to various reasons. One of the reasons for transmission failures in a multi-hop network is channel noise in the communication links, which may corrupt the contents of state and control input data packets. The occurrence of data corruption in a communication network may be modeled using random processes [8]. In addition to channel noise, network congestion may also cause packet transmission failures. Routers may drop some packets to mitigate congestion [9]. Furthermore, it has become apparent that malicious attacks may also hamper transmissions in a networked control system. For instance, jamming attacks by (A. Cetinkaya, H. Ishii) Department of Computer Science, Tokyo Institute of Technology, Yokohama, 226-8502, Japan. (T. Hayakawa) Department of Systems and Control Engineering, Tokyo Institute of Technology, Tokyo 152-8552, Japan. E-mail addresses: [email protected], [email protected], [email protected] . Key words and phrases. Networked Control, Multi-hop Networks, Malicious Attacks, Random Failures. This work was supported in part by the JST CREST Grant No. JPMJCR15K3 and by JSPS under Grant-in-Aid for Scientific Research Grant No. 15H04020. 1 2 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL an adversary may interfere with the communication on links and effectively prevent transmission of packets. This issue was investigated in several works from the viewpoints of wireless communications [10, 11], as well as control and game theory [12, 13, 14, 15, 16]. Transmissions of state and control input information between the plant and the controller may also fail due to malicious activities of routers. Malicious routers may intentionally drop some of the packets coming from and/or headed to certain nodes of the network [6, 17, 18]. The detection of such routing attacks can be challenging especially when the malicious nodes act normal for certain periods of time (see grayhole attacks in [19]). Furthermore, networks may face both malicious routing and random packet losses due to link errors [20, 21]. Understanding the effects of malicious attacks on networks is important from the viewpoint of cyber security of networked control systems [22, 23]. Our goal in this paper is to explore the effects of random and malicious transmission failures in a general multi-hop communication network and develop a network characterization to be used in the analysis of networked control systems. The key problem here is to characterize the failures for the overall multi-hop network in a nonconservative way while still taking into account mutually-dependent packet failures and coordinated malicious attacks on the network. In the literature, researchers have proposed different characterizations of packet failures in a networked control system. Specifically, [2] explored control over a network with multiple links that introduce random packet drops. The results obtained in [2] utilize packet drop probabilities on the edges that constitute cut-sets of the network graph. This approach is also utilized in network characterization by [24]. Furthermore, [3] discussed almost sure networked control system stability, and [25] studied networked state estimation problem. Recently, [7] investigated mean square stability and robustness under delays and packet losses through a Markov jump linear system framework. In these studies, Markov processes with certain transition probabilities are used for modeling packet losses on a network. In this paper, we consider a network with not only random failures but also malicious activities on nodes or links. As a result, failures may not always be modeled by Markov processes and packet losses may not always have well-defined probabilities. In [6], researchers explored a multi-hop network model with malicious nodes. There, the fault detection and isolation problem is explored for the case where the nodes induce delay in transmissions. Here, we consider a different setup and a different modeling approach. In particular, we do not investigate a detection problem, and we do not model the effect of delays. In this paper, we would like to characterize the overall packet exchange failures on a network between the plant and the controller by using the properties of the paths of the network and the communication links on those paths. We also note that our network characterization provides a high level model and it is tailored to be utilized for stability analysis in networked control as in [2]. Instead of specifying underlying physical channel models and routing protocols, we take a probabilistic approach to characterize transmission failure ratios on the links, paths of a network, as well as the network itself. Our approach for modeling the overall packet failures in a network is built upon tail-probability bounds for the binary-valued processes that describe the occurrences of failures on the network. Specifically, each link on a multi-hop network is described through an asymptotic tail-probability bound of the transmission failure CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 3 ratio of that link. This tail-probability-based approach is different from the typical random packet loss modeling approach of assigning probabilities to failures. Our approach can capture failures that occur due to both malicious and nonmalicious reasons. In fact, we utilized the tail-probability-based approach in [26] to study the combined effects of malicious-attacks following the discrete-time version of the attack model in [13, 16] and random packet losses modeled as Markov chains. Differently from [26], we show in this paper that when tail-probability bounds for the links are available, then we can obtain tail-probability bounds describing the overall failures on individual paths of a network. Then those bounds are used for deriving tail-probability bounds describing the overall failures on the network itself. Using our proposed characterizations, we obtain a probabilistic upper-bound for the average number of packet exchange failures between the plant and the controller, which we use in almost sure stability analysis of a discrete-time linear networked control system. In the multi-hop setting, the location of failures and whether multiple failures depend on each other or not critically affect the quality of communication and hence the stabilization performance of the controller. Especially, the situation becomes more serious when the network is targeted by a number of adversaries that launch coordinated attacks on different locations in the communication network. Our tail-probability bound approach can handle such worst-case situations in a unified manner. In addition to our investigation on those situations, we also explore the case where one or more paths/links are known to be associated with random failures and the corresponding indicator processes are mutually independent. For such cases, we show that tighter results can be obtained. This is done by exploiting certain properties of the hidden Markov models that characterize the random failures. The organization of the rest of the paper is as follows. In Section 2, we explain the networked control problem over a multi-hop network. We then present our multihop network characterization in Sections 3 and 4. Specifically, in Section 3, we give a characterization of the overall transmission failures in a multi-hop network based on the failures on individual paths of that network. Furthermore, in Section 4, we investigate failures on the paths that occur due to data-corruption and packetdropping issues at nodes and communication links. We demonstrate the utility of our results in Section 5, and conclude the paper in Section 6. We note that the conference version of this paper appeared in [27]. In this paper, we provide more detailed discussions throughout the paper. Furthermore, we present new results in Sections 3, 4 and new examples in Section 5. In this paper, we use N0 and N to denote nonnegative and positive integers, respectively. The notation P[ยท] denotes the probability on a probability space (โ„ฆ, F , P) with filtration {Ft }tโˆˆN0 . For binary numbers, the notation โˆจ represents the oroperation; moreover, โˆง represents the and-operation. 2. Control over Multi-hop Networks In this section, we investigate the control of a linear plant over a multi-hop network. On this network, the plant and the controller exchange state measurement and control input packets. The transmissions in the network are not subject to delay; however, there may be failures in packet exchange attempts between the plant and the controller. 4 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL We describe the linear dynamics of the plant by (1) x(t + 1) = Ax(t) + Bu(t), x(0) = x0 , t โˆˆ N0 , where A โˆˆ Rnร—n and B nร—m respectively denote the state and input matrices; furthermore, x(t) โˆˆ Rn and u(t) โˆˆ Rm are the state and the control input vectors, respectively. The plant and the controller attempt to exchange state measurement and control input packets at each time instant t. We denote success or failure states of packet exchange attempts by using the binary-valued process {l(t) โˆˆ {0, 1}}tโˆˆN0 . In the case of a successful packet exchange (l(t) = 0), the plant transmits the state measurement to the controller; the controller uses the received state information together with a linear static feedback control law to compute the control input, which is then sent back to the plant. The transmitted control input is applied at the plant side. At certain time instants, either the state packet or the control input packet cannot be delivered due to network issues such as packet drops, jamming attacks, and other communication errors. In such cases packet exchange attempts fail (l(t) = 1), and the control input at the plant side is set to 0, which is one of the common approaches in the literature (see [1] and the references therein). Under this characterization, the control input u(t) applied at the plant side is given by u(t) , (1 โˆ’ l(t)) Kx(t), (2) t โˆˆ N0 , mร—n where K โˆˆ R represents the feedback gain. Although we consider a static state-feedback control setup here, the techniques that we develop in this paper can also be used in conjunction with other control approaches. In particular, the predictive control approach of [28] and the event-triggered output-feedback control approach from our earlier work [29] can be studied within the context of multi-hop networked control by using the network characterizations that we develop here. We now introduce a class of processes that is useful in describing packet failure indicators in the paper. Definition 2.1 (ฮ›ฯ ). Given a scalar ฯ โˆˆ [0, 1] we define the class of binary-valued processes ฮ›ฯ by โˆž kโˆ’1 X X  ฮ›ฯ , l : l(t) โˆˆ {0, 1}, t โˆˆ N0 ; P[ l(t) > ฯk] < โˆž . k=1 t=0 By this definition, we have ฮ›ฯ1 โІ ฮ›ฯ2 for ฯ1 โ‰ค ฯ2 . Furthermore, any binaryvalued process l satisfies l โˆˆ ฮ›1 . In [26], we explored a problem similar to the one that we discuss in this paper. There, we considered a single direct communication channel between the plant and the controller. To describe the packet losses on this channel, we proposed a probabilistic characterization that is based on the following assumption. Assumption 2.2. For the packet exchange failure indicator l(ยท), we have l โˆˆ ฮ›ฯ with ฯ โˆˆ [0, 1]. This assumption allows us to characterize a range of scenarios in a unified manner through the scalar ฯ โˆˆ [0, 1]. For instance, the case where all packet exchange attempts fail (l(t) = 1, t โˆˆ N0 ) can be described by setting ฯ = 1. Moreover, in CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 5 the case where all packet exchange attempts are successful (l(t) = 0, t โˆˆ N0 ), then l โˆˆ ฮ›0 . In addition to these two extreme cases, as we illustrate throughout the paper, Assumption 2.2 can also be used to describe random failures and malicious attacks. When the packet exchange failures in a networked control system satisfy Assumption 2.2, then the scalar ฯ โˆˆ [0, 1] also represents a bound on the asymptotic packet exchange failure ratio. Specifically, it follows from Borel-Cantelli Lemma Pkโˆ’1 l(t) โ‰ค ฯ, almost surely. When this inequality holds with that lim supkโ†’โˆž k1 t=0 a small ฯ, it means that the packet exchanges fail statistically rarely. We showed in [26] that the plant (1) can be stabilized over a network, if ฯ is sufficiently small. The stability analysis method developed in [26] allows us to obtain the following result, which presents sufficient stability conditions for the closed-loop networked control system (1), (2). Theorem 2.3. Consider the dynamical system (1), (2). Suppose Assumption 2.2 holds with scalar ฯ โˆˆ [0, 1]. If there exist a positive-definite matrix P โˆˆ Rnร—n and scalars ฮฒ โˆˆ (0, 1), ฯ• โˆˆ [1, โˆž) such that T (3) (A + BK) P (A + BK) โˆ’ ฮฒP โ‰ค 0, (4) AT P A โˆ’ ฯ•P โ‰ค 0, (5) (1 โˆ’ ฯ) ln ฮฒ + ฯ ln ฯ• < 0, then the zero solution x(t) โ‰ก 0 of the closed-loop system (1), (2) is asymptotically stable almost surely. In Theorem 2.3, the conditions (3) and (4) characterize stability and instability of the closed-loop and the open-loop dynamics through scalars ฮฒ and ฯ•. These scalars also appear in condition (5). When ฯ (and hence the packet exchange failure ratio) is sufficiently small so that (5) is satisfied, then we have almost sure asymptotic stability, which implies P[limtโ†’โˆž kx(t)k = 0] = 1. In Sections 3 and 4 below, we will present some key methods for obtaining ฯ of a multi-hop networked control system (1), (2) to facilitate its stability analysis with Theorem 2.3. Specifically, we will consider the setting where the state measurement and control input packets are attempted to be transmitted over multi-hop networks instead of a single direct channel, which was considered in [26]. We will use assumptions similar to Assumption 2.2 to characterize packet transmission failures on the paths between the plant and the controller as well as the individual links on those paths. We will then show that the packet exchange failures (represented by l(ยท)) in the overall networked control system satisfy Assumption 2.2 with a scalar ฯ โˆˆ [0, 1] that depends on the network structure as well as failure models of links. To facilitate the analysis in the following sections, we now define two more classes of binary-valued processes that are distinct from ฮ›ฯ . Our goal is to characterize more specific models for random and malicious failures. In our earlier work [26], we utilized time-inhomogeneous Markov chains for characterizing random failures in a single communication channel. When we consider a multi-hop network composed of a number of channels that face random transmission failures, we are required to introduce a different characterization. This is because the overall failures in the network depends on the failures on each individual channel. Hence, the overall failures cannot always be described as a Markov 6 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL chain. In order to describe random failures in multi-hop networks, we utilize timeinhomogeneous hidden Markov models (see [30, 31, 32]). The binary-valued process {l(t) โˆˆ {0, 1}}tโˆˆN0 has a time-inhomogeneous hidden Markov model if l(t) = hl (ฮธl (t)), (6) l t โˆˆ N0 , l where h : ฮ˜ โ†’ {0, 1} is a binary valued function on a set ฮ˜l of finite number of elements, and moreover, {ฮธl (t) โˆˆ ฮ˜l }tโˆˆN0 is an Ft -adapted, finite-state, and timeinhomogeneous Markov chain with initial distributions ฯ‘lq โˆˆ [0, 1], q โˆˆ ฮ˜l , and time-varying transition probability functions plq,r : N0 โ†’ [0, 1], q, r โˆˆ ฮ˜l , satisfying P[ฮธl (0) = q] = ฯ‘lq , P[ฮธ (t + 1) = r|ฮธl (t) = q] = plq,r (t), l t โˆˆ N0 . The process {l(t) โˆˆ {0, 1}}tโˆˆN0 is also called the output process of a hidden Markov model. Notice that {l(t) โˆˆ {0, 1}}tโˆˆN0 depends on the Markov chain {ฮธl (t) โˆˆ ฮ˜l }tโˆˆN0 through function hl , but it is not necessarily a Markov chain itself. Specifically, in certain cases, we may have P[l(t + 1) = 1|Ft ] 6= P[l(t + 1) = 1|l(t)], which shows that Markov property (see [33]) does not hold. This is for example the case where l(ยท) represents the failures on a Gilbert-Elliott channel (see [34, 35]). We also note that hidden Markov models naturally arise in the description of multi-hop networks. For instance, l(ยท) may be the failure indicator of a path with multiple links. Even if the failures on individual links may satisfy the Markov property, the overall failure indicator l(ยท) does not satisfy it due to dependence on the failure/success states of all individual links. In such cases, l(ยท) follows a hidden Markov model, where the Markov chain {ฮธl (t) โˆˆ ฮ˜l }tโˆˆN0 represents the combined states of all individual links. For a given binary-valued output process {l(t) โˆˆ {0, 1}}tโˆˆN0 associated with a time-inhomogeneous hidden Markov model, let ฮ˜l0 , ฮ˜l1 โŠ‚ ฮ˜l be given by ฮ˜l0 , {r โˆˆ ฮ˜l : hl (r) = 0}, ฮ˜l1 , {r โˆˆ ฮ˜l : hl (r) = 1}. In the next definition we introduce a class of binary-valued output processes associated with time-inhomogeneous hidden Markov models. Definition 2.4 (ฮ“p0 ,p1 ). Given scalars p0 , p1 โˆˆ [0, 1] we define the class ฮ“p0 ,p1 of binary-valued output processes of time-inhomogeneous hidden Markov models by X  X l plq,r (t) โ‰ค p1 , q โˆˆ ฮ˜l , t โˆˆ N0 . pq,r (t) โ‰ค p0 , q โˆˆ ฮ˜l , t โˆˆ N0 ; ฮ“p0 ,p1 , l : rโˆˆฮ˜l0 rโˆˆฮ˜l1 The following result establishes the relation between the classes ฮ“p0 ,p1 and ฮ›ฯ . Proposition 2.5. Consider the binary-valued output process {l(t) โˆˆ {0, 1}}tโˆˆN0 of a time-inhomogeneous hidden Markov model. If l โˆˆ ฮ“p0 ,p1 with p1 โˆˆ (0, 1), then we have l โˆˆ ฮ›ฯ for any ฯ โˆˆ (p1 , 1]. Before, we give the proof of Proposition 2.5, we first present a technical result that provides upper bounds on the tail probabilities of sums involving a binaryvalued output process associated with a time-inhomogeneous hidden Markov model. Lemma 2.6. Let {ฮพ(t) โˆˆ ฮž}tโˆˆN0 be a finite-state time-inhomogeneous Markov chain with transition probabilities pq,r : N0 โ†’ [0, 1], q, r โˆˆ ฮž, and let ฮž1 โŠ‚ ฮž be given by ฮž1 , {r โˆˆ ฮž : h(r) = 1}, where h : ฮž โ†’ {0, 1} is a binary-valued function. CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 7 Furthermore, let {ฯ‡(t) โˆˆ {0, 1}}tโˆˆN0 be a binary-valued process that is independent of {ฮพ(t) โˆˆ ฮž}tโˆˆN0 . Assume X (7) pq,r (t) โ‰ค pฬƒ, q โˆˆ ฮž, t โˆˆ N0 , rโˆˆฮž1 โˆž X (8) P[ kโˆ’1 X ฯ‡(t) > wฬƒk] < โˆž, t=0 k=1 where pฬƒ โˆˆ (0, 1), wฬƒ โˆˆ (0, 1]. We then have for ฯ โˆˆ (pฬƒwฬƒ, wฬƒ), (9) P[ kโˆ’1 X h(ฮพ(t))ฯ‡(t) > ฯk] โ‰ค ฯˆk , k โˆˆ N, t=0 wฬƒk pฬƒ+1) where ฯˆk , ฯƒฬƒk + ฯ†โˆ’ฯk+1 ((ฯ†โˆ’1) (ฯ†โˆ’1)pฬƒ Pโˆž N. Moreover, k=1 ฯˆk < โˆž. โˆ’1 ,ฯ†, ฯ wฬƒ (1โˆ’pฬƒ) ฯ , pฬƒ(1โˆ’ wฬƒ ) ฯƒฬƒk , P[ Pkโˆ’1 t=0 ฯ‡(t) > wฬƒk], k โˆˆ Lemma 2.6 is an essential tool for dealing with different failure scenarios specific to multi-hop networks, and it generalizes Lemma A.1 of our previous work [26]. In particular, in the case where ฮž = {0, 1} and h(r) = r, r โˆˆ ฮž, Lemma 2.6 recovers Lemma A.1 of [26]. The proof Lemma 2.6 is given in the Appendix. We are now ready to prove Proposition 2.5. Proof of Proposition 2.5. Notice that l โˆˆ ฮ›ฯ for ฯ = 1, since l(ยท) is binary-valued. For the case ฯ โˆˆ (p1 , 1), we show l โˆˆ ฮ›ฯ by employing Lemma 2.6. Specifically, let pฬƒ = p1 , wฬƒ = 1, and define the processes {ฮพ(t) โˆˆ {0, 1}}tโˆˆN0 and {ฯ‡(t) โˆˆ {0, 1}}tโˆˆN0 with ฮพ(t) = ฮธ1l (t) and ฯ‡(t) = 1, t โˆˆ N0 . Since the conditions in (7) and (8) are satisfied with pฬƒ = p1 , h = hl , ฮž = ฮ˜l , and ฮž1 = ฮ˜l1 , it follows from Lemma 2.6 that โˆž X k=1 P[ kโˆ’1 X t=0 l(t) > ฯk] = โˆž X P[ k=1 which completes the proof. kโˆ’1 X hl (ฮธ1l (t)) > ฯk] = t=0 โˆž X k=1 P[ kโˆ’1 X h(ฮพ(t))ฯ‡(t) > ฯk] < โˆž, t=0  Next, we introduce a class for binary-valued processes that we employ in characterizing the timing of malicious attacks. Definition 2.7 (ฮ ฮบ,w ). Given scalars ฮบ โ‰ฅ 0, w โˆˆ [0, 1] we define the class of binary-valued processes ฮ ฮบ,w by X   kโˆ’1  ฮ ฮบ,w , l : l(t) โˆˆ {0, 1}, t โˆˆ N0 ; P l(t) โ‰ค ฮบ + wk = 1, k โˆˆ N . t=0 The characterization for the class ฮ ฮบ,w is based on a discrete-time version of the malicious attack model used by [13, 16]. In this model, occurrences of malicious  Pkโˆ’1  attacks is described by a process l(ยท) such that P t=0 l(t) โ‰ค ฮบ + wk = 1, k โˆˆ N, where ฮบ โ‰ฅ 0 represents an upper-bound for a number of initial attacks, and w โˆˆ (0, 1) represents a bound on the average attack rate. Lemma 2.3 in [26] shows that if l โˆˆ ฮ ฮบ,w with w โˆˆ (0, 1), then l โˆˆ ฮ›ฯ for any ฯ โˆˆ (w, 1]. Note that the malicious attack characterization through the class ฮ ฮบ,w , does not require the process l โˆˆ ฮ ฮบ,w to follow a particular distribution at each time. This is the key difference of the class ฮ ฮบ,w from the class ฮ“p0 ,p1 that represents random failures. 8 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL There are several ways an attacker can strategize when to cause transmission failures. For instance, game-theoretic [14, 15] and optimization-based methods can be used by the attacker to decide the timing of attacks. An important property of the class ฮ ฮบ,w is that it characterizes attacks by their maximum average attack rate but not by the specific timing strategy they follow. Thus by using ฮ ฮบ,w , we can capture the uncertainty in the generation of attacks, which may follow a deterministic strategy, or may involve randomness. Interestingly, an attacker can also make use of system dynamics as well as past/present state information to decide the timing of attacks to cause more damage to the system. Such attacks are further illustrated in Section 5.3 and explored through the characterization of ฮ ฮบ,w . As we discussed above, a process l that belongs to either of the classes ฮ ฮบ,w and ฮ“p0 ,p1 also belongs to the class ฮ›ฯ for a suitable value of ฯ. This observation suggests us that both random failures and malicious attacks can be characterized by utilizing the class ฮ›ฯ . As we make it clear in the following sections, the class ฮ›ฯ has useful properties. For instance, if two processes l1 and l2 belong to classes ฮ›ฯ1 and ฮ›ฯ2 , then the processes lโˆง and lโˆจ defined by setting lโˆง (t) = l1 (t) โˆง l2 (t) and lโˆจ = l1 (t) โˆจ l2 (t) belong to classes ฮ›ฯโˆง and ฮ›ฯโˆจ where ฯโˆง and ฯโˆจ depend on ฯ1 and ฯ2 . Such properties enable us to model the failures on both the links and the paths of a network by using processes that belong to the class ฮ›ฯ for certain values of ฯ. 3. Random and Malicious Packet Failures in Multi-Hop Networks In this section, we present a framework for modeling random and malicious packet transmission failures in the multi-hop networks that are used for exchanging state and control input packets between the plant and the controller. 3.1. Multi-Hop Network Model. We follow the approach of [24] and represent the networks between the plant and the controller by using directed acyclic graphs. To model the network, over which the state packets are transmitted from the plant to the controller, we consider the directed acyclic graph G , (V, E), where V denotes the set of nodes, and E โŠ‚ {(v1 , v2 ) : v1 , v2 โˆˆ V } denotes the set of edges. Here the nodes and the edges correspond respectively to communication devices and links. We represent the nodes at the plant and the controller with vP โˆˆ V and vC โˆˆ V , respectively. A path P from a node v1 โˆˆ V to another node vh โˆˆ V is identified  as a sequence of nonrepeating edges P = (v1 , v2 ), (v2 , v3 ), . . . , (vhโˆ’1 , vh ) . We write |P| to denote the number of edges on the path P. Similarly, the network used for transmission of the control input packets from the controller to the plant is represented by graph Gฬƒ , (Vฬƒ , Eฬƒ) with plant and controller nodes vฬƒP โˆˆ Vฬƒ and vฬƒC โˆˆ Vฬƒ . In practice, the same physical network may be used for transmission of both the state and the control input packets. For those cases, the nodes in V and Vฬƒ would correspond to the same physical devices. We assume that there exists at least one directed path from node vP to node vC in G, and at least one directed path from node vฬƒC to node vฬƒP in Gฬƒ. Example 3.1. We show an example of G and Gฬƒ in Fig. 1, where the nodes corresponding to the plant and the controller are not directly connected, but state and control input packets can still be transmitted with the help of the intermediate nodes v1 , . . . , v4 in G, and vฬƒ1 , . . . , vฬƒ5 in Gฬƒ. CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 9 Figure 1. Multi-hop networked control system Intermediate nodes in networks forward data packets that they receive from their incoming edges to their outgoing edges. Depending on the communication protocol, the forwarding method may differ. For instance, in the broadcast method, intermediate nodes forward all data packets that they receive from their incoming edges to all the nodes that they are connected with their outgoing edges. On the other hand, it may also be the case that intermediate nodes follow a specific routing scheme, where a packet coming from a certain incoming edge is forwarded through a certain outgoing edge [36]. We assume that the information packets propagate with no delay in both networks represented with G and Gฬƒ, although there may be transmission failures due to: 1) packet drops by malicious nodes to prevent communication and/or by nonmalicious nodes to avoid congestion; 2) data corruption on links because of random channel errors and/or malicious jamming attacks. Hence, a packet exchange between the plant and the controller may fail if the state or the control input packets are dropped or get corrupted. Here note that corrupted data packets are allowed to be transmitted over intermediate nodes, but they are detected and discarded at the plant/controller nodes. Error-detecting codes can be used for this purpose. Note also that if the controller only receives corrupted versions of a state packet, the control input is not computed. In the following sections, we present some key results for the analysis of packet failures on network G, which are directly applicable for analyzing Gฬƒ. In particular, we characterize failures on G in terms of the failures on different paths between the plant and the controller. Then we present a set of results that relate data corruption and packet dropping issues of nodes and links to the failures on each individual path of G. These results enable us to obtain ฯ โˆˆ [0, 1] in Assumption 2.2, which is essential for analyzing the system in Fig. 1 with Theorem 2.3. We emphasize that the central problem here is to find ฯ for the overall multi-hop network in Fig. 1 in a nonconservative way while still taking into account mutually-dependent packet failures and coordinated attacks on the network. 3.2. Packet Transmission Failures on Networks. We use the binary-valued process {lG (t) โˆˆ {0, 1}}tโˆˆN0 to indicate transmission failures on G. Specifically, lG (t) = 0 means that the state packet x(t) sent from the plant node vP is successfully 10 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL received at the controller node vC . On the other hand, lG (t) = 1 indicates a failure, that is, the controller does not receive the state x(t). Let c โˆˆ N denote the number of paths on graph G from the node vP to the node vC , and let Pi , i โˆˆ {1, . . . , c}, denote these paths. In the example network G in Fig. 1, there are c = 3 paths   P1 = (vP , v1 ), (v1 , vC ) , P2 = (vP , v2 ), (v2 , v4 ), (v4 , vC ) ,  (10) P3 = (vP , v3 ), (v3 , v4 ), (v4 , vC ) . Note that different paths may include the same link. Hence, when packet transmission is attempted on multiple paths, a link that is shared on those paths may be used multiple times. For instance, (v4 , vC ) is on both P2 and P3 . Hence, (v4 , vC ) may be utilized twice to forward the packets coming from v2 and v3 . On the other hand, the framework that we describe below also allows modeling the case where one of the packets is dropped at node v4 and not transmitted further. Furthermore, the packet drop can be random or malicious. We use {lPi (t) โˆˆ {0, 1}}tโˆˆN0 to indicate whether the state packet x(t) is successfully transmitted to the controller through path Pi or not. Specifically, lPi (t) = 0 represents a successful transmission. On the other hand lPi (t) = 1 may indicate that the path is not utilized for transmission due to the particular routing scheme, or it may indicate a failure. Failures occur if packets get dropped on the path or if they get corrupted. Thus, in network G, the transmission of the state packet x(t) from node vP to node vC results in failure if lPi (t) = 1 for all paths Pi , i โˆˆ {1, . . . , c}. Therefore, lG (ยท) is given by lG (t) = lP1 (t) โˆง lP2 (t) โˆง ยท ยท ยท โˆง lPc (t). (11) The following result presents a probabilistic and asymptotic bound for the packet transmission failure ratio of G as a function of the bounds for the individual paths Pi . Proposition 3.2. Assume for each path Pi that we have lPi โˆˆ ฮ›ฯPi , where ฯPi โˆˆ [0, 1]. Then lG โˆˆ ฮ›ฯG with ฯG , miniโˆˆ{1,...,c} ฯPi . Proof. First let iโˆ— , arg miniโˆˆ{1,...,c} ฯPi . It follows that ฯG = miniโˆˆ{1,...,c} ฯPi = ฯPiโˆ— . Now, by (11), kโˆ’1 X lG (t) โ‰ค t=0 and hence Pkโˆ’1 t=0 lG (t) P[ โ‰ค kโˆ’1 X kโˆ’1 X lPi (t), i โˆˆ {1, . . . , c}, t=0 Pkโˆ’1 t=0 lPiโˆ— (t). Therefore, lG (t) > ฯG k] โ‰ค P[ t=0 The result then follows, since lPiโˆ— โˆˆ ฮ›ฯPiโˆ— . kโˆ’1 X lPiโˆ— (t) > ฯPiโˆ— k]. t=0  The scalars ฯPi , i โˆˆ {1, . . . , c}, in Proposition 3.2 represent bounds for asymptotic packet failure ratios on different paths of network G. Proposition 3.2 indicates that the minimum of these scalars is also a bound for the packet failure ratio of the whole network. Observe that if ฯPi = 0 for some path Pi , then we have ฯG = 0, CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 11 which means that the state can be securely and reliably transmitted to the controller at all time instants. This is because the transmission on path Pi never fails. If, on the other hand, ฯPi = 1 for all paths Pi , then ฯG = 1, indicating all packet transmission attempts fail, almost surely. Note that in Proposition 3.2, we do not assume that {lPi (t) โˆˆ {0, 1}}tโˆˆN0 are mutually-independent processes. This allows us to deal with the scenarios where transmission failures on different paths may depend on each other. In particular, we can consider coordinated packet dropout attacks of several malicious routers on different paths. For instance, two malicious routers v2 and v3 in Fig. 1 may skip forwarding packets at the same time. Then transmissions on paths P2 and P3 given in (10) would both fail. Similarly, Proposition 3.2 is also useful when links on different paths are attacked at the same time by coordinated jamming attackers. Another scenario that can be explored through Proposition 3.2 is related to packet drops by nonmalicious routers to prevent congestion [9]. For example, a nonmalicious router v4 in Fig. 1 may choose to forward only one of the packets coming from v2 and v3 . Then, lP2 (ยท) and lP3 (ยท) would be dependent processes. In particular, if there are no other failures in the network, then we have lP2 (t) = 1 โˆ’ lP3 (t). We remark that by utilizing additional properties of the indicator processes lPi (ยท) for paths, we can obtain a better asymptotic failure bound ฯG than the one provided in Proposition 3.2. In particular, if one or more paths are known to be associated with random failures and the corresponding indicator processes are mutually independent, we can obtain tighter results than Proposition 3.2. To this end, we first present the following result on the properties of a process that is obtained by using โˆง operation on the output processes of two mutually-independent hidden Markov models. Theorem 3.3. Consider the binary-valued output processes {l(1) โˆˆ {0, 1}}tโˆˆN0 and {l(2) โˆˆ {0, 1}}tโˆˆN0 of hidden Markov models such that l(1) โˆˆ ฮ“p(1) ,p(1) , l(2) โˆˆ (1) (1) (2) 0 (2) 1 (1) ฮ“p(2) ,p(2) with p0 , p1 , p0 , p1 โˆˆ [0, 1]. Suppose that the Markov chains {ฮธl (t) โˆˆ 0 (1) 1 (2) (2) ฮ˜l }tโˆˆN0 and {ฮธl (t) โˆˆ ฮ˜l }tโˆˆN0 associated with the processes l(1) and l(2) are (1) (1) (2) (2) (2) (1) mutually independent. Let pฬƒ0 , min{p0 + p1 p0 , p0 + p1 p0 , 1} and pฬƒ1 , (1) (2) p1 p1 . Then the process {lฬƒ(t) โˆˆ {0, 1}}tโˆˆN0 defined by หœ l(t) = l(1) (t) โˆง l(2) (t), (12) t โˆˆ N0 , is the output process of a time-inhomogeneous hidden Markov model, and moreover, lฬƒ โˆˆ ฮ“pฬƒ0 ,pฬƒ1 . (1) (2) Proof. Let ฮ˜lฬƒ , {(q (1) , q (2) ) : q (1) โˆˆ ฮ˜l , q (2) โˆˆ ฮ˜l } and define the bivariate process {ฮธlฬƒ (t) โˆˆ ฮ˜lฬƒ }tโˆˆN0 by (1) (2) ฮธlฬƒ (t) = (ฮธl (t), ฮธl (t)), t โˆˆ N0 . It follows that {ฮธlฬƒ (t) โˆˆ ฮ˜lฬƒ }tโˆˆN0 is a time-inhomogeneous Markov chain with ini(1) (2) (2) (1) tial distribution ฯ‘lฬƒ(q(1) ,q(2) ) = ฯ‘lq(1) ฯ‘lq(2) , q (1) โˆˆ ฮ˜l , q (2) โˆˆ ฮ˜l , and time-varying (1) (2) transition probabilities plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) = plq(1) ,r(1) (t)plq(2) ,r(2) (t), t โˆˆ N0 . Here, for j โˆˆ {1, 2}, ฯ‘l (j) (j) and pl (ยท) respectively denote the initial distribution and the 12 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL (j) (j) transition probability function for the Markov chain {ฮธl (t) โˆˆ ฮ˜l }tโˆˆN0 associated with the output process {l(j) โˆˆ {0, 1}}tโˆˆN0 . Furthermore, it follows from (12) that (1) (1) (2) (2) หœ l(t) = l(1) (t) โˆง l(2) (t) = l(1) (t)l(2) (t) = hl (ฮธl (t))hl (ฮธl (t)), t โˆˆ N0 . Now let hlฬƒ : ฮ˜lฬƒ โ†’ {0, 1} be given by (1) (2) hlฬƒ ((q, r)) = hl (q)hl (r), (q, r) โˆˆ ฮ˜lฬƒ . It follows that (6) holds with l replaced with lฬƒ. Thus, {lฬƒ(t) โˆˆ {0, 1}}tโˆˆN0 is the output process of a time-inhomogeneous hidden Markov model. Our next goal is to prove lฬƒ โˆˆ ฮ“pฬƒ0 ,pฬƒ1 by showing X (13) plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โ‰ค pฬƒ0 , (r (1) ,r (2) )โˆˆฮ˜lฬƒ0 X (14) plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โ‰ค pฬƒ1 , t โˆˆ N0 . (r (1) ,r (2) )โˆˆฮ˜lฬƒ1 First, we show (13). Observe that ฮ˜lฬƒ0 = {(r(1) , r(2) ) โˆˆ ฮ˜lฬƒ : hlฬƒ ((r(1) , r(2) )) = 0} (1) (2) = {(r(1) , r(2) ) โˆˆ ฮ˜lฬƒ : hl (r(1) )hl (r(2) ) = 0}. (15) Now let j1 , j2 โˆˆ {1, 2} be such that j1 6= j2 . It follows from (15) that ฮ˜lฬƒ0 = {(r(1) , r(2) ) โˆˆ ฮ˜lฬƒ : hl (j1 ) โˆช {(r(1) , r(2) ) โˆˆ ฮ˜lฬƒ : hl (16) Hence, by (16), we obtain X (r(j1 ) ) = 1, hl (j1 ) (j2 ) (r(j2 ) ) = 0} (r(j1 ) ) = 0}. plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) (r (1) ,r (2) )โˆˆฮ˜lฬƒ0 = X plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) (j ) (j ) r (j1 ) โˆˆฮ˜0l 1 ,r (j2 ) โˆˆฮ˜l 2 + X (j1 ) r (j1 ) โˆˆฮ˜1l X = (j1 ) r (j1 ) โˆˆฮ˜0l + X X r (j2 ) โˆˆฮ˜l (17) + (j2 ) ,r (j2 ) โˆˆฮ˜0l X r (j2 ) โˆˆฮ˜l (j1 ) r (j1 ) โˆˆฮ˜1l = plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) (j1 ) (j2 ) X (j1 ) (j2 ) r (j2 ) โˆˆฮ˜0l (j2 ) (j2 ) (j1 ) (j1 ) X (j1 ) plq(j1 ) ,r(j1 ) (t) (j1 ) r (j1 ) โˆˆฮ˜0l plq(j1 ) ,r(j1 ) (t) r (j1 ) โˆˆฮ˜1l (j2 ) plq(j1 ) ,r(j1 ) (t)plq(j2 ) ,r(j2 ) (t) plq(j2 ) ,r(j2 ) (t) X (j2 ) plq(j1 ) ,r(j1 ) (t)plq(j2 ) ,r(j2 ) (t) X (j2 ) pql (j2 ) ,r(j2 ) (t). (j2 ) r (j2 ) โˆˆฮ˜0l CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 13 P (j1 ) Now, since l(1) โˆˆ ฮ“p(1) ,p(1) , l(2) โˆˆ ฮ“p(2) ,p(2) , we have r(j1 ) โˆˆฮ˜l(j1 ) plq(j1 ) ,r(j1 ) (t) โ‰ค 0 1 0 1 0 P (j1 ) (j2 ) (j ) P (j ) (j ) p0 1 , r(j1 ) โˆˆฮ˜l(j1 ) plq(j1 ) ,r(j1 ) (t) โ‰ค p1 1 , and r(j2 ) โˆˆฮ˜l(j2 ) plq(j2 ) ,r(j2 ) (t) โ‰ค p0 2 , t โˆˆ 1 0 P (j2 ) N0 . Furthermore, we have r(j2 ) โˆˆฮ˜l(j2 ) plq(j2 ) ,r(j2 ) (t) = 1, since the summation is (j2 ) over all possible states r(j2 ) โˆˆ ฮ˜l . Using these inequalities in (17), we obtain X (j ) (j ) (j ) (18) plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โ‰ค p0 1 + p1 1 p0 2 , (r (1) ,r (2) )โˆˆฮ˜lฬƒ0 for t โˆˆ N0 . Since (18) holds for all j1 , j2 โˆˆ {1, 2} such that j1 6= j2 , we have (19) X (1) (1) (2) (2) (2) (1) plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โ‰ค min{p0 + p1 p0 , p0 + p1 p0 }, t โˆˆ N0 . (r (1) ,r (2) )โˆˆฮ˜lฬƒ0 P Furthermore, noting that ฮ˜lฬƒ0 โŠ‚ ฮ˜lฬƒ , we obtain (r(1) ,r(2) )โˆˆฮ˜lฬƒ plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) โ‰ค 0 P lฬƒ p (t) = 1, t โˆˆ N . By using this inequality, it follows lฬƒ (1) (2) 0 (1) (2) (1) (2) (r ,r )โˆˆฮ˜ (q ,q ),(r ,r ) from (19) that (13) holds. Next, we show (14). Notice that ฮ˜lฬƒ1 = {(r(1) , r(2) ) โˆˆ ฮ˜lฬƒ : hlฬƒ ((r(1) , r(2) )) = 1} (1) (2) = {(r(1) , r(2) ) โˆˆ ฮ˜lฬƒ : hl (r(1) )hl (r(2) ) = 1} (1) (2) = {(r(1) , r(2) ) โˆˆ ฮ˜lฬƒ : hl (r(1) ) = 1, hl (r(2) ) = 1}. (20) Noting that l(1) โˆˆ ฮ“p(1) ,p(1) , l(2) โˆˆ ฮ“p(2) ,p(2) , we use (20) to obtain for t โˆˆ N0 , 1 0 1 0 X X lฬƒ plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) p(q(1) ,q(2) ),(r(1) ,r(2) ) (t) = (1) (r (1) ,r (2) )โˆˆฮ˜lฬƒ1 = X (1) r (1) โˆˆฮ˜l1 = X X r (1) โˆˆฮ˜l1 plq(1) ,r(1) (t)plq(2) ,r(2) (t) (2) r (2) โˆˆฮ˜l1 X (1) plq(1) ,r(1) (t) (1) r (1) โˆˆฮ˜l1 (2) ,r (2) โˆˆฮ˜l1 (2) (1) (2) (1) (2) plq(2) ,r(2) (t) โ‰ค p1 p1 , (2) r (2) โˆˆฮ˜l1  which implies (14). Now since (13) and (14) hold, we have lฬƒ โˆˆ ฮ“pฬƒ0 ,pฬƒ1 . (1) (2) Theorem 3.3 shows that when two hidden Markov output processes l and l are combined with โˆง operation, the resulting process lฬƒ is also a hidden Markov output process. Furthermore, Theorem 3.3 provides the values of pฬƒ0 , pฬƒ1 for which lฬƒ โˆˆ ฮ“pฬƒ0 ,pฬƒ1 . This result can be applied to obtain ฯG . For instance, consider the case c = 2, where lP1 (ยท) and lP2 (ยท) are the output processes of hidden Markov models such that lP1 โˆˆ ฮ“p(1) ,p(1) , lP2 โˆˆ ฮ“p(2) ,p(2) . It follows from Theorem 3.3 with l(1) = lP1 , 0 1 0 1 (1) (2) l(2) = lP2 , and lฬƒ = lG that lG โˆˆ ฮ“pฬƒ0 ,pฬƒ1 with pฬƒ1 , p1 p1 . Now, suppose that (1) (2) p1 p1 < 1. Notice that since lP1 โˆˆ ฮ“p(1) ,p(1) and lP2 โˆˆ ฮ“p(2) ,p(2) , we have lP1 โˆˆ (1) 0 1 (2) 0 1 ฮ›ฯP1 and lP2 โˆˆ ฮ›ฯP2 with ฯP1 โˆˆ (p1 , 1) and ฯP2 โˆˆ (p1 , 1). The direct application of Proposition 3.2 gives lG โˆˆ ฮ›ฯG with ฯG = min{ฯP1 , ฯP2 }. However, by applying Proposition 2.5, we can obtain a smaller value for ฯG . In fact by Proposition 2.5, 14 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL (1) (2) we obtain lG โˆˆ ฮ›ฯG for any ฯG โˆˆ (p1 p1 , 1). Notice that in the case where c > 2, Theorem 3.3 can be applied repeatedly. For instance, when c = 3, we can use Theorem 3.3 first for lP2 (t) โˆง lP3 (t) and then for lG (t) = lP1 (t) โˆง (lP2 (t) โˆง lP3 (t)). Now consider the case where the graph G possesses some paths with indicator processes that are mutually independent but not all of them are associated with random failures. Even for this case, we can obtain results that are tighter than Proposition 3.2. To this end, we first provide the following result where we derive properties of a process that is obtained by using โˆง operation on a hidden Markov output process l(1) โˆˆ ฮ“p(1) p(1) and a binary valued process l(2) โˆˆ ฮ›ฯ(2) . 0 1 Theorem 3.4. Consider the binary-valued processes {l(1) โˆˆ {0, 1}}tโˆˆN0 and {l(2) โˆˆ (1) {0, 1}}tโˆˆN0 that satisfy l(1) โˆˆ ฮ“p(1) ,p(1) and l(2) โˆˆ ฮ›ฯ(2) with p1 ฯ(2) < 1. Then the 0 1 process {lฬƒ(t) โˆˆ {0, 1}}tโˆˆN0 defined by หœ = l(1) (t) โˆง l(2) (t), (21) l(t) t โˆˆ N0 , (1) satisfies หœ l โˆˆ ฮ›ฯฬƒ for all ฯฬƒ โˆˆ (p1 ฯ(2) , 1]. (1) (1) Proof. We will first show that lฬƒ โˆˆ ฮ›ฯฬƒ for ฯฬƒ โˆˆ (p1 ฯ(2) , min{p1 , ฯ(2) }). Let วซ , (1) ฯฬƒ โˆ’ p1 ฯ(2) . Note that ฯ(2) + วซ(1) < 1. It follows that {ฯ‡(t) , {0, 1}}tโˆˆN0 defined 2p1 by ฯ‡(t) = l (2) (2) (t), t โˆˆ N0 , satisfies (8) with wฬƒ = p1 + (1) วซ (1) . 2p1 Furthermore, {ฮพ(t) , (1) (1) {0, 1}}tโˆˆN0 defined by ฮพ(t) = ฮธl (t), t โˆˆ N0 , satisfies (7) with pฬƒ = p1 , h = hl , (1) (1) ฮž = ฮ˜l , and ฮž1 = ฮ˜l1 . It then follows from Lemma 2.6 that for all ฯ โˆˆ (pฬƒwฬƒ, wฬƒ), we have X X kโˆ’1 X kโˆ’1 X P[ h(ฮพ(t))ฯ‡(t) > ฯk] = P[ l(1) (t) โˆง l(2) (t) > ฯk] < โˆž. kโˆˆN t=0 kโˆˆN (1) p1 ฯ(2) t=0 (1) < p1 ฯ(2) and wฬƒ = ฯ(2) + วซ (1) (1) ฯฬƒ โˆˆ (p1 ฯ(2) , min{p1 , ฯ(2) }). (1) > min{p1 , ฯ(2) }, it + Now since pฬƒwฬƒ = follows that หœ l โˆˆ ฮ›ฯฬƒ holds for This implies หœl โˆˆ ฮ›ฯฬƒ , (1) (2) ฯฬƒ โˆˆ [min{p1 , ฯ }, 1], since ฮ›ฯ1 โІ ฮ›ฯ2 for any ฯ1 , ฯ2 โˆˆ [0, 1] such that ฯ1 โ‰ค ฯ2 . (1) (1) (1) Consequently, we have หœ l โˆˆ ฮ›ฯฬƒ for ฯฬƒ โˆˆ (p1 ฯ(2) , 1] = (p1 ฯ(2) , min{p1 , ฯ(2) }) โˆช (1) (2)  [min{p1 , ฯ }, 1]. วซ 2 Theorem 3.4 is concerned with โˆง operation applied to a process l(1) (ยท) from the hidden Markov model class ฮ“p(1) ,p(1) and another process l(2) (ยท) from the class ฮ›ฯ(2) . (1) 0 1 It is shown that if p1 ฯ(2) < 1, then this operation results in a process lฬƒ that satisfies (1) lฬƒ โˆˆ ฮ›ฯฬƒ for all ฯฬƒ โˆˆ (p1 ฯ(2) , 1]. We note that the application of Proposition 3.2 to (1) this situation would allow us to show หœl โˆˆ ฮ›ฯฬƒ for all ฯฬƒ โˆˆ (min{p1 , ฯ(2) }, 1]. Notice (1) (1) that Proposition 3.2 in this case is conservative since min{p1 , ฯ(2) } > p1 ฯ(2) . On the other hand, we note that Proposition 3.2 allows us to deal with processes that are not mutually independent. 4. Packet Transmission Failures on Paths of a Network So far, in the previous section, we have looked at how packet failures on the paths of a network affect the overall packet transmission rate. In this section, our goal is to explore the effect of the failures at individual nodes and links of a path. CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 15 To this end, we first consider the scenario where packet transmission failures occur due to only data corruption. We then explore the case where data corruption and packet drops may occur on the same path. 4.1. Characterization for Data Corrupting Paths. Let Pi,j denote the jth P edge on path Pi . We use the binary-valued process {lPii,j (t) โˆˆ {0, 1}}tโˆˆN0 to denote the data corruption indicator for this link. For example, in Fig. 1, consider the (v ,v ) second edge P1,2 = (v1 , vC ) of path P1 in (10). The state lP11 C (t) = 1 indicates that at time t, the packet flowing on path P1 faces data corruption on the link (v1 , vC ). This may be due to a jamming attack on this link, or due to channel noise, and moreover, it may also be the case that the node v1 maliciously corrupts the packet. The notation for the data corruption indicator allows us to distinguish data corruption issues when we consider the same communication link on different paths. For instance, communication link (v4 , vC ) is on both P2 and P3 . It may be the case that node v4 corrupts all packets transmitted along P2 , but none of the packets (v ,v ) transmitted along P3 . This situation can be described by setting lP24 C (t) = 1, (v ,v ) t โˆˆ N0 , and lP34 C (t) = 0, t โˆˆ N0 . State packet transmitted through path Pi is subject to data corruption if there is data corruption on one (or more) of the edges in this path. Hence, for each i โˆˆ {1, . . . , c}, P Pi,|Pi | P lPi (t) = lPii,1 (t) โˆจ lPii,2 (t) โˆจ ยท ยท ยท โˆจ lPi (22) (t). The next result shows that an upper-bound for the asymptotic transmission failure rate of a path can be given as the sum of the failure rate bounds of the links on the path. P Proposition 4.1. Consider {lPi (t) โˆˆ {0, 1}}tโˆˆN0 given by (22). Assume lPii,j โˆˆ P|Pi | Pi,j P ฮ›ฯPi,j , j โˆˆ {1, . . . , |Pi |}, where ฯPi,j โˆˆ [0, 1], j โˆˆ {1, . . . , |Pi |}, satisfy j=1 ฯPi โ‰ค i Pi P|Pi | Pi,j 1. Then lPi โˆˆ ฮ›ฯPi with ฯPi , j=1 ฯPi . P|Pi | Pkโˆ’1 Pi,j Pkโˆ’1 Proof. By (22), t=0 lPi (t) โ‰ค j=1 t=0 lPi (t). Hence, (23) P[ kโˆ’1 X lPi (t) > ฯPi k] โ‰ค P[ t=0 |Pi | kโˆ’1 X X P lPii,j (t) > ฯPi k] โ‰ค j=1 t=0 |Pi | X j=1 for k โˆˆ N, where to obtain the last inequality, we used P[ |Pi | X j=1 |P | i {ฮณj > 0}] โ‰ค ฮณj > 0] โ‰ค P[โˆชj=1 |Pi | X P[ kโˆ’1 X P P lPii,j (t) > ฯPi,j k], i t=0 P[ฮณj > 0] j=1 Pkโˆ’1 P P P k. The result then follows from (23) since lPii,j โˆˆ with ฮณj , t=0 lPii,j (t) โˆ’ ฯPi,j i ฮ› Pi,j , j โˆˆ {1, . . . , |Pi |}.  ฯP i Proposition 4.1 can be used to characterize overall failures on a path. Note that in Proposition 4.1, the indicators for the links are not necessarily mutuallyindependent processes. This allows us to model failures on different links that 16 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL depend on each other. In particular, we can explore the effect of interference between links as well as coordinated jamming attacks targeting several links at the same time. Note that in certain cases the result provided in Proposition 4.1 can be improved in terms of conservativeness. In particular, if one or more links in a path are known to be associated with random failures and the corresponding indicator processes are mutually independent, we can obtain less conservative results in comparison to Proposition 4.1. The following result is the counterpart of Theorem 3.3 for โˆจ operation and it is concerned with output processes of two mutually-independent hidden Markov models. Theorem 4.2. Consider the binary-valued output processes {l(1) โˆˆ {0, 1}}tโˆˆN0 and {l(2) โˆˆ {0, 1}}tโˆˆN0 of hidden Markov models such that l(1) โˆˆ ฮ“p(1) ,p(1) , l(2) โˆˆ (1) (1) (2) 0 (2) 1 (1) ฮ“p(2) ,p(2) with p0 , p1 , p0 , p1 โˆˆ [0, 1]. Suppose that the Markov chains {ฮธl (t) โˆˆ 0 (1) 1 (2) (2) ฮ˜l }tโˆˆN0 and {ฮธl (t) โˆˆ ฮ˜l }tโˆˆN0 associated with the processes l(1) and l(2) (1) (2) (1) (1) (2) (2) are mutually independent. Let pฬƒ0 , p0 p0 and pฬƒ1 , min{p1 + p0 p1 , p1 + (2) (1) p0 p1 , 1}. Then the process {lฬƒ(t) โˆˆ {0, 1}}tโˆˆN0 defined by หœ l(t) = l(1) (t) โˆจ l(2) (t), (24) t โˆˆ N0 , is the output process of a time-inhomogeneous hidden Markov model, and moreover, lฬƒ โˆˆ ฮ“pฬƒ0 ,pฬƒ1 . (1) (2) Proof. Let ฮ˜lฬƒ , {(q (1) , q (2) ) : q (1) โˆˆ ฮ˜l , q (2) โˆˆ ฮ˜l } and define the bivariate process {ฮธlฬƒ (t) โˆˆ ฮ˜lฬƒ }tโˆˆN0 by (1) (2) ฮธlฬƒ (t) = (ฮธl (t), ฮธl (t)), t โˆˆ N0 . It follows that {ฮธlฬƒ (t) โˆˆ ฮ˜lฬƒ }tโˆˆN0 is a time-inhomogeneous Markov chain with ini(1) (2) (2) (1) tial distribution ฯ‘lฬƒ(q(1) ,q(2) ) = ฯ‘lq(1) ฯ‘lq(2) , q (1) โˆˆ ฮ˜l , q (2) โˆˆ ฮ˜l , and time-varying (2) (1) transition probabilities plฬƒ(q(1) ,q(2) ),(r(1) ,r(2) ) (t) = plq(1) ,r(1) (t)plq(2) ,r(2) (t), t โˆˆ N0 . Here, (j) (j) for j โˆˆ {1, 2}, ฯ‘l and pl (ยท) respectively denote the initial distribution and the (j) (j) transition probability function for the Markov chain {ฮธl (t) โˆˆ ฮ˜l }tโˆˆN0 associated with the output process {l(j) โˆˆ {0, 1}}tโˆˆN0 . Furthermore, it follows from (12) that หœ l(t) = l(1) (t) โˆจ l(2) (t) = l(1) (t) + (1 โˆ’ l(1) (t))l(2) (t) (1) (1) (1) (1) (2) (2) = hl (ฮธl (t)) + (1 โˆ’ hl (ฮธl (t)))hl (ฮธl (t)), for t โˆˆ N0 . Now let hlฬƒ : ฮ˜lฬƒ โ†’ {0, 1} be given by (1) (1) (2) hlฬƒ ((q, r)) = hl (q) + (1 โˆ’ hl (q))hl (r), (q, r) โˆˆ ฮ˜lฬƒ . It follows that (6) holds with l replaced with lฬƒ. Thus, {lฬƒ(t) โˆˆ {0, 1}}tโˆˆN0 is the output process of a time-inhomogeneous hidden Markov model. To show หœ l โˆˆ ฮ“pฬƒ0 ,pฬƒ1 , we can apply Theorem 3.3. To this end, we first note that for an output process l โˆˆ ฮ“p0 ,p1 , the complementing process {lc (t) โˆˆ {0, 1}}tโˆˆN0 given by lc (t) = 1 โˆ’ l(t), t โˆˆ N0 , is the output process of a time-inhomogeneous hidden Markov model, for which ฮ˜lc = ฮ˜l , ฮธlc (t) = ฮธl (t), t โˆˆ N0 . Furthermore, we have ฮ˜l0c = ฮ˜l1 and ฮ˜l1c = ฮ˜l0 , since hlc ((q, r)) = 1 โˆ’ hl ((q, r)), (q, r) โˆˆ ฮ˜lc = ฮ˜l . CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 17 As a consequence, we have l โˆˆ ฮ“p0 ,p1 if and only if lc โˆˆ ฮ“p1 ,p0 . In the following, we show lฬƒ โˆˆ ฮ“pฬƒ0 ,pฬƒ1 by proving that {lฬƒc (t) โˆˆ {0, 1}}tโˆˆN0 given by หœlc (t) = 1 โˆ’ หœl(t), t โˆˆ N0 , satisfies lฬƒc โˆˆ ฮ“pฬƒ1 ,pฬƒ0 . lc (t) = 1โˆ’หœl(t) = 1โˆ’l(1) (t)โˆจl(2) (t) = (1โˆ’l(1) (t))โˆง(1โˆ’l(2) (t)) = First, observe that หœ (1) (2) (i) lc (t) โˆง lc (t), where lc (t) = 1 โˆ’ l(i) (t), i โˆˆ {1, 2}. Since l(1) โˆˆ ฮ“p(1) ,p(1) , l(2) โˆˆ (1) ฮ“p(2) ,p(2) , we have lc 0 1 (2) โˆˆ ฮ“p(1) ,p(1) , lc 1 0 0 1 โˆˆ ฮ“p(2) ,p(2) . Finally, noting that lฬƒc (ยท) is 1 (1) 0 (2) obtained by using โˆง operation on processes lc (ยท), lc (ยท), we can use Theorem 3.3,  to obtain หœ lc โˆˆ ฮ“pฬƒ1 ,pฬƒ0 , which implies หœl โˆˆ ฮ“pฬƒ0 ,pฬƒ1 . Theorem 4.2 shows that when two hidden Markov output processes l(1) and l(2) are combined with โˆจ operation, the resulting process lฬƒ is also a hidden Markov output process. Furthermore, it provides the values of pฬƒ0 , pฬƒ1 for which lฬƒ โˆˆ ฮ“pฬƒ0 ,pฬƒ1 . Theorem 4.2 can be applied in obtaining ฯPi for a given path Pi . Consider for example a path Pi with |Pi | = 2 links. Assume that the failure indicator P P processes lPii,1 (ยท), lPii,2 (ยท) associated with the links are mutually independent and P P P lPii,1 โˆˆ ฮ“p(1) ,p(1) , lPii,2 โˆˆ ฮ“p(2) ,p(2) . It follows from Theorem 4.2 with l(1) (t) = lPii,1 (t) 0 1 0 P 1 (1) (2) and l(2) (t) = lPii,2 (t) that lPi โˆˆ ฮ“pฬƒ0 ,pฬƒ1 with pฬƒ0 = p0 p0 (1) (2) (2) (2) (1) (1) (1) and pฬƒ1 = min{p1 + (1) (2) (2) (2) (1) p0 p1 , p1 + p0 p1 , 1}. Furthermore, if min{p1 + p0 p1 , p1 + p0 p1 } < 1, (1) (1) (2) (2) then by Proposition 2.5, we have lPi โˆˆ ฮ›ฯPi with ฯPi โˆˆ (min{p1 + p0 p1 , p1 + (2) (1) p0 p1 }, 1]. On the other hand, the direct application of Proposition 4.1 provides P a conservative result. To apply Proposition 4.1, notice first that lPii,1 โˆˆ ฮ›ฯPi,1 , P (2) (1) lPii,2 โˆˆ ฮ›ฯPi,2 with ฯPi,1 โˆˆ (p1 , 1] and ฯPi,2 โˆˆ (p1 , 1]. Hence, by Proposition 4.1, we obtain the value ฯPi = ฯPi,1 + ฯPi,2 , which implies that lPi โˆˆ ฮ›ฯPi with ฯPi โˆˆ (1) (2) (1) (1) (2) (2) (2) (1) (1) (2) (p1 + p1 , 1]. The inequality min{p1 + p0 p1 , p1 + p0 p1 } โ‰ค p1 + p1 allows us to conclude that Theorem 4.2 provides a less conservative range for ฯPi compared to Proposition 4.1. In certain scenarios a path Pi may be composed of communication links with mutually-independent indicator processes some of which are not associated with random failures. In such scenarios, it is again possible to obtain results that are less conservative than those in Proposition 4.1. Specifically, in the following result we obtain properties of a process that is obtained by using โˆจ operation on a hidden Markov output process l(1) โˆˆ ฮ“p(1) p(1) and a binary valued process l(2) โˆˆ ฮ›ฯ(2) . 0 1 Theorem 4.3. Consider the binary-valued processes {l(1) โˆˆ {0, 1}}tโˆˆN0 and {l(2) โˆˆ (1) (1) {0, 1}}tโˆˆN0 that satisfy l(1) โˆˆ ฮ“p(1) ,p(1) and l(2) โˆˆ ฮ›ฯ(2) with p1 +p0 ฯ(2) < 1. Then 0 1 the process {lฬƒ(t) โˆˆ {0, 1}}tโˆˆN0 defined by (25) หœ l(t) = l(1) (t) โˆจ l(2) (t), t โˆˆ N0 , (1) (1) satisfies หœ l โˆˆ ฮ›ฯฬƒ for all ฯฬƒ โˆˆ (p1 + p0 ฯ(2) , 1]. Proof. Notice that since หœ l(ยท) is a binary-valued process, we have ฮ›ฯฬƒ for ฯฬƒ = 1. Next, (1) (1) หœ we show l โˆˆ ฮ›ฯฬƒ for ฯฬƒ โˆˆ (p1 + p0 ฯ(2) , 1). First, (25) implies (26) lฬƒ(t) = l(1) (t) + (1 โˆ’ l(1) (t))l(2) (t), t โˆˆ N0 . 18 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL Pkโˆ’1 หœ t=0 l(t). It follows from (26) that Let Lฬƒ(k) , (27) Lฬƒ(k) = kโˆ’1 X l(1) (t) + t=0 (1) kโˆ’1 X (1 โˆ’ l(1) (t))l(2) (t), k โˆˆ N. t=0 (1) (2) ฯ(2) โˆ’p (1) ฯ 0 }, วซ1 , วซ โˆ’ วซ2 , and define Now, let วซ , ฯฬƒ โˆ’ p1 โˆ’ p0 ฯ(2) , วซ2 , min{ 2วซ , 2 Pkโˆ’1 (1) (1) (1) (2) (t) and ฯฬƒ1 , p1 + วซ1 , ฯฬƒ2 , p0 ฯ + วซ2 . Furthermore, let Lฬƒ1 (k) , t=0 l Pkโˆ’1 (1) (2) Lฬƒ2 (k) , t=0 (1 โˆ’ l (t))l (t). We then have P[Lฬƒ(k) > ฯฬƒk] = P[Lฬƒ1 (k) + Lฬƒ2 (k) > ฯฬƒ1 k + ฯฬƒ2 k] oi o n hn โ‰ค P Lฬƒ1 (k) > ฯฬƒ1 k โˆช Lฬƒ2 (k) > ฯฬƒ2 k โ‰ค P[Lฬƒ1 (k) > ฯฬƒ1 k] + P[Lฬƒ2 (k) > ฯฬƒ2 k]. Pโˆž P In the following we show k=1 P[Lฬƒ1 (k) > ฯฬƒ1 k] < โˆž and โˆž k=1 P[Lฬƒ2 (k) > ฯฬƒ2 k] < โˆž. First, note that (28) (1) วซ (1) ฯ(2) โˆ’ p0 ฯ(2) (1) (1) ฯฬƒ1 = p1 + วซ โˆ’ วซ2 = max{p1 + , p1 + วซ โˆ’ } 2 2 (1) (1) (1) ฯ(2) โˆ’ p0 ฯ(2) p + ฯฬƒ โˆ’ p0 ฯ(2) (1) , ฯฬƒ โˆ’ p0 ฯ(2) โˆ’ } = max{ 1 2 2 (1) (1) p + ฯฬƒ โˆ’ p0 ฯ(2) 2ฯฬƒ โˆ’ ฯ(2) (1 + p0 ) , }. = max{ 1 2 2 (29) (1) p (1) (2) +ฯฬƒโˆ’p (2) ฯ (1) 0 As 1 < 1 and 2ฯฬƒโˆ’ฯ 2(1+p0 ) < 1, it holds from (29) that ฯฬƒ1 โˆˆ (p1 , 1). 2 (1) Since l โˆˆ ฮ“p(1) ,p(1) , we can use Proposition 2.5 with ฯ replaced with ฯฬƒ and l 0 1 Pโˆž replaced with l(1) to obtain k=1 P[Lฬƒ1 (k) > ฯ1 k] < โˆž. P Next, we use Lemma 2.6 to show that โˆž k=1 P[Lฬƒ2 (k) > ฯฬƒ2 k] < โˆž. To obtain (1) (2) this result, we first observe that ฯฬƒ2 > p0 ฯ , since วซ2 > 0. Moreover, (1) (1) วซ ฯ(2) โˆ’ p0 ฯ(2) ฯ(2) โˆ’ p0 ฯ(2) (1) (1) ฯ2 = p0 ฯ(2) + min{ , } โ‰ค p0 ฯ(2) + 2 2 2 (1) (2) (1) (2) (2) (2) < p0 ฯ + ฯ โˆ’ p0 ฯ = ฯ , (1) (1) and hence, we have ฯ2 โˆˆ (p0 ฯ(2) , ฯ(2) ). Let {lc (t) โˆˆ {0, 1}}tโˆˆN0 be defined by (1) (1) lc (t) = 1 โˆ’ l(1) (t), i โˆˆ {1, 2}. Since l(1) โˆˆ ฮ“p(1) ,p(1) , we have lc โˆˆ ฮ“p(1) ,p(1) . 0 1 1 0 Furthermore, since l(2) โˆˆ ฮ›ฯ(2) , conditions (7), (8) in the Lemma 2.6 hold with (1) pฬƒ = p0 and wฬƒ = ฯ(2) , together with processes {ฮพ(t) โˆˆ {0, 1}}tโˆˆN0 and {ฯ‡(t) โˆˆ {0, 1}}tโˆˆN0 defined by setting ฮพ(t) = ฮธlc (t), ฯ‡(t) = lM (t), t โˆˆ N0 . Now, we have Pโˆž Pkโˆ’1 Lฬƒ2 (k) = t=0 ฮพ(t)ฯ‡(t) and hence, Lemma 2.6 implies k=1 P[Lฬƒ2 (k) > ฯฬƒ2 k] < โˆž. Finally, by (28), we arrive at โˆž X k=1 P[Lฬƒ(k) > ฯฬƒk] โ‰ค โˆž X P[Lฬƒ1 (k) > ฯฬƒ1 k] + k=1 โˆž X P[Lฬƒ2 (k) > ฯฬƒ2 k] < โˆž, k=1 (1) (1) which shows that หœ l โˆˆ ฮ›ฯฬƒ for all ฯฬƒ โˆˆ (p1 + p0 ฯ(2) , 1].  (1) Theorem 4.3 is concerned with โˆจ operation applied to a process l (ยท) from the hidden Markov model class ฮ“p(1) ,p(1) and another process l(2) (ยท) from the class ฮ›ฯ(2) . 0 1 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 19 It is shown that the โˆจ operation results in a process lฬƒ that satisfies lฬƒ โˆˆ ฮ›ฯฬƒ for all (1) (1) ฯฬƒ โˆˆ (p1 +p0 ฯ(2) , 1]. Notice that the application of Proposition 3.2 to this situation (1) would allow us to show lฬƒ โˆˆ ฮ›ฯฬƒ for all ฯฬƒ โˆˆ (p1 + ฯ(2) , 1]. Proposition 4.1 in this case (1) (1) (1) (1) (1) (1) is conservative since p1 + ฯ(2) โ‰ฅ p1 + p0 ฯ(2) (and p1 + ฯ(2) > p1 + p0 ฯ(2) if (1) p0 < 1). We remark that the advantage of Proposition 4.1 may be that it allows us to deal with processes that are not mutually independent. 4.2. A General Characterization of Paths with Data Corruption and Packet Drops. In the previous section, we provided a characterization for paths with data-corrupting links. In what follows we extend this characterization to consider effects of both data corruption and packet dropouts. Without loss of generality, we assume that links on a path are either data-corrupting or packet-dropping, but not both. Note that if in the original network, a link (v, w) is subject to both of the issues, we can artificially add a node v โ€ฒ and edges (v, v โ€ฒ ), (v โ€ฒ , w) to the graph, and consider (v, v โ€ฒ ) as a packet-dropping link and (v โ€ฒ , w) as a data-corrupting link. For a data-corrupting link (v, w), packets available at v are always transmitted to w, but their content may be externally manipulated or damaged during the transmission over this link. On the other hand, if (v, w) is a packet-dropping link, packets available at v may or may not be transmitted to w, but never get corrupted on link (v, w). A packet dropout may occur if v is a malicious router that intentionally skips forwarding packets (see blackhole and grayhole attacks in [19]). A nonmalicious router may also drop packets to avoid congestion. In addition to these two issues, a packet may also be dropped if the header part of the packet, which includes information on the destination of the packet, is corrupted. Furthermore, in scenarios where error-detection is implemented at intermediate nodes, corruption on the data part of a packet can be detected. As a result, a corrupted packet need not be further transmitted. Such a scenario can also be studied within the packet drop framework. Consider a link Pi,j = (v, w) on path Pi . Let t = 0, 1, . . ., denote the indices of packets that node v possesses (or receives from previous nodes on path Pi ). Observe that if there are links before Pi,j that are packet-dropping, then the first packet (with index t = 0) that v receives may be different from x(0), and it may be the state at a later time. This is because x(0) may have been dropped before reaching node v. We use lPi,j (t) โˆˆ {0, 1} to indicate the status of transmission of the (t + 1)th packet (with index t) that node v possesses to node w. Our goal here is to obtain a relation between the asymptotic packet failure ratio of path Pi and the failure ratios of the links on that path. To this end, we will use a recursive characterization for describing packet failures on paths. Specifically, consider a path  (30) P , (v1 , v2 ), (v2 , v3 ), . . . , (vh , vh+1 ) of h โ‰ฅ 1 links, and consider the associated process {lP (t) โˆˆ {0, 1}}tโˆˆN0 . The state lP (t) = 0 indicates that the (t + 1)th packet that the first node v1 possesses can be successfully transmitted to the last node vh+1 , whereas lP (t) = 1 indicates a failure. (v ,v ) If h = 1 in (30), then we have lP (t) = lP 1 2 (t), t โˆˆ N0 . Now consider the case h โ‰ฅ 2, and let f (P) and R(P) respectively denote the first link on P, and the 20 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL subpath composed of the rest of the links, that is, (31) (32) f (P) = (v1 , v2 ),  R(P) = (v2 , v3 ), . . . , (vh , vh+1 ) . We illustrate f (P) and R(P) on the left side of Fig. 2. Next, we show that transmission failures on a path P can be characterized f (P) through transmission failures on the link f (P) and the subpath R(P). Let {lP (t) โˆˆ R(P) {0, 1}}tโˆˆN0 and {lP (t) โˆˆ {0, 1}}tโˆˆN0 denote indicators of transmission failures on the link f (P) and the subpath R(P). If the link f (P) = (v1 , v2 ) is a dataf (P) R(P) corrupting link, then we would have lP (t) = lP (t) โˆจ lP (t). But this relation f (P) does not hold if f (P) is a packet-dropping link, because the index t for lP (t) and R(P) lP (t) represent different packets. R(P) Now, we will introduce a new process {b lP (t) โˆˆ {0, 1}}tโˆˆN0 for which (33) f (P) lP (t) = lP R(P) (t) โˆจ b lP (t), t โˆˆ N0 . R(P) R(P) If f (P) is a data-corrupting link, then we define b lP (ยท) by setting b lP (t) = R(P) lP (t), t โˆˆ N0 . On the other hand, if f (P) is a packet-dropping link, then for t โˆˆ N0 , ( f (P) 0, if lP (t) = 1, R(P) b  lP (t) , R(P) (34) f (P) lP kฬ‚(t + 1) โˆ’ 1 , if lP (t) = 0, Ptโˆ’1 f (P) where kฬ‚(t) , i=0 (1 โˆ’ lP (i)), t โˆˆ N. In this definition, kฬ‚(t + 1) denotes the number of packets that are successfully transmitted from node v1 to node v2 among the first t+1 packets that node v1 possesses. Hence, the scalar kฬ‚(t+1)โˆ’1 represents  R(P) the index of the kฬ‚(t + 1)th packet received by v2 . Moreover, lP kฬ‚(t + 1) โˆ’ 1 indicates whether this packet is successfully transmitted from v2 over R(P) to vh+1 . R(P) Observe that by (34), b lP (t) is set to 0, if v1 drops the (t + 1)th packet that it R(P) possesses. On the other hand, if v1 transmits this packet to v2 , the state b lP (t) = 1 indicates that further transmission of this packet on subpath R(P) has failed, R(P) f (P) whereas b lP (t) = 0 indicates success. As a result, we have lP (t) = lP (t) + (1 โˆ’ R(P) f (P) lP (t), and hence, (33) holds. lP (t))b The characterization above is recursive in the sense that it is recursively applied to describe failures on R(P) by means of failures on the first link f (R(P)) and the subpath R(R(P)). Example 4.4. In Fig. 2, we see a path P, its packet-dropping first link f (P) = R(P) f (P) lP (ยท), (v1 , v2 ), and its subpath R(P), together with sample trajectories of lP (ยท), b R(P) lP (ยท) and lP (ยท). Note that the link f (P) = (v1 , v2 ) drops the first two packets, that R(P) R(P) f (P) lP (1) = 0, and as lP (0) = b is, lP (t) = 1 for t โˆˆ {0, 1}. By (34), we have b a consequence of (33), lP (0) = lP (1) = 1. Furthermore, the link f (P) successfully f (P) R(P) transmits the 3rd packet, i.e, lP (2) = 0. The value of b lP (2) represents whether this packet is successfully transmitted over the subpath R(P) or not. Since this packet is the first packet that v2 receives, its transmission state is represented by R(P) R(P) R(P) R(P) lR(P) (0), and as a result, b lP (2) = lP (0). We have b lP (2) = lP (0) = 0, CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 21 Figure 2. [Left] Paths P, R(P), and packet-dropping link f (P). f (P) [Right] Trajectories of lP R(P) R(P) (ยท), b lP (ยท), lP (ยท) and lP (ยท). indicating successful transmission over R(P). Now, by (33), lP (2) = 0, which indicates that the 3rd packet possessed by the first node v1 is successfully transmitted to the last node vh+1 . The following result is essential for characterizing the failures on path P through those on the first link f (P) and the subpath R(P). We obtain the result by first Pkโˆ’1 R(P) Pkโˆ’1 R(P) establishing the key inequality t=0 b lP (t) โ‰ค t=0 lP (t), and then applying some of the arguments that we employed for proving Proposition 4.1. f (P) Lemma 4.5. Consider path P given in (30) for h โ‰ฅ 1. Assume lP f (P) R(P) โˆˆ [0, 1], โˆˆ ฮ›ฯR(P) with scalars ฯP , ฯP P f (P) R(P) follows that lP โˆˆ ฮ›ฯP with ฯP = ฯP + ฯP . R(P) lP such that f (P) ฯP + โˆˆฮ› f (P) ฯP R(P) โ‰ค ฯP and 1. It R(P) Proof. We will first show that b lP โˆˆ ฮ›ฯR(P) . If f (P) is a data-corrupting link, P R(P) R(P) R(P) โˆˆ ฮ›ฯR(P) . Now consider lP we have b lP (t) = lP (t), t โˆˆ N0 , and therefore b P the situation where f (P) is a packet-dropping link. For this case, kโˆ’1 X t=0 R(P) b lP (t) = ( 0, Pkฬ‚(k)โˆ’1 t=0 kฬ‚(k) = 0, R(P) lP (t), kฬ‚(k) 6= 0, k โˆˆ N. Pkฬ‚(k)โˆ’1 R(P) Pkโˆ’1 R(P) Since kฬ‚(k) โ‰ค k and lR(P) (t) โ‰ฅ 0, we have t=0 lP (t) โ‰ค t=0 lP (t), and Pkโˆ’1 R(P) Pkโˆ’1 bR(P) hence, t=0 lP (t) โ‰ค t=0 lP (t). It follows that P[ kโˆ’1 X t=0 R(P) Now, as lP R(P) R(P) b lP (t) > ฯP k] โ‰ค P[ R(P) โˆˆ ฮ›ฯR(P) , we also have b lP P kโˆ’1 X R(P) lP t=0 โˆˆ ฮ›ฯR(P) . P R(P) (t) > ฯP k]. 22 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL f (P) Finally, since (33) holds, we have lP (t) โ‰ค lP P[ kโˆ’1 X lP (t) > ฯP k] โ‰ค P[ t=0 = P[ โ‰ค P[ f (P) lP (t) + f (P) lP (t) + kโˆ’1 X kโˆ’1 X t=0 f (P) lP (t) > kโˆ’1 X t=0 t=0 kโˆ’1 X t=0 (35) kโˆ’1 X R(P) (t) + b lP (t), t โˆˆ N0 . Hence, R(P) b lP (t) > ฯP k] R(P) f (P) R(P) b lP (t) > (ฯP + ฯP )k] f (P) ฯP k] + P[ kโˆ’1 X t=0 t=0 Pโˆž R(P) R(P) b lP (t) > ฯP k]. Pkโˆ’1 f (P) f (P) It then follows from (35) together with k=1 P[ t=0 lP (t) > ฯP k] < โˆž and Pโˆž Pkโˆ’1 Pโˆž Pkโˆ’1 bR(P) R(P) (t) > ฯP k] < โˆž that k=1 P[ t=0 lP (t) > ฯP k] < โˆž, k=1 P[ t=0 lP which completes the proof.  Now, for a given path Pi , repeated application of Lemma 4.5 to Pi , R(Pi ), R(R(Pi )), . . ., allows us to obtain the following result. P P โˆˆ [0, 1], j โˆˆ {1, . . . , |Pi |}, that Theorem 4.6. Assume lPii,j โˆˆ ฮ›ฯPi,j with ฯPi,j i Pi P|Pi | Pi,j P|Pi | Pi,j ฯPi . satisfy j=1 ฯPi โ‰ค 1. Then lPi โˆˆ ฮ›ฯPi with ฯPi , j=1 Note that Theorem 4.6 allows us to consider both data-corruption and packetdropouts on links, and hence it generalizes Proposition 4.1. Remark 4.7. By utilizing Theorem 4.6 together with Proposition 3.2, we can obtain ฯG , ฯGฬƒ โˆˆ [0, 1] as upper-bounds for the average number of packet exchange failures on networks G and Gฬƒ such that lG โˆˆ ฮ›ฯG and lGฬƒ โˆˆ ฮ›ฯGฬƒ . Note that when lG (t) = 1, then the controller either does not receive the state packet or receives corrupted versions, which are discarded. Hence, when lG (t) = 1, no control input packet is attempted to be transmitted on Gฬƒ. This setting is similar to the situation that we discussed above for packet dropping links. Here we can consider the whole networked system as a path P from the node vP to node vฬƒP , where lG (ยท) corresponds to the indicator for the first packet dropping link (f (P)) and lGฬƒ (ยท) corresponds to packet transmission failure indicator for the rest of the path (R(P)). Hence, using arguments similar to the ones used above, we can show that if ฯG + ฯGฬƒ โ‰ค 1, then l โˆˆ ฮ›ฯ with ฯ = ฯG + ฯGฬƒ . This ฯ value is utilized for stability analysis with Theorem 2.3. 5. Illustrative Numerical Examples In this section, we present illustrative examples to demonstrate the utility of our results in the characterization of communication failures on multi-hop networks. We also investigate the effect of those failures on the stability of a multi-hop networked control system. Consider the networked control system (1), (2) with       1 0.1 0.1 A= , B= (36) , K = โˆ’2.9012 โˆ’0.9411 โˆ’0.5 1.1 1.2 together with the networks G and Gฬƒ in Fig. 1. This system was explored previously in [26] with a single channel network model. Here, differently from [26], we consider CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 23 networks G and Gฬƒ that incorporate multiple paths and multiple links for packet transmissions. In what follows, we investigate various scenarios where we demonstrate the utility of our results in Sections 3 and 4 for characterizing overall network failures. For each different scenario, our goal is to find out the level of transmission failures that can be tolerated on the communication links so that the stability of the system (1), (2) is guaranteed. 5.1. Data corruption/packet dropout issues on both networks G and Gฬƒ. Consider the scenario where all links on both networks G and Gฬƒ are subject to malicious/nonmalicious data corruption or packet dropout issues. We explore the general situation where the failures may depend on each other. For this general setup, we can use Proposition 3.2 and Theorem 4.6 for the characterization of the overall transmission failures between the plant and the controller. As explained in Remark 4.7, the overall packet exchange failure process l(ยท) satisfies Assumption 2.2 with ฯ = ฯG + ฯGฬƒ . Here, ฯG and ฯGฬƒ are asymptotic failure ratios for the networks G and Gฬƒ, that is, lG โˆˆ ฮ›ฯG , lGฬƒ โˆˆ ฮ›ฯGฬƒ . To find the values of ฯG and ฯGฬƒ , we can use Proposition 3.2 and Theorem 4.6. In particular, by Proposition 3.2 and Theorem 4.6, we obtain ฯG = miniโˆˆ{1,...,c=3} ฯPi P|Pi | Pi,j where ฯPi = j=1 ฯPi . Similarly, we have ฯGฬƒ = miniโˆˆ{1,...,cฬƒ} ฯPฬƒi and ฯPฬƒi = P|Pฬƒi | Pฬƒi,j j=1 ฯPฬƒ , where cฬƒ = 4 is the number of paths (denoted by Pฬƒi ) from the controller i node vฬƒC to the plant node vฬƒP on the network Gฬƒ. Consequently, Assumption 2.2 holds with ฯ= min iโˆˆ{1,...,c} |Pi | X P + ฯPi,j i j=1 |Pฬƒi | X min iโˆˆ{1,...,cฬƒ} Pฬƒ ฯPฬƒi,j . i j=1 P Pฬƒ The effect of the asymptotic packet failure ratios ฯPi,j , ฯPฬƒi,j on the stability of i i the networked system can be analyzed by using Theorem 2.3. First, we identify the values of asymptotic packet exchange failure ratio ฯ in Assumption 2.2, for which the stability conditions (3)โ€“(5) hold. For this numerical example, there exist a positive-definite matrix P and scalars ฮฒ โˆˆ (0, 1), ฯ• โˆˆ [1, โˆž) that satisfy (3)โ€“(5), when ฯ is less than 0.411. Hence, Theorem 2.3 guarantees that the zero solution of the closed-loop system (1), (2) is asymptotically stable almost surely if the asymptotic packet transmission failure ratios satisfy (37) min iโˆˆ{1,...,c} |Pi | X j=1 P ฯPi,j + i min iโˆˆ{1,...,cฬƒ} |Pฬƒi | X Pฬƒ ฯPฬƒi,j โ‰ค 0.411. i j=1 The system operator can guarantee (37) by ensuring that at least one path in each network is sufficiently secure and reliable. In particular, if there exist a P|Piโˆ— | Piโˆ— ,j path Piโˆ— in network G and a path Pฬƒiโˆ— in network Gฬƒ such that j=1 ฯPiโˆ— + P|Pฬƒiโˆ— | Pฬƒiโˆ— ,j j=1 ฯPฬƒiโˆ— โ‰ค 0.411, then (37) holds and the stability is guaranteed regardless of the security/reliability of all other paths. Another approach to guarantee (37) is to ensure a certain level of security/reliability for all links. For this example, if P Pฬƒ , ฯPฬƒi,j โ‰ค ฯ , 0.411 all links are sufficiently secure and reliable so that ฯPi,j 6 , then i i (37) holds and the stability is guaranteed. To see this, first note that the network 24 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL Figure 3. Paths from the plant node vP to the controller node vC in network G Figure 4. Paths from the controller node vฬƒC to the plant node vฬƒP in network Gฬƒ G contains 3 paths, and the number of links on these paths are given by 2, 3, 3. Furthermore, the network Gฬƒ contains 4 paths, each of which contains 4 links. It follows that min iโˆˆ{1,...,c} |Pi | X j=1 P + ฯPi,j i min iโˆˆ{1,...,cฬƒ} |Pฬƒi | X j=1 Pฬƒ ฯPฬƒi,j โ‰ค i min iโˆˆ{1,...,c} |Pi | X ฯ+ j=1 = min{2ฯ, 3ฯ, 3ฯ} + min{4ฯ, 4ฯ, 4ฯ, 4ฯ} = 6ฯ โ‰ค 0.411, min iโˆˆ{1,...,cฬƒ} |Pฬƒi | X ฯ j=1 which implies that (37) holds, and hence stability is guaranteed. Notice that in this example, we have not made any particular assumption on the independence or randomness of the failures on the links. In fact, all links may be subject to failures caused by actions of coordinated adversaries. In such a case, the occurrence of the failures may be nonrandom, and moreover, the binary-valued processes that characterize failures on different links would depend on each other. For example, in the case of data-corruption attacks, the worst-case scenario would be that the failures on the paths are synchronized so that packet transmissions necessarily fail in all parallel paths (such as paths P1 , P2 , and P3 of the graph P Pฬƒ , ฯPฬƒi,j โ‰ค ฯ guarantees that G) at the same time. Notice that the condition ฯPi,j i i such failures happen sufficiently rarely in average in the long run. Thus, networked stabilization can be achieved through the successful exchanges of measurement and control data. In the following examples, we will illustrate how our results in Sections 3 and 4 can be used for scenarios where some information on the properties of the communication links are available. CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 25 5.2. Jamming Attacks and Random Transmission Failures on Multiple Links. Consider the network G and its paths shown in Fig. 3. We assume that the paths P1 and P3 are subject to malicious attacks. In particular, the node v3 on P3 is assumed to be controlled by a malicious agent and all packets arriving P at node v3 are dropped. Hence, we have lP33,2 (t) = 1, t โˆˆ N0 , which implies that lP3 (t) = 1, t โˆˆ N0 . Moreover, the first and the second links on path P1 are assumed to be subject to jamming attacks that cause data corruption. Here the worst-case scenario happens when the attackers coordinate and jam only one of the links at once. This would maximize the number of packet losses within the total energy constraint of the attackers. Our results take this worst-case into account. P In particular, suppose that the attacked links P1,1 and P1,2 satisfy lP11,1 โˆˆ ฮ ฮบ,w , P lP11,2 โˆˆ ฮ ฮบ,w with ฮบ โ‰ฅ 0 and w โˆˆ (0, 1). Here, w provides a bound on average failures on each link and it is related to the energy available to each attacker. The P P P P fact that lP11,1 โˆˆ ฮ ฮบ,w , lP11,2 โˆˆ ฮ ฮบ,w implies lP11,1 โˆˆ ฮ›ฯP1,1 , lP11,2 โˆˆ ฮ›ฯP1,2 for all P P1 P P1 P P ฯP11,1 , ฯP11,1 โˆˆ (w, 1]. It then follows from Proposition 4.1 that ฯP1 = ฯP11,1 + ฯP11,1 , and hence lP1 โˆˆ ฮ›ฯP1 for ฯP1 โˆˆ (2w, 1]. Notice that lP1 โˆˆ ฮ›ฯP1 holds even in the worst-case scenario mentioned above. Here ฯP1 โˆˆ (2w, 1] provides an upper-bound on the average number of overall failures on path P1 in the worst-case scenario. We further assume that the link (v4 , vC ) on path P2 is subject to random data P corruption and the associated failure indicator process {lP22,3 (t) โˆˆ {0, 1}}tโˆˆN0 satP isfies lP22,3 โˆˆ ฮ“p0 ,p1 with p0 , p1 โˆˆ (0, 1). We consider ideal communication on the other links on path P2 . Thus, by using (22), we obtain P P P P P lP2 (t) = lP22,1 (t) โˆจ lP22,2 (t) โˆจ lP22,3 (t) = 0 โˆจ 0 โˆจ lP22,3 (t) = lP22,3 (t), t โˆˆ N0 , and hence we also have lP2 โˆˆ ฮ“p0 ,p1 . To characterize overall failures on network G, we use (11) and obtain lG (t) = lP1 (t) โˆง lP2 (t) โˆง lP3 (t) = lP1 (t) โˆง lP2 (t) โˆง 1 = lP1 (t) โˆง lP2 (t), t โˆˆ N0 . Now, assuming that the failures on paths P1 and P2 are mutually-independent, it (1) (1) follows from Theorem 3.4 with l(1) (t) = lP2 (t), l(2) (t) = lP1 (t), p0 = p0 , p1 = p1 , and ฯ(2) = ฯP1 that if p1 ฯP1 < 1, then lG โˆˆ ฮ›ฯG with ฯG โˆˆ (p1 ฯP1 , 1]. Noting that ฯP1 โˆˆ (2w, 1], we see that if 2p1 w < 1, then lG โˆˆ ฮ›ฯG for all ฯG โˆˆ (2p1 w, 1]. Next, consider the network Gฬƒ. Suppose that Gฬƒ is secure against attacks, but it is unreliable and subject to random transmission failures. To characterize the overall transmission failures on the network Gฬƒ, we utilize Theorems 3.3 and 4.2. Before we apply these results, we first describe the routing scheme on this network. Specifically, in this network vฬƒ3 is assumed to be a router that forwards all incoming packets from node vฬƒ1 only to node vฬƒ5 , and all incoming packets from node vฬƒ2 only to node vฬƒ4 . Among the paths shown in Fig. 4, packets may be transmitted on Pฬƒ1 and Pฬƒ2 , but are never transmitted on Pฬƒ3 and Pฬƒ4 due to the routing scheme. Hence lPฬƒ3 (t) = 1, lPฬƒ4 (t) = 1, t โˆˆ N0 . We assume that the links (vฬƒ1 , vฬƒ3 ) and (vฬƒ3 , vฬƒ5 ) on path Pฬƒ1 and the links (vฬƒ2 , vฬƒ3 ) and (vฬƒ3 , vฬƒ4 ) on Pฬƒ2 face random data corruption issues. Furthermore, the failure (vฬƒ ,vฬƒ ) (vฬƒ ,vฬƒ ) (vฬƒ ,vฬƒ ) indicator processes {lPฬƒ 1 3 (t) โˆˆ {0, 1}}tโˆˆN0 , {lPฬƒ 3 5 (t) โˆˆ {0, 1}}tโˆˆN0 , {lPฬƒ 2 3 (t) โˆˆ (vฬƒ ,vฬƒ ) 1 1 2 {0, 1}}tโˆˆN0 , {lPฬƒ 3 4 (t) โˆˆ {0, 1}}tโˆˆN0 are assumed to be mutually independent pro2 cesses that belong to the hidden Markov model class ฮ“p0 ,p1 with p0 , p1 โˆˆ (0, 1) (see 26 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL Definition 2.4). The links that are connected directly to the plant and the controller nodes (vฬƒP and vฬƒC ) are considered to be ideal communication links. In other words, Pฬƒ Pฬƒ lPฬƒi,1 (t) = 0, lPฬƒi,4 (t) = 0, t โˆˆ N0 , i โˆˆ {1, 2}. i i Now, observe that the failure indicators for paths Pฬƒ1 and Pฬƒ2 satisfy Pฬƒ Pฬƒ Pฬƒ Pฬƒ Pฬƒ Pฬƒ lPฬƒi (t) = lPฬƒi,1 (t) โˆจ lPฬƒi,2 (t) โˆจ lPฬƒi,3 (t) โˆจ lPฬƒi,4 (t) = 0 โˆจ lPฬƒi,2 (t) โˆจ lPฬƒi,3 (t) โˆจ 0 i = i Pฬƒ lPฬƒi,2 (t) i โˆจ i Pฬƒ lPฬƒi,3 (t), i i i i t โˆˆ N0 , i โˆˆ {1, 2}. Pฬƒ Pฬƒ (1) (2) By applying Theorem 4.2 with l(1) (t) = lPฬƒi,2 (t), l(2) (t) = lPฬƒi,3 (t), p0 = p0 = p0 , (1) i (2) i and p1 = p1 = p1 , we obtain lPฬƒi โˆˆ ฮ“pฬƒ0 ,pฬƒ1 , i โˆˆ {1, 2}, where pฬƒ0 = p20 and pฬƒ1 = min{p1 + p0 p1 , p1 + p0 p1 , 1} = min{p1 + p0 p1 , 1}. Next, since lPฬƒ3 (t) = 1, lPฬƒ4 (t) = 1, t โˆˆ N0 , we have lGฬƒ (t) = lPฬƒ1 (t) โˆง lPฬƒ2 (t) โˆง lPฬƒ3 (t) โˆง lPฬƒ4 (t) = lPฬƒ1 (t) โˆง lPฬƒ2 (t) โˆง 1 โˆง 1 = lPฬƒ1 (t) โˆง lPฬƒ2 (t), for t โˆˆ N0 . It then follows from Theorem 3.3 with l(1) (t) = lPฬƒ1 (t), l(2) (t) = lPฬƒ2 (t), (1) (2) p0 = p0 with (1) = p20 , and p1 (1) (2) = p1 (1) (2) (2) = min{p1 + p0 p1 , 1}, that we have lGฬƒ โˆˆ ฮ“pGฬƒ ,pGฬƒ 0 (2) (1) (1) 1 (1) (2) pGฬƒ 0 = min{p0 + p1 p0 , p0 + p1 p0 , 1} = min{p0 + p1 p0 , 1} = min{p20 + min{p1 + p0 p1 , 1}p20 , 1} = min{p20 + min{p20 p1 + p30 p1 , p20 }, 1} = min{min{p20 + p20 p1 + p30 p1 , 2p20 }, 1} = min{p20 + p20 p1 + p30 p1 , 2p20 , 1} (1) (2) 2 2 and pGฬƒ 1 = p1 p1 = (min{p1 +p0 p1 , 1}) = min{(p1 +p0 p1 ) , 1}. Finally, in the case 2 where (p1 + p0 p1 ) < 1, as a consequence of Proposition 2.5, we obtain lGฬƒ โˆˆ ฮ›ฯฬƒG 2 for ฯGฬƒ โˆˆ (pGฬƒ 1 , 1] = ((p1 + p0 p1 ) , 1]. Now, we note once again that the overall packet exchange failure indicator {l(t) โˆˆ {0, 1}}tโˆˆN0 satisfies l โˆˆ ฮ›ฯ with ฯ = ฯG + ฯGฬƒ . Since ฯG โˆˆ (2p1 w, 1] and ฯGฬƒ โˆˆ ((p1 + p0 p1 )2 , 1], it follows that if 2p1 w + (p1 + p0 p1 )2 < 1, then l โˆˆ ฮ›ฯ with ฯ โˆˆ (2p1 w+(p1 +p0 p1 )2 , 1]. As we discussed in Section 5.1, stability of the networked control system can be ensured when ฯ โ‰ค 0.411. It follows that if (38) 2p1 w + (p1 + p0 p1 )2 < 0.411, then l โˆˆ ฮ›ฯ holds with ฯ = 0.411, implying almost sure asymptotic stability of the networked control system. Observe that by utilizing the results in Sections 3 and 4, we are able to derive the sufficient stability condition (38) in terms of the attack rate w โˆˆ (0, 1) associated with the links on path P1 that are attacked by jamming attackers as well as random failure parameters p0 , p1 โˆˆ (0, 1). 5.3. State-dependent Attacks by a Malicious Node. In the scenarios discussed in Sections 5.1 and 5.2, the strategies of the attackers are not specified. However, in certain cases an attacker may have access to the state or control input information and be able to directly cause transmission failures between the plant and the controller. In such scenarios, the goal of the attacker might be to increase state norm with small amount of attacks. In this section, our goal is to illustrate such an attack strategy. In particular, we consider the case where the plant node vP is compromised by an attacker. The attacker is assumed to have access to the state information. CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 27 We consider an attack strategy that is based on an optimization problem. In particular, the attacker at node vP decides whether to transmit the state information on links P1,1 = (vP , v1 ), P2,1 = (vP , v2 ), and P3,1 = (vP , v3 ) after solving an optimization problem for maximizing the norm of the state at a future time. We represent the attackers actions with a binary-valued process {lA (t) โˆˆ {0, 1}}tโˆˆN0 , where lA (t) = 0 indicates the attacker transmits the state packet on P1,1 = (vP , v1 ), P2,1 = (vP , v2 ), and P3,1 = (vP , v3 ) and lA (t) = 1 indicates no transmission. The attacker decides the values of the binary-valued process lA (t) according to lA (t) = aโˆ—t , (39) where (aโˆ—t , aโˆ—t+1 , ยท ยท ยท , aโˆ—t+N โˆ’1 ) โˆˆ {0, 1}N is a solution to the optimization problem PN 2 maximize i=1 kxฬ‚(t + i)k (a ,ยทยทยท ,a ) t t+N โˆ’1 (40) Pt+N โˆ’1 Ptโˆ’1 ai โ‰ค ฮบ + w(t + N ), subject to i=t i=0 lA (t) +    where xฬ‚(t+i) = A+(1โˆ’at+iโˆ’1 )BK A+(1โˆ’at+iโˆ’2 )BK ยท ยท ยท A+(1โˆ’at )BK x(t). In this strategy, the attacker decides to attack (lA (t) = 1) or not (lA (t) = 0) at time t based on the optimization problem where the goal is to maximize the sum of squared state norms over the interval [t + 1, t + N ], while keeping the attack rate below a certain value w โˆˆ (0, 1). Here N โˆˆ N is the horizon in the optimization problem, and it can be large if the attacker has sufficient computational resources. Notice that under this attack strategy, we have lA โˆˆ ฮ ฮบ,w , and hence, lA โˆˆ ฮ›ฯ for any ฯ โˆˆ (w, 1]. Observe that in this scenario, we have P P P lP11,1 (t) =lP22,1 (t) = lP11,1 (t) = lA (t), t โˆˆ N0 . P Since lA โˆˆ ฮ ฮบ,w , we have lA โˆˆ ฮ›ฯA with ฯA โˆˆ (w, 1]. As a consequence, lPii,1 โˆˆ ฮ› P ฯPi,1 P with ฯPii,1 โˆˆ (wA , 1] for all i โˆˆ {1, 2, 3}. Notice that lA (t) = 1 implies l(t) = 1, i since the attacker can completely prevent the packet exchange between the plant and the controller. Observe also that if there are other sources of transmission failures on the network, then there may be times when l(t) = 1 even if lA (t) = 0. As a result, if lA (t) = 0 then the attacker may not be able to correctly predict the state x(t + 1) at time t, as there may or may not be a failure in the network that prevents control input to reach the plant. However, as the optimization problem in (40) is solved at each time step, the updated state information is used for decision. Notice that in the case where all links other than P1,1 = (vP , v1 ), P2,1 = (vP , v2 ), and P3,1 = (vP , v3 ) are secure and reliable, we have lG (t) = lA (t), since P P P lG (t) = lP1 (t) โˆง lP2 (t) โˆง lP3 (t) = lP11,1 (t) โˆง lP22,1 (t) โˆง lP33,1 (t) = lA (t) โˆง lA (t) โˆง lA (t) = lA (t), t โˆˆ N0 . Hence, lG โˆˆ ฮ›ฯG with ฯG โˆˆ (w, 1]. Now suppose that the network Gฬƒ also faces failures. In particular, consider the 2 setup in Section 5.2, where lGฬƒ โˆˆ ฮ›ฯฬƒG for ฯGฬƒ โˆˆ (pGฬƒ 1 , 1] = ((p1 + p0 p1 ) , 1]. Since 2 l โˆˆ ฮ›ฯ with ฯ = ฯG +ฯGฬƒ , we have l โˆˆ ฮ›ฯ for all ฯ โˆˆ (w+(p1 +p0 p1 ) , 1]. Noting that the stability of the networked control system can be ensured when ฯ โ‰ค 0.411, we can impose a sufficient condition on the attack rate w. Specifically, for the scenario PSfrag replacements 28 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL kx(t)k ร—101 w = 0.25, ฮบ = 1, N = 2 0.5 0.0 0 kx(t)k ร—10 5 10 15 20 1 25 w = 0.25, ฮบ = 1, N = 10 1 0 0 5 10 15 20 25 Time [t] Figure 5. Comparison of state trajectories for different values of N in (40) of this section, if w + (p1 + p0 p1 )2 < 0.411, (41) then l โˆˆ ฮ›ฯ holds with ฯ = 0.411, and thus the networked control system is almost surely asymptotically stable. To illustrate the effect of different parameters in the attack strategy (40), we conduct simulations. First, we generate 50 sample trajectories of the process lGฬƒ by Pฬƒ Pฬƒ setting the failure processes lPฬƒi,2 , lPฬƒi,3 , i โˆˆ {1, 2}, as outputs of time-inhomogeneous i i hidden Markov models such that (42) Pฬƒ lPฬƒi,j (t) = ฮธi,j (t), i t โˆˆ N0 , i โˆˆ {1, 2}, j โˆˆ {2, 3}, where {ฮธi,j (t) โˆˆ ฮ˜l = {0, 1}}tโˆˆN0 is an Ft -adapted finite-state time-inhomogeneous Markov chain with initial distributions and time-varying transition probability functions satisfying P[ฮธi,j (0) = 0] = 0.6 and P[ฮธi,j (t + 1) = 1|ฮธi,j (t) = 0] = 0.2 + 0.02 cos2 (0.1t), P[ฮธi,j (t + 1) = 1|ฮธi,j (t) = 1] = 0.2 + 0.02 sin2 (0.2t), Pฬƒ Pฬƒ for t โˆˆ N0 , i โˆˆ {1, 2}, j โˆˆ {2, 3}. Notice that lPฬƒi,2 , lPฬƒi,3 โˆˆ ฮ“p0 ,p1 , i โˆˆ {1, 2}, with i i p0 = 0.8, p1 = 0.22. Next, for each sample trajectory of lGฬƒ , we simulate the networked control system (1), (2) under the attack strategy (40). In Fig. 5, we show state trajectories when attack parameters are selected as w = 0.25 and ฮบ = 1. In top part of Fig. 5, the horizon parameter N = 2, and in the bottom part N = 10. Observe that with larger horizon variable, the attacker following the strategy (40) can utilize the resources more efficiently so that the state norm is set to larger values for longer durations even though in both cases N = 2 and N = 10, the attack belongs to the same class ฮ ฮบ,w . Notice that with p0 = 0.8, p1 = 0.22, and w = 0.25, the inequality (41) holds. Therefore, the zero solution of the closed-loop system is almost surely asymptotically stable by Theorem 2.3. PSfrag replacements t=0 lGฬƒ (t) 0.0 Pkโˆ’1 0.5 1 k CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 1.0 (p1 + p0 p1 )2 = 0.156816 1 k Pkโˆ’1 t=0 lG (t) 0 l(t) 100 200 300 400 500 600 700 1.0 w = 0.25 0.5 0.0 0 100 200 300 t=0 1.0 0.5 1 k Pkโˆ’1 29 0.0 400 500 600 700 w + (p1 + p0 p1 )2 = 0.406816 0 100 200 300 400 500 600 700 Number of packet transmission attempts [k] Figure 6. Average number of failures on networks Gฬƒ and G together with average number of overall packet exchange failures For w = 0.25, ฮบ = 1, and N = 2, we show in Fig. 6 the average number of failures on the networks Gฬƒ and G as well as the average number of total packet exchange failures between the plant and the controller. These averages are upper bounded in the long run by certain scalars. In particular, for a process l that satisfies l โˆˆ ฮ›ฯ with Pkโˆ’1 ฯ โˆˆ (ฯ, 1], we have lim supkโ†’โˆž k1 t=0 l(t) โ‰ค ฯ (see Lemma 3.3 in [26]). As a result, Pkโˆ’1 Pkโˆ’1 we have lim supkโ†’โˆž k1 t=0 lGฬƒ (t) โ‰ค (p1 + p0 p1 )2 , lim supkโ†’โˆž k1 t=0 lG (t) โ‰ค w, P kโˆ’1 and lim supkโ†’โˆž k1 t=0 l(t) โ‰ค w + (p1 + p0 p1 )2 . Next, we consider the case where ฮบ = 10, which corresponds to the case where the attacker has more initial resources. In this case, we consider two scenarios w = 0.25 and w = 0.75, for which we obtain the sample state trajectories shown in Fig. 7. First, notice that in the case with ฮบ = 10, w = 0.25 (top plot in Fig. 7), the state grows to larger values for longer durations in comparison to the case with ฮบ = 1, w = 0.25 (top plot in Fig. 5). In both cases, the stability conditions hold with w = 0.25, and therefore the state eventually converges to zero as guaranteed by Theorem 2.3. Note that, when w is set to larger values, the attacker can attack at a higher rate. For this example, we set w = 0.75 and observe that for such a high attack rate all sample state trajectories diverge (see bottom plot in Fig. 7). 6. Conclusion In this paper, we explored state feedback control of a linear plant over an unreliable network that may also face malicious attacks. We developed a probabilistic PSfrag replacements 30 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL kx(t)k ร—102 w = 0.25, ฮบ = 10, N = 2 0.5 0.0 0 kx(t)k ร—10 10 20 30 40 50 4 60 70 w = 0.75, ฮบ = 10, N = 2 2.5 0.0 0 10 20 30 40 50 60 70 Time [t] Figure 7. Comparison of state trajectories for different values of w in (39) approach to characterize the failures on the network in terms of the failures on different paths between the plant and the controller. We showed that the failures on each path can be described as a combination of data-corruption and packet-dropout failures on the communication links of that particular path. We obtained sufficient conditions for almost sure stability of the overall networked control system, which allow us to check stability by using a probabilistic upper-bound obtained for the average number of packet exchange failures between the plant and the controller. Appendix A. Proof of Lemma 2.6 In this section, we prove Lemma 2.6. As in the proof of Lemma A.1 of [26], for proving Lemma 2.6, we use Markovโ€™s inequality and follow the approaches used for obtaining Chernoff-type tail distribution inequalities for sums of random variables (see Appendix B of [37] and Section 1.9 of [33]). In the proof Lemma 2.6, the following result also plays a key role. Lemma A.1. Let {ฮพ(t) โˆˆ ฮž}tโˆˆN0 be a finite-state time-inhomogeneous Markov chain with transition probabilities pq,r : N0 โ†’ [0, 1], q, r โˆˆ ฮž. Furthermore, let ฮž1 โŠ‚ ฮž be given by ฮž1 , {r โˆˆ ฮž : h(r) = 1}, where h : ฮž โ†’ {0, 1} is a binary-valued function. Then for all ฯ† > 1, s โˆˆ N, and pฬƒ โˆˆ [0, 1] such that X (43) pq,r (t) โ‰ค pฬƒ, q โˆˆ ฮž, t โˆˆ N0 , rโˆˆฮž1 we have (44) Ps E[ฯ† j=1 h(ฮพ(tj )) ] โ‰ค ฯ† ((ฯ† โˆ’ 1)pฬƒ + 1)sโˆ’1 , where t1 , t2 , . . . , ts โˆˆ N0 denote indices such that 0 โ‰ค t1 < t2 < . . . < ts . Proof. We use induction to show (44). First, we consider the case where s = 1. In this case, we have (45) Ps E[ฯ† j=1 h(ฮพ(tj )) ] = E[ฯ†h(ฮพ(t1 )) ] โ‰ค ฯ†. CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 31 Next, consider the case where s = 2. Observe that t1 โ‰ค t2 โˆ’ 1, thus the random variable ฮพ(t1 ) is Ft2 โˆ’1 -measurable. Consequently, Ps E[ฯ† j=1 h(ฮพ(tj )) ] = E[ฯ†h(ฮพ(t1 )) ฯ†h(ฮพ(t2 )) ] = E[E[ฯ†h(ฮพ(t1 )) ฯ†h(ฮพ(t2 )) | Ft2 โˆ’1 ]] = E[ฯ†h(ฮพ(t1 )) E[ฯ†h(ฮพ(t2 )) | Ft2 โˆ’1 ]], (46) where the last equality follows from the fact that ฯ†h(ฮพ(t1 )) is a measurable function of ฮพ(t1 ), and hence, it is Ft2 โˆ’1 -measurable. Now, since {ฮพ(t) โˆˆ ฮž}tโˆˆN0 is a Markov chain, we have E[ฯ†h(ฮพ(t2 )) | Ft2 โˆ’1 ] = E[ฯ†h(ฮพ(t2 )) | ฮพ(t2 โˆ’ 1)]. Therefore, Ps j=1 h(ฮพ(tj )) ] = E[ฯ†h(ฮพ(t1 )) E[ฯ†h(ฮพ(t2 )) | ฮพ(t โˆ’ 1)]] 2  i h = E ฯ†h(ฮพ(t1 )) ฯ†P[h(ฮพ(t2 )) = 1 | ฮพ(t2 โˆ’ 1)] + P[h(ฮพ(t2 )) = 0 | ฮพ(t2 โˆ’ 1)]  i h = E ฯ†h(ฮพ(t1 )) ฯ†P[h(ฮพ(t2 )) = 1 | ฮพ(t2 โˆ’ 1)] + 1 โˆ’ P[h(ฮพ(t2 )) = 1 | ฮพ(t2 โˆ’ 1)] E[ฯ† (47)  i h = E ฯ†h(ฮพ(t1 )) (ฯ† โˆ’ 1)P[h(ฮพ(t2 )) = 1 | ฮพ(t2 โˆ’ 1)] + 1 . P Here we obtain P[h(ฮพ(t2 )) = 1 | ฮพ(t2 โˆ’1)] = P[ฮพ(t2 ) โˆˆ ฮž1 |ฮพ(t2 โˆ’1)] = rโˆˆฮž1 P[ฮพ(t2 ) = r|ฮพ(t2 โˆ’ 1)]. Thus, by using (43) and (45), we arrive at i h  i Ps E[ฯ† j=1 h(ฮพ(tj )) ] โ‰ค E ฯ†h(ฮพ(t1 )) (ฯ† โˆ’ 1)pฬƒ + 1 = E[ฯ†h(ฮพ(t1 )) ]((ฯ† โˆ’ 1)pฬƒ + 1) โ‰ค ฯ†((ฯ† โˆ’ 1)pฬƒ + 1). (48) Hence, we have that (44) is satisfied for s โˆˆ {1, 2}. Now, assume that (44) holds for s = sฬƒ > 2, i.e., Psฬƒ (49) E[ฯ† j=1 h(ฮพ(tj )) sฬƒโˆ’1 ] โ‰ค ฯ† ((ฯ† โˆ’ 1)pฬƒ + 1) . We will to prove that (44) holds for s = sฬƒ + 1. By employing arguments similar to those used for obtaining (46)โ€“(48), we get Psฬƒ+1 E[ฯ† j=1 h(ฮพ(tj )) Psฬƒ = E[E[ฯ† j=1 Psฬƒ ] = E[ฯ† (50) ฯ† j=1 h(ฮพ(tj )) Psฬƒ = E[ฯ† j=1 h(ฮพ(tj )) h(ฮพ(tsฬƒ+1 )) h(ฮพ(tj )) h(ฮพ(tsฬƒ+1 )) Psฬƒ = E[ฯ† j=1 h(ฮพ(tj )) h(ฮพ(tsฬƒ+1 )) E[ฯ† ฯ† ] | Ftsฬƒ+1 โˆ’1 ]] | Ftsฬƒ+1 โˆ’1 ]] Psฬƒ E[ฯ†h(ฮพ(tsฬƒ+1 )) | ฮพ(tsฬƒ+1 โˆ’ 1)]] โ‰ค E[ฯ† j=1 h(ฮพ(tj )) Finally, by (49) and (50), we obtain (44) with s = sฬƒ + 1. ]((ฯ† โˆ’ 1)pฬƒ + 1).  Next, by utilizing Lemma A.1, we prove Lemma 2.6. Proof of Lemma 2.6. First, we define h(k) , [h(ฮพ(0)), h(ฮพ(1)), . . . , h(ฮพ(k โˆ’ 1))]T , ฯ‡(k) , [ฯ‡(0), ฯ‡(1), . . . , ฯ‡(k โˆ’ 1)]T , k โˆˆ N. Next, let Fs,k , {ฯ‡ โˆˆ {0, 1}k : ฯ‡T ฯ‡ = s}, s โˆˆ {0, 1, . . . , k}, k โˆˆ N. Here, we have Fs1 ,k โˆฉ Fs2 ,k = โˆ…, s1 6= s2 , and moreover, P[ฯ‡(k) โˆˆ โˆชks=0 Fs,k ] = 1, k โˆˆ N. By 32 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL utilizing these definitions we obtain for all ฯ โˆˆ (pฬƒwฬƒ, 1) and k โˆˆ N, P[ kโˆ’1 X T h(ฮพ(t))ฯ‡(t) > ฯk] = P[h (k)ฯ‡(k) > ฯk] t=0 (51) = k X X T P[h (k)ฯ‡(k) > ฯk | ฯ‡(k) = ฯ‡]P[ฯ‡(k) = ฯ‡]. s=0 ฯ‡โˆˆFs,k Since ฮพ(ยท) and ฯ‡(ยท) are mutually-independent, T T P[h (k)ฯ‡(k) > ฯk | ฯ‡(k) = ฯ‡] = P[h (k)ฯ‡ > ฯk]. (52) Therefore, it follows from (51) and (52) that for k โˆˆ N, P[ kโˆ’1 X h(ฮพ(t))ฯ‡(t) > ฯk] = t=0 k X X T P[h (k)ฯ‡ > ฯk]P[ฯ‡(k) = ฯ‡] s=0 ฯ‡โˆˆFs,k โŒŠwฬƒkโŒ‹ = X X T P[h (k)ฯ‡ > ฯk]P[ฯ‡(k) = ฯ‡] s=0 ฯ‡โˆˆFs,k (53) k X + X T P[h (k)ฯ‡ > ฯk]P[ฯ‡(k) = ฯ‡]. s=โŒŠwฬƒkโŒ‹+1 ฯ‡โˆˆFs,k In what follows, our goal is to find upper bounds for the two summation terms T in (53). We start with the second term. Since P[h (k)ฯ‡ > ฯk] โ‰ค 1, k โˆˆ N, we obtain k X X T P[h (k)ฯ‡ > ฯk]P[ฯ‡(k) = ฯ‡] s=โŒŠwฬƒkโŒ‹+1 ฯ‡โˆˆFs,k (54) โ‰ค k X X P[ฯ‡(k) = ฯ‡] = P[ kโˆ’1 X ฯ‡(t) > wฬƒk] = ฯƒฬƒk , t=0 s=โŒŠwฬƒkโŒ‹+1 ฯ‡โˆˆFs,k for k โˆˆ N. Next, we obtain an upper bound for the first term in (53). Observe T that P[h (k)ฯ‡ > ฯk] = 0 for ฯ‡ โˆˆ F0,k . It then follows that, for all k โˆˆ N such that โŒŠwฬƒkโŒ‹ = 0, we have โŒŠwฬƒkโŒ‹ X X (55) T P[h (k)ฯ‡ > ฯk]P[ฯ‡(k) = ฯ‡] = 0. s=0 ฯ‡โˆˆFs,k Moreover, for all k โˆˆ N such that โŒŠwฬƒkโŒ‹ โ‰ฅ 1, we obtain (56) โŒŠwฬƒkโŒ‹ X X s=0 ฯ‡โˆˆFs,k T P[h (k)ฯ‡ > ฯk]P[ฯ‡(k) = ฯ‡] = โŒŠwฬƒkโŒ‹ X X T P[h (k)ฯ‡ > ฯk]P[ฯ‡(k) = ฯ‡]. s=1 ฯ‡โˆˆFs,k T To obtain an upper bound for the term P[h (k)ฯ‡ > ฯk], we will utilize Markovโ€™s inequality and Lemma A.1. First, for s โˆˆ {1, 2, . . . , โŒŠwฬƒkโŒ‹}, let t1 (ฯ‡), t2 (ฯ‡), . . . , ts (ฯ‡) CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 33 denote the indices of the nonzero entries of ฯ‡ โˆˆ Fs,k such that t1 (ฯ‡) < t2 (ฯ‡) < ยท ยท ยท < ts (ฯ‡). Consequently, T (57) P[h (k)ฯ‡ > ฯk] = P[ s X htj (ฯ‡ฬ„) (k) > ฯk] = P[ j=1 s X h(ฮพ(tj (ฯ‡) โˆ’ 1)) > ฯk], j=1 for ฯ‡ โˆˆ Fs,k , s โˆˆ {1, 2, . . . , โŒŠwฬƒkโŒ‹}, and k โˆˆ N such that โŒŠwฬƒkโŒ‹ โ‰ฅ 1. Now observe that ฯ† > 1, since ฯ โˆˆ (pฬƒwฬƒ, wฬƒ). By using Markovโ€™s inequality, we obtain T P[h (k)ฯ‡ > ฯk] โ‰ค P[ s X Ps h(ฮพ(tj (ฯ‡) โˆ’ 1)) โ‰ฅ ฯk] = P[ฯ† j=1 โˆ’ฯk โ‰คฯ† (58) Ps E[ฯ† j=1 h(ฮพ(tj (ฯ‡)โˆ’1)) j=1 h(ฮพ(tj (ฯ‡)โˆ’1)) โ‰ฅ ฯ†ฯk ] ]. Ps sโˆ’1 It follows from Lemma A.1 that E[ฯ† j=1 h(ฮพ(tj (ฯ‡)โˆ’1)) ] โ‰ค ฯ† ((ฯ† โˆ’ 1)pฬƒ + 1) . This inequality together with (56) and (58) imply that for all k โˆˆ N such that โŒŠwฬƒkโŒ‹ โ‰ฅ 1, โŒŠwฬƒkโŒ‹ X X T P[h (k)ฯ‡ > ฯk]P[ฯ‡(k) = ฯ‡] s=0 ฯ‡โˆˆFs,k โŒŠwฬƒkโŒ‹ โ‰ค X X sโˆ’1 ฯ†โˆ’ฯk ฯ† ((ฯ† โˆ’ 1)pฬƒ + 1) P[ฯ‡k = ฯ‡] s=1 ฯ‡โˆˆFs,k โŒŠwฬƒkโŒ‹ = ฯ†โˆ’ฯk+1 X ((ฯ† โˆ’ 1)pฬƒ + 1) X ((ฯ† โˆ’ 1)pฬƒ + 1) X sโˆ’1 s=1 โŒŠwฬƒkโŒ‹ โˆ’ฯk+1 =ฯ† P[ฯ‡k = ฯ‡] ฯ‡โˆˆFs,k sโˆ’1 P[ฯ‡k โˆˆ Fs,k ] sโˆ’1 . s=1 โŒŠwฬƒkโŒ‹ โˆ’ฯk+1 โ‰คฯ† (59) X ((ฯ† โˆ’ 1)pฬƒ + 1) s=1 Notice that to obtain the last inequality in (59), we employed the fact that P[ฯ‡k โˆˆ Fs,k ] โ‰ค 1. The summation term on the far right-hand side of (59) satisfies โŒŠwฬƒkโŒ‹ (60) X โŒŠwฬƒkโŒ‹ sโˆ’1 ((ฯ† โˆ’ 1)pฬƒ + 1) s=1 = wฬƒk ((ฯ† โˆ’ 1)pฬƒ + 1) ((ฯ† โˆ’ 1)pฬƒ + 1) โˆ’1 โ‰ค ((ฯ† โˆ’ 1)pฬƒ + 1) โˆ’ 1 (ฯ† โˆ’ 1)pฬƒ โˆ’1 . Therefore, from (59) and (60), we obtain โŒŠwฬƒkโŒ‹ (61) X X s=0 ฯ‡โˆˆFs,k T P[h (k)ฯ‡ > ฯk]P[ฯ‡(k) = ฯ‡] โ‰ค ฯ†โˆ’ฯk+1 ((ฯ† โˆ’ 1)pฬƒ + 1)wฬƒk โˆ’ 1 , (ฯ† โˆ’ 1)pฬƒ for all k โˆˆ N such that โŒŠwฬƒkโŒ‹ โ‰ฅ 1. The right-hand side of this inequality is zero if โŒŠwฬƒkโŒ‹ = 0. Therefore, (61) holds also for all k โˆˆ N. By using this fact together with (53), (54), we arrive at (9). 34 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL Next, we show โˆž X Pโˆž k=1 ฯ†โˆ’ฯk+1 k=1 (62) = ฯˆk < โˆž. First of all, we have wฬƒk ((ฯ† โˆ’ 1)pฬƒ + 1) (ฯ† โˆ’ 1)pฬƒ โˆ’1 โˆž โˆž k=1 k=1 X X ฯ† ฯ† ฯ†โˆ’ฯk ((ฯ† โˆ’ 1)pฬƒ + 1)wฬƒk โˆ’ ฯ†โˆ’ฯk . (ฯ† โˆ’ 1)pฬƒ (ฯ† โˆ’ 1)pฬƒ We will prove that the summation terms on the right-hand side of (62) are both convergent. First, we have ฯ†โˆ’ฯ < 1, because ฯ† > 1. Therefore, the geometric series Pโˆž โˆ’ฯk P โˆ’ฯk converges, that is, โˆž < โˆž. Next, we show ฯ†โˆ’ฯ ((ฯ† โˆ’ 1)pฬƒ + 1)wฬƒ < k=1 ฯ† k=1 ฯ† 1. Observe that wฬƒ  ฯ wฬƒ (63) ฯ†โˆ’ฯ ((ฯ† โˆ’ 1)pฬƒ + 1) = ฯ†โˆ’ wฬƒ ((ฯ† โˆ’ 1)pฬƒ + 1) . Moreover, ฯ โˆ’ wฬƒ ฯ† โˆ’ wฬƒฯ  ฯ   โˆ’ pฬƒ) wฬƒ (1 โˆ’ pฬƒ) ((ฯ† โˆ’ 1)pฬƒ + 1) = โˆ’ 1 pฬƒ + 1 pฬƒ(1 โˆ’ wฬƒฯ ) pฬƒ(1 โˆ’ wฬƒฯ ) ฯ   wฬƒ  1โˆ’ wฬƒฯ pฬƒwฬƒ 1 โˆ’ pฬƒ = . ฯ 1 โˆ’ wฬƒฯ  ฯ wฬƒ (1 1โˆ’pฬƒ Here, we have pฬƒฯwฬƒ , 1โˆ’ ฯ โˆˆ (0, 1) โˆช (1, โˆž). As a result, since ln v < v โˆ’ 1 for any wฬƒ v โˆˆ (0, 1) โˆช (1, โˆž), we obtain       ฯ ฯ pฬƒwฬƒ 1 โˆ’ pฬƒ ฯ โˆ’ wฬƒ ((ฯ† โˆ’ 1)pฬƒ + 1) = ln ln ฯ† + (1 โˆ’ ) ln wฬƒ ฯ wฬƒ 1 โˆ’ wฬƒฯ     ฯ pฬƒwฬƒ ฯ ฯ p 1 โˆ’ pฬƒ < โˆ’ 1 + (1 โˆ’ ) + โˆ’ pฬƒ = 0, ฯ โˆ’ 1 = pฬƒ โˆ’ wฬƒ ฯ wฬƒ 1 โˆ’ wฬƒ wฬƒ wฬƒ ฯ wฬƒ which implies ฯ†โˆ’ wฬƒ ((ฯ† โˆ’ 1)pฬƒ + 1) < 1. Thus, by (63), ฯ†โˆ’ฯ ((ฯ† โˆ’ 1)pฬƒ + 1) < 1. It then follows that โˆž X wฬƒk (64) ฯ†โˆ’ฯk ((ฯ† โˆ’ 1)pฬƒ + 1) < โˆž. Finally, since Pโˆž k=1 k=1 โˆ’ฯk ฯ† < โˆž, we obtain Pโˆž k=1 ฯˆk < โˆž from (62) and (64).  References [1] J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, โ€œA survey of recent results in networked control systems,โ€ Proc. IEEE, vol. 95, no. 1, pp. 138โ€“172, 2007. [2] V. Gupta, A. F. Dana, J. P. Hespanha, R. M. Murray, and B. Hassibi, โ€œData transmission over networks for estimation and control,โ€ IEEE Trans. Autom. Control, vol. 54, no. 8, pp. 1807โ€“1819, 2009. [3] R. Alur, A. Dโ€™Innocenzo, K. H. Johansson, G. J. Pappas, and G. Weiss, โ€œCompositional modeling and analysis of multi-hop control networks,โ€ IEEE Trans. Autom. Control, vol. 56, no. 10, pp. 2345โ€“2357, 2011. [4] F. Smarra, A. Dโ€™Innocenzo, and M. D. Di Benedetto, โ€œOptimal co-design of control, scheduling and routing in multi-hop control networks,โ€ in Proc. IEEE Conf. Dec. Contr., pp. 1960โ€“1965, 2012. [5] A. Dโ€™Innocenzo, M. D. Di Benedetto, and E. Serra, โ€œFault tolerant control of multi-hop control networks,โ€ IEEE Trans. Autom. Control, vol. 58, no. 6, pp. 1377โ€“1389, 2013. [6] A. Dโ€™Innocenzo, F. Smarra, and M. D. Di Benedetto, โ€œResilient stabilization of multi-hop control networks subject to malicious attacks,โ€ Automatica, vol. 71, pp. 1โ€“9, 2016. CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL 35 [7] F. Smarra, M. D. D. Benedetto, and A. Dโ€™Innocenzo, โ€œA sub-optimal method for routing redundancy design over lossy networks,โ€ in Proc. 20th IFAC W. Congress, pp. 2604โ€“2609, 2017. [8] S. A. Khayam and H. Radha, โ€œMarkov-based modeling of wireless local area networks,โ€ in Proc. ACM MSWiM, pp. 100โ€“107, 2003. [9] S. Floyd and V. Jacobson, โ€œRandom early detection gateways for congestion avoidance,โ€ IEEE/ACM Trans. Networking, vol. 1, no. 4, pp. 397โ€“413, 1993. [10] W. Xu, W. Trappe, Y. Zhang, and T. Wood, โ€œThe feasibility of launching and detecting jamming attacks in wireless networks,โ€ in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Network. Comput., pp. 46โ€“57, 2005. [11] K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurty, โ€œDenial of service attacks in wireless networks: The case of jammers,โ€ IEEE Commun. Surveys Tuts., vol. 13, no. 2, pp. 245โ€“257, 2011. [12] S. Amin, A. A. Cรกrdenas, and S. S. Sastry, โ€œSafe and secure networked control systems under Denial-of-Service attacks,โ€ in Proc. 12th HSCC, pp. 31โ€“45, 2009. [13] C. De Persis and P. Tesi, โ€œInput-to-state stabilizing control under denial-of-service,โ€ IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 2930โ€“2944, 2015. [14] S. Liu, P. X. Liu, and A. El Saddik, โ€œA stochastic game approach to the security issue of networked control systems under jamming attacks,โ€ J. Franklin Inst., vol. 351, no. 9, pp. 4570โ€“4583, 2014. [15] Y. Li, L. Shi, P. Cheng, J. Chen, and D. E. Quevedo, โ€œJamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach,โ€ IEEE. Trans. Autom. Control, vol. 60, no. 10, pp. 2831โ€“2836, 2015. [16] C. De Persis and P. Tesi, โ€œNetworked control of nonlinear systems under Denial-of-Service,โ€ Syst. Control Lett., vol. 96, pp. 124โ€“131, 2016. [17] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, โ€œODSBR: An ondemand secure Byzantine resilient routing protocol for wireless ad hoc networks,โ€ ACM Trans. Inf. and System Security, vol. 10, no. 4, p. 6, 2008. [18] M. M. E. A. Mahmoud and X. S. Shen, Security for Multi-hop Wireless Networks. Springer, 2014. [19] R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, โ€œDoS attacks in mobile ad hoc networks: A survey,โ€ in Proc. ACTT, pp. 535โ€“541, 2012. [20] A. T. Mizrak, S. Savage, and K. Marzullo, โ€œDetecting malicious packet losses,โ€ IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 2, pp. 191โ€“206, 2009. [21] T. Shu and M. Krunz, โ€œPrivacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks,โ€ IEEE Trans. Mobile Computing, vol. 14, no. 4, pp. 813โ€“828, 2015. [22] A. A. Cรกrdenas, S. Amin, and S. Sastry, โ€œResearch challenges for the security of control systems,โ€ in Proc. Conf. Hot Topics in Security, 2008. [23] H. Sandberg, S. Amin, and K. H. Johansson, โ€œSpecial issue on cyberphysical security in networked control systems,โ€ IEEE Control Syst. Mag., vol. 35, no. 1, 2015. [24] A. F. Dana, R. Gowaikar, R. Palanki, B. Hassibi, and M. Effros, โ€œCapacity of wireless erasure networks,โ€ IEEE Trans. Inf. Theory, vol. 52, no. 3, pp. 789โ€“804, 2006. [25] D. E. Quevedo, A. Ahlรฉn, and K. H. Johansson, โ€œState estimation over sensor networks with correlated wireless fading channels,โ€ IEEE Trans. Autom. Control, vol. 58, no. 3, pp. 581โ€“593, 2013. [26] A. Cetinkaya, H. Ishii, and T. Hayakawa, โ€œNetworked control under random and malicious packet losses,โ€ IEEE Trans. Autom. Control, vol. 62, no. 5, pp. 2434โ€“2449, 2017. [27] A. Cetinkaya, H. Ishii, and T. Hayakawa, โ€œRandom and malicious packet transmission failures on multi-hop channels in networked control systems,โ€ in Proc. IFAC NecSys, pp. 49โ€“54, 2016. [28] D. E. Quevedo and D. Nesic, โ€œInput-to-state stability of packetized predictive control over unreliable networks affected by packet-dropouts,โ€ IEEE Trans. Autom. Control, vol. 56, no. 2, pp. 370โ€“375, 2011. [29] A. Cetinkaya, H. Ishii, and T. Hayakawa, โ€œEvent-triggered output feedback control resilient against jamming attacks and random packet losses,โ€ in Proc. IFAC NecSys, pp. 270โ€“275, 2015. [30] B. D. O. Anderson, โ€œFrom Wiener to hidden Markov models,โ€ IEEE Control Syst. Mag., vol. 19, no. 3, pp. 41โ€“51, 1999. 36 CHARACTERIZATION OF FAILURES IN MULTI-HOP NETWORKED CONTROL [31] O. Cappรฉ, E. Moulines, and T. Rydรฉn, Inference in Hidden Markov Models. Springer, 2009. [32] M. Vidyasagar, Hidden Markov Processes: Theory and Applications to Biology. Princeton University Press, 2014. [33] P. Billingsley, Probability and Measure. Wiley, 2012. [34] P. Sadeghi, R. A. Kennedy, P. B. Rapajic, and R. Shams, โ€œFinite-state Markov modeling of fading channels,โ€ IEEE Signal Process. Mag., vol. 25, no. 5, pp. 57โ€“80, 2008. [35] M. Ellis, D. P. Pezaros, T. Kypraios, and C. Perkins, โ€œA two-level Markov model for packet loss in UDP/IP-based real-time video applications targeting residential users,โ€ Comput. Netw., vol. 70, no. 9, pp. 384โ€“399, 2014. [36] D. Medhi and K. Ramasamy, Network Routing: Algorithms, Protocols, and Architectures. Morgan Kaufmann, 2007. [37] U. Madhow, Fundamentals of Digital Communication. Cambridge University Press, 2008.
3cs.SY
Two provably consistent divide and conquer clustering algorithms for large networks arXiv:1708.05573v1 [stat.ML] 18 Aug 2017 Soumendu Sundar Mukherjee1 , Purnamrita Sarkar2 , and Peter J. Bickel1 1 2 Department of Statistics, University of California, Berkeley Department of Statistics and Data Sciences, University of Texas, Austin August 21, 2017 Abstract In this article, we advance divide-and-conquer strategies for solving the community detection problem in networks. We propose two algorithms which perform clustering on a number of small subgraphs and finally patches the results into a single clustering. The main advantage of these algorithms is that they bring down significantly the computational cost of traditional algorithms, including spectral clustering, semi-definite programs, modularity based methods, likelihood based methods etc., without losing on accuracy and even improving accuracy at times. These algorithms are also, by nature, parallelizable. Thus, exploiting the facts that most traditional algorithms are accurate and the corresponding optimization problems are much simpler in small problems, our divide-and-conquer methods provide an omnibus recipe for scaling traditional algorithms up to large networks. We prove consistency of these algorithms under various subgraph selection procedures and perform extensive simulations and real-data analysis to understand the advantages of the divide-and-conquer approach in various settings. Contents 0 Glossary of notation 2 1 Introduction 3 2 Two divide and conquer algorithms 2.1 PACE: an averaging algorithm . . . 2.2 GALE: a sequential algorithm . . . 2.3 Remarks on sampling schemes . . . 2.4 Beyond community detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 6 8 10 10 3 Main results 11 3.1 Results on PACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.2 Results on GALE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 4 Simulations and real-data analysis 17 4.1 Simulations: comparison against traditional algorithms . . . . . . . . . . . . . . . . . . . . . . 17 4.2 Real data analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 1 5 Discussion 20 6 Proofs 21 6.1 Results on PACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 6.2 Results on GALE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 7 Acknowledgments 30 A Details of DGCluster 33 B Some auxiliary results B.1 Analysis of PACE under stochastic block model . . . B.1.1 Community sizes in random m-subgraphs . . B.1.2 Community sizes in 1-hop ego neighborhoods B.1.3 Analysis of adjacency spectral clustering . . . B.1.4 Analysis of SDP . . . . . . . . . . . . . . . . B.2 Proofs of some results for GALE . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 35 36 36 37 39 39 Glossary of notation For the convenience of the reader, we collect here some of the more frequently used notations used in the paper, and provide a summarizing phrase for each, as well as the page number at which the notation first appears. T S, Sl wl,i,j Nij ฯ„ Cฬ‚ Cฬ‚proj M Zฬ‚` Zฬ‚ (`) nk ฯ€k ฯ€min ฮดc (ฯƒ, ฯƒ 0 ) ฮด(Z, Z 0 ) ฮดฬƒ(C, C 0 ) M(Z 0 , Z) (`) yi ฯ€ (S) nk Yab number of subgraphs used a randomly chosen subgraph weights used in w-PACE the number of times i and j appear in all subgraphs S1 , . . . , ST threshold for Nij , a tuning parameter in PACE estimated clustering matrix returned by PACE randomly projected version of Cฬ‚, to be used for recovering an estimate of Z confusion matrix between two clusterings, used by Match cluster membership matrix of subgraph S` before alignment cluster membership matrix of subgraph S` after alignment number of nodes from cluster k nk /n, i.e. proportion of nodes from cluster k mink ฯ€k , similarly ฯ€max normalized mismatch between two clusterings ฯƒ, ฯƒ 0 (ฯƒ, ฯƒ 0 : {1, . . . , n} โ†’ {1, . . . , K}) normalized mismatch between two clusterings Z, Z 0 (Z, Z 0 โˆˆ {0, 1}nร—K ) normalized between two clustering matrices C, C 0 nฮด(Z, Z 0 ) 1 if i โˆˆ S` and 0 otherwise the vector (ฯ€1 , . . . , ฯ€K ) number of nodes from cluster k in a subgraph S |Sa โˆฉ Sb | 2 6 6 6 6 6 6 7 8 9 9 9 9 9 11 11 11 14 14 16 26 28 1 Introduction Community detection, also known as community extraction or network clustering, is a central problem in network inference. A wide variety of real world problems, ranging from finding protein protein complexes in gene networks (Guruharsha et al., 2011) to studying the consequence of social cliques on adolescent behavioral patterns (Hollingshead, 1949) depend on detecting and analyzing communities in networks. In most of these problems, one observes co-occurrences or interactions between pairs of entities, i.e. pairwise edges and possibly additional node attributes. The goal is to infer the hidden community memberships. Many of these real world networks are massive, and hence it is crucial to develop and analyze scalable algorithms for community detection. We will first talk about methodology that uses only the network connections for inference. These can be divided into roughly two types. The first type consists of methods which are derived independently of any model assumption. These typically involve the formulation of global optimization problem; examples include normalized cuts (Shi and Malik, 2000), Spectral Clustering (Ng et al., 2002), etc. On the other end, Statisticians often devise techniques under model assumptions. The simplest statistical model for networks with communities is the Stochastic Blockmodel (SBM) (Holland et al., 1983). The key idea in a SBM is to enforce stochastic equivalence, i.e. two nodes in the same latent community have identical probabilities of connection to all nodes in the network. There are many extensions of SBM. The Degree Corrected Stochastic Blockmodel (Karrer and Newman, 2011) allow one to model varied degrees in the same community, whereas a standard SBM does not. Mixed membership blockmodels (Airoldi et al., 2009) allow a node to belong to multiple communities, whereas in a SBM, a node can belong to exactly one cluster. For an SBM generating a network with n nodes and K communities, one has a hidden community/cluster membership matrix Z โˆˆ {0, 1}nร—K , where Zik = 1 if node i is in community k โˆˆ [K]. Given these memberships, the link formation probabilities are given as P(Aij = 1 | Zik = 1, Zjk0 = 1) = Bkk0 , where B is a K ร— K symmetric parameter matrix of probabilities. The elements of B may decay to zero as n grows to infinity, to model sparse networks. Typically the goal is to estimate the latent memberships consistently. A method outputting an estimate Zฬ‚ is called strongly consistent if P(Zฬ‚ = Zฮ ) โ†’ 1 for some K ร— K permutation matrix ฮ , as n โ†’ โˆž. A weaker notion of consistency is when the fraction of misclustered nodes goes to zero as n goes to infinity. Typically most of the consistency results are derived where average degree of the network grows faster than the logarithm of n. This is is often called the semi-dense regime. When average degree is bounded, we are in the sparse regime. There are a plethora of algorithms for community detection. These include likelihood-based methods (Amini et al., 2013), modularity based methods (Snijders and Nowicki, 1997; Newman and Girvan, 2004; Bickel and Chen, 2009), spectral methods (Rohe et al., 2011), semi-definite programming (SDP) based approaches (Cai et al., 2015) etc. Among these, spectral methods are scalable since the main bottleneck is computing top K eigenvectors of a large and often sparse matrix. While the theoretical guarantees of Spectral Clustering are typically proven in the semi-dense regime (McSherry, 2001; Rohe et al., 2011; Lei and Rinaldo, 2015), a regularized version of it has been shown to perform better than a random predictor for sparse networks (Le et al., 2015). Profile likelihood methods (Bickel and Chen, 2009) involve greedy search over all possible membership matrices, which makes them computationally expensive. Semidefinite programs are robust to outliers (Cai et al., 2015) and are shown to be strongly consistent in the dense regime (Amini and Levina, 2014) and yield a small but non-vanishing error in the sparse regime (Gueฬdon 3 and Vershynin, 2015). However, semi definite programs are slow and typically only scale to thousands of nodes, not millions of nodes. Methods like spectral clustering on geodesic distances (Bhattacharyya and Bickel, 2014) are provably consistent in the semi-dense case, and can give a small error in sparse cases. However, it requires computing all pairs of shortest paths between all nodes, which can pose serious problems for both computation and storage for very large graphs. Monte Carlo methods (Snijders and Nowicki, 1997; Nowicki and Snijders, 2001), which are popular tools in Bayesian frameworks, are typically not scalable. More scalable alternatives such as variational methods (Gopalan and Blei, 2013) do not have provable guarantees for consistency, and often suffer from bad local minima. So far we have discussed community detection methods which only look at the network connections, and not node attributes, which are often also available and may possess useful information on the community structure (see, e.g., Newman and Clauset (2015)). There are extensions of the methods mentioned earlier which accommodate node attributes, e.g., modularity based (Zhang et al., 2015), spectral (Binkiewicz et al., 2014), SDP based (Yan and Sarkar, 2016), etc. These methods come with theoretical guarantees and have good performance in moderately sized networks. While existing Bayesian methods (McAuley and Leskovec, 2012; Newman and Clauset, 2015; Xu et al., 2012) are more amenable to incorporating covariates in the inference procedure, they often are computationally expensive and lack rigorous theoretical guarantees. While the above mentioned array of algorithms are diverse and each has unique aspects, in order to scale them to very large datasets, one has to apply different computational tools tailored to different algorithmic settings. While stochastic variational updates may be suitable to scale Bayesian methods, pseudo likelihood methods are better optimized using row sums of edges inside different node blocks. In this article, we propose a divide and conquer approach to community detection. The idea is to apply a community detection method on small subgraphs of a large graph, and somehow stitch the results together. If we could achieve this, we would be able to scale up any community detection method (which may involve covariates as well as the network structure) that is computationally feasible on small graphs, but is difficult to execute on very large networks. This would be especially useful for computationally expensive community detection methods (such as SDPs, modularity based methods, Bayesian methods etc.). Another possible advantage concerns variational likelihood methods (such as mean-field) with a large number (depending on n) of local parameters, which typically have an optimization landscape riddled with local minima. For smaller graphs there are less parameters to fit, and the optimization problem often becomes easier. Clearly, the principal difficulty in doing this, is matching the possibly conflicting label assignments from different subgraphs (see Figure 1(a) for an example). This immediately rules out a simple-minded averaging of estimates Zฬ‚S of cluster membership matrices ZS , for various subgraphs S, as a viable stitching method. In this regard, we propose two different stitching algorithms. The first is called Piecewise Averaged Community Estimation (PACE); in which we focus on estimating the clustering matrix C = ZZ > , which is labeling invariant, since the (i, j)-th element of this matrix being one simply means that nodes i and j belong to the same cluster, whereas the value zero means i and j belongs to two different clusters. Thus we first compute estimates of ZS ZS> for various subgraphs S and then average over these matrices to obtain an estimate Cฬ‚ of C. Finally we apply some computationally cheap clustering algorithm like approximate K-means, DGClusterโ€  , spectral clustering etc. on Cฬ‚ to recover an estimate of Z. We also propose another algorithm called Global Alignment of Local Estimates (GALE), where we first take a sequence of subgraphs, such that any two consecutive subgraphs on this sequence have a large intersection, and then traverse through this sequence, aligning the clustering based on a subgraph with an โ€  This is a greedy algorithm we propose in this article, see Appendix A. 4 (a) (b) Figure 1: (a) Conflicting label assignments on two subgraphs, on one labels are denoted by 0/1, on the other by +/โˆ’, (b) onion neighborhood: the yellow vertices and the solid edges between them constitute the ego network of the root vertex colored red. The green and yellow vertices together with the solid edges between them constitute the 2-hop onion neighborhood of the root averaged clustering of the union of all its predecessor subgraphs in the sequence, which have already been aligned. The alignment is done via an algorithm called Match which identifies the right permutation to align two clusterings on two subgraphs by computing the confusion matrix of these two clusterings restricted to the intersection of the two subgraphs. Whereas a naive approach would entail searching through all K permutations, Match finds the right permutation in K log K time. Once this alignment step is complete, we get an averaged clustering of the union of all subgraphs (which covers all the vertices). By design GALE works with estimates of cluster membership matrices ZS directly to output an estimate of Z, and thus, unlike PACE, avoids the extra overhead of recovering such an estimate from Cฬ‚. The rest of the paper is organized as follows. In Section 2 we describe our algorithms. In Section 3 we state our main results and some applications. Section 4 contains simulations and real data experiments. In Section 6 we provide proofs of our main results, while relegating some of the details to the Appendix, Section B. Finally, in Section 5 we conclude with some discussions and directions for future work. 2 Two divide and conquer algorithms As we discussed in the introduction, the main issue with divide and conquer algorithms for clustering is that one has to somehow match up various potentially conflicting label assignments. In this vein we propose two algorithms to accomplish this task. Both algorithms first compute the clustering on small patches of a network; these patches can be induced subgraph of a random subsample of nodes, or neighborhoods. However, the stitching procedures are different. 5 2.1 PACE: an averaging algorithm Suppose A is the adjacency matrix of a network with true cluster membership of its nodes being given by the n ร— K matrix Z where there are K clusters. Set C = ZZ > to be the clustering matrix whose (i, j)-th entry is the indicator of whether nodes i, j belong to the same cluster. Given A we will perform a local clustering algorithm to obtain an estimate of C, from which an estimate Zฬ‚ of the cluster memberships may be reconstructed. Algorithm 1 PACE: Piecewise Averaged Community Estimation 1: Subgraph selection: Fix a positive integer threshold m? for minimum required subgraph size. Fix another positive integer T , that will be the number of subgraphs we will sample. Given A, choose T subsets S1 , . . . , ST of the nodes with |S` | โ‰ฅ m? by some procedure, e.g., select m โ‰ฅ m? nodes at random, or pick h-hop neighborhoods of vertices in G, or ego-neighborhood of vertices. By AS` denote the adjacency matrix of the network induced by S` . 2: Clustering on subgraphs: Perform any of the standard clustering algorithms like Profile Likelihood (PL), Mean Field Likelihood (MFL), Spectral Clustering (SC), Semi-Definite Programming (SDP) etc. on each of these T subgraphs which have size at least m? to obtain estimated clustering matrices Cฬ‚ (S` ) = Cฬ‚ (`) . For the rest of the subgraphs set Cฬ‚ (`) โ‰ก 0. Extend Cฬ‚ (`) to an n ร— n matrix by setting (`) Cฬ‚ij = 0 if at least one of i, j was not selected in S` . Letโ€™s denote the resulting matrix again by Cฬ‚ (`) . 3: Patching up: Let yij denote the indicator of the event that both i, j were selected in S` . Set Nij = PT (`) `=1 yij . Define the combined estimator Cฬ‚ = Cฬ‚ฯ„ by (`) Cฬ‚ij = Cฬ‚ฯ„,ij = 1{Nij โ‰ฅฯ„ } (`) (`) `=1 yij Cฬ‚ij PT Nij = 1{Nij โ‰ฅฯ„ } (`) `=1 Cฬ‚ij PT Nij . (1) Here 1 โ‰ค ฯ„ โ‰ค T is an integer tuning parameter. We will call Cฬ‚ฯ„ as Piecewise Averaged Community Estimator (also abbreviated as PACE). The ฯ„ parameter in PACE seems to reduce variance in estimation quality as it discards information from less credible sources โ€” if a pair of nodes has appeared in only a few subgraphs, we do not trust what the patching has to say about them. Setting ฯ„ = ฮธE(Nij ) seems to work well in practice (this choice is also justified by our theory). A slight variant of Algorithm 1 is where we allow subgraph and/or node-pair specific weights w`,i,j in the computation of the final estimate, i.e. P P (`) (`) (`) 1{Nij โ‰ฅฯ„ } T`=1 w`,i,j yij Cฬ‚ij 1{Nij โ‰ฅฯ„ } T`=1 w`,i,j Cฬ‚ij Cฬ‚ij = Cฬ‚ฯ„,ij = = , (2) Nij Nij P (`) where Nij now equals T`=1 w`,i,j yij . We may call this estimator w-PACE standing for weighted-PACE. If the weights are all equal, w-PACE becomes equivalent to ordinary PACE. There are natural nontrivial choices, including (i) w`,i,j = |S` |, which will place more weight to estimates based on large subgraphs, (ii) w`,i,j = degS` (i) + degS` (j), where degS (u) denotes the degree of node u in subgraph S (this will put more weight on pairs which have high degree in S` ). 6 The first prescription above is intimately related to the following sampling scheme for ordinary PACE: pick subgraphs with probability proportional to their sizes. For instance, in Section 4.2 we analyze the political blog data of Adamic and Glance (2005) where neighborhood subgraphs are chosen by selecting their roots with probability proportional to degree. In real world applications, it might make more sense to choose these weights based on domain knowledge (for instance, it may be that certain subnetworks are known to be important). Another (minor) advantage of having weights is that when T = 1 and |S1 | = n, we have Nij = w1,i,j and so if w1,i,j โ‰ฅ ฯ„ , then (1) Cฬ‚ij = Cฬ‚ij , i.e. w-PACE becomes the estimator based on the full graph. This is for example true with w`,i,j = |S` |, because ฯ„ is typically much smaller than n. However, ordinary PACE lacks this property unless ฯ„ = 1, in fact, with ฯ„ > 1, the estimate returned by PACE is identically 0. Anyway, in what follows, we will stick with ordinary PACE because of its simplicity. Before we discuss how to reconstruct an estimate Zฬ‚ of Z from Cฬ‚, let us note that we may obtain a binary matrix Cฬ‚ฮท by thresholding Cฬ‚ at some level ฮท (for example, ฮท = 1/2): Cฬ‚ฮท := [Cฬ‚ > ฮท]. This thresholding does not change consistency properties (see Lemma B.1). Looking at a plot of this matrix gives a good visual representation of the community structure. In what follows, we work with unthresholded Cฬ‚. Reconstruction of Zฬ‚: How do we actually reconstruct Zฬ‚ from Cฬ‚? The key is to note that members of the same community have identical rows in C and that, thanks to PACE, we have gotten hold of a consistent estimate of C. Thus we may use any clustering algorithm on the rows of Cฬ‚ to recover the community memberships. Another option would be to run spectral clustering on the matrix Cฬ‚ itself. However, as the rows of Cฬ‚ are n-vectors, most clustering algorithms will typically have a running time of O(n3 )โ€  at best. Indeed, the main computational bottleneck of any distance based clustering algorithm in a high dimensional situation like the present one, is computing dij = kCฬ‚i? โˆ’Cฬ‚j? k which takes O(n) bit operations. However, since we have gotten a good estimate of C, we can project the rows of Cฬ‚ onto lower dimensions, without distorting the distances too much. The famous Johnson-Lindenstrauss Lemma for random projections says that by projecting onto โ„ฆ(log n/2 ) dimensions, one can keep, with probability at least 1 โˆ’ O(1/n), the distances between projected vectors within a factor of (1 ยฑ ) of the true distances. Choosing  as inverse polylog(n) we need to project onto polylog(n) dimensions and this would then readily bring the computational cost of any distance based algorithm down from O(n3 ) to O(n2 polylog(n)). Following the discussion of the above paragraph, we first do a random projection of the rows of Cฬ‚ onto s (= polylog(n)) dimensions and then apply a (distance-based) clustering algorithm. Algorithm 2 Recovering Zฬ‚ from Cฬ‚: random projection followed by distance based clustering 1: Select a dimension s for random projection. Let Cluster(ยท, K) be a clustering algorithm that operates on the rows of its first argument and outputs K clusters. โˆš 2: Cฬ‚proj โ† Cฬ‚R/ s, where R is a standard Gaussian matrix of dimensions n ร— s. 3: Zฬ‚ โ† Cluster(Cฬ‚proj , K). โ€  A word on asymptotic notation: in addition to the standard โ€˜Oโ€™, โ€˜โ„ฆโ€™, โ€˜ฮ˜โ€™, โ€˜oโ€™ notations, and their probabilistic counterparts, we will use the following less standard alternatives to clean up the presentation at places: (i) A  B to mean A = ฮ˜(B), and (ii) A  B to mean B = o(A). We will also sometimes use a โ€˜tildeโ€™ over the standard notations to hide polylogarithmic factors. 7 As for Cluster(ยท, K), we may use approximate K-means or any other distance based clustering algorithm, e.g., DGCluster(Cฬ‚, Cฬ‚proj , K), a greedy algorithm presented in Appendix A as Algorithm 5. 2.2 GALE: a sequential algorithm First we introduce a simple algorithm for computing the best permutation to align labels of one clustering (Z1 ) to another (Z2 ) of the same set of nodes (with fixed ordering) in a set S. The idea is to first compute the confusion matrix between two clusterings. Note that if the two labelings each have low error with respect to some unknown true labeling, then the confusion matrix will be close to a diagonal matrix up to permutations. The following algorithm below essentially finds a best permutation to align one clustering to another. Algorithm 3 Match: An algorithm for aligning two clusterings of the same set S of nodes. Input Z1 , Z2 โˆˆ {0, 1}|S|ร—K . Compute K ร— K confusion matrix M = Z1> Z2 . Set ฮ  โ† 0Kร—K . 2: while there are no rows/columns left do 1: (a) Find i, j, such that Mij = kM kโˆž (a tie can be broken arbitrarily). (b) Set ฮ ij = 1. (c) Replace the i-th row and j-th columns in M with โˆ’1. 3: Return the permutation matrix ฮ . Remark 2.1. One can also compute the optimal permutation by searching through all K! permutations of the labels and picking the one which gives smallest mismatch between the two; but Match brings the dependence on K down from exponential to quadratic. Note that if one of the clusterings are poor, then Match may not retrieve the optimal permutation. However, our goal is to cluster many subgraphs using an algorithm which has good accuracy with high probability (but may be computationally intensive, e.g., Profile Likelihood or Semidefinite Programming) and then use the intersections between the subgraphs to align one to another. As we shall show later, as long as there are enough members from each community in S, the simple algorithm sketched above suffices to find an optimal permutation. Now we present our sequential algorithm which aligns labelings across different subgraphs. The idea is to first fix the indexing of the nodes; cluster the subgraphs (possibly with a parallel implementation) using some algorithm, and then align the clusterings along a sequence of subgraphs. To make things precise, we make the following definition. Definition 2.1. Let Sm,T = (V, E) (vertex set V and edge set E) denote a โ€œsuper-graph of subgraphsโ€ where each subgraph is a node, and two nodes are connectedlif the m corresponding subgraphs have a substantial m2 overlap. For random m-subgraphs, this threshold is m1 := 2n . Define a traversal through a spanning tree T of Sm,T as a sequence x1 , . . . , xJ , xj โˆˆ [T ], T โ‰ค J โ‰ค 2T , covering all the vertices, such that along the sequence xi and xi+1 are adjacent, for 1 โ‰ค i โ‰ค J โˆ’ 1 (i.e. a traversal is just a walk on T of length at most 2T โˆ’ 1 passing through each vertex at least once). After we construct a traversal, we travel through this traversal such that at any step, we align the current subgraphโ€™s labels using the Match algorithm (Algorithm 3) on its intersection with the union of the previously aligned subgraphs. At the end, all subgraph labellings are aligned to the labeling of the starting subgraph. Now we can simply take an average or a majority vote between these. 8 Algorithm 4 GALE: Global Alignment of Local Estimates. Input adjacency matrix A, parameters m, T, ฯ„i , i โˆˆ [T ], a base algorithm A (e.g., PL, MFL, SC, SDP etc. ) 1: Subgraph selection: Given A, choose T subsets S1 , . . . , ST of the nodes by some procedure, e.g., select them at random, or select T random nodes and then pick their h-hop neighborhoods. By AS` denote the adjacency matrix of the network induced by S` . 2: Clustering on subgraphs: Perform algorithm A on each of these T subgraphs to obtain estimated cluster membership matrices Zฬ‚` = Zฬ‚S` . Extend Zฬ‚` to a n ร— K matrix by setting (Zฬ‚` )jk = 0 for all k โˆˆ [K] if j โˆˆ / S` . Traversal of subgraphs: Construct a traversal Sx1 , . . . , SxJ through the T subgraphs. Initial estimate of Z: Zฬ‚ โ† Zฬ‚x1 . Also set Zฬ‚ (x1 ) := Zฬ‚x1 . 5: Sequential label aligning: For subgraph Sxi on the traversal (i = 1, . . . , J), if xi has not been visited yet, 3: 4: (a) Compute the overlap between the current subgraph with all subgraphs previously visited, i.e. let S = Sxi โˆฉ โˆชiโˆ’1 `=1 Sx` . (b) Compute the best permutation to match the clustering Zฬ‚xi , Zฬ‚ on this set S, i.e. compute ฮ ฬ‚i = Match(Zฬ‚xi S , Zฬ‚ S ). (c) Permute the labels of the nodes of Sxi to get an aligned cluster membership matrix Zฬ‚ (xi ) โ† Zฬ‚xi ฮ ฬ‚. P (d) Update Zฬ‚jk โ† (x ) `โˆˆ{x1 ,...,xi } P Zฬ‚jk ` 1{jโˆˆSx `โˆˆ{x1 ,...,xi } 1{jโˆˆSx ` } ` } 1{P`โˆˆ{x 1 ,...,xi } 1{jโˆˆSx ` } >ฯ„i } , for some threshold ฯ„i . (e) Mark Sxi as visited. Implementation details: Constructing a traversal of the subgraphs can be done using a depth first search of the super-graph Sm,T of subgraphs. For our implementation, we start with a large enough subgraph (the parent), pick another subgraph that has a large overlap with it (the child), align it and note that this subgraph has been visited. Now recursively find another unvisited child of the current subgraph, and so on. It is possible that a particular path did not cover all vertices, and hence it is ideal to estimate clusterings with multiple traversals with different starting subgraphs and then align all these clusterings, and take an average. This is what we do for real networks. We also note that at any step, if we find a poorly clustered subgraph, then this can give a bad permutation which may deteriorate the quality of aligning the subsequent subgraphs on the path. In order to avoid this we use a self validation routine. Let S be intersection of current subgraph with union of the previously visited subgraphs. After aligning the current subgraphโ€™s clustering, we compute the classification accuracy of the current labeling of S with the previous labeling of S. If this accuracy is large enough, we use this subgraph, and if not we move to the next subgraph on the path. For implementation, we use a threshold of 0.55. Computational time and storage: The main computational bottleneck in GALE is in building a traversal through the random subgraphs. Let ฮทm,T be the time for computing the clusterings for T subgraphs in parallel. A naive implementation would require computing intersections between all T2 pairs of mp subsets. As we will show in our theoretical analysis, we take m = ฯ‰( n/ฯ€min ), where ฯ€min := mink ฯ€k (here ฯ€k := nk /n, where nk is the size of the k-th cluster) and T = โ„ฆฬƒ(n/m). Taking ฯ€min = ฮ˜(1), the computation of intersections takes O(T 2 m) = Oฬƒ(n3/2 ) time. Further, a naive comparison for computing subsets similar or close to a given one would require T log T time for each subset leading to T 2 log T = Oฬƒ(n) computation. However, for building a traversal one only needs access to subsets with large overlap with a given subset, 9 which is a classic example of nearest neighbor search in Computer Science. One such method is the widely used and theoretically analyzed technique of Locality Sensitive Hashing (LSH). A hash function maps any data object of an arbitrary size to another object of a fixed size. In our case, we map the characteristic vector of a subset to a number. The idea of LSH is to compute hash functions for two subsets A and B such that the two functions are the same with high probability if A and B are โ€œcloseโ€. In fact, the amount of overlap normalized by m is simply the cosine similarity between the characteristic vectors ฯ‡(A) and ฯ‡(B) of the two subsets, for which efficient hashing schemes h : {0, 1}n โ†’ {0, 1} using random projections exist Charikar (2002), with P(h(A) = h(B)) = 1 โˆ’ arccos(ฯ‡(A)T ฯ‡(B)/m)/ฯ€. For LSH schemes, one needs to build L := T ฯ hash tables, for some ฯ < 1, that governs the approximation quality. In each hash table, a โ€œbucketโ€ corresponding to an index stores all subsets which have been hashed to this index. For any query point, one evaluates O(L) hash functions and examines O(L) subsets hashed to those buckets in the respective hash tables. Now for these subsets, the distance is computed exactly. The 1+ฯ preprocessing time is O(T 1+ฯ ) = Oฬƒ(n 2 ), with storage being O(T 1+ฯ + T m) = Oฬƒ(n), and total query time being O(T 1+ฯ m) = Oฬƒ(n1+ฯ/2 ). This brings down the running time added to the algorithm specific ฮทm,T from sub-quadratic time Oฬƒ(n3/2 ) to nearly linear time, i.e. Oฬƒ(n1+ฯ/2 ). Thus, for other nearly linear time clustering algorithms GALE may not lead to computational savings. However, for algorithms like Profile Likelihood or SDP which are well known to be computationally intensive, GALE can lead to a significant computational saving without requiring a lot of storage. 2.3 Remarks on sampling schemes With PACE we have mainly used random m-subgraphs, h-hop neighborhoods, and onion neighborhoods, but many other subgraph sampling schemes are possible. For instance, choosing roots of hop neighborhoods with probability proportional to degree, or sampling roots from high degree nodes (we have done this in our analysis of the political blog data, in Section 4.2). As discussed earlier, this weighted sampling scheme is related to w-PACE. A natural question regarding h-hop neighborhoods is how many hops to use. While we do not have a theory for this yet, because of โ€œsmall world phenomenonโ€ we expect not to need many hops; typically in moderately sparse networks, 2-3 hops should be enough. Although, an adaptive procedure (e.g., cross-validation type) for choosing h would be welcome. Also, since neighborhood size increases exponentially with hop size, an alternative to choosing full hop-neighborhoods is to choose a smaller hopneighborhood and then add some (but not all) randomly chosen neighbors of the already chosen vertices. Other possibilities include sampling a certain proportion of edges at random, and the consider the subgraph induced by the participating nodes. We leave all these possibilities for future work. We have analyzed GALE under the random sampling scheme. For any other scheme, one will have to understand the behavior of the intersection of two samples or neighborhoods. For example, if one takes hhop neighborhoods, for sparse graphs, each neighborhood predominantly has nodes from mainly one cluster. Hence GALE often suffers with this scheme. We show this empirically in Section 4, where GALEโ€™s accuracy is much improved under a random m-subgraph sampling scheme. 2.4 Beyond community detection The ideas behind PACE and GALE are not restricted to community detection and can be modified for application in other interesting problems, including general clustering problems, co-clustering problems (Rohe et al. (2016)), mixed membership models, among others (these will be discussed in an upcoming article). In fact, Mackey et al. (2015) took a similar divide and conquer approach for matrix completion. 10 3 Main results In this section we will state and discuss our main results on PACE and GALE, along with a few applications. 3.1 Results on PACE Let ฯƒ and ฯƒ 0 be two clusterings (of n objects into K clusters), usually their discrepancy is measured by n ฮดc (ฯƒ, ฯƒ 0 ) = inf ฮพโˆˆSK 1 1X 1{ฯƒ(i)6=ฮพ(ฯƒ0 (i))} = inf kฮพ(ฯƒ) โˆ’ ฯƒ 0 k0 , n n ฮพโˆˆSK i=1 where SK is the permutation group on [K]. If Z, Z 0 are the corresponding n ร— K binary matrices, then a related measure of discrepancy between the two clusterings is ฮด(Z, Z 0 ) = inf Q perm. n1 kZQ โˆ’ Z 0 k0 . It is easy to see that ฮด(Z, Z 0 ) = 2ฮดc (ฯƒ, ฯƒ 0 ). (To elaborate, let Qฮพ be the permutation matrix corresponding to the 0 , i.e. k(ZQ ) โˆ’Z 0 k = permutation ฮพ, i.e. Qij = 1{ฮพ(i)=j)} . Then ฮพ(ฯƒ(i) 6= ฯƒ 0 (i), if and only if (ZQฮพ )i? 6= Zi? ฮพ i? i? 0 2.) For our purposes, however, a more useful measure of discrepancy would be the normalized Frobenius squared distance between the corresponding clustering matrices C = ZZ > and C 0 = Z 0 Z 0> , i.e. ฮดฬƒ(C, C 0 ) = 1 kC โˆ’ C 0 k2F . n2 Now we compare these two notions of discrepancies. Proposition 3.1. We have ฮดฬƒ(C, C 0 ) โ‰ค 4ฮด(Z, Z 0 ) = 8ฮดc (ฯƒ, ฯƒ 0 ) Incidentally, if the cluster sizes are equal, i.e. n/K, then one can show that ฮดฬƒ(C, C 0 ) โ‰ค 4 8 ฮด(Z, Z 0 ) = ฮดc (ฯƒ, ฯƒ 0 ). K K Although we do not have a lower bound on ฮดฬƒ(C, C 0 ) in terms of ฮด(Z, Z 0 ), Lemma A.1 of Tang et al. (2013) gives us (with X = Z, Y = Z 0 ) that there exists an orthogonal matrix O such that p p โˆš kC โˆ’ C 0 k( KkCk + KkC 0 k) 2 KnkC โˆ’ C 0 k 0 kZO โˆ’ Z kF โ‰ค โ‰ค , ฮปmin (C) nmin (Z) where we used the fact that kCk = ฮปmax (C) = nmax (Z) โ‰ค n. The caveat here is that the matrix O need not be a permutation matrix. To prove consistency of PACE we have to assume that the clustering algorithm A we use has some consistency properties. For example, it will suffice to assume that for a randomly chosen subgraph S (under our subgraph selection procedure), Eฮด(Zฬ‚S , ZS )โ€  is small. The following is our main result on the expected misclustering rate of PACE. Theorem 3.1 (Expected misclustering rate of PACE). Let S be a randomly chosen subgraph according to our sampling scheme. Let ฯ€max = maxk ฯ€k . We have Eฮดฬƒ(Cฬ‚, C) โ‰ค T ร— EkCฬ‚ (S) โˆ’ C (S) k2F + ฯ€max ร— max P(Nij < ฯ„ ), i,j ฯ„ n2 where EkCฬ‚ (S) โˆ’ C (S) k2F โ‰ค n2 P(|S| < m? ) + 4E|S|2 ฮด(Zฬ‚S , ZS )1(|S|โ‰ฅm? ) . โ€  The expectation is taken over both the randomness in the graph and the randomness of the sampling mechanism. 11 (3) The first term in (3) essentially measures the performance of the clustering algorithm we use on a randomly chosen subgraph. The second term measures how well we have covered the full graph by the chosen subgraphs, and only depend on the subgraph selection procedure. The effect of the algorithm we use is felt through the first term only. We can now specialize Theorem 3.1 to various subgraph selection schemes. First, we consider randomly chosen m-subgraphs, which is an easy corollary. Corollary 3.1 (Subgraphs are induced by m โ‰ฅ m? randomly chosen nodes). Let p = and ฯ„ = ฮธT p. We have m 2 Eฮดฬƒ(Cฬ‚, C) โ‰ค ร— Eฮดฬƒ(Cฬ‚ (S) , C (S) ) + ฯ€max ร— eโˆ’(1โˆ’ฮธ) T p/2 . ฮธ(m โˆ’ 1) m(mโˆ’1) n(nโˆ’1) , 0<ฮธ<1 (4) m Notice that the constant ฮธ(mโˆ’1) in (4) can be made as close to 1 as one desires, which means that the above bound is essentially optimal. Full h-hop neighborhood subgraphs are much harder to analyze and will not be pursued here. However, ego networks, which are 1-hop neighborhoods minus the root node (see Figure 1(b)), are easy to deal with. One can also extend our analysis to h-hop onion neighborhoods which are recursively defined as follows: O1 (v) = S1 (v) is just the ego network of vertex v; in general, the h-th shell Sh (v) := ]uโˆˆShโˆ’1 (v) [O1 (u) \ Ohโˆ’1 (v) โˆช {v}], and Oh (v) = Ohโˆ’1 (v) ] Sh (v), where the operation ] denotes superposition of networks. Here, for ease of exposition, we choose to work with ego networks (1-hop onion neighborhoods). Corollary 3.2 (Ego neighborhoods under a stochastic block model). Let B# = max Bab , B? = min Bab and 2 โ€  ? ฯ„ = TB 4 and m? โ‰ค (n โˆ’ 1)B? /2. Let ฮธ > 1. Then Eฮดฬƒ(Cฬ‚, C) โ‰ค 2 16(1 + ฮธ)2 B# B?2 ร— Eฮด(Zฬ‚S , ZS )1(|S|โ‰ฅm? ) + โˆ†, (5) where " !    2   # ฮธ nB# 4 nB?2 4 nB?4 T B?2 โˆ† โ‰ค 2 ร— exp โˆ’ + 2 2 ร— exp โˆ’ + ฯ€max ร— 2 exp โˆ’ + exp โˆ’ . 2 B? 16B# n B? 6 16 16B# We will now use existing consistency results on several clustering algorithms A, in conjunction with the above bounds to see what conditions (i.e. conditions on the model parameters, and m, T etc.) are required for PACE to be consistent. We first consider (1 + )-approximate adjacency spectral clustering (ASP) of Lei and Rinaldo (2015) as A. We will use stochastic block model as the generative model and for simplicity will assume that the link probability matrix has the following simple form B = ฮฑn [ฮปI + (1 โˆ’ ฮป)11> ] with 0 < ฮป < 1. (6) We now quote a slightly modified version of Corollary 3.2 of Lei and Rinaldo (2015) for this model. Lemma 3.1 (Lei and Rinaldo (2015)). Let c0 , , r > 0. Consider an adjacency matrix A generated from the simple block model (6) where ฮฑn โ‰ฅ c0 log n/n. If Zฬ‚ is the output of the (1 + )-approximate adjacency spectral clustering algorithm applied to A, then there exists an absolute constant c = c(c0 , r) such that with probability at least 1 โˆ’ nโˆ’r ,   1 K ฯ€max โˆ’1 ฮด(Zฬ‚, Z) โ‰ค min c (2 + ) 2 (7) 2 n, 1 . 2 ฮป ฮฑn ฯ€min โ€  Actually we can allow ฯ„ = ฮธ0 T B?2 , for any 0 < ฮธ0 < 1. As the resulting bound involves complicated constants depending on ฮธ and does not add anything extra as to the nature of the bounds, we have chosen to work with a particular ฮธ0 (= 1/4) to 2 ease our exposition. With a general ฮธ0 , the constant multiplier in the first term in (5) will be 4 (1+ฮธ) , instead of 16(1 + ฮธ)2 . ฮธ0 0 12 Corollary 3.3 ((1 + )-approximate adjacency spectral clustering with random m-subgraphs). Assume the setting of Lemma 3.1. Let r, r0 > 0. We have     2K 8m K ฯ€max 1 2 โˆ’1 Cn,m,r0 , 1 + r0 + r + ฯ€max ร— eโˆ’(1โˆ’ฮธ) T p/2 . (8) Eฮดฬƒ(Cฬ‚, C) โ‰ค ร— min c (2 + ) 2 2 ฮธ(m โˆ’ 1) ฮป ฮฑn ฯ€min m m n Here the quantity Cn,m,r0 โ†’ 1, if 2 m ฯ€min ฯ€max log n โ†’ โˆž. The proof of Corollary 3.3 follows from Corollary 3.1 and an estimate for Eฮด(Zฬ‚S , ZS ) given in (33), which max = o(1), is obtained using Lemma 3.1. In order for the first term of (8) to go to zero we need ฮป2 Kฯ€ mฮฑ ฯ€ 2 n min Kฯ€max . 2 ฮป2 ฮฑn ฯ€min 1 K) 2 i.e. m  Thus for balanced block sizes (i.e. ฯ€max , ฯ€min  we need to have m  ฮปK 2 ฮฑ . So, n qualitatively, for large K or small ฮฑn or a small separation between the blocks, m has to be large, which is natural to expect. In particular, for fixed K and ฮป, this shows that we need subgraphs of size m  ndโˆ’1 n , n2 n2 and T  m2 many of them to achieve consistency (here the average degree dn  nฮฑn ). Let T = m2 rn and m = dnn sn , where both rn , sn โ†’ โˆž. Let us see what computational gain we get from this. Spectral clustering on the full graph has complexity O(n3 ), while the complexity of PACE with spectral clustering is  2   3   n n 3 3 2 O(T m ) = O rn m = O n mrn = O rn sn . m2 dn So if dn = ฮ˜(nฮฑ ), then the complexity would be O(n3โˆ’ฮฑ rn sn ), which is essentially O(n3โˆ’ฮฑ ). When dn = ฮ˜(log n) the gain is small. Note however that for a parallel implementation, with each source processing M out of the T subgraphs, wemay get a significant boost in running time, at least in terms of constants; the running time would be 3 O Mndn rn sn . Corollary 3.4 ((1 + )-approximate adjacency spectral clustering with ego subgraphs). Assume the setting of Lemma 3.1. Let r, r0 > 0. We have     r  32(1 + ฮธ)2 K ฯ€max 16 2K 4 โˆ’1 Eฮดฬƒ(Cฬ‚, C) โ‰ค ร— min c (2 + ) 4 2 2 Dn,B,r0 , 1 + r0 + + + โˆ†, (9) ฮป2 ฮป ฮฑn ฯ€min n nฮป2 ฮฑn nฮปฮฑn n where    2       4 nฮป2 ฮฑn 4 ฮธ nฮฑn nฮป4 ฮฑn2 T ฮป2 ฮฑn2 + 2 2 2 ร— exp โˆ’ + ฯ€max ร— 2 exp โˆ’ + exp โˆ’ . โˆ† โ‰ค 2 2 ร— exp โˆ’ ฮป ฮฑn 16 n ฮป ฮฑn 6 16 16 Here the quantity Dn,B,r0 โ†’ 1, if 2 ฮป2 nฮฑ ฯ€min n ฯ€max log n โ†’ โˆž. The proof of Corollary 3.4 follows from Corollary 3.2 and an estimate for Eฮด(Zฬ‚S , ZS )1(|S|โ‰ฅm? ) given in (34), which is obtained using Lemma 3.1. For the right hand side in (9) to go to zero (assuming K fixed, balanced block sizes), we need min{nฮฑn2 , T ฮฑn2 } โ†’ โˆž. In terms of average degree this means that we need โˆš 2 dn  n, and T  dn2 . That with ego neighborhoods we can not go down to dn = ฮ˜(log n) is not surprising, n since these ego networks are rather sparse in this case. One needs to use larger neighborhoods. Anyway, โˆš 2 writing dn = nrn , T = dn2 sn , where both rn , sn โ†’ โˆž, the complexity of adjacency spectral clustering, in n 2 this case becomes O(T d3n ) = O(n2 dn rn sn ) and with M processing units gets further down to O( nMdn rn sn ). 13 Although from our analysis, it is not clear why PACE with spectral clustering should work well for sparse settings, in numerical simulations, we have found that in various regimes PACE with (regularized) spectral clustering vastly outperforms ordinary (regularized) spectral clustering (see Table 4). It seems that the reason why PACE works well in sparse settings lies in the weights Nij . With h-hop neighborhoods as the chosen subgraphs, if Puv = 1{ฯg (u,v)โ‰คh} , where ฯg is the geodesic distance on G, then Nij = (P 2 )ij . It is known that spectral clustering on the matrix of geodesic distances works well in sparse settings (Bhattacharyya and Bickel (2014)). PACE seems to inherit that property through N , although we do not presently have a rigorous proof of this. We conclude this section with an illustration of PACE with random m-subgraphs using SDP as the algorithm A. We shall use the setting of Theorem 1.3 of Gueฬdon and Vershynin (2015) for the illustration, stated here with slightly different notation. Let SDP-GV denote the following SDP (Gueฬdon and Vershynin, 2015, SDP (1.10)) maximize hA, Xi subject to X  0, X โ‰ฅ 0, diag(X) = In , 1> X1 = 1> C1. Lemma 3.2 (Gueฬdon and Vershynin (2015), Theorem 1.3). Consider an SBM with P mink Bkk โ‰ฅ a/n, 2 maxk6=k0 Bkk0 โ‰ค b/n, where a > b. Also let the expected variance of all edges n(nโˆ’1) 1โ‰คkโ‰คk0 โ‰คK Bkk0 (1 โˆ’ Bkk0 )nkk0 = ng , where nkk0 denotes the number of pairs of vertices, one from community k, the other from community k 0 . Fix an accuracy  > 0. If g โ‰ฅ 9 and (a โˆ’ b)2 โ‰ฅ 484โˆ’2 g, then any solution Xฬ‚ of SDP-GV satisfies 1 kXฬ‚ โˆ’ Ck2F โ‰ค . n2 0 Corollary 3.5 (SDP with random m-subgraphs). Consider the setting 0.   of Lemma 3.2. Let c > 1 >0 c >  c1 (nโˆ’1)g c2 mg nโˆ’cm nโˆ’c m 2 0 2 and set gฬ„1 = mโˆ’1 and gฬ„2 = n , where c1 = c 1 โˆ’ cm(nฯ€min โˆ’1) and c2 = (c ) 1 โˆ’ c0 m(nฯ€max โˆ’1) . Fix an accuracy  > 0. Assume that (a โˆ’ b)2 โ‰ฅ 484โˆ’2 gฬ„1 , and that gฬ„2 โ‰ฅ 9. Then we have Eฮดฬƒ(Cฬ‚, C) โ‰ค 4m 1 0 2 2 2 ร— ( + e3 5โˆ’m + Keโˆ’(1โˆ’c ) mฯ€min /4 + Keโˆ’(cโˆ’1) mฯ€min /4 ) + ร— eโˆ’(1โˆ’ฮธ) T p/2 . ฮธ(m โˆ’ 1) 2 For the simple two parameter blockmodel B = n1 ((a โˆ’ b)I + b11> ) with equal community sizes, we have g  a+(Kโˆ’1)b  dn , the average degree of the nodes (note that dn = a+(Kโˆ’1)b โˆ’ na ). The assumptions of K K Corollary 3.5 are satisfied when    n ndn m = โ„ฆ max , . dn 2 (a โˆ’ b)2 This is exactly similar to what we saw for spectral clustering (take a = nฮฑn , and b = nฮฑn (1 โˆ’ ฮป)). In particular, when the average degree dn = ฮ˜(nฮฑ ), and a โˆ’ b = ฮ˜(nฮฑ ), we need m = โ„ฆ(n1โˆ’ฮฑ /2 ) and T  n2ฮฑ /4 for PACE to succeed. However, in the bounded degree regime, the advantage is negligible, only from a potentially smaller constant, because we need m = โ„ฆ(n). Again, from our numerical results, we expect that with h-hop subgraphs, PACE will perform much better. 3.2 Results on GALE We denote the unnormalized miscustering error between estimated labels Zฬ‚ and the true labels Z, (Zฬ‚, Z โˆˆ {0, 1}nร—K ) of the same set of nodes as M(Z, Zฬ‚) := nฮด(Z, Z 0 ) = minQ perm. kZฬ‚ โˆ’ ZQk0 . Note that since Zฬ‚, Z 14 are binary, the kZฬ‚ โˆ’ ZQk0 = kZฬ‚ โˆ’ ZQk1 = kZฬ‚ โˆ’ ZQk2F . As discussed earlier, the number of misclustered nodes will be half of this number. The main idea of our algorithm is simple. Every approximately accurate clustering of a set of nodes is only accurate up to a permutation, which can never be recovered without the true labels. However we can align a labeling to a permuted version of the truth, where the permutation is estimated from another labeling of the same set of vertices. This is done by calculating the confusion matrix between two clusterings. We call two clusterings aligned if cluster i from one clustering has a large overlap with cluster i from the other clustering. If the labels are โ€œalignedโ€ and the clusterings agree, this confusion matrix will be a matrix with large diagonal entries. This idea is used in the Match algorithm, where we estimate the permutation matrix to align one clustering to another. Now we present our main result. We prove consistency of a slightly modified and weaker version of Algorithm 4. In Algorithm 4, at every step of a traversal, we apply the Match algorithm on the intersection of the current subgraph and the union of all subgraphs previously aligned to estimate the permutation of the yet unaligned current subgraph. However, in the theorem presented below we use the intersection between the unaligned current subgraph with the last aligned subgraph. Empirically it is better to use the scheme presented in Algorithm 4 since it increases the size of the intersection which requires weaker conditions on the clustering accuracy of any individual subgraph. We leave this for future work. (`) We now formally define our estimator Zฬ‚ GALE . Let yi = 1{iโˆˆS` } . Let Zฬ‚ (`) denote the aligned clustering PT (`) of subgraph S` and let Ni = `=1 yi . Define GALE Zฬ‚ik (`) (`) `=1 yi Zฬ‚ik PT := Ni 1{Ni โ‰ฅฯ„ } . (10) The entries of Zฬ‚ GALE will be fractions, but as we show in Lemma B.2, rounding it to a binary matrix will not change consistency properties. Note that GALE depends on the spanning tree we use and particular the traversal of that spanning tree. Let SpanningTreesG be the set of all spanning trees of a graph G. For T โˆˆ SpanningTreesG , let TraversalsT be the set of all traversals of T . Let Zฬ‚TGALE ,(x1 ,...,xJ ) be the outcome of GALE on the traversal (x1 , . . . , xJ ) of T โˆˆ SpanningTreesSm,T . Theorem 3.2 (Misclustering rate of GALE). Let 0 < ฮธ < 1 and r, r0 > 0. Let m = โ„ฆr,r0 ,ฮธ q n log n ฯ€min  , ฮธT m n . T = โ„ฆr,r0 ,ฮธ (n log n/m), and ฯ„ = Consider an algorithm A which labels any random m-subgraph with 0 error โ‰ค m1 ฯ€min /12 with probability at least 1 โˆ’ ฮด. Then we have, with probability at least 1 โˆ’ T ฮด โˆ’ O(1/nr ), that   T 1 X 1 GALE max max ฮด(Zฬ‚T ,(x1 ,...,xJ ) , Z) โ‰ค ฮด(Zฬ‚` , Z) + O . (11) T โˆˆSpanningTreesS ฮธT nr (x1 ,...,xJ )โˆˆTraversalsT m,T `=1 Again, the constant ฮธ can be taken as close to 1 as one desires. Thus the above bound is also essentially optimal. We will now illustrate Theorem 3.2 with several algorithms A. We begin with a result on (1 + )approximate adjacency spectral clustering. Corollary 3.6 ((1 + )-approximate adjacency spectral clustering with q GALE).  Assume the setting of n log n 0 00 000 0 Lemma 3.1. Let 0 < ฮธ < 1. Let r, r , r , r > 0. Let m = โ„ฆr,r0 ,ฮธ ฯ€min , T = โ„ฆr,r ,ฮธ (n log n/m), 15 and ฯ„ = ฮธT m n . Then we have, with probability at least 1 โˆ’ T mr00 โˆ’ 2T K nr000 โˆ’O  1 nr 0  , that      K ฯ€max 2 1 000 min cโˆ’1 (2 + ) 2 , C , 1 +O 2 m n,m,r r T โˆˆSpanningTreesS ฮธ ฮป ฮฑ n ฯ€ (x ,...,x )โˆˆTraversals 1 n min J T m,T (12) 000 where the constant Cn,m,r is the same as in Corollary 3.1 max max ฮด(Zฬ‚TGALE ,(x1 ,...,xJ ) , Z) โ‰ค We see that the first term is exactly same as the first term in Corollary 3.1. This, for balanced graphs, 2 again imposes the condition m  ฮปK 2 ฮฑ . In particular, if K = ฮ˜(1) and we are in a dense well separated โˆš โˆšn regime, with ฮป = ฮ˜(1), ฮฑn = โ„ฆ(1/ n), then we need m = โ„ฆ( n log n). If K = ฮ˜(1), ฮป = ฮ˜(1) and ฮฑn = ฮ˜(log n/n), then we need m  n/ log n. In both cases, we need T = โ„ฆ(n log n/m). Thus in the regime where average degree is like log n there is still some computational advantage for very large networks (also factoring in parallelizability); however, for moderately sized networks, GALE may not lead to much computational advantage. Now we present an exact recovery result with SDP as the base algorithm A. We shall use a resultโ€  from Yan et al. (2017) on an SDP which they call SDP-ฮป. Let ฮบ := ฯ€max /ฯ€min . Also let ฯ€ denote the vector of the cluster proportions (ฯ€1 , . . . , ฯ€K ). Lemma 3.3 (Theorem 2 of Yan et al. (2017)). Let r > 0. Then Z diag(nฯ€)โˆ’1 Z > is the optimal solution of the SDP-ฮป, with probability at least 1 โˆ’ O((nฯ€min )โˆ’r ), if ๏ฃซ ๏ฃถ s max(B , K max B ) kk `6=k k` ๏ฃธ min(Bkk โˆ’ max Bk` ) = โ„ฆฬƒr ๏ฃญฮบ max . (13) k `6=k k nฯ€k Assuming that any subsequent clustering of the exactly recovered scaled clustering matrix Z diag(nฯ€)โˆ’1 Z > gives the exact clustering Z back (for example, our distance based naive algorithm NaiveClusterโ€ก will do this), we have the following corollary. Corollary 3.7 (SDP with GALE, exact recovery). Assume the setting of Lemma 3.3. Let 0 < ฮธ < q  n log n ฮธT m 0 1. Let r, r0 , r00 , r000 > 0. Let m = โ„ฆr,r0 ,ฮธ ฯ€min , T = โ„ฆr,r ,ฮธ (n log n/m), and ฯ„ = n . Then, as long in (13) holds with m replacing n, we have, with probability at least  as the separation condition  T TK 1 1 โˆ’ O (mฯ€ )r00 + nr000 + nr0 , that min max T โˆˆSpanningTreesS max m,T (x1 ,...,xJ )โˆˆTraversalsT ฮด(Zฬ‚TGALE ,(x1 ,...,xJ ) , Z) = O  1 nr  , (14) Note that, in the above bound r can taken to be greater than 1. This means that, with high probability, the proportion of misclustered nodes is less than 1/n and hence zero, leading to exact recovery. As for computational complexity, note that the separation condition (13), with n replaced by m, restricts how small m can be. Consider the simple SBM (6) with balanced block sizes for concreteness. In this case, the 2 separation condition essentially dictates, as in the case of spectral clustering, that m  ฮปK 2 ฮฑ . Thus the n remarks made earlier on how large m or T should be chosen apply here as well. โ€  We are not using Lemma 3.2 as it only shows that the solution of SDP-GV has small norm difference from the ideal clustering matrix, but does not relate this directly to misclustering error. โ€ก detailed in Appendix A 16 As discussed earlier in Section 2, even a naive implementation of GALE will only result in an O(n3/2 ) running time in addition to the time (ฮทm,T ) required to cluster the T random m-subgraphs, whereas a more careful implementation will only add a time to ฮทm,T that is nearly linear in T . Since SDPs are notoriously time intensive to solve, this gives us a big saving. 4 Simulations and real-data analysis In Table 1 we present a qualitative comparison of PACE and GALE with four representative global community detection methods Profile Likelihood (PL), Mean Field Likelihood (MFL), Spectral Clustering (SC) and Semi Definite Programming (SDP). Computationally easy Theoretical complexity Real-world scalability (n) Parallelizability PL 7 NP hard 102 โˆ’ 103 7 MFL 7 O(nฮธ1 )โ€  102 โˆ’ 103 7 SC 3 O(n3 ) 106 7 SDP 7 O(nฮธ2 )โ€  102 โˆ’ 103 7 PACE 3 O(n2+ )โ€ก  106 3 GALE 3 O(n2+ )โ€ก  106 3 Table 1: Qualitative comparison of various methods. 4.1 Simulations: comparison against traditional algorithms For simulations we will use of the following simple block model: B = (p โˆ’ q)I + qJ = ฯn a((1 โˆ’ r)I + rJ), where I is the K dimensional identity matrix and J is the K ร— K matrix of all ones. Here ฯn will be the degree density, and r will measure the relative separation between the within block and between block connection probabilities, i.e. p and q. If the blocks have prior probabilities ฯ€i , i = 1, . . . , K, then the average degree d, under this model is given by X dn = (n โˆ’ 1)ฯn a((1 โˆ’ r) ฯ€i2 + r). i In particular, if the model is balanced, i.e. ฯ€i = 1/K for all i, then dn = (n โˆ’ 1)ฯn a(1 + (K โˆ’ 1)r) . K In order to understand and emphasize the role of PACE and GALE in reducing computational time while maintaining good clustering accuracy, we use different settings of sparsity for different methods. For recovering Zฬ‚ from Cฬ‚ in PACE, we have used random projection plus K-means (abbreviated as RPKmeans below), and spectral clustering (SC). We also want to point out that, for sparse unbalanced networks GALE may return more than K clusters, typically when a very small fraction of nodes has not been visited. However, it is possible that the unvisited nodes have important information about the network structure. For example, all subgraphs may be chosen from the larger clusters, thereby leaving the smallest cluster โ€  โ€ก ฮธj โ€™s (โ‰ฅ 3) depend on details of implementation and numerical accuracy sought. with O(n3 ) algorithms 17 unvisited. We take care of this by computing the smallest error between the (K + 1)! permutations of GALEโ€™s clustering to the ground truth. This essentially treats the smallest cluster returned by GALE as misclustered. In real and simulated networks we have almost never seen GALE return a large number of unvisited nodes. SDP with ADMM: Interior point methods for SDPs are not very fast in practice. We have solved SDPs using an ADMM based implementation of Yan and Sarkar (2016). From Table 2 we see that PACE and GALE significantly reduces the running time of SDP without losing accuracy too much. In fact, if we use spectral clustering to estimate Zฬ‚ from Cฬ‚ in the last step of PACE, we get zero misclustering error (ME). Mean Field Likelihood: From Table 3 we see that our implementation of mean field on the full graph did not converge to an acceptable solution even after five and half hours, while both PACE and GALE return much better solutions in about two minutes. In fact, with spectral clustering in the last step of PACE, the misclustering error is only 0.14, which is quite good. This begs the question if this improvement is due to spectral clustering only. We show in the next simulation that in certain settings, even when spectral clustering is used as the base algorithm, PACE and GALE lead to significant improvements in terms of accuracy and running time. Algorithm SDP SDP + PACE + SC SDP + PACE + RPKmeans SDP + GALE ME(%) 0 0 9.1 1.2 Algorithm MFL MFL + PACE + SC MFL + PACE + RPKmeans MFL + GALE Time taken 1588s 288s 281s 281s ME(%) 50 1.4 36.5 19.2 Time taken 20439s 131s 125s 126s Table 3: PACE and GALE with Mean Field Likelihood (MFL) as the base method. Simulation settings: n = 5000, average degree = 13, 2-hop neighborhood, 2 equal sized clusters, T = 100, parallel implementation in Matlab with 20 workers. Table 2: PACE and GALE with SDP as the base method. Simulation settings: n = 5000, average degree = 128, m = 500, 4 equal sized clusters, T = 100, parallel implementation in Matlab with 20 workers. Regularized Spectral Clustering: In sparse unbalanced settings, regularized spectral clustering with PACE and GALE performs significantly better than regularized spectral clustering on full graph. In fact, with spectral clustering used in the last step of PACE, we can hit about 5% error or below, which is quite remarkable. See Table 4. In Section 4.2 we will see that PACE and GALE also add stability to spectral clustering (in terms of clustering degree 1 vertices). Profile Likelihood with tabu search: Optimizing profile likelihood (PL) or likelihood modularity (Bickel and Chen (2009)) for community detection is a combinatorial problem, and as such hard to scale, even if we ignore the problem of local minima. In Table 5 we compare running time of profile likelihood (optimized using tabu search) and its divide and conquer versions. We see that the local methods significantly cut down the running time of PL without losing accuracy too much. We also applied profile likelihood on 5000 node graphs with 20 workers. Although PACE and GALE finished in about 22 minutes, the global method did not finish in 3 days. So, here we present results on 1000 node networks instead. Remark 4.1. We have seen from the results presented in this section that, for recovering Zฬ‚ from Cฬ‚ in PACE, spectral clustering outperforms the random projection based algorithms (e.g., RPKmeans). For smaller 18 Random 1500-subgraph 3-hop neighborhood 5-hop onion Algorithm ME(%) Time taken ME(%) Time taken ME(%) Time taken RSC 39.6 87s RSC + PACE + SC 11.1 26s 3.4 21s 5.1 59s RSC + PACE + RPKmeans 34.7 20s 34.2 14s 18 53s RSC + GALE 17.9 23s 33.6 13s 29.7 52s Table 4: PACE and GALE with Regularized Spectral Clustering (RSC) as the base method. Simulation settings: n = 5000, average degree = 7, 2 unequal sized clusters with relative sizes ฯ€ = (0.2, 0.8), T = 100, parallel implementation in Matlab with 20 workers. Random 310-subgraph Algorithm ME(%) Time taken PL 0 70m PL + PACE + RPKmeans 3.9 PL + GALE 1.2 2-hop neighborhood ME(%) Time taken 30m 3.5 38m 30m 29.5 38m Table 5: PACE and GALE with Profile Likelihood (PL) as the base method. Simulation settings: n = 1000, average degree = 18.47, 2 unequal sized clusters with relative sizes ฯ€ = (0.4, 0.6), T = 50, parallel implementation in Matlab with 12 workers. We sampled 2-hop neighborhoods by selecting their roots uniformly at random from nodes having degree greater than the 0.1th lower quantile (= 12) of the degree distribution (average neighborhood size was 310). Ordinary PACE with such a scheme may be thought of as w-PACE, as discussed in Section 2. networks, this is not an issue (e.g., spectral clustering on the dense 5000 ร— 5000 matrix Cฬ‚ in the context of Table 3 took only about 7-8 seconds). However, for networks of much larger scale (say, with several million nodes), that last step would be costly if spectral clustering is used. Designing better algorithms for recovering Zฬ‚ from Cฬ‚ is something we are working on currently. 4.2 Real data analysis Political blog data: This is a directed network (see Figure 2) of hyperlinks between 1490 blogs (2004) that are either liberal or conservative (Adamic and Glance (2005)); we have ground truth labels available for comparison, 758 are liberal, 732 are conservative. We convert it into an undirected network by putting an edge between blogs i and j if there is at least one directed edge between them. The resulting network has lots of isolated nodes and isolated edges. The degree distribution is also quite heterogeneous (so a degree-corrected model would be more appropriate). We focus on the largest connected component. We use Laplacian spectral clustering (row normalized, to correct for degree heterogeneity), with PACE. Tables 6-7 show that PACE and GALE add stability (possibly in eigenvector computation) to spectral clustering. Indeed, with PACE and GALE we are able to cluster โ€œleafโ€ vertices (i.e. vertices of degree 1), with significantly more accuracy. 19 Figure 2: Network of political blogs, reds are conservative, blues are liberal; picture courtesy: Adamic and Glance (2005). Largest Conn. Comp. With leaves (1222 nodes) Without leaves (1087 nodes) RSC 18.74% 11.87% RSC + PACE 6.79% 4.23% SC 48.12% 3.13% SC + PACE 6.55% 3.86% Table 6: Misclustering rate in the political blog data. PACE was used with T = 10, and h-hop neighborhoods with h = 2, with roots chosen at random from high degree nodes. Largest Conn. Comp. With leaves (1222 nodes) Without leaves (1087 nodes) RSC 18.74% 11.87% RSC + PACE 13.34% 12.8% RSC + GALE 11.62% 10.0% SC 48.12% 4.23% SC + PACE 7.86 % 7.28% SC + GALE 5.81% 6.7% Table 7: Misclustering rate in the political blog data. GALE and PACE were used with T = 50, and m = 300 random subgraphs. 5 Discussion To summarize, we have proposed two divide-and-conquer type algorithms for community detection, PACE and GALE, which can lead to significant computational advantages without sacrificing accuracy. The main idea behind these methods is to compute the clustering for each individual subgraph and then โ€œstitchโ€ them together to produce a global clustering of the entire network. The main challenge of such a stitching procedure comes from the fundamental problem of unidentifiability of label assignments. That is, if two subgraphs overlap, the clustering assignment of a pair of nodes in the overlap may be inconsistent between the two subgraphs. PACE addresses this problem by estimating the clustering matrix for each subgraph and then estimating the global clustering matrix by averaging over the subgraphs. GALE takes a different approach by using overlaps between two subgraphs to calculate the best alignment between the cluster memberships of nodes in 20 the subgraphs. We prove that, in addition to being computationally much more efficient than base methods which typcally run in โ„ฆ(n2 ) time, these methods have accuracy at least as good as the base algorithmโ€™s typical accuracy on the type of subgraphs used, with high probability. Experimentally, we show something more interesting โ€” we identify parameter regimes where a local implementation of a base algorithm based on PACE or GALE in fact outperforms the corresponding global algorithm. One example of this is the Meanfield algorithm, which typically suffers from bad local optima for large networks. Empirically, we have seen that on a smaller subgraph, with a reasonable number of restarts, it finds a local optima that is often highly correlated with the ground truth. PACE and GALE take advantage of this phenomenon to improve on accuracy/running time significantly. Another example is Regularized Spectral Clustering on sparse unbalanced networks. We intend to theoretically investigate this further in future work. Finally, working with many subgraphs naturally leads to the question of self consistency of the underlying algorithm. This is often crucial in real world clustering problems with no available ground truth labels. We intend to explore this direction further for estimating model parameters like the number of clusters, algorithmic parameters like the size and number of subgraphs, number of hops to be used for the neighborhood subgraphs, etc. Currently, these are all picked a priori based on the degree considerations. It may also be possible to choose between different models (e.g., standard blockmodels, degree corrected models, dot product models etc.) by examining which model leads to the most self consistent results. We leave this for future work. In conclusion, not only are our algorithms, to the best of our knowledge, the first ever divide-and-conquer type algorithms used for community detection, we believe that the basic principles of our methods will have a broad impact on a range of clustering and estimation algorithms that are computationally intensive. 6 6.1 Proofs Results on PACE Proof of Proposition 3.1. Since both Z, Z 0 are 0, 1-valued, we can safely replace the count by Frobenius norm squared, i.e. 1 ฮด(Z, Z 0 ) = inf kZQ โˆ’ Z 0 k2F . Q perm. n Now, note that (ZQ)(ZQ)> = ZZ > for all permutation matrices Q. Thus kC โˆ’ C 0 kF = k(ZQ)(ZQ)> โˆ’ Z 0 Z 0> kF = k(ZQ โˆ’ Z 0 )(ZQ)> + Z 0 ((ZQ)> โˆ’ Z 0> kF โ‰ค k(ZQ โˆ’ Z 0 )(ZQ)> kF + kZ 0 ((ZQ)> โˆ’ Z 0> kF โ‰ค kZQ โˆ’ Z 0 kF kZQ> k2 + kZ 0 k2 k(ZQ)> โˆ’ Z 0> kF . But kZ 0 k22 is the maximum eigenvalue of Z 0> Z 0 which is diagonal with its maximum diagonal entry being the size of the largest cluster under Z 0 . Thus kZ 0 k22 equals the size of the largest cluster under Z 0 and so is trivially upper bounded by n. Same goes for kZQ> k22 . Therefore we get โˆš kC โˆ’ C 0 kF โ‰ค 2 nkZQ โˆ’ Z 0 kF . Squaring this, and taking infimum over all permutation matrices Q in the right hand side, we obtain the claimed inequality. 21 Now we will prove Theorem 3.1. The proof will be broken down into two propositions. First we decompose Cฬ‚ij โˆ’ Cij = Cฬ‚ij โˆ’ Cij 1{Nij โ‰ฅฯ„ } + Cij 1{Nij โ‰ฅฯ„ } โˆ’ Cij (15) {z } | {z } | =:(E1 )ij Note that (E1 )ij = 1{Nij โ‰ฅฯ„ } Therefore =:(E2 )ij (`) (`) `=1 yij (Cฬ‚ij โˆ’ Cij )/Nij , PT and (E2 )ij = โˆ’1{Nij <ฯ„ } Cij , so that (E1 )ij (E2 )ij = 0. 1 1 kCฬ‚ โˆ’ Ck2F = 2 (kE1 k2F + kE2 k2F ). 2 n n We will estimate kE1 kF and kE2 kF separately. (16) Proposition 6.1. We have T EkCฬ‚ (S) โˆ’ C (S) k2F . (17) ฯ„ P (`) (`) = Wij T`=1 yij (Cฬ‚ij โˆ’ Cij ). So, by an application of Cauchy- EkE1 k2F โ‰ค Proof. Let Wij := Schwartz, we have kE1 k2F = 1{Nij โ‰ฅฯ„ } . Nij X Wij2 i,j Then (E1 )ij T X !2 (`) (`) yij (Cฬ‚ij โˆ’ Cij ) (C-S) โ‰ค X T X Wij2 i,j `=1 `=1 | = T X X ! (`) yij T X ! (`) (`) yij (Cฬ‚ij โˆ’ Cij ) 2 `=1 {z =Nij (`) } (`) Wij yij (Cฬ‚ij โˆ’ Cij )2 `=1 i,j โ‰ค max Wij ij Note that Wij = 1{Nij โ‰ฅฯ„ } Nij (`) (`) yij (Cฬ‚ij โˆ’ Cij )2 `=1 i,j = max Wij ij T X X T X kCฬ‚ (`) โˆ’ C (`) k2F . `=1 โ‰ค ฯ„1 . On the other hand, since the subgraphs were chosen independently using the same sampling scheme, the kCฬ‚ (`) โˆ’ C (`) kF are identically distributed. Therefore, taking expectations we get T EkE1 k2F 1 X T โ‰ค ร— EkCฬ‚ (`) โˆ’ C (`) k2F = EkCฬ‚ (S) โˆ’ C (S) k2F , ฯ„ ฯ„ `=1 where S is a randomly chosen subgraph under our subgraph selection scheme. Proposition 6.2. Let nmax be the size of the largest block. Then we have EkE2 k2 โ‰ค nmax n max P(Nij < ฯ„ ). (18) i,j P 21 Proof. Since โˆ’(E2 )ij = Cij 1{Nij <ฯ„ } , we have kE2 k2F = i,j Cij {Nij <ฯ„ } , and by taking expectations we get X X 2 2 EkE2 k2F = Ci,j P(Nij < ฯ„ ) โ‰ค max P(Nij < ฯ„ ) Ci,j i,j i,j i,j = max P(Nij < ฯ„ ) i,j K X a=1 22 n2a โ‰ค nmax n ร— max P(Nij < ฯ„ ). i,j Proof of Theorem 3.1. Combining Propositions 6.1 and 6.2, we get (3). Finally, note that EkCฬ‚ (S) โˆ’ C (S) k2F = EkCฬ‚ (S) โˆ’ C (S) k2F 1(|S|<m? ) + EkCฬ‚ (S) โˆ’ C (S) k2F 1(|S|โ‰ฅm? ) โ‰ค n2 P(|S| < m? ) + 4E|S|2 ฮด(Zฬ‚S , ZS )1(|S|โ‰ฅm? ) . Proof of Corollary 3.1. For this sampling scheme |S| = m โ‰ฅ m? and with p = so that we have, using the Chernoff boundโˆ— for binomial lower tail, that 2 T p/2 P (Nij < ฮธT p) โ‰ค eโˆ’(1โˆ’ฮธ) m(mโˆ’1) n(nโˆ’1) , Nij โˆผ Binomial(T, p) . Finally, we get (4) by plugging in these parameter values and estimates in (3). Proof of Corollary 3.2. The most crucial thing to observe here is that if one removes the root node and its adjacent edges from a 1-hop neighborhood, then the remaining โ€œego networkโ€ has again a blockmodel structure. Indeed, let S be a random ego neighborhood of size โ‰ฅ s with root R, i.e. V (S) = {j : ARj = 1}. Then conditional on V (S) being Rโ€™s neighbors, and the latent cluster memberships, edges in E(S) are independently generated, i.e. for j, k, `, m โˆˆ V (S), and s, t โˆˆ {0, 1}, we have P(Ajk = s, A`m = t|S, Z) = P(Ajk = s|Z)P(A`m = t|Z). This is because the โ€œspokeโ€ edges ARj are independent of Aj,k , j, k โˆˆ V (S). Therefore, conditional on S, this ego-subgraph is one instantiation of a block model with the same parameters on |S| vertices. (`) Now for ego networks, yij โˆผ Bernoulli(nij /n), where nij is the total number of ego-subgraphs containing both i and j. Notice that X nij = 1{Ai` =1,Aj` =1} , `6=i,j that is, nij is the sum of (n โˆ’ 2) independent Bernoulli random variables 1{Ai` =1,Aj` =1} โˆผ Bernoulli(Bฯƒ(i)ฯƒ(`) Bฯƒ(j)ฯƒ(`) ). So 2 (n โˆ’ 2)B# โ‰ฅ Enij = X Bฯƒ(i)ฯƒ(`) Bฯƒ(j)ฯƒ(`) โ‰ฅ (n โˆ’ 2)B?2 , `6=i,j and we have, by the Chernoff bound, that P(nij โ‰ค (n โˆ’ 2)B?2   (Enij โˆ’ (n โˆ’ 2)B?2 + โˆ†)2 โˆ’ โˆ†) โ‰ค exp โˆ’ 2Enij ! โˆ†2 โ‰ค exp โˆ’ . 2 2(n โˆ’ 2)B# (19) In order to apply Theorem 3.1 we need the following two ingredients, which we will now work out. โˆ— We use a slightly loose but convenient form of the Chernoff bounds: (i) P(X โ‰ค (1 โˆ’ ฮด)ยต) โ‰ค exp(โˆ’ฮด 2 ยต/2), and (ii) P(X โ‰ฅ (1 + ฮด)ยต) โ‰ค exp(โˆ’ฮด 2 ยต/3), where X = X1 + ยท ยท ยท + Xn and Xi โ€™s are independent binary random variables, with EX = ยต, and 0 < ฮด < 1. 23 (i) estimate of |S|, and (ii) estimate of P(Nij < ฯ„ ). (i) Estimate of |S|. Note that |S| = P k AkR . So P(|S| < m? ) = ER P(|S| < m? | R). P Since (n โˆ’ 1)B? โ‰ค E(|S| | R) = j6=R Bฯƒ(k)ฯƒ(R) โ‰ค (n โˆ’ 1)B# , and AkR , 1 โ‰ค k โ‰ค n are independent, we have, by Chernoffโ€™s inequality, that   (E(|S| | R) โˆ’ m? )2 P(|S| < m? | R) โ‰ค exp โˆ’ 2E(|S| | R)   ((n โˆ’ 1)B? โˆ’ m? )2 โ‰ค exp โˆ’ , 2(n โˆ’ 1)B# where m? โ‰ค (n โˆ’ 1)B? . Therefore, the same upper bound holds for P(|S| < m? ). In particular, for m? โ‰ค (n โˆ’ 1)B? /2 we have     (n โˆ’ 1)B?2 nB?2 P(|S| < m? ) โ‰ค exp โˆ’ โ‰ค exp โˆ’ . (20) 8B# 16B# Similarly, using Chernoffโ€™s inequality for Binomial upper tail, we can show that, for ฮธ > 0,  2  ฮธ nB# P(|S| > (1 + ฮธ)nB# ) โ‰ค exp โˆ’ . 6 (ii) Estimate of P(Nij < ฯ„ ). Recall that Nij | nij โˆผ Binomial(T, nij /n). Then     2nฯ„ 2nฯ„ P(Nij < ฯ„ ) = P Nij < ฯ„, nij < + P Nij < ฯ„, nij โ‰ฅ . T T | {z } | {z } =:P1 =:P2 Clearly     2nฯ„ nB?2 P1 โ‰ค P nij < โ‰ค P nij < . T 2 Now, given nij such that nij โ‰ฅ 2nฯ„ T , we can invoke Chernoffโ€™s inequality to get     (E(Nij | nij ) โˆ’ ฯ„ )2 T nij P(Nij < ฯ„ | nij ) โ‰ค exp โˆ’ โ‰ค exp โˆ’ . 2E(Nij | nij ) 8n Therefore  T nij P2 โ‰ค E exp โˆ’ 8n  1{nij โ‰ฅ 2nฯ„ } T   T nij โ‰ค E exp โˆ’ 8n     T nij T nij = E exp โˆ’ 1 โˆ’ 1 nB 2 + E exp nB 2 {nij < 2 ? } (nij โ‰ฅ 2 ? ) 8n 8n     nB?2 T B?2 โ‰ค P nij < + exp โˆ’ . 2 16 24 (21) Thus     T B?2 nB?2 + exp โˆ’ . P(Nij < ฯ„ ) โ‰ค 2P nij < 2 16 But by (19) nB?2 P nij < 2   2 ? 2 ((n โˆ’ 2)B?2 โˆ’ nB 2 ) โ‰ค exp โˆ’ 2 2(n โˆ’ 2)B# ! (n โˆ’ 2) B?4 โ‰ค exp โˆ’ 2 8 B# Thus nB?4 P(Nij < ฯ„ ) โ‰ค 2 exp โˆ’ 2 16B# ! ! nB?4 โ‰ค exp โˆ’ 2 16B# ! .   T B?2 + exp โˆ’ . 16 Now we are ready to use (3). Using our estimates on |S| we get that 2 2 2 E|S| ฮด(Zฬ‚S , ZS )1(|S|โ‰ฅm? ) โ‰ค (1 + ฮธ) n 2 Eฮด(Zฬ‚S , ZS )1(|S|โ‰ฅm? ) B# ฮธ2 nB# + exp โˆ’ 6   . Next we plug into (3) all the estimates we derived in this subsection to get the desired bound (5). 6.2 Results on GALE For any clustering Zฬ‚i on subgraph Si , let ฮ i โˆˆ arg minQ perm. kZฬ‚i โˆ’ Zi Qk1 , where Zi is used a shorthand for ZSi = Z S , the true cluster membership matrix for the members of Si . Define the matrix Fi by the i requirement Zฬ‚i = Zi ฮ i + Fi , Fi โˆˆ {0, ยฑ1}nร—K . (22) In other words, kFi k1 = M(Zฬ‚i , Zi ). We first analyze Algorithm 3, i.e. Match. Recall that, if two clusterings on some set S agree, then the confusion matrix will be a diagonal matrix up to permutations, with the entries in the diagonal corresponding to the cluster sizes in either of the clusterings. In the following lemma, we consider a noisy version of this, where the two clusterings are not in perfect agreement. This lemma essentially establishes that if supplied with two clusterings whose confusion matrix is a diagonal matrix up to permutations plus noise, then Match will recover the correct aligning permutation, if the noise is not too large. > Kร—K , kฮ“k Lemma 6.1. Let d โˆˆ RK โˆž โ‰ค mini di /3. Then + . Also let M = ฮ 2 diag(d)ฮ 1 + ฮ“, where ฮ“ โˆˆ R > Match returns ฮ  = ฮ 2 ฮ 1 , when applied on the confusion matrix M . Proof of Lemma 6.1. Let D := diag(d). Let ฮพi be the permutation encoded in ฮ i , for i โˆˆ [2], i.e. (ฮ i )uv = 1{v=ฮพi (u)} . It is easy to see that Muv = Dฮพโˆ’2 (u),ฮพโˆ’1 (v) + ฮ“uv . We have for all u, v such that (ฮ > 2 ฮ 1 ))uv = 0, 1 2 Muv โ‰ค kฮ“kโˆž , whereas for all u, v such that (ฮ > 2 ฮ 1 )uv = 1, Muv โ‰ฅ mina Daa โˆ’ kฮ“kโˆž . Hence min u,v : (ฮ > 2 ฮ 1 )uv =1 Muv โ‰ฅ min Daa โˆ’ kฮ“kโˆž โ‰ฅ 2kฮ“kโˆž โ‰ฅ 2 a max u,v : (ฮ > 2 ฮ 1 )uv =0 Muv . Hence the top K (recall that K is the number of rows in M ) elements are the diagonal elements in D. Thus the elements of ฮ  learned by the Match algorithm will be ฮ uv = 1{ฮพโˆ’1 (u)=ฮพโˆ’1 (v)} . This is equivalent 2 to ฮ  = ฮ > 2 ฮ 1 . 25 1 Now we will establish that post-alignment misclustering errors on subgraphs equal the original misclustering errors. For this we first need a lemma on what happens when we align two subgraphs based on their intersection. Lemma 6.2. Consider two random m-subgraphs S1 and S2 . Suppose our clustering algorithm A outputs l 2m m clusterings Zฬ‚i , i = 1, 2. Let S = S1 โˆฉ S2 be of size at least m1 = 2n . Assume that M(Zฬ‚i , Zi ) โ‰ค (S) m1 ฯ€min /12 and that minkโˆˆ[K] nk Match(Zฬ‚2 S , Zฬ‚1 S ). โ‰ฅ m1 ฯ€min . Then kZฬ‚2 ฮ  โˆ’ Zฮ 1 k = M(Zฬ‚2 , Z), where ฮ  is the output of Proof of Lemma 6.2. To ease notation, let us write Zฬƒi := Zฬ‚i S , Fฬƒi := Fi S , i = 1, 2, and Zฬƒ := Z S . Then by restricting (22) to S, we get Zฬƒi = Zฬƒฮ i + Fฬƒi , Fฬƒi โˆˆ {0, ยฑ1}nร—K . Now > > > > > Zฬƒ2> Zฬƒ1 = ฮ > 2 Zฬƒ Zฬƒฮ 1 + ฮ 2 Zฬƒ Fฬƒ1 + Fฬƒ2 Zฬƒฮ 1 + Fฬƒ2 Fฬƒ1 . | {z } =:ฮ“ Note that (a) multiplication by a permutation matrix does not change the kยทk1 norm, and (b) for any matrix A, we have kAk1 = kA> k1 . Therefore > kฮ > 2 Zฬƒ Fฬƒ1 k1 (by (a)) = kZฬƒ > Fฬƒ1 k1 = X X XX X X | (Zฬƒ > )ai (Fฬƒ1 )ib | โ‰ค Zฬƒia |(Fฬƒ1 )ib | = |(Fฬƒ1 )ib | ร— Zฬƒia = kFฬƒ1 k1 . i a,b a,b i i,b | a {z } =1 Similarly, kFฬƒ2> Zฬƒฮ 1 k1 (by (b)) = > kฮ > 1 Zฬƒ Fฬƒ2 k1 โ‰ค kFฬƒ2 k1 . Finally, kFฬƒ2> Fฬƒ1 k1 โ‰ค XX a,b |(Fฬƒ2 )ia (Fฬƒ1 )ib | = i X |(Fฬƒ1 )ib | ร— X |(Fฬƒ2 )ia )| = 2kFฬƒ1 k1 , a i,b | {z =2 } where we have used the fact that each row of Fฬƒi has exactly one 1 and one โˆ’1. By (b), kFฬƒ2> Fฬƒ1 k1 = kFฬƒ1> Fฬƒ2 k1 โ‰ค 2kFฬƒ2 k1 , and therefore kFฬƒ2> Fฬƒ1 k1 โ‰ค kFฬƒ1 k1 + kFฬƒ2 k1 . Note that, by our assumptions on the individual misclustering errors, kFฬƒi k1 โ‰ค kFi k1 = M(Zฬ‚i , Zi ) โ‰ค m1 ฯ€min /12. Therefore kฮ“k โ‰ค 2(kFฬƒ1 k1 + kFฬƒ2 k1 ) โ‰ค m1 ฯ€min /3. (S) Since by our assumption, (Zฬƒ > Zฬƒ)kk = nk Match(Zฬƒ2 , Zฬƒ1 ) is ฮ  = ฮ > 2 ฮ 1 . Hence โ‰ฅ m1 ฯ€min , we can apply Lemma 6.1 to see that the output > kZฬ‚2 ฮ  โˆ’ Zฮ 1 k1 = kZฬ‚2 ฮ > 2 ฮ 1 โˆ’ Zฮ 1 k1 = kZฬ‚2 ฮ 2 โˆ’ Zk1 = kZฬ‚2 โˆ’ Zฮ 2 k1 = kF2 k1 . 26 Proposition 6.3. Let the T subsets, (Si )Ti=1 be associated with estimated clusterings Zฬ‚i with misclustering error M(Zฬ‚i , Zi ) โ‰ค m1 ฯ€min /12. Consider a traversal x1 โˆผ x2 โˆผ ยท ยท ยท โˆผ xJ of some spanning tree T of Sm,T as in Algorithm 4, satisfying (Sxi โˆฉSxiโˆ’1 ) min min nk 2โ‰คjโ‰คJ kโˆˆ[K] โ‰ฅ m1 ฯ€min , (S) where nk is the number of nodes from cluster k in a subgraph S. Applying GALE on this walk: let Zฬ‚ (x1 ) := Zฬ‚x1 , ฮ ฬ‚x1 = I and for 2 โ‰ค i โ‰ค J, define recursively ฮ ฬ‚xi ( I = Match(Zฬ‚xi Sxi โˆฉSxiโˆ’1 , Zฬ‚ (xiโˆ’1 ) Sxi โˆฉSxiโˆ’1 ) if xi was visited before, i.e. xi = xj for some 1 โ‰ค j < i, otherwise, and set Zฬ‚ (xi ) = Zฬ‚xi ฮ ฬ‚xi . Then, for any 1 โ‰ค i โ‰ค J, we have that M(Zฬ‚ (xi ) , Zxi ) = M(Zฬ‚xi , Zxi ). Proof. We claim that, for all 1 โ‰ค i โ‰ค J, we have ฮ x1 โˆˆ arg min kZฬ‚ (xi ) โˆ’ Zxi Qk, and M(Zฬ‚ (xi ) , Zxi ) = M(Zฬ‚xi , Zxi ). Q (23) We use strong induction to prove this claim. (23) is true by definition, for i = 1. Now assume that it is true for all i โ‰ค `. Then, for all i โ‰ค `, we have the representation Zฬ‚ (xi ) = Zxi ฮ x1 + Fฬ„xi , for some matrix Fฬ„xi โˆˆ {0, ยฑ1}mร—K . If x`+1 has been visited before, i.e. x`+1 = xj for some j โ‰ค `, then (23) holds by our induction hypothesis. Otherwise, we can apply Lemma 6.2 on the two clusterings Zฬ‚ (x` ) on Sx` and Zฬ‚x`+1 on Sx`+1 , to conclude that kZฬ‚ (x`+1 ) โˆ’ Zx`+1 ฮ x1 k1 = kZฬ‚x`+1 ฮ ฬ‚x`+1 โˆ’ Zx`+1 ฮ x1 k1 = M(Zฬ‚x`+1 , Zx`+1 ). But Zฬ‚ (x`+1 ) = Zฬ‚x`+1 ฮ ฬ‚x`+1 , and ฮ ฬ‚x`+1 = ฮ > x`+1 ฮ x1 . So, for any permutation matrix Q we have kZฬ‚ (x`+1 ) โˆ’ Zx`+1 Qk1 = kZฬ‚x`+1 ฮ ฬ‚x`+1 โˆ’ Zx`+1 Qk1 = kZฬ‚x`+1 โˆ’ Zx`+1 Qฮ ฬ‚> x`+1 k1 โ‰ฅ M(Zฬ‚x`+1 , Zx`+1 ) = kZฬ‚ (x`+1 ) โˆ’ Zx`+1 ฮ 1 k1 . Thus, indeed ฮ x1 โˆˆ arg minQ kZฬ‚ (x`+1 ) โˆ’ Zx` Qk and as a consequence M(Zฬ‚ (x`+1 ) , Zx`+1 ) = M(Zฬ‚x`+1 , Zx`+1 ). The induction is now complete. Now we establish an upper bound on the error of the estimator Zฬ‚ GALE in terms of the errors of the aligned clusterings Zฬ‚ (`) . Proposition 6.4. Let 0 < ฮธ < 1, and set ฯ„ = ฮธT m n . Then, for any cluster membership matrix Zฬ„ โˆˆ {0, 1}nร—K , T kZฬ‚ GALE โˆ’ Zฬ„k2F 1 X kZฬ‚ (`) โˆ’ Zฬ„` k2F X โ‰ค + 1{Ni <ฯ„ } . n ฮธT m i `=1 27 (24) Proof. The proof is very similar to the proof of Theorem 3.1. We decompose Zฬ„ik = Zฬ„ik 1{Ni โ‰ฅฯ„ } + Zฬ„ik 1{Ni <ฯ„ } . Using this we have GALE Zฬ‚ik (`) (`) `=1 yi (Zฬ‚ik PT โˆ’ Zฬ„ik = โˆ’ Zฬ„ik ) Ni 1{Ni โ‰ฅฯ„ } โˆ’ Zฬ„ik 1{Ni <ฯ„ } . Therefore kZฬ‚ GALE 2 โˆ’ Zฬ„k = X GALE (Zฬ‚ik 2 โˆ’ Zฬ„ik ) = i,k X (`) (`) `=1 yi (Zฬ‚ik PT X !2 1{Ni โ‰ฅฯ„ } + Ni i,k โ‰ค โˆ’ Zฬ„ik ) (`) (`) `=1 yi (Zฬ‚ik โˆ’ Zฬ„ik ) !2 1{Ni โ‰ฅฯ„ } + Ni | 2 Zฬ„ik 1{Ni <ฯ„ } i,k PT i,k X X 1{Ni <ฯ„ } . i {z } =:E PT P (`) (`) 2 2 We now analyze E. Let Wi := 1(Ni โ‰ฅฯ„ ) /Ni . Noting that E = i,k Wi ( `=1 yi (Zฬ‚ik โˆ’ Zฬ„ik )) , an application of Cauchy-Schwartz inequality gives ! T T T X X X X (`) (`) X (`) (`) (`) Eโ‰ค Wi2 yi yi (Zฬ‚ik โˆ’ Zฬ„ik )2 = Wi yi (Zฬ‚ik โˆ’ Zฬ„ik )2 i,k `=1 | {z =Ni } `=1 `=1 i,k โ‰ค max Wi i โ‰ค max Wi i Note that Wi = 1(Ni โ‰ฅฯ„ ) Ni โ‰ค 1 ฯ„ = n ฮธT m . T X X (`) (`) yi (Zฬ‚ik โˆ’ Zฬ„ik )2 `=1 i,k T X kZฬ‚ (`) โˆ’ Zฬ„` k2F . (25) `=1 Therefore Eโ‰ค T n X kZฬ‚ (`) โˆ’ Zฬ„` k2F . ฮธT m (26) `=1 We now mention some auxiliary results, whose proofs are deferred to the Appendix. These will help us control the probability of a โ€œbadโ€ event, defined in the proof of Theorem 3.2. Lemma 6.3. Let ฯ„ = ฮธT m n , where 0 < ฮธ < 1. Let r > 0. Then, with probability at least 1 โˆ’ ! r X 3r log n โˆ’(1โˆ’ฮธ)2 T m/2n 1{Ni <ฯ„ } โ‰ค ne 1+ . โˆ’(1โˆ’ฮธ)2 T m/2n ne i 1 nr , we have Recall that we view the T random m-subsets of [n] as nodes of a super-graph Sm,T and put an edge between nodes a(โ‰ก Sa ) and b(โ‰กl Sb )m in Sm,T (we use the shorthand a โˆผ b to denote an edge between a and b), if Yab := |Sa โˆฉ Sb | โ‰ฅ m1 = graph. m2 2n . The next lemma shows that Sm,T is in fact an Erdoฬˆs-Reฬnyi random 28 Lemma 6.4. The super-graph Sm,T is an Erdoฬˆs-Reฬnyi random graph with     2  m2 m โ‰ฅ 1 โˆ’ exp โˆ’ . P (a โˆผ b) = P Yab โ‰ฅ 2n 16n (27) Because of our assumptions on m, it follows that Sm,T is well above the connectivity threshold for Erdoฬˆs-Reฬnyi random graphs. Lemma 6.5. The super-graph Sm,T is connected with probability at least 1 โˆ’ exp(โˆ’O(n)). The next lemma states that intersection of two random m-subgraphs contains enough representatives from each cluster, with high probability. Lemma 6.6. Consider two random m-subgraphs Sa and Sb . Let r > 0 and P (S โˆฉS ) nk a b m2 ฯ€k < n s 1โˆ’O 2rn log n m2 ฯ€k m 2 ฯ€k n log n !!! โ‰ค โ‰ฅ 20r. Then 2 . nr We are now ready to prove our main result on GALE. Proof of Theorem 3.2. First we construct a good set in the sample space. Consider the following โ€œbadโ€ events B1 := {(S1 , . . . , ST ) | Sm,T is connected},   (Si โˆฉSj ) B2 := (S1 , . . . , ST ) | min min nk < m1 ฯ€min , (i,j) k ( r X โˆ’(1โˆ’ฮธ)2 T m/2n B3 := (S1 , . . . , ST ) | 1+ 1{Ni <ฯ„ } > e i !) 3r0 log n , neโˆ’(1โˆ’ฮธ)2 T m/2n B4 := {(A, S1 , . . . , ST ) | max M(Zฬ‚i , Zi ) > m1 ฯ€min /12}. 1โ‰คiโ‰คT Let B := โˆช4i=1 Bi . Let r00 > 0 By Lemma 6.5, we have P(B1 ) โ‰ค exp(โˆ’O(n)). Lemma 6.6, and a union  2 1 bound gives P(B2 ) โ‰ค T2 ร— K ร— n2r00 โ‰ค KT 00 . By Lemma 6.3, P(B3 ) โ‰ค 0 . Finally, by our hypothesis on nr nr individual misclustering errors, we have, by a union bound, that P(B4 ) โ‰ค T ฮด. Therefore P(B) โ‰ค 4 X i=1 KT 2 1 P(Bi ) โ‰ค exp(โˆ’O(n)) + r00 + r0 + T ฮด โ‰ค T ฮด + O n n  1 nr 0  , by choosing r00 suitably large. Now on the good set B c , for any T โˆˆ SpanningTreesSm,T and for any (x1 , . . . , xJ ) โˆˆ TraversalsT , the hypothesis of Propositions 6.3 and 6.4 are satisfied. Now note that ฮด(Zฬ‚TGALE ,(x1 ,...,xJ ) , Z) โ‰ค kZฬ‚TGALE ,(x1 ,...,xJ ) โˆ’ Zฮ x1 k1 n = 2 kZฬ‚TGALE ,(x1 ,...,xJ ) โˆ’ Zฮ x1 kF n By Proposition 6.3, we also have, for any 1 โ‰ค ` โ‰ค T , that kZฬ‚ (`) โˆ’ Z` ฮ x1 k2F kZฬ‚ (`) โˆ’ Z` ฮ x1 k1 = = ฮด(Zฬ‚ (`) , Z) = ฮด(Zฬ‚` , Z). m m 29 . Thus, by of Proposition 6.4, taking Zฬ„ = Zฮ x1 and noting then that Zฬ„` = Z` ฮ x1 , we have ฮด(Zฬ‚TGALE ,(x1 ,...,xJ ) , Z) โ‰ค T X 1 X ฮด(Zฬ‚` , Z) + 1{Ni <ฯ„ } . ฮธT i `=1 Since the bound on the RHS does not depend on the particular spanning tree used, or a particular traversal thereof, we conclude that, on the good event B c , max max T โˆˆSpanningTreesS m,T (x1 ,...,xJ )โˆˆTraversalsT Now, for our choice of ฯ„ , and T โ‰ฅ X 1{Ni <ฯ„ } โ‰ค e 2r000 n log n (1โˆ’ฮธ)2 m โˆ’(1โˆ’ฮธ)2 T m/2n ฮด(Zฬ‚TGALE ,(x1 ,...,xJ ) , Z) T X 1 X โ‰ค ฮด(Zฬ‚` , Z) + 1{Ni <ฯ„ } . ฮธT i `=1 , we have e r 1+ i โˆ’(1โˆ’ฮธ)2 T m/2n 3r0 log n neโˆ’(1โˆ’ฮธ)2 T m/2n โ‰ค ! 1 . nr000 r =O Therefore, on the event B c log n n1+r000 !  =O 1 nr  , by choosing r000 suitably large.   Thus we conclude that with probability at least 1 โˆ’ T ฮด โˆ’ O n1r0 , we have max T โˆˆSpanningTreesS 7 max m,T (x1 ,...,xJ )โˆˆTraversalsT ฮด(Zฬ‚TGALE ,(x1 ,...,xJ ) , Z) โ‰ค   T 1 X 1 ฮด(Zฬ‚` , Z) + O . ฮธT nr `=1 Acknowledgments We thank Arash Amini, David Blei, David Choi for their valuable comments when versions of this work were presented at conferences. SSM thanks Aditya Guntuboyina, Alan Hammond, Luca Trevisan and Bin Yu for their valuable comments during his quals talk at Berkeley, which was based on this paper. References Adamic, L. A. and Glance, N. (2005). The political blogosphere and the 2004 us election: divided they blog. In Proceedings of the 3rd international workshop on Link discovery, pages 36โ€“43. ACM. Airoldi, E. M., Blei, D. M., Fienberg, S. E., and Xing, E. P. (2009). Mixed membership stochastic blockmodels. In Advances in Neural Information Processing Systems, pages 33โ€“40. Amini, A. A., Chen, A., Bickel, P. J., Levina, E., et al. (2013). Pseudo-likelihood methods for community detection in large sparse networks. The Annals of Statistics, 41(4):2097โ€“2122. Amini, A. A. and Levina, E. (2014). On semidefinite relaxations for the block model. arXiv preprint arXiv:1406.5647. Bhattacharyya, S. and Bickel, P. J. (2014). Community detection in networks using graph distance. arXiv preprint arXiv:1401.3915. 30 Bickel, P. J. and Chen, A. (2009). A nonparametric view of network models and newmanโ€“girvan and other modularities. Proceedings of the National Academy of Sciences, 106(50):21068โ€“21073. Binkiewicz, N., Vogelstein, J. T., and Rohe, K. (2014). Covariate assisted spectral clustering. arXiv preprint arXiv:1411.2158. Cai, T. T., Li, X., et al. (2015). Robust and computationally feasible community detection in the presence of arbitrary outlier nodes. The Annals of Statistics, 43(3):1027โ€“1059. Charikar, M. S. (2002). Similarity estimation techniques from rounding algorithms. In Proceedings of the Thiry-fourth Annual ACM Symposium on Theory of Computing, STOC โ€™02, pages 380โ€“388, New York, NY, USA. ACM. Gopalan, P. K. and Blei, D. M. (2013). Efficient discovery of overlapping communities in massive networks. Proceedings of the National Academy of Sciences, 110(36):14534โ€“14539. Greene, E. and Wellner, J. A. (2017). Exponential bounds for the hypergeometric distribution. Bernoulli, 23(3):1911โ€“1950. Gueฬdon, O. and Vershynin, R. (2015). Community detection in sparse networks via grothendieckโ€™s inequality. Probability Theory and Related Fields, pages 1โ€“25. Guruharsha, K., Rual, J.-F., Zhai, B., Mintseris, J., Vaidya, P., Vaidya, N., Beekman, C., Wong, C., Rhee, D. Y., Cenaj, O., et al. (2011). A protein complex network of drosophila melanogaster. Cell, 147(3):690โ€“ 703. Holland, P. W., Laskey, K. B., and Leinhardt, S. (1983). Stochastic blockmodels: First steps. Social networks, 5(2):109โ€“137. Hollingshead, A. B. (1949). Elmstownโ€™s youth; the impact of social classes on adolescents. Karrer, B. and Newman, M. E. (2011). Stochastic blockmodels and community structure in networks. Physical Review E, 83(1):016107. Le, C. M., Levina, E., and Vershynin, R. (2015). Sparse random graphs: regularization and concentration of the laplacian. arXiv preprint arXiv:1502.03049. Lei, J. and Rinaldo, A. (2015). Consistency of spectral clustering in stochastic block models. The Annals of Statistics, 43(1):215โ€“237. Mackey, L., Talwalkar, A., and Jordan, M. I. (2015). Distributed matrix completion and robust factorization. Journal of Machine Learning Research, 16:913โ€“960. McAuley, J. J. and Leskovec, J. (2012). Learning to discover social circles in ego networks. In NIPS, volume 2012, pages 548โ€“56. McSherry, F. (2001). Spectral partitioning of random graphs. In Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on, pages 529โ€“537. IEEE. Newman, M. and Clauset, A. (2015). Structure and inference in annotated networks. arXiv preprint arXiv:1507.04001. 31 Newman, M. E. and Girvan, M. (2004). Finding and evaluating community structure in networks. Physical review E, 69(2):026113. Ng, A. Y., Jordan, M. I., Weiss, Y., et al. (2002). On spectral clustering: Analysis and an algorithm. Advances in neural information processing systems, 2:849โ€“856. Nowicki, K. and Snijders, T. A. B. (2001). Estimation and prediction for stochastic blockstructures. Journal of the American Statistical Association, 96(455):1077โ€“1087. Rohe, K., Chatterjee, S., and Yu, B. (2011). Spectral clustering and the high-dimensional stochastic blockmodel. Ann. Statist., 39(4):1878โ€“1915. Rohe, K., Qin, T., and Yu, B. (2016). Co-clustering directed graphs to discover asymmetries and directional communities. Proceedings of the National Academy of Sciences, 113(45):12679โ€“12684. Shi, J. and Malik, J. (2000). Normalized cuts and image segmentation. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 22(8):888โ€“905. Snijders, T. A. B. and Nowicki, K. (1997). Estimation and prediction for stochastic blockmodels for graphs with latent block structure. Journal of Classification, 14(1):75โ€“100. Tang, M., Sussman, D. L., Priebe, C. E., et al. (2013). Universally consistent vertex classification for latent positions graphs. The Annals of Statistics, 41(3):1406โ€“1430. Xu, Z., Ke, Y., Wang, Y., Cheng, H., and Cheng, J. (2012). A model-based approach to attributed graph clustering. In Proceedings of the 2012 ACM SIGMOD international conference on management of data, pages 505โ€“516. ACM. Yan, B. and Sarkar, P. (2016). Convex relaxation for community detection with covariates. arXiv preprint arXiv:1606.01869. Yan, B., Sarkar, P., and Cheng, X. (2017). Exact recovery of number of blocks in blockmodels. arXiv preprint arXiv:1705.08580. Zhang, Y., Levina, E., and Zhu, J. (2015). Community detection in networks with node features. arXiv preprint arXiv:1509.01173. 32 A Details of DGCluster Here we detail our distance based greedy algorithm DGCluster. The idea behind DGCluster p is to note that, if ip and j are in the same community, then kCi? โˆ’ Cj? k = 0, and otherwise kCi? โˆ’ Cj? k = |ฯƒ(i)| + |ฯƒ(j)| = ฮ˜( 2n/K) (when the communities are balanced). Thus, we expect to be able to cluster the vertices using dij = kCฬ‚proj,i? โˆ’ Cฬ‚proj,j? k, namely by starting with a root vertex r1 and for some threshold ฮณ putting all vertices j satisfying dr1 j โ‰ค ฮณ in the same cluster as r1 , and then picking another root vertex r2 from the remaining set, and putting all vertices j in the remaining set that satisfy dr2 j โ‰ค ฮณ in the same cluster as r2 , and so on. Here a root vertex ri may be chosen as one of the vertices with the highest degree in the remaining set (or according to a degree-weighted random sampling scheme), to give importance to highly connected vertices. We also note that depending on the threshold ฮณ the number of blocks we get can vary. In practice, we will start with small ฮณ (yielding a large number of communities), and stop at the smallest ฮณ that gives us โ‰ฅ K blocks. If we get more than K blocks, we merge, in succession, pairs of blocks having the largest intersectionpin Cฬ‚ (relative to their sizes) until we get exactly K blocks. A rule of thumb would be to start with ฮณ = c 2n/K with c small and then gradually increase c. Algorithm 5 A distance based greedy clustering algorithm: DGCluster 1: Input: C, C 0 , K. Output: ฯƒ = DGCluster(C, C 0 , K), a clustering based on distances between the rows of C 0 , with p merging guidance from C, if necessary. 2: Set ฮธ = 2n/K. c = cmin = 0, ฮด = 0.01. 3: Set Know = n; 4: while flag = TRUE do 5: c โ† c + ฮด. 6: ฯƒtemp โ† NaiveCluster(C 0 , cฮธ). 7: Know = maxi ฯƒtemp (i). 8: if Know โ‰ฅ K then 9: flag โ† TRUE. 10: ฯƒ โ† ฯƒtemp . 11: else 12: flag โ† FALSE. 13: Know โ† maxi ฯƒ(i). 14: while Know > K do 15: Let ฮ“i = ฯƒ โˆ’1 ({i}), i = 1, . . . , Know . 16: Compute the (upper triangle of the) matrix R, where P kโˆˆฮ“i ,lโˆˆฮ“j Ckl Rij โ† . |ฮ“i ||ฮ“j | 17: 18: Pick (i? , j? ) โˆˆ arg maxi,j Rij . ฯƒ โ† Merge(ฯƒ, i? , j? ). Algorithm 5 in turn makes use of the following two algorithms. 33 Algorithm 6 A naive clustering algorithm: NaiveCluster 1: Input: C, ฮณ : a threshold. Output: ฯƒ = NaiveCluster(C, ฮณ), a clustering based on distances between the rows of C. 2: Set Unassigned = {1, . . . , n}, b = 1, ฯƒ โ‰ก 0. 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: while Unassigned 6= โˆ… do i โ† a random (uniform or degree-weighted etc.) index in Unassigned. ฯƒ(i) โ† b. Unassigned โ† Unassigned \ {i}. for j โˆˆ Unassigned do Compute dij = kCฬ‚i? โˆ’ Cฬ‚j? k if dij โ‰ค ฮณ then ฯƒ(j) โ† b Unassigned โ† Unassigned \ {j}. b โ† b + 1. Algorithm 7 Merge 1: Input: ฯƒ, a, b. Output: ฯƒ = Merge(ฯƒ, a, b), a clustering with blocks a and b merged 2: u โ† min{a, b}, v โ† max{a, b} 3: for i = 1, . . . , n do 4: if ฯƒ(i) = v then 5: ฯƒ(i) โ† u. 6: else if ฯƒ(i) > v then 7: ฯƒ(i) โ† ฯƒ(i) โˆ’ 1. B Some auxiliary results Lemma B.1 (Thresholding PACE). Let Cฬ‚ฮท := [Cฬ‚ > ฮท]. We have Eฮดฬƒ(Cฬ‚ฮท , C) โ‰ค Eฮดฬƒ(Cฬ‚ฮท , C) . min{ฮท 2 , (1 โˆ’ ฮท)2 } (28) In particular, for ฮท = 1/2, we have Eฮดฬƒ(Cฬ‚1/2 , C) โ‰ค 4Eฮดฬƒ(Cฬ‚, C). Proof. Note that |(Cฬ‚ฮท )ij โˆ’ Cij | โˆผ Ber(qij ), where qij = Cij P(Cฬ‚ij โ‰ค ฮท) + (1 โˆ’ Cij )P(Cฬ‚ij > ฮท). Thus E((Cฬ‚ฮท )ij โˆ’ Cij )2 = qij . Now E(Cฬ‚ij โˆ’ Cij )2 = E(Cฬ‚ij โˆ’ Cij )2 1{Cฬ‚ij โ‰คฮท} + E(Cฬ‚ij โˆ’ Cij )2 1{Cฬ‚ij โ‰คฮท} . Therefore ( (1 โˆ’ ฮท)2 P(Cฬ‚ij โ‰ค ฮท) = (1 โˆ’ ฮท)2 qij , E(Cฬ‚ij โˆ’ Cij ) โ‰ฅ ฮท 2 P(Cฬ‚ij > ฮท) = ฮท 2 qij , 2 34 if Cij = 1 if Cij = 0. This means E((Cฬ‚ฮท )ij โˆ’ Cij )2 โ‰ค E(Cฬ‚ij โˆ’ Cij )2 , min{ฮท 2 , (1 โˆ’ ฮท)2 } which, on summing over i, j, gives us the desired bound. Lemma B.2 (Rounding GALE). Consider an estimated cluster membership matrix Zฬ‚ โˆˆ [0, 1]nร—K and the true cluster membership matrix Z โˆˆ {0, 1}nร—K . Then kround(Zฬ‚) โˆ’ Zk1 โ‰ค 2kZฬ‚ โˆ’ Zk1 . Proof. Let S := {(i, k) โˆˆ [n]ร—[K] : |Zฬ‚ik โˆ’Zik | โ‰ฅ 1/2}. Then by Markovโ€™s inequality, we have |S| โ‰ค 2kZฬ‚โˆ’Zk1 . Note that for (i, k) โˆˆ [n] ร— [K] \ S, round(Zฬ‚ik ) = Zik . Thus, X |round(Zฬ‚ik ) โˆ’ Zik | โ‰ค |S| โ‰ค 2kZฬ‚ โˆ’ Zk1 kround(Zฬ‚) โˆ’ Zk1 = (i,k)โˆˆS We shall need the following Bernstein-type concentration result for hypergeometric random variables. Lemma B.3 (Corollary 1 of Greene and Wellner (2017) (restated here using slightly different notation)). Consider a random variable H โˆผ Hypergeometric(k, `, L). Let ยต = `/L, ฯƒ 2 = ยต(1 โˆ’ ยต), f = (k โˆ’ 1)/(L โˆ’ 1). Then for ฮป > 0, !     โˆš H ฮป2 /2 P k โˆ’ ยต > ฮป โ‰ค exp โˆ’ . ฮป k ฯƒ 2 (1 โˆ’ f ) + 3โˆš k Let us deduce from this two convenient Chernoff type bounds on the upper and lower tail of a hypergeometric variable. Lemma B.4. Consider a random variable H โˆผ Hypergeometric(k, `, L). Then for 0 <  < 1, we have    2  2 EH  EH max{P (H < (1 โˆ’ )EH) , P (H > (1 + )EH)} โ‰ค exp โˆ’ โ‰ค exp โˆ’ . 2(1 + /3) 4 Proof. Note that k โˆ’ H โˆผ Hypergeometric(k, L โˆ’ `, L). Using Lemma B.3 we get  P Taking โˆšฮป k = ` L , H ` ฮป โˆ’ < โˆ’โˆš k L k  !     โˆš kโˆ’H Lโˆ’` ฮป2 /2 k โˆ’ > ฮป โ‰ค exp โˆ’ ` =P . ฮป โˆš k L L + 3 k we get  k` P H < (1 โˆ’ ) L      `3 k2 /(2L2 ) 2 k` โ‰ค exp โˆ’ = exp โˆ’ . (1 + /3)`/(L) 2(1 + /3)L This gives us the desired bound for the lower tail, the upper tail can be handled similarly. B.1 Analysis of PACE under stochastic block model Recall that we need to know how an algorithm performs on a randomly selected subgraph under our subgraph selection procedure. Here we will discuss how one can obtain such guarantees under the stochastic blockmodel. This will require us to understand the behavior of sizes of different communities in a (randomly) chosen subgraph. 35 B.1.1 Community sizes in random m-subgraphs (The results of this subsection do not depend on any modeling assumption.) Let S be a random m(S) (S) (S) subgraph, and set m/n = q. Then if (n1 , . . . , nK ) is the cluster size vector for ZS , then clearly nk โˆผ Hypergeometric(m, nk , n) and therefore, by Lemma B.4,   ((nk โˆ’ nmin )q + โˆ†)2 (S) P(nk โ‰ค nmin q โˆ’ โˆ†) โ‰ค exp โˆ’ 4nk q   2 โˆ† . โ‰ค exp โˆ’ 4nmax q Therefore, by union bound, (S) P(nmin โ‰ค nmin q โˆ’ โˆ†) โ‰ค X (S) P(nk โ‰ค nmin q โˆ’ โˆ†) k โˆ†2 โ‰ค K exp โˆ’ 4nmax q  Choosing โˆ† = โˆš  . 4r0 nmax q log n, where r0 > 0, we see that with probability at least 1 โˆ’ (S) nmin โ‰ฅ nmin q โˆ’ p 4r0 nmax q log n K nr 0 we have (29) Similarly, we can show that P(n(S) max and then, taking โˆ† =  โ‰ฅ nmax q + โˆ†) โ‰ค K exp โˆ’  , โˆš 0 4r nmax q log n, conclude that with probability at least 1 โˆ’ n(S) max โ‰ค nmax q + B.1.2 โˆ†2 4nmax q K nr0 p 4r0 nmax q log n. (30) Community sizes in 1-hop ego neighborhoods Let now S be a randomly chosen 1-hop ego neighborhood. Note that the size of the k-th block in this neighborhood satisfies X (S) nk = Xj , j : ฯƒ(j)=k where Xj = 1{jโˆˆS} . Now it is not hard to see that the Xj โ€™s are independent conditional R, the root of S. We also have that E(Xj | R) = Bฯƒ(j)ฯƒ(R) 1(j 6= R). It follows that (S) E(nk | R) = X X E(Xj | R) = j : ฯƒ(j)=k Bฯƒ(j)ฯƒ(R) 1{j6=R} , j : ฯƒ(j)=k which means that (S) (nmin โˆ’ 1)Bโˆ— โ‰ค (nk โˆ’ 1)B? โ‰ค E(nk | R) โ‰ค nk B# โ‰ค nmax B# . 36 Therefore, by Chernoffโ€™s inequality, (S) (S) P(nk โ‰ค (nmin โˆ’ 1)B? โˆ’ โˆ† | R) โ‰ค exp โˆ’  โ‰ค exp โˆ’ (E(nk | R) โˆ’ nmin B? + โˆ†)2 ! (S) 2E(nk | S)  . โˆ†2 2nmax B# Since the right hand side does not depend on R, we can take expectations of both sides with respect to R to get   โˆ†2 (S) P(nk โ‰ค (nmin โˆ’ 1)B? โˆ’ โˆ†) โ‰ค exp โˆ’ . 2nmax B# This implies, by an application of the union bound, that (S) P(nmin Choosing, โˆ† = โˆ†2 โ‰ค (nmin โˆ’ 1)B? โˆ’ โˆ†) โ‰ค K exp โˆ’ 2nmax B#  p 2r0 nmax B# log n we conclude, with probability at least 1 โˆ’ (S) nmin โ‰ฅ (nmin โˆ’ 1)B? โˆ’ p  . K , nr0 that 2r0 nmax B# log n. (31) One can prove similarly that P(n(S) max and then, taking โˆ† =  โ‰ฅ nmax B# + โˆ†) โ‰ค K exp โˆ’  , p 3r0 nmax B# log n, conclude, with probability at least 1 โˆ’ n(S) max โ‰ค nmax B# + B.1.3 โˆ†2 3nmax B# K , nr0 that p 3r0 nmax B# log n. (32) Analysis of adjacency spectral clustering We shall use the community size estimates from the previous subsection along with Lemma 3.1. Random m-subgraphs: From (29) and (30) we have, with probability at least 1 โˆ’ n2K r 0 , that โˆš nmax q + 4r0 nmax q log n nmax โˆš 0 โ‰ค โ‰ค 2 Cn,m,r0 , 2 (S) 2 nmin q (nmin q โˆ’ 4r nmax q log n) (nmin ) (S) nmax where s Cn,m,r0 = 1+ 4r0 log n nmax q n2 s ! 1โˆ’ q 4r0 nmax log n n2min q !โˆ’2 . n2 q Note that Cn,m,r0 stays bounded, e.g., by 6, if nmaxminlog n โ‰ฅ 16r0 . In fact, it approaches 1 as nmaxminlog n โ†’ โˆž. 1 Thus, from (7), with probability at least 1 โˆ’ n2K r 0 over randomness in S and with probability at least 1 โˆ’ mr over randomness in AS , we have   1 K nmax โˆ’1 ฮด(Zฬ‚S , ZS ) โ‰ค min c (2 + ) 2 Cn,m,r0 , 1 . 2 ฮป ฮฑn n2min q 37 We conclude that   2K 1 K nmax 1 โˆ’1 Cn,m,r0 , 1 + r0 + r . Eฮด(Zฬ‚S , ZS ) โ‰ค min c (2 + ) 2 2 2 ฮป ฮฑn nmin q m n 1-hop ego neighborhoods: By (7), given S (non-empty), with probability at least 1 โˆ’ randomness in AS , we have ( ) (S) 1 n K max ฮด(Zฬ‚S , ZS ) โ‰ค min cโˆ’1 (2 + ) 2 , 1 =: JS . 2 ฮป ฮฑn (n(S) )2 (33) 1 |S|r over the min So 1 1 E[ฮด(Zฬ‚S , ZS ) | S] โ‰ค JS + . 2 |S|r Therefore 1 Eฮด(Zฬ‚S , ZS )1(|S|โ‰ฅm? ) โ‰ค EJS 1(|S|โ‰ฅm? ) + E 2  1(|S|โ‰ฅm? ) |S|r  . From (31) and (32) we have, with probability at least 1 โˆ’ n2K r 0 , that p (S) nmax B# + 3r0 nmax B# log n nmax B# nmax nmax p โ‰ค Dn,B,r0 = 2 Dn,B,r0 , โ‰ค 2 2 (S) 2 0 2 nmin B? nmin ฮป2 ฮฑn ((nmin โˆ’ 1)B? โˆ’ 2r nmax B# log n) (nmin ) where !โˆ’2 2r0 nmax B# log n Dn,B,r0 = 1 + 1โˆ’ โˆ’ nmin n2min B?2 s ! !โˆ’2 r 3r0 log n 2r0 nmax log n 1 = 1+ . 1โˆ’ โˆ’ nmax ฮฑn nmin n2min ฮป2 ฮฑn q n2min ฮป2 ฮฑn 0 stays bounded, e.g., by 16(1 + 38 ), if nmax log n โ‰ฅ 8r . In fact, it approaches 1 as s Note that Dn,B,r0 n2min ฮป2 ฮฑn nmax log n 3r0 log n nmax B# ! 1 s โ†’ โˆž. Thus  โˆ’1 EJS 1(|S|โ‰ฅm? ) โ‰ค min c  K nmax 2K (2 + ) 4 2 2 Dn,B,r0 , 1 + r0 . ฮป ฮฑn nmin n On the other hand,  E 1(|S|โ‰ฅm? ) |S|r   โ‰คE =E  1(|S|โ‰ฅ1) |S|r ! 1( (nโˆ’1)B? >|S|โ‰ฅ1) 2 |S|r +E 1(|S|โ‰ฅ (nโˆ’1)B? ) ! 2 |S|r r    (n โˆ’ 1)B? 2 โ‰ค P |S| < + 2 (n โˆ’ 1)B?    r nB?2 2 โ‰ค exp โˆ’ + (by (20)) 16B# (n โˆ’ 1)B?    r 16B# 4 r 16 4 โ‰ค + = + . nB?2 nB? nฮป2 ฮฑn nฮปฮฑn 38 So, finally, we have  r   4 16 2K 1 โˆ’1 K nmax + Eฮด(Zฬ‚S , ZS )1(|S|โ‰ฅm? ) โ‰ค min c . Dn,B,r0 , 1 + r0 + 2 ฮป4 ฮฑn2 n2min nฮป2 ฮฑn nฮปฮฑn n B.1.4 Analysis of SDP a n In the setting of Corollary 3.5, for a random m-subgraph S we have mink Bkk โ‰ฅ b n (34) bฬƒ m am n , (S) nkk0 bm n . = aฬƒ 0 m , maxk6=k Bkk0 โ‰ค = where aฬƒ = bฬƒ = Let denote the number of pairs of vertices in the subgraph S such that one of them is from community k and the other is from community k 0 . Now by Lemma B.4 (S) P(nk 2 mฯ€ โ‰ฅ cnk m/n) โ‰ค eโˆ’(cโˆ’1) min /4 . 2 So with probability at least 1 โˆ’ Keโˆ’(cโˆ’1) mฯ€min /4 we have, for all 1 โ‰ค k โ‰ค k 0 โ‰ค K, that ( (S) (S) for k < k 0 , n n 0 โ‰ค c2 nk n0k m2 /n2 โ‰ค c1 nkk0 m2 /n2 , (S) nkk0 = 1 k (S) k (S) 1 2 2 for k = k 0 , 2 nk (nk โˆ’ 1) โ‰ค 2 cnk m/n(cnk m/n โˆ’ 1) โ‰ค c1 nkk m /n ,  where c1 = c2 1 + cm โˆ’1 n cm (nฯ€ min โˆ’1) n  0 2 mฯ€ . Similarly, we can show that, with probability at least 1โˆ’Keโˆ’(1โˆ’c ) (S) nkk0  ( c2 nkk0 m2 /n2 , โ‰ฅ c2 nkk m2 /n2 , min /4 for k < k 0 , for k = k 0 , c0 m โˆ’1 n  (S) where c2 = 1 + c0 m . Let G = {S | c2 nkk0 m2 /n2 โ‰ค nkk0 โ‰ค c1 nkk0 m2 /n2 , for all 1 โ‰ค k โ‰ค (nฯ€max โˆ’1) n P (S) gฬƒ 2 k 0 โ‰ค K}. Given S, the expected variance of edges in S is m(mโˆ’1) 1โ‰คkโ‰คk0 โ‰คK Bkk0 (1 โˆ’ Bkk0 )nkk0 =: m , say. Then, if S โˆˆ G, we have (c0 )2 c2 g c2 m(n โˆ’ 1) g gฬƒ c1 m(n โˆ’ 1) g m โ‰ค ร— โ‰ค โ‰ค ร— = 2 ร— gฬ„. n (m โˆ’ 1)n n m (m โˆ’ 1)n n n 2 and so, using our assumptions on a, b, g, we get that gฬƒ โ‰ฅ 9 and aฬƒ, bฬƒ satisfy (aฬƒ โˆ’ bฬƒ)2 โ‰ฅ 484โˆ’2 m gฬ„ โ‰ฅ 484โˆ’2 gฬƒ. n2 Therefore, using Lemma 3.2 on the subgraph S, we conclude that, given S โˆˆ G, we have 1 kCฬ‚ (S) โˆ’ Cฬ‚ (S) k2F โ‰ค , m2 with probability at least 1 โˆ’ e3 5โˆ’m , where Cฬ‚ (S) is a solution of SDP-GV on the subgraph S. As P(S โˆˆ / G) โ‰ค 2 0 2 Keโˆ’(cโˆ’1) mฯ€min /4 + Keโˆ’(1โˆ’c ) mฯ€min /4 , we conclude that Eฮดฬƒ(Cฬ‚ (S) , C (S) ) โ‰ค  + e3 5โˆ’m + Keโˆ’(cโˆ’1) B.2 2 mฯ€ min /4 0 2 mฯ€ + Keโˆ’(1โˆ’c ) min /4 . Proofs of some results for GALE In this section we collect the proofs of the auxiliary results we presented in Section 6.2. 39 Proof of Lemma 6.3. Note that the Ni โ€™s are i.i.d. Binomial(T ; m/n) random variables and hence by Chernoffโ€™s inequality we have, 2 P(Ni < ฯ„ ) โ‰ค eโˆ’(1โˆ’ฮธ) T m/2n . (35) Another use of Chernoff gives, for ฮด > 0, ! P X 1{Ni <ฯ„ } > nP(N1 < ฯ„ )(1 + ฮด) โ‰ค exp(โˆ’ฮด 2 nP(N1 < ฯ„ )/3). i Setting ฮด = q 3r log n nP(N1 <ฯ„ ) , we conclude that with probability at least 1 โˆ’ X 1{Ni <ฯ„ } โ‰ค nP(N1 < ฯ„ ) + 1 nr , p 3rnP(N1 < ฯ„ ) log n i โ‰ค ne โˆ’(1โˆ’ฮธ)2 T m/2n r 1+ 3r log n neโˆ’(1โˆ’ฮธ)2 T m/2n ! . Proof of Lemma 6.4. We will first show that for three different nodes a, b, c in Sm,T the overlap variables Yab and Yac are independent. This is an immediate consequence of the following two facts: (i) Yab and y (a) are independent which follows from the observation that for any m-subset S of [n], Yab | y (a) = 1S โˆผ Hypergeometric(m, m, n). (ii) Given y (a) , the overlaps Yab and Yac are independent, which follows from the fact that y (b) and y (c) are independent. From the discussion above, Yab โˆผ Hypergeometric(m, m, n). Using Lemma B.4 we get, with  = 1/2, we get that   2    m m2 P(a โˆผ b) = P Yab โ‰ฅ โ‰ฅ 1 โˆ’ exp โˆ’ . 2n 16n (S) Proof of Lemma 6.6. Notice that nk | Yab โˆผ Hypergeometric(Yab , nฯ€k , n), which follows from the fact that given Yab , Sa โˆฉ Sb is distributed as a uniform Yab -subset of [n]โ€  . So, Lemma B.4 gives us s ! ! 4r log n 1 (S) P nk < Yab ฯ€k 1 โˆ’ Yab โ‰ค r . Yab ฯ€k n Therefore the same bound holds for the unconditional probability. Another application of Lemma B.4 for Yab โˆผ Hypergeometric(m, m, n) gives us !! r m2 4rn log n 1 P Yab < 1โˆ’ โ‰ค r. n m2 n โ€  Thanks to Satyaki Mukherjee for making this observation, which makes the proof considerably shorter than our original approach based on concentration inequalities for sums of dependent Bernoulli random variables. 40 Using these two bounds, we conclude that with probability at least 1 โˆ’ (S) nk as long as m2 ฯ€k n log n โ‰ฅ m2 ฯ€ n s k 1โˆ’O 2 n log n m2 ฯ€k 2 nr , we have that !! , is large enough ( nmlogฯ€kn โ‰ฅ 20r suffices to make the RHS above โ‰ฅ 0). 41
10math.ST
arXiv:1704.07811v1 [math.GR] 25 Apr 2017 R-triviality of some exceptional groups Maneesh Thakur Indian Statistical Institute, 7-S.J.S. Sansanwal Marg New Delhi 110016, India e-mail: maneesh.thakur@ gmail.com Abstract The main aim of this paper is to prove R-triviality for simple, simply connected 78 or E 78 , defined over a field k of arbitrary algebraic groups with Tits index E8,2 7,1 characteristic. Let G be such a group. We prove that there exists a quadratic extension K of k such that G is R-trivial over K, i.e., for any extension F of K, G(F )/R = {1}, where G(F )/R denotes the group of R-equivalence classes in G(F ), in the sense of Manin (see [23]). As a consequence, it follows that the variety G is retract K-rational and that the Kneser-Tits conjecture holds for these groups over K. Moreover, G(L) is projectively simple as an abstract group for any field extension L of K. In their monograph ([51]) J. Tits and Richard Weiss conjectured that for an Albert division algebra A over a field k, its structure group Str(A) is generated by scalar homotheties and its U -operators. This is known to 78 . We be equivalent to the Kneser-Tits conjecture for groups with Tits index E8,2 settle this conjucture for Albert division algebras which are first constructions, in affirmative. These results are obtained as corollaries to the main result, which shows that if A is an Albert division algebra which is a first construction and ฮ“ its structure group, i.e., the algebraic group of the norm similarities of A, then ฮ“(F )/R = {1} for any field extension F of k, i.e., ฮ“ is R-trivial. Keywords: Exceptional groups, Algeraic groups, Albert algebras, Structure group, Kneser-Tits conjecture 1 Introduction The main aim of this paper is to prove R-triviality of certain exceptional algebraic groups. More precisely, let G be a simple, simply connected algebraic group defined over a field k of 78 or E 78 (see [48] for the index notation). Groups arbitrary characteristic, with Tits index E8,2 7,1 with these indices exist over a field k if k admits a central division algebra of degree 3 with non-surjective reduced norm, or if k admits degree 3 central division algebras with unitary involutions over a quadratic extension of k, with non-surjective reduced norm map (see [46], 78 , E 78 do not exist over finite 3.2, 3.3.1). Note also that the groups with Tits indices E8,2 7,1 fields, number fields, algebraically closed fields, local fields, field of reals. However, these exist, for example, over Q(t), the function field over Q in one variable. 1 2 Maneesh Thakur 78 are classified by isotopy classes of Albert division algebras over k Groups with index E8,2 and their associated buildings are Moufang hexagons defined by a hexagonal system of type 27/K where K is either a quadratic extension of k or K = k (see [51], [42]). Groups with 78 are classified by isotopy classes of Albert division algebras and they are associated index E7,1 to Moufang sets M(A), for A an Albert division algebra (e.g. see [43] or [2]). Let G be an algebraic group over k, with Tits index as one of the above mentioned indices. We prove that there exists a quadratic field extension K of k such that G is R-trivial over K, i.e., for any field extension L of K, G(L)/R = {1} in the sense of Manin ([23]). Since E8 has 78 , there is a quadratic extension K of k trivial center, it follows that when G has index E8,2 such that G(L) is a simple (abstract) group for any field extension L of K. It is well known (see [46]) that the anisotropic kernels of these groups correspond (upto a central torus) to the structure groups of Albert division algebras over k. Albert division algebras over a field k are obtainable from two (rational) constructions due to Tits, called the first construction and the second construction. We prove that if the anisotropic kernel of G (for G as above) comes from a first construction Albert division algebra, then G is R-trivial over k. In this situation G splits over a cubic extension of k. The Kneser-Tits conjecture predicts that if G is a connected, simple, simply connected algebraic group, defined and isotropic over a field k, then G(k)/G(k)โ€  = {1}, where G(k)โ€  is the subgroup of G(k) generated by the k-rational points of the unipotent radicals of kparabolics of G (see [33], ยง7.2, [13]). By a theorem of Gille, this is equivalent to proving G(k)/R = {1} ([13], Thm. 7.2). A conjecture of J. Tits and Richard M. Weiss asserts that if A is an Albert division algebra over a field k, then its structure group Str(A) is generated by scalar homotheties and U -operators (defined in ยง2) of A (see [51], 37.41, 37.42 and page 418). This conjecture 78 (see [51]). is equivalent to the Kneser-Tits conjecture for groups with Tits index E8,2 Our results prove the Tits-Weiss conjecture when A is a first Tits construction. For an extensive survey and new results on the Kneser-Tits problem, we refer the reader to ([13]) along with the classics ([45], [47]) and ([33]) and the paper ([38]) for reduction to the relative rank one case. We mention some recent results: The case of simply connected group with 29 was settled in ([12]), where a modern version (in terms of W -triviality) of F. D. index 2 E6,1 Veldkampโ€™s proof ([49], [50]) is presented. The case of the trialitarian forms of D4 over global fields was settled in ([37]). The paper [37]) also presents a description of the Whitehead group (over an infinite field k) of an absolutely simple, simply connected algebraic group of type 3,6 D4 of k-rank 1. The result for such groups over a general field is covered in ([13], 66 over an arbitrary field was ยง6.1). The Kneser-Tits conjecture for groups with Tits index E8,2 settled in ([36]). This paper is the second in a series of papers dedicated to this problem. In the first paper ([44]) we proved, among other results, that the conjecture is true for pure first constructions. We had also proved that for such an Albert division algebra A over k, the group Aut(A) is R-trivial. The problem of R-equivalence for semisimple algebraic groups has been studied by several mathematicians, see for example ([4], [5], [7], [8], [3]) and the references therein. This connects with some algebro-geometric properties of algebraic groups; e.g. if G is a simple, simply connected algebraic group, isotropic and defined over a field k, then G is R-trivial if and only if the variety of G is retract k-rational (see [13], Thm. 5.9). 78 or E 78 , the Remark : For a simple, simply connected algebraic group G with Tits index E8,2 7,1 (semisimple) anisotropic kernel H of G is isomorphic to Isom(A), the full group of isometries of the norm form of an Albert division algebra A over k. The anisotropic kernel H of G is R-triviality 3 split by a cubic extension of k if and only if A is a first Tits construction (see Proposition 2.2 and Corollary 2.1). Retract rationality : By ([13]), our results also prove that if G is a simple, simply connected 78 or E 78 , then there exists a quadratic algebraic group defined over k with Tits index E8,2 7,1 extension K of k such that the underlying variety of G is retract K-rational. If the anisotropic kernel of G is split over a cubic extension of k, then G is retract k-rational. Plan of the paper : In this paper, k will always denote a base field, infinite of arbitrary characteristic. In ยง2, we give a quick introduction to Albert algebras, Tits processes and the structure group of an Albert algebra. A description of strongly inner groups of type E6 and those 78 and E 78 is given in detail. This is followed by a brief introduction to with Tits index E8,2 7,1 R-equivalence on algebraic groups. At the end of ยง2, we state our main results and some of their consequences. ยง3 and ยง4 contain some of the key results of the paper. ยง3 is mainly concerned with extension of automorphisms of a 9-dimensional subalgebra of an Albert algebra A to an automorphism of A and also discusses R-triviality of some subgroups of Aut(A). ยง4 contains results on extending norm similarities of 9-dimensional subalgebras to those of the Albert algebra (see Theorem 4.5). Some of the most important results on R-triviality are proved ยง5. Here we develop the R-triviality results on various subgroups of Aut(A) and Str(A) for Albert algebras in general as well as for the special case of first constructions. These results culminate in the main theorem (Theorem 5.4) , where we prove Str(A) is R-trivial for first Tits construction Albert algebras. ยง6 discusses a proof of the R-triviality of groups of type 78 , with anisotropic kernel split over a cubic extension. A proof of the Tits-Weiss conjecture E8,2 for Albert division algebras, arising from first Tits construction is presented (Corollary 6.1). 78 , having anisotropic kernel split over a cubic In ยง7, we discuss groups with Tits index E7,1 extension. We prove that such groups are R-trivial. We end ยงwith some R-triviality results for reduced Albert algebras. In ยง8 some retract rationality results are derived. We prove, as a consequence of our results 78 or E 78 and the anisotropic kernel is in ยง6 and ยง7, that any group G whose Tits index is E7,1 8,2 split over a cubic extension of k, is retract k-rational. 2 Preliminaries and results For much of the preliminary material on Albert algebras, we refer the reader to ([27]), ([39]) and ([21]). We recall below, very briefly, some notions we will need. All base fields considered in this paper will be assumed to be infinite and of arbitrary characteristic. To define the notion of an Albert algebra over a field of arbitrary characteristics, we take the approach via cubic norm structure, as defined in ([32] or [30]) . Cubic norm structures : Let J be a finite dimensional vector space over a field k. A cubic norm structure on J consists of a tuple (N, #, c), where c โˆˆ J is a base point, called the identity element of the norm structure and 1. N : J โ†’ k is a cubic form on J, 2. N (c) = 1, 3. the trace form T : J ร— J โ†’ k, defined by T (x, y) := โˆ’โˆ†xc โˆ†y logN , is nondegenerate, 4 Maneesh Thakur 4. the adjoint map # : J โ†’ J defined by T (x# , y) = โˆ†yx N , is a quadratic map such that 5. x## = N (x)x, 6. c# = c, 7. cร—x = T (x)cโˆ’x, where T (x) := T (x, c) is the trace of x and xร—y := (x+y)# โˆ’x# โˆ’y # , and these hold in all scalar extensions of J. In the above, โˆ†yx f denotes the directional derivative of a polynomial function f on J, in the direction y, evaluated at x. For differential calculus of rational maps and related notation, we refer to ([16], Chap. VI, Sect. 2). Let, for x โˆˆ J, Ux (y) := T (x, y)x โˆ’ x# ร— y, y โˆˆ J. Then with 1J := c and Ux as above, one gets a unital quadratic Jordan algebra structure on J (see [24]), sometimes denoted by J(N, c). The linear operators Ux as defined above, are called the U -operators of the Jordan algebra J. An element x โˆˆ J is invertible if and only if N (x) 6= 0 and in that case one has xโˆ’1 = N (x)โˆ’1 x# . Recall that J(N, c) is called a division algebra if Ux is surjective for all x 6= 0, which is equivalent to N (x) 6= 0 for all x 6= 0. We list some examples and notation that we will use in the paper: Example 1. Let D denote a separable associative algebra over k, of degree 3. Let ND denote its norm and TD the trace. Then with 1D the unit element of D and # : D โ†’ D the (classical) adjoint map, we get a quadratic Jordan algebra structure on D, which we will denote by D+ . Example 2. Let (B, ฯƒ) be a separable associative algebra over k with an involution ฯƒ of the second kind (over its center). With the unit element 1 of B and the restriction of the norm NB of B to (B, ฯƒ)+ := {b โˆˆ B|ฯƒ(b) = b}, we get a cubic norm structure on (B, ฯƒ)+ which is a substructure of B+ . Example 3. Let C be an octonion algebra over a field k with n as its norm map and t its trace. Let x 7โ†’ x denote its canonical involution. Let ฮณ = diag(ฮณ1 , ฮณ2 , ฮณ3 ) โˆˆ GL3 (k) and H3 (C, ฮณ) := {x = (xij ) โˆˆ M3 (C)|ฮณ โˆ’1 xt ฮณ = x and xii โˆˆ k, 1 โ‰ค i โ‰ค 3}, where M3 (C) is the algebra of 3 ร— 3 matrices with It follows that any x โˆˆ H3 (C, ฮณ) has the form ๏ฃซ ฮฑ1 ฮณ2 c ๏ฃญ x = ฮณ1 c ฮฑ2 ฮณ1 b ฮณ2 a entries in C and xt is the transpose of x. ๏ฃถ ฮณ3 b ฮณ3 a๏ฃธ , ฮฑ3 where ฮฑi โˆˆ k, a, b, c โˆˆ C. Define N (x) := ฮฑ1 ฮฑ2 ฮฑ3 โˆ’ ฮณ2 ฮณ3 ฮฑ1 n(a) โˆ’ ฮณ3 ฮณ1 ฮฑ2 n(b) โˆ’ ฮณ1 ฮณ2 ฮฑ3 n(c) + ฮณ1 ฮณ2 ฮณ3 t(abc), 1 := e11 + e22 + e33 , and x# := ฮฑ2 ฮฑ3 โˆ’ ฮณ2 ฮณ3 n(a) + ฮฑ3 ฮฑ1 โˆ’ ฮณ3 ฮณ1 n(b) + ฮฑ1 ฮฑ2 โˆ’ ฮณ1 ฮณ2 n(c) +(ฮณ1 bc โˆ’ ฮฑ1 a)[23] + (ฮณ2 ca โˆ’ ฮฑ2 b)[31] + (ฮณ3 ab โˆ’ ฮฑ3 c)[12], 5 R-triviality where a[ij] := ฮณj aeij + ฮณi aeji in terms of the matrix units. This defines a cubic norm structure (see [30]), hence a Jordan algebra, called a reduced Albert algebra over k. We call a reduced Albert algebra split if the coordinate octonion algebra is split, in which case H3 (C, ฮณ) โˆผ = H3 (C) := H3 (C, 1). Tits process : 1. Let D be a finite dimensional associative k-algebra of degree 3 with norm ND and trace TD . Let ฮป โˆˆ kโˆ— . We define a cubic norm structure on the k-vector space D โŠ• D โŠ• D by 1 := (1, 0, 0), N ((x, y, z)) := ND (x) + ฮปND (y) + ฮปโˆ’1 ND (z) โˆ’ TD (xyz), (x, y, z)# := (x# โˆ’ yz, ฮปโˆ’1 z # โˆ’ xy, ฮปy # โˆ’ zx). The (quadratic) Jordan algebra associated to this norm structure is denoted by J(D, ฮป). We regard D+ as a subalgebra of J(D, ฮป) through the first summand. Recall (see [32], 5.2) that J(D, ฮป) is a division algebra if and only if ฮป is not a norm from D. This construction is called the first Tits process arising from the parameters D and ฮป. 2. Let K be a quadratic eฬtale extension of k and B be a separable associative algebra of degree 3 over K with a K/k involution ฯƒ. Let u โˆˆ (B, ฯƒ)+ be a unit such that NB (u) = ยตยต for some ยต โˆˆ K โˆ— , where a 7โ†’ a denotes the nontrivial k-automorphism of K. We define a cubic norm structure on the k-vector space (B, ฯƒ)+ โŠ• B by the formulae: N ((b, x)) := NB (b) + TK (ยตNB (x)) โˆ’ TB (bxuฯƒ(x)), (b, x)# := (b# โˆ’ xuฯƒ(x), ยตฯƒ(x)# uโˆ’1 โˆ’ bx), 1 := (1B , 0). The (quadratic) Jordan algebra corresponding to this cubic norm structure is denoted by J(B, ฯƒ, u, ยต). We note that (B, ฯƒ)+ can be identified with a subalgebra of J(B, ฯƒ, u, ยต) through the first summand. Recall (see [32], 5.2) that J(B, ฯƒ, u, ยต) is a division algebra if and only if ยต is not a norm from B. This construction is called the second Tits process arising from the parameters B, u, ยต. Note that when K = k ร— k, then B = D ร— D โ—ฆ and ฯƒ is the switch involution, where D โ—ฆ is the opposite algebra of D. In this case, the second construction J(B, ฯƒ, u, ยต) can be identified with a first construction J(D, ฮป). Albert algebras : In the Tits process (1) described above, if we start with a central simple algebra D and ฮป โˆˆ kโˆ— , we get a first Tits construction Albert algebra A = J(D, ฮป) over k. Similarly, in the Tits process (2) above, if we start with a central simple algebra (B, ฯƒ) with center a quadratic eฬtale algebra K over k and an involution ฯƒ of the second kind, u, ยต as described above, we get a second Tits construction Albert algebra A = J(B, ฯƒ, u, ยต) over k. One knows that all Albert algebras can be obtained via Tits constructions. An Albert algebra is a division algebra if and only if its (cubic) norm N is anisotropic over k (see [21], ยง39). We also recall here that a first construction Albert algebra A is either a division algebra, or it is split, i.e., is isomorphic to H3 (C) with C the split octonion algebra k. Moreover, any Albert division algebra arising from a first construction is split over any of its cubic subfields. If A = J(B, ฯƒ, u, ยต) as above, then A โŠ—k K โˆผ = J(B, ยต) as K-algebras, where K is the center of B (see [21], 39.4). Hexagonal systems : A hexagonal system is a cubic norm structure whose norm is anisotropic. We say a hexagonal system is of type 27/k if it arises from a first Tits construction Albert division algebra over k, and of type 27/K, for K a quadratic field extension of k, 6 Maneesh Thakur if it arises from a Tits second construction Albert division algebra, corresponding to (B, ฯƒ)+ and K is the center of B. Pure first and second constructions : Let A be an Albert algebra over k. If A is a first construction, but not a second construction with respect to a degree 3 central simple algebra whose center is a quadratic field extension of k, then we call A a pure first construction Albert algebra. Similarly pure second construction Albert algebras are those which are not obtainable through the first construction. We recall at this stage that if A is an Albert division algebra, then any subalgebra of A is either k or a cubic subfield of A or of the form (B, ฯƒ)+ for a degree 3 central simple algebra B with an involution ฯƒ of the second kind over its center K, a quadratic eฬtale extension of k (see [16], Chap. IX, ยง12, Lemma 2, [30]). Norm similarities of Albert algebras : Let A be an Albert algebra over k and N denote its norm map. A norm similarity of A is a bijective linear map f : A โ†’ A such that N (f (x)) = ฮฝ(f )N (x) for all x โˆˆ A and some ฮฝ(f ) โˆˆ k โˆ— . Since we are working over k infinite, norm similarities are synonimous with isotopies of Albert algebras (see [16], Chap. VI, Thm. 6, Thm. 7). Adjoints and U -operators : Let A be an Albert algebra over k and N be its norm map. Recall, for a โˆˆ A the U -operator Ua is given by Ua (y) := T (a, y)a โˆ’ a# ร— y, y โˆˆ A. When a โˆˆ A is invertible, it can be shown that Ua is a norm similarity of A, in fact, for any x โˆˆ A, N (Ua (x)) = N (a)2 N (x) when a is invertible. For a central simple algebra D of degree 3 over k, the adjoint map a 7โ†’ a# satisfies ND (a) = aa# = a# a, โˆ€ a โˆˆ D. It can be shown that (xy)# = y # x# for all x, y โˆˆ D. It also follows that N (x# ) = N (x)2 . Algebraic groups from Albert algebras : In this paper, for a k-algebra X and a field extension L of k, We will denote by XL the L-algebra X โŠ—k L. Let A be an Albert algebra over k with norm N and k be an algebraic closure of k. The full group of automorphisms Aut(A) := Aut(Ak ) is a simple algebraic group of type F4 defined over k and all simple groups of type F4 defined over k arise this way. When A is a division algebra, Aut(A) is anisotropic over k. We will denote the group of k-rational points of Aut(A) by Aut(A). Note that A is a division algebra precisely when the norm form N of A is anisotropic (see [40], Thm. 17.6.5). The full group Str(A) of norm similarities of N , called the structure group of A, is a connected reductive group over k, of type E6 . We denote by Str(A) the group of krational points Str(A)(k). The U -operators Ua , for a โˆˆ A invertible, are norm similarities and generate a normal subgroup of Str(A), called the inner structure group of A, which we will denote by Instr(A). The commutator subgroup Isom(A) of Str(A) is the full group of isometries of N and is a simple, simply connected group of type E6 , anisotropic over k if and only if N is anisotropic, if and only if A is a division algebra (see [39], [40]). Note that Aut(A) is the stabilizer of 1 โˆˆ A in Str(A). On occasions, we will need to treat an algebra X as an algebraic variety (particularly when dealing with R-equivalence etc.). In such a situation, if no confusion is likely, we shall continue to denote the underlying (affine) space by X. Morphisms X โ†’ Y or rational maps would carry similar meanings. Base change of an object X defined over a base field k to an extension L of k will be denoted by XL . We record the following observations with proofs : Proposition 2.1. Let A be an Albert division algebra over k. Then Aut(A), Str(A) and Isom(A) are split by a degree 6 extension of k. 7 R-triviality 1. A is a first construction if and only if A ( hence Aut(A) ) has a degree 3 splitting field and, A is a pure first construction if and only if every minimal splitting field of A is cubic cyclic. 2. A is a pure second construction if and only if A ( hence Aut(A) ) has no splitting field of degree 3 over k. Proof. Write A as a second construction A = J(B, ฯƒ, u, ยต) for suitable parameters as decribed in the preliminaries. If A is a first construction, any cubic subfield of A splits A (see [28], Thm. 4.7), hence splits Aut(A) and the statement follows. Let K be the center of B, which must be a quadratic field extension of k if A is not a first construction. Base changing to K we have A โŠ— K โˆผ = J(B, ยต). By the argument presented, there is a cubic extension L of K that splits A โŠ— K. Hence A is split by the degree 6 extension LK of k. To prove (1), note that if A is a first construction, A has a cubic splitting field. Conversely, if A has a degree 3 splitting field L over k, then the invariant f3 (A) โˆˆ H 3 (k, Z/2) vanishes over L and hence over k by Springerโ€™s theorem. Hence f3 (A) = 0 and A is a first construction ([21], 40.5). The assertion about pure first construction follows from ([44], Thm. 2.1). Proof of (2) follows from (1). Proposition 2.2. Let A be an Albert division algebra over k. Then A is a first Tits construction if and only if Str(A) (equivalently Isom(A)) is split by a cubic extension of k. Proof. First assume that A is an Albert division algebra over k arising from a first Tits construction. Then A is split by any cubic extension L โŠ‚ A of k (see [28], Thm. 4.7) and hence, by ([40], Thm. 17.6.3), L also splits the structure group Str(A) of A. Conversely, if Str(A) splits over a cubic extension L of k, then, by ([40], Thm. 17.6.5), the Albert algebra A is reduced over L. By ([40], Thm. 17.6.3), the stabilizer of 1 โˆˆ A โŠ—k L is the split group of type F4 over L and equals Aut(A โŠ—k L). Hence, by ([21], 40.5), Aut(A โŠ—k L) has its mod-2 invariant f3 (A โŠ—k L) = f3 (A) โŠ—k L = 0. It follows that the coordinatizing octonion algebra of A โŠ—k L is split over L. Hence, by Springerโ€™s theorem, f3 (A) = 0. Therefore A must be a first Tits construction over k ([21], 40.5). Strongly inner group of type E6 : Let H be a simple, simply connected algebraic group defined and strongly inner of type E6 over k (see [46] for definition). Then H is isomorphic to Isom(A), the (algebraic) group of all norm isometries of an Albert algebra A over k. Moreover, H is anisotropic if and only if A is a division algebra (see [40], Thm. 17.6.5). 78 : Let G be a simple, simply connected algebraic group with Groups with Tits index E8,2 78 over k. The index has associated diagram as below: Tits index E8,2 โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข The anisotropic kernel of such a group is a simple, simply connected, strongly inner group of type E6 and by ([51], [46]), can be realized as the group Isom(A) of norm isometries of an Albert division algebra A over k. Let ฮ“ denote the Tits building associated to G. Then ฮ“ is a Moufang hexagon associated to a hexagonal system of type 27/F , where F is a quadratic field extension K of k (this is when A is written as a second construction J(B, ฯƒ, u, ยต) with Z(B) = K) or F = k (when A is a first construction). The group G(k) is the group of โ€œlinearโ€ 78 as automorphisms of a automorphisms of ฮ“. The explicit realization of groups of type E8,2 Moufang hexagon as above is due to Tits and Weiss and is detailed in their monograph ([51]). 8 Maneesh Thakur 78 : Let H be a simple, simply connected algebraic group over Groups with Tits index E7,1 78 k with Tits index E7,1 over k. Then the anisotropic kernel of H is a simple, simply connected strongly inner group of type E6 and is isomorphic to Isom(A) for an Albert division algebra A over k (see [46]). The Tits index of H has associated diagram as below: โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข Following Max Koecher ([20]), one can realize H as follows: fix an Albert divsion algebra A over k. Let ฮž(A) be the (algebraic) group of birational transformations of A generated by the structure group Str(A) and the maps x 7โ†’ ta (x) = x + a ( a โˆˆ Ak ), x 7โ†’ j(x) = โˆ’xโˆ’1 (x โˆˆ Ak ). 78 and any algebraic group over k with this Tits index arises this way Then ฮž(A) has type E7,1 (see [46]). Any element of f โˆˆ ฮž(A) is of the form f = w โ—ฆ ta โ—ฆ j โ—ฆ tb โ—ฆ j โ—ฆ tc , w โˆˆ Str(A), a, b, c โˆˆ Ak . This was proved by Koecher when k is infinite and has characteristic 6= 2 and by O. Loos in arbitrary chatacteristics ([22]), in the context of Jordan pairs. Remark : In light of Proposition 2.1 and Proposition 2.2, the anisotropic kernel of a simple, 78 or E 78 , is split by a degree 6 simply connected group G defined over k, with Tits index E8,2 7,1 extension of k. We have 78 Corollary 2.1. Let G be a simple, simply connected algebraic group over k with index E8,2 78 or E7,1 , such that the anisotropic kernel H of G is split by a cubic extension of k. Then Hโˆผ = Isom(A) for an Albert division algebra A over k arising from the first Tits construction. Proof. This is immediate from Proposition 2.2 and the above discussion. R-equivalence in algebraic groups : Let X be an irreducible variety over a field k with X(k) nonempty. Following Manin ([23]) we define points x, y โˆˆ X(k) to be R-equivalent if there exists a sequence x0 = x, x1 , ยท ยท ยท , xn = y of points in X(k) and rational mape fi : A1k โ†’ X, 1 โ‰ค i โ‰ค n, defined over k and regular at 0 and 1, such that fi (0) = xiโˆ’1 , fi (1) = xi . When G is a connected algebraic group defined over k, the set of elements of G(k) which are R-equivalent to 1 โˆˆ G(k) is a normal subgroup RG(k) of G(k). The set G(k)/R of Requivalence classes in G(k) is in natural bijection with the quotient G(k)/RG(k) and therefore carries a natural group structure, and we identify G(k)/R with the group G(k)/RG(k). This group measures the obstruction to rational parameterizing of points of G(k). We say G is R-trivial if G(L)/R = {1} for all field extensions L of k. Recall that a variety X defined over k is said to be k-rational if X is birationally isomorphic over k to an affine space. It is well known (see [52], Chap. 6, Prop. 2) that if G is k-rational then G is R-trivial. Let G be a connected reductive group defined over k and assume G is k-isotropic, i.e., admits a k-embedding Gm ึ’โ†’ G such that the image is not contained in Z(G), the center of G. Let G(k)โ€  denote the subgroup of G(k) generated by the k-rational points of the unipotent radicals of the k-parabolic subgroups of G. Then G(k)โ€  is normal in G(k) and the quotient W (k, G) = G(k)/G(k)โ€  is the Whitehead group of G. R-triviality 9 By a theorem of Gille ([13], Thm. 7.2) if G is a semisimple, simply connected and absolutely almost simple group, defined and isotropic over k, then W (k, G) โˆผ = G(k)/R. The Kneser-Tits problem asks if for such a group G, its Whitehead group is trivial, or more generally, to compute the Whitehead group. In this paper, we prove 78 or Theorem 2.1. Let G be a simple, simply connected algebraic group over k of type E7,1 78 or strongly inner type E , whose anisotropic kernel is split by a cubic extension of k. E8,2 6 Then G is R-trivial. Corollary 2.2. Let G be a simple, simply connected algebraic group, defined and isotropic 78 or E 78 , and anisotropic kernel split by a cubic extension over a field k, with Tits index E8,2 7,1 of k. then the Kneser-Tits conjecture holds for G. Moreover, G(L) is projectively simple, for any field extension L or k. Corollary 2.3. Let G be a simple, simply connected algebraic group, defined and isotropic 78 or E 78 . Then there exists a quadratic field extension K over a field k, with Tits index E8,2 7,1 of k such that G is R-trivial over K, i.e., for any extension F of K, G(F )/R = {1}. We will prove this result in steps. The key result in proving the above theorem is our Main theorem: Theorem 2.2. Let A be an Albert division algebra over k arising from the first Tits construction. Then Str(A) is R-trivial. Corollary 2.4. Tits-Weiss conjecture : Let A be an Albert division algebra arising from the first Tits construction. Then Str(A) = C.Instr(A), where C is the subgroup of Str(A) consisting of scalar homotheties Ra : A โ†’ A, a โˆˆ kโˆ— . 3 Automorphisms and R-triviality Let A be an Albert algebra over k and S a subalgebra of A. We will denote by Aut(A/S) the (closed) subgroup of Aut(A) consisting of automorphisms of A which fix S pointwise and Aut(A, S) will denote the closed subgroup of automorphisms of A stabilizing S. The group of k-rational points of these groups will be denoted by ordinary fonts, for example Aut(A) = Aut(A)(k) and so on. When A is a division algebra, any proper subalgebra S of A is either k or a cubic subfield or a 9-dimensional (degree 3) Jordan subalgebra, which is of the form D+ for a degree 3 central division algebra D over k or of the form (B, ฯƒ)+ for a central division algebra B of degree 3 over a quadratic extension K of k, with an involution ฯƒ of the second kind over K/k (cf. Thm. 1.1, [31]). We record below a description of some subgroups of Aut(A) which we shall use in the sequel, we refer to ([21], 39.B) and ([11]) for details. Proposition 3.1. Let A be an Albert algebra over k. 1. Suppose S = D+ โŠ‚ A for D a degree 3 central simple k-algebra. Write A = J(D, ยต) for some ยต โˆˆ kโˆ— . Then Aut(A/S) โˆผ = SL(1, D), the algebraic group of norm 1 elements in D. 2. Let S = (B, ฯƒ)+ โŠ‚ A for B a degree 3 central simple algebra of degree 3 over a quadratic extension K of k with an involution ฯƒ of the second kind over K/k. Write A = J(B, ฯƒ, u, ยต) for suitable parameters. Then Aut(A/S) โˆผ = SU(B, ฯƒu ), where ฯƒu := Int(u) โ—ฆ ฯƒ. 10 Maneesh Thakur In particular, the subgroups described in (1) and (2) are simply connected, simple of type A2 , defined over k and hence are rational, therefore are R-trivial. The last assertion is due to the fact that connected reductive groups of absolute rank at most 2 are rational (see [6]). For an algebraic group G defined over k, we denote the (normal) subgroup of elements in G(k) that are R-equivalent to 1 โˆˆ G(k) by R(G(k)). Extending automorphisms : Let A be an Albert (division) algebra and S โŠ‚ A a subalgebra. Then, under certain conditions, we can extend automorphisms of S to automorphisms of A (e.g. when S is nine dimensional, see [34], Thm. 3.1, [26], Thm. 5.2). We need certain explicit extensions for our results, we proceed to describe these (cf. [21], 39.B). We will need the following important result in the sequel frequently, so we record it below ([25] or [21], 40.13 and Lemma 5.4 of [26] for arbitrary characteristics): Lemma 3.1. Let (B, ฯƒ) be a degree 3 central simple algebra with center K, a quadratic eฬtale algebra and ฯƒ an involution of the second kind. Let w โˆˆ B โˆ— be such that ฮป := NB (w) satisfies ฮปฮป = 1. Then there exists q โˆˆ U (B, ฯƒ) such that ฮป = NB (q). First, let S be a 9-dimensional subalgebra of A. Then we may assume S = (B, ฯƒ)+ for a degree 3 central simple algebra with center K, a quadratic eฬtale extension of k (see [31]). We then have A โˆผ = J(B, ฯƒ, u, ยต) for suitable parameters. Recall that any automorphism of S is of the form x 7โ†’ pxpโˆ’1 with p โˆˆ Sim(B, ฯƒ), where Sim(B, ฯƒ) = {g โˆˆ B โˆ— |gฯƒ(g) โˆˆ kโˆ— }. This is immediate from the fact that any norm similarity of S is of the form x 7โ†’ ฮณgxฯƒ(g) for some ฮณ โˆˆ kโˆ— and g โˆˆ B โˆ— (see Thm. 5.12.1, [17]) and that among these, automorphisms are precisely the norm similarities that fix the identity element of S (see [18], Thm. 4). Recall the notation ฯƒu := Int(u) โ—ฆ ฯƒ. We have, Proposition 3.2. Let A = J(B, ฯƒ, u, ยต) be an Albert algebra over k, S := (B, ฯƒ)+ and K = Z(B) be as above. Let ฯ† โˆˆ Aut(S) be given by ฯ†(x) = gxg โˆ’1 for g โˆˆ Sim(B, ฯƒ) with gฯƒ(g) = ฮป โˆˆ kโˆ— and ฮฝ := NB (g) โˆˆ K โˆ— . Let q โˆˆ U (B, ฯƒu ) be arbitrary with NB (q) = ฮฝฬ„ โˆ’1 ฮฝ. Then the map ฯ†e : A โ†’ A, given by (a, b) 7โ†’ (gag โˆ’1 , ฮปโˆ’1 ฯƒ(g)# bq), is an automorphism of A extending ฯ†. Proof. To show ฯ†e is an automorphism, we first note that ฯ†e is a k-linear bijection. Hence, e by ([24], Page 507), it suffices to check ฯ†(1) = 1 and ฯ†e preserves norms. The first condition is obvious. Let us verify the second. We first note some formulae which will be used in the computation below: NB (ฯƒ(g)) = ฮฝ, NB (g# ) = NB (g)2 = ฮฝ 2 , NB (ฯƒ(g)# ) = ฮฝ 2 , NB (gฯƒ(g)) = ฮฝฮฝ = ฮป3 , NB (g) = gg # = ฮฝ, ฮป2 = (gฯƒ(g))# = ฯƒ(g)# g # , NB (q) = ฮฝ โˆ’1 ฮฝ. Also, since q โˆˆ U (B, ฯƒu ), we have 1 = qฯƒu (q) = quฯƒ(q)uโˆ’1 , qu = uฯƒ(q)โˆ’1 . Now, for (a, b) โˆˆ A, we compute using the above formulae, e b)) = N ((gag โˆ’1 , ฮปโˆ’1 ฯƒ(g)# bq)) N (ฯ†(a, 11 R-triviality = NB (gag โˆ’1 )+TK (ยตNB (ฮปโˆ’1 ฯƒ(g)# bq))โˆ’TB (gag โˆ’1 (ฮปโˆ’1 ฯƒ(g)# bq)uฯƒ(ฮปโˆ’1 ฯƒ(g)# bq)) = NB (a)+TK (ยตฮปโˆ’3 ฮฝฬ„ 2 NB (b)NB (q))โˆ’TB (gag โˆ’1 (ฮปโˆ’1 ฯƒ(g)# bq)u(ฯƒ(q)ฯƒ(b)g# ฮปโˆ’1 )) = NB (a)+TK (ยต(ฮฝ ฮฝฬ„)โˆ’1 ฮฝฬ„ 2 NB (b)ฮฝฬ„ โˆ’1 ฮฝ)โˆ’TB (gag โˆ’1 ฮปโˆ’1 ฮป2 (g # )โˆ’1 bquฯƒ(q)ฯƒ(b)ฮฝgโˆ’1 ฮปโˆ’1 ) = NB (a)+TK (ยตNB (b))โˆ’TB (gag โˆ’1 gฮฝ โˆ’1 bquฯƒ(q)ฯƒ(b)ฮฝgโˆ’1 ) = NB (a)+TK (ยตNB (b))โˆ’TB (abuฯƒ(b)) = N ((a, b)). Hence ฯ†e is an automorphism of A extending ฯ†. Corollary 3.1. Let A = J(D, ยต) be an Albert algebra, which is a first construction. Let ฯ† โˆˆ Aut(D+ ) be given by ฯ†(x) = gxg โˆ’1 for g โˆˆ D โˆ— and x โˆˆ D+ . Then the map (x, y, z) 7โ†’ (gxg โˆ’1 , gyhโˆ’1 , hzgโˆ’1 ), for any h โˆˆ D โˆ— with ND (g) = ND (h), is an automorphism of A extending ฯ†. Proof. We identify A = J(D, ยต) with the second construction J(D ร— D โ—ฆ , วซ, 1, (ยต, ยตโˆ’1 )), where วซ is the switch involution on B = D ร— D โ—ฆ and apply the proposition. Note that, for g โˆˆ Sim(B, ฯƒ), the extension ฯ†e of ฯ† as constructed above, can be simplified as follows: let p = ฮปฮฝ โˆ’1 g, where gฯƒ(g) = ฮป โˆˆ kโˆ— and ฮฝ = NB (g) โˆˆ K โˆ— . Then ฮป3 = ฮฝ ฮฝฬ„ and p โˆˆ U (B, ฯƒ), since pฯƒ(p) = ฮปฮฝ โˆ’1 gฮปฮฝฬ„ โˆ’1 ฯƒ(g) = ฮป2 (ฮฝ ฮฝฬ„)โˆ’1 (gฯƒ(g)) = ฮป3 ฮปโˆ’3 = 1. e using gฯƒ(g) = ฮป, ฯƒ(g# )g# = ฮป2 , gg# = ฮฝ, becomes, Hence the expression for ฯ†, e b) = (gag โˆ’1 , ฮปโˆ’1 ฯƒ(g# )bq) ฯ†(a, = (ฮปฮฝ โˆ’1 gaฮปโˆ’1 ฮฝgโˆ’1 , ฮปโˆ’1 ฮฝฬ„ฯƒ(g)โˆ’1 bq) = (papโˆ’1 , ฯƒ(ฮปโˆ’1 ฮฝg โˆ’1 )bq) = (papโˆ’1 , ฯƒ(p)โˆ’1 bq) = (papโˆ’1 , pbq). We have, Proposition 3.3. Let A = J(B, ฯƒ, u, ยต) be an Albert algebra and S := (B, ฯƒ)+ โŠ‚ A and K = Z(B), a quadratic eฬtale extension of k. Then any automorphism of A stabilizing S is of the form (a, b) 7โ†’ (papโˆ’1 , pbq) for p โˆˆ U (B, ฯƒ) and q โˆˆ U (B, ฯƒu ) with NB (p)NB (q) = 1. We have Aut(A, (B, ฯƒ)+ ) โˆผ = [U (B, ฯƒ) ร— U (B, ฯƒu )]det /K (1) , where [U (B, ฯƒ) ร— U (B, ฯƒu )]det := {(p, q) โˆˆ U (B, ฯƒ) ร— U (B, ฯƒu )|NB (p) = NB (q)}, and K (1) denotes the group of norm 1 elements in K, embedded diagonally. Proof. Let ฯ† โˆˆ Aut(A, S) and let ฮท := ฯ†|S โˆˆ Aut(S). Then ฮท(a) = gag โˆ’1 for some g โˆˆ Sim(B, ฯƒ). Let ฮป := gฯƒ(g) โˆˆ kโˆ— and ฮฝ := NB (g) โˆˆ K โˆ— . We extend ฮท to an automorphism ฮทe of A by the formula ฮทe(a, b) = (papโˆ’1 , pbq โ€ฒ ), 12 Maneesh Thakur where p = ฮปฮฝ โˆ’1 g and q โ€ฒ โˆˆ U (B, ฯƒu ) is arbitrary with NB (q โ€ฒ )NB (p) = 1. Then p โˆˆ U (B, ฯƒ) as discussed above and the automorphism ฮทeโˆ’1 ฯ† of A fixes S = (B, ฯƒ)+ pointwise. Hence, by ([21], 39.16), ฮทeโˆ’1 ฯ†(a, b) = (a, bq โ€ฒโ€ฒ ) for some q โ€ฒโ€ฒ โˆˆ SU (B, ฯƒu ). Therefore we get ฯ†(a, b) = ฮทe(a, bq โ€ฒโ€ฒ ) = (papโˆ’1 , pbq โ€ฒโ€ฒ q โ€ฒ ). We set q = q โ€ฒโ€ฒ q โ€ฒ โˆˆ U (B, ฯƒu ) and the proof of the first assertion is complete. Now, if q โˆˆ U (B, ฯƒu ) is arbitrary, with NB (q) = ฮฝ โˆˆ K โˆ— . Then ฮฝฮฝ = 1. Hence, by Lemma 3.1, there exists p โˆˆ U (B, ฯƒ) with NB (p) = ฮฝ โˆ’1 . Then, by the computations done before, it follows that (b, x) 7โ†’ (pbpโˆ’1 , pxq) is an automorphism of A stabilizing (B, ฯƒ)+ . Hence any automorphism ฯ† of A which stabilizes (B, ฯƒ)+ is precisely of the form (b, x) 7โ†’ (pbpโˆ’1 , pxq) for some p โˆˆ U (B, ฯƒ), q โˆˆ U (B, ฯƒu ) with NB (p)NB (q) = 1. The map f : [U (B, ฯƒ) ร— U (B, ฯƒu )]det โ†’ Aut(A, (B, ฯƒ)+ ) given by (p, q) 7โ†’ [(b, x) 7โ†’ (pbpโˆ’1 , pxq โˆ’1 )] is a surjective homomorphism with ker(f ) = {(p, p)|p โˆˆ K (1) } โˆผ = K (1) , inducing the required isomorphism between the two groups. Corollary 3.2. Let A = J(D, ยต) be a first Tits construction Albert algebra. Then any automorphism of A stabilizing D+ โŠ‚ A is of the form (x, y, z) 7โ†’ (gxg โˆ’1 , gyhโˆ’1 , hzgโˆ’1 ), where g, h โˆˆ D โˆ— and ND (h) = ND (g). Proof. As before, we identify A = J(D, ยต) with a second Tits construction J(Dร—D โ—ฆ , วซ, 1, (ยต, ยตโˆ’1 )) and apply the proposition. 4 Norm similarities and R-triviality In the last section, we extended automorphisms of a 9-dimensional subalgebra of an Albert algebra to an automorphism of the Albert algebra. In this section, we analyse norm similarities of an Albert algebra A in the same spirit, study rationality and R-triviality properties of some subgroups of Str(A). First we make some simple observations. Since any norm similarity of A fixing the identity element 1 of A is necessarily an automorphism of A, it follows that for any k-subalgebra S โŠ‚ A the subgroup Str(A/S) of all norm similarities that fix S pointwise, is equal to the subgroup Aut(A/S) of Aut(A), i.e., Str(A/S) =Aut(A/S). Recall that we denote the (normal) subgroup of Str(A) generated by the U -operators of A, by Instr(A). We will now prove some results on norm similarities that will be needed in the paper. We begin with Theorem 4.1. Let A be any Albert algebra. Then Instr(A) โŠ‚ R(Str(A)(k)). Proof. Let ฯˆ โˆˆ Instr(A). Then ฯˆ = Ua Ub Uc ยท ยท ยท with a, b, c, ยท ยท ยท โˆˆ A. Let, for t โˆˆ A1k , at := (1 โˆ’ t)a + t โˆˆ Ak , similarly bt , ct , ยท ยท ยท be defined. Let ฮธ : A1k โ†’Str(A) be defined by ฮธ(t) = Uat Ubt Uct ยท ยท ยท Then ฮธ is a rational map defined over k, with domain the (open) subset of A1k consisting of t such that at , bt , ct , ยท ยท ยท are invertible elements of Akฬ„ . Clearly ฮธ is regular and defined at 0 and 1 and ฮธ(t) โˆˆ Str(A) with ฮธ(0) = ฯˆ, ฮธ(1) = 1. Hence the assertion is proved. R-triviality 13 The theorem below is a generalization of Corollary 4.2 of ([44]) over a field k of arbitrary characteristic : Theorem 4.2. Let A be an Albert division algebra over k and ฯ† โˆˆ Aut(A) an automorphism of A. Then ฯ† fixes a cubic subfield of A pointwise. Proof. Let Aฯ† denote the subalgebra of fixed points of ฯ†. In light of the fact that proper subalgebras of an Albert division algebras are of dimension 1, 3 or 9, and that Dimk (Aฯ† ) is invariant under base change, we may work with Ak . Since the eigenvalues of ฯ† are the same as the eigenvalues of its semisimple part, we may further assume ฯ† is semisimple. Let T be a maximal torus containing ฯ†. By (Theorem 3, [9]), the group of all automorphisms of Ak fixing a primitive idempotent is isomorphic to Spin(9). We can conjugate T to a maximal torus in Spin(9) (over k) to conclude that T fixes a vector w, w โˆˆ / k. Hence ฯ† fixes some v โˆˆ A, v โˆˆ / k. Then v generates a cubic subfield L of A and ฯ† fixes L pointwise. The following theorem is a generalization of Theorem 5.3 of ([44]) to arbitrary characteristics : Theorem 4.3. Let A be a first Tits construction Albert division algebra over k. Let ฯ† โˆˆ Aut(A) be such that ฯ† fixes a cubic cyclic subfield of A pointwise. Then ฯ† is a product of two automorphisms, each stabilizing a 9-dimensional subalgebra of A. Proof. The proof goes along the exact lines of the proof given in ([44]), except that we use Theorem 4.2 above in place of (Corollary 4.2, [44]). We have the following corollary to the above, with proof exactly as in ([44], Cor. 5.1), we will use this in the paper for k of arbitrary characteristics: Corollary 4.1. Let A be a first Tits construction Albert division algebra over k and ฯ† โˆˆ Aut(A) be such that ฯ†(L) = L for a cubic cyclic subfield L โŠ‚ A. Then ฯ† is a product of three automorphisms of A, each stabilizing a 9-dimensional subalgebra of A. The following result is a generalization of Theorem 5.10 of ([44]), for arbitrary characteristics : Theorem 4.4. Let A be an Albert division algebra arising from the first Tits construction. Let L โŠ‚ A be a cubic cyclic subfield. Then Str(A, L) โŠ‚ C.Instr(A).H, where H denotes the subgroup of Aut(A) generated by automorphisms stabilizing 9-dimensional subalgebras of A and C is the group of all scalar homotheties in Str(A) . Proof. The proof goes along the exact lines of the proof of Thm 5.10 in ([44]), except that we use Corollary 4.1 above instead of (Cor.5.1, [44]). Extending norm similarities : Let A be an Albert (division) algebra and S a 9-dimensional subalgebra of A. Given an element ฯˆ โˆˆ Str(S), we wish to extend it to an element of Str(A). Though this can be achieved using a recent result of Garibaldi-Petersson ([15], Prop. 7.2.4), we need certain explicit extension for the purpose of proving R-triviality of the algebraic groups described in the introduction, which we now proceed to describe. We have S โˆผ = (B, ฯƒ)+ for a suitable degree 3 central division algebra B over a quadratic extension K of k with an involution ฯƒ of the second kind. Therefore we have A โˆผ = J(B, ฯƒ, u, ยต) for suitable parameters. For our purpose, by conjugating with a suitable automprphism of 14 Maneesh Thakur A, we may assume S = (B, ฯƒ)+ , A = J(B, ฯƒ, u, ยต) and ฯˆ โˆˆ Str((B, ฯƒ)+ ). Let b0 = ฯˆ(1) and ฮป = NB (b0 ). By ([17], Chap.V, Thm. 5.12.10), Str((B, ฯƒ)+ ) consists of the maps x 7โ†’ ฮปaxฯƒ(a), x โˆˆ (B, ฯƒ)+ , a โˆˆ B โˆ— , ฮป โˆˆ kโˆ— . Hence there exists ฮณ โˆˆ kโˆ— and g โˆˆ B โˆ— such that ฯˆ(x) = ฮณgxฯƒ(g), โˆ€x โˆˆ S. Let ฮฝ := NB (g) โˆˆ K = Z(B) and let ฮด = NB (ฯƒu (g)โˆ’1 g) = NB (g) โˆ’1 NB (g) = ฮฝฬ„ โˆ’1 ฮฝ, where ฯƒu = Int(u) โ—ฆ ฯƒ. Then ฮดฮดฬ„ = 1. By Lemma 3.1, there exists q โˆˆ U (B, ฯƒu ) such that ฮด = NB (q). Define ฯˆe : A โ†’ A by setting e ฯˆ((b, x)) = ฮณ(gbฯƒ(g), ฯƒ(g)# xq). (โˆ—) e Clearly ฯˆ((b, 0)) = (ฯˆ(b), 0). Hence ฯˆe is an extension of ฯˆ to A and is clearly a k-linear bijective endomorphism of A. We now compute e N (ฯˆ((b, x))) = ฮณ 3 N ((gbฯƒ(g), ฯƒ(g)# xq)) 2 = ฮณ 3 [NB (g)NB (g)NB (b) + TK (ยตNB (g) NB (x)NB (q)) โˆ’TB (gbฯƒ(b)ฯƒ(g)# xquฯƒ(q)ฯƒ(x)g # )]. โˆ’1 Now substituting N (q) = NB (g) NB (g), ฮฝ = NB (g) = gg # and qu = uฯƒ(q)โˆ’1 using qฯƒu (q) = 1 = quฯƒ(q)uโˆ’1 in the RHS of the above equation and simplifying, we get e N (ฯˆ((b, x))) = ฮณ 3 ฮฝ ฮฝฬ„N ((b, x)). Therefore ฯˆe โˆˆ Str(A, S). We have proved Theorem 4.5. Let A be an Albert division algebra over k and S โŠ‚ A be a 9-dimensional subalgebra. Then every element ฯˆ โˆˆ Str(S) admits an extension ฯˆe โˆˆ Str(A). Let S = (B, ฯƒ)+ and A = J(B, ฯƒ, u, ยต) for suitable parameters. Let ฯˆ โˆˆ Str(S) be given by b 7โ†’ ฮณgbฯƒ(g) for b โˆˆ (B, ฯƒ)+ , g โˆˆ B โˆ— and ฮณ โˆˆ kโˆ— . Then for any q โˆˆ U (B, ฯƒu ) with NB (q) = NB (ฯƒ(g)โˆ’1 g), the map ฯˆe given by e ฯˆ((b, x)) = ฮณ(gbฯƒ(g), ฯƒ(g)# xq), is a norm similarity of A extending ฯˆ. Corollary 4.2. Let A = J(D, ยต) be a first construction Albert algebra. Let ฯˆ โˆˆ Str(D+ ) be given by x 7โ†’ ฮณaxb for ฮณ โˆˆ kโˆ— and a, b โˆˆ D โˆ— . Then the map ฯˆe : A โ†’ A given by (x, y, z) 7โ†’ ฮณ(axb, b# yc, cโˆ’1 za# ), where b, c โˆˆ D โˆ— are such that ND (a) = ND (b)ND (c), is a norm similarity of A extending ฯˆ. 15 R-triviality Now, let ฮท โˆˆ Str(A, S) be arbitrary and let ฯ† := ฮท|S. We extend ฯ† to an element ฯ†e โˆˆ Str(A) according to (โˆ—). Then we have ฯ†eโˆ’1 โ—ฆ ฮท โˆˆ Str(A/S) = Aut(A/S) โˆผ = SU (B, ฯƒu ). Hence there exists q โ€ฒ โˆˆ SU (B, ฯƒu ) such that ฯ†eโˆ’1 โ—ฆ ฮท((b, x)) = (b, xq โ€ฒ ) โˆ€b โˆˆ (B, ฯƒ)+ , x โˆˆ B. Write ฮธqโ€ฒ for the automorphism (b, x) 7โ†’ (b, xq โ€ฒ ). Then ฮท = ฯ†e โ—ฆ ฮธqโ€ฒ . Also, since ฮท((B, ฯƒ)+ ) = (B, ฯƒ)+ , there exists ฮณ โˆˆ kโˆ— and g โˆˆ B โˆ— , such that ฮท((b, 0)) = ฮณ(gbฯƒ(g), 0) โˆ€b โˆˆ (B, ฯƒ)+ . Therefore, we have ฮท((b, x)) = ฮณ(gbฯƒ(g), ฯƒ(g)# xq0 ) for all (b, x) โˆˆ A and some q0 โˆˆ U (B, ฯƒu ) with N (q0 ) = NB (ฯƒ(g)โˆ’1 g). We have therefore associated a triple (ฮณ, (g, q0 )) โˆˆ kโˆ— ร— B โˆ— ร— U (B, ฯƒu ) to ฮท โˆˆ Str(A, S) with ฮณ โˆˆ kโˆ— and g โˆˆ B โˆ— arbtrary and q0 โˆˆ U (B, ฯƒu ) with NB (q0 ) = NB (ฯƒ(g)โˆ’1 g). Conversely, for any triple (ฮณ, (g, q0 )) โˆˆ kโˆ— ร— B โˆ— ร— U (B, ฯƒu ) with ฮณ โˆˆ kโˆ— , g โˆˆ B โˆ— arbitrary and q0 โˆˆ U (B, ฯƒu ) such that NB (q0 ) = NB (ฯƒ(g)โˆ’1 g), we define ฮท : A โ†’ A by the formula (โˆ—) : ฮท((b, x)) = ฮณ(gbฯƒ(g), ฯƒ(g)# xq0 ). By a straight forward calculation exactly as above, it follows that N (ฮท((b, x))) = ฮณ 3 ฮฝ ฮฝฬ„N ((b, x)). Therefore ฮท โˆˆ Str(A, S). Hence we have proved Theorem 4.6. Let A = J(B, ฯƒ, u, ยต) be an Albert division algebra, written as a second Tits construction and S = (B, ฯƒ)+ . The group Str(A, S) consists of the maps (b, x) 7โ†’ ฮณ(gbฯƒ(b), ฯƒ(g)# xq) where ฮณ โˆˆ kโˆ— , g โˆˆ B โˆ— are arbitrary and q โˆˆ U (B, ฯƒu ) satisfies NB (q) = NB (ฯƒ(g)โˆ’1 g). We have, โˆ— โˆผ k ร— H0 , Str(A, (B, ฯƒ)+ ) = Kโˆ— where H0 = {(g, q) โˆˆ B โˆ— ร— U (B, ฯƒu )|NB (q)NB (ฯƒ(g)โˆ’1 g) = 1} and K โˆ— ึ’โ†’ kโˆ— ร— H0 via ฮฑ 7โ†’ (NK (ฮฑ)โˆ’1 , ฮฑ, ฮฑโˆ’1 ฮฑ). Proof. Only the last assertion needs to be proved. Let H0 = {(g, q) โˆˆ B โˆ— ร— U (B, ฯƒu )|NB (q)NB (ฯƒ(g)โˆ’1 g) = 1}. We define f : kโˆ— ร— H0 โ†’ Str(A, (B, ฯƒ)+ ) by (ฮณ, (g, q)) 7โ†’ [(b, x) 7โ†’ ฮณ.(gbฯƒ(g), ฯƒ(g)# xq โˆ’1 )]. Then, by our calculations before, f is a surjective homomorphism. We compute ker(f ). Let (ฮณ, (g, q)) โˆˆ Ker(f ). Then ฮณ(gbฯƒ(g), ฯƒ(g)# xq โˆ’1 ) = (b, x) โˆ€b โˆˆ (B, ฯƒ)+ , x โˆˆ B. (โˆ—โˆ—) 16 Maneesh Thakur Taking b = 1, x = 1 in the above relation gives ฮณgฯƒ(g) = 1, ฮณฯƒ(g)# q โˆ’1 = 1. (โˆ— โˆ— โˆ—) Now gฯƒ(g) = ฮณ โˆ’1 gives NB (g)NB (g) = ฮณ โˆ’3 and ฯƒ(g)# = ฮณ โˆ’2 (g# )โˆ’1 . Also gg # = NB (g) gives (g# )โˆ’1 = NB (g)โˆ’1 g. Therefore, we get from the above equation ฮณฯƒ(g)# = ฮณ(ฮณ โˆ’2 (g# )โˆ’1 ) = ฮณ โˆ’1 NB (g)โˆ’1 g = q, and thus g = ฮณNB (g)q and ฯƒ(g)# = ฮณ โˆ’1 q. Substituting this in (โˆ—โˆ—) we get ฮณ(ฮณNB (g)qbฯƒ(q)NB (g)ฮณ, ฮณ โˆ’1 qxq โˆ’1 ) = (b, x) โˆ€b โˆˆ (B, ฯƒ)+ , x โˆˆ B. This gives, using NB (g)NB (g) = ฮณ โˆ’3 , (qbq โˆ’1 , qxq โˆ’1 ) = (b, x) โˆ€b โˆˆ (B, ฯƒ)+ , x โˆˆ B. Hence q โˆˆ K โˆ— โˆฉ U (B, ฯƒu ) = K (1) . Thus g = ฮณNB (g)q โˆˆ K โˆ— and, by (โˆ— โˆ— โˆ—), NK (g) = gฯƒ(g) = ฮณ โˆ’1 . Therefore, q = ฮณ โˆ’1 NB (g)โˆ’1 g = ฮณ โˆ’1 g โˆ’3 g = ฮณ โˆ’1 g โˆ’2 = ฯƒ(g)ggโˆ’2 = ฯƒ(g)g โˆ’1 . Hence (ฮณ, g, q) = (NK (g)โˆ’1 , g, ฯƒ(g)gโˆ’1 ). This shows ker(f ) = {(NK (ฮฑ)โˆ’1 , ฮฑ, ฮฑโˆ’1 ฮฑ)|ฮฑ โˆˆ K โˆ— }, and the proof is complete. Corollary 4.3. Let A = J(D, ยต) be a first construction Albert algebra. Then the group Str(A, D+ ) consists of the maps (x, y, z) 7โ†’ ฮณ(axb, b# yc, cโˆ’1 za# ), where a, b, c โˆˆ D โˆ— , ฮณ โˆˆ kโˆ— and ND (a) = ND (b)ND (c). 5 R-triviality results In this section, we proceed to develop our results on R-triviality of various groups and also prove our main theorem. We need a version of a theorem of Yanchevskii ([21], 17.25) for degree 3 division algebras in arbitrary characteristics, which we prove now: Proposition 5.1. Let (B, ฯƒ) be a degree 3 central division algebra over its center K, a quadratic eฬtale extension of k, with ฯƒ an involution of the second kind. Then every nonzero element g โˆˆ B admits a factorization g = zs with s โˆˆ (B, ฯƒ)+ and z โˆˆ B โˆ— is such that zฯƒ(z) = ฯƒ(z)z. Proof. We may assume characteristic of k is 2, the proof when characteristic is not 2 is as in ([21], 17.25). Then (B, ฯƒ)+ = Sym(B, ฯƒ) = Skew(B, ฯƒ) and Dimk (Sym(B, ฯƒ)) = 9. Since ฯƒ restricts to the nontrivial k-automorphism of K, K 6โŠ‚ Sym(B, ฯƒ). Hence Dimk (K + Sym(B, ฯƒ)) = 10. Also g โˆˆ B โˆ— , hence Dimk (g.Sym(B, ฯƒ)) = Dimk (Sym(B, ฯƒ)) = 9. 17 R-triviality Hence g.Sym(B, ฯƒ) โˆฉ (K + Sym(B, ฯƒ)) 6= 0. Thus we can find s0 โˆˆ Sym(B, ฯƒ) โˆ’ {0}, ฮป โˆˆ K and z0 โˆˆ Sym(B, ฯƒ) such that gs0 = ฮป + z0 . Let z := ฮป + z0 . Then z โˆˆ B โˆ— and zฯƒ(z) = (ฮป + z0 )(ฯƒ(ฮป) + z0 ) = (ฯƒ(ฮป) + z0 )(ฮป + z0 ) = ฯƒ(z)z. Moreover, g.s0 = z implies g = z.(s0 )โˆ’1 . Hence we have the required factorization g = zs for s = sโˆ’1 0 . We now have Theorem 5.1. Let A be an Albert (division) algebra. Let S โŠ‚ A be a 9-dimensional subalgebra. Then, with the notations as above, Str(A, S) is R-trivial. Proof. Let ฯˆ โˆˆ Str(A, S). Since Dim(S) = 9, S โˆผ = (B, ฯƒ)+ for a suitable degree 3 central simple algebra over a quadratic eฬtale extension K of k, with an involution ฯƒ of the second kind. Conjugating by a suitable automorphism of A, we may assume S = (B, ฯƒ)+ and A = J(B, ฯƒ, u, ยต) for suitable parameters. Let H0 = {(g, q) โˆˆ B โˆ— ร— U (B, ฯƒu )|NB (ฯƒ(g)โˆ’1 g) = NB (q)}. Clearly H0 is a subgroup of B โˆ— ร—U (B, ฯƒu ). Then, by Theorem 4.6, ฯˆ((b, x)) = ฮณ(gbฯƒ(g), ฯƒ(g)# xq) for ฮณ โˆˆ kโˆ— and (g, q) โˆˆ H0 . By Proposition 5.1, we can write g = zs with s, z โˆˆ B โˆ— satisfying โˆ’1 ฯƒu (z)z = zฯƒu (z), ฯƒu (s) = s. Then, since NB (ฯƒ(s)โˆ’1 s) = NB (s) NB (s) = 1, it follows that (s, 1) โˆˆ H0 . Since the scalar homotheties in Str(A, S) constitute a 1 dimensional k-split torus, by ([52], ยง16, Prop. 2, 16.2, Prop. 3), scalar multiplications over k are in R(Str(A, S)(k)). Hence we may assume ฯˆ((b, x)) = (gbฯƒ(g), ฯƒ(g)# xq). Now, using g = zs as above (with ฯƒu (s) = s, ฯƒu (z)z = zฯƒu (z)) and that (s, 1) โˆˆ H0 , writing ฮธ for the norm similarity (b, x) 7โ†’ (sbฯƒ(s), ฯƒ(s)# x), we have ฯˆ = ฯˆ โ€ฒ โ—ฆ ฮธ, where ฯˆ โ€ฒ โˆˆ Str(A, S) with ฯˆ โ€ฒ ((b, x)) := (zbฯƒ(z), ฯƒ(z)# xq), ฯƒu (z)z = zฯƒu (z) and (z, q) โˆˆ H0 . Claim : ฮธ โˆˆ R(Str(A, S)(k)). To see this, define st := (1 โˆ’ t)s + t โˆˆ Bk and let ฮป : A1k โ†’ Str(A, S) be defined by ฮป(t)((b, x)) = (st bฯƒ(st ), ฯƒ(st )# x), (b, x) โˆˆ Ak = J(Bk , ฯƒ, u, ยต) = (Bk , ฯƒ)+ โŠ• Bk . Then ฮป is a rational map, defined over k, regular at 0 and 1 and ฮป(0) = ฮธ, ฮป(1) = 1 in Str(A, S). This settles the claim. Hence it only remains to show that ฯˆ โ€ฒ โˆˆ R(Str(A, S)(k)). For this, observe that p := ฯƒu (z)โˆ’1 z โˆˆ U (B, ฯƒu ) since zฯƒu (z) = ฯƒu (z)z. We have, NB (p) = NB (z) โˆ’1 โˆ’1 NB (z) = NB (gsโˆ’1 ) NB (gsโˆ’1 ) = NB (ฯƒ(g)โˆ’1 g) = NB (q). Hence q = pq โ€ฒ for some q โ€ฒ โˆˆ SU (B, ฯƒu ). We therefore have (z, q) = (z, pq โ€ฒ ) โˆˆ H0 for some q โ€ฒ โˆˆ SU (B, ฯƒu ). Hence (z, q) = (z, p)(1, q โ€ฒ ) and (1, q โ€ฒ ) โˆˆ H0 . Also SU(B, ฯƒu ) โŠ‚ Str(A, S) via ฮท 7โ†’ [(b, x) 7โ†’ (b, xฮท)], ฮท โˆˆ SU(B, ฯƒu ). By ([6]), SU(B, ฯƒu ) is rational, hence R-trivial. Hence the automorphism ฯˆ0โ€ฒ : (b, x) 7โ†’ (b, xq โ€ฒ ) belongs to R(Str(A, S)(k)). Let ฯˆ0 โˆˆ Str(A, S) be defined by ฯˆ0 (b, x) := (zbฯƒ(z), ฯƒ(z)# xp). Then ฯˆ โ€ฒ = ฯˆ0โ€ฒ โ—ฆ ฯˆ0 . Claim : ฯˆ0 โˆˆ R(Str(A, S)(k)). To see this, define zt = (1 โˆ’ t)z + t โˆˆ Bk . Then ฯƒu (zt )zt = zt ฯƒu (zt ). Let qt = ฯƒu (zt )โˆ’1 zt whenever zt โˆˆ Bkโˆ— . Then qt โˆˆ U(B, ฯƒu ) and the map f : A1k โ†’ Str(A, S), f (t)((b, x)) = (zt bฯƒ(zt ), ฯƒ(zt )# xqt ) 18 Maneesh Thakur is defined on an open subset of A1k , is a rational map and f (t) โˆˆ Str(A, S) corresponds to (zt , qt ) โˆˆ H0 . In particular, f (0) corresponds to the pair (z0 , q0 ) = (z, p), hence f (0) = ฯˆ0 . Now f (1) corresponds to (z1 , q1 ) = (1, q1 ) โˆˆ H0 . But q1 = ฯƒu (z1 )โˆ’1 z1 = 1 since z1 = 1. Hence f (1) = 1 โˆˆ Str(A, S). This settles the claim and the proof of the theorem is complete. Corollary 5.1. Let A be an Albert (division) algebra and S a 9-dimensional subalgebra of A. Then Aut(A, S) โŠ‚ R(Str(A)(k)). We now can prove Theorem 5.2. Let A be a first Tits construction Albert division algebra and L โŠ‚ A a cubic cyclic subfield. Then Str(A, L) โŠ‚ R(Str(A)(k)). Proof. By Theorem 4.4, Str(A, L) โŠ‚ C.Instr(A).H. By Theorem 4.1 it follows that C.Instr(A) โŠ‚ R(Str(A)(k)), where C is the subgroup of Str(A) consisting of scalar homotheties and H is the subgroup of Aut(A) generated by all automorphisms stabilizing 9-dimensional subalgebras of A. So it suffices to prove H โŠ‚ R(Str(A)(k)). Any element of H is a product of automorphisms, each stabilizing some 9-dimensional subalgebra of A. Let h โˆˆ H and write h = h1 h2 ยท ยท ยท hr with hi โˆˆ Aut(A, Si ), Si a 9-dimensional subalgebra of A. But by the above theorem Aut(A, Si ) โŠ‚ Str(A, Si ) โŠ‚ R(Str(A)(k)). Hence h โˆˆ R(Str(A)(k)) and the proof is complete. Corollary 5.2. Assume that A is a first Tits construction and L โŠ‚ A a cyclic cubic subfield. Then Aut(A, L) โŠ‚ R(Str(A)(k)). Proof. We have Aut(A, L) โŠ‚ Str(A, L), hence the result follows from Theorem 5.2. Theorem 5.3. Let A be an Albert division algebra, arising from the first Tits construction. Then Aut(A) โŠ‚ R(Str(A)(k)). Proof. Fix a cubic cyclic extension E โŠ‚ A, which is possible by ([29]). Let ฯ† โˆˆ Aut(A). If ฯ†(E) = E, then ฯ† โˆˆ Aut(A, E) and by Theorem 5.2, ฯ† โˆˆ R(Str(A)(k)). So we may assume F := ฯ†(E) 6= E. Let S be the subalgebra of A generated by E and F . Then (cf. [31], Thm. 1.1), S is 9-dimensional. Hence S = (B, ฯƒ)+ for a degree 3 central simple algebra B over a quadratic eฬtale extension K of k, with an involution of the second kind over K. Hence we may write A = J(B, ฯƒ, u, ยต) for suitable parameters. If Z(B) = K = k ร—k, then we have (B, ฯƒ)+ = D+ for a degree 3 central division algebra D over k, and A = J(D, ยต0 ) for some ยต0 โˆˆ kโˆ— . Then, by the classical Skolem-Noether theorem, ฯ†|E : E โ†’ F extends to an automorphism of D+ and hence, by Corollary 3.1, to an automorphism ฮธ of A, ฮธ(D+ ) = D+ and ฮธ|E = ฯ†|E. Hence ฯˆ := ฯ†โˆ’1 โ—ฆ ฮธ fixes E pointwise. By Corollary 5.2, ฯˆ โˆˆ Aut(A, E) โŠ‚ R(Str(A)(k)). Also, ฮธ โˆˆ Aut(A, D+ ). Hence by Corollary 5.1, ฮธ โˆˆ Aut(A, D+ ) โŠ‚ R(Str(A)(k)). It follows that ฯ† โˆˆ R(Str(A)(k)). So now we assume K is a field. First extend ฯ†|E to ฯ†โ€ฒ : EK โ†’ F K โŠ‚ B to a K-linear isomorphism. By Skolem-Noether theorem, there exists g โˆˆ B โˆ— such that ฯ†โ€ฒ = Int(g) : EK โ†’ F K. Since ฯ†(E) = F , it follows that Int(g)(E) = F = ฯ†(E) โŠ‚ (B, ฯƒ)+ . Therefore ฯƒ(gxg โˆ’1 ) = gxg โˆ’1 โˆ€x โˆˆ E. This yields ฯƒ(g)โˆ’1 xฯƒ(g) = gxg โˆ’1 โˆ€x โˆˆ E. 19 R-triviality Hence ฯƒ(g)g centralizes E and hence EK in B. Since EK is maximal commutative in B, it follows that ฯƒ(g)g โˆˆ EK. Also ฯƒ(g)g โˆˆ (B, ฯƒ)+ . Hence ฯƒ(g)g โˆˆ E. Similarly, it follows that gฯƒ(g) โˆˆ F . Let e := ฯƒ(g)g โˆˆ E and f := gฯƒ(g) โˆˆ F . Define ฯˆ โˆˆ Str(S) by ฯˆ(x) = gxฯƒ(g), x โˆˆ S. Then for any x โˆˆ E we have xe โˆˆ E. Hence, ฯˆ(x) = gxฯƒ(g) = gxeg โˆ’1 = ฯ†(xe) โˆˆ ฯ†(E) = F. Therefore ฯˆ(E) = F and ฯˆ(1) = f โˆˆ F . Since A is a first Tits construction and F is cyclic, there is a degree 3 central division algebra D over k, such that F โŠ‚ D+ โŠ‚ A (see [28], Cor. 4.5). By ([44], Lemma 5.1), there exists ฯ‡ โˆˆ C.Instr(A) such that ฯ‡(f ) = 1, ฯ‡(D+ ) = D+ and ฯ‡(F ) = F . Hence ฯ‡ โ—ฆ ฯˆ(1) = 1. We extend ฯˆ to an element ฯˆe โˆˆ Str(A, S) by the formula in Theorem 4.5. Then ฯ‡ โ—ฆ ฯˆe โˆˆ e e Str(A) and ฯ‡ โ—ฆ ฯˆ(1) = 1. Hence ฯ‡ โ—ฆ ฯˆe โˆˆ Aut(A) with ฯ‡ โ—ฆ ฯˆ(E) = F . Therefore ฯ†โˆ’1 โ—ฆ ฯ‡ โ—ฆ ฯˆe โˆˆ โˆ’1 โˆ’1 e Aut(A) and ฯ† โ—ฆ ฯ‡ โ—ฆ ฯˆ(E) = E. Hence, by Theorem 5.2, ฯ† โ—ฆ ฯ‡ โ—ฆ ฯˆe โˆˆ R(Str(A)(k)). Also, ฯ‡ โˆˆ Str(A, D+ ), and ฯˆe โˆˆ Str(A, S). We have already shown in Theorem 5.1 that these are subgroups of R(Str(A)(k)). It now follows that ฯ† โˆˆ R(Str(A)(k)). Lemma 5.1. Let L be a cubic extension of k and ฮป โˆˆ kโˆ—. Let S denote the first Tits process J(L, ฮป) over k. Let a โˆˆ Lโˆ—. Define ฯ‡ โˆˆ Str(S) by ฯ‡ = RNL (a) U(0,0,1) U(0,NL (a)โˆ’1 ,0) . Then ฯ‡(a) = 1. Proof. The proof follows from a calculation exactly same as in the proof of (Lemma 5.1, [44]). We are now in a position to prove our main result: Theorem 5.4. Let A be an Albert division algebra arising from the first Tits construction. Then Str(A) is R-trivial. Proof. Let ฯˆ โˆˆ Str(A) and a := ฯˆ(1). If a โˆˆ k โˆ— , we have Ra โˆˆ R(Str(A)(k)) and Raโˆ’1 โ—ฆ ฯˆ(1) = 1. Hence, by Theorem 5.3, Raโˆ’1 โ—ฆ ฯˆ โˆˆ Aut(A) โŠ‚ R(Str(A)(k)). This implies ฯˆ โˆˆ R(Str(A)(k)). So we may assume a โˆˆ / kโˆ— . Then L := k(a) โŠ‚ A is a cubic separable subfield and, by ([28], Cor. 4.5), there is ฮป โˆˆ kโˆ— such that the Tits process S = J(L, ฮป) โŠ‚ A. Define ฯ‡ โˆˆ Str(S) by ฯ‡ = RN (a) U(0,0,1) U(0,N (a)โˆ’1 a,0) . By the above lemma ฯ‡(a) = 1. We now extend ฯ‡ to ฯ‡ e โˆˆ Str(A) using (โˆ—). Then ฯ‡ e(S) = S and hence by Theorem 5.1, ฯ‡ e โˆˆ R(Str(A)(k)). Also, ฯ‡ e โ—ฆ ฯˆ(1) = ฯ‡ e(a) = 1. Hence ฯ‡ e โ—ฆ ฯˆ โˆˆ Aut(A) โŠ‚ R(Str(A)(k)) and it follows that ฯˆ โˆˆ R(Str(A)(k)). Theorem 5.5. Let A be an Albert division algebra arising from the first Tits construction over a field k. Then Isom(A) is R-trivial. 20 Maneesh Thakur Proof. Let ฯˆ โˆˆ Isom(A) = Isom(A)(k) โŠ‚ Str(A) = Isom(A)(k). By Theorem 5.4, Str(A) is R-trivial. Let ฮธ : A1k โ†’ Str(A) be a rational map connecting ฯˆ to 1 in Str(A), ฮธ(0) = ฯˆ, ฮธ(1) = 1. Let ฯˆt := ฮธ(t), at := ฯˆt (1), ฮปt := N (at ). Let ฯ‡t := Rฮปโˆ’1 Uaโˆ’1 Uat ฯˆt . Then 0 t ฯ‡t (1) = โˆ’1 ฮปโˆ’1 t Ua0 Uat ฯˆt (1) = 3 ฮปโˆ’1 t Ua0 (at ). Since N (a0 ) = N (ฯˆ0 (1)) = N (ฯˆ(1)) = 1, we have 2 3 N (ฯ‡t (1)) = ฮปโˆ’3 t N (a0 ) N (at ) = 1, It follows that ฯ‡t โˆˆ Isom(A). Also, t 7โ†’ ฯ‡t is a rational map A1k โ†’ Isom(A). Now ฮป0 = N (ฯˆ0 (1)) = N (ฯˆ(1)) = 1 as ฯˆ is a norm isometry. Hence ฯ‡0 = Uaโˆ’1 Uฯˆ(1) ฯˆ0 = ฯˆ, 0 and ฯ‡1 = 1. This proves the assertion. 6 78 Tits-Weiss conjecture and E8,2 In this section, we will prove the Tits-Weiss conjecture for Albert division algebras that arise from the first Tits construction. Recall that in this paper, we denote by Str(A) the group Str(A)(k) of k-rational points of the algebraic group Str(A), the full group of norm similarities of A. We denote by Isom(A) the full group of norm isometries of A and Isom(A) := Isom(A)(k). By ([39], Thm. 7.3.2) Isom(A) is a connected, simple, simply connected algebraic group of type E6 defined over k. It follows that Isom(A) is the commutator subgroup of Str(A). Let C denote the subgroup of Str(A) consisting of all scalar homotheties Ra , a โˆˆ kโˆ— . Tits-Weiss conjecture : Let A be as above, then Str(A) = C.Instr(A). Str(A) = {1}. This is equivalent to the KneserEquivalently, the conjecture predicts that C.Instr(A) 78 Tits conjecture for groups of type E8,2 . 78 and G(k)โ€  Let G be a simple, simply connected group defined over k, with Tits index E8,2 be the subgroup of G(k) generated by the k-rational points of the unipotent radicals of G(k) parabolic k-subgroups of G. The Kneser-Tits conjecture for G predicts that G(k) โ€  = {1}. The (reductive) anisotropic kernel of G is the structure group Str(A) of a uniquely (upto isotopy) determined Albert division algebra A defined over k (see [46], 3.3.1). It is proved G(k) โˆผ Str(A) in ([51], 37.41, 42.3.6) that G(k) โ€  = C.Instr(A) . Hence, to prove the Tits-Weiss conjecture, we need to show the first quotient is trivial. By (Thm. 7.2, [13]), it suffices to prove G is R-trivial. In fact, it suffices to prove W (k, G) = G(k)/G(k)โ€  โˆผ = G(k)/R = {1}. Let S be a maximal k-split torus in G. By the Bruhat-Tits decomposition for G, it follows that there is a birational k-isomorphism G โˆผ = U ร— ZG (S) ร— U, where U is the unipotent radical of a minimal parabolic k-subgroup containing S. It is well known that the underlying variety of U is rational over k. Hence, by ([52], Prop. 1, ยง16), it follows that G(k) โˆผ ZG (S)(k) . = R R Again, by ([14], 1.2), ZG (S)(k) โˆผ ZG (S) (k)/R. = R S 21 R-triviality Hence, to prove the Tits-Weiss conjecture, it suffices to prove that the second quotient above is trivial. We now proceed to prove this. Note that H := ZG (S) is a connected reductive k-subgroup of G, is the reductive anisotropic kernel of G and its commutator subgroup Hโ€ฒ is simple k-anisotropic, strongly inner of type E6 . Hence, by ([46], 3.3), Hโ€ฒ = Isom(A). We first prove Lemma 6.1. The connected center of H equals S. Proof. We know that H is connected reductive and its connected center contains S. We have H = Hโ€ฒ .Z(H)โ—ฆ , an almost direct product of groups. Since Hโ€ฒ is simple of type E6 , Rank(Hโ€ฒ ) = 6. Let T be any maximal k-torus in Hโ€ฒ . The connected center Z(H)โ—ฆ of H is a torus Sโ€ฒ โŠƒ S and Sโ€ฒ โˆฉ T is finite. Hence T.Sโ€ฒ is a torus in H of dimension 6 + rank(Sโ€ฒ ) and rank(Sโ€ฒ ) โ‰ฅ 2. Therefore Rank(G) = 8 โ‰ฅ 6 + rank(Sโ€ฒ ). It follows that Sโ€ฒ = S. In light of this lemma, we have ZG (S) Hโ€ฒ S Hโ€ฒ (k)/R = (k)/R โˆผ (k)/R. = โ€ฒ S S H โˆฉS It is well known (see Thm. 7.3.2, [39]. Thm. 14.27, [41]) that for an Albert algebra A over k, Str(A) is a connected reductive group defined over k. We need information on its center: Lemma 6.2. Let A be an Albert algebra over k. Then the group Str(A) is connected reductive with center Gm . The commutator [Str(A), Str(A)] = Isom(A) and the sequence {1} โ†’ Isom(A) โ†’ Str(A) โ†’ Gm โ†’ {1} is exact, where Str(A) โ†’ Gm maps a norm similarity to its factor of similitude. Proof. That Str(A) is connected reductive is proved in (3.3.1, [46], [39]). Let ฯˆ โˆˆ Z(Str(A)). We choose two 9-dimensional degree 3 separable k-subalgebras of A, say S1 and S2 such that S1 โˆฉ S2 = k (see [35], Lemma 5.2). Let ฮธi โˆˆ Aut(A/Si ) be such that Aฮธi = Si . Then since ฯˆ commutes with ฮธi , i = 1, 2, ฯˆ must stabilize both S1 as well as S2 . Hence ฯˆ stabilizes S1 โˆฉ S2 = k. Thus a := ฯˆ(1) โˆˆ kโˆ— and ฯ† = Raโˆ’1 โ—ฆ ฯˆ โˆˆ Aut(A). Hence ฯ† โˆˆ Z(Aut(A)). But Aut(A) is a group of type F4 , hence has trivial center. It follows that ฯˆ = Ra . Hence Z(Str(A)) = Gm , the k-subgroup of Str(A) consisting of all scalar homotheties Ra , a โˆˆ Gm . The remaining assertions follow from ([39], Thm. 7.3.2) and ([41]. Thm. 14.27). Now we observe that maximal k-split tori in G are conjugate by G(k) and G โŠƒ Str(A) over k (see [51], 42.6). Hence we may assume that S โŠƒ Z(Str(A)). Denote by Z the center of Str(A). We have Str(A) = [Str(A), Str(A)].Z = Isom(A).Z. Since both S and Z are split over k, by ([1], 8.5. Corollary) we have a decomposition S = Z.Sโ€ฒ of k-tori, with Z โˆฉ Sโ€ฒ = {1}. Hence, since Hโ€ฒ = [Str(A), Str(A)] = Isom(A), we have Hโ€ฒ S = Hโ€ฒ Z.Sโ€ฒ = Isom(A)Z.Sโ€ฒ = Str(A).Sโ€ฒ . Also, since Z โˆฉ Sโ€ฒ = {1} and Sโ€ฒ โŠ‚ S = Z(H)โ—ฆ , it follows that Str(A) โˆฉ Sโ€ฒ = {1}. We therefore have ZG (S) Hโ€ฒ S โˆผ Str(A) ร— Sโ€ฒ โˆผ Str(A) = . = = S S Z ร— Sโ€ฒ Z 22 Maneesh Thakur Finally, by Hilbert Theorem-90, H 1 (k, Z) = {1}. Hence, it follows that Str(A) Str(A)(k) (k) โˆผ . = Z Z(k) We can now state and prove Theorem 6.1. Let G be a simple, simply connected algebraic group over k with Tits index 78 , whose anisotropic kernel is split by a cubic extension of k. Then G is R-trivial. E8,2 Proof. Let H denote the reductive anisotropic kernel of G as in the above discussion. Then, by Corollary 2.1, [H, H] = Isom(A) for an Albert division algebra A over k, arising from a first Tits construction. We have already shown G(k)/R โˆผ = Str(A) Str(A)(k) (k)/R โˆผ /R. = Z Z(k) Also, by Theorem 5.4, when A is a first Tits construction, Str(A) is R-trivial. Let L be any field extension of k. If A โŠ—k L is split, then G splits over L and hence W (L, G) = {1}. If AโŠ—k L is division, then the Tits index of G over L does not change and the anisotropic kernel of G over L corresponds to Str(A โŠ—k L). Hence W (L, G) = G(L)/R = Str(A)(L) /R = {1}, Z(L) the last equality holds because Str(A) is R-trivial : since Str(A) Z (L) = Str(A)(L) Z(L) , any element Str(A) Z (L) of is represented by an element of Str(A)(L) and any element of Str(A)(L) can be joined to the identity element by an L-rational image of A1L , as Str(A) is R-trivial. The result now follows. Remark : Note that we have proved above also that Str(A) Z , the adjoint form of E6 corresponding to a first Tits construction Albert algebra A over a field k is R-trivial. Corollary 6.1. Tits-Weiss Conjecture : Let A be a first Tits construction Albert division algebra. Then Str(A) = C.Instr(A). Proof. This follows immediately from the above theorem and that G is as in the above theorem. 7 Str(A) C.Instr(A) โˆผ = G(k) R , where 78 Groups with index E7,1 78 . The In this brief section, we wish to explore R-triviality issues for simple groups of type E7,1 reason for considering such groups is that these groups also have their anisotropic kernels as the structure groups of Albert division algebras and all groups of this type arise this way (see [46], 3.3.1). We will consider the groups ฮž with this index whose anisotropic kernel is the structure group of an Albert division algebra, that is a Tits first construction. These groups were studied by Max Koecher in ([20]). We use the explicit description of ฮž given by Max Koecher. Fix an Albert division algebra A over k. Let ฮž(A) be the full group of birational transformations generated by j : Ak โ†’ Ak , j(x) := (โˆ’x)โˆ’1 and the translations ta : x 7โ†’ a+x, a, x โˆˆ Ak . Then every element of ฮž(A) has an expression f = w โ—ฆ ta โ—ฆ j โ—ฆ tb โ—ฆ j โ—ฆ tc , a, b, c โˆˆ Ak . 23 R-triviality In particular Str(A) is contained in ฮž(A) and Isom(A) is the anisotropic kernel (up to a central torus) of ฮž(A). More precisely, let Z denote, as before, the center of Str(A), which is a Gm defined over k. Let S โŠ‚ ฮž(A) be a maximal k-split torus containing Z. Then H = Zฮž (S) is a connected reductive k-subgroup of G, is the reductive anisotropic kernel of ฮž = ฮž(A). Since k-rank of ฮž is 1, we have S = Z. It follows from this that Z(H)โ—ฆ = Z. We have, as in the previous section Zฮž (S) ฮž(k)/R โˆผ (k)/R. = Zฮž (S)(k)/R โˆผ = S Now, H = Zฮž (S) = Hโ€ฒ .Z(H)โ—ฆ = Isom(A).Z = Str(A). Hence Zฮž (S) Str(A) = . S Z We have shown in the last section that Str(A) Z (k)/R = {1}. Hence we have, by arguments 78 , quite analougous to the proof of R-triviality of groups with index E8,2 Theorem 7.1. Let ฮž be a simple, simply connected algebraic group over k with Tits index 78 , whose semisimple anistropic kernel is split over a cubic extension of k. Then ฮž is E7,1 R-trivial. Reduced Albert algebras : In this mini-section, we wish to explore the group Str(A) when A is a reduced Albert algebra, mainly the R-triviality of such groups. We recall at this stage our result from ([44]), which. in fact, holds over fields of arbitrary characteristics : Theorem 7.2. Let A be a reduced Albert algebra over any field k. Then Str(A) = C.Instr(A), where C denotes the subgroup of Str(A) of scalar homotheties of A and Instr(A) is the inner structure group. Proof. This follows from a result of J. R. Faulkner ([9], Thm. 1, [10]), that for any reduced Albert algebra A, the group Isom(A) is simple modulo its center. Given ฯˆ โˆˆ Str(A), let a := ฯˆ(1) and ฮฑ := N (a). Then ฮฑ 6= 0 and Ua is invertible. We now consider ฯ‡ := Rฮฑโˆ’1 Ua ฯˆ โˆˆ Str(A). Then ฯ‡ โˆˆ Isom(A). Since Instr(A) is a normal subgroup of Str(A) and norm similarities of the form Ua1 Ua2 ...Uar โˆˆ Isom(A) whenever ฮ N (ai ) = 1, it follows that (Instr(A) โˆฉ Isom(A)).Z 6= {1} and hence (Instr(A) โˆฉ Isom(A)).Z = Isom(A), where Z is the center of Isom(A) and consists of scalar homotheties Rc with c โˆˆ kโˆ— , c3 = 1. Therefore ฯ‡ โˆˆ C.Instr(A) and hence ฯˆ โˆˆ C.Instr(A). This completes the proof. We have already shown in ยง4 that Instr(A) โŠ‚ R(Str(A)(k)). Hence it follows from the above theorem that Str(A) โŠ‚ R(Str(A)(k)). This inclusion is independent of the base field, hence Str(A) is R-trivial. We record this as Theorem 7.3. Let A be a reduced Albert algebra over a field k. Then Str(A) is R-trivial. Theorem 7.4. Let A be an Albert algebra arising from the first Tits construction. Then any norm similarity of A is a product of norm similarities, each stabilizing a 9-dimensional subalgebra of A. 24 Maneesh Thakur Proof. First assume A is split. Let ฯˆ โˆˆ Str(A) and ฯˆ(1) = a. Then, ฯ‡ := RN (a)โˆ’1 โ—ฆ Ua โ—ฆ ฯˆ โˆˆ Isom(A) and RN (a)โˆ’1 โ—ฆ Ua โˆˆ Str(A) stabilizes any subalgebra of A containing a. By a result of Faulkner cited above, Isom(A) is a simple group modulo its center, which contains scalar homotheties. Hence Isom(A) is generated by norm isometries which stabilize 9-dimensional subalgebras and the result follows. Now assume A is a division algebra. As above, we may assume ฯˆ โˆˆ Isom(A). As in the proof of Theorem 5.4, we reduce to the case when ฯˆ โˆˆ Aut(A). Again, using the arguments in the proof of Theorem 5.3, we may assume that ฯˆ stabilizes a cubic cyclic extension E โŠ‚ A, i.e. ฯˆ โˆˆ Str(A, E). By Theorem 4.4, Str(A, E) โŠ‚ C.Instr(A).H, where C is the subgroup of scalar homoteties on A, Instr(A) is the subgroup of Str(A) generated by the U -operators of A and H is the subgroup of Aut(A) generated by automorphisms that stabilize 9-dimensional subalgebras of A. Hence ฯˆ admits the required factorization. Theorem 7.5. Let A be a reduced Albert algebra over a field k. Then Isom(A) is R-trivial. Proof. Let ฯˆ โˆˆ Isom(A) = Isom(A)(k) โŠ‚ Str(A). By Theorem 7.3 Str(A) is R-trivial. Now, by an argument exactly as in the proof of Theorem 5.5, the result follows. 8 Retract rationality Recall that a an irreducible variety X defined over a field k is retract k-rational if there exists a non-empty open subset U โŠ‚ X, defined over k such that the identity map of U factors through an open subset V of an affine space Am k , i.e. there exists morphisms f : U โ†’ V and r : V โ†’ U such that r โ—ฆ f = idU (see 2.2, [13]). The following result is proved in ([13], Prop. 5.4, Thm. 5.9): Theorem 8.1. Let G be a semisimple, simply connected, absolutely almost simple group, defined and isotropic over an infinite field k, then the following are equivalent 1. G is W -trivial, i.e. W (F, G) = {1} for all field extensions F/k. 2. G is a retract k-rational variety. Combining this with our results, we have, Corollary 8.1. Let G be a simple, simply connected algebraic group defined over a field k 78 or E 78 whose anisotropic kernel splits over a cubic extension of k. Then with Tits index E8,2 7,1 G is retract k-rational. Proof. By Corollary 2.1, the anisotropic kernel of G is isomorphic to Isom(A) for a first Tits construction Albert division algebra A over k. Since if A is a first Tits construction, for any field extension F of k, A โŠ—k F is either split or a division algebra (see [28], Cor. 4.2). Let AF := A โŠ—k F . By Theorem 7.2, Str(AF ) = C.Instr(AF ) when AF is split and by our result on Tits-Weiss conjecture, Str(AF ) = C.Instr(AF ) also when AF is a division algebra. Hence, by Theorem 6.1 and Theorem 7.1 we have W (F, G) = {1}. This proves the assertion on G. Theorem 8.2. Let A be a reduced Albert algebra over a field k. Then Isom(A) is retract rational. R-triviality 25 Proof. Note that when A is a reduced Albert algebra, the algebraic group Isom(A) is simple, simply connected and k-isotropic. The assertion now follows from the R-triviality of this group, settled in Theorem 7.5. Acknowledgement Part of this work was done when I visited Linus Kramer of the Mathematics Institute, University of Muenster, in March 2016. The stay was supported by the Deutsche Forschungsgemeinschaft through SFB 878. His help is gratefully acknowledged. I thank Richard Weiss and Tom De Medts for some very useful discussions and suggestions. I have immensely benefitted from discussions with Bernhard Muhlherr, Gopal Prasad and Dipendra Prasad. I thank Holger Petersson and Otmar Loos for their encouragement and interest in this work. References [1] A. Borel, Linear Algebraic Groups, GTM 126, Springer Verlag, New York, 1991. [2] Lien Boelaert, Tom De Medts, Anastasia Stavrova, Moufang sets and structurable division algebras, Preprint, available on the arXiv: http://arxiv.org/abs/1603.00780. [3] Chetan Balwe and Anand Sawant, R-equivalence and A1 -connectedness in anisotropic groups, to appear in IMRN. [4] V. Chernousov, A. Merkurjev, R-equivalence and Special Unitary Group, J. Algebra, 209 (1998), 175-198. [5] V. Chernousov, A. Merkurjev, R-equivalence in spinor groups, J. Amer. Math. Soc., 14 (2001), no. 3, 509-534. [6] Vladimir I. Chernousov and Vladimir P. Platonov, The rationality problem for semisimple group varieties, J. Reine Angew. Math. 504 (1998), 1-28. [7] J.-L. Colliot-Theฬlene, J.-J. Sansuc, La R-eฬquivalence sur les tores, Ann. Scient. Ec. Norm. Sup., 4e serie, 10 (1977), 175-230. [8] V. Chernousov, L. Timoshenko, On the group of R-equivalence classes of semisimple groups over arithmetic fields, (Russian) Algebra i Analiz 11 (1999), no. 6, 191-221; translation in St. Petersburg Math. J. 11 (2000), no. 6, 1097-1121. [9] John R. Faulkner, Octonion planes in characteristic 2, Bull. AMS. 75 (1969), 980-983. [10] John R. Faulkner, Octonion planes defined by quadratic Jordan algebras, Mem. AMS., 104, 1970. [11] Joseph C. Ferrar and Holger P. Petersson, Exceptional simple Jordan algebras and Galois cohomology, Arch. Math., Vol. 61 (1993), 517-520. [12] Skip Garibaldi, Kneser-Tits for a rank 1 form of E6 (After Veldkamp), Compositio Math. 143 (2007), 191-200. [13] Philippe Gille, Le Probleฬme de Kneser-Tits, Seฬminaire Bourbaki 982 (2007), Asteฬrisque 326 (2009), 39-81. 26 Maneesh Thakur [14] Philippe Gille, Speฬcialisation de la R-eฬquivalence pour les groupes reฬductifs, Trans. AMS. 356 (2004), 4465-4474. [15] Skip Garibaldi and Holger P. Petersson, Outer automorphisms of algebraic groups and a Skolem-Noether theorem for Albert algebras, to appear in Documenta Mathematica. [16] N. Jacobson, Structure and representations of Jordan algebras, AMS. Providence, R. I., 1968, AMS. Colloquium Publications, Vol. XXXIX. [17] N. Jacobson, Finite-dimensional division algebras over fields, Springer Verlag, Berlin, 1996. [18] N. Jacobson, Some groups of transformations defined by Jordan algebras-I, J. reine angew. Math. 201 (1959), No. 3/4, 178-195. [19] N. Jacobson, Some groups of transformations defined by Jordan Algebras. III. Groups of type E6 , J. reine angew. Math. 207 (1961), 61-85. [20] Max Koecher, Uber eine Gruppe von rationalen Abbildungen, Invent. Math. 3, (1967) 136-171. [21] M. A. Knus, A. Merkurjev, M. Rost, J. P. Tignol, The Book of Involutions, AMS. Colloquium Publications, Vol. 44, 1998. [22] Ottmar Loos, On algebraic groups defined by Jordan pairs, Nagoya Math. J., Vol. 74 (1979), 23-66. [23] Yu. I. Manin, Cubic forms, North-Holland, Amsterdam, 1974. [24] K. McCrimmon, The Freudenthal-Springer-Tits constructions of exceptional Jordan algebras, Trans. AMS. 139 (1969), 495-510. [25] A. S. Merkurjev, The norm principle for algebraic groups, Algebra i Analiz 7 (1996), no. 2, 243-264. [26] H. P. Petersson, Structure theorems for Jordan algebras of degree three over fields of arbitrary characteristic, Comm. Algebra 32 (2004), no. 3, 1019โ€“1049. [27] H. P. Petersson, Albert algebras, mini-course, Fields Institute workshop on exeptional algebras and groups, University of Ottawa, 2012. (available on the URL http://www.fernuni-hagen.de/petersson/vortraege). [28] H. P. Petersson, M. Racine, Springer forms and the first Tits construction of exceptional Jordan division algebras, Manuscripta Math. 45 (1984), no. 3, 249-272. [29] H. P. Petersson, M. Racine, An elementary approach to the Serre-Rost invariant of Albert algebras, Indag. Mathem., N.S. 7 (1996), no. 3, 343-365. [30] H. P. Petersson, M. Racine, Albert algebras, Jordan algebras (Oberwolfach, 1992)(W. Kaup and McCrimmon, eds), de Gruyter, Berlin, 1994, no. 3, 197-207. [31] H. P. Petersson, M. Racine, Classification of algebras arising from the Tits process, J. Algebra 98 (1986), no. 1, 244โ€“279. R-triviality 27 [32] H. P. Petersson, M. Racine, Jordan algebras of degree 3 and the Tits process, J. Algebra 98 (1986), no.1, 211-243. [33] V. P. Platonov and A. Rapinchuk, Algebraic groups and number theory, Pure and Applied Mathematics, Vol. 139, Academic Press Inc., Boston, MA, 1994. [34] R. Parimala, R. Sridharan, M. L. Thakur, A classification theorem for Albert algebras, Trans. AMS. 350 (1998), no. 3, 1277-1284. [35] R. Parimala, R. Sridharan, Maneesh L. Thakur, Titsโ€™ constructions of Jordan algebras and F4 bundles on the plane, Compositio Math. 119 (1999), 13-40. [36] R. Parimala, J. P. Tignol, Richard M. Weiss, The Kneser-Tits conjecture for groups with 66 over an arbitrary field, Transform. Groups. 17 (2012), no. 1, 209-231. Tits-index E8,2 [37] Gopal Prasad, On the Kneser-Tits problem for triality forms, Comment. Math. Helv. 83 (2008), no. 4, 913-925. [38] Gopal Prasad, M. S. Raghunathan, On the Kneser-Tits problem, Comment. Math. Helv. 60 (1985), no. 1, 107-121. [39] T. A. Springer and F. D. Veldkamp, Octonions, Jordan Algebras and Exceptional Groups, Springer Monographs in Mathematics, Springer-Verlag, Berlin, (2000). [40] T. A. Springer, Linear Algebraic Groups, Second Edition, Progress in Mathematics, Birkhauser, Boston, 1998. [41] T. A. Springer, Jordan algebras and algebraic groups, Ergebnisse der Mathematik und ihrer Grenzgebiete, Band 75, Springer-Verlag, 1973. [42] Tom De Medts and Hendrik Van Maldeghem, Moufang Generalized Polygons, Topics in Diagram Geometry, Quaderni di Matematica, Volume 12 (edited by Antonio Pasini), 59-126, Dept. Math., Seconda Univ. Napoli, Caserta, 2003. [43] Tom De Medts and Yoav Segev, A course on Moufang sets, Innovations in Incidence Geometry, Vol. 9 (2009), pp. 79-122. [44] Maneesh Thakur. Automorphisms of Albert algebras and a conjecture of Tits and Weiss, Trans. AMS. 365 (2013), no. 6., 3041-3068. [45] J. Tits, Groupes de Whitehead de groupes algeฬbriques simples sur un corps, in Seฬminaire Bourbaki, Vol. 1976/77, Exp. 505, Lecture Notes in Math., No. 677, Springer, BerlinHeidelberg-New York, 1978, pp. 218-236. [46] J. Tits, Strongly inner anisotropic forms of simple algebraic groups, Journal of Alg. 131 (1990), 648-677. [47] J. Tits, Classification of buildings of spherical type and Moufang polygons: A Survey, Colloquio Internazionale sulle Teorie Combinatorie (Roma, 1973), Tomo I, pp. 229โ€“246. Atti dei Convegni Lincei, No. 17, Accad. Naz. Lincei, Rome, 1976. [48] J. Tits, Classification of algebraic semisimple groups, Algebraic Groups and Discontinuous Subgroups (Proc. Sympos. Pure Math., Boulder, Colo., 1965) (A. Borel and G. D. Mostow, eds.), Vol. 9, AMS., Providence, R.I., 1966, 33-62. 28 Maneesh Thakur [49] F. D. Veldkamp, Unitary groups in projective octave planes, Compositio Math. 19 (1968), 213-258. [50] F. D. Veldkamp, Unitary groups in Hjelmslev-Moufang planes, Math. Z. 108 (1969), 288-312. [51] J. Tits, R. M. Weiss, Moufang Polygons, Springer Monographs in Mathematics, Springer Verlag, 2002. [52] V. E. Voskresenskii, Algebraic Groups and Their Birational Invariants, Translation of Math. Monographs, Vol 179, AMS, Providence, RI, 1998. [53] R. M. Weiss, The Structure of Spherical Buildings, Princeton University Press, 2003, Princeton. [54] R. M. Weiss, Quadrangular Algebras, Princeton University Press, Mathematical Notes 46, Princeton University Press, 2006, Princeton.
4math.GR
arXiv:1708.02740v1 [cs.LG] 9 Aug 2017 A Data Prism: Semi-Verified Learning in the Small-ฮฑ Regime Michela Meister [email protected] Gregory Valiant [email protected] August 10, 2017 Abstract We consider a simple model of unreliable or crowdsourced data where there is an underlying set of n binary variables, each โ€œevaluatorโ€ contributes a (possibly unreliable or adversarial) estimate of the values of some subset of r of the variables, and the learner is given the true value of a constant number of variables. We show that, provided an ฮฑ-fraction of the evaluators are โ€œgoodโ€ (either correct, or with independent noise rate p < 1/2), then the true values of a (1 โˆ’ วซ) fraction of the n underlying variables can be deduced as long as ฮฑ > 1/(2 โˆ’ 2p)r . For example, if each โ€œgoodโ€ worker evaluates a random set of 10 items and there is no noise in their responses, then accurate recovery is possible provided the fraction of good evaluators is larger than 1/1024. This result is optimal in that if ฮฑ โ‰ค 1/(2 โˆ’ 2p)r , the large dataset can contain no information. This setting can be viewed as an instance of the semi-verified learning model introduced in [3], which explores the tradeoff between the number of items evaluated by each worker and the fraction of โ€œgoodโ€ evaluators. Our results require the number of evaluators to be extremely large, > nr , although our algorithm runs in linear time, Or,วซ (n), given query access to the large dataset of evaluations. This setting and results can also be viewed as examining a general class of semi-adversarial CSPs with a planted assignment. This extreme parameter regime, where the fraction of reliable data is small (inverse exponential in the amount of data provided by each source), is relevant to a number of practical settings. For example, settings where one has a large dataset of customer preferences, with each customer specifying preferences for a small (constant) number of items, and the goal is to ascertain the preferences of a specific demographic of interest. Our results show that this large dataset (which lacks demographic information) can be leveraged together with the preferences of the demographic of interest for a constant number of randomly selected items, to recover an accurate estimate of the entire set of preferences, even if the fraction of the original dataset contributed by the demographic of interest is inverse exponential in the number of preferences supplied by each customer. In this sense, our results can be viewed as a โ€œdata prismโ€ allowing one to extract the behavior of specific cohorts from a large, mixed, dataset. 1 Introduction Imagine that you have access to a large dataset of market research. Specifically, the dataset consists of customer evaluations of products. While the total set of products is large, of size n, each customer is only asked to evaluate a small (perhaps randomly selected) subset of r = 2, 3, etc. of those products. Long after the dataset is collected, suppose you wish to identify the preferences of some special demographic of customersโ€”perhaps the customers who are full-time students. Let ฮฑ denote a lower bound on the fraction of the surveyed customers that were full-time students, but assume that we do not have this demographic information in our datasetโ€“all we have is the set of evaluations of each customer. How can we leverage this dataset to learn anything about the student-demographic? 1 If ฮฑ โ‰ช 1/2, this problem seems hopeless because the amount of data contributed by non-students might swamp the portion of the dataset contributed by the demographic of interest. Nevertheless, the main result of this paper shows that one could hire some students to evaluate a constant, k, number of (random) products in the set of size n, and then leverage that constant amount of information together with the large dataset to return accurate evaluations of the student-demographic preferences on all n items. This claim will hold provided the number of items evaluated by each of the customers in the dataset, r > log2 (1/ฮฑ). The guarantees of the algorithm will ensure that, with high probability, at most an วซ-fraction of the returned evaluations are incorrect (where kโ€”the number of products evaluated by the hired students, is a function of วซ that is independent of the total number of items, n). In particular, this strong success guarantee holds irrespective of the behavior of the non-student demographics in the original datasetโ€“in particular, they could even be adversarial, provided by a single malicious entity who is trying to disguise the feedback provided by the student-demographic. The above setting, where one has a large dataset reflecting a number of demographics, and wishes to leverage the large dataset in conjunction with a very small set of โ€œverifiedโ€ datapoints from one demographic of interest, seems widely applicable beyond the market research domain. Indeed, there are many biological or health-related datasets where the โ€œdemographic of interestโ€ might be a trait that is expensive to evaluate. For example, perhaps one has a large database of medical records, and wishes to investigate the propensity of certain medical conditions for the subset of people with a specific genetic mutation. The large dataset of medical records will likely not contain information about whether individuals have the mutation in question. Nevertheless, our results imply that accurate inferences about this subset of people can likely be made as long as 1) the fraction of people with the mutation in the large dataset is not minuscule, and 2) one can obtain a small (i.e. constant) amount of data from individuals with the genetic mutation in question, for example studying a constant number of individuals who are known to have the mutation. 1.1 Formal Model We formally model this problem as an instance of the semi-verified learning model proposed by Charikar, Steinhardt, and Valiant [3]. Suppose there is a set of n Boolean variables, V = {v1 , . . . , vn }, and m โ€œworkersโ€ who each provide an evaluation of the values of a randomly selected subset of r of the variables. Suppose that an ฮฑ-fraction of the workers are โ€œreliableโ€ and submit evaluations with the property that each of their r reported values is incorrect independently with probability โ‰ค prel . We make no assumptions on the evaluations submitted by the (1 โˆ’ ฮฑ)m unreliable workersโ€”these evaluations could be biased, arbitrary, or even adversarially chosen with the goal of confounding the learning algorithm. In addition to this large dataset, we also receive k โ‰ช n, m โ€œverifiedโ€ data points that consist of the values of a random subset of the variables of size k. The goal of the learner will be to return assignments to the n variables, such that with probability at least 1 โˆ’ ฮด, at most วซn of these returned assignments differ from their true values. Previous work [12, 3] focussed on the regime where the number of workers, m = ฮ˜(n). In contrast, we will allow m โ‰ซ n, and focus on the interplay between the number of variables evaluated by each individual, r, and the fraction of reliable workers, ฮฑ. Throughout, our positive results hold when the number of verified data points, k, is a constant that is independent of n, but dependent on วซ, ฮด, and ฮฑ. 1.2 Summary of Results and Connections to Random CSPs Our main result is the following: Theorem 1. Fix a failure probability ฮด > 0 and accuracy parameter วซ > 0. Consider a set of n items that each have a Boolean value, and m reviewers who each evaluate a uniformly random subset of r out of the n items. Suppose that ฮฑm of the reviewers are โ€œgoodโ€ in that each of their r reviews is correct (independently) with probability at least 1 โˆ’ p โ‰ฅ 1/2. Given sufficiently many reviewers, accurate reviews 2 of at least (1 โˆ’ วซ)n items can be inferred given the true values of a constant (independent of n) sized random 1 subset of the variables, provided the fraction of good reviewers satisfies ฮฑ > (2โˆ’2p) r.  Specifically, given the values of a random, constant-sized subset of the items of size k = Oฬƒ 1วซ ยท 22r log(1/ฮด) , with probability at least 1โˆ’ฮด one can recover accurate evaluations of at least (1โˆ’วซ)n of the items, provided 1 r ฮฑ > (2โˆ’2p) r and the number of reviewers m = ฮ˜ฬƒฮฑ,ฮด,วซ (n ). Additionally, the algorithm runs in time linear in the number of items, n, given the ability to query the dataset for reviewers who have evaluated a given set of items in constant time. Specifically, the runtime of the algorithm is Oฮด,วซ,r (n), where the hidden constant hides an exponential dependence on r, and polynomial dependence on 1/วซ and log(1/ฮด). The following straightforward observation demonstrates that the above theorem is optimal in the relationship between the fraction of good reviewers, ฮฑ, and the number of items reviewed by each individual, r, and the error rate of each good reviewer, p: Observation 1. If each good reviewer incorrectly reviews each item independently with probability p, and 1 the fraction of good reviewers satisfies ฮฑ = (2โˆ’2p) r where r denotes the number of items evaluated by each reviewer, then the remaining (1 โˆ’ ฮฑ) fraction of reviewers can behave such that for every set of r items, for a randomly selected reviewer, the distribution of reviews for those items will be uniform over the 2r possible review vectors. Hence the dataset contains no useful information. One reason why Theorem 1 is surprising is that this inverse exponential dependence between the number of reviews per reviewers, r, and the fraction of โ€œgoodโ€ reviewers, can not be attained via the usual approach of low-rank matrix approximation that is often applied to this problem of recommendation systems (e.g. [2, 9]). To see why these approaches cannot be applied, note that for any matrix in which all rows have at most r entries, there is a rank r matrix that exactly agrees with all entries. Intuitively, each of these r factors is capable of representing a different subset of the reviewers. Still, at best this would result in an algorithm that is capable of capturing r different groups of reviewers; in other words, it seems extremely unlikely that such approaches could yield positive results in the setting where the fraction of โ€œgoodโ€ reviewers was less than 1/r, in contrast to our results that allow this fraction to be 1/exp(r). The setting of Theorem 1 can be easily mapped into the language of a constraint satisfaction problem. Given the evaluations of the reviewers, we build the constraint satisfaction problem by associating a Boolean variable to each of the n items, and for every set of r variables, we define the set of allowable assignments to those variables to include any of the 2r review vectors that constitutes more than a 1/2r fraction of the review vectors for the associated items. (In other words, if at most a 1/2r fraction of the reviewers who evaluated a given set of r items submitted a vector of reviews ฯƒ = (ฯƒ1 , . . . , ฯƒr ), then ฯƒ is not an allowable 1 assignment for those variables.) The requirement that ฮฑ > (2โˆ’2p) r guarantees that, for every set of r items, irrespective of the behaviors of the (1 โˆ’ ฮฑ) fraction of bad reviewers, for a randomly selected reviewer, the probability that the r reviews are all correct is strictly larger than 1/2r . Additionally, our requirement on the number of reviewers, m, ensures that with high probability (by elementary concentration bounds) for every set of r items, there are sufficiently many reviewers assigned to that set of r items, so as to ensure that the number of accurate ratings (provided by the good reviewers) exceeds a 1/2r fraction of the overall reviews for that set of r items. Hence, with high probability, we obtain a constraint satisfaction problem such that for every set of r variables 1) the correct assignment is in the set of allowable assignments, and 2) at least one of the 2r possible assignments is disallowed. Given this mapping from the review/evaluation setting to constraint satisfaction problems, Theorem 1 will follow immediately from the following result concerning a class of adversarial constraint satisfaction problems: 3 Theorem 2. Consider a set of n Boolean variables, and a planted assignment ฯƒ โˆˆ {0, 1}n . Suppose that for each subset of r variables, t = {v1 , . . . , vr }, there is a subset Ct โŠ‚ {0, 1}r of assignments such that |Ct | โ‰ค 2r โˆ’ 1 and the planted assignment ฯƒ (restricted to the variables in t) is in set Ct . Given the ability to query the planted assignment values for a constant number of variables chosen uniformly at random, the planted assignment can be recovered with up to วซn errors, for any constant วซ > 0. Specifically, for any วซ, ฮด > 0, after querying the values of   1 2r ยท 2 log(1/ฮด) k = Oฬƒ วซ variables, with probability at least 1 โˆ’ ฮด we can output an assignment ฯƒ โ€ฒ โˆˆ {0, 1}n that differs from the planted assignment, ฯƒ, in at most วซn values. Additionally, the algorithm will run in time Or,วซ,ฮด (n). There is a simple V C-dimension argument together with a sphere-packing result of Haussler [7] that yields a tighter information theoretic recovery result, yielding an analog of the above theorem with polynomial (rather than super-exponential) dependence on r.1 Specifically, the number of verified assignments must be k = O( 1วซ (r log(1/วซ) + log(1/ฮด)). This V C-dimension approach, however, seems to yield an algorithm with runtime at least nr , as opposed to the linear time algorithms of Theorems 1 and 2. For practical settings, having a linear-time algorithm seems quite important; that said, exploring this problem from an information theoretic perspective is also worthwhile. One natural question is whether one can achieve a best-of-both-worlds: a near-linear time algorithm with a polynomial dependence on r. We discuss this problem more in Section 4. Proposition 1. As in Theorem 2, consider a set of n Boolean variables, and a planted assignment ฯƒ โˆˆ {0, 1}n . Suppose that for each subset of r variables, t = {v1 , . . . , vr }, there is a subset Ct โŠ‚ {0, 1}r of assignments such that |Ct | โ‰ค 2r โˆ’1 and the planted assignment ฯƒ (restricted to the variables in t) is consistent with Ct . Given the ability to query the planted assignment values for k = O 1วซ (r log(1/วซ) + log(1/ฮด)) random entries, with probability at least 1 โˆ’ วซ one can recover an assignment that disagrees with ฯƒ on at most วซn values. Proof. Let S โŠ‚ {0, 1}n be the set of assignments that are consistent with all of the sets of partial assignments to the r-tuples specified by the sets Ct . The Vapnik-Chervonenkis (VC) dimension of the set S is at most r, since, by assumption, for every r-tuple of variables, t = {v1 , . . . , vr }, there are at most |Ct | โ‰ค 2r โˆ’ 1 possible assignments to those variables. As was shown by Haussler (Theorem 1 in [7]), for any subset S of n the Boolean hypercube  with VC dimension at most r, for every วซ > 0 there exists a set T โŠ‚ {0, 1} of size 2e r at most e(r + 1) วซ such that for every point x โˆˆ S, there exists a point tx โˆˆ T that agrees with x on at least (1 โˆ’ วซ)n coordinates. Let Tวซ/2 denote such a covering set corresponding to the set S, such that every x โˆˆ S is distance at most  nวซ/2 from an element of Tวซ/2 . We can use our k = O 1วซ (r log(1/วซ) + log(1/ฮด)) random coordinates of the vector ฯƒ โˆˆ S to find, with probability at least 1 โˆ’ ฮด, a point in Tวซ/2 of distance at most nวซ from ฯƒ by simply choosing the element of Tวซ/2 that agrees with the largest fraction of the k random samples. This follows from 1) leveraging a Chernoff bound to show that out of the k samples, at most a (2/3)วซ fraction will disagree with the element of Tวซ/2 that has distance วซn/2, and 2) a union bound over |Tวซ/2 | Chernoff bounds to argue that none of the elements of Tวซ/2 that have distance at least วซn will disagree in fewer than a (2/3)วซ fraction of indices. Together, this yields that the probability that the element of Tวซ/2 that agrees with the largest fraction of the k random samples has distance greater than วซn from the true assignment, is at most |Tวซ/2 |exp(O(โˆ’kวซ)) = |Tวซ/2 |(1/วซ)O(r) ฮด, which is at most ฮด for a suitable choice of the constant in  the โ€œOโ€ term of k = O 1วซ (r log(1/วซ) + log(1/ฮด)) . 1 We thank an anonymous reviewer of an early version of this paper for drawing our attention to this. 4 One implication of the above result is that for any Boolean constraint satisfaction problem for which 1) there exists a satisfying assignment, and 2) for every subset of r variables the constraints forbid at least one of the 2r possible assignments, it must be the case that there are only a constant number of โ€œวซ-similar solution clusters,โ€ where an วซ-similar solution cluster is a set of assignments that differ from each other in at most วซn locations. Indeed, the number of such clusters will be at most 2k , where k = Oฬƒ(r/วซ) is as specified in Theorem 2 and Proposition 1, is a bound on the number of variables whose assigned value must be queried to achieve a constant probability of failure ฮด < 1. Note that this number of solution clusters is independent of n. This structure of the satisfying assignments is slightly surprising given the following two simple examples: the first example illustrates that it is possible for such CSPs to have at least two extremely different satisfying assignments, and the second illustrates that it is possible for such CSPs to have super-constant sized solution clustersโ€”clusters of size โ„ฆ(n)โ€”although all the assignments in such a cluster are quite similar. Example 1. Consider the setting where the underlying assignment to all n variables is T , and for every pair of variables, the set of allowable assignments is {(F, F ), (T, T )}. Based on these constraints, there are two possible satisfying assignmentsโ€”either all T or all F . A single โ€œverifiedโ€ data point is sufficient to distinguish between these two sets of assignments. The following example illustrates that, in general, it is impossible to guarantee that the learner will correctly output the exact assignment, unless the number of verified datapoints k = ฮ˜(n). Example 2. Consider the setting where each set of r values has the constraint that precludes the (F, F, . . . , F ) r-tuple. In this case, there is a single solution cluster consisting of all assignments to the n variables such that at most r โˆ’ 1 of the variables are F and the remaining n โˆ’ r + 1 are T . In this case, it is impossible to distinguish between these assignments with any significant probability using fewer than ฮ˜(n) verified evaluations. Despite the above examples, it is still unclear whether the information theoretic bound of Proposition 1 is tight; particularly for small constant วซ, it is not clear the extent to which the number of วซ-separated solution clusters can grow as วซ decreases. 1.3 Related Work Motivated by the increasing practical importance of robust estimationโ€”and more generally, robust learning and optimizationโ€”there has been recent interest in these problems from both an information theoretic and computational perspective. Recent works tackled this general problem in several basic settings, including robust linear regression [1], and robustly estimating the mean and covariance of natural classes of distribution, including multivariate Gaussians [4, 10]. The focus of these works was largely on establishing computationally efficiency algorithms for these tasks that approach the information theoretic (minimax) guarantees achieved by more naive or brute-force algorithms. All three works focussed on the regime in which a majority of the data is assumed to be โ€œgoodโ€โ€”drawn from the distribution or cohort of interest. In the case of [1], the recovery guarantees require that this fraction of good data satisfies ฮฑ โ‰ฅ 64 65 . The recent works [12] and [3] consider the setting where a minority of the data is โ€œgoodโ€ (i.e. ฮฑ < 1/2), with the latter paper formally proposing the โ€œsemi-verifiedโ€ learning model where one may obtain a small amount of โ€œverifiedโ€ data that has been drawn from the distribution/cohort in question. The former paper, [12] considers a similar item evaluation setting to the setting we consider, but focusses on the regime where the number of evaluators is on the same order as the number of items being evaluated. In this regime, they show that วซ-accurate recovery is possible provided that the number of items reviewed by each evaluator is O( วซ41ฮฑ3 ) . 5 In contrast, we consider the regime in which the number of evaluators might be significantly larger than the number of items, but establish an optimal tradeoff between the fraction of good reviewers and the number of items evaluated by each reviewer, demonstrating the surprising ability to tolerate a fraction of good evaluators that is inverse exponential in the number of items evaluated by each evaluator. For the context of leveraging these techniques as a โ€œprismโ€ to extract information about specific demographics from a large, mixed dataset, this small-ฮฑ regime seems especially significant. The techniques of this paper, via local algorithms and the constraint-satisfaction perspective, also differ significantly from the previous approaches to robust estimation which rely on more geometric or spectral structure. The general challenge of developing algorithms and estimators that are robust to corruptions in the input data dates back to the early work of [13], and has led to a significant body of work on โ€œRobust Statisticsโ€, which explores a number of different models for the data corruptions, and largely focusses on the regime in which a majority of the data is โ€œgood.โ€ Much of this work is orthogonal to the objectives of this paper, and we refer the reader to the surveys of [8] and [6]. 2 The Algorithm In this section we describe a simplified algorithm that obtains the claimed result of Theorem 2 with the exception of two key properties: as-described, the runtime of this algorithm is O(nr ) rather than Or (n), and this algorithm will require a number of โ€œverifiedโ€ samples that is inverse polynomial in the error parameter วซ, as opposed to the nearly inverse linear dependence specified in the theorem. The algorithm to which Theorem 2 applies is an extension of this algorithm, and we describe it in Section 3. The overall structure of the algorithm is to reduce an instance of the problem with non-trivial constraints on all sets of r variables, to an instance of the problem that has non-trivial constraints on all sets of r โˆ’ 1 variables. In general, the true assignment might not satisfy the constraints that we derive on the sets of r โˆ’ 1 variables, though we will be able to leverage any such derived constraints that are discovered to be false. We begin by providing the intuition for the algorithm in the case that r = 2, and then in Section 2.2 describe the intuition for the reduction from constraints on sets of r variables to constraints on r โˆ’ 1-tuples. We formally describe the general algorithm in Section 3. 2.1 Intuition: Restricting to Pessimistic Constraints Our algorithm will proceed iteratively, with the goal of each iteration being to inspect at most a constant number of randomly sampled โ€œverifiedโ€ variable values, and return accurate guesses for at least a constant fraction of the variables. The algorithm will then recursively iterate this procedure on the remaining variables until all but 2วซ n variables have been assigned guesses; assignments to these last โ‰ค วซn/2 variables can be chosen arbitrarily. To begin, consider the setting where r = 2, and for every pair of variables (x, y) we have a set of allowable assignments, C(x,y) โŠ‚ {T, F }2 , with |C(x,y) | โ‰ค 3. Each such set provides at least two implications, one of the form x = X =โ‡’ y = Y and one of the form y = Y โ€ฒ โ†’ x = X โ€ฒ for some choice of X, X โ€ฒ , Y, Y โ€ฒ โˆˆ {T, F }. For example, if the assignment (T, F ) 6โˆˆ C(x,y) , then we have the implications x = T =โ‡’ Y = T and y = F =โ‡’ x = F . In other words, there is at least one value of variable x that would imply the value of variable y, and similarly for y. Hence, if we fix variable x, and consider the implications derived from the sets C(x,y) as y ranges over all n โˆ’ 1 other variables, there must be an assignment to variable x that would imply the values of at least n/2 variables. We will refer to this assignment as the โ€œoptimisticโ€ value of x, as this assignment to x would immediately yield the values of at least half the remaining variables, and we would be done with the current iteration of the algorithm, and would then recurse on the remaining variables that have not been assigned 6 values. The first key idea of our algorithm is that we will assume that all variables take their โ€œpessimisticโ€ values. We will then โ€œcheckโ€ this assumption by revealing the true values of a random sample of O(log(1/ฮด)/วซ) of these variables. If all of these values are consistent with the โ€œpessimisticโ€ values, we can conclude that with probability at least 1 โˆ’ ฮด, at least (1 โˆ’ วซ)n of the variables actually take their โ€œpessimisticโ€ values, and hence we can simply output this assignment. If, however, any of our O(log(1/ฮด)/วซ) random checks fails, that means that we have found a variable that takes its โ€œoptimisticโ€ value, and hence that one variable, x, together with the n โˆ’ 1 constraint sets C(x,ยท) that involve it, imply the values of at least n/2 variables. In either case, our constant (dependent on วซ, ฮด) number of checks has yielded an accurate assignment to at least half the variables. This simple algorithm in the r = 2 case is summarized in the following pseudo-code: FindAssigments, r = 2: Input: Set of n variables, and for every pair (x, y), a set of allowable assignments to those variables C(x,y) โŠ‚ {T, F }2 , with |Ct | โ‰ค 3. Error parameter วซ > 0 and failure parameter ฮด > 0. Output: Assignments to each of the n variables. โ€ข While there exists โ‰ฅ วซn/2 variables without assignments โ€“ Let nโ€ฒ denote the number of remaining variables, and for each of these, determine an โ€œoptimisticโ€ assignment that would imply the values of at least nโ€ฒ /2 other variables, and define a variableโ€™s โ€œpessimisticโ€ value to be the opposite assignment. randomly chosen variables and their โ€œverifiedโ€ assignments. (If โ€“ Consider a set of 10 log(1/ฮด) วซ2 of these variables lie in the set of nโ€ฒ > วซn/2 variables in consideration, fewer than log(1/ฮด) วซ output FAIL) โ€“ If all the verified assignments for variables in the set of nโ€ฒ agree with their pessimistic assignments, then assign these nโ€ฒ variables their pessimistic assignments. โ€“ Otherwise, we must have found a variable whose verified assignment is its optimistic assignment, and we can assign the values of at least nโ€ฒ /2 variables accordingly. 2.2 From r-tuples to r โˆ’ 1-tuples: Pessimism All The Way Down Given the algorithm for the r = 2 case, which is successful provided every pair of variables has at least one forbidden assignment, the question is how to reduce the setting with constraints on sets of r โ‰ฅ 3 variables, to the setting of constraints on sets of r โˆ’ 1 variables. The following trivial lemma is the key to this reduction: Lemma 1. Given an r-tuple and set of at most 2r โˆ’ 1 allowable assignments to those r variables, then for any subset of r โˆ’ 1 of those variables, there exists an assignment to those r โˆ’ 1 variables that would imply the value of the rth variable. Proof. Consider a r โˆ’ 1 tuple, t, and an additional variable v, and the set of โ‰ค 2r โˆ’ 1 allowable assignments to the r-tuple (t โˆช v). If the restriction of these assignments to the r โˆ’ 1 variables in t contains all 2rโˆ’1 possible assignments, it must be the case that for at least one of these assignments, there is a unique value that v must assume, otherwise this r-tuple would have all 2r possible assignments. If the restriction of the 2r โˆ’ 1 assignments to the r โˆ’ 1 tuple do not contain all 2rโˆ’1 assignments, then any such assignment would (vacuously) imply the value of the rth variable. The utility of this lemma is that if we have an r โˆ’ 1-tuple of variables, t, then by considering all possible additional variables v 6โˆˆ t, there exists an assignment to t that determines the value of at least a 1/2rโˆ’1 7 fraction of the variables not in t. Hence we can designate an โ€œoptimisticโ€ assignment with the property that if that assignment holds, then it will imply assignments to at least a 1/2rโˆ’1 fraction of the remaining variables. We will then assume that this โ€œoptimisticโ€ assignment is not allowed, thereby reducing the set of allowable assignments of variables in t to size 2rโˆ’1 โˆ’ 1, and proceed inductively. In this sense, at some intermediate step of this algorithm where we are considering sets of r โ€ฒ < r variables, the allowable sets of assignments that we are considering may not be completely accurate, as we are not verifying whether the sets actually do take their โ€œoptimisticโ€ assignments or not. However, if a r โ€ฒ -tuple of variables actually takes the values of a forbidden/optimistic assignment, then either it will immediately imply the values of a constant (i.e. at least 1/2r ) fraction of variables, or it must be a subset of a larger tuple that takes its โ€œoptimisticโ€ assignment. Which of these two cases holds can be easily decided via querying the values of a (constant) number of random variables. We describe the full algorithm in the following section. 2.3 The Basic Algorithm The high-level structure of the algorithm described in the previous part takes the form of a โ€œdescendingโ€ pass followed by an โ€œascendingโ€ pass. In the descending pass, we iteratively turn constraints on r0 tuples into constraints on r0 โˆ’ 1 tuples, then r0 โˆ’ 2 tuples, etc; all the while, we forbid โ€œoptimisticโ€ assignments to ensure that in the rth level, each r tuple has at most 2r โˆ’ 1 allowable assignments. This descending phase terminates with r = 1, where we have our โ€œpessimisticโ€ conjectured assignments to all variables. We then randomly check a few of these values; if we do not discover any inconsistencies with the conjectured values, then we can safely conclude that most of the conjectured values are correct. If we have discovered any inconsistencies, then we begin the ascending phase that investigates and checks any discovered โ€œoptimisticโ€ assignments. One minor wrinkle is that we should not trust the > 1/2r fraction of values that appear to be implied by an optimistic assignment to a set of r < r0 โˆ’1 variables. These implications might be the result of forbidding an optimistic assignment for some larger tuple. Nevertheless, if we randomly check some of the implications, then we will either verify the accuracy of these implications, or have found an optimistic assignment to a r + 1 tuple. In this sense, the ascending phase will either terminate upon satisfactorily verifying a significant (constant sized) subset of the set of output assignments, or we will have found an โ€œoptimisticโ€ assignment to a r0 โˆ’ 1 tuple, and the implications of r0 โˆ’ 1 tuples are based directly on the given set of constraints to r0 -tuples, which are valid by assumption. Hence each phase of the algorithm will return assignments to a constant (at least 1/2r0 ) fraction of the variables. FindAssigments: Input: Set of n variables, integer r0 , and for every tuple t โŠ‚ [n]r0 of r0 distinct variables, a set of allowable assignments to those variables Ct โŠ‚ {T, F }r0 , with |Ct | โ‰ค 2r0 โˆ’ 1. Error parameter วซ > 0 and failure parameter ฮด > 0. Output: Assignments to at least (1 โˆ’ 2วซ )n variables. โ€ข While there exists โ‰ฅ วซn/2 variables without assignments, run DESCEND on the set of unassigned variables and their corresponding sets of allowable assignments. 8 DESCEND: Input: For each r-tuple, a set C of assignments to those variables, with |C| โ‰ค 2r โˆ’ 1. 1. If r = 1, AscendAndVerify(set of assigned values to each variable, r = 1). 2. Else, for every r โˆ’ 1 tuple, t, we will create a set Ct of โ‰ค 2rโˆ’1 โˆ’ 1 assignments: โ€ข Find an โ€œoptimisticโ€ assignment ฯƒt that would determine at least a 1/2r fraction of variables not in t. (The existence of such an assignment is guaranteed by Lemma 1.) โ€ข Set Ct = {T, F }rโˆ’1 \ ฯƒt . 3. Run DESCEND on the set of r โˆ’ 1-tuples and their corresponding sets of assignments, each of size 2rโˆ’1 โˆ’ 1. ASCEND AND VERIFY: Input: Proposed assignments ฯƒv for each variable v โˆˆ V for some set V of variables. Integer r indicating the size of the tuples whose constraints generated the proposed assignments, and assignment ฯƒt to a r โˆ’ 1-tuple t, such that Ctโˆชv provided the implication ฯƒt โ†’ ฯƒv . Access to sets of allowable assignments corresponding to all tuples of size r โ€ฒ โˆˆ {r, . . . , r0 }. Constant A = 2r0 log(1/ฮด) log(1/วซ))/วซ2 . 1. Randomly sample A verified variable assignments. 2. If all verified variable assignments agree with the proposed assignments, ฯƒv , then permanently assign v โˆˆ V with their proposed assignments, ฯƒv . 3. Otherwise, let v denote a variable whose true/verified assignment av 6= ฯƒv , disagrees with the proposed assignment to v. Hence (ฯƒt , av ) 6โˆˆ Ctโˆชv so assignment (ฯƒt , av ) together with the constraints on the r + 1 tuples must imply at least a 1/2r fraction of variable assignments. Denote these assignments by ฯƒ new . โ€ข Run AscendAndVerify(ฯƒ new , r + 1, {t โˆช v}, (ฯƒt , av )) 3 An Efficient Algorithm The linear-time variant of the basic algorithm described in the previous section hinges on two observations. The first is that for a given r-tuple t, rather than consulting all ฮ˜(n) constraints Ctโˆชxi for all xi 6โˆˆ t to determine the โ€œoptimisticโ€ assignment to t, one can determine an assignment that implies at least a 21 21r fraction of the variable values, with high probability, via sampling a constant (independent of n but dependent on r, วซ, ฮด) number of such constraints. Note that this sampling does not look at any of the โ€œverifiedโ€ variable assignmentsโ€”it just samples which of the constraints to consider. We formalize this ability to efficiently determine an โ€œoptimisticโ€ assignment via the following subroutine, and the following lemma characterizing its performance. 9 FIND OPTIMISTIC ASSIGNMENT: Input: Set of n variables X, r-tuple t, the ability to query constraints Ctโ€ฒ for |tโ€ฒ | = r0 โ‰ฅ r (i.e. the ability to find optimistic assignments to tuples tโ€ฒ with |tโ€ฒ | = r0 ) and probability of failure ฮณ > 0. Output: An optimistic assignment ฯƒt to t that would, with probability at least 1 โˆ’ ฮณ, imply the assignments to at least a 1/2r+1 fraction of other variables via the constraints Ctโˆชx . We define Ct := {T, F }r \ {ฯƒt }. 1. If r = r0 then return constraint Ct . 2. Else โ€ข Select s = 3 ยท 2|t| log(1/ฮณ) variables x1 , . . . , xs uniformly at random from X \ t. โ€ข For each of these s variables, xi , compute Ctโˆชxi via a (recursive) call to F indOptimisticAssignment(X, t โˆช xi , P robF ailure = ฮณ/(2s)). โ€ข Define assignment ฯƒt โˆˆ {T, F }r to be the lexicographically first assignment that, via the constraints {Ctโˆชxi }, imply at least a 1/2r fraction of variables {x1 , . . . , xs }. [Note that such an assignment exists, since for each xi , |Ctโˆชxi | โ‰ค 2r+1 โˆ’ 1 has at least one out of the 2r possible assignment to t that would imply that value of xi .] โ€ข Call ฯƒt the โ€œoptimisticโ€ assignment to tuple t, and store Ct = {T, F }r \ ฯƒt . The following two lemmas quantify the performance of the above algorithm. The first lemma characterizes the probability of failure, and the proof follows immediately from standard Chernoff tail bounds. Lemma 2. With probability at least 1 โˆ’ ฮณ the optimistic assignment ฯƒt returned by algorithm FindOptimisticAssignment on input X and t has the property that for at least a 1/2|t|+1 fraction of variables x โˆˆ X, the assignment ฯƒt together with the constraint set Ctโˆชx that would be computed by the algorithm on input tuple t โˆช x, implies the value of variable x. Proof. Letting p denote the true fraction of variables, x, whose assignments are implied by ฯƒt and Ctโˆชx . Recall that ฯƒt was chosen based on s independent samples, yielding an empirical estimate pฬ‚ โ‰ฅ 1/2|t| , and โˆ’ s standard tail bounds yield that Pr[pฬ‚ > 2p] โ‰ค e 3ยท2|t| , yielding the lemma, since s = 3 ยท 2|t| log(1/ฮณ). Lemma 3. Given constant-time query access to the constraint sets Ctโ€ฒ for tuples satisfying |tโ€ฒ | = r0 , for any tuple t, algorithm FindOptimisticAssignment on input t and probability of failure ฮณ > 0 returns Ct and 2 runs in time/queries (2 log(1/ฮณ))O(r0 ) , which is independent of the size of the variable set, |X|. Proof. Note that computing Ct calls O(2|t| log(1/ฮณ)) computations of Ctโ€ฒ for |tโ€ฒ | = |t| + 1, each called with error parameter 2|t| smaller. When |t| = r0 , Ct is obtained via a single constant-time query. Expanding this recursion yields the above lemma. The second observation that underpins the efficient algorithm is that we do not need to determine the optimistic assignments and form constraints Ct for all nr r-tuples t. For each phase of the algorithm, which returns assignments to a constant fraction of the unassigned variablesโ€”at least 1/2r0 โ€”it suffices to find a single tuple t that takes its โ€œoptimisticโ€ assignment. Indeed, such a tuple, by definition, takes values that imply assignments to a constant fraction of the remaining variables. And for each of these variables, x, whose assignment is implied by the assignment to the tuple t, the value of variable x can be determined in constant time by consulting the constraint Ctโˆชx . This observation is clarified in the following algorithm, which is an adaptation of the Descend/AscendAndVerify algorithm described in the previous section. Finally, we highlight the fact that the algorithm proceeds iteratively. Given an initial set of variables, Y , at some intermediate step in the algorithm, we let X denote the set of variables for which we have not 10 yet output an assignment. The algorithm will terminate when |X| โ‰ค วซ|Y |/2. The goal of the current step of the algorithm will be to output assignments to at least a 1/2r0 fraction of variables in X, such that the |Y | วซ fraction of such assignments that are incorrect is bounded by 2 log(2/วซ) |X| . Given this bound on the fraction of incorrect returned at this phase of the algorithm, the total fraction of errors is bounded by R 1 assignments วซ ยท 1t dt = วซ where the first วซ/2 is a bound on the error due to the arbitrary assignments to วซ/2 + t=วซ/2 2 log(2/วซ) the last โ‰ค วซ|Y |/2 variables. The benefit of having the target accuracy increase as |X| decreases is because we are given verified samples, drawn uniformly at random from Y . To โ€œcheckโ€ a proposed assignment to set X to a target accuracy of ฮณ, we need at least 1/ฮณ verified samples from the set X (ignoring the logarithmic dependence on the probability of failure). To guarantee that this number of verified samples is obtained from |Y | verified samples from Y . Using the above trick of having the desired set X, we will need to draw โ‰ˆ ฮณ|X| accuracy degrade as |X| decreases, for each phase of the algorithm, a set of |Y |/|X| |Y | วซ 2 log(2/วซ) |X| = Oฬƒ(1/วซ) verified samples is requiredโ€”as opposed to the ฮ˜(1/วซ2 ) samples that would have been required if we had fixed the target error rate to be วซ for all rounds of the algorithm. EFFICIENT FIND ASSIGNMENTS: Input: Set of n variables Y , integer r0 and for every r0 -tuple t โŠ‚ Y , a set of allowable assignments Ct with |Ct | โ‰ค 2r0 โˆ’ 1. Error parameter วซ > 0 and probability of failure ฮด. Output: Set of T /F assignments to each x โˆˆ Y . โ€ข Set T = r0 ยท 2r0 +1 log(2/วซ). โ€ข While there are at least วซn/2 unassigned variables: 1. Let X โŠ‚ Y denote the set of unassigned variables. 2. Let วซX = |Y | วซ 2 log(2/วซ) |X| | denote the target accuracy of this round, and set s = 10 วซX|Y|X| log(10T /ฮด). 3. Take s verified samples, revealing the planted assignment values for each of these variables. Let X1 โŠ‚ X denote the subset of these variables that are in set X, and for each x โˆˆ X1 let ax denote |X| the verified assignment to variable x. If |X1 | < s 2|Y | output FAIL. 4. For each x โˆˆ X1 , determine Cx via FindOptimisticAssignments with failure parameter ฮณ = ฮด/T . 5. If, for all x โˆˆ X1 , ax = Cx , then for every variable x โˆˆ X, compute and output assignment Cx . 6. Otherwise, let x1 โˆˆ X1 denote a variable for which ax EfficientAscend(X, i, x1 , ax1 , s). 11 6= Cx , and run EFFICIENT ASCEND: Input: Set of variables X, integer i โˆˆ {1, . . . , r0 โˆ’ 1}, tuple t with |t| = i, verified assignments at โˆˆ {T, F }|t| to tuple t, and parameter s. Output: Output to a subset of variables in set X. 1. If i โ‰ฅ r0 output FAIL. 2. Take si = s ยท 2i verified samples, and let Xi+1 denote the intersection of X with this set of variables with verified assignments, with ax denoting the verified assignment to variable x โˆˆ Xi+1 . 3. For each x โˆˆ Xi+1 , determine Ctโˆชx via a call to FindOptimisticAssignment(X, tโˆชx, F ailureP rob = โ€ฒ ฮด/(10T ยท si )), and let Xi+1 โŠ‚ Xi+1 denote the subset of variables x โˆˆ Xi+1 for which the constraint โ€ฒ | โ‰ค s |X| output FAIL. Ctโˆชx together with at implies a value ฯƒx for x. If |Xi+1 i 4ยท2i |Y | โ€ฒ , it holds that ฯƒ = a , then for every variable x โˆˆ X, compute C 4. If, for all x โˆˆ Xi+1 x x tโˆชx and output assignment ฯƒx if ฯƒx is implied by Ctโˆชx and at . โ€ฒ 5. Otherwise, let xi+1 โˆˆ Xi+1 denote a variable for which Ctโˆชxi+1 and at implies assignment ฯƒxi+1 6= axi+1 . Run EfficientAscend(X, i + 1, t โˆช xi+1 , (at , axi+1 ), s). Proposition 2. Algorithm EfficientFindAssignments, when run with error parameter วซ and probability of failure ฮด, has the following properties:  โ€ข The algorithm will require at most Oฬƒ 1วซ ยท 22r0 log(1/ฮด) verified samples drawn uniformly at random from the set of variables, Y . โ€ข With probability at least 1 โˆ’ ฮด, the algorithm will output assignments to each variable x โˆˆ Y , such that at most an วซ fraction of the assignments disagree with the planted assignment. โ€ข The algorithm runs in time Or0 ,วซ,ฮด (n), where the hidden constant is a function of r0 , วซ, ฮด. Proof. The high level outline of the execution of algorithm EfficientFindAssignments is that in each step of the outer WHILE loop, an assignment to at least a 1/2r0 +1 fraction of the remaining unassigned variables, X, will be output. This continues until |X| โ‰ค วซn/2, at which point these remaining variables can be assigned arbitrary labels and the algorithm terminates. Hence there will be at most O (2r0 log(1/วซ)) iterations of the while loop. In the iteration conducted on unassigned variable set X โŠ‚ Y , the goal will be to return assignn วซ ments such that the fraction of returned assignments that are incorrect is at most 2 log(2/วซ) |X| , where |Y | = n is the total number of initial variables. Provided these accuracy goals are met at each step of the algorithm, R1 วซ the overall fraction of errors will be bounded by วซ/2 + f =วซ/2 f1 ยท 2 log(2/eps) df = วซ, where the first term is the errors due to the arbitrary assignment to the remaining โ‰ค วซn/2 variables. Additionally,  the number of verified samples required in each iteration is at most O(r0 s ยท s2r0 ) = Oฬƒ 2r0 1วซ log(1/ฮด) , hence the total number of verified samples across the O (2r0 log(1/วซ)) iterations will be bounded by Oฬƒ(22r0 log(1/ฮด)/วซ), as claimed. We now analyze each run of the WHILE loop in EfficientFindAssignments, and the recursive calls to EfficientAscend. At a high level, in each recursive call to EfficientAscend, either an assignment to at least a 1/2r0 +1 fraction of the remaining unassigned variables is returned via the implications from some (verified) optimistic assignment to a tuple, t; or, we have found a tuple tโˆชxi+1 for which we have verified assignments to all |t| + 1 variables, and for which that assignment, (at , axi+1 ) 6โˆˆ Ctโˆชxi+1 is the optimistic assignment, in which case the subsequent call to EfficientAscend considers this strictly larger tuple tโ€ฒ = t โˆช xi+1 . 12 To bound the runtime of the algorithm, note that each run of the algorithm requires constant time (dependent on r0 , วซ, ฮด but independent of the number of variables, |X|, up until the point in the algorithm when an assignment will be output (Step 4 in EfficientAscend). At this point in the algorithm, at a computational expense of Or0 ,วซ,ฮด (|X|), an assignment to a constant fraction, at least 1/2r0 +1 of the remaining variables will be output, and the algorithm will then be repeated on the remaining unassigned variables. Hence, the overall runtime of the algorithm will be linear in the number of variables. To bound the probability that a given run of the WHILE loop fails to successfully output an assignY วซ ment to at least |X|/2r0 +1 variables that meets the target accuracy of 2 log(2/วซ) |X| , we will leverage a union bound over a number of standard Chernoff tail bounds. First, note that the probability that EfficientFindAssignments outputs โ€™FAILโ€™ in Step 3 in a given round of the algorithm is bounded by the probability that |X1 | โ‰ค E[|X1 |/2], where X1 is a sum of i.i.d 0/1 random variables, hence this probability is bounded by ฮด , where T, as specified in EfficientFindAssignments is a bound on the number of exp(โˆ’E[|X1 |]/8) โ‰ค 10T calls to EfficientAscend which bounds the number of runs of the WHILE loop. Given that |X1 | โ‰ฅ E[|X1 |/2], the probability that the assignment output in Step 5 of EfficientFindAssignments does not meet the target Y วซ |X1 | โ‰ค ฮด . accuracy, วซX = 2 log(2/วซ) 10T |X| , is bounded by (1 โˆ’ วซX ) The remaining probability of failure stems from the execution of EfficientAscend. In this algorithm, failure can stem from three different issues: 1) the constant number of constraints Cยท computed via FindOptimisticAssignment prior to Step 4 of EfficientAscend can be erroneous and fail to imply the desired fraction of assignments. The probability of this is bounded by ฮด/(10T si ), which is sufficient to guarantee that every optimistic assignment/constraint set Cยท that is computed during the execution of the algorithm is accurate and implies the desired fraction of assignments, aside from the O(|Y |) constraints computed during the assignment output stepsโ€”Step 4 of EfficientAscend and Step 5 of EfficientFindAssignments. EfficientAscend will never output FAIL during Step 1, as the constraints corresponding to to i = r0 are the constraints on r0 -tuples, which are satisfied by assumption. The final potential failure mode of the algorithm is Step 3 of EfficientAscend, if the random set of verified assignments is insufficiently large to verify (to the target accuracy) a given potential set of assignments implied by an optimistic assignment via Ctโˆชx . Given that the assignment at to tuple t is optimistic, as guaranteed by the validity of FindOptimisticAssignments described above, this probability of failure is also a trivial application of standard Chernoff bounds, guaranteeing that โ€ฒ | in Step 3 of EfficientAscend deviates from a lower bound on its expectation by the random variable |Xi+1 at most a factor of 1/2. A union bound over these probabilities of failure for each of the โ‰ค T runs of the EfficientAscend algorithm yields the desired proposition. 4 Future Work This work shows that it is possible to tolerate a fraction of โ€œgoodโ€ data, ฮฑ, that is inverse exponential in r0 , the sparsity of each datapoint (i.e. the number of evaluations submitted per reviewer), provided the number of datapoints/reviewers is sufficiently large to ensure that each set of r items has been evaluated by a significant number of good reviewers. Our algorithm runs in time linear in the number of items to review (provided the ability to query summary statistics of the set of reviewers who have evaluated a given sets of items), and uses a constant number of โ€œverifiedโ€ reviews, which is independent of the total number of items to review, and depends inverse linearly on the desired error (to logarithmic factors). One natural question is prompted by the results of [12], which provide efficient algorithms for the regime where r = poly(1/ฮฑ), but where the number of reviewers is linear in the number of items being reviewed (and uses a constant, dependent on ฮฑ, วซ, ฮด verified reviews). Is it possible to achieve the best-of-both-worlds: r = polylog(1/ฮฑ), and a number of reviewers that is linear, or grows significantly more slowly than the nr that we require, while leveraging a constant number of verified reviews? 13 To this end, our algorithm only ever considers โ€œsingle-hopโ€ implications of proposed assignments: an assignment to a set of r variables is considered โ€œoptimisticโ€ if it directly implies values for a significant fraction of the other variables. It is easy to imagine extending this definition to also consider longer chains of implication. Perhaps a specific assignment to r variables would imply values to c1 additional variables, which in turn would imply values to c2 variables, etc. Indeed, in the basic setting of r = 2, this approach can be realized to yield an algorithm that only requires constraints on a random subset of size O(n3/2 ), as opposed to the O(n2 ) constraints assumed in this work. From a computational perspective, it seems unlikely that such an approach could be pushed to yield an efficient algorithm for the regime in which fewer than nr/2 sets of r variables have nontrivial constraints. Indeed, even for random instances of r โˆ’ SAT with a planted solution, efficient algorithms below this threshold have been elusive (see, for example, the recent related work on random CSPs with planted assignments [5, 11]). From a purely information theoretic perspectiveโ€”the picture is not entirely clear either. In contrast to random CSPs, our setting is complicated by the adversarial nature of the constraints that are placed on the r-tuples. Even for a semi-adversarial setting where tuples are chosen at random, and an adversary chooses the constraints to place on those random tuples, it is not immediately clear how to analyze the extent to which implications โ€œpropagateโ€. A second difficulty is that the goal of our setting is not just to find a satisfying assignment, but to find something close to a specific planted assignment. Our results imply, for the setting we consider, that there are at most a constant number of solution clusters. It seems interesting to investigate the extent to which this holds for semi-adversarial CSPs with fewer constraints, perhaps with nr/2 constraints being the threshold between a constant and super-constant number of such clusters. References [1] Kush Bhatia, Prateek Jain, and Purushottam Kar. Robust regression via hard thresholding. In Advances in Neural Information Processing Systems, pages 721โ€“729, 2015. [2] Emmanuel J Candes and Yaniv Plan. Matrix completion with noise. Proceedings of the IEEE, 98(6):925โ€“936, 2010. [3] M. Charikar, J. Steinhardt, and G. Valiant. Learning from untrusted data. In Symposium on Theory of Computing (to appear), 2017. [4] Ilias Diakonikolas, Gautam Kamath, Daniel M Kane, Jerry Li, Ankur Moitra, and Alistair Stewart. Robust estimators in high dimensions without the computational intractability. In Foundations of Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 655โ€“664. IEEE, 2016. [5] Vitaly Feldman, Will Perkins, and Santosh Vempala. On the complexity of random satisfiability problems with planted solutions. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, pages 77โ€“86. ACM, 2015. [6] Frank R Hampel, Elvezio M Ronchetti, Peter J Rousseeuw, and Werner A Stahel. Robust statistics: the approach based on influence functions, volume 114. John Wiley & Sons, 2011. [7] David Haussler. Sphere packing numbers for subsets of the boolean n-cube with bounded vapnikchervonenkis dimension. Journal of Combinatorial Theory, Series A, 69(2):217โ€“232, 1995. [8] Peter J Huber. Robust statistics. Springer, 2011. [9] Raghunandan H Keshavan, Andrea Montanari, and Sewoong Oh. Matrix completion from a few entries. IEEE Transactions on Information Theory, 56(6):2980โ€“2998, 2010. 14 [10] Kevin A Lai, Anup B Rao, and Santosh Vempala. Agnostic estimation of mean and covariance. In Foundations of Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 665โ€“674. IEEE, 2016. [11] Prasad Raghavendra, Satish Rao, and Tselil Schramm. Strongly refuting random csps below the spectral threshold. arXiv preprint arXiv:1605.00058, 2016. [12] Jacob Steinhardt, Gregory Valiant, and Moses Charikar. Avoiding imposters and delinquents: Adversarial crowdsourcing and peer prediction. In Advances in Neural Information Processing Systems, pages 4439โ€“4447, 2016. [13] John W Tukey. A survey of sampling from contaminated distributions. Contributions to probability and statistics, 2:448โ€“485, 1960. 15
7cs.IT
SCUT-FBP5500โ€ก: A Diverse Benchmark Dataset for Multi-Paradigm Facial Beauty Prediction Abstractโ€”Facial beauty prediction (FBP) is a significant visual recognition problem to make assessment of facial attractiveness that is consistent to human perception. To tackle this problem, various data-driven models, especially state-of-the-art deep learning techniques, were introduced, and benchmark dataset become one of the essential elements to achieve FBP. Previous works have formulated the recognition of facial beauty as a specific supervised learning problem of classification, regression or ranking, which indicates that FBP is intrinsically a computation problem with multiple paradigms. However, most of FBP benchmark datasets were built under specific computation constrains, which limits the performance and flexibility of the computational model trained on the dataset. In this paper, we argue that FBP is a multi-paradigm computation problem, and propose a new diverse benchmark dataset, called SCUT-FBP5500, to achieve multi-paradigm facial beauty prediction. The SCUTFBP5500 dataset has totally 5500 frontal faces with diverse properties (male/female, Asian/Caucasian, ages) and diverse labels (face landmarks, beauty scores within [1, 5], beauty score distribution), which allows different computational models with different FBP paradigms, such as appearance-based/shape-based facial beauty classification/regression model for male/female of Asian/Caucasian. We evaluated the SCUT-FBP5500 dataset for FBP using different combinations of feature and predictor, and various deep learning methods. The results indicates the improvement of FBP and the potential applications based on the SCUT-FBP5500. I. I NTRODUCTION Assessing facial beauty seems natural for human being, but an absolute definition of facial beauty remains elusive. Recently, facial beauty prediction (FBP) have attracted evergrowing interest in the pattern recognition and machining learning communities [8]โ€“[10], which aims to achieve automatic human-consistent facial attractiveness assessment by a computational model. It has application potential in facial makeup synthesis/recommendation [10]โ€“[12], content-based image retrieval [16], aesthetic surgery [10], or face beautification [4]โ€“[7]. From the computational perspective, FBP is still a challenging problem. It is involved with the formulation of visual This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant 61472144 and Grant 61502176; in part by GDSTP under Grant 2015B010101004, Grant 2015B010130003, Grant 2015B010131004; in part by the National Key Research & Development Plan of China under Grant 2016YFB1001405; and in part by Fundamental Research Funds for the Central Universities (No.2017BQ058). *Corresponding author: Lianwen Jin. Beau utyscore e arXiv:1801.06345v1 [cs.CV] 19 Jan 2018 Lingyu Liang, Luojun Lin, Lianwen Jin*, Duorui Xie and Mengru Li South China University of Technology, Guangzhou 510641, China E-mail:{lianwen.jin, lianglysky}@gmail.com โ€ก Dataset Download URL: https://github.com/HCIILAB/SCUT-FBP5500-Database-Release 5 4 3 2 1 0 Asia Female 1 2 3 4 5 Asia Male Caucasian Female Caucasian Male Fig. 1. The images with different facial properties and beauty scores from the proposed SCUT-FBP5500 benchmark dataset. The dataset download URL is shown below the title. representation and predictor for the abstract concept of facial beauty. To tackle this problem, various data-driven models, were introduced into FBP. One line of the works follows the classic pattern recognition process, which constructs the FBP system using the combination of the hand-crafted features and the shallow predictors. The related hand-crafted feature derived from visual recognition includes the geometric features, like the geometric ratios and landmark distances [8], [15], [19]โ€“[21], [23], and the texture features, like the Gabor/SIFT-like features [24]โ€“[26]. Then, a shallow FBP predictoris trained by the extracted feature in a statistical manner. Another line of works is advanced by the reviving of neural networks, especially the stat-of-the-art deep learning [14]. The hierarchial structure of the deep learning model allows to build an end-to-end FBP system that automatically learns both the representation and the predictor of facial beauty simultaneously from the data. Many works indicate that FBP TABLE I R EPRESENTATIVE DATABASES FOR FACIAL B EAUTY P REDICTION Database Image Num. Labelers/Image Beauty Class Face Property Face Landmarks Publicly Available ร— โˆš ร— Y. Eisenthal et al. [15] 184 28 or 18 7 Caucasian Female F. Chen et al. [22] 23412 unknown 2 Asian Male/Female H. Gunes et al. [35] 215 46 10 Female J. Fan et al. [23] 432 30 7 Generated Female M. Redi et al. [34] 10141 78-549 10 Multiple (Sampled from AVA [16]) SCUT-FBP [1] 500 70 5 Asian Female SCUT-FBP5500 5500 60 5 Asian/Caucasian; Male/Female based on deep learning is superior to the shallow predictors with hand-crafted facial feature [1]โ€“[3], [29], [30], [33]. Most of current FBP models are data-driven, which makes benchmark dataset become one of the essential elements for FBP. There have been many works of the benchmark datasets [16], [22]โ€“[24], [30], [33]โ€“[35] involved with FBP, but most of these datasets focus on a specific problem with specific computation constrains, as shown in Table I. Yan et al. [24] regarded FBP as a ranking problem, and proposed a dataset with low-resolution images gathered from social networks. Fan et al. [23] focused on the geometry analysis of FBP and proposed a dataset containing computergenerated faces with different facial proportions. The Northeast China database [22], Shanghai database [21], Hot-Or-Not database [32], [33], AVA database [16] and re-sampled face subset of AVA database [34] are large-scale databases involved with FBP, where the Northeast China [22] and Shanghai database [21] are limited for geometric facial beauty analysis without attractiveness ratings; Hot-Or-Not database [32], [33] only focuses on the appearance-based FBP; and the AVA database [16], [34] is originally designed for aesthetic analysis of entire images but not the facial attractiveness. In our previous work, Xie et al. [1] published a SCUT-FBP benchmark dataset, which has led to many FBP models [1]โ€“[3], [31], [37], especially the hierarchial CNN-based FBP models with the state-of-the-art deep learning [1]โ€“[3], [37]. Despite the prevalent usage of the SCUT-FBP, it only contains 500 Asian Female faces, which may limit the performance of the datademanded model for FBP. We find that FBP have been formulated the recognition of facial beauty as a specific supervised learning problem of classification [15], [20], [27], [30], regression [13], [19], [23], [29], [38] or ranking [24], [25], [37]. It indicates that FBP is intrinsically a computation problem with multiple paradigms. Previous databases built under specific computation constrains would limit the performance and flexibility of the computational model trained on the dataset, and it is difficult to compare different models derived from the dataset with specific computation paradigm. Therefore, this paper argues that FBP is a multi-paradigm computation problem, and proposes a new diverse benchmark dataset, called SCUTFBP5500, to achieve multi-paradigm facial beauty prediction. โˆš โˆš ร— โˆš โˆš ร— ร— ร— โˆš โˆš โˆš The SCUT-FBP5500 dataset has totally 5500 frontal faces with diverse properties (male/female, Asian/Caucasian, ages) and diverse labels (face landmark, beauty score, beauty score distribution), which allows different computational model with different FBP paradigms, such as appearance-based/shapebased facial beauty classification/regression/ranking model for male/female with Asian/Caucasian. Furthermore, the diverse faces with beauty scores gathered from 60 different labelers can lead to many interesting research, such as cross-culture facial beauty analysis, personalized FBP [36], or automatic face beautification [4]โ€“[7]. Both shallow prediction model with hand-crafted feature and the state-of-the-art deep learning models were evaluated on the dataset, and the results indicates the improvement of FBP and the potential applications by the SCUT-FBP5500. The main contributions of this paper can be summarized as following: 1) Dataset. We propose a new large-scale SCUT-FBP5500 benchmark dataset that has totally 5500 frontal faces with diverse properties and diverse labels, which allows construction of FBP models with different paradigms. 2) Benchmark Analysis. We analyze the samples, score labels, labelers and facial landmarks of the SCUTFBP5500 statistically, and the visualization of the data illustrates the properties of the SCUT-FBP5500. 3) Facial Beauty Prediction Evaluation. Both shallow prediction model with hand-crafted feature and deep learning models are trained on the SCUT-FBP5500 for evaluation, and the results indicates the improvement of FBP based on the proposed dataset with better diversity. II. C ONSTRUCTION OF SCUT-FBP5500 DATASET A. Face Images Collection The SCUT-FBP5500 Dataset contains 5500 frontal, unoccluded faces aged from 15 to 60 with neutral expression. It can be divided into four subsets with different races and gender, including 2000 Asian females, 2000 Asian males, 750 Caucasian females and 750 Caucasian males. Most of the images of the SCUT-FBP5500 were collected from Internet, where some portions of Asian faces were from the DataTang [39] and some Caucasian faces were from the 10k US Adult database [40]. TABLE II T HE O UTLIER N UMBER AND P ORTION OF B EAUTY S CORES OF C AUCASIAN FEMALE (CF), C AUCASIAN MALE (CM), A SIAN FEMALE (AF) AND A SIAN MALE (AM). Subset Total Score Num. Outlier Num. Outlier Portion CF 45000 143 0.3% CM 45000 181 0.4% AF 120000 356 0.3% AM 120000 497 0.4% (a) Score distribution of CF (b) Score distribution of CM (c) Score distribution of AF (d) Score distribution of AM Fig. 2. Gaussian fitting (yellow curve) and piecewise fitting (red and blue curve) for the visualization of the beauty score distribution of Caucasian female (CF), Caucasian male (CM), Asian female (AF) and Asian male (AM). Fig. 3. Distribution of standard deviations of Caucasian female, Asian female, Caucasian male and Asian male, respectively. (a) Box figure of CF (b) Box figure of AF (c) Box figure of CM (d) Box figure of AM B. Facial Beauty Scores and Facial Landmarks All the images are labeled with beauty scores ranging from [1, 5] by totally 60 volunteers aged from 18-27 (average 21.6), where the beauty score 5 means most attractive and so on. We developed a web-based GUI system to obtain the facial beauty scores. The labeling system was deployed on the Ali Cloud, and the labeling tasks are distributed to each volunteer in crowdsourcing manners. The four subset, Asian male/female and Caucasian male/female, are labeled separately, where each face of the subset are randomly shown to the volunteer. Then, the volunteer are asked to select the beauty scores within [1, 5] for the face. To reduce the variance in the labeling process, about 10% faces recurred randomly. If the correlation coefficient of the two beauty score of the same faces is less than 0.7, the volunteer would be asked to rate this face once more to decide the final score. To allow geometric analysis of facial beauty, 86 facial landmarks are located to the significant facial components of each images, such as eyes, eyebrows, nose and mouth. A GUI landmarks location system is developed, where the original location of the landmarks are initialized by the active shape model (ASM) trained by the SCUT-FBP dataset. Then, the detected landmarks by ASM are modified manually by volunteers to ensure the accuracy. Fig. 4. Box figures of standard deviations of Caucasian female (CF), Asian female (AF), Caucasian male (CM) and Asian male (AM), respectively. III. B ENCHMARK A NALYSIS OF THE SCUT-FBP5500 We made benchmark analysis of the beauty scores, labelers and face landmarks of the SCUT-FBP5500 with different gender and races, including Asian female (AF), Asian male (AM), Caucasian female (CF) and Caucasian male (CM). A. Distribution of Beauty Scores We visualize the distribution of the beauty scores of AF, AM, CF and CM, respectively. To obtain better visualization, we preprocess the data and filter the outliers of the beauty scores. We regard the average score of all the 60 labelers as the ground-truth. If the score of specific labeler for the same face differs from the ground-truth over 2, the score is treated as outlier and is removed from the distribution visualization. TABLE III C ORRELATION C OEFFICIENTS BETWEEN M ALE AND F EMALE L ABELERS FOR B EAUTY S CORE OF C AUCASIAN FEMALE (CF), C AUCASIAN MALE (CM), A SIAN FEMALE (AF) AND A SIAN MALE (AM). Female Labelers Male Labelers All Labelers CF 0.785 0.791 0.788 AF 0.800 0.795 0.785 CM 0.747 0.763 0.743 AM 0.793 0.797 0.782 All Faces 0.785 0.781 0.770 distributions of the original data and the preprocessed data is mostly similar. Therefore, we visualized the score distribution of the SCUT-FBP5500 using the preprocessed data for all the four subset, respectively. Two distribution fitting schemes are used: one is Gaussian fitting (yellow curve), the other is piecewise fitting (red and blue curve), as shown in Fig. 2. The results indicates that the beauty scores of all the four subset can be approximately fitted by a mixed distribution model with two Gaussian components. B. Standard Deviation of Beauty Scores Female Labeler Male Labeler All Labeler CF AF CM AM All Faces We calculate the standard deviation of the scores gathered from different labelers to the ground-truth, and illustrate the results as histogram in Fig. 3 and as box figure in Fig. 4. We observe that the distribution of standard deviations is similar to Gaussian distribution, and most of the standard deviations are within a reasonable range of [0.6, 0.7]. C. Correlation of Male/Female Labelers 2nd PC 1st PC Fig. 5. Correlation Coefficient of male and female labelers for beauty score of CF, AF, CM, AM and all the faces in SCUT-FBP5500. In this subsection, we investigate the correlation between the male and female Asian labelers for the beauty scores, as shown in Table III and Fig. 5. We observe that the correlation of Asian faces is persistently larger than Caucasian. It is consistent to the psychological research that human have better facial beauty perception for the faces from the same race. 5th PC 4th PC 3rd PC D. PCA Analysis of Facial Geometry mean-4*sigma mean mean+4*sigma (a) PCA Analysis of AF 1st PC โฌ‹แ—ปฯขเฝ‡แ—ปาŽใœŒแ”ถโขŠโฑ˜ะแŸค฿šเฆฌเฃช We visualize the 86-points face landmarks of the dataset using principle component analysis (PCA). Fig. 6 illustrate the mean and the five first principle component of the facial geometry of Asian female (AF) and Asian male (AM), where the landmarks data of Caucasian share similar distribution to Asian faces. We observe that the face shape is one of the main component influence the face geometry of beauty, which is consistent to related psychological research and previous works in [21], [22] 2nd PC IV. FBP E VALUATION VIA H AND -C RAFTED F EATURE AND S HALLOW P REDICTOR 4th PC 3rd PC This section, we evaluate the SCUT-FBP5500 using the hand-crafted feature with shallow predictor, while the next section introduce some state-of-the-art deep learning model to achieve FBP. 5th PC A. Geometric Feature with Shallow Predictor We extract a 18-dimensional ratio feature vector from the faces and formulate FBP based on different regression mod(b) PCA Analysis of AM els, such as the linear regression (LR), Gaussian regression เณ’ โฌ‹แ—ปฯขเฝ‡แ—ปาŽใœŒแ”ถโขŠโฑ˜ะแŸค฿šเฆฌเฃช Fig. 6. PCA analysis of face landmarks of Asian female (AF) and Asian (GR), and support vector regression (SVR). Comparison were performed for Caucasian female/male and Asian female/male male (AM). subsets, and the performance of different model are measured using pearson correlation coefficient (PC) [15], maximum abThe number and portion of the outliers in the four subset are solute error (MAE) and root mean square error (RMSE) after listed in Table II, and the small portion of outlier indicate the 10 folds cross validation. The results are listed in Table IV and reliability of the labeling process for beauty score. Table V, which can be regarded as a baseline for the geometric Since the outlier portion of the beauty score is tiny, the analysis of FBP. mean-4*sigma mean mean+4*sigma TABLE IV FACIAL BEAUTY PREDICTION USING GEOMETRIC FEATURE WITH SHALLOW MODELS FOR SUBSETS OF DIFFERENT RACES AND GENDER PC MAE RMSE PC MAE RMSE Asian Female LR GR SVR 0.6771 0.7057 0.7008 0.402 0.387 0.3876 0.5246 0.5057 0.5089 Caucasian Female LR GR SVR 0.6809 0.7263 0.7093 0.3986 0.3862 0.4001 0.5239 0.4908 0.5087 Asian Male LR GR SVR 0.6348 0.6923 0.6816 0.3894 0.3572 0.356 0.5085 0.4752 0.4823 Caucasian Male LR GR SVR 0.6063 0.63 0.6397 0.3871 0.3689 0.3617 0.4899 0.4784 0.4739 TABLE V FACIAL BEAUTY PREDICTION USING G EOMETRIC F EATURE WITH TABLE VII C OMPARISON OF A LEX N ET [41], R ES N ET-18 [42] AND R ES N E X T-50 [43] IN MEASUREMENT OF PC, MAE AND RMSE BY 5- FOLD CROSS VALIDATION PC AlexNet ResNet-18 ResNeXt-50 MAE AlexNet ResNet-18 ResNeXt-50 RMSE AlexNet ResNet-18 ResNeXt-50 1 0.8667 0.8847 0.8985 1 0.2633 0.248 0.2306 1 0.3408 0.3258 0.3025 2 0.8645 0.8792 0.8932 2 0.2605 0.2459 0.2285 2 0.3449 0.3286 0.3084 3 0.8615 0.8929 0.9016 3 0.2681 0.243 0.226 3 0.3538 0.3184 0.3016 4 0.8678 0.8932 0.899 4 0.2609 0.2383 0.2349 4 0.3438 0.3107 0.3044 5 0.8566 0.9004 0.9064 5 0.2728 0.2383 0.2258 5 0.3576 0.2994 0.2918 Average 0.8634 0.89 0.8997 Average 0.2651 0.2419 0.2291 Average 0.3481 0.3166 0.3017 SHALLOW MODELS FOR THE WHOLE DATASET Linear Regression Gaussian Regression SVR 0.5948 0.4289 0.5531 0.6738 0.3914 0.5085 0.6668 0.3898 0.5132 PC MAE RMSE TABLE VI FACIAL BEAUTY PREDICTION USING G ABOR FEATURE WITH TWO SAMPLING SCHEME ON WHOLE DATASET PC MAE RMSE 86-keypoints GR SVR 0.7472 0.6691 0.3554 0.3891 0.4599 0.5065 64UniSample GR SVR 0.6764 0.8065 0.4014 0.3976 0.5177 0.5126 Fig. 7. Two sampling schemes to extract the appearance feature of FBP, where the left one is the 86-keypoints method and the right one is the UniSamplePoint method. B. Appearance Feature with Shallow Predictor We extract 40 Gabor feature maps from every original image in five directions and eight angles. Then, we obtain the appearance feature of FBP using two different sampling schemes that extracts some component of the Gabor feature maps as following: โ€ข Sample 86-keypoints from each 40 Gabor feature maps to obtain a 3340-dimensional feature vector, as shown in the right sub-figure of Fig. 7; โ€ข Use 64UniSample to obtain a 2560-dimensional feature vector, as shown in the left sub-figure of Fig. 7. Finally, we use PCA to reduce the extracted feature dimension before we train the predictor. The results of the appearancebased shallow predictors for all the data are shown in Table VI. TABLE VIII C OMPARISON OF A LEX N ET [41], R ES N ET-18 [42] AND R ES N E X T-50 [43] IN MEASUREMENT OF PC, MAE AND RMSE BY 60% TRAINING AND 40% TESTING PC MAE RMSE AlexNet ResNet-18 ResNeXt-50 0.8298 0.2938 0.3819 0.8513 0.2818 0.3703 0.8777 0.2518 0.3325 V. FBP E VALUATION VIA D EEP P REDICTOR We evaluate three recently proposed CNN models with different structures for FBP, including AlexNet [41], ResNet18 [42] and ResNeXt-50 [43]. All these CNN models are trained by initializing weights using networks pre-trained on the ImageNet dataset. The evaluation of were performed under two different experiment settings as following: 1) The models were trained and tested using 5-fold cross validation, which means each fold containing 20% samples (1100 images). The accuracy of each fold and the average of all the 5 fold are shown in Table VII. 2) The models were trained using 60% samples (3300 images), and tested with the rest 40% (2200 images). The results are shown in Table VIII. The results illustrates that the deepest CNN-based ResNeXt50 model [43] obtains the best performance comparing to the ResNet-18 and AlexNet in both the experiment setting. It can be observed that all the deep CNN model are superior to the shallow predictor with hand-crafted geometric feature in Table V or appearance feature in Table VI. It indicates the effectiveness and powerfulness of the end-to-end feature learning deep model for FBP. Comparing the results of Table VII and Table VIII, we also find that the accuracy of all the 5-fold cross validation is slightly higher than the results of the split of 60% training and 40% testing. One of the reasons may be due to the amounts and diversity of the training samples, since the 5-fold cross validation use 80% samples to train the models. This observation indicates that the data augmentation techniques may further improve the performance of the deep FBP model, which merits exploring in the future. VI. C ONCLUSION In this paper, we introduce a new diverse benchmark dataset, called SCUT-FBP5500, to achieve multi-paradigm facial beauty prediction. The SCUT-FBP5500 dataset has totally 5500 frontal faces with diverse properties (male/female, Asian/Caucasian, ages) and diverse labels (face landmarks, beauty scores within [1, 5], beauty score distribution). Benchmark analysis have been made for the beauty scores and landmarks in SCUT-FBP5500, and the visualization of the data shows the statistical properties of the dataset. Since the SCUTFBP5500 is designed for multi-paradigm, it can be adapted to different FBP models for different tasks, like appearancebased or shape-based model for facial beauty classification/regression/ranking. We evaluated the SCUT-FBP5500 using different combinations of feature and predictor, and deep learning models, where the results indicates the reliability of the dataset. R EFERENCES [1] D. Xie, L. Liang, L. Jin, J. Xu and M. Li, โ€œSCUT-FBP: A Benchmark Dataset for Facial Beauty Perception,โ€ in Proc. of IEEE SMC, pp. 18211826, 2015. [2] L. Liang, D. Xie, L. Jin, J. Xu, M. Li, and L. Lin, โ€œRegion-aware scattering convolution networks for facial beauty prediction,โ€ in Proc. of IEEE ICIP, pp. 2861-2865, 2017. [3] J. Xu, L. Jin, L. Liang, Z. Feng, D. Xie, and H. Mao, โ€œFacial attractiveness prediction using psychologically inspired convolutional neural network (PI-CNN),โ€ in Proc. of IEEE ICASSP, pp. 1657-1661, 2017. [4] L. Liang, L. Jin, and D. Liu, โ€œEdge-aware label propagation for mobile facial enhancement on the cloud,โ€ IEEE Trans. on Circuits and Systems for Video Technology, vol. 27, no. 1, pp. 125-138, 2017. [5] L. Liang, L. Jin, and X. Li, โ€œFacial skin beautification using adaptive region-aware mask,โ€ IEEE Trans. on Cybernetics, vol. 44, no. 12, pp. 2600-2612, 2014. [6] J. Li, X. Chao, L. Liu, X. Shu, and S. Yan, โ€œDeep face beautification,โ€ Proc. ACM International Conference on Multimedia, pp. 793-794, 2015. [7] T. Leyvand, D. Cohen-Or, G. Dror, and D. Lischinski, โ€œData-driven enhancement of facial attractiveness,โ€ ACM Trans. Graph., pp. 28:1-10, 2008. [8] H. Gunes, โ€œA survey of perception and computation of human beauty,โ€ in Proc. of J-HGBU, pp. 19-24, 2011. [9] A. Laurentini and A. Bottino, โ€œComputer analysis of face beauty: A survey,โ€ Comput. Vision and Image Underst., vol. 125, pp. 184โ€“199, 2014. [10] D. Zhang, F. Chen, and Y. Xu, Computer models for facial beauty analysis. Springer International Publishing Switzerland, 2016. [11] L. Liu, J. Xing, S. Liu, H. Xu, X. Zhou, and S. Yan, โ€œWow! you are so beautiful today!,โ€ ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 11, no. 1s, p. 20, 2014. [12] K. Scherbaum, T. Ritschel, M. Hullin, T. Thormaฬˆhlen, V. Blanz and H. Seidel, โ€œComputer-suggested facial makeup,โ€ Comput. Graph. Forum, vol. 30, no. 2, pp. 485-492, 2011. [13] Y. Mu, โ€œComputational facial attractiveness prediction by aestheticsaware features,โ€ Neurocomputing, vol. 99, pp. 59-64, 2013. [14] Y. LeCun, Y. Bengio and G. Hinton, โ€œDeep learning,โ€ Nature, vol. 251, pp. 436-444, 2015. [15] Y. Eisenthal, G. Dror and E. Ruppin, โ€œFacial Attractiveness: Beauty and the Machine,โ€ Neural Computation, vol. 18, pp. 119-142, 2006. [16] N. Murray, L. Marchesotti L, and F. Perronnin, โ€œAVA: A large-scale database for aesthetic visual analysis,โ€ in Proc. of CVPR, pp. 2408-2415, 2012. [17] A. Laurentini and A. Bottino, โ€œComputer analysis of face beauty: A survey,โ€ Computer Vision and Image Understanding, vol. 125, pp. 184199, 2014. [18] I. Stephen, M. Law Smith, M. Stirrat, and D. Perrett, โ€œFacial skin coloration affects perceived health of human faces,โ€ International Journal of Primatology, vol. 30, no. 6, pp. 845-857, 2009. [19] A. Kagian, G. Dror, T. Leyvand, D. Cohen-Or, and E. Ruppin, โ€œA humanlike predictor of facial attractiveness,โ€ in Proc. of NIPS, pp. 649656, 2006. [20] H. Mao, L. Jin and M. Du, โ€œAutomatic classification of Chinese female facial beauty using Support Vector Machine,โ€ in Proc. of IEEE SMC, pp. 4842-4846, 2009. [21] D. Zhang, Q. Zhao and F. Chen, โ€œQuantitative analysis of human facial beauty using geometric features,โ€ Pattern Recognition, vol. 44, no. 4, pp. 940-950, 2011. [22] F. Chen and D. Zhang, โ€œA benchmark for geometric facial beauty study,โ€ Medical Biometrics, pp. 21-32, 2010. [23] J. Fan, K. P. Chau, X. Wan, L. Zhai and E. Lau, โ€œPrediction of facial attractiveness from facial proportions,โ€ Pattern Recognition, vol. 45, pp. 2326-2334, 2012. [24] H. Yan, โ€œCost-sensitive ordinal regression for fully automatic facial beauty assessment,โ€ Neurocomputing, no. 129, pp. 334-342, 2014. [25] H. Altwaijry and S. Belongie, โ€œRelative ranking of facial attractiveness,โ€ in IEEE Workshop on WACV, pp. 117-124, 2013. [26] Y. Chen, H. Mao, L. Jin, โ€œA novel method for evaluating facial attractivenessโ€, in IEEE Proc. ICALIP, pp. 1382-1386, 2010. [27] W. Chiang, H. Lin, C. Huang, L. Lo, and S. Wan, โ€œThe cluster assessment of facial attractiveness using fuzzy neural network classifier based on 3D Moir features,โ€ Pattern Recognition, vol. 47, no. 3, pp. 1249-1260, 2014. [28] S. Kalayci, H. K. Ekenel, and H. Gunes, โ€œAutomatic analysis of facial attractiveness from video,โ€ in Proc. of ICIP, pp. 4191-4195, 2014. [29] J. Gan, L. Li, Y. Zhai and Y. Liu, โ€œDeep self-taught learning for facial beauty prediction,โ€ Neurocomputing, no. 144, pp. 295-303, 2014. [30] S. Wang, M. Shao and Y. Fu, โ€œAttractive or not? Beauty prediction with attractiveness-aware encoders and robust late fusion,โ€ ACM Multimedia, pp. 805-808, 2014. [31] Y. Ren and X. Geng, โ€œSense beauty by label distribution learning,โ€ in Proc, IJCAI, pp. 2648โ€“2654, 2017. [32] R. White, A. Eden, and M. Maire, โ€œAutomatic prediction of human attractiveness,โ€ UC Berkeley CS280A Proj., vol. 1, p. 2, 2004. [33] D. Gray, K. Yu, W. Xu and Y. Gong, โ€œPredicting facial beauty without landmarks,โ€ in Proc. ECCV, 2010. [34] M. Redi, N. Rasiwasia, G. Aggarwal and A. Jaimes, โ€œThe Beauty of Capturing Faces: Rating the Quality of Digital Portraits,โ€ in IEEE Workshops on AFGR, pp. 1-8, 2015. [35] H. Gunes and M. Piccardi, โ€œAssessing facial beauty through proportion analysis by image processing and supervised learning,โ€ International Journal of Human-Computer Studies, vol. 64, no. 12, pp. 1184-1199, 2006. [36] J. Whitehill and J.R. Movellan, โ€œPersonalized facial attractiveness prediction,โ€ in Proc. AFGR, 2008. [37] Y. Fan, S. Liu, B. Li, Y. Fan, Z. Guo, A. Samal, J. Wan and Stan Z. Li โ€œLabel Distribution based facial attractiveness computation by deep residual learningโ€, IEEE Transactions on Multimedia, 2017 (Online). [38] B. Davis and S. Lazebnik, โ€œAnalysis of human attractiveness using manifold kernel regression,โ€ in Proc. ICIP, 2008. [39] โ€œDataTang,โ€ url: http://datatang.com/. [40] W.A. Bainbridge, P. Isola and A. Oliva, โ€œThe intrinsic memorability of face images.โ€ Journal of Experimental Psychology: General, vol. 142, no. 4, pp. 1323-1334, 2013. [41] A. Krizhevsky, I. Sutskever, and G. E. Hinton, โ€œImagenet classification with deep convolutional neural networks,โ€ in Proc, NIPS, 2012, pp. 1097โ€“ 1105. [42] K. He, X. Zhang, S. Ren, and J. Sun, โ€œDeep residual learning for image recognition,โ€ in Proc, CVPR, 2016, pp. 770โ€“778. [43] S. Xie, R. Girshick, P. Dollaฬr, Z. Tu, and K. He, โ€œAggregated residual transformations for deep neural networks,โ€ arXiv preprint arXiv:1611.05431, 2016.
1cs.CV
1 Degrees of Freedom of the Broadcast Channel with Hybrid CSI at Transmitter and Receivers arXiv:1709.02884v1 [cs.IT] 9 Sep 2017 Mohamed Fadel, Student Member, IEEE, and Aria Nosratinia, Fellow, IEEE Abstract In general the different links of a broadcast channel may experience different fading dynamics and, potentially, unequal or hybrid channel state information (CSI) conditions. The faster the fading and the shorter the fading block length, the more often the link needs to be trained and estimated at the receiver, and the more likely that CSI is stale or unavailable at the transmitter. Disparity of link fading dynamics in the presence of CSI limitations can be modeled by a multi-user broadcast channel with both non-identical link fading block lengths as well as dissimilar link CSIR/CSIT conditions. This paper investigates a MISO broadcast channel where some receivers experience longer coherence intervals (static receivers) and have CSIR, while some other receivers experience shorter coherence intervals (dynamic receivers) and do not enjoy free CSIR. We consider a variety of CSIT conditions for the above mentioned model, including no CSIT, delayed CSIT, or hybrid CSIT. To investigate the degrees of freedom region, we employ interference alignment and beamforming along with a product superposition that allows simultaneous but non-contaminating transmission of pilots and data to different receivers. Outer bounds employ the extremal entropy inequality as well as a bounding of the performance of a discrete memoryless multiuser multilevel broadcast channel. For several cases, inner and outer bounds are established that either partially meet, or the gap diminishes with increasing coherence times. Index Terms Broadcast channel, Channel state information, Coherence time, Coherence diversity, Degrees of freedom, Fading channel, Multilevel broadcast channel, Product superposition. The authors are with the Department of Electrical Engineering, University of Texas at Dallas, Richardson, TX 750830688 USA, E-mail: [email protected];[email protected]. This work was presented in part at the IEEE International Symposium on Information Theory (ISIT), Germany, June 2017 [1]. March 26, 2018 DRAFT 2 I. I NTRODUCTION The performance of a broadcast channel depends on both the channel dynamics as well as the availability and the quality of channel state information (CSI) on the two ends of each link [2]โ€“[5]. The two issues of CSI and the channel dynamics are practically related. The faster the fading, the more often the channel needs training, thus consuming more channel resources, while a very slow fading link requires infrequent training, therefore slow fading models often assume that CSIR is available due to the cost of training being small when amortized over time. In practice, in a broadcast channel some links may fade faster or slower than others. Recently, it has been shown [6], [7], that the degrees of freedom of the broadcast channel are affected by the disparity of link fading speeds, but existing studies have focused on a few simple and uniform CSI conditions, e.g., neither CSIT nor CSIR were available in [6], [7] for any user. This paper studies a broadcast channel where the links experience both disparate fading conditions as well as non-uniform or hybrid CSI conditions. A review of the relevant literature is as follows. Under perfect instantaneous CSI, the degrees of freedom of a broadcast channel increase with the minimum of the transmit antennas and the total number of receivers antennas [8], [9]. However, due to the time-varying nature of the channel and feedback impairments, perfect instantaneous transmit-side CSI (CSIT) may not be available, and also receive-side CSI (CSIR) can be assumed for slow-fading channels only. Broadcast channel with perfect CSIR has been investigated under a variety of CSIT conditions, including imperfect, delayed, or no CSIT [2]โ€“[4], [10]โ€“[12]. In the absence of CSIT, Huang et al. [2] and Vaze and Varanasi [3] showed that the degrees of freedom collapse to that of the single-receiver, since the receivers are stochastically equivalent with respect to the transmitter. For a MISO broadcast channel Lapidoth et al. [4] conjectured that as long as the precision of CSIT is finite, the degrees of freedom collapse to unity. This conjecture was recently settled in the positive by Davoodi and Jafar in [10]. Moreover, for a MISO broadcast channel under perfect delayed CSIT Maddah-Ali and Tse in [11] showed using retrospective interference alignment that the degrees of freedom are 1 1 1+ 12 +...+ K > 1, where K is the number of the transmit antennas and also the number of receivers. A scenario of mixed CSIT was investigated in [12], where the transmitter has partial knowledge on the current channel in addition to delayed CSI. The potential variation between the quality of feedback links has led to the model of hybrid March 26, 2018 DRAFT 3 CSIT, where the CSIT with respect to different links may not be identical [10], [13]โ€“[15]. A MISO broadcast channel with perfect CSIT for some receivers and delayed for the others was studied by Tandon et al. in [13] and Amuru et al. in [14]. Davoodi and Jafar in [10] showed that for a MISO two-receiver broadcast channel under perfect CSIT for one user and no CSIT for the other, the degrees of freedom collapse to unity. Tandon et al. in [15] considered a MISO broadcast channel with alternating hybrid CSIT to be perfect, delayed, or no CSIT with respect to different receivers. As mentioned earlier, investigation of broadcast channels under unequal link fading dynamics is fairly recent. An achievable degrees of freedom region for one static and one dynamic receiver was given in [16]โ€“[19] via product superposition, producing a gain that is now known as coherence diversity. Coherence diversity gain was further investigated in [6], [7] for a K-receiver broadcast channel with neither CSIT nor CSIR. Also, a broadcast channel was investigated in [20], where the receivers MIMO fading links experience nonidentical spacial correlation. In this paper, we consider a multiuser model under a hybrid CSIR scenario where a group of receivers, denoted static receivers, are assumed to have CSIR, and another group with shorter link coherence time, denoted dynamic receivers, do not have free CSIR. We consider this model under a variety of CSIT conditions, including no CSIT, delayed CSIT, and two hybrid CSIT scenarios. In each of these conditions, we analyze the degrees of freedom region. A few new tools are introduced, and inner and outer bounds are derived that partially meet in some cases. The results of this paper are cataloged as follows. In the absence of CSIT, an outer bound on the degrees of freedom region is produced via bounding the rates of a discrete memoryless multilevel broadcast channel [21], [22] and then applying the extremal entropy inequality [23], [24]. Our achievable degrees of freedom region meets the outer bound in the limiting case where the coherence times of the static and dynamic receivers are the same. For delayed CSIT, we use the outdated CSI model that was used by Maddah-Ali and Tse [11] under i.i.d. fading and assuming global CSIR at all nodes. Noting that our model does not have uniform CSIR, we produced a technique with alignment over super-symbols to utilize outdated CSIT but merge it together with product superposition to reuse the pilots of the dynamic receivers for the purpose of transmission to static receivers. Moreover, we develop an outer bound that is suitable for block-fading channels with different coherence times, by appropriately enhancing March 26, 2018 DRAFT 4 static Tx dynamic Fig. 1. A broadcast channel with multiple static and multiple dynamic users the channel to a physically-degraded broadcast channel and then applying the extremal entropy inequality [23], [24]. For one static and one dynamic receiver, our achievable degrees of freedom partially meet our outer bound, and furthermore the gap decreases with the dynamic receiver coherence time T . Under hybrid CSIT, we analyze two conditions: First, we consider perfect CSIT for the static receivers and no CSIT with respect to the dynamic receivers. The achievable degrees of freedom in this case are obtained using product superposition with the dynamic receiverโ€™s pilots reused and beamforming for the static receivers to avoid interference. Second, we consider perfect CSIT with respect to the static receivers and delayed CSIT with respect to the dynamic receivers. An achievable transmission scheme is proposed via a combination of beamforming, interference alignment, and product superposition methodologies. The outer bounds for the two hybrid-CSIT cases were based on constructing an enhanced physically degraded channel and then applying the extremal entropy inequality. For one static receiver with perfect CSIT and one dynamic receiver with delayed CSIT, the gap between the achievable and the outer sum degrees of freedom is 1 . T II. S YSTEM M ODEL Consider a broadcast channel with multiple single-antenna receivers and the transmitter is equipped with Nt antennas. The expressions โ€œreceiverโ€ and โ€œuserโ€ are employed without distinction throughout the paper, indicating the receiving terminals in the broadcast channel. The channels of the users are modeled as Rayleigh block fading where the channel coefficients remain constant over each block and change independently across blocks [25], [26]. As shown in Fig. 1, the users are partitioned into two sets based on channel availability and the length of the coherence interval: one set of dynamic users and another set of static users. The former contains March 26, 2018 DRAFT 5 TABLE I N OTATION Static Users Dynamic Users mโ€ฒ m MISO channel gains g1 , . . . , gmโ€ฒ h1 , . . . , hm received signals (continuous) โ€ฒ y1โ€ฒ , . . . , ym โ€ฒ y1 , . . . , ym DMC receive variables โ€ฒ Y1โ€ฒ , . . . , Ym โ€ฒ Y1 , . . . , Ym transmission rates โ€ฒ R1โ€ฒ , . . . , Rm โ€ฒ R1 . . . , Rm โ€ฒ M1โ€ฒ , . . . , Mm โ€ฒ M1 , . . . , Mm dโ€ฒ1 , . . . , dโ€ฒmโ€ฒ d1 , . . . , dm number of users messages degrees of freedom coherence time T โ€ฒ T General Variables X transmit signal ฯ signal-to-noise ratio Ui , Vj , W auxiliary random variables H set of all channel gains Dx vertex of degrees of freedom region ei canonical coordinate vector m dynamic users having coherence time T and no free CSIR1 , and the latter contains mโ€ฒ static users having coherence time T โ€ฒ and perfect instantaneous CSIR. We consider the transmitter is equipped with more antennas than the number of dynamic and static users, i.e., Nt โ‰ฅ mโ€ฒ + m. The received signals yjโ€ฒ (t), yi (t) at the static user j, and the dynamic user i, respectively, at time instant t are yjโ€ฒ (t) = gjโ€  (t)x(t) + zjโ€ฒ (t), j = 1, . . . , mโ€ฒ , yi (t) = hโ€ i (t)x(t) + zi (t), i = 1, . . . , m, (1) where x(t) โˆˆ CNt is the transmitted signal, zjโ€ฒ (t), zi (t) denote the corresponding additive i.i.d. Gaussian noise of the users, and gj (t) โˆˆ CNt , hi (t) โˆˆ CNt denote the channels of the static user j and the dynamic user i whose coefficients stay the same over T โ€ฒ and T time instances, 1 This means that the cost of knowing CSI at the receiver, e.g., by channel estimation, is not ignored. March 26, 2018 DRAFT 6 respectively. The distributions of gj and hi are globally known at the transmitter and at the users.2 Having CSIR, the value of gj (t) is available instantaneously and perfectly at the static user j. Furthermore, the static user j obtains an outdated version of the dynamic users channels hi , and also the dynamic user i obtains an outdated version of the static users channel gi (completely stale) [11]. CSIT for each user can take one of the following: โ€ข Perfect CSIT: the channel vectors, gj (t), hi (t), are available at the transmitter instantaneously and perfectly. โ€ข Delayed CSIT: the channel vectors, gj (t), hi (t), are available at the transmitter after they change independently in the following block (completely stale [11]). โ€ข No CSIT: the channel vectors, gj (t), hi (t), cannot not be known at the transmitter. We consider the broadcast channel with private messages for all users and no common โ€ฒ messages. More specifically, we assume that the independent messages Mjโ€ฒ โˆˆ [1 : 2nRi (ฯ) ], Mi โˆˆ [1 : 2nRi (ฯ) ] associated with rates Rjโ€ฒ (ฯ), Ri (ฯ) are communicated from the transmitter to the static user j and dynamic user i, respectively, at ฯ signal-to-noise ratio. The degrees of freedom of the static and dynamic users achieving rates Rjโ€ฒ (ฯ), Ri (ฯ) can be defined as Rjโ€ฒ (ฯ) , ฯโ†’โˆž log(ฯ) Ri (ฯ) di = lim , ฯโ†’โˆž log(ฯ) j = 1, . . . , mโ€ฒ , dโ€ฒj = lim i = 1, . . . , m. (2) The degrees of freedom region is defined as  โ€ฒ +m โ€ฒ โˆƒ(R1โ€ฒ (ฯ), . . . , Rm D = (dโ€ฒ1 , . . . , dโ€ฒmโ€ฒ , d1 , . . . , dm ) โˆˆ Rm โ€ฒ (ฯ), R1 (ฯ), . . . , Rm (ฯ)) โˆˆ C(ฯ), + Rjโ€ฒ (ฯ) Ri (ฯ) , di = lim , j = 1, . . . , mโ€ฒ , i = 1, . . . , m , ฯโ†’โˆž log(ฯ) ฯโ†’โˆž log(ฯ) dโ€ฒj = lim (3) where C(ฯ) is the capacity region at ฯ signal-to-noise ratio. The sum degrees of freedom is defined as Csum (ฯ) , ฯโ†’โˆž log(ฯ) dsum = lim where โ€ฒ Csum (ฯ) = max m X j=1 2 Rjโ€ฒ (ฯ) + m X (4) Ri (ฯ). (5) i=1 Also, the coherence times of all channels are globally known at the transmitter and at the users. March 26, 2018 DRAFT 7 Y1โ€™ X Y2โ€™ p(y3โ€™|y2โ€™) p(ymโ€™โ€™|ymโ€™-1โ€™) p(y3|y2) p(ym|ym-1) Ymโ€™โ€™ p(y1โ€™,y1|x) Y1 Fig. 2. p(y2โ€™|y1โ€™) p(y2|y1) Y2 Ym Discrete memoryless multiuser multilevel broadcast channel In the sequel, we study the degrees of freedom of the above MISO broadcast channel under different CSIT scenarios that could be perfect, delayed or no CSIT. III. N O CSIT FOR A LL U SERS In this section, we study the broadcast channel defined in Section II when there is no CSIT for all users. In particular, we give outer and achievable degrees of freedom regions in Section III-B and Section III-C, respectively. The outer degrees of freedom region is based on the construction of an outer bound on the rates of a multiuser multilevel discrete memoryless channel that is given in Section III-A. A. Multiuser Multilevel Broadcast Channel The multilevel broadcast channel was introduced by Borade et al. [21] as a three-user broadcast discrete memoryless broadcast channel where two of the users are degraded with respect to each other. The capacity of this channel under degraded message sets was established by Nair and El Gamal [22]. Here, we study a multiuser multilevel broadcast channel with two sets of degraded users (see Fig. 2). One set contains mโ€ฒ users with Yjโ€ฒ received signal at user j, and the other set contains m users with Yi received signal at user i. Therefore, X โ†’Y1โ€ฒ โ†’ Y2โ€ฒ โ†’ ยท ยท ยท โ†’ Ymโ€ฒ โ€ฒ X โ†’Y1 โ†’ Y2 โ†’ ยท ยท ยท โ†’ Ym March 26, 2018 (6) DRAFT 8 form two Markov chains. We consider a broadcast channel with (mโ€ฒ + m) private messages and no common message. An outer bound for the above multilevel broadcast channel is given in the following theorem. Theorem 1: The rate region of the multilevel broadcast channel with two sets of degraded users (Eq. (6)) is outer bounded by the intersection of R1 โ‰คI(Umโ€ฒ , W ; Y1|V1 ) โˆ’ I(W ; Ymโ€ฒ โ€ฒ |Umโ€ฒ ), (7) Ri โ‰คI(Viโˆ’1 ; Yi |Vi ), (8) Rjโ€ฒ โ‰คI(Ujโˆ’1 ; Yjโ€ฒ |Uj ), i = 2, . . . , m, j = 1, . . . , mโ€ฒ โˆ’ 1, โ€ฒ โ€ฒ โ€ฒ โ€ฒ Rm โ€ฒ โ‰คI(W ; Ymโ€ฒ |Umโ€ฒ ) + I(X; Ymโ€ฒ |Umโ€ฒ , W ) โˆ’ I(X; Ymโ€ฒ |Umโ€ฒ โˆ’1 ), (9) (10) and Ri โ‰คI(Uฬƒiโˆ’1 ; Yi |Uฬƒi ), i = 1, . . . , m โˆ’ 1, (11) Rm โ‰คI(Wฬƒ ; Ym |Uฬƒm ) + I(X; Ym|Uฬƒm , Wฬƒ ) โˆ’ I(X; Ym|Uฬƒmโˆ’1 ), (12) R1โ€ฒ โ‰คI(Uฬƒm , Wฬƒ ; Y1โ€ฒ |Vฬƒ1 ) โˆ’ I(Wฬƒ ; Ym |Uฬƒm ), (13) Rjโ€ฒ โ‰คI(Vฬƒjโˆ’1; Yjโ€ฒ |Vฬƒj ), (14) j = 2, . . . , mโ€ฒ , for some pmf p(u1 , . . . , umโ€ฒ , uฬƒ1 , . . . , uฬƒm , v1 , . . . , vm , vฬƒ1 , . . . , vฬƒmโ€ฒ , w, wฬƒ, x), (15) where Umโ€ฒ โ†’ ยท ยท ยท โ†’ U1 โ†’X โ†’ (Y1 , . . . , Ym, Y1โ€ฒ , . . . , Ymโ€ฒ โ€ฒ ) Vm โ†’ ยท ยท ยท โ†’ V1 โ†’ (W, Umโ€ฒ ) โ†’X โ†’ (Y1 , . . . , Ym, Y1โ€ฒ , . . . Ymโ€ฒ โ€ฒ ) Uฬƒm โ†’ ยท ยท ยท โ†’ Uฬƒ1 โ†’X โ†’ (Y1 , . . . Ym , Y1โ€ฒ , . . . , Ymโ€ฒ โ€ฒ ) Vฬƒmโ€ฒ โ†’ ยท ยท ยท โ†’ Vฬƒ1 โ†’ (Wฬƒ , Uฬƒm ) โ†’X โ†’ (Y1 , . . . Ym , Y1โ€ฒ , . . . , Ymโ€ฒ โ€ฒ ) (16) forms Markov chains and U0 = Uฬƒ0 , X. Proof: See Appendix I. Remark 1: Theorem 1 is an extension of the Koฬˆrner-Marton outer bound [27, Theorem 5] to more than two users, and it recovers the Koฬˆrner-Marton bound when m = mโ€ฒ = 1. March 26, 2018 DRAFT 9 Remark 2: For the multiuser multilevel broadcast channel characterized by (6), we establish the capacity for degraded message sets in Appendix II, where one common message is communicated to all receivers and one further private message is communicated to one receiver. B. Outer Degrees of Freedom Region In the sequel, we give an outer bound on the degrees of freedom of the broadcast channel defined in Section II when there is no CSIT for all users. The outer bound development depends on the results of Theorem 1 in Section III-A. Theorem 2: An outer bound on the degrees of freedom region of the fading broadcast channel characterized by Eq. (1) without CSIT is, โ€ฒ m X dโ€ฒj โ‰ค 1, m X di โ‰ค 1 โˆ’ (17) j=1 i=1 mโ€ฒ X j=1 dโ€ฒj + m X i=1 di โ‰ค ๏ฃฑ ๏ฃด ๏ฃฒ1 ๏ฃด ๏ฃณ4 3 1 , T T = T โ€ฒ , โˆ†T = 0 (18) (19) otherwise, where โˆ†T is the offset between the two coherence intervals. Proof: Equations (17) and (18) are outer bounds for a broadcast channel whose users are either all homogeneously static or all homogeneously dynamic [7], [18]. The remainder of the proof is dedicated to establishing (19). We enhance the channel by giving all users global CSIR. When T โ€ฒ = T and โˆ†T = 0, (19) follows directly from [7], [18]. When T โ€ฒ 6= T or โˆ†T 6= 0, having no CSIT, the channel belongs to the class of multiuser multilevel broadcast channels in Section III-A. We then use the two outer bounds developed for the multilevel broadcast channels to generate two degrees of freedom bounds, and merge them to get the desired result. We begin with the outer bound described in (7)-(10); we combine these equations to obtain P P partial sum-rate bounds on the static ( Rjโ€ฒ ) and dynamic ( Ri ) receivers: โ€ฒ m X Rjโ€ฒ j=1 โ‰ค โ€ฒ โˆ’1 m X โ€ฒ โ€ฒ I(Ujโˆ’1 ; yjโ€ฒ |Uj , H) + I(W ; ym โ€ฒ |Umโ€ฒ , H) + I(x; ymโ€ฒ |Umโ€ฒ , W, H) j=1 โ€ฒ โˆ’ I(x; ym โ€ฒ |Umโ€ฒ โˆ’1 , H) March 26, 2018 DRAFT 10 = โ€ฒ โˆ’1 m X โ€ฒ โ€ฒ h(yjโ€ฒ |Uj , H) โˆ’ h(yjโ€ฒ |Ujโˆ’1 , H) + I(W ; ym โ€ฒ |Umโ€ฒ , H) + h(ymโ€ฒ |Umโ€ฒ , W, H) j=1 โ€ฒ โˆ’ h(ym โ€ฒ |Umโ€ฒ โˆ’1 , H) + o(log(ฯ)) (20) โ€ฒ โ€ฒ =I(W ; ym โ€ฒ |Umโ€ฒ , H) + h(ymโ€ฒ |Umโ€ฒ , W, H) + o(log(ฯ)), (21) where H is the set of all channel vectors, (20) follows from the chain rule, h(yjโ€ฒ |x, H) = o(log(ฯ)), and (21) follows since the received signals of all static users, yjโ€ฒ , have the same statistics [7], [18]. Also, using Theorem 1, m X Rj โ‰คI(Umโ€ฒ , W ; y1|V1 , H) โˆ’ โ€ฒ I(W ; ym โ€ฒ |Umโ€ฒ , H) + m X I(Vjโˆ’1; yj |Vj , H) j=2 j=1 =h(y1 |V1 , H) โˆ’ h(y1 |Umโ€ฒ , W, H) โˆ’ โ€ฒ I(W ; ym โ€ฒ |Umโ€ฒ , H) + m X h(yj |Vj , H) j=2 โˆ’ h(yj |Vjโˆ’1, H) (22) โ€ฒ = โˆ’ h(y1 |Umโ€ฒ , W, H) โˆ’ I(W ; ym โ€ฒ |Umโ€ฒ , H) + h(ym |Vm , H) + o(log(ฯ)) (23) โ€ฒ โ‰ค โˆ’ h(y1 |Umโ€ฒ , W, H) โˆ’ I(W ; ym โ€ฒ |Umโ€ฒ , H) + log(ฯ) + o(log(ฯ)), (24) where (22) follows from the chain rule, (23) follows since yj have the same statistics, and (24) โ€ฒ follows since h(ym |Vm , H) โ‰ค n log(ฯ) + o(log(ฯ)). Define Yj,k to be the received signal of user j at time instance k. From (21) and (24), we can obtain the bound (27) on the rates. mโ€ฒ m 1X โ€ฒ X 1 1 โ€ฒ โ€ฒ Rj + Rj โ‰ค I(W ; ym h(ym โ€ฒ |Umโ€ฒ , H) + โ€ฒ |Umโ€ฒ , W, H) โˆ’ h(y1 |Umโ€ฒ , W, H) 2 j=1 2 2 j=1 โ€ฒ โˆ’ I(W ; ym โ€ฒ |Umโ€ฒ , H) + log(ฯ) + o(log(ฯ)) 1 โ€ฒ = h(ym โ€ฒ |Umโ€ฒ , W, H) โˆ’ h(y1 |Umโ€ฒ , W, H) + log(ฯ) + o(log(ฯ)) 2 1 โ€ฒ โ‰ค h(ym โ€ฒ , y1 |Umโ€ฒ , W, H) โˆ’ h(y1 |Umโ€ฒ , W, H) + log(ฯ) + o(log(ฯ)) 2 n X 1 โ€ฒ โ€ฒ โ€ฒ โ‰ค h(ym โ€ฒ ,k , y1,k |Umโ€ฒ , W, H, ymโ€ฒ ,1 , . . . , ymโ€ฒ ,kโˆ’1 , y1,1 , . . . , y1,kโˆ’1 ) 2 k=1 (25) โ€ฒ โ€ฒ โˆ’ h(y1,k |Umโ€ฒ , W, H, ym โ€ฒ ,1 , . . . , ymโ€ฒ ,kโˆ’1 , y1,1 , . . . , y1,kโˆ’1 ) + log(ฯ) + o(log(ฯ)) โ‰ค March 26, 2018 max Tr{ฮฃx }โ‰คฯ,ฮฃx <0 (26) EH 1 log |I + Hฮฃx Hโ€  | โˆ’ log(1 + hโ€ 1 ฮฃx h1 ) + log(ฯ) 2 DRAFT 11 + o(log(ฯ)), (27) where (25) and (26) follow from the chain rule and that conditioning does not increase differential entropy, and (27) follows from extremal entropy inequality [23], [24], [28]. In order to bound (27), we use a specialization of [29, Lemma 3] as follows. Lemma 1: Consider two random matrices H1 โˆˆ CN1 ร—Nt and H2 โˆˆ CN2 ร—Nt , where N1 โ‰ฅ N2 . For a covariance matrix ฮฃx , where Tr{ฮฃx } โ‰ค ฯ, we have 1 1 log |I + H1 ฮฃx Hโ€ 1 | โˆ’ log |I + H2 ฮฃx Hโ€ 2 | โ‰ค o(log(ฯ)). (28) ฮฃx min{Nt , N1 } min{Nt , N2 } The proof of Lemma 1 is omitted as it directly follows from [29, Lemma 3]. Lemma 1 yields max the following outer bound on the degrees of freedom: mโ€ฒ m 1X โ€ฒ X d + di โ‰ค 1. 2 j=1 j i=1 (29) We now repeat the exercise of bounding the sum rates and deriving degrees of freedom, this time starting from (11)-(14). By following bounding steps parallel to (21), (24), (27), โ€ฒ m X m dโ€ฒj j=1 1X di โ‰ค 1. + 2 i=1 (30) Adding (29) and (30) yields the outer bound (19), completing the proof of Theorem 2. C. Achievable Degrees of Freedom Region Theorem 3: The fading broadcast channel described by Eq. (1) can achieve the following degrees of freedom without CSIT: m X di โ‰ค 1 โˆ’ m X di โ‰ค 1. i=1 mโ€ฒ X j=1 dโ€ฒj + 1 , T (31) (32) i=1 Proof: The achievable scheme uses product superposition [17], [18], where the transmitter uses one antenna to send the super symbol to two users: one dynamic and one static, xโ€  = xs xโ€ d , (33) where xs โˆˆ C is a symbol intended for the static user, xโ€ d = [xฯ„ , xโ€ ฮด ] March 26, 2018 (34) DRAFT 12 where xฯ„ โˆˆ C is a pilot and xฮด โˆˆ CT โˆ’1 is a super symbol intended for the dynamic user. Since degrees of freedom analysis is insensitive to the additive noise, we omit the noise component in the following. yโ€  = hxs [xฯ„ , xโ€ ฮด ] = [hxฯ„ , hxโ€ ฮด ], (35) where h = hxs . The dynamic user estimates the equivalent channel h during the first time instance and then decodes xฮด coherently based on the channel estimate. The static receiver only utilizes the received signal during the first time instance: y1โ€ฒ = gxs . (36) Knowing its channel gain g, the static receiver can decode xs . The achievable degrees of freedom of the two users are, (dโ€ฒ , d) = 1 1 . ,1 โˆ’ T T (37) We now proceed to prove that the degrees of freedom region characterized by (31) and (32) can be achieved via a combination of two-user product superposition strategies that were outlined above, and single-user strategies. For clarity of exposition we refer to (31), which describes the degrees of freedom constraints of the dynamic receivers, as the non-coherent bound, and to (32) as the coherent bound. The non-negativity of degrees of freedom restricts them to the โ€ฒ m+m . The intersection of the coherent bound and the non-negative orthant non-negative orthant R+ is a (mโ€ฒ + m)โ€“simplex that has m + mโ€ฒ + 1 vertices. The non-coherent bound is a hyperplane that partitions the simplex with mโ€ฒ + 1 vertices on one side of the non-coherent bound and m on the other. Therefore the intersection of the simplex with the non-coherent bound produces a polytope with (mโ€ฒ + 1)(m + 1) vertices.3 For illustration, see Fig. 3 showing the three-user degrees of freedom with two static users and Fig. 4 with one static user. We now verify that each of the (mโ€ฒ + 1)(m + 1) vertices can be achieved with either a single-user strategy, or via a two-user product superposition strategy: โ€ข mโ€ฒ vertices corresponding to single-user transmission to each static user j achieving one degree of freedom. 3 This can be verified with a simple counting exercise involving the number of edges of the simplex that cross the non-coherent bound. March 26, 2018 DRAFT 13 d d1 Non-coherent bound Non-coherent bound d2 Coherent bound dโ€™2 dโ€™ dโ€™1 Fig. 3. Achievable degrees of freedom region of one dynamic and two static users โ€ข Coherent bound Fig. 4. Achievable degrees of freedom region of one static and two dynamic users m vertices corresponding to single-user transmission to each dynamic user i achieving (1 โˆ’ T1 ) degrees of freedom. โ€ข mโ€ฒ m vertices corresponding to product superposition applied to all possible pairs of static and dynamic users, achieving 1 T degrees of freedom for one static user and (1 โˆ’ T1 ) degrees of freedom for one dynamic user. โ€ข One trivial vertex at the origin, corresponding to no transmission achieving zero degrees of freedom for all users. Hence, the number of the vertices is mโ€ฒ + m + mโ€ฒ m + 1 = (m + 1)(mโ€ฒ + 1). This completes the achievability proof of Theorem 3. Remark 3: When the static and dynamic users have the same coherence time, the inner and outer bounds on degrees of freedom coincide. In this case it is degrees of freedom optimal to serve two-users at a time (one dynamic and one static). IV. D ELAYED CSIT FOR ALL USERS Under delayed CSIT, the transmitter knows each channel gain only after it is no longer valid. This condition is also known as outdated CSIT. We begin by proving inner and outer bounds March 26, 2018 DRAFT 14 when transmitting only to static users, only to dynamic users, and to one static and one dynamic user. We then synthesize this collection of bounds into an overall degrees of freedom region. A. Transmission to Static Users Theorem 4: The degrees of freedom region of the fading broadcast channel characterized by Eq. (1) with delayed CSIT and having mโ€ฒ static users and no dynamic users is 1 j = 1, . . . , mโ€ฒ . (38) 1 , 1 + + . . . + mโ€ฒ Proof: The special case of fast fading (T โ€ฒ = 1) was discussed by Maddah-Ali and Tse dโ€ฒj โ‰ค 1 2 in [11], where the achievability was established by retrospective interference alignment that aligns the interference using the outdated CSIT, and the converse was proved by generating an improved channel without CSIT having a tight degrees of freedom region against TDMA according to the results in [2], [3]. For T โ€ฒ โ‰ฅ 1, the achievability is established by employing retrospective interference alignment presented in [11] over super symbols each of length T โ€ฒ . The converse is proved by following the same procedures in [11] to generate a block-fading improved channel without CSIT and with identical coherence intervals of length T โ€ฒ . According to the results of [7], [18], TDMA is tight against the degrees of freedom region of the improved channel. B. Transmission to Dynamic Users Theorem 5: The fading broadcast channel characterized by Eq. (1), with delayed CSIT and having m dynamic users and no static users, can achieve the degrees of freedom di โ‰ค 1 1 + + ...+ 1 2 1 (1 m โˆ’ m ), T i = 1, . . . , m. (39) An outer bound on the degrees of freedom region is di โ‰ค1 โˆ’ m X 1 , T (40) m . (41) 1 + + . . . + m1 i=1 Proof: The achievability part can be proved as follows. At the beginning of each super di โ‰ค 1 2 symbol, m pilots are sent for channel estimation. Then retrospective interference alignment in [11] over super symbols is employed during the remaining (T โˆ’ m) instances, to achieve (39). March 26, 2018 DRAFT 15 For the converse part, (41) is proved by giving the users global CSIR, and then applying Theorem 4. Moreover, (40) is the single-user bound for each dynamic user that can be proved as follows. For a single user with delayed CSIT, feedback does not increase the capacity [30], and consequently the assumption of delayed CSIT can be removed. Hence, the single-user bound for each dynamic user with delayed CSIT is the same as the single-user bound without CSIT [26]. C. Transmission to One Static and One Dynamic User Theorem 6: The fading broadcast channel characterized by Eq. (1), with delayed CSIT and having one static and one dynamic user, can achieve the following degrees of freedom 2 1 2 2  (1 + ), (1 โˆ’ ) , 3 T 3 T 1 1 D2 : (dโ€ฒ , d) = ( , 1 โˆ’ ). T T D1 : (dโ€ฒ , d) = (42) (43) Furthermore, the achievable degrees of freedom region is the convex hull of the above degrees of freedom pairs. Proof: From Section III-C, product superposition achieves the pair (43) that does not require CSIT for any of the two users. The remainder of the proof is dedicated to the achievability of the pair (42). We provide a transmission scheme based on retrospective interference alignment [11] along with product superposition. 1) The transmitter first emits a super-symbol intended for the static user: X1 = [X1,1 , ยท ยท ยท , X1,โ„“ ], where โ„“ = Tโ€ฒ , T (44) and each X1,n โˆˆ C2ร—T occupies T time instances and has the following structure: X1,n = [Uฬ„n , Uฬ„n Un ], n = 1, . . . , โ„“, (45) both the diagonal matrix Uฬ„n โˆˆ C2ร—2 and Un โˆˆ C2ร—(T โˆ’2) contain symbols intended for the โ€ฒ โ€ฒ โ€ฒ โ€  โ€  static user. The components of y1โ€  = [y1,1 , ยท ยท ยท , y1,โ„“ ] are: โ€ฒ โ€  y1,n =[g1โ€  Uฬ„n , g1โ€  Uฬ„n Un ], โ€  โ€  =[gฬƒ1,n , gฬƒ1,n Un ], March 26, 2018 n = 1, . . . , โ„“ (46) DRAFT 16 โ€  = g1โ€  Uฬ„n . The static user by definition knows g1 so it can decode Uฬ„n which where gฬƒ1,n โ€ฒ yields 2 TT degrees of freedom. The remaining โ€  Un involve (T โˆ’ 2) observations in gฬƒ1,n Tโ€ฒ T โ€ฒ 2 TT (T โˆ’ 2) unknowns, so they require a further Tโ€ฒ T (T โˆ’ 2) independent observations for reliable decoding. โ€  โ€  The components of y1โ€  = [y1,1 , ยท ยท ยท , y1,โ„“ ] are โ€  =[hโ€ 1,n Uฬ„n , hโ€ 1,n Uฬ„n Un ], y1,n n = 1, . . . , โ„“ =[hฬƒโ€ 1,n , hฬƒโ€ 1,n Un ], (47) where hฬƒโ€ 1,n = hโ€ 1,n Uฬ„n is the equivalent channel estimated by the dynamic user. The dynamic user saves hฬƒโ€ 1,n Un for interference cancellation in the upcoming steps. 2) The transmitter sends a second super symbol intended for the dynamic user: X2 = [X2,1 , ยท ยท ยท , X2,โ„“ ], (48) where X2,n = [Uฬƒn , Uฬƒn Vn ], n = 1, . . . , โ„“, (49) Uฬƒn โˆˆ C2ร—2 is diagonal and includes 2 independent symbols intended for the static user, and Vn โˆˆ C2ร—(T โˆ’2) contains independent symbols intended for the dynamic user. The โ€  โ€  components of y2โ€  = [y2,1 , ยท ยท ยท , y2,โ„“ ] are โ€  y2,n =[hโ€ 2,n Uฬƒn , hโ€ 2,n Uฬƒn Vn ], n = 1, . . . , โ„“ =[hฬƒโ€ 2,n , hฬƒโ€ 2,n Vn ], (50) where hฬƒโ€ 2,n = hโ€ 2,n Uฬƒn is the equivalent channel estimated by the dynamic user. The dynamic user saves hฬƒโ€ 2,n Vn which includes Tโ€ฒ T Tโ€ฒ (T โˆ’ T โ€ฒโ€  y2,โ„“ ] are unknowns, and hence an additional โ€ฒ โ€ฒ โ€  components of y2โ€  = [y2,1 , ยทยทยท , โ€ฒ (T โˆ’ 2) independent observations about 2 TT (T โˆ’ 2) 2) observations are needed to decode Vn . The โ€ฒ y2,n =[g2โ€  Uฬƒn , g2โ€  Uฬƒn Vn ], n = 1, . . . , โ„“ โ€  โ€  =[gฬƒ2,n , gฬƒ2,n Vn ], (51) โ€  where gฬƒ2,n = g2โ€  Uฬƒn is the equivalent channel estimated by the static user; the static user โ€  saves gฬƒ2,n Vn for the upcoming steps. Knowing g2 , the static user achieves 2 TT further โ€ฒ degrees of freedom from decoding Uฬƒn . March 26, 2018 DRAFT 17 3) The transmitter emits a third super symbol consisting of a linear combination of the signals generated from the first and the second super symbols. X3 = [X3,1 , ยท ยท ยท , X3,โ„“ ], (52) where โ€  X3,n = [Uฬ‚n , Uฬ‚n (hฬƒโ€ 1,n Un + gฬƒ2,n Vn )], n = 1, . . . , โ„“, (53) Uฬ‚n โˆˆ C2ร—2 is diagonal and contains 2 independent symbols intended for the static user, โ€ฒ and hence the static user achieves further 2 TT degrees of freedom. โ€  The static user cancels gฬƒ2,n Vn saved during the second super symbol and obtains hฬƒโ€ 1,n Un that includes the additional independent Tโ€ฒ T (T โˆ’ 2) observations needed for decoding Un . Tโ€ฒ Therefore, the static user achieves 2 T (T โˆ’ 2) further degrees of freedom. The dynamic user estimates the equivalent channel hฬƒโ€ 3,n = hโ€ 3,n Uฬ‚n , cancels hฬƒโ€ 1,n Un saved during the โ€  Vn that contains the additional observations needed first super symbol, and obtains gฬƒ2,n โ€ฒ for decoding Vn . Hence, the dynamic user achieves 2 TT (T โˆ’ 2) degrees of freedom. In aggregate, over 3T โ€ฒ time instants, the static and dynamic user achieve the degrees of freedom dโ€ฒ = 6 Tโ€ฒ Tโ€ฒ + 2 (T โˆ’ 2), T T d=2 Tโ€ฒ (T โˆ’ 2). T (54) This completes the proof of Theorem 6. Theorem 7: An outer bound on the degrees of freedom region of the fading broadcast channel characterized by Eq. (1), with one static and one dynamic user having delayed CSIT, is dโ€ฒ + d โ‰ค 1, 2 d dโ€ฒ + โ‰ค 1, 2 (55) (56) 1 . (57) T Proof: The inequality (57) represents the single-user outer bound [26]. We prove the dโ‰ค1โˆ’ bound (55) as follows. We enhance the original channel by giving both users global CSIR. In addition, the channel output of the dynamic user, y(t), is given to the static user. Therefore, the channel outputs at time instant t are (y โ€ฒ(t), y(t), H) at the static user, and (y(t), H) at the dynamic user. The enhanced channel is physically degraded [31], [32], hence, removing the delayed CSIT does not reduce the capacity [33]. Also, Rโ€ฒ โ‰คI(x(t); y โ€ฒ(t), y(t)|U, H) = h(y โ€ฒ(t), y(t)|U, H) โˆ’ h(y โ€ฒ (t), y(t)|U, x(t), H) March 26, 2018 DRAFT 18 R โ‰คI(U; y(t)|H) = h(y(t)|H) โˆ’ h(y(t)|U, H), (58) where U is an auxiliary random variable, and U โ†’ x โ†’ (y โ€ฒ(t), y(t)) forms a Markov chain. Therefore, 1 Rโ€ฒ + R โ‰คh(y(t)|H) + h(y โ€ฒ(t), y(t)|U, H) โˆ’ h(y(t)|U, H) + o(log(ฯ)) 2 2 1 (59) โ‰ค log(ฯ) + h(y โ€ฒ(t), y(t)|U, H) โˆ’ h(y(t)|U, H) + o(log(ฯ)) 2 1 โ‰ค log(ฯ) + max EH log |I + Hฮฃx Hโ€  | โˆ’ log(1 + hโ€  (t)ฮฃx h(t)) + o(log(ฯ)) Tr{ฮฃx }โ‰คฯ,ฮฃx <0 2 (60) โ‰ค log(ฯ) + o(log(ฯ)), (61) where (59) follows since h(y(t)|H) โ‰ค log(ฯ)+o(log(ฯ)) [34], (60) follows from extremal entropy inequality [23], [24], [29], and (61) follows from Lemma 1. Hence, the bound (55) is proved. A similar argument, with the role of the two users reversed, leads to the bound (56). Remark 4: The inner and outer bounds obtained for the two-user case partially meet, with the gap diminishing with the coherence time of the dynamic user as shown in Fig. 5 and Fig. 6 for T = 15 and T = 30, respectively. D. Transmission to arbitrary number of static and dynamic users Theorem 8: The fading broadcast channel characterized by Eq. (1), with delayed CSIT, can achieve the multiuser degrees of freedom characterized by vectors Di , 1 D1 : 1 1 + 2 + ...+ โ€ฒ m X 1 mโ€ฒ i=1 eโ€ i , 1 2 2 2 D2 , . . . , Dmmโ€ฒ +1 : (1 + )eโ€ j + (1 โˆ’ )eโ€ mโ€ฒ +i , j = 1, . . . , mโ€ฒ , i = 1, . . . , m, 3 T 3 T m m โ€  1 m X โ€  Dmmโ€ฒ +2 , . . . , Dmmโ€ฒ +mโ€ฒ +2 : ej + e , j = 1, . . . , mโ€ฒ , (1 โˆ’ ) T T i=1 i 1 + 21 + . . . + m1 (62) (63) (64) where ej is the canonical coordinate vector. Their convex hull characterized an achievable degrees of freedom region. Proof: The achievability of (62) was proved in Section IV-A via multiuser transmission to static users. The achievability of (63) was proved in Section IV-C, via a two-user transmission to a dynamic-static pair. March 26, 2018 DRAFT 19 1.5 Achievable region Outer region 1 0.5 0 0 Fig. 5. 0.2 0.4 0.6 0.8 1 1.2 One static and one dynamic with delayed CSIT and T = 15 1.5 Achievable region Outer region 1 0.5 0 0 Fig. 6. 0.2 0.4 0.6 0.8 1 1.2 One static and one dynamic with delayed CSIT and T = 30 March 26, 2018 DRAFT 20 We now show the achievability of (64) via retrospective interference alignment [11] along with product superposition. Over a super symbol of length T , consider the following transmission: X = [U, UV], (65) where U โˆˆ Cmร—m is diagonal and includes m independent symbols intended for the static user j, and V โˆˆ Cmร—(T โˆ’m) is a super symbol containing independent symbols intended for the dynamic users according to retrospective interference alignment [11]. Therefore, the static user decodes U. Thus, over T time instants, the static user achieves m degrees of freedom and the dynamic users achieve 1 1 (T 1+ 12 +...+ m โˆ’ m), hence (64) is achieved. Theorem 9: An outer bound on the degrees of freedom of the fading broadcast channel characterized by Eq. (1), with delayed CSIT, is โ€ฒ m X dโ€ฒj di + โ‰ค 1, โ€ฒ m + m i=1 m (66) m m X dโ€ฒj X di + โ‰ค 1, โ€ฒ โ€ฒ m m + m j=1 i=1 (67) m X j=1 โ€ฒ dโ€ฒj โ‰ค 1, โˆ€j = 1, . . . , mโ€ฒ , (68) 1 , โˆ€i = 1, . . . , m. (69) T Proof: The inequalities (68), (69) represent the single-user bounds on the static and the di โ‰ค 1 โˆ’ dynamic users, respectively [26], [34]. The remainder of the proof is dedicated to establishing the bounds (66) and (67). We enhance the channel by providing global CSIR as well as allowing full cooperation among static users and full cooperation among dynamic users. The enhanced channel is equivalent to a broadcast channel with two users: one static equipped with mโ€ฒ antennas and one dynamic โ€ฒ equipped with m antennas. Define Y โ€ฒ โˆˆ Cm and Y โˆˆ Cm to be the received signals of the static and the dynamic super-user, respectively, in the enhanced channel. We further enhance the channel by giving Y to the static user, generating a physically degraded channel since X โ†’ (Y โ€ฒ , Y) โ†’ Y forms a Markov chain. Feedback including delayed CSIT has no effect on capacity [33], therefore we remove it from consideration. Subsequently, we can utilize the Koฬˆrner-Marton outer bound [27], โ€ฒ m X Rjโ€ฒ โ‰คI(X; Y โ€ฒ, Y|U, H) j=1 March 26, 2018 DRAFT 21 m X Ri โ‰คI(U; Y|H). (70) i=1 Therefore, from applying extremal entropy inequality [23], [29], [35] and Lemma 1, โ€ฒ m X j=1 m X Rjโ€ฒ 1 1 Ri โ€ฒ + โ‰ค I(X; Y , Y|U, H) + I(U; Y|H) mโ€ฒ + m i=1 m mโ€ฒ + m m = mโ€ฒ 1 1 1 h(Y โ€ฒ, Y|U, H) + o(log(ฯ)) + h(Y|H) โˆ’ h(Y|U, H) +m m m โ‰ค log(ฯ) + o(log(ฯ)). (71) Therefore, the bound (66) is proved. Similarly, we can prove the bound (67) using the same steps after switching the roles of the two users in the enhanced channel. V. H YBRID CSIT: P ERFECT CSIT FOR THE S TATIC U SERS AND N O CSIT FOR THE DYNAMIC U SERS Theorem 10: The fading broadcast channel characterized by Eq. (1), with perfect CSIT for the static users and no CSIT for the dynamic users, can achieve the following multiuser degrees of freedom, โ€ฒ D1 : m X eโ€ j , (72) j=1 โ€ฒ D2 , . . . , Dm+1 m 1 1X โ€  ej + (1 โˆ’ )eโ€ i , : T j=1 T i = 1, . . . , m. (73) Therefore, their convex hull is also achievable. Proof: D1 is achieved by inverting the channels of the static users at the transmitter and then every static user achieves one degree of freedom. D2 , . . . , Dm+1 in (73) are achieved using product superposition along with channel inversion as follows. The transmitted signal over T instants is, X = [u, uvโ€  ], where u = Pmโ€ฒ j=1 bj uj , (74) uj is a symbol intended for the static user j, gjโ€  bj = 0, and v โˆˆ CT โˆ’1 contain independent symbols intended for the dynamic user i. Each of the static users receive an interference-free signal during the first time instant achieving one degrees of freedom. The dynamic user estimates its equivalent channel during the first time instant and decodes v during the remaining (T โˆ’ 1) time instants. March 26, 2018 DRAFT 22 Theorem 11: An outer bound on the degrees of freedom of the fading broadcast channel characterized by Eq. (1), with perfect CSIT for the static users and no CSIT for the dynamic users, is โ€ฒ m X j=1 m X dโ€ฒj + di โ‰ค 1, mโ€ฒ + 1 i=1 dโ€ฒj โ‰ค 1, m X (75) โˆ€j = 1, . . . , mโ€ฒ , (76) 1 . (77) T i=1 Proof: The inequalities (76) represent single-user bounds for the static users [34], and (77) di โ‰ค 1 โˆ’ is a time-sharing outer bound for the dynamic users that was established in [7], [18]. It remains to prove (75), as follows. We enhance the channel by giving global CSIR to all users and allowing full cooperation between the static users. This gives rise to an equivalent static user with mโ€ฒ antennas receiving Y โ€ฒ over an equivalent channel G and noise Zโ€ฒ . At this point, we have a multi-user system where CSIT is available with respect to one user, but not others. We then bound the performance of this system with that of another (similar) system that has no CSIT. To do so, we use the local statistical equivalence property developed and used in [13], [15], [36]. First, we draw Gฬƒ, Zฬƒ according to the distribution of G, Zโ€ฒ and independent of them. We enhance the channel by providing Yฬƒ = GฬƒX + Zฬƒ to the static receiver and Gฬƒ to all receivers. Because we do not provide Gฬƒ to the transmitter, there is no CSIT with respect to Yฬƒ. According to [36], we have h(Yฬƒ, Y โ€ฒ|H) = h(Y โ€ฒ |H) + o(log(ฯ)), where H = (G, Gฬƒ, h1 , . . . , hm ), therefore we can remove Y โ€ฒ from the enhanced channel without reducing its degrees of freedom. This new equivalent channel has one user with mโ€ฒ antennas receiving (Yฬƒ, H), m single-antenna users receiving (yi , H), and no CSIT.4 Having no CSIT, the enhanced channel is in the form of a multilevel broadcast channel studied in Section III-A, and hence using Theorem 1, โ€ฒ m X Rjโ€ฒ โ‰คI(W ; Yฬƒ|U, H) + I(X; Yฬƒ|U, W, H) j=1 4 In the enhanced channel after removal of Y โ€ฒ , the transmitter and receivers still share information about G, but this random variable is now independent of all (remaining) transmit and receive variables. March 26, 2018 DRAFT 23 R1 โ‰คI(U, W ; y1|V1 , H) โˆ’ I(W ; Yฬƒ|U, H) Ri โ‰คI(Viโˆ’1 ; yi |Vi , H), i = 2, . . . , m. (78) The dynamic receiver received signals have the same distribution. By following bounding steps parallel to (22), (23), (24), m X Ri โ‰ค log(ฯ) + o(log(ฯ)) โˆ’ I(W ; Yฬƒ|U, H) โˆ’ h(y1 |U, W, H). (79) j=1 Therefore, โ€ฒ m X j=1 m X Rjโ€ฒ 1 h(Yฬƒ|U, W, H) + R โ‰ค log(ฯ) + o(log(ฯ)) + ( โˆ’ 1)I(W ; Yฬƒ|U, H) + i mโ€ฒ + 1 j=1 mโ€ฒ + 1 mโ€ฒ + 1 โˆ’ h(y1 |U, W, H), โ‰ค log(ฯ) + o(log(ฯ)) + (80) h(Yฬƒ, y1 |U, W, H) โˆ’ h(y1 |U, W, H) mโ€ฒ + 1 โ‰ค log(ฯ) + o(log(ฯ)), (81) (82) where the last inequality follows from applying the extremal entropy inequality [23], [29], [35] and Lemma 1. This concludes the proof of the bound (75). VI. H YBRID CSIT: P ERFECT CSIT FOR THE S TATIC U SERS AND D ELAYED CSIT FOR THE DYNAMIC U SERS We begin with inner and outer bounds for one static and one dynamic user, then extend the result to multiple users. The transmitter knows the channel of the static users perfectly and instantaneously, and an outdated version of the channel of the dynamic users. A. Transmitting to One Static and One Dynamic User Theorem 12: For the fading broadcast channel characterized by Eq. (1) with one static and one dynamic user, with perfect CSIT for the static user and delayed CSIT for the dynamic user, the achievable degrees of freedom region is the convex hull of the vectors, 1 1 1 , โˆ’ ), 2T 2 2T 1 1 D2 :(dโ€ฒ, d) = ( , 1 โˆ’ ). T T D1 :(dโ€ฒ, d) = (1 โˆ’ March 26, 2018 (83) (84) DRAFT 24 Proof: The degrees of freedom (84) can be achieved by product superposition as discussed in Section III, without CSIT. We proceed to prove the achievability of (83). 1) Consider [u1 , ยทยทยท , uT โˆ’1 ] to be a complex 2 ร— (T โˆ’ 1) matrix containing symbols intended for the static user, [v1 , ยท ยท ยท , vT โˆ’1 ] intended for the dynamic user, and b โˆˆ C is a beamforming vector so that gโ€  b = 0. In addition we define u0 = 0, v0 = 1. Using these components, the transmitter constructs and transmits a super-symbol of length T , whose value at time t is: xโ€ 1 (t) = ut + b vt . (85) Note that x1 (0) = b does not carry any information for either user, and serves as a pilot. The received super symbol at the static user is: โ€ฒ y1โ€  = [0, gโ€  u1 , ยท ยท ยท , gโ€  uT โˆ’1 ]. (86) The received super symbol at the dynamic user y1โ€  =[hโ€ 1 b, (hโ€ 1 u1 + hโ€ 1 bv1 ), ยท ยท ยท , (hโ€ 1 uT โˆ’1 + hโ€ 1 bvT โˆ’1 )]. (87) The dynamic user estimates its equivalent channel hโ€ 1 b from the received value in the first time instant. The remaining terms include symbols intended for the dynamic user plus some interference, whose cancellation is the subject of the next step. 2) The transmitter next sends a second super symbol of length T , x2 = [uฬ„, uฬ„(hโ€ 1 u1 ), ยท ยท ยท , uฬ„(hโ€ 1 uT โˆ’1 )], (88) where uฬ„ โˆˆ C is a symbol intended for the static user. Hence, y2โ€  = [h2 uฬ„, h2 uฬ„(hโ€ 1 u1 ), ยท ยท ยท , h2 uฬ„(hโ€ 1 uT โˆ’1 )]. (89) The dynamic user estimates the equivalent channel h2 uฬ„ during the first time instant and then acquires hโ€ 1 ut , the interference in (87). Therefore, using y1 , y2 , the dynamic user solves for vt achieving (T โˆ’ 1) degrees of freedom. Furthermore, โ€ฒ y2โ€  = [g1 uฬ„, g1 uฬ„(hโ€ 1 u1 ), ยท ยท ยท , g1 uฬ„(hโ€ 1 uT โˆ’1 )]. (90) The static user solves for uฬ„ achieving one degree of freedom and also uses hโ€ 1 ut to solve for ut achieving further 2 (T โˆ’ 1) degrees of freedom. March 26, 2018 DRAFT 25 In summary, during 2T instants, the static user achieves (2T โˆ’ 1) degrees of freedom and the dynamic user achieves (T โˆ’ 1) degrees of freedom. This shows the achievability of (83). Theorem 13: For the fading broadcast channel characterized by Eq. (1) with one static and one dynamic user, where there is perfect CSIT for the static user and delayed CSIT for the dynamic user, an outer bound on the degrees of freedom region is, dโ€ฒ + d โ‰ค1, 2 dโ€ฒ โ‰ค1, (91) (92) 1 . (93) T Proof: The inequalities (92) and (93) represent the single-user outer bounds [26], [34]. It d โ‰ค1 โˆ’ only remains to prove the outer bound (91), as follows. 1) We enhance the channel by giving global CSIR to both users and also give y to the static user. The enhanced channel is physically degraded having (Y โ€ฒ , G) at the static user and (y, G) at the dynamic user, where Y โ€ฒ , (y โ€ฒ, y) and G , (h, g). In a physically degraded channel, causal feedback (including delayed CSIT) does not affect capacity [33], so we can remove the delayed CSIT with respect to the dynamic user. 2) We now use another enhancement with the motivation to remove the remaining CSIT (noncausal, with respect to the static user). This is accomplished, similar to Theorem 11, via local statistical equivalence property [13], [15], [36] in the following manner. We create a channel Gฬƒ, and noise Zฬƒ with the same distribution but independently of the true channel and noise, and a signal Yฬƒ = GฬƒX + Zฬƒ. A genie will give Yฬƒ to the static receiver and Gฬƒ to both receivers. It has been shown [36] that h(Yฬƒ, Y โ€ฒ |H) = h(Y โ€ฒ |H) + o(log ฯ), where H = (G, Gฬƒ), therefore we can remove Y โ€ฒ from the enhanced channel without reducing its degrees of freedom. 3) The enhanced channel is still physically degraded, therefore [31], [32] Rโ€ฒ โ‰คI(x; Yฬƒ|U, H) = h(Yฬƒ|U, H) + o(log(ฯ)) R โ‰คI(U; y|H) = h(y|H) โˆ’ h(y|U, H), (94) where U is an auxiliary random variable, and U โ†’ x โ†’ (y โ€ฒ , y) forms a Markov chain. Therefore, 1 1 โ€ฒ R + R โ‰คh(y|H) + h(Yฬƒ|U, H) โˆ’ h(y|U, H) + o(log(ฯ)) 2 2 March 26, 2018 DRAFT 26 1.5 Achievable region Outer region 1 0.5 0 0 Fig. 7. 0.2 0.4 0.6 0.8 1 1.2 One static and one dynamic user with hybrid CSIT and T = 15 โ‰ค log(ฯ) + o(log(ฯ)), (95) where the last inequality follows from extremal entropy inequality and Lemma 1 [23], [29], [35]. This concludes the proof of the bound (91). Remark 5: For the above broadcast channel with hybrid CSIT, the achievable sum degrees of freedom is dsum = 3 2 โˆ’ T1 , and the outer bound on the sum degrees of freedom is dsum โ‰ค 32 . The gap decreases with the dynamic user coherence time (see Fig. 7 and 8). B. Multiple Static and Dynamic Users Theorem 14: The fading broadcast channel characterized by Eq. (1), with perfect CSIT for the static users and delayed CSIT for the dynamic users, can achieve the following degrees of freedom, โ€ฒ D1 : m X eโ€ j , (96) j=1 D2 , . . . , Dmmโ€ฒ +1 : (1 โˆ’ March 26, 2018 1 1 โ€  1 โ€  )ej + ( โˆ’ )e , 2T 2 2T i j = 1, . . . , mโ€ฒ , i = 1, . . . , m, (97) DRAFT 27 1.5 Achievable region Outer region 1 0.5 0 0 Fig. 8. 0.2 0.4 0.6 0.8 1 1.2 One static and one dynamic user with hybrid CSIT and T = 30 โ€ฒ Dmmโ€ฒ +2 , . . . , Dmmโ€ฒ +m+2 mโ€ฒ Dmmโ€ฒ +m+3 m 1 1X โ€  ej + (1 โˆ’ )eโ€ i , : T j=1 T mX โ€  1 : ej + ( 1 T j=1 1 + 2 + ...+ i = 1, . . . , m, (98) m m X โ€  (1 โˆ’ )) e. 1 T i=1 i m (99) The achievable region consists of the convex hull of the above vectors. Proof: D1 is achieved by inverting the channel of the static users at the transmitter, providing one degree of freedom per static user. The achievability of D2 , . . . , Dmmโ€ฒ +1 was established in Section VI-A, and that of Dmmโ€ฒ +2 , . . . , Dmmโ€ฒ +m+2 was proved in Section V without CSIT for the dynamic user, so it remains achievable with delayed CSIT. Dmmโ€ฒ +m+3 is achieved by retrospective interference alignment [11] along with product superposition, as follows. The transmitted signal over T instants is X = [Uฬ„, Uฬ„V], (100) where Uฬ„ โˆˆ Cmร—m contains independent symbols intended for the static users sent by inverting the channels of the static users. Therefore, during the first m time instants, each static user receives an interference-free signal and achieves m degree of freedom, and furthermore the dynamic users estimate their equivalent channels. During the remaining time instants, each dynamic receiver March 26, 2018 DRAFT 28 obtains coherent observations of (T โˆ’ m) transmit symbols, which are pre-processed, combined and interference-aligned into super-symbols V according to retrospective interference alignment techniques of [11]. Accordingly, each dynamic receiver achieves 1 1 (1 1+ 12 +...+ m โˆ’ m ) T degrees of freedom. Theorem 15: An outer bound on the degrees of freedom region of the fading broadcast channel characterized by Eq. (1), with perfect CSIT for the static users and delayed CSIT for the dynamic users, is โ€ฒ m X j=1 m X dโ€ฒj di + โ‰ค 1, โ€ฒ m + m i=1 m m X i=1 di โ‰ค 1+ dโ€ฒj โ‰ค 1, (101) 1 2 m + ...+ 1 m , j = 1, . . . , mโ€ฒ , (102) (103) 1 , i = 1, . . . , m. (104) T Proof: The inequalities (103) and (104) represent the single-user outer bounds for the static di โ‰ค 1 โˆ’ and dynamic users, respectively [26], [34]. According to Theorem 5, (102) represents an outer bound for the dynamic users. It only remains to prove (101) as follows. 1) The original channel is enhanced by giving the users global CSIR. Furthermore, we assume full cooperation between the static users and between the dynamic users. The resulting enhanced channel is a broadcast channel with two users: one static user equipped with mโ€ฒ antennas, received signal Y โ€ฒ , channel G, and noise noise Zโ€ฒ , and one dynamic user equipped with m antennas, received signal Y, channel H, and noise Z. 2) We further enhance the channel by giving Y to the static user, constructing a physically degraded channel. For the enhanced channel, the static receiver is equipped with mโ€ฒ + m โ€ฒ antennas and has received signal Yฬ‚ = [Y โ€  , Y โ€  ]โ€  , channel Gฬ‚ = [Gโ€  , Hโ€  ]โ€  , and noise โ€ฒ Zฬ‚ = [Zโ€  , Z โ€  ]โ€  . Since any causal feedback (including delayed CSIT) does not affect the capacity of a physically degraded channel [33], the delayed CSIT for the dynamic receiver can be removed. 3) We now use another enhancement with the motivation to remove the remaining CSIT (non-causal, with respect to the static user). We create an artificial channel and noise, Gฬƒ, Zฬƒ, with the same distribution but independent of Gฬ‚, Zฬ‚, and a signal Yฬƒ = GฬƒX + Zฬƒ. A March 26, 2018 DRAFT 29 genie will give Yฬƒ to the static receiver and Gฬƒ to both receivers. It has been shown [36] that h(Yฬƒ, Yฬ‚|H) = h(Yฬ‚|H) + o(log ฯ), where H = (Gฬ‚, Gฬƒ), therefore we can remove Yฬ‚ from the enhanced channel without reducing its degrees of freedom. 4) The enhanced channel is physically degraded without CSIT, therefore [31], [32], โ€ฒ m X Rjโ€ฒ โ‰ค I(X; Yฬƒ|U, H) m X Ri โ‰ค I(U; Y|H). j=1 (105) i=1 Hence, โ€ฒ m X j=1 m X Rjโ€ฒ 1 1 1 Ri + โ‰ค โ€ฒ h(Yฬƒ|U, H) + h(Y|H) โˆ’ h(Y|U, H) + o(log(ฯ)) โ€ฒ m + m j=1 m m + m m m โ‰ค log(ฯ) + o(log(ฯ)), (106) where the last inequality follows from the extremal entropy inequality [23], [29], [35] and Lemma 1 and since h(Y|H) โ‰ค m log(ฯ) + o(log(ฯ)) [34]. This concludes the proof of the bound (101). VII. C ONCLUSION A multiuser broadcast channel was studied where some receivers experience longer coherence intervals and have CSIR while other receivers experience a shorter coherence interval and do not enjoy free CSIR. The degrees of freedom were studied under delayed CSIT, hybrid CSIT, and no CSIT. Among the techniques employed were interference alignment and beamforming along with product superposition for the inner bounds. The outer bounds involved a bounding of the rate region of the multiuser (discrete memoryless) multilevel broadcast channel. Some highlights of the results are: for one static and one dynamic user with delayed CSIT, the achievable degrees of freedom region partially meets the outer bound. For one static user with perfect CSIT and one dynamic user with delayed CSIT, the gap between the achievable and the outer sum degrees of freedom is inversely proportional to the dynamic user coherence time. For each of the considered CSI conditions, inner and outer bounds were also found for arbitrary number of users. From these results we conclude that in the broadcast channel, coherence diversity delivers gains that are distinct from, and augment, the gains from beamforming and interference alignment. March 26, 2018 DRAFT 30 The authors anticipate that the tools and results of this paper can be helpful for future studies of hybrid CSIT/CSIR in other multi-terminal networks. A PPENDIX I P ROOF OF T HEOREM 1 Recall, Mjโ€ฒ , Mi are the messages of users j = 1, . . . , mโ€ฒ and i = 1, . . . , m, respectively. We โ€ฒ โ€ฒ enhance the channel by assuming that user j = 1, . . . , mโ€ฒ knows the messages Mj+1 , . . . , Mm โ€ฒ and M1 , . . . , Mm and user i = 1, . . . , m knows the messages Mi+1 , . . . , Mm . Using Fanoโ€™s inequality, chain rule, and data processing inequality we can bound the rates of the static user j = 1, . . . , mโ€ฒ , โ€ฒ โ€ฒ โ€ฒ โ€ฒ nRjโ€ฒ โ‰ค I(Mjโ€ฒ ; Yj,1 , . . . , Yj,n |Mj+1 , . . . , Mm โ€ฒ , M1 , . . . , Mm ) (107) = n X โ€ฒ I(Mjโ€ฒ ; Yj,k |Uj,k ) (108) โ‰ค n X โ€ฒ โ€ฒ โ€ฒ I(Mjโ€ฒ , Uj,k , Yjโˆ’1,1 , . . . , Yjโˆ’1,kโˆ’1 ; Yj,k |Uj,k ) (109) = n X โ€ฒ I(Ujโˆ’1,k ; Yj,k |Uj,k ) (110) k=1 k=1 k=1 where  โ€ฒ โ€ฒ โ€ฒ โ€ฒ , . . . , Mm Uj,k = Mj+1 โ€ฒ , M1 , . . . , Mm , Yj,1 , . . . , Yj,kโˆ’1 , โ€ฒ denotes the received signal of user j at time instant k, Yj,k Umโ€ฒ โ†’ ยท ยท ยท โ†’ U1 โ†’ X โ†’ (Y1โ€ฒ , . . . , Ymโ€ฒ โ€ฒ , Y1 , . . . , Ym) forms a Markov chain, and U0 = X. The rate of static user mโ€ฒ can be bounded as n X โ€ฒ I(Umโ€ฒ โˆ’1,k ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ ,k ) nRmโ€ฒ โ‰ค = โ‰ค = k=1 n X k=1 n X k=1 n X k=1 March 26, 2018 I(Xk ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ ,k ) โˆ’ n X I(Xk ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ โˆ’1,k ) (111) (112) k=1 I(Xk , Y1,k+1, . . . , Y1,n ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ ,k ) โˆ’ n X I(Xk ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ โˆ’1,k ) (113) k=1 I(Y1,k+1, . . . , Y1,n ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ ,k ) + n X I(Xk ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ ,k , Y1,k+1, . . . , Y1,n ) k=1 DRAFT 31 โˆ’ n X I(Xk ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ โˆ’1,k ) (114) k=1 = n X I(Wk ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ ,k ) + n X I(Xk ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ ,k , Wk ) I(Xk ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ โˆ’1,k ), k=1 k=1 k=1 โˆ’ n X (115) n where Wk = Y1,k+1 . Similarly, nRi โ‰คI(Mi ; Yi,1, . . . , Yi,n |Mi+1 , . . . , Mm ) = = = n X k=1 n X k=1 n X (116) I(Mi ; Yi,k |Vi,k ) (117) I(Mi , Vi,k , Yiโˆ’1,k+1, . . . , Yiโˆ’1,n ; Yi,k |Vi,k ) (118) I(Viโˆ’1,k ; Yi,k |Vi,k ), (119) k=1 where we define Vi,k , (Mi+1 , . . . , Mm , Yi,k+1, . . . , Yi,n ), which leads to the Markov chain Vm โ†’ ยท ยท ยท โ†’ V1 โ†’ (Umโ€ฒ , W ) โ†’ X โ†’ (Y1โ€ฒ , . . . , Ymโ€ฒ โ€ฒ , Y1 , . . . , Ym ) . Using the chain rule and Csiszaฬr sum identity [37], we obtain the bound (125). R1 โ‰ค n X I(M1 , . . . , Mm ; Y1,k |V1,k ) (120) โ‰ค n X I(M1 , . . . , Mm , Y1,k+1, . . . , Y1,n ; Y1,k |V1,k ) (121) = n X I(M1 , . . . , Mm , Y1,k+1, . . . , Y1,n , Ymโ€ฒ โ€ฒ ,1 , . . . , Ymโ€ฒ โ€ฒ ,kโˆ’1 ; Y1,k |V1,k ) (122) k=1 k=1 k=1 โˆ’ n X I(Ymโ€ฒ โ€ฒ ,1 , . . . , Ymโ€ฒ โ€ฒ ,kโˆ’1; Y1,k |M1 , . . . , Mm , Y1,k+1, . . . , Y1,n ) (123) k=1 = n X = n X I(Umโ€ฒ ,k , Wk ; Y1,k |V1,k ) โˆ’ n X I(Y1,k+1, . . . , Y1,n ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ ,k ) (124) I(Umโ€ฒ ,k , Wk ; Y1,k |V1,k ) โˆ’ n X I(Wk ; Ymโ€ฒ โ€ฒ ,k |Umโ€ฒ ,k ). (125) k=1 k=1 k=1 k=1 By introducing a time-sharing auxiliary random variable, Q, [38] and defining X ,(XQ , Q), March 26, 2018 โ€ฒ Yjโ€ฒ , (Yj,Q , Q) DRAFT 32 Yi ,(Yi,Q , Q), Ui , (Ui,Q , Q) Vj ,(Vj,Q , Q), W , (WQ , Q), (126) we establish (7)-(10). Similarly, we can follow the same steps to prove (11)-(14) after switching the role of the two sets of variables Y1โ€ฒ , . . . , Ymโ€ฒ โ€ฒ and Y1 , . . . , Ym . This completes the proof of Theorem 1. A PPENDIX II M ULTILEVEL B ROADCAST C HANNEL WITH D EGRADED M ESSAGE S ETS Here, we study the capacity of the multiuser multilevel broadcast channel that is characterized   by (6) with degraded message sets. In particular, M0 โˆˆ 1 : 2nR0 is to be communicated to   all receivers, and furthermore M1 โˆˆ 1 : 2nR1 is to be communicated to receiver Y1 .5 A threereceiver special case was studied by Nair and El Gamal [22] where the idea of indirect decoding was introduced, and the capacity is the set of rate pairs (R1 , R0 ) such that  R0 โ‰ค min I(U; Y2 ), I(V ; Y1โ€ฒ ) , R1 โ‰คI(X; Y1|U), R0 + R1 โ‰คI(V ; Y1โ€ฒ ) + I(X; Y1|V ), (127) for some pmf p(u, v)p(x|v). In the sequel, we give a generalization of Nair and El Gamal for multiuser multilevel broadcast channel. Theorem 16: The capacity of multiuser multilevel broadcast channel characterized by (6), with degraded message sets, is the set of rate pairs (R1 , R0 ) such that  R0 โ‰ค min I(U; Ym ), I(V ; Ymโ€ฒ โ€ฒ ) , R1 โ‰คI(X; Y1|U), R0 + R1 โ‰คI(V ; Ymโ€ฒ โ€ฒ ) + I(X; Y1 |V ), (128) for some pmf p(u, v)p(x|v). Proof: The converse parallels the proof of the converse of the three-receiver case studied by Nair and El Gamal in [22] after replacing Y2 , Y1โ€ฒ with Ym , Ymโ€ฒ โ€ฒ , respectively. In particular, U 5 For compactness of expression, here we refer to each receiver by the variable denoting its received signal. March 26, 2018 DRAFT 33 and V are defined as follows. Uk , (M0 , Y1,1, . . . , Y1,kโˆ’1, Ym,k+1, . . . , Ym,n ), Vk , (M0 , Y1,1, . . . , Y1,kโˆ’1, Ymโ€ฒ โ€ฒ ,k+1, . . . , Ymโ€ฒ โ€ฒ ,n ), k = 1, . . . , n, and let Q be a time-sharing random variable uniformly distributed over the set {1, . . . , n} and independent of X n , Y1n , Ym,1 , . . . , Ym,n , Ymโ€ฒ โ€ฒ ,1 , . . . , Ymโ€ฒ โ€ฒ ,n . We then set U = (UQ , Q), V = (VQ , Q), X = XQ , Y1 = Y1,Q , Ym = Ym,Q , and Ymโ€ฒ โ€ฒ = Ymโ€ฒ โ€ฒ ,Q . This completes the converse part of the proof. The achievability part uses superposition coding and indirect decoding as follows. โ€ข Rate splitting: divide the private message M1 into two independent messages M10 at rate R10 and M11 at rate R11 , where R1 = R10 + R11 . โ€ข Codebook generation: fix a pmf p(u, v)p(x|v) and randomly and independently generate   Q 2nR0 sequences un (m0 ), m0 โˆˆ 1 : 2nR0 , each according to nk=1 pU (uk ). For each m0 , randomly and conditionally independently generate 2nR10 sequences v n (m0 , m10 ), m10 โˆˆ [1 : Q 2nR10 ], each according to nk=1 pV |U (vk |uk (m0 )). For each pair (m0 , m10 ), randomly and conditionally independently generate 2nR11 sequences xn (m0 , m10 , m11 ), m11 โˆˆ [1 : 2nR11 ], Q each according to nk=1 pX|V (xk |vk (m0 , m10 )). โ€ข Encoding: to send the message pair (m0 , m1 ) = (m0 , m10 , m11 ), the encoder transmits xn (m0 , m10 , m11 ). โ€ข Decoding at the users Y2 , . . . , Ym : decoder i declares that mฬ‚0i โˆˆ [1 : 2nR0 ] is sent if it is (n) the unique message such that (un (mฬ‚0i ), yin) โˆˆ Tวซ . Hence, by law of large numbers and the packing lemma [38], the probability of error tends to zero as n โ†’ โˆž if R0 < min {I(U; Yi ) โˆ’ ฮด(วซ)}, 2โ‰คiโ‰คm = I(U; Ym ) โˆ’ ฮด(วซ), (129) where the last equality follows from applying data processing inequality on the Markov chain U โ†’ X โ†’ Y1 โ†’ Y2 โ†’ ยท ยท ยท โ†’ Ym . โ€ข Decoding at Y1 : decoder 1 declares that (mฬ‚01 , mฬ‚10 , mฬ‚11 ) is sent if it is the unique message  triple such that un (mฬ‚01 ), v n (mฬ‚01 , mฬ‚10 ), xn (mฬ‚01 , mฬ‚10 , mฬ‚11 ), y1n โˆˆ [1 : 2nR0 ]. Hence, by law of large numbers and the packing lemma [38], the probability of error tends to zero as March 26, 2018 DRAFT 34 n โ†’ โˆž if R11 < I(X; Y1|V ) โˆ’ ฮด(วซ), R10 + R11 < I(X; Y1|U) โˆ’ ฮด(วซ), R0 + R10 + R11 < I(X; Y1) โˆ’ ฮด(วซ). โ€ข (130) Decoding at users Y1โ€ฒ , . . . , Ymโ€ฒ โ€ฒ : decoder j decodes m0 indirectly by declaring mฬƒ0j is sent (n) if it is the unique message such that (un (mฬƒ0j ), v n (mฬƒ0j , m10 ), zjn ) โˆˆ Tวซ for some m10 โˆˆ [1 : 2nR0 ]. Hence, by law of large numbers and packing lemma, the probability of error tends to zero as n โ†’ โˆž if R0 + R10 < min {I(U, V ; Yjโ€ฒ ) โˆ’ ฮด(วซ)}, min {I(V ; Yjโ€ฒ ) โˆ’ ฮด(วซ)}, 1โ‰คjโ‰คmโ€ฒ = 1โ‰คjโ‰คmโ€ฒ = I(V ; Ymโ€ฒ โ€ฒ ) โˆ’ ฮด(วซ), (131) where the last two equalities follow from applying the chain rule and data processing inequality on the Markov chain U โ†’ V โ†’ X โ†’ Y1โ€ฒ โ†’ Y2โ€ฒ โ†’ ยท ยท ยท โ†’ Ymโ€ฒ โ€ฒ . By combining the bounds in (129), (130), (131), substituting R10 + R11 = R1 , and eliminating R10 and R11 by the Fourier-Motzkin procedure [22], the proof of the achievability is completed. R EFERENCES [1] M. Fadel and A. Nosratinia, โ€œBlock-fading broadcast channel with hybrid CSIT and CSIR,โ€ in IEEE International Symposium on Information Theory (ISIT), June 2017, pp. 1873โ€“1877. [2] C. Huang, S. Jafar, S. Shamai, and S. Vishwanath, โ€œOn degrees of freedom region of MIMO networks without channel state information at transmitters,โ€ IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 849โ€“857, Feb. 2012. [3] C. Vaze and M. Varanasi, โ€œThe degree-of-freedom regions of MIMO broadcast, interference, and cognitive radio channels with no CSIT,โ€ IEEE Trans. Inf. Theory, vol. 58, no. 8, pp. 5354โ€“5374, Aug. 2012. [4] A. Lapidoth, S. Shamai, and M. Wigger, โ€œOn the capacity of fading MIMO broadcast channels with imperfect transmitter side-information,โ€ arXiv preprint cs/0605079, 2006. [5] S. Jafar, โ€œBlind interference alignment,โ€ IEEE J. Sel. Topics Signal Process., vol. 6, no. 3, pp. 216โ€“227, June 2012. [6] M. Fadel and A. Nosratinia, โ€œBroadcast channel under unequal coherence intervals,โ€ in IEEE International Symposium on Information Theory (ISIT), July 2016, pp. 275โ€“279. [7] โ€”โ€”, โ€œCoherence disparity in broadcast and multiple access channels,โ€ IEEE Trans. Inf. Theory, vol. 62, no. 12, pp. 7383โ€“7401, Dec. 2016. March 26, 2018 DRAFT 35 [8] G. Caire and S. Shamai, โ€œOn the achievable throughput of a multiantenna Gaussian broadcast channel,โ€ IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1691โ€“1706, July 2003. [9] H. Weingarten, Y. Steinberg, and S. Shamai, โ€œThe capacity region of the Gaussian multiple-input multiple-output broadcast channel,โ€ IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 3936โ€“3964, Sept. 2006. [10] A. Davoodi and S. Jafar, โ€œAligned image sets under channel uncertainty: Settling a conjecture by Lapidoth, Shamai and Wigger on the collapse of degrees of freedom under finite precision CSIT,โ€ arXiv preprint arXiv:1403.1541, 2014. [11] M. Maddah-Ali and D. Tse, โ€œCompletely stale transmitter channel state information is still very useful,โ€ IEEE Trans. Inf. Theory, vol. 58, no. 7, pp. 4418โ€“4431, July 2012. [12] T. Gou and S. Jafar, โ€œOptimal use of current and outdated channel state information: Degrees of freedom of the MISO BC with mixed CSIT,โ€ IEEE Commun. Lett., vol. 16, no. 7, pp. 1084โ€“1087, July 2012. [13] R. Tandon, M. A. Maddah-Ali, A. Tulino, H. V. Poor, and S. Shamai, โ€œOn fading broadcast channels with partial channel state information at the transmitter,โ€ in International Symposium on Wireless Communication Systems (ISWCS), Aug. 2012, pp. 1004โ€“1008. [14] S. Amuru, R. Tandon, and S. Shamai, โ€œOn the degrees-of-freedom of the 3-user MISO broadcast channel with hybrid CSIT,โ€ in IEEE International Symposium on Information Theory (ISIT), 2014, pp. 2137โ€“2141. [15] R. Tandon, S. Jafar, S. Shamai, and V. Poor, โ€œOn the synergistic benefits of alternating CSIT for the MISO broadcast channel,โ€ IEEE Trans. Inf. Theory, vol. 59, no. 7, pp. 4106โ€“4128, July 2013. [16] Y. Li and A. Nosratinia, โ€œProduct superposition for MIMO broadcast channels,โ€ IEEE Trans. Inf. Theory, vol. 58, no. 11, pp. 6839โ€“6852, Nov. 2012. [17] โ€”โ€”, โ€œCoherent product superposition for downlink multiuser MIMO,โ€ IEEE Trans. Wireless Commun., vol. PP, no. 99, pp. 1โ€“9, 2014. [18] M. Fadel and A. Nosratinia, โ€œCoherent, non-coherent, and mixedโ€“CSIR broadcast channels: Multiuser degrees of freedom,โ€ in IEEE International Symposium on Information Theory (ISIT), June 2014, pp. 2574โ€“2578. [19] โ€”โ€”, โ€œCoherence disparity in time and frequency,โ€ in Proc. IEEE Global Telecommunication Conference (GLOBECOMโ€™16), Dec. 2016, pp. 1โ€“6. [20] F. Zhang, M. Fadel, and A. Nosratinia, โ€œSpatially correlated MIMO broadcast channel: Analysis of overlapping correlation eigenspaces,โ€ in IEEE International Symposium on Information Theory (ISIT), June 2017, pp. 1097โ€“1101. [21] S. Borade, L. Zheng, and M. Trott, โ€œMultilevel broadcast networks,โ€ in IEEE International Symposium on Information Theory (ISIT), June 2007, pp. 1151โ€“1155. [22] C. Nair and A. Gamal, โ€œThe capacity region of a class of three-receiver broadcast channels with degraded message sets,โ€ IEEE Trans. Inf. Theory, vol. 55, no. 10, pp. 4479โ€“4493, Oct. 2009. [23] T. Liu and P. Viswanath, โ€œAn extremal inequality motivated by multiterminal information-theoretic problems,โ€ IEEE Trans. Inf. Theory, vol. 53, no. 5, pp. 1839โ€“1851, May 2007. [24] R. Liu, T. Liu, V. Poor, and S. Shamai, โ€œA vector generalization of Costaโ€™s entropy-power inequality with applications,โ€ IEEE Trans. Inf. Theory, vol. 56, no. 4, pp. 1865โ€“1879, Apr. 2010. [25] T. Marzetta and B. Hochwald, โ€œCapacity of a mobile multiple-antenna communication link in Rayleigh flat fading,โ€ IEEE Trans. Inf. Theory, vol. 45, no. 1, pp. 139โ€“157, Jan. 1999. [26] L. Zheng and D. Tse, โ€œCommunication on the Grassmann manifold: a geometric approach to the noncoherent multipleantenna channel,โ€ IEEE Trans. Inf. Theory, vol. 48, no. 2, pp. 359โ€“383, Feb. 2002. March 26, 2018 DRAFT 36 [27] K. Marton, โ€œA coding theorem for the discrete memoryless broadcast channel,โ€ IEEE Trans. Inf. Theory, vol. 25, no. 3, pp. 306โ€“311, May 1979. [28] S. Yang, M. Kobayashi, D. Gesbert, and X. Yi, โ€œDegrees of freedom of time correlated MISO broadcast channel with delayed CSIT,โ€ IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 315โ€“328, Jan. 2013. [29] X. Yi, S. Yang, D. Gesbert, and M. Kobayashi, โ€œThe degrees of freedom region of temporally correlated MIMO networks with delayed CSIT,โ€ IEEE Trans. Inf. Theory, vol. 60, no. 1, pp. 494โ€“514, Jan. 2014. [30] C. Shannon, โ€œThe zero error capacity of a noisy channel,โ€ IEEE Trans. Inf. Theory, vol. 2, no. 3, pp. 8โ€“19, Sept. 1956. [31] P. Bergmans, โ€œRandom coding theorem for broadcast channels with degraded components,โ€ IEEE Trans. Inf. Theory, vol. 19, no. 2, pp. 197โ€“207, Mar. 1973. [32] โ€”โ€”, โ€œA simple converse for broadcast channels with additive white Gaussian noise,โ€ IEEE Trans. Inf. Theory, vol. 20, no. 2, pp. 279โ€“280, Mar. 1974. [33] A. E. Gamal, โ€œThe feedback capacity of degraded broadcast channels (corresp.),โ€ IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 379โ€“381, May 1978. [34] E. Telatar, โ€œCapacity of multi-antenna Gaussian channels,โ€ European transactions on telecommunications, vol. 10, no. 6, pp. 585โ€“595, 1999. [35] H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, โ€œThe capacity region of the degraded multiple-input multiple-output compound broadcast channel,โ€ IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011โ€“5023, Oct. 2009. [36] P. Mukherjee, R. Tandon, and S. Ulukus, โ€œSecure degrees of freedom region of the two-user MISO broadcast channel with alternating CSIT,โ€ IEEE Trans. Inf. Theory, vol. PP, no. 99, pp. 1โ€“1, Apr. 2017. [37] I. Csiszaฬr and J. Koฬˆrner, โ€œInformation theory : Coding theorems for discrete memoryless channels,โ€ Budapest: Akadeฬmiai Kiadoฬ, 1981. [38] A. E. Gamal and Y. Kim, Network information theory. March 26, 2018 Cambridge University Press, 2011. DRAFT
7cs.IT
arXiv:1208.3882v1 [cs.DC] 19 Aug 2012 Coordination Level Modeling and Analysis of Parallel Programs using Petri Nets Francisco Heron de Carvalho-Junior Departamento de Computacฬงaฬƒo Universidade Federal do Cearaฬ (UFC) Fortaleza, Brazil Rafael Dueire Lins Centro de Informaฬtica Universidade Federal de Pernambuco Recife, Brazil March 2005 Abstract In the last fifteen years, the high performance computing (HPC) community has claimed for parallel programming environments that reconciles generality, higher level of abstraction, portability, and efficiency for distributed-memory parallel computing platforms. The Hash component model appears as an alternative for addressing HPC community claims for fitting these requirements. This paper presents foundations that will enable a parallel programming environment based on the Hash model to address the problems of โ€œdebuggingโ€, performance evaluation and verification of formal properties of parallel program by means of a powerful, simple, and widely adopted formalism: Petri nets. 1 Introduction Haskell# is a parallel extension to Haskell [6], the most widely used non-strict pure functional programming language [25]. It makes possible the coordination of a set of functional processes written in Haskell through a configuration language, called HCL (Haskell# Configuration Language). Thus, Haskell# separate the programming task in two levels: the computation level, where functional processes are written in Haskell, and the coordination level, where functional processes are coordinated. The coordination media of Haskell# is also called the Hash component model. In recent works, we have generalized the Hash component model in order to support other programming languages than Haskell at the computation level. Functional processes are now units, possibly written 1 in any programming language supported by a programming environment that complies to the Hash component model. In this paper, we still suppose that units are the functional processes of Haskell#. The coordination level of Haskell# , i. e. the Hash component model, was designed in order to make possible to translate the coordination media of Haskell# programs onto Petri nets. This paper addresses the issue of presenting a translation schema for that, demonstrating its use to formal analysis of them, involving verification of formal properties. The use of Petri nets allows for reusing existing automatic tools based on this formalisms for reasoning about Hash programs, such as PEP [4] and INA [21]. Further extensions could make possible performance evaluation using timed or stochastic Petri Nets variants [14, 26]. In the rest of the paper, we use the Hash component model to refer to the coordination level of Haskell# , i.e. it is assumed that functional processes are written in Haskell (functional modules) and they communicate through either stream-based or singleton communication channels that link their input and output ports. Such concepts are not present in the general definition of the Hash component model. In additional to this introduction, this paper comprises the following sections. Section 2 presents additional details about the Hash component model. Section 3 presents a translation schema of Hash programs onto Petri nets. Section 4 demonstrates how Petri net models of Hash programs may be used for verification of formal concurrency properties of Hash programs. 2 The Hash Component Model Distributed parallel programs may be viewed as collections of processes that interact by exchanging messages during execution. Current programming models provide the ability to describe computation of processes by augmenting common languages with notations for explicit message passing. However, they do not provide ability to modularize concerns that appear in the design of parallel applications, including the concern of parallelism itself, which are scattered across the implementation of processes. We advocate that this is the key feature for integrating advanced software engineering techniques in the development environment of HPC parallel applications. In sequential programming, the focus is on modularization of concerns, since there are a unique conceptual โ€œprocessโ€ and efficiency requirements are less restrictive. This is the essential difference that makes sequential programming actually more suitable for current software engineering techniques for large scale applications than current parallel programming. The Hash component model may be viewed as a new paradigm for developing message passing programs. Now, they may be viewed from two orthogonal perspective dimensions: the dimension of processes and the dimension of components. A process correspond to the related notion derived from conventional message passing programming. Thus, they are agents that perform computational 2 tasks, communicating through communication channels. Conceptually, Hash channels, like in OCCAM [17], are point-to-point, synchronous, typed and unidirectional. Bounded buffers are also supported. The disciplined use of channels is the feature that makes possible formal analysis of parallel programs by using Petri nets, the main topic of this paper. A component is an abstract entity that address a functional or non-functional concern of the application or its execution environment in the parallel program. A component describe the role of a set of processes with respect to a given concern. The sets of components that respectively implement a set of concerns may overlap, allowing for modular separation of concerns that are interlaced across implementation of processes (cross-cutting concerns). The separation of cross-cutting concerns is an active research area in object-oriented programming of large scale applications [19]. A Hash program is defined by a main component that address the overall application concern. Some common examples of cross-cutting non-functional concerns that appears in HPC applications are: placement of processes onto processors, secure policies for accessing computing resources on grids, fault-tolerance schemes for long-running applications, parallel debugging, execution timing, and so on. Hash programming is performed from the perspective of components, instead of processes, but resulting in the specification of the topology of a network of parallel processes. Components may be composed or simple. Composed components are programmed using the Hash configuration language (HCL), being built by hierarchical composition of other components, called inner components. HCL may be viewed as a language for gluing and orchestrating components, i.e. a connector language. It is distinguished from other compositional languages because it supports composition of parallel components by overlapping the concerns they address. Conventional compositional languages only allows nested composition of sequential components. Simple components addresses functional concerns, implemented using a host language, supposed to be sequential. Simple components are the atoms of functionality in Hash programs, constituting the leaves in their component hierarchy. The Hash component model supports parallel programming with skeletons [11] without any additional language support. Partial topological skeletons may expose topological patterns of interaction between processes in a Hash program, which may be used to produce more efficient code for specific architectures and execution environments [8]. They are implemented as composed components parameterized by their addressed concerns. The Hash component model has origins in Haskell# [6], where the host language used to program simple components is Haskell. Haskell enables separation between coordination and computation code, by attaching lazy streams to communication channels at coordination level, avoiding the use of communication primitives in communication code [5]. This paper on focused in Haskell# . In the next section, it is described how composed components, and skeletons, are programmed using Hash configurations, while programming of simple components, in Haskell, is described in Section 2.2. 3 # Programming Message Passing Programming (Efficient, Portable, Expressive) (Structured, High Level of Abstraction) # Program recv! recv! send! # compiler โˆ’ code generation โˆ’ # compiler โˆ’ unfolding โˆ’ send! computable computable computable send! send! send! send! recv! recv! recv! send! send! nonโˆ’computable Unit send! Process # Process Process View Component View Process View concerns are scattered among processes,but it is possible to factorize them into components concerns are encapsulated into components send! recv! send! Process Slice Port Channel recv! recv! requires programmer intervention Component recv! recv! recv! concerns are scattered among processes and it is not possible to factorize them into components Figure 1: Component Perspective versus Process Perspective 2.1 Programming Composed Components Composed components define coordination media of Haskell# programs, where all parallelism concerns are addresses without mention to entities at computation levels, where computations are specified. Composed components are written in HCL (Hash Configuration Language). Also, they define the core of the Hash component model, supported by Haskell#. The configuration of a composed component specifies how a collection units, agents that perform specific tasks, interact by means of point-to-point, typed, and unidirectional communication channels, for addressing a given parallel programming concern. For that, a unit is instantiated from an interface and associated to a component (Figure 2). The latter specifies the task performed by the unit, since functional modules describe addressed concerns, while the former specifies how the unit interacts with the coordination medium. A unit associated with a simple component is called process, while a unit associated with a composed component is called a cluster. A interface of a unit is defined by a set of typed input and output ports and a protocol. The protocol of an interface specifies the order in which ports may be activated during execution of the units instantiated from that interface, by means of an embedded language whose constructors have semantic equivalence to regular expressions controlled by semaphores. This formalism is equivalent to place/transition Petri nets, allowing for formal property analysis, simulation and performance evaluation of programs using available Petri net tools [10], such as PEP [16] and INA [21]. A port is activated between the time in which it becomes ready to perform a Assignmennt Instantiation interface declaration Unit (nonโˆ’virtual) Virtual Unit Interface or Interface Class unit declaration assign declaration Figure 2: Instantiating and Configuring a Unit 4 A C e b F d F unification A CDE B D a e a e b G d B b G c factorization E c Figure 3: Unification/Factorization communication operation and the time it completes this operation, according to the communication mode of the channel where the port is connected. Units interact through communication channels, which connect an output port from an unit (transmitter ) to an input port of another one (receiver ). The types of the connected ports must be the same. The supported communication modes, inspired on MPI, are : synchronous, buffered and ready. In a unit specification, interface ports can be replicated to form groups. Groups may be of two kinds: any and all, according to the semantics of activation. The activation of a group of ports of kind all implies activation of all its port members. The activation of a group of ports of kind any implies that one of the port members will be put ready for communication but only one will complete communication. The chosen port is one of the activated ports whose communication pairs are also activated at that instant. From the internal perspective of the unit, groups are treated as indivisible entities, while from the perspective of the coordination medium, port members are referred directly in order to forming channels. Input and output ports (groups individually) of the unit interface must be mapped to arguments and return points of the component assigned to it, respectively. Wire functions are useful when it is necessary to transform values at the boundary between ports and arguments/exit points. A particularly useful use of wire functions is to aggregate data received from input ports belonging to a group of ports of kind all to a unique value, passed to the associated argument. Similarly, wire functions allow that a value produced in an exit point to be mapped onto a collection of values in order to be sent by the port members of the associated group of output ports of kind all. Wire functions A A[1] B B[1] A[2] replication C C D D Figure 4: An Illustrative Example of Replication 5 B[2] TORUS<3> SQMATMULT X9 PIPELINE<3> overlapping FARM<9> topological reorganization O V E R L A P P I N G n w MMShift ab e c s Figure 5: Topology of Matrix Multiplication Using a Torus increases the changes for reusing a component, resolving possible conflicts. Two operations are defined on units: unification and factorization. Unification allows to unify a collection of units, forming a single unit. Factorization is the inverse of unification, allowing units to be divided into many virtual units. Replication, a third operation applied to units, allows that the network induced by a collection of units to be replicated. All operations assume that units are fully connected. Behavioral and connectivity preserving restrictions are applied, but not formalized here. Connectivity restrictions imply the possibility of to replicate ports whenever it is necessary to adjust topological connectivity after an operation. Figures 3 and 4 present illustrative examples of these operations. 2.1.1 Virtual Units and Skeletons To allow overlapping of components and the support for skeletons, the notion of virtual unit has been introduced. A unit is virtual whenever there is no component associated with it. In other terms, the task performed by a virtual unit is not defined. Components are partially parameterized in its addressed concern by means of placing virtual units in its constitution. A component that comprises at least one virtual unit is called an abstract component, or a partial topological skeleton. These terms are used as synonyms. When a programmer re-use an abstract component for specification of a Hash program, it must to assign components to the virtual units comprising it. Abstract components may not instantiate applications. It is necessary to describe the computation performed by their constituent virtual units. The assignment operation is used allows to associate a component to a virtual unit, making it a non-virtual unit. Also, there is a superseding operation, which allows to take a non-virtual unit for replacing a virtual unit of the topology. The behavioural compatibility restrictions from the non-virtual unit to the replaced virtual unit guarantees that any sequence of communication actions that is 6 ... X9= ... ... ... ... ... P i p e โˆ’ L i n e ... Figure 6: Composing Pipe-Lines to Form a Systolic Mesh valid in the non-virtual unit remains valid in the virtual unit. The superseding operation is a โ€œsyntactic sugarโ€ of HCL, since it may be implemented using unification and assignment. Figure 6 shows how a skeleton describing a systolic mesh of processes, implemented by overlapping a collection of pipe-line skeleton instances. The abstract components PipeLine is used to describe interaction of processes placed at the mesh lines and columns. Each unit in SystolicMesh abstract component is formed by two slices: one described by the unit that comes from the vertical PipeLine component and the other described by the unit that comes from the horizontal one. 2.2 Programming Simple Components Simple components, also called functional modules, are atoms of functionalities in Hash programming. The collection of simple components in a Hash program describes its computation media. Simple components might be programmed virtually in any general purpose language, called host language. For that, it is needed to define which host language constructions correspond to the arguments and return points of the underlying functional module. It is preferred that no extensions to the host language be necessary for this purpose, keeping transparency between coordination and computation media. Simple components may be overlapped when configuring composed components. The goal is to implement a really multi-lingual approach for parallel programming. For that, it has been proposed to use CCA (Common Component Architecture) [2], a recent standard proposed for integrating components written in different languages in a parallel environment. Another possibility is to use heterogeneous implementations of MPI [24, 23], recently proposed, facilitating this task since, in cluster environments, Hash programs are compiled to MPI. Since the translation schema onto Petri nets is defined on top of coordination 7 component CPipeLine <N> with component SqMatMult<N> where iterator i range [1,N] interface ICPipe where ports: i* โ†’ o* protocol: repeat seq{o!; i?} until <o & i> [/ unit pipe[i] where ports: ICPipe /] iterator i, j range [1,N] use Skeletons.Common.{Torus, Farm} use MMShift interface ISqMatMult where ports: j โ†’ r # ITorus protocol: seq {j?; repeat seq {s!;e!;n?;w?} counter N } connect pipe[i]โ†’o to pipe[i+1]โ†i, buffered component Torus <N> with unit mm torus; assign Torus<N> to mm torus unit mm farm; assign Farm<N> to mm farm use Skeletons.Common.CPipeLine iterator i, j range [1,N] interface ITorus where ports: ICPipe @ n โ†’ s # ICPipe @ e โ†’ w protocol: repeat seq {par {s!; w!}; par {n?; e?}} until <n & e & s & w> [/ unit vpipe[i]; assign CPipeLine<N> to vpipe[i] /] [/ unit hpipe[j]; assign CPipeLine<N> to hpipe[j] /] [/ unify farm.worker[i + j ร— N ], torus.node[i][j] to sqmm[i][j] /] where ports: ISqMatMult unify farm.distributor, farm.collector, sqmm[0][0] to sqmm root where ports: () โ†’ ab # c โ†’ () # ISqMatMult @ mm protocol: seq {ab!; c?; do mm } [/ assign MMShift to sqmm[i][j] /] [/ unify vpipe[i].pipe[j], hpile[j].pipe[i] to node[i][j] where ports: ITorus /] module MMShift(main) where component Farm<N> with main :: Num t โ‡’ t โ†’ t โ†’ [t] โ†’ [t] โ†’ ([t],[t],t) main a b as i bs i = (as o,bs o,c) where c = matmult as o bs o (as o, bs o) = (a:as i, b:bs i) unit distributor where ports: () โ†’ job unit worker where ports: job โ†’ result protocol: seq {job?; result!} unit collector where ports: result โ†’ () connect distributor.job to worker.job, synchronous connect worker.result to collector.result, synchronous matmult :: Num t โ‡’ t โ†’ [t] โ†’ [t] โ†’ t matmult [] [] = 0 matmult (a:as) (b:bs) = a*b + matmult as bs replicate N: worker Figure 7: Configuration Code of Matrix Multiplication on a Torus module Tracking(main) where import Track import Tallies import Mcp types main :: User spec info โ†’ [(Particle,Seed)] โ†’ ([[Event]],[Int]) main user info particle list = let eventsโ€™s = map f particle list in (eventsโ€™s, tally bal event lists) where f (particle@( , , , e, ), sd) = (Create source e):(track user info particle [] sd) Figure 8: A Functional Module from MCP-Haskell# 8 <Component> โ†’ component ({u1 :<Unit>, . . ., ui :<unit>}, {c1 :<Channel>, . . .,cj :<Channel>}) <Unit> โ†’ unit (id, {p1 :<Port>, . . ., pk :<Port>}, <Typeu >) <Typeu > โ†’ repetitive | non-repetitive <Behavior> โ†’ protocol ({idsem , . . . , idsem }, <Action>) n 1 <Action> โ†’ | | | | | | | | | skip seq {a1 :<Action>; . . .; ak :<Action>} par {a1 :<Action>; . . .; ak :<Action>} alt {g1 :<Action>; . . .; gk :<Action>} repeat until (<Action>, C) repeat counter (<Action>, N) repeat forever <Action> signal id wait id activate id <Port> โ†’ port (id,<Direction>,<Multiplicity>,<Typep >,nesting f actor) <Multiplicity> โ†’ single | group (<Typeg >, {p1 :<Port>, . . ., pn :<Port>}) <Direction> โ†’ input | output <Typep > โ†’ stream | non-stream <Typeg > โ†’ any | all <Channel> โ†’ connect (idport , idport , <ChanMode>) <ChanMode> โ†’ synchronous | buffered | ready Figure 9: Abstract Hash Configuration Language Syntax media, abstracting from computation media concerns, specific details about programming simple components is not provided in this paper. For illustration, Figure 8 presents an example of functional module from MCP-Haskell# program [9], written in Haskell. 2.3 An Abstract Representation for Hash Components In Figure 2.2, it is defined a simplified syntax for an abstract representation of Hash configurations, named Abstract Hash. The abstract Hash configuration language (AHCL) only captures information strictly relevant to the translation schema onto Petri nets further presented. For example, interface declarations and operations over units, such as unifications, factorizations, replications, and assign operation are not represented in AHCL. It is supposed that these operations are all resolved before translation process. AHCL is not a simplification. Indeed, in the compilation process of Hash configurations, AHCL correspond to the intermediate code generated by the front-end compiler module, which serves as input to all back-end modules. A back-end was developed for generating PNML (Petri Net Markup Language) code from a Hash configuration. The following paragraph describes the structure of AHCL. A component is composed by a set of units (u1 , . . . , ui ) and a set of channels (c1 , . . . , cj ). Units are described by an identifier, a collection of ports (< Port >). A unit can be repetitive or non-repetitive (< Typeu >). The interface of a unit is defined by a collection of ports and a protocol, described by means of an embedded language that specifies valid orders for activation of ports. This language have constructors equivalent to combinators of regular 9 <COMPONENT> unidades repetitivas <UNIT> P2 ... P4 T2 ... P6 P3 T4 <UNIT> P2 ... P4 T2 P5 P3 (P1) PROGRAM_BEGIN <UNIT> T1 P2 ... (P2) PROCESS_STARTED[proc_i] (P3) PROCESS_RESTART_ENABLED[proc_i] P4 (P4) PROCESS_FINISHED[proc_i] (P5) PROGRAM_END_READY ... ~ unidades naoโˆ’repetitivas P1 (P6) PROGRAM_END T3 <UNIT> P2 ... (T1) T.PROCESSES_FORK (T2) T.PROCESS_RESTART[proc_i] P4 (T3) T.PROCESSES_NR_JOIN (T4) T.PROCESSES_ALL_JOIN Figure 10: Translating a Component expressions controlled by balanced semaphores. A port is described by an identifier (id), a direction (< Direction >), a type (stream or non-stream) and a nesting factor. Additionally, port multiplicity specifies if a port is a single port or a group of ports. Notice that a group of port can be of two types: any or all. All port identifiers are assumed to be distinct in an abstract Hash programs. A channel connect two ports and is associated to a mode (synchronous, buffered and ready). Notice that, abstract Hash syntax does not force that these two ports be from opposite directions. This restriction is implicitly assumed. 3 Translating Hash programs into Petri Nets In this section, a schema for translating Hash programs into Petri nets is introduced. In order to make translation schema easier to understand, it is informally described using diagrams. The possibility of making intuitive visual descriptions is an interesting feature of Petri nets. The translation schema is specified inductively in the hierarchy of components at the coordination medium of the Hash program. Thus, simple components are ignored. The overall steps in the translation procedure of a Hash program into an interlaced Petri net are: 1. Translating units: For each unit comprising the component (unit declarations), its interface is used for yielding an interlaced Petri net describing activation order of their interface ports. In Hash configuration language, it is defined by an embedded language, in interface declarations, whose combinators have correspondence to operators of regular expression controlled by semaphores. This formalism was proved to have expressiveness 10 Interface or Interface Class Assignmennt Instantiation interface declaration Unit (nonโˆ’virtual) Virtual Unit unit declaration assign declaration Figure 11: Unit = Interface (by instantiation) + Component (by assignment) equivalence to Petri nets according to formal language theory. If a unit is a cluster (a composed component is assigned to the unit), it is necessary to generate the Petri net that corresponds to the assigned component. Using information about mapping of argument/return points to input/output ports of the unit, it is possible to synchronize behavior of the unit with behavior of the component, in such way that they are compatible; 2. Synchronize units. Now that a Petri net exists for describing communication behavior (traces) of each unit, communication channels (connect declarations) may be used for coordinating synchronized behavior of these Petri nets (units); 3. Synchronize streams. For each port carrying a stream, a Petri net describing a protocol for stream synchronization is overlapped with the Petri net produced in the last step. The semantics of stream communication is described separately because it increases complexity of the generated interlaced Petri net, making computationally hard its analysis. Thus, in Hash programming environment, the programmer may decide not to include stream synchronization protocol. Obviously, information may be lost, but it may not be necessary for some useful analysis. The next sections provide details about the above translation steps. Also, it is discussed how higher-level information encompassed in skeletons may be used to simplify the generated network. 3.1 Modelling Components (ฮฅC ) In Figure 10, the Petri net resulted from application of translation function ฮฅC to the configuration of a component is illustrated. The translation function ฮฅU is applied to each unit comprising the component, generating a Petri net that describes its communication behavior. The resulting Petri nets are connected in order to model parallel execution of units. The places process started[j] and process finished[j], 1 โ‰ค j โ‰ค n, where n is the number of units, correspond to start places and stop places of the Petri nets modelling units, respectively. When a token is placed on process started[j], the unit j is ready to initiate execution, and when a token is placed on process finished[j], the unit j had 11 (T1) GROUP_PREPARE[g] (P2) PORT_COMPLETE[p] (T2) GROUP_COMPLETE[g] ... (P4) GROUP_COMPLETE[g] (T3) PORT_SEND[p] / PORT_RECV[p] ] (P3) GROUP_PREPARED[g] a[n (P1) PORT_PREPARED[p] ] a[2 ] a[1 a ANY ALL Group of Ports P1 T3 P2 T3 P2 T1 T2 P3 P2 P1 T2 P4 ... P4 P2 P1 T3 ... T3 P1 ... P3 <PORT> group any P2 ... T1 P2 P1 port ... T3 P1 T3 ... Individual Port <PORT> group all T3 <PORT> single P1 P2 Figure 12: Translating Unitโ€™s Ports finished. The transitions process restart[k], 1 โ‰ค k โ‰ค r, where r is the number of repetitive units, allows that repetitive units return back to its initial state after finalization. They are introduced in the Petri net generated for each unit. The place program end ready receives a mark when all non-repetitive units terminates. In this case, the tokens in places process restart enabled[k], 1 โ‰ค k โ‰ค r, are removed, preventing repetitive processes execute again. At this state, the program terminates after all repetitive processes also terminate, which causes transition processes all join to be fired and a token to be deposited in program end. 3.2 Modelling Units (ฮฅU ) This section intends to describe how individual units are translated into Petri nets. Firstly, Figure 12 presents interlaced Petri nets that model the activation of the ports of the interface of a unit. A mark in place port prepared[p] indicates that the port p is prepared for communication. The firing of transition port send[p]/port recv[p] models communication, causing the deposit of a mark in place port complete[p] for indicating that communication has been completed on port p. It is possible that two ports be active at the same time. In groups of ports, the places group prepare[g] and group complete[g] are connected to places port prepared[p] and port complete[p] of each port p belonging to the group g that model local preparation and completion of communication in ports belonging to the group, according to their semantics: any or all. In groups of ports of kind all, all individual ports are activated in consequence of activation of the group. In groups of ports of kind any, only one port is chosen among the ports that are ready for communication completion. For obeying this semantic restriction, the firing of a transition port send[p]/port recv[p] of a port p in group g of kind any causes removal of the marks in places port prepared[pโ€ฒ ], for all places pโ€ฒ belonging to g, in 12 <ACTION> skip p Figure 13: Translating โ€œNull Actionโ€ such a way that all ports p, such that p 6= p, cannot complete communication (firing of transition port send[p]/port recv[p]). The order in which marks are placed in places port prepared[p], for any p, is controlled by an interlaced Petri net that models the protocol of the unit. The following sections discusses how primitive actions and action combinators of behavior expressions are translated into Petri nets. The primitive actions are: skip (null action), wait (increment semaphore primitive), signal (decrement semaphore primitive), ? (activation of input port), and ! (activation of output ports). The combinators of actions are: seq (sequential actions), par (concurrent actions), alt (non-deterministic choice among n actions), and if (conditional choice between two actions). 3.2.1 Null Action (skip) The skip combinator have no communication effect. Because that, it is known as the โ€œnull actionโ€. Only one place is needed, where it is both start and stop place (Figure 13) of the interlaced Petri net generated. 3.2.2 Sequencing (seq) The seq combinator describes a total ordering for execution of a set of actions (sequential execution), represented by a1 , a2 , . . . , an . It may be modelled by sequential composition of the Petri nets induced for each action (Figure 14). 3.2.3 Concurrency (par) The par combinator describes a concurrent (interleaving) execution of a set of actions, represented by a1 , a2 , . . . , an . It may be modelled by parallel composi<ACTION> seq <ACTION> T1 <ACTION> T1 T1 (T1) SEQ_NEXT_ACTION[seq_label, i] Figure 14: Sequence of Actions 13 <ACTION> <ACTION> par (P1) PAR_BEGIN[par_label] <ACTION> (P2) PAR_END[par_label] T1 T2 <ACTION> P1 P2 <ACTION> (T1) PAR_FORK_ACTIONS[par_label] (T2) PAR_JOIN_ACTIONS[par_label] Figure 15: Interleaving (Concurrency) Among Actions tion of the Petri nets induced by each action (Figure 15). 3.2.4 Non-Deterministic Choice (alt) The alt combinator describes a conceptually non-deterministic choice among a set of actions, represented by a1 , a2 , . . . , an . It may be modelled by composing the Petri nets induced for each action using a conflict in place alt begin[alt label], its start place (Figure 16). The firing of transitions alt select branch[alt label, i], 1 โ‰ค i โ‰ค n, models the choice. 3.2.5 Streams and Conditions for Checking Stream Termination The two combinators modelled in the next sections, repeat and if, requires testing a condition in order to choose the next action to be performed. The condition is defined by a logical predicate in its disjunctive normal form (DNF). <ACTION> alt <ACTION> T2 T1 (P1) ALT_BEGIN[alt_label] <ACTION> P2 P1 T2 ... T1 (P2) ALT_END[alt_label] (T1) ALT_SELECT_BRANCH[alt_label,i] (T2) ALT_END_ACTION[alt_label,i] <ACTION> T1 T2 Figure 16: Choice Among Actions 14 Logical variables are references to ports that carry streams. This section attempts to formalize the notion of streams in the Hash component model and valuation of logical variables of termination-test conditions of streams. A stream is defined as a sequence of semantically related data items, terminated with a special mark, that is transmitted through a channel. By making an analogy with conventional message passing programming using MPI, a trivial example of stream is a sequence of data items transmitted in calls to a specific occurrence of MPI Send primitive in the context of an iteration. At each iteration, an item of the stream is transmitted. The termination of the iteration is modelled, in the Hash program, by the end mark carried by the stream. Communication on channels that carry streams may be implemented using persistent communication objects in the underlying messaging passing library, which may reduce communication overhead. Hash streams may be nested. Streams of streams, at any nesting depth may (1,d) be defined. A stream Sx , where d is the nesting factor of the stream and x is a positive integer that indicates the order of a nested stream in a stream, may be defined as following:  (i,d) Sx (i+1,d) = hS1 VALUE (i+1,d) , S2 (i+1,d) , . . . , Sn , EOS[i]i, n โ‰ฅ 0 , if i < d , if i = d (1) where VALUE is a data item and EOS[i] is a termination value at nesting level i. Notice that termination values should carry an integer indicating the nesting level of the stream being terminated. The feature of nested streams appeared in consequence of design of Haskell# . Streams at coordination level must be associated to lazy lists in computation media 1 . The experience with Haskell# programming have shown that laziness of Haskell nested lists may be useful in some applications. This feature is analogous to communication operations that occurs in context of nested iterations in MPI parallel programming. In Hash configuration language, streams are declared by placing โ€œ*โ€ symbols after the identifier of a port in the declaration of interfaces. The number of โ€œ*โ€โ€™s indicates the nesting factor of the stream carried by the port. Only ports carrying streams of the same nesting levels may be connected through a channel. It is defined that a port that transmit a single value (non-streamed) have nesting level zero. Now that the notion of streams is defined, it is possible to define the syntax and semantics of predicates for testing synchronized termination of streams, a necessary feature for combinators if and repeat. This kind of predicate will be referred as stream predicate. Syntactically, a stream predicate is a logical predicate in its disjunctive normal form. The logical operators supported are โ€œ&โ€, the logical and, and โ€œ|โ€, the logical or. Disjunctions may be enclosed by โ€œhโ€ and โ€œiโ€ delimiters. Logical variables are references to interface ports of a unit. The formal syntax of stream predicates is shown below: 1 In Haskell# , simple components are functional modules written in Haskell 15 stream predicate โ†’ sync conjunction 1 โ€˜|โ€™ . . . โ€˜|โ€™ sync conjunction n (n โ‰ฅ 1) sync conjunction โ†’ โ€˜hโ€™ simple conjunction โ€˜iโ€™ | simple conjunction simple conjunction โ†’ port id | ( port id1 โ€˜&โ€™ . . . โ€˜&โ€™ port idn ) (n โ‰ฅ 1) Let d be the depth of nesting of an occurrence R of a repeat or if combinator in relation to an outermost occurrence, if it exists (d = 0, if it does not exists). Only port carrying streams with nesting factor equal or less than d can appear in the termination condition of R. It is now possible to define semantics of stream predicates, by defining how values of logical variables may be inferred in execution of units. For instance, let p be a port carrying stream S (1,n) . Its value is false whenever a data value (VALUE) or an ending value at nesting level i (EOS[i]), such that i < d, was transmitted (sent or received) in its last activation. Otherwise, it is true. The value of the stream predicate may evaluate to true, false or fail. A value true is obtained by evaluating the stream predicate ignoring semantics of angle brackets delimiters. A fail is obtained if negation of some conjunction enclosed in angle brackets evaluates to true, assuming the following identity that defines angle brackets semantics: ยฌha(k,r) โˆง a(k,r+1) โˆง . . . โˆง a(k,s) i = ยฌa(k,r) โˆง ยฌa(k,r+1) โˆง . . . โˆง ยฌa(k,s) (2) If stream predicate evaluates neither to true or error, the value of the stream predicate is false. Angle brackets delimiters are used for ensuring synchronization of the nature of values transmitted by streams, whenever necessary. In order to make possible to model test of stream predicates with Petri nets, it is firstly necessary to model stream communication by using this formalism. Particularly, it is necessary to introduce, in the Petri net of the Hash program, places that can remember the kind of value transmitted in the last activation of ports that carry streams. In a Hash program, for each port s that carries a stream with nesting factor n, there are two sets of n + 1 places, here referred as Stream Flags(s) and Stream Flags(s): Stream Flags(s) = {stream port flag[s, k] | 0 โ‰ค k โ‰ค n} Stream Flags(s) = {stream port flag dual[s, k] | 0 โ‰ค k โ‰ค n} For some stream port s, the places in set Stream Flags(s) form a split binary semaphore: X M (p) = 1 pโˆˆStream Flags(s) Also, they are mutually exclusive with its corresponding places in Stream Flags(s): โˆ€k : 0 โ‰ค k โ‰ค n : M (stream port flag[s, k]) + M (stream port flag dual[s, k]) = 1 For a port s carrying a stream with nesting factor n, the places Stream Flags(s) and Stream Flags(s) are used to remember which kind of value was transmitted in the last activation of s. There are n + 1 possibilities: 16 P10 ... T5 ... P5 P10 P10 T7 P10 P10 T7 ... ... T5 P10 ... P10 ... P10 (P1) RU_CHECKING_CONDITIONS[r] (P2) RU_CHECKING_CONDITION_L[r] (P3) RU_CHECKING_CONDITION_T[r] (P4) RU_CHECKING_CONDITION_F[r] (P5) RU_SATISFIED_CONDITION_L[r] (P6) RU_SATISFIED_CONDITION_T[r] (P7) RU_SATISFIED_CONDITION_F[r] (P8) RU_TERMINATED (P9) RU_FAILED (P10) STREAM_PORT_FLAG[p,i] P2 P7 P4 T4 P9 <ACTION> repeat ... until T3 <ACTION> P8 P1 T1 T2 P3 P10 T6 P10 ... T6 ... P10 P6 ... (T1) RU_CHECK_CONDITION[r] (T2) RU_TERMINATE[r] (T3) RU_FAIL[r] (T4) RU_LOOP[r] (T5) RU_SATISFY_CONJUNCTION_L[r,i] (T6) RU_SATISFY_CONJUNCTION_T[r,i] (T7) RU_SATISFY_CONJUNCTION_F[r,i] P10 Figure 17: Stream Controlled Repetition โ€ข An ending marker at nesting level i (EOS[i]), for 0 โ‰ค i โ‰ค n โˆ’ 1; โ€ข A data value. The places stream port flag[s,k], such that 0 โ‰ค k โ‰ค n โˆ’ 1, are respectively associated to ending marks EOS[k] of a port s carrying a stream with nesting factor n. The place stream port flag[s,n] is associated to a data value. Assuming the restrictions above, if there is a mark on the stream port flag[s,k] place, then a value of its corresponding kind was transmitted in the last activation of the port. All the above restrictions are guaranteed by the Petri net protocol for synchronization of streams introduced further, in Section 3.4. The next two sections present respectively how to model repeat and if combinators, assuming the existence of sets of places Stream Flags(s) and Stream Flags(s). 3.2.6 Repetition Controlled by Stream Predicates The repeat combinator is used to model repeated execution of an action. The termination condition may be provided in a until or a counter clause. The later will be introduced in the next section. The former uses a stream predicate for testing termination of a repetition after each iteration. In the Petri net modelling of repeat combinator with until clause, it is assumed existence of the sub-network modelling stream communication introduced in Section 3.2.5. In Figure 17, it is illustrated the Petri net resulted from translation of repeat combinator with an until clause to check termination. The conflict in place ru checking conditions models the decision on to terminate or not the 17 <ACTION> repeat ... counter T1 P2 (P1) RC_ENTERING[r] (P2) RC_REMAINING[r] (P3) RC_PREPARED[r] (P4) RC_PERFORMED[r] (P5) RC_EXITING[r] T2 n P1 P3 <ACTION> (T1) RC_ENTER[r] (T2) RC_START_ACTION[r] (T3) RC_FINISH_ACTION[r] (T4) RC_EXIT[r] P5 T4 n T3 P4 Figure 18: Repeated Action by a Fixed Number of Times <ACTION> repeat ... forever <ACTION> RI_REPEAT[r] Figure 19: Infinite Repetition (repeat) 18 P11 ... T7 ... P5 P11 P11 T6 P11 P11 P8 <ACTION> if ... then ... else ... T6 ... ... T7 P11 ... P10 P11 ... P11 P7 P4 T3 <ACTION> then T2 P9 P1 <ACTION> else P2 T1 T4 P6 P11 T5 P11 ... T5 ... P11 P3 ... (P1) IF_STARTED[r] (P2) IF_CHECKING_CONDITIONS[r] (P3) IF_CHECKING_CONDITION_E[r] (P4) IF_CHECKING_CONDITION_T[r] (P5) IF_CHECKING_CONDITION_F[r] (P6) IF_SATISFIED_CONDITION_E[r] (P7) IF_SATISFIED_CONDITION_T[r] (P8) IF_SATISFIED_CONDITION_F[r] (P9) IF_TERMINATED (P10) IF_FAILED (P11) STREAM_PORT_FLAG[p,i] P11 (T1) IF_CHECK_CONDITION[r] (T2) IF_THEN[r] (T3) IF_FAIL[r] (T4) IF_ELSE[r] (T5) IF_SATISFY_CONJUNCTION_E[r,i] (T6) IF_SATISFY_CONJUNCTION_T[r,i] (T7) IF_SATISFY_CONJUNCTION_F[r,i] Figure 20: Conditional iteration. Values of logical variables corresponding to ports in the stream predicate are tested using their respective Stream Flags(s) and Stream Flags(s) places. The arrangement of places and transitions in Figure 17 allows for testing the value of stream predicates at each iteration. The mutual exclusive firing of transitions ru terminate, ru fail and ru loop correspond, respectively, to values true (execute one more iteration), false (termination) and error (abort the program) for the stream predicate. 3.2.7 Bounded Repetition The combinator repeat with termination condition defined by a counter clause models repeated execution of an action by a fixed number of times. Its translation into Petri nets is illustrated in Figure 18. For a certain fixed bounded repetition r, the weight of arcs (rc enter[r], rc remaining[r]) and (rc performed[r], rc exit[r]) (n) define the number of repetitions of < ACT ION >. 3.2.8 Infinite Repetition Whenever no termination condition is defined for a given occurrence of the repeat combinator, the given action is repeated infinitely. The Petri net that models this kind of repeat combinator is illustrated in Figure 19. 3.2.9 Conditional Choice (if ) The if combinator describes a conditional choice between to two actions. Its translation into Petri nets is illustrated in Figure 20. The reader may notice 19 (P4) SEM_WAIT_BEGIN (P1) SEM_SIGNAL_BEGIN <ACTION> signal (P2) SEM_SIGNAL_END (P5) SEM_WAIT_END P3 P3 (T2) SEM_WAIT (T1) SEM_SIGNAL <ACTION> wait (P3) SEM_COUNTER P1 P2 P5 P4 T1 T2 Figure 21: signal (left) and wait (right) Semaphore Primitives the analogy between the construction of the Petri net in this diagram with the Petri net generated for the repeat ... until combinator, mainly concerning the test of the stream predicate. 3.2.10 Semaphore Primitives The wait and signal (balanced counter) semaphore primitives and the par combinator make behavior expressions comparable to labelled Petri nets in descriptive power [18]. In absence of semaphore primitives, only regular patterns of unit behavior could be described. The semantic of semaphore primitives is now defined using the notation introduced in [1] for concurrent synchronization: wait(s): <await s > 0 โ†’ s := s โˆ’ 1> signal(s): < s := s + 1 > The angle brackets model mutual exclusion (atomic actions in concurrent processes), while the await statement models condition synchronization. The wait primitive causes a process to delay until the value of the semaphore s is greater than zero in order to decrement its value. Thus, the value of a semaphore is greater than zero in any instant of execution of a unit. In concurrent systems where synchronization is controlled by balanced counter semaphores, like in behavior expressions here defined, the value of a semaphore must be the same at the initial and final states of the system. The signal and wait primitives are modelled using Petri nets as described in Figure 21. Given a semaphore s, the number of marks in place sem counter[s] models the semaphore value at a given state. 3.2.11 Port Activation The Hash primitive actions ! and ? models respectively send and receive primitives in message passing programming. In Hash programs, they cause activation of groups of ports and individual ports that are not member of any group. In Section 3.2, the Petri net slice that model individual ports and groups of ports is illustrated in Figure 12. An individual port p is prepared for communication whenever a mark is deposited in place port prepared[p]. A group of ports 20 of kind all is prepared whenever all of its ports are prepared, while a group of kind any is prepared whenever any of its ports are prepared. The communication is completed whenever a place is deposited in place port complete[p] or group complete[p]. The activation a of a port p is defined as the time between preparation of a port and completion of communication. The format of Petri net slices induced by translation of occurrences of primitives ! and ? is illustrated in Figure 22. The firing of transition activate start[a] prepares port p for communication and firing of transition activate stop[a] occurs whenever the port completes communication. Notice that whenever a mark is deposited in place activate on[p], the port p is active. 3.3 Communication between Units In the translation of a component, the Petri net slices resulted from translation of their units form an interlaced Petri net that models their asynchronous execution. Information regarding synchronization of units, by means of communication channels, is not yet included. In Figure 23, Petri net slices that model, respectively, the three kinds of channels that may occur in a Hash program (synchronous, buffered and ready) are presented. The translation function ฮฅL is applied to each communication channel in a component, generating Petri net slices according to the translation schema illustrated in Figure 23. These Petri net slices are overlapped with the Petri net slices that models behavior of units in order to model synchronous execution of the units. For synchronous channels, communication pairs must be active at the same time for communication to complete. For implementing that, it is only necessary to unify the respective transitions modelling completion of communication from the respective pairs. For buffered channels (bounded buffers), the sender does not need to wait completion of communication operation for resuming execution. For that, whenever the sender port s in a channel c is activated, transition port send[s] must be activated if there is a mark in <ACTION> activate PORT_PREPARED[port] PORT_COMPLETE[port] T2 T1 P3 P2 P1 (P1) ACTIVATE_ENTERING[a] (P2) ACTIVATE_ON[a] (P3)ACTIVATE_EXITING[a] from translation of ports (T1) ACTIVATE_START[a] (T2) ACTIVATE_FINISH[a] Figure 22: Activation of Ports 21 S <CHAN NEL> P1 P2 P1 <CHAN NEL> P1 P2 T3 T1 #n P1 P2 P1 P5 #1 P4 P2 (P1) PORT_PREPARED[p] (P2) PORT_COMPLETE[p] T3/T6 T5 P1 P2 <mode> = ready <mode> = buffered n <mode> = synchronous (P5) CHAN_READY_IS_OPEN[c] (P3) CHAN_BUFFER_FREE[c] (T3) CHAN_SYNCHRONIZE[c] (T1) PORT_SEND[p] (T2) PORT_RECV[p] P3 P2 T4 T2 T2 P2 P1 T1 connect a.o to b.i <mode> P1 <CHAN NEL> P2 (P4) CHAN_BUFFER_USED[c] T3 = fusion of T1 and T2 (T4) CHAN_READY_SENDER_CLOSE[c] (T5) CHAN_READY_RECEIVER_TRY_ENTER[c] (T6) CHAN_READY_SENDER_OPEN[c] from translation of ports Figure 23: Modelling Communication Channels place chan buffer free[c], which models the number of empty slots in the buffer. The place chan buffer used[c], which receives a mark after activation of port send[s], models the number of used slots in the buffer. Notice that the sender blocks whenever there is no empty slots in the buffer. Channels supporting ready mode require a more complex protocol. The place chan ready is open[c] ensures that communication proceeds only if activation of the sender port precedes activation of the receiver. Notice that whenever receiver is activated before sender, the sender cannot proceed, causing a deadlock that may be detected by a Petri net verification tool. Using this approach, it is possible to verify, for example, if a certain parallel program using ready channels may fail in some program state during execution. Ready communication mode may improve communication performance of MPI programs, but unfortunately it is hard to ensure that communication semantics is safe in arbitrary parallel programs. The modelling of communication semantics with Petri nets may overcome these difficulties for debugging. 3.4 Synchronization of Streams Protocol In Section 3.2.5, it was introduced two sets of places that must exist for each stream port s: Stream Flags(s) and Stream Flags(s). Additionally, restrictions were introduced for their markings. They allow to check the kind of the transmitted value in the last activation of the port, making possible to check stream termination conditions that occurs in repeat and if combinators. This section presents a protocol for updating marking of places Stream Flags(s) and Stream Flags(s) in such a way that restrictions introduced in Section 3.2.5 are obeyed. In Figure 24, it is illustrated how the network presented in Figure 22 (activation of ports) may be enriched in order to introduce a protocol for updating places in Stream Flags(s) and Stream Flags(s), for an arbitrary stream port s with nesting factor n. The Petri net slice introduced have the transitions sp clear flag[s,i] e sp set flag[s,i], for 0 โ‰ค i โ‰ค n as its main components. They are arranged in such a way that transitions inside the sets are mutually ex- 22 P6โ€™s Output Port/Group of Ports P6โ€™s Input Port/Group of Ports #1 ... ... #1 T2โ€™s T4โ€™s #1 T2โ€™s T5 T3 P2 P3 P4 P5 ... ... P3 P2 T4โ€™s #1 T5 T3 P4 P5 ... ... ... ... #1 #1 ... ... P7โ€™s P7โ€™s The receiver may decide which value has been received only after completion of communication Before the activation, the sender may decide which kind of value is going to be transmitted (P2) SP_CLEARING_FLAGS[s] (P3) SP_CLEARED_FLAGS[s] (P4) SP_SETTING_FLAGS[s] (P5) SP_EXITING[s] (P6) STREAM_PORT_FLAG[s,i] (P7) STREAM_PORT_FLAG_DUAL[s,i] (T2) SP_CLEAR_FLAG[s,i] (T3) SP_START_SET_FLAGS[s] (T4) SP_SET_FLAG[s,i] (T5) SP_PREPARE_PORT[s] Figure 24: Activation of Stream Ports clusive. The firing of a transition in sp clear flag[s,i] clears the set of places Stream Flags(s), by moving the mark in the corresponding cleared place to the corresponding place in set Stream Flags(s). After that, all places in Stream Flags(s) have exactly one mark, while all places in Stream Flags(s) have zero mark. In sequence, one transition of set sp set flag[s,i] is fired causing the moving of a mark from one of the places in Stream Flags(s), chosen non-deterministically, to the corresponding place in Stream Flags(s). This sequence of actions models the test of the kind of the value transmitted in the current activation of the port. Notice that the moment of the choice is different for input and output ports. An input port only updates its Stream Flags(s) after communication has been completed. This is in accordance with implementation semantics, once only after receiving the value, the receiver may check the kind of the transmitted value. 3.4.1 Ensuring Consistency of Communication Channel communication semantics imposes that the kind of value transmitted by the sender in a given activation of a stream port is the same as the kind of the value that the receiver receives in the corresponding activation. In Figure 25, it is shown how this restriction is ensured for channels with synchronous and ready mode of communication. For the following description, consider that individual ports are groups containing only one port. Thus, consider a channel c connecting a sender stream port s and a receiver stream port r, both with nesting factor n. The groups where s and r are contained are respectively gs and gr . For each i, 0 โ‰ค i โ‰ค n, it is necessary to create an arc that links the place stream port flag[gs ,i] to the transition sp set flag[gr ,i], in such way that consistency of Stream Flags(s) and Stream Flags(r) is forced after com- 23 #1 ... #1 ... ... ... ... #1 Sender Side ... #1 ... Receiver Side #1 ... ... ... ... Synchronous/Ready Channel #1 ... The kind of the received value must be the same kind of the sent value Figure 25: Ensuring the Consistency of Streams Connected through Synchronous Channels munication completion. If two different senders, connected to ports belonging to a group gr of kind all, decide to transmit values of different nesting levels in a give activation of gr , a deadlock occurs. But it was possible to introduce a Petri net slice for detecting this event. Bounded buffered communication imposes a more complicated approach, illustrated in Figure 26. Consider that channel c have a buffer of size b. For each buffer slot k, 0 โ‰ค k โ‰ค b โˆ’ 1, in a channel connecting ports with nesting factor n, there is a set of places buf slot flag[c,k,i], for 0 โ‰ค i โ‰ค n. They remember the kind of value stored in a buffer slot k, after communication in a channel c. Essentially, after firing transition sp set flag[gs ,i], the marking of stream port flag[gs ,i] at the moment of the activation of the group gs is saved in buf slot flag[c,k,i], where k is the number of the next available buffer slot. If all slots are filled, the sender blocks until a slot is freed by the receiver. If gr is a group of kind all (notice that all groups with one port is of kind all), an arc from each place buf slot flag[c,0,i] to transition sp set flag[gr ,i] ensures that the marking of Stream Flags(r) reflects the kind of the oldest value placed in the buffer by the sender, as semantics of buffered communication imposes. If gr is a group of kind any, it is necessary to introduce the Petri net slice shown in Figure 27. It ensures to copy the marking of the places buf slot flag[c,0,i] of the chosen receiver port r in gr . For that, the mutually exclusive places any group port activated[r], for each r belonging to gr , remember which port of gr was chosen. They enable the appropriate set of transitions any group copy flag[r], which are connected to places buf slot flag[c,0,i] of the channel where the chosen port is connected. The marking of this set of places is copied to places any group copied flag[r,i], which are connected to transitions sp set flag[gr , i]. 24 #1 ... #1 ... ... ... ... #1 Sender Side P1 ... T1 P3 #1 T3โ€™s 2 1 ... 2 1 nโˆ’1 n ... P6 P5 P5 P6 P6 ... 2 ... 2 nโˆ’1 P5 ... ... 2 P5 2 P5 ... ... 2 P5 P5 T3โ€™s T3โ€™s 2 P5 ... 2 ... P5 Buffered Channel #n P2 P4 (T1) BUF_SLOTS_UNLOCK[c] (T2) BUF_SLOT_SELECT[c,s] (T3) BUF_SLOT_FLAG_SET[c,s,i] (T4) BUF_SLOT_SHIFT_FLAG[c,s,i] (T5) BUF_SLOTS_START_SHIFT[c] (T6) BUF_SLOTS_FINISH_SHIFT[c] T2โ€™s 2 Buffer Management (P1) BUF_SLOTS_LOCKED[c] (P2) BUF_SLOTS_UNLOCKED[c] (P3) BUF_SLOT_READY_UPDATE[c] (P4) BUF_SLOT_UPDATED[c] (P5) BUF_SLOT_FLAG[c,s,i] (P6) BUF_SLOT_EMPTY[c,s] (P7) BUF_SLOT_READY_SHIFT[c,s] (P8) BUF_SLOTS_SHIFTED[c] (P9) BUF_SLOTS_SHIFTING[c,s] Receiver Side T4โ€™s T4โ€™s P7 ... #1 P7 P7 ... P8 #1 ... ... ... ... P9 T6 T5 #1 ... The kind of the received value must be the same kind of the oldest sent value Figure 26: Ensuring Consistency Streams Connected through Buffered Channels P3โ€™s Activation of Groups of Ports of Kind Any ... T3 ... P1 T3 P3โ€™s P2 T3 ... P1 ... T3 P3โ€™s T1 (P1) ANY_GROUP_PORT_ACTIVATED[p] (P2) ANY_GROUP_COPIED_FLAG[g,i] (P3) BUF_SLOT_FLAG[p,0,i] ... ... T2 P2 T2 T2 P2 T3 T3 P1 ... (T1) PORT_SEND[p] / PORT_RECV[p] (T2) SP_SET_FLAG[g,i] (T3) ANY_GROUP_COPY_FLAG[p,i] ... T1 ... ... T1 T3 ... ... ... ... ... ... T3 T3 Figure 27: Copying Protocol for Groups of Input Ports of Kind any 25 The arrangement of the places buf slots locked[c] and buf slots unlocked[c] and the transition buf slots unlock[c] avoids accesses to the buffer while it is being updated after a transmission. The firing of a transition buf slot select[c,k] means the selection of the next empty slot. Whenever the buffer is full (n marks are deposited in place chan buffer used[c]), the sender must block for waiting that the receiver consume the contents of the first slot entry. After copying the kind of the value in the first slot of the buffer, it is discarded. For that, a shift operation, that occurs while a mark is deposited in place buf slots shifting[c], allows to save the marking of places buf slot flag[c,k,i] to buf slot flag[c,k โˆ’ 1,i], for 1 โ‰ค k โ‰ค n. 3.4.2 Ensuring Consistency of Order of Kind of Transmitted Values The following example illustrates the needs for imposing one more restriction in the Petri net slice of the stream control protocol. For instance, consider a nested Haskell list of Intโ€™s with nesting factor 4. [[[[1],[5,6]],[[2,3]]],[],[[[[4,5,7],[8,9]]],[[6],[7,9]]]] The correspondent stream in the Hash component model will transmit the following values at each activation of the corresponding port: {1,Eos 3, 5, 6,Eos 3,Eos 1, 2, 3,Eos 3,Eos 2,Eos 1,Eos 1, 4, 5, 7, Eos 3, 8, 9,Eos 3,Eos 2,Eos 1, 6,Eos 3, 7, 9,Eos 3,Eos 2,Eos 1,Eos 0} Notice that after transmitting a value Eos 2, it is not possible to transmit a value Eos 0, since the enclosing stream at nesting level 1 was not finalized yet. In this case, only values Eos 1, Eos 2, Eos 3 and a data item may be transmitted. Now, consider the general case for the transmission of given end marker at nesting level k. If k โ‰ฅ 1, the next value to be transmitted may be any of the end markers at nesting level greater than k โˆ’ 1 or a data item. If k = 0, the stream is finalized. Any attempt to read a value in a finalized stream is considered an error. In Figure 28, it is shown how the Petri net slice presented in Figure 24 (output port) may be enriched in order to support the restriction stated in the last paragraph. A mark is placed in place sp order fail[s] whenever an attempt to activate a finalized stream port s (the kind of last transmitted value is Eos 0) occurs. For each nesting level i, four places and two transitions controls the consistency of the order of the transmitted value. The place sp flag open[s,i] receives a value whenever a value Eos i may be sent. Its mutually exclusive dual place, named sp flag open dual[s,i] allows for resetting the marking of sp flag open[s,i] after activation. Resetting procedure is implemented using the next elements described here. The place sp cleaning flag[s,i] has a mark whenever the resetting procedure is enabled for the port s in nesting level i. Its corresponding place sp cleaned flag[s,i] has a mark after resetting procedure finishes. The transition sp clean[s,i] resets the place sp flag open[s,i] 26 P5 T3โ€™s (P1) SP_FLAG_OPEN[s,i] (P2) SP_FLAG_OPEN_DUAL[s,i] (P3) SP_CLEANING_FLAG[s,i] (P4) SP_CLEANED_FLAG[s,i] (P5) SP_FAIL T1 P3 P1 P2 P4 ... T2 T1 P3 P1 (T1) SP_CLEAN[s,i] (T2) SP_KEEP_CLEANED[s,i] P2 T2 P4 ... ... ... (T3) SP_CLEAR_FLAG[s,i] (T4) SP_SET_FLAG[s,i] (T5) SP_PREPARE_PORT[s] T1 P3 ... P1 P2 From Stream Output Port T2 P4 T4โ€™s Figure 28: Consistency of the Order of Kind of Transmitted Stream Values to its original state (zero marks), while transition sp keep cleaned[s,i] fires whenever the place sp flag open[s,i] is already cleaned. Notice that the transitions sp keep cleaned[s,i] and sp clean[s,i] are mutual exclusive, since sp flag open[s,i] and sp flag open dual[s,i] are too. 3.5 The Complexity of the Generated Petri Net After overlapping the Petri net slice that models stream communication semantics, allowing to make precise analysis about behavior of Hash programs at coordination level, the Petri net of simple Hash programs may become very large. Large Petri nets may turn impossible for programmers the analysis without help of some automatic or higher level means. Also, it makes hard and memory consuming the computations performed by the underlying Petri net tools, such as computation of reachability and coverability graphs, place and transition invariants, etc. These difficulties comes from transitory technological limitations, since processing power and memory amount of machines have increased rapidly in the recent years and it is expected that they will continue to increase in the next decades. Also, it is possible to use parallel techniques to perform high computing demanding analysis, but this approach has been exploited by few designers of Petri net tools. It is a reasonable assumption that parallel programmers have access to some parallel computer. Despite these facts, it is desirable to provide ways for helping programmers to work with large Petri nets or simplifying the generated Petri net. The following techniques have been proposed: โ€ข During the process of analysis, the programmer may decide not to augment the Petri net of the Hash program with the protocol for modelling stream communication. This approach makes sense whenever the infor27 T5 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. component IS<problem class, num procs, max key log2, num buckets log2, total keys log2, max iterations, max procs, test array size> with #define PARAMETERS (IS Params problem class num procs max key log2 num buckets log2 total keys log2 max iterations max procs test array size) iterator i range [1, num procs] use Skeletons.{Misc.RShift, Collective.{AllReduce, AllToAllv}} use IS FM โˆ’โˆ’ IS Functional Module unit bs comm assign AllReduce<num procs, MPI SUM, MPI INTEGER> to bs comm unit kb comm assign AllToAllv<num procs> to kb comm unit k shift assign RShift<num procs> 0 โ†’ to k shift interface IIS (bs*, kb*, k) โ†’ (bs*, kb*, k) where: bs@IAllReduce (UArray Int Int) # kb@IAllToAllv (Int, Ptr Int) # k@RShift Int behaviour: seq {repeat seq {do bs; do kb} until <bs & kb>; do k} [/ unify bs comm.p[i] # bs, kb comm.p[i] # kb, k comm.p[i] # k to is peer[i] # IIS assign IS FM (PARAMETERS, bs, kb, k) โ†’ (bs, kb, k) to is peer[i] # bs # kb # k /] Figure 29: The Configuration Code of IS Program mation provided by the protocol is not always necessary for the analysis being conducted. This is the reason for the separation of the stream communication protocol from the rest of the Petri net in the Hash program; โ€ข Another approach that have been proposed, but for further works, is to build higher level environments for analysis of Hash programs on top of Petri net tools. Instead of programmers to manipulate Petri net components, they manipulate Hash program elements of abstraction. Then, the analysis are transparently and automatically translated into proving sequences using INA tool; โ€ข Specific translation schemas for skeletons might be specified in order to simplify the generated Petri net. This approach is illustrated in the next section. For instance, it is defined how higher-level information provided by the use of collective communication skeletons might be used in the translation process of Hash programs into Petri nets. 3.6 Modelling Collective Communication Skeletons Message passing libraries, such as MPI, support special primitives for collective communication. In Hash programming environment, it is defined a library of skeletons that implement the pattern of communication involved in collective communication operations supported by MPI. They are: Bcast, Scatter, Scatterv, Reduce Scatter, Scan, Gather, Gatherv, Reduce, AllGather, AllGatherv, AllToAll, AllToAllv, and AllReduce. In the next paragraphs, the use of collective communication skeletons is illustrated by means of an example. In Figure 29, the code for the Hash version of IS program, from NPB (NAS Parallel Benchmarks) [3] is presented. IS is a parallel implementation of the bucket sort algorithm, originally written in C/MPI. In this section, IS is used to 28 collective port (a) T1 P1 (b) P1 join transitions P2 P2 T1 P2 P1 T1 ... ... T1 P1 ... P2 ... P1 P1 P2 P2 protocol for modelling stream communication semantics (P3) SP_CLEARING_FLAGS[d] (P4) SP_CLEARED_FLAGS[d] (P5) SP_SETTING_FLAGS[d] (P6) SP_EXITING[d] (P7) STREAM_PORT_FLAG[d,i] (P8) STREAM_PORT_FLAG_DUAL[d,i] P8โ€™s (c) (P1) COLLECTIVE_PREPARED[d] (P2) COLLECTIVE_COMPLETE[d] #1 ... (T1) COLLECTIVE_JOIN[d] (T2) COLLECTIVE_UNJOIN[d] #1 P1 T1 P1 P5 P2 P6 T2 ... ... ... ... P1 T4 P4 P3 P2 T5โ€™s T3โ€™s P2 #1 ... P7โ€™s shared among all collective ports (T3) SP_CLEAR_FLAG[d,i] (T4) SP_START_SET_FLAG[d,i] (T5) SP_SET_FLAG[d,i] Figure 30: Modelling Collective Communication Skeleton Semantics illustrate the use of collective communication skeletons in a Hash program, motivating definition of a specific strategy for translating collective communication patterns of interaction among units in a Hash program. In the line 9 of Figure 29, it is declared that skeletons2 AllReduce and AllToAllv will be used in the configuration. In lines 12, 13, and 14, three units are declared, named bs comm, kb comm and k shift. The first two have collective communication skeletons assigned to them, respectively AllReduce and AllToAllv. Since skeletons are composed components, these units are clusters of units that interact using the collective communication patterns described by the skeleton. In line 20, the unification of correspondent units that comprise clusters bs comm, kb comm and k shift forms the units that comprise the IS topology. The unification of virtual units from distinct cluster allows to overlap skeletons. The behavior of the virtual units that result from unification, 2 Partial topological skeletons are composed components where at least one unit is virtual. In the case of collective communication skeletons, all units are virtual. 29 named is peer[i], 1 โ‰ค i โ‰ค num procs, is specified by interface IIS. The simple component IS FM is assigned to them for defining the computation of each process in the IS program. Notice that IS is a SPMD program, where the task performed by all processes is defined by the same simple component [7]. The interface IIS is declared from composition of IAllReduce, IAllToAllv and IRShift interfaces, the interface slices of IIS. The interface slices are respectively identified by bs, kb, and k. The use of combinator do is an abbreviation that avoids to rewrite the behavior of interface slices. Thus, โ€œdo bsโ€ relates to the sequence of actions encapsulated in the specification of interface IAllReduce. Using the above conventions for overlapping collective communication skeletons in order to form more complex topologies, it is simple to define a specific translation rule for patterns of collective communication interactions. The identifiers of interface slices from collective communication skeletons might be viewed as special kinds of ports (collective ports) and the operator do as its activation operator. Notice that interface slices may be used in termination conditions of streams, like in line 18. Collective ports have no direction, since all processes participate in communication. All communication operations are synchronous. The Figure 30(b) illustrates a Petri net slice that models a collective communication operation. The involved ports are collective ports that correspond to interface slices of units that participates in a certain collective communication operation, defined by the cluster of units that defines it. In Figure 30(c), it is illustrated how to augment the Petri net slice shown in Figure 30(b) with a protocol for modelling stream communication semantics. It is important to notice that the set of places Stream Flags(s) and Stream Flags(s) are shared by all collective ports involved in a collective operation. 4 Petri Net Analysis of Formal Properties In this section, solutions for two well known synchronization problems, implemented in Hash approach, illustrates the use of Petri nets for analyzing Hash programs by verifying their formal properties. 4.1 Dining Philosophers The dining philosophers problem is one of the most relevant synchronization problems in concurrency theory. Since it was originally proposed by Dijkstra in 1968 [12], it has been widely used for exercising the ability of concurrent languages and models for providing elegant solutions for avoiding deadlocks in concurrent programs. The dining philosophers problem is stated in the following way: Five philosophers are sited around a table for dinner. The philosophers spend their times eating and thinking. When a philosopher wants to eat, he takes two forks from the table. When a philosopher 30 + + phil[0] + + phil[0] + + phil[1] + + + + phil[4] + + + + phil[3] + + phil[4] + + phil[2] + + phil[1] phil[3] (a) phil[2] (b) Figure 31: Hash Topologies for the Dining Philosophers Problem wants to think, he keeps the two forks available on the table. However, there are only five forks available, requiring that each philosopher share their two forks with their neighbors. Thus, whenever a philosopher is eating, its neighbors are thinking. A solution to the dining philosopher problem establishes a protocol for ordering the activity of the philosophers. In Figure 31, Hash topologies for solutions for the dining philosophers problem are presented. The first one, whose code is presented in Figure 32(a), is an โ€œanarchicalโ€ solution, where philosophers are free to decide when to think or to eat. In this solution, the reader may observe the use of buffered channels and groups of ports of kind any composing the network topology. The one-slot buffered channel allows to model the fact that a fork may be on the table waiting for a philosopher to acquire them. This occurs whenever there is one message pending on the buffer. At the beginning of the interaction, all philosophers have a fork and release them. When a philosopher releases a fork, the semantics of group of ports of kind any ensures that if there is a philosopher waiting for the fork, he will obtain the fork immediately. Otherwise, it is possible that the philosopher that released the fork have a chance to acquire the fork again. This solution does not satisfy some of the enunciated requisites for a good solution to an instance of the critical section problem. For example, if all philosophers acquire their right (left) forks, they will be in deadlock. It is also possible that a philosopher never get a chance to obtain the forks (eventual entry). The second solution, whose code is presented in Figure 32(b), ensure all requisites. Additionally, it ensures maximal parallelism. In any state of execution, there are two philosophers eating. Figure 33 presents the Petri nets that model the respective behaviors of individual philosophers in the first and in the second solutions. Figure 34 presents the Petri nets modelling the interaction among the five philosophers, after modelling communication channels. The figures are only illustrative, since the networks have a number of components intractable by simple visual inspection. 31 component DiningPhilosophers<N> with index i range [0,N-1] interface IPhil where ports: (rf get*, lf get*) โ†’ (rf put*, rf put*) protocol: seq {rf put!; repeat seq {par {lf get?; rf get?}; par {lf put!; rf put!}} until < lf get & rf get & lf put & rf put >} [/ unit phil[i] where ports: IPhil grouping: rf get {neighbor,self} any, lf get {neighbor,self} any, rf put {neighbor,self} any, lf put {neighbor,self} any /] [/ connect connect connect connect phil[i]โ†’rf put[neighbor] phil[i]โ†’rf put[self] phil[i]โ†’lf put[neighbor] phil[i]โ†’lf put[self] to to to to phil[i-1 mod N] โ†lf get[neighbor] , phil[i] โ†rf get[self] , phil[i+1 mod N] โ†rf get[neighbor] , phil[i] โ†lf get[self] , buffered buffered buffered buffered 1 1 1 1 /] (a) component DiningPhilosophers<N> with index i range [0,N-1] interface IPhil [0] where ports: (rf get, lf get) โ†’ (rf put, rf put) protocol: repeat seq {lf put!;rf get?; lf get?; rf put!} interface IPhil [1] where ports: (rf get, lf get) โ†’ (rf put, rf put) protocol: repeat seq {rf get?; lf put!; rf put!; lf get?} [/ unit phil[i] where ports: IPhil [i mod 2] /] [/ connect phil[i]โ†’rf put to phil[i-1 mod N]โ†lf get, buffered connect phil[i]โ†’lf put to phil[i+1 mod N]โ†rf get, buffered /] (b) Figure 32: Hash Code for the First Solution of the Dining Philosophers Problem 32 (a) (b) Figure 33: Petri Net Modelling Behavior of One Philosopher 4.1.1 Proving Properties on the Dining Philosophers Solution In this section, INA (Integrated Network Analyzer) is used as an underlying engine for verifying formal properties about the above Hash solutions for the dining philosophers problem. INA allows to perform several structural and dynamic analysis on the Petri net induced from the two solutions. Among other possible analysis approaches, INA provides model checking facilities that allows to check validity of CTL (Constructive Tree Logic) formulae, describing properties about the Hash program, on the reachability graph of its corresponding Petri net. CTL is a suitable formalism, from branching-time temporal logics, for expressing and verifying safety (invariance) and liveness properties of dynamic systems. It allows temporal operators to quantify over paths that are possible from a given state. There exist a superset of CTL, named CTLโˆ— , that augments expressive power of CTL by allowing to express fairness constrains that are not allowed to be expressed in CTL. However, INA restricts to CTL because model checking algorithms for CTL are more efficient (linear in the formula size) that in CTLโˆ— (exponential in the formula size). Now, let us to introduce relevant properties that may be proved about solutions to the dining philosophers problems and to model these properties using CTL. The dining philosophers problem may be thought as an instance of the critical section problem. In fact, forks are critical sections, since it cannot be taken by more than one philosopher. A good solution to an instance of the critical section problem must ensure three properties [1]: โ€ข Mutual exclusion: Two adjacent philosophers cannot obtain the same 33 (a) (b) Figure 34: Petri nets for Dining Philosophers Hash Solutions 34 (a) Macros About Channels sender prepared[c] receiver prepared[c] rendezvous[c] buffer full[c] buffer empty[c] sender blocked[c] sender blocked[c] receiver blocked[c] receiver blocked[c] (b) Macros About Ports port pair prepared[p] port pair prepared[p] = = = = = = = = = = = port prepared[โˆ‚0 (c)] port prepared[โˆ‚1 (c)] sender ready[c] โˆง receiver ready[c] ยฌchan buffer free[c] ยฌchan buffer used[c] sender ready[c] โˆง ยฌreceiver ready[c] sender ready[c] โˆง buffer full[c] receiver ready[c] โˆง ยฌsender ready[c] receiver ready[c] โˆง buffer empty[c] port prepared[โˆ‚1 โ—ฆ โˆ‚0โˆ’ 1(p)] port prepared[โˆ‚0 โ—ฆ โˆ‚1โˆ’ 1(p)] (c) Macros About Groups of Ports group prepared[G] group prepared[G] = = i โ€ข s โ€ข โ€ข โ€ข b โ€ข โ€ข โ€ข โ€ข โ€ข r โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข o โ€ข (โˆ€p)โˆˆG : port prepared[p] (โˆƒp)โˆˆG : port prepared[p] all โ€ข any โ€ข Table 1: Some Useful Formula Macros for Hash programming fork (enter critical section); โ€ข Absence of deadlock: A deadlock occurs whenever there is at least one active philosopher and all active (not terminated) philosophers are blocked. The classical deadlock situation in dining philosophers problem occurs when all philosophers acquire its right, or left, forks. In this state, all philosophers may not proceed and they are not finished. Thus, they are in deadlock; โ€ข Absence of unnecessary delay: If a philosopher demands its right (left) fork and their right (left) neighbor is thinking, the philosopher is not prevented from obtaining the fork; โ€ข Eventual entry: Each philosopher that demands for a fork eventually will obtain it. In the following paragraphs, the above properties are characterized using CTL formulae. But before, intending to facilitate concise and modular specification of complex CTL formulas, we define the notion of CTL-formula macro. A CTL-formula macro is new kind of CTL-formula of the form hmacro namei[q1 , q2 , . . . , qn ], where hmacro namei is a macro name, qi , 1 โ‰ค i โ‰ค n, are qualifiers. CTLformulae macros may be expanded in flat CTL-formulae, by applying recursively their definitions. For instance, A CTL-formula macro is defined using the following syntax: hmacro namei[v1 , v2 , . . . , vn ] :: f where hmacro namei is a name for the macro, vi , 1 โ‰ค i โ‰ค n, are qualifier variables, and f is a CTL-formula (possibly making reference to CTL-formula 35 (a) Macros About Philosophers (p = 0 . . . N โˆ’ 1) phil demands lf[p] = phil demands rf[p] = phil posseses lf[p] = phil posseses rf[p] = phil is eating[p] = phil posseses lf[p] โˆง phil posseses rf[p] phil is thinking[p] = ยฌphil is eating[p] phil waiting[p] = phil demands rf[p] โˆจ phil demands lf[p] phil finished[p] = process finished[phil[p]] all phil finished = (โˆ€p)<N : phil finished[p] (b) Macros About Forks (f = 0 . . . N โˆ’ 1) fork is free[f ] = phil is thinking[f ] โˆง phil is thinking[f โŠ•N 1] fork in use by right[f ] = phil posseses lf[f ] fork in use by left[f ] = phil posseses rf[f โŠ•N 1] fork in use[f ] = fork in use by right[f ] โˆจ fork in use by left[f ] Table 2: Some Useful Formula Macros for Dining Philosophers macros). In a flat CTL-formula that appears in the right-hand-side of a CTLformula macro, qualifier variables are used as qualifiers for place and transition identifiers and for references to enclosed CTL-formulae macros. In Table 1, some useful CTL-formulae macros are defined for simplifying specification of CTL formulae on the restrict domain of Hash programs. In Table 2, other CTL-formulae macros are defined, but now on the restrict domain of the dining philosophers problem (application oriented). Notice that CTL-formulae macros of Table 2 are defined on top of that defined in Table 1. Unlike the later macros, the implementation of the former ones is not sensitive to modifications in the underlying translation schema. This illustrates the transparency provided by the use of CTL-formulae macros in an environment for proof and analysis of formal properties. We have used INA for proving the three properties enunciated above for dining philosophers. The first three ones are safety properties. It may be proved by negating a predicate describing a state that cannot be reached in execution (bad state). The last one is a liveness property, for which validity of a predicate must be checked in all possible states. Proof of Mutual Exclusion. Safety property. One valid formulation for the corresponding bad state is:   bad = EF (โˆƒf )0โ‰คf <N : fork in use by right[f ] โˆง fork in use by left[f ] Proof of Absence of deadlock. the corresponding bad state is:  bad = EF Safety property. One valid formulation for   (โˆ€p)0โ‰คp<N : phil waiting[p] โˆจ phil finished[p] โˆง ยฌall phil finished Proof of Absence of unnecessary delay. mulation for the corresponding bad state is: 36 Safety property. One valid for- out is [t] out transmitter as [(t,Bit)] as await asl [(t,Bit)] as corrupt_send bs2 [Err (t,Bit)] [Err Bit] bs ds corrupt_ack as [Bit] cs in [Err (t,Bit)] bs ds sender side bs1 ack receiver side os [t] in receiver Figure 35: Hash Topology for of ABP (Alternating Bit Protocol) EF  bad =  (โˆ€p)0โ‰คf <N : fork is free[f ] โˆง (phil demands lf[f ] โˆจ phil demands rf[f โŠ•N 1]) Proof of Eventual entry. Liveness property. One valid formulation for the corresponding good state is: : good = AG [phil waiting[p] โ‡’ (AF [phil eating[p]])] 4.2 The Alternating Bit Protocol The alternating bit protocol (ABP) is a simple and effective technique for managing retransmission of lost messages in fault-tolerant low level implementations of message passing libraries. Given a transmitter process A and a receiver process B, connected by a point-to-point stream channel, ABP ensures that whenever a message sent from A to B is lost, it is retransmitted. The Hash implementation described here is based on a functional implementation described in [13]. The Figure 35 illustrates the topology of the component ABP, which might be used for implementing ABP protocol. The virtual units transmitter and receiver model the processes involved in the communication. The other units implement the protocol. The units transmitter, out, await, and corrupt ack implement the sender side of the ABP protocol, while the units receiver, in, ack, and corrupt send implement the receiver side. The await process may retransmit a message repetitively until the message is received by process ack. Retransmissions are modelled using streams with nesting factor 2 (streams of streams). The elements of the nested stream correspond to the retransmission attempts of a given value. The correct arrive of the message is performed by inspecting the value received through the port ds. The processes corrupt ack and corrupt send verify the occurrence of errors in the messages that arrive at the sender and receiver, respectively, modelling the unreliable nature of the communication channel. The Hash configuration code presented in Figure 36 implements the ABP component. The Petri net induced by translating ABP component is presented in Figure 37. 37 component ABP with use Out, Await, Corrupt, Ack, In interface ABP Transmitter where ports: () โ†’ (out*::t) protocol: repeat out! until out interface ABP Receiver t where ports: (in*::t) โ†’ () protocol: repeat in? until in interface Out where ports: (is::t) โ†’ (as::(t,Bit)) protocol: repeat seq {is?; as!} until <is & as> interface Await where ports: (as*::(t,Bit),ds**::Err Bit) โ†’ (asโ€™**::(t,Bit)) protocol: repeat seq { as?; repeat seq {asโ€™ !; ds?} until <asโ€™ & ds>} until <as & asโ€™ & ds> interface Corrupt where ports: (as**::(t,Bit)) โ†’ (bs**::Err (t,Bit)) protocol: repeat seq {as?; bs!} until <as & bs> interface Ack where ports: (bs**::Err (t,Bit)) โ†’ (cs**::Bit) protocol: repeat seq {bs?; cs!} until <bs & cs> interface In where ports: (bs**::Err (t,Bit)) โ†’ (os*::t) protocol: repeat seq { repeat bs? until bs; os!} until <bs & os> unit transmitter where ports: ABP Transmitter () โ†’ out unit receiver where ports: ABP Receiver in โ†’ () unit unit unit unit unit unit out await corrupt ack in ack corrupt send connect connect connect connect connect connect connect connect * * * * * * * * where where where where where where ports: ports: ports: ports: ports: ports: transmitterโ†’out inโ†’os outโ†’as awaitโ†’as corrupt ackโ†’ds corrupt sendโ†’bs[0] corrupt sendโ†’bs[1] ackโ†’cs IOut IAwait ICorrupt IIn IAck ICorrupt grouping: bs*2 all to to to to to to to to outโ†is receiverโ†in awaitโ†as corrupt sendโ†as ackโ†ds inโ†bs ackโ†bs corrupt ackโ†cs assign assign assign assign assign assign Out to Await to Corrupt to In to Ack to Corrupt to , buffered , buffered Figure 36: ABP Component 38 out await corrupt ack in ack corrupt send transmitter await receiver corrupt_send out corrupt_ack ack in Figure 37: Petri Net Induced by ABP Component 39 References [1] G. Andrews. Concurrent Programming: Principles and Practice. Addison Wesley, 1991. [2] R. Armstrong, D. Gannon, A. Geist, K. Keahey, S. Kohn, L. McInnes, S. Parker, and B. Smolinski. Towards a Common Component Architecture for High-Performance Scientific Computing. In The 8th IEEE International Symposium on High Performance Distributed Computing. IEEE, 1999. [3] D. H. Bailey, T. Harris, W. Shapir, R. van der Wijngaart, A. Woo, and M. Yarrow. The NAS Parallel Benchmarks 2.0. Technical Report NAS-95-020, NASA Ames Research Center, December 1995. http://www.nas.nasa.org/NAS/NPB. [4] E. Best, J. Esparza, B. Grahlmann, S. Melzer, S. Rmer, and F. Wallner. The PEP Verification System. In Workshop on Formal Design of Safety Critical Embedded Systems (FEmSysโ€™97), 1997. [5] F. H. Carvalho Junior, R. M. F. Lima, and R. D. Lins. Coordinating Functional Processes with Haskell# . In ACM Press, editor, ACM Symposium on Applied Computing, Track on Coordination Languages, Models and Applications, pages 393โ€“400, March 2002. [6] F. H. Carvalho Junior and R. D. Lins. Haskell# : Parallel Programming Made Simple and Efficient. Journal of Universal Computer Science, 9(8):776โ€“794, August 2003. [7] F. H. Carvalho Junior and R. D. Lins. On the Implementation of SPMD Applications using Haskell#. In 15th Brazilian Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2003). IEEE Press, November 2003. [8] F. H. Carvalho Junior and R. D. Lins. Topological Skeletons in Haskell# . In International Parallel and Distributed Processing Symposium (IPDPS). IEEE Press, April 2003. 8 pages. [9] F. H. Carvalho Junior, R. D. Lins, and R. M. F. Lima. Parallelising MCP-Haskell# for Evaluating Haskell# Parallel Programming Environment. In UnB, editor, 13th Brazilian Symposium on Computer Architecture and High-Performance Computing (SBAC-PAD 2001), September 2001. [10] F. H. Carvalho Junior, R. D. Lins, and R. M. F. Lima. Translating Haskell# Programs into Petri Nets. Lecture Notes in Computer Science (VECPARโ€™2002), 2565:635โ€“649, 2002. [11] M. Cole. Algorithm Skeletons: Structured Management of Paralell Computation. Pitman, 1989. 40 [12] E. C. Djikstra. The Structure of THE Multiprogramming System. Communications of the ACM, 11:341โ€“346, November 1968. [13] P. Dybjer and H. P. Sander. A Functional Programming Approach to the Specification and Verification of Concurrent Systems. Formal Aspects of Computing, 1:303โ€“319, 1989. [14] R. German. SPNL: Processes as Language-Oriented Building Blocks of Stochastic Petri Nets. In 9th Conference on Computer Performance Evaluation, Modelling Techniques and Tools, pages 123โ€“134. Springer Verlag, 1997. [15] J. Gischer. Shuffle Languages, Petri Nets, and Context-Sensitive Grammars. Communications of the ACM, 24(9):597โ€“605, September 1981. [16] B. Grahlmann and E. Best. PEP - More than a Petri Net Tool. In Lecture Notes in Computer Science (Tools and Algorithms for the Construction and Analysis of Systems, Second Int. Workshop, TACASโ€™96, Passau, Germany), volume 1055, pages 397โ€“401. Springer Verlag, March 1996. [17] Inmos. Occam Programming Manual. Prentice-Hall, C.A.R. Hoare Series Editor, 1984. [18] T. Ito and Y. Nishitani. On Universality of Concurrent Expressions with Synchronization Primitives. Theoretical Computer Science, 19:105โ€“115, 1982. [19] G. Kiczales, J. Lamping, Menhdhekar A., Maeda C., C. Lopes, J. Loingtier, and J. Irwin. Aspect-Oriented Programming. In Lecture Notes in Computer Science (Object-Oriented Programming 11th European Conference โ€“ ECOOP โ€™97), volume 1241, pages 220โ€“242. Springer-Verlag, November 1997. [20] S. L. Peyton Jones and J. (editors) Hughes. Report on the Programming Language Haskell 98, A Non-strict, Purely Functional Language, February 1999. [21] S. Roch and P. Starke. Manual: Integrated Net Analyzer Version 2.2, 1999. [22] A. C. Shaw. Software Descriptions with Flow Expressions. IEEE Transactions on Software Enginnering, SE-4(3):299โ€“325, May 1978. [23] J. M. Squyres and A. Lumsdaine. A Component Architecture for LAM/MPI. In Proceedings, 10th European PVM/MPI Usersโ€™ Group Meeting, number 2840 in Lecture Notes in Computer Science, Venice, Italy, September 2003. Springer-Verlag. [24] J. M. Squyres, A. Lumsdaine, W. L. George, J. G. Hagedorn, and J. E. Devaney. The interoperable message passing interface (IMPI) extensions to LAM/MPI. In Proceedings, MPIDCโ€™2000, March 2000. 41 [25] S. Thompson. Haskell, The Craft of Functional Programming. AddisonWesley Publishers Ltd., 1996. [26] A. Zimmermann, J. Freiheit, R. German, and G. Hommel. Petri Net Modelling and Performability Evaluation with TimeNET 3.0. In 11th Int. Conf. on Modelling Techniques and Tools for Computer Performance Evaluation (TOOLSโ€™2000), pages 188โ€“202. Lecture Notes in Computer Sciente, 2000. A The Formal Syntax of HCL In what follows, it is described a context-free grammar for HCL, the Haskell# Configuration Language, whose syntax and programming abstractions were informally presented in Section ??. Examples of HCL configurations and their meanings were presented in Sections ?? and ??. The notation employed here is similar to that used for describing syntax of Haskell 98 [20]. Indeed, some non-terminals from that grammar are reused here, once some Haskell code appears in HCL configurations. They are faced italic and bold. A minor difference on notation resides on the use of (. . .)? , instead of [. . .], for describing optional terms. For simplicity, notation for indexed notation is ignored from the description of formal syntax of HCL. It may be resolver by a pre-processor, before parsing. A.1 Top-Level Definitions configuration header static parameter list component interface declaration A.2 โ†’ โ†’ โ†’ โ†’ โ†’ | | | header declaration 1 . . . declaration n (n โ‰ฅ 0) component ID static parameter list ? component interface ? < ID1 . . . IDn > (n โ‰ฅ 0) ports naming | iterator decl | interface decl import decl | use decl unit decl | assign decl | replace decl | channel decl unify decl | factorize decl | replicate decl | bind decl haskell code Use Declaration use decl โ†’ use use spec use spec โ†’ id | id.use spec | id.{ use spec 1 , . . . , use spec n } A.3 (n โ‰ฅ 1) Import Declaration import decl โ†’ impdecl A.4 Iterator Declaration iterator decl โ†’ iterator id1 , . . ., idn range [ numeric exp , numeric exp ] (n โ‰ฅ 1) 42 A.5 Interface Declaration interface decl โ†’ interface (context =>)? ID tyvar 1 . . . tyvar k interface spec interface spec โ†’ interface ports spec (where : interface inheritance)? (behavior : behavior expression)? A.5.1 Interface Ports Description interface ports spec โ†’ port spec list -> port spec list port spec list โ†’ port spec | ( port spec 1 , . . . , port spec n ) (n โ‰ฅ 2) port spec โ†’ id (*)? (:: atype)? | id A.5.2 Interface Composition โ†’ interface slice 1 # . . . # interface slice k (k โ‰ฅ 1) interface inheritance interface slice โ†’ id @ ID | ID ports naming composition ports naming composition โ†’ ports naming | ( ports naming 1 # . . . # ports naming n ) (n โ‰ฅ 1) ports naming โ†’ port naming list -> port naming list port naming list โ†’ id | ( id1 , . . . , idn ) (n โ‰ฅ 1) A.5.3 Interface Behavior behavior expression โ†’ action โ†’ | | | condition โ†’ disjunction โ†’ sync conjunction โ†’ simple conjunction โ†’ A.6 Unit Declaration unit decl unit spec unit interface wf setup group spec group type wire function A.7 (sem id1 , . . . , idn )? : action (n โ‰ฅ 1) par { action 1 ; . . . ; action n } | seq { action 1 ; . . . ; action n } alt { action 1 ; . . . ; action n } | repeat action condition ? if condition then action else action id ! | id ? | signal id | wait id (n โ‰ฅ 2) until disjunction | counter numeric exp sync conjunction 1 โ€˜|โ€™ . . . โ€˜|โ€™ sync conjunction n (n โ‰ฅ 1) h simple conjunction i | simple conjunction id | ( id1 & . . . & idn ) (n โ‰ฅ 1) โ†’ โ†’ โ†’ โ†’ โ†’ โ†’ โ†’ unit unit spec (*)? id (# unit interface)? (wire wf setup 1 , . . . , wf setup n )? ID ports naming composition ? | interface spec id (group type group spec)? (: wire function)? { id1 , . . ., idn } | * numeric exp any | all ? | exp Assignment Declaration assign decl โ†’ assign assigned component to assigned unit 43 assigned component โ†’ ID actual parameter list ? ports naming composition ? actual parameter list โ†’ < numeric exp 1 , . . . , numeric exp n > (n โ‰ฅ 1) assigned unit โ†’ qid ports naming composition ? A.8 Replace Declaration replace decl โ†’ replace qid ports naming composition ? by operand unit A.9 Channel Declaration channel decl โ†’ connect qid -> qid to qid <- qid , comm mode comm mode โ†’ synchronous | buffered numeric exp | ready A.10 Unification Declaration โ†’ unify operand unit 1 , . . . , operand unit n to unit spec adjust wire wf setup 1 , . . . , wf setup k (n โ‰ฅ 2, k โ‰ฅ 1) operand unit โ†’ qid # interface pattern 1 . . . # interface pattern n (n โ‰ฅ 1) interface pattern โ†’ port pattern list -> port pattern list | id port pattern list โ†’ pattern | ( pattern 1 , . . . , pattern n ) pattern โ†’ id | @ qid | | unify decl A.11 Factorization Declaration factorize decl โ†’ factorize operand unit to unit spec 1 . . . unit spec n adjust wire wf setup 1 , . . . , wf setup k (n โ‰ฅ 2, k โ‰ฅ 1) A.12 Replication Declaration replicate decl โ†’ replicate operand unit 1 , . . . , operand unit n into numeric exp adjust wire wf setup 1 , . . . , wf setup k (n โ‰ฅ 2, k โ‰ฅ 1) A.13 Bind Declaration bind declaration โ†’ bind qid -> qid to -> id | bind qid <- qid to <- id A.14 Miscelaneous haskell code โ†’ topdecls qid โ†’ id1 โ€˜.โ€™ . . . โ€˜.โ€™ idn (n โ‰ค 2) qID โ†’ ID1 โ€˜.โ€™ . . . โ€˜.โ€™ IDn (n โ‰ค 2) 44 B Foundations and Notations In this section, it is discussed the formalisms that comprise the formal framework for the development of this work, concerning modelling of communication behavior of processes, according to the Hash component model design principles. B.1 Formal Languages The theory of formal languages will be employed as a framework for the study of patterns of communication interaction of Hash process in a parallel program. The main interest is to investigate relations between descriptive power of concurrent expressions and Petri nets, in order to define a language for expressing communication behavior of processes, embedded in the Hash language. Definition 1 (Alphabet) An alphabet is a finite set of indivisible symbols, denoted by ฮฃ. Definition 2 (Word) A word is a finite sequence of symbols of some alphabet ฮฃ. The symbol วซ denotes the empty word, whose length is zero. Definition 3 (Kleeneโ€™s Closure of an Alphabet ) A Kleeneโ€™s closure of an alphabet ฮฃ, denoted by ฮฃโˆ— , is defined as below: ฮฃโˆ— = {w | w is a word in ฮฃ} Thus, any sequence of symbols in ฮฃ, including วซ, belongs to ฮฃโˆ— . It is common to define ฮฃ+ as: ฮฃ+ = ฮฃโˆ— โˆ’ {วซ} Definition 4 Given an alphabet ฮฃ, a formal language L is defined as follows: L โŠ‚ ฮฃโˆ— B.2 Labelled Petri Nets and Formal Languages Now, notations and definitions concerning Petri nets are presented. Definition 5 (Place/Transition Petri Net) A place/transition Petri net is a directed bipartite graph that can be formalized as a quadruple (P, T, A, M0 ), where: 1. P is a finite set of places, which can store an unlimited number of marks; 2. T is a finite set of transitions. 3. P โˆฉ T = โˆ…. 45 4. A defines a set of arcs, in such way that A โІ ((P ร— T ) โˆช (T ร— P )) ร— N aturais. Thus, an arc can go from a transition to a place or from a place to a transition. A number is associated to the arc, indicating its weight. For simplicity, if the weight is omitted it is one ((p, t) โ‰ก (p, t, 1)). 5. The relation M0 โŠ‚ P ร— N defines the initial marking, or the number of marks that are stored in each place at the initial state of the Petri net; From the initial marking, a Petri net defines a set reachable markings. A marking is reachable if it can be obtained from the initial marking by firing a sequence of transitions, according to firing rules, formalized in what follows. Definition 6 (Enabled Transition) Be ฮ , ฮ  = (P, T, A, MO ), a Petri net and t, t โˆˆ T , a transition of ฮ : t is enabled โ‡” (โˆ€p โˆˆ P, โˆƒm, n โˆˆ N : (p, t, m) โˆˆ A โˆง (p, n) โˆˆ M : n โ‰ฅ m) Thus, a transition t is enabled if the number of marks in each one of its input places is greater than or equal to the weight of the arc that links it to the transition. Definition 7 (Firing Rule and Reachable Markings) Be ฮ  = (P, T, A, M0 ) a Petri net and a marking M of ฮ . The transition from the marking M to a new marking Mโ€™ is a side effect of firing an enabled transition t, and represented by t the relation M โ†’ M โ€ฒ , where: M โ€ฒ = Mฬ„ โˆช MI โˆช MO MI = {(p, n โˆ’ m) | โˆƒm, n โˆˆ N : p โˆˆ P, (p, t, m) โˆˆ A, (p, n) โˆˆ M } MO = {(p, n + m) | โˆƒm, n โˆˆ N : p โˆˆ P, (t, p, m) โˆˆ A, (p, n) โˆˆ M } The sub-marking MI indicates the new marking for the input places of the transition t, while MO indicates the new marking for output places of t. The transition can be fire if it is enabled and the effect of firing is to remove marks from input places and add marks to output places, according to the weights of the arcs that link these places to t. It is necessary to generalize this definition to cover the concept of (transitively) reachable marking. Thus, a marking Mn is reachable from a mark M if there is a sequence of firing of transitions from M to Mn : t t t t n 3 2 1 Mn ยทยทยท โ†’ M2 โ†’ M1 โ†’ Mโ†’ This notation can be abbreviated to: ฯƒ M โ†’ Mn , where ฯƒ = t1 t2 ยท ยท ยท tn The symbol ฯƒ denotes a sequence of firings of transitions. 46 Definition 8 (Labelled Petri nets) Be ฮฃ an alphabet. A labelled Petri net is a 7-uple (P, T, A, M0 , ฯ), where (P, T, A, M0 ) is a place/transition Petri net and ฯ : T โ†’ ฮฃ โˆช {ฮป} is a function that associate transitions to a symbol in ฮฃ. Transitions labelled with ฮป are called silent transitions. Labelled Petri nets are an extension of Petri nets for generating formal languages. There are two classes of Petri net languages. Definition 9 (Petri Net Language) Given a labelled Petri net ฮ  = (P, T, A, M0 , ฯ), we define the formal language generated by ฮ  as: ฯƒ L(ฮ , M0 ) = {ฯ(ฯƒ) | โˆƒM : M0 โ†’ M }. Definition 10 (Petri Net Terminal Language) Given a Petri net ฮ (P, T, A, M0 , ฯ) and a final marking Mf , we can define the terminal language generated by ฮ , with respect to Mf , by: ฯƒ T (N, M0 , Mf ) = {ฯ(ฯƒ) | M0 โ†’ Mf } Given a labelled Petri net ฮ , the language generated by ฮ  defines the possible sequence of firing traces from its initial marking. The terminal language generated by ฮ , with respect to final marking Mf , differs from ฮ  language because only that traces from M0 to Mf are considered. Definition 11 (Classes of Petri Nets Languages) We denote the class of all Petri net languages as โ„“ฮป 0 , and the class of all Petri net terminal languages as โ„“ฮป 1 . It is simple to demonstrable that โ„“ฮป 0 โŠ‚ โ„“ฮป 1 . B.3 Interlaced Petri Nets Interlaced Petri nets are an alternative extension to labelled Petri nets, introduced in this article for simplifying specification of the translation schema of Hash programs into labelled Petri nets. Like hierarchic Petri nets [], interlaced Petri nets allows that complex and large scale Petri nets be implemented in a simpler and modular way. It does not modify descriptive power of labelled Petri nets. However, while hierarchic Petri nets allow only nesting composition of Petri nets, interlaced Petri nets also allow overlapping of them. Given a set of Petri net slices, each one addressing different concerns, they may be overlapped to form an interlaced Petri net. Interlaced Petri nets may also be viewed as Petri net slices for composing higher level interlaced Petri nets. Definition 12 (Interlaced Petri Nets) An interlaced Petri net ฮ  can be defined inductively as: 1. (Base) A tuple (P, T, A, M0 , ฯ, ฮด), where (P, T, A, M0 , ฯ) represents a labelled Petri net and ฮด : (P โˆช T ) โ†’ 2โˆ† is a function that maps Petri net nodes (places and transitions) onto a list of qualifiers, represents a simple interlaced Petri net; 47 2. (Induction) Let ฮ 1 , ฮ 2 , . . . , ฮ n be interlaced Petri nets, called Petri net slices in this context ( hypothesis). ฮ , such that ฮ  = hฮ 1 , ฮ 2 , . . . , ฮ n i, is a composed interlaced Petri net ( induction step). 3. Anything that may not be formed from application of inductive rules 1 and 2 is not an interlaced Petri net. Definition 13 (Unfolding Composite Interlaced Petri Nets) An unfolded interlaced Petri net ฮ ฬ† is obtained from a interlaced petri net ฮ  by applying the transformation function ยต, defined below: 1. ยต [(P, T, A, M0 , ฯ, ฮด)] = (P, T, A, M0 , ฯ, ฮด) ห˜ ยต [ฮ 2 ] โˆช ห˜ ...โˆช ห˜ ยต [ฮ n ] (composite) 2. ยต [< ฮ 1 , ฮ 2 , . . . , ฮ n >] = ยต [ฮ 1 ] โˆช ห˜ correspond to the Petri net union operator, defined The binary operator โˆช as below: ห˜ (P1 , T1 , A1 , M0 1 , ฯ1 , ฮด1 )โˆช(P 2 , T2 , A2 , M02 , ฯ2 , ฮด2 ) = (P1 โˆช P2 , T1 โˆช T2 , A1 โˆช A2 , M01 โˆช M0 2 , ฯ1 โˆช ฯ2 , ฮด1 โˆช ฮด2 ) Qualifiers are used to identify components of interlaced Petri nets (places or transitions) that must be treated as the same component. These components are said to be equivalent components. They may belong to distinct slices. Next, qualifiers and identification rules are formalized. Definition 14 (Qualifier) Let ฮ˜ be a finite set of symbols. The set โˆ† is informally defined as all qualifiers that can be induced from set ฮ˜. A qualifier ฮด, ฮด โˆˆ โˆ†, is defined from ฮ˜ as following: โ€ข a, a โˆˆ ฮ˜, is a qualifier ( primitive qualifier); โ€ข A tuple (a1 , a2 , . . . , an ) is a qualifier ( composed qualifier), assuming that each ai , 1 โ‰ค i โ‰ค n, is a primitive qualifier; The following rule teaches how to identify equivalent vertices in an interlaced Petri net, using their qualifiers. Definition 15 (Identification of Vertices (Places or Transitions)) Let ฮ  be an interlaced Petri net. Consider its unfolded variant ยต [ฮ ] = (P, T, A, M0 , ฯ, ฮด). Let V be the collection of components of ยต [ฮ ] (P โˆชT ). The following equivalence relation is defined between two vertices v1 and v2 ({v1 , v2 } โŠ‚ V ): v1 โ‰ก v2 โ‡” ({v1 , v2 } โŠ‚ T โˆจ {v1 , v2 } โŠ‚ P ) โˆง (ฮด(v1 ) โˆฉ ฮด(v2 ) 6= โˆ…) 48 B.4 Regular Expressions Controlled by Balanced Semaphores (SCRE) The following definitions are presented in order to introduce the class of regular expressions controlled by balanced semaphores (SCRE). This generalization to regular expressions, with descriptive power comparable to labelled Petri nets, will be used to model a language for specification of communication behavior of Hash processes. Definition 16 (Regular Expressions) A regular expression E over an alphabet ฮฃ is inductively defined as follows: 1. a โˆˆ ฮฃ is a regular expression; 2. ฮป is a regular expression; 3. โˆ… is a regular expression; 4. Be S1 and S2 regular expression. Thus, (S1 ), S1 ยท S2 , S1 + S2 e, S1 โˆ— are also regular expressions. Definition 17 (Regular Language) Be E a regular expression over ฮฃ. The formal language generated by E, LRE (E), is defined in the following way: 1. LRE (โˆ…) = โˆ… 2. LRE (ฮป) = {ฮป} 3. LRE (a) = {a}, para a โˆˆ ฮฃ, 4. LRE ((E)) = LRE (E) 5. LRE (E1 .E2 ) = {xy | x โˆˆ LRE (E1 ) โˆง y โˆˆ LRE(E2 )} 6. LRE (E1 + E2 ) = {x | x โˆˆ LRE (E1 ) โˆจ x โˆˆ LRE (S2 )} S 7. LRE (E โˆ— ) = LRE (Ei ) where: 1. E 0 = ฮป 2. E i = E iโˆ’1 E, i > 0 The class of regular languages are denoted by RE. A previous version of the Hash language used regular expressions to model communication traces of processes [5]. However, Petri nets are far more expressive than simple regular expressions for describing communication traces. This fact motivated us to generalize the adopted approach, using some class of synchronized concurrent expressions shown to be equivalent to Petri nets. Concurrent expressions are an extension to regular expressions defined to model concurrency. Some authors refer to these languages as shuffle languages. 49 Definition 18 (Concurrent Expressions) Be ฮฃ an alphabet. A concurrent expression S over ฮฃ is defined by the following rules: 1. If S is a regular expression over ฮฃ, then S is a concurrent expression; 2. If S1 e S2 are concurrent expressions, then S1 โŠ™ S2 , e S1 โŠ— are concurrent expressions; The operators โŠ™ and โŠ— distinguish, at least syntactically, non-regular concurrent expressions. The language generated by concurrent expressions are defined below. Definition 19 (Concurrent Languages) Be S a concurrent expression over ฮฃ. The concurrent language LCE (S) is defined according to the following rules: 1. LCE (S) = LRE(S), if S is a well-formed regular expression. 2. LCE (S1 โŠ™ S2 ) = {x1 y1 x2 y2 ยท ยท ยท xk yk | x1 x2 ยท ยท ยท xk โˆˆ LCE (S1 ) โˆง y1 y2 ยท ยท ยท yk โˆˆ LCE (S2 )}, S 3. LCE (S โŠ— ) = LCE (SโŠ™i ). where: 1. S โŠ™0 = ฮป 2. S โŠ™i = S โŠ™iโˆ’1 โŠ™ S, i > 0. The class of concurrent languages are denoted by CE. It is clear that CE โŠƒ RE, because every regular expression is a concurrent expression. But there is a strongest and important result that relates concurrent and regular languages. Theorem 1 ([22], Relating Concurrent and Regular Expressions) If S is a concurrent expression that does not makes use of โŠ— operator, then LCE (S) is regular. Another important result gives bounds to the expressiveness of concurrent expressions. Theorem 2 ([15], Bounds to Concurrent Expressions Expressiveness) If S is a concurrent expression, than LCE (S) is a context-sensitive language. In order to increase expressivity of concurrent expressions, allowing than to express recursively enumerable languages, synchronized concurrent expressions[18] were proposed. They extend concurrent expressions with synchronization mechanisms and has been used extensively in 80โ€™s to analyse expressiveness of synchronization mechanisms of concurrency, mainly that based on semaphores. 50 Definition 20 (Synchronized Concurrent Expressions) Be ฮฃ an alphabet and โ„ฆ a set of symbols that denote synchronization primitives, where ฮฃ and โ„ฆ are disjoint. A concurrent expression E over ฮฃ โˆช โ„ฆ is called synchronized concurrent expression and the language (LS (โ„ฆ)) is said to be a synchronization mechanism over E. A synchronized concurrent expression over ฮฃ โˆช โ„ฆ, adopting the synchronization mechanism K, where K= LS (โ„ฆ), will be denoted by (E, ฮฃ, โ„ฆ, K). The class of synchronized concurrent expression is denoted by SCE. The next definition defines the language of a synchronized concurrent expression, which gives a meaning for the synchronization mechanism. Definition 21 (Synchronized Concurrent Languages) Be (S, ฮฃ, โ„ฆ, K) a synchronized concurrent expression, where K = LS (โ„ฆ). The language of S, LSCE (S) is defined as below: LSCE (S) = {h(x) | x โˆˆ LCE (x), h(x) โˆˆ K}, where the homomorphisms h and h are defined as follwing:  a aโˆˆฮฃ h(a) = ฮป aโˆˆโ„ฆ h(a) =  ฮป a aโˆˆฮฃ aโˆˆโ„ฆ The class of synchronized concurrent languages that uses a synchronization mechanism K is denoted by SCEK . This definition parameterizes the adopted synchronization mechanism. The most common are that based on semaphores, whose most significative examples are presented in the following paragraphs Be โ„ฆn a set of synchronization primitives com n sฤฑฬmbolos, where: โ„ฆn = {ฯ‰i , ฯƒi | i = 1, ยท ยท ยท , n} The following semaphore-based synchronization mechanisms can be defined over โ„ฆn [18]. 1. Counter semaphore: LS (โ„ฆn ) = C(n), where: C(n) = LCE ((ฯƒ1 ยทฯ‰1 + ฯƒ1 ))โŠ— โŠ™ (ฯƒ2 ยทฯ‰2 + sigma2 ))โŠ— โŠ™ ยท ยท ยทโŠ™ (ฯƒn ยทฯ‰n + ฯƒn ))โŠ— ) C = {C(n) | n โ‰ฅ 0, whereC(0) = ฮป} 2. [0]-counter semaphore: LS (โ„ฆn ) = C0 (n), where: C0 (n) = LCE ((ฯƒ1 ยท ฯ‰1 ))โŠ— โŠ™ (ฯƒ2 ยท ฯ‰2 ))โŠ— โŠ™ ยท ยท ยท โŠ™ (ฯƒn ยท ฯ‰n ))โŠ— ) C0 = {C0 (n) | n โ‰ฅ 0, whereC0 (0) = ฮป} 51 3. Binary semaphore: LS (โ„ฆn ) = B(n), where: B(n) = LCE ((ฯƒ1 ยท ฯ‰1 + ฯƒ1 ))โˆ— โŠ™ (ฯƒ2 ยท ฯ‰2 + sigma2))โˆ— โŠ™ ยท ยท ยท โŠ™ (ฯƒn ยท ฯ‰n + ฯƒn ))โˆ— ) B = {B(n) | n โ‰ฅ 0, whereB(0) = ฮป} 4. [0]-binary semaphore: LS (โ„ฆn ) = B0 (n), where: B0 (n) = LCE ((ฯƒ1 ยท ฯ‰1 ))โˆ— โŠ™ (ฯƒ2 ยท ฯ‰2 ))โˆ— โŠ™ ยท ยท ยท โŠ™ (ฯƒn ยท ฯ‰n ))โˆ— ) B0 = {B0 (n) | n โ‰ฅ 0, whereB0 (0) = ฮป} C, C0 , B, B0 denote the sets of synchronization primitives with any number of primitives. This notation can be generalized to any synchronization mechanism other than semaphores. Let CE(n) beSthe family of synchronization mechanisms with n primitives. Then CE = CE(n), n = 0 . . . n. Thus, C(n), C0 (n), B(n), B0 (n) are special cases of CE(2n). A concurrent expression controlled by a semaphore system will be called as a semaphore controlled concurrent expression. Many important results about the expressive power of synchronized concurrent expressions were presented[]. But, in this work, one deserve special attention. It establishes the equivalence of synchronized regular expressions that uses [0]-counter semaphores as synchronization protocol to Petri nets. Synchronized regular expressions are defined below. Definition 22 (Regular Expressions Controlled by Balanced Semaphores) Regular expressions controlled by balanced semaphores (RECBS) are defined as [0]-counter synchronized concurrent expressions that does not make use of โŠ— operator. The class of RECBSโ€™s is denoted by RECBS. Remember that theorem 1 guarantees that concurrent expressions without โŠ— operator are equivalent to regular expressions. However the presence of โŠ™ operator and [0]-counter semaphores guarantees that this kind of expression may generate a richer class of formal languages than simple regular expressions, a fact enunciated by the following theorem. Theorem 3 (Equivalence of RECBS to Petri nets [] ) The class of languages generated by a RECBS is โ„“ฮป 1 . The result in theorem 3 are convenient for our purpose to make descriptive power of the Hash language equivalent to descriptive power of Petri nets. The use of RECBS avoids the use of โŠ— operator. Shaw [22], when introducing flow expressions to make software descriptions gave two interpretations for โŠ—: a parallel loop and as a sequential loop that creates a process (fork ) in each iteration. Neither interpretation is practical in the Hash language, because it assumes static parallelism. 52
6cs.PL
P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 arXiv:1704.07234v2 [cs.PL] 8 May 2017 Scaling Reliably: Improving the Scalability of the Erlang Distributed Actor Platform Phil Trinder, Natalia Chechina, Nikolaos Papaspyrou, Konstantinos Sagonas, Simon Thompson, Stephen Adams, Stavros Aronis, Robert Baker, Eva Bihari, Olivier Boudeville, Francesco Cesarini, Maurizio Di Stefano, Sverker Eriksson, Viktoria Fordos, Amir Ghaffari, Aggelos Giantsios, Rockard Green, Csaba Hoch, David Klaftenegger, Huiqing Li, Kenneth Lundin, Kenneth MacKenzie, Katerina Roukounaki, Yiannis Tsiouris, Kjell Winblad RELEASE EU FP7 STREP (287510) project www.release-project.eu/ April 25, 2017 Abstract Distributed actor languages are an effective means of constructing scalable reliable systems, and the Erlang programming language has a well-established and influential model. While the Erlang model conceptually provides reliable scalability, it has some inherent scalability limits and these force developers to depart from the model at scale. This article establishes the scalability limits of Erlang systems, and reports the work of the EU RELEASE project to improve the scalability and understandability of the Erlang reliable distributed actor model. We systematically study the scalability limits of Erlang, and then address the issues at the virtual machine, language and tool levels. More specifically: (1) We have evolved the Erlang virtual machine so that it can work effectively in large scale single-host multicore and NUMA architectures. We have made important changes and architectural improvements to the widely used Erlang/OTP release. (2) We have designed and implemented Scalable Distributed (SD) Erlang libraries to address language-level scalability issues, and provided and validated a set of semantics for the new language constructs. (3) To make large Erlang systems easier to deploy, monitor, and debug we have developed and made open source releases of five complementary tools, some specific to SD Erlang. Throughout the article we use two case studies to investigate the capabilities of our new technologies and tools: a distributed hash table based Orbit calculation and Ant Colony Optimisation (ACO). Chaos Monkey experiments show that two versions of ACO survive random process failure and hence that SD Erlang preserves the Erlang reliability model. While we report measurements on a range of NUMA and cluster architectures, the key scalability experiments are conducted on the Athos cluster with 256 hosts (6144 cores). Even for programs with no global recovery data to maintain, SD Erlang partitions the network to reduce network traffic and hence improves performance of the Orbit and ACO benchmarks above 80 hosts. ACO measurements show that maintaining global recovery data dramatically limits scalability; however scalability is recovered by partitioning the recovery data. We exceed the established scalability limits of distributed Erlang, and do not reach the limits of SD Erlang for these benchmarks at this scale (256 hosts, 6144 cores). 1 I. Introduction stant messaging server [77]. In Erlang, the actors are termed processes and are managed by a sophisticated Virtual Machine on a single multicore or NUMA host, while distributed Erlang provides relatively transparent distribution over networks of VMs on multiple hosts. Erlang is supported by the Open Telecom Platform (OTP) libraries that capture common patterns of reliable distributed computation, such as the client-server pattern and process supervision. Any largescale system needs scalable persistent storage and, following the CAP theorem [39], Erlang uses and indeed implements Dynamostyle NoSQL DBMS like Riak [49] and Cassandra [50]. While the Erlang distributed actor model conceptually provides reliable scalability, it has some inherent scalability limits, and indeed large-scale distributed Erlang systems must depart from the distributed Erlang paradigm in order to scale, e.g. not maintaining a fully connected graph of hosts. The EU FP7 RELEASE project set out to establish and address the scalability limits of the Erlang reliable distributed actor model [67]. After outlining related work (Section II) and the benchmarks used throughout the article (Section III) we investigate the scalability limits of Erlang/OTP, seeking to identify specific issues at the virtual machine, language and persistent storage levels (Section IV). We then report the RELEASE project work to address these issues, working at the following three levels. Distributed programming languages and frameworks are central to engineering large scale systems, where key properties include scalability and reliability. By scalability we mean that performance increases as hosts and cores are added, and by large scale we mean architectures with hundreds of hosts and tens of thousands of cores. Experience with high performance and data centre computing shows that reliability is critical at these scales, e.g. host failures alone account for around one failure per hour on commodity servers with approximately 105 cores [11]. To be usable, programming languages employed on them must be supported by a suite of deployment, monitoring, refactoring and testing tools that work at scale. Controlling shared state is the only way to build reliable scalable systems. State shared by multiple units of computation limits scalability due to high synchronisation and communication costs. Moreover shared state is a threat for reliability as failures corrupting or permanently locking shared state may poison the entire system. Actor languages avoid shared state: actors or processes have entirely local state, and only interact with each other by sending messages [2]. Recovery is facilitated in this model, since actors, like operating system processes, can fail independently without affecting the state of other actors. Moreover an actor can supervise other actors, detecting failures and taking remedial action, e.g. restarting the failed actor. Erlang [6, 19] is a beacon language for reliable scalable computing with a widely emulated distributed actor model. It has influenced the design of numerous programming languages like Clojure [43] and F# [74], and many languages have Erlang-inspired actor frameworks, e.g. Kilim for Java [73], Cloud Haskell [31], and Akka for C#, F# and Scala [64]. Erlang is widely used for building reliable scalable servers, e.g. Ericssonโ€™s AXD301 telephone exchange (switch) [79], the Facebook chat server, and the Whatsapp in- 1. We have designed and implemented a set of Scalable Distributed (SD) Erlang libraries to address language-level reliability and scalability issues. An operational semantics is provided for the key new s_group construct, and the implementation is validated against the semantics (Section V). 2. We have evolved the Erlang virtual machine so that it can work effectively in large-scale single-host multicore and NUMA architectures. We have improved the shared 2 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 ETS tables, time management, and load balancing between schedulers. Most of these improvements are now included in the Erlang/OTP release, currently downloaded approximately 50K times each month (Section VI). 3. To facilitate the development of scalable Erlang systems, and to make them maintainable, we have developed three new tools: Devo, SDMon and WombatOAM, and enhanced two others: the visualisation tool Percept, and the refactorer Wrangler. The tools support refactoring programs to make them more scalable, easier to deploy at large scale (hundreds of hosts), easier to monitor and visualise their behaviour. Most of these tools are freely available under open source licences; the WombatOAM deployment and monitoring tool is a commercial product (Section VII). Throughout the article we use two benchmarks to investigate the capabilities of our new technologies and tools. These are a computation in symbolic algebra, more specifically an algebraic โ€˜orbitโ€™ calculation that exploits a non-replicated distributed hash table, and an Ant Colony Optimisation (ACO) parallel search program (Section III). We report on the reliability and scalability implications of our new technologies using Orbit, ACO, and other benchmarks. We use a Chaos Monkey instance [14] that randomly kills processes in the running system to demonstrate the reliability of the benchmarks and to show that SD Erlang preserves the Erlang language-level reliability model. While we report measurements on a range of NUMA and cluster architectures as specified in Appendix A, the key scalability experiments are conducted on the Athos cluster with 256 hosts and 6144 cores. Having established scientifically the folklore limitations of around 60 connected hosts/nodes for distributed Erlang systems in Section 4, a key result is to show that the SD Erlang benchmarks exceed this limit and do not reach their limits on the Athos clus- ter (Section VIII). Contributions. This article is the first systematic presentation of the coherent set of technologies for engineering scalable reliable Erlang systems developed in the RELEASE project. Section IV presents the first scalability study covering Erlang VM, language, and storage scalability. Indeed we believe it is the first comprehensive study of any distributed actor language at this scale (100s of hosts, and around 10K cores). Individual scalability studies, e.g. into Erlang VM scaling [8], or language and storage scaling have appeared before [38, 37]. At the language level the design, implementation and validation of the new libraries (Section V) have been reported piecemeal [21, 60], and are included here for completeness. While some of the improvements made to the Erlang Virtual Machine (Section i) have been thoroughly reported in conference publications [66, 46, 47, 69, 70, 71], others are reported here for the first time (Sections iii, ii). In Section VII, the WombatOAM and SDMon tools are described for the first time, as is the revised Devo system and visualisation. The other tools for profiling, debugging and refactoring developed in the project have previously been published piecemeal [52, 53, 55, 10], but this is their first unified presentation. All of the performance results in Section VIII are entirely new, although a comprehensive study of SD Erlang performance is now available in a recent article by [22]. II. Context i. Scalable Reliable Programming Models There is a plethora of shared memory concurrent programming models like PThreads or Java threads, and some models, like OpenMP [20], are simple and high level. However synchronisation costs mean that these models generally do not scale well, often struggling to exploit even 100 cores. Moreover, re3 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 liability mechanisms are greatly hampered by the shared state: for example, a lock becomes permanently unavailable if the thread holding it fails. The High Performance Computing (HPC) community build large-scale (106 core) distributed memory systems using the de facto standard MPI communication libraries [72]. Increasingly these are hybrid applications that combine MPI with OpenMP. Unfortunately, MPI is not suitable for producing general purpose concurrent software as it is too low level with explicit message passing. Moreover, the most widely used MPI implementations offer no fault recovery:1 if any part of the computation fails, the entire computation fails. Currently the issue is addressed by using what is hoped to be highly reliable computational and networking hardware, but there is intense research interest in introducing reliability into HPC applications [33]. Server farms use commodity computational and networking hardware, and often scale to around 105 cores, where host failures are routine. They typically perform rather constrained computations, e.g. Big Data Analytics, using reliable frameworks like Google MapReduce [26] or Hadoop [78]. The idempotent nature of the analytical queries makes it relatively easy for the frameworks to provide implicit reliability: queries are monitored and failed queries are simply re-run. In contrast, actor languages like Erlang are used to engineer reliable general purpose computation, often recovering failed stateful computations. ii. Actor Languages The actor model of concurrency consists of independent processes communicating by means of messages sent asynchronously between processes. A process can send a message to any other process for which it has the address (in Erlang the โ€œprocess identifierโ€ or pid), and the remote process may reside on a different host. While the notion of actors originated 1 Some fault tolerance is provided in less widely used MPI implementations like [27]. 4 in AI [42], it has been used widely as a general metaphor for concurrency, as well as being incorporated into a number of niche programming languages in the 1970s and 80s. More recently it has come back to prominence through the rise of not only multicore chips but also larger-scale distributed programming in data centres and the cloud. With built-in concurrency and data isolation, actors are a natural paradigm for engineering reliable scalable general-purpose systems [1, 41]. The model has two main concepts: actors that are the unit of computation, and messages that are the unit of communication. Each actor has an address-book that contains the addresses of all the other actors it is aware of. These addresses can be either locations in memory, direct physical attachments, or network addresses. In a pure actor language, messages are the only way for actors to communicate. After receiving a message an actor can do the following: (i) send messages to another actor from its address-book, (ii) create new actors, or (iii) designate a behaviour to handle the next message it receives. The model does not impose any restrictions in the order in which these actions must be taken. Similarly, two messages sent concurrently can be received in any order. These features enable actor based systems to support indeterminacy and quasicommutativity, while providing locality, modularity, reliability and scalability [41]. Actors are just one message-based paradigm, and other languages and libraries have related message passing paradigms. Recent example languages include Go [28] and Rust [62] that provide explicit channels, similar to actor mailboxes. Probably the most famous message passing library is MPI [72], with APIs for many languages and widely used on clusters and High Performance Computers. It is, however, arguable that the most important contribution of the actor model is the one-way asynchronous communication [41]. Messages are not coupled with the sender, and neither they are transferred synchronously to a temporary container where transmission takes place, e.g. a buffer, a queue, or a mailbox. Once a message is sent, P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 the receiver is the only entity responsible for that message. Erlang [6, 19] is the pre-eminent programming language based on the actor model, having a history of use in production systems, initially with its developer Ericsson and then more widely through open source adoption. There are now actor frameworks for many other languages; these include Akka for C#, F# and Scala [64], CAF2 for C++, Pykka3 , Cloud Haskell [31], PARLEY [51] for Python, and Termite Scheme [35], and each of these is currently under active use and development. Moreover, the recently defined Rust language [62] has a version of the actor model built in, albeit in an imperative context. iii. Erlangโ€™s Support for Concurrency In Erlang, actors are termed processes, and virtual machines are termed nodes. The key elements of the actor model are: fast process creation and destruction; lightweight processes, e.g. enabling 106 concurrent processes on a single host with 8GB RAM; fast asynchronous message passing with copying semantics; process monitoring; strong dynamic typing, and selective message reception. By default Erlang processes are addressed by their process identifier (pid), e.g. Pong_PID = spawn(fun some_module:pong/0) spawns a process to execute the anonymous function given as argument to the spawn primitive, and binds Pong_PID to the new process identifier. Here the new process will execute the pong/0 function which is defined in some_module. A subsequent call Pong_PID ! finish sends the messaged finish to the process identified by Pong_PID. Alternatively, processes can be given names using a call of the form: register(my_funky_name, Pong_PID) 2 http://actor-framework.org 3 http://pykka.readthedocs.org/en/latest/ which registers this process name in the nodeโ€™s process name table if not already present. Subsequently, these names can be used to refer to or communicate with the corresponding processes (e.g. send them a message): my_funky_process ! hello. A distributed Erlang system executes on multiple nodes, and the nodes can be freely deployed across hosts, e.g. they can be located on the same or different hosts. To help make distribution transparent to the programmer, when any two nodes connect they do so transitively, sharing their sets of connections. Without considerable care this quickly leads to a fully connected graph of nodes. A process may be spawned on an explicitly identified node, e.g. Remote_Pong_PID = spawn(some_node, fun some_module:pong/0). After this, the remote process can be addressed just as if it were local. It is a significant burden on the programmer to identify the remote nodes in large systems, and we will return to this in Sections ii, i.2. iv. Scalability and Erlang Systems Reliability in Erlang was designed to solve a particular set of problems, namely those in building telecommunicationsโ€™ infrastructure, where systems need to be scalable to accommodate hundreds of thousands of calls concurrently, in soft real-time. These systems need to be highlyavailable and reliable: i.e. to be robust in the case of failure, which can come from software or hardware faults. Given the inevitability of the latter, Erlang adopts the โ€œlet it failโ€ philosophy for error handling. That is, encourage programmers to embrace the fact that a process may fail at any point, and have them rely on the supervision mechanism, discussed shortly, to handle the failures. Figure 1 illustrates Erlangโ€™s support for concurrency, multicores and distribution. Each Erlang node is represented by a yellow shape, 5 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 1: Conceptual view of Erlangโ€™s concurrency, multicore support and distribution. and each rectangle represents a host with an IP address. Each red arc represents a connection between Erlang nodes. Each node can run on multiple cores, and exploit the inherent concurrency provided. This is done automatically by the VM, with no user intervention needed. Typically each core has an associated scheduler that schedules processes; a new process will be spawned on the same core as the process that spawns it, but work can be moved to a different scheduler through a work-stealing allocation algorithm. Each scheduler allows a process that is ready to compute at most a fixed number of computation steps before switching to another. Erlang built-in functions or BIFs are implemented in C, and at the start of the project were run to completion once scheduled, causing performance and responsiveness problems if the BIF had a long execution time. Scaling in Erlang is provided in two different ways. It is possible to scale within a single node by means of the multicore virtual machine exploiting the concurrency provided by the multiple cores or NUMA nodes. It is also possible to scale across multiple hosts using multiple distributed Erlang nodes. Reliability in Erlang is multi-faceted. As in all actor languages each process has private state, preventing a failed or failing process from corrupting the state of other processes. Messages enable stateful interaction, and contain a deep copy of the value to be shared, with no references (e.g. pointers) to the sendersโ€™ internal state. Moreover Erlang avoids type errors by enforcing strong typing, albeit dynamically [7]. Connected nodes check liveness 6 with heartbeats, and can be monitored from outside Erlang, e.g. by an operating system process. However, the most important way to achieve reliability is supervision, which allows a process to monitor the status of a child process and react to any failure, for example by spawning a substitute process to replace a failed process. Supervised processes can in turn supervise other processes, leading to a supervision tree. The supervising and supervised processes may be in different nodes, and on different hosts, and hence the supervision tree may span multiple hosts or nodes. To provide reliable distributed service registration, a global namespace is maintained on every node, which maps process names to pids. It is this that we mean when we talk about a โ€˜reliableโ€™ system: it is one in which a named process in a distributed system can be restarted without requiring the client processes also to be restarted (because the name can still be used for communication). To see global registration in action, consider a pong server process global:register_name(pong_server, Remote_Pong_PID). Clients of the server can send messages to the registered name, e.g. global:whereis_name(pong_server)!finish. If the server fails the supervisor can spawn a replacement server process with a new pid and register it with the same name (pong_server). Thereafter client messages to the pong_server will be delivered to the new server process. We return to discuss the scalability limitations of maintaining a global namespace in Section V. v. ETS: Erlang Term Storage Erlang is a pragmatic language and the actor model it supports is not pure. Erlang processes, besides communicating via asynchronous message passing, can also share data in public memory areas called ETS tables. P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 The Erlang Term Storage (ETS) mechanism is a central component of Erlangโ€™s implementation. It is used internally by many libraries and underlies the in-memory databases. ETS tables are key-value stores: they store Erlang tuples where one of the positions in the tuple serves as the lookup key. An ETS table has a type that may be either set, bag or duplicate_bag, implemented as a hash table, or ordered_set which is currently implemented as an AVL tree. The main operations that ETS supports are table creation, insertion of individual entries and atomic bulk insertion of multiple entries in a table, deletion and lookup of an entry based on some key, and destructive update. The operations are implemented as C built-in functions in the Erlang VM. The code snippet below creates a set ETS table keyed by the first element of the entry; atomically inserts two elements with keys some_key and 42; updates the value associated with the table entry with key 42; and then looks up this entry. Table = ets:new(my_table, [set, public, {keypos, 1}]), ets:insert(Table, [ {some_key, an_atom_value}, {42, {a,tuple,value}}]), ets:update_element(Table, 42, [{2, {another,tuple,value}}]), [{Key, Value}] = ets:lookup(Table, 42). ETS tables are heavily used in many Erlang applications. This is partly due to the convenience of sharing data for some programming tasks, but also partly due to their fast implementation. As a shared resource, however, ETS tables induce contention and become a scalability bottleneck, as we shall see in Section i. III. Benchmarks for scalability and reliability The two benchmarks that we use throughout this article are Orbit, that measures scalability without looking at reliability, and Ant Colony Optimisation (ACO) that allows us to measure the impact on scalability of adding global namespaces to ensure reliability. The source code for the benchmarks, together with more detailed documentation, is available at https://github. com/release-project/benchmarks/. The RELEASE project team also worked to improve the reliability and scalability of other Erlang programs including a substantial (approximately 150K lines of Erlang code) SimDiasca simulator [16] and an Instant Messenger that is more typical of Erlang applications [23] but we do not cover these systematically here. i. Orbit Orbit is a computation in symbolic algebra, which generalises a transitive closure computation [57]. To compute the orbit for a given space [0..X ], a list of generators g1 , g2 , ..., gn are applied on an initial vertex x0 โˆˆ [0..X ]. This creates new values ( x1 ...xn ) โˆˆ [0..X ], where xi = gi ( x0 ). The generator functions are applied on the new values until no new value is generated. Orbit is a suitable benchmark because it has a number of aspects that characterise a class of real applications. The core data structure it maintains is a set and, in distributed environments is implemented as a distributed hash table (DHT), similar to the DHTs used in replicated form in NoSQL database management systems. Also, in distributed mode, it uses standard peer-to-peer (P2P) techniques like a credit-based termination algorithm [61]. By choosing the orbit size, the benchmark can be parameterised to specify smaller or larger computations that are suitable to run on a single machine (Section i) or on many nodes (Sectioni). Moreover it is only a few hundred lines of code. As shown in Figure 2, the computation is initiated by a master which creates a number of workers. In the single node scenario of the benchmark, workers correspond to processes but these workers can also spawn other processes to apply the generator functions on a subset of their input values, thus creating intraworker parallelism. In the distributed version 7 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 2: Distributed Erlang Orbit (D-Orbit) architecture: workers are mapped to nodes. of the benchmark, processes are spawned by the master node to worker nodes, each maintaining a DHT fragment. A newly spawned process gets a share of the parentโ€™s credit, and returns this on completion. The computation is finished when the master node collects all credit, i.e. all workers have completed. ii. Ant Colony Optimisation (ACO) Ant Colony Optimisation [29] is a metaheuristic which has been applied to a large number of combinatorial optimisation problems. For the purpose of this article, we have applied it to an NP-hard scheduling problem known as the Single Machine Total Weighted Tardiness Problem (SMTWTP) [63], where a number of jobs of given lengths have to be arranged in a single linear schedule. The goal is to minimise the cost of the schedule, as determined by certain constraints. The ACO method is attractive from the point of view of distributed computing because it can benefit from having multiple cooperating colonies, each running on a separate compute node and consisting of multiple โ€œantsโ€. Ants are simple computational agents which concur- Figure 3: Distributed Erlang Two-level Ant Colony Optimisation (TL-ACO) architecture. 8 rently compute possible solutions to the input problem guided by shared information about good paths through the search space; there is also a certain amount of stochastic variation which allows the ants to explore new directions. Having multiple colonies increases the number of ants, thus increasing the probability of finding a good solution. We implement four distributed coordination patterns for the same multi-colony ACO computation as follows. In each implementation, the individual colonies perform some number of local iterations (i.e. generations of ants) and then report their best solutions; the globallybest solution is then selected and is reported to the colonies, which use it to update their pheromone matrices. This process is repeated for some number of global iterations. Two-level ACO (TL-ACO) has a single master node that collects the coloniesโ€™ best solutions and distributes the overall best solution back to the colonies. Figure 3 depicts the process and node placements of the TL-ACO in a cluster with NC nodes. The master process spawns NC colony processes on available nodes. In the next step, each colony process spawns NA ant processes on the local node. Each ant iterates I A times, returning its result to the colony master. Each colony iterates I M times, reporting their best solution to, and receiving the globally-best solution from, the master process. We validated the implementation by applying TL-ACO to a number of standard SMTWTP instances [25, 13, 34], obtaining good results in all cases, and confirmed that the number of perfect solutions increases as we increase the number of colonies. Multi-level ACO (ML-ACO). In TL-ACO the master node receives messages from all of the colonies, and thus could become a bottleneck. ML-ACO addresses this by having a tree of submasters (Figure 4), with each node in the bottom level collecting results from a small number of colonies. These are then fed up through the tree, with nodes at higher levels selecting the best solutions from their children. Globally Reliable ACO (GR-ACO). In ML-ACO if a single colony fails to report back the sys- P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 4: Distributed Erlang Multi-level Ant Colony Optimisation (ML-ACO) architecture. tem will wait indefinitely. GR-ACO adds fault tolerance, supervising colonies so that a faulty colony can be detected and restarted, allowing the system to continue execution. Scalable Reliable ACO (SR-ACO) also adds fault-tolerance, but using supervision within our new s_groups from Section i.1, and the architecture of SR-ACO is discussed in detail there. i. Scaling Erlang on a Single Host To investigate Erlang scalability we built BenchErl, an extensible open source benchmark suite with a web interface.4 BenchErl shows how an applicationโ€™s performance changes when resources, like cores or schedulers, are added; or when options that control these resources change: โ€ข the number of nodes, i.e. the number of Erlang VMs used, typically on multiple hosts; IV. Erlang Scalability Limits This section investigates the scalability of Erlang at VM, language, and persistent storage levels. An aspect we choose not to explore is the security of large scale systems where, for example, one might imagine providing enhanced security for systems with multiple clusters or cloud instances connected by a Wide Area Network. We assume that existing security mechanisms are used, e.g. a Virtual Private Network. โ€ข the number of cores per node; โ€ข the number of schedulers, i.e. the OS threads that execute Erlang processes in parallel, and their binding to the topology of the cores of the underlying computer node; โ€ข the Erlang/OTP release and flavor; and โ€ข the command-line arguments used to start the Erlang nodes. 4 Information about BenchErl is available at http:// release.softlab.ntua.gr/bencherl/. 9 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 20000 with intra-worker parallelism, 10048, 128 without intra-worker parallelism, 10048, 128 18000 16000 time (ms) 14000 12000 10000 8000 6000 4000 2000 0 0 10 20 30 40 50 60 70 60 70 # Schedulers 40 with intra-worker parallelism, 10048, 128 without intra-worker parallelism, 10048, 128 35 30 Speedup 25 20 15 10 5 0 0 10 20 30 40 50 # Schedulers Figure 5: Runtime and speedup of two configurations of the Orbit benchmark using Erlang/OTP R15B01. Using BenchErl, we investigated the scalability of an initial set of twelve benchmarks and two substantial Erlang applications using a single Erlang node (VM) on machines with up to 64 cores, including the Bulldozer machine specified in Appendix A. This set of experiments, reported by [8], confirmed that some programs scaled well in the most recent Erlang/OTP release of the time (R15B01) but also revealed VM and language level scalability bottlenecks. Figure 5 shows runtime and speedup curves for the Orbit benchmark where master and workers run on a single Erlang node in configurations with and without intra-worker parallelism. In both configurations the program scales. Runtime continuously decreases as we add more schedulers to exploit more cores. The speedup of the benchmark without intraworker parallelism, i.e. without spawning additional processes for the computation (green 10 curve), is almost linear up to 32 cores but increases less rapidly from that point on; we see a similar but more clearly visible pattern for the other configuration (red curve) where there is no performance improvement beyond 32 schedulers. This is due to the asymmetric characteristics of the machineโ€™s micro-architecture, which consists of modules that couple two conventional x86 out-of-order cores that share the early pipeline stages, the floating point unit, and the L2 cache with the rest of the module [3]. Some other benchmarks, however, did not scale well or experienced significant slowdowns when run in many VM schedulers (threads). For example the ets_test benchmark has multiple processes accessing a shared ETS table. Figure 6 shows runtime and speedup curves for ets_test on a 16-core (eight cores with hyperthreading) Intel Xeon-based machine. It shows that runtime increases beyond two schedulers, and that the program exhibits a slowdown instead of a speedup. For many benchmarks there are obvious reasons for poor scaling like limited parallelism in the application, or contention for shared resources. The reasons for poor scaling are less obvious for other benchmarks, and it is exactly these we have chosen to study in detail in subsequent work [8, 46]. A simple example is the parallel BenchErl benchmark, that spawns some n processes, each of which creates a list of m timestamps and, after it checks that each timestamp in the list is strictly greater than the previous one, sends the result to its parent. Figure 7 shows that up to eight cores each additional core leads to a slowdown, thereafter a small speedup is obtained up to 32 cores, and then again a slowdown. A small aspect of the benchmark, easily overlooked, explains the poor scalability. The benchmark creates timestamps using the erlang:now/0 built-in function, whose implementation acquires a global lock in order to return a unique timestamp. That is, two calls to erlang:now/0, even from different processes are guaranteed to produce monotonically increasing values. This lock is precisely the bot- P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 10000 160000 [2512,1264,640] 9000 8000 120000 7000 100000 time (ms) time (ms) [70016,640] 140000 6000 5000 80000 60000 4000 40000 3000 20000 2000 1000 0 0 2 4 6 8 10 12 14 16 0 10 20 30 # Schedulers 40 50 60 70 # Schedulers 1.6 1 [2512,1264,640] [70016,640] 0.9 1.4 0.8 1.2 Speedup Speedup 0.7 1 0.8 0.6 0.5 0.4 0.6 0.3 0.4 0.2 0.2 0.1 0 2 4 6 8 10 12 14 16 # Schedulers 0 10 20 30 40 50 60 70 # Schedulers Figure 6: Runtime and speedup of the ets_test BenchErl benchmark using Erlang/OTP R15B01. Figure 7: Runtime and speedup of the BenchErl benchmark called parallel using Erlang/OTP R15B01. tleneck in the VM that limits the scalability of this benchmark. We describe our work to address VM timing issues in Figure iii. tion as there is no need to discover nodes, and the design works well for small numbers of nodes. However at emergent server architecture scales, i.e. hundreds of nodes, this design becomes very expensive and system architects must switch from the default Erlang model, e.g. they need to start using hidden nodes that do not share connection sets. We have investigated the scalability limits imposed by network connectivity costs using several Orbit calculations on two large clusters: Kalkyl and Athos as specified in Appendix A. The Kalkyl results are discussed by [21], and Figure 29 in Section i shows representative results for distributed Erlang computing orbits with 2M and 5M elements on Athos. In all cases performance degrades beyond some scale (40 nodes for the 5M orbit, and 140 nodes for the 2M orbit). Figure 32 illustrates the additional network traffic induced by the fully connected network. It allows a comparison be- Discussion Our investigations identified contention for shared ETS tables, and for commonly-used shared resources like timers, as the key VM-level scalability issues. Section VI outlines how we addressed these issues in recent Erlang/OTP releases. ii. Distributed Erlang Scalability Network Connectivity Costs When any normal distributed Erlang nodes communicate, they share their connection sets and this typically leads to a fully connected graph of nodes. So a system with n nodes will maintain O(n2 ) connections, and these are relatively expensive TCP connections with continual maintenance traffic. This design aids transparent distribu- 11 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 tween the number of packets sent in a fully connected network (ML-ACO) with those sent in a network partitioned using our new s_groups (SR-ACO). paper [37] investigates the impact of data size, and computation time in P2P calls both independently and in combination, and the scaling properties of the common Erlang/OTP generic server processes gen_server and gen_fsm. Global Information Costs Maintaining global information is known to limit the scalability of distributed systems, and crucially the process namespaces used for reliability are global. To investigate the scalability limits imposed on distributed Erlang by such global information we have designed and implemented DE-Bench, an open source, parameterisable and scalable peer-to-peer benchmarking framework [37, 36]. DE-Bench measures the throughput and latency of distributed Erlang commands on a cluster of Erlang nodes, and the design is influenced by the Basho Bench benchmarking tool for Riak [12]. Each DE-Bench instance acts as a peer, providing scalability and reliability by eliminating central coordination and any single point of failure. To evaluate the scalability of distributed Erlang, we measure how adding more hosts increases the throughput, i.e. the total number of successfully executed distributed Erlang commands per experiment. Figure 8 shows the parameterisable internal workflow of DEBench. There are three classes of commands in DE-Bench:(i) Point-to-Point (P2P) commands, where a function with tunable argument size and computation time is run on a remote node, include spawn, rpc, and synchronous calls to server processes, i.e. gen_server or gen_fsm. (ii) Global commands, which entail synchronisation across all connected nodes, such as global:register_name and global:unregister_name. (iii) Local commands, which are executed independently by a single node, e.g. whereis_name, a look up in the local name table. The benchmarking is conducted on 10 to 100 host configurations of the Kalkyl cluster (in steps of 10) and measures the throughput of successful commands per second over 5 minutes. There is one Erlang VM on each host and one DE-Bench instance on each VM. The full Here we focus on the impact of different proportions of global commands, mixing global with P2P and local commands. Figure 9 shows that even a low proportion of global commands limits the scalability of distributed Erlang, e.g. just 0.01% global commands limits scalability to around 60 nodes. Figure 10 reports the latency of all commands and shows that, while the latencies for P2P and local commands are stable at scale, the latency of the global commands increases dramatically with scale. Both results illustrate that the impact of global operations on throughput and latency in a distributed Erlang system is severe. 12 Explicit Placement While network connectivity and global information impact performance at scale, our investigations also identified explicit process placement as a programming issue at scale. Recall from Section iii that distributed Erlang requires the programmer to identify an explicit Erlang node (VM) when spawning a process. Identifying an appropriate node becomes a significant burden for large and dynamic systems. The problem is exacerbated in large distributed systems where (1) the hosts may not be identical, having different hardware capabilities or different software installed; and (2) communication times may be non-uniform: it may be fast to send a message between VMs on the same host, and slow if the VMs are on different hosts in a large distributed system. These factors make it difficult to deploy applications, especially in a scalable and portable manner. Moreover while the programmer may be able to use platform-specific knowledge to decide where to spawn processes to enable an application to run efficiently, if the application is then deployed on a different platform, or if the platform changes as hosts fail or are added, this becomes outdated. P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 8: DE-Benchโ€™s internal workflow. Figure 9: Scalability vs. percentage of global commands in Distributed Erlang. Discussion Our investigations confirm three language-level scalability limitations of Erlang from developer folklore.(1) Maintaining a fully connected network of Erlang nodes limits scalability, for example Orbit is typically limited to just 40 nodes. (2) Global operations, and crucially the global operations required for reliability, i.e. to maintain a global namespace, seriously limit the scalability of distributed Erlang systems. (3) Explicit process placement makes it hard to built performance portable applications for large architectures. These issues cause designers of reliable large scale systems in Erlang to depart from the standard Erlang model, e.g. using techniques like hidden nodes and stor- ing pids in data structures. In Section V we develop language technologies to address these issues. iii. Persistent Storage Any large scale system needs reliable scalable persistent storage, and we have studied the scalability limits of Erlang persistent storage alternatives [38]. We envisage a typical large server having around 105 cores on around 100 hosts. We have reviewed the requirements for scalable and available persistent storage and evaluated four popular Erlang DBMS against these requirements. For a target scale 13 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 10: Latency of commands as the number of Erlang nodes increases. of around 100 hosts, Mnesia and CouchDB are, unsurprisingly, not suitable. However, Dynamo-style NoSQL DBMS like Cassandra and Riak have the potential to be. We have investigated the current scalability limits of the Riak NoSQL DBMS using the Basho Bench benchmarking framework on a cluster with up to 100 nodes and independent disks. We found that that the scalability limit of Riak version 1.1.1 is 60 nodes on the Kalkyl cluster. The study placed into the public scientific domain what was previously well-evidenced, but anecdotal, developer experience. We have also shown that resources like memory, disk, and network do not limit the scalability of Riak. By instrumenting the global and gen_server OTP libraries we identified a specific Riak remote procedure call that fails to scale. We outline how later releases of Riak are refactored to eliminate the scalability bottlenecks. Discussion We conclude that Dynamo-like NoSQL DBMSs have the potential to deliver reliable persistent storage for Erlang at our target scale of approximately 100 hosts. Specifically an Erlang Cassandra interface is available and Riak 1.1.1 already provides scalable and available persistent storage on 60 nodes. Moreover 14 the scalability of Riak is much improved in subsequent versions. V. Improving Language Scalability This section outlines the Scalable Distributed (SD) Erlang libraries [21] we have designed and implemented to address the distributed Erlang scalability issues identified in Section ii. SD Erlang introduces two concepts to improve scalability. S_groups partition the set of nodes in an Erlang system to reduce network connectivity and partition global data (Section i.1). Semi-explicit placement alleviates the issues of explicit process placement in large heterogeneous networks (Section i.2). The two features are independent and can be used separately or in combination. We overview SD Erlang in Section i, and outline s_group semantics and validation in Sections ii, iii respectively. i. SD Erlang Design i.1 S_groups reduce both the number of connections a node maintains, and the size of name spaces, i.e. they minimise global information. Specifically names are registered on, and synchronised between, only the nodes within the s_group. An s_group has the following parameters: a name, P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 a list of nodes, and a list of registered names. A node can belong to many s_groups or to none. If a node belongs to no s_group it behaves as a usual distributed Erlang node. The s_group library defines the functions shown in Table 1. Some of these functions manipulate s_groups and provide information about them, such as creating s_groups and providing a list of nodes from a given s_group. The remaining functions manipulate names registered in s_groups and provide information about these names. For example, to register a process, Pid, with name Name in s_group SGroupName we use the following function. The name will only be registered if the process is being executed on a node that belongs to the given s_group, and neither Name nor Pid are already registered in that group. s_group:register_name(SGroupName, Name, Pid) -> yes | no To illustrate the impact of s_groups on scalability we repeat the global operations experiment from Section ii (Figure 9). In the SD Erlang experiment we partition the set of nodes into s_groups each containing ten nodes, and hence the names are replicated and synchronised on just ten nodes, and not on all nodes as in distributed Erlang. The results in Figure 11 show that with 0.01% of global operations throughput of distributed Erlang stops growing at 40 nodes while throughput of SD Erlang continues to grow linearly. The connection topology of s_groups is extremely flexible: they may be organised into a hierarchy of arbitrary depth or branching, e.g. there could be multiple levels in the tree of s_groups; see Figure 12. Moreover it is not necessary to create an hierarchy of s_groups, for example, we have constructed an Orbit implementation using a ring of s_groups. Given such a flexible way of organising distributed systems, key questions in the design of an SD Erlang system are the following. How should s_groups be structured? Depending on the reason the nodes are grouped โ€“ reducing the number of connections, or reducing the namespace, or both โ€“ s_groups can be freely structured as a tree, ring, or some other topology. How large should the s_groups be? Smaller s_groups mean more inter-group communication, but the synchronisation of the s_group state between the s_group nodes constrains the maximum size of s_groups. We have not found this constraint to be a serious restriction. For example many s_groups are either relatively small, e.g. 10-node, internal or terminal elements in some topology, e.g. the leaves and nodes of a tree. How do nodes from different s_groups communicate? While any two nodes can communicate in an SD Erlang system, to minimise the number of connections communication between nodes from different s_groups is typically routed via gateway nodes that belong to both s_groups. How do we avoid single points of failure? For reliability, and to minimise communication load, multiple gateway nodes and processes may be required. Information to make these design choices is provided by the tools in Section VII and by benchmarking. A further challenge is how to systematically refactor a distributed Erlang application into SD Erlang, and this is outlined in Section i. A detailed discussion of distributed system design and refactoring in SD Erlang provided in a recent article [22]. We illustrate typical SD Erlang system designs by showing refactorings of the Orbit and ACO benchmarks from Section III. In both distributed and SD Erlang the computation starts on the Master node and the actual computation is done on the Worker nodes. In the distributed Erlang version all nodes are interconnected, and messages are transferred directly from the sending node to the receiving node (Figure 2). In contrast, in the SD Erlang version nodes are grouped into s_groups, and messages are transferred between different s_groups via Submaster nodes (Figure 13). A fragment of code that creates an s_group on a Sub-master node is as follows: create_s_group(Master, GroupName, Nodes0) -> case s_group:new_s_group(GroupName, Nodes0) of {ok, GroupName, Nodes} -> 15 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Table 1: Summary of s_group functions. Function Description new_s_group(SGroupName, Nodes) Creates a new s_group consisting of some nodes. delete_s_group(SGroupName) Deletes an s_group. add_nodes(SGroupName, Nodes) Adds a list of nodes to an s_group. remove_nodes(SGroupName, Nodes) Removes a list of nodes from an s_group. s_groups() Returns a list of all s_groups known to the node. own_s_groups() Returns a list of s_group tuples the node belongs to. own_nodes() Returns a list of nodes from all s_groups the node belongs to. own_nodes(SGroupName) Returns a list of nodes from the given s_group. info() Returns s_group state information. register_name(SGroupName, Name, Pid) Registers a name in the given s_group. re_register_name(SGroupName, Name, Pid) Re-registers a name (changes a registration) in a given s_group. unregister_name(SGroupName, Name) Unregisters a name in the given s_group. registered_names({node,Node}) Returns a list of all registered names on the given node. registered_names({s_group,SGroupName}) Returns a list of all registered names in the given s_group. whereis_name(SGroupName, Name) Return the pid of a name registered in the given whereis_name(Node, SGroupName, Name) s_group. send(SGroupName, Name, Msg) Send a message to a name registered in the given send(Node, SGroupName, Name, Msg) s_group. Master ! {GroupName, Nodes}; _ -> io:format("exception: message") end. distributed Erlang and SD Erlang Orbit and ACO is presented in Section VIII. Similarly, we introduce s_groups in the GR-ACO benchmark from Section ii to create Scalable Reliable ACO (SR-ACO); see Figure 12. Here, apart from reducing the number of connections, s_groups also reduce the global namespace information. That is, instead of registering the name of a pid globally, i.e. with all nodes, the names is registered only on all nodes in the s_group with s_group:register_name/3. A comparative performance evaluation of i.2 16 Semi-Explicit Placement Recall from Section iii that distributed Erlang spawns a process onto an explicitly named Erlang node, e.g. spawn(some_node,fun some_module:pong/0). and also recall the portability and programming effort issues associated with such explicit placement in large scale systems discussed in Section ii. P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 1e+09 9e+08 Throughput 7e+08 5e+08 3e+08 1e+08 10 20 30 40 50 60 70 80 90 100 Number of nodes Distributed Erlang SD Erlang Figure 11: Global operations in Distributed Erlang vs. SD Erlang. represents a sub-master process represents a colony process master node Level 0 master process represents an ant process P1 represents an s_group P2 Level 1 P16 represents a node node1 node2 node16 node1 node1 node16 node1 node1 node16 colony nodes in this level Level 2 Figure 12: SD Erlang ACO (SR-ACO) architecture. To address these issues we have developed a semi-explicit placement library that enables the programmer to select nodes on which to spawn processes based on run-time information about the properties of the nodes. For example, if a process performs a lot of computation one would like to spawn it on a node with considerable computation power, or if two processes are likely to communicate frequently then it would be desirable to spawn them on the same node, or nodes with a fast interconnect. ated hosts, such as total and currently available RAM, installed software, hardware configuration, etc. The second deals with a notion of communication distances which models the communication times between nodes in a distributed system. Therefore, instead of specifying a node we can use the attr:choose_node/1 function to define the target node, i.e. We have implemented two Erlang libraries to support semi-explicit placement [60]. The first deals with node attributes, and describes properties of individual Erlang VMs and associ- [60] report an investigation into the communication latencies on a range of NUMA and cluster architectures, and demonstrate the effectiveness of the placement libraries using the spawn(attr:choose_node(Params), fun some_module:pong/0). 17 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 13: SD Erlang (SD-Orbit) architecture. ML-ACO benchmark on the Athos cluster. ii. S_group Semantics For precise specification, and as a basis for validation, we provide a small-step operational semantics of the s_group operations [21]. Figure 14 defines the state of an SD Erlang system and associated abstract syntax variables. The abstract syntax variables on the left are defined as members of sets, denoted {}, and these in turn may contain tuples, denoted (), or further sets. In particular nm is a process name, p a pid, ni a node_id, and nis a set of node_ids. The state of a system is modelled as a four tuple comprising a set of s_groups, a set of f ree_groups, a set of f ree_hidden_groups, and a set of nodes. Each type of group is associated with nodes and has a namespace. An s_group additionally has a name, whereas a f ree_hidden_group consists of only one node, i.e. a hidden node simultaneously acts as a node and as a group, because as a group it has a namespace but does not share it with any other node. Free normal and hidden groups have no names, and are uniquely defined by the nodes associated with them. Therefore, group names, gr_names, are either NoGroup or a set of s_group_names. A namespace is a set of name and process id, pid, pairs and is 18 replicated on all nodes of the associated group. A node has the following four parameters: node_id identifier, node_type that can be either hidden or normal, connections, and group_names, i.e. names of groups the node belongs to. The node can belong to either a list of s_groups or one of the free groups. The type of the free group is defined by the node type. Connections are a set of node_ids. Transitions in the semantics have the form (state, command, ni) โˆ’โ†’ (state0 , value) meaning that executing command on node ni in state returns value and transitions to state0 . The semantics is presented in more detail by [21], but we illustrate it here with the s_group:registered_names/1 function from Section i.1. The function returns a list of names registered in s_group s if node ni belongs to the s_group, an empty list otherwise (Figure 15). Here โŠ• denotes disjoint set union; IsSGroupNode returns true if node ni is a member of some s_group s, false otherwise; and OutputNms returns a set of process names registered in the ns namespace of s_group s. iii. Semantics Validation As the semantics is concrete it can readily be made executable in Erlang, with lists replacing sets throughout. Having an executable seman- P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017   (grs, fgs, fhs, nds) โˆˆ {state} โ‰ก {s_group}, {free_group}, {free_hidden_group}, {node}   gr โˆˆ grs โ‰ก {s_group} โ‰ก s_group_name, {node_id}, namespace   fg โˆˆ fgs โ‰ก {free_group} โ‰ก {node_id}, namespace   fh โˆˆ fhs โ‰ก {free_hidden_group} โ‰ก node_id, namespace   nd โˆˆ nds โ‰ก {node} โ‰ก node_id, node_type, connections, gr_names  gs โˆˆ { gr_names} โ‰ก NoGroup, {s_group_name}  ns โˆˆ {namespace} โ‰ก {(name, pid)}  cs โˆˆ {connections} โ‰ก {node_id} nt โˆˆ {node_type} โ‰ก { Normal, Hidden} s โˆˆ { NoGroup, s_group_name} Figure 14: SD Erlang state [21]. (grs,fgs, fhs, nds), s_group : registered_names(s), ni โˆ’โ†’ (grs, fgs, fhs, nds), nms)  โˆ’โ†’ (grs, fgs, fhs, nds), {} where  (s, {ni} โŠ• nis, ns) โŠ• grs0 โ‰ก grs nms โ‰ก OutputNms(s, ns)  if IsSGroupNode(ni, s, grs  otherwise  IsSGroupNode(ni, s, grs) = โˆƒnis, ns, grs0 . (s, {ni} โŠ• nis, ns) โŠ• grs0 โ‰ก grs  OutputNms(s, ns) = (s, nm) | (nm, p) โˆˆ ns Figure 15: SD Erlang Semantics of s_group:registered_names/1 Function tics allows users to engage with it, and to understand how the semantics behaves vis ร  vis the library, giving them an opportunity to assess the correctness of the library against the semantics. Better still, we can automatically assess how the system behaves in comparison with the (executable) semantics by executing them in lockstep, guided by the constraints of which operations are possible at each point. We do that by building an abstract state machine model of the library. We can then generate random sequences (or traces) through the model, with appropriate library data gener- ated too. This random generation is supported by the QuickCheck property-based testing system [24, 9]. The architecture of the testing framework is shown in Figure 16. First an abstract state machine embedded as an โ€œeqc_statemโ€ module is derived from the executable semantic specification. The state machine defines the abstract state representation and the transition from one state to another when an operation is applied. Test case and data generators are then defined to control the test case generation; this includes the automatic generation of eligible s_group operations and the input data to 19 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 those operations. Test oracles are encoded as the postcondition for s_group operations. During testing, each test command is applied to both the abstract model and the s_group library. The application of the test command to the abstract model takes the abstract model from its current state to a new state as described by the transition functions; whereas the application of the test command to the library leads the system to a new actual state. The actual state information is collected from each node in the distributed system, then merged and normalised to the same format as the abstract state representation. For a test to be successful, after the execution of a test command, the test oracles specified for this command should be satisfied. Various test oracles can be defined for s_group operations; for instance one of the generic constraints that applies to all the s_group operations is that after each s_group operation, the normalised system state should be equivalent to the abstract state. Thousands of tests were run, and three kinds of errors โ€” which have subsequently been corrected โ€” were found. Some errors in the library implementation were found, including one error due to the synchronisation between nodes, and the other related to the remove_nodes operation, which erroneously raised an exception. We also found a couple of trivial errors in the semantic specification itself, which had been missed by manual examination. Finally, we found some situations Figure 16: Testing s_groups using QuickCheck. 20 where there were inconsistencies between the semantics and the library implementation, despite their states being equivalent: an example of this was in the particular values returned by functions on certain errors. Overall, the automation of testing boosted our confidence in the correctness of the library implementation and the semantic specification. This work is reported in more detail by [54]. VI. Improving VM Scalability This section reports the primary VM and library improvements we have designed and implemented to address the scalability and reliability issues identified in Section i. i. Improvements to Erlang Term Storage Because ETS tables are so heavily used in Erlang systems, they are a focus for scalability improvements. We start by describing their redesign, including some improvements that pre-date our RELEASE project work, i.e. those prior to Erlang/OTP R15B03. These historical improvements are very relevant for a scalability study and form the basis for our subsequent changes and improvements. At the point when Erlang/OTP got support for multiple cores (in release R11B), there was a single reader-writer lock for each ETS table. Optional fine grained locking of hash-based ETS tables (i.e. set, bag or duplicate_bag tables) was introduced in Erlang/OTP R13B02-1, adding 16 reader-writer locks for the hash buckets. Reader groups to minimise read synchronisation overheads were introduced in Erlang/OTP R14B. The key observation is that a single count of the multiple readers must be synchronised across many cache lines, potentially far away in a NUMA system. Maintaining reader counts in multiple (local) caches makes reads fast, although writes must now check every reader count. In Erlang/OTP R16B the number of bucket locks, and the default number of reader groups, were both upgraded from 16 to 64. We illustrate the scaling properties of the P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 50 12 R11B-5 R13B02-1 R14B R16B 45 40 1 RG 2 RG 4 RG 8 RG 16 RG 32 RG 64 RG 10 35 8 30 6 25 20 4 15 10 2 5 0 0 60 10 20 30 40 50 60 70 R11B-5 R13B02-1 R14B R16B 50 0 0 10 20 30 40 50 14 12 10 40 60 70 1 RG 2 RG 4 RG 8 RG 16 RG 32 RG 64 RG 8 30 6 20 4 10 0 2 0 10 20 30 40 50 60 70 0 0 10 20 30 40 50 60 70 Figure 17: Runtime of 17M ETS operations in Erlang/OTP releases: 10% updates (left) and 1% updates (right). The y-axis shows time in seconds (lower is better) and the x-axis is number of OS threads (VM schedulers). Figure 18: Runtime of 17M ETS operations with varying numbers of reader groups: 10% updates (left) and 1% updates (right). The y-axis shows runtime in seconds (lower is better) and the x-axis is number of schedulers. ETS concurrency options using the ets_bench BenchErl benchmark on the Intel NUMA machine with 32 hyperthreaded cores specified in Appendix A. The ets_bench benchmark inserts 1M items into the table, then records the time to perform 17M operations, where an operation is either a lookup, an insert, or a delete. The experiments are conducted on a hash-based (set) ETS table with different percentages of update operations, i.e. insertions or deletions. Figure 17 shows the runtimes in seconds of 17M operations in different Erlang/OTP versions, varying the number of schedulers (xaxis), reflecting how the scalability of ETS tables has improved in more recent Erlang/OTP releases. Figure 18 shows the runtimes in seconds of 17M operations on an ETS table with different numbers of reader groups, again varying the number of schedulers. We see that one reader group is not sufficient with 10% updates, nor are two with 1% updates. Beyond that, different numbers of reader groups have little impact on the benchmark performance except that using 64 groups with 10% updates slightly degrades performance. We have explored four other extensions or redesigns in the ETS implementation for better scalability. 1. Allowing more programmer control over the number of bucket locks in hashbased tables, so the programmer can reflect the number of schedulers and the expected access pattern. 2. Using contention-adapting trees to get better scalability for ordered_set ETS tables as described by [69]. 3. Using queue delegation locking to improve scalability [47]. 4. Adopting schemes for completely eliminating the locks in the meta table. A more complete discussion of our work on ETS can be found in the papers by [69] and [47]. Here we outline only our work on contention-adapting (CA) trees. A CA tree monitors contention in different parts of a 21 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 ii. Operations / Microsecond 20 15 10 set ordset AVL-CA tree Treap-CA tree 5 0 0 10 20 30 40 Number of Threads 50 60 70 30 40 Number of Threads 50 60 70 Operations / Microsecond 25 20 set ordset AVL-CA tree Treap-CA tree 15 10 5 0 0 10 20 Figure 19: Throughput of CA tree variants: 10% updates (left) and 1% updates (right). tree-shaped data structure, introducing routing nodes with locks in response to high contention, and removing them in response to low contention. For experimental purposes two variants of the CA tree have been implemented to represent ordered_sets in the virtual machine of Erlang/OTP 17.0. One extends the existing AVL trees in the Erlang VM, and the other uses a Treap data structure [5]. Figure 19 compares the throughput of the CA tree variants with that of ordered_set and set as the number of schedulers increases. It is unsurprising that the CA trees scale so much better than an ordered_set which is protected by a single readers-writer lock. It is more surprising that they also scale better than set. This is due to hash tables using fine-grained locking at a fixed granularity, while CA trees can adapt the number of locks to the current contention level, and also to the parts of the key range where contention is occurring. 22 Improvements to Schedulers In the Erlang VM, a scheduler is responsible for executing multiple processes concurrently, in a timely and fair fashion, making optimal use of hardware resources. The VM implements preemptive multitasking with soft realtime guarantees. Erlang processes are normally scheduled on a reduction count basis where one reduction is roughly equivalent to a function call. Each process is allowed to execute until it either blocks waiting for input, typically a message from some other process, or until it has executed its quota of reductions. The Erlang VM is usually started with one scheduler per logical core (SMT-thread) available on the host machine, and schedulers are implemented as OS threads. When an Erlang process is spawned it is placed in the run queue of the scheduler of its parent, and it waits on that queue until the scheduler allocates it a slice of core time. Work stealing is used to balance load between cores, that is an idle scheduler may migrate a process from another run queue. Scheduler run queues are visualised in Figure iii.2. The default load management mechanism is load compaction that aims to keep as many scheduler threads as possible fully loaded with work, i.e. it attempts to ensure that scheduler threads do not run out of work. We have developed a new optional scheduler utilisation balancing mechanism that is available from Erlang/OTP 17.0. The new mechanism aims to balance scheduler utilisation between schedulers; that is, it will strive for equal scheduler utilisation on all schedulers. The scheduler utilisation balancing mechanism has no performance impact on the system when not enabled. On the other hand, when enabled, it results in changed timing in the system; normally there is a small overhead due to measuring of utilisation and calculating balancing information, which depends on the underlying primitives provided by the operating system. The new balancing mechanism results in a better distribution of processes to schedulers, P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 reducing the probability of core contention. Together with other VM improvements, such as interruptable BIFs and garbage collection, it results in lower latency and improved responsiveness, and hence reliability, for soft real-time applications. iii. Improvements to Time Management Soon after the start of the RELEASE project, time management in the Erlang VM became a scalability bottleneck for many applications, as illustrated by the parallel benchmark in Figure i. The issue came to prominence as other, more severe, bottlenecks were eliminated. This subsection motivates and outlines the improvements to time management that we made; these were incorporated into Erlang/OTP 18.x as a new API for time and time warping. The old API is still supported at the time of writing, but its use is deprecated. The original time API provides the erlang:now/0 built-in that returns โ€œErlang system timeโ€ or time since Epoch with micro second resolution. This time is the basis for all time internally in the Erlang VM. Many of the scalability problems of erlang:now/0 stem from its specification, written at a time when the Erlang VM was not multi-threaded, i.e. SMT-enabled. The documentation promises that values returned by it are strictly increasing and many applications ended up relying on this. For example applications often employ erlang:now/0 to generate unique integers. Erlang system time should align with the operating systemโ€™s view of time since Epoch or โ€œOS system timeโ€. However, while OS system time can be freely changed both forwards and backwards, Erlang system time cannot, without invalidating the strictly increasing value guarantee. The Erlang VM therefore contains a mechanism that slowly adjusts Erlang system time towards OS system time if they do not align. One problem with time adjustment is that the VM deliberately presents time with an in- accurate frequency; this is required to align Erlang system time with OS system time smoothly when these two have deviated, e.g. in the case of clock shifts when leap seconds are inserted or deleted. Another problem is that Erlang system time and OS system time can differ for very long periods of time. In the new API, we resolve this using a common OS technique [59], i.e. a monotonic time that has its zero point at some unspecified point in time. Monotonic time is not allowed to make leaps forwards and backwards while system time is allowed to do this. Erlang system time is thus just a dynamically varying offset from Erlang monotonic time. Time Retrieval Retrieval of Erlang system time was previously protected by a global mutex, which made the operation thread safe, but scaled poorly. Erlang system time and Erlang monotonic time need to run at the same frequency, otherwise the time offset between them would not be constant. In the common case, monotonic time delivered by the operating system is solely based on the machineโ€™s local clock and cannot be changed, while the system time is adjusted using the Network Time Protocol (NTP). That is, they will run with different frequencies. Linux is an exception with a monotonic clock that is NTP adjusted and runs with the same frequency as system time [76]. To align the frequencies of Erlang monotonic time and Erlang system time, we adjust the frequency of the Erlang monotonic clock. This is done by comparing monotonic time and system time delivered by the OS, and calculating an adjustment. To achieve this scalably, one VM thread calculates the time adjustment to use at least once a minute. If the adjustment needs to be changed, new adjustment information is published and used to calculate Erlang monotonic time in the future. When a thread needs to retrieve time, it reads the monotonic time delivered by the OS and the time adjustment information previously published and calculates Erlang monotonic time. To preserve monotonicity it is important that all threads that read the same OS 23 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 180000 15B01 (now()) [70016,640] 17.4 (now()) [70016,640] 18.1 (now()) [70016,640] 18.1 (monotonic_time()) [70016,640] 160000 140000 time (ms) 120000 100000 80000 60000 40000 20000 0 0 10 20 30 40 50 60 70 60 70 # Schedulers 30 18.1 (monotonic_time()) [70016,640] 25 20 Speedup monotonic time map this to exactly the same Erlang monotonic time. This requires synchronisation on updates to the adjustment information using a readers-writer (RW) lock. This RW lock is write-locked only when the adjustment information is changed. This means that in the vast majority of cases the RW lock will be read-locked, which allows multiple readers to run concurrently. To prevent bouncing the lock cache-line we use a bespoke reader optimised RW lock implementation where reader threads notify about their presence in counters on separate cache-lines. The concept is similar to the reader indicator algorithm described by [48, Fig. 11] and alternatives include the ingress-egress counter used by [18] and the SNZI algorithm of [30]. 15 10 Timer Wheel and BIF Timer The timer wheel contains all timers set by Erlang processes. The original implementation was protected by a global mutex and scaled poorly. To increase concurrency, each scheduler thread has been assigned its own timer wheel that is used by processes executing on the scheduler. The implementation of timers in Erlang/OTP uses a built in function (BIF), as most low-level operations do. Until Erlang/OTP 17.4, this BIF was also protected by a global mutex. Besides inserting timers into the timer wheel, the BIF timer implementation also maps timer references to a timer in the timer wheel. To improve concurrency, from Erlang/OTP 18 we provide scheduler-specific BIF timer servers as Erlang processes. These keep information about timers in private ETS tables and only insert one timer at the time into the timer wheel. Benchmarks We have measured several benchmarks on a 16-core Bulldozer machine with eight dual CPU AMD Opteron 4376 HEs.5 We present three of them here. The first micro benchmark compares the execution time of an Erlang receive with that of a receive after that specifies a timeout and 5 See ยง2.5.4 of the RELEASE project Deliverable 2.4 (http://release-project.eu/documents/D2.4.pdf). 24 5 0 0 10 20 30 40 50 # Schedulers Figure 20: BenchErl parallel benchmark using erlang:monotonic_time/0 or erlang:now/0 in different Erlang/OTP releases: runtimes (left) and speedup obtained using erlang:monotonic_time/0 (right). provides a default value. The receive after sets a timer when the process blocks in the receive, and cancels it when a message arrives. In Erlang/OTP 17.4 the total execution time with standard timers is 62% longer than without timers. Using the improved implementation in Erlang/OTP 18.0, total execution time with the optimised timers is only 5% longer than without timers. The second micro benchmark repeatedly checks the system time, calling the built-in erlang:now/0 in Erlang/OTP 17.4, and calling both erlang:monotonic_time/0 and erlang:time_offset/0 and adding the results in Erlang/OTP 18.0. In this machine, where the VM uses 16 schedulers by default, the 18.0 release is more than 69 times faster than the 17.4 release. The third benchmark is the parallel BenchErl P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 benchmark from Section i. Figure 20 shows the results of executing the original version of this benchmark, which uses erlang:now/0 to create monotonically increasing unique values, using three Erlang/OTP releases: R15B01, 17.4, and 18.1. We also measure a version of the benchmark in Erlang/OTP 18.1 where the call to erlang:now/0 has been substituted with a call to erlang:monotonic_time/0. The graph on its left shows that: 1. the performance of time management has remained roughly unchanged between Erlang/OTP releases prior to 18.0; 2. the improved time management in Erlang/OTP 18.x make time management less likely to be a scalability bottleneck even when using erlang:now/0, and 3. the new time API (using erlang:monotonic_time/0 and friends) provides a scalable solution. The graph on the right side of Figure 20 shows the speedup that the modified version of the parallel benchmark achieves in Erlang/OTP 18.1. VII. Scalable Tools This section outlines five tools developed in the RELEASE project to support scalable Erlang systems. Some tools were developed from scratch, like Devo, SDMon and WombatOAM, while others extend existing tools, like Percept and Wrangler. These include tooling to transform programs to make them more scalable, to deploy them for scalability, to monitor and visualise them. Most of the tools are freely available under open source licences (Devo, Percept2, SD-Mon, Wrangler); while WombatOAM is a commercial product. The tools have been used for profiling and refactoring the ACO and Orbit benchmarks from Section III. The Erlang tool โ€œecosystemโ€ consists of small stand-alone tools for tracing, profiling and debugging Erlang systems that can be used separately or together as appropriate for solving the problem at hand, rather than as a single, monolithic, super-tool. The tools presented here have been designed to be used as part of that ecosystem, and to complement already available functionality rather than to duplicate it. The Erlang runtime system has built-in support for tracing many types of events, and this infrastructure forms the basis of a number of tools for tracing and profiling. Typically the tools build on or specialise the services offered by the Erlang virtual machine, through a number of built-in functions. Most recently, and since the RELEASE project was planned, the Observer6 application gives a comprehensive overview of many of these data on a node-bynode basis. As actor frameworks and languages (see Section ii) have only recently become widely adopted commercially, their tool support remains relatively immature and generic in nature. That is, the tools support the language itself, rather than its distinctively concurrent aspects. Given the widespread use of Erlang, tools developed for it point the way for tools in other actor languages and frameworks. For example, just as many Erlang tools use tracing support provided by the Erlang VM, so can other actor frameworks, e.g. Akka can use the Kamon7 JVM monitoring system. Similarly, tools for other actor languages or frameworks could use data derived through OS-level tracing frameworks DTrace8 and SystemTap9 probes as we show in this section for Erlang, provided that the host language has tracing hooks into the appropriate infrastructure. i. Refactoring for Scalability Refactoring [65, 32, 75] is the process of changing how a program works without changing what it does. This can be done for readability, for testability, to prepare it for modification or extension, or โ€” as is the case here โ€” in order to improve its scalability. Because refactoring involves the transformation of source code, it is typically performed using machine support in a refactoring tool. There are a number of tools that support refactoring in Erlang: in the RELEASE project we have chosen to extend Wrangler10 [56]; other tools include Tidier [68] 6 http://www.erlang.org/doc/apps/observer/ 7 http://kamon.io 8 http://dtrace.org/blogs/about/ 9 https://sourceware.org/systemtap/wiki 10 http://www.cs.kent.ac.uk/projects/wrangler/ 25 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 and RefactorErl [44]. Supporting API Migration The SD Erlang libraries modify Erlangโ€™s global_group library, becoming the new s_group library; as a result, Erlang programs using global_group will have to be refactored to use s_group. This kind of API migration problem is not uncommon, as software evolves and this often changes the API of a library. Rather than simply extend Wrangler with a refactoring to perform this particular operation, we instead added a framework for the automatic generation of API migration refactorings from a user-defined adaptor module. Our approach to automatic API migration works in this way: when an API functionโ€™s interface is changed, the author of this API function implements an adaptor function, defining calls to the old API in terms of the new. From this definition we automatically generate the refactoring that transforms the client code to use the new API; this refactoring can also be supplied by the API writer to clients on library upgrade, allowing users to upgrade their code automatically. The refactoring works by generating a set of rules that โ€œfold inโ€ the adaptation to the client code, so that the resulting code works directly with the new API. More details of the design choices underlying the work and the technicalities of the implementation can be found in a paper by [52]. Support for Introducing Parallelism We have introduced support for parallelising explicit list operations (map and foreach), for process introduction to complete a computationally intensive task in parallel, for introducing a worker process to deal with call handling in an Erlang โ€œgeneric serverโ€ and to parallelise a tail recursive function. We discuss these in turn now; more details and practical examples of the refactorings appear in a conference paper describing that work [55]. Uses of map and foreach in list processing are among of the most obvious places where parallelism can be introduced. We have added a small library to Wrangler, called 26 para_lib, which provides parallel implementations of map and foreach. The transformation from an explicit use of sequential map/foreach to the use of their parallel counterparts is very straightforward, even manual refactoring would not be a problem. However a map/foreach operation could also be implemented differently using recursive functions, list comprehensions, etc.; identifying this kind of implicit map/foreach usage can be done using Wranglerโ€™s code inspection facility, and a refactoring that turns an implicit map/foreach to an explicit map/foreach can also be specified using Wranglerโ€™s rule-based transformation API. If the computations of two non-trivial tasks do not depend on each other, then they can be executed in parallel. The Introduce a New Process refactoring implemented in Wrangler can be used to spawn a new process to execute a task in parallel with its parent process. The result of the new process is sent back to the parent process, which will then consume it when needed. In order not to block other computations that do not depend on the result returned by the new process, the receive expression is placed immediately before the point where the result is needed. While some tail-recursive list processing functions can be refactored to an explicit map operation, many cannot due to data dependencies. For instance, an example might perform a recursion over a list while accumulating results in an accumulator variable. In such a situation it is possible to โ€œfloat outโ€ some of the computations into parallel computations. This can only be done when certain dependency constraints are satisfied, and these are done by program slicing, which is discussed below. Support for Program Slicing Program slicing is a general technique of program analysis for extracting the part of a program, also called the slice, that influences or is influenced by a given point of interest, i.e. the slicing criterion. Static program slicing is generally based on program dependency including both control dependency and data dependency. Backward P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 intra-function slicing is used by some of the refactorings described above; it is also useful in general, and made available to end-users under Wranglerโ€™s Inspector menu [55]. Our work can be compared with that in PaRTE11 [17], a tool developed in another EU project that also re-uses the Wrangler front end. This work concentrates on skeleton introduction, as does some of our work, but we go further in using static analysis and slicing in transforming programs to make them suitable for introduction of parallel structures. ii. Scalable Deployment We have developed the WombatOAM tool12 to provide a deployment, operations and maintenance framework for large-scale Erlang distributed systems. These systems typically consist of a number of Erlang nodes executing on different hosts. These hosts may have different hardware or operating systems, be physical or virtual, or run different versions of Erlang/OTP. Prior to the development of WombatOAM, deployment of systems would use scripting in Erlang and the shell, and this is the state of the art for other actor frameworks; it would be possible to adapt the WombatOAM approach to these frameworks in a straightforward way. Architecture The architecture of WombatOAM is summarised in Figure 21. Originally the system had problems addressing full scalability because of the role played by the central Master node; in its current version an additional layer of Middle Managers was introduced to allow the system to scale easily to thousands of deployed nodes. As the diagram shows, the โ€œnorthboundโ€ interfaces to the web dashboard and the command-line are provided through RESTful connections to the Master. The operations of the Master are delegated to the Middle Managers that 11 http://paraphrase-enlarged.elte.hu/ downloads/D4-3_user_manual.pdf 12 WombatOAM (https://www.erlang-solutions. com/products/wombat-oam.html) is a commercial tool available from Erlang Solutions Ltd. engage directly with the managed nodes. Each managed node runs a collection of services that collect metrics, raise alarms and so forth; we describe those now. Services WombatOAM is designed to collect, store and display various kinds of information and event from running Erlang systems, and these data are accessed and managed through an AJAX-based Web Dashboard; these include the following. Metrics WombatOAM supports the collection of some hundred metrics โ€” including, for instance, numbers of processes on a node and the message traffic in and out of the node โ€” on a regular basis from the Erlang VMs running on each of the hosts. It can also collect metrics defined by users within other metrics collection frameworks, such as Folsom13 , and interface with other tools such as graphite14 which can log and display such information. The metrics can be displayed as histograms covering different windows, such as the last fifteen minutes, hour, day, week or month. Notifications As well as metrics, it can support event-based monitoring through the collection of notifications from running nodes. Notifications, which are one time events can be generated using the Erlang System Architecture Support Libraries, SASL, which is part of the standard distribution, or the lager logging framework15 , and will be displayed and logged as they occur. Alarms Alarms are more complex entities. Alarms have a state: they can be raised, and once dealt with they can be cleared; they also have identities, so that the same alarm may be raised on the same node multiple times, and each instance will need to be 13 Folsom collects and publishes metrics through an Erlang API: https://github.com/boundary/folsom 14 https://graphiteapp.org 15 https://github.com/basho/lager 27 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Wombat Web Dashboard Wombat CLI REST REST Northbound Interface Metrics API Notif. API Alarms API Orchestration API Node manager Metrics Notif. Alarms Orchestration Node manager Metrics Notif. Alarms Orchestration Topology API Erlang Master Core Core DB (including Topology and Orchestration data) Topology Erlang Middle Manager Core Erlang elibcloud/ Libcloud Erlang/RPC Provision VMs (REST) Provision software (SSH) Infrastructure Provider Agents Metrics agent Virtual machine error_logger agent lager agent Alarms agent Managed Erlang Node Figure 21: The architecture of WombatOAM. dealt with separately. Alarms are generated by SASL or lager, just as for notifications. Topology The Topology service handles adding, deleting and discovering nodes. It also monitors whether they are accessible, and if not, it notifies the other services, and periodically tries to reconnect. When the nodes are available again, it also notifies the other services. It doesnโ€™t have a middle manager part, because it doesnโ€™t talk to the nodes directly: instead it asks the Node manager service to do so. Node manager This service maintains the connection to all managed nodes via the 28 Erlang distribution protocol. If it loses the connection towards a node, it periodically tries to reconnect. It also maintains the states of the nodes in the database (e.g. if the connection towards a node is lost, the Node manager changes the node state to DOWN and raises an alarm). The Node manager doesnโ€™t have a REST API, since the node states are provided via the Topology serviceโ€™s REST API. Orchestration This service can deploy new Erlang nodes on already running machines. It can also provision new virtual machine instances using several cloud providers, and deploy Erlang nodes on those instances. For communicating with P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 the cloud providers, the Orchestration service uses an external library called Libcloud,16 for which Erlang Solutions has written an open source Erlang wrapper called elibcloud, to make Libcloud easier to use from WombatOAM. Note that WombatOAM Orchestration doesnโ€™t provide a platform for writing Erlang applications: it provides infrastructure for deploying them. Deployment The mechanism consists of the following five steps. 1. Registering a provider. WombatOAM provides the same interface for different cloud providers which support the OpenStack standard or the Amazon EC2 API. WombatOAM also provides the same interface for using a fixed set of machines. In WombatOAMโ€™s backend, this has been implemented as two driver modules: the elibcloud driver module which uses the elibcloud and Libcloud libraries to communicate with the cloud providers, and the SSH driver module that keeps track of a fixed set of machines. 2. Uploading a release. The release can be either a proper Erlang release archive or a set of Erlang modules. The only important aspect from WombatOAMโ€™s point of view is that start and stop commands should be explicitly specified. This will enable WombatOAM start and stop nodes when needed. 3. Defining a node family. The next step is creating the node family, which is the entity that refers to a certain release, contains deployment domains that refer to certain providers, and contains other information necessary to deploy a node. 4. Defining a deployment domain. At this step a deployment domain is created that specifies(i) which providers should be used for 16 The unified cloud API [4]: apache.org https://libcloud. provisioning machines; (ii) the username that will be used when WombatOAM connects to the hosts using SSH. 5. Node deployment. To deploy nodes a WombatOAM user needs only to specify the number of nodes and the node family these nodes belong to. Nodes can be dynamically added to, or removed from, the system depending on the needs of the application. The nodes are started, and WombatOAM is ready to initiate and run the application. iii. Monitoring and Visualisation A key aim in designing new monitoring and visualisation tools and adapting existing ones was to provide support for systems running on parallel and distributed hardware. Specifically, in order to run modern Erlang systems, and in particular SD Erlang systems, it is necessary to understand both their single host (โ€œmulticoreโ€) and multi-host (โ€œdistributedโ€) nature. That is, we need to be able to understand how systems run on the Erlang multicore virtual machine, where the scheduler associated with a core manages its own run queue, and processes migrate between the queues through a work stealing algorithm; at the same time, we have to understand the dynamics of a distributed Erlang program, where the user explicitly spawns processes to nodes.17 iii.1 Percept2 Percept218 builds on the existing Percept tool to provide post hoc offline analysis and visualisation of Erlang systems. Percept2 is designed to allow users to visualise and tune the parallel performance of Erlang systems on a single node on a single manycore host. It visualises Erlang application level concurrency and identifies concurrency bottlenecks. Percept2 uses 17 This is in contrast with the multicore VM, where programmers have no control over where processes are spawned; however, they still need to gain insight into the behaviour of their programs to tune performance. 18 https://github.com/RefactoringTools/percept2 29 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Erlang built in tracing and profiling to monitor process states, i.e. waiting, running, runnable, free and exiting. A waiting or suspended process is considered an inactive and a running or runnable process is considered active. As a program runs with Percept, events are collected and stored to a file. The file is then analysed, with the results stored in a RAM database, and this data is viewed through a web-based interface. The process of offline profiling for a distributed Erlang application using Percept2 is shown in Figure 22. Percept generates an application-level zoomable concurrency graph, showing the number of active processes at each point during profiling; dips in the graph represent low concurrency. A lifetime bar for each process is also included, showing the points during its lifetime when the process was active, as well as other per-process information. Percept2 extends Percept in a number of ways โ€” as detailed by [53] โ€” including most importantly: โ€ข Distinguishing between running and runnable time for each process: this is apparent in the process runnability comparison as shown in Figure 23, where orange represents runnable and green represents running. This shows very clearly where potential concurrency is not being exploited. โ€ข Showing scheduler activity: the number of active schedulers at any time during the profiling. โ€ข Recording more information during execution, including the migration history of a process between run queues; statistics about message passing between processes: the number of messages and the average message size sent/received by a process; the accumulated runtime per-process: the accumulated time when a process is in a running state. โ€ข Presenting the process tree: the hierarchy structure indicating the parent-child relationships between processes. 30 โ€ข Recording dynamic function call graph/count/time: the hierarchy structure showing the calling relationships between functions during the program run, and the amount of time spent in a function. โ€ข Tracing of s_group activities in a distributed system. Unlike global group, s_group allows dynamic changes to the s_group structure of a distributed Erlang system. In order to support SD Erlang, we have also extended Percept2 to allow the profiling of s_group related activities, so that the dynamic changes to the s_group structure of a distributed Erlang system can be captured. We have also improved on Percept as follows. โ€ข Enabling finer-grained control of what is profiled. The profiling of port activities, schedulers activities, message passing, process migration, garbage collection and s_group activities can be enabled/disabled, while the profiling of process runnability (indicated by the โ€œprocโ€ flag) is always enabled. โ€ข Selective function profiling of processes. In Percept2, we have built a version of fprof, which does not measure a functionโ€™s own execution time, but measures everything else that fprof measures. Eliminating measurement of a functionโ€™s own execution time gives users the freedom of not profiling all the function calls invoked during the program execution. For example, they can choose to profile only functions defined in their own applicationsโ€™ code, and not those in libraries. โ€ข Improved dynamic function callgraph. With the dynamic function callgraph, a user is able to understand the causes of certain events, such as heavy calls of a particular function, by examining the region around the node for the function, including the path to the root of the graph. Each edge in the callgraph is annotated with P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 22: Offline profiling of a distributed Erlang application using Percept2. Figure 23: Percept2: showing processes running and runnable (with 4 schedulers/run queues). the number of times the target function is called by the source function as well as further information. Finally, we have also improved the scalability of Percept in three ways. First we have parallelised the processing of trace files so that multiple data files can be processed at the same time. We have also compressed the representation of call graphs, and cached the history of generated web pages. Together these make the system more responsive and more scalable. iii.2 DTrace/SystemTap tracing DTrace provides dynamic tracing support for various flavours of Unix, including BSD and Mac OS X, and SystemTap does the same for Linux; both allow the monitoring of live, running systems with minimal overhead. They can be used by administrators, language developers and application developers alike to examine the behaviour of applications, language implementations and the operating system during development or even on live production systems. In comparison to other similar tools and instrumentation frameworks, they are relatively lightweight, do not require special recompiled versions of the software to be examined, nor special post-processing tools to create meaningful information from the data gathered. Using these probs, it is possible to identify bottlenecks both in the VM itself and 31 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Run Queues 4500 RunQueue15 RunQueue14 RunQueue13 RunQueue12 RunQueue11 RunQueue10 RunQueue9 RunQueue8 RunQueue7 RunQueue6 RunQueue5 RunQueue4 RunQueue3 RunQueue2 RunQueue1 RunQueue0 4000 3500 3000 2500 2000 1500 1000 500 0 Figure 24: DTrace: runqueue visualisation of bang benchmark with 16 schedulers (time on Xaxis). in applications. VM bottlenecks are identified using a large number of probes inserted into Erlang/OTPโ€™s VM, for example to explore scheduler runqueue lengths. These probes can be used to measure the number of processes per scheduler, the number of processes moved during work stealing, the number of attempts to gain a run-queue lock, how many of these succeed immediately, etc. Figure 24 visualises the results of such monitoring; it shows how the size of run queues vary during execution of the bang BenchErl benchmark on a VM with 16 schedulers. Application bottlenecks are identified by an alternative back-end for Percept2, based on DTrace/SystemTap instead of the Erlang builtin tracing mechanism. The implementation reuses the existing Percept2 infrastructure as far as possible. It uses a different mechanism for collecting information about Erlang programs, a different format for the trace files, but the same storage infrastructure and presentation facilities. iii.3 Devo Devo19 [10] is designed to provide real-time online visualisation of both the low-level (single node, multiple cores) and high-level (multi19 https://github.com/RefactoringTools/devo 32 ple nodes, grouped into s_groups) aspects of Erlang and SD Erlang systems. Visualisation is within a browser, with web sockets providing the connections between the JavaScript visualisations and the running Erlang systems, instrumented through the trace tool builder (ttb). Figure 25 shows visualisations from devo in both modes. On the left-hand side a single compute node is shown. This consists of two physical chips (the upper and lower halves of the diagram) with six cores each; with hyperthreading this gives twelve virtual cores, and hence 24 run queues in total. The size of these run queues is shown by both the colour and height of each column, and process migrations are illustrated by (fading) arc between the queues within the circle. A green arc shows migration on the same physical core, a grey one on the same chip, and blue shows migrations between the two chips. On the right-hand side of Figure 25 is a visualisation of SD-Orbit in action. Each node in the graph represents an Erlang node, and colours (red, green, blue and orange) are used to represent the s_groups to which a node belongs. As is evident, the three nodes in the central triangle belong to multiple groups, and act as routing nodes between the other nodes. The colour of the arc joining two nodes represents the current intensity of communication between the nodes (green quiescent; red busiest). iii.4 SD-Mon SD-Mon is a tool specifically designed for monitoring SD-Erlang systems. This purpose is accomplished by means of a shadow network of agents, that collect data from a running system. An example deployment is shown in Figure 26, where blue dots represent nodes in the target system and the other nodes make up the SD-Mon infrastructure. The network is deployed on the basis of a configuration file describing the network architecture in terms of hosts, Erlang nodes, global group and s_group partitions. Tracing to be performed on moni- P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 p0 9152 0 p0 10890 0 p0 10891 0 p0 9501 0 Figure 25: Devo: low and high-level visualisations of SD-Orbit. tored nodes is also specified within the configuration file. An agent is started by a master SD-Mon node for each s_group and for each free node. Configured tracing is applied on every monitored node, and traces are stored in binary format in the agent file system. The shadow network follows system changes so that agents are started and stopped at runtime as required, as shown in Figure 27. Such changes are persistently stored so that the last configuration can be reproduced after a restart. Of course, the shadow network can be always updated via the User Interface. Each agent takes care of an s_group or of a free node. At start-up it tries to get in contact with its nodes and apply the tracing to them as stated by the master. Binary files are stored in the host file system. Tracing is internally used in order to track s_group operations happening at runtime. An asynchronous message is sent to the master whenever one of these changes occurs. Since each process can only be traced by a single process at a time, each node (included those belonging to more than one s_group) is controlled by only one agent. When a node is removed from a group or when the group is deleted, another agent takes over, as shown in Figure 27. When an agent is stopped, all traces on the controlled nodes are switched off. The monitoring network is also supervised, in order to take account of network fragility, and when an agent node goes down another node is deployed to play its role; there are also periodic consistency checks for the system as a whole, and when an inconsistency is detected then that part of the system can be restarted. SD-Mon does more than monitor activities one node at a time. In particular inter-node and inter-group messages are displayed at runtime. As soon as an agent is stopped, the related tracing files are fetched across the network by the master and they are made available in a readable format in the master file system. SD-Mon provides facilities for online visualisation of this data, as well as post hoc offline analysis. Figure 28 shows, in real time, messages that are sent between s_groups. This data 33 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 26: SD-Mon architecture. can also be used as input to the animated Devo visualisation, as illustrated in the right-hand side of Figure 25. VIII. Figure 27: SD-Mon evolution. Before (top) and after eliminating s_group 2 (bottom). Systemic Evaluation Preceding sections have investigated the improvements of individual aspects of an Erlang system, e.g. ETS tables in Section i. This section analyses the impact of the new tools and technologies from Sections V, VI, VII in concert. We do so by investigating the deployment, reliability, and scalability of the Orbit and ACO benchmarks from Section III. The experiments reported here are representative. Similar experiments show consistent results for a range of micro-benchmarks, several benchmarks, and the very substantial (approximately 150K lines of Erlang) Sim-Diasca case study [16] on several state of the art NUMA architectures, and the four clusters specified in Appendix A. A coherent presentation of many of these results is available in an article by [22] and in a RELEASE project deliverable20 . The bulk of the experiments reported here are conducted on the Athos cluster using Erlang/OTP 17.4 and the 20 See Deliverable 6.2, available online. http://www. release-project.eu/documents/D6.2.pdf 34 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 28: SD-Mon: online monitoring. associated SD Erlang libraries. The experiments cover two measures of scalability. As Orbit does a fixed size computation, the scaling measure is relative speedup (or strong scaling), i.e. speedup relative to execution time on a single core. As the work in ACO increases with compute resources, weak scaling is the appropriate measure. The benchmarks also evaluate different aspects of s_groups: Orbit evaluates the scalability impacts of network connections, while ACO evaluates the impact of both network connections and the global namespace required for reliability. D-Orbit performs better on a small number of nodes as communication is direct, rather than via a gateway node. As the number of nodes grows, however, SD-Orbit delivers better speedups, i.e. beyond 80 nodes in case of 2M orbit elements, and beyond 100 nodes in case of 5M orbit elements. When we increase the size of Orbit beyond 5M, the D-Orbit version fails due to the fact that some VMs exceed the available RAM of 64GB. In contrast SD-Orbit experiments run successfully even for an orbit with 60M elements. ii. i. Orbit Figure 29 shows the speedup of the D-Orbit and SD-Orbit benchmarks from Section i.1. The measurements are repeated seven times, and we plot standard deviation. Results show that Ant Colony Optimisation (ACO) Deployment The deployment and monitoring of ACO, and of the large (150K lines of Erlang) Sim-Diasca simulation using WombatOAM (Section ii) on the Athos cluster is detailed in [22]. 35 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 450 Relative Speedup 400 300 200 100 0 0 50(1200) 100(2400) 150(3600) Number of nodes (cores) D-Orbit W=2M D-Orbit W=5M 200(4800) 257(6168) SD-Orbit W=2M SD-Orbit W=5M Figure 29: Speedup of distributed Erlang vs. SD Erlang Orbit (2M and 5M elements) [Strong Scaling]. An example experiment deploys 10,000 Erlang nodes without enabling monitoring, and hence allocates three nodes per core (i.e. 72 nodes on each of 139 24-core Athos hosts). Figure 30 shows that WombatOAM deploys the nodes in 212s, which is approximately 47 nodes per second. It is more common to have at least one core per Erlang node, and in a related experiment 5000 nodes are deployed, one per core (i.e. 24 nodes on each of 209 24-core Athos hosts) in 101s, or 50 nodes per second. Crucially in both cases the deployment time is linear in the number of nodes. The deployment time could be reduced to be logarithmic in the number of nodes using standard divideand-conquer techniques. However there hasnโ€™t been the demand to do so as most Erlang systems are long running servers. The measurement data shows two important facts: it shows that WombatOAM scales well (up to a deployment base of 10,000 Erlang nodes), and that WombatOAM is non-intrusive because its overhead on a monitored node is typically less than 1.5% of effort on the node. We conclude that WombatOAM is capable of deploying and monitoring substantial distributed Erlang and SD Erlang programs. The experiments in the remainder of this section 36 use standard distributed Erlang configuration file deployment. Reliability SD Erlang changes the organisation of processes and their recovery data at the language level, so we seek to show that these changes have not disrupted Erlangโ€™s world-class reliability mechanisms at this level. As we havenโ€™t changed them we donโ€™t exercise Erlangโ€™s other reliability mechanisms, e.g. those for managing node failures, network congestion, etc. A more detailed study of SD Erlang reliability, including the use of replicated databases for recovering Instant Messenger chat sessions, finds similar results [23]. We evaluate the reliability of two ACO versions using a Chaos Monkey service that kills processes in the running system at random [14]. Recall that GR-ACO provides reliability by registering the names of critical processes globally, and SR-ACO registers them only within an s_group (Section ii). For both GR-ACO and SR-ACO a Chaos Monkey runs on every Erlang node, i.e. master, submasters, and colony nodes, killing a random Erlang process every second. Both ACO versions run to completion. Recovery, at this failure frequency, has no measurable P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Time (sec) 200 160 120 80 0 2000 4000 6000 Number of nodes (N) Experimental data 8000 10000 Best fit: 0.0125N+83 Figure 30: Wombat Deployment Time Execution time (s) 16 12 8 4 0 0 50(1200) GR-ACO 100(2400) 150(3600) Number of nodes (cores) SR-ACO 200(4800) 250(6000) ML-ACO Figure 31: ACO execution times, Erlang/OTP 17.4 (RELEASE) [Weak Scaling]. 37 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 impact on runtime. This is because processes are recovered within the Virtual machine using (globally synchronised) local recovery information. For example, on a common X86/Ubuntu platform typical Erlang process recovery times are around 0.3ms, so around 1000x less than the Unix process recovery time on the same platform [58]. We have conducted more detailed experiments on an Instant Messenger benchmark, and obtained similar results [23]. We conclude that both GR-ACO and SRACO are reliable, and that SD Erlang preserves distributed Erlang reliability model. The remainder of the section outlines the impact of maintaining the recovery information required for reliability on scalability. Scalability Figure 31 compares the runtimes of the ML, GR, and SR versions of ACO (Section ii) on Erlang/OTP 17.4(RELEASE). As outlined in Section i.1, GR-ACO not only maintains a fully connected graph of nodes, it registers process names for reliability, and hence scales significantly worse than the unreliable ML-ACO. We conclude that providing reliability with standard distributed Erlang process registration dramatically limits scalability. While ML-ACO does not provide reliability, and hence doesnโ€™t register process names, it maintains a fully connected graph of nodes which limits scalability. SR-ACO, that maintains connections and registers process names only within s_groups scales best of all. Figure 31 illustrates how maintaining the process namespace, and fully connected network, impacts performance. This reinforces the evidence from the Orbit benchmarks, and others, that partitioning the network of Erlang nodes significantly improves performance at large scale. To investigate the impact of SD Erlang on network traffic, we measure the number of sent and received packets on the GPG cluster for three versions of ACO: ML-ACO, GR-ACO, and SR-ACO. Figure 32 shows the total number of sent packets. The highest traffic (the red line) belongs to the GR-ACO and the lowest traffic belongs to the SR-ACO (dark blue line). This 38 shows that SD Erlang significantly reduces the network traffic between Erlang nodes. Even with the s_group name registration SR-ACO has less network traffic than ML-ACO that has no global name registration. iii. Evaluation Summary We have shown that WombatOAM is capable of deploying and monitoring substantial distributed Erlang and SD Erlang programs like ACO and Sim-Diasca. The Chaos Monkey experiments with GR-ACO and SR-ACO show that both are reliable, and hence that SD Erlang preserves the distributed Erlang language-level reliability model. As SD Orbit scales better than D-Orbit, SRACO scales better than ML-ACO, and SRACO has significantly less network traffic, we conclude that, even when global recovery data is not maintained, partitioning the fullyconnected network into s_groups reduces network traffic and improves performance. While the distributed Orbit instances (W=2M) and (W=5M) reach scalability limits at around 40 and 60 nodes, Orbit scales to 150 nodes on SD Erlang (limited by input size), and SR-ACO is still scaling well on 256 nodes (6144 cores). Hence not only have we exceeded the 60 node scaling limits of distributed Erlang identified in Section ii, we have not reached the scaling limits of SD Erlang on this architecture. Comparing GR-ACO and ML-ACO scalability curves shows that maintaining global recovery data, i.e. a process name space, dramatically limits scalability. Comparing GRACO and SR-ACO scalability curves shows that scalability can be recovered by partitioning the nodes into appropriately-sized s_groups, and hence maintaining the recovery data only within a relatively small group of nodes. These results are consistent with other experiments. IX. Discussion Distributed actor platforms like Erlang, or Scala with Akka, are a common choice for internet-scale system architects as the model, P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Figure 32: Number of sent packets in ML-ACO, GR-ACO, and SR-ACO. with its automatic, and VM-supported reliability mechanisms makes it extremely easy to engineer scalable reliable systems. Targeting emergent server architectures with hundreds of hosts and tens of thousands of cores, we report a systematic effort to improve the scalability of a leading distributed actor language, while preserving reliability. The work is a vade mecum for addressing scalability of reliable actor languages and frameworks. It is also high impact, with downloads of our improved Erlang/OTP running at 50K a month. We have undertaken the first systematic study of scalability in a distributed actor language, covering VM, language and persistent storage levels. We have developed the BenchErl and DE-Bench tools for this purpose. Key VM-level scalability issues we identify include contention for shared ETS tables and for commonly-used shared resources like timers. Key language scalability issues are the costs of maintaining a fully-connected network, maintaining global recovery information, and explicit process placement. Unsurprisingly the scaling issues for this distributed actor language are common to other distributed or parallel languages and frameworks with other paradigms like CHARM++ [45], Cilk [15], or Legion [40]. We establish scientifically the folklore limitations of around 60 connected nodes for distributed Erlang (Section IV). The actor model is no panacea, and there can still be scalability problems in the algorithms that we write, either within a single actor or in the way that we structure communicating actors. A range of pragmatic issues also impact the performance and scalability of actor systems, including memory occupied by processes (even when quiescent), mailboxes filling up, etc. Identifying and resolving these problems is where tools like Percept2 and WombatOAM are needed. However, many of the scalability issues arise where Erlang departs from the private state principle of the actor model, e.g. in maintaining shared state in ETS tables, or a shared global process namespace for recovery. We have designed and implemented a set of Scalable Distributed (SD) Erlang libraries to address language-level scalability issues. The key constructs are s_groups for partitioning the network and global process namespace, and semi-explicit process placement for deploying distributed Erlang applications on large heterogeneous architectures in a portable way. We have provided a state transition operational semantics for the new s_groups, and validated 39 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 the library implementation against the semantics using QuickCheck (Section V). To improve the scalability of the Erlang VM and libraries we have improved the implementation of shared ETS tables, time management and load balancing between schedulers. Following a systematic analysis of ETS tables, the number of fine-grained (bucket) locks and of reader groups have been increased. We have developed and evaluated four new techniques for improving ETS scalability:(i) programmer control of number of bucket locks; (ii) a contention-adapting tree data structure for ordered_sets; (iii) queue delegation locking; and (iv) eliminating the locks in the meta table. We have introduced a new scheduler utilisation balancing mechanism to spread work to multiple schedulers (and hence cores), and new synchronisation mechanisms to reduce contention on the widely-used time management mechanisms. By June 2015, with Erlang/OTP 18.0, the majority of these changes had been included in the primary releases. In any scalable actor language implementation such thoughtful design and engineering will be required to schedule large numbers of actors on hosts with many cores, and to minimise contention on shared VM resources (Section VI). To facilitate the development of large Erlang systems, and to make them understandable we have developed a range of tools. The proprietary WombatOAM tool deploys and monitors large distributed Erlang systems over multiple, and possibly heterogeneous, clusters or clouds. We have made open source releases of four concurrency tools: Percept2 now detects concurrency bad smells; Wrangler provides enhanced concurrency refactoring; the Devo tool is enhanced to provide interactive visualisation of SD Erlang systems; and the new SD-Mon tool monitors SD Erlang systems. We anticipate that these tools will guide the design of tools for other large scale distributed actor languages and frameworks (Section VII). We report on the reliability and scalability implications of our new technologies using a range of benchmarks, and consistently use the Orbit and ACO benchmarks throughout the 40 article. While we report measurements on a range of NUMA and cluster architectures, the key scalability experiments are conducted on the Athos cluster with 256 hosts (6144 cores). Even when global recovery data is not maintained, partitioning the network into s_groups reduces network traffic and improves the performance of the Orbit and ACO benchmarks above 80 hosts. Crucially we exceed the 60 node limit for distributed Erlang and do not reach the scalability limits of SD Erlang with 256 nodes/VMs and 6144 cores. Chaos Monkey experiments show that two versions of ACO are reliable, and hence that SD Erlang preserves the Erlang reliability model. However the ACO results show that maintaining global recovery data, i.e. a global process name space, dramatically limits scalability in distributed Erlang. Scalability can, however, be recovered by maintaining recovery data only within appropriately sized s_groups. These results are consistent with experiments with other benchmarks and on other architectures (Section VIII). In future work we plan to incorporate RELEASE technologies, along with other technologies in a generic framework for building performant large scale servers. In addition, preliminary investigations suggest that some SD Erlang ideas could improve the scalability of other actor languages.21 For example the Akka framework for Scala could benefit from semiexplicit placement, and Cloud Haskell from partitioning the network. Appendix A: Architecture Specifications The specifications of the clusters used for measurement are summarised in Table 2. We also use the following NUMA machines. (1) An AMD Bulldozer with 16M L2/16M L3 cache, 128GB RAM, four AMD Opteron 6276s at 2.3 GHz, 16 โ€œBulldozerโ€ cores each, giving a total of 64 cores. (2) An Intel NUMA with 128GB RAM, four Intel Xeon E5-4650s at 2.70GHz, 21 See Deliverable 6.7 (http://www.release-project. eu/documents/D6.7.pdf), available online. P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 Table 2: Cluster Specifications (RAM per host in GB). Cores per Name max Hosts host total avail. 20 16 320 320 Kalkyl 348 8 2,784 1,408 TinTin 160 16 2,560 2,240 Athos 776 24 18,624 6,144 GPG Processor RAM Intel Xeon E5-2640v2 8C, 2GHz Intel Xeon 2.26GHz 5520v2 4C, 64 24โ€“72 Interconnection 10GB Ethernet InfiniBand Gb/s 20 AMD Opteron 6220v2 Bull2:1 oversub64โ€“128 scribed dozer 8C, 3.0GHz QDR Infiniband Intel Xeon E5-2697v2 12C, 2.7GHz 64 Infiniband FDR14 each with eight hyperthreaded cores, giving a total of 64 cores. [3] Bulldozer (microarchitecture), 2015. https://en.wikipedia.org/wiki/ Bulldozer_(microarchitecture). Acknowledgements [4] Apache SF. Liblcoud, 2016. https:// libcloud.apache.org/. We would like to thank the entire RELEASE project team for technical insights and administrative support. Roberto Aloi and Enrique Fernandez Casado contributed to the development and measurement of WombatOAM. This work has been supported by the European Union grant RII3-CT-2005-026133 โ€œSCIEnce: Symbolic Computing Infrastructure in Europeโ€, IST-2011287510 โ€œRELEASE: A High-Level Paradigm for Reliable Large-scale Server Softwareโ€, and by the UKโ€™s Engineering and Physical Sciences Research Council grant EP/G055181/1 โ€œHPCGAP: High Performance Computational Algebra and Discrete Mathematicsโ€. [5] C. R. Aragon and R. G. Seidel. Randomized search trees. In Proceedings of the 30th Annual Symposium on Foundations of Computer Science, pages 540โ€“545, October 1989. [6] Joe Armstrong. Programming Erlang: Software for a Concurrent World. Pragmatic Bookshelf, 2007. [7] Joe Armstrong. Erlang. Commun. ACM, 53:68โ€“75, 2010. [1] Gul Agha. ACTORS: A Model of Concurrent Computation in Distributed Systems. PhD thesis, MIT, 1985. [8] Stavros Aronis, Nikolaos Papaspyrou, Katerina Roukounaki, Konstantinos Sagonas, Yiannis Tsiouris, and Ioannis E. Venetis. A scalability benchmark suite for Erlang/OTP. In Torben Hoffman and John Hughes, editors, Proceedings of the Eleventh ACM SIGPLAN Workshop on Erlang, pages 33โ€“42, New York, NY, USA, September 2012. ACM. [2] Gul Agha. An overview of Actor languages. SIGPLAN Not., 21(10):58โ€“67, 1986. [9] Thomas Arts, John Hughes, Joakim Johansson, and Ulf Wiger. Testing telecoms References 41 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 software with Quviq QuickCheck. In Proceedings of the 2006 ACM SIGPLAN workshop on Erlang, pages 2โ€“10, New York, NY, USA, 2006. ACM. [10] Robert Baker, Peter Rodgers, Simon Thompson, and Huiqing Li. Multi-level Visualization of Concurrent and Distributed Computation in Erlang. In Visual Languages and Computing (VLC): The 19th International Conference on Distributed Multimedia Systems (DMS 2013), 2013. [11] Luiz Andrรฉ Barroso, Jimmy Clidaras, and Urs Hรถlzle. The Datacenter as a Computer. Morgan and Claypool, 2nd edition, 2013. Symposium, TFP 2014. Revised Selected Papers, volume 8843 of LNCS, pages 104โ€“121. Springer, 2015. [18] Irina Calciu, Dave Dice, Yossi Lev, Victor Luchangco, Virendra J. Marathe, and Nir Shavit. NUMA-aware reader-writer locks. In Proceedings of the 18th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, pages 157โ€“166, New York, NY, USA, 2013. ACM. [19] Francesco Cesarini and Simon Thompson. Erlang Programming: A Concurrent Approach to Software Development. Oโ€™Reilly Media, 1st edition, 2009. [12] Basho Technologies. Riakdocs. Basho Bench, 2014. http://docs.basho. com/riak/latest/ops/building/ benchmarking/. [20] Rohit Chandra, Leonardo Dagum, Dave Kohr, Dror Maydan, Jeff McDonald, and Ramesh Menon. Parallel Programming in OpenMP. Morgan Kaufmann, San Francisco, CA, USA, 2001. [13] J. E. Beasley. OR-Library: Distributing test problems by electronic mail. The Journal of the Operational Research Society, 41(11):1069โ€“1072, 1990. Datasets available at http://people.brunel.ac. uk/~mastjjb/jeb/orlib/wtinfo.html. [21] Natalia Chechina, Huiqing Li, Amir Ghaffari, Simon Thompson, and Phil Trinder. Improving the network scalability of Erlang. J. Parallel Distrib. Comput., 90(C):22โ€“34, 2016. [14] Cory Bennett and Ariel Tseitlin. Chaos monkey released into the wild. Netflix Blog, 2012. [15] Robert D Blumofe, Christopher F Joerg, Bradley C Kuszmaul, Charles E Leiserson, Keith H Randall, and Yuli Zhou. Cilk: An efficient multithreaded runtime system. In Proceedings of the fifth ACM SIGPLAN symposium on Principles and practice of parallel programming, pages 207โ€“216. ACM, 1995. [16] Olivier Boudeville. Technical manual of the sim-diasca simulation engine. EDF R&D, 2012. [17] Istvรกn Bozรณ, Viktรณria Fรถrdoฬ‹s, Dรกniel Horpรกcsi, Zoltรกn Horvรกth, Tamรกs Kozsik, Judit Koฬ‹szegi, and Melinda Tรณth. Refactorings to enable parallelization. In Jurriaan Hage and Jay McCarthy, editors, Trends in Functional Programming: 15th International 42 [22] Natalia Chechina, Kenneth MacKenzie, Simon Thompson, Phil Trinder, Olivier Boudeville, Viktรณria Fรถrdoฬ‹s, Csaba Hoch, Amir Ghaffari, and Mario Moro Hernandez. Evaluating scalable distributed Erlang for scalability and reliability. IEEE Transactions on Parallel and Distributed Systems, 2017. [23] Natalia Chechina, Mario Moro Hernandez, and Phil Trinder. A scalable reliable instant messenger using the SD Erlang libraries. In Erlangโ€™16, pages 33โ€“41, New York, NY, USA, 2016. ACM. [24] Koen Claessen and John Hughes. QuickCheck: a lightweight tool for random testing of Haskell programs. In Proceedings of the 5th ACM SIGPLAN International Conference on Functional Programming, pages 268โ€“279, New York, NY, USA, 2000. ACM. P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 [25] H. A. J. Crauwels, C. N. Potts, and L. N. van Wassenhove. Local search heuristics for the single machine total weighted tardiness scheduling problem. INFORMS Journal on Computing, 10(3):341โ€“350, 1998. The datasets from this paper are included in Beasleyโ€™s ORLIB. [26] Jeffrey Dean and Sanjay Ghemawat. Mapreduce: Simplified data processing on large clusters. Commun. ACM, 51(1):107โ€“ 113, 2008. [27] David Dewolfs, Jan Broeckhove, Vaidy Sunderam, and Graham E. Fagg. FTMPI, fault-tolerant metacomputing and generic name services: A case study. In EuroPVM/MPIโ€™06, pages 133โ€“140, Berlin, Heidelberg, 2006. Springer-Verlag. [28] Alan AA Donovan and Brian W Kernighan. The Go programming language. Addison-Wesley Professional, 2015. [29] Marco Dorigo and Thomas Stรผtzle. Ant Colony Optimization. Bradford Company, Scituate, MA, USA, 2004. [30] Faith Ellen, Yossi Lev, Victor Luchangco, and Mark Moir. SNZI: scalable NonZero indicators. In Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing, pages 13โ€“22, New York, NY, USA, 2007. ACM. [31] Jeff Epstein, Andrew P. Black, and Simon Peyton-Jones. Towards Haskell in the Cloud. In Haskell โ€™11, pages 118โ€“129. ACM, 2011. [32] Martin Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1999. [33] Ana Gainaru and Franck Cappello. Errors and faults. In Fault-Tolerance Techniques for High-Performance Computing, pages 89โ€“144. Springer International Publishing, 2015. [34] Martin Josef Geiger. New instances for the Single Machine Total Weighted Tardiness Problem. Technical Report Research Report 10-03-01, March 2010. Datasets available at http://logistik. hsu-hh.de/SMTWTP. [35] Guillaume Germain. Concurrency oriented programming in termite scheme. In Proceedings of the 2006 ACM SIGPLAN workshop on Erlang, pages 20โ€“20, New York, NY, USA, 2006. ACM. [36] Amir Ghaffari. De-bench, a benchmark tool for distributed erlang, 2014. https: //github.com/amirghaffari/DEbench. [37] Amir Ghaffari. Investigating the scalability limits of distributed Erlang. In Proceedings of the 13th ACM SIGPLAN Workshop on Erlang, pages 43โ€“49. ACM, 2014. [38] Amir Ghaffari, Natalia Chechina, Phip Trinder, and Jon Meredith. Scalable persistent storage for Erlang: Theory and practice. In Proceedings of the 12th ACM SIGPLAN Workshop on Erlang, pages 73โ€“74, New York, NY, USA, 2013. ACM. [39] Seth Gilbert and Nancy Lynch. Brewerโ€™s conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News, 33:51โ€“59, 2002. [40] Andrew S Grimshaw, Wm A Wulf, and the Legion team. The Legion vision of a worldwide virtual computer. Communications of the ACM, 40(1):39โ€“45, 1997. [41] Carl Hewitt. Actor model for discretionary, adaptive concurrency. CoRR, abs/1008.1459, 2010. [42] Carl Hewitt, Peter Bishop, and Richard Steiger. A universal modular ACTOR formalism for artificial intelligence. In IJCAIโ€™73, pages 235โ€“245, San Francisco, CA, USA, 1973. Morgan Kaufmann. [43] Rich Hickey. The Clojure programming language. In DLSโ€™08, pages 1:1โ€“1:1, New York, NY, USA, 2008. ACM. 43 P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 [44] Zoltรกn Horvรกth, Lรกszlรณ Lรถvei, Tamรกs Kozsik, Rรณbert Kitlei, Anikรณ Nagynรฉ Vรญg, Tamรกs Nagy, Melinda Tรณth, and Roland Kirรกly. Building a refactoring tool for Erlang. In Workshop on Advanced Software Development Tools and Techniques, WASDETT 2008, 2008. [45] Laxmikant V Kale and Sanjeev Krishnan. Charm++: a portable concurrent object oriented system based on c++. In ACM Sigplan Notices, volume 28, pages 91โ€“108. ACM, 1993. [46] David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. On the scalability of the Erlang term storage. In Proceedings of the Twelfth ACM SIGPLAN Workshop on Erlang, pages 15โ€“26, New York, NY, USA, September 2013. ACM. [47] David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. Delegation locking libraries for improved performance of multithreaded programs. In Euro-Par 2014 Parallel Processing., volume 8632 of LNCS, pages 572โ€“583. Springer, 2014. [48] David Klaftenegger, Konstantinos Sagonas, and Kjell Winblad. Queue delegation locking. IEEE Transactions on Parallel and Distributed Systems, 2017. To appear. [49] Rusty Klophaus. Riak core: Building distributed applications without shared state. In ACM SIGPLAN Commercial Users of Functional Programming, CUFP โ€™10, pages 14:1โ€“14:1, New York, NY, USA, 2010. ACM. [50] Avinash Lakshman and Prashant Malik. Cassandra: A decentralized structured storage system. SIGOPS Oper. Syst. Rev., 44(2):35โ€“40, April 2010. [51] J. Lee et al. Python actor runtime library, 2010. osl.cs.uiui.edu/parley/. [52] Huiqing Li and Simon Thompson. Automated API Migration in a User-Extensible Refactoring Tool for Erlang Programs. In 44 Tim Menzies and Motoshi Saeki, editors, Automated Software Engineering, ASEโ€™12. IEEE Computer Society, 2012. [53] Huiqing Li and Simon Thompson. Multicore profiling for Erlang programs using Percept2. In Proceedings of the Twelfth ACM SIGPLAN workshop on Erlang, 2013. [54] Huiqing Li and Simon Thompson. Improved Semantics and Implementation Through Property-Based Testing with QuickCheck. In 9th International Workshop on Automation of Software Test, 2014. [55] Huiqing Li and Simon Thompson. Safe Concurrency Introduction through Slicing. In PEPM โ€™15. ACM SIGPLAN, January 2015. [56] Huiqing Li, Simon Thompson, Gyรถrgy Orosz, and Melinda Tรถth. Refactoring with Wrangler, updated. In ACM SIGPLAN Erlang Workshop, volume 2008, 2008. [57] Frank Lubeck and Max Neunhoffer. Enumerating large Orbits and direct condensation. Experimental Mathematics, 10(2):197โ€“ 205, 2001. [58] Andreea Lutac, Natalia Chechina, Gerardo Aragon-Camarasa, and Phil Trinder. Towards reliable and scalable robot communication. In Proceedings of the 15th International Workshop on Erlang, Erlang 2016, pages 12โ€“23, New York, NY, USA, 2016. ACM. [59] LWN.net. The high-resolution timer API, January 2006. https://lwn.net/ Articles/167897/. [60] Kenneth MacKenzie, Natalia Chechina, and Phil Trinder. Performance portability through semi-explicit placement in distributed Erlang. In Proceedings of the 14th ACM SIGPLAN Workshop on Erlang, pages 27โ€“38. ACM, 2015. [61] Jeff Matocha and Tracy Camp. A taxonomy of distributed termination detection P. Trinder, N. Chechina, N. Papaspyrou, K. Sagonas, S. Thompson, et al. โ€ข Scaling Reliably โ€ข 2017 algorithms. Journal of Systems and Software, 43(221):207โ€“221, 1998. [62] Nicholas D Matsakis and Felix S Klock II. The Rust language. In ACM SIGAda Ada Letters, volume 34, pages 103โ€“104. ACM, 2014. [63] Robert McNaughton. Scheduling with deadlines and loss functions. Management Science, 6(1):1โ€“12, 1959. [64] Martin Odersky et al. The Scala programming language, 2012. www.scala-lang.org. [65] William F. Opdyke. Refactoring ObjectOriented Frameworks. PhD thesis, University of Illinois at Urbana-Champaign, 1992. [66] Nikolaos Papaspyrou and Konstantinos Sagonas. On preserving term sharing in the Erlang virtual machine. In Torben Hoffman and John Hughes, editors, Proceedings of the 11th ACM SIGPLAN Erlang Workshop, pages 11โ€“20. ACM, 2012. [67] RELEASE Project Team. EU Framework 7 Project 287510 (2011โ€“2015), 2015. http: //www.release-project.eu. [68] Konstantinos Sagonas and Thanassis Avgerinos. Automatic refactoring of Erlang programs. In Principles and Practice of Declarative Programming (PPDPโ€™09), pages 13โ€“24. ACM, 2009. range updates using contention adapting search trees. In Languages and Compilers for Parallel Computing - 28th International Workshop, volume 9519 of LNCS, pages 37โ€“53. Springer, 2016. [72] Marc Snir, Steve W. Otto, D. W. Walker, Jack Dongarra, and Steven HussLederman. MPI: The Complete Reference. MIT Press, Cambridge, MA, USA, 1995. [73] Sriram Srinivasan and Alan Mycroft. Kilim: Isolation-typed actors for Java. In ECOOPโ€™08, pages 104โ€“128, Berlin, Heidelberg, 2008. Springer-Verlag. [74] Don Syme, Adam Granicz, and Antonio Cisternino. Expert F# 4.0. Springer, 2015. [75] Simon Thompson and Huiqing Li. Refactoring tools for functional languages. Journal of Functional Programming, 23(3), 2013. [76] Marcus Vรถlker. Linux timers, May 2014. [77] WhatsApp, 2015. https://www.whatsapp. com/. [78] Tom White. Hadoop - The Definitive Guide: Storage and Analysis at Internet Scale (3. ed., revised and updated). Oโ€™Reilly, 2012. [79] Ulf Wiger. Industrial-Strength Functional programming: Experiences with the Ericsson AXD301 Project. In Implementing Functional Languages (IFLโ€™00), Aachen, Germany, September 2000. Springer-Verlag. [69] Konstantinos Sagonas and Kjell Winblad. More scalable ordered set for ETS using adaptation. In Proc. ACM SIGPLAN Workshop on Erlang, pages 3โ€“11. ACM, September 2014. [70] Konstantinos Sagonas and Kjell Winblad. Contention adapting search trees. In Proceedings of the 14th International Symposium on Parallel and Distributed Computing, pages 215โ€“224. IEEE Computing Society, 2015. [71] Konstantinos Sagonas and Kjell Winblad. Efficient support for range queries and 45
6cs.PL
Top Tips to Make Your Research Irreproducible Neil P. Chue Hong1 , Tom Crick2 , Ian P. Gent3 , Lars Kotthoff4 and Kenji Takeda5 1 arXiv:1504.00062v2 [cs.CE] 8 Apr 2015 2 Software Sustainability Institute, University of Edinburgh, UK Department of Computing & Information Systems, Cardiff Metropolitan University, UK 3 School of Computer Science, University of St Andrews, UK 4 Insight Centre for Data Analytics, University College Cork, Ireland 5 Microsoft Research, Cambridge, UK 1 [email protected] http://www2.epcc.ed.ac.uk/~ neilc/ 2 [email protected] http://drtomcrick.com/ 3 [email protected] http://ian.gent 4 [email protected] http://4c.ucc.ie/~ larsko/ 5 [email protected] http://research.microsoft.com/en-us/people/kenjitak/ 1 April 2015 We have noticed (and contributed to) a number of manifestos, guides and top tips on how to make research reproducible [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]; however, we have seen very little published on how to make research irreproducible. Irreproducibility is the default setting for all of science, and irreproducible research is particularly common across the computational sciences. The study of making your work irreproducible without reviewers complaining is a much neglected area; we feel therefore that by encapsulating some of our top tips1 on irreproducibility, we will be filling a much-needed gap in the domain literature. By following our starter tips, you can ensure that if your work is wrong, nobody will be able to check it; if it is correct, you will make everyone else do disproportionately more work than you to build upon it. In either case you are the beneficiary. It is an unfortunate convention of science that research should pretend to be reproducible; our top tips will help you salve the conscience of certain reviewers still bound by this fussy conventionality, enabling them to enthusiastically recommend acceptance of your irreproducible work. 1. Think โ€œBig Pictureโ€. People are interested in the science, not the dull experimental setup, so donโ€™t describe it. If necessary, camouflage this absence with brief, high-level details of insignificant aspects of your methodology. 2. Be abstract. Pseudo-code is a great way of communicating ideas quickly and clearly while giving readers no chance to understand the subtle implementation details (particularly the custom toolchains and manual interventions) that actually make it work. 3. Short and sweet. Any limitations of your methods or proofs will be obvious to the careful reader, so there is no need to waste space on making them explicit2 . However much work it takes colleagues to fill in the gaps, you will still get the credit if you just say you have amazing experiments or proofs (with a hat-tip to Pierre de Fermat: โ€œCuius rei demonstrationem mirabilem sane detexi hanc marginis exiguitas non caperet.โ€). 4. The deficit model. Youโ€™re the expert in the domain, only you can define what algorithms and data to run experiments with. In the unhappy circumstance that your methods do not do well on 1 N.B. We are by no means claiming this is an exhaustive list for making your research irreproducible... Space saved in this way can be used to cite the critical papers in the field, i.e. those papers that will inflate your own (as well as potential reviewersโ€™) h-index. 2 1 community curated benchmarks, you should create your own bespoke benchmarks and use those (and preferably not make them available to others). 5. Donโ€™t share. Doing so only makes it easier for other people to scoop your research ideas, understand how your code actually works3 instead of why you say it does, or worst of all to understand that your code doesnโ€™t actually work at all. However, our most important tip is deceptively but beautifully simple: to ensure your work is irreproducible, make sure that you cannot reproduce it yourself . If you were able to reproduce it, there would always be the danger of somebody else being able to do exactly the same as you. Much else follows from this; for example, complete confidence in your own inability to reproduce work saves tedious time revising your work on advice from reviewers: if you are unable to browbeat the editor into accepting it as is, you can always resubmit elsewhere. A major advantage of this key insight is that no strict discipline is required to ensure self-irreproducibility: in our experience, irreproducibility can happily occur after only the tiniest amount of carelessness at one of any number of stages. We make a simple conjecture: an experiment that is irreproducible is exactly equivalent to an experiment that was never carried out at all. The happy consequences of this conjecture for experts in irreproducibility will be published elsewhere, with extremely impressive experimental support. We close with a mantra for scientists interested in irreproducibility: After Publishing Research, Irreproducibility Lets False Observations Obtain Longevity! References [1] Andreas Prlicฬ and James B. Procter. Ten Simple Rules for the Open Development of Scientific Software. PLoS Computational Biology, 12(8), 2012. [2] Geir Kjetil Sandve, Anton Nekrutenko, James Taylor, and Eivind Hovig. Ten Simple Rules for Reproducible Computational Research. PLoS Computational Biology, 9(10), 2013. [3] Ian P. Gent. The Recomputation Manifesto. Available from: http://arxiv.org/abs/1304.3674, April 2013. [4] Lucas N. Joppa, Greg McInerny, Richard Harper, Lara Salido, Kenji Takeda, Kenton Oโ€™Hara, David Gavaghan, and Stephen Emmott. Troubling Trends in Scientific Software Use. Science, 340(6134):814โ€“815, 2013. [5] Ian P. Gent and Lars Kotthoff. Recomputation.org: Experience of its first year and lessons learned. In Recomputability 2014, December 2014. [6] Greg Wilson, D. A. Aruliah, C. Titus Brown, Neil P. Chue Hong, Matt Davis, Richard T. Guy, Steven H. D. Haddock, Kathryn D. Huff, Ian M. Mitchell, Mark D. Plumbley, Ben Waugh, Ethan P. White, and Paul Wilson. Best Practices for Scientific Computing. PLoS Biology, 12(1), 2014. [7] Carole Goble. Better Software, Better Research. IEEE Internet Computing, 18(5):4โ€“8, 2014. [8] Tom Crick, Benjamin A. Hall, and Samin Ishtiaq. โ€œCan I Implement Your Algorithm?โ€: A Model for Reproducible Research Software. In Proceedings of 2nd International Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE2), 2014. [9] Tom Crick, Benjamin A. Hall, Samin Ishtiaq, and Kenji Takeda. โ€œShare and Enjoyโ€: Publishing Useful (and Usable) Scientific Models. In Proceedings of 1st International Workshop on Recomputability, 2014. [10] Victoria Stodden and Sheila Miguez. Best Practices for Computational Science: Software Infrastructure and Environments for Reproducible and Extensible Research. Journal of Open Research Software, 2(1):1โ€“6, 2014. 3 An exemplary example: http://www.phdcomics.com/comics.php?f=1689 2
5cs.CE
RESTRICTION ESTIMATES FOR THE FREE TWO STEP NILPOTENT GROUP ON THREE GENERATORS arXiv:1704.07876v1 [math.GR] 25 Apr 2017 VALENTINA CASARINO AND PAOLO CIATTI Abstract. Let G be the free two step nilpotent Lie group on three generators and let L be a subLaplacian on it. We compute the spectral resolution of L and prove that the operators arising from this decomposition enjoy a Tomas-Stein type estimate. 1. Introduction Starting from the observation of E. Stein that, when the Lebesgue exponent p is sufficiently close to 1, the Fourier transform of an Lp function restricts in a sense, that may be made precise, to a compact hypersurface of nonvanishing curvature, various forms of restriction theorems for the Fourier transform became one of the main theme of analysis. The most satisfactory result obtained so far in this theory is the Stein-Tomas theorem, which concerns the restriction in the L2 - sense of the Fourier transform of a function n`1 in Lp pRn q, with 1 ฤ p ฤ 2 n`3 , to the sphere S nยด1 . This result was proved in the mid seventies of the last century and, as any very important theorem, has now a great deal of extensions and applications in different branches of mathematics. In particular, it was observed by Stein himself and by R. Strichartz in [Str] that the Stein-Tomas estimates can be interpreted as bounds concerning the mapping properties between Lebesgue spaces of the operators arising in the spectral decomposition of the Euclidean Laplacian. This point of view is emphasised in the works of C. Sogge, who studied the boundedness of the spectral projections of the Laplace-Beltrami operator on the spheres in [So1] and more generally on compact Riemannian manifolds in [So2]. Few years later D. Mรผller proved for the first time a result of this sort for a subelliptic operator, the subLaplacian on the Heisenberg group. In the series of papers [C1], [C2], [CCi2], [CCi4] the authors of this article studied a sort of combination of the previous results considering estimates for the joint spectral projections of a Laplace-Beltrami operator and a subLaplacian. Some years ago we started in [CCi2] and [CCi3] an investigation devoted to extend the result of Mรผller to subLaplacians on more general two step nilpotent Lie groups. In those papers we considered groups enjoying a special nondegeneracy condition, according to which the quotient with respect to a codimension one subspace of the center is isomorphic to a Heisenberg group. In this paper we are instead concerned with the mapping properties of the operators arising in the spectral decomposition of an invariant subLaplacian on the free two step 2000 Mathematics Subject Classification. 22E25; 22E30, 43A80, 47B40. Key words and phrases. Free nilpotent Lie groups. Sub-Laplacians. Restriction theorems. Research supported by the Italian Ministero dellโ€™Istruzione, dellโ€™Universitร  e della Ricerca through PRIN โ€œReal and Complex Manifolds: Geometry, Topology and Harmonic Analysisโ€ and the GNAMPA project 2016 โ€œCalcolo funzionale per operatori subellittici su varietร โ€. 1 2 VALENTINA CASARINO AND PAOLO CIATTI nilpotent Lie group on three generators. In this group the quotient with respect to a codimension one subspace of the center is isomorphic to the direct product of the three dimensional Heisenberg group and the real line. Therefore, the nondegeneracy property we exploited in the previous works here is absent. However, the analysis on this group is made easier by the fact that the abelian component in the quotients with respect to the planes in the center is always one dimensional and by the fact that the combined action of the rotation group on the two layers of the Lie algebra gives rise to a family of automorphisms. We conclude the introduction with a short description of the next sections. In Section 2 we describe some features of the group G we are concerned with. Decomposing its Lie algebra g into the direct sum z โ€˜ v, where z is the center, we see that once a nontrivial linear form ยต on z has been fixed, the quotient of g with respect to the null space of ยต is the direct product of a three dimensional Heisenberg algebra times the real line. Moreover, these two components, the Heisenberg and the abelian one, depend only on the line in zหš spanned by ยต. Then in Section 3 we derive the spectral decomposition of an L2 function f with respect to the subLaplacian. This decomposition is expressed first of all in terms of the Fourier transform f ยต of f on z, which for every ยต in the dual of z is a function living on v. This transform is followed by the section of the Fourier transform of f ยต in the direction of the radical of ยต, which is finally decomposed into eigenfunctions of the two dimensional twisted Laplacian. Finally, in Section 4 we prove that the operators arising from the spectral decomposition of the subLaplacian are bounded for 1 ฤ s ฤ 6{5 and 1 ฤ p ฤ 2 from the nonisotropic Lebesgue space Lsz Lpv , in which the integrations in z and v are weighted with exponents s 1 and p, to Lsz L2v . The basic ingredients in these estimates are provided by the Stein-Tomas theorem, which in fact dictates the range of the exponents concerning the integration on z, and by the estimates proved some years ago by H. Koch and F. Ricci in [KR] for the twisted Laplacian. The range of exponents for which our estimates hold is sharp as examples analogue to those provided in [CCi2] show. 2. Generalities Let G be a free two step nilpotent Lie group on three generators. We assume that G is connected and simply connected. The Lie algebra, g, of G splits as a vector space into the direct sum g โ€œ v โ€˜ z, where z is the centre. Both v and z are three dimensional vector spaces. To proceed it is convenient to introduce on g an inner product xยจ, ยจy with respect to which v and z are orthogonal subspaces. The inner product induces a norm on g and a norm on gหš , the space of linear forms on g, which we will both denote by | ยจ |. We shall always identify G with its Lie algebra g by means of the exponential mapping and use coordinates px, zq with x โ€œ px1 , x2 , x3 q P R3 labeling the points of v and z โ€œ pz1 , z2 , z3 q P R3 the points of z. The vector fields X1 โ€œ B x 1 ` x3 x2 B z2 ยด B z3 , 2 2 X2 โ€œ B x 2 ` x1 x3 B z3 ยด B z1 , 2 2 X3 โ€œ B x 3 ` x2 x1 B z1 ยด B z2 2 2 RESTRICTION ESTIMATES FOR THE FREE GROUP 3 are left invariant and satisfy rX1 , X2 s โ€œ Bz3 โ€œ Z3 , rX2 , X3 s โ€œ Bz1 โ€œ Z1 , rX3 , X1 s โ€œ Bz2 โ€œ Z2 . (2.1) Fix a point ฯ‰ in the unit sphere S โ€œ tฮฝ P zหš : |ฮฝ| โ€œ 1u; here zหš denotes the space of linear forms on z. We call rฯ‰ the radical of the skew-symmetric form v ห† v Q pX, Y q รžร‘ ฯ‰prX, Y sq, that is the space rฯ‰ โ€œ tX P v : ฯ‰prX, Y sq โ€œ 0 for all Y P vu, which as follows from (2.1) is one dimensional. If Zฯ‰ P z satisfies ฯ‰pZฯ‰ q โ€œ 1, then |Zฯ‰ | โ€œ 1 and rX, Y s โ€œ ฯ‰prX, Y sqZฯ‰ , X, Y P v. Thus if we fix two unit vectors Xฯ‰ and Yฯ‰ in vฯ‰ satisfying ฯ‰prXฯ‰ , Yฯ‰ sq โ€œ 1, then the subspace hฯ‰ spanned by tXฯ‰ , Yฯ‰ , Zฯ‰ u is a Lie algebra isomorphic to the three dimensional Heisenberg algebra. The subspace kฯ‰ of z orthogonal to Zฯ‰ coincides with the kernel of ฯ‰. Therefore the quotient of g with respect to kฯ‰ is isomorphic as a Lie algebra to the direct product of hฯ‰ and rฯ‰ . To equip this algebra with a system of coordinates, we decompose a vector into the sum vฯ‰ Vฯ‰ ` xฯ‰ Xฯ‰ ` yฯ‰ Yฯ‰ ` zฯ‰ Zฯ‰ , where Vฯ‰ is a unit vector in rฯ‰ and pvฯ‰ , xฯ‰ , yฯ‰ , zฯ‰ q P R4 . We shall identify, with a slight abuse of notation, ฯ‰ with the linear form in vหš canonically associated to Vฯ‰ , writing vฯ‰ โ€œ ฯ‰pXq. Fixing two orthonormal vectors tWฯ‰,1 , Wฯ‰,2 u in kฯ‰ , we obtain an orthogonal basis tZฯ‰ , Wฯ‰,1 , Wฯ‰,2 u of z. Then any vector in g can be uniquely written as vฯ‰ Vฯ‰ ` xฯ‰ Xฯ‰ ` yฯ‰ Yฯ‰ ` zฯ‰ Zฯ‰ ` wฯ‰,1 Wฯ‰,1 ` wฯ‰,2 Wฯ‰,2 , where pvฯ‰ , xฯ‰ , yฯ‰ , zฯ‰ , wฯ‰,1 , wฯ‰,2q P R6 are coordinates adapted to ฯ‰. The transformation mapping X โ€œ px1 , x2 , x3 q to pxฯ‰ , yฯ‰ , vฯ‰ q is a rotation Rฯ‰ P SOp3q fixing Vฯ‰ and hence pxฯ‰ , yฯ‰ q โ€œ xฯ‰ Xฯ‰ ` yฯ‰ Yฯ‰ โ€œ Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ . Since by the universal property rotations of v extend to automorphisms of g, Rฯ‰ preserves Zฯ‰ and maps pz1 , z2 , z3 q to pwฯ‰,1 , wฯ‰,2, zฯ‰ q. 3. The subLaplacian The vector fields X1 , X2 , X3 generate by (2.1) the entire Lie algebra g. Therefore by Hรถrmanderโ€™s theorem the subLaplacian L โ€œ ยดX12 ยด X22 ยด X32 4 VALENTINA CASARINO AND PAOLO CIATTI is a hypoelliptic differential operator. It is easy to see that 1 1 1 L โ€œ ยดBx21 ยด Bx22 ยด Bx23 ` px2 Bx3 ยด x3 Bx1 qBz1 ` px3 Bx1 ยด x2 Bx3 qBz2 ` px1 Bx2 ยด x2 Bx1 qBz3 2 2 2 1 2 1 2 1 2 2 2 2 2 2 2 ยด px2 ` x3 qBz1 ยด px1 ` x3 qBz2 ยด px1 ` x2 qBz3 4 4 4 and hence that L is homogeneous with respect to the dilations defined by ฮดวซ pX, Zq โ€œ pวซx, วซ2 zq, วซ ฤ… 0, that is Lpf ห ฮดวซ q โ€œ วซ2 pLf q ห ฮดวซ . The subLaplacian is a symmetric operator on the Schwartz class and extends to a selfadjoint operator on L2 pGq with positive spectrum. Our plan in the section consists in deriving its spectral decomposition. Our construction is largely inspired by the analogous derivations in [ACDS] and [MMรผ]. To accomplish the task, given a Schwartz function f on G, we take its partial Fourier transform in the central variables ลผ ยต f pXq โ€œ eยดiยตpZq f pX, ZqdZ, ยต P zหš . zหš We then introduce spherical coordinates in zหš , writing ยต โ€œ ฯฯ‰, where ฯ โ€œ |ยต| and ฯ‰ belongs to S. In these coordinates the Fourier inversion formula in zหš reads ลผ ลผ8 f pX, Zq โ€œ eiฯฯ‰pZq f ฯฯ‰ pXqฯ2 dฯdฯ‰. (3.1) S 0 In particular, we have Xa f pX, Zq โ€œ ลผ ลผ8 S eiฯฯ‰pZq Xaฯฯ‰ f ฯฯ‰ pXqฯ2 dฯdฯ‰, a โ€œ 1, 2, 3, (3.2) 0 where the vector fields Xaฯฯ‰ are the differential operators on v defined by ` ห˜ Xa eยดiฯฯ‰pZq gpXq โ€œ eยดiฯฯ‰pZq Xaฯฯ‰ gpXq, a โ€œ 1, 2, 3, for any Schwartz function g. They are more explicitly given by i i i X1ฯฯ‰ โ€œ Bx1 ` ฯpฯ‰3 x2 ยดฯ‰2 x3 q, X2ฯฯ‰ โ€œ Bx2 ` ฯpฯ‰1 x3 ยดฯ‰3 x1 q, X3ฯฯ‰ โ€œ Bx3 ` ฯpฯ‰2 x1 ยดฯ‰1 x2 q, 2 2 2 ฯฯ‰ where ฯ‰a โ€œ ฯ‰ pZa q, a โ€œ 1, 2, 3. Defininig the differential operator L on v by ` ห˜ L eยดiฯฯ‰pZq gpXq โ€œ eยดiฯฯ‰pZq Lฯฯ‰ gpXq, (3.3) we find i i i Lฯฯ‰ โ€œ ยดBx21 ยด Bx22 ยด Bx23 ` ฯฯ‰1 px3 Bx1 ยด x2 Bx3 q ` ฯฯ‰2 px2 Bx3 ยด x3 Bx1 q ` ฯฯ‰3 px2 Bx1 ยด x1 Bx2 q 2 2 2 1 1 1 2 2 2 ` ฯ ฯ‰1 px2 ` x23 q ` ฯ2 ฯ‰22px21 ` x23 q ` ฯ2 ฯ‰32ฯ2 px21 ` x22 q. 4 4 4 In the coordinates pvฯ‰ , xฯ‰ , yฯ‰ , zฯ‰ , wฯ‰,1 , wฯ‰,2q the operator Lฯฯ‰ becomes i 1 2 2 2 2 2 2 Lฯฯ‰ xฯ‰ ,yฯ‰ ,vฯ‰ โ€œ ยดBvฯ‰ ยด Bxฯ‰ ยด Byฯ‰ ` ฯpyฯ‰ Bxฯ‰ ยด xฯ‰ Byฯ‰ q ` ฯ pxฯ‰ ` yฯ‰ q 2 4 โ€œ ยดBv2ฯ‰ ` โˆ†ฯxฯ‰ ,yฯ‰ , (3.4) RESTRICTION ESTIMATES FOR THE FREE GROUP 5 where โˆ†ฮปs,t ห™ ห† ห˜ B2 ฮป2 ` 2 B2 i B B โ€œยด 2 ยด 2 ` ฮป t ยดs ` s ` t2 Bs Bt 2 Bs Bt 4 is the two dimensional ฮป-twisted Laplacian. The spectrum of โˆ†ฮปs,t consists of eigenvalues, which are given by ฮปp2k ` 1q with k โ€œ 0, 1, 2, ยจ ยจ ยจ . We write the spectral decomposition of g with respect to โˆ†ฮปs,t as gps, tq โ€œ 8 รฟ ฮ›ฮปk gps, tq, (3.5) kโ€œ0 where ฮ›ฮปk maps L2 pR2 q onto the eigenspace associated to ฮปp2k ` 1q. These are integral operators (for more details about them see, for instance, [Th, p.19 ff]) satisfying the estimates 1 1 1 }ฮ›ฮปk f }L2 pR2 q ฤ Cฮป p ยด 2 p2k ` 1qฮณp p q }f }Lp pR2 q , 1 ฤ p ฤ 2 , (3.6) proved by H. Koch and F. Ricci in [KR]; here ฮณ is the piecewise affine function on r 21 , 1s defined by # ห† ห™ 1 ยด1 if 1 ฤ p ฤ 56 , 1 ฮณ (3.7) :โ€œ p1 1 1 p p ยด p q if 56 ฤ p ฤ 2. 2 2 In order to decompose f ฯฯ‰ into eigenfunctions of the twisted Laplacian, we define the function gฯ,ฯ‰ โ€œ f ฯฯ‰ ห Rฯ‰ยด1 , where Rฯ‰ยด1 is the inverse of Rฯ‰ . Since pxฯ‰ , yฯ‰ , vฯ‰ q โ€œ Rฯ‰ px1 , x2 , x3 q โ€œ Rฯ‰ X, recalling that vฯ‰ โ€œ ฯ‰pXq and pxฯ‰ , yฯ‰ q โ€œ Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ , we have f ฯฯ‰ pXq โ€œ gฯ,ฯ‰ pxฯ‰ , yฯ‰ , vฯ‰ q โ€œ gฯ,ฯ‰ pRฯ‰ pXq ยด ฯ‰pXqVฯ‰ , ฯ‰pXqq. Then it makes sense to decompose the function gฯ,ฯ‰ pxฯ‰ , yฯ‰ , vฯ‰ q in eigenfuctions of โˆ†ฯxฯ‰ ,yฯ‰ , obtaining f ฯฯ‰ pXq โ€œ gฯ,ฯ‰ pxฯ‰ , yฯ‰ , vฯ‰ q 8 รฟ โ€œ ฮ›ฯk gฯ,ฯ‰ pxฯ‰ , yฯ‰ , vฯ‰ q โ€œ kโ€œ0 8 รฟ kโ€œ0 ` ห˜ ฮ›ฯk pf ฯฯ‰ ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ , ฯ‰pXq . Taking the partial Fourier transform of gฯ,ฯ‰ in rฯ‰ , it follows that ลผ8 ` ห˜ Fฯ‰ gฯ,ฯ‰ pxฯ‰ , yฯ‰ ; ฮพq โ€œ eยดisฮพ gฯ,ฯ‰ Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ` sVฯ‰ ds โ€œ ยด8 8 รฟลผ8 kโ€œ0 ยด8 and also Fฯ‰ gฯ,ฯ‰ pxฯ‰ , yฯ‰ ; ฮพq โ€œ ` ห˜ eยดisฮพ ฮ›ฯk gฯ,ฯ‰ Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ` sVฯ‰ ds, 8 รฟ kโ€œ0 ` ห˜ ฮ›ฯk Fฯ‰ gฯ,ฯ‰ Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ , 6 VALENTINA CASARINO AND PAOLO CIATTI since the operators ฮ›ฯk and Fฯ‰ , acting on different spaces, namely vฯ‰ and rฯ‰ , commute. Thus, inverting the Fourier transform we obtain 8 ลผ8 รฟ gฯ,ฯ‰ pxฯ‰ , yฯ‰ , vฯ‰ q โ€œ eivฯ‰ ฮพ ฮ›ฯk Fฯ‰ gฯ,ฯ‰ pxฯ‰ , yฯ‰ ; ฮพqdฮพ. kโ€œ0 ยด8 Hence, we have 8 ลผ8 รฟ ฯฯ‰ f pXq โ€œ kโ€œ0 ยด8 ` ห˜ eiฯ‰pXqฮพ ฮ›ฯk Fฯ‰ pf ฯฯ‰ ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ dฮพ, (3.8) which plugged in (3.1) yields ลผ8 8 ลผ ลผ8 รฟ ` ห˜ iฯฯ‰pZq e eiฯ‰pXqฮพ ฮ›ฯk Fฯ‰ pf ฯฯ‰ ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ dฮพฯ2 dฯdฯ‰. f pX, Zq โ€œ kโ€œ0 S ยด8 0 (3.9) We may now deduce from (3.9) the spectral decomposition of f with respect to L by replacing the arguments of the sum and the integrals with generalised eigenfunctions. To do that we notice that by (3.2) we have ลผ ลผ8 Lf pX, Zq โ€œ eiฯฯ‰pZq Lฯฯ‰ f ฯฯ‰ pXqฯ2 dฯdฯ‰, S 0 which by (3.8) and (3.4) implies ยธ หœ ลผ ลผ ลผ8 8 8 รฟ ` ห˜ eiฯ‰pXqฮพ ฮ›ฯk Fฯ‰ pf ฯฯ‰ ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ dฮพ ฯ2 dฯdฯ‰ eiฯฯ‰pZq Lฯฯ‰ S โ€œ kโ€œ0 ยด8 0 8 รฟ ลผ ลผ8 kโ€œ0 S eiฯฯ‰pZq 0 ห† ห™ห‡ ลผ8 ` ห˜ ห‡ 2 ฯ ivฯ‰ ฮพ ฯ ฯฯ‰ ยด1 ห† pยดBvฯ‰ ` โˆ†xฯ‰ ,yฯ‰ q e ฮ›k Fฯ‰ pf ห Rฯ‰ q xฯ‰ , yฯ‰ ; ฮพ dฮพ ห‡ โ€œ 8 ลผ ลผ8 รฟ kโ€œ0 S ห† ห†ลผ 8 ยด8 0 ivฯ‰ ฮพ e 8 ลผ ลผ8 รฟ kโ€œ0 S ห† ห†ลผ 8 2 pฮพ ` ivฯ‰ ฮพ e kโ€œ0 S ห† ยด8 ห Rฯ‰ยด1 q ` ห™ห‡ ห˜ ห‡ xฯ‰ , yฯ‰ ; ฮพ dฮพ ห‡ Rฯ‰ pXq ฯ2 dฯdฯ‰ 0 8 ลผ ลผ8 รฟ ห†ลผ 8 โˆ†ฯxฯ‰ ,yฯ‰ qฮ›ฯk Fฯ‰ pf ฯฯ‰ eiฯฯ‰pZq 2 pฮพ ` ฯp2k ` ยด8 โ€œ ฯ2 dฯdฯ‰ eiฯฯ‰pZq ยด8 โ€œ Rฯ‰ pXq 1qqฮ›ฯk Fฯ‰ pf ฯฯ‰ ห Rฯ‰ยด1 q eiฯฯ‰pZq ` ห™ห‡ ห˜ ห‡ xฯ‰ , yฯ‰ ; ฮพ dฮพ ห‡ Rฯ‰ pXq ฯ2 dฯdฯ‰ 0 iฯ‰pXqฮพ e 2 pฮพ ` ฯp2k ` 1qqฮ›ฯk Fฯ‰ pf ฯฯ‰ ห Rฯ‰ยด1 q ` ห™ ห˜ Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ dฮพ ฯ2 dฯdฯ‰, RESTRICTION ESTIMATES FOR THE FREE GROUP 7 ห‡ where ห‡Rฯ‰ pXq means that the integral must be computed in xฯ‰ Xฯ‰ `yฯ‰ Yฯ‰ โ€œ Rฯ‰ pXqยดฯ‰pXqVฯ‰ and vฯ‰ โ€œ ฯ‰pXq. Replacing in the last integral ฯp2k ` 1q with ฯ we obtain ลผ8 ลผ8 ลผ รฟ 8 ยด3 p2k ` 1q eiฯฯ‰pZq{p2k`1q eiฯ‰pXqฮพ pฮพ 2 ` ฯq Lf pX, Zq โ€œ ห† ยด8 0 S kโ€œ0 ` ฯ{p2k`1q ฮ›k Fฯ‰ pf ฯฯ‰{p2k`1q ห Rฯ‰ยด1 q Rฯ‰ pXq ห˜ ยด ฯ‰pXqVฯ‰ ; ฮพ ฯ2 dฯdฮพdฯ‰, from which, setting ยต โ€œ ฮพ 2 ` ฯ and using Fubiniโ€™s theorem, we deduce ลผ8 ลผ8 ลผ รฟ 8 2 ยด3 p2k ` 1q eipยตยดฮพ qฯ‰pZq{p2k`1q eiฯ‰pXqฮพ pยต ยด ฮพ 2 q2 Lf pX, Zq โ€œ ยด8 S kโ€œ0 ฮพ2 ` ห˜ 2 pยตยดฮพ 2 q{p2k`1q ห† ยตฮ›k Fฯ‰ pf pยตยดฮพ qฯ‰{p2k`1q ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ dยตdฮพdฯ‰ ลผ8 ลผ รฟ ลผ ?ยต 8 2 โ€œ ยต p2k ` 1qยด3 ? eipยตยดฮพ qฯ‰pZq{p2k`1q eiฯ‰pXqฮพ pยต ยด ฮพ 2 q2 ห† ยด ยต S kโ€œ0 0 2 pยตยดฮพ 2 q{p2k`1q ฮ›k Fฯ‰ pf pยตยดฮพ qฯ‰{p2k`1q ` ห˜ ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ dฮพdฯ‰dยต. The expression for Lf just derived shows that if we write ลผ8 f pX, Zq โ€œ Pยต f pX, Zqdยต, (3.10) 0 where Pยต f pX, Zq โ€œ ลผ รฟ 8 p2k ` 1q ยด3 ? eipยตยดฮพ 2 qฯ‰pZq{p2k`1q eiฯ‰pXqฮพ pยต ยด ฮพ 2 q2 (3.11) ยด ยต S kโ€œ0 pยตยดฮพ 2 q{p2k`1q ห† ฮ›k ลผ ?ยต Fฯ‰ pf pยตยดฮพ 2 qฯ‰{p2k`1q then ` ห˜ ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ dฮพdฯ‰, LPยต f โ€œ ยตPยต f. Thus, (3.10) provides the spectral resolution of f with respect to L. 4. The restriction theorem In this section we show that the operators Pยต satisfy some restriction estimates. To state and prove this result we introduce nonisotropic norms on G defined, for 1 ฤ p, s ฤƒ 8, by หœลผ ห†ลผ ยธ p1 ห™p s }f }Lsz Lpv โ€œ |f pX, Zq|s dZ dV , v z with the obvious modifications when s or p equal 8. We shall prove the following theorem. Theorem 4.1. Let f be a Schwartz function on G and let 1 ฤ p ฤ 2 and 1 ฤ s ฤ 65 , then }Pยต f }Lsz 1 L2v ฤ Cยต3p s ยด s1 q`3p p ยด 2 q }f }Lsz Lpv . 1 These estimates are false for s ฤ… 65 . 1 1 1 (4.1) 8 VALENTINA CASARINO AND PAOLO CIATTI Proof. The sharpness of the range of s where the estimates hold may be proved with a suitable and easy modification of the example provided in [CCi2]. So we prove only the bound (4.1). The dependence on ยต in the right hand side of (4.1) is dictated by the homogeneity of L. Therefore, it suffices to discuss the case ยต โ€œ 1. To reduce the complexity of the notation and make the formulas more readable we consider a tensor function f pX, Zq โ€œ ฮฑpZqฮฒpXq, with ฮฑ and ฮฒ Schwartz functions on z and v. Then (3.11) reduces to ห† ห™ ลผ ลผ1 รฟ 8 p1 ยด ฮพ 2 q2 i p1ยดฮพ2 qฯ‰pZq iฯ‰pXqฮพ p1 ยด ฮพ 2 qฯ‰ P1 f pX, Zq โ€œ ฮฑฬ‚ e 2k`1 e 3 2k ` 1 S ยด1 kโ€œ0 p2k ` 1q 1ยดฮพ2 2k`1 ห† ฮ›k ` ห˜ Fฯ‰ pฮฒ ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ dฮพdฯ‰, where ฮฑฬ‚ denotes the Fourier transform of ฮฑ. Consider another tensor function gpX, Zq โ€œ ฮณpZqฮดpXq, with }ฮณ}Lsz โ€œ 1 and }ฮด}Lqv โ€œ 1, and compute ลผ ลผ xP1 f, gy โ€œ P1 f pX, ZqgpX, ZqdZdX. v z Then we have ห† ห™ ลผ ลผ หœลผ ลผ 1 รฟ 8 p1 ยด ฮพ 2 q2 i p1ยดฮพ2 qฯ‰pZq iฯ‰pXqฮพ p1 ยด ฮพ 2 qฯ‰ xP1 f, gy โ€œ ฮฑฬ‚ e 2k`1 e 3 2k ` 1 v z S ยด1 kโ€œ0 p2k ` 1q ยธ 1ยดฮพ2 ` ห˜ ห† ฮ›k2k`1 Fฯ‰ pฮฒ ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ dฮพdฯ‰ ฮณpZqฮดpXqdZdX ห™ ห† ห™ ห† ลผ ลผ1 รฟ 8 p1 ยด ฮพ 2 q2 p1 ยด ฮพ 2 qฯ‰ p1 ยด ฮพ 2 qฯ‰ โ€œ ฮฑฬ‚ ฮณฬ‚ 3 2k ` 1 2k ` 1 S ยด1 kโ€œ0 p2k ` 1q หœลผ ยธ 1ยดฮพ2 ` ห˜ ห† eiฯ‰pXqฮพ ฮ›k2k`1 Fฯ‰ pฮฒ ห Rฯ‰ยด1 q Rฯ‰ pXq ยด ฯ‰pXqVฯ‰ ; ฮพ ฮดpXqdX dฮพdฯ‰. v Changing the variables in the integral over v we obtain (since | det Rฯ‰ | โ€œ 1) ห™ ห† ห™ ห† ลผ ลผ1 รฟ 8 p1 ยด ฮพ 2 qฯ‰ p1 ยด ฮพ 2 q2 p1 ยด ฮพ 2 qฯ‰ ฮณฬ‚ xP1 f, gy โ€œ ฮฑฬ‚ 3 2k ` 1 2k ` 1 S ยด1 kโ€œ0 p2k ` 1q ยธ หœลผ 1ยดฮพ2 ` ห˜ ห† eivฯ‰ ฮพ ฮ›k2k`1 Fฯ‰ pฮฒ ห Rฯ‰ยด1 q xฯ‰ , yฯ‰ ; ฮพ pฮด ห Rฯ‰ยด1 qpxฯ‰ , yฯ‰ , vฯ‰ qdxฯ‰ dyฯ‰ dvฯ‰ dฮพdฯ‰ v ห™ ห† ห™ ห† ลผ ลผ1 รฟ 8 p1 ยด ฮพ 2 q2 p1 ยด ฮพ 2 qฯ‰ p1 ยด ฮพ 2 qฯ‰ โ€œ ฮฑฬ‚ ฮณฬ‚ 3 2k ` 1 2k ` 1 S ยด1 kโ€œ0 p2k ` 1q หœลผ ยธ 1ยดฮพ2 ` ห˜ ฮ›k2k`1 Fฯ‰ pฮฒ ห Rฯ‰ยด1 q xฯ‰ , yฯ‰ ; ฮพ Fฯ‰ pฮด ห Rฯ‰ยด1 qpxฯ‰ , yฯ‰ ; ฮพqdxฯ‰ dyฯ‰ dฮพdฯ‰. ห† vฯ‰ RESTRICTION ESTIMATES FOR THE FREE GROUP 9 Setting ฮจpฯ‰; ฮพ, kq โ€œ ลผ vฯ‰ we write 1ยดฮพ2 ` ห˜ ฮ›k2k`1 Fฯ‰ pฮฒ ห Rฯ‰ยด1 q xฯ‰ , yฯ‰ ; ฮพ Fฯ‰ pฮด ห Rฯ‰ยด1 qpxฯ‰ , yฯ‰ ; ฮพqdxฯ‰ dyฯ‰ , (4.2) ยธ ห™ ห† ห™ ลผ หœลผ ห† 8 รฟ p1 ยด ฮพ 2 q2 1 p1 ยด ฮพ 2 qฯ‰ p1 ยด ฮพ 2 qฯ‰ ฮจpฯ‰; ฮพ, kqdฯ‰ dฮพ. ฮฑฬ‚ xP1 f, gy โ€œ ฮณฬ‚ p2k ` 1q3 ยด1 S 2k ` 1 2k ` 1 kโ€œ0 Then the Cauchy-Schwarz inequality yields ลผ1 8 รฟ 1 |xP1 f, gy| ฤ p1 ยด ฮพ 2 q2 ฮฆpฮพ, kq 3 p2k ` 1q ยด1 kโ€œ0 หœลผ ห‡ ห† ห™ห‡2 ยธ 21 หœลผ ห‡ ห† ห™ห‡2 ยธ 21 2 2 ห‡ ห‡ ห‡ ห‡ ห‡ฮฑฬ‚ p1 ยด ฮพ qฯ‰ ห‡ dฯ‰ ห‡ฮณฬ‚ p1 ยด ฮพ qฯ‰ ห‡ dฯ‰ ห† dฮพ, ห‡ ห‡ 2k ` 1 ห‡ 2k ` 1 ห‡ S S where we set ฮฆpฮพ, kq โ€œ sup |ฮจpฯ‰; ฮพ, kq| (4.3) ฯ‰PS to simplify the notation. We remind that according to the Tomas-Stein theorem in R3 the inequality ห™ 21 ห†ลผ 1 2 |ฮทฬ‚ prฯ‰q| dฯ‰ ฤ Cs r ยด3{s }ฮท}Lsz S holds for 1 ฤ s ฤ 4 3 and r ฤ… 0, where |xP1 f, gy| ฤ }ฮฑ}Lsz 8 รฟ 1 s ` 1 s1 โ€œ 1. Thus, we obtain (being }ฮณ}Lsz โ€œ 1) 1 kโ€œ0 p2k ` 1q 3ยด s61 ลผ1 6 p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ. (4.4) ยด1 To estimate the integral in the last formula, we remind the definition (4.3) of ฮฆ (see also (4.2)) and use the Cauchy-Schwarz inequality in the integral on vฯ‰ to obtain ลผ1 ลผ1 6 2 2ยด s61 ฮฆpฮพ, kqdฮพ ฤ p1 ยด ฮพ 2 q2ยด s1 p1 ยด ฮพ q ยด1 ยด1 ห‡ลผ ห‡ 2 1ยดฮพ ห‡ ห‡ ` ห˜ 2k`1 ยด1 ยด1 ห† ห‡ห‡ ฮ›k Fฯ‰ pฮฒ ห Rฯ‰ q xฯ‰ , yฯ‰ ; ฮพ Fฯ‰ pฮด ห Rฯ‰ qpxฯ‰ , yฯ‰ ; ฮพqdxฯ‰ dyฯ‰ ห‡ห‡ dฮพ vฯ‰ ฤ ลผ1 6 p1 ยด ฮพ 2 q2ยด s1 ยด1 ยธ 12 หœลผ ห‡ ห‡2 1ยดฮพ2 ห‡ ห‡ 2k`1 ` ห˜ ยด1 ห‡ ห‡ฮ› ห‡ k Fฯ‰ pฮฒ ห Rฯ‰ q xฯ‰ , yฯ‰ ; ฮพ ห‡ dxฯ‰ dyฯ‰ vฯ‰ ห† ห†ลผ vฯ‰ ห‡ ห‡ ห‡Fฯ‰ pฮด ห Rฯ‰ยด1 qpxฯ‰ , yฯ‰ ; ฮพqห‡2 dxฯ‰ dyฯ‰ ห™1 2 dฮพ. 10 VALENTINA CASARINO AND PAOLO CIATTI A further application of the Cauchy-Schwarz inequality then implies ลผ1 6 p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ ยด1 ฤ หœลผ 1 12 p1 ยด ฮพ 2q4ยด s1 ยด1 (4.5) ยธ1 ห‡2 ลผ ห‡ 1ยดฮพ2 2 ห‡ 2k`1 ห‡ ` ห˜ ยด1 ห‡ฮ› ห‡ ห‡ k Fฯ‰ pฮฒ ห Rฯ‰ q xฯ‰ , yฯ‰ ; ฮพ ห‡ dxฯ‰ dyฯ‰ dฮพ vฯ‰ ห† ห†ลผ 8 ลผ ยด8 vฯ‰ ห‡ ห‡ ห‡Fฯ‰ pฮด ห Rยด1 qpxฯ‰ , yฯ‰ ; ฮพqห‡2 dxฯ‰ dyฯ‰ dฮพ ฯ‰ ห™ 12 . Since the Plancherel theorem applied to Fฯ‰ yields ลผ8 ลผ ลผ ลผ8 ห‡ ห‡ ห‡ ห‡2 ยด1 ห‡pฮด ห Rฯ‰ยด1 qpxฯ‰ , yฯ‰ , vฯ‰ qห‡2 dxฯ‰ dyฯ‰ dvฯ‰ ห‡Fฯ‰ pฮด ห Rฯ‰ qpxฯ‰ , yฯ‰ ; ฮพqห‡ dฮพdxฯ‰ dyฯ‰ โ€œ vฯ‰ ยด8 ยด8 vฯ‰ โ€œ }ฮด}L2v โ€œ 1, (being | det Rฯ‰ | โ€œ 1), (4.5) reduces to ลผ1 6 p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ ยด1 ฤ หœลผ 1 p1 ยด ฮพ 2 q 4ยด 12 s1 ยด1 ลผ vฯ‰ (4.6) ยธ1 ห‡ 1ยดฮพ2 ห‡2 2 ห‡ 2k`1 ห‡ ` ห˜ ยด1 ห‡ฮ› ห‡ . ห‡ k Fฯ‰ pฮฒ ห Rฯ‰ q xฯ‰ , yฯ‰ ; ฮพ ห‡ dxฯ‰ dyฯ‰ dฮพ Then in force of the Koch-Ricci estimates (3.6) we deduce from (4.6) that ลผ1 1 1 1 6 p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ ฤ C p2k ` 1qฮณ p p qยดp p ยด 2 q ยด1 ห† หœลผ 1 p1 ยด ฮพ 2 q p 4ยด 12 `2 p1 ยด 12 s1 ยด1 q ห†ลผ vฯ‰ ห‡ ` ห˜ห‡ ห‡Fฯ‰ pฮฒ ห Rยด1 q xฯ‰ , yฯ‰ ; ฮพ ห‡p dxฯ‰ dyฯ‰ ฯ‰ ห™2 p dฮพ (4.7) ยธ 21 . Applying the Hรถlder inequality in (4.7) to the integration in ฮพ with exponents p1 {2 and p {pp1 ยด 2q โ€œ p{p2 ยด pq, we deduce that ลผ1 6 p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ 1 ยด1 ฤ C p2k ` 1q ฮณ p p1 qยดp p1 ยด 12 q ห†ลผ 1 4p 3 p1 ยด ฮพ qp1ยด s1 q 2ยดp `1 dฮพ 2 ยด1 ห™ p1 ยด 21 ห› 11 ยจ p ห™ pp1 ลผ 8 ห†ลผ ห‡ ` ห˜ห‡p ยด1 ห‡Fฯ‰ pฮฒ ห R q xฯ‰ , yฯ‰ ; ฮพ ห‡ dxฯ‰ dyฯ‰ dฮพ โ€š . ห†ห ฯ‰ ยด8 vฯ‰ The first integral is finite since s1 ฤ› 4, which implies that ห† ห™ 3 2 4p 1ยด 1 `1ฤ› ฤ… 0. s 2ยดp 2ยดp RESTRICTION ESTIMATES FOR THE FREE GROUP 11 Therefore, we have ลผ1 6 p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ ยด1 ยจ ลผ 8 ห†ลผ ฮณ p p1 qยดp 1p ยด 21 q ห ฤ C p2k ` 1q ยด8 vฯ‰ ห‡ ` ห˜ห‡ ห‡Fฯ‰ pฮฒ ห Rฯ‰ยด1 q xฯ‰ , yฯ‰ ; ฮพ ห‡p dxฯ‰ dyฯ‰ ห™ pp1 ห› 11 p dฮพ โ€š . Now, being p1 {p ฤ› 1, we may use the Minkowski integral inequality, which gives ลผ1 6 p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ ยด1 ฤ C p2k ` 1q ฮณ p p1 qยดp p1 ยด 12 q หœลผ ห†ลผ 8 ยด8 vฯ‰ ห‡ ` ห˜ห‡ 1 ห‡Fฯ‰ pฮฒ ห Rยด1 q xฯ‰ , yฯ‰ ; ฮพ ห‡p dฮพ ฯ‰ ห™ p1 p dxฯ‰ dyฯ‰ ยธ p1 . Then we apply the Hausdorff-Young inequality in the inner integral to Fฯ‰ and replace the coordinates xฯ‰ , yฯ‰ , vฯ‰ with x, y, v, ลผ1 6 p1 ยด ฮพ 2 q2ยด s1 ฮฆpฮพ, kqdฮพ ยด1 ฤ C p2k ` 1q ฮณ p p1 qยดp p1 ยด 12 q ห†ลผ ห†ลผ 8 ยด8 vฯ‰ ฤ C p2k ` 1q ฮณ p p1 qยดp p1 ยด 12 q deducing that ลผ1 ยด1 ห†ลผ v ห™ ห™ 1p ห‡ ห‡ ` ห‡pฮฒ ห Rยด1 q xฯ‰ , yฯ‰ , vฯ‰ qห‡p dvฯ‰ dxฯ‰ dyฯ‰ ฯ‰ ห‡ ` ห‡ ห‡ฮฒ x, y, vqห‡p dxdydv ห™ p1 , p1 ยด ฮพ 2q2ยด s1 ฮฆpฮพ, kqdฮพ ฤ C p2k ` 1qฮณ p p qยดp p ยด 2 q }ฮฒ}Lpv . 1 6 1 1 (4.8) Finally, plugging (4.8) in (4.4) we obtain |xP1 f, gy| ฤ C}ฮฑ} }ฮฒ} Lsz Lpv 8 รฟ p2k ` 1q s1 ยด3`ฮณ p p qยดp p ยด 2 q 6 1 1 1 (4.9) kโ€œ0 ฤ C}ฮฑ}Lsz }ฮฒ}Lpv โ€œ C}f }Lsz Lpv . The series in fact converges for 1 ฤ s ฤ 4{3 and 1 ฤ p ฤ 2 since by (3.7), when 1 ฤ p ฤ 56 , we have ห™ ห† ห™ ห† 1 1 6 1 ยด ฤ ยด2 ยด3`ฮณ ยด s1 p p 2 and, when 6 5 ฤ p ฤ 2, 6 ยด3`ฮณ s1 ห™ ห† ห™ ห† 3 1 1 1 ยด ฤยด . ยด p p 2 2 From (4.9) the estimate asserted in the statement follows by duality, proving the theorem.  12 VALENTINA CASARINO AND PAOLO CIATTI References [ACDS] [C1] [C2] [CCi1] [CCi2] [CCi3] [CCi4] [KR] [MMรผ] [Mรผ] [So1] [So2] [Str] [Th] F. Astengo, M. Cowling, B. Di Blasio, M. Sundari, Hardyโ€™s uncertainty principle on certain Lie groups, J. London Math. Soc. (2), 62 (2000), no. 2, 461โ€“472. V. Casarino, Norms of complex harmonic projection operators, Canad. J. Math., 55 (2003), no. 6, 1134โ€“1154. V. Casarino, Two-parameter estimates for joint spectral projections on complex spheres, Math. Z., 261 (2009), no. 2, 245โ€“259. V. Casarino and P. Ciatti, Transferring Lp eigenfunction bounds from S 2n`1 to hn , Studia Math., 194 (2009), no. 1, 23โ€“42. V. Casarino and P. Ciatti, A Restriction Theorem for Mรฉtivier Groups, Advances in Mathematics, 245 (2013), 52โ€“77. V. Casarino and P. Ciatti, Restriction estimates for the full Laplacian on Mรฉtivier Groups, Rend. Lincei Mat. Appl. 24 (2013), 165โ€“179. V. Casarino and P. Ciatti, Lp Joint Eigenfunction Bounds on Quaternionic Spheres, J. Fourier Anal. Appl., electronically published on 14 October 2016, DOI: http://dx.doi.org/10.1007/s00041-016-9506-6 (to appear in print). H. Koch and F. Ricci, Spectral projections for the twisted Laplacian, Studia Math. 180 (2007), no. 2, 10โ€“110. A. Martini and D. Mรผller, Lp spectral multipliers on the free group N3,2 , Studia Math. 217 (2013), no. 1, 41โ€“55. D. Mรผller, A restriction theorem for the Heisenberg group, Ann. of Math. (2), 131 (1990), no. 3, 567โ€“587. C. Sogge, Oscillatory integrals and spherical harmonics, Duke Math. J. (2), 53 (1986), no. 1, 43โ€“65. C. Sogge, Concerning the Lp norm of spectral clusters for second-order elliptic operators on compact manifolds, J. Funct. Anal., 77 (1988), no. 1, 123โ€“138. R. Strichartz, Harmonic analysis as spectral theory of Laplacians, J. Funct. Anal., 87 (1989), no.1, 51โ€“148. S. Thangavelu, Harmonic Analysis on the Heisenberg Group, Progress in Mathematics, Vol. 159, Birkhรคuser Boston Inc., Boston, MA, 1998. Universitร  degli Studi di Padova, Stradella san Nicola 3, I-36100 Vicenza, Italy E-mail address: [email protected] Universitร  degli Studi di Padova, Via Marzolo 9, I-35100 Padova, Italy E-mail address: [email protected]
4math.GR
arXiv:1606.03809v3 [cs.PL] 29 Dec 2017 Why Nominal-Typing Matters in Object-Oriented Programming Moez A. AbdelGawad College of Mathematics and Econometrics, Hunan University Changsha 410082, Hunan, P.R. China Informatics Research Institute, SRTA-City New Borg ElArab, Alexandria, Egypt [email protected] January 1, 2018 Abstract type systems. Recently, a domain-theoretic model of nominally-typed OOP was compared to well-known models of structurally-typed OOP. Combined, these comparisons provide both a clear technical account and a deep mathematical account of the relation between nominal and structural OO type systems that have not been presented before, and they help demonstrate the key value of nominal typing and nominal subtyping to OO developers and language designers. We believe a clearer understanding of the key semantic advantage of pure nominal OO typing over pure structural OO typing can help remedy the existing schism. We believe future foundational OO PL research, to further its relevance to mainstream OOP, should be based less on structural models of OOP and more on nominal ones instead. The statements โ€˜inheritance is not subtypingโ€™ and โ€˜mainstream OO languages unnecessarily place restrictions over inheritanceโ€™ have rippled as mantras through the PL research community for years. Many mainstream OO developers and OO language designers, however, do not accept these statements. In nominally-typed OO languages that these developers and language designers are dearly familiar with, inheritance simply is subtyping; and they believe OO type inheritance is an inherently nominal notion, not a structural one. Nominally-typed OO languages, such as Java, C#, C++, and Scala, are among the most used programming languages today. However, the value of nominal typing to mainstream OO developers, as a means for designing robust OO software, seems to be in wait for full appreciation among PL researchersโ€”thereby perpetuating an unnecessary schism between many OO developers and language designers and many OO PL researchers, with each side discounting, if not even disregarding, the views of the other. In this essay we strengthen and complement earlier efforts to demonstrate the semantic value of nominal typing by presenting a technical comparison between nominal OO type systems and structural OO 1 Introduction In 1990, Cook et al. shocked the programming languages (PL) research community by declaring that, in object-oriented programming, โ€˜inheritance is not subtyping,โ€™ meaning there is no one-to-one correspondence between type inheritance and subtyping in OO programming languages, further adding that mainstream OO languages unnecessarily โ€˜place re1 strictions over inheritance.โ€™ Over the years, these statements rippled, as mantras, through the PL research community. To this day, however, many mainstream OO developers and OO language designers cannot digest or accept not identifying type inheritance with subtyping. Simply, the statement of Cook et al. is not true in nominally-typed OO languages that these developers and language designers are dearly familiar with. Further, they see that the so-called โ€œrestrictionโ€ of type inheritance in nominally-typed OO languages is strongly justified, or, more so, that a structural view of inheritance is in fact an unjustified redefinition of type inheritance, which they view as an inherently nominal notion. Nominally-typed OO languages are among the top most-used programming languages today. Examples of nominally-typed OO languages include many industrial-strength mainstream OO programming languages such as Java [44], C# [1], C++ [2], and Scala [61]. Nominally-typed OO languages have remained among the top most-used programming languages for over a decade [14, 5]. And, even by the most conservative measures, these languages are expected to remain among the top most-used OO programming languages in the near future, if not the far one, too. In spite of this, the value of nominal typing and nominal subtyping to mainstream OO developers, as a means for designing robust OO software that can be readily understood and maintained, as well as the value of properties of OO type systems that depend on nominality to them (such as the identification of type inheritance with subtyping), seem to be not yet fully appreciated among OO PL researchers. This has led to a continuing tension and schism between two large and significant communities: many mainstream OO developers and OO language designers, on one side, and many OO PL researchers, on the other side, with each of both sides discounting, and even disregarding, the views and opinions of the other. In nominally-typed (a.k.a., nominatively-typed) OO languages, objects and their types are nominal, meaning that objects and their types carry class names information as part of the meaning of objects and of the meaning of their types. Class namesโ€” and interface names and trait names in OO languages that support these notionsโ€”are used as type names in nominally-typed OO languages. Classโ€”and interface and traitโ€”behavioral contracts, typically written informally in code documentation comments, are specifications of the behavioral design intentions of OO software developers. In nominally-typed OOP, a reference to a class (or interface or trait) name is invariably considered a reference to the associated contract too. Given this association of type names to corresponding behavioral contracts, nominal typing allows associating types of objects with (formal or informal) behavioral contracts. By using type names in their code, OO developers using nominally-typed OO languages have a simple way to refer to the corresponding contractsโ€” referring to them as richer specifications of object state and behavior that can be checked statically and that can be used during runtime. This readily access to richer object specificationsโ€”which cannot be expressed in a natural way using non-nominal (a.k.a., structural) record types that, by definition, include no class names informationโ€”makes nominally typed OO languages closer to being semantically typed languages than structurally typed OO languages are. The first mathematical models of OOP to gain widespread recognition among programming languages (PL) researchers were developed while OOP was making its first steps into mainstream computer programming. (See Section 2.) These early models were structural models of OOP. As the developers of these models themselves (e.g., Cardelli) explained, this was due to influence from functional programming research extant at that time. These models of OOP, thus, reflected a view of OOP that does not include class names information. Being structural, objects were viewed in these models simply as being records (of functions). Object types, in accordance, were viewed as record types, where the type of an object only specifies the structure of the object, meaning that object types carry information only on the names of the members of objects (i.e., fields and methods) and, inductively, on the (structural) types of those members. Examples of structurally-typed OO languages include lesserknown languages such as Oโ€™Caml [48], Modula-3 [27], 2 Moby [39], PolyTOIL [21], and Strongtalk [19].1 In pure structurally-typed OO languages, class names information (also called nominal information) is not used as part of the identity of objects and their types, neither during static type checking nor at runtime. Accordingly, nominal information is missing in structural mathematical models of OOP. The main practical advantage of structural typing over nominal typing in OO languages seems to be their โ€œflexibility,โ€ i.e., the ability in a structurallytyped OO language to have supertypes get defined โ€œafter the factโ€ (i.e., after their subtypes are already defined). In light of mainstream OO developers of statically-typed OO languages not adopting structural typing, the โ€œinflexibilityโ€ of nominally-typed OO languages seems not to be enough justification for wider use of structural typing, particularly in light of the advantages of nominal typing we discuss in this essay. We attempt thus in this essay to further close the gap that exists between programming language researchers who maintain a structurally-typed view of OOP (and who believe in conclusions based on this view, such as inheritance and subtyping not being in one-to-one correspondence) and mainstream OO software developers and OO language designers who maintain a nominally-typed view of OO software (and who, accordingly, reject conclusions based on the structural view) by giving a precise technical account of the relation between nominal and structural OO type systems. The essay complements the recent mathematical comparison of a nominal domain-theoretic model of OOP to structural domain-theoretic models of OOP. This essay is structured as follows. First, in Section 2 we give some details on the history of modeling OOP, particularly details relevant to realizing differences between nominal typing and structural typing and to the development of nominal and structural models of OOP. Given that structural typing, more or less, is understood well among PL researchers, in Section 3 we directly demonstrate the value of behavioral contracts and nominal typing in mainstream nominally-typed OO languages using a comparison, followed by a discussion of the comparison. In Section 3.1 we first discuss, in some detail, the value of contracts and the value of identifying inheritance with subtyping in mainstream OO software design. Then, using code examples, in Section 3.2 and Section 3.3 we compare nominally-typed OO type systems and structurallytyped ones to more vividly illustrate the main technical differences between them. We then conclude in Section 3.4 by discussing the nominal and structural views of type names and of recursive-types, and the importance of recursive types in mainstream OOP. We conclude the essay by summarizing our findings, and making some final remarks, in Section 4. 2 Related Work Even though object-oriented programming emerged in the 1960s, and got mature and well-established in mainstream software development in the 1980s, the differences between nominally-typed and structurally-typed OO programming languages started getting discussed by PL researchers only in the 1990s [53, 65, 68]. In spite of an early hint by Cardelli (see below), the value of investigating nominal typing and nominal subtyping and their value to OO developers was not appreciated much howeverโ€”that is, until about a decade later, around the year 2000. In the eighties, while mainstream OOP was in its early days, Cardelli built the first denotational model of OOP [24, 25]. Cardelliโ€™s work was pioneering, and naturally, given the research on modeling functional programming extant at that time (which Cardelli heavily referred to and relied on), the model Cardelli constructed was a structural denotational model of OOP.2 1 A discussion of statically-typed versus dynamically-typed OO languages (including the non-well-defined so-called โ€œducktypingโ€), and the merits and demerits of each, is beyond the scope of this essay. The interested reader should check [56]. In this essay, we focus on nominal and structural statically-typed OO languages. 2 Quite significantly, Cardelli in fact also hinted at looking for investigating nominal typing [26, p.2]. Sadly, Cardelliโ€™s hint went largely ignored for years, and structural typing was rather assumed superior to nominal typing instead, particularly after 3 In the late eighties/early nineties, Cook and his colleagues worked to improve on Cardelliโ€™s model. Unlike Cardelli, Cook et al. emphasized in their work the importance of self-references in OOP, at the value level and at the type level. Their research led them to break the identification of type/interface inheritance with subtyping [32, 35, 34].3 In 1994, Bruce and others presented a discussion of the problem of binary methods in OOP [22] (a โ€œbinary methodโ€ is a method that takes a parameter or more of the same type as the class the method is declared in4 ). Later, Bruce and Simons promoted the structural view of OOP and conclusions based on it in a number of publications (e.g., [23] and [66]), in spite of the disagreement between these conclusions and the fundamental intuitions of a significant portion of mainstream OO developers and language designers [28]. Under the pressure of this disagreement, some PL researchers then started in the late nineties/early 2000s stressing the significance of the differences between nominally-typed OOP and structurally-typed OOP, and they started acknowledging the practical value of nominal typing and nominal subtyping [63]. Accordingly some attempts were made to develop OO languages with complex type systems that are both nominally- and structurally-typed [38, 62, 42, 54, 55, 61, 4]. However, in the eyes of mainstream OO developers, these โ€œhybridโ€ languages have more complex type systems than those of languages that are either simply purely nominally-typed or purely structurallytyped. This more complexity typically results in lesser productivity for developers who attempt to use both of the typing approaches in their software (see also discussion at the end of Section 3.4). As to operational models of OOP, Abadi and Cardelli were the first to present such a model [6, 7]. Again, their model had a structural view of OOP. However, operational models of nominallytyped OOP got later developed. In their seminal work, Igarashi, Pierce, and Wadler presented Featherweight Java (FJ) [45] as an operational model of a nominally-typed OO language. Even though FJ is not the first operational model of nominallytyped OOP (see [36], [60] and [40, 41], for example), FJ is the most widely known operational model of (a tiny core subset of) a nominally-typed mainstream OO language, namely Java. The development of FJ and other operational models of nominallytyped OOP motivated the construction of NOOP as the first domain-theoretic model of nominally-typed OOP [8, 10].5 Given the different basis for deriving data structuring in functional programming (based on standard branches of mathematics) and in object-oriented programming (based on biology and taxonomy6), 5 Featherweight Java [45] offers a very clear operational semantics for a tiny nominally-typed OO language. It is worth mentioning that domain-theoretic models of nominally-typed OO languages, as more foundational models that have fewer assumptions than operational ones, provide a denotational justification for the inclusion of nominal information in FJ. The inclusion of nominal information in NOOP was crucial for proving the identification of inheritance with subtyping in nominally-typed OOP [8, 10]. In FJ [45], the identification of inheritance with subtyping was taken as an assumption rather than being proven as a consequence of nominality. Also, domain-theoretic models such as NOOP allows discussing issues of OOP such as type names, โ€˜self-typesโ€™ and binary methods on a more foundational level than provided by operational models of OOP such as FJ. The more abstract description of denotational models results in a conceptually clearer understanding of the programming notions described as well as the relations between them. (It is also worth mentioning that NOOP was developed, partially, in response to the technical challenge Pierce presented in his LICSโ€™03 lecture [64] in which Pierce looked for the precise relation between structural and nominal OO type systems, notably after the development of FJ was concluded, implying that the question about the relation remained an open question after the development of FJ. As to their purpose, it is customary that denotational models and operational ones play complementary roles, where denotational models are usually of more interest to programming language designers, while operational ones are usually of more interest to programming language implementers.) 6 Which is a fact that seemingly is nowadays forgotten by some PL researchers but that Cardelli explicitly mentions in [24, 25]. the publication of Cook et al.โ€™s and Bruce et al.โ€™s work as we later discuss. 3 A discussion of Cardelliโ€™s model and of Cookโ€™s model and a comparison of NOOP, a nominal domain-theoretic model of OOP [8, 10], versus the structural models of Cardelli and Cook is presented in [11, 13]. 4 See our later discussion of โ€˜false/spurious binary methodsโ€™โ€”methods that are mistakenly identified by structural OO type systems as being binary methods but their semantics are not those of true binary methods. 4 we uncover a third so-far-unrecognized problem in pure structurally-typed OO languages that we call the problem of โ€˜spurious binary methods.โ€™ We then conclude our demonstration of the value of nominal typing by discussing, in some depth, the nominal and structural views of type names and of recursive-types, and the importance of recursive types in mainstream OOP in Section 3.4. The discussions and comparisons in this section demonstrate that nominal typing in nominally-typed OO programming languages causes typing and subtyping in these languages to be closer to semantic typing and subtyping, respectively, because of the association of nominal information with class contracts. This closeness to semantic typing, the simplicity of the resulting software design mental model, and the importance of recursive types to mainstream OO developers and OO language designers help explain the practical value of nominal typing to mainstream OO developers and OO language designers. some PL researchers have also expressed dissatisfaction with assuming that the views of programming based on researching functional programming (including a view that assumes structural typing) may apply, without qualifications, to object-oriented programming. In addition to Pierce and other earlier and later researchers pointing out the importance of distinguishing between nominal typing and structural typing, MacQueen [51], for example, also noted many mismatches between Standard ML (a popular functional programming language [59]) and classbased OO languages such as Java and C++. Later, Cook [33] also pointed out differences between objects of OOP and abstract data types (ADTs) that are common in functional programming. These research results run in a similar vein as ours since they somewhat also point to some mismatches between the theory and practice of programming languagesโ€”theory being more mathematics-based, functional, and structurally-typed, and practice being more biology/taxonomy-based, object-oriented, and nominally-typed. 3 3.1 Nominally-Typed OOP versus Structurally-Typed OOP Contracts, Nominality and The Liskov Substitution Principle (LSP) Contracts are widely-used notions in mainstream OO software development. A contract in an OO program is similar to a contract in the real world: It specifies what an object expects of client objects and what client objects can expect of it. Members of an objectโ€”i.e., its fields and methodsโ€”and properties of these members form the objectโ€™s interface with the outside world; the buttons on the front of a television set, for example, are the interface between us and the electrical wiring on the other side of the TVโ€™s plastic casing. One presses the โ€œpowerโ€ button and he or she are promised this will turn the television on and off. In its most common form, an interface is a group of related methods together with a contract giving promises on the behavior of these methods. Similarly, a class contract is an agreement that instances of the class will expose (present as their public interface, or API) certain methods, certain properties, and certain behaviors. In this section we first informally and less-technically, discuss the importance of contracts, and of nominal typing and nominal subtyping to mainstream OO developers in Section 3.1โ€”briefly discussing DbC (Design by Contract) in the process, then we discuss how LSP (Liskovโ€™s Substitution Principle) expresses the importance of preserving contracts upon inheritance. In Section 3.2 and Section 3.3, we then present code examples that illustrate how nominally-typed OOP and structurally-typed OOP compare to each other from a technical point of view, and illustrate how structural typing and structural subtyping sometimes force the breaking of contracts. In the comparison we discuss two key problems with structural OO type systems, namely, โ€˜spurious subsumption,โ€™ and its converse, โ€˜missing subsumption.โ€™7 In Section 3.3.1, 7 A technical overview of main OO typing notions that explains some of the technical jargon used in this essay is pre- sented in [9]. 5 Provider Client Contract Examples Examples of contracts in OO software are plenty. Examples familiar to most Java developers, for example, include the contract of the Comparable interface promising its clients a total ordering on its elements and requiring that classes that implement the interface adhere to this promise, and the contract of class Object promising that the equals() method and the hashCode() method are in agreement and requiring subclasses that override one of the two methods to override the other method accordingly. Also in Java, class JComponent contains a default implementation of all of the methods in the Accessible interface, but JComponent is not actually declared to implement the interface, because the contract associated with Accessible is not satisfied by the default implementation provided in JComponent. This example stresses the association of inherited contracts with superclass names. In mainstream OO software, if a class extends another class or implements an interface it is declaring that it inherits the contract associated with the superclass or superinterface and will maintain it. Likewise, if a class does not maintain the contract associated with another class or interface it does not declare itself as extending or implementing the class or interface. We discuss this point further in Section 3.1.1. Other examples of contracts may also include a class that implements tree layout algorithms. The contract of such a class may require the input graph to be a tree, and may promise as result, if the input is a tree, to produce a layout that has no overlapping nodes, edges or labels. In general, contracts, whether written formally or informally, usually contain the following pieces of information: side effects, preconditions, postconditions, invariants, and, sometimes, even performance guarantees. In Java, class contracts, as a set of requirements and promises, are usually stated in Javadoc comments. Requirements of a contract are simply any conditions on the use of the class, for example: conditions on argument values, conditions on the order of execution of methods, conditions on execution in a multi-threaded or parallel environment. Two further, rather artificial, examples for contracts, that we will expound on below to show the dif- Benefit (4) Output guaranteed to comply to postconditions (no need to check output) (2) Input guaranteed to comply to preconditions (no need to check input) Obligation (1) Satisfy preconditions (3) Satisfy postconditions Table 1: Design By Contract (DbC): Benefits and Obligations [Source: [46]] ferences between nominal typing and structural typing, are the promise that an animal can play with any another animal, and the promise that a (mathematical) set contains no repeated elements. In particular, we use these two examples to show how structural subtyping can lead to breaking contracts associated with classes/interfaces/traits. From the presented examples, it is easy to see that a contract is made of two parts: requirements upon the caller (โ€œthe clientโ€) made by the class (โ€œthe providerโ€) and promises made by the class to the caller. If the caller fulfills the requirements, then the class promises to deliver some well-defined service. Requirements may be enforced by throwing checked or unchecked exceptions when the stated conditions are violated. Promises can be enforced by assertions at the end of a method. Further, according to proponents of โ€˜Design By Contractโ€™ (DbC), classes of a software system communicate with one another on the basis of precisely defined benefits and obligations [57, 58]. If preconditions are not obeyed by the client of the class method, the service provider will deny its service. If any postcondition or invariant is violated, it uncovers a problem on the service provider side [46]. As such, the benefits and obligations of clients and providers, along with their relative chronological order, can be summarized as in Table 1. Nominally-Typed OOP Moving on from DbC to the design of mainstream OO type systems, OO languages should ideally include behavioral contracts in object types. Motivated by DbC, contracts are used 6 Provider Client by mainstream OO developers for constructing robust, reliable, reusable and maintainable OO software, since contracts promise specified properties of objects. For example, in his widely-known book titled โ€˜Effective Javaโ€™ [16, 17], Joshua Bloch reflects on the use of contracts in mainstream OOP and asserts the value of contracts to OO software design by writing that, โ€˜No class is an island. Instances of one class are frequently passed to another. Many classes depend on the objects passed to them obeying the contracts associated with their superclasses ... once youโ€™ve violated the contract, you simply donโ€™t know how other objects will behave when confronted with your object.โ€™ Obligation (1) Satisfy contract requirements (3) Satisfy contract promises Table 2: Contracts in Nominally-Typed OOP: Benefits and Obligations world. In a statically-typed language the tractable component of the contract is enforced at build time by the compiler. In Java, for example, if a class claims to implement an interface, all methods defined by that interface must appear in its source code before the class will successfully compile, and during run time it is assumed the promises given by the interface are maintained by the class. The same happens if a class claims to extend another class, or if an interface claims to extend another interface. This inheritance of requirements and promises is sometimes referred to as interface inheritance, contract inheritance, or type inheritance.8 While using inheritance, it may be necessary to make changes to a superclass contract. Some changes to a specification/contract will break the caller, and some will not. For determining if a change will break a caller, professional OO developers use the memorable phrase โ€œrequire no more, promise no lessโ€: if the new specification does not require more from the caller than before, and if it does not promise to de- In practice however, the inclusion of behavioral contracts in object types is too much to ask of a type checker (because of the general problem of not being able to statically check contracts, since behavioral contracts are remarkably expressive). The solution OO language designers choose is to go with an approximation. The association of class names with contracts, and OO type systems respecting nominal information in typing and subtyping decisions, allows a nominally-typed OO type system to be a tractable approximation of DbC; hence, OO language designers of many mainstream OO languages use nominal typing. Nominally-typed OO languages typically do not require the enforcement of requirements and promises of contracts; requirements and promises are rather assumed to hold, thereby encouraging but not requiring developers to enforce the contracts. To accurately reflect how contracts are used in nominally-typed OOP, Table 1 can as such be modified into Table 2. 3.1.1 Benefit (4) Output assumed to comply to contract promises (no need to check output) (2) Input assumed to comply to contract requirements (no need to check input) 8 According to [67], โ€˜Programmers employ inheritance for a number of different purposes: to provide subtyping, to reuse code, to allow subclasses to customise superclassesโ€™ behaviour, or just to categorise objectsโ€™. Inheritance as only being โ€˜a method by which classes share implementationsโ€™ (i.e., it being a โ€˜code sharing/code reuseโ€™ technique), is a very limited notion of inheritance that, unfortunately, is still entertained by some OO PL researchers. Code sharing is only a part of the fuller picture of OO inheritance, and is only a means towards the higher goal of classes sharing their contracts (and even their architectures [37, 14]), not just their code. Inheritance as โ€˜contract sharingโ€™ is the notion of inheritance that we are generally interested in and discuss in this essay. Inheritance, Subsumption and Contract Preservation As to the inheritance of contracts in mainstream OOP, implementing an interface, for example, allows a class in an OO program to become more formal about the behavior it promises to provide. Interfaces form a contract between a class and the outside 7 liver less than before, then the new specification is compatible with the old, and will not break the caller. Bloch [16, 17], hinting at the conventional wisdom among mainstream OO developers that identifies type inheritance with subtyping, proceeds to conclude, based on his earlier observations about contracts, that programming. Whenever these principles are violated, a program becomes more difficult to understand and to maintain. (For example, after his discussion of contracts Bloch then gives examples demonstrating problems, in the Java libraries which Bloch himself coauthored, that resulted from violating these principles [16, 17].) Based on the discussion of contracts and inheritance, two clear OO design principles among professional mainstream OO developers are: โ€˜inheritance [of contracts] is appropriate only in circumstances where the subclass really is a subtype of the superclass.โ€™ 1. Whenever the contract of a class/interface/trait is obeyed by an inheriting class (i.e., whenever we have type inheritance) we should have subsumption between corresponding class types (i.e., we should have subtyping), and, conversely, As such, Bloch concludes that โ€˜it is the responsibility of any subclass overriding the methods of a superclass to obey their general contracts; failure to do so will prevent other classes that depend on the contracts from functioning properly in conjunction with the subclass.โ€™ 2. Whenever we have subsumption between two class types (i.e., whenever we have subtyping) the contracts (of the superclass type) should be obeyed by the subclass type (i.e., we should have type inheritance). The requirement that subclasses maintain the contracts of their superclasses is expressed among professional OO developers by stating that well-designed OO software should obey the Liskov substitution principle (LSP) [49, 50]. According to Bloch [16, 17], Given the importance of the LSP (as expressing the preservation of contracts upon inheritance) to mainstream OO developers, and given that contracts are typically specifications of object behavior, it is easy to conclude that basing typing on contracts so as to make typing and subtyping closer to behavioral typing and behavioral subtyping (sometimes also called โ€˜semantic typingโ€™ and โ€˜semantic subtypingโ€™) is a desirable property of an OO language. To further illustrate the importance of identifying inheritance with subtyping to OO software developers, in the following two sections we present code examples that point out two problems with structural subtyping that do not exist in nominally-typed OOP. The first problem is what is sometimes called the problem of โ€˜spurious subsumptionโ€™ ([63, p.253]), and the second is the problem of inheritance not implying subtyping (which we call โ€˜missing subsumptionโ€™), i.e., that inheritance between two classes does not imply subsumption between the two corresponding class types (the converse of the spurious subsumption problem.)10 โ€˜The LSP says that any important property of a type should also hold for its subtypes, so that any method written for the type should work equally well on its subtypes [49, 50]โ€™.9 As such, as demonstrated by Bloch, it is common knowledge among professional mainstream OO developers that subsumption (as expressed by the LSP) and the identification of inheritance with subsumption (i.e., subtyping between object types) are an integral part of the mental model of object-oriented 9 The LSP is the third of the five OO design principles (the L in โ€˜SOLIDโ€™) mainstream OO developers follow to design robust OO software. In the jargon of OO developers, OO code โ€œsmellsโ€ (in particular, it has a โ€˜refused bequestโ€™) if some class in the code does not obey LSP, i.e., if a derived classโ€”that is, a subclassโ€”in the code breaks the contract of one of its base classes-โ€“that is, of one of its superclasses. The LSP thus expresses that class contracts are preserved by inheriting classes. 10 The code examples can be skipped by a reader familiar with these two problems. 8 In the spurious subsumption problem, we have two classes whose instances do not maintain the same contract but are considered subtypes according to structural subtyping rules, demonstrating an example of structural subtyping breaking LSP. In the missing subsumption problem, we have two classes whose instances do maintain the same behavioral contract but that are not considered subtypes in a structural type system, due to structural type systems rebinding self-types upon inheritance, demonstrating an example of structural subtyping thus breaking the identification between inheritance and subtyping. Further, due to pure structural OO type systems always requiring the rebinding of self-types upon inheritance, we also point out a so-far-unknown problem with pure structural subtyping that we call the problem of โ€˜spurious binary methods.โ€™ We note in the code for class Set and class MultiSet that the two classes support precisely the same set of four operations on their instances having the same signatures for these four operations. The different contracts associated with the two classes, specifying that the semantics and run-time behavior of their instances should agree with the corresponding mathematical notions, are reflected only in the different class names of the two classes but not in the structure of the two classes. Given that nominally-typed OOP respects class names (and thus the associated class contracts) while structurally-typed OOP ignores them, we have the final assignment in 3.2 correctly disallowed in nominally-typed OOP, but is wrongly allowed in structurally-typed OOP. The assignment is not allowed in nominally-typed OOP because class MultiSet does not inherit from class Set, while it is allowed in structurally-typed OOP because of matching signatures of all operations supported by the two classes. The assignment should not be allowed because, if allowed (as demonstrated in the code above), it will allow repetition of a setโ€™s elements in the value bound to variable s by the assignment (given that it is an instance of MultiSet). Variable s, by its declaration, is assumed to be a Set (with no repeated elements), and the assignment, if allowed, will thus break the contract of class Set associated with variable s. The problem of spurious subsumption is similar to the problem of accidentally mistaking values of a datatype for those of another datatype (think of using floats for modeling euros and dollars then mistaking euros for dollars or mistaking floats for either [63].) Similarly, OO software developers think of an object in the context of its class hierarchy and of the contracts associated with its class members. A key prescript of nominally-typed OOP is that class contracts are inherited along with class members and should be maintained by instances of inheriting subclasses. Spurious subsumption in structurally-typed OOP al- MultiSet m = new MultiSet (); m . insert (2); m . insert (2); Set s = m ; // Allow assignment ? Spurious Subsumption In structurally-typed OOP, subtyping does not imply inheritance, that is, we may have subtyping between types corresponding to two classes (instances of one can be used as that of the other) but not have an inheritance relation between these two classes. To illustrate, let us assume the following definitions for class Set and class MultiSet (where the contract of class Set disallows repetition of elements of a Set, in agreement with the mathematical definition of sets, whereas the contract of class MultiSet allows repetition of elements of a MultiSet, in agreement with the mathematical definition of multisets, sometimes also called bags), class Set { Boolean equals ( Object s ) { ... } Void insert ( Object o ) { ... } Void remove ( Object o ) { ... } Boolean isMember ( Object o ) { ... } } class MultiSet { Boolean equals ( Object ms ) { ... } Void insert ( Object o ) { ... } Void remove ( Object o ) { ... } Boolean isMember ( Object o ) { ... } } 9 lows for unintended breaking of this rule, since a structural type checker fails to reject a program that uses an object of one type where a behaviorally different, but structurally compatible, type is expected.11 . 3.3 Animal mate ( Animal a ) { ... } } class Cat extends Animal { ... // behavior specific to cats Inheritance Is Not Subtyping Another problem with structural subtyping is the converse of the spurious subsumption problem. In structurally-typed OO languages, structural subtyping does not require subtyping between types of classes that are in the inheritance relation (and thus have inherited contracts), i.e., inheritance does not imply subtyping. In combination with subtyping not implying inheritance (i.e., spurious subsumption), structural subtyping thus totally separates the notions of inheritance and subtyping, based on its nonnominal view of inheritance which ignores the inheritance of class contracts associated with class names. To illustrate inheritance not implying subtyping in structurally-typed OOP, assume the following definitions for class Animal and class Cat class Animal { Void move ( Point to ) { ... } Void eat ( Food some ) { ... } Void breathe () { ... } Void sleep ( Time period ) { ... } ... // more generic animal behavior , // and ... 11 For example, as mentioned earlier, interface Comparable in Java, consisting of the single abstract method int compareTo(Object o), has a public contract asserting that compareTo defines a total ordering on instances of any class inheriting from Comparable, and that clients of Comparable can thus depend on this property. An arbitrary class with a method int compareTo(Object o), however, generallyspeaking does not necessarily obey this contract. In structurally-subtyped OO languages, instances of such a class can be bound, by spurious subsumption, to variables of type Comparable (similar to allowing the binding of the instance first bound to variable m to variable s in the Set/MultiSet example above). This is in spite of the fact that when a developer asserts that a class C implements Comparable, he or she is asserting that compareTo() defines a total ordering on class C, and the author of Comparable conversely asserting that if a class C does not implement the Comparable interface, instances of C cannot be bound to variables of type Comparable, since the compareTo method of C may unintentionally or intentionally not define a total ordering on instances of C. // generic animal behavior inherited // from class Animal // but , do Cats ... Cat mate ( Cat c ) { ... } // OR do they ... Animal mate ( Animal a ) { ... } // ??? } Structurally-typed and nominally-typed OOP disagree on the signature of method mate() in class Cat. Structurally-typed OOP assumes that mate() is a binary method (See [22], where binary methods were recognized as problematic and multiple approaches were suggested for dealing with them. We discuss them more technically in Section 3.4), and requires the method to have the โ€œmore naturalโ€ signature Cat mate(Cat c), at the expense of making Cats (i.e., instances of class Cat) not be Animals (i.e., instances of class Animal)12, when they (quite naturally) should be ones13 . Nominally-typed OOP, on the other hand, does not assume the mate() method in class Animal to be a binary method. It thus keeps using the same signature for the method upon its inheritance by class Cat. In nominally-typed OOP, thus, Cats are indeed Animals, meaning that nominally-typed mainstream OOP does identify inheritance with subtyping. Given how nominally-typed OOP and structurally-typed OOP differ on whether inheritance implies subtyping, 12 That is, in structurally-typed OO languages the structural type corresponding to class Cat is not a subtype of the structural type corresponding to class Animal (because of the contravariance of types of method arguments), unless some unintuitive structural notion, like โ€˜matchingโ€™ [23] (which expresses โ€˜the similarity of recursive structureโ€™ between class Cat and class Animal, but which did not gain traction or support in mainstream OOP), is added to the language to be used as a pseudo-replacement for subtyping. (See also discussions in Section 3.4 and in [11, 13]) 13 One may here recall Cardelliโ€™s noting, in [24, 25], of the โ€˜biological originโ€™ of OOP. This biological origin is the reason OO inheritance is called โ€˜inheritanceโ€™ in the first place. 10 the assignment Animal a = new Cat() is correctly allowed in nominally-typed OOP, but is wrongly disallowed in structurally-typed OOP. To summarize, the code examples presented above demonstrate a fundamental difference between structurally-typed OOP and nominally-typed OOP from the perspective of OO developers. In structurally-typed OOP, where only class structure is inherited but not class contracts, MultiSets are Sets (contrary to their mathematical definition) and Cats are not Animals (contrary to their โ€œbiological definitionโ€). In nominally-typed OOP, where class contracts are inherited (via class names) in addition to class structure, MultiSets are not Sets (in agreement with their mathematical definition) and Cats are Animals (in agreement with their โ€œbiological definitionโ€.) In nominally-typed OOP whether subtyping is needed or not is indicated by the presence or absence of explicit inheritance declarations. Accordingly, the code examples above make it clear, more generally, that: Structurally-typed OOP sometimes forces subtyping when it is unneeded, and sometimes bars it when it is needed, while nominally-typed OOP only forces subtyping when it is explicitly needed, and bars it when, by omission, it is explicitly unneeded. This conclusion demonstrates a fundamental semantic and practical value of nominal information to OO developers of nominally-typed OO programming languages. method any method inside a class that takes an argument that has the same type as that of the class the method is declared in. This causes methods like playWith in class Animal, whose semantics is not that of true binary methods, to be mistaken as ones, and thus, in subclass Cat, for example, the playWith method will have the restrictive signature Void playWith(Cat a) (allowing Cats to play only with other Cats but not with other Animals.) We call this so-far-unrecognized problem with structural typing as the problem of โ€˜spurious binary methodsโ€™ (or, โ€˜false binary methodsโ€™), since a method is inadvertently considered as being a binary method when it should not be. Nominallytyped OO languages do not suffer from this problem, because nominally-typed OO languages treat any such method as a regular (i.e., non-binary) method, and thus the signature of the method does not change upon inheritance in a nominally-typed OO language.15 3.4 Nominal Typing, Type Names, Recursive Types and Binary Methods Based on the discussion in the previous sections, a fundamental technical difference between nominallytyped OO languages and structurally-typed OO languages clearly lies in how the two approaches of typing OO languages differently view and treat type names. 3.3.1 Spurious Binary Methods In structurally-typed OO languages, type names are viewed as being names for type variables that abA lesser-recognized problem with structurally-typed breviate type expressions (i.e., are โ€œshortcutsโ€). As OOP, which is also related to binary methods, is the such type names in structurally-typed OO languages fact that, in a pure structurally-typed OO language (i.e., one with no nominal typing features), a class 15 In nominally-typed OOP, โ€˜F-bounded Genericsโ€™ (as used, like Animal cannot have a method like, say, for example, to define the generic class Enum in Java [43, 44]) offers a somewhat better alternativeโ€”if also not a fully satisfacVoid playWith(Animal a) that keeps having the same signature in its subclass tory oneโ€”to support true binary methods, while keeping the identification between inheritance and subtyping. Based on Cat14 and any other subclasses of class Animal. Pure some preliminary research we made, we expect future research structurally-typed OOP always treats as a binary to offer a more satisfactory alternative for supporting true bi14 So as to allow Cats to play with Dogs and Mouses (i.e., mice!), for example. nary methods in nominally-typed OO languagesโ€”hopefully a fully satisfactory alternative. (Also see related discussion close to the end of Section 3.4.) 11 are useful, and are even necessary for defining recursive type expressions. As variable names, however, recursive type names in structurally-typed OO languages (such as the name of a class when used inside the definition of the class, which gets interpreted as โ€˜self-typeโ€™) get rebound to different types upon inheritance, and they get rebound to types that, if they were subtypes, could break the contravariant subtyping rule of method parameter types and thus break the type safety of structurally-typed OO languages. Structurally-typed OO languages resolve this situation by breaking the one-to-one correspondence between inheritance and subtyping as we demonstrated in the earlier code examples in Section 3.2 and Section 3.3. In nominally-typed OO languages, however, nominality of types means type names are viewed as part of the identity and meaning of type expressions given the association of type names with public class contracts. This means that class names cannot be treated as variable names. Accordingly, in a nominally-typed OO program type names have fixed meanings that do not change upon inheritance. Further, the fixed type a type name is bound to in a nominally-typed OO program does not break the contravariant subtyping of method parameters when the method and its type get inherited by subclasses, thus not necessitating breaking the identification between inheritance and subtyping as we demonstrated by the earlier code examples in Section 3.2 and Section 3.3. In class-based OOP, a class can directly refer to itself (using class names) in the signature of a field, or that of a method parameter or return value. This kind of reference is called a self-reference, a recursive reference, or, sometimes, a circular reference. Also, mutually-dependent classes, where a class refers to itself indirectly (i.e., via other classes), are allowed in class-based OOP. This kind of reference inside a class, indirectly referencing itself, is called an indirect self-reference, a mutually-recursive reference, or, a mutually-circular reference. As Pierce [63] noted, nominally-typed OO languages allow readily expressing circular (i.e., mutually-dependent) class definitions. Since objects in mainstream OOP are characterized as being selfreferential values (are โ€˜self-aware,โ€™ or โ€˜autognosticโ€™ ac- cording to Cook [33]), and since self-referential values can be typed using recursive types [52], there is a strong and wide need for circular class definitions in OOP. As such, direct and indirect circular type references are quite common in mainstream OOP [33]. The ease by which recursive typing can be expressed in nominally-typed OO languages is one of the main advantages of nominally-typed OOP. According to Pierce [63, p.253], โ€˜The fact that recursive types come essentially for free in nominal systems is a decided benefit [of nominally-typed OO languages].โ€™ As a demonstration of the influence of views of selfreferential classes on properties of OO type systems, when nominal and structural domain-theoretic models of OOP are compared (as done in brief, e.g., in [8, 10], and in detail, e.g., in [11]), it is easy to see that self-referential classes are viewed differently by nominal models of OOP than by structural models and that these different views of self-referential classes, in particular, make nominal domain-theoretic models of OOP lead to a simple mathematical proof of the identification between type inheritance and subtypingโ€”a different conclusion than the one reached based on structural models. (In particular, the inclusion of class signature constructs in NOOP led to the simplicity of the mathematical proof of this identification. See [8, 10, 13] for more details.) Aside from theory, the difference between the nominal and the structural views of type names in OOP demonstrates itself most prominently, in practice, in the different support and the different treatment provided by nominally-typed OO languages and by structurally-typed OO languages to โ€œbinary methodsโ€. As mentioned in Section 3.3, a โ€œbinary methodโ€ is a method that takes a parameter or more of the same type as the class the method is declared in [22]. The problem of binary methods and requiring them to be supported in OO languages was a main factor behind structural models of OOP leading to not identifying type inheritance with subtyping. Structurally-typed OO languages, given their view of type names as type variable names that can get rebound, require the type of the argument of a method, 12 when identified as a binary method and upon inheritance of the method, to be that of the type corresponding to the subclass. Nominally-typed OO languages, on the other hand, with their fixed interpretation of type names, offer a somewhat middle-ground solution between totally avoiding binary methods and overly embracing them as pure structurally-typed OO languages do. Nominally-typed OO languages treat a method taking in an argument of the same class as that in which the method is declared like any other method, needing no special treatment. Nominally-typed OOP thus does not quite support binary methods, but, for good reasons (i.e., so as to not break the identification of inheritance of contracts with subtyping nor lose other advantages of nominal typing), offers only a good approximation to binary methods. Given that the meaning of types names in nominally-typed OO languages does not change upon inheritance, these languages provide methods whose type, upon inheritance, only approximates that of true binary methods: The type of the input parameter of a method that approximates a binary method is guaranteed to be a supertype of its type if it were a true binary method. Given that the type of the parameter does not change in subclasses, the degree of approximation gets lesser the deeper in the inheritance hierarchy the method gets inherited. In light of the โ€˜spurious binary methodsโ€™ problem we uncovered in structural OO type systems (see Section 3.3), we believe providing approximations to binary methods is a smart design choice by nominal OO type systems, even if it is likely that avoiding spurious binary methods may have not been consciously intended. It should also be noted that the problem of spurious binary methods provides justification for nominally-typed OO languages being cautious about fully embracing binary methods by treating a method that looks like a binary method as indeed being one. Also, as we hinted to in earlier sections, in our opinion structural typing having arguably better support for binary methods does not justify using structural OO typing, since structural type systems have their own problems in their support of binary methods (i.e., the problem of spurious binary methods). We conjecture that F-bounded generics, or some other notion16 may provide a better solution for binary methods in nominally-typed (and possibly also in structurally-typed OOP) that does not require breaking the identification of inheritance with subtyping (and thus does not require sacrificing the closeness of nominal typing/subtyping to semantic and behavioral typing/subtyping and other advantages of nominal typing). In light of the โ€˜spurious binary methodsโ€™ problem, and requiring no explicit use of generics, in our opinion a better approach towards supporting binary methods in mainstream OO languages might be by allowing developers to explicitly mark or flag binary methods as being such, or, even more precisely, to allow developers to mark specific parameters of methods as being parameters that need to be treated as those of binary methods. As to โ€œhybridโ€ OO languages, which add (some) structural typing features to nominally-typed OO languages17 , or vice versa, we conjecture that the useful part of the claimed โ€œflexibilityโ€ of structural typing may be possible to achieve in nominally-typed OO languages by supporting a separate notion of โ€˜contract names,โ€™ thereby splitting class names from contract names, then allowing classes to additionally define themselves as satisfying supercontracts of other already-defined (sub)classes. We have not explored this suggestion further however, since we believe it may complicate nominal OO type systems. But we believe that, if flexibility is an absolute necessity, then splitting class names from contract names may be a suggestion worthy of investigation. We believe this suggestion to be a more viable optionโ€”simpler to reason about and more in agreement with the nominal spirit of nominally-typed OO languagesโ€”than using multiple dispatch ([30, 18, 31]), which was discussed in [22] as a possible solution to the problem of binary methods, and also more viable than creating hybrid languages. We believe that having an OO type system be both nominally and structurally typed, as 16 For example, โ€œimplicit self-type-variablesโ€, e.g., This/Self, which are implicit type variables because they do not get included in class signatures, similar to โ€œimplicit self-variablesโ€, e.g., this/self, which are not included in method signatures. 17 Due to problems with supporting recursive types mentioned above, we believe most of these โ€œhybridโ€ languages do not support recursive structural types, for example. 13 in [38, 62, 42, 54, 55, 61, 4], makes the type system does not necessarily imply the similarity of behavvery complex (and probably even lends its โ€œhybridโ€ ior, in nominally-typed OOP type inheritance implies features unusable.) refined contracts, and refined contracts imply subsumption between class types, and vice versa (i.e., in nominally-typed OOP, subsumption between class 4 Concluding Remarks types implies refined contracts, implying type inheritance.) In this essay we added to earlier efforts that aimed Putting these facts together, it is clear that in to demonstrate the semantic value of nominal typing, nominally-typed OOP different class names informaparticularly the association of class names with be- tion implies different contracts/types and different havioral class contracts, by making a technical com- contracts/types imply different class names informaparison between nominal OO type systems and struc- tion. This identification of types with contracts, and tural OO type systems. Recently, a domain-theoretic of subtyping with inheritance of contracts, makes model of nominally-typed OOP, namely NOOP, was nominal typing and nominal subtyping closer to sealso compared to models of structurally-typed OOP. mantic typing and semantic subtyping. These comparisons provide a clear and deep account In the essay we thus stressed the practical value of for the relation between nominal and structural OO nominal typing in mainstream OOP by particularly type systems that, due to earlier lack of a domain- showing theoretic model of nominally-typed OOP, has not 1. The value of nominal subtyping, at compile time been presented before, and they should help furand at runtime, in respecting behavioral conther demonstrate, to OO PL researchers, the value tracts and thus respecting design intents, of nominal typing and nominal subtyping to mainstream OO developers and language designers, and 2. The value of the resulting identification between instill in them a deeper appreciation of it. inheritance and subtyping in providing a simpler In the essay we particularly noted that nominal conceptual model of OO software and of OO softtyping prevents types that structurally look the same ware components, leading to a simpler design from being confused as being the same type. Since process of OO software, and some objects having the same structure does not necessarily imply these objects have the same behav3. The value of making recursive types readily ior, nominal typing identifies types only if they have expressible, this being necessary for the static the same class names information (nominal informatyping of โ€œautognosticโ€ objects. tion) and thus only if they assert maintaining the same contract and not just assert having the same Our comparison also revealed the problem of โ€˜spuristructural interface. Thus, in nominally-typed OOP ous binary methods,โ€™ so far an unrecognized problem objects having the same class type implies them as- in structurally-typed OO languages. serting they maintain the same contracts, and them Further, the recent comparison of nominal and asserting they maintain the same contracts implies structural denotational models of OOP demonstrates them having the same type. them having different views of fundamental notions of Similarly, nominal subtyping allows subtyping re- mainstream OOP, namely of objects, of type names, lations to be decided based on the refinement of con- of object/class types, of subtyping and of the relation tracts maintained by the objects, not just based on between subtyping and type inheritance. In particthe refinements of their structure. By inclusion of ular, this comparison demonstrates that an object contracts in deciding the subtyping relation, nominal in mainstream nominally-typed OOP is a record tosubtyping thus also prevents types that are superfi- gether with nominal information, that class types are cially (i.e., structurally) similar from being confused record types whose elements (i.e., objects/class inas being subtypes. Since the similarity of structure stances) additionally respect statements of class con14 tracts, and that type inheritance is correctly identi- mainstream OOP, should be based less on structural models of OOP and more on nominal ones instead. fied with nominal subtyping. Table 3 on the following page summarizes the main differences between nominal typing and structural References typing we pointed out in this essay. [1] C# language specification, version 3.0. http://msdn.microsoft.com/vcsharp, 2007. We hope the development of mathematical models of nominally-typed OOP and the comparisons presented in this essay and elsewhere are significant steps in providing a full account of the relation between nominal and structural OO type systems. We further hope this essay clearly explains the rationale behind our belief that the significant practical value and the significant semantic value of nominal typing are the reasons for industrial-strength mainstream OO software developers correctly choosing to use nominally-typed OO languages. We believe that having a clear view of the rationale behind many OO developersโ€™ preference of nominally-typed OO languages, and having a more accurate technical and mathematical view of nominally-typed OO software, present programming languages researchers with better chances for progressing mainstream OO languages and for making PL research relevant to more OO language designers and more mainstream OO software developers.18 Finally, we believe a clearer understanding and a deeper appreciation of a key semantic advantage of nominal OO typing over structural OO typing can help remedy the existing schism between OO PL researchers on one hand and OO developers and OO language designers on the other hand, offering thereby better chances for progressing mainstream OO languages. In particular, we believe future foundational OO PL research, to further its relevance to 18 Generics, for example, add to the expressiveness of type systems of nominally-typed OO programming languages [15, 20, 29, 43, 44, 1, 17, 3, 47, 69]. As hinted to earlier, genericsโ€” particularly so-called โ€˜F-bounded genericsโ€™โ€”seem to improve the support for binary methods in nominally-typed OO languages while maintaining the identification between inheritance and subtyping. We believe building a domain-theoretic model of generic nominally-typed OOP (e.g., along the lines of [12]) may offer better chances for having a deeper understanding of features of generic mainstream OO languages, such as Java erasure, variance annotations (including the notorious Java wildcards), polymorphic methods, generic type inference and so on. [2] ISO/IEC 14882:2011: Programming Languages: C++. 2011. [3] The Scala programming language. www.scalalang.org, 2014. [4] The Go programming www.golang.org, 2015. language. [5] The TIOBE index. http://www.tiobe.com/index.php/ content/paperinfo/ tpci/index.html, 2016. [6] Martin Abadi and Luca Cardelli. A semantics of object types. In Proc. LICSโ€™94, 1994. [7] Martin Abadi and Luca Cardelli. A Theory of Objects. Springer-Verlag, 1996. [8] Moez A. AbdelGawad. NOOP: A Mathematical Model of Object-Oriented Programming. PhD thesis, Rice University, 2012. [9] Moez A. AbdelGawad. An overview of nominaltyping versus structural-typing in objectoriented programming (with code examples). Technical report, arXiv.org:1309.2348 [cs.PL], 2013. [10] Moez A. AbdelGawad. A domain-theoretic model of nominally-typed object-oriented programming. Journal of Electronic Notes in Theoretical Computer Science (ENTCS), DOI: 10.1016/j.entcs.2014.01.002., 301:3โ€“19, 2014. [11] Moez A. AbdelGawad. A comparison of NOOP to structural domain-theoretic models of objectoriented programming. Preprint available at http://arXiv.org/abs/1603.08648, 2016. 15 Nominally-Typed OOP Object Interfaces Nominal; Include class names Contracts (as richer specifications of object behavior) Types of Objects Object Type Expressions Included (via class names) in the meaning of objects, of their interfaces and of their types Class types Structurally-Typed OOP Structural; Do not include class names Ignored in the meaning of objects, of object interfaces, and of object types Record types Class signatures Record type expressions Class signatures, as object types, are included in object meanings Class names, being associated with public class contracts, are used as type names Fixed. Cannot be rebound upon inheritance Includes inheritance of class contracts Respects contracts; respects (type) inheritance Objects do not carry their types as part of object meanings Type names are abbreviations/ synonyms for type expressions (with no inherent fixed meaning) Can be rebound upon inheritance Type Reification/Nominality Type Names Meaning of Type Names (Type) Inheritance Subtyping (Type) Inheritance versus Subtyping OO Software Design Mental Model Binary Methods Spurious and Missing Subsumption Spurious Bin. Methods Ignores behavioral class contracts Ignores behavioral class contracts One-to-one correspondence Two relations independent Simple; Inheritance hierarchy = Subtyping hierarchy Not supported. Approximations provided Complex; An inheritance hierarchy and a separate, independโ€™t subtyping hierarchy Fully supported (including false ones) Neither can exist Both can exist Cannot exist Can exist Special constructs needed for explicit expression Further from semantic/behavioral typing and subtyping Recursive Types Readily and naturally expressed Typing and Subtyping Closer to semantic/behavioral typing and subtyping Table 3: OO Nominal-Typing vs. OO Structural-Typing 16 [12] Moez A. AbdelGawad. Towards understand- [22] Kim Bruce, Luca Cardelli, Giuseppe Castagna, ing generics. Technical report, arXiv:1605.01480 The Hopkins Objects Group, Gary Leavens, and [cs.PL], 2016. Benjamin C. Pierce. On binary methods. Theory and Practice of Object Systems, 1994. [13] Moez A. AbdelGawad and Robert Cartwright. In nominally-typed OOP, objects are not mere [23] Kim B. Bruce. Foundations of Object-Oriented records and inheritance Is subtyping. Submitted Languages: Types and Semantics. MIT Press, for journal publication, 2016. 2002. [14] Jonathan Aldrich. The power of interoperabil[24] Luca Cardelli. A semantics of multiple inherity: Why objects are inevitable. In Proceedings itance. In Proc. of the internat. symp. on seof the 2013 ACM International Symposium on mantics of data types, volume 173, pages 51โ€“67. New Ideas, New Paradigms, and Reflections on Springer-Verlag, 1984. Programming & Software, Onward! 2013, pages 101โ€“116, New York, NY, USA, 2013. ACM. [25] Luca Cardelli. A semantics of multiple inheritance. Inform. and Comput., 76:138โ€“164, 1988. [15] Joseph A. Bank, Barbara Liskov, and Andrew C. Myers. Parameterized types and Java. Technical [26] Luca Cardelli. Structural subtyping and the report, 1996. notion of power type. In ACM Proceedings of POPL, 1988. [16] Joshua Bloch. Effective java programming language guide, sun microsystems. Inc., Mountain [27] Luca Cardelli, James Donahue, Lucille GlassView, CA, 2001. man, Mick Jordan, Bill Kalsow, and Greg Nel[17] Joshua Bloch. Effective Java. Prentice Hall son. Modula-3 Report (Revised), volume 52. DigPTR, 2008. ital Systems Research Center, 1989. [18] John Boyland and Giuseppe Castagna. Parasitic [28] Robert Cartwright and Moez A. AbdelGawad. methods: An implementation of multi-methods Inheritance Is subtyping (extended abstract). for Java. In OOPSLA, 1997. In The 25th Nordic Workshop on Programming Theory (NWPT), Tallinn, Estonia, 2013. [19] G. Bracha and D. Griswold. Strongtalk: typechecking Smalltalk in a production environment. [29] Robert Cartwright and Jr. Steele, Guy L. In OOPSLAโ€™93, pages 215โ€“230, 1993. Compatible genericity with run-time types for [20] Gilad Bracha, Martin Odersky, David the Java programming language. In Craig Stoutamire, and Philip Wadler. Making Chambers, editor, ACM Symposium on Objectthe future safe for the past: Adding genericity Oriented Programming: Systems, Languages to the Java programming language. In Craig and Applications (OOPSLA), volume 33, pages Chambers, editor, ACM Symposium on Object201โ€“215, Vancouver, BC, October 1998. ACM, Oriented Programming: Systems, Languages ACM SIGPLAN. and Applications (OOPSLA), volume 33, pages 183โ€“200, Vancouver, BC, October 1998. ACM, [30] C. Chambers. Object-oriented multi-methods in Cecil. In ECOOP, 1992. ACM SIGPLAN. [21] K. Bruce, A. Schuett, R. van Gent, and A. Fiech. [31] C. Clifton, T. Millstein, G. Leavens, and PolyTOIL: A type-safe polymorphic objectC. Chambers. MultiJava: Design rationale, comoriented language. ACM Transactions on Propiler implementation and applications. ACM gramming Languages and Systems, 25(2):225โ€“ Transactions on Programming Languages and 290, 2003. Systems, 28(3):517โ€“575, 2006. 17 [32] William R. Cook. A Denotational Semantics of Inheritance. PhD thesis, Brown Univ., 1989. [43] James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. The Java Language Specification. Addison-Wesley, 2005. [33] William R. Cook. On understanding data abstraction, revisited. volume 44, pages 557โ€“572. [44] James Gosling, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. The Java Language ACM, 2009. Specification. Addison-Wesley, 2014. [34] William R. Cook, Walter L. Hill, and Peter S. [45] Atsushi Igarashi, Benjamin C. Pierce, and Philip Canning. Inheritance is not subtyping. In Wadler. Featherweight Java: A minimal core POPLโ€™90 Proceedings, 1990. calculus for Java and GJ. ACM Transactions on Programming Languages and Systems, [35] William R. Cook and Jens Palsberg. A denota23(3):396โ€“450, May 2001. tional semantics of inheritance and its correctness. In ACM Symposium on Object-Oriented [46] Reto Kramer. Examples of Design by Contract Programming, Systems, Languages and Applicain Java. In Design and Components - Object tions (OOPSLA), pages 433โ€“444, 1989. World - Berlin, 1999. [36] Sophia Drossopoulou, Susan Eisenbach, and Sar- [47] Angelika Langer. The Java Generics FAQ. www.angelikalanger.com/GenericsFAQ/Javafraz Khurshid. Is the java type system sound? GenericsFAQ.html, 2015. TAPOS, 5(1):3โ€“24, 1999. [37] Mohamed Fayad and Douglas C. Schmidt. [48] X. Leroy, D. Doligez, J. Garrigue, D. Rรฉmy, and J. Vouillon. The Objective Caml system. AvailObject-oriented application frameworks. Comable at http://caml.inria.fr/. mun. ACM, 40(10):32โ€“38, October 1997. [49] Barbara Liskov. Keynote address-data abstrac[38] Robert Bruce Findler, Matthew Flatt, and tion and hierarchy. In ACM Sigplan Notices, volMatthias Felleisen. Semantic casts: Contracts ume 23, pages 17โ€“34. ACM, 1987. and structural subtyping in a nominal world. In ECOOP 2004โ€“Object-Oriented Programming, [50] Barbara H Liskov and Jeannette M Wing. A pages 365โ€“389. Springer, 2004. behavioral notion of subtyping. ACM Transactions on Programming Languages and Systems [39] K. Fisher and J. Reppy. The design of a class (TOPLAS), 16(6):1811โ€“1841, 1994. mechanism for Moby. In PLDI, 1999. [51] David B. MacQueen. Should ML be objectoriented? Formal Aspects of Computing, 13:214โ€“ [40] Matthew Flatt, Shriram Krishnamurthi, and 232, 2002. Matthias Felleisen. Classes and mixins. In Proceedings of the 25th ACM SIGPLAN-SIGACT [52] David B. MacQueen, Gordon D. Plotkin, and symposium on Principles of programming lanR. Sethi. An ideal model for recursive polymorguages, pages 171โ€“183. ACM, 1998. phic types. Information and Control, 71:95โ€“130, 1986. [41] Matthew Flatt, Shriram Krishnamurthi, and Matthias Felleisen. A programmerโ€™s reduction [53] Boris Magnusson. Code reuse considered harmsemantics for classes and mixins. In Formal ful, 1991. syntax and semantics of Java, pages 241โ€“269. [54] Donna Malayeri and Jonathan Aldrich. InSpringer, 1999. tegrating nominal and structural subtyping. In ECOOP 2008โ€“Object-Oriented Programming, [42] J. Gil and I. Maman. Whiteoak: Introducing pages 260โ€“284. Springer, 2008. structural subtyping in Java. In OOPSLA, 2008. 18 [55] Donna Malayeri and Jonathan Aldrich. Is struc- [67] Ewan Tempero, Hong Yul Yang, and James Noble. What programmers do with inheritural subtyping useful? an empirical study. In tance in java. In Proceedings of the 27th EuESOP, 2009. ropean Conference on Object-Oriented Program[56] Erik Meijer and Peter Drayton. Static typing ming, ECOOPโ€™13, pages 577โ€“601, Berlin, Heiwhere possible, dynamic typing when needed: delberg, 2013. Springer-Verlag. The end of the cold war between programming [68] Kresten Krab Thorup and Mads Torgersen. Unilanguages. In OOPSLA, 2004. fying genericity. In ECOOP 99โ€“Object-Oriented Programming, pages 186โ€“204. Springer, 1999. [57] Bertrand Meyer. Applying โ€˜design by contractโ€™. Computer, 25(10):40โ€“51, 1992. [69] Yizhou Zhang, Matthew C. Loring, Guido Salvaneschi, Barbara Liskov, and Andrew C. Myers. [58] Bertrand Meyer. Object-Oriented Software ConLightweight, flexible object-oriented generics. In struction. Prentice Hall, 1995. Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Im[59] R. Milner, M. Tofte, R. Harper, and D. Macplementation, PLDI 2015, pages 436โ€“445, New Queen. The Definition of Standard ML (ReYork, NY, USA, 2015. ACM. vised). MIT Press, 1997. [60] Tobias Nipkow and David Von Oheimb. Javalight is type-safeโ€“definitely. In Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 161โ€“170. ACM, 1998. [61] Martin Odersky. The scala language specification, v. 2.7. http://www.scala-lang.org, 2009. [62] Klaus Ostermann. Nominal and structural subtyping in component-based programming. Journal of Object Technology, 7(1):121โ€“145, 2008. [63] Benjamin C. Pierce. Types and Programming Languages. MIT Press, 2002. [64] Benjamin C. Pierce. Types and programming languages: The next generation. LICSโ€™03, 2003. [65] Harry H Porter III. Separating the subtype hierarchy from the inheritance of implementation. Journal of Object-Oriented Programming, 4(6):20โ€“29, 1992. [66] Anthony J. H. Simons. The theory of classification, part 1: Perspectives on type compatibility. Journal of Object Technology, 1(1):55โ€“61, MayJune 2002. 19
6cs.PL
arXiv:1307.8162v2 [math.AC] 24 Jan 2018 STILLMANโ€™S QUESTION FOR EXTERIOR ALGEBRAS AND HERZOGโ€™S CONJECTURE ON BETTI NUMBERS OF SYZYGY MODULES JASON MCCULLOUGH Abstract. Let K be a field of characteristic 0 and consider exterior algebras of finite dimensional K-vector spaces. In this short paper we exhibit principal quadric ideals in a family whose Castelnuovo-Mumford regularity is unbounded. This negatively answers the analogue of Stillmanโ€™s Question for exterior algebras posed by I. Peeva. We show that these examples are dual to modules over polynomial rings that yield counterexamples to a conjecture of J. Herzog on the Betti numbers in the linear strand of syzygy modules. 1. Introduction Let K be a field and let S be the symmetric algebra of some finite dimensional K-vector space. Stillman [12, Problem 3.14] posed the following question: Can the projective dimension pdS (S/I) of a homogeneous ideal I be bounded purely in terms of the number and degrees of the minimal generators of I? Caviglia showed that this question was equivalent to the parallel question where one replaces projective dimension by regularity. (cf. [10, Theorem 2.4]) Ananyan-Hochster [1] recently gave a positive answer to this question in full generality. Now let E be the positively graded exterior algebra of a finite dimensional Kvector space. While resolutions over E need not be finite, the regularity regE (M ) of a finitely generated E-module is finite since E is a Koszul algebra. Here regE (M ) is defined as regE (M ) := sup{j โˆ’ i| TorE i (M, K)j 6= 0}. Irena Peeva posed the following variant of Stillmanโ€™s Question at the Joint Introductory Workshop at MSRI in the fall of 2012: Question 1.1 (Peeva). Can the regularity regE (E/I) of a homogeneous ideal I of E be bounded purely in terms of the number and degrees of the generators? Surprisingly, and contrary to the symmetric algebra case, the answer to this question is no. In Section 4 we present a family of principal quadric ideals in exterior algebras over an arbitrary field whose regularity is unbounded. Now let M be a finitely generated, graded S-module where S = K[x1 , . . . , xn ]. Let d denote the minimal degree of a generator of M . We consider the Betti numbers in the linear strand of M , that is: ฮฒilin (M ) := ฮฒi,d+i (M ), 2010 Mathematics Subject Classification. Primary: 13D02 ; Secondary: 15A75. 1 2 JASON MCCULLOUGH where ฮฒi,j (M ) = dimK TorSi (M, K)j . The length of the linear strand of M is max{i | ฮฒilin (M ) 6= 0}. Herzog proposed the following lower bound on the Betti numbers in the linear strand of kth syzygy modules. Conjecture 1.2 (Herzog [8]). If M is a graded kth syzygy module over S with linear strand of length p, then   p+k lin ฮฒi (M ) โ‰ฅ . i+k The conjecture has been proved in the following cases: (1) Herzog proved the case k = 0 in [8]. (2) Herzog was motivated by a result of Green [7] which contained the case k = 1, i = 0. See also similar results by Eisenbud-Koh [5]. (3) Reiner and Welker [13] proved the case when M is a monomial ideal and k = 1. (4) Roฬˆmer [14] proved the following cases: (a) When k = 1 and 0 โ‰ค i โ‰ค p.  p+k lin (b) When p > 0 and i = p โˆ’ 1; i.e. ฮฒpโˆ’1 (M ) โ‰ฅ pโˆ’1+k = p + k. (c) When M is Zn -graded, Roฬˆmer proved the conjecture in full generality. By modifying a recent construction of Iyengar-Walker [9], we use the BernsteinGelโ€™fand-Gelโ€™fand (BGG) correspondence to produce counterexamples for virtually all other cases of Herzogโ€™s Conjecture. More precisely, in Section 3 we construct for each n โ‰ฅ 1 a finitely generated, graded S = K[x1 , . . . , x2n ]-module M that is an nth sygyzy module such that M has linear resolution of length n and has graded Betti numbers     2n 2n lin ฮฒi (M ) = โˆ’ , for 0 โ‰ค i โ‰ค n. n+i n+i+2 We note that for 0 โ‰ค i โ‰ค n โˆ’ 2 that       2n 2n n+n lin ฮฒi (M ) = โˆ’ < , n+i n+i+2 n+i contradicting the conjecture. These examples are BGG dual to the principal quadric E-ideals mentioned above. We note that a different construction of Conca-Herbig-Iyengar [2] also gives a family of counterexamples to Conjecture 1.2, although that was not their aim. Specifically, they show [2, Theorem 5.1] that if S = K[x1 , . . . , xn , y1 , . . . , yn ] and I is the ideal I = ({xi yj , xi yj โˆ’ xj yi | 1 โ‰ค i, j โ‰ค n with i 6= j}) , then the cyclic module B = S/I has graded Betti numbers ๏ฃฑ 1 for i, j = 0 ๏ฃด ๏ฃด ๏ฃด ๏ฃฒ 2n  โˆ’ 2n  โˆ’ 2 n  for 1 โ‰ค i โ‰ค n โˆ’ 1 and j = i + 1 i+1 iโˆ’1 i+1   ฮฒiS (B) = 2n 2n ๏ฃด โˆ’ for n โ‰ค i โ‰ค 2n and j = i + 2 ๏ฃด i i+2 ๏ฃด ๏ฃณ 0 otherwise In particular, setting N = Syzn (B) gives an nth syzygy module with the same graded Betti numbers (after a degree shift) as M above. STILLMANโ€™S QUESTION AND HERZOGโ€™S CONJECTURE 3 2. The BGG Correspondence We briefly recall the Bernstein-Gelโ€™fand-Gelโ€™fand (BGG) correspondence. We refer the reader to [3] or [4] for more details. Let K be a field of characteristic 0. Fix a positive integer n. Let S = K[x1 , . . . , x2n ] denote a standard graded polynomial ring over K. Set W = S1 and let V = HomK (W, K) denote the vectorspace dual of W . Let E = โˆงV be the exterior algebra of V . Let e1 , . . . , e2n be a dual basis to x1 , . . . , x2n . Thus E = Khe1 , . . . , e2n i, which we also view as a positively graded ring with deg(ei ) = 1 to keep the notation in this paper consistent. (In [3] and [4], E is viewed as a negatively graded ring.) Let L denote the functor from the category of graded E-modules to the category of linear free complexes of S-modules defined as follows: Given any graded Emodule P , we define L(P ) to be S โŠ—K P viewed as a complex of graded free S-modules, where L(P )i = S โŠ—K Pโˆ’i and the differential is induced by L(P ) : ยท ยท ยท โ†’ S โŠ—K Pโˆ’i sโŠ—p d โ†’i P S โŠ—K P1โˆ’i โ†’ ยท ยท ยท 7โ†’ sxj โŠ— ej p We extend L to a functor on complexes of E-modules by taking the total complex of the resulting double complex. There is an adjoint function R from complexes of S-modules to complexes of E-modules, defined in a similar way, which creates an equivalence of bounded derived categories of graded S-modules and that of graded E-modules. An important property of the equivalence for the purpose of this paper is that under this equivalence the functor L identifies finitely generated E-modules with linear free S-complexes. 3. Counterexamples to Herzogโ€™s Conjecture First we recall a well-known fact about exterior algebras: Theorem 3.1 (cf. [11, Theorem 5.2]). Let f โˆˆ E2 = โˆง2 V be a generic element. Then the linear transformation fยท โˆงr V โ†’ โˆงr+2 V is injective for r โ‰ค n โˆ’ 1 and is surjective for r โ‰ฅ n โˆ’ 1. As remarked in [9], it suffices to pick f = e1 e2 + ยท ยท ยท + e2nโˆ’1 e2n . We now come to the first main result. By convention, we set m k = 0 if k < 0 or if k > m. Theorem 3.2. Fix n > 0 and a field K of characteristic 0. Let S = K[x1 , . . . , x2n ] be a standard graded polynomial ring. There exists a finitely generated, graded Smodule M , generated by degree 0 elements such that reg(M ) = 1 and the graded Betti numbers are ๏ฃฑ   2n 2n ๏ฃด if i = j and 0 โ‰ค i โ‰ค n ๏ฃฒ i+1 โˆ’ iโˆ’1 2n 2n ฮฒi,j (M ) = if j = i + 1 and n + 1 โ‰ค i โ‰ค 2n i โˆ’ i+2 ๏ฃด ๏ฃณ 0 otherwise.   2n 2n In particular, if we set N = Syzn (M ), then ฮฒilin (N ) = n+i โˆ’ n+i+2 , contradicting Conjecture 1.2 for 0 โ‰ค i โ‰ค n โˆ’ 2. Proof. Let f โˆˆ E2 be a general element. Consider the graded complex of free E-modules f Gโ€ข : E(2 โˆ’ 2n) โˆ’โ†’ E(โˆ’2n). 4 JASON MCCULLOUGH Let Fโ€ข = L(Gโ€ข ). Since L(E) is the usual Koszul complex Kโ€ข (x, S)[2n] with a shift in homological degree, we have Fโ€ข = cone(Kโ€ข (x, S)[2] โ†’ Kโ€ข (x, S)). The complex Fโ€ข fits in a short exact sequence 0 โ†’ Kโ€ข (x, S)[1] โ†’ Fโ€ข โ†’ Kโ€ข (x, S) โ†’ 0. Since H0 (Kโ€ข (x, S)) โˆผ = K and Hi (Kโ€ข (x, S)) = 0 for all i > 0, if follows that ( K for i = 0, โˆ’1 Hi (Fโ€ข ) = 0 otherwise. By Theorem 3.1, every possible cancelation in Fโ€ข that can occur does occur. Thus the minimal subcomplex Fโ€ข โ€ฒ of Fโ€ข has graded Betti table -1 0: 1 1: - 0 2n - 1 2n 2 ยทยทยท โˆ’ 1 ยทยทยท -  n-1 2n  โˆ’ nโˆ’2 - 2n n n  2n โˆ’ n ยทยทยท  2n ยท ยท ยท n+2 2n-1 2n 2n 1  Note that under the BGG correspondence, the first linear strand corresponds to L(AnnE (f )) and the second linear strand is L(E/(f )). In particular, Since Hi (Fโ€ฒโ€ข ) = 0 for i > 0, if we set Fโ€ฒโ‰ฅ0 to be the truncation of Fโ€ฒโ€ข , then Fโ€ฒโ‰ฅ0 is the minimal free resolution of an S-module M . (We shift graded degrees to ensure that M is generated in degree 0.) In particular, M now has graded Betti table of the form 0 ยทยทยท n ยท ยท ยท 2n-1 2n 1  n-1 2n  2n 0: 2n 2n โˆ’ 1 ยท ยท ยท โˆ’ 2 n nโˆ’2   2n 2n ยทยทยท 2n 1 1: n โˆ’ n+2 Setting N = Syzn (M ), we see that N is an nth syzygy with linear free resolution and graded Betti numbers as prescribed above. 4. Peeva-Stillman Question for Exterior Algebras Now let E be the exterior algebra of a finite dimensional K-vector space. Here we set the exterior variables to have degree +1 rather than โˆ’1, as in the previous section. While resolutions over E need not be finite, since E is a Koszul algebra, the regularity regE (M ) of a finitely generated E-module is finite. Here regE (M ) is defined as regE (M ) := sup{j โˆ’ i| TorE i (M, K)j 6= 0}. Irena Peeva posed the following variant of Stillmanโ€™s Question at the Joint Introductory Workshop at MSRI in the Fall of 2012: The following theorem gives the promised negative answer to Question 1.1. Theorem 4.1. Let K be a field of characteristic 0. Fix any positive integer n. Let V be V the K-vector space with basis e1 , e2 , . . . , e2n and consider the exterior algebra E = V . Set f = e1 e2 + e3 e4 + ยท ยท ยท + e2nโˆ’1 e2n . Then regE (E/(f )) = n. Proof. Consider the minimal free resolution of E/(f ) over E. Note that we may identify Syz2 (E/(f )) with AnnE (f ). By Theorem 3.1, AnnE (f ) has no elements of degree < n. Thus regE (E/(f )) โ‰ฅ n. On the other hand, by the proof of STILLMANโ€™S QUESTION AND HERZOGโ€™S CONJECTURE 5 Theorem 3.2, we see that L(E/(f )) has a linear free S-resolution. By the Dictionary Theorem [3, Theorem 7.7], HomK (E/(f ), K) โˆผ = AnnE (f ) has a linear free E-resolution. Therefore regE (E/(f )) = n.  Remark 4.2. The previous theorem also holds over any field of positive characteristic p > 0, but it is no longer true that Ann(f ) has a linear free resolution since in particular f p = 0. 5. An Example Finally we show how one can construct nth syzygy modules with linear free resolutions of length n and with graded Betti numbers smaller than those predicted by Herzogโ€™s Conjecture in Macaulay2. Here we make use of the BGG package written by Abo, Decker, Eisenbud, Schreyer, Smith and Stillman. Here we demonstrate the case n = 4. i1 : n = 4; i2 : E = QQ[e_1..e_(2*n),SkewCommutative=>true]; -- an exterior algebra in 2n variables i3 : S = QQ[x_1..x_(2*n)]; -- a polynomial ring in 2n variables i4 : I = ideal sum for i from 1 to n list e_(2*i-1)*e_(2*i) o4 = ideal(e e + e e + e e + e e ) 1 2 3 4 5 6 7 8 o4 : Ideal of E i5 : betti res I -- The resolution over E of E/I. reg(E/I) = n o5 = total: 0: 1: 2: 3: 4: 0 1 1 . . . . 1 2 3 4 5 6 7 8 9 1 42 288 1155 3520 9009 20384 42042 80640 . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 288 1155 3520 9009 20384 42042 80640 o5 : BettiTally i6 : J = ann I; o6 : Ideal of E i7 : P = J / ideal product flatten entries vars E; 6 JASON MCCULLOUGH i8 : loadPackage "BGG" o8 = BGG o8 : Package i9 : F = bgg(2*n-2,P,S); 8 27 o9 : Matrix S <--- S i10 : M = coker F ** S^{-(2*n-1)}; -- M is an S-module i11 : betti res M -- the linear strand of the resolution of M is L(J/(e_1*...*e_2n)) 0 1 2 3 4 5 6 o11 = total: 8 27 48 42 42 48 27 0: 8 27 48 42 . . . 1: . . . . 42 48 27 7 8 . 8 8 1 . 1 o11 : BettiTally i12 : G = bgg(n-1,comodule I,S); 42 o12 : Matrix S 48 <--- S i13 : N = coker G ** S^{-n}; -- N is the nth syzygy module of M, with a shift in grading i14 : betti res N -- its resolution is L(E/I) under the BGG correspondence 0 1 2 3 4 o14 = total: 42 48 27 8 1 0: 42 48 27 8 1 o14 : BettiTally It is clear that this is not the most extreme counterexample to Herzogโ€™s Conjecture. Note that the module N above has rank 14 and is a 4th syzygy module over S. By a Theorem of Bruns (cf. [6, Corollary 3.13]), there exists a free submodule F โŠ‚ N of rank 10 such N/F is a still a 4th syzygy module. The module N/F would then have Betti table 0 1 2 3 4 0: 32 48 27 8 1 STILLMANโ€™S QUESTION AND HERZOGโ€™S CONJECTURE 7 It would be interesting to know in general what the minimal Betti numbers are for a nth syzygy module with linear free resolution. Acknowledgements The author thanks Srikanth Iyengar, Irena Peeva, and Mark Walker for useful conversations concerning this paper and also Jerzy Weyman for pointing out reference [11]. References 1. Tigran Ananyan and Melvin Hochster, Small subalgebras of polynomial rings and stillmanโ€™s conjecture, arXiv: 1610.09268, 2017. 2. Aldo Conca, Hans-Christian Herbig, and Srikanth Iyengar, Koszul property for the moment map of some classical representations, arXiv: 1705.02688, 2017. 3. David Eisenbud, The geometry of syzygies, Graduate Texts in Mathematics, vol. 229, SpringerVerlag, New York, 2005, A second course in commutative algebra and algebraic geometry. 4. David Eisenbud, Gunnar Flรธystad, and Frank-Olaf Schreyer, Sheaf cohomology and free resolutions over exterior algebras, Trans. Amer. Math. Soc. 355 (2003), no. 11, 4397โ€“4426. MR 1990756 5. David Eisenbud and Jee Koh, Some linear syzygy conjectures, Adv. Math. 90 (1991), no. 1, 47โ€“76. 6. E. Graham Evans and Phillip Griffith, Syzygies, London Mathematical Society Lecture Note Series, vol. 106, Cambridge University Press, Cambridge, 1985. 7. Mark L. Green, Koszul cohomology and the geometry of projective varieties, J. Differential Geom. 19 (1984), no. 1, 125โ€“171. 8. Juฬˆrgen Herzog, The linear strand of a graded free resolution, unpublished notes, 1998. 9. Srikanth Iyengar and Mark Walker, Examples of finite free complexes of small rank and homology, arXiv: 1706.02156, 2017. 10. Jason McCullough and Alexandra Seceleanu, Bounding projective dimension, Commutative Algebra. Expository Papers Dedicated to David Eisenbud on the Occasion of His 65th Birthday (I. Peeva, Ed.), Springer-Verlag London Ltd., London, 2013. 11. Guillermo Moreno-Socฤฑฬas and Jan Snellman, Some conjectures about the Hilbert series of generic ideals in the exterior algebra, Homology Homotopy Appl. 4 (2002), no. 2, part 2, 409โ€“426, The Roos Festschrift volume, 2. 12. Irena Peeva and Mike Stillman, Open problems on syzygies and Hilbert functions, J. Commut. Algebra 1 (2009), no. 1, 159โ€“195. 13. V. Reiner and V. Welker, Linear syzygies of Stanley-Reisner ideals, Math. Scand. 89 (2001), no. 1, 117โ€“132. 14. Tim Roฬˆmer, Bounds for Betti numbers, J. Algebra 249 (2002), no. 1, 20โ€“37. E-mail address: [email protected] Iowa State University, Department of Mathematics, Ames, IA 50011
0math.AC
Recruitment Market Trend Analysis with Sequential Latent Variable Models Chen Zhu1 , Hengshu Zhu1,2 , Hui Xiong3โˆ—, Pengliang Ding1 , Fang Xie1 1 Baidu Inc., 2 Baidu Research-Big Data Lab, 3 Rutgers University, {zhuchen02, zhuhengshu, dingpengliang, xiefang}@baidu.com, [email protected] arXiv:1712.02975v1 [cs.AI] 8 Dec 2017 ABSTRACT Recruitment market analysis provides valuable understanding of industry-specific economic growth and plays an important role for both employers and job seekers. With the rapid development of online recruitment services, massive recruitment data have been accumulated and enable a new paradigm for recruitment market analysis. However, traditional methods for recruitment market analysis largely rely on the knowledge of domain experts and classic statistical models, which are usually too general to model large-scale dynamic recruitment data, and have difficulties to capture the fine-grained market trends. To this end, in this paper, we propose a new research paradigm for recruitment market analysis by leveraging unsupervised learning techniques for automatically discovering recruitment market trends based on large-scale recruitment data. Specifically, we develop a novel sequential latent variable model, named MTLVM, which is designed for capturing the sequential dependencies of corporate recruitment states and is able to automatically learn the latent recruitment topics within a Bayesian generative framework. In particular, to capture the variability of recruitment topics over time, we design hierarchical dirichlet processes for MTLVM. These processes allow to dynamically generate the evolving recruitment topics. Finally, we implement a prototype system to empirically evaluate our approach based on real-world recruitment data in China. Indeed, by visualizing the results from MTLVM, we can successfully reveal many interesting findings, such as the popularity of LBS related jobs reached the peak in the 2nd half of 2014, and decreased in 2015. Keywords Trend Analysis, Recruitment Market, Latent Variable Model 1. INTRODUCTION The scarcity of skilled talents has stimulated the global recruitment industry in the past few years. An article from โˆ— Corresponding Author. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. KDD โ€™16, August 13-17, 2016, San Francisco, CA, USA c 2016 ACM. ISBN 978-1-4503-4232-2/16/08. . . $15.00 DOI: http://dx.doi.org/10.1145/2939672.2939689 Forbes reported that, US corporations spend nearly $ 72 billion each year on a variety of recruiting services, and the worldwide number is likely three times bigger [4]. Along this line, a growing challenge is to provide an effective trend analysis of recruitment market, such as forecasting recruitment demand and predicting market status. Both employers and job seekers can benefit from the study of recruitment market trends. Moreover, at the macro level, this analysis can also provide valuable understanding of industry-specific economic growth for business analysts. With the rapid development of online recruitment services, such as Linkedin [7], Dice [3], and Lagou [6], massive recruitment posting data have been accumulated. For example, as of the end of 2015, there are more than 1.3 million job positions from 100K+ companies across more than 20 Internet-related industries, such as mobile Internet, online-to-offline (O2O), and cloud computing, available at Lagou [6]-a Chinese tech hiring service website. These huge data enable a new paradigm for studying recruitment market trends in a holistic and fine-grained manner. Recruitment market analysis is a classic topic in human capital economics, where recruitment market is either treated as a factor of macro economic phenomenons or the analysis is focused on advising people to make the best job decisions in a general economic framework [26, 27, 29]. However, previous studies rely largely on the knowledge of domain experts and classic statistical models, and thus usually too general to capture the high variability of recruitment market (e.g., the evolution of recruitment topics). Also, these studies have limited efforts on understanding the fine-grained market trends, such as forecasting the recruitment situation for a specific company in the next few months. Therefore, it is very appealing to design a new research paradigm for recruitment market analysis through large-scale analysis on massive recruitment data. Along this line, there are some major challenges. First, how to model the intrinsically sequential dependency of recruitment states (e.g., Hiring Freeze) forming the market trend? Second, how to model the semantic relationship between the market trend and job postings from different companies? Finally, how to model the variability of recruitment postings for a long time period? To tackle these challenges, we propose an unsupervised learning approach for recruitment market trend analysis, which can automatically discern the underlying trend of recruitment market. First, we develop a novel sequential market trend latent variable model (MTLVM), which is designed for capturing the temporal dependencies of recruitment states of companies and is able to automatically learn Figure 1: The trend of the number of job postings related to different skill requirements over two years, which indicates the demands of recruitment market. the latent recruitment topics and demands from recruitment data within a Bayesian generative framework. To be more specific, we assume that the current recruitment state of a specific company is influenced by its state in previous epoch, and it will impel the company to review appropriate recruitment demands (e.g., R&D recruitment). Then, different recruitment demands will generate different recruitment topics (e.g., experienced algorithm engineer), which will finally generate the recruitment postings. In particular, to capture the variability of recruitment topics over time, we design a hierarchical dirichlet processes for MTLVM, which can dynamically generate recruitment topics. Finally, we implement an intelligent prototype system to empirically evaluate our approach based on a real-world recruitment data set collected from China for the time period from 2014 to 2015. Indeed, by visualizing the results from MTLVM, we can successfully observe many interesting discoveries, such as the popularity of LBS related jobs reaches the peak in the 2nd half of 2014, and decreases in 2015. Generally, the contributions of this paper can be summarized as follows. โ€ข To the best of our knowledge, this paper is the first attempt to leverage unsupervised learning approach for automatically modeling the trend of recruit market. This work provides a new research paradigm for recruitment market analysis. โ€ข We propose a sequential latent variable model, named MTLVM, for learning the latent recruitment states, demands, and topics simultaneously. Particularly, MTLVM can dynamically generate recruitment topics by integrating hierarchical dirichlet processes. โ€ข We develop a prototype system for empirically evaluate our approach. Indeed, by visualizing the results obtained from MTLVM, we can successfully observe many interesting and useful findings. 2. OVERVIEW In this section, we first introduce some preliminaries of recruitment market modeling, and then formally present the overview of our model MTLVM. (a) Jan, 2014-Jun, 2014 (b) Jul, 2014-Dec, 2014 (c) Jan, 2015-Jun, 2015 (d) Jul, 2015-Nov, 2015 Figure 2: The word cloud representation of job postings related to โ€œMobile Software Engineerโ€ with respect to different epochs in our data set, where the size of each keyword is proportional to its frequency. 2.1 Preliminaries Recent years have witnessed the rapid development of online recruitment services, which have already become the most important venue of talent seeking, especially for hightech companies. Therefore, the job posting data from these services can help researchers better understand the trend of recruitment market from the perspectives of not only an individual company but also the whole industry. Intuitively, different job postings can indicate different recruitment demands of companies, such as R&D related positions, which usually change over different epochs. For example, Figure 1 demonstrates the trend of the number of job postings related to different skill requirements during January 2014 to November 2015 based on our real-world data set. We can observe that skill โ€œInformation Retrievalโ€ becomes less popular, compared with other skills, such as โ€œData Miningโ€, and โ€œMachine Learningโ€. Meanwhile, โ€œSparkโ€, an emerging technique for big data processing, has attracted more and more attention during these years. Indeed, such evolution of recruitment demands is inherently determined by the change of latent recruitment states of companies at different epochs, which have strong sequential dependency. For example, Alibaba, one of the largest E-Commerce companies in China, hugely enlarged the recruitment in 2014, which is followed by the recruitment state โ€œHiring Freezeโ€ in 2015. As a result, its recruitment demands related to ECommerce largely shrank in 2015. To capture the change of recruitment states, and model the semantic relationship between recruitment demand and state, our model MTLVM follows the Beysian latent variable model with first-order Markov assumption, where current state is only determined by the state at previous epoch. Indeed, by further analyzing the descriptions of job postings, we observe that the detail of similar recruitment demands (e.g., Recruiting Mobile Software Engineer) will be influenced by the corresponding recruitment states. Thus the corresponding demands usually have high variability, and generate different recruitment topics. For example, ฮฑ ฯc & ce,t ฮณ1 Gc De,t,m ฮณ2 & H Q0 ฯ•e,t,m,n ฮงe,t,m,n ฮณ0 0HW of unique recruitment states is C. Specifically, at the first epoch, the corresponding ce,1 for all companies is sampled from a uniform distribution. For the following epochs, if company e releases some job postings at previous epoch t โˆ’ 1, namely that ฯ‡e,tโˆ’1 exists, its current recruitment state ce,t is sampled from a multinomial distribution determined by previous state ce,tโˆ’1 . Otherwise, ce,t is drawn from the overall recruitment state at epoch t โˆ’ 1, i.e., P (ce,t ) = PC c=1 P (ce,t |ctโˆ’1 = c)P (ctโˆ’1 = c), where P (ctโˆ’1 = c) is the average P (ce0 ,tโˆ’1 ) of company e0 who has market state c at epoch t โˆ’ 1. In addition, we name the chains consisting of neighbouring ฯ‡e,tโˆ’1 that belong to the same company as a data chain. Therefore, if a company only occasionally releases jobs, it may have more than one data chain according to our formulation. Furthermore, we define the generative process of job posting ฯ‡e,t,m โˆˆ ฯ‡e,t of company e at epoch t as follows. First, a recruitment demand De,t,m is generated from the latent factor Gc which is sampled from a Dirichlet Process and determined by the current recruitment state ce,t . Then, we sample a recruitment topic ฯ†e,t,m,n from the demand De,t,m for each observation ฯ‡e,t,m,n . Finally, each observation ฯ‡e,t,m,n is generated from a multinomial distribution determined by corresponding topic ฯ†e,t,m,n . Specifically, Figure 3 shows the graphical representation of MTLVM. Figure 3: The graphical representation of MTLVM. 3. Figure 2 shows the word cloud representation 1 of job postings related to โ€œMobile Software Engineerโ€ with respect to different epochs. We can observe that, โ€œMobile Game Developmentโ€ is a hot topic in the second half of 2014, while โ€œAndroid based Web Technologyโ€ becomes popular in the first half 2015. To model the semantic relationships among recruitment states, recruitment demands, and recruitment topics, our model, MTLVM, follows the idea of Hierarchical Dirichlet Processes, an infinity version of topic modeling, to model the job postings. Therefore the topic number can be automatically determined. In this section, we will introduce the technical details of our model MTLVM. And we illustrate the important mathematical notations in Table 1. 2.2 3.1 MODELING THE TREND OF RECRUITMENT MARKET Model Inference According to the introduction in Section 2, we can summarize the parameterizations of MTLVM as follows, ฯc |ฮฑ โˆผ Diri(ฮฑ), ce,t |{ฯc }C c=1 , ce,tโˆ’1 Overview of MTLVM Formally, we regard the m-th job posting of company e at epoch t as a bag of words ฯ‡e,t,m = {ฯ‡e,t,m,n }n , where ฯ‡e,t,m,n is the basic observation in job postings (e.g., keywords in job description), and |ฯ‡e,t,m | = Ne,t,m . For modeling the trend of recruitment market, we first divide all job postings into different data units {ฯ‡e,t }e,t with respect to companies and timestamps, which contain job postings of company e at epoch t. As introduced above, we assume that the current recruitment state of a specific company is influenced by its state in previous epoch, and it will impel the company to review appropriate recruitment demands. Then, different recruitment demands will generate different recruitment topics, which will finally generate the recruitment postings. Therefore, we define a parameter ce,t to represent the recruitment state of company e at epoch t, where the number 1 All the words are originally in Chinese, and are automatically translated by a commercial translation tool [1]. โˆผ Multi(ฯce,tโˆ’1 ), Q0 |H, ฮณ0 โˆผ DP(ฮณ0 , H), Gc |Q0 , ฮณ1 โˆผ DP(ฮณ1 , Q0 ), De,t,m |{Gc }C c=1 , ฮณ2 , ce,t โˆผ DP(ฮณ2 , Gce,t ), ฯ†e,t,m,n |Ge,t,m โˆผ De,t,m , ฯ‡e,t,m,n |ฯ†e,t,m,n โˆผ Multi(ฯ†e,t,m,n ). Following the above parameterizations, we can get the joint probability distribution of ฯ‡ and c as P (ฯ‡, c|ฮ›) = Y  P (ce,t |ce,tโˆ’1 , ฮ›)P (ฯ‡e,t |ฮ›, ce,t ) , (1) e,t where ฮ› is a set of hyper-parameters, including ฮฑ, H, ฮณ0 , ฮณ1 , ฮณ2 , and c0 . Specifically, c0 is a default initial recruitment state and ฯc0 is fixed to (1/C, ..., 1/C). Indeed, the above equation can be divided into two parts, i.e., P (ce,t |ce,tโˆ’1 , ฮ›) that follows a multinomial distribution Multi(ฯce,tโˆ’1 ), and P (ฯ‡e,t |ฮ›, ce,t ) that follows Dirichlet Processes, respectively. Specifically, P (ฯ‡e,t |ฮ›, ce,t ) can be computed by Table 1: Mathematical Notations. Me,t P (ฯ‡e,t |ฮ›, ce,t ) = Y  P (De,t,m |ฮ›, Gce,t ) ร— Symbol Description ฯ‡e,t,m,n The n-th tokens at m-th job posting of company e at epoch t. The m-th job posting of company e at epoch t. The observation unit containing job postings of company e at epoch t. The entire data set of job postings. The recruitment state of company e at epoch t. The hyperparameter of the Dirichlet prior on ฯc . The transition matrix of recruitment state c. The probability measure representing the recruitment strategy of state c. The probability measure representing the recruitment demand of ฯ‡e,t,m . The recruitment topic of the n-th tokens at m-th job posting of company e at epoch t. The base measure for Dirichlet Process generating Gc . The concentration parameter for Dirichlet Process generating Q0 . The concentration parameter for Dirichlet Process generating Gc . The concentration parameter for Dirichlet Process generating De,t,m . The base measure for Dirichlet Process generating Q0 . A set of hyperparameters, including ฮฑ, H, ฮณ0 , ฮณ1 , ฮณ2 , and c0 . The default initial recruitment state. The number of tokens at m-th job posting of company e at epoch t. The number of job postings of company e at epoch t. The number of unique recruitment states. m=1 ฯ‡e,t,m ฯ‡e,t Ne,t,m  Y P (ฯ†e,t,m,n |ฮ›, De,t,m )P (ฯ‡e,t,m,n |ฯ†e,t,m,n ) . (2) n=1 ฯ‡ ce,t ฮฑ ฯ Gc Therefore, the objective of learning MTLVM is to find a set of optimal parameters in P (ce,t |ce,tโˆ’1 , ฮ›), P (De,t,m |ฮ›, Gce,t ), P (ฯ†e,t,m,n |ฮ›, De,t,m ), and P (ฯ‡e,t,m,n |ฯ†e,t,m,n ), which can maximize the probability of Equation 1. In this paper, we propose a two-step framework to learn our model by a Gibbs Sampling method. In the first step, we introduce how to optimize the transition matrix ฯ, which is constituted of P (ce,t |ce,tโˆ’1 , ฮ›), given P (ฯ‡e,t |ฮ›, ce,t ). Depending on equation 1, we could get the conditional distribution of ce,t P (ce,t = c|cโˆ’e,t , ฯ‡, ฮ›) = P (ce,t = c, ฯ‡e,t |ฯ‡โˆ’e,t , ฮ›) P (ฯ‡e,t |cโˆ’e,t , ฯ‡โˆ’e,t , ฮ›) โˆ’e,t โˆ P (ฯ‡e,t |ce,t = c, ฮ›)P (ce,t = c|c De,t,m ฯ†e,t,m,n Q0 ฮณ0 ฮณ1 (3) ฮณ2 , ฮ›). H Since P (ฯ‡e,t |ce,t = c, ฮ›) is given, the only challenge is to calculate P (ce,t = c|cโˆ’e,t , ฮ›). Here we follow the inference in [16] and give it directly. โˆ’e,t P (ce,t = c|c โˆ’e,t +ฮฑ e,tโˆ’1 ,c) โˆ’e,t +Cฮฑ q(c e,tโˆ’1 ) q(c where โˆ’e,t q(c) โˆ’e,t +I(ctโˆ’1 =c=ct+1 )+ฮฑ e,t+1 ) โˆ’e,t q(c) +I(ctโˆ’1 =c)+Cฮฑ Me,t , (4) C means the number of recruitment states c ap- The Application of MTLVM After learning stage, MTLVM can be used for predicting the future trend of recruitment market, e.g., recruitment states, demands, topics, and basic observations. Specifically, given a company e, we can estimate its current recruitment state ce,t by ce,t = arg max P (c|ฯ‡e,t , ce,tโˆ’1 , ฯ, ฮ›), c c0 Ne,t,m , ฯ‡, ฮ›) = P (ฯ‡e,t |ce,t = c, ฮ›) ยท q(c,c โˆ’e,t pearing except ce,t , and q(c means the number of pair e,tโˆ’1 ,c) ce,tโˆ’1 , c appearing except ce,t . In the second step, we introduce how to compute the parameters related to Dirichlet Process in Equation 2. Indeed, this task can be regarded as an analog of the Chinese Restaurant Process (CRP) [8], and the metaphor can be explained as follows. We have C cuisine styles (i.e., recruitment state) and a franchise (i.e., company) with Me,t restaurants (i.e., job postings). Everyday, the franchise will change its cuisine style according to the cuisine styles on last day. In Particular, the menus of different restaurants may be different, even if they share the same cuisine style. At each table of each restaurant, the dish (i.e., topic) is determined by the first customer (i.e., the basic observation in job postings) sitting there, and it is shared among all customers who sit at that table. When a new customer enters the restaurant, she can sit at an occupied table or a new table. If she chooses a new table, she can order a new dish from the menu. According to the above metaphor of CRP, we can easily obtained a Gibbs sampling scheme for posterior sampling given ฯ‡ [28]. The detailed definition and inference can be found in Appendix. 3.2 ฮ› (5) where ฯ is the transition matrix, and P (ce,t |ฯ‡e,t , ce,tโˆ’1 , ฯ, ฮ›) โˆ P (ce,t , ฯ‡e,t |ce,tโˆ’1 , ฯ, ฮ›) = P (ฯ‡e,t |ce,t , ฮ›)P (ce,t |ce,tโˆ’1 , ฯ). (6) Therefore, the probability of recruitment state at the next epoch ce,t+1 can be obtained by P (ce,t+1 ) = Multi(ฯce,t ). Furthermore, the recruitment topics can be obtained in the same way introduced in Section 3.1. Thus, the probability of a basic observation ฯ‡e,t+1,k (e.g., keywords in job description) from company e appearing at epoch t + 1 can be computed by P (ฯ‡e,t+1,k |ฮ›) = C X P (ฯ‡e,t+1,k |ce,t+1 , ฮ›)P (ce,t+1 ), (7) ce,t+1 =1 where P (ฯ‡e,t+1,k |ce,t+1 ) can be obtained by Equation 2. 4. EXPERIMENTS In this section, we will study the performance of our model MTLVM on a huge data set collected from a major online recruitment website in China. Furthermore, we have developed a web-based prototype system to empirically evaluate our model. This system can visualize the results of our model, provide in-depth analysis of recruitment market analysis, and help people understand the high variability of recruitment market. Figure 4 shows a screenshot of this prototype system. In this system, we show the trend analysis of the entire recruitment market and the detail evolution of recruitment state of companies. Table 3: Average VM/CM comparison. MTLVM (C=5) MTLVM (C=10) MTLVM (C=20) LDA K VM CM 105 100 118 100 0.464 0.682 0.688 0.637 5.044 6.783 6.279 6.722 learning recruitment states and recruitment topics). Specially, following [28], we set a symmetric Dirichlet distribution with parameters of 0.5 for the prior H over topic distributions. For simplicity, ฮณ0 , ฮณ1 , and ฮณ2 are set to 1 directly, and another hyperparameter ฮฑ is also be set to 1 empirically. 4.2 Figure 4: A screenshot of our system for recruitment market analysis. All of following visualization results in this section can be obtained by this prototype system. Table 2: The statistics of our real-world data set. Raw Data Filtered Data # # # # 4.1 job postings unique companies data units data chains 934,761 68,302 191,549 116,392 257,166 997 13,209 2,557 Data Set and Experimental Setup The data set used in our experiments is collected from a major online recruitment website in China and contains 934,761 job postings from 68,302 companies released from January 2014 to November 2015. Specially, Figure 5(a) to 5(d) demonstrate some statistics of our data set. As mentioned above, โ€œdata unitโ€ in Figure 5(c) means a job posting set ฯ‡e,t released by company e at epoch t and โ€œdata chainโ€ means chains consisting of neighbouring ฯ‡e,tโˆ’1 that belong to the same company. From these statistics we can observe that most of companies only randomly release very few job postings, and therefore cannot represent the trend of recruitment market. To avoid such bias, we only conserve companies which have released more than 100 job postings. Table 2 shows the detailed statistics of our raw data set and the filtered data set. By the above pre-process, we filtered about 72% original data; and the number of companies declined by 98.6%. However, the average number of job postings per company increases from 13.7 to 258, and the average length of chain also increases from 1.65 to 5.16, which make it more reasonable for training MTLVM. In particular, in each job posting, the keywords in job description (e.g., job responsibility, skill requirements) are treated as basic observations, and all stop words are removed to guarantee the modeling performance. Note that, our model is trained with original Chinese words, and all experimental results were translated into English by a commercial translation tool [1] for facilitating demonstration. In the following subsections, we will comprehensively study the performance of MTLVM in term of trend analysis (e.g., Evaluation of Recruitment Topics How to quantitatively evaluate the performance of latent variable models is always an open problem. Although perplexity and held-out likelihood are common measures for evaluating prediction results, they cannot demonstrate how coherent and meaningful the latent factors (e.g., recruitment states and topics) are. Therefore, in this paper, we follow the measures introduced in [31], which is inspired by [30, 13], for evaluating MTLVM. Specifically, we picked up top 10 keywords for each learned recruitment topic and asked 4 senior experts of human resource to evaluate its value. These experts are first required to judge whether this topic is valuable. If a topic is valuable, they need continue to judge how many words are relevant in the top 10 keyword list. Based on these manually labeled results, the metrics Validity Measure (VM) and Coherence Measure (CM) are defined as VM = # of relevant words # of valid topics , CM = . # of topics # of words in valid topics Besides, to evaluate how the number of recruitment states affects the performance, we train MTLVM with different settings of state number, i.e., C = 5, 10, 20 respectively. Furthermore, we select widely used topic model Latent Dirichlet Allocation (LDA) [12] as baseline. After convergence, the numbers of topic in all our models, i.e., K, are automatically determined as about 100. Therefore, we set K as 100 for LDA. Table 3 shows the average results of VM and CM. We can observe that in terms of VM, both of MTLVM (C=20) and MTLVM (C=10) outperform LDA a lot, and MTLVM (C=20) has the best performance. In terms of CM, the performance of MTLVM (C=10) is the best, while that of MTLVM (C=20) is worse than LDA. It may be because that too many states will make the model relatively sparse, and thus will make relevant words scattered in different topics. In particular, the performance of MTLVM (C=5) is the worst, which may be because that few states cannot accurately describe the market trend well. Overall, since MTLVM (C=10) has the most balanced results, we set state number C = 10 in all of following experiments. 4.3 Evaluation of Recruitment States Here, we will empirically evaluate the learned recruitment states from several aspects. Figure 6 shows the trend of popularity of recruitment states discovered by MTLVM over time. It is obvious that (a) (b) (c) (d) Figure 5: The distribution of (a) the number of companies that release job posting in different epochs, (b) the number of companies with respect to the number of their job postings, (c) the number of data units with respect to the number of contained job postings, and (d) the number of data chains with respect to their length. Table 4: The probabilities of top recruitment topics of selected recruitment states (e.g., #1, #3, #4, #9). The corresponding word cloud representations of these topics are shown in figure 8. state #3 state #4 state #5 state #9 top top top top 4.3.1 Figure 6: The trend of popularity of recruitment states discovered by our model over time. Figure 7: The transition matrix of recruitment states, where the i, j element means the transition probability from i-th state to j-th state, and deeper color means higher probability. these states change over time dramatically. Specifically, state #3 kepng a relative high popularity over the long period, while popularity of #6 is always low. Meanwhile, the popularity of state #9 is rising dramatically since February 2015. Several other states, such as state #2, #7, and #10, represent totally opposite trends. Furthermore, Figure 7 shows the transition matrix of recruitment states, where the element of i-th row and j-th column represents the transition probability from state i to state j. We can observe that, all states have the highest transition probabilities to themselves, which is due to the momentum of recruitment market. Also, the color of 3-th, and 9-th columns is relatively deeper, which indicates the importance of states #3, and #9. All of above results show that our model MTLVM has the ability to capture the high variability of recruitment market by discovering these latent recruitment states. #1 #2 #3 #4 0.22493 0.12399 0.10064 0.08932 0.22172 0.17637 0.11360 0.08725 0.18185 0.10126 0.07735 0.07242 0.19441 0.12350 0.10018 0.08021 Recruitment State Inspection Here, we will test whether the recruitment states discovered by our model are comprehensible. To solve this problem, we select 4 representative recruitment states according to above analysis and show their top 4 topics in figure 8 by word cloud representations, where the larger words have higher generative probabilities. Meanwhile, Table 4 shows the corresponding generative probabilities of these topics. We can find that the topic about โ€œprogrammingโ€ always has very high probability in every state. In particular, the top #1 topics in state #1, state #3, and state #9 are the same. That means the demands for R&D related positions are always exuberant, since the high-probability words, โ€œlinuxโ€ and โ€œmysqlโ€, directly indicate the fundamental skill requirements of R&D. Actually, the salary of software engineer has kept rising for a long time, which can support this discovery of our model. These states also show that the work about games and front-end are also very popular, which is consistent with our real-world observations. Next, we โ€ขfurther illustrated in top figure Stateinspect #3. Itstates is obvious that the #18. topic is about R&D. The top #3 topic, containing โ€œdataโ€, โ€œanalysisโ€, โ€œresearchโ€, and โ€œalgorithmโ€, indicates the demand of recruiting senior researchers or algorithmic engineers. The top #4 topic may be about propaganda (e.g., public relationship), because it contains several paperwork and advertising related words, such as โ€œcomposeโ€, โ€œeditโ€, โ€œWeChatโ€ and โ€œblogโ€(e.g., social network based advertising). Besides, what makes this state different is the top #2 topic, which contains โ€œhumanโ€, โ€œresourceโ€, โ€œofficeโ€, and โ€œassistโ€. All of them are about administrative management obviously. Actually, in our model, this topic only exists in this state. Since research development, propagandism, and administrative management are essential to any companies, we can conclude that this state covers the fundamental talent demands for most by high-tech companies. And (a) state #3 (b) state #4 (c) state #5 (d) state #9 Figure 8: The word cloud representations of top 4 topics of selected recruitment states (e.g., #3, #4, #5, #9), where the size of each keyword is proportional to its generative provability. The generative probabilities of these recruitment topics are shown in table 4. figure 6 also indicates state #3 is the most popular. โ€ข State #4. This state is closely related to state #5. We can find that the top #2, #3, and #4 topics are relative normal. And the top #1 topic, which contains โ€œdataโ€, โ€œprogrammingโ€, and โ€œalgorithmโ€, is apparently about R&D, too. However, what makes this topic different is word โ€œlbsโ€. Location-based Service (LBS), such as map navigation or map localization, is the cornerstone of O2O, which is a kind of business model that uses online and mobile to drive offline local sales and become more and more popular since 2014. In figure 6, we notice that the popularity of this topic increased in 2014 and declined in 2015. This may be because the industry doorsill of this field is related high, so only a few large companies have capability to get into this field. Actually, only the largest IT companies in China, such as Baidu, Tencent, and sogou, provide such service now. โ€ข State #5. This is a very Chinese-style recruitment state. In top #4 topic, we find word โ€œO2Oโ€ as well as โ€œmerchantโ€ and โ€œbusinessโ€. Actually, with the proposal of โ€œInternet Plusโ€ [5], thousands of start-up companies, focusing on O2O, sprung up across the country. Meanwhile, the others topics in this state are related normal in terms of technology. The top #1 and #3 topics are just about some popular programming language, web-framework, and database. It may indicate that โ€œO2Oโ€ is just a business concept rather than a technology concept. โ€ข State #9. As shown in figure 6, this state exploded since February 2015. In the word cloud representations of its topics, the top #4 is related meaningful. These high frequency words (โ€œBaiduโ€, โ€œdataโ€, โ€œminingโ€, โ€œlargeโ€, โ€œdistributedโ€) indicate this is a big data related topic (e.g., large-scale machine learning and data mining). Its trend directly reveals that high-tech companies, such as Baidu, have paid more attention to big data related fields. 4.3.2 Visualization of Trend over Companies Here, we evaluate our model by checking the trend of several representative companies from a few important fields, such as Baidu is a famous high-tech company and Alibaba is the largest E-Commerce company in China. We visualize the evolution of the recruitment states of these companies in figure 9. From figure 9, we can first observe that state #3 is a very common state among most of companies. It is consistent with the analysis from topics of this state. Besides, we find that state #4, which is relevant to LBS, appears relatively frequently among Baidu, Sogou, and Tencent in 2014. Actually, all of these companies provide map service in China, especially Baidu. Baidu Map is the most popular navigation tool in China and many O2O companies use LBS API provided by Baidu to improve their services. So Baidu has remarkable strengths in LBS and has paid much attention to it indeed. Furthermore, Tencent, as one of the largest IT companies in China, its business is very scattered and covers many fields, such as game, social network, media, and entertainment. This kind of business strategy is directly reflected in Figure 9, where the recruitment state of Tencent changes frequently. Meanwhile, Baidu, Alibaba and Sogou (another search engine) prefer state #9, which is relevant to big data (e.g., large-scale machine learning and data mining), in 2015. Considering that their core business (search engine and Ecommerce) has several data-related practical applications (advertising and recommender system), the preference is also reasonable. In addition, we happened to find an interesting company, Zuora, whose state is almost state #9. Actually, Zuora is an enterprise software company that aim to automate billing, commerce, and finance operations with a subscription business model. Such business model is naturally related to big data processing and thus has need for senior data-related talents. Furthermore, we can observe that state #5, which is related to O2O, appears in company Tuniu, Qunar, and Feiniu frequently. Indeed, all of these companies aim to connect offline merchants and online customers, which is high consistent with O2O. Both of Tuniu and Qunar aim to provide one-stop travel booking service, such as hotel, ticket, car rental, and so on. And Feiniu is a B2C E-commerce wesite which is invested by a large retail corporation. The goal of its establishment is to fuse traditional offline service channel with online sale channel. 4.4 Evaluation of of Model Application Here, we will evaluate the proposed model by predicting basic observations in future. As introduced in Section 3, we make prediction by calculating the probability of basic observations with equation 7. So in this experiment, we will compare the likelihood of overall observations in test set to prove the performance of our model. The test set is built up by the following approach. We extract the recruitment postings in November 2015, the companies of which had also released some jobs in October 2015. It means all of companies in test set have recruitment states in the previous time span. In the end, the test set contains 350 companies and 4002 recruitment postings. Besides, all of recruitment postings between January 2014 and October 2015 are treated as train data. We select two model as baselines. One is dynamic Topic Model (DTM) [11]. DTM is a classic topic model for analyzing evolution of topics. It assumes topics evolve smoothly with respect to time and thus chains topics in adjacent epochs by state space models. Its performance was proved by predicting the next year of Science given all the articles from the previous years in [11]. It is obvious that DTM cannot be used for prediction directly, but due to its assumption, the topics extracted by it can model future data better than static topic models in some cases. In this experiment, we follow this method to prove the assumption of DTM is not very solid in our problem and indicate the necessity of our model. The code of DTM was got from [2]. The number of topics is set to 100 and all of other parameters are set to default values. In addition, we developed a simple sequence approach, called Byesian multivariate Hidden Markov Model (B-mHMM), as the other baseline. Compared with MTLVM, this baseline associates states with words directly. The joint probability distribution of B-mHMM is as follows  Y Y P (ce,t |ce,tโˆ’1 , ฯ) P (ฯ‡, c|ฯ, ฮน) = e,t P (ฯ‡e,t,m,n |ce,t , ฮน) , (8) m,n where the first term is the same to equation 1. And as shown in second term, we assume that given the recruitment state, Table 5: The prediction performance of MTLVM and baseline methods in terms of log likelihood. log likelihood MTLVM B-mHMM DTM -2095737.793 -2133504.721 -2599529.728 all of observations ฯ‡e,t,m,n are conditionally independent in B-mHMM and P (ฯ‡e,t,m,n |ce,t , ฮน) = M ulti(ฮนce,t ). By this baseline, we aim to prove the latent hierarchical structure of our model are meaningful for modeling recruitment markets. Because of the similarity of B-mHMM and MTLVM, The details and inference of B-mHMM follow those of MTLVM and are omitted here. Table 5 shows the log likelihood of prediction with respect to different models. The larger number means better performance. Both of B-mHMM and MTLVM outperform DTM largely. It indicates it is reasonable to employ latent recruitment states to model the trend of recruitment markets. And the performance of MTLVM is also better than that of BmHMM. All of these clearly validate the effectiveness of the proposed model. 5. RELATED WORK Generally, the related works of this paper can be grouped into two categories, namely recruitment market analysis, and sequential latent variable model. 5.1 Recruitment Market Analysis Traditionally, recruitment market analysis can be regarded as a classic topic in human capital economics, which attracts generations of researchers to contribute ever since Adam Smith. From the Macro perspective, labor is always a crucial element in studying gross economy growth, money market, exchange market and the equilibrium [26], ever since Solow proposed his growth model. Therefore, economists usually study topics about, for example, the demographic structure and participation rate of labor, the relation between inflation and unemployment rate, and how labor contributes in gross productivity or expenditures, etc [27]. In another Micro perspective, which is more relevant to our paper, all studies are set off from a basic market cleaning framework [29], where all employees choose their best balance between leisure and work, while all employers hire with budget constrain, and consequently the wage is derived as the marginal labor cost. Later researches improve our understandings by releasing constraints [19] (e.g., acknowledging the market with segmentations/barriers and as non-cleaning), or by detailed investigations (e.g., forming better utility functions of employees, and studying the actions of employees with game theory). Recently, several researchers in computer science try to employ data mining technology to solve these problems, such as offer categorization [24], job skill analysis [22]. However, previous research in economics efforts relies largely on the knowledge of domain experts or classic statistical models, and thus are usually too general to capture the high variability of recruitment market, and neglect the finegrained market trend. On the other hand, the recent research in computer science still focuses on those traditional human resource problems. Therefore, in this paper we pro- Figure 9: Visualization of the change of recruitment states over several companies, with different colors representing different states. pose a new research paradigm for recruitment market analysis by leveraging unsupervised learning approach. 5.2 Sequential Latent Variable Model Indeed, our novel sequential latent variable model MTLVM can be regarded as a combination of both Hidden Markov Model (HMM) and Hierarchical Dirichlet Processes (HDP) within a Bayesian generative framework, which can intrinsically capture the sequential dependency and variability of latent variable (e.g., recruitment states and topics). Specially, HMM based sequential latent variable models have been successfully applied to problems in a variety of fields, such as signal processing and speech recognition [25, 21], biometrics [15], genetics [14, 23], economics [18], and mobile Internet mining [20, 9, 33]. For much of their history, HMMs have been implemented by using recursive algorithms developed for parameter estimation [10], which are viewed as โ€œblack boxesโ€ by many statisticians. In recent years, some researchers proposed to use Bayesian methods to simulate HMM parameters from the posterior distribution, which can provide more scalable and stable process of parameter estimation for HMM [16, 17]. Compared with the traditional maximum-likelihood estimation (MLE) based HMM learning solution, the Bayesian methods can directly maximize the probability of the hidden variables given the observed data by integrating over all possible parameter values rather than searching for an optimal set of parameter values. To this end, the model proposed in this paper also follows a Bayesian generative framework. Latent Dirichlet Allocation (LDA) [12] based latent variable models, have become one of the most powerful tools for mining textual data. However, most topic models [11, 31, 32] need a predefined parameter to indicate the number of topics, and thus fail to capture the variability of topics. To this end, the Hierarchical Dirichlet Processes (HDP) [28] is proposed as an infinity version of topic model, which can automatically learn the number of topics. Therefore, in this paper we propose to ingrate HDP into our MTLVM for capturing the variability of latent recruitment topics. 6. CONCLUSION In this paper, we provided a large-scale data driven analysis of recruitment market trends. Specifically, we developed a novel sequential latent variable model, named MTLVM, which is designed for capturing the temporal dependencies of corporate recruitment states and is able to automatically learn the latent recruitment topics within a Bayesian generative framework. Moreover, to capture the variability of recruitment topics over time, we designed hierarchical dirichlet processes for MTLVM. These processes allow to dynamically generate recruitment topics. Finally, we implemented a prototype system to empirically evaluate our approach based on large-scale real-world recruitment data. The results showed that our approach could effectively discover recruitment market trends and provide guidances for both job recruiters and job seekers. 7. APPENDIX Here, we will describe an analog of Chinese Restaurant Process (CRP) for P (ฯ‡e,t |ฮ›, ce,t ) and corresponding inference in detail. Specifically, we first define {ฯˆe,t,m,z }z as variables sampled from Gce,t for each job posting and |ฯˆe,t,m | = Ze,t,m . Each ฯ†e,t,m,n is linked with a ฯˆe,t,m,z and ze,t,m,n is the index of ฯˆe,t,m,z for ฯ†e,t,m,n . In other words, we have ฯ†e,t,m,n = ฯˆe,t,m,ze,t,m,n . Besides, let ie,t,m,z denote the number of {ฯ†e,t,m,n }n linked with ฯˆe,t,m,z . According to CRP, we can integrate out the De,t,m and get the conditional distribution of ฯ†e,t,m,n as follows. ฯ†e,t,m,n |ฯ†e,t,m,1 , ..., ฯ†e,t,m,nโˆ’1 , {Gc }c , ce,t , ฮณ2 โˆผ Ze,t,m X z=1 ฮณ2 ie,t,m,z ฮดฯˆ + Gc , n โˆ’ 1 + ฮณ2 e,t,m,z n โˆ’ 1 + ฮณ2 e,t (9) where ฮดฯˆ is a probability measure concentrated at ฯˆ. If a new ฯˆ is sampled, it indicates the second term on the right-hand side of equation 9 is chosen. Then we need to add Ze,t,m by 1, sample a new ฯˆ by equation 10, and allocate ฯ†e,t,m,n to it. If the sampled value is an existed ฯ†, we just need allocate ฯ†e,t,m,n to it. Second, we define {ฮทc,s }s as variables sampled from G0 for each recruitment state and |ฮทc | = Sc . Each ฯˆe,t,m,z is linked with a ฮทc,s and se,t,m,z is the index of ฮทc,s for ฯˆe,t,m,z . In other words, ฯˆe,t,m,z = ฮทc,se,t,m,z . Besides, let jc,s denote the number of {ฯˆe,t,m,z }e,t,m , which is linked with ฮทc,s and ce,t = c. Similarly, we can integrate out Gc and get the conditional distribution of ฯˆe,t,m,z as follows. ฯˆe,t,m,z |ฯˆ1,1,1,1 , ..., ฯˆe,t,m,zโˆ’1 , Q0 , ฮณ1 โˆผ Psc j j Psc c,s ฮดฮทc,s + Psc c,s Q0 . s=1 j +ฮณ j +ฮณ s=1 c,s 1 s=1 c,s The sampling process is similar to ฯ†. 1 (10) Third, we let {ฮธk }k denote the variables sampled from H and |ฮธ| is K. Each ฮทc,s is linked with a ฮธk and kc,s is the index of ฮธk for ฮทc,s , i.e., ฮทc,s = ฮธkc,s . And we also let ok denote the number of {ฮทc,s }c,s . Now we can write the conditional distribution of ฮทc,s directly as ฮทc,s |ฮท1,1 , ..., ฮทc,sโˆ’1 , H, ฮณ0 โˆผ PK k=1 PK ok ฮด ok +ฮณ0 ฮธk + k=1 PK ok H. ok +ฮณ0 (11) k=1 Next, we will describe a Gibbs sampling method yielded from above. Specifically, we follow the inference method in [28] and sample z, s, k and ฮธ, rather than dealing with ฯ†, ฯˆ and ฮท directly. Sampling z, s, and k. Relying on equation 9, we can easily compute the conditional distribution of ze,t,m,n by P (ze,t,m,n = z|z โˆ’e,t,m,n , s, k, ฮธ, ฯ‡) โˆ ( new, ฮณ2 P (ฯ‡e,t,m,n |ฮธke,se,t,m,z ) used, iโˆ’e,t,m,n e,t,m,z P (ฯ‡e,t,m,n |ฮธke,se,t,m,z ) (12) where iโˆ’e,t,m,n is ie,t,m,z except the variable ฯ†e,t,m,n . The e,t,m,z likelihood of ze,t,m,n = z is simply P (ฯ‡e,t,m,n |ฮธke,se,t,m,z ) given all of other variables. And the prior probability that ze,t,m,n samples an existed ฯˆe,t,m,z is proportional to iโˆ’e,t,m,n e,t,m,z is ie,t,m,z . Its prior probability for a new ฯˆ is proportional to ฮณ2 . The process of sampling s and k is similar to that of sampling z. Sampling ฮธ. Given z, s, and k, {ฮธk }k are mutually independent. So the conditional distribution for each ฮธk is only related with all of ฯ‡ that linked with it. It follows P (ฮธk |z, t, k, ฮธโˆ’k , ฯ‡) โˆ h(ฮธk ) ยท Q c,s:kc,s =k Q e,t:ce,t =c Q m,z:se,t,m,z =s Q n:ze,t,m,n =z P (ฯ‡e,t,m,n |ฮธk ), (13) where h(ฮธk ) is the density of measure H at parameter ฮธk . 8. REFERENCES [1] Baidu translation. http://fanyi.baidu.com/. [2] Code of dynamic topic model. https://code.google.com/archive/p/ princeton-statistical-learning/downloads. [3] Dice. http://www.dice.com/. [4] Forbes article. http://suo.im/gxxz0. [5] Internet plus. https://en.wikipedia.org/wiki/Internet Plus. [6] Lagou. http://www.lagou.com/. [7] Linkedin. http://www.linkedin.com/. [8] D. J. Aldous. Exchangeability and related topics. Springer, 1985. [9] T. Bao, H. Cao, E. Chen, J. Tian, and H. Xiong. An unsupervised approach to modeling personalized contexts of mobile users. Knowledge and Information Systems, 31(2):345โ€“370, 2012. [10] L. E. Baum, T. Petrie, G. Soules, and N. Weiss. A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains. The annals of mathematical statistics, 41(1):164โ€“171, 1970. [11] D. M. Blei and J. D. Lafferty. Dynamic topic models. In Proceedings of the 23rd international conference on Machine learning, pages 113โ€“120. ACM, 2006. [12] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. the Journal of machine Learning research, 3:993โ€“1022, 2003. [13] J. Chang, S. Gerrish, C. Wang, J. L. Boyd-Graber, and D. M. Blei. Reading tea leaves: How humans interpret topic models. In Advances in neural information processing systems, pages 288โ€“296, 2009. [14] G. A. Churchill. Stochastic models for heterogeneous dna sequences. Bulletin of mathematical biology, 51(1):79โ€“94, 1989. [15] D. R. Fredkin and J. A. Rice. Bayesian restoration of single-channel patch clamp recordings. Biometrics, pages 427โ€“448, 1992. [16] S. Goldwater and T. Griffiths. A fully bayesian approach to unsupervised part-of-speech tagging. In Annual meeting-association for computational linguistics, volume 45, page 744. Citeseer, 2007. [17] S. Guha, L. Yi, and D. Neuberg. Bayesian hidden markov modeling of array cgh data. Journal of the American Statistical Association, 103:485โ€“497, 2008. [18] J. D. Hamilton. A new approach to the economic analysis of nonstationary time series and the business cycle. Econometrica: Journal of the Econometric Society, pages 357โ€“384, 1989. [19] T. Hayashi and T. Sakai. Nash implementation of competitive equilibria in the job-matching market. International Journal of Game Theory, 38(4):453โ€“467, 2009. [20] B. Huai, E. Chen, H. Zhu, H. Xiong, T. Bao, Q. Liu, and J. Tian. Toward personalized context recognition for mobile users: a semisupervised bayesian hmm approach. ACM Transactions on Knowledge Discovery from Data (TKDD), 9(2):10, 2014. [21] B.-H. Juang and L. R. Rabiner. Hidden markov models for speech recognition. Technometrics, 33(3):251โ€“272, 1991. [22] C. Litecky, A. J. Igou, and A. Aken. Skills in the management oriented is and enterprise system job markets. In Proceedings of the 50th annual conference on Computers and People Research, pages 35โ€“44. ACM, 2012. [23] J. S. Liu, A. F. Neuwald, and C. E. Lawrence. Markovian structures in biological sequence alignments. Journal of the American Statistical Association, 94(445):1โ€“15, 1999. [24] E. Malherbe, M. Cataldi, and A. Ballatore. Bringing order to the job market: Efficient job offer categorization in e-recruitment. In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, pages 1101โ€“1104. ACM, 2015. [25] L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257โ€“286, 1989. [26] D. Romer and C. Chow. Advanced Macroeconomic Theory. Mcgraw-hill, 1996. [27] C. Shapiro and J. E. Stiglitz. Equilibrium unemployment as a worker discipline device. The American Economic Review, 74(3):433โ€“444, 1984. [28] Y. W. Teh, M. I. Jordan, M. J. Beal, and D. M. Blei. Hierarchical dirichlet processes. Journal of the american statistical association, 101(476), 2006. [29] H. R. Varian and J. Repcheck. Intermediate microeconomics: a modern approach, volume 6. WW Norton & Company New York, NY, 2010. [30] P. Xie and E. P. Xing. Integrating document clustering and topic modeling. arXiv preprint arXiv:1309.6874, 2013. [31] H. Zhang, G. Kim, and E. P. Xing. Dynamic topic modeling for monitoring market competition from online text and image data. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1425โ€“1434. ACM, 2015. [32] C. Zhu, H. Zhu, Y. Ge, E. Chen, Q. Liu, T. Xu, and H. Xiong. Tracking the evolution of social emotions with topic models. Knowledge and Information Systems, pages 1โ€“28, 2015. [33] H. Zhu, C. Liu, Y. Ge, H. Xiong, and E. Chen. Popularity modeling for mobile apps: A sequential approach. Cybernetics, IEEE Transactions on, 45(7):1303โ€“1314, 2015.
2cs.AI
Matrix Completion and Related Problems via Strong Duality Maria-Florina Balcanโˆ— Yingyu Liangโ€  David P. Woodruffโ€ก Hongyang Zhangยง arXiv:1704.08683v3 [cs.DS] 19 Jan 2018 Abstract This work studies the strong duality of non-convex matrix factorization problems: we show that under certain dual conditions, these problems and its dual have the same optimum. This has been well understood for convex optimization, but little was known for non-convex problems. We propose a novel analytical framework and show that under certain dual conditions, the optimal solution of the matrix factorization program is the same as its bi-dual and thus the global optimality of the non-convex program can be achieved by solving its bi-dual which is convex. These dual conditions are satisfied by a wide class of matrix factorization problems, although matrix factorization problems are hard to solve in full generality. This analytical framework may be of independent interest to non-convex optimization more broadly. We apply our framework to two prototypical matrix factorization problems: matrix completion and robust Principal Component Analysis (PCA). These are examples of efficiently recovering a hidden matrix given limited reliable observations of it. Our framework shows that exact recoverability and strong duality hold with nearly-optimal sample complexity guarantees for matrix completion and robust PCA. โˆ— Carnegie Mellon University. Email: [email protected] University of Wisconsin-Madison. Email: [email protected] โ€ก Carnegie Mellon University. Email: [email protected] ยง Corresponding author. Carnegie Mellon University. Email: [email protected] โ€  1 Introduction Non-convex matrix factorization problems have been an emerging object of study in theoretical computer science [JNS13, Har14, SL15, RSW16], optimization [WYZ12, SWZ14], machine learning [BNS16, GLM16, GHJY15, JMD10, LLR16, WX12], and many other domains. In theoretical computer science and optimization, the study of such models has led to significant advances in provable algorithms that converge to local minima in linear time [JNS13, Har14, SL15, AAZB+ 16, AZ16]. In machine learning, matrix factorization serves as a building block for large-scale prediction and recommendation systems, e.g., the winning submission for the Netflix prize [KBV09]. Two prototypical examples are matrix completion and robust Principal Component Analysis (PCA). This work develops a novel framework to analyze a class of non-convex matrix factorization problems with strong duality, which leads to exact recoverability for matrix completion and robust Principal Component Analysis (PCA) via the solution to a convex problem. The matrix factorization problems can be stated as finding a target matrix Xโˆ— in the form of Xโˆ— = AB, by minimizing the objective function H(AB) + 1 2 n1 ร—r and B โˆˆ Rrร—n2 with a known value of r  min{n , n }, where 1 2 2 kABkF over factor matrices A โˆˆ R H(ยท) is some function that characterizes the desired properties of Xโˆ— . Our work is motivated by several promising areas where our analytical framework for non-convex matrix factorizations is applicable. The first area is low-rank matrix completion, where it has been shown that a low-rank matrix can be exactly recovered by finding a solution of the form AB that is consistent with the observed entries (assuming that it is incoherent) [JNS13, SL15, GLM16]. This problem has received a tremendous amount of attention due to its important role in optimization and its wide applicability in many areas such as quantum information theory and collaborative filtering [Har14, ZLZ16, BZ16]. The second area is robust PCA, a fundamental problem of interest in data processing that aims at recovering both the low-rank and the sparse components exactly from their superposition [CLMW11, NNS+ 14, GWL16, ZLZC15, ZLZ16, YPCC16], where the low-rank component corresponds to the product of A and B while the sparse component is captured by a proper choice of function H(ยท), e.g., the `1 norm [CLMW11, ABHZ16]. We believe our analytical framework can be potentially applied to other non-convex problems more broadly, e.g., matrix sensing [TBSR15], dictionary learning [SQW17a], weighted low-rank approximation [RSW16, LLR16], and deep linear neural network [Kaw16], which may be of independent interest. Without assumptions on the structure of the objective function, direct formulations of matrix factorization problems are NP-hard to optimize in general [HMRW14, ZLZ13]. With standard assumptions on the structure of the problem and with sufficiently many samples, these optimization problems can be solved efficiently, e.g., by convex relaxation [CR09, Che15]. Some other methods run local search algorithms given an initialization close enough to the global solution in the basin of attraction [JNS13, Har14, SL15, GHJY15, JGN+ 17]. However, these methods have sample complexity significantly larger than the information-theoretic lower bound; see Table 1 for a comparison. The problem becomes more challenging when the number of samples is small enough that the sample-based initialization is far from the desired solution, in which case the algorithm can run into a local minimum or a saddle point. Another line of work has focused on studying the loss surface of matrix factorization problems, providing positive results for approximately achieving global optimality. One nice property in this line of research is that there is no spurious local minima for specific applications such as matrix completion [GLM16], matrix sensing [BNS16], dictionary learning [SQW17a], phase retrieval [SQW16], linear deep neural networks [Kaw16], etc. However, these results are based on concrete forms of objective functions. Also, even when any local minimum is guaranteed to be globally optimal, in general it remains NP-hard to escape high-order saddle points [AG16], and additional arguments are needed to show the achievement of a local minimum. Most importantly, all existing results rely on strong assumptions on the sample size. 1 Strong Duality Primal Problem (1) Bi-Dual Problem (2) X AB Surface of (1) Surface of (2) By Theorem 3.3 + Dual Certificate Common Optimal Solution Figure 1: Strong duality of matrix factorizations. 1.1 Our Results Our work studies the exact recoverability problem for a variety of non-convex matrix factorization problems. The goal is to provide a unified framework to analyze a large class of matrix factorization problems, and to achieve efficient algorithms. Our main results show that although matrix factorization problems are hard to optimize in general, under certain dual conditions the duality gap is zero, and thus the problem can be converted to an equivalent convex program. The main theorem of our framework is the following. Theorems 3.3 (Strong Duality. Informal). Under certain dual conditions, strong duality holds for the non-convex optimization problem 1 e B) e = (A, argmin F (A, B) = H(AB) + kABk2F , H(ยท) is convex and closed, (1) 2 AโˆˆRn1 ร—r ,BโˆˆRrร—n2 where โ€œthe function H(ยท) is closedโ€ means that for each ฮฑ โˆˆ R, the sub-level set {X โˆˆ Rn1 ร—n2 : H(X) โ‰ค ฮฑ} is a closed set. In other words, problem (1) and its bi-dual problem e = argmin H(X) + kXkrโˆ— , X (2) XโˆˆRn1 ร—n2 eB e = X, e where kXkrโˆ— is a convex function defined have exactly the same optimal solutions in the sense that PA r 1 2 2 2 by kXkrโˆ— = maxM hM, Xi โˆ’ 2 kMkr and kMkr = i=1 ฯƒi (M) is the sum of the first r largest squared singular values. Theorem 3.3 connects the non-convex program (1) to its convex counterpart via strong duality; see Figure 1. We mention that strong duality rarely happens in the non-convex optimization region: low-rank matrix approximation [OW92] and quadratic optimization with two quadratic constraints [BE06] are among the few paradigms that enjoy such a nice property. Given strong duality, the computational issues of the original problem can be overcome by solving the convex bi-dual problem (2). The positive result of our framework is complemented by a lower bound to formalize the hardness of the above problem in general. Assuming that the random 4-SAT problem is hard (see Conjecture 1) [RSW16], we give a strong negative result for deterministic algorithms. If also BPP = P (see Section 6 for a discussion), then the same conclusion holds for randomized algorithms succeeding with probability at least 2/3. Theorem 6.1 (Hardness Statement. Informal). Assuming that random 4-SAT is hard on average, there is a problem in the form of (1) such that any deterministic algorithm achieving (1 + )OPT in the objective function value with  โ‰ค 0 requires 2โ„ฆ(n1 +n2 ) time, where OPT is the optimum and 0 > 0 is an absolute constant. If BPP = P, then the same conclusion holds for randomized algorithms succeeding with probability at least 2/3. Our framework only requires the dual conditions in Theorem 3.3 to be verified. We will show that two prototypical problems, matrix completion and robust PCA, obey the conditions. They belong to the linear inverse problems of form (1) with a proper choice of function H(ยท), which aim at exactly recovering a hidden matrix Xโˆ— with rank(Xโˆ— ) โ‰ค r given a limited number of linear observations of it. For matrix completion, the linear measurements are of the form {Xโˆ—ij : (i, j) โˆˆ โ„ฆ}, where โ„ฆ is the support set which is uniformly distributed among all subsets of [n1 ] ร— [n2 ] of cardinality m. With strong 2 Table 1: Comparison of matrix completion methods. Here ฮบ = ฯƒ1 (Xโˆ— )/ฯƒr (Xโˆ— ) is the condition number of e obeys kX e โˆ’ Xโˆ— kF โ‰ค , n(1) = max{n1 , n2 } and Xโˆ— โˆˆ Rn1 ร—n2 ,  is the accuracy such that the output X n(2) = min{n1 , n2 }. The first line of ours is an information-theoretic upper bound and the second line is a polynomial-time approach. Work Sample Complexity ยต-Incoherence    โˆ— [JNS13] O ฮบ4 ยต2 r4.5 n(1) log n(1) log rkX kF Condition (3)    โˆ— 2 โˆ— n kX k kX kF [Har14] O ยตrn(1) (r + log (1)  F Condition (3) ฯƒ2 r O(max{ยต6 ฮบ16 r4 , ยต4 ฮบ4 r6 }n(1) log2 n(1) ) n o qn O(rn(1) ฮบ2 max ยต log n(2) , n(1) ยต2 r6 ฮบ4 [GLM16] [SL15] [ZWL15] [KMO10a] [Gro11] [Che15] Ours Lower Bound1 [CT10] O  ยต2 r4 ฮบ2 (1) ฮบ2 max(ยต, log n + ยตr log  kXโˆ— kF   (1) )) ยต โˆ— n(2) kX kF Condition (3) kXโˆ— kF   n(1) log  1 3n O ยตr log n log (1) (1)   n o qn qn O n(2) r n(1) ฮบ2 max ยต log n(2) , ยต2 r n(1) ฮบ4 (2) (2) 2 โˆš Condition (3) (2) O(ยตr2 n [ZL16] [GLZ17] kXโˆ—i: k2 โ‰ค O(ยตrn(1) log n(1) ) O(ยตrn(1) log2 n(1) ) O(ยตrn(1) log n(1) ) 2 O(ฮบ ยตrn(1) log(n(1) ) log2ฮบ (n(1) )) โ„ฆ(ยตrn(1) log n(1) ) Condition (3) Condition (3) Similar to (3) and (13) Conditions (3) and (13) Condition (3) Condition (3) Condition (3) Condition (3) duality, we can either study the exact recoverability of the primal problem (1), or investigate the validity of its convex dual (or bi-dual) problem (2). Here we study the former with tools from geometric functional analysis. Recall that in the analysis of matrix completion, one typically requires a ยต-incoherence condition for a given rank-r matrix Xโˆ— with skinny SVD UฮฃVT [Rec11, CT10]: r r ยตr ยตr T T , and kV ei k2 โ‰ค , for all i (3) kU ei k2 โ‰ค n1 n2 where ei โ€™s are vectors with i-th entry equal to 1 and other entries equal to 0. The incoherence condition claims that information spreads throughout the left and right singular vectors and is quite standard in the matrix completion literature. Under this standard condition, we have the following results. Theorems 4.1, 4.3, and 4.2 (Matrix Completion. Informal). Xโˆ— โˆˆ Rn1 ร—n2 is the unique matrix of rank at most r that is consistent with the m measurements with high probability, provided m = O(ยต(n1 + n2 )r log(n1 + n2 )) and Xโˆ— satisfies incoherence (3). In addition, there exists a convex optimization for matrix completion in the form of (2) that exactly recovers Xโˆ— with high probability, provided that m = O(ฮบ2 ยต(n1 + n2 )r log(n1 + n2 ) log2ฮบ (n1 + n2 )), where ฮบ is the condition number of Xโˆ— . To the best of our knowledge, our result is the first to connect convex matrix completion to non-convex matrix completion, two parallel lines of research that have received significant attention in the past few years. Table 1 compares our result with prior results. For robust PCA, instead of studying exact recoverability of problem (1) as for matrix completion, we investigate problem (2) directly. The robust PCA problem is to decompose a given matrix D = Xโˆ— + Sโˆ— into the sum of a low-rank component Xโˆ— and a sparse component Sโˆ— [ANW12]. We obtain the following theorem for robust PCA. 1 This lower bound is information-theoretic. 3 Theorems 5.1 (Robust PCA. Informal). There exists a convex optimization formulation for robust PCA in โˆ— n1 ร—n2 and Sโˆ— โˆˆ Rn1 ร—n2 with high the form of problem (2) that exactly recovers the incoherent   matrix X โˆˆ R min{n ,n } 1 2 probability, even if rank(Xโˆ— ) = ฮ˜ ยต log2 max{n and the size of the support of Sโˆ— is m = ฮ˜(n1 n2 ), 1 ,n2 } where the support set of Sโˆ— is uniformly distributedq among all sets of cardinality m, and the incoherence ฯƒr (Xโˆ— ). parameter ยต satisfies constraints (3) and kXโˆ— kโˆž โ‰ค nยตr 1 n2 The bounds in Theorem 5.1 match the best known results in the robust PCA literature when the supports of Sโˆ— are uniformly sampled [CLMW11], while our assumption is arguably more intuitive; see Section 5. Note that our results hold even when Xโˆ— is close to full rank and a constant fraction of the entries have noise. Independently of our work, Ge et al. [GJY17] developed a framework to analyze the loss surface of low-rank problems, and applied the framework to matrix completion and robust PCA. Their bounds are: for matrix completion, the sample complexity is O(ฮบ6 ยต4 r6 (n1 + n2 ) log(n1 + n2)); forrobust PCA, the outlier entries 1 n2 are deterministic and the number that the method can tolerate is O nยตrฮบ 5 . Zhang et al. [ZWG17] also studied the robust PCA problem using non-convex optimization, where the  outlier entries are deterministic 1 n2 and the number of outliers that their algorithm can tolerate is O nrฮบ . The strong duality approach is unique to our work. 1.2 Our Techniques Reduction to Low-Rank Approximation. Our results are inspired by the low-rank approximation problem: min AโˆˆRn1 ร—r ,BโˆˆRrร—n2 1 e โˆ’ ABk2 . kโˆ’ฮ› F 2 (4) We know that all local solutions of (4) are globally optimal (see Lemma 3.1) and that strong duality holds for e โˆˆ Rn1 ร—n2 [GRG16]. To extend this property to our more general problem (1), our main any given matrix โˆ’ฮ› insight is to reduce problem (1) to the form of (4) using the `2 -regularization term. While some prior work attempted to apply a similar reduction, their conclusions either depended on unrealistic conditions on local solutions, e.g., all local solutions are rank-deficient [HYV14, GRG16], or their conclusions relied on strong assumptions on the objective functions, e.g., that the objective functions are twice-differentiable [HV15]. e For concrete Instead, our general results formulate strong duality via the existence of a dual certificate ฮ›. applications, the existence of a dual certificate is then converted to mild assumptions, e.g., that the number of measurements is sufficiently large and the positions of measurements are randomly distributed. We will illustrate the importance of randomness below. e may not exist in the deterministic world. The Blessing of Randomness. The desired dual certificate ฮ› A hardness result [RSW16] shows that for the problem of weighted low-rank approximation, which can be cast in the form of (1), without some randomization in the measurements made on the underlying low rank matrix, it is NP-hard to achieve a good objective value, not to mention to achieve strong duality. A similar phenomenon was observed for deterministic matrix completion [HM12]. Thus we should utilize such randomness to analyze the existence of a dual certificate. For matrix completion, the assumption that the measurements are random is standard, under which, the angle between the space โ„ฆ (the space of matrices which are consistent with observations) and the space T (the space of matrices which are low-rank) is small with high probability, namely, Xโˆ— is almost the unique low-rank matrix that is consistent with the measurements. Thus, our dual certificate can be represented as another form of a convergent Neumann series concerning the projection operators on the spaces โ„ฆ and T . The remainder of the proof is to show that such a construction obeys the dual conditions. To prove the dual conditions for matrix completion, we use the fact that the subspace โ„ฆ and the complement space T โŠฅ are almost orthogonal when the sample size is sufficiently large. This implies 4 the projection of our dual certificate on the space T โŠฅ has a very small norm, which exactly matches the dual conditions. Non-Convex Geometric Analysis. Strong duality implies that the primal problem (1) and its bi-dual problem (2) have exactly the same solutions ฮฉ" e e e in the sense that AB = X. Thus, to show exact recoverability of linear inverse problems such as matrix completion and robust PCA, it suffices to study either the non-convex primal problem (1) or its convex counterpart (2). Here we do the former analysis for matrix completion. We mention 0 # โˆ’ {& โˆ— } that traditional techniques [CT10, Rec11, CRPW12] for convex optimization break down for our non-convex problem, since the subgradient of a non-convex objective function may not even exist [BV04]. Instead, we apply tools from geometric functional analysis [Ver09] to analyze the Descent Cone ) (& โˆ— ) * geometry of problem (1). Our non-convex geometric analysis is in stark contrast to prior techniques of convex geometric analysis [Ver15] where Figure 2: Feasibility. convex combinations of non-convex constraints were used to define the Minkowski functional (e.g., in the definition of atomic norm) while our method uses the non-convex constraint null(A) itself. For matrix completion, problem (1) has two hard constraints: a) the rank of the output matrix should be no larger than r, as implied by the form of AB; b) the output matrix should be consistent with the sampled measurements, i.e., Pโ„ฆ (AB) = Pโ„ฆ (Xโˆ— ). We study the feasibility condition of problem (1)โˆ— )from a geometric -. (& โˆ— eB e = X is the unique feasible solution to problem (1) if and only if starting from Xโˆ— , the0 perspective: A rank of Xโˆ— + D increases for all directions Dโ€™s in the constraint set โ„ฆโŠฅ = {D โˆˆ Rn1 ร—n2 : Pโ„ฆ (Xโˆ— + D) = /01 ร—03 45 โˆ— 45 ) โˆฉ /01 ร—03that . (&requirement Pโ„ฆ (Xโˆ— )} (a.k.a. the feasibility condition). This can be geometrically interpreted as-the the descent cone DS (Xโˆ— ) = {t(X โˆ’ Xโˆ— ) โˆˆ Rn1 ร—n2 : rank(X) โ‰ค r, t โ‰ฅ 0} and the constraint set โ„ฆโŠฅ must intersect uniquely at 0 (see Figure 2), which means Xโˆ— is the unique matrix that satisfies the constraints a) and b). This is shown by the following tangent cone argument. Let S be the set of all matrices with rank at most r around the underlying matrix Xโˆ— . In the tangent cone argument, by definition, DS (Xโˆ— ) is a subset of the tangent cone of S at Xโˆ— . The latter cone of interest has a very nice form, namely, it is just the space T mentioned above (the space of matrices which are low-rank). Now leverage results from prior work which imply T โˆฉ โ„ฆโŠฅ = {0} with a large enough sample size. Namely, among all matrices of the form Xโˆ— + D, D = 0 is the only matrix such that rank(Xโˆ— + D) โ‰ค r and Xโˆ— + D is consistent with the observations. Using this argument, we can show that the sample size needed for exact recovery in matrix completion matches the known lower bound up to a constant factor. Putting Things Together. We summarize our new analytical framework with the following figure. Geometric Analysis Exact Recovery by Non-Convex Problem (1) with Optimal Sample Complexity Non-Convex Problem (1) Exact Recovery by Convex Problem (2) (NP-hard in general) Randomness Construction of Dual Certificate Reduction to Strong Duality Low-Rank Approximation Other Techniques. An alternative method is to investigate the exact recoverability of problem (2) via standard convex analysis. We find that the sub-differential of our induced function k ยท krโˆ— is very similar to 5 that of the nuclear norm. With this observation, we prove the validity of robust PCA in the form of (2) by combining this property of k ยท krโˆ— with standard techniques from [CLMW11]. 2 Preliminaries We will use calligraphy to represent a set, bold capital letters to represent a matrix, bold lower-case letters to represent a vector, and lower-case letters to represent scalars. Specifically, we denote by Xโˆ— โˆˆ Rn1 ร—n2 the underlying matrix. We use X:t โˆˆ Rn1 ร—1 (Xt: โˆˆ R1ร—n2 ) to indicate the t-th column (row) of X. The entry in the i-th row, j-th column of X is represented by Xij . The condition number of X is ฮบ = ฯƒ1 (X)/ฯƒr (X). We let n(1) = max{n1 , n2 } and n(2) = min{n1 , n2 }. For a function H(M) on an input matrix M, its conjugate function H โˆ— is defined by H โˆ— (ฮ›) = maxM hฮ›, Mi โˆ’ H(M). Furthermore, let H โˆ—โˆ— denote the conjugate function of H โˆ— . We will frequently use rank(X) โ‰ค r to constrain the rank of X. This can be equivalently represented as X = AB, qPby restricting the number of columns of A and rows of B to be r. For norms, we denote by 2 kXkF = ij Xij the Frobenius norm of matrix X. Let ฯƒ1 (X) โ‰ฅ ฯƒ2 (X) โ‰ฅ ... โ‰ฅ ฯƒr (X) be the non-zero P singular values of X. The nuclear norm (a.k.a. trace norm) of X is defined by kXkโˆ— = ri=1 ฯƒi (X), and the operator norm of X is kXk = ฯƒ1 (X). Denote and P by kXkโˆž = maxij |Xij |. For two matrices nA ร—n 1 2 : B of equal dimensions, we denote by hA, Bi = ij Aij Bij . We denote by โˆ‚H(X) = {ฮ› โˆˆ R H(Y) โ‰ฅ H(X) + hฮ›, Y โˆ’ Xi for any Y} the sub-differential of function H evaluated at X. We define ( 0, if X โˆˆ C; the indicator function of convex set C by IC (X) = For any non-empty set C, denote by +โˆž, otherwise. cone(C) = {tX : X โˆˆ C, t โ‰ฅ 0}. We denote by โ„ฆ the set of indices of observed entries, and โ„ฆโŠฅ its complement. Without confusion, โ„ฆ also indicates the linear subspace formed by matrices with entries in โ„ฆโŠฅ being 0. We denote by Pโ„ฆ : Rn1 ร—n2 โ†’ Rn1 ร—n2 the orthogonal projector of subspace โ„ฆ. We will consider a single norm for these operators, namely, the operator norm denoted by kAk and defined by kAk = supkXkF =1 kA(X)kF . For any orthogonal projection operator PT to any subspace T , we know that kPT k = 1 whenever dim(T ) 6= 0. For distributions, denote by N (0, 1) a standard Gaussian random variable, Uniform(m) the uniform distribution of cardinality m, and Ber(p) the Bernoulli distribution with success probability p. 3 `2 -Regularized Matrix Factorizations: A New Analytical Framework In this section, we develop a novel framework to analyze a general class of `2 -regularized matrix factorization problems. Our framework can be applied to different specific problems and leads to nearly optimal sample complexity guarantees. In particular, we study the `2 -regularized matrix factorization problem (P) 1 F (A, B) = H(AB) + kABk2F , H(ยท) is convex and closed. 2 AโˆˆRn1 ร—r ,BโˆˆRrร—n2 min We show that under suitable conditions the duality gap between (P) and its dual (bi-dual) problem is zero, so problem (P) can be converted to an equivalent convex problem. 3.1 Strong Duality b 2 โˆ’ hY, b ABi for a fixed Y, b leading to the objective We first consider an easy case where H(AB) = 12 kYk F 1 b 2 function 2 kY โˆ’ ABkF . For this case, we establish the following lemma. 6 b โˆ’ ABk2 is globally optimal, b any local minimum of f (A, B) = 1 kY Lemma 3.1. For any given matrix Y, F 2 b The objective function f (A, B) around any saddle point has a negative second-order given by svdr (Y). directional curvature. Moreover, f (A, B) has no local maximum.2 The proof of Lemma 3.1 is basically to calculate the gradient of f (A, B) and let it equal to zero; see b b โˆ’ ABk2 for some Y Appendix B for details. Given this lemma, we can reduce F (A, B) to the form 12 kY F plus an extra term: 1 1 1 F (A, B) = kABk2F + H(AB) = kABk2F + H โˆ—โˆ— (AB) = max kABk2F + hฮ›, ABi โˆ’ H โˆ— (ฮ›) ฮ› 2 2 2 (5) 1 1 = max k โˆ’ ฮ› โˆ’ ABk2F โˆ’ kฮ›k2F โˆ’ H โˆ— (ฮ›) , max L(A, B, ฮ›), ฮ› 2 ฮ› 2 1 1 2 2 where we define L(A, B, ฮ›) , 2 k โˆ’ ฮ› โˆ’ ABkF โˆ’ 2 kฮ›kF โˆ’ H โˆ— (ฮ›) as the Lagrangian of problem (P),3 and the second equality holds because H is closed and convex w.r.t. the argument AB. For any fixed value of ฮ›, by Lemma 3.1, any local minimum of L(A, B, ฮ›) is globally optimal, because minimizing L(A, B, ฮ›) is equivalent to minimizing 12 k โˆ’ ฮ› โˆ’ ABk2F for a fixed ฮ›. e such that (A, e B, e ฮ›) e is a primal-dual saddle The remaining part of our analysis is to choose a proper ฮ› e e B). e point of L(A, B, ฮ›), so that minA,B L(A, B, ฮ›) and problem (P) have the same optimal solution (A, For this, we introduce the following condition, and later we will show that the condition holds with high probability. e B) e to problem (P), there exists an ฮ› e โˆˆ โˆ‚X H(X)| e e such that Condition 1. For a solution (A, X=AB eB eB eT = ฮ› eB eT โˆ’A and e T (โˆ’A e B) e =A e T ฮ›. e A (6) Explanation of Condition 1. We note that โˆ‡A L(A, B, ฮ›) = ABBT + ฮ›BT and โˆ‡B L(A, B, ฮ›) = e ฮ›)| e e in (6), then โˆ‡A L(A, B, AT AB + AT ฮ› for a fixed ฮ›. In particular, if we set ฮ› to be the ฮ› e =0 A=A e e e e and โˆ‡B L(A, B, ฮ›)|B=B e = 0. So Condition 1 implies that (A, B) is either a saddle point or a local e e minimizer of L(A, B, ฮ›) as a function of (A, B) for the fixed ฮ›. The following lemma states that if it is a local minimizer, then strong duality holds. e B) e be a global minimizer of F (A, B). If there exists a dual certificate Lemma 3.2 (Dual Certificate). Let (A, e e is a local minimizer of L(A, B, ฮ›) e for the fixed ฮ›, e e then strong ฮ› satisfying Condition 1 and the pair (A, B) eB e = svdr (โˆ’ฮ›). e duality holds. Moreover, we have the relation A e B, e ฮ›) e is a primal-dual saddle Proof Sketch. By the assumption of the lemma, we can show that (A, point to the Lagrangian L(A, B, ฮ›); see Appendix C. To show strong duality, by the fact that F (A, B) = e = argmaxฮ› L(A, e B, e ฮ›), we have F (A, e B) e = L(A, e B, e ฮ›) e โ‰ค L(A, B, ฮ›), e maxฮ› L(A, B, ฮ›) and that ฮ› e e e for any A, B, where the inequality holds because (A, B, ฮ›) is a primal-dual saddle point of L. So on the e B) e โ‰ค minA,B L(A, B, ฮ›) e โ‰ค maxฮ› minA,B L(A, B, ฮ›). one hand, minA,B maxฮ› L(A, B, ฮ›) = F (A, On the other hand, by weak duality, we have minA,B maxฮ› L(A, B, ฮ›) โ‰ฅ maxฮ› minA,B L(A, B, ฮ›). Therefore, minA,B maxฮ› L(A, B, ฮ›) = maxฮ› minA,B L(A, B, ฮ›), i.e., strong duality holds. Therefore, eB e = argminAB L(A, B, ฮ›) e = argminAB 1 kABk2 + hฮ›, e ABi โˆ’ H โˆ— (ฮ›) e = argminAB 1 k โˆ’ ฮ› e โˆ’ A F 2 2 e as desired. ABk2F = svdr (โˆ’ฮ›),  This lemma then leads to the following theorem. 2 e is of full rank and does not Prior work studying the loss surface of low-rank matrix approximation assumes that the matrix ฮ› have the same singular values [BH89]. In this work, we generalize this result by removing these two assumptions. 3 One can easily check that L(A, B, ฮ›) = minM L0 (A, B, M, ฮ›), where L0 (A, B, M, ฮ›) is the Lagrangian of the constraint optimization problem minA,B,M 12 kABk2F + H(M), s.t. M = AB. With a little abuse of notation, we call L(A, B, ฮ›) the Lagrangian of the unconstrained problem (P) as well. 7 % โˆ’, *+ small * . O %& %' = ฯˆ !"#$ %& % $ large % , (dual certificate) Figure 3: Geometry of dual condition (7) for general matrix factorization problems. e B) e the optimal solution of problem (P). Define a matrix space Theorem 3.3. Denote by (A, e T + YB, e X โˆˆ Rn2 ร—r , Y โˆˆ Rn1 ร—r }. T , {AX Then strong duality holds for problem (P), provided that e โˆˆ โˆ‚H(A e B) e , ฮจ, (1) ฮ› e =A e B, e (2) PT (โˆ’ฮ›) e < ฯƒr (A e B). e (3) kPT โŠฅ ฮ›k (7) e so that the conditions in Lemma 3.2 hold. ฮ› e should Proof. The proof idea is to construct a dual certificate ฮ› satisfy the following: (a) (b) (c) e โˆˆ โˆ‚H(A e B), e ฮ› (by Condition 1) eB e + ฮ›) e B e T = 0 and A e T (A eB e + ฮ›) e = 0, (A (by Condition 1) eB e = svdr (โˆ’ฮ›). e A (by the local minimizer assumption and Lemma 3.1) (8) eA e โ€  )M(I โˆ’ B eB e โ€  ) and so kPT โŠฅ Mk โ‰ค kMk, It turns out that for any matrix M โˆˆ Rn1 ร—n2 , PT โŠฅ M = (I โˆ’ A eB e and V the a fact that we will frequently use in the sequel. Denote by U the left singular space of A right singular space. Then the linear space T can be equivalently represented as T = U + V. Therefore, eB e + ฮ›) e B e T = 0 and A e T (A eB e + ฮ›) e = 0 imply T โŠฅ = (U + V)โŠฅ = U โŠฅ โˆฉ V โŠฅ . With this, we note that: (b) (A T โŠฅ โŠฅ โŠฅ e e e e e e e e e e e e AB + ฮ› โˆˆ Null(A ) = Col(A) and AB + ฮ› โˆˆ Row(B) (so AB + ฮ› โˆˆ T ), and vice versa. And (c) eB e = svdr (โˆ’ฮ›) e implies that for an orthogonal decomposition โˆ’ฮ› e =A eB e + E, where A eB e โˆˆ T , and E โˆˆ A โŠฅ e e e e e e = svdr (โˆ’ฮ›). e T , we have kEk < ฯƒr (AB). Conversely, kEk < ฯƒr (AB) and condition (b) imply AB e e e e e e Therefore, the dual conditions in (8) are equivalent to (1) ฮ› โˆˆ โˆ‚H(AB) , ฮจ; (2) PT (โˆ’ฮ›) = AB; (3) e < ฯƒr (A e B). e kPT โŠฅ ฮ›k To show the dual condition in Theorem 3.3, intuitively, we need to show that the angle ฮธ between subspace T and ฮจ is small (see Figure 3) for a specific function H(ยท). In the following (see Section E), we will demonstrate applications that, with randomness, obey this dual condition with high probability. 4 Matrix Completion In matrix completion, there is a hidden matrix Xโˆ— โˆˆ Rn1 ร—n2 with rank r. We are given measurements {Xโˆ—ij : (i, j) โˆˆ โ„ฆ}, where โ„ฆ โˆผ Uniform(m), i.e., โ„ฆ is sampled uniformly at random from all subsets of [n1 ] ร— [n2 ] of cardinality m. The goal is to exactly recover Xโˆ— with high probability. Here we apply our unified framework in Section 3 to matrix completion, by setting H(ยท) = I{M:Pโ„ฆ (M)=Pโ„ฆ (Xโˆ— )} (ยท). A quantity governing the difficulties of matrix completion is the incoherence parameter ยต. Intuitively, matrix completion is possible only if the information spreads evenly throughout the low-rank matrix. This intuition is captured by the incoherence conditions. Formally, denote by UฮฃVT the skinny SVD of a fixed 8 n1 ร— n2 matrix X of rank r. Candรจs et al. [CLMW11, CR09, Rec11, ZLZ16] introduced the ยต-incoherence n(1) condition (3) to the low-rank matrix X. For conditions (3), it can be shown p that 1 โ‰ค ยต โ‰ค r . The condition holds for many random matrices with incoherence parameter ยต about r log n(1) [KMO10a]. We have two positive results. The first result is an information-theoretic upper bound: with the standard incoherence condition (3), Xโˆ— is the unique matrix of rank at most r that is consistent with the observations. The proof is deferred to Appendix D. Theorem 4.1 (Information-Theoretic Upper Bound). Let โ„ฆ โˆผ Uniform(m) be the support set uniformly distributed among all sets of cardinality m. Suppose that m โ‰ฅ cยตn(1) r log n(1) for an absolute constant c. Then Xโˆ— is the unique n1 ร— n2 matrix of rank at most r with ยต-incoherence condition (3) such that Pโ„ฆ (X) = Pโ„ฆ (Xโˆ— ), with probability at least 1 โˆ’ nโˆ’10 (1) . Proof Sketch. We consider the feasibility of the matrix completion problem: Find a matrix X โˆˆ Rn1 ร—n2 such that Pโ„ฆ (X) = Pโ„ฆ (Xโˆ— ), rank(X) โ‰ค r. (9) Our proof first identifies a feasibility condition for problem (9), and then shows that Xโˆ— is the only matrix which obeys this feasibility condition when the sample size is large enough. More specifically, we note that Xโˆ— obeys the conditions in problem (9). Therefore, Xโˆ— is the only matrix which obeys condition (9) if and only if Xโˆ— + D does not follow the condition for all D, i.e., DS (Xโˆ— ) โˆฉ โ„ฆโŠฅ = {0}, where DS (Xโˆ— ) is the descent cone of all low-rank matrices. We note that the descent cone DS (Xโˆ— ) is contained in the subspace T by the tool of geometry functional analysis. Thus by a well-known fact that T โˆฉ โ„ฆโŠฅ = {0} when the sample size is large, the proof is completed.  We describe a simple finite-time inefficient algorithm given Theorem 4.1 in Section H. This positive result matches a lower bound from prior work, which claims that the sample complexity in Theorem 4.1 is optimal. Theorem 4.2 (Information-Theoretic Lower Bound. [CT10], Theorem 1.7). Denote by โ„ฆ โˆผ Uniform(m) the support set uniformly distributed among all sets of cardinality m. Suppose that m โ‰ค cยตn(1) r log n(1) for an absolute constant c. Then there exist infinitely many n1 ร— n2 matrices X0 of rank at most r obeying ยต-incoherence (3) such that Pโ„ฆ (X0 ) = Pโ„ฆ (Xโˆ— ), with probability at least 1 โˆ’ nโˆ’10 (1) . Our second positive result converts the feasibility problem in Theorem 4.1 to a convex optimization problem, which can be efficiently solved. Theorem 4.3 (Efficient Matrix Completion). Let โ„ฆ โˆผ Uniform(m) be the support set uniformly distributed among all sets of cardinality m. Suppose Xโˆ— has condition number ฮบ = ฯƒ1 (Xโˆ— )/ฯƒr (Xโˆ— ). Then there are absolute constants c and c0 such that with probability at least 1 โˆ’ c0 nโˆ’10 (1) , the output of the convex problem e = argmin kXkrโˆ— , s.t. Pโ„ฆ (X) = Pโ„ฆ (Xโˆ— ), X (10) X e = Xโˆ— , provided that m โ‰ฅ cฮบ2 ยตrn(1) log2ฮบ (n(1) ) log(n(1) ) and Xโˆ— obeys is unique and exact, i.e., X ยต-incoherence (3). e B) e = argminA,B 1 kABk2 , s.t.Pโ„ฆ (AB) = Proof Sketch. We have shown in Theorem 4.1 that the problem (A, F 2 eB e = Xโˆ— , with the optimal sample complexity. So if strong duality Pโ„ฆ (Xโˆ— ), exactly recovers Xโˆ— , i.e., A holds, this non-convex optimization problem can be equivalently converted to the convex program (10). Then Theorem 4.3 is straightforward from strong duality. It now suffices to apply our unified framework in Section 3 to prove the strong duality. We show that e B) e be a the dual condition in Theorem 3.3 holds with high probability by the following arguments. Let (A, global solution to problem (10). For H(X) = I{MโˆˆRn1 ร—n2 : Pโ„ฆ M=Pโ„ฆ Xโˆ— } (X), we have e B) e = {G โˆˆ Rn1 ร—n2 : hG, A e Bi e โ‰ฅ hG, Yi, for any Y โˆˆ Rn1 ร—n2 s.t. Pโ„ฆ Y = Pโ„ฆ Xโˆ— } ฮจ = โˆ‚H(A = {G โˆˆ Rn1 ร—n2 : hG, Xโˆ— i โ‰ฅ hG, Yi, for any Y โˆˆ Rn1 ร—n2 s.t. Pโ„ฆ Y = Pโ„ฆ Xโˆ— } = โ„ฆ, 9 eB e = Xโˆ— . Then we only need to show where the third equality holds since A e โˆˆ โ„ฆ, (1) ฮ› e =A e B, e (2) PT (โˆ’ฮ›) e < 2 ฯƒr (A e B). e (3) kPT โŠฅ ฮ›k 3 (11) It is interesting to see that dual condition (11) can be satisfied if the angle ฮธ between subspace โ„ฆ and subspace T is very small; see Figure 3. When the sample size |โ„ฆ| becomes larger and larger, the angle ฮธ becomes smaller and smaller (e.g., when |โ„ฆ| = n1 n2 , the angle ฮธ is zero as โ„ฆ = Rn1 ร—n2 ). We show that the sample size m โ‰ฅ โ„ฆ(ฮบ2 ยตrn(1) log2ฮบ (n(1) ) log(n(1) )) is a sufficient condition for condition (11) to hold.  5 Robust Principal Component Analysis In this section, we develop our theory for robust PCA based on our framework. In the problem of robust PCA, we are given an observed matrix of the form D = Xโˆ— + Sโˆ— , where Xโˆ— is the ground-truth matrix and Sโˆ— is the corruption matrix which is sparse. The goal is to recover the hidden matrices Xโˆ— and Sโˆ— from the observation D. We set H(X) = ฮปkD โˆ’ Xk1 . To make the information spreads evenly throughout the matrix, the matrix cannot have one entry whose absolute value is significantly larger than other entries. For the robust PCA problem, Candรจs et al. [CLMW11] introduced an extra incoherence condition (Recall that Xโˆ— = UฮฃVT is the skinny SVD of Xโˆ— ) r ยตr T kUV kโˆž โ‰ค . (12) n1 n2 In this work, we make the following incoherence assumption for robust PCA instead of (12): r ยตr โˆ— ฯƒr (Xโˆ— ). kX kโˆž โ‰ค n1 n2 (13) Note that condition (13) is very similar to the incoherence condition (12) for the robust PCA problem, but the two notions are incomparable. Note that condition (13) has an intuitive explanation, namely, that the entries must scatter almost uniformly across the low-rank matrix. We have the following results for robust PCA. Theorem 5.1 (Robust PCA). Suppose Xโˆ— is an n1 ร— n2 matrix of rank r, and obeys incoherence (3) and (13). Assume that the support set โ„ฆ of Sโˆ— is uniformly distributed among all sets of cardinality m. Then with probability at least 1 โˆ’ cnโˆ’10 (1) , the output of the optimization problem e S) e = argmin kXkrโˆ— + ฮปkSk1 , (X, s.t. D = X + S, X,S with ฮป = ฯƒr (Xโˆ— ) โˆš n(1) e = Xโˆ— and S e = Sโˆ— , provided that rank(Xโˆ— ) โ‰ค ฯr n(2) is exact, namely, X ยต log2 n and m โ‰ค (1) ฯs n1 n2 , where c, ฯr , and ฯs are all positive absolute constants, and function k ยท krโˆ— is given by (14). The bounds on the rank of Xโˆ— and the sparsity of Sโˆ— in Theorem 5.1 match the best known results for robust PCA in prior work when we assume the support set of Sโˆ— is sampled uniformly [CLMW11]. 6 Computational Aspects Computational Efficiency. We discuss our computational efficiency given that we have strong duality. We note that the dual and bi-dual of primal problem (P) are given by (see Appendix I) 10 (Dual, D1) (Bi-Dual, D2) 1 โˆ’H โˆ— (ฮ›) โˆ’ kฮ›k2r , 2 ฮ›โˆˆRn1 ร—n2 max min MโˆˆRn1 ร—n2 H(M) + kMkrโˆ— , where kฮ›k2r = r X ฯƒi2 (ฮ›), i=1 where kMkrโˆ— (14) 1 = maxhM, Xi โˆ’ kXk2r . X 2 Problems (D1) and (D2) can be solved efficiently due to their convexity. In particular, Grussler et al. [GRG16] provided a computationally efficient algorithm to compute the proximal operators of functions 12 k ยท k2r and k ยท krโˆ— . Hence, the Douglas-Rachford algorithm can find global minimum up to an  error in function value in time poly(1/) [HY12]. Computational Lower Bounds. Unfortunately, strong duality does not always hold for general non-convex problems (P). Here we present a very strong lower bound based on the random 4-SAT hypothesis. This is by now a fairly standard conjecture in complexity theory [Fei02] and gives us constant factor inapproximability of problem (P) for deterministic algorithms, even those running in exponential time. If we additionally assume that BPP = P, where BPP is the class of problems which can be solved in probabilistic polynomial time, and P is the class of problems which can be solved in deterministic polynomial time, then the same conclusion holds for randomized algorithms. This is also a standard conjecture in complexity theory, as it is implied by the existence of certain strong pseudorandom generators or if any problem in deterministic exponential time has exponential size circuits [IW97]. Therefore, any subexponential time algorithm achieving a sufficiently small constant factor approximation to problem (P) in general would imply a major breakthrough in complexity theory. The lower bound is proved by a reduction from the Maximum Edge Biclique problem [AMS11]. The details are presented in Appendix G. Theorem 6.1 (Computational Lower Bound). Assume Conjecture 1 (the hardness of Random 4-SAT). Then there exists an absolute constant 0 > 0 for which any deterministic algorithm achieving (1 + )OPT in the objective function value for problem (P) with  โ‰ค 0 , requires 2โ„ฆ(n1 +n2 ) time, where OPT is the optimum. If in addition, BPP = P, then the same conclusion holds for randomized algorithms succeeding with probability at least 2/3. Proof Sketch. Theorem 6.1 is proved by using the hypothesis that random 4-SAT is hard to show hardness of the Maximum Edge Biclique problem for deterministic algorithms. We then do a reduction from the Maximum Edge Biclique problem to our problem.  The complete proofs of other theorems/lemmas and related work can be found in the appendices. Acknowledgments. We thank Rong Ge, Jason D. Lee, Zhouchen Lin, Tengyu Ma, Benjamin Recht and Tuo Zhao for useful discussions. This work was supported in part by NSF grants NSF CCF-1422910, NSF CCF-1535967, NSF CCF-1451177, NSF IIS-1618714, NSF CCF-1527371, a Sloan Research Fellowship, a Microsoft Research Faculty Fellowship, DMS-1317308, Simons Investigator Award, Simons Collaboration Grant, and ONR-N00014-16-1-2329. We would like to thank Rina Foygel for finding a bug in the proof of Theorem 4.3 in a previous version. 11 A Other Related Work Non-convex matrix factorization is a popular topic studied in theoretical computer science [JNS13, Har14, SL15, RSW16], machine learning [BNS16, GLM16, GHJY15, JMD10, LLR16], and optimization [WYZ12, SWZ14]. We review several lines of research on studying the global optimality of such optimization problems. Global Optimality of Matrix Factorization. While lots of matrix factorization problems have been shown to have no spurious local minima, they either require additional conditions on the local minima, or are based on particular forms of the objective function. Specifically, Burer and Monteiro [BM05] showed that one can minimize F (AAT ) for any convex function F by solving for A directly without introducing any local minima, provided that the rank of the output A is larger than the rank of the true minimizer Xtrue . However, such a condition is often impossible to check as rank(Xtrue ) is typically unknown a priori. To resolve the issue, Bach et al. [BMP08] and Journรฉe et al. [JBAS10] proved that X = AAT is a global minimizer of F (X), if A is a rank-deficient local minimizer of F (AAT ) and F (X) is a twice differentiable convex function. Haeffele and Vidal [HV15] further extended this result by allowing a more general form of objective function F (X) = G(X) + H(X), where G is a twice differentiable convex function with compact level set and H is a proper convex function such that F is lower semi-continuous. However, a major drawback of this line of research is that these result fails when the local minimizer is of full rank. Matrix Completion. Matrix completion is a prototypical example of matrix factorization. One line of work on matrix completion builds on convex relaxation (e.g., [SS05, CR09, CT10, Rec11, CRPW12, NW12]), which does not achieve the optimal sample complexity. Recently, Ge et al. [GLM16] showed that matrix completion has no spurious local optimum, when |โ„ฆ| is sufficiently large and the matrix Y is incoherent. The result is only for positive semi-definite matrices and their sample complexity is not optimal. Another line of work is built upon good initialization for global convergence. Recent attempts showed that one can first compute some form of initialization (e.g., by singular value decomposition) that is close to the global minimizer and then use non-convex approaches to reach global optimality, such as alternating minimization, block coordinate descent, and gradient descent [KMO10b, KMO10a, JNS13, Kes12, Har14, BKS16, ZL15, ZWL15, TBSR15, CW15, SL15]. In our result, in contrast, we can reformulate non-convex matrix completion problems as equivalent convex programs, which guarantees global convergence from any initialization. Robust PCA. Robust PCA is also a prototypical example of matrix factorization. The goal is to recover both the low-rank and the sparse components exactly from their superposition [CLMW11, NNS+ 14, GWL16, ZLZC15, ZLZ16, YPCC16]. It has been widely applied to various tasks, such as video denoising, background modeling, image alignment, photometric stereo, texture representation, subspace clustering, and spectral clustering. There are typically two settings in the robust PCA literature: a) the support set of the sparse matrix is uniformly sampled [CLMW11, ZLZ16]; b) the support set of the sparse matrix is deterministic, but the non-zero entries in each row or column of the matrix cannot be too large [YPCC16, GJY17]. In this work, we discuss the first case. Our framework provides results that match the best known work in setting (b) [CLMW11]. Other Matrix Factorization Problems. Matrix sensing is another typical matrix factorization problem [CRPW12, JNS13, ZWL15]. Bhojanapalli et al. [BNS16] and Tu et al. [TBSR15] showed that the matrix recovery model minA,B 12 kA(AB โˆ’ Y)k2F , achieves optimality for every local minimum, if the operator A satisfies the restricted isometry property. They further gave a lower bound and showed that the unstructured operator A may easily lead to a local minimum which is not globally optimal. Some other matrix factorization problems are also shown to have nice geometric properties such as the property that all local minima are global minima. Examples include dictionary learning [SQW17a], phase 12 retrieval [SQW16], and linear deep neural networks Q [Kaw16]. In multi-layer linear neural networks where the โˆ— goal is to learn a multi-linear projection X = i Wi , each Wi represents the weight matrix that connects the hidden units in the i-th and (i + 1)-th layers. The study of such linear models is central to the theoretical understanding of the loss surface of deep neural networks with non-linear activation functions [Kaw16, CHM+ 15]. In dictionary learning, we aim to recover a complete (i.e., square and invertible) dictionary matrix A from a given signal X in the form of X = AB, provided that the representation coefficient B is sufficiently sparse. This problem centers around solving a non-convex matrix factorization problem with a sparsity constraint on the representation coefficient B [BMP08, SQW17a, SQW17b, ABGM14]. Other high-impact examples of matrix factorization models range from the classic unsupervised learning problems like PCA, independent component analysis, and clustering, to the more recent problems such as non-negative matrix factorization, weighted low-rank matrix approximation, sparse coding, tensor decomposition [BCMV14, AGH+ 14], subspace clustering [ZLZG15, ZLZG14], etc. Applying our framework to these other problems is left for future work. Atomic Norms. The atomic norm is a recently proposed function for linear inverse problems [CRPW12]. Many well-known norms, e.g., the `1 norm and the nuclear norm, serve as special cases of atomic norms. It has been widely applied to the problems of compressed sensing [TBSR13], low-rank matrix recovery [CR13], blind deconvolution [ARR14], etc. The norm is defined by the Minkowski functional associated with the convex hull of a set A: kXkA = inf{t > 0 : X โˆˆ tA}. In particular, if we set A to be the convex hull of the infinite set of unit-`2 -norm rank-one matrices, then k ยท kA equals to the nuclear norm. We mention that our objective term kABkF in problem (1) is similar to the atomic norm, but with slight differences: unlike the atomic norm, we set A to be the infinite set of unit-`2 -norm rank-r matrices for rank(X) โ‰ค r. With this, we achieve better sample complexity guarantees than the atomic-norm based methods. B Proof of Lemma 3.1 b any local minimum of f (A, B) = 1 kY b โˆ’ ABk2 is globally Lemma 3.1 (Restated). For any given matrix Y, F 2 optimal. The objective function f (A, B) around any saddle point has a negative second-order directional curvature. Moreover, f (A, B) has no local maximum. Proof. (A,B) is a critical point of f (A, B) if and only if โˆ‡A f (A, B) = 0 and โˆ‡B f (A, B) = 0, or equivalently, b T and AT AB = AT Y. b ABBT = YB (15) Note that for any fixed matrix A (resp. B), the function f (A, B) is convex in the coefficients of B (resp. A). To prove the desired lemma, we have the following claim. Claim 1. If two matrices A and B define a critical point of f (A, B), then the global mapping M = AB is of the form b M = PA Y, with A satisfying bY b T = AAโ€  Y bY b T AAโ€  = Y bY b T AAโ€  . AAโ€  Y (16) Proof. If A and B define a critical point of f (A, B), then (15) holds and the general solution to (15) satisfies B = (AT A)โ€  AT Y + (I โˆ’ Aโ€  A)L, (17) b = AAโ€  Y b = PA Y b by the property of the Moorefor any matrix L. So M = AB = A(AT A)โ€  AT Y โ€  T โ€  T Penrose pseudo-inverse: A = (A A) A . 13 By (15), we also have b T AT ABBT AT = YB b T. or equivalently MMT = YM b (B) can be rewritten as Plugging in the relation M = AAโ€  Y, bY b T AAโ€  = Y bY b T AAโ€  . AAโ€  Y bY b T AAโ€  is symmetric. Thus Note that the matrix AAโ€  Y bY b T = AAโ€  Y bY b T AAโ€  , AAโ€  Y as desired. To prove Lemma 3.1, we also need the following claim. Claim 2. Denote by I = {i1 , i2 , ..., ir } any ordered r-index set (ordered by ฮปij , j โˆˆ [r] from the largest bY b T โˆˆ Rn1 ร—n1 with p distinct values. Let UI = to the smallest) and ฮปi , i โˆˆ [n1 ], the eigenvalues of Y bY bT โˆˆ [ui1 , ui2 , ..., uir ] denote the matrix formed by the orthonormal eigenvectors U = [u1 , u2 , ..., un1 ] of Y n ร—n 1 1 R associated with the ordered p eigenvalues, whose multiplicities are m1 , m2 , ..., mp (m1 + m2 + ... + mp = n1 ). Then two matrices A and B define a critical point of f (A, B) if and only if there exists an ordered r-index set I, an invertible matrix C, and an r ร— n matrix L such that b + (I โˆ’ Aโ€  A)L, A = (UD):I C and B = Aโ€  Y (18) where D is a p-block-diagonal matrix with each block equal to the orthogonal projector of dimension mi . For such a critical point, we have b AB = PA Y, 1 f (A, B) = 2 ! bY bT) โˆ’ tr(Y X iโˆˆI ฮปi = 1X ฮปi . 2 (19) i6โˆˆI bY b T is a real symmetric covariance matrix. So it can always be represented as Uฮ›UT , Proof. Note that Y bY b T and ฮ› โˆˆ Rn1 ร—n1 is a where U โˆˆ Rn1 ร—n1 is an orthonormal matrix consisting of eigenvectors of Y T b b diagonal matrix with non-increasing eigenvalues of YY . If A and B satisfy (18) for some C, L, and I, then b T ABBT = YB and b AT AB = AT Y, which is (15). So A and B define a critical point of f (A, B). For the converse, notice that PUT A = UT A(UT A)โ€  = UT AAโ€  U = UT PA U, or equivalently, PA = UPUT A UT . Thus (16) yields UPUT A UT Uฮ›UT = Uฮ›UT UPUT A UT , or equivalently, PUT A ฮ› = ฮ›PUT A . Notice that ฮ› โˆˆ Rn1 ร—n1 is a diagonal matrix with p distinct eigenvalues bY b T . So PUT A is a block-diagonal matrix with p blocks, each of which is an orthogonal projector of of Y 14 dimension mi , corresponding to the eigenvalues ฮปi , i โˆˆ [p]. Therefore, there exists an index set I such that PUT A = D:I DT:I , where D is a block-diagonal matrix. It follows that PA = UPUT A UT = UD:I DT:I UT = (UD):I (UD)T:I . Since the column space of A coincides with the column space of (UD):I , A is of the form A = (UD):I C, b + A(I โˆ’ Aโ€  A)L = PA Y b and and B is given by (17). Thus AB = A(AT A)โ€  AT Y 1 b f (A, B) = kY โˆ’ ABk2F 2 1 b b 2 โˆ’ PA Yk = kY F 2 1 b 2 = kPAโŠฅ Yk F 2 X 1 = ฮปi . 2 i6โˆˆI So the local minimizer of f (A, B) is given by (18) with I = ฮฆ, which is globally optimal according to bY b T . We then show that when I (19), where ฮฆ is the index set corresponding to the r largest eigenvalues of Y consists of other combinations of indices of eigenvalues, i.e., I = 6 ฮฆ, the corresponding pair (A, B) given by (18) is a strict saddle point. Claim 3. If I = 6 ฮฆ, then the pair (A, B) given by (18) is a strict saddle point. Proof. Let i โˆˆ ฮฆ but i 6โˆˆ I, and denote by UD = R. It is enough to slightly perturb the column space of A towards the direction of an eigenvector of ฮปi . More precisely, fix two indices i and j such that i โˆˆ ฮฆ, e :j = (1 + 2 )โˆ’1/2 (R:j + R:i ). Notice that i 6โˆˆ I. Thus i 6โˆˆ I, and j is the largest index in I. For any , let R eTR e e e e eโ€  eโ€ e R :j :j = I. Let A = RI C and B = A Y + (I โˆ’ A A)L. A direct calculation shows that e B) e = f (A, B) โˆ’ 2 (ฮปi โˆ’ ฮปj )/(2 + 22 ). f (A, Hence, e B) e โˆ’ f (A, B) f (A, 1 = โˆ’ (ฮปi โˆ’ ฮปj ) < 0. 2 โ†’0  2 lim Note that all critical points of f (A, B) are in the form of (18), and if I 6= ฮฆ, the pair (A, B) given by (18) is a strict saddle point, while if I = ฮฆ, then the pair (A, B) given by (18) is a local minimum. We conclude that f (A, B) has no local maximum. The proof is completed. C Proof of Lemma 3.2 e B) e be a global minimizer of F (A, B). If there exists a dual certificate ฮ› e Lemma 3.2 (Restated). Let (A, e e e e as in Condition 1 such that the pair (A, B) is a local minimizer of L(A, B, ฮ›) for the fixed ฮ›, then strong eB e = svdr (โˆ’ฮ›). e duality holds. Moreover, we have the relation A 15 e โˆ’ ABk2 + e B) e is a local minimizer of L(A, B, ฮ›) e = 1k โˆ’ ฮ› Proof. By the assumption of the lemma, (A, F 2 e where c(ฮ›) e is a function that is independent of A and B. So according to Lemma 3.1, (A, e B) e = c(ฮ›), e namely, (A, e B) e globally minimizes L(A, B, ฮ›) when ฮ› is fixed to ฮ›. e Furthermore, argminA,B L(A, B, ฮ›), โˆ— e โˆˆ โˆ‚X H(X)| e e implies that A eB e โˆˆ โˆ‚ฮ› H (ฮ›)| e by the convexity of function H, meaning that ฮ› X=AB ฮ›=ฮ› e B, e ฮ›). So ฮ› e = argmaxฮ› L(A, e B, e ฮ›) due to the concavity of L(A, e B, e ฮ›) w.r.t. variable ฮ›. 0 โˆˆ โˆ‚ฮ› L(A, e e e Thus (A, B, ฮ›) is a primal-dual saddle point of L(A, B, ฮ›). e = We now prove the strong duality. By the fact that F (A, B) = maxฮ› L(A, B, ฮ›) and that ฮ› e B, e ฮ›), we have argmaxฮ› L(A, e B) e = L(A, e B, e ฮ›) e โ‰ค L(A, B, ฮ›), e โˆ€A, B. F (A, e B, e ฮ›) e is a primal-dual saddle point of L. So on the one hand, we where the inequality holds because (A, have e B) e โ‰ค min L(A, B, ฮ›) e โ‰ค max min L(A, B, ฮ›). min max L(A, B, ฮ›) = F (A, A,B ฮ› A,B ฮ› A,B On the other hand, by weak duality, min max L(A, B, ฮ›) โ‰ฅ max min L(A, B, ฮ›). A,B ฮ› ฮ› A,B Therefore, minA,B maxฮ› L(A, B, ฮ›) = maxฮ› minA,B L(A, B, ฮ›), i.e., strong duality holds. Hence, eB e = argmin L(A, B, ฮ›) e A AB 1 e โˆ’ ABk2 โˆ’ 1 kฮ›k e 2 โˆ’ H โˆ— (ฮ›) e = argmin k โˆ’ ฮ› F F 2 2 AB 1 e โˆ’ ABk2 = argmin k โˆ’ ฮ› F 2 AB e = svdr (โˆ’ฮ›), as desired. D Proof of Theorem 4.1 Theorem 4.1 (Information-Theoretic Upper Bound. Restated). Let โ„ฆ โˆผ Uniform(m) be the support set, which is uniformly distributed among all sets of cardinality m. Suppose that m โ‰ฅ cยตn(1) r log n(1) for an absolute constant c. Then Xโˆ— is the unique n1 ร— n2 matrix of rank at most r with ยต-incoherence (3) such that Pโ„ฆ (X) = Pโ„ฆ (Xโˆ— ), with probability at least 1 โˆ’ nโˆ’10 (1) . Proof. We note  that the sampling model Uniform(m) is equivalent to the sampling model Ber(p) with m p = ฮ˜ n1 n2 , which we will frequently use in the sequel (see Appendix J). We consider the feasibility of the matrix completion problem: Find a matrix X โˆˆ Rn1 ร—n2 such that Pโ„ฆ (X) = Pโ„ฆ (Xโˆ— ), rank(X) โ‰ค r. (20) Our proof first identifies a feasibility condition for problem (20), and then shows that Xโˆ— is the only matrix that obeys this feasibility condition when the sample size is large enough. We denote by S = {X โˆˆ Rn1 ร—n2 : rank(X) โ‰ค r}, 16 and define DS (Xโˆ— ) = {t(X โˆ’ Xโˆ— ) โˆˆ Rn1 ร—n2 : rank(X) โ‰ค r, t โ‰ฅ 0}. We have the following proposition for the feasibility of problem (20). Proposition D.1 (Feasibility Condition). Xโˆ— is the unique feasible solution to problem (20) if DS (Xโˆ— ) โˆฉ โ„ฆโŠฅ = {0}. Proof. Notice that problem (20) is equivalent to another feasibility problem Find a matrix D โˆˆ Rn1 ร—n2 such that rank(Xโˆ— + D) โ‰ค r, D โˆˆ โ„ฆโŠฅ . Suppose that DS (Xโˆ— ) โˆฉ โ„ฆโŠฅ = {0}. Since rank(Xโˆ— + D) โ‰ค r implies D โˆˆ DS (Xโˆ— ), and note that D โˆˆ โ„ฆโŠฅ , we have D = 0, which means Xโˆ— is the unique feasible solution to problem (20). The remainder of the proof is to show DS (Xโˆ— ) โˆฉ โ„ฆโŠฅ = {0}. To proceed, we note that the โ€œescaping through a meshโ€ techniques for matrix sensing do not work for matrix completion since โ„ฆ is not drawn from the Grassmanian according to the Haar measure. To address this issue, we instead need the following lemmas. The first lemma claims that the tangent cone of the set S evaluated at Xโˆ— is slightly larger than the cone cone(S โˆ’ {Xโˆ— }). Lemma D.2 ([Jah07], Theorem 4.8). Let S be a non-empty subset of a real normed space. If S is star-shaped w.r.t. some Xโˆ— โˆˆ S, i.e., t(S โˆ’ {Xโˆ— }) โІ S โˆ’ {Xโˆ— } for all t โˆˆ [0, 1], then it follows cone(S โˆ’ {Xโˆ— }) โІ T (S, Xโˆ— ), where T (S, Xโˆ— ) is the tangent cone of the set S at point Xโˆ— defined by T (S, Xโˆ— ) = {ฮž โˆˆ Rn1 ร—n2 : โˆƒXn โІ S, (an ) โІ R+ s.t. Xn โ†’ Xโˆ— , an (Xn โˆ’ Xโˆ— ) โ†’ ฮž}. The second lemma states that the tangent cone of the set S evaluated at Xโˆ— can be represented in a closed form. Lemma D.3 ([SU15], Theorem 3.2). Let Xโˆ— = UฮฃVT be the skinny SVD of matrix Xโˆ— . The tangent cone T (S, Xโˆ— ) of the set S = {X โˆˆ Rn1 ร—n2 : rank(X) โ‰ค r} at Xโˆ— is a linear subspace given by T (S, Xโˆ— ) = {ULT + MVT : L โˆˆ Rn2 ร—r , M โˆˆ Rn1 ร—r } , T . Now we are ready to prove Theorem 4.1. By Lemma D.2 and D.3, we have DS (Xโˆ— ) = cone(S โˆ’ {Xโˆ— }) โІ T (S, Xโˆ— ) = T , where the first equality holds by the definition of DS (Xโˆ— ). So if T โˆฉ โ„ฆโŠฅ = {0}, then DS (Xโˆ— ) โˆฉ โ„ฆโŠฅ = {0}, meaning that Xโˆ— is the unique feasible solution to the problem (20). Thus the rest of proof is to find a sufficient condition for T โˆฉ โ„ฆโŠฅ = {0}. We have the following lemma. Lemma D.4. Assume that โ„ฆ โˆผ Ber(p) and the incoherence condition (3) holds. Then with probability at โˆš least 1 โˆ’ nโˆ’10 1 โˆ’ p + p, provided that p โ‰ฅ C0 โˆ’2 (ยตr log n(1) )/n(2) , where C0 (1) , we have kPโ„ฆโŠฅ PT k โ‰ค is an absolute constant. 17 Proof. If โ„ฆ โˆผ Ber(p), we have, by Theorem E.2, that with high probability kPT โˆ’ pโˆ’1 PT Pโ„ฆ PT k โ‰ค , provided that p โ‰ฅ C0 โˆ’2 ยตr log n(1) . n(2) Note, however, that since I = Pโ„ฆ + Pโ„ฆโŠฅ , PT โˆ’ pโˆ’1 PT Pโ„ฆ PT = pโˆ’1 (PT Pโ„ฆโŠฅ PT โˆ’ (1 โˆ’ p)PT ) and, therefore, by the triangle inequality kPT Pโ„ฆโŠฅ PT k โ‰ค p + (1 โˆ’ p). Since kPโ„ฆโŠฅ PT k2 โ‰ค kPT Pโ„ฆโŠฅ PT k, the proof is completed. We note that kPโ„ฆโŠฅ PT k < 1 implies โ„ฆโŠฅ โˆฉ T = {0}. The proof is completed. E Proof of Theorem 4.3 e B) e = argminA,B 1 kABk2 , s.t.Pโ„ฆ (AB) = Pโ„ฆ (Xโˆ— ), We have shown in Theorem 4.1 that the problem (A, F 2 eB e = Xโˆ— , with the optimal sample complexity. So if strong duality holds, this exactly recovers Xโˆ— , i.e., A non-convex optimization problem can be equivalently converted to the convex program (10). Then Theorem 4.3 is straightforward from strong duality. It now suffices to apply our unified framework in Section 3 to prove the strong duality. We show that the e B) e be a global solution to problem (10). dual condition in Theorem 3.3 holds with high probability. Let (A, For H(X) = I{MโˆˆRn1 ร—n2 : Pโ„ฆ M=Pโ„ฆ Xโˆ— } (X), we have e B) e = {G โˆˆ Rn1 ร—n2 : hG, A e Bi e โ‰ฅ hG, Yi, for any Y โˆˆ Rn1 ร—n2 s.t. Pโ„ฆ Y = Pโ„ฆ Xโˆ— } ฮจ = โˆ‚H(A = {G โˆˆ Rn1 ร—n2 : hG, Xโˆ— i โ‰ฅ hG, Yi, for any Y โˆˆ Rn1 ร—n2 s.t. Pโ„ฆ Y = Pโ„ฆ Xโˆ— } = โ„ฆ, eB e = Xโˆ— . Then we only need to show where the third equality holds since A (1) (2) (3) e โˆˆ โ„ฆ, ฮ› e =A e B, e PT (โˆ’ฮ›) (21) e < 2 ฯƒr (A e B). e kPT โŠฅ ฮ›k 3 We have the following lemma. Lemma E.1. If we can construct an ฮ› such that (a) ฮ› โˆˆ โ„ฆ, (b) e Bk e F โ‰ค kPT (โˆ’ฮ›) โˆ’ A (c) 1 e B), e kPT โŠฅ ฮ›k < ฯƒr (A 3 s r e B), e ฯƒr (A 3n2(1) e such that Eqn. (21) holds with probability at least 1 โˆ’ nโˆ’10 . then we can construct an ฮ› (1) Proof. To prove the lemma, we first claim the following theorem. 18 (22) Theorem E.2 ([CR09], Theorem 4.1). Assume that โ„ฆ is sampled according to the Bernoulli model with success probability p = ฮ˜( n1mn2 ), and incoherence condition (3) holds. Then there is an absolute constant CR such that for ฮฒ > 1, we have r ฮฒยตn(1) r log n(1) โˆ’1 kp PT Pโ„ฆ PT โˆ’ PT k โ‰ค CR , , m q ฮฒยตn(1) r log n(1) โˆ’ฮฒ with probability at least 1 โˆ’ 3n provided that CR < 1. m e โˆ’ ฮ› โˆˆ โ„ฆ be the perturbation matrix between ฮ› and ฮ› e Suppose that Condition (22) holds. Let Y = ฮ› โˆ’1 e e e e e such that PT q (โˆ’ฮ›) = AB. Such a Y exists by setting Y = Pโ„ฆ PT (PT Pโ„ฆ PT ) (PT (โˆ’ฮ›) โˆ’ AB). So e B). e We now prove Condition (3) in Eqn. (21). Observe that kPT YkF โ‰ค 3nr2 ฯƒr (A (1) e โ‰ค kPT โŠฅ ฮ›k + kPT โŠฅ Yk kPT โŠฅ ฮ›k 1 e B) e + kPT โŠฅ Yk. โ‰ค ฯƒr (A 3 (23) e B). e So we only need to show kPT โŠฅ Yk โ‰ค 13 ฯƒr (A Before proceeding, we begin by introducing a normalized version Qโ„ฆ : Rn1 ร—n2 โ†’ Rn1 ร—n2 of Pโ„ฆ : Qโ„ฆ = pโˆ’1 Pโ„ฆ โˆ’ I. With this, we have PT Pโ„ฆ PT = pPT (I + Qโ„ฆ )PT . Note that for any operator P : T โ†’ T , we have X P โˆ’1 = (PT โˆ’ P)k whenever kPT โˆ’ Pk < 1. kโ‰ฅ0 So according to Theorem E.2, the operator p(PT Pโ„ฆ PT )โˆ’1 can be represented as a convergent Neumann series X p(PT Pโ„ฆ PT )โˆ’1 = (โˆ’1)k (PT Qโ„ฆ PT )k , kโ‰ฅ0 because kPT Qโ„ฆ PT k โ‰ค  < also note that 1 2 once m โ‰ฅ Cยตn(1) r log n(1) for a sufficiently large absolute constant C. We p(PT โŠฅ Qโ„ฆ PT ) = PT โŠฅ Pโ„ฆ PT , 19 because PT โŠฅ PT = 0. Thus e B))k e kPT โŠฅ Yk = kPT โŠฅ Pโ„ฆ PT (PT Pโ„ฆ PT )โˆ’1 (PT (โˆ’ฮ›) โˆ’ A e B))k e = kPT โŠฅ Qโ„ฆ PT p(PT Pโ„ฆ PT )โˆ’1 ((PT (โˆ’ฮ›) โˆ’ A X e B))k e =k (โˆ’1)k PT โŠฅ Qโ„ฆ (PT Qโ„ฆ PT )k ((PT (โˆ’ฮ›) โˆ’ A kโ‰ฅ0 โ‰ค X e B))k e F k(โˆ’1)k PT โŠฅ Qโ„ฆ (PT Qโ„ฆ PT )k ((PT (โˆ’ฮ›) โˆ’ A kโ‰ฅ0 โ‰ค kQโ„ฆ k X e B))k e F kPT Qโ„ฆ PT kk kPT (โˆ’ฮ›) โˆ’ A kโ‰ฅ0 4 e B)k e F kPT (โˆ’ฮ›) โˆ’ A p n n  s r 1 2 e B) e โ‰คฮ˜ ฯƒr (A m 3n2(1) โ‰ค 1 e B) e โ‰ค ฯƒr (A 3 with high probability. The proof is completed. It thus suffices to construct a dual certificate ฮ› such that all conditions in (22) hold. To this end, partition โ„ฆ = โ„ฆ1 โˆช โ„ฆ2 โˆช ... โˆช โ„ฆb into b partitions of size q. By assumption, we may choose   128 1 qโ‰ฅ Cฮฒฮบ2 ยตrn(1) log n(1) and b โ‰ฅ log2ฮบ 242 n2(1) ฮบ2 3 2 for a sufficiently large constant C. Let โ„ฆj โˆผ Ber(q) denote the set of indices corresponding to the jeB e and set ฮ›k = n1 n2 Pk Pโ„ฆ (Wjโˆ’1 ), Wk = A eB e โˆ’ PT (ฮ›k ) for th partitions. Define W0 = A j j=1 q k = 1, 2, ..., b. Then by Theorem E.2,   n1 n2 n1 n2 kWk kF = Wkโˆ’1 โˆ’ PT Pโ„ฆk (Wkโˆ’1 ) = PT Pโ„ฆk PT (Wkโˆ’1 ) PT โˆ’ q q F F 1 โ‰ค kWkโˆ’1 kF . 2ฮบ q r โˆš e B) e โ‰ค ee So it follows that kWb kF โ‰ค (2ฮบ)โˆ’b kW0 kF โ‰ค (2ฮบ)โˆ’b rฯƒ1 (A 2 2 ฯƒr (AB). 24 n(1) The following lemma together implies the strong duality of (10) straightforwardly. Lemma E.3. Under the assumptions of Theorem 4.3, the dual certification Wb obeys the dual condition (22) with probability at least 1 โˆ’ nโˆ’10 (1) . Proof. It is well known that for matrix completion, the Uniform model โ„ฆ โˆผ Uniform(m) is equivalent to the Bernoulli model โ„ฆ โˆผ Ber(p), where each element in [n1 ] ร— [n2 ] is included with probability p = ฮ˜(m/(n1 n2 )) independently; see Section J for a brief justification. By the equivalence, we can suppose โ„ฆ โˆผ Ber(p). To prove Lemma E.3, as a preliminary, we need the following lemmas. Lemma E.4 ([Che15], Lemma 2). Suppose Z is a fixed matrix. Suppose โ„ฆ โˆผ Ber(p). Then with high probability, ๏ฃซ ๏ฃถ s log n(1) log n(1) k(I โˆ’ pโˆ’1 Pโ„ฆ )Zk โ‰ค C00 ๏ฃญ kZkโˆž + kZkโˆž,2 ๏ฃธ , p p 20 where C00 > 0 is an absolute constant and ๏ฃฑ ๏ฃผ s sX ๏ฃฒ ๏ฃฝ X 2 2 = max max Zib , max Zaj . j ๏ฃณ i ๏ฃพ a kZkโˆž,2 b Lemma E.5 ([CLMW11], Lemma 3.1). Suppose โ„ฆ โˆผ Ber(p) and Z is a fixed matrix. Then with high probability, kZ โˆ’ pโˆ’1 PT Pโ„ฆ Zkโˆž โ‰ค kZkโˆž , provided that p โ‰ฅ C0 โˆ’2 (ยตr log n(1) )/n(2) for some absolute constant C0 > 0. Lemma E.6 ([Che15], Lemma 3). Suppose that Z is a fixed matrix and โ„ฆ โˆผ Ber(p). If p โ‰ฅ c0 ยตr log n(1) /n(2) for some c0 sufficiently large, then with high probability, r 1 n(1) 1 k(pโˆ’1 PT Pโ„ฆ โˆ’ PT )Zkโˆž,2 โ‰ค kZkโˆž + kZkโˆž,2 . 2 ยตr 2 Observe that by Lemma E.5, kWj kโˆž  j 1 e Bk e โˆž, kA โ‰ค 2 and by Lemma E.6, kWj kโˆž,2 โ‰ค 1 2 r n(1) 1 kWjโˆ’1 kโˆž + kWjโˆ’1 kโˆž,2 . ยตr 2 So kWj kโˆž,2  j r n(1) 1 e Bk e โˆž + 1 kWjโˆ’1 kโˆž,2 โ‰ค kA 2 ยตr 2  j r  j n(1) 1 1 e e e Bk e โˆž,2 . โ‰คj kABkโˆž + kA 2 ยตr 2 Therefore, kPT โŠฅ ฮ›b k โ‰ค b X n1 n2 k PT โŠฅ Pโ„ฆj Wjโˆ’1 k q j=1 = b X kPT โŠฅ ( j=1 โ‰ค b X j=1 k( n1 n2 Pโ„ฆj Wjโˆ’1 โˆ’ Wjโˆ’1 )k q n1 n2 Pโ„ฆj โˆ’ I)(Wjโˆ’1 )k. q 21 Let p denote ฮ˜  q n1 n2  . By Lemma E.4, kPT โŠฅ ฮ›b k b X 0 log n(1) โ‰ค C0 kWjโˆ’1 kโˆž + C00 p s b log n(1) X kWjโˆ’1 kโˆž,2 p j=1 j=1 s # "   r  j b  j b j X X log n n log n 1 1 1 (1) (1) e e (1) e Bk e โˆž + C0 e Bk e โˆž,2 โ‰ค C00 kA j kABkโˆž + kA 0 p 2 p 2 ยตr 2 j=1 j=1 s s r log n log n n log n(1) (1) e e (1) (1) e e e Bk e โˆž,2 . โ‰ค C00 kABkโˆž + 2C00 kABkโˆž + C00 kA p p ยตr p eB e = Xโˆ— , we note the facts that (we assume WLOG n2 โ‰ฅ n1 ) Setting A r r ยตr ยตr โˆ— โˆ— T T T โˆ— ฯƒ1 (X ) โ‰ค ฮบฯƒr (Xโˆ— ), kX kโˆž,2 = max kei UฮฃV k2 โ‰ค max kei Ukฯƒ1 (X ) โ‰ค i i n1 n1 and that kXโˆ— kโˆž = maxhXโˆ— , ei eTj i = maxhUฮฃVT , ei eTj i = maxheTi Uฮฃ, eTj Vi ij โ‰ค Substituting p = ฮ˜ F  ij ij max keTi UฮฃVT k2 keTj Vk2 ij ฮบ2 ยตrn(1) log(n(1) ) log2ฮบ (n(1) ) n1 n2  ยตrฮบ ฯƒr (Xโˆ— ). โ‰ค max kX kโˆž,2 keTj Vk2 โ‰ค โˆš j n1 n2 โˆ— e < 1 ฯƒr (Xโˆ— ). The proof is completed. , we obtain kPT โŠฅ ฮ›k 3 Proof of Theorem 5.1 Theorem 5.1 (Robust PCA. Restated). Suppose Xโˆ— is n1 ร— n2 , obeys incoherence (3) and (13). Assume that the support set โ„ฆ of Sโˆ— is uniformly distributed among all sets of cardinality m. Then with probability at least 1 โˆ’ cnโˆ’10 (1) , the output of the optimization problem e S) e = argmin kXkrโˆ— + ฮปkSk1 , (X, s.t. D = X + S, (24) X,S with ฮป = ฯƒr (Xโˆ— ) โˆš n(1) n (2) e = Xโˆ— and S e = Sโˆ— , provided that rank(Xโˆ— ) โ‰ค ฯr is exact, namely, X ยต log2 n and m โ‰ค (1) ฯs n1 n2 , where c, ฯr , and ฯs are all positive absolute constants, and function k ยท krโˆ— is given by (14). F.1 Subgradient of the rโˆ— Function Lemma F.1. Let UฮฃVT be the skinny SVD of matrix Xโˆ— of rank r. The subdifferential of k ยท krโˆ— evaluated at Xโˆ— is given by โˆ‚kXโˆ— krโˆ— = {Xโˆ— + W : UT W = 0, WV = 0, kWk โ‰ค ฯƒr (Xโˆ— )}. Proof. Note that for any fixed function f (ยท), the set of all optimal solutions of the problem f โˆ— (Xโˆ— ) = maxhXโˆ— , Yi โˆ’ f (Y) Y 22 (25) form the subdifferential of the conjugate function f โˆ— (ยท) evaluated at Xโˆ— . Set f (ยท) to be 12 k ยท k2r and notice that the function 12 k ยท k2r is unitarily invariant. By Von Neumannโ€™s trace inequality, the optimal solutions to problem (25) are given by [U, UโŠฅ ]Diag([ฯƒ1 (Y), ..., ฯƒr (Y), ฯƒr+1 (Y), ..., ฯƒn(2) (Y)])[V, VโŠฅ ]T , where n(2) {ฯƒi (Y)}i=r+1 can be any value no larger than ฯƒr (Y) and {ฯƒi (Y)}ri=1 are given by the optimal solution to the problem r r X 1X 2 โˆ— max ฯƒi (X )ฯƒi (Y) โˆ’ ฯƒi (Y). 2 {ฯƒi (Y)}ri=1 i=1 The solution is unique such that ฯƒi (Y) = ฯƒi F.2 (Xโˆ— ), i=1 i = 1, 2, ..., r. The proof is complete. Dual Certificates Lemma F.2. Assume that kPโ„ฆ PT k โ‰ค 1/2 and ฮป < ฯƒr (Xโˆ— ). Then (Xโˆ— , Sโˆ— ) is the unique solution to problem (5.1) if there exists a pair (W, F) for which Xโˆ— + W = ฮป(sign(Sโˆ— ) + F + Pโ„ฆ K), where W โˆˆ T โŠฅ , kWk โ‰ค ฯƒr (Xโˆ— ) , 2 F โˆˆ โ„ฆโŠฅ , kFkโˆž โ‰ค 12 , and kPโ„ฆ KkF โ‰ค 14 . Proof. Let (Xโˆ— + H, Sโˆ— โˆ’ H) be any optimal solution to problem (24). By the definition of the subgradient, the inequality follows kXโˆ— + Hkrโˆ— + ฮปkSโˆ— โˆ’ Hk1 โ‰ฅ kXโˆ— krโˆ— + ฮปkSโˆ— k1 + hXโˆ— + Wโˆ— , Hi โˆ’ ฮปhsign(Sโˆ— ) + Fโˆ— , Hi = kXโˆ— krโˆ— + ฮปkSโˆ— k1 + hXโˆ— โˆ’ ฮปsign(Sโˆ— ), Hi + hWโˆ— , Hi โˆ’ ฮปhFโˆ— , Hi = kXโˆ— krโˆ— + ฮปkSโˆ— k1 + hXโˆ— โˆ’ ฮปsign(Sโˆ— ), Hi + ฯƒr (Xโˆ— )kPT โŠฅ Hkโˆ— + ฮปkPโ„ฆโŠฅ Hk1 = kXโˆ— krโˆ— + ฮปkSโˆ— k1 + hฮปF + ฮปPโ„ฆ K โˆ’ W, Hi + ฯƒr (Xโˆ— )kPT โŠฅ Hkโˆ— + ฮปkPโ„ฆโŠฅ Hk1 ฮป ฮป ฯƒr (Xโˆ— ) = kXโˆ— krโˆ— + ฮปkSโˆ— k1 + kPT โŠฅ Hkโˆ— + kPโ„ฆโŠฅ Hk1 โˆ’ kPโ„ฆ HkF . 2 2 4 We note that kPโ„ฆ HkF โ‰ค kPโ„ฆ PT HkF + kPโ„ฆ PT โŠฅ HkF 1 โ‰ค kHkF + kPT โŠฅ HkF 2 1 1 โ‰ค kPโ„ฆ HkF + kPโ„ฆโŠฅ HkF + kPT โŠฅ HkF , 2 2 which implies that ฮป4 kPโ„ฆ HkF โ‰ค ฮป4 kPโ„ฆโŠฅ HkF + ฮป2 kPT โŠฅ HkF โ‰ค ฮป4 kPโ„ฆโŠฅ Hk1 + ฮป2 kPT โŠฅ Hkโˆ— . Therefore, ฮป ฯƒr (Xโˆ— ) โˆ’ ฮป kPT โŠฅ Hkโˆ— + kPโ„ฆโŠฅ Hk1 2 4 โˆ—) โˆ’ ฮป ฯƒ (X ฮป r โ‰ฅ kXโˆ— + Hkrโˆ— + ฮปkSโˆ— โˆ’ Hk1 + kPT โŠฅ Hkโˆ— + kPโ„ฆโŠฅ Hk1 , 2 4 where the second inequality holds because (Xโˆ— + H, Sโˆ— โˆ’ H) is optimal. Thus H โˆˆ T โˆฉ โ„ฆ. Note that kPโ„ฆ PT k < 1 implies T โˆฉ โ„ฆ = {0}. This completes the proof. kXโˆ— + Hkrโˆ— + ฮปkSโˆ— โˆ’ Hk1 โ‰ฅ kXโˆ— krโˆ— + ฮปkSโˆ— k1 + According to Lemma F.2, to show the exact recoverability of problem (24), it is sufficient to find an appropriate W for which ๏ฃฑ ๏ฃด W โˆˆ T โŠฅ, ๏ฃด ๏ฃด ๏ฃด ๏ฃฒkWk โ‰ค ฯƒr (Xโˆ— ) , 2 (26) โˆ— โˆ— ))k โ‰ค ฮป , ๏ฃด kP (X + W โˆ’ ฮปsign(S โ„ฆ F ๏ฃด 4 ๏ฃด ๏ฃด ๏ฃณkP โŠฅ (Xโˆ— + W)k โ‰ค ฮป . โˆž โ„ฆ 2 23 F.3 Dual Certification by Least Squares and the Golfing Scheme The remainder of the proof is to construct W such that the dual condition (26) holds true. Before introducing our construction, we assume โ„ฆ โˆผ Ber(p), or equivalently โ„ฆโŠฅ โˆผ Ber(1 โˆ’ p), where p is allowed be as large as an absolute constant. Note that โ„ฆโŠฅ has the same distribution as that of โ„ฆ1 โˆช โ„ฆ2 โˆช ... โˆช โ„ฆj0 , where the โ„ฆj โ€™s are drawn independently with replacement from Ber(q), j0 = dlog n(1) e, and q obeys p = (1 โˆ’ q)j0 (q = โ„ฆ(1/ log n(1) ) implies p = O(1)). We construct W based on such a distribution. Our construction separates W into two terms: W = WL + WS . To construct WL , we apply the golfing scheme introduced by [Gro11, Rec11]. Specifically, WL is constructed by an inductive procedure: Yj = Yjโˆ’1 + q โˆ’1 Pโ„ฆj PT (Xโˆ— โˆ’ Yjโˆ’1 ), Y0 = 0, WL = PT โŠฅ Yj0 . To construct WS , we apply the method of least squares by [CLMW11], which is X WS = ฮปPT โŠฅ (Pโ„ฆ PT Pโ„ฆ )k sign(Sโˆ— ). (27) (28) kโ‰ฅ0 Note that kPโ„ฆ PT k โ‰ค 1/2. Thus kPโ„ฆ PT Pโ„ฆ k โ‰ค 1/4 and the Neumann series in (28) is well-defined. Observe that Pโ„ฆ WS = ฮป(Pโ„ฆ โˆ’ Pโ„ฆ PT Pโ„ฆ )(Pโ„ฆ โˆ’ Pโ„ฆ PT Pโ„ฆ )โˆ’1 sign(Sโˆ— ) = ฮปsign(Sโˆ— ). So to prove the dual condition (26), it suffices to show that ฯƒr (Xโˆ— ) , 4 (a) kWL k โ‰ค ฮป , 4 ฮป โ‰ค , 4 (b) kPโ„ฆ (Xโˆ— + WL )kF โ‰ค (c) kPโ„ฆโŠฅ (Xโˆ— + WL )kโˆž ฯƒr (Xโˆ— ) , 4 ฮป (e) kPโ„ฆโŠฅ WS kโˆž โ‰ค . 4 (29) (d) kWS k โ‰ค F.4 (30) Proof of Dual Conditions Since we have constructed the dual certificate W, the remainder is to show that W obeys dual conditions (29) and (30) with high probability. We have the following. Lemma F.3. Assume โ„ฆj โˆผ Ber(q), j = 1, 2, ..., j0 , and j0 = 2dlog n(1) e. Then under the other assumptions of Theorem 5.1, WL given by (27) obeys dual condition (29). Proof. Let Zj = PT (Xโˆ— โˆ’ Yj ) โˆˆ T . Then we have Zj = PT Zjโˆ’1 โˆ’ q โˆ’1 PT Pโ„ฆj PT Zjโˆ’1 = (PT โˆ’ q โˆ’1 PT Pโ„ฆj PT )Zjโˆ’1 , and Yj = Pj k=1 q โˆ’1 P Z โ„ฆk kโˆ’1 โˆˆ โ„ฆโŠฅ . We set q = โ„ฆ(โˆ’2 ยตr log n(1) /n(2) ). 24 Proof of (a). It holds that L kW k = kPT โŠฅ Yj0 k โ‰ค j0 X kq โˆ’1 PT โŠฅ Pโ„ฆk Zkโˆ’1 k k=1 = โ‰ค j0 X k=1 j0 X kPT โŠฅ (q โˆ’1 Pโ„ฆk Zkโˆ’1 โˆ’ Zkโˆ’1 )k kq โˆ’1 Pโ„ฆk Zkโˆ’1 โˆ’ Zkโˆ’1 k k=1 ๏ฃซ โ‰ค C00 ๏ฃญ log n(1) q j0 X s kZkโˆ’1 kโˆž + k=1 log n(1) q j0 X ๏ฃถ kZkโˆ’1 kโˆž,2 ๏ฃธ . (by Lemma E.4) k=1 We note that by Lemma E.5, kZkโˆ’1 kโˆž  kโˆ’1 1 kZ0 kโˆž , โ‰ค 2 and by Lemma E.6, kZkโˆ’1 kโˆž,2 1 โ‰ค 2 r n(1) 1 kZkโˆ’2 kโˆž + kZkโˆ’2 kโˆž,2 . ยตr 2 Therefore, kZkโˆ’1 kโˆž,2  kโˆ’1 r n(1) 1 1 kZ0 kโˆž + kZkโˆ’2 kโˆž,2 โ‰ค 2 ยตr 2  kโˆ’1 r  kโˆ’1 n(1) 1 1 โ‰ค (k โˆ’ 1) kZ0 kโˆž + kZ0 kโˆž,2 , 2 ยตr 2 and so we have kWL k ๏ฃฎ s !๏ฃน  kโˆ’1  kโˆ’1r j0  kโˆ’1 j0 X X log n log n n 1 1 1 (1) (1) (1) โ‰ค C00 ๏ฃฐ kZ0 kโˆž+ kZ0 kโˆž+ kZ0 kโˆž,2 ๏ฃป (k โˆ’ 1) q 2 q 2 ยตr 2 k=1 k=1 ๏ฃฎ ๏ฃน s s log n n log n log n (1) (1) (1) (1) โ‰ค 2C00 ๏ฃฐ kXโˆ— kโˆž + kXโˆ— kโˆž + kXโˆ— kโˆž,2 ๏ฃป q qยตr q r   โˆš n(2) n(2) n1 n2 โˆ— โˆ— โˆ— โ‰ค 2C0 kX kโˆž + kX kโˆž + kX kโˆž,2 (since q = โ„ฆ(ยตr log n(1) )/n(2) ) ยตr ยตr ยตr ฯƒr (Xโˆ— ) โ‰ค , (by incoherence (13)) 4 where we have used the fact that kXโˆ— kโˆž,2 โ‰ค p n(1) kXโˆ— kโˆž โ‰ค 25 r ยตr ฯƒr (Xโˆ— ). n(2) Proof of (b). Because Yj0 โˆˆ โ„ฆโŠฅ , we have Pโ„ฆ (Xโˆ— + PT โŠฅ Yj0 ) = Pโ„ฆ (Xโˆ— โˆ’ PT Yj0 ) = Pโ„ฆ Zj0 . It then follows from Theorem E.2 that kZj0 kF โ‰ค tj0 kXโˆ— kF โˆš โ‰ค tj0 n1 n2 kXโˆ— kโˆž r ยตr j0 โˆš ฯƒr (Xโˆ— ) โ‰คt n1 n2 n1 n2 ฮป โ‰ค . (tj0 โ‰ค eโˆ’2 log n(1) โ‰ค nโˆ’2 (1) ) 8 Proof of (c). By definition, we know that Xโˆ— + WL = Zj0 + Yj0 . Since we have shown kZj0 kF โ‰ค ฮป/8, it suffices to prove kYj0 kโˆž โ‰ค ฮป/8. We have kYj0 kโˆž โ‰ค q โˆ’1 โ‰ค q โˆ’1 j0 X k=1 j0 X kPโ„ฆk Zkโˆ’1 kโˆž kโˆ’1 kXโˆ— kโˆž (by Lemma E.5) k=1 r n(2) 2 ยตr ฯƒr (Xโˆ— ) (by incoherence (13)) โ‰ค C0 ยตr log n(1) n1 n2 ฮป โ‰ค , 8   ยตr(log n(1) )2 1/4 if we choose  = C for an absolute constant C. This can be true once the constant ฯr is n(2) sufficiently small. We now prove that WS given by (28) obeys dual condition (30). We have the following. Lemma F.4. Assume โ„ฆ โˆผ Ber(p). Then under the other assumptions of Theorem 5.1, WS given by (28) obeys dual condition (30). Proof. According to the standard de-randomization argument [CLMW11], it is equivalent to studying the case when the signs ฮดij of Sโˆ—ij are independently distributed as ๏ฃฑ ๏ฃด w.p. p/2, ๏ฃฒ1, ฮดij = 0, w.p. 1 โˆ’ p, ๏ฃด ๏ฃณ โˆ’1, w.p. p/2. Proof of (d). Recall that WS = ฮปPT โŠฅ X (Pโ„ฆ PT Pโ„ฆ )k sign(Sโˆ— ) kโ‰ฅ0 = ฮปPT โŠฅ sign(Sโˆ— ) + ฮปPT โŠฅ X (Pโ„ฆ PT Pโ„ฆ )k sign(Sโˆ— ). kโ‰ฅ1 โˆš To bound the first term, we have ksign(Sโˆ— )k โ‰ค 4 n(1) p [Ver10]. So kฮปPT โŠฅ sign(Sโˆ— )k โ‰ค ฮปksign(Sโˆ— )k โ‰ค โˆš 4 pฯƒr (Xโˆ— ) โ‰ค ฯƒr (Xโˆ— )/8. 26 P We now bound the second term. Let G = kโ‰ฅ1 (Pโ„ฆ PT Pโ„ฆ )k , which is self-adjoint, and denote by Nn1 and Nn2 the 12 -nets of Sn1 โˆ’1 and Sn1 โˆ’1 of sizes at most 6n1 and 6n2 , respectively [Led05]. We know that [Ver10] kG(sign(Sโˆ— ))k = hG(yxT ), sign(Sโˆ— )i sup xโˆˆSn2 โˆ’1 ,yโˆˆSn1 โˆ’1 โ‰ค4 hG(yxT ), sign(Sโˆ— )i. sup xโˆˆNn2 ,yโˆˆNn1 Consider the random variable X(x, y) = hG(yxT ), sign(Sโˆ— )i which has zero expectation. By Hoeffdingโ€™s inequality, we have     2t2 2t2 โ‰ค 2 exp โˆ’ . Pr(|X(x, y)| > t|โ„ฆ) โ‰ค 2 exp โˆ’ kGk2 kG(xyT )k2F Therefore, by a union bound, โˆ— n1 +n2 Pr(kG(sign(S ))k > t|โ„ฆ) โ‰ค 2 ร— 6 t2 exp โˆ’ 8kGk2  Note that conditioned on the event {kPโ„ฆ PT k โ‰ค ฯƒ}, we have kGk = t2 Pr(ฮปkG(sign(Sโˆ— ))k > t) โ‰ค 2ร—6n1 +n2 exp โˆ’ 2 8ฮป  1 โˆ’ ฯƒ2 ฯƒ2 P  . kโ‰ฅ1 (Pโ„ฆ PT Pโ„ฆ )k โ‰ค ฯƒ2 . 1โˆ’ฯƒ 2 So 2 ! Pr(kPโ„ฆ PT k โ‰ค ฯƒ)+Pr(kPโ„ฆ PT k > ฯƒ). The following lemma guarantees that event {kPโ„ฆ PT k โ‰ค ฯƒ} holds with high probability for a very small absolute constant ฯƒ. Lemma F.5 ([CLMW11], Cor 2.7). Suppose that โ„ฆ โˆผ Ber(p) and incoherence (3) holds. Then with 2 โˆ’2 probability at least 1 โˆ’ nโˆ’10 (1) , kPโ„ฆ PT k โ‰ค p + , provided that 1 โˆ’ p โ‰ฅ C0  ยตr log n(1) /n(2) for an absolute constant C0 . Setting t = ฯƒr (Xโˆ— ) , 8 this completes the proof of (d). P Proof of (e). Recall that WS = ฮปPT โŠฅ kโ‰ฅ0 (Pโ„ฆ PT Pโ„ฆ )k sign(Sโˆ— ) and so Pโ„ฆโŠฅ WS = ฮปPโ„ฆโŠฅ (I โˆ’ PT ) X (Pโ„ฆ PT Pโ„ฆ )k sign(Sโˆ— ) kโ‰ฅ0 X = โˆ’ฮปPโ„ฆโŠฅ PT (Pโ„ฆ PT Pโ„ฆ )k sign(Sโˆ— ). kโ‰ฅ0 Then for any (i, j) โˆˆ โ„ฆโŠฅ , we have * S Wij = hWS , ei eTj i = + X ฮปsign(Sโˆ— ), โˆ’ (Pโ„ฆ PT Pโ„ฆ )k Pโ„ฆ PT (ei eTj ) . kโ‰ฅ0 Let X(i, j) = โˆ’ P kโ‰ฅ0 (Pโ„ฆ PT Pโ„ฆ )k Pโ„ฆ PT (ei eTj ). By Hoeffdingโ€™s inequality and a union bound, ! Pr S sup |Wij | ij > t|โ„ฆ โ‰ค2 X ij 27 2t2 exp โˆ’ 2 ฮป kX(i, j)k2F   . We note that conditioned on the event {kPโ„ฆ PT k โ‰ค ฯƒ}, for any (i, j) โˆˆ โ„ฆโŠฅ , kX(i, j)kF โ‰ค โ‰ค = โ‰ค โ‰ค Then unconditionally, ! Pr S sup |Wij | ij >t 1 ฯƒkPT (ei eTj )kF 1 โˆ’ ฯƒ2 q 1 ฯƒ 1 โˆ’ kPT โŠฅ (ei eTj )k2F 1 โˆ’ ฯƒ2 q 1 ฯƒ 1 โˆ’ k(I โˆ’ UUT )ei k22 k(I โˆ’ VVT )ej k22 1 โˆ’ ฯƒ2 s    1 ยตr ยตr 1โˆ’ ฯƒ 1โˆ’ 1โˆ’ 1 โˆ’ ฯƒ2 n1 n2 r ยตr ยตr 1 ฯƒ + . 2 1โˆ’ฯƒ n1 n2 2t2 (1 โˆ’ ฯƒ 2 )2 n1 n2 โ‰ค 2n1 n2 exp โˆ’ 2 2 ฮป ฯƒ ยตr(n1 + n2 )   Pr(kPโ„ฆ PT k โ‰ค ฯƒ) + Pr(kPโ„ฆ PT k > ฯƒ). By Lemma F.5 and setting t = ฮป/4, the proof of (e) is completed. G Proof of Theorem 6.1 Our computational lower bound for problem (P) assumes the hardness of random 4-SAT. Conjecture 1 (Random 4-SAT). Let c > ln 2 be a constant. Consider a random 4-SAT formula on n variables in which each clause has 4 literals, and in which each of the 16n4 clauses is picked independently with probability c/n3 . Then any algorithm which always outputs 1 when the random formula is satisfiable, 0 and outputs 0 with probability at least 1/2 when the random formula is unsatisfiable, must run in 2c n time on some input, where c0 > 0 is an absolute constant. Based on Conjecture 1, we have the following computational lower bound for problem (P). We show that problem (P) is in general hard for deterministic algorithms. If we additionally assume BPP = P, then the same conclusion holds for randomized algorithms with high probability. Theorem 6.1 (Computational Lower Bound. Restated). Assume Conjecture 1. Then there exists an absolute constant 0 > 0 for which any algorithm that achieves (1 + )OPT in objective function value for problem (P) with  โ‰ค 0 , and with constant probability, requires 2โ„ฆ(n1 +n2 ) time, where OPT is the optimum. If in addition, BPP = P, then the same conclusion holds for randomized algorithms succeeding with probability at least 2/3. Proof. Theorem 6.1 is proved by using the hypothesis that random 4-SAT is hard to show hardness of the Maximum Edge Biclique problem for deterministic algorithms. Definition 1 (Maximum Edge Biclique). The problem is Input: An n-by-n bipartite graph G. Output: A k1 -by-k2 complete bipartite subgraph of G, such that k1 ยท k2 is maximized. 28 [GL04] showed that under the random 4-SAT assumption there exist two constants 1 > 2 > 0 such that no efficient deterministic algorithm is able to distinguish between bipartite graphs G(U, V, E) with |U | = |V | = n which have a clique of size โ‰ฅ (n/16)2 (1 + 1 ) and those in which all bipartite cliques are of size โ‰ค (n/16)2 (1 + 2 ). The reduction uses a bipartite graph G with at least tn2 edges with large probability, for a constant t. Given a given bipartite graph G(U, V, E), define H(ยท) as follows. Define the matrix Y and W: Yij = 1 if edge (Ui , Vj ) โˆˆ E, Yij = 0 if edge (Ui , Vj ) 6โˆˆ E; Wij = 1 if edge (Ui , Vj ) โˆˆPE, and Wij = poly(n) if 2 (Y โˆ’ (AB) )2 . edge (Ui , Vj ) 6โˆˆ E. Choose a large enough constant ฮฒ > 0 and let H(AB) = ฮฒ ij Wij ij ij 2 Now, if there exists a biclique in G with at least (n/16) (1 + 2 ) edges, then the number of remaining edges is at most tn2 โˆ’ (n/16)2 (1 + 1 ), and so the solution to min H(AB) + 12 kABk2F has cost at most ฮฒ[tn2 โˆ’ (n/16)2 (1 + 1 )] + n2 . On the other hand, if there does not exist a biclique that has more than (n/16)2 (1 + 2 ) edges, then the number of remaining edges is at least (n/16)2 (1 + 2 ), and so any solution to min H(AB) + 21 kABk2F has cost at least ฮฒ[tn2 โˆ’ (n/16)2 (1 + 2 )]. Choose ฮฒ large enough so that ฮฒ[tn2 โˆ’ (n/16)2 (1 + 2 )] > ฮฒ[tn2 โˆ’ (n/16)2 (1 + 1 )] + n2 . This combined with the result in [GL04] completes the proof for deterministic algorithms. To rule out randomized algorithms running in time 2ฮฑ(n1 +n2 ) for some function ฮฑ of n1 , n2 for which ฮฑ = o(1), observe that we can define a new problem which is the same as problem (P) except the input description of H is padded with a string of 1s of length 2(ฮฑ/2)(n1 +n2 ) . This string is irrelevant for solving problem (P) but changes the input size to N = poly(n1 , n2 ) + 2(ฮฑ/2)(n1 +n2 ) . By the argument in the previous paragraph, any deterministic algorithm still requires 2โ„ฆ(n) = N ฯ‰(1) time to solve this problem, which is super-polynomial in the new input size N . However, if a randomized algorithm can solve it in 2ฮฑ(n1 +n2 ) time, then it runs in poly(N ) time. This contradicts the assumption that BPP = P. This completes the proof. H Matrix Completion by Information-Theoretic Upper Bound Theorem 4.1 formulates matrix completion as a feasibility problem. However, it is a priori unclear if there is an algorithm for finding Xโˆ— with O(ยตn(1) r log n(1) ) sample complexity and incoherence (3) via solving the feasibility problem. To answer this question, we mention that matrix completion can be solved in finite time under these minimum assumptions, namely, we note that the feasibility problem is equivalent to finding a zero of the polynomial X (eTi ABej โˆ’ Xโˆ—ij )2 = 0 (i,j)โˆˆโ„ฆ w.r.t. the (n1 + n2 )r unknowns A and B. Since A can be assumed to be orthogonal, if the entries of Xโˆ— can be written down with poly(n) bits, then kBkF โ‰ค exp(poly(n)), which means if one rounds each of the entries of B to the nearest additive grid multiple of 1/ exp(poly(n)), then we will get a rank-k matrix B where each entry represents the true entry of the optimal B up to additive 1/ exp(poly(n)) error (of course one cannot write down B in some cases if the entries are irrational). Such an A and B can be found in exp((n1 + n2 )r) time [Ren92a, Ren92b, BPR96]. This gives an exponential time algorithm to solve the feasibility problem in Theorem 4.1 for matrix completion. I Dual and Bi-Dual Problems In this section, we derive the dual and bi-dual problems of non-convex program (P). According to (5), the primal problem (P) is equivalent to 1 1 min max k โˆ’ ฮ› โˆ’ ABk2F โˆ’ kฮ›k2F โˆ’ H โˆ— (ฮ›). A,B ฮ› 2 2 29 Therefore, the dual problem is given by 1 1 max min k โˆ’ ฮ› โˆ’ ABk2F โˆ’ kฮ›k2F โˆ’ H โˆ— (ฮ›) ฮ› A,B 2 2 n (2) 1 X 2 1 = max ฯƒi (โˆ’ฮ›) โˆ’ kฮ›k2F โˆ’ H โˆ— (ฮ›) ฮ› 2 2 i=r+1 1 = max โˆ’ kฮ›k2r โˆ’ H โˆ— (ฮ›), ฮ› 2 where kฮ›k2r = Pr 2 i=1 ฯƒi (ฮ›). (D1) The bi-dual problem is derived by 1 min max0 โˆ’ kฮ›k2r โˆ’ H โˆ— (ฮ›0 ) + hM, ฮ›0 โˆ’ ฮ›i M ฮ›,ฮ› 2     1 2 0 โˆ— 0 = min max hM, โˆ’ฮ›i โˆ’ k โˆ’ ฮ›kr + max hM, ฮ› i โˆ’ H (ฮ› ) M โˆ’ฮ› ฮ›0 2 = min kMkrโˆ— + H(M), (D2) M where kMkrโˆ— = maxX hM, Xi โˆ’ 21 kXk2r is a convex function, and H(M) = maxฮ›0 [hM, ฮ›0 i โˆ’ H โˆ— (ฮ›0 )] holds by the definition of conjugate function. Problems (D1) and (D2) can be solved efficiently due to their convexity. In particular, [GRG16] provided a computationally efficient algorithm to compute the proximal operators of functions 12 k ยท k2r and k ยท krโˆ— . Hence, the Douglas-Rachford algorithm can find the global minimum up to an  error in function value in time poly(1/) [HY12]. J Equivalence of Bernoulli and Uniform Models Lemma J.1. Let n be the number of Bernoulli trials and suppose that โ„ฆ โˆผ Ber(m/n). Then with probability at least 1 โˆ’ nโˆ’10 , |โ„ฆ| = ฮ˜(m), provided that m โ‰ฅ c log n for an absolute constant c. Proof. By the scalar Chernoff bound, with  > 0 we have  Pr(|โ„ฆ| โ‰ค m โˆ’ n) โ‰ค exp โˆ’2 n2 /(2m) , (31)  Pr(|โ„ฆ| โ‰ฅ m + n) โ‰ค exp โˆ’2 n2 /(3m) . (32) and Taking  = m/(2n) and m โ‰ฅ c1 log n in (31) for an appropriate absolute constant c1 , we have Pr(|โ„ฆ| โ‰ค m/2) โ‰ค exp(โˆ’m/4) โ‰ค nโˆ’10 . 2 (33) Taking  = m/n and m โ‰ฅ c2 log n in (32) for an appropriate absolute constant c2 , we have Pr(|โ„ฆ| โ‰ฅ 2m) โ‰ค exp(โˆ’m/3) โ‰ค nโˆ’10 . 2 (34) Given (33) and (34), we conclude that m/2 < |โ„ฆ| < 2m with probability at least 1 โˆ’ nโˆ’10 , provided that m โ‰ฅ c log n for an absolute constant c. 30 References [AAZB+ 16] Naman Agarwal, Zeyuan Allen-Zhu, Brian Bullins, Elad Hazan, and Tengyu Ma. Finding approximate local minima for nonconvex optimization in linear time. arXiv preprint arXiv:1611.01146, 2016. [ABGM14] Sanjeev Arora, Aditya Bhaskara, Rong Ge, and Tengyu Ma. More algorithms for provable dictionary learning. arXiv preprint arXiv:1401.0579, 2014. [ABHZ16] Pranjal Awasthi, Maria-Florina Balcan, Nika Haghtalab, and Hongyang Zhang. Learning and 1-bit compressed sensing under asymmetric noise. In Annual Conference on Learning Theory, pages 152โ€“192, 2016. [AG16] Anima Anandkumar and Rong Ge. Efficient approaches for escaping higher order saddle points in non-convex optimization. arXiv preprint arXiv:1602.05908, 2016. [AGH+ 14] Animashree Anandkumar, Rong Ge, Daniel J Hsu, Sham M Kakade, and Matus Telgarsky. Tensor decompositions for learning latent variable models. Journal of Machine Learning Research, 15(1):2773โ€“2832, 2014. [AMS11] Christoph Ambรผhl, Monaldo Mastrolilli, and Ola Svensson. Inapproximability results for maximum edge biclique, minimum linear arrangement, and sparsest cut. SIAM Journal on Computing, 40(2):567โ€“596, 2011. [ANW12] Alekh Agarwal, Sahand Negahban, and Martin J Wainwright. Noisy matrix decomposition via convex relaxation: Optimal rates in high dimensions. The Annals of Statistics, pages 1171โ€“1197, 2012. [ARR14] Ali Ahmed, Benjamin Recht, and Justin Romberg. Blind deconvolution using convex programming. IEEE Transactions on Information Theory, 60(3):1711โ€“1732, 2014. [AZ16] Zeyuan Allen-Zhu. Katyusha: The first direct acceleration of stochastic gradient methods. arXiv preprint arXiv:1603.05953, 2016. [BCMV14] Aditya Bhaskara, Moses Charikar, Ankur Moitra, and Aravindan Vijayaraghavan. Smoothed analysis of tensor decompositions. In ACM Symposium on Theory of Computing, pages 594โ€“603, 2014. [BE06] Amir Beck and Yonina C Eldar. Strong duality in nonconvex quadratic optimization with two quadratic constraints. SIAM Journal on Optimization, 17(3):844โ€“860, 2006. [BH89] Pierre Baldi and Kurt Hornik. Neural networks and principal component analysis: Learning from examples without local minima. Neural Networks, 2(1):53โ€“58, 1989. [BKS16] Srinadh Bhojanapalli, Anastasios Kyrillidis, and Sujay Sanghavi. Dropping convexity for faster semi-definite optimization. In Annual Conference on Learning Theory, pages 530โ€“582, 2016. [BM05] Samuel Burer and Renato DC Monteiro. Local minima and convergence in low-rank semidefinite programming. Mathematical Programming, 103(3):427โ€“444, 2005. [BMP08] Francis Bach, Julien Mairal, and Jean Ponce. Convex sparse matrix factorizations. arXiv preprint arXiv:0812.1869, 2008. 31 [BNS16] Srinadh Bhojanapalli, Behnam Neyshabur, and Nati Srebro. Global optimality of local search for low rank matrix recovery. In Advances in Neural Information Processing Systems, pages 3873โ€“3881, 2016. [BPR96] Saugata Basu, Richard Pollack, and Marie Francoise Roy. On the combinatorial and algebraic complexity of quantifier elimination. J. ACM, 43(6):1002โ€“1045, 1996. [BV04] Stephen Boyd and Lieven Vandenberghe. Convex optimization. Cambridge university press, 2004. [BZ16] Maria-Florina Balcan and Hongyang Zhang. Noise-tolerant life-long matrix completion via adaptive sampling. In Advances in Neural Information Processing Systems, pages 2955โ€“2963, 2016. [Che15] Yudong Chen. Incoherence-optimal matrix completion. IEEE Transactions on Information Theory, 61(5):2909โ€“2923, 2015. [CHM+ 15] Anna Choromanska, Mikael Henaff, Michael Mathieu, Gรฉrard Ben Arous, and Yann LeCun. The loss surfaces of multilayer networks. In International Conference on Artificial Intelligence and Statistics, 2015. [CLMW11] Emmanuel J. Candรจs, Xiaodong Li, Yi Ma, and John Wright. Robust principal component analysis? Journal of the ACM, 58(3):11, 2011. [CR09] Emmanuel J. Candรจs and Ben Recht. Exact matrix completion via convex optimization. Foundations of Computational Mathematics, 9(6):717โ€“772, 2009. [CR13] Emmanuel J. Candรจs and Benjamin Recht. Simple bounds for recovering low-complexity models. Mathematical Programming, pages 1โ€“13, 2013. [CRPW12] Venkat Chandrasekaran, Benjamin Recht, Pablo A Parrilo, and Alan S Willsky. The convex geometry of linear inverse problems. Foundations of Computational Mathematics, 12(6):805โ€“ 849, 2012. [CT10] Emmanuel J. Candรจs and Terence Tao. The power of convex relaxation: Near-optimal matrix completion. IEEE Transactions on Information Theory, 56(5):2053โ€“2080, 2010. [CW15] Yudong Chen and Martin J. Wainwright. Fast low-rank estimation by projected gradient descent: General statistical and algorithmic guarantees. arXiv preprint arXiv:1509.03025, 2015. [Fei02] Uriel Feige. Relations between average case complexity and approximation complexity. In Proceedings of the 17th Annual IEEE Conference on Computational Complexity, Montrรฉal, Quรฉbec, Canada, May 21-24, 2002, page 5, 2002. [GHJY15] Rong Ge, Furong Huang, Chi Jin, and Yang Yuan. Escaping from saddle points โ€“ online stochastic gradient for tensor decomposition. In Annual Conference on Learning Theory, pages 797โ€“842, 2015. [GJY17] Rong Ge, Chi Jin, and Zheng Yi. No spurious local minima in nonconvex low rank problems: A unified geometric analysis. arXiv preprint: 1704.00708, 2017. [GL04] Andreas Goerdt and Andrรฉ Lanka. An approximation hardness result for bipartite clique. In Electronic Colloquium on Computational Complexity, Report, volume 48, 2004. 32 [GLM16] Rong Ge, Jason D Lee, and Tengyu Ma. Matrix completion has no spurious local minimum. In Advances in Neural Information Processing Systems, pages 2973โ€“2981, 2016. [GLZ17] David Gamarnik, Quan Li, and Hongyi Zhang. Matrix completion from O(n) samples in linear time. arXiv preprint arXiv:1702.02267, 2017. [GRG16] Christian Grussler, Anders Rantzer, and Pontus Giselsson. Low-rank optimization with convex constraints. arXiv preprint arXiv:1606.01793, 2016. [Gro11] D. Gross. Recovering low-rank matrices from few coefficients in any basis. IEEE Transactions on Information Theory, 57(3):1548โ€“1566, 2011. [GWL16] Quanquan Gu, Zhaoran Wang, and Han Liu. Low-rank and sparse structure pursuit via alternating minimization. In International Conference on Artificial Intelligence and Statistics, pages 600โ€“609, 2016. [Har14] Moritz Hardt. Understanding alternating minimization for matrix completion. In IEEE Symposium on Foundations of Computer Science, pages 651โ€“660, 2014. [HM12] Moritz Hardt and Ankur Moitra. Algorithms and hardness for robust subspace recovery. arXiv preprint: 1211.1041, 2012. [HMRW14] Moritz Hardt, Raghu Meka, Prasad Raghavendra, and Benjamin Weitz. Computational limits for matrix completion. In Annual Conference on Learning Theory, pages 703โ€“725, 2014. [HV15] Benjamin D Haeffele and Renรฉ Vidal. Global optimality in tensor factorization, deep learning, and beyond. arXiv preprint arXiv:1506.07540, 2015. [HY12] Bingsheng He and Xiaoming Yuan. On the O(1/n) convergence rate of the douglasโ€“rachford alternating direction method. SIAM Journal on Numerical Analysis, 50(2):700โ€“709, 2012. [HYV14] Benjamin Haeffele, Eric Young, and Rene Vidal. Structured low-rank matrix factorization: Optimality, algorithm, and applications to image processing. In International Conference on Machine Learning, pages 2007โ€“2015, 2014. [IW97] Russell Impagliazzo and Avi Wigderson. P = BPP if E requires exponential circuits: Derandomizing the XOR lemma. In ACM Symposium on the Theory of Computing, pages 220โ€“229, 1997. [Jah07] Johannes Jahn. Introduction to the theory of nonlinear optimization. Springer Berlin Heidelberg, 2007. [JBAS10] Michel Journรฉe, Francis Bach, P-A Absil, and Rodolphe Sepulchre. Low-rank optimization on the cone of positive semidefinite matrices. SIAM Journal on Optimization, 20(5):2327โ€“2351, 2010. [JGN+ 17] Chi Jin, Rong Ge, Praneeth Netrapalli, Sham M Kakade, and Michael I Jordan. How to escape saddle points efficiently. arXiv preprint arXiv:1703.00887, 2017. [JMD10] Prateek Jain, Raghu Meka, and Inderjit S Dhillon. Guaranteed rank minimization via singular value projection. In Advances in Neural Information Processing Systems, pages 937โ€“945, 2010. [JNS13] Prateek Jain, Praneeth Netrapalli, and Sujay Sanghavi. Low-rank matrix completion using alternating minimization. In ACM Symposium on Theory of Computing, pages 665โ€“674, 2013. 33 [Kaw16] Kenji Kawaguchi. Deep learning without poor local minima. arXiv preprint arXiv:1605.07110, 2016. [KBV09] Yehuda Koren, Robert Bell, and Chris Volinsky. Matrix factorization techniques for recommender systems. IEEE Computer, 42(8):30โ€“37, 2009. [Kes12] Raghunandan Hulikal Keshavan. Efficient algorithms for collaborative filtering. PhD thesis, Stanford University, 2012. [KMO10a] Raghunandan H Keshavan, Andrea Montanari, and Sewoong Oh. Matrix completion from a few entries. IEEE Transactions on Information Theory, 56(6):2980โ€“2998, 2010. [KMO10b] Raghunandan H Keshavan, Andrea Montanari, and Sewoong Oh. Matrix completion from noisy entries. Journal of Machine Learning Research, 11:2057โ€“2078, 2010. [Led05] Michel Ledoux. The concentration of measure phenomenon. Number 89. American Mathematical Society, 2005. [LLR16] Yuanzhi Li, Yingyu Liang, and Andrej Risteski. Recovery guarantee of weighted low-rank approximation via alternating minimization. In International Conference on Machine Learning, pages 2358โ€“2367, 2016. [NNS+ 14] Praneeth Netrapalli, UN Niranjan, Sujay Sanghavi, Animashree Anandkumar, and Prateek Jain. Non-convex robust PCA. In Advances in Neural Information Processing Systems, pages 1107โ€“1115, 2014. [NW12] Sahand Negahban and Martin J Wainwright. Restricted strong convexity and weighted matrix completion: Optimal bounds with noise. Journal of Machine Learning Research, 13:1665โ€“1697, 2012. [OW92] Michael L Overton and Robert S Womersley. On the sum of the largest eigenvalues of a symmetric matrix. SIAM Journal on Matrix Analysis and Applications, 13(1):41โ€“45, 1992. [Rec11] Benjamin Recht. A simpler approach to matrix completion. Journal of Machine Learning Research, 12:3413โ€“3430, 2011. [Ren92a] James Renegar. On the computational complexity and geometry of the first-order theory of the reals, part I: introduction. preliminaries. the geometry of semi-algebraic sets. the decision problem for the existential theory of the reals. J. Symb. Comput., 13(3):255โ€“300, 1992. [Ren92b] James Renegar. On the computational complexity and geometry of the first-order theory of the reals, part II: the general decision problem. preliminaries for quantifier elimination. J. Symb. Comput., 13(3):301โ€“328, 1992. [RSW16] Ilya Razenshteyn, Zhao Song, and David P. Woodruff. Weighted low rank approximations with provable guarantees. In ACM Symposium on Theory of Computing, pages 250โ€“263, 2016. [SL15] Ruoyu Sun and Zhi-Quan Luo. Guaranteed matrix completion via nonconvex factorization. In IEEE Symposium on Foundations of Computer Science, pages 270โ€“289, 2015. [SQW16] Ju Sun, Qing Qu, and John Wright. A geometric analysis of phase retrieval. In IEEE International Symposium on Information Theory, pages 2379โ€“2383, 2016. 34 [SQW17a] Ju Sun, Qing Qu, and John Wright. Complete dictionary recovery over the sphere I: Overview and the geometric picture. IEEE Transactions on Information Theory, 63(2):853โ€“884, 2017. [SQW17b] Ju Sun, Qing Qu, and John Wright. Complete dictionary recovery over the sphere II: Recovery by Riemannian trust-region method. IEEE Transactions on Information Theory, 63(2):885โ€“914, 2017. [SS05] Nathan Srebro and Adi Shraibman. Rank, trace-norm and max-norm. In International Conference on Computational Learning Theory, pages 545โ€“560. Springer, 2005. [SU15] Reinhold Schneider and Andrรฉ Uschmajew. Convergence results for projected line-search methods on varieties of low-rank matrices via Lojasiewicz inequality. SIAM Journal on Optimization, 25(1):622โ€“646, 2015. [SWZ14] Yuan Shen, Zaiwen Wen, and Yin Zhang. Augmented lagrangian alternating direction method for matrix separation based on low-rank factorization. Optimization Methods and Software, 29(2):239โ€“263, 2014. [TBSR13] Gongguo Tang, Badri Narayan Bhaskar, Parikshit Shah, and Benjamin Recht. Compressed sensing off the grid. IEEE Transactions on Information Theory, 59(11):7465โ€“7490, 2013. [TBSR15] Stephen Tu, Ross Boczar, Mahdi Soltanolkotabi, and Benjamin Recht. Low-rank solutions of linear matrix equations via procrustes flow. arXiv preprint arXiv:1507.03566, 2015. [Ver09] Roman Vershynin. Lectures in geometric functional analysis. pages 1โ€“76, 2009. [Ver10] Roman Vershynin. Introduction to the non-asymptotic analysis of random matrices. arXiv preprint: 1011.3027, 2010. [Ver15] Roman Vershynin. Estimation in high dimensions: A geometric perspective. In Sampling theory, a renaissance, pages 3โ€“66. Springer, 2015. [WX12] Yu-Xiang Wang and Huan Xu. Stability of matrix factorization for collaborative filtering. In International Conference on Machine Learning, pages 417โ€“424, 2012. [WYZ12] Zaiwen Wen, Wotao Yin, and Yin Zhang. Solving a low-rank factorization model for matrix completion by a nonlinear successive over-relaxation algorithm. Mathematical Programming Computation, 4(4):333โ€“361, 2012. [YPCC16] Xinyang Yi, Dohyung Park, Yudong Chen, and Constantine Caramanis. Fast algorithms for robust PCA via gradient descent. In Advances in neural information processing systems, pages 4152โ€“4160, 2016. [ZL15] Qinqing Zheng and John Lafferty. A convergent gradient descent algorithm for rank minimization and semidefinite programming from random linear measurements. In Advances in Neural Information Processing Systems, pages 109โ€“117, 2015. [ZL16] Qinqing Zheng and John Lafferty. Convergence analysis for rectangular matrix completion using Burer-Monteiro factorization and gradient descent. arXiv preprint arXiv:1605.07051, 2016. 35 [ZLZ13] Hongyang Zhang, Zhouchen Lin, and Chao Zhang. A counterexample for the validity of using nuclear norm as a convex surrogate of rank. In European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, volume 8189, pages 226โ€“241, 2013. [ZLZ16] Hongyang Zhang, Zhouchen Lin, and Chao Zhang. Completing low-rank matrices with corrupted samples from few coefficients in general basis. IEEE Transactions on Information Theory, 62(8):4748โ€“4768, 2016. [ZLZC15] Hongyang Zhang, Zhouchen Lin, Chao Zhang, and Edward Chang. Exact recoverability of robust PCA via outlier pursuit with tight recovery bounds. In AAAI Conference on Artificial Intelligence, pages 3143โ€“3149, 2015. [ZLZG14] Hongyang Zhang, Zhouchen Lin, Chao Zhang, and Junbin Gao. Robust latent low rank representation for subspace clustering. Neurocomputing, 145:369โ€“373, 2014. [ZLZG15] Hongyang Zhang, Zhouchen Lin, Chao Zhang, and Junbin Gao. Relations among some low rank subspace recovery models. Neural Computation, 27:1915โ€“1950, 2015. [ZWG17] Xiao Zhang, Lingxiao Wang, and Quanquan Gu. A nonconvex free lunch for low-rank plus sparse matrix recovery. arXiv preprint arXiv:1702.06525, 2017. [ZWL15] Tuo Zhao, Zhaoran Wang, and Han Liu. A nonconvex optimization framework for low rank matrix estimation. In Advances in Neural Information Processing Systems, pages 559โ€“567, 2015. 36
8cs.DS
arXiv:1403.3148v4 [cs.SI] 15 Nov 2016 Heat Kernel Based Community Detection Kyle Kloster David F. Gleich Purdue University West Lafayette, IN Purdue University West Lafayette, IN [email protected] [email protected] ABSTRACT The heat kernel is a type of graph diffusion that, like the much-used personalized PageRank diffusion, is useful in identifying a community nearby a starting seed node. We present the first deterministic, local algorithm to compute this diffusion and use that algorithm to study the communities that it produces. Our algorithm is formally a relaxation method for solving a linear system to estimate the matrix exponential in a degree-weighted norm. We prove that this algorithm stays localized in a large graph and has a worst-case constant runtime that depends only on the parameters of the diffusion, not the size of the graph. On large graphs, our experiments indicate that the communities produced by this method have better conductance than those produced by PageRank, although they take slightly longer to compute. On a real-world community identification task, the heat kernel communities perform better than those from the PageRank diffusion. Categories and Subject Descriptors G.2.2 [Discrete mathematics]: Graph theoryโ€”Graph algorithms; I.5.3 [Pattern recognition]: Clusteringโ€”Algorithms General Terms Algorithms,Theory Keywords heat kernel; local clustering 1. INTRODUCTION The community detection problem is to identify a set of nodes in a graph that are internally cohesive but also separated from the remainder of the network. One popular way to capture this idea is through the conductance measure of a set. We treat this idea formally in the next section, but Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. KDDโ€™14, August 24โ€“27, 2014, New York, NY, USA. Copyright is held by the owner/author(s). Publication rights licensed to ACM. ACM 978-1-4503-2956-9/14/08 ...$15.00. http://dx.doi.org/10.1145/2623330.2623706. informally, the conductance of a set is a ratio of the number of edges leaving the set to the number of edges touched by the set of vertices. If this value is small, then it indicates a set with many internal edges and few edges leaving. In many surveys and empirical studies [17, 35, 49], the conductance measure surfaces as one of the most reliable measures of a community. Although this measure has been critized for producing cavemen-type communities [24], empirical properties of real-world communities correlate highly with sets produced by algorithms that optimize conductance [1]. Furthermore, state-of-the-art methods for identifying overlapping sets of communities use conductance to find realworld communities better than any alternative [54]. Virtually all of the rigorous algorithms that identify sets of small conductance are based on min-cuts [6, 48], eigenvector computations [4, 21], or local graph diffusions [5, 14]. (One notable exception is the graclus method [17] that uses a relationship between kernel k-means and a variant of conductance.) In this paper, we study a new algorithm that uses a heat kernel diffusion [14] to identify small-conductance communities in a network. (The heat kernel is discussed formally in Section 3.) Although the properties of this diffusion had been analyzed in theory in Chungโ€™s work [14], that work did not provide an efficient algorithm to compute the diffusion. Recently, Chung and Simpson stated a randomized Monte Carlo method to estimate the diffusion [16]. This paper introduces an efficient and deterministic method to estimate this diffusion. We use it to study the properties of the small conductance sets identified by the method as communities. For this use, a deterministic approach is critical as we need to differentiate between subtle properties of the diffusion. Our primary point of comparison is the well-known personalized PageRank diffusion [5], which has been used to establish new insights into the properties of communities in large scale networks [35]. Thus, we wish to understand how the communities produced by the heat kernel compare to those produced by personalized PageRank. The basic operation of our algorithm is a coordinate relaxation step. This has been used to efficiently compute personalized PageRank [5, 23, 38] where it is known as the โ€œpushโ€ operation on a graph; the term โ€œcoordinate relaxationโ€ is the classical name for this operation, which dates back to the Gauss-Seidel method. What distinguishes our approach from prior work is the use of coordinate relaxation on an implicitly constructed linear system that will estimate the heat kernel diffusion, which is formally the exponential of the random walk transition matrix. We began looking into this problem recently in a workshop paper [28], where we showed that this style of algorithm successfully estimates a related quantity. This paper tackles a fundamentally new direction and, although similar in techniques, required an entirely new analysis. In particular, we are able to estimate this diffusion in constant time in a degree-weighted norm that depends only on the parameters of the diffusion, and not the size of the graph. A Python implementation of our algorithm to accomplish this task is presented in Figure 2. In the remainder of the paper, we first review these topics formally (Sections 2 and 3); present our algorithm (Section 4) and discuss related work (Section 5). Then we show how our new approach differs from and improves upon the personalized PageRank diffusion in synthetic and real-world problems. Summary of contributions. ยท We propose the first local, deterministic method to accurately compute a heat kernel diffusion in a graph. The code is simple and scalable to any graph where out-link access is inexpensive. ยท Our method is always localized, even in massive graphs, because it has a provably constant runtime in a degreeweighted norm. ยท We compare the new heat kernel diffusion method to the venerable PageRank diffusion in synthetic, small, and large networks (up to 2 billion edges) to demonstrate the differences. On large networks such as Twitter, our method tends to produce smaller and tighter communities. It is also more accurate at detecting ground-truth communities. We make our experimental codes available in the spirit of reproducible research: https://www.cs.purdue.edu/homes/dgleich/codes/hkgrow 2. PRELIMINARIES We begin by fixing our notation. Let G = (V, E) be a simple, undirected graph with n = |V | vertices. Fix an ordering of the vertices from 1 to n such that we can refer to a vertex by itโ€™s numeric ID. For a vertex v โˆˆ V , we denote by dv the degree of node v. Let A be the associated adjacency matrix. Because G is undirected, A is symmetric. Furthermore, let D be the diagonal matrix of degrees (Dii = di ) and P = (Dโˆ’1 A)T = ADโˆ’1 be the random walk transition matrix. Finally, we denote by ei the vector (of an appropriate length) of zeros having a single 1 in entry i, and by e the vector of all 1s. Conductance. Given a subset S โІ V , we denote by vol(S) the sum of the degrees of all vertices in S, and by โˆ‚(S), the boundary of S, the number of edges with one endpoint inside of S and one endpoint outside of S. With this notation, the conductance of a set S is given by ฯ†(S) := โˆ‚(S) min{vol(S), vol(V โˆ’ S)} Conceptually, ฯ†(S) is the probability that a random walk of length one will land outside of S, given that we start from a node chosen uniformly at random inside S. Matrix exponential. The heat kernel of a graph involves the matrix exponential, and we wish to briefly mention some facts about this operation. See Higham [22] for a more in-depth treatment. Consider a general matrix G. The exponential function of a matrix is not just the exponential applied element-wise, but rather is given by substituting the matrix into the Taylor series expansion of the exponential function: โˆž X 1 k exp {G} = G . k! k=0 That said, the exponential of a diagonal matrix is the exponential function applied to the diagonal entries. This phenomenon occurs because powers of a diagonal matrix are simply the diagonal elements raised to the given power. For any matrix G, if GT G = GGT (which is a generalization of the notion of a symmetric matrix, called a normal matrix), then G has an eigenvalue decomposition G = Xฮ›Xโˆ’1 and there is a simple, albeit inefficient, means of computing the exponential: exp {G} = X exp {ฮ›} Xโˆ’1 . Computing the matrix exponential, or even the product of the exponential with a vector, exp {G} z, is still an active area of research [2]. 3. FINDING SMALL CONDUCTANCE COMMUNITIES WITH DIFFUSIONS A graph diffusion is any sum of the following form: f= โˆž X ฮฑk Pk s k=0 P where k ฮฑk = 1 and s is a stochastic vector (that is, it is non-negative and sums to one.) Intuitively, a diffusion captures how a quantity of si material on node i flows through the graph. The terms ฮฑk provide a decaying weight that ensures that the diffusion eventually dissipates. In the context of this paper, we are interested in the diffusions of single nodes or neighborhood P sets of a single vertex; and so in these cases s = ei or s = iโˆˆS ei /|S| for a small set S. We call the origins of the diffusion the seeds. Given an estimate of a diffusion f from a seed, we can produce a small conductance community from it using a sweep procedure. This involves computing Dโˆ’1 f, sorting the nodes in descending order by their magnitude in this vector, and computing the conductance of each prefix of the sorted list. Due to the properties of conductance, there is an efficient means of computing all of these conductances. We then return the set of smallest conductance as the community around the seeds. The personalized PageRank diffusion. One of the most well-known instances of this framework is the personalized PageRank diffusion. Fix ฮฑ โˆˆ (0, 1). Then p is defined: p = (1 โˆ’ ฮฑ) โˆž X ฮฑk Pk s. (1) k=0 The properties of this diffusion have been studied extensively. In particular, Andersen et al. [5] establish a local Cheeger inequality using a particular algorithm called โ€œpushโ€ that locally distributes mass. The local Cheeger inequality informally states that, if the seed is nearby a set with small conductance, then the result of the sweep procedure is a set with a related conductance. Moreover, they show that their โ€œpushโ€ algorithm estimates f with an error ฮต in a degree1 weighted norm by looking at (1โˆ’ฮฑ)ฮต edges. The heat kernel diffusion. Another instance of the same framework is the heat kernel diffusion [14, 15]. It sim- ply replaces the weights ฮฑk with tk /k!: ! โˆž X tk k โˆ’t (P) s = exp {โˆ’t(I โˆ’ P)} s. h=e k! k=0 satisfying the degree weighted bound: kDโˆ’1 exp {โˆ’t(I โˆ’ P)} s โˆ’ Dโˆ’1 xkโˆž < ฮต. (2) While it was known that estimating h gave rise to a similar type of local Cheeger inequality [15]; until Chung and Simpsonโ€™s Monte Carlo approach [16], no methods were known to estimate this quantity efficiently. Our new algorithm is a deterministic approach that is more suitable for comparing the properties of the diffusions. It terminates after exploring 2Net edges (Theorem 1), where N is a parameter that grows ฮต slowly1 with ฮต. Heat kernels compared to PageRank. These different sets of coefficients simply assign different levels of importance to walks of varying lengths: the heat kernel coefficients tk decay much more quickly than ฮฑk , and so the heat kerk! nel more heavily weights shorter walks in the overall sum (depicted in Figure 1). This property, in turn, will have important consequences when we study these methods in large graphs in Section 6. 0 10 Weight ฮฑ=0.99 By using standard properties of the matrix exponential, we can factor exp {โˆ’t(I โˆ’ P)} = eโˆ’t exp {tP)} and scale by et so that the above problem is equivalent to computing y satisfying kDโˆ’1 (exp {tP} s โˆ’ y)kโˆž < et ฮต. The element-wise characterization is that y must satisfy: |et hi โˆ’ yi | < et ฮตdi for all i. A similar weighted objective was used in the push algorithm for PageRank [5]. Outline of algorithm. To accomplish this, we first approximate exp {tP} with its degree N Taylor polynomial, TN (tP), and then we compute TN (tP)s. But we use a large, implicitly formed linear system to avoid explicitly evaluating the Taylor polynomial. Once we have the linear system, we state a relaxation method in the spirit of Gauss-Seidel and the PageRank push algorithm in order to compute an accurate approximation of h. 4.1 Taylor Polynomial for exp{X} Determining the exponential of a matrix is a sensitive computation with a rich history [41, 42]. For a general matrix G, an approximation via the Taylor polynomial, exp {G} = โˆž X 1 Gk k! k=0 โˆ’5 10 t=1 t=5 0 ฮฑ=0.85 t=15 20 40 60 80 100 Length Figure 1: Each curve represents the coefficients of (ADโˆ’1 )k in a sum of walks. The dotted blue lines give ฮฑk , and the red give tk /k!, for the indicated values of ฮฑ and t. (3) โ‰ˆ N X 1 Gk , k! k=0 can be inaccurate when kGk is large and G has mixed signs, as large powers Gk can contain large, oppositely signed numbers that cancel properly only in exact arithmetic. However, we intend to compute exp {tP} s, where P, t, and s are nonnegative, so the calculation does not rely on any delicate cancellations. Furthermore, our approximation need not be highly precise. We therefore use the polynomial P k tk exp {tP} s โ‰ˆ TN (tP) = N k=0 k! P for our approximation. For details on choosing N , see Section 4.5. For now, assume that we have chosen N such that kDโˆ’1 exp {tP} s โˆ’ Dโˆ’1 TN (tP)skโˆž < ฮต/2. 4. ALGORITHM The overall idea of the local clustering algorithm is to approximate a heat kernel vector of the form h = exp {โˆ’t(I โˆ’ P)} s so that we can perform a sweep over h. Here we describe a coordinate-relaxation method, which we call hk-relax, for approximating h. This algorithm is rooted in our recent work on computing an accurate column of exp {P} [28]; but is heavily tuned to the objective below. Thus, while the overall strategy is classical โ€“ just as the PageRank push method is a classic relaxation method โ€“ the simplifications and efficient implementation are entirely novel. In particular, the new objective in this paper enables us to get a constant runtime bound independent of any property of the graph, which differs markedly from both of our previous methods [28, 27]. Our objective. Recall that the final step of finding a small conductance community involves dividing by the degree of each node. Thus, our goal is to compute x โ‰ˆ h 1 Since the original publication of this work we have proven an upperbound on N in terms of ฮต and t [26]. (4) This way, if we compute y โ‰ˆ TN (tP)s satisfying kDโˆ’1 TN (tP)s โˆ’ Dโˆ’1 ykโˆž < ฮต/2, then by the triangle inequality we will have kDโˆ’1 exp {tP} s โˆ’ Dโˆ’1 ykโˆž < ฮต, (5) our objective. 4.2 Error weights Using a degree N Taylor polynomial, hk-relax ultimately approximates h by approximating each term in the sum of the polynomial times the vector s: s + 1t Ps + ยท ยท ยท + tN PN s. N! The total error of our computed solution is then a weighted k sum of the errors at each individual term, tk! Pk s. We show in Lemma 1 that these weights are given by the polynomials ฯˆk (t), which we define now. For a fixed degree N Taylor P tk polynomial of the exponential, TN = N k=0 k! , we define ฯˆk := Nโˆ’k X m=0 k! tm (m+k)! for k = 0, ยท ยท ยท , N . (6) These polynomials ฯˆk (t) are closely related to the ฯ† functions central to exponential integrators in ODEs [39]. Note that ฯˆ0 = TN . To guarantee the total error satisfies the criterion (3) then, it is enough to show that the error at each Taylor term satisfies an โˆž-norm inequality analogous to (3). This is discussed in more detail in Section A. 4.3 Deriving a linear system To define the basic step of the hk-relax algorithm and to show how the ฯˆk influence the total error, we rearrange the Taylor polynomial computation into a linear system. Denote by vk the kth term of the vector sum TN (tP)s: N TN (tP)s = s + 1t Ps + ยท ยท ยท + tN! PN s = v0 + v1 + ยท ยท ยท + vN . (7) (8) k+1 t t Note that vk+1 = (k+1)! Pk+1 = (k+1) Pvk . This identity implies that the terms vk exactly satisfy the linear system ๏ฃน ๏ฃน ๏ฃฎ ๏ฃน๏ฃฎ ๏ฃฎ I s v0 โˆ’t ๏ฃบ ๏ฃฏ v1 ๏ฃบ ๏ฃฏ 0 ๏ฃบ ๏ฃฏ 1 P I ๏ฃบ ๏ฃบ ๏ฃฏ ๏ฃบ๏ฃฏ ๏ฃฏ ๏ฃบ ๏ฃฏ .. ๏ฃบ ๏ฃฏ .. ๏ฃบ ๏ฃฏ .. โˆ’t ๏ฃบ ๏ฃฏ . ๏ฃบ = ๏ฃฏ . ๏ฃบ . (9) ๏ฃฏ . P 2 ๏ฃบ ๏ฃบ ๏ฃฏ ๏ฃบ๏ฃฏ ๏ฃฏ ๏ฃบ๏ฃฏ . ๏ฃบ ๏ฃฏ . ๏ฃบ ๏ฃฏ .. . . ๏ฃฐ ๏ฃป ๏ฃฐ ๏ฃป ๏ฃฐ . . ๏ฃป . I โˆ’t P N I vN 0 Let v = [v0 ; v1 ; ยท ยท ยท ; vN ]. An approximate solution vฬ‚ to P (9) would have block components vฬ‚k such that N k=0 vฬ‚k โ‰ˆ t TN (tP)s, our desired approximation to e h. In practice, we update only a single length n solution vector, adding all updates to that vector, instead of maintaining the N + 1 different block vectors vฬ‚k as part of vฬ‚; furthermore, the block matrix and right-hand side are never formed explicitly. With this block system in place, we can describe the algorithmโ€™s steps. # G is graph as dictionary - of - sets , # seed is an array of seeds , # t , eps , N , psis are precomputed x = {} # Store x , r as dictionaries r = {} # initialize residual Q = collections . deque () # initialize queue for s in seed : r [( s ,0)] = 1./ len ( seed ) Q . append (( s ,0)) while len ( Q ) > 0: (v , j ) = Q . popleft () # v has r [( v , j )] ... rvj = r [( v , j )] # perform the hk - relax step if v not in x : x [ v ] = 0. x [ v ] += rvj r [( v , j )] = 0. mass = ( t * rvj /( float ( j )+1.))/ len ( G [ v ]) # for neighbors of v for u in G [ v ]: next = (u , j +1) # in the next block if j +1 == N : # last step , add to soln x [ u ] += rvj / len ( G ( v )) continue if next not in r : r [ next ] = 0. thresh = math . exp ( t )* eps * len ( G [ u ]) thresh = thresh /( N * psis [ j +1])/2. if r [ next ] < thresh and \ r [ next ] + mass >= thresh : Q . append ( next ) # add u to queue r [ next ] = r [ next ] + mass Figure 2: Pseudo-code for our algorithm as working python code. The graph is stored as a dictionary of sets so that the G[v] statement returns the set of neighbors associated with vertex v. The solution is the vector x indexed by vertices and the residual vector is indexed by tuples (v, j) that are pairs of vertices and steps j. A fully working demo may be downloaded from github https://gist.github.com/dgleich/7d904a10dfd9ddfaf49a. 4.4 The hk-relax algorithm Given a random walk transition matrix P, scalar t > 0, and seed vector s as inputs, we solve the linear system from (9) as follows. Denote the initial solution vector by y and the initial nN ร— 1 residual by r(0) = e1 โŠ— s. Denote by r(i, j) the entry of r corresponding to node i in residual block j. The idea is to iteratively remove all entries from r that satisfy r(i, j) โ‰ฅ et ฮตdi . 2N ฯˆj (t) (10) To organize this process, we begin by placing the nonzero entries of r(0) in a queue, Q(r), and place updated entries of r into Q(r) only if they satisfy (10). Then hk-relax proceeds as follows. 1. At each step, pop the top entry of Q(r), call it r(i, j), and subtract that entry in r, making r(i, j) = 0. 2. Add r(i, j) to yi . t 3. Add r(i, j) j+1 Pei to residual block rj+1 . 4. For each entry of rj+1 that was updated, add that entry to the back of Q(r) if it satisfies (10). Once all entries of r that satisfy (10) have been removed, the resulting solution vector y will satisfy (3), which we prove in Section A, along with a bound on the work required to achieve this. We present working code for our method in Figure 2 that shows how to optimize this computation using sparse data structures. These make it highly efficient in practice. 4.5 Choosing N The last detail of the algorithm we need to discuss is how to pick N . In (4) we want to guarantee the accuracy of Dโˆ’1exp {tP} s โˆ’ Dโˆ’1 TN (tP)s. By using Dโˆ’1 exp {tP} = exp tPT Dโˆ’1 and Dโˆ’1 TN (tP) = TN (tPT )Dโˆ’1 , we can get a new upperbound on kDโˆ’1 exp {tP} sโˆ’Dโˆ’1 TN (tP)skโˆž by noting n o k exp tPT Dโˆ’1 s โˆ’ TN (tPT )Dโˆ’1 skโˆž n o โ‰ค k exp tPT โˆ’ TN (tPT )kโˆž kDโˆ’1 skโˆž . Since s is stochastic, we have kDโˆ’1 skโˆž โ‰ค kDโˆ’1 sk1 โ‰ค 1. From [36] we know that the norm k exp tPT โˆ’TN (tPT )kโˆž is bounded by ktPT kN+1 (N + 2) (N + 2) tN+1 โˆž โ‰ค . (N + 1)! (N + 2 โˆ’ t) (N + 1)! (N + 2 โˆ’ t) (11) So to guarantee (4), it is enough to choose N that implies (N+2) tN +1 < ฮต/2. Such an N can be determined effi(N+1)! (N+2โˆ’t) ciently simply by iteratively computing terms of the Taylor polynomial for et until the error is less than the desired error for hk-relax. In practice, this required a choice of N no greater than 2t log( 1ฮต ), which we think can be made rigorous. 4.6 Outline of convergence result The proof proceeds as follows. First, we relate the error vector of the Taylor approximation E1 = TN (tP)s โˆ’ x, to the error vector from solving the linear system described in Section 4.4, E2 = TN (tP)s โˆ’ y. Second, we express the error vector E2 in terms of the residual blocks of the linear system (9); this will involve writing E2 as a sum of residual blocks rk with weights ฯˆk (tP). Third, we use the previous results to upperbound kDโˆ’1 TN (tP)s โˆ’ P โˆ’1 Dโˆ’1 xkโˆž with N rk kโˆž , and use this to show k=0 ฯˆk (t)kD that kDโˆ’1 TN (tP)s โˆ’ Dโˆ’1 xkโˆž < ฮต/2 is guaranteed by the stopping criterion of hk-relax, (3). Finally, we prove that performing steps of hk-relax until the stopping criterion is attained requires work bounded by 2Nฯˆฮต1 (t) โ‰ค 2N et /ฮต. 5. RELATED WORK We wish to highlight a few ideas that have recently emerged in the literature to clarify how our method differs. We discuss these in terms of community detection, the matrix exponential, fast diffusion methods, and relaxation methods. Community detection and conductance. Conductance often appears in community detection and is known to be one of the most important measures of a community [49]. The personalized PageRank method is one of the most scalable methods to find sets of small conductance, although recent work opened up a new possibility with localized maxflow algorithms [48]. For the PageRank algorithm we use as a point of comparison, Zhu et al. [56] recently provided an improved bound on the performance of this algorithm when finding sets with high internal conductance. The internal conductance of a set is the minimum conductance of the subgraph induced by the set and we would expect that realworld communities have large internal conductance. Due to the similarity between our algorithm and the personalized PageRank diffusion, we believe that a similar result likely holds here as well. The matrix exponential in network analysis. Recently, the matrix exponential has frequently appeared as a tool in the network analysis literature. It has been used to estimate node centrality [18, 20, 19], for link-prediction [31], in graph kernels [30], and โ€“ as already mentioned โ€“ clustering and community detection [14]. Many of these studies involve fast ways to approximate the entire matrix exponential, instead of a single column as we study here. For instance, Sui et al. [51] describe a low-parameter decomposition of a network that is useful both for estimating Katz scores [25] and the matrix exponential. Orecchia and Mahoney [46] show that the heat kernel diffusion implicitly approximates a diffusion operator using a particular type of generalized entropy, which provides a principled rationale for its use. Fast methods for diffusions. Perhaps the most related work is a recent Monte Carlo algorithm by Chung and Simpson [16] to estimate the heat kernel diffusion via a random walk sampling scheme. This approach involves directly simulating a random walk with transition probabilities that mirror the Taylor series expansion of the exponential. In comparison, our approach is entirely deterministic and thus more useful to compare between diffusions, as it eliminates the algorithmic variance endemic to Monte Carlo simulations. A similar idea is used by Borgs et al. [13] to achieve a randomized sublinear time algorithm to estimate the largest PageRank entries, and in fact, Monto Carlo methods frequently feature in PageRank computations due to the relationship between the diffusion and a random walk [7, 13, 8, 9]. Most other deterministic approaches for the matrix exponential involve at least one matrix-vector product [47, 2]. Relaxation methods. The algorithm we use is a coordinate relaxation method similar to Gauss-Seidel and GaussSouthwell. If we applied it to a symmetric positive definite matrix, then it would be a coordinate descent method [37]. It has been proposed for PageRank in a few difference cases [23, 38, 5]. The same type of relaxation method has also been used to estimate the Katz diffusion [12]. We recently used it to estimate a column of the matrix exponential exp {P} ei in a strict, 1-norm error and were able to prove a sublinear convergence bound by assuming a very slowly growing maximum degree [28] or a power-law degree distribution [27]. This paper, in comparision, treats the scaled exponential exp {โˆ’t(I โˆ’ P)} ei in a degree-weighted norm; it also shows a constant runtime independent of any network property. 6. EXPERIMENTAL RESULTS Here we compare hk-relax with a PageRank-based local clustering algorithm, pprpush [5]. Both algorithms accept as inputs a symmetric graph A and seed set s. The parameters required are t and ฮต, for hk-relax, and ฮฑ and ฮต for pprpush. Both algorithms compute their respective diffusion ranks starting from the seed set, then perform a sweepcut on the resulting ranks. The difference in the algorithms lies solely in the diffusion used and the particular parameters. We conducted the timing experiments on a Dual CPU system with the Intel Xeon E5-2670 processor (2.6 GHz, 8 cores) with 16 cores total and 256 GB of RAM. None of the experiments needed anywhere near all the memory, nor any of the parallelism. Our implementation uses Matlabโ€™s sparse matrix data structure through a C++ mex interface. It uses C++ unordered maps to store sparse vectors and is equivalent to the code in Figure 2. 6.1 Synthetic results In this section, we study the behavior of the PageRank and heat kernel diffusions on the symbolic image graph of a chaotic function f [50]. The graphs that result are loosely reminiscent of a social network because they have pockets of structure, like communities, and also chaotic behaviour that results in a small-world like property. The symbolic image of a function f is a graph where each node represents a region of space, and edges represent the action of the function in that region of space. We consider two-dimensional functions f (x, y) in the unit square [0, 1]2 so that we can associate each node with a pixel of an image and illustrate the vectors as images. In Figure 3 (left), we illustrate how the graph construction works. In the remaining examples, we let f be a map that results from a chaotic, nonlinear dynamical system [50] (we use the T10 construction with k = 0.22, ฮท = 0.99 and sample 1000 points from each region of space, then symmetrize the result and discard weights). We discretize space in a 512 ร— 512 grid, which results in a 262, 144 node graph with 2M edges. In Figure 3 (right), we also show the PageRank vector with uniform teleportation as an image to โ€œillustrate the structureโ€ in the function f . Next, in Figure 4, we compare the vectors and sets identified by both diffusions starting from a single seed node. We chose the parameters ฮฑ = 0.85 and t = 3 so the two methods perform the same amount of work. These results are what would be expected from Figure 1, and what many of the remaining experiments show: PageRank diffuses to a larger region of the graph whereas the heat-kernel remains more focused in a sub-region. PageRank, then, finds a large community with about 5,000 nodes whereas the heat kernel finds a small community with around 452 nodes with slightly worse conductance. This experiment suggests that, if these results also hold in real-world networks, then because real-world communities are often small [35], the heat kernel diffusion should produce more accurate communities in real-world networks. (a) ppr vector ฮฑ = 0.85, ฮต = 10โˆ’5 (b) ppr set, ฯ† = 0.31, size = 5510 1 y 0 f(x,y) 0 x 1 Figure 3: (Left) An illustration of the symbolic image of a function f as a graph. Each large, blue node represents a region of space. Thick, blue edges represent how the thin, red values of the function behave in that region. (Right) The global PageRank vector is then an image that illustrates features of the chaotic map f and shows that it has pockets of structure. (c) hk vector t = 3, ฮต = 10โˆ’5 (d) hk set, ฯ† = 0.34, size = 455 Figure 4: When we compare the heat-kernel and PageRank diffusions on the symbolic image of the Chirikov map (see Figure 3), pprgrow finds a larger set with slightly better conductance, whereas hkgrow finds a tighter set with about the same conductance. In real-world networks, these smaller sets are more like real-world communities. 6.2 Runtime and conductance We next compare the runtime and conductance of the algorithms on a suite of social networks. For pprpush, we fix ฮฑ = 0.99, then compute PageRank for multiple values of ฮต = 10โˆ’2 , 10โˆ’3 , 10โˆ’4 , 10โˆ’5 , and output the set of best conductance obtained. (This matches the way this method is commonly used in past work.) For hk-relax, we compute the heat kernel rank for four different parameter sets, and output the set of best conductance among them: (t, ฮต) = (10, 10โˆ’4 ); (20, 10โˆ’3 ); (40, 5 ยท 10โˆ’3 ); (80, 10โˆ’2 ). We also include in hk-relax an early termination criterion, in the case that the degrees of the nodes which are relaxed, P the sum of 1.5 dil , exceeds n . However, even the smaller input graphs (on which the condition is more likely to be met because of the smaller value of n1.5 ) do not appear to have reached this threshold. Furthermore, the main theorem of this paper imP plies that the quantity dil cannot exceed 2Nฯˆฮต1 (t) . The datasets we use are summarized in Table 1; all datasets are modified to be undirected and a single connected component. These datasets were originally presented in the following papers [3, 10, 11, 32, 33, 34, 35, 40, 43, 44, 52, 55]. To compare the runtimes of the two algorithms, we display in Figure 5 for each graph the 25%, 50%, and 75% percentiles of the runtimes from 200 trials performed. For a given graph, each trial consisted of choosing a node of that graph uniformly at random to be a seed, then calling both the PageRank and the heat kernel algorithms. On the larger datasets, which have a much broader spectrum of node degrees and therefore greater variance, we instead performed 1,000 trials. Additionally, we display the 25%, 50%, and 75% percentiles of the conductances achieved during the exact same set of trials. The trendlines of these figures omit some of the trials in order to better show the trends, but all of the median results are plotted (as open circles). The figures show that in small graphs, hk-relax is faster than pprpush, but gets larger (worse) conductance. The picture reverses for large graphs where hk-relax is slower but finds smaller (better) conductance sets. Cluster size and conductance. We highlight the individual results of the previous experiment on the symmetrized twitter network. Here, we find that hk-relax finds sets of better conductance than pprpush at all sizes of communities in the network. See Figure 6. 6.3 Clusters produced vs. ground-truth We conclude with an evaluation of identifying groundtruth communities in the com-dblp, com-lj, com-amazon, com-orkut, com-youtube, and com-friendster datasets [40, 55]. In this experiment, for each dataset we first located 100 known communities in the dataset of size greater than 102 2 We thank AmirMahdi Ahmadinejad for pointing out a small mistake in our original implementation of this experiment โ€“ though we reported in Table 2 in our original publication [29] that we carried out this experiment on 100 commmunities of size greater than 10, Ahmadinejad noted that in practice we had used some communities of size less than 10. The results shown here in Table 2 are from the corrected experiment, and in fact are even more favorable for our hk-relax algorithm than our original reported results. 10,680 17,903 19,365 22,963 25,000 27,519 33,696 36,458 119,130 190,914 226,413 513,969 5,363,260 41,652,230 65,608,366 334,863 317,080 1,134,890 3,997,962 3,072,441 hkgrow 50% 25% 75% pprgrow 50% 25% 75% |E| 24,316 196,972 96,616 48,436 56,071 116,181 180,811 171,735 704,267 607,610 716,460 3,190,452 50,030,085 1,202,513,046 1,806,067,135 925,872 1,049,866 2,987,624 34,681,189 117,185,083 1.5 Runtime (s) pgp-cc ca-AstroPh-cc marvel-comics-cc as-22july06 rand-ff-25000-0.4 cond-mat-2003-cc email-Enron-cc cond-mat-2005-fix-cc soc-sign-epinions-cc itdk0304-cc dblp-cc flickr-bidir-cc ljournal-2008 twitter-2010 friendster com-amazon com-dblp com-youtube com-lj com-orkut 2 1 0.5 0 5 6 7 log10(|V|+|E|) 8 Conductances: hk vs. ppr 0 โˆ’1 10 hkgrow 50% 25% 75% pprgrow 50% 25% 75% โˆ’2 10 Table 2: The result of evaluating the heat kernel (hk) vs. PageRank (pr) on finding real-world communities. The heat kernel finds smaller, more accurate, sets with slightly worse conductance. data F1 -measure conductance set size hk pr hk pr hk pr amazon dblp youtube lj orkut friendster 0.608 0.364 0.128 0.138 0.183 0.125 0.415 0.273 0.078 0.104 0.116 0.112 0.124 0.238 0.477 0.564 0.824 0.866 0.050 0.144 0.361 0.524 0.736 0.860 145 156 137 156 95 96 5,073 4,529 5,833 299 476 218 . Given one such community, using every single node as an individual seed, we looked at the sets returned by hk-relax with t = 5, ฮต = 10โˆ’4 and pprpush using the standard procedure. We picked the set from the seed that had the highest F1 measure. (Recall that the F1 measure is a harmonic mean of precision and recall.) We report the mean of the F1 measure, conductance, and set size, where the average is taken over all 100 trials in Table 2. These results show that hk-relax produces only slightly inferior conductance scores, but using much smaller sets with substantially better F1 measures. This suggests that hk-relax better captures the properties of real-world communities than the PageRank diffusion in the sense that the tighter sets produced by the heat kernel are better focused around real-world communities than are the larger sets produced by the PageRank diffusion. 7. CONCLUSIONS These results suggest that the hk-relax algorithm is a viable companion to the celebrated PageRank push algorithm and may even be a worthy competitor for tasks that require accurate communities of large graphs. Furthermore, 9 10 log10(Conductances) Graph Runtime: hk vs. ppr Table 1: Datasets |V | 5 6 7 log10(|V|+|E|) 8 9 Figure 5: (Top figure) Runtimes of the hk-relax vs. ppr-push, shown with percentile trendlines from a select set of experiments. (Bottom) Conductances of hk-relax vs. ppr-push, shown in the same way. we suspect that the hk-relax method will be useful for the myriad other uses of PageRank-style diffusions such as linkprediction [31] or even logic programming [53]. In the future, we plan to explore this method on directed networks as well as better methods for selecting the parameters of the diffusion. It is also possible that our new ideas may translate to faster methods for non-conservative diffusions such as the Katz [25] and modularity methods [45], and we plan to explore these diffusions as well. Acknowledgements This work was supported by NSF CAREER Award CCF1149756. 8. REFERENCES [1] B. Abrahao, S. Soundarajan, J. Hopcroft, and R. Kleinberg. On the separability of structural classes of communities. In KDD, pages 624โ€“632, 2012. [2] A. H. Al-Mohy and N. J. Higham. Computing the action of the matrix exponential, with an application to exponential integrators. SIAM J. Sci. Comput., 33(2):488โ€“511, March 2011. [3] R. Alberich, J. Miro-Julia, and F. Rosselloฬ. Marvel universe looks almost like a real social network. arXiv preprint cond-mat/0202174, 2002. [4] N. Alon and V. D. Milman. ฮป1 , isoperimetric inequalities for graphs, and superconcentrators. J. of Comb. Theory, Series B, 38(1):73โ€“88, 1985. 0.9 conductance 0.8 0.7 0.6 0.5 0.4 0.3 hk ppr 0.2 0 1 density 0.1 2 3 4 log10(clustersize) 5 hk ppr 0 0.2 0.4 0.6 conductance 0.8 1 Figure 6: The top figure shows a scatter plot of conductance vs. community size in the twitter graph for the two community detection methods; the bottom figure shows a kernel density estimate of the conductances achieved by each method, which shows that hk-relax is more likely to return a set of lower conductance. [5] R. Andersen, F. Chung, and K. Lang. Local graph partitioning using PageRank vectors. In FOCS, 2006. [6] R. Andersen and K. Lang. An algorithm for improving graph partitions. In SODA, pages 651โ€“660, January 2008. [7] K. Avrachenkov, N. Litvak, D. Nemirovsky, and N. Osipova. Monte carlo methods in pagerank computation: When one iteration is sufficient. SIAM J. Numer. Anal., 45(2):890โ€“904, February 2007. [8] B. Bahmani, K. Chakrabarti, and D. Xin. Fast personalized pagerank on MapReduce. In SIGMOD, pages 973โ€“984, New York, NY, USA, 2011. ACM. [9] B. Bahmani, A. Chowdhury, and A. Goel. Fast incremental and personalized pagerank. Proc. VLDB Endow., 4(3):173โ€“184, Dec. 2010. [10] M. Bogunฬƒaฬ, R. Pastor-Satorras, A. Dฤฑฬaz-Guilera, and A. Arenas. Models of social networks based on social distance attachment. Phys. Rev. E, 70(5):056122, Nov 2004. [11] P. Boldi, M. Rosa, M. Santini, and S. Vigna. Layered label propagation: A multiresolution coordinate-free ordering for compressing social networks. In WWW, pages 587โ€“596, March 2011. [12] F. Bonchi, P. Esfandiar, D. F. Gleich, C. Greif, and L. V. Lakshmanan. Fast matrix computations for pairwise and columnwise commute times and Katz scores. Internet Mathematics, 8(1-2):73โ€“112, 2012. [13] C. Borgs, M. Brautbar, J. Chayes, and S.-H. Teng. Multi-scale matrix sampling and sublinear-time pagerank computation. Internet Mathematics, Online, 2013. [14] F. Chung. The heat kernel as the PageRank of a graph. PNAS, 104(50):19735โ€“19740, 2007. [15] F. Chung. A local graph partitioning algorithm using heat kernel pagerank. Internet Mathematics, 6(3):315โ€“330, 2009. [16] F. Chung and O. Simpson. Solving linear systems with boundary conditions using heat kernel pagerank. In Algorithms and Models for the Web Graph, pages 203โ€“219. Springer, 2013. [17] I. S. Dhillon, Y. Guan, and B. Kulis. Weighted graph cuts without eigenvectors a multilevel approach. IEEE Trans. Pattern Anal. Mach. Intell., 29(11):1944โ€“1957, November 2007. [18] E. Estrada. Characterization of 3d molecular structure. Chemical Physics Letters, 319(5-6):713โ€“718, 2000. [19] E. Estrada and D. J. Higham. Network properties revealed through matrix functions. SIAM Review, 52(4):696โ€“714, 2010. [20] A. Farahat, T. LoFaro, J. C. Miller, G. Rae, and L. A. Ward. Authority rankings from HITS, PageRank, and SALSA: Existence, uniqueness, and effect of initialization. SIAM Journal on Scientific Computing, 27(4):1181โ€“1201, 2006. [21] M. Fiedler. Algebraic connectivity of graphs. Czechoslovak Mathematical Journal, 23(98):298โ€“305, 1973. [22] N. J. Higham. Functions of Matrices: Theory and Computation. SIAM, 2008. [23] G. Jeh and J. Widom. Scaling personalized web search. In WWW, pages 271โ€“279. ACM, 2003. [24] U. Kang and C. Faloutsos. Beyond โ€˜caveman communitiesโ€™: Hubs and spokes for graph compression and mining. In ICDM, pages 300โ€“309, Washington, DC, USA, 2011. IEEE Computer Society. [25] L. Katz. A new status index derived from sociometric analysis. Psychometrika, 18(1):39โ€“43, March 1953. [26] K. Kloster. Graph diffusions and matrix functions: Fast algorithms and localization results. PhD thesis, Purdue University, 2016. [27] K. Kloster and D. F. Gleich. A fast relaxation method for computing a column of the matrix exponential of stochastic matrices from large, sparse networks. arXiv, cs.SI:1310.3423, 2013. [28] K. Kloster and D. F. Gleich. A nearly-sublinear method for approximating a column of the matrix exponential for matrices from large, sparse networks. In Algorithms and Models for the Web Graph, page in press, 2013. [29] K. Kloster and D. F. Gleich. Heat kernel based community detection. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1386โ€“1395. ACM, 2014. [30] R. I. Kondor and J. D. Lafferty. Diffusion kernels on graphs and other discrete input spaces. In ICML, pages 315โ€“322, San Francisco, CA, USA, 2002. Morgan Kaufmann Publishers Inc. [31] J. Kunegis and A. Lommatzsch. Learning spectral graph transformations for link prediction. In ICML, pages 561โ€“568, 2009. [32] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In WWW, pages 591โ€“600, 2010. [33] J. Leskovec, D. Huttenlocher, and J. Kleinberg. Signed networks in social media. In CHI, pages 1361โ€“1370, 2010. [34] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data, 1:1โ€“41, March 2007. [35] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics, 6(1):29โ€“123, September 2009. [36] M. Liou. A novel method of evaluating transient response. APPENDIX Proceedings of the IEEE, 54(1):20โ€“23, 1966. A. CONVERGENCE THEORY [37] Z. Q. Luo and P. Tseng. On the convergence of the coordinate descent method for convex differentiable Here we state our main result bounding the work required by minimization. J. Optim. Theory App., 72(1):7โ€“35, 1992. hk-relax to approximate the heat kernel with accuracy as de10.1007/BF00939948. scribed in (3). [38] F. McSherry. A uniform approach to accelerated PageRank Theorem 1. Let P, t, ฯˆk (t), and r be as in Section 4. If steps computation. In WWW, pages 575โ€“582, 2005. of hk-relax are performed until all entries of the residual satisfy [39] B. V. Minchev and W. M. Wright. Norges et ฮตdi , then hk-relax produces an approximation x of r(i, j) < 2Nฯˆ teknisk-naturvitenskapelige universitet. 2005. j (t) [40] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and h = exp {โˆ’t(I โˆ’ P)} s satisfying B. Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM kDโˆ’1 exp {โˆ’t(I โˆ’ P)} s โˆ’ Dโˆ’1 xkโˆž < ฮต, conference on Internet measurement, pages 29โ€“42. ACM, and the amount of work required is bounded by 2007. [41] C. Moler and C. Van Loan. Nineteen dubious ways to 2N (et โˆ’ 1) 2N ฯˆ1 (t) โ‰ค . work(ฮต) โ‰ค compute the exponential of a matrix. SIAM Review, ฮต ฮตt 20(4):801โ€“836, 1978. [42] C. Moler and C. Van Loan. Nineteen dubious ways to Producing x satisfying compute the exponential of a matrix, twenty-five years kDโˆ’1 exp {โˆ’t(I โˆ’ P)} s โˆ’ Dโˆ’1 xkโˆž < ฮต later. SIAM Review, 45(1):3โ€“49, 2003. [43] M. Newman. Network datasets. is equivalent to producing y satisfying http://www-personal.umich.edu/~mejn/netdata/, 2006. kDโˆ’1 exp {tP)} s โˆ’ Dโˆ’1 ykโˆž < et ฮต. [44] M. E. J. Newman. The structure of scientific collaboration networks. PNAS, 98(2):404โ€“409, 2001. We will show that the error vector in the hk-relax steps, TN (tP)sโˆ’ [45] M. E. J. Newman. Modularity and community structure in y, satisfies kDโˆ’1 TN (tP)s โˆ’ Dโˆ’1 ykโˆž < et ฮต/2. networks. PNAS, 103(23):8577โ€“8582, 2006. The following lemma expresses the error vector, TN (tP)s โˆ’ y, [46] L. Orecchia and M. W. Mahoney. Implementing as a weighted sum of the residual blocks rk in the linear system regularization implicitly via approximate eigenvector (9), and shows that the polynomials ฯˆk (t) are the weights. computation. In ICML, pages 121โ€“128, 2011. [47] L. Orecchia, S. Sachdeva, and N. K. Vishnoi. Lemma 1. Let ฯˆk (t) be defined as in Section 4. Then in the Approximating the exponential, the Lanczos method and notation of Section 4.3, we can express the error vector of hkan Otilde(m)-time spectral algorithm for balanced relax in terms of the residual blocks rk as follows separator. In STOC, pages 1141โ€“1160, 2012. N [48] L. Orecchia and Z. A. Zhu. Flow-based algorithms for local X TN (tP)s โˆ’ y = ฯˆk (tP)rk (12) graph clustering. In SODA, pages 1267โ€“1286, 2014. k=0 [49] S. E. Schaeffer. Graph clustering. Computer Science Review, 1(1):27โ€“64, 2007. Proof. Consider (9). Recall that v = [v0 ; v1 ; ยท ยท ยท ; vN ] and [50] D. L. Shepelyansky and O. V. Zhirov. Google matrix, let S be the (N + 1) ร— (N + 1) matrix of 0s with first subdiagonal dynamical attractors, and ulam networks. Phys. Rev. E, 1 equal to [ 11 , 12 , ยท ยท ยท , N ]. Then we can rewrite this linear system 81(3):036213, March 2010. more conveniently as [51] X. Sui, T.-H. Lee, J. Whang, B. Savas, S. Jain, K. Pingali, (I โˆ’ S โŠ— (tP))v = e1 โŠ— s. (13) and I. Dhillon. Parallel clustered low-rank approximation of graphs and its application to link prediction. In Let vk be the true solution vectors that the vฬ‚k are approximating H. Kasahara and K. Kimura, editors, Languages and in (13). We showed in Section 4.3 that the error TN (tP)s โˆ’ y Compilers for Parallel Computing, volume 7760 of Lecture is in fact the sum of the errors vk โˆ’ vฬ‚k . Now we will express Notes in Computer Science, pages 76โ€“95. Springer Berlin TN (tP)s โˆ’ y in terms of the residual partitions, i.e. rk . Heidelberg, 2013. At any given step we have r = e1 โŠ— s โˆ’ (I โˆ’ S โŠ— (tP))vฬ‚, so pre[52] C. (The Cooperative Association for Internet Data multiplying by (I โˆ’ S โŠ— (tP))โˆ’1 yields (I โˆ’ S โŠ— (tP))โˆ’1 r = v โˆ’ vฬ‚, Analyais). Network datasets. because (I โˆ’ S โŠ— (tP))v = e1 โŠ— s exactly, by definition of v. Note http://www.caida.org/tools/measurement/skitter/router_topology/, that (I โˆ’ S โŠ— (tP))โˆ’1 r = v โˆ’ vฬ‚ is the error vector for the linear 2005. Accessed in 2005. system (13). From this, an explicit computation of the inverse [53] W. Y. Wang, K. Mazaitis, and W. W. Cohen. (see [28] for details) yields Programming with personalized pagerank: A locally ๏ฃฎ ๏ฃฎ ๏ฃน ๏ฃน groundable first-order probabilistic logic. In Proceedings of ! v0 โˆ’ vฬ‚0 r0 N X the 22Nd ACM International Conference on Conference on ๏ฃฏ ๏ฃฏ ๏ฃบ ๏ฃบ .. Sk โŠ— (tP)k ๏ฃฐ .. ๏ฃป . (14) ๏ฃฐ ๏ฃป= Information &#38; Knowledge Management, CIKM โ€™13, . . k=0 pages 2129โ€“2138, New York, NY, USA, 2013. ACM. vN โˆ’ vฬ‚N rN [54] J. J. Whang, D. F. Gleich, and I. S. Dhillon. Overlapping For our purposes, the full block vectors v, vฬ‚, r and their individual community detection using seed set expansion. In CIKM, partitions are unimportant: we want only their sum, because pages 2099โ€“2108, New York, NY, USA, 2013. ACM. P TN (tP)s โˆ’ y = N ), as previously discussed. [55] J. Yang and J. Leskovec. Defining and evaluating network k=0 (vk โˆ’ vฬ‚k P communities based on ground-truth. In Proceedings of the Next we use (14) to express N k=0 (vk โˆ’ vฬ‚k ), and hence ACM SIGKDD Workshop on Mining Data Semantics, TN (tP)s โˆ’ y, MDS โ€™12, pages 3:1โ€“3:8, New York, NY, USA, 2012. ACM. [56] Z. A. Zhu, S. Lattanzi, and V. Mirrokni. A local algorithm in terms of the residual blocks rk . We accomplish this by examfor finding well-connected clusters. In ICML, pages ining the coefficients of an arbitrary block rk in (14), which in 396โ€“404, 2013. turn requires analyzing the powers of (S โŠ— tP). Fix a residual block rjโˆ’1 and consider the product with a single term (Sk โŠ— (tP)k ). Since rjโˆ’1 is in block-row j of r, it multiplies with only the block-column j of each term (Sk โŠ— (tP)k ), so we want to know what the blocks in block-column j of (Sk โŠ— (tP)k ) look like. From [28] we know that ( (jโˆ’1)! ej+m if 0 โ‰ค m โ‰ค N + 1 โˆ’ j m S ej = (jโˆ’1+m)! 0 otherwise. This means that block-column j of (Sm โŠ— (tP)m ) contains only a (jโˆ’1)! single nonzero block, (jโˆ’1+m)! tm Pm , for all 0 โ‰ค m โ‰ค N + 1 โˆ’ j. Hence, summing the n ร— n blocks in block-column j of each power (Sm โŠ— (tP)m ) yields N+1โˆ’j X m=0 (j โˆ’ 1)!tm Pm (j โˆ’ 1 + m)! (15) kDโˆ’1 rk kโˆž < = m=0 k=0 = N X k!tm Pm (k + m)! ! โ‰ค which is bounded above by โˆ’1 kD ฯˆk (tP)rk , as desired. P Now that weโ€™ve shown TN (tP)s โˆ’ y = N k=0 ฯˆk (tP)rk we can upperbound kDโˆ’1 TN (tP)s โˆ’ Dโˆ’1 ykโˆž . To do this, we first show that (16) To prove this claim, recall that P = AD . Since ฯˆk (t) is a polynomial, we have Dโˆ’1 ฯˆk (tP) = Dโˆ’1 ฯˆk (tADโˆ’1 ) = ฯˆk (tDโˆ’1 A)Dโˆ’1 , which equals ฯˆk (tPT )Dโˆ’1 . Taking the infinity norm and applying the triangle inequality to the definition of ฯˆk (t) gives us kDโˆ’1 ฯˆk (tP)rk kโˆž โ‰ค Nโˆ’k X m=0 tm k! k(PT )m (Dโˆ’1 rk )kโˆž . (m + k)! we have k(PT )m (Dโˆ’1 rk )kโˆž โ‰ค equals k(Dโˆ’1 rk )kโˆž because PT Then k(PT )m kโˆž k(Dโˆ’1 rk )kโˆž which is row-stochastic. Returning to our original objective, we then have kDโˆ’1 ฯˆk (tP)rk kโˆž โ‰ค Nโˆ’k X m=0 tm k! k(Dโˆ’1 rk )kโˆž (m + k)! = ฯˆk (t)kDโˆ’1 rk kโˆž , proving the claim in (16). This allows us to continue: TN (tP)s โˆ’ y = N X ฯˆk (tP)rk so k=0 kDโˆ’1 TN (tP)s โˆ’ Dโˆ’1 ykโˆž โ‰ค N X kDโˆ’1 ฯˆk (tP)rk kโˆž k=0 โ‰ค N X ฯˆk (t)kDโˆ’1 rk kโˆž . k=0 The stopping criterion for hk-relax requires that every entry of the residual satisfies r(i, j) < to satisfying r(i,j) di < et ฮต . 2Nฯˆj (t) et ฮตdi , 2Nฯˆj (t) which is equivalent This condition guarantees that et ฮต/2. ฯˆk (t) et ฮต 2N ฯˆk (t)  Finally, we have that โˆ’1 TN (tP)s โˆ’ D ykโˆž < et ฮต/2 implies kDโˆ’1 (exp {โˆ’t(I โˆ’ P)} s โˆ’ x)kโˆž < ฮต/2, completing our proof of the first part of Theorem 1. k=0 โˆ’1 ฯˆk (t)kDโˆ’1 rk kโˆž N  X k=0 rk kDโˆ’1 ฯˆk (tP)rk kโˆž โ‰ค ฯˆk (t)kDโˆ’1 rk kโˆž . N X k=0 m=0 Nโˆ’k X N X Thus we have kDโˆ’1 TN (tP)s โˆ’ Dโˆ’1 ykโˆž โ‰ค as the matrix coefficient of rjโˆ’1 in the right-hand side expression P PN m T of N โŠ— (tP)m )r. k=0 (vk โˆ’ vฬ‚k ) = (e โŠ— I)( m=0 S Substituting k = j โˆ’ 1 on the right-hand side of (15) yields ! N N X X T m m (vk โˆ’ vฬ‚k ) = (e โŠ— I) S โŠ— (tP) r k=0 et ฮต . 2Nฯˆk (t) Bounding work. It remains to bound the work required to perform steps of hkrelax until the stopping criterion is achieved. Because the stopping criterion requires each residual entry to satisfy r(i, j) et ฮต < di 2N ฯˆj (t) we know that each step of hk-relax must operate on an entry r(i, j) larger than this threshold. That is, each step we relax an r(i,j) et ฮต โ‰ฅ 2Nฯˆ . entry of r satisfying d (t) i j Consider the solution vector y โ‰ˆ TN (tP)s and note that each entry of y is really a sum of values that we have deleted from r. But r always contains only nonnegative values: the seed vector s is nonnegative, and each step involves setting entry r(i, j) = 0 and adding a scaled column of P, which is nonnegative, to r. Hence, PT kyk1 equals the sum of the r(i, j) added to y, l=1 r(il , jl ) = kyk1 . Finally, since the entries of y are nondecreasing (because they only change if we add positive values r(i, j) to them), we know that kyk1 โ‰ค kTN (tP)sk1 = ฯˆ0 (t) โ‰ค et . This implies, then, that T X r(il , jl ) โ‰ค et . l=1 Using the fact that the values of r(i, j) that we relax must satisfy r(i,j) et ฮต โ‰ฅ 2Nฯˆ we have that d (t) i j T X dil et ฮต โ‰ค et . 2N ฯˆjl (t) l=1 Simplifying yields T X l=1 dil 2N โ‰ค . ฯˆjl (t) ฮต By Lemma 1 we know ฯˆk (t) โ‰ค ฯˆ1 (t) for each k โ‰ฅ 1, so we can PT PT di di 2N l l l=1 ฯˆ (t) โ‰ค l=1 ฯˆ (t) โ‰ค ฮต , giving us lowerbound jl 1 T X l=1 dil โ‰ค 2N ฯˆ1 (t) . ฮต Finally, note that the dominating suboperation in each step of hk-relax consists of relaxing r(i, j) and spreading this โ€œheat kernel rankโ€ to the neighbors of node i in block rj+1 . Since node i has di neighbors, this step consists of di adds, and so the work P performed by hk-relax is T l=1 dil , which is exactly the quantity we bounded above. This figure "chirikov-hk-set.png" is available in "png" format from: http://arxiv.org/ps/1403.3148v4 This figure "chirikov-hk-vec.png" is available in "png" format from: http://arxiv.org/ps/1403.3148v4 This figure "chirikov-pr-set.png" is available in "png" format from: http://arxiv.org/ps/1403.3148v4 This figure "chirikov-pr-vec.png" is available in "png" format from: http://arxiv.org/ps/1403.3148v4 This figure "chirikov-pr.png" is available in "png" format from: http://arxiv.org/ps/1403.3148v4
8cs.DS
Modeling The Intensity Function Of Point Process Via Recurrent Neural Networks Shuai Xiao1 , Junchi Yan23 , Stephen M. Chu3 , Xiaokang Yang1 , Hongyuan Zha4 arXiv:1705.08982v1 [cs.LG] 24 May 2017 1 Shanghai Jiao Tong University 2 East China Normal University 3 IBM Research โ€“ China 4 Georgia Tech {benjaminforever,xkyang}@sjtu.edu.cn, [email protected], [email protected], [email protected] Abstract Event sequence, asynchronously generated with random timestamp, is ubiquitous among applications. The precise and arbitrary timestamp can carry important clues about the underlying dynamics, and has lent the event data fundamentally different from the time-series whereby series is indexed with fixed and equal time interval. One expressive mathematical tool for modeling event is point process. The intensity functions of many point processes involve two components: the background and the effect by the history. Due to its inherent spontaneousness, the background can be treated as a time series while the other need to handle the history events. In this paper, we model the background by a Recurrent Neural Network (RNN) with its units aligned with time series indexes while the history effect is modeled by another RNN whose units are aligned with asynchronous events to capture the long-range dynamics. The whole model with event type and timestamp prediction output layers can be trained end-to-end. Our approach takes an RNN perspective to point process, and models its background and history effect. For utility, our method allows a black-box treatment for modeling the intensity which is often a pre-defined parametric form in point processes. Meanwhile end-to-end training opens the venue for reusing existing rich techniques in deep network for point process modeling. We apply our model to the predictive maintenance problem using a log dataset by more than 1000 ATMs from a global bank headquartered in North America. Introduction Event sequence is becoming increasingly available in a variety of applications such as e-commerce transactions, social network activities, conflicts, and equipment failures etc. The event data can carry rich information not only about the event attribute (e.g. type, participator) but also the timestamp {zi , ti }N i=1 indicating when the event occurs. Being treated as a random variable when the event is stochastically generated in an asynchronous manner, the timestamp makes the Correspondence author is Junchi Yan. This research was partially supported by The National Key Research and Development Program of China (2016YFB1001003), NSFC (61602176, 61672231, 61527804, 61521062), STCSM (15JC1401700, 14XD1402100), China Postdoctoral Science Foundation Funded Project (2016M590337), the 111 Program (B07022) and NSF (IIS-1639792, DMS-1620345). Copyright c 2017, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. event sequence fundamentally different from the time series (Montgomery, Jennings, and Kulahci 2015) with equal and fixed time interval, whereby the time point only serves as a role for index {yt }Tt=1 . A major line of research (Aalen, Borgan, and Gjessing 2008) has been devoted to study event sequence, especially exploring the timestamp information to model the underlying dynamics of the system, whereby point process (Snyder and Miller 2012) has been a powerful and compact framework in this direction. Recently there are many machine learning based models for scalable point process modeling. We attribute the progressions in this direction in part to the smart mathematical reformulations and optimization techniques e.g. (Lewis and Mohler 2011; Zhou, Zha, and Song 2013b; Zhou, Zha, and Song 2013a), as well as novel parametric forms for the conditional intensity function (Shen et al. 2014; Ertekin, Rudin, and McCormick 2015; Xu et al. 2016) as carefully designed by researchersโ€™ prior knowledge to capture the character of the dataset in study. However, one major limitation of the parametric forms of point process is due to their specialized and restricted expression capability for arbitrary distributed event data which trends to be oversimplified or even infeasible for capturing the problem complexity in real applications. Moreover, it runs at the risk of model underfitting due to the misjudgement on model choice. Recent works e.g. (Zhou, Zha, and Song 2013b) start to turn to non-parametric form to fit the structure of a point process, but their method is under the Hawkes process formulation,while this formulation runs at the risk of model mischoice. In this paper, we view the conditional intensity of a point process as a nonlinear mapping between the predicted transient occurrence intensity of events with different types, and the model input information of event participators, event profile and the system history. Such a nonlinear mapping is expected to be complex and flexible enough to model various characters of real event data for its application utility. In fact, deep learning models, such as Convolutional Neural Networks (CNNs) (LeCun et al. 1998), Recurrent Neural Networks (RNNs) (Pascanu, Mikolov, and Bengio 2013) have attracted wide attention in recent vision, speech and language communities, and many of them has dominated the competing results on perceptual benchmark tasks e.g. (Russakovsky et al. 2015). In particular, we turn to RNNs as a Figure 1: Time series and event sequence can be synergically modeled. The former can be used to timely capture the recent window for the time-varying features, while the latter can capture the long-range dependency over time. Note the dependency in an event sequence can be easily captured by an event sequence LSTM with less than 5 steps, while it takes too much more steps if using a time series with a fixed time interval e.g. 7 days in the figure (Note many unit steps in the top time series are omitted in the figure for clarity). natural way to encode such nonlinear and dynamic mapping, in an effort for modeling an end-to-end nonlinear intensity mapping without any prior knowledge. Key idea and highlights Our model interprets the conditional intensity function of a point process as a nonlinear mapping, which is synergetically established by a composite neural network with two RNNs as its building blocks. As illustrated in Fig.1, time series (top row) and event sequence (bottom row) are distinct to each other in that time series is more suitable to carry the synchronously (i.e. in a fixed pace) and regularly updated or constant profile features, while the event sequence can compactly catch event driven, more abrupt information, which can affect the condition intensity function over longer time period. More specifically, the highlights of this paper are: 1) We first make an observation that many conditional intensity functions can be viewed as an integration of two effects: i) spontaneous background component inherently affected by the internal (time-varying) attributes of the individual and the event type; ii) effects from history events. Meanwhile, most information in real world can also be covered by continuously updated features like age, temperature, and asynchronous event data such as clinical records, failures. This motivates us to devise a general approach. 2) Then we use an RNN whose units are aligned with the time points of a time series as its units, and an RNN whose units are aligned with events. The time series RNN can timely track the spontaneous background while the event sequence RNN is used to efficiently capture the long-range dependency over history with arbitrary time intervals. This allows to fit arbitrary dynamics of point process which otherwise will be very difficult or often impossible to be specified by a parameterized model under certain assumptions. 3) To our best knowledge, this is the first work to fully in- terpret and instantiate the conditional intensity function with fused time series and event sequence RNNs. This opens up the room for connecting the neural network techniques to traditional point process that emphasizes more on specific model driven by domain knowledge. More importantly the introduction of a full RNN treatment lessen the efforts for the design of (semi-)parametric point process model and its complex learning algorithms which often call for special tricks that prohibiting the wide use for practitioners. In contrast, neural networks and specifically RNN, is becoming off-the-shelf tools and getting widely used recently. 4) Our model is simple, general and can be end-to-end trained. We target to a predictive maintenance problem. The data is from a global bank headquartered in North America, consisting decades of thousands of event logs for a large number of Automated Teller Machines (ATMs). The stateof-the-art performance on failure type and timestamp prediction corroborates its suitability to real-world applications. Related Work and Motivation We view the related concepts and work in this section, which is mainly focused on Recurrent Neural Networks (RNNs) and their applications in time series and sequences data, respectively. Then we give our point of view on existing point process methods and their connection to RNNs. All these observations indeed motivate the work of this paper. Recurrent neural network The building blocks of our model are the Recurrent Neural Networks (RNNs) (Elman 1990; Pascanu, Mikolov, and Bengio 2013) and its modern variant Long Short-Term Memory (LSTM) units (Hochreiter and Schmidhuber 1997; Graves 2013). RNNs are dynamical systems whose next state and output depend on the present network state and input, which are more general models than the feed-forward networks. RNNs have long been explored in perceptual applications for many decades, however it can be very difficult to train RNNs to learn long-range dynamics perhaps in part due to the vanishing and exploding gradients problem. LSTMs provide a solution by incorporating memory units that allow the network to learn when to forget previous hidden states and when to update hidden states given new information. Recently, RNNs and LSTMs have been successfully applied in large-scale vision (Gregor et al. 2015), speech (Graves, rahman Mohamed, and Hinton 2014) and language (Sutskever, Vinyals, and Le. 2014) problems. RNNs for series data From application perspective, we view RNNs works by two scenarios as particularly considered in this paper: i) RNNs for synchronized series with evenly spaced interval e.g. time series or indexed sequence with pure order information e.g. language; ii) asynchronous sequence with random timestamp e.g. event data. i) Synchronized series: RNNs have been a long time a natural tool for standard time series modeling and prediction (Connor, Martin, and Atlas 1994; Han et al. 2004; Chandra and Zhang 2012; Chen, Chang, and Chang 2013), whereby the indexed series data point is fed as input to an (unfold) RNN. In a broader sense, video frames can also be treated as time series and RNN are widely used in recent visual analytics works (Jain et al. 2016; Tripathi et al. 2016) and so for speech (Graves, rahman Mohamed, and Hinton 2014). RNNs are also intensively adopted for sequence modeling tasks (Chung et al. 2014; Bengio et al. 2015) when only order information is considered. ii) Asynchronous event: In contrast, event sequence with timestamp about their occurrence, which are asynchronously and randomly distributed over the continuous time space, is another typical input type for RNNs (Du et al. 2016; Choi et al. 2016; Esteban et al. 2016) and (Che et al. 2016) (despite its title for โ€™time seriesโ€™). One key differentiation against the first scenario is that the timestamp or time duration between events (together with other features) is taken as input to the RNNs. By doing so, (long-range) event dependency can be effectively encoded. Point process Point process has been a principled framework for modeling event data (Aalen, Borgan, and Gjessing 2008). The dynamics of the point process can be well captured by its conditional intensity function whose definition is briefly reviewed here: for a short time window [t, t + dt), ฮป(t) represents the rate for the occurrence of a new event conditioned on the history Ht = {zi , ti |ti < t}: ฮป(t) = lim โˆ†tโ†’0 E(N (t + โˆ†t) โˆ’ N (t)|Ht ) E(dN (t)|Ht ) = โˆ†t dt where E(dN (t)|Ht ) is the expectation of the number of events happened in the interval (t, t + dt] given the historical observations Ht . The conditional intensity function has played a central role in point processes and many popular processes vary on how it is parameterized. 1) Poisson process (Kingman 1992): the homogeneous Poisson process has a very simple form for its intensity function: ฮป(t) = ฮป0 . Poisson process and its time-varying generalization are both assumed to be independent of the history. 2) Reinforced poisson processes (Pemantle 2007; Shen et al. 2014): the model captures the โ€˜rich-get-richerโ€™ mechanism characterized by a compact intensity function, which is recently used for popularity prediction (Shen et al. 2014). 3) Hawkes process (Hawkes 1971): Hawkes process has received wide attention recently in social network analysis (Zhou, Zha, and Song 2013a), viral diffusion(Yang and Zha 2013) and criminology (Lewis et al. 2010) etc. It explicitly uses a triggering term to model the excitation effect from history events and is originally motivated to analyze the earthquake and its aftershocks(Ogata 1988). 4) Reactive point process (Ertekin, Rudin, and McCormick 2015): it can be regarded as a generalization for the Hawkes process by adding a self-inhibiting term to account for the inhibiting effects from history events. 5) Self-correcting process (Isham and Westcott 1979): its background part increases steadily, while it is decreased by a constant eโˆ’ฮฑ < 1 every time a new event appears. We reformulate these intensity functions in their general form in Table 1. It tries to separate the spontaneous background component and history event effect explicitly. Predictive maintenance Predictive maintenance (Mobley 2002) is a sound testbed for our model which refers to a practice that involves equipment risk prediction to allow for proactive scheduling of corrective maintenance. Such an early identification of potential concerns helps deploy limited resources more cost effectively, reduce operations costs Table 1: Conditional intensity functions of point processes. Model Poisson process Reinforced poisson process Hawkes process Reactive point process Self-correcting process Background History event effect ยต(t) 0 ยต(t) ยต(t) 0 0 P ฮณ(t) P ti <t ฮด(ti < t) P P ti <t ฮณ(t, ti ) ti <t ฮณ1 (t, ti ) โˆ’ P ti <t ฮณ2 (t, ti ) exp(ยตt โˆ’ ti <t ฮณ(t, ti ) Note:ฮด(t) is Dirac function, ฮณ(t, ti ) is time-decaying kernel and ยต(t) can be constant or time-varying function. and maximize equipment uptime (Grall et al. 2002). Predictive maintenance is adopted in a wide variety of applications such as fire inspection (Madaio et al. 2016), data center (Sirbu and Babaoglu 2015) and electrical grid (Ertekin, Rudin, and McCormick 2015) management. For its practical importance in different scenarios and relative rich event data for modeling, we target our model to a real-world dataset of more than 1,000 automated teller machines (ATMs) from a global bank headquartered in North America. Network Structure and End-to-End Learning Taking a sequence {x}Tt=1 as input, the RNN generates the hidden states {h}Tt=1 and outputs a sequence (Elman 1990; Pascanu, Mikolov, and Bengio 2013). Specifically, we implement our RNN with Long Short Term Memory (LSTM) (Hochreiter and Schmidhuber 1997; Graves 2013) for its popularity and well-known capability for efficient longrange dependency learning. In fact other RNN variant e.g. Gated Recurrent Units (GRU) (Chung et al. 2014) can also be alternative choice. We reiterate the formulation of LSTM: it ft ct ot ht = ฯƒ(Wi xt + Ui htโˆ’1 + Vi ctโˆ’1 + bi ), = ฯƒ(Wf xt + Uf htโˆ’1 + Vf ctโˆ’1 + bf ), = ft ctโˆ’1 + it tanh(Wc xt + Uc htโˆ’1 + bc ), = ฯƒ(Wo xt + Uo htโˆ’1 + Vo ct + bo ), = ot tanh(ct ) where denotes element-wise multiplication and the recurrent activation ฯƒ is the Logistic Sigmod function. The above system can be reduced into an LSTM equation: (ht , ct ) = LSTM(xt , htโˆ’1 + ctโˆ’1 ) We consider two types of input: i) continuously and evenly distributed time-series data e.g. temperature; ii) event data whose occurrence time interval is random. The network is comprised by two RNNs using evenly spaced time series {yt }Tt=1 to model the background intensity of events occurrence and event sequence {zi , ti }N i=1 to capture long-range event dependency. As a result, we have: (hyt , cyt ) = LSTMy (yt , hytโˆ’1 + cytโˆ’1 ), (1) (hzt , czt ) (2) et Ut ut st = LSTMz (zt , hztโˆ’1 tanh(Wf [hyt , hzt ] + cztโˆ’1 ), = + bf ), = softMax(WU et + bU ), = softMax(Wu [et , Ut ] + bu ) = Ws et + bs , (3) (4) (5) (6) where U and u denotes the main type and subtype of events respectively. s is the timestamp associated with each event. The total loss is the sum of the time prediction loss and the cross-entropy loss for event type: N  X   โˆ’WUj log(Utj ) โˆ’ wuj log(ujt ) โˆ’ log f (sjt |hjtโˆ’1 ) (7) j=1 where N is the number of training samples indexed by j, and sjt is the timestamp for the coming event, while hjtโˆ’1 is the history information. The underlying rationale for the third term is that we not only encourage correct classification of the coming event type, but also reinforce the corresponding timestamp of the event shall be close to the ground truth. We adopt a Gaussian penalty function with a fixed ฯƒ 2 = 10: ! 1 โˆ’(sjt โˆ’ sฬƒjt )2 j j f (st |htโˆ’1 ) = โˆš exp 2ฯƒ 2 2ฯ€ฯƒ Figure 2: Our network can be trained end-to-end. Time series and event sequence are fed into two RNNs (LSTM) which are connected to an embedding mapping layer that fuses the information from two LSTMs. Then three prediction layers are used to output the predicted main type, subtype of events, and the associated timestamp. Cross-entropy with the time penalty loss by Eq.7 and square loss are respectively used for event type and timestamp prediction. total max min mean std Training set Table 2: Statistics of main/sub-type of event count per ATM, and timestamp interval in days for all ATMs (in brackets). Ticket Error PRT CNG IDC COMM LMTP MISC 2226(โ€“) 28434(โ€“) 9204(โ€“) 7767(โ€“) 4082(โ€“) 3371(โ€“) 2525(โ€“) 1485(โ€“) 10(137.04) 168(153.90) 88(210.13) 50(200.07) 116(206.61) 47(202.79) 81(207.93) 32(204.41) 0(1.21) 0(0.10) 0(0.10) 0(0.10) 0(0.10) 0(0.10) 0(0.10) 0(0.10) 2.09(31.70) 26.70(6.31) 8.64(12.12) 7.29(15.49) 3.83(23.85) 3.16(22.35) 2.37(22.86) 1.39(24.27) 1.85(25.14) 18.38(9.74) 11.37(21.41) 6.59(23.87) 5.84(30.71) 3.90(29.36) 4.41(34.56) 2.54(34.38) Testing set The output sฬƒjt from the timestamp prediction layer is fed to the classification loss layer to compute the above penalty given the actual timestamp sjt for sample i. Following the importance weighting methodology for skewed data of model training (Rosenberg 2012), the weight parameters W, w for both main-type and subtype are set as the inverse of the sample number ratio in that type against the total size of samples, in order to weight more on those classes with fewer training samples. For the loss of independent main-type or subtype prediction as shown in Fig.3(b), we set the weight parameter w and W to zero respectively. We adopt RMSprop gradients (Dauphin et al. 2015) which have been shown to work well on training deep networks to learn these parameters. data Ticket Error PRT CNG IDC COMM LMTP MISC 1164(โ€“) 11799(โ€“) 4089(โ€“) 3134(โ€“) 1645(โ€“) 1366(โ€“) 939(โ€“) 626(โ€“) 15(148.00) 104(193.75) 60(205.48) 66(196.93) 35(205.75) 53(205.17) 20(186.87) 21(190.75) 0(0.13) 1(0.10) 0(0.10) 0(0.10) 0(0.10) 0(0.10) 0(0.10) 0(0.10) 2.52(26.30) 25.59(6.47) 8.86(11.45) 6.79(15.90) 3.57(25.15) 2.96(22.88) 2.04(26.63) 1.36(25.14) 2.41(25.22) 17.71(10.09) 10.77(20.44) 6.91(25.22) 4.29(31.62) 4.08(30.09) 2.76(36.96) 2.59(34.91) Experiments on Real-world Data We use failure prediction for predictive ATMs maintenance as a typical example of event based point process modeling. We have no prior knowledge on the dynamics of the complex system and the task can involve arbitrarily working schedules and heterogeneous mix of conditions. It takes much cost or even impractical to devise specialized models. Problem and real data description In maintenance support services, when a device fails, the equipment owner raises a maintenance service ticket and technician will be assigned to repair the failure. In fact, the history log and relevant profile information about the equipment can be indicative signals for the coming failures. The studied dataset is comprised of the event logs involving error reporting and failure tickets, which is originally collected from a large number of ATMs owned by an anonymous global bank headquartered in North America. The bank is also a customer of the technical support service department of a Fortune 500 IT company. ATM models The training data consists of 1085 ATMs and testing data has 469 ATMs, in total 1557 Wincor ATMs that cover 5 ATM machine models: ProCash 2100 RL (980, 430), 1500 RL (19, 5), 2100 FL (53, 21), 1500 FL (26, 10), type and 2250XE RL (7, 3). The numbers in the bracket indicate the number of machines for training and testing. Event type There are two main types โ€˜ticketโ€™ and โ€˜errorโ€™ from Sep. 2014 to Mar. 2015. Statistics is presented in Table 2. Moreover โ€˜errorโ€™ is divided into 6 subtypes regarding in which component the error occurs: 1) printer (PRT), 2) cash dispenser module (CNG), 3) internet data center (IDC), 4) communication part (COMM), 5) printer monitor (LMTP), 6) miscellaneous e.g. hip card module, usb (MISC). Features The input features for the two RNNs are: 1) Time series RNN: For each sub-window of length 7 days, for the time series RNN, we extract features including: i) the inventory information: ATM models, age, location, etc; ii) Event statistics, including tickets events from maintenance records, and errors from system log. Their occurrence frequencies are used as features. The concatenation of the above two categories of features serves as the features for each sub-window i.e. time series point. 2) Event sequence RNN: event type and the time interval between two events. Model setting We use a single layer LSTM of size 32 with Sigmoid gate activations and tanh activation for hidden representation. The embedding layer is fully connected and it uses tanh activation and outputs a 16 dimensional vector. One-hot or embedding can be used for event type representation. For a large number of types, embedding representation is compact and efficient. For time series RNN, we set the length of each sub-window (i.e. the evenly spaced time interval) to be 7 days and the number of sub-window to be 5. In this way, our observation length is 35 days for time series. For event-dependency, the length of event sequence can be arbitrarily long. Here we take it by 7. We also test degraded versions of our model as follows: 1) Time series RNN: the input is event sequence (the right half in the yellow part of Fig.2) is removed. Note this design is in spirit similar to many LSTM models (Jain et al. 2016; Tripathi et al. 2016) used for video analytics, whereby the frame sequence can be treated as time series as the input to LSTMs. 2) Event (sequence) RNN: the RNN whose input is time series (the left half in the yellow part of Fig.2) is removed; 3) Intensity RNN: two RNN are fused as shown in Fig.2. For the above three methods, the output layer is directly the fine-grained subtype of events with no hierarchical structure as shown in the top left part of Fig.2) in dark green. We also term three โ€˜hierarchicalโ€™ versions whose two hierarchical prediction layers in Fig.2 are used: 4) Time series hRNN, 5) Event (sequence) hRNN, 6) Intensity hRNN. In addition, we compare three major peer methods. For Logistic model, the input are the concatenation of feature vectors for all active time series RNN sub-windows (set to 5 in this paper). For RMTPP and Hawkes process, we train the model on the event sequences with associated information. In fact, RMTPP will further process the event data into the similar input information to our event RNN. 1) Logistic model: we use Logistic regression for event timestamp prediction and use another independent Logistic classification model for event type prediction. 2) Recurrent Marked Temporal Point Processes (RMTPP): (Du et al. 2016) uses neural network to model the event dependency flexibly. The method can only sample transient time series features when an event happens and use partially parametric form for the base intensity. 3) Hawkes Process: To enable multi-type event prediction, we use a Multi-dimensional Hawkes process. Similar to (Zhou, Zha, and Song 2013a), we also add a sparsity regularization term on the mutual infection matrix but the lowrank assumption is removed as we only have 6 subtypes. Evaluation metrics We use several popular prediction metrics for performance evaluation. For the coming event type prediction, we adopt Precision, Recall, F1 Score and Confusion matrix over 2 main types (โ€˜errorโ€™, โ€˜ticketโ€™) as well Figure 3: Hierarchical layer and Flat independent layer. as Confusion matrix over 6 subtypes under โ€˜errorโ€™. Note all these metrics are computed for each type, and then are averaged over all types. For event time prediction, we use the Mean Absolute Error (MAE) which measures the absolute difference between the predicted time point and the actual one. These settings are similar to (Du et al. 2016). To evaluate the type and timestamp prediction jointly, we devise two more strict metrics. For type prediction, we narrow down to test the samples whose timestamp prediction error MAE< 3 days and we compute the new F1 score+. For timestamp, we recompute the new MAE+ only for the samples whose coming event is correctly predicted. Platform The code is based on Theano running on a Linux server with 32G memory, 2 CPUs with 6 cores for each: Intel(R) Xeon(R) CPU E5-2603 v3 @ 1.60GHz. We also use 4 GPU:GeForce GTX TITAN X for acculturation. Results and discussion All evaluations are performed on the testing dataset distinctive to training set whose statistics are shown in Table 2. Averaged performance Table 3 shows the averaged performance among various types of events. As shown in Fig.3, we test two architectures of the event type prediction layer, i.e. hierarchical predictor (Fig.3(a)) and flat independent predictors (Fig.3(b)). The main type includes โ€˜ticketโ€™ and โ€˜errorโ€™ and the subtype include โ€˜ticketโ€™ and the other six subtypes under โ€˜errorโ€™ as we describe earlier in the paper. Confusion matrix The confusion matrix for the six subtypes under โ€˜errorโ€™ event, as well as for the two main types โ€˜ticketโ€™ and โ€˜errorโ€™ are shown in Fig.4 by various methods. We make observations and analysis based on the results: 1) As shown in 3, for main-type, the flat architecture that directly predicts the main types outperforms the hierarchical one in different settings of the input RNN as well as varying evaluation metrics. This can be explained that the loss function focuses on the main-type misclassification only. While for the subtype prediction, the hierarchical layer performs better since it fuses the output from the main-type prediction layer and the embedding layer as shown in Fig.3(a). 2) No surprisingly, for both event type and timestamp prediction, our main approach, i.e. intensity RNN that fuses two RNNs outperforms its counterparts time series RNN and event sequence RNN by a notable margin. While the event RNN also often performs better than the time series counterpart. This suggests at least in the studied dataset, history event effects are important for the future event occurrence. 3) Our main method intensity RNN is almost always superior against other methods except for the main-type pre- Table 3: Ablation test of our method and peer methods i.e. multi-dimensional Hawkes process, recurrent Hawkes process and Logistic classification (for type) and regression (for event timestamp). Numbers are averaged over types. subtype precision Time series RNN Event sequence RNN Intensity RNN Hawkes process Logistic prediction RMTPP 0.673 0.671 0.714 0.457 0.883 0.581 0.554 0.570 0.620 0.387 0.385 0.574 0.582 0.623 0.642 โ€” โ€” โ€” 0.590 0.614 0.664 โ€”โ€” โ€” recall Time series RNN Event sequence RNN Intensity RNN Hawkes process Logistic prediction RMTPP 0.853 0.821 0.905 0.493 0.795 0.691 0.522 0.543 0.614 0.394 0.273 0.583 0.738 0.770 0.805 โ€” โ€” โ€” 0.608 0.621 0.661 โ€” โ€” โ€” F1 score Time series RNN Event sequence RNN Intensity RNN Hawkes process Logistic prediction RMTPP 0.707 0.703 0.765 0.473 0.832 0.584 0.533 0.555 0.616 0.386 0.269 0.572 0.571 0.651 0.662 โ€” โ€” โ€” 0.605 0.610 0.663 โ€” โ€” โ€” MAE (in days) Time series RNN Event sequence RNN Intensity RNN Hawkes process Logistic prediction RMTPP 4.37 4.24 4.13 5.26 4.52 4.28 4.48 4.42 4.20 5.46 4.61 4.32 4.26 4.21 4.02 โ€” โ€” โ€” 4.41 4.37 4.13 โ€” โ€” โ€” F1 Score+ hierarchical output main-type subtype main-type Time series RNN Event sequence RNN Intensity RNN Hawkes process Logistic prediction RMTPP 0.768 0.705 0.825 0.467 0.846 0.584 0.547 0.597 0.661 0.451 0.286 0.619 0.572 0.639 0.684 โ€” โ€” โ€” 0.603 0.646 0.708 โ€” โ€” โ€” MAE+ model Time series RNN Event sequence RNN Intensity RNN Hawkes process Logistic prediction RMTPP 4.21 4.16 4.12 5.42 4.5 4.26 3.78 3.84 3.57 3.93 4.24 3.99 4.05 4.12 4.21 โ€” โ€” โ€” 3.97 4.01 4.11 โ€” โ€” โ€” diction task, whereby the Logistic classification model performs better. However for more challenging tasks i.e. subtype prediction and event timestamp prediction, our method significantly outperforms especially for subtype prediction task. Interestingly, all point process based models obtain better results on this task which suggests the point process models are more promising compared with classical classification models. Indeed, our methodology provides an endto-end learning mechanism without any pre-assumption in modeling point process. All these empirical results on realworld tasks suggest the efficacy of our approach. Conclusion We use Fig.5 to conclude and further position our model in the development of (implicit and explicite) modeling the intensity function of point process. In fact, Hawkes process uses a full explicit parametric model and RMTPP misses the dense time series features to model time-varying base intensity and assumes a partially parametric form for it. We make a further step by a full implicit mapping model. Our model (a) Intensity hRNN (b) Time series hRNN (c) Event hRNN (d) Intensity RNN (e) Time series RNN (f) Event RNN (g) Hawkes process (j) i-hRNN (o) (k) t-hRNN e-RNN (p) (h) Logistic (l) e-hRNN (m) (q) Logistic Hawkes (i) i-RNN (r) RMTPP (n) t-RNN RMTPP Figure 4: Confusion matrixes for sub/main type. Three methods in top and middle row use the hierarchical and flat structure as in Fig.3 respectively. Zoom in for better view. Figure 5: The evolving of point process modeling. (see Fig.2) is simple, general and can be learned end-to-end with standard backpropagation and opens up new possibilities for borrowing the advances in neural network learning to the area of point process modeling and applications. The representative study in this paper has clearly suggests its high potential to real-world problems, even we have no domain knowledge on the problem at hand. This is in contrast to existing point process models where an assumption about the dynamics is often need to be specified beforehand. References [Aalen, Borgan, and Gjessing 2008] Aalen, O.; Borgan, O.; and Gjessing, H. 2008. Survival and event history analysis: a process point of view. Springer Science & Business Media. [Bengio et al. 2015] Bengio, S.; Vinyals, O.; Jaitly, N.; and Shazeer, N. 2015. Scheduled sampling for sequence prediction with recurrent neural networks. In NIPS. [Chandra and Zhang 2012] Chandra, R., and Zhang, M. 2012. Cooperative coevolution of elman recurrent neural networks for chaotic time series prediction. Neurocomputing 86:116โ€“123. [Che et al. 2016] Che, Z.; Purushotham, S.; Cho, K.; Sontag, D.; and Liu, Y. 2016. Recurrent neural networks for multivariate time series with missing values. In arXiv:1606.01865. [Chen, Chang, and Chang 2013] Chen, P. A.; Chang, L. C.; and Chang, F. J. 2013. Reinforced recurrent neural networks for multistep-ahead flood forecasts. Journal of Hydrology 497:71โ€“79. [Choi et al. 2016] Choi, E.; Bahadori, M. T.; Schuetz, A.; Stewart, W. F.; and Sun, J. 2016. Doctor ai: Predicting clinical events via recurrent neural networks. In arXiv:1511.05942v10. [Chung et al. 2014] Chung, J.; Gulcehre, C.; Cho, K.; and Bengio, Y. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. In arXiv:1412.3555. [Connor, Martin, and Atlas 1994] Connor, J. T.; Martin, R. D.; and Atlas, L. E. 1994. Recurrent neural networks and robust time series prediction. IEEE Transactions on Neural Networks 5(2):240โ€“254. [Dauphin et al. 2015] Dauphin, Y. N.; de Vries, H.; Chung, J.; and Bengio, Y. 2015. Rmsprop and equilibrated adaptive learning rates for non-convex optimization. In arXiv:1502.04390. [Du et al. 2016] Du, N.; Dai, H.; Trivedi, R.; Upadhyay, U.; GomezRodriguez, M.; and Song, L. 2016. Recurrent marked temporal point processes: Embedding event history to vectore. In KDD. [Elman 1990] Elman, J. L. 1990. Finding structure in time. Cognitive Science 14:179โ€“211. [Ertekin, Rudin, and McCormick 2015] Ertekin, S.; Rudin, C.; and McCormick, T. H. 2015. Reactive point processes: A new approach to predicting power failures in underground electrical systems. The Annals of Applied Statistics 9(1):122โ€“144. [Esteban et al. 2016] Esteban, C.; Staeck, O.; Yang, Y.; and Tresp, V. 2016. Predicting clinical events by combining static and dynamic information using recurrent neural networks. In arXiv:1602.02685. [Grall et al. 2002] Grall, A.; Dieulle, L.; Berenguer, C.; and Roussignol, M. 2002. Continuous-time predictive-maintenance scheduling for a deteriorating system. IEEE transactions on Reliability 51(2):141โ€“150. [Graves, rahman Mohamed, and Hinton 2014] Graves, A.; rahman Mohamed, A.; and Hinton, G. 2014. Towards end-to-end speech recognition with recurrent neural networks. In ICML. [Graves 2013] Graves, A. 2013. Generating sequences with recurrent neural networks. In arXiv:1308.0850. [Gregor et al. 2015] Gregor, K.; Danihelka, I.; Graves, A.; Rezende, D.; and Wierstra, D. 2015. Draw: A recurrent neural network for image generation. In ICML. [Han et al. 2004] Han, M.; Xi, J.; Xu, S.; and Yin, F.-L. 2004. Prediction of chaotic time series based on the recurrent predictor neural network. IEEE Transactions on Signal Processing 52(12):3409โ€“3416. [Hawkes 1971] Hawkes, A. G. 1971. Spectra of some self-exciting and mutually exciting point processes. Biometrika. [Hochreiter and Schmidhuber 1997] Hochreiter, S., and Schmidhuber, J. 1997. Long short-term memory. Neural computation 9(8):1735โ€“1780. [Isham and Westcott 1979] Isham, V., and Westcott, M. 1979. A self-correcting pint process. Advances in Applied Probability 37:629โ€“646. [Jain et al. 2016] Jain, A.; Singh, A.; Koppula, H. S.; Soh, S.; and Saxena, A. 2016. Recurrent neural networks for driver activity anticipation via sensory-fusion architecture. In ICRA. [Kingman 1992] Kingman, J. F. C. 1992. Poisson processes. volume 3. Oxford university press. [LeCun et al. 1998] LeCun, Y.; Bottou, L.; Bengio, Y.; and Haffner, P. 1998. Gradient-based learning applied to document recognition. Proceedings of the IEEE 86(11):2278โ€“2324. [Lewis and Mohler 2011] Lewis, E., and Mohler, E. 2011. A nonparametric em algorithm for multiscale hawkes processes. Journal of Nonparametric Statistics. [Lewis et al. 2010] Lewis, E.; Mohler, G.; Brantingham, P. J.; and Bertozzi, A. 2010. Self-exciting point process models of insurgency in iraq. UCLA CAM Reports 10 38. [Madaio et al. 2016] Madaio, M.; Chen, S.; Haimson, O.; Zhang, W.; Cheng, X.; and Hinds-Aldrich, M. 2016. Firebird: Predicting fire risk and prioritizing fire inspections in atlanta. In KDD. [Mobley 2002] Mobley, R. K. 2002. An introduction to predictive maintenance. Butterworth-Heinemann. [Montgomery, Jennings, and Kulahci 2015] Montgomery, D. C.; Jennings, C. L.; and Kulahci, M. 2015. Introduction to time series analysis and forecasting. John Wiley & Sons. [Ogata 1988] Ogata, Y. 1988. Statistical models for earthquake occurrences and residual analysis for point processes. J. Amer. Statist. Assoc. 83(401):9โ€“27. [Pascanu, Mikolov, and Bengio 2013] Pascanu, R.; Mikolov, T.; and Bengio, Y. 2013. On the difficulty of training recurrent neural networks. In ICML. [Pemantle 2007] Pemantle, R. 2007. A survey of random processes with reinforcement. Probability Survey 4(0):1โ€“79. [Rosenberg 2012] Rosenberg, A. 2012. Classifying skewed data: Importance weighting to optimize average recall. In INTERSPEECH, 2242โ€“2245. [Russakovsky et al. 2015] Russakovsky, O.; Deng, J.; Su, H.; Krause, J.; Satheesh, S.; Ma, S.; Huang, Z.; Karpathy, A.; Khosla, A.; Bernstein, M.; Berg, A. C.; and Fei-Fei, L. 2015. Imagenet large scale visual recognition challenge. International Journal of Computer Vision 115(3):211โ€“252. [Shen et al. 2014] Shen, H.; Wang, D.; Song, C.; and Barabaฬsi, A. 2014. Modeling and predicting popularity dynamics via reinforced poisson processes. In AAAI. [Sirbu and Babaoglu 2015] Sirbu, A., and Babaoglu, O. 2015. A holistic approach to log data analysis in high-performance computing systems: The case of ibm blue gene/q. Euro-Par 2015: Parallel Processing Workshopss 631โ€“643. [Snyder and Miller 2012] Snyder, D. L., and Miller, M. I. 2012. Random point processes in time and space. Springer Science & Business Media. [Sutskever, Vinyals, and Le. 2014] Sutskever, I.; Vinyals, O.; and Le., Q. V. 2014. Sequence to sequence learning with neural networks. In NIPS. [Tripathi et al. 2016] Tripathi, S.; Lipton, Z. C.; Belongie, S.; and Nguyen, T. 2016. Context matters: Refining object detection in video with recurrent neural networks. In BMVC. [Xu et al. 2016] Xu, H.; Wu, W.; Nemati, S.; and Zha, H. 2016. Patient flow prediction via discriminative learning of mutuallycorrecting processes. IEEE transactions on Knowledge and Data Engineering. [Yang and Zha 2013] Yang, S.-h., and Zha, H. 2013. Mixture of mutually exciting processes for viral diffusion. In ICML. [Zhou, Zha, and Song 2013a] Zhou, K.; Zha, H.; and Song, L. 2013a. Learning social infectivity in sparse low-rank networks using multi-dimensional hawkes processe. In AISTATS. [Zhou, Zha, and Song 2013b] Zhou, K.; Zha, H.; and Song, L. 2013b. Learning triggering kernels for multi-dimensional hawkes processes. In ICML.
2cs.AI
arXiv:1404.1957v3 [math.PR] 29 Oct 2015 The Annals of Applied Probability 2015, Vol. 25, No. 6, 3511โ€“3570 DOI: 10.1214/14-AAP1081 c Institute of Mathematical Statistics, 2015 ERGODIC CONTROL OF MULTI-CLASS M/M/N + M QUEUES IN THE HALFINโ€“WHITT REGIME By Ari Arapostathisโˆ—,1, Anup Biswasโˆ—,2 and Guodong Pangโ€ ,3 The University of Texas at Austinโˆ— and Pennsylvania State Universityโ€  We study a dynamic scheduling problem for a multi-class queueing network with a large pool of statistically identical servers. The arrival processes are Poisson, and service times and patience times are assumed to be exponentially distributed and class dependent. The optimization criterion is the expected long time average (ergodic) of a general (nonlinear) running cost function of the queue lengths. We consider this control problem in the Halfinโ€“Whitt (QED) regime, that is, the number of servers n and the total offered load r scale โˆš like n โ‰ˆ r + ฯฬ‚ r for some constant ฯฬ‚. This problem was proposed in [Ann. Appl. Probab. 14 (2004) 1084โ€“1134, Section 5.2]. The optimal solution of this control problem can be approximated by that of the corresponding ergodic diffusion control problem in the limit. We introduce a broad class of ergodic control problems for controlled diffusions, which includes a large class of queueing models in the diffusion approximation, and establish a complete characterization of optimality via the study of the associated HJB equation. We also prove the asymptotic convergence of the values for the multi-class queueing control problem to the value of the associated ergodic diffusion control problem. The proof relies on an approximation method by spatial truncation for the ergodic control of diffusion processes, where the Markov policies follow a fixed priority policy outside a fixed compact set. Received April 2014; revised November 2014. Supported in part by the Office of Naval Research Grant N00014-14-1-0196. 2 Supported in part by an award from the Simons Foundation (# 197982) to The University of Texas at Austin and in part by the Office of Naval Research through the Electric Ship Research and Development Consortium. 3 Supported in part by the Marcus Endowment Grant at the Harold and Inge Marcus Department of Industrial and Manufacturing Engineering at Penn State. AMS 2000 subject classifications. Primary 60K25; secondary 68M20, 90B22, 90B36. Key words and phrases. Multi-class Markovian queues, reneging/abandonment, Halfinโ€“Whitt (QED) regime, diffusion scaling, long time-average control, ergodic control, stable Markov optimal control, spatial truncation, asymptotic optimality. 1 This is an electronic reprint of the original article published by the Institute of Mathematical Statistics in The Annals of Applied Probability, 2015, Vol. 25, No. 6, 3511โ€“3570. This reprint differs from the original in pagination and typographic detail. 1 2 A. ARAPOSTATHIS, A. BISWAS AND G. PANG CONTENTS 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1. Contributions and comparisons . . . . . . . . . . . . . . . 1.2. Organization . . . . . . . . . . . . . . . . . . . . . . . . . 1.3. Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. The controlled system in the Halfinโ€“Whitt regime . . . . . . 2.1. The multi-class Markovian many-server model . . . . . . 2.2. The ergodic control problem in the Halfinโ€“Whitt regime 3. A broad class of ergodic control problems for diffusions . . . 3.1. The controlled diffusion model . . . . . . . . . . . . . . . 3.2. Structural assumptions . . . . . . . . . . . . . . . . . . . 3.3. Piecewise linear controlled diffusions . . . . . . . . . . . . 3.4. Existence of optimal controls . . . . . . . . . . . . . . . . 3.5. The HJB equation . . . . . . . . . . . . . . . . . . . . . . 3.6. Technical proofs . . . . . . . . . . . . . . . . . . . . . . . 4. Approximation via spatial truncations . . . . . . . . . . . . . 5. Asymptotic convergence . . . . . . . . . . . . . . . . . . . . . . 5.1. The lower bound . . . . . . . . . . . . . . . . . . . . . . . 5.2. The upper bound . . . . . . . . . . . . . . . . . . . . . . . 6. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 4 6 6 8 8 10 14 14 17 18 22 26 31 42 48 49 53 61 61 61 1. Introduction. One of the classical problems in queueing theory is to schedule the customers/jobs in a network in an optimal way. These problems are known as the scheduling problems which arise in a wide variety of applications, in particular, whenever there are different customer classes present in the network and competing for the same resources. The optimal scheduling problem has a long history in the literature. One of the appealing scheduling rules is the well-known cยต rule. This is a static priority policy in which it is assumed that each class-i customer has a marginal delay cost ci and an average service time 1/ยตi , and the classes are prioritized in the decreasing order of ci ยตi . This static priority rule has proven asymptotically optimal in many settings [4, 28, 32]. In [11], a single-server Markov modulated queueing network is considered and an averaged cยต-rule is shown asymptotically optimal for the discounted control problem. An important aspect of queueing networks is abandonment/reneging, that is, customers/jobs may choose to leave the system while being in the queue before their service. Therefore, it is important to include customer abandonment in modeling queueing systems. In [5, 6], Atar et al. considered a multi-class M/M/N +M queueing network with customer abandonment and proved that a modified priority policy, referred to as cยต/ฮธ rule, is asymptotically optimal for the long run average cost in the fluid scale. Dai and Tezcan [13] showed the asymptotic optimality of a static priority policy on a finite ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 3 time interval for a parallel server model under the assumed conditions on the ordering of the abandonment rates and running costs. Although static priority policies are easy to implement, it may not be optimal for control problems of many multi-server queueing systems. For the same multi-class M/M/N + M queueing network, discounted cost control problems are studied in [3, 7, 22], and asymptotically optimal controls for these problems are constructed from the minimizer of a Hamiltonโ€“Jacobiโ€“Bellman (HJB) equation associated with the controlled diffusions in the Halfinโ€“Whitt regime. In this article, we are interested in an ergodic control problem for a multi-class M/M/N + M queueing network in the Halfinโ€“Whitt regime. The network consists of a single pool of n statistically identical servers and a buffer of infinite capacity. There are d customer classes and arrivals of jobs/customers are d independent Poisson processes with parameters ฮปni , i = 1, . . . , d. The service rate for class-i customers is ยตni , i = 1, . . . , d. Customers may renege from the queue if they have not started to receive service before their patience times. Class-i customers renege from the queue at rates ฮณin > 0, i = 1, . . . , d. The scheduling policies are work-conserving, that is, no server stays idle if any of the queues is nonempty. We assume the system operates in the Halfinโ€“Whitt regime, where the arrival rates and the number of servers are scaled appropriately in a manner that the traffic intensity of the system satisfies ! d X โˆš ฮปni โˆ’โ†’ ฯฬ‚ โˆˆ R. n 1โˆ’ nยตni nโ†’โˆž i=1 In this regime, the system operations achieve both high quality (high server levels) and high efficiency (high serversโ€™ utilization), and hence it is also referred to as the Quality-and-Efficiency-Driven (QED) regime; see, for example, [7, 16, 17, 19, 21] on the many-server regimes. We consider an ergodic cost function given by  Z T 1 n r(Qฬ‚ (s)) ds , lim sup E T โ†’โˆž T 0 where the running cost r is a nonnegative, convex function with polynomial growth and Qฬ‚n = (Qฬ‚n1 , . . . , Qฬ‚nd )T is the diffusion-scaled queue length process. It is worth mentioning that in addition to the running cost above which is based on the queue-length, we can add an idle-server cost provided that it has at most polynomial growth. For such, a running cost structure the same analysis goes through. The control is the allocation of servers to different classes of customers at the service completion times. The value function is defined to be the infimum of the above cost over all admissible controls (among all work-conserving scheduling policies). In this article, we are interested in the existence and uniqueness of asymptotically optimal stable 4 A. ARAPOSTATHIS, A. BISWAS AND G. PANG stationary Markov controls for the ergodic control problem, and the asymptotic behavior of the value functions as n tends to infinity. In [7], Section 5.2, it is stated that analysis of this type of problems is important for modeling call centers. 1.1. Contributions and comparisons. The usual methodology for studying these problems is to consider the associated continuum model, which is the controlled diffusion limit in a heavy-traffic regime, and to study the ergodic control problem for the controlled diffusion. Ergodic control problems governed by controlled diffusions have been well studied in literature [1, 9] for models that fall in these two categories: (a) the running cost is near-monotone, which is defined by the requirement that its value outside a compact set exceeds the optimal average cost, thus penalizing unstable behavior (see Assumption 3.4.2 in [1] for details), or (b) the controlled diffusion is uniformly stable, that is, every stationary Markov control is stable and the collection of invariant probability measures corresponding to the stationary Markov controls is tight. However, the ergodic control problem at hand does not fall under any of these frameworks. First, the running cost we consider here is not near-monotone because the total queue length can be 0 when the total number of customers in the system are O(n). On the other hand, it is not at all clear that the controlled diffusion is uniformly stable (unless one imposes nontrivial hypotheses on the parameters), and this remains an open problem. One of our main contributions in this article is that we solve the ergodic control problem for a broad class of nondegenerate controlled diffusions, that in a certain way can be viewed as a mixture of the two categories mentioned above. As we show in Section 3, stability of the diffusion under any optimal stationary Markov control occurs due to certain interplay between the drift and the running cost. The model studied in Section 3 is far more general than the queueing problem described, and thus it is of separate interest for ergodic control. We present a comprehensive study of this broad class of ergodic control problems that includes existence of a solution to the ergodic HJB equation, its stochastic representation and verification of optimality (Theorem 3.4), uniqueness of the solution in a certain class (Theorem 3.5), and convergence of the vanishing discount method (Theorem 3.6). These results extend the well-known results for near-monotone running costs. The assumptions in these theorems are verified for the multiclass queueing model and the corresponding characterization of optimality is obtained (Corollary 3.1), which includes growth estimates for the solution of the HJB. We also introduce a new approximation technique, spatial truncation, for the controlled diffusion processes; see Section 4. It is shown that if we freeze the Markov controls to a fixed stable Markov control outside a compact set, then we can still obtain nearly optimal controls in this class of Markov ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 5 controls for large compact sets. We should keep in mind that this property is not true in general. This method can also be thought of as an approximation by a class of controlled diffusions that are uniformly stable. We remark that for a fixed control, the controlled diffusions for the queueing model can be regarded as a special case of the piecewise linear diffusions considered in [14]. It is shown in [14] that these diffusions are stable under constant Markov controls. The proof is via a suitable Lyapunov function. We conjecture that uniform stability holds for the controlled diffusions associated with the queueing model. For the same multi-class Markovian model, Gamarnik and Stolyar show that the stationary distributions of the queue lengths are tight under any work-conserving policy [15], Theorem 2. We also wish to remark here that we allow ฯฬ‚ to be negative, assuming abandonment rates are strictly positive, while in [15], ฯฬ‚ > 0 and abandonment rates can be zero. Another important contribution of this work is the convergence of the value functions associated with the sequence of multi-class queueing models to the value of the ergodic control problem, say ฬบโˆ— , corresponding to the controlled diffusion model. It is not obvious that one can have asymptotic optimality from the existence of optimal stable controls for the HJB equations of controlled diffusions. This fact is relatively straightforward when the cost under consideration is discounted. In that situation, the tightness of paths on a finite time horizon is sufficient to prove asymptotic optimality [7]. But we are in a situation where any finite time behavior of the stochastic process plays no role in the cost. In particular, we need to establish the convergence of the controlled steady states. Although uniform stability of stationary distributions for this multi-class queueing model in the case where ฯฬ‚ > 0 and abandonment rates can be zero is established in [15], it is not obvious that the stochastic model considered here has the property of uniform stability. Therefore, we use a different method to establish the asymptotic optimality. First, we show that the value functions are asymptotically bounded below by ฬบโˆ— . To study the upper bound, we construct a sequence of Markov scheduling policies that are uniformly stable (see Lemma 5.1). The key idea used in establishing such stability results is a spatial truncation technique, under which the Markov policies follow a fixed priority policy outside a given compact set. We believe these techniques can also be used to study ergodic control problems for other many-server queueing models. The scheduling policies we consider in this paper allow preemption, that is, a customer in service can be interrupted for the server to serve a customer of a different class and her service will be resumed later. In fact, the asymptotic optimality is shown within the class of the work-conserving preemptive policies. In [7], both preemptive and nonpreemptive policies are studied, where a nonpreemptive scheduling control policy is constructed from the HJB equation associated with preemptive policies and thus is shown to be 6 A. ARAPOSTATHIS, A. BISWAS AND G. PANG asymptotically optimal. However, as far as we know, the optimal nonpreemptive scheduling problem under the ergodic cost remains open. For a similar line of work in uncontrolled settings, we refer the reader to [16, 19]. Admission control of the single class M/M/N + M model with an ergodic cost criterion in the Halfinโ€“Whitt regime is studied in [26]. For controlled problems and for finite server models, asymptotic optimality is obtained in [12] in the conventional heavy-traffic regime. The main advantage in [12] is the uniform exponential stability of the stochastic processes, which is obtained by using properties of the Skorohod reflection map. A recent work studying ergodic control of a multi-class single-server queueing network is [25]. To summarize our main contributions in this paper: โ€“ We introduce a new class of ergodic control problems and a framework to solve them. โ€“ We establish an approximation technique by spatial truncation. โ€“ We provide, to the best of our knowledge, the first treatment of ergodic control problems at the diffusion scale for many server models. โ€“ We establish asymptotic optimality results. 1.2. Organization. In Section 1.3, we summarize the notation used in the paper. In Section 2, we introduce the multi-class many server queueing model and describe the Halfinโ€“Whitt regime. The ergodic control problem under the heavy-traffic setting is introduced in Section 2.2, and the main results on asymptotic convergence are stated as Theorems 2.1 and 2.2. Section 3 introduces a class of controlled diffusions and associated ergodic control problems, which contains the queueing models in the diffusion scale. The key structural assumptions are in Section 3.2 and these are verified for a generic class of queueing models in Section 3.3, which are characterized by piecewise linear controlled diffusions. Section 3.4 concerns the existence of optimal controls under the general hypotheses, while Section 3.5 contains a comprehensive study of the HJB equation. Section 3.6 is devoted to the proofs of the results in Section 3.5. The spatial truncation technique is introduced and studied in Section 4. Finally, in Section 5 we prove the results of asymptotic optimality. 1.3. Notation. The standard Euclidean norm in Rd is denoted by |ยท|. The set of nonnegative real numbers is denoted by R+ , N stands for the set of natural numbers, and I denotes the indicator function. By Zd+ we denote the set of d-vectors of nonnegative integers. The closure, the boundary and the complement of a set A โŠ‚ Rd are denoted by A, โˆ‚A and Ac , respectively. The open ball of radius R around 0 is denoted by BR . Given two real numbers a and b, the minimum (maximum) is denoted by a โˆง b (a โˆจ b), respectively. ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 7 Define a+ := a โˆจ 0 and aโˆ’ := โˆ’(a โˆง 0). The integer part of a real number a is denoted by โŒŠaโŒ‹. We use the notation ei , i = 1, . . . , d, to denote the vector with ith entry equal to 1 and all other entries equal to 0. We also let e := (1, . . . , 1)T . Given any two vectors x, y โˆˆ Rd the inner product is denoted by x ยท y. By ฮดx we denote the Dirac mass at x. For any function f : Rd โ†’ R and domain D โŠ‚ R we define the oscillation of f on D as follows: osc(f ) := sup{f (x) โˆ’ f (y) : x, y โˆˆ D}. D For a nonnegative function g โˆˆ C(Rd ), we let O(g) denote the space of |f (x)| < โˆž. This is a Banach space functions f โˆˆ C(Rd ) satisfying supxโˆˆRd 1+g(x) under the norm |f (x)| kf kg := sup . xโˆˆRd 1 + g(x) We also let o(g) denote the subspace of O(g) consisting of those functions f satisfying lim sup |x|โ†’โˆž |f (x)| = 0. 1 + g(x) By a slight abuse of notation, we also denote by O(g) and o(g) a generic member of these spaces. For two nonnegative functions f and g, we use the notation f โˆผ g to indicate that f โˆˆ O(g) and g โˆˆ O(f ). We denote by Lploc (Rd ), p โ‰ฅ 1, the set of real-valued functions that are p d d locally p-integrable and by Wk,p loc (R ) the set of functions in Lloc (R ) whose p ith weak derivatives, i = 1, . . . , k, are in Lloc (Rd ). The set of all bounded k,ฮฑ continuous functions is denoted by Cb (Rd ). By Cloc (Rd ) we denote the set of functions that are k-times continuously differentiable and whose kth derivatives are locally Hoฬˆlder continuous with exponent ฮฑ. We define Cbk (Rd ), k โ‰ฅ 0, as the set of functions whose ith derivatives, i = 1, . . . , k, are continuous and bounded in Rd and denote by Cck (Rd ) the subset of Cbk (Rd ) with compact support. For any path X(ยท), we use the notation โˆ†X(t) to denote the jump at time t. Given any Polish space X , we denote by P(X ) the set of probability measures on X and we endow P(X ) with the Prokhorov metric. For ฮฝ โˆˆ P(X ) and a Borel measurable map f : X โ†’ R, we often use the abbreviated notation Z f dฮฝ. ฮฝ(f ) := X The quadratic variation of a square integrable martingale is denoted by hยท, ยทi and the optional quadratic variation by [ยท, ยท]. For presentation purposes we use the time variable as the subscript for the diffusion processes. Also ฮบ1 , ฮบ2 , . . . and C1 , C2 , . . . are used as generic constants whose values might vary from place to place. 8 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Fig. 1. A schematic model of the system. 2. The controlled system in the Halfinโ€“Whitt regime. 2.1. The multi-class Markovian many-server model. Let (โ„ฆ, F, P) be a given complete probability space and all the stochastic variables introduced below are defined on it. The expectation w.r.t. P is denoted by E. We consider a multi-class Markovian many-server queueing system which consists of d customer classes and n parallel servers capable of serving all customers (see Figure 1). The system buffer is assumed to have infinite capacity. Customers of class i โˆˆ {1, . . . , d} arrive according to a Poisson process with rate ฮปni > 0. Customers enter the queue of their respective classes upon arrival if not being processed. Customers of each class are served in the first-come-first-serve (FCFS) service discipline. While waiting in queue, customers can abandon the system. The service times and patience times of customers are classdependent and both are assumed to be exponentially distributed, that is, class i customers are served at rate ยตni and renege at rate ฮณin . We assume that customer arrivals, service and abandonment of all classes are mutually independent. The Halfinโ€“Whitt regime. We study this queueing model in the Halfinโ€“ Whitt regime [or the Quality-and-Efficiency-Driven (QED) regime]. Consider a sequence of such systems indexed by n, in which the arrival rates ฮปni and the number of servers n both increase appropriately. Let rni := ฮปni /ยตni be the mean offered load of classPi customers. The traffic intensity of the nth system is given by ฯn = nโˆ’1 di=1 rni . In the Halfinโ€“Whitt regime, the ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 9 parameters are assumed to satisfy the following: as n โ†’ โˆž, (2.1) ฮปni โ†’ ฮปi > 0, ยตni โ†’ ยตi > 0, n โˆš ฮปni โˆ’ nฮปi โˆš n(ยตni โˆ’ ยตi ) โ†’ ยตฬ‚i , โ†’ ฮปฬ‚i , n ฮปi rni โ†’ ฯi := < 1, n ยตi This implies that โˆš n(1 โˆ’ ฯn ) โ†’ ฯฬ‚ := d X ฮณin โ†’ ฮณi > 0, ฯi = 1. i=1 d X ฯi ยตฬ‚i โˆ’ ฮปฬ‚i i=1 ยตi โˆˆ R. The above scaling is common in multi-class multi-server models [7, 22]. Note that we do not make any assumption on the sign of ฯฬ‚. State descriptors. Let Xin = {Xin (t) : t โ‰ฅ 0} be the total number of class i customers in the system, Qni = {Qni (t) : t โ‰ฅ 0} the number of class i customers in the queue and Zin = {Zin (t) : t โ‰ฅ 0} the number of class i customers in service. The following basic relationships hold for these processes: for each t โ‰ฅ 0 and i = 1, . . . , d, (2.2) Xin (t) = Qni (t) + Zin (t), Qni (t) โ‰ฅ 0, Zin (t) โ‰ฅ 0 and e ยท Z n (t) โ‰ค n. We can describe these processes using a collection {Ani , Sin , Rin , i = 1, . . . , d} of independent rate-1 Poisson processes. Define Aฬƒni (t) := Ani (ฮปni t),  Z t  Sฬƒin (t) := Sin ยตni Zin (s) ds , 0  Z t  n n n n Rฬƒi (t) := Ri ฮณi Qi (s) ds . 0 Then the dynamics take the form (2.3) Xin (t) = Xin (0) + Aฬƒni (t) โˆ’ Sฬƒin (t) โˆ’ Rฬƒin (t), t โ‰ฅ 0, i = 1, . . . , d. Scheduling control. Following [7, 22], we only consider work-conserving policies that are nonanticipative and allow preemption. When a server becomes free and there are no customers waiting in any queue, the server stays idle, but if there are customers of multiple classes waiting in the queue, the 10 A. ARAPOSTATHIS, A. BISWAS AND G. PANG server has to make a decision on the customer class to serve. Service preemption is allowed, that is, service of a customer class can be interrupted at any time to serve some other class of customers and the original service is resumed at a later time. A scheduling control policy determines the processes Z n , which must satisfy the constraints in (2.2) and the work-conserving constraint, that is, e ยท Z n (t) = (e ยท X n (t)) โˆง n, t โ‰ฅ 0. Define the action set An (x) as An (x) := {a โˆˆ Zd+ : a โ‰ค x and e ยท a = (e ยท x) โˆง n}. Thus, we can write Z n (t) โˆˆ An (X n (t)) for each t โ‰ฅ 0. We also assume that all controls are nonanticipative. Define the ฯƒ-fields Ftn := ฯƒ{X n (0), Aฬƒni (t), Sฬƒin (t), Rฬƒin (t) : i = 1, . . . , d, 0 โ‰ค s โ‰ค t} โˆจ N and Gtn := ฯƒ{ฮดAฬƒni (t, r), ฮดSฬƒin (t, r), ฮดRฬƒin (t, r) : i = 1, . . . , d, r โ‰ฅ 0}, where ฮดAฬƒni (t, r) := Aฬƒni (t + r) โˆ’ Aฬƒni (t),  Z t  n n n n n ฮดSฬƒi (t, r) := Si ยตi Zi (s) ds + ยตi r โˆ’ Sฬƒin (t), 0 ฮดRฬƒin (t, r) := Rin  ฮณin Z 0 t Qni (s) ds + ฮณin r  โˆ’ Rฬƒin (t), and N is the collection of all P-null sets. The filtration {Ftn , t โ‰ฅ 0} represents the information available up to time t while Gtn contains the information about future increments of the processes. We say that a working-conserving control policy is admissible if: (i) Z n (t) is adapted to Ftn , (ii) Ftn is independent of Gtn at each time t โ‰ฅ 0, (iii) for each i = 1, . . . , d, and t โ‰ฅ 0, the process ฮดSฬƒin (t, ยท) agrees in law with Sin (ยตni ยท), and the process ฮดRฬƒin (t, ยท) agrees in law with Rin (ฮณin ยท). We denote the set of all admissible control policies (Z n , F n , G n ) by Un . 2.2. The ergodic control problem in the Halfinโ€“Whitt regime. Define the diffusion-scaled processes Xฬ‚ n = (Xฬ‚1n , . . . , Xฬ‚dn )T , Qฬ‚n = (Qฬ‚n1 , . . . , Qฬ‚nd )T and Zฬ‚ n = (Zฬ‚1n , . . . , Zฬ‚dn )T , ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 11 by (2.4) 1 Xฬ‚in (t) := โˆš (Xin (t) โˆ’ ฯi nt), n 1 Qฬ‚ni (t) := โˆš Qni (t), n 1 Zฬ‚in (t) := โˆš (Zin (t) โˆ’ ฯi nt) n for t โ‰ฅ 0. By (2.3), we can express Xฬ‚in as Z t Z t n n n n n n Xฬ‚i (t) = Xฬ‚i (0) + โ„“i t โˆ’ ยตi Zฬ‚i (s) ds โˆ’ ฮณi Qฬ‚ni (s) ds 0 0 (2.5) n n n + Mฬ‚A,i (t) โˆ’ Mฬ‚S,i (t) โˆ’ Mฬ‚R,i (t), where โ„“n = (โ„“n1 , . . . , โ„“nd )T is defined as 1 โ„“ni := โˆš (ฮปni โˆ’ ยตni ฯi n), n and (2.6) 1 n Mฬ‚A,i (t) := โˆš (Ani (ฮปni t) โˆ’ ฮปni t), n   Z t   Z t 1 n n n n n n Mฬ‚S,i (t) := โˆš Si ยตi Zi (s) ds โˆ’ ยตi Zi (s) ds , n 0 0   Z t   Z t 1 n n n n n n Mฬ‚R,i (t) := โˆš Ri ฮณi Qi (s) ds โˆ’ ฮณi Qi (s) ds n 0 0 are square integrable martingales w.r.t. the filtration {Ftn }. Note that โˆš 1 (ฮปฬ‚i โˆ’ ฯi ยตฬ‚i ) . โ„“ni = โˆš (ฮปni โˆ’ ฮปi n) โˆ’ ฯi n(ยตni โˆ’ ยตi ) โˆ’โ†’ โ„“i := nโ†’โˆž n ยตi Define S := {u โˆˆ Rd+ : e ยท u = 1}. For Z n โˆˆ Un we define, for t โ‰ฅ 0 and for adapted Uฬ‚ n (t) โˆˆ S, (2.7) Qฬ‚n (t) := (e ยท Xฬ‚ n (t))+ Uฬ‚ n (t), Zฬ‚ n (t) := Xฬ‚ n (t) โˆ’ (e ยท Xฬ‚ n (t))+ Uฬ‚ n (t). If Qฬ‚n (t) = 0, we define Uฬ‚ n (t) := ed = (0, . . . , 0, 1)T . Thus, Uฬ‚in represents the fraction of class-i customers in the queue when the total queue size is positive. As we show later, it is convenient to view Uฬ‚ n (t) as the control. Note that the controls are nonanticipative and preemption is allowed. 12 A. ARAPOSTATHIS, A. BISWAS AND G. PANG 2.2.1. The cost minimization problem. We next introduce the running cost function for the control problem. Let r : Rd+ โ†’ R+ be a given function satisfying (2.8) c1 |x|m โ‰ค r(x) โ‰ค c2 (1 + |x|m ) for some m โ‰ฅ 1, and some positive constants ci , i = 1, 2. We also assume that r is locally Lipschitz. This assumption includes linear and convex running cost functions. For example, if we let hi be the holding cost rate for class i customers, then some of the typical running cost functions are the following: r(x) = d X hi xm i , m โ‰ฅ 1. i=1 These running cost functions evidently satisfy the condition in (2.8). Given the initial state X n (0) and a work-conserving scheduling policy n Z โˆˆ Un , we define the diffusion-scaled cost function as  Z T 1 n n n (2.9) r(Qฬ‚ (s)) ds , J(Xฬ‚ (0), Zฬ‚ ) := lim sup E T โ†’โˆž T 0 where the running cost function r satisfies (2.8). Note that the running cost is defined using the scaled version of Z n . Then the associated cost minimization problem becomes (2.10) Vฬ‚ n (Xฬ‚ n (0)) := ninf n J(Xฬ‚ n (0), Zฬ‚ n ). Z โˆˆU We refer to Vฬ‚ n (Xฬ‚ n (0)) as the diffusion-scaled value function given the initial state Xฬ‚ n (0) in the nth system. From (2.7), it is easy to see that by redefining r as r(x, u) = r((e ยท x)+ u) we can rewrite the control problem as หœ Xฬ‚ n (0), Uฬ‚ n ), Vฬ‚ n (Xฬ‚ n (0)) = inf J( where (2.11) หœ Xฬ‚ n (0), Uฬ‚ n ) := lim sup 1 E J( T โ†’โˆž T Z T 0  r(Xฬ‚ n (s), Uฬ‚ n (s)) ds , and the infimum is taken over all admissible pairs (Xฬ‚ n , Uฬ‚ n ) satisfying (2.7). For simplicity, we assume that the initial condition Xฬ‚ n (0) is deterministic and Xฬ‚ n (0) โ†’ x as n โ†’ โˆž for some x โˆˆ Rd . ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 13 2.2.2. The limiting controlled diffusion process. As in [7, 22], one formally deduces that, provided Xฬ‚ n (0) โ†’ x, there exists a limit X for Xฬ‚ n on every finite time interval, and the limit process X is a d-dimensional diffusion process with independent components, that is, (2.12) dXt = b(Xt , Ut ) dt + ฮฃ dWt, with initial condition X0 = x. In (2.12), the drift b(x, u) : Rd ร— S โ†’ Rd takes the form (2.13) with b(x, u) = โ„“ โˆ’ R(x โˆ’ (e ยท x)+ u) โˆ’ (e ยท x)+ ฮ“u, โ„“ := (โ„“1 , . . . , โ„“d )T , R := diag(ยต1 , . . . , ยตd ), ฮ“ := diag(ฮณ1 , . . . , ฮณd ). The control Ut lives in S and is nonanticipative, W (t) is a d-dimensional standard Wiener process independent of the initial condition X0 = x, and the covariance matrix is given by ฮฃฮฃT = diag(2ฮป1 , . . . , 2ฮปd ). A formal derivation of the drift in (2.13) can be obtained from (2.5) and (2.7). A detailed description of equation (2.12) and related results are given in Section 3. Let U be the set of all admissible controls for the diffusion model (for a definition see Section 3). 2.2.3. The ergodic control problem in the diffusion scale. Define rฬƒ : Rd+ ร— Rd+ โ†’ R+ by rฬƒ(x, u) := r((e ยท x)+ u), where r is the same function as in (2.9). In analogy with (2.11) we define the ergodic cost associated with the controlled diffusion process X and the running cost function rฬƒ(x, u) as  Z T 1 U J(x, U ) := lim sup Ex rฬƒ(Xt , Ut ) dt , U โˆˆ U. T โ†’โˆž T 0 We consider the ergodic control problem (2.14) ฬบโˆ— (x) = inf J(x, U ). U โˆˆU We call ฬบโˆ— (x) the optimal value at the initial state x for the controlled diffusion process X. It is shown later that ฬบโˆ— (x) is independent of x. A detailed treatment and related results corresponding to the ergodic control problem are given in Section 3. We next state the main results of this section, the proof of which can be found in Section 5. 14 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Theorem 2.1. Let Xฬ‚ n (0) โ†’ x โˆˆ Rd as n โ†’ โˆž. Also assume that (2.1) and (2.8) hold. Then lim inf Vฬ‚ n (Xฬ‚ n (0)) โ‰ฅ ฬบโˆ— (x), nโ†’โˆž where ฬบโˆ— (x) is given by (2.14). Theorem 2.2. Suppose the assumptions of Theorem 2.1 hold. In addition, assume that r in (2.9) is convex. Then lim sup Vฬ‚ n (Xฬ‚ n (0)) โ‰ค ฬบโˆ— (x). nโ†’โˆž Thus, we conclude that for any convex running cost function r, Theorems 2.1 and 2.2 establish the asymptotic convergence of the ergodic control problem for the queueing model. 3. A broad class of ergodic control problems for diffusions. 3.1. The controlled diffusion model. The dynamics are modeled by a controlled diffusion process X = {Xt , t โ‰ฅ 0} taking values in the d-dimensional Euclidean space Rd , and governed by the Itoฬ‚ stochastic differential equation (3.1) dXt = b(Xt , Ut ) dt + ฯƒ(Xt ) dWt . All random processes in (3.1) live in a complete probability space (โ„ฆ, F, P). The process W is a d-dimensional standard Wiener process independent of the initial condition X0 . The control process U takes values in a compact, metrizable set U, and Ut (ฯ‰) is jointly measurable in (t, ฯ‰) โˆˆ [0, โˆž) ร— โ„ฆ. Moreover, it is nonanticipative: for s < t, Wt โˆ’ Ws is independent of Fs := the completion of ฯƒ{X0 , Ur , Wr , r โ‰ค s} relative to (F, P). Such a process U is called an admissible control, and we let U denote the set of all admissible controls. We impose the following standard assumptions on the drift b and the diffusion matrix ฯƒ to guarantee existence and uniqueness of solutions to equation (3.1). (A1) Local Lipschitz continuity: The functions b = [b1 , . . . , bd ]T : Rd ร— U โ†’ Rd and ฯƒ = [ฯƒ ij ] : Rd โ†’ Rdร—d are locally Lipschitz in x with a Lipschitz constant CR > 0 depending on R > 0. In other words, for all x, y โˆˆ BR and u โˆˆ U, |b(x, u) โˆ’ b(y, u)| + kฯƒ(x) โˆ’ ฯƒ(y)k โ‰ค CR |x โˆ’ y|. We also assume that b is continuous in (x, u). ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 15 (A2) Affine growth condition: b and ฯƒ satisfy a global growth condition of the form |b(x, u)|2 + kฯƒ(x)k2 โ‰ค C1 (1 + |x|2 ) โˆ€(x, u) โˆˆ Rd ร— U, where kฯƒk2 := trace(ฯƒฯƒ T ). (A3) Local nondegeneracy: For each R > 0, it holds that d X i,j=1 โˆ’1 2 |ฮพ| aij (x)ฮพi ฮพj โ‰ฅ CR โˆ€x โˆˆ BR , for all ฮพ = (ฮพ1 , . . . , ฮพd )T โˆˆ Rd , where a := ฯƒฯƒ T . In integral form, (3.1) is written as Z t Z t (3.2) ฯƒ(Xs ) dWs . b(Xs , Us ) ds + Xt = X0 + 0 0 The third term on the right-hand side of (3.2) is an Itoฬ‚ stochastic integral. We say that a process X = {Xt (ฯ‰)} is a solution of (3.1), if it is Ft -adapted, continuous in t, defined for all ฯ‰ โˆˆ โ„ฆ and t โˆˆ [0, โˆž), and satisfies (3.2) for all t โˆˆ [0, โˆž) a.s. It is well known that under (A1)โ€“(A3), for any admissible control there exists a unique solution of (3.1) [1], Theorem 2.2.4. We define the family of operators Lu : C 2 (Rd ) โ†’ C(Rd ), where u โˆˆ U plays the role of a parameter, by (3.3) Lu f (x) := 12 aij (x)โˆ‚ij f (x) + bi (x, u)โˆ‚i f (x), u โˆˆ U. We refer to Lu as the controlled extended generator of the diffusion. In โˆ‚ (3.3) and elsewhere in this paper, we have adopted the notation โˆ‚i := โˆ‚x i 2 and โˆ‚ij := โˆ‚xโˆ‚i โˆ‚xj . We also use the standard summation rule that repeated subscripts and superscripts are summed from 1 through d. In other words, the right-hand side of (3.3) stands for d d X 1 X ij โˆ‚f โˆ‚2f bi (x, u) a (x) (x) + (x). 2 โˆ‚xi โˆ‚xj โˆ‚xi i=1 i,j=1 Of fundamental importance in the study of functionals of X is Itoฬ‚โ€™s formula. For f โˆˆ C 2 (Rd ) and with Lu as defined in (3.3), it holds that Z t LUs f (Xs ) ds + Mt , (3.4) a.s., f (Xt ) = f (X0 ) + 0 where Mt := Z 0 t hโˆ‡f (Xs ), ฯƒ(Xs ) dWs i 16 A. ARAPOSTATHIS, A. BISWAS AND G. PANG is a local martingale. Krylovโ€™s extension of Itoฬ‚โ€™s formula [27], page 122, d extends (3.4) to functions f in the local Sobolev space W2,p loc (R ), p โ‰ฅ d. Recall that a control is called Markov if Ut = v(t, Xt ) for a measurable map v : R+ ร— Rd โ†’ U, and it is called stationary Markov if v does not depend on t, that is, v : Rd โ†’ U. Correspondingly, (3.1) is said to have a strong solution if given a Wiener process (Wt , Ft ) on a complete probability space (โ„ฆ, F, P), there exists a process X on (โ„ฆ, F, P), with X0 = x0 โˆˆ Rd , which is continuous, Ft -adapted, and satisfies (3.2) for all t a.s. A strong solution is called unique, if any two such solutions X and X โ€ฒ agree P-a.s., when viewed as elements of C([0, โˆž), Rd ). It is well known that under assumptions (A1)โ€“(A3), for any Markov control v, (3.1) has a unique strong solution [20]. Let USM denote the set of stationary Markov controls. Under v โˆˆ USM , the process X is strong Markov, and we denote its transition function by Pvt (x, ยท). It also follows from the work of [8, 31] that under v โˆˆ USM , the transition probabilities of X have densities which are locally Hoฬˆlder continuous. Thus, Lv defined by Lv f (x) := 12 aij (x)โˆ‚ij f (x) + bi (x, v(x))โˆ‚i f (x), v โˆˆ USM , for f โˆˆ C 2 (Rd ), is the generator of a strongly-continuous semi-group on Cb (Rd ), which is strong Feller. We let Pvx denote the probability measure and Evx the expectation operator on the canonical space of the process under the control v โˆˆ USM , conditioned on the process X starting from x โˆˆ Rd at t = 0. We need the following definition. Definition 3.1. A function h : Rd ร— U โ†’ R is called inf-compact on a set A โŠ‚ Rd if the set Aฬ„ โˆฉ {x : minuโˆˆU h(x, u) โ‰ค ฮฒ} is compact (or empty) in Rd for all ฮฒ โˆˆ R. When this property holds for A โ‰ก Rd , then we simply say that h is inf-compact. Recall that control v โˆˆ USM is called stable if the associated diffusion is positive recurrent. We denote the set of such controls by USSM , and let ยตv denote the unique invariant probability measure on Rd for the diffusion under the control v โˆˆ USSM . We also let M := {ยตv : v โˆˆ USSM }. Recall that v โˆˆ USSM if and only if there exists an inf-compact function V โˆˆ C 2 (Rd ), a bounded domain D โŠ‚ Rd , and a constant ฮต > 0 satisfying Lv V(x) โ‰ค โˆ’ฮต โˆ€x โˆˆ D c . We denote by ฯ„ (A) the first exit time of a process {Xt , t โˆˆ R+ } from a set A โŠ‚ Rd , defined by ฯ„ (A) := inf{t > 0 : Xt โˆˆ / A}. ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 17 The open ball of radius R in Rd , centered at the origin, is denoted by BR , c ). and we let ฯ„R := ฯ„ (BR ), and ฯ„ฬ†R := ฯ„ (BR We assume that the running cost function r(x, u) is nonnegative, continuous and locally Lipschitz in its first argument uniformly in u โˆˆ U. Without loss of generality, we let ฮบR be a Lipschitz constant of r(ยท, u) over BR . In summary, we assume that (A4) r : Rd ร—U โ†’ R+ is continuous and satisfies, for some constant CR > 0 |r(x, u) โˆ’ r(y, u)| โ‰ค CR |x โˆ’ y| โˆ€x, y โˆˆ BR , โˆ€u โˆˆ U, and all R > 0. In general, U may not be a convex set. It is therefore often useful to enlarge the control set to P(U). For any v(du) โˆˆ P(U) we can redefine the drift and the running cost as Z Z (3.5) bฬ„(x, v) := b(x, u)v(du) and rฬ„(x, v) := r(x, u)v(du). U U It is easy to see that the drift and running cost defined in (3.5) satisfy all the aforementioned conditions (A1)โ€“(A4). In what follows, we assume that all the controls take values in P(U). These controls are generally referred to as relaxed controls. We endow the set of relaxed stationary Markov controls with the following topology: vn โ†’ v in USM if and only if Z Z Z Z f (x) g(x, u)v(du|x) dx f (x) g(x, u)vn (du|x) dx โˆ’โ†’ Rd nโ†’โˆž Rd U L1 (Rd ) L2 (Rd ) U (Rd for all f โˆˆ โˆฉ and g โˆˆ Cb ร— U). Then USM is a compact metric space under this topology [1], Section 2.4. We refer to this topology as the topology of Markov controls. A control is said to be precise if it takes value in U. It is easy to see that any precise control Ut can also be understood as a relaxed control by Ut (du) = ฮดUt . Abusing the notation, we denote the drift and running cost by b and r, respectively, and the action of a relaxed control on them is understood as in (3.5). 3.2. Structural assumptions. Assumptions 3.1 and 3.2, described below, are in effect throughout the analysis, unless otherwise stated. Assumption 3.1. For some open set K โŠ‚ Rd , the following hold: (i) The running cost r is inf-compact on K. (ii) There exist inf-compact functions V โˆˆ C 2 (Rd ) and h โˆˆ C(Rd ร— U), such that (3.6) Lu V(x) โ‰ค 1 โˆ’ h(x, u) โˆ€(x, u) โˆˆ Kc ร— U, Lu V(x) โ‰ค 1 + r(x, u) โˆ€(x, u) โˆˆ K ร— U. 18 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Without loss of generality, we assume that V and h are nonnegative. Remark 3.1. In the statement of Assumption 3.1, we refrain from using any constants in the interest of notational economy. There is no loss of generality in doing so, since the functions V and h can always be scaled to eliminate unnecessary constants. The next assumption is not a structural one, but rather the necessary requirement that the value of the ergodic control problem is finite. Otherwise, the problem is vacuous. For U โˆˆ U, define  Z T 1 U ฬบU (x) := lim sup Ex (3.7) r(Xs , Us ) ds . T โ†’โˆž T 0 Assumption 3.2. x โˆˆ Rd . There exists U โˆˆ U such that ฬบU (x) < โˆž for some Assumption 3.2 alone does not imply that ฬบv < โˆž for some v โˆˆ USSM . However, when combined with Assumption 3.1, this is the case as the following lemma asserts. Lemma 3.1. Let Assumptions 3.1 and 3.2 hold. Then there exists u0 โˆˆ USSM such that ฬบu0 < โˆž. Moreover, there exists a nonnegative inf-compact function V0 โˆˆ C 2 (Rd ), and a positive constant ฮท such that (3.8) Lu0 V0 (x) โ‰ค ฮท โˆ’ r(x, u0 (x)) โˆ€x โˆˆ Rd . Conversely, if (3.8) holds, then Assumption 3.2 holds. Proof. The first part of the result follows from Theorem 3.1(e) and (3.23) whereas the converse part follows from Lemma 3.2. These proofs are stated later in the paper.  Remark 3.2. There is no loss of generality in using only the constant ฮท in Assumption 3.2, since V0 can always be scaled to achieve this. We also observe that for K = Rd the problem reduces to an ergodic control problem with near-monotone cost, and for K = โˆ… we obtain an ergodic control problem under a uniformly stable controlled diffusion. 3.3. Piecewise linear controlled diffusions. The controlled diffusion process in (2.12) belongs to a large class of controlled diffusion processes, called piecewise linear controlled diffusions [14]. We describe this class of controlled diffusions and show that it satisfies the assumptions in Section 3.2. ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 19 Definition 3.2. A square matrix R is said to be an M -matrix if it can be written as R = sI โˆ’ N for some s > 0 and nonnegative matrix N with property that ฯ(N ) โ‰ค s, where ฯ(N ) denotes the spectral radius of N . Let ฮ“ = [ฮณ ij ] be a given matrix whose diagonal elements are positive, = 0 for i = 1, . . . , d โˆ’ 1, and the remaining elements are in R. (Note that for the queueing model, ฮ“ is a positive diagonal matrix. Our results below hold for the more general ฮ“.) Let โ„“ โˆˆ Rd and R be a nonsingular M -matrix. Define ฮณ id (3.9) b(x, u) := โ„“ โˆ’ R(x โˆ’ (e ยท x)+ u) โˆ’ (e ยท x)+ ฮ“u, with u โˆˆ S := {u โˆˆ Rd+ : e ยท u = 1}. Assume that eT R โ‰ฅ 0T . We consider the following controlled diffusion in Rd : (3.10) dXt = b(Xt , Ut ) dt + ฮฃ dWt, where ฮฃ is a constant matrix such that ฮฃฮฃT is invertible. It is easy to see that (3.10) satisfies conditions (A1)โ€“(A3). Analysis of these types of diffusion approximations is an established tradition in queueing systems. It is often easy to deal with the limiting object and it also helps to obtain information on the behavior of the actual queueing model. We next introduce the running cost function. Let r : Rd ร— S โ†’ [0, โˆž) be locally Lipschitz with polynomial growth and (3.11) c1 [(e ยท x)+ ]m โ‰ค r(x, u) โ‰ค c2 (1 + [(e ยท x)+ ]m ), for some m โ‰ฅ 1 and positive constants c1 and c2 that do not depend on u. Some typical examples of such running costs are + m r(x, u) = [(e ยท x) ] d X i=1 hi um i with m โ‰ฅ 1, for some positive vector (h1 , . . . , hd )T . Remark 3.3. The controlled dynamics in (3.9) and running cost in (3.11) are clearly more general than the model described in Section 2.2. In (3.10), X denotes the diffusion approximation for the number customers in the system in the Halfinโ€“Whitt regime and its ith component X i denotes the diffusion approximation of the number of class i customers. Therefore, (e ยท X)+ denotes the total number of customers in the queue. For R and ฮ“ diagonal as in (2.13), the diagonal entries of R and ฮ“ denote the service 20 A. ARAPOSTATHIS, A. BISWAS AND G. PANG and abandonment rates, respectively, of the customer classes. The ith coordinate of U denotes the fraction of class-i customers waiting in the queue. Therefore, the vector-valued process Xt โˆ’ (e ยท Xt )+ Ut denotes the diffusion approximation of the numbers of customers in service from different customer classes. Proposition 3.1. Let b and r be given by (3.9) and (3.11), respectively. Then (3.10) satisfies Assumptions 3.1 and 3.2, with h(x) = c0 |x|m and (3.12) K := {x : ฮด|x| < (e ยท x)+ } for appropriate positive constants c0 and ฮด. Proof. We recall that if R is a nonsingular M -matrix, then there exists a positive definite matrix Q such that QR + RT Q is strictly positive definite [14]. Therefore, for some positive constant ฮบ0 it holds that 2 ฮบ0 |y|2 โ‰ค y T [QR + RT Q]y โ‰ค ฮบโˆ’1 0 |y| โˆ€y โˆˆ Rd . The set K in (3.12), where ฮด > 0 is chosen later, is an open convex cone, and the running cost function r is inf-compact on K. Let V be a nonnegative function in C 2 (Rd ) such that V(x) = [xT Qx]m/2 for |x| โ‰ฅ 1, where the constant m is as in (3.11). Let |x| โ‰ฅ 1 and u โˆˆ S. Then m[xT Qx]m/2โˆ’1 T x [QR + RT Q]x 2 + m[xT Qx]m/2โˆ’1 Qx ยท (R โˆ’ ฮ“)(e ยท x)+ u   m/2โˆ’1 ฮบ0 T 2 + โ‰ค โ„“ ยท โˆ‡V(x) โˆ’ m[x Qx] |x| โˆ’ C|x|(e ยท x) 2 โˆ‡V(x) ยท b(x, u) = โ„“ ยท โˆ‡V(x) โˆ’ ฮบ0 , then on Kc โˆฉ {|x| โ‰ฅ 1} for some positive constant C. If we choose ฮด = 4C we have the estimate mฮบ0 T (3.13) [x Qx]m/2โˆ’1 |x|2 . โˆ‡V(x) ยท b(x, u) โ‰ค โ„“ ยท โˆ‡V(x) โˆ’ 4 Note that โ„“ ยท V is globally bounded for m = 1. For any m โˆˆ (1, โˆž), it follows by (3.13) that mฮบ0 T โˆ‡V(x) ยท b(x, u) โ‰ค m(โ„“T Qx)[xT Qx]m/2โˆ’1 โˆ’ [x Qx]m/2โˆ’1 |x|2 4 (3.14) m/2 T mฮบ0 (ฮป(Q))m/2 m m|โ„“ Q|(ฮป(Q)) |x|mโˆ’1 โˆ’ |x| โ‰ค ฮป(Q) 4ฮป(Q) for x โˆˆ Kc โˆฉ {|x| โ‰ฅ 1}, where ฮป(Q) and ฮป(Q) are the smallest and largest eigenvalues of Q, respectively. We use Youngโ€™s inequality |a|m m โˆ’ 1 m/(mโˆ’1) + |b| , a, b โ‰ฅ 0, |ab| โ‰ค m m ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 21 in (3.14) to obtain the bound (3.15) โˆ‡V(x) ยท b(x, u) โ‰ค ฮบ1 โˆ’ mฮบ0 (ฮป(Q))m/2 |x|m 8ฮป(Q) for some constant ฮบ1 > 0. A similar calculation shows for some constant ฮบ2 > 0 it holds that (3.16) โˆ‡V(x) ยท b(x, u) โ‰ค ฮบ2 (1 + [(e ยท x)+ ]m ) โˆ€x โˆˆ K โˆฉ {|x| โ‰ฅ 1}. Also note that we can select ฮบ3 > 0 large enough such that (3.17) 1 mฮบ0 |trace(ฮฃฮฃT โˆ‡2 V(x))| โ‰ค ฮบ3 + (ฮป(Q))m/2 |x|m . 2 16ฮป(Q) Hence, by (3.13)โ€“(3.17) there exists ฮบ4 > 0 such that mฮบ0 (ฮป(Q))m/2 |x|m IKc (x) + ฮบ2 [(e ยท x)+ ]m IK (x) (3.18) Lu V(x) โ‰ค ฮบ4 โˆ’ 16ฮป(Q) for all x โˆˆ Rd . It is evident that we can scale V, by multiplying it with a constant, so that (3.18) takes the form (3.19) Lu V(x) โ‰ค 1 โˆ’ c0 |x|m IKc (x) + c1 [(e ยท x)+ ]m IK (x) โˆ€x โˆˆ Rd . By (3.11), the running cost r is inf-compact on K. It then follows from (3.11) and (3.19) that (3.6) is satisfied with h(x) := c0 |x|m . We next show that (3.10) satisfies Assumption 3.2. Let u0 (ยท) โ‰ก ed = (0, . . . , 0, 1)T . Then we can write (3.10) as (3.20) dXt = (โ„“ โˆ’ R(Xt โˆ’ (e ยท Xt )+ u0 ) โˆ’ (e ยท x)+ ฮ“u0 ) dt + ฮฃ dWt. It is shown in [14] that the solution Xt in (3.20) is positive recurrent and, therefore, u0 is a stable Markov control. This is done by finding a suitable Lyapunov function. In particular, in [14], Theorem 3, it is shown that there exists a positive definite matrix Qฬƒ such that if we define (3.21) ฯˆ(x) := (e ยท x)2 + ฮบฬƒ[x โˆ’ ed ฯ†(e ยท x)]T Qฬƒ[x โˆ’ ed ฯ†(e ยท x)], for some suitably chosen constant ฮบฬƒ and ๏ฃฑ ๏ฃฒ y, ฯ†(y) = โˆ’ 21 ฮดฬƒ, ๏ฃณ smooth, a function ฯ† โˆˆ C 2 (R), given by if y โ‰ฅ 0, if y โ‰ค โˆ’ฮดฬƒ, if โˆ’ ฮดฬƒ < y < 0, where ฮดฬƒ > 0 is a suitable constant and 0 โ‰ค ฯ†โ€ฒ (y) โ‰ค 1, then it holds that (3.22) Lu0 ฯˆ(x) โ‰ค โˆ’ฮบฬƒ1 |x|2 , 22 A. ARAPOSTATHIS, A. BISWAS AND G. PANG for |x| large enough and positive constant ฮบฬƒ1 . We define V0 := eaฯˆ where a is to be determined later. Note that |โˆ‡ฯˆ(x)| โ‰ค ฮบฬƒ2 (1 + |x|) for some constant ฮบฬƒ2 > 0. Hence, a straightforward calculation shows that if we choose a small enough, then for some constant ฮบฬƒ3 > 0 it holds that Lu0 V0 (x) โ‰ค (โˆ’ฮบฬƒ1 a|x|2 + a2 kฮฃk2 ฮบฬƒ2 (1 + |x|)2 )V0 (x) โ‰ค โˆ’ฮบฬƒ3 |x|2 V0 (x), for all |x| large enough. Since V0 (x) > [(e ยท x)+ ]m , m โ‰ฅ 1, for all large enough |x| we see that V0 satisfies (3.8) with control u0 . Hence, Assumption 3.2 holds by Lemma 3.1.  3.4. Existence of optimal controls. Definition 3.3. Recall the definition of ฬบU in (3.7). For ฮฒ > 0, we define Uฮฒ := {U โˆˆ U : ฬบU (x) โ‰ค ฮฒ for some x โˆˆ Rd }. We also let UฮฒSM := Uฮฒ โˆฉ USM , and ฬบห†โˆ— := inf{ฮฒ > 0 : Uฮฒ 6= โˆ…}, ฬบโˆ— := inf{ฮฒ > 0 : UฮฒSM 6= โˆ…}, ฬบหœโˆ— := inf{ฯ€(r) : ฯ€ โˆˆ G}, where  Z d G := ฯ€ โˆˆ P(R ร— U) : Rd ร—U u L f (x)ฯ€(dx, du) = 0 โˆ€f โˆˆ Ccโˆž (Rd )  , and Lu f (x) is given by (3.3). It is well known that G is the set of ergodic occupation measures of the controlled process in (3.1), and that G is a closed and convex subset of P(Rd ร— U) [1], Lemmas 3.2.2 and 3.2.3. We use the notation ฯ€v when we want to indicate the ergodic occupation measure associated with the control v โˆˆ USSM . In other words, ฯ€v (dx, du) := ยตv (dx)v(du|x). Lemma 3.2. If (3.8) holds for some V0 and u0 , then we have ฯ€u0 (r) โ‰ค ฮท. Therefore, ฬบห†โˆ— < โˆž. Proof. Let (Xt , u0 (Xt )) be the solution of (3.1). Recall that ฯ„R is the first exit time from BR for R > 0. Then by Itoฬ‚โ€™s formula  Z T โˆงฯ„R u0 u0 Ex [V0 (XT โˆงฯ„R )] โˆ’ V0 (x) โ‰ค ฮทT โˆ’ Ex r(Xs , u0 (Xs )) ds . 0 ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 23 Therefore, letting R โ†’ โˆž and using Fatouโ€™s lemma, we obtain the bound  Z T u0 Ex r(Xs , u0 (Xs )) ds โ‰ค ฮทT + V0 (x) โˆ’ min V0 , Rd 0 and thus 1 lim sup Eux0 T โ†’โˆž T Z T 0  r(Xs , u0 (Xs )) ds โ‰ค ฮท.  In the analysis, we use a function hฬƒ โˆˆ C(Rd ร— U) which, roughly speaking, is of the same order as r in K ร— U and lies between r and a multiple of r + h on Kc ร— U, with K as in Assumption 3.1. The existence of such a function is guaranteed by Assumption 3.1 as the following lemma shows. Lemma 3.3. Define H := (K ร— U) โˆช {(x, u) โˆˆ Rd ร— U : r(x, u) > h(x, u)}, where K is the open set in Assumption 3.1. Then there exists an inf-compact function hฬƒ โˆˆ C(Rd ร— U) which is locally Lipschitz in its first argument uniformly w.r.t. its second argument, and satisfies (3.23) r(x, u) โ‰ค hฬƒ(x, u) โ‰ค k0 (1 + h(x, u)IHc (x, u) + r(x, u)IH (x, u)) 2 for all (x, u) โˆˆ Rd ร— U, and for some positive constant k0 โ‰ฅ 2. Moreover, (3.24) Lu V(x) โ‰ค 1 โˆ’ h(x, u)IHc (x, u) + r(x, u)IH (x, u) for all (x, u) โˆˆ Rd ร— U, where V is the function in Assumption 3.1. Proof. If f (x, u) denotes the right-hand side of (3.23), with k0 = 4, then f (x, u) โˆ’ r(x, u) > h(x, u)IHc (x, u) + r(x, u)IH (x, u) โ‰ฅ h(x, u)IKc (x) + r(x, u)IK (x), since r(x, u) > h(x, u) on H \ (K ร— U). Therefore, by Assumption 3.1, the set {(x, u) : f (x, u) โˆ’ r(x, u) โ‰ค n} is bounded in Rd ร— U for every n โˆˆ N. Hence, there exists an increasing sequence of open balls Dn , n = 1, 2, . . . , centered at 0 in Rd such that f (x, u) โˆ’ r(x, u) โ‰ฅ n for all (x, u) โˆˆ Dnc ร— U. Let g : Rd โ†’ R be any nonnegative smooth function such that n โˆ’ 1 โ‰ค g(x) โ‰ค n for x โˆˆ Dn+1 \ Dn , n = 1, 2, . . . , and g(x) = 0 on D1 . Clearly, hฬƒ := r + g is continuous, inf-compact, locally Lipschitz in its first argument, and satisfies (3.23). That (3.24) holds is clear from (3.6) and the fact that H โЇ K ร— U.  24 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Remark 3.4. It is clear from the proof of Lemma 3.3 that we could fix the value of the constant k0 in (3.23), say k0 = 4. However, we keep the variable k0 because this provides some flexibility in the choice of hฬƒ, and also in order to be able to trace it along the different calculations. Remark 3.5. Note that if h โ‰ฅ r and r is inf-compact, then H = K ร— U and hฬƒ := r satisfies (3.23). Note also, that in view of (3.11) and Proposition 3.1, for the multi-class queueing model we have r(x, u) โ‰ค c2 (1 + [(e ยท x)+ ]m ) c2 dmโˆ’1 (1 + (1 โˆง c0 )|x|m ) 1 โˆง c0   c2 dmโˆ’1 1 + m m c โ‰ค 1 + c0 |x| IK (x) + m [(e ยท x) ] IK (x) 1 โˆง c0 ฮด   mโˆ’1 1 c2 d r(x, u)IK (x) 1 + h(x)IKc (x) + โ‰ค 1 โˆง c0 c1 ฮดm โ‰ค โ‰ค โ‰ค c2 dmโˆ’1 (1 + h(x)IKc (x) + r(x, u)IK (x)) 1 โˆง c0 โˆง c1 ฮดm c2 dmโˆ’1 (1 + h(x)IHc (x, u) + r(x, u)IH (x, u)). 1 โˆง c0 โˆง c1 ฮดm Therefore, hฬƒ(x, u) := c2 + c2 dmโˆ’1 |x|m satisfies (3.23). Remark 3.6. We often use the fact that if g โˆˆ C(Rd ร— U) is bounded below, then the map P(Rd ร— U) โˆ‹ ฮฝ 7โ†’ ฮฝ(g) is lower semi-continuous. This easily follows from two facts: (a) g can be expressed as an increasing limit of bounded continuous functions, and (b) if g is bounded and continuous, then ฯ€ 7โ†’ ฯ€(g) is continuous. Theorem 3.1. Let ฮฒ โˆˆ (ห† ฬบโˆ— , โˆž). Then: (a) For all U โˆˆ Uฮฒ and x โˆˆ Rd such that ฬบU (x) โ‰ค ฮฒ, then Z T  1 U lim sup Ex (3.25) hฬƒ(Xs , Us ) ds โ‰ค k0 (1 + ฮฒ). tโ†’โˆž T 0 (b) ฬบห†โˆ— = ฬบโˆ— = ฬบหœโˆ— . (c) For any ฮฒ โˆˆ (ฬบโˆ— , โˆž), we have UฮฒSM โŠ‚ USSM . (d) The set of invariant probability measures Mฮฒ corresponding to controls in UฮฒSM satisfies Z hฬƒ(x, v(x))ยตv (dx) โ‰ค k0 (1 + ฮฒ) โˆ€ยตv โˆˆ Mฮฒ . Rd ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 25 In particular, UฮฒSM is tight in P(Rd ). (e) There exists (Vฬƒ , ฬบหœ) โˆˆ C 2 (Rd ) ร— R+ , with Vฬƒ inf-compact, such that (3.26) min[Lu Vฬƒ (x) + hฬƒ(x, u)] = ฬบหœ. uโˆˆU Proof. Using Itoฬ‚โ€™s formula, it follows by (3.24) that (3.27) 1 U (E [V(XT โˆงฯ„R )] โˆ’ V(x)) T x Z T โˆงฯ„R  1 U h(Xs , Us )IHc (Xs , Us ) ds โ‰ค 1 โˆ’ Ex T 0  Z T โˆงฯ„R 1 U + Ex r(Xs , Us )IH (Xs , Us ) ds . T 0 Since V is inf-compact, (3.27) together with (3.23) implies that  Z T 1 U 2 lim sup E hฬƒ(Xs , Us ) ds k0 T โ†’โˆž T x 0 (3.28)  Z T 1 U โ‰ค 2 + 2 lim sup Ex r(Xs , Us ) ds . T โ†’โˆž T 0 Part (a) then follows from (3.28). Now fix U โˆˆ Uฮฒ and x โˆˆ Rd such that ฬบU (x) โ‰ค ฮฒ. The inequality in (3.25) U : t โ‰ฅ 1}, defined by implies that the set of mean empirical measures {ฮถx,t  Z t 1 U U IAร—B (Xs , Us ) ds ฮถx,t(A ร— B) := Ex t 0 for any Borel sets A โŠ‚ Rd and B โŠ‚ U, is tight. It is the case that any limit point of the mean empirical measures in P(Rd ร— U) is an ergodic occupation measure [1], Lemma 3.4.6. Then in view of Remark 3.6 we obtain (3.29) U ฯ€(r) โ‰ค lim sup ฮถx,t (r) โ‰ค ฮฒ tโ†’โˆž for some ergodic occupation measure ฯ€. Therefore, ฬบหœโˆ— โ‰ค ฬบห†โˆ— . Disintegrating the measure ฯ€ as ฯ€(dx, du) = v(du|x)ยตv (dx), we obtain the associated control v โˆˆ USSM . From ergodic theory [33], we also know that  Z T 1 lim sup Evx r(Xs , v(Xs )) ds = ฯ€v (r) for almost every x. T โ†’โˆž T 0 It follows that ฬบโˆ— โ‰ค ฬบหœโˆ— , and since it is clear that ฬบห†โˆ— โ‰ค ฬบโˆ— , equality must hold among the three quantities. If v โˆˆ UฮฒSM , then (3.28) implies that (3.29) holds with U โ‰ก v and ฯ€ โ‰ก ฯ€v . Therefore, parts (c) and (d) follow. 26 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Existence of (Vฬƒ , ฬบหœ), satisfying (3.26), follows from Assumption 3.2 and [1], Theorem 3.6.6. The inf-compactness of Vฬƒ follows from the stochastic representation of Vฬƒ in [1], Lemma 3.6.9. This proves (e).  Existence of a stationary Markov control that is optimal is asserted by the following theorem. Theorem 3.2. Let G denote the set of ergodic occupation measures corresponding to controls in USSM , and Gฮฒ those corresponding to controls in UฮฒSM , for ฮฒ > ฬบโˆ— . Then: (a) The set Gฮฒ is compact in P(Rd ) for any ฮฒ > ฬบโˆ— . (b) There exists v โˆˆ USM such that ฬบv = ฬบโˆ— . Proof. By Theorem 3.1(d), the set Gฮฒ is tight for any ฮฒ > ฬบโˆ— . Let {ฯ€n } โŠ‚ Gฮฒ , for some ฮฒ > ฬบโˆ— , be any convergent sequence in P(Rd ) such that ฯ€n (r) โ†’ ฬบโˆ— as n โ†’ โˆž and denote its limit by ฯ€โˆ— . Since G is closed, ฯ€โˆ— โˆˆ G, and since the map ฯ€ โ†’ ฯ€(r) is lower semi-continuous, it follows that ฯ€โˆ— (r) โ‰ค ฬบโˆ— . Therefore, Gฮฒ is closed, and hence compact. Since ฯ€(r) โ‰ฅ ฬบโˆ— for all ฯ€ โˆˆ G, the equality ฯ€โˆ— (r) = ฬบโˆ— follows. Also v is obtained by disintegrating ฯ€โˆ— .  Remark 3.7. The reader might have noticed at this point that Assumption 3.1 may be weakened significantly. What is really required is the existence of an open set Hฬ‚ โŠ‚ Rd ร— U and inf-compact functions V โˆˆ C 2 (Rd ) and h โˆˆ C(Rd ร— U), satisfying (H1) inf {u : (x,u)โˆˆHฬ‚} r(x, u) โˆ’โ†’ โˆž. (H2) |x|โ†’โˆž u L V(x) โ‰ค 1 โˆ’ h(x, u)IHฬ‚c (x, u) + r(x, u)IHฬ‚ (x, u) โˆ€(x, u) โˆˆ Rd ร— U. In (H1), we use the convention that the โ€˜infโ€™ of the empty set is +โˆž. Also note that (H1) is equivalent to the statement that {(x, u) : r(x, u) โ‰ค c} โˆฉ Hฬ‚ is bounded in Rd ร— U for all c โˆˆ R+ . If (H1)โ€“(H2) are met, we define H := Hฬ‚ โˆช {(x, u) โˆˆ Rd ร— U : r(x, u) > h(x, u)}, and following the proof of Lemma 3.3, we assert the existence of an inf-compact hฬƒ โˆˆ C(Rd ร— U) satisfying (3.23). In fact, throughout the rest of the paper, Assumption 3.1 is not really invoked. We only use (3.24), the inf-compact function hฬƒ satisfying (3.23), and, naturally, Assumption 3.2. 3.5. The HJB equation. For ฮต > 0, let rฮต (x, u) := r(x, u) + ฮตhฬƒ(x, u). By Theorem 3.1(d), for any ฯ€ โˆˆ Gฮฒ , ฮฒ > ฬบโˆ— , we have the bound (3.30) ฯ€(rฮต ) โ‰ค ฮฒ + ฮตk0 (1 + ฮฒ). ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 27 Therefore, since rฮต is near-monotone, that is, lim inf min rฮต (x, u) > inf ฯ€(rฮต ), |x|โ†’โˆž uโˆˆU ฯ€โˆˆG there exists ฯ€ฮต โˆˆ arg minฯ€โˆˆG ฯ€(rฮต ). Let ฯ€โˆ— โˆˆ G be as in the proof of Theorem 3.2. The sub-optimality of ฯ€โˆ— relative to the running cost rฮต and (3.30) imply that ฯ€ฮต (r) โ‰ค ฯ€ฮต (rฮต ) (3.31) โ‰ค ฯ€โˆ— (rฮต ) โ‰ค ฬบโˆ— + ฮตk0 (1 + ฬบโˆ— ) โˆ€ฮต > 0. It follows from (3.31) and Theorem 3.1(d) that {ฯ€ฮต : ฮต โˆˆ (0, 1)} is tight. Since ฯ€ฮต 7โ†’ ฯ€ฮต (r) is lower semi-continuous, if ฯ€ฬ„ is any limit point of ฯ€ฮต as ฮต ึ 0, then taking limits in (3.31), we obtain (3.32) ฯ€ฬ„(r) โ‰ค lim sup ฯ€ฮต (r) โ‰ค ฬบโˆ— . ฮตึ0 Since G is closed, ฯ€ฬ„ โˆˆ G, which implies that ฯ€ฬ„(r) โ‰ฅ ฬบโˆ— . Therefore, equality must hold in (3.32), or in other words, ฯ€ฬ„ is an optimal ergodic occupation measure. Theorem 3.3. There exists a unique function V ฮต โˆˆ C 2 (Rd ) with V ฮต (0) = 0, which is bounded below in Rd , and solves the HJB (3.33) min[Lu V ฮต (x) + rฮต (x, u)] = ฬบฮต , uโˆˆU where ฬบฮต := inf ฯ€โˆˆG ฯ€(rฮต ), or in other words, ฬบฮต is the optimal value of the ergodic control problem with running cost rฮต . Also a stationary Markov control vฮต is optimal for the ergodic control problem relative to rฮต if and only if it satisfies (3.34) Hฮต (x, โˆ‡V ฮต (x)) = b(x, vฮต (x)) ยท โˆ‡V ฮต (x) + rฮต (x, vฮต (x)) where (3.35) Hฮต (x, p) := min[b(x, u) ยท p + rฮต (x, u)]. uโˆˆU Moreover: (a) for every R > 0, there exists kR such that (3.36) osc V ฮต โ‰ค kR ; BR a.e. in Rd , 28 A. ARAPOSTATHIS, A. BISWAS AND G. PANG (b) if vฮต is a measurable a.e. selector from the minimizer of the Hamiltonian in (3.35), that is, if it satisfies (3.33), then for any ฮด > 0,  Z ฯ„ฬ†ฮด V ฮต (x) โ‰ฅ Evxฮต (rฮต (Xs , vฮต (Xs )) โˆ’ ฬบฮต ) ds + inf V ฮต ; Bฮด 0 (c) for any stationary control v โˆˆ USSM and for any ฮด > 0,  Z ฯ„ฬ†ฮด ฮต v ฮต V (x) โ‰ค Ex (rฮต (Xs , v(Xs )) โˆ’ ฬบฮต ) ds + V (Xฯ„ฬ†ฮด ) , 0 where ฯ„ฬ†ฮด is hitting time to the ball Bฮด . Theorem 3.4. following hold: Let V ฮต , ฬบฮต , and vฮต , for ฮต > 0, be as in Theorem 3.3. The (a) The function V ฮต converges to some Vโˆ— โˆˆ C 2 (Rd ), uniformly on compact sets, and ฬบฮต โ†’ ฬบโˆ— , as ฮต ึ 0, and Vโˆ— satisfies min[Lu Vโˆ— (x) + r(x, u)] = ฬบโˆ— . (3.37) uโˆˆU Also, any limit point vโˆ— (in the topology of Markov controls) as ฮต ึ 0 of the set {vฮต } satisfies Lvโˆ— Vโˆ— (x) + r(x, vโˆ— (x)) = ฬบโˆ— a.e. in Rd . (b) A stationary Markov control v is optimal for the ergodic control problem relative to r if and only if it satisfies a.e. in Rd , (3.38) H(x, โˆ‡Vโˆ— (x)) = b(x, v(x)) ยท โˆ‡Vโˆ— (x) + r(x, v(x)) where H(x, p) := min[b(x, u) ยท p + r(x, u)]. uโˆˆU Moreover, for an optimal v โˆˆ USM , we have  Z T 1 v r(Xs , v(Xs )) ds = ฬบโˆ— lim Ex T โ†’โˆž T 0 โˆ€x โˆˆ Rd . (c) The function Vโˆ— has the stochastic representation Z ฯ„ฬ†ฮด  v Ex Vโˆ— (x) = lim S inf (r(Xs , v(Xs )) โˆ’ ฬบโˆ— ) ds ฮดึ0 vโˆˆ (3.39) = lim ฮดึ0 Evฬ„x ฮฒ ฮฒ>0 USM Z 0 ฯ„ฬ†ฮด 0 (r(Xs , vโˆ— (Xs )) โˆ’ ฬบโˆ— ) ds for any vฬ„ โˆˆ USM that satisfies (3.38).  ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 29 (d) If U is a convex set, u 7โ†’ {b(x, u) ยท p + r(x, u)} is strictly convex whenever it is not constant, and u 7โ†’ hฬƒ(x, u) is strictly convex for all x, then any measurable minimizer of (3.33) converges pointwise, and thus in USM , to the minimizer of (3.37). Theorem 3.4 guarantees the existence of an optimal stable control, which is made precise by (3.38), for the ergodic diffusion control problem with the running cost function r. Moreover, under the convexity property in part (d), the optimal stable control can be obtained as a pointwise limit from the minimizing selector of (3.33). For instance, if we let + r(x, u) = (e ยท x) d X hi um i , m > 1, i=1 then by choosing h and hฬƒ + |u|2 as in Proposition 3.1, we see that the approximate value function V ฮต and approximate control vฮต converge to the desired optimal value function Vโˆ— and optimal control vโˆ— , respectively. Concerning the uniqueness of the solution to the HJB equation in (3.37), recall that in the near-monotone case the existing uniqueness results are as follows: there exists a unique solution pair (V, ฬบ) of (3.37) with V in the class of functions C 2 (Rd ) which are bounded below in Rd . Moreover, it satisfies V (0) = 0 and ฬบ โ‰ค ฬบโˆ— . If the restriction ฬบ โ‰ค ฬบโˆ— is removed, then in general, there are multiple solutions. Since in our model r is not near-monotone in Rd , the function Vโˆ— is not, in general, bounded below. However, as we show later in Lemma 3.10 the negative part of Vโˆ— grows slower than V, that is, it holds that Vโˆ—โˆ’ โˆˆ o(V), with o(ยท) as defined in Section 1.3. Therefore, the second part of the theorem that follows may be viewed as an extension of the well-known uniqueness results that apply to ergodic control problems with near-monotone running cost. The third part of the theorem resembles the hypotheses of uniqueness that apply to problems under a blanket stability hypothesis. Theorem 3.5. (3.40) Let (Vฬ‚ , ฬบห†) be a solution of min[Lu Vฬ‚ (x) + r(x, u)] = ฬบห†, uโˆˆU such that Vฬ‚ โˆ’ โˆˆ o(V) and Vฬ‚ (0) = 0. Then the following hold: (a) Any measurable selector vฬ‚ from the minimizer of the associated Hamiltonian in (3.38) is in USSM and ฬบvฬ‚ < โˆž. (b) If ฬบห† โ‰ค ฬบโˆ— then necessarily ฬบห† = ฬบโˆ— and Vฬ‚ = Vโˆ— . (c) If Vฬ‚ โˆˆ O(minuโˆˆU hฬƒ(ยท, u)), then ฬบห† = ฬบโˆ— and Vฬ‚ = Vโˆ— . 30 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Applying these results to the multi-class queueing diffusion model, we have the following corollary. Corollary 3.1. For the queueing diffusion model with controlled dynamics given by (3.10), drift given by (3.9), and running cost as in (3.11), there exists a unique solution V , satisfying V (0) = 0, to the associated HJB in the class of functions C 2 (Rd ) โˆฉ O(|x|m ), whose negative part is in o(|x|m ). This solution agrees with Vโˆ— in Theorem 3.4. Proof. Existence of a solution V follows by Theorem 3.4. Select V โˆผ |x|m as in the proof of Proposition 3.1. That the solution V is in the stated class then follows by Lemma 3.10 and Corollary 4.1 that appear later in Sections 3.6 and 4, respectively. With h โˆผ |x|m as in the proof of Proposition 3.1, it follows that minuโˆˆU hฬƒ(x, u) โˆˆ O(|x|m ). Therefore, uniqueness follows by Theorem 3.5.  We can also obtain the HJB equation in (3.37) via the traditional vanishing discount approach as the following theorem asserts. Similar results are shown for a one-dimensional degenerate ergodic diffusion control problem in [29] and certain multi-dimensional ergodic diffusion control problems (allowing degeneracy and spatial periodicity) in [2]. Theorem 3.6. Let Vโˆ— and ฬบโˆ— be as in Theorem 3.4. For ฮฑ > 0, we define  Z โˆž โˆ’ฮฑt U e r(Xt , Ut ) dt . Vฮฑ (x) := inf Ex U โˆˆU 0 The function Vฮฑ โˆ’ Vฮฑ (0) converges, as ฮฑ ึ 0, to Vโˆ— , uniformly on compact subsets of Rd . Moreover, ฮฑVฮฑ (0) โ†’ ฬบโˆ— , as ฮฑ ึ 0. The proofs of the Theorems 3.3โ€“3.6 are given in Section 3.6. The following result, which follows directly from (3.31), provides a way to find ฮต-optimal controls. Proposition 3.2. Let {vฮต } be the minimizing selector from Theorem 3.3 and {ยตvฮต } be the corresponding invariant probability measures. Then almost surely for all x โˆˆ Rd ,  Z Z T 1 vฮต lim Ex r(x, vฮต (x))ยตvฮต (dx) r(Xs , vฮต (Xs )) ds = T โ†’โˆž T Rd 0 โ‰ค ฬบโˆ— + ฮตk0 (1 + ฬบโˆ— ). ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 31 3.6. Technical proofs. Recall that rฮต (x, u) = r(x, u) + ฮตhฬƒ(x, u), with hฬƒ as in Lemma 3.3. We need the following lemma. For ฮฑ > 0 and ฮต โ‰ฅ 0, we define  Z โˆž ฮต U โˆ’ฮฑt Vฮฑ (x) := inf Ex (3.41) e rฮต (Xt , Ut ) dt , U โˆˆU 0 where we set r0 โ‰ก r. Clearly, when ฮต = 0, we have Vฮฑ0 โ‰ก Vฮฑ . We quote the following result from [1], Theorem 3.5.6, Remark 3.5.8. Lemma 3.4. Provided ฮต > 0, then Vฮฑฮต defined above is in C 2 (Rd ) and is the minimal nonnegative solution of min[Lu Vฮฑฮต (x) + rฮต (x, u)] = ฮฑVฮฑฮต (x). uโˆˆU The HJB in Lemma 3.4 is similar to the equation in [7], Theorem 3, which concerns the characterization of the discounted control problem. Lemma 3.5. Let u be any precise Markov control and Lu be the corresponding generator. Let ฯ• โˆˆ C 2 (Rd ) be a nonnegative solution of Lu ฯ• โˆ’ ฮฑฯ• = g, d where g โˆˆ Lโˆž loc (R ). Let ฮบ : R+ โ†’ R+ be any nondecreasing function such that kgkLโˆž (BR ) โ‰ค ฮบ(R) for all R > 0. Then for any R > 0 there exists a constant D(R) which depends on ฮบ(4R), but not on u, or ฯ•, such that   osc ฯ• โ‰ค D(R) 1 + ฮฑ inf ฯ• . BR B4R Proof. Define gฬƒ := ฮฑ(g โˆ’ 2ฮบ(4R)) and ฯ•ฬƒ := 2ฮบ(4R) + ฮฑฯ•. Then gฬƒ โ‰ค 0 in B4R and ฯ•ฬƒ solves Lu ฯ•ฬƒ โˆ’ ฮฑฯ•ฬƒ = gฬƒ in B4R . Also kgฬƒkLโˆž (B4R ) โ‰ค ฮฑ(2ฮบ(4R) + kgkLโˆž (B4R ) ) โ‰ค 3ฮฑ(2ฮบ(4R) โˆ’ kgkLโˆž (B4R ) ) = 3 inf |gฬƒ| B4R โ‰ค 3|B4R |โˆ’1 kgฬƒkL1 (B4R ) . Hence by [1], Theorem A.2.13, there exists a positive constant CฬƒH such that sup ฯ•ฬƒ(x) โ‰ค CฬƒH inf ฯ•ฬƒ(x), xโˆˆB3R xโˆˆB3R 32 A. ARAPOSTATHIS, A. BISWAS AND G. PANG implying that   ฮฑ sup ฯ•(x) โ‰ค CฬƒH 2ฮบ(4R) + inf ฮฑฯ•(x) . (3.42) xโˆˆB3R xโˆˆB3R We next consider the solution of Lu ฯˆ = 0 in B3R , ฯˆ=ฯ• on โˆ‚B3R . Then Lu (ฯ• โˆ’ ฯˆ) = ฮฑฯ• + g in B3R . If ฯ•(xฬ‚) = inf xโˆˆB3R ฯ•(x), then applying the maximum principle ([1], Theorem A.2.1, [18]) it follows from (3.42) that sup |ฯ• โˆ’ ฯˆ| โ‰ค Cฬ‚(1 + ฮฑฯ•(xฬ‚)). (3.43) xโˆˆB3R Again ฯˆ attains its minimum at the boundary ([1], Theorem A.2.3, [18]). Therefore, ฯˆ โˆ’ ฯ•(xฬ‚) is a nonnegative function, and hence by the Harnack inequality, there exists a constant CH > 0 such that ฯˆ(x) โˆ’ ฯ•(xฬ‚) โ‰ค CH (ฯˆ(xฬ‚) โˆ’ ฯ•(xฬ‚)) โ‰ค CH Cฬ‚(1 + ฮฑฯ•(xฬ‚)) โˆ€x โˆˆ B2R . Thus, combining the above display with (3.43) we obtain osc ฯ• โ‰ค sup(ฯ• โˆ’ ฯˆ) + sup ฯˆ โˆ’ ฯ•(xฬ‚) โ‰ค Cฬ‚(1 + CH )(1 + ฮฑฯ•(xฬ‚)). B2R B2R B2R This completes the proof.  Lemma 3.6. Let Vฮฑฮต be as in Lemma 3.4. Then for any R > 0, there exists a constant kR > 0 such that osc Vฮฑฮต โ‰ค kR for all ฮฑ โˆˆ (0, 1] and ฮต โˆˆ [0, 1]. BR Proof. Recall that ยตu0 is the stationary probability distribution for the process under the control u0 โˆˆ USSM in Lemma 3.1. Since u0 is sub-optimal for the ฮฑ-discounted criterion in (3.41), and Vฮฑฮต is nonnegative, then for any ball BR , using Fubiniโ€™s theorem, we obtain Z ฮต Vฮฑฮต (x)ยตu0 (dx) ยตu0 (BR ) inf Vฮฑ โ‰ค BR Rd โ‰ค Z Rd Eux0 Z โˆž 0 โˆ’ฮฑt e  rฮต (Xt , u0 (Xt )) dt ยตu0 (dx) 1 ยตu (rฮต ) ฮฑ 0 1 โ‰ค (ฮท + ฮตk0 (1 + ฮท)), ฮฑ = ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 33 where for the last inequality we used Lemma 3.2 and Theorem 3.1(a). Therefore, we have the estimate ฮฑ inf Vฮฑฮต โ‰ค BR ฮท + ฮตk0 (1 + ฮท) . ยตu0 (BR ) The result then follows by Lemma 3.5.  We continue with the proof of Theorem 3.3. Proof of Theorem 3.3. Consider the function Vฬ„ฮฑฮต := Vฮฑฮต โˆ’ Vฮฑฮต (0). In view of Lemma 3.5 and Lemma 3.6, we see that Vฬ„ฮฑฮต is locally bounded uniformly in ฮฑ โˆˆ (0, 1] and ฮต โˆˆ (0, 1]. Therefore, by standard elliptic theory, Vฬ„ฮฑฮต and its first- and second-order partial derivatives are uniformly bounded in Lp (B), for any p > 1, in any bounded ball B โŠ‚ Rd , that is, for some constant CB depending on B and p, kVฬ„ฮฑฮต kW2,p (B) โ‰ค CB ([18], Theorem 9.11, page 117). Therefore, we can extract a subsequence along which Vฬ„ฮฑฮต converges. Then the result follows from Theorems 3.6.6, Lemma 3.6.9 and Theorem 3.6.10 in [1]. The proof of (3.36) follows from Lemma 3.5 and Lemma 3.6.  Remark 3.8. In the proof of the following lemma, and elsewhere in the paper, we use the fact that if U โŠ‚ USSM is a any set of controls such that the corresponding set {ยตv : v โˆˆ U } โŠ‚ M of invariant probability measures is tight then the map v 7โ†’ ฯ€v from the closure of U to P(Rd ร— U) is continuous, and so is the map v 7โ†’ ยตv . In fact, the latter is continuous under the total variation norm topology [1], Lemma 3.2.6. We also recall that G and M are closed and convex subsets of P(Rd ร— U) and P(Rd ). Therefore,{ฯ€v : v โˆˆ Uฬ„ } is compact in G. Note also that since U is compact, tightness of a set of invariant probability measures is equivalent to tightness of the corresponding set of ergodic occupation measures. Lemma 3.7. If {vฮต : ฮต โˆˆ (0, 1]} is a collection of measurable selectors from the minimizer of (3.33), then the corresponding invariant probability measures {ยตฮต : ฮต โˆˆ (0, 1]} are tight. Moreover, if vฮตn โ†’ vโˆ— along some subsequence ฮตn ึ 0, then the following hold: (a) ยตฮตn โ†’ ยตvโˆ— as ฮตn ึ 0, (b) Rvโˆ— is a stable Markov control, (c) Rd r(x, vโˆ— (x))ยตvโˆ— (dx) = limฮตึ0 ฬบฮต = ฬบโˆ— . Proof. By (3.25) and (3.31), the set of ergodic occupation measures corresponding to {vฮต : ฮต โˆˆ (0, 1]} is tight. By Remark 3.8, the same applies to the set {ยตฮต : ฮต โˆˆ (0, 1]}, and also part (a) holds. Part (b) follows from the equivalence of the existence of an invariant probability measure for a 34 A. ARAPOSTATHIS, A. BISWAS AND G. PANG controlled diffusion and the stability of the associated stationary Markov control (see [1], Theorem 2.6.10). Part (c) then follows since equality holds in (3.32).  We continue with the following lemma that asserts the continuity of the mean hitting time of a ball with respect to the stable Markov controls. Lemma 3.8. Let {vn : n โˆˆ N} โŠ‚ UฮฒSM , for some ฮฒ > 0, be a collection of Markov controls such that vn โ†’ vฬ‚ in the topology of Markov controls as n โ†’ โˆž. Let ยตn , ยตฬ‚ be the invariant probability measures corresponding to the controls vn , vฬ‚, respectively. Then for any ฮด > 0, it holds that Evxn [ฯ„ฬ†ฮด ] โˆ’โ†’ Evฬ‚x [ฯ„ฬ†ฮด ] โˆ€x โˆˆ Bฮดc . nโ†’โˆž Proof. Define H(x) := minuโˆˆU hฬƒ(x, u). It is easy to see that H is infcompact and locally Lipschitz. Therefore, by Theorem 3.1(d) we have sup ยตn (H) โ‰ค k0 (1 + ฮฒ), nโˆˆN and since ยตn โ†’ ยตฬ‚, we also have ยตฬ‚(H) โ‰ค k0 (1 + ฮฒ). Then by [1], Lemma 3.3.4, we obtain  Z ฯ„ฬ†ฮด  Z ฯ„ฬ†ฮด sup Evxn H(Xs ) ds + Evฬ‚x (3.44) H(Xs ) ds < โˆž. nโˆˆN 0 0 Let R be a positive number greater than |x|. Then by (3.44), there exists a positive k such that  Z ฯ„ฬ†ฮด  Z ฯ„ฬ†ฮด 1 k Evx I{H>R} (Xs ) ds โ‰ค Evx H(Xs )I{H>R} (Xs ) ds โ‰ค R R 0 0 for v โˆˆ {{vn }, vฬ‚}. From this assertion and (3.44), we see that  Z ฯ„ฬ†ฮด v sup Ex I{H>R} (Xs ) ds โˆ’โ†’ 0. vโˆˆ{{vn },vฬ‚} Rโ†’โˆž 0 Therefore, in order to prove the lemma it is enough to show that, for any R > 0, we have Z ฯ„ฬ†ฮด  Z ฯ„ฬ†ฮด  vn vฬ‚ Ex I{Hโ‰คR} (Xs ) ds โˆ’โ†’ Ex I{Hโ‰คR} (Xs ) ds . 0 nโ†’โˆž 0 But this follows from [1], Lemma 2.6.13(iii).  ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 35 Lemma 3.9. Let (V ฮต , ฬบฮต ) be as in Theorem 3.3, and vฮต satisfy (3.35). There exists a subsequence ฮตn ึ 0, such that V ฮตn converges to some Vโˆ— โˆˆ C 2 (Rd ), uniformly on compact sets, and Vโˆ— satisfies min[Lu Vโˆ— (x) + r(x, u)] = ฬบโˆ— . (3.45) uโˆˆU Also, any limit point vโˆ— (in the topology of Markov controls) of the set {vฮต }, as ฮต ึ 0, satisfies (3.46) Lvโˆ— Vโˆ— (x) + r(x, vโˆ— (x)) = ฬบโˆ— a.e. in Rd . Moreover, Vโˆ— admits the stochastic representation  Z ฯ„ฬ†ฮด v Vโˆ— (x) = S inf Ex (r(Xs , v(Xs )) โˆ’ ฬบโˆ— ) ds + Vโˆ— (Xฯ„ฬ†ฮด ) vโˆˆ (3.47) = Evxโˆ— ฮฒ ฮฒ>0 USM Z 0 ฯ„ฬ†ฮด 0  (r(Xs , vโˆ— (Xs )) โˆ’ ฬบโˆ— ) ds + Vโˆ— (Xฯ„ฬ†ฮด ) . It follows that Vโˆ— is the unique limit point of V ฮต as ฮต ึ 0. Proof. From (3.36), we see that the family {V ฮต : ฮต โˆˆ (0, 1]} is uniformly locally bounded. Hence, applying the theory of elliptic PDE, it follows that d {V ฮต : ฮต โˆˆ (0, 1]} is uniformly bounded in W2,p loc (R ) for p > d. Consequently, 1,ฮณ ฮต {V : ฮต โˆˆ (0, 1]} is uniformly bounded in Cloc for some ฮณ > 0. Therefore, along some subsequence ฮตn ึ 0, V ฮตn โ†’ Vโˆ— โˆˆ W2,p โˆฉ C 1,ฮณ , as n โ†’ โˆž, uniformly on compact sets. Also, limฮตึ0 ฬบฮต = ฬบโˆ— by Lemma 3.6(c). Therefore, passing to the limit we obtain the HJB equation in (3.45). It is straightforward to verify that (3.46) holds [1], Lemma 2.4.3. By Theorem 3.3(c), taking limits as ฮต ึ 0, we obtain  Z ฯ„ฬ†ฮด Evx (3.48) Vโˆ— (x) โ‰ค S inf (r(Xs , v(Xs )) โˆ’ ฬบโˆ— ) ds + Vโˆ— (Xฯ„ฬ†ฮด ) . vโˆˆ ฮฒ ฮฒ>0 USM 0 Also by Theorem 3.3(b) we have the bound V ฮต (x) โ‰ฅ โˆ’ฬบฮต Evxฮต [ฯ„ฬ†ฮด ] + inf V ฮต . Bฮด Using Lemma 3.8 and taking limits as ฮตn ึ 0, we obtain the lower bound (3.49) Vโˆ— (x) โ‰ฅ โˆ’ฬบโˆ— Evxโˆ— [ฯ„ฬ†ฮด ] + inf Vโˆ— . Bฮด By Lemma 3.7(c) and Theorem 3.1(d), vโˆ— โˆˆ USSM , and ฯ€vโˆ— (hฬƒ) โ‰ค k0 (1 + ฬบโˆ— ). Define Z ฯ„ฬ†ฮด  vโˆ— ฯ•(x) := Ex (3.50) hฬƒ(Xs , vโˆ— (Xs )) ds . 0 36 A. ARAPOSTATHIS, A. BISWAS AND G. PANG For |x| > ฮด, we have Evxโˆ— [I{ฯ„R <ฯ„ฬ†ฮด } ฯ•(Xฯ„R )] = Evxโˆ—  I{ฯ„R <ฯ„ฬ†ฮด } Z ฯ„ฬ†ฮด ฯ„R โˆงฯ„ฬ†ฮด  hฬƒ(Xs , vโˆ— (Xs )) ds . Therefore, by the dominated convergence theorem and the fact that ฯ•(x) < โˆž we obtain Evxโˆ— [ฯ•(Xฯ„R )I{ฯ„R <ฯ„ฬ†ฮด } ] โˆ’โ†’ 0. Rึ€โˆž By (3.48) and (3.49), we have |Vโˆ— | โˆˆ O(ฯ•). Thus (3.49) and (3.50) imply that lim inf Evxโˆ— [Vโˆ— (Xฯ„R )I{ฯ„R <ฯ„ฬ†ฮด } ] = 0, Rึ€โˆž and thus lim inf Evxโˆ— [Vโˆ— (Xฯ„R โˆงฯ„ฬ†ฮด )] = Evxโˆ— [Vโˆ— (Xฯ„ฬ†ฮด )]. (3.51) Rึ€โˆž Applying Itoฬ‚โ€™s formula to (3.46), we obtain Z ฯ„ฬ†ฮด โˆงฯ„R  vโˆ— (3.52) Vโˆ— (x) = Ex (r(Xs , vโˆ— (Xs )) โˆ’ ฬบโˆ— ) ds + Vโˆ— (Xฯ„ฬ†ฮด โˆงฯ„R ) . 0 Taking limits as R โ†’ โˆž, and using the dominated convergence theorem, we obtain (3.47) from (3.48).  Recall the definition of o(ยท) from Section 1.3. We need the following lemma. Lemma 3.10. Let Vโˆ— be as in Lemma 3.9. It holds that Vโˆ—โˆ’ โˆˆ o(V). Proof. Let vโˆ— be as in Lemma 3.9. Applying Itoฬ‚โ€™s formula to (3.24) with u โ‰ก vโˆ— we obtain  Z ฯ„ฬ†ฮด vโˆ— Ex h(Xs , vโˆ— (Xs ))IHc (Xs , vโˆ— (Xs )) ds (3.53) 0 โ‰ค Evxโˆ— Z ฯ„ฬ†ฮด 0  r(Xs , vโˆ— (Xs ))IH (Xs , vโˆ— (Xs )) ds + Evxโˆ— [ฯ„ฬ†ฮด ] + V(x). Therefore, adding the term  Z ฯ„ฬ†ฮด vโˆ— Ex r(Xs , vโˆ— (Xs ))IH (Xs , vโˆ— (Xs )) ds โˆ’ (1 + 2ฬบโˆ— )Evxโˆ— [ฯ„ฬ†ฮด ] 0 ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 37 to both sides of (3.53) and using the stochastic representation of Vโˆ— we obtain Z ฯ„ฬ†ฮด  โˆ’1 vโˆ— F (x) := 2k0 Ex hฬƒ(Xs , vโˆ— (Xs )) ds โˆ’ 2(1 + ฬบโˆ— )Evxโˆ— [ฯ„ฬ†ฮด ] (3.54) 0 โ‰ค 2Vโˆ— (x) + V(x) โˆ’ 2 inf Vโˆ— . Bฮด From the stochastic representation of Vโˆ— we have Vโˆ—โˆ’ (x) โ‰ค ฬบโˆ— Evxโˆ— [ฯ„ฬ†ฮด ]โˆ’inf Bฮด Vโˆ— . For any R > ฮด, we have Z ฯ„ฬ†ฮด    vโˆ— c (3.55) Ex hฬƒ Ex [ฯ„ฬ†R ] โˆ€x โˆˆ BR . hฬƒ(Xs , vโˆ— (Xs )) ds โ‰ฅ inf c BR ร—U 0 It is also straightforward to show that lim|x|โ†’โˆž EExx[ฯ„ฬ†[ฯ„ฬ†Rฮด ]] = 1. Therefore, since hฬƒ is inf-compact, it follows by (3.54) and (3.55) that the map x 7โ†’ Evxโˆ— [ฯ„ฬ†ฮด ] is in o(F ), which implies that Vโˆ—โˆ’ โˆˆ o(F ). On the other hand, by (3.54) we obtain F (x) โ‰ค V(x) โˆ’ 2 supBฮด Vโˆ— for all x such that Vโˆ— (x) โ‰ค 0, which implies that the restriction of F to the support of Vโˆ—โˆ’ is in O(V). It follows that Vโˆ—โˆ’ โˆˆ o(V).  We next prove Theorem 3.4. Proof of Theorem 3.4. Part (a) is contained in Lemma 3.9. To prove part (b), let vฬ„ be any control satisfying (3.38). By Lemma 3.10 the map V + 2Vโˆ— is inf-compact and by Theorem 3.4 and (3.24) it satisfies Lvฬ„ (V + 2Vโˆ— )(x) โ‰ค 1 + 2ฬบโˆ— โˆ’ r(x, vฬ„(x)) โˆ’ h(x, vฬ„(x))IHc (x, vฬ„(x)) โ‰ค 2 + 2ฬบโˆ— โˆ’ 2k0โˆ’1 hฬƒ(x, vฬ„(x)) โˆ€x โˆˆ Rd . This implies that vฬ„ โˆˆ USSM . Applying Itoฬ‚โ€™s formula, we obtain  Z T 1 vฬ„ lim sup Ex (3.56) hฬƒ(Xs , vฬ„(Xs )) ds โ‰ค k0 (1 + ฬบโˆ— ). T โ†’โˆž T 0 Therefore, ฯ€vฬ„ (hฬƒ) < โˆž. By (3.24), we have  Z t vฬ„ vฬ„ Ex [V(Xt )] โ‰ค V(x) + t + Ex r(Xs , vฬ„(Xs )) ds , 0 and since r โ‰ค hฬƒ, this implies by (3.56) that 1 (3.57) lim sup Evฬ„x [V(XT )] โ‰ค 1 + k0 (1 + ฬบโˆ— ). T โ†’โˆž T Since Vโˆ—โˆ’ โˆˆ o(V), it follows by (3.57) that 1 lim sup Evฬ„x [Vโˆ—โˆ’ (XT )] = 0. T โ†’โˆž T 38 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Therefore, by Itoฬ‚โ€™s formula, we deduce from (3.37) that  Z T 1 vฬ„ (3.58) r(Xs , vฬ„(Xs )) ds โ‰ค ฬบโˆ— . lim sup Ex T โ†’โˆž T 0 On the other hand, since the only limit point of the mean empirical measures vฬ„ , as t โ†’ โˆž, is ฯ€ , and ฯ€ (r) = ฬบ , then in view of Remark 3.6, we obtain ฮถx,t vฬ„ vฬ„ โˆ— vฬ„ (r) โ‰ฅ ฬบ . This proves that equality holds in (3.58) and that lim inf tโ†’โˆž ฮถx,t โˆ— the โ€œlim supโ€ may be replaced with โ€œlim.โ€ Conversely, suppose v โˆˆ USM is optimal but does not satisfy (3.38). Then there exists R > 0 and a nontrivial nonnegative f โˆˆ Lโˆž (BR ) such that fฮต (x) := IBR (x)(Lv V ฮต (x) + rฮต (x, v(x)) โˆ’ ฬบฮต ) converges to f , weakly in L1 (BR ), along some subsequence ฮต ึ 0. By applying Itoฬ‚โ€™s formula to (3.33), we obtain  Z T โˆงฯ„R 1 v 1 v ฮต ฮต (E [V (XT โˆงฯ„R )] โˆ’ V (x)) + Ex rฮต (Xs , v(Xs )) ds T x T 0 (3.59) Z T โˆงฯ„R  1 v fฮต (Xs , v(Xs )) ds . โ‰ฅ ฬบฮต + Ex T 0 Define, for some ฮด > 0, G(x) := Evx Z 0 ฯ„ฬ†ฮด  rฮต (Xs , v(Xs )) ds . Since V is bounded from below, by Theorem 3.3(c) we have V ฮต โˆˆ O(G). Invoking [1], Corollary 3.7.3, we obtain ฮต 1 v ฮต Ex [V (XT )] = 0, T โ†’โˆž T lim and lim Evx [V ฮต (XT โˆงฯ„R )] = Evx [V ฮต (XT )]. Rโ†’โˆž Therefore, taking limits in (3.59), first as R ึ€ โˆž, and then as T โ†’ โˆž, we obtain (3.60) ฯ€v (rฮต ) โ‰ฅ ฬบฮต + ฯ€v (fฮต ). Taking limits as ฮต ึ 0 in (3.60), since ยตv has a strictly positive density in BR , we obtain ฯ€v (r) โ‰ฅ ฬบโˆ— + ฯ€v (f ) > ฬบโˆ— , which is a contradiction. This completes the proof of part (b). ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 39 The first equality (3.39) follows by Lemma 3.9, taking limits as ฮด ึ 0. To show that the second equality holds for any optimal control, suppose vฬ„ satisfies (3.38). By (3.24) we have, for ฮด > 0 and |x| > ฮด,  Z ฯ„R โˆงฯ„ฬ†ฮด (1 + r(Xs , vฬ„(Xs ))) ds . Evฬ„x [V(Xฯ„R )I{ฯ„R <ฯ„ฬ†ฮด } ] โ‰ค V(x) + sup V โˆ’ + Evฬ„x Bฮด 0 It follows that (see [1], Lemma 3.3.4) lim sup Evฬ„x [V(Xฯ„R )I{ฯ„R <ฯ„ฬ†ฮด } ] < โˆž, Rโ†’โˆž and since Vโˆ—โˆ’ โˆˆ o(V) we must have lim sup Evฬ„x [Vโˆ—โˆ’ (Xฯ„R )I{ฯ„R <ฯ„ฬ†ฮด } ] = 0. Rโ†’โˆž By the first equality in (3.47), we obtain Vโˆ—+ โˆˆ O(ฯ•), with ฯ• as defined in (3.50) with vโˆ— replaced by vฬ„. Thus, in analogy to (3.51), we obtain lim inf Evฬ„x [Vโˆ— (Xฯ„R โˆงฯ„ฬ†ฮด )] = Evฬ„x [Vโˆ— (Xฯ„ฬ†ฮด )]. Rึ€โˆž The rest follows as in the proof of Lemma 3.9 via (3.52). We next prove part (d). We assume that U is a convex set and that c(x, u, p) := {b(x, u) ยท p + r(x, u)} is strictly convex in u if it is not identically a constant for fixed x and p. We fix some point uฬ„ โˆˆ U. Define B := {x โˆˆ Rd : c(x, ยท, p) = c(x, uฬ„, p) for all p}. It is easy to see that on B both b and r do not depend on u. It is also easy to check that B is a closed set. Let (Vโˆ— , vโˆ— ) be the limit of (V ฮต , vฮต ), where Vโˆ— is the solution to (3.37) and vโˆ— is the corresponding limit of vฮต . We have already shown that vโˆ— is a stable Markov control. We next show that it is, in fact, a precise Markov control. By our assumption, vฮต is the unique minimizing selector in (3.34) and, moreover, vฮต is continuous in x. By the definition of rฮต it is clear that the restriction of vฮต to B does not depend on ฮต. Let vฮต (x) = v โ€ฒ (x) on B. Using the strict convexity property of c(x, ยท, โˆ‡Vโˆ— ) it is easy to verify that vฮต converges to the unique minimizer of (3.37) on B c . In fact, since B c is open, then for any sequence xฮต โ†’ x โˆˆ B c it holds that vฮต (xฮต ) โ†’ vโˆ— (x). This follows from the definition of the minimizer and the uniform convergence of โˆ‡V ฮต to โˆ‡Vโˆ— . Therefore, we see that vโˆ— is a precise Markov control, vโˆ— = v โ€ฒ on B, and vฮต โ†’ vโˆ— pointwise as ฮต โ†’ 0. It is also easy to check that pointwise convergence implies convergence in the topology of Markov controls.  We now embark on the proof of Theorem 3.5. 40 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Proof of Theorem 3.5. The hypothesis that Vฬ‚ โˆ’ โˆˆ o(V) implies that the map V + 2Vฬ‚ is inf-compact. Also by (3.24) and (3.40), it satisfies Lvฬ‚ (V + 2Vฬ‚ )(x) โ‰ค 1 + 2ห† ฬบ โˆ’ r(x, vฬ‚(x)) โˆ’ h(x, vฬ‚(x))IHc (x, vฬ‚(x)) โ‰ค 2 + 2ห† ฬบ โˆ’ 2k0โˆ’1 hฬƒ(x, vฬ‚(x)) โˆ€x โˆˆ Rd . R Therefore, hฬƒ(x, vฬ‚(x)) dฯ€vฬ‚ < โˆž from which it follows that ฬบvฬ‚ < โˆž. This proves part (a). By (3.24), we have  Z t vฬ‚ vฬ‚ r(Xs , vฬ‚(Xs )) ds , Ex [V(Xt )] โ‰ค V(x) + t + Ex 0 and since ฬบvฬ‚ < โˆž, this implies that 1 lim sup Evฬ‚x [V(XT )] โ‰ค 1 + ฬบvฬ‚ . (3.61) T โ†’โˆž T Since Vฬ‚ โˆ’ โˆˆ o(V), it follows by (3.61) that lim sup T โ†’โˆž 1 vฬ‚ โˆ’ E [Vฬ‚ (XT )] = 0. T x Therefore, by Itoฬ‚โ€™s formula, we deduce from (3.40) that  Z T  1 vฬ‚ 1 vฬ‚ + E [Vฬ‚ (XT )] + Ex r(Xs , vฬ‚(Xs )) ds = ฬบห†. lim sup T x T T โ†’โˆž 0 This implies that ฬบvฬ‚ โ‰ค ฬบห† and since by hypothesis ฬบห† โ‰ค ฬบโˆ— we must have ฬบห† = ฬบโˆ— . Again by (3.24), we have Z ฯ„R โˆงฯ„ฬ†ฮด  vฬ‚ โˆ’ vฬ‚ Ex [V(Xฯ„R )I{ฯ„R <ฯ„ฬ†ฮด } ] โ‰ค V(x) + sup V + Ex (1 + r(Xs , vฬ‚(Xs ))) ds . Bฮด 0 It follows by [1], Lemma 3.3.4, that lim sup Evฬ‚x [V(Xฯ„R )I{ฯ„R <ฯ„ฬ†ฮด } ] < โˆž, Rโ†’โˆž and since Vฬ‚ โˆ’ โˆˆ o(V) we must have (3.62) lim sup Evฬ‚x [Vฬ‚ โˆ’ (Xฯ„R )I{ฯ„R <ฯ„ฬ†ฮด } ] = 0. Rโ†’โˆž Using (3.62) and following the steps in the proof of the second equality in (3.47), we obtain Z ฯ„ฬ†ฮด  vฬ‚ Vฬ‚ (x) โ‰ฅ Ex (r(Xs , vฬ‚(Xs )) โˆ’ ฬบโˆ— ) ds + inf Vฬ‚ Bฮด 0 โ‰ฅ Vโˆ— (x) โˆ’ sup Vโˆ— + inf Vฬ‚ . Bฮด Bฮด 41 ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME Taking limits as ฮด ึ 0, we have Vโˆ— โ‰ค Vฬ‚ . Since Lvฬ‚ (Vโˆ— โˆ’ Vฬ‚ ) โ‰ฅ 0 and Vโˆ— (0) = Vฬ‚ (0), we must have Vฬ‚ = Vโˆ— on Rd , and the proof of part (b) is complete. R To prove part (c) note that by part (a) we haveR ฬบvฬ‚ < โˆž. Therefore, hฬƒ dฯ€vฬ‚ โ‰ค โˆž by Theorem 3.1(a), which implies that |Vฬ‚ | dยตvฬ‚ โ‰ค โˆž by the hypothesis. Therefore, Evฬ‚x (|Vฬ‚ (Xt )|) converges as t โ†’ โˆž by [23], Proposition 2.6, which of course implies that 1t Evฬ‚x (|Vฬ‚ (Xt )|) tends to 0 as t โ†’ โˆž. Similarly, we deduce that 1t Evxโˆ— (|Vฬ‚ (Xt )|) as t โ†’ โˆž. Applying Itoฬ‚โ€™s formula to (3.40), with u โ‰ก vโˆ— , we obtain ฬบห† โ‰ค ฬบโˆ— . Another application with u โ‰ก vฬ‚ results in ฬบห† = ฬบvฬ‚ . Therefore, ฬบห† = ฬบโˆ— . The result then follows by part (b).  We finish this section with the proof of Theorem 3.6. Proof of Theorem 3.6. We first show that limฮฑึ0 ฮฑVฮฑ (0) = ฬบโˆ— . Let Vฬƒ(t, x) := eโˆ’ฮฑt V(x), and ฯ„n (t) := ฯ„n โˆง t. Applying Itoฬ‚โ€™s formula to (3.24), we obtain  Z ฯ„n (t) U U Ex [Vฬƒ(ฯ„n (t), Xฯ„n (t) )] โ‰ค V(x) โˆ’ Ex ฮฑVฬƒ(s, Xs ) ds 0 It follows that Z U Ex (3.63) ฯ„n (t) โˆ’ฮฑs e 0 โ‰ค + EU x Z + EU x Z ฯ„n (t) โˆ’ฮฑs e 0 ฯ„n (t) โˆ’ฮฑs e 0 (1 โˆ’ h(Xs , Us ))IHc (Xs , Us ) ds  (1 + r(Xs , Us ))IH (Xs , Us ) ds . h(Xs , Us )IHc (Xs , Us ) ds 1 + V(x) + EU x ฮฑ Z ฯ„n (t) 0    eโˆ’ฮฑs r(Xs , Us )IH (Xs , Us ) ds . Taking limits first as n ึ€ โˆž and then as t ึ€ โˆž in (3.63), and evaluating U at an optimal ฮฑ-discounted control vฮฑโˆ— , relative to r we obtain the estimate, using also (3.23),  Z โˆž 2 โˆ— eโˆ’ฮฑs hฬƒ(Xs , vฮฑโˆ— (Xs )) ds โ‰ค + V(x) + 2Vฮฑ (x). (3.64) 2k0โˆ’1 Exvฮฑ ฮฑ 0 By (3.23) and (3.64), it follows that Z โˆ— ฮต vฮฑ Vฮฑ (x) โ‰ค Vฮฑ (x) โ‰ค Ex 0 โˆž โˆ’ฮฑs e rฮต (Xs , vฮฑโˆ— (Xs )) ds โ‰ค Vฮฑ (x) + ฮตk0 (ฮฑโˆ’1 + V(x) + Vฮฑ (x)).  42 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Multiplying by ฮฑ and taking limits as ฮฑ ึ 0 we obtain lim sup ฮฑVฮฑ (0) โ‰ค ฬบฮต โ‰ค (1 + ฮตk0 ) lim sup ฮฑVฮฑ (0) + ฮตk0 . ฮฑึ0 ฮฑึ0 The same inequalities hold for the โ€œlim inf.โ€ Therefore, limฮฑึ0 ฮฑVฮฑ (0) = ฬบโˆ— . Let Vฬƒ := lim (Vฮฑ โˆ’ Vฮฑ (0)). ฮฑึ0 (Note that a similar result as Lemma 3.5 holds.) Then Vฬƒ satisfies  Z ฯ„ฬ†ฮด [ ฮฒ v Vฬƒ (x) โ‰ค lim Ex (r(Xs , v(Xs )) โˆ’ ฬบโˆ— ) ds โˆ€v โˆˆ USM . ฮดึ0 0 ฮฒ>0 This can be obtained without the near-monotone assumption on the running cost; see, for example, [1], Lemma 3.6.9 or Lemma 3.7.8. It follows from (3.39) that Vฬƒ โ‰ค Vโˆ— . On the other hand, since Lvโˆ— (Vฬƒ โˆ’ Vโˆ— ) โ‰ฅ 0, and Vฬƒ (0) = Vโˆ— (0), we must have Vฬƒ = Vโˆ— by the strong maximum principle.  4. Approximation via spatial truncations. We introduce an approximation technique which is in turn used to prove the asymptotic convergence results in Section 5. Let v0 โˆˆ USSM be any control such that ฯ€v0 (r) < โˆž. We fix the control v0 on the complement of the ball Bฬ„l and leave the parameter u free inside. In other words, for each l โˆˆ N we define  b(x, u), if (x, u) โˆˆ Bฬ„l ร— U, bl (x, u) := b(x, v0 (x)), otherwise,  r(x, u), if (x, u) โˆˆ Bฬ„l ร— U, rl (x, u) := r(x, v0 (x)), otherwise. We consider the family of controlled diffusions, parameterized by l โˆˆ N, given by (4.1) dXt = bl (Xt , Ut ) dt + ฯƒ(Xt ) dWt , with associated running costs rl (x, u). We denote by USM (l, v0 ) the subset of USM consisting of those controls v which agree with v0 on Bฬ„lc . Let ฮท0 := ฯ€v0 (r). It is well known that there exists a nonnegative solution ฯ•0 โˆˆ d W2,p loc (R ), for any p > d, to the Poisson equation (see [1], Lemma 3.7.8(ii)) Lv0 ฯ•0 (x) = ฮท0 โˆ’ hฬƒ(x, v0 (x)) x โˆˆ Rd , which is inf-compact, and satisfies, for all ฮด > 0,  Z ฯ„ฬ†ฮด v0 ฯ•0 (x) = Ex (hฬƒ(Xs , v0 (Xs )) โˆ’ ฮท0 ) ds + ฯ•0 (Xฯ„ฬ†ฮด ) 0 โˆ€x โˆˆ Rd . ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 43 We recall the Lyapunov function V from Assumption 3.1. We have the following theorem. Theorem 4.1. Let Assumptions 3.1 and 3.2 hold. Then for each l โˆˆ N d l there exists a solution V l in W2,p loc (R ), for any p > d, with V (0) = 0, of the HJB equation min[Lul V l (x) + rl (x, u)] = ฬบl , (4.2) uโˆˆU Lul where is the elliptic differential operator corresponding to the diffusion in (4.1). Moreover, the following hold: (i) (ii) 2ฯ•0 (x) (iii) (iv) ฬบl is nonincreasing in l; there exists a constant C0 , independent of l, such that V l (x) โ‰ค C0 + for all l โˆˆ N; (V l )โˆ’ โˆˆ o(V + ฯ•0 ) uniformly over l โˆˆ N; the restriction of V l on Bl is in C 2 . Proof. As earlier, we can show that  Z โˆž l U โˆ’ฮฑs Vฮฑ (x) := inf Ex e rl (Xs , Us ) ds U โˆˆU 0 is the minimal nonnegative solution to (4.3) min[Lul Vฮฑl (x) + rl (x, u)] = ฮฑVฮฑl (x), uโˆˆU d and Vฮฑl โˆˆ W2,p loc (R ), p > d. Moreover, any measurable selector from the minimizer in (4.3) is an optimal control. A similar estimate as in Lemma 3.5 holds and, therefore, there exists a subsequence {ฮฑn }, along which Vฮฑl n (x) โˆ’ Vฮฑl n (0) d l converges to V l in W2,p loc (R ), p > d, and ฮฑn Vฮฑn (0) โ†’ ฬบl as ฮฑn ึ 0, and (V l , ฬบl ) satisfies (4.2) (see also [1], Lemma 3.7.8). To show that ฯ€vl (r) = ฬบl , v l is a minimizing selector in (4.2), we use the following argument. Since ฯ€v0 (r) < โˆž, we claim that there exists a nonnegative, inf-compact function g โˆˆ C(Rd ) such that ฯ€v0 (g ยท (1 + r)) < โˆž. Indeed, this is true since integrability and uniform integrability of a function under any given measure are equivalent (see also the proof of [1], Lemma 3.7.2). Since every control in USM (l, v0 ) agrees with v0 on Blc , then for any x0 โˆˆ Bฬ„lc the map  Z ฯ„ฬ†l v v 7โ†’ Ex0 g(Xs )(1 + r(Xs , v(Xs ))) ds 0 is constant on USM (l, v0 ). By the equivalence of (i) and (iii) in Lemma 3.3.4 of [1], this implies that sup vโˆˆUSM (l,v0 ) ฯ€v (g ยท (1 + r)) < โˆž โˆ€l โˆˆ N, 44 A. ARAPOSTATHIS, A. BISWAS AND G. PANG and thus r is uniformly integrable with respect to the family {ฯ€v : v โˆˆ USM (l, v0 )} for any l โˆˆ N. It then follows by [1], Theorem 3.7.11, that (4.4) ฬบl = inf vโˆˆUSM (l,v0 ) ฯ€v (r), l โˆˆ N. This yields part (i). Moreover, in view of Lemmas 3.5 and 3.6, we deduce that for any ฮด > 0 it holds that supBฮด |V l | โ‰ค ฮบฮด , where ฮบฮด is a constant independent of l โˆˆ N. It is also evident by (4.4) that ฬบl is decreasing in l and ฬบl โ‰ค ฮท0 for all l โˆˆ N. Fix ฮด such that minuโˆˆU hฬƒ(x, u) โ‰ฅ 2ฮท0 on Bฮดc . Since ฯ•0 is nonnegative, we obtain  Z ฯ„ฬ†ฮด v0 (4.5) โˆ€x โˆˆ Rd . (hฬƒ(Xs , v0 (Xs )) โˆ’ ฮท0 ) ds โ‰ค ฯ•0 (x) Ex 0 Using an analogous argument as the one used in the proof of [1], Lemma 3.7.8, we have Z ฯ„ฬ†ฮด  l v (4.6) V (x) โ‰ค Ex (rl (Xs , v(Xs )) โˆ’ ฬบl ) ds + ฮบฮด โˆ€v โˆˆ USM (l, v0 ). 0 Thus, by (4.5) and (4.6), and since by the choice of ฮด > 0, it holds that r โ‰ค hฬƒ โ‰ค 2(hฬƒ โˆ’ ฮท0 ) on Bฮดc , we obtain Z ฯ„ฬ†ฮด  V l (x) โ‰ค Evx0 2(hฬƒ(Xs , v0 (Xs )) โˆ’ ฮท0 ) ds + ฮบฮด 0 (4.7) โ‰ค ฮบฮด + 2ฯ•0 (x) โˆ€x โˆˆ Rd . This proves part (ii). Now fix l โˆˆ N. Let vฮฑl be a minimizing selector of (4.3). Note then that l vฮฑ โˆˆ USM (l, v0 ). Therefore, vฮฑl is a stable Markov control. Let vฮฑl n โ†’ v l in the topology of Markov controls along the same subsequence as above. Then it is evident that v l โˆˆ USM (l, v0 ). Also from Lemma 3.8, we have vl l Exฮฑn [ฯ„ฬ†ฮด ] โˆ’โ†’ Evx [ฯ„ฬ†ฮด ] โˆ€x โˆˆ Bฮดc , โˆ€ฮด > 0. ฮฑn ึ0 Using [1], Lemma 3.7.8, we obtain the lower bound l V l (x) โ‰ฅ โˆ’ฬบl Evx [ฯ„ฬ†ฮด ] โˆ’ ฮบฮด . (4.8) By [1], Theorem 3.7.12(i) (see also (3.7.50) in [1]), it holds that  Z ฯ„ฬ†ฮด l vl l l V (x) = Ex (rl (Xs , v (Xs )) โˆ’ ฬบl ) ds + V (Xฯ„ฬ†ฮด ) 0 (4.9) โ‰ฅ l Evx Z 0 ฯ„ฬ†ฮด l  l rl (Xs , v (Xs )) ds โˆ’ ฬบl Evx [ฯ„ฬ†ฮด ] โˆ’ ฮบฮด โˆ€x โˆˆ Blc . ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 45 By (3.23), we have 2k0โˆ’1 hฬƒ(x, u)IH (x, u) โ‰ค 1 + r(x, u)IH (x, u). Therefore, using the preceding inequality and (4.9), we obtain l (4.10) V l (x) + (1 + ฬบl )Evx [ฯ„ฬ†ฮด ] + ฮบฮด Z ฯ„ฬ†ฮด  2 vl l l โ‰ฅ Ex hฬƒ(Xs , v (Xs ))IH (Xs , v (Xs )) ds . k0 0 By (3.24), (4.9) and the fact that V is nonnegative, we have Z ฯ„ฬ†ฮด  2 vl l Ex hฬƒ(Xs , v l (Xs ))IHc (Xs , v l (Xs )) ds โˆ’ V(x) โˆ’ Evx [ฯ„ฬ†ฮด ] k0 0 Z ฯ„ฬ†ฮด  vl l l โ‰ค Ex (4.11) r(Xs , v (Xs ))IH (Xs , v (Xs )) ds 0 l l โ‰ค V (x) + ฬบl Evx [ฯ„ฬ†ฮด ] + ฮบฮด . Combining (4.7), (4.10) and (4.11), we obtain  Z ฯ„ฬ†ฮด l l hฬƒ(Xs , v l (Xs )) ds โ‰ค k0 (1 + ฬบl )Evx [ฯ„ฬ†ฮด ] Evx 0 + k0 V(x) + 2k0 (ฯ•0 (x) + ฮบฮด ) 2 for all l โˆˆ N. As earlier, using the inf-compact property of hฬƒ and the fact that ฬบl โ‰ค ฮท0 is bounded, we can choose ฮด large enough such that Z ฯ„ฬ†ฮด  vl vl l (4.12) ฮท0 Ex [ฯ„ฬ†ฮด ] โ‰ค Ex hฬƒ(Xs , v (Xs )) ds โ‰ค k0 V(x) + 4k0 (ฯ•0 (x) + ฮบฮด ) 0 for all l โˆˆ N. Since hฬƒ is inf-compact, part (iii) follows by (4.8) and (4.12). Part (iv) is clear from regularity theory of elliptic PDE [18], Theorem 9.19, page 243.  Similar to Theorem 3.3, we can show that oscillations of {V l } are uniformly bounded on compacts. Therefore, if we let l โ†’ โˆž we obtain a HJB equation (4.13) min[Lu Vฬ‚ (x) + r(x, u)] = ฬบห†, uโˆˆU with Vฬ‚ โˆˆ C 2 (Rd ) and limlโ†’โˆž ฬบl = ฬบห†. By Theorem 4.1, we have the bound (4.14) Vฬ‚ (x) โ‰ค C0 + 2ฯ•0 (x), 46 A. ARAPOSTATHIS, A. BISWAS AND G. PANG for some positive constant C0 . This of course, implies that Vฬ‚ + (x) โ‰ค C0 + 2ฯ•0 (x). Moreover, it is straightforward to show that for any v โˆˆ USSM with ฬบv < โˆž, we have 1 lim sup Evx [V(Xt )] < โˆž. tโ†’โˆž t Therefore, if in addition, we have 1 lim sup Evx [ฯ•0 (Xt )] < โˆž, tโ†’โˆž t then it follows by Theorem 4.1(iii) that (4.15) 1 lim sup Vฬ‚ โˆ’ (Xt ) โˆ’โ†’ 0. tโ†’โˆž tโ†’โˆž t Theorem 4.2. Suppose that ฯ•0 โˆˆ O(minuโˆˆU hฬƒ(ยท, u)). Then, under the assumptions of Theorem 4.1, we have limlโ†’โˆž ฬบl = ฬบห† = ฬบโˆ— , and Vฬ‚ = Vโˆ— . Moreover, Vโˆ— โˆˆ O(ฯ•0 ). Proof. Let {vฬ‚l } be any sequence of measurable selectors from the minimizer of (4.2) and {ฯ€l } the corresponding sequence of ergodic occupation measures. Since by Theorem 3.1 {ฯ€l } is tight, then by Remark 3.8 if vฬ‚ is a limit point of a subsequence {vฬ‚l }, which we also denote by {vฬ‚l }, then ฯ€ฬ‚ = ฯ€vฬ‚ is the corresponding limit point of {ฯ€l }. Therefore, by the lower semi-continuity of ฯ€ โ†’ ฯ€(r) we have ฬบห† = lim ฯ€l (r) โ‰ฅ ฯ€ฬ‚(r) = ฬบvฬ‚ . lโ†’โˆž It also holds that (4.16) Lvฬ‚ Vฬ‚ (x) + r(x, vฬ‚(x)) = ฬบห†, a.s. By (4.15), we have lim inf T โ†’โˆž 1 vฬ‚ E [Vฬ‚ (XT )] = 0, T x and hence applying Itoฬ‚โ€™s rule on (4.16) we obtain ฬบvฬ‚ โ‰ค ฬบห†. On the other hand, if vโˆ— is an optimal stationary Markov control, then by the hypothesis ฯ•0 โˆˆ O(hฬƒ), the fact that ฯ€vโˆ— (hฬƒ) < โˆž, (4.14) and [23], Proposition 2.6, we deduce that Evxโˆ— [Vฬ‚ + (Xt )] converges as t โ†’ โˆž, which of course together with (4.15) implies that 1t Evฬ‚x [Vฬ‚ (Xt )] tends to 0 as t โ†’ โˆž. Therefore, evaluating (4.13) at vโˆ— and applying Itoฬ‚โ€™s rule we obtain ฬบvโˆ— โ‰ฅ ฬบห†. Combining the two estimates, we have ฬบvฬ‚ โ‰ค ฬบห† โ‰ค ฬบโˆ— , and thus equality must hold. Here, we have used the fact that there exists an optimal Markov control for r by Theorem 3.4. ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME Next, we use the stochastic representation in (4.9)  Z ฯ„ฬ†ฮด l vฬ‚l l (4.17) V (x) = Ex (r(Xs , vฬ‚l (Xs )) โˆ’ ฬบl ) ds + V (Xฯ„ฬ†ฮด ) , 0 47 x โˆˆ Bฮดc . ฬบv Fix any x โˆˆ Bฮดc . Since USM0 is compact, it follows that for each ฮด and R with ฬบv 0 < ฮด < R, the map Fฮด,R (v) : USM0 โ†’ R+ defined by  Z ฯ„ฬ†ฮด โˆงฯ„R v Fฮด,R (v) := Ex r(Xs , v(Xs )) ds 0 is continuous. Therefore, the map Fฬ„ฮด := limRึ€โˆž Fฮด,R is lower semi-continuous. It follows that  Z ฯ„ฬ†ฮด  Z ฯ„ฬ†ฮด vฬ‚ vฬ‚l r(Xs , vฬ‚(Xs )) ds โ‰ค lim Ex (4.18) Ex r(Xs , vฬ‚l (Xs )) ds . lโ†’โˆž 0 0 On the other hand, since hฬƒ is inf-compact, it follows by (4.12) that ฯ„ฬ†ฮด is uniformly integrable with respect to the measures {Pvฬ‚xl }. Therefore, as also shown in Lemma 3.8, we have lim Evฬ‚xl [ฯ„ฬ†ฮด ] = Evฬ‚x [ฯ„ฬ†ฮด ]. (4.19) lโ†’โˆž Since V l โ†’ Vฬ‚ , uniformly on compact sets, and ฬบl โ†’ ฬบโˆ— , as l โ†’ โˆž, it follows by (4.17)โ€“(4.19) that Z ฯ„ฬ†ฮด  Vฬ‚ (x) โ‰ฅ Evฬ‚x (r(Xs , vฬ‚(Xs )) โˆ’ ฬบโˆ— ) ds + Vฬ‚ (Xฯ„ฬ†ฮด ) , x โˆˆ Bฮดc . 0 Therefore, by Theorem 3.4(b), for any ฮด > 0 and x โˆˆ Bฮดc we obtain Z ฯ„ฬ†ฮด  vฬ‚ Vโˆ— (x) โ‰ค Ex (r(Xs , vฬ‚(Xs )) โˆ’ ฬบโˆ— ) ds + Vโˆ— (Xฯ„ฬ†ฮด ) 0 โ‰ค Vฬ‚ (x) + Evฬ‚x [V โˆ— (Xฯ„ฬ†ฮด )] โˆ’ Evฬ‚x [Vฬ‚ (Xฯ„ฬ†ฮด )], and taking limits as ฮด ึ 0, using the fact that Vฬ‚ (0) = Vโˆ— (0) = 0, we obtain Vโˆ— โ‰ค Vฬ‚ on Rd . Since Lvฬ‚ (Vโˆ— โˆ’ Vฬ‚ ) โ‰ฅ 0, we must have Vโˆ— = Vฬ‚ . By Theorem 4.1(ii), we have Vโˆ— โˆˆ O(ฯ•0 ).  Remark 4.1. It can be seen from the proof of Theorem 4.2 that the assumption ฯ•0 โˆˆ O(hฬƒ) can be replaced by the weaker hypothesis that 1 vโˆ— T Ex [ฯ•0 (XT )] โ†’ 0 as T โ†’ โˆž. It is easy to see that if one replaces rl by ๏ฃฑ 1 ๏ฃด ๏ฃฒ r(x, u) + f (u), for x โˆˆ Bฬ„l , l rl (x, u) = ๏ฃด ๏ฃณ r(x, v0 (x)) + 1 f (v0 (x)), otherwise, l Remark 4.2. 48 A. ARAPOSTATHIS, A. BISWAS AND G. PANG for some positive valued continuous function f , the same conclusion of Theorem 4.2 holds. If we consider the controlled dynamics given by (3.20), with running cost as in (3.11), then there exists a function V โˆผ |x|m satisfying (3.6). This fact is proved in Proposition 3.1. There also exists a Lyapunov function V0 โˆˆ O(|x|m ), satisfying the assumption in Theorem 4.2, relative to any control v0 with ฯ€v0 (hฬƒ) < โˆž, where hฬƒ is selected as in Remark 3.5. Indeed, in order to construct V0 we recall the function ฯˆ in (3.21). Let V0 โˆˆ C 2 (Rd ) be any function such that V0 = ฯˆ m/2 on the complement of the unit ball centered at the origin. Observe that for some positive constants ฮบ1 and ฮบ2 it holds that ฮบ1 |x|2 โ‰ค ฯˆ(x) โ‰ค ฮบ2 |x|2 . Then a straightforward calculation from (3.22) shows that (3.8) holds with the above choice of V0 . By the stochastic representation of ฯ•0 , it follows that ฯ•0 โˆˆ O(V0 ). We have proved the following corollary. Corollary 4.1. For the queueing diffusion model with controlled dynamics given by (3.20), and running cost given by (3.11), there exists a solution (up to an additive constant) to the associated HJB in the class of functions in C 2 (Rd ) whose positive part grows no faster than |x|m and whose negative part is in o(|x|m ). We conclude this section with the following remark. Remark 4.3. Comparing the approximation technique introduced in this section with that in Section 3, we see that the spatial truncation technique relies on more restrictive assumption on the Lyapunov function V0 and the running cost function (Theorem 4.2). In fact, the growth of hฬƒ also restricts the growth of r by (3.23). Therefore, the class of ergodic diffusion control problems considered in this section is more restrictive. For example, if the running cost r satisfies (3.11) and hฬƒ โˆผ |x|m , then it is not obvious that one can obtain a Lyapunov function V0 with growth at most of order |x|m . For instance, if the drift has strictly sub-linear growth, then it is expected that the Lyapunov function should have growth larger than |x|m . Therefore, the class of problems considered in Section 3 is larger than those considered in this section. 5. Asymptotic convergence. In this section, we prove that the value of the ergodic control problem corresponding to the multi-class M/M/N + M queueing network asymptotically converges to ฬบโˆ— , the value of the ergodic control for the controlled diffusion. ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 49 Recall the diffusion-scaled processes Xฬ‚ n , Qฬ‚n and Zฬ‚ n defined in (2.4), and from (2.5) and (2.6) that Z t Z t n n n n n n Xฬ‚i (t) = Xฬ‚i (0) + โ„“i t โˆ’ ยตi Zฬ‚i (s) ds โˆ’ ฮณi Qฬ‚ni (s) ds (5.1) 0 0 n n n + Mฬ‚A,i (t) โˆ’ Mฬ‚S,i (t) โˆ’ Mฬ‚R,i (t), n (t), Mฬ‚ n (t) and Mฬ‚ n (t), i = 1, . . . , d, as defined in (2.6), are where Mฬ‚A,i S,i R,i square integrable martingales w.r.t. the filtration {Ftn } with quadratic variations ฮปni t, n Z ยตni t n n hMฬ‚S,i i(t) = Z (s) ds, n 0 i Z ฮณin t n n Q (s) ds. hMฬ‚R,i i(t) = n 0 i n hMฬ‚A,i i(t) = 5.1. The lower bound. In this section, we prove Theorem 2.1. Proof of Theorem 2.1. Recall the definition of Vฬ‚ n in (2.10), and consider a sequence such that supn Vฬ‚ n (Xฬ‚ n (0)) < โˆž. Let ฯ• โˆˆ C 2 (Rd ) be any function satisfying ฯ•(x) := |x|m for |x| โ‰ฅ 1. As defined in Section 1.3, โˆ†X(t) denotes the jump of the process X at time t. Applying Itoฬ‚โ€™s formula on ฯ• (see, e.g., [24], Theorem 26.7), we obtain from (5.1) that  Z t ฮ˜n1 (Xฬ‚1n (s), Zฬ‚1n (s))ฯ•โ€ฒ (Xฬ‚1n (s)) ds E[ฯ•(Xฬ‚1n (t))] = E[ฯ•(Xฬ‚1n (0))] + E 0 +E Z 0 +E t ฮ˜n2 (Xฬ‚1n (s), Zฬ‚1n (s))ฯ•โ€ฒโ€ฒ (Xฬ‚1n (s)) ds X sโ‰คt  โˆ†ฯ•(Xฬ‚1n (s)) โˆ’ ฯ•โ€ฒ (Xฬ‚1n (sโˆ’)) ยท โˆ†Xฬ‚1n (s)  1 โ€ฒโ€ฒ n n n โˆ’ ฯ• (Xฬ‚ (sโˆ’))โˆ†Xฬ‚1 (s)โˆ†Xฬ‚1 (s) , 2 where ฮ˜n1 (x, z) := โ„“n1 โˆ’ ยตn1 z โˆ’ ฮณ1n (x โˆ’ z),   ยตn1 z + ฮณ1n (x โˆ’ z) ฮปn1 1 n n โˆš + ยต ฯ1 + . ฮ˜2 (x, z) := 2 1 n n 50 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Since {โ„“n1 } is a bounded sequence, it is easy to show that for all n there exist positive constants ฮบi , i = 1, 2, independent of n, such that ฮ˜n1 (x, z)ฯ•โ€ฒ (x) โ‰ค ฮบ1 (1 + |(e ยท x)+ |m ) โˆ’ ฮบ2 |x|m , ฮบ2 ฮ˜n2 (x, z)ฯ•โ€ฒโ€ฒ (x) โ‰ค ฮบ1 (1 + |(e ยท x)+ |m ) + |x|m , 4 provided that x โˆ’ z โ‰ค (e ยท x)+ and โˆšzn โ‰ค 1. We next compute the terms corresponding to the jumps. For that, first we see that the jump size is of order โˆš1n . We can also find a positive constant ฮบ3 such that sup |ฯ•โ€ฒโ€ฒ (y)| โ‰ค ฮบ3 (1 + |x|mโˆ’2 ) โˆ€x โˆˆ Rd . |yโˆ’x|โ‰ค1 Using Taylorโ€™s approximation, we obtain the inequality โˆ†ฯ•(Xฬ‚1n (s)) โˆ’ ฯ•โ€ฒ (Xฬ‚1n (sโˆ’)) ยท โˆ†Xฬ‚1n (s) โ‰ค 1 sup |ฯ•โ€ฒโ€ฒ (y)|[โˆ†(Xฬ‚1n (s))]2 . 2 |yโˆ’Xฬ‚ n (sโˆ’)|โ‰ค1 1 Hence, combining the above facts we obtain X E โˆ†ฯ•(Xฬ‚1n (s)) โˆ’ ฯ•โ€ฒ (Xฬ‚1n (sโˆ’)) ยท โˆ†Xฬ‚1n (s) sโ‰คt (5.2)  1 โ€ฒโ€ฒ n n n โˆ’ ฯ• (Xฬ‚1 (sโˆ’))โˆ†Xฬ‚1 (s)โˆ†Xฬ‚1 (s) 2 X โ‰คE ฮบ3 (1 + |Xฬ‚1n (sโˆ’)|mโˆ’2 )(โˆ†(Xฬ‚1n (s)))2 sโ‰คt t   ฮปn1 ยตn1 Z1n (s) ฮณ1n Qn1 (s) = ฮบ3 E + + ds n n n 0 Z t    ฮบ2 โ‰คE ฮบ4 + |Xฬ‚1n (s)|m + ฮบ5 ((e ยท Xฬ‚ n (s))+ )m ds , 4 0 Z  (1 + |Xฬ‚1n (s)|mโˆ’2 ) for some suitable positive constants ฮบ4 and ฮบ5 , independent of n, where in the second inequality we use the fact that the optional martingale [Xฬ‚1n ] is the sum of the squares of the jumps, and that [Xฬ‚1n ] โˆ’ hXฬ‚1n i is a martingale. Therefore, for some positive constants C1 and C2 it holds that 0 โ‰ค E[ฯ•(Xฬ‚1n (t))] (5.3) โ‰ค E[ฯ•(Xฬ‚1n (0))] + C1 t โˆ’ + C2 E Z t 0 ฮบ2 E 2 Z 0 t |Xฬ‚1n (s)|m ds  ((e ยท Xฬ‚ (s)) ) ds . n + m  ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 51 By (2.8), we have r(Qฬ‚n (s)) โ‰ฅ c1 ((e ยท Xฬ‚ n (s))+ )m , dm which, combined with the assumption that supn Vฬ‚ n (Xฬ‚ n (0)) < โˆž, implies that  Z T 1 + m n ((e ยท Xฬ‚ (s)) ) ds < โˆž. sup lim sup E n T โ†’โˆž T 0 In turn, from (5.3) we obtain sup lim sup n T โ†’โˆž 1 E T Z T 0  |Xฬ‚1n (s)|m ds < โˆž. Repeating the same argument for coordinates i = 2, . . . , d, we obtain  Z T 1 (5.4) |Xฬ‚ n (s)|m ds < โˆž. sup lim sup E n T โ†’โˆž T 0 We introduce the process ๏ฃฑ n ๏ฃฒ Xฬ‚i (t) โˆ’ Zฬ‚in (t) , n n + Ui (t) := ๏ฃณ (e ยท Xฬ‚ (t)) ed , i = 1, . . . , d, if (e ยท Xฬ‚ n (t))+ > 0, otherwise. Since Z n is work-conserving, it follows that U n takes values in S, and Uin (t) represents the fraction of class i customers in queue. Define the mean empirical measures  Z T 1 n n n ฮฆT (A ร— B) := E IAร—B (Xฬ‚ (s), U (s)) ds T 0 for Borel sets A โŠ‚ Rd and B โŠ‚ S. From (5.4), we see that the family {ฮฆnT : T > 0, n โ‰ฅ 1} is tight. Hence, for any sequence Tk โ†’ โˆž, there exists a subsequence, also denoted by Tk , such that ฮฆnTk โ†’ ฯ€ n , as k โ†’ โˆž. It is evident that {ฯ€ n : n โ‰ฅ 1} is tight. Let ฯ€ n โ†’ ฯ€ along some subsequence, with ฯ€ โˆˆ P(Rd ร— S). Therefore, it is not hard to show that Z n n rฬƒ(x, u)ฯ€(dx, du), lim Vฬ‚ (Xฬ‚ (0)) โ‰ฅ nโ†’โˆž Rd ร—U where, as defined earlier, rฬƒ(x, u) = r((e ยท x)+ u). To complete the proof of the theorem, we only need to show that ฯ€ is an ergodic occupation measure for the diffusion. For that, consider f โˆˆ Ccโˆž (Rd ). Recall that [Xฬ‚in , Xฬ‚jn ] = 0 52 A. ARAPOSTATHIS, A. BISWAS AND G. PANG for i 6= j [30], Lemmas 9.2 and 9.3. Therefore, using Itoฬ‚โ€™s formula and the definition of ฮฆnT , we obtain 1 E[f (Xฬ‚ n (T ))] T 1 = E[f (Xฬ‚ n (0))] T ! Z d X (5.5) Ani (x, u) ยท fxi (x) + Bin (x, u)fxi xi (x) ฮฆnT (dx, du) + Rd ร—U + i=1 d " X 1 X fxi (Xฬ‚ n (sโˆ’)) ยท โˆ†Xฬ‚in (s) E โˆ†f (Xฬ‚ n (s)) โˆ’ T sโ‰คT i=1 # d 1 X n n n fxi xj (Xฬ‚ (sโˆ’))โˆ†Xฬ‚i (s)โˆ†Xฬ‚j (s) , โˆ’ 2 i,j=1 where Ani (x, u) := โ„“ni โˆ’ ยตni (xi โˆ’ (e ยท x)+ ui ) โˆ’ ฮณin (e ยท x)+ ui ,   ฮปn ยตn xi + (ฮณin โˆ’ ยตni )(e ยท x)+ ui 1 n โˆš ยตi ฯi + i + i . Bin (x, u) := 2 n n We first bound the last term in (5.5). Using Taylorโ€™s formula, we see that n โˆ†f (Xฬ‚ (s)) โˆ’ โˆ’ d X i=1 โˆ‡f (Xฬ‚ n (sโˆ’)) ยท โˆ†Xฬ‚ n (s) d 1 X fxi xj (Xฬ‚ n (sโˆ’))โˆ†Xฬ‚in (s)โˆ†Xฬ‚jn (s) 2 i,j=1 = d kkf kC 3 X โˆš |โˆ†Xฬ‚in (s)โˆ†Xฬ‚jn (s)| n i,j=1 for some positive constant k, where we use the fact that the jump size is โˆš1 . Hence, using the fact that independent Poisson processes do not have n simultaneous jumps w.p.1, using the identity Qฬ‚ni = Xฬ‚in โˆ’ Zฬ‚in , we obtain " d X 1 X โˆ‡f (Xฬ‚ n (sโˆ’)) ยท โˆ†Xฬ‚ n (s) E โˆ†f (Xฬ‚ n (s)) โˆ’ T i=1 sโ‰คT (5.6) # d 1 X โˆ’ fxi xj (Xฬ‚ n (sโˆ’))โˆ†Xฬ‚in (s)โˆ†Xฬ‚jn (s) 2 i,j=1 ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME kkf k 3 โ‰ค โˆšC E T n "Z T 0 53 d  n X ฮป i=1  # n Z n (s) n Qn (s) ยต ฮณ i + i i + i i ds . n n n Therefore, first letting T โ†’ โˆž and using (5.2) and (5.4) we see that the expectation on the right-hand side of (5.6) is bounded above. Therefore, as n โ†’ โˆž, the left-hand side of (5.6) tends to 0. Thus, by (5.5) and the fact that f is compactly supported, we obtain Z Lu f (x)ฯ€(dx, du) = 0, Rd ร—U where Lu f (x) = ฮปi โˆ‚ii f (x) + (โ„“i โˆ’ ยตi (xi โˆ’ (e ยท x)+ ui ) โˆ’ ฮณi (e ยท x)+ ui )โˆ‚i f (x). Therefore, ฯ€ โˆˆ G.  5.2. The upper bound. The proof of the upper bound in Theorem 2.2 is a little more involved than that of the lower bound. Generally, it is very helpful if one has uniform stability across n โˆˆ N (see, e.g., [12]). In [12], uniform stability is obtained from the reflected dynamics with the Skorohod mapping. However, here we establish the asymptotic upper bound by using the technique of spatial truncation that we have introduced in Section 4. Let vฮด be any precise continuous control in USSM satisfying vฮด (x) = u0 = (0, . . . , 0, 1) for |x| > K > 1. First, we construct a work-conserving admissible policy for each n โˆˆ N (see [7]). Define a measurable map ฬŸ : {z โˆˆ Rd+ : e ยท z โˆˆ Z} โ†’ Zd+ as follows: for z = (z1 , . . . , zd ) โˆˆ Rd , let ! d X (zi โˆ’ โŒŠzi โŒ‹) . ฬŸ(z) := โŒŠz1 โŒ‹, . . . , โŒŠzdโˆ’1 โŒ‹, โŒŠzd โŒ‹ + i=1 Note that |ฬŸ(z) โˆ’ z| โ‰ค 2d. Define uh (x) := ฬŸ((e ยท x โˆ’ n)+ vฮด (xฬ‚n )), x โˆˆ Rd ,   x1 โˆ’ ฯ1 n xd โˆ’ ฯd n n โˆš xฬ‚ := ,..., โˆš , n n n โˆš o An := x โˆˆ Rd+ : sup |xi โˆ’ ฯi n| โ‰ค K n . i We define a state-dependent, work-conserving policy as follows: ๏ฃฑ n X โˆ’ uh (X n ), if X n โˆˆ An , ๏ฃด ๏ฃด ๏ฃฒ i ! + iโˆ’1 X Zin [X n ] := (5.7) n n ๏ฃด , otherwise. Xj X โˆง nโˆ’ ๏ฃด ๏ฃณ i j=1 54 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Therefore, whenever the state of the system is in Acn , the system works under the fixed priority policy with the least priority given to class-d jobs. First, we show that this is a well-defined policy for all large n. It is enough to show that Xin โˆ’ uh (X n ) โ‰ฅ 0 for all i when X n โˆˆ An . If not, then for some i, 1 โ‰ค i โ‰ค d, we must have Xin โˆ’ uh (X n ) < 0 and so Xin < (e ยท X n โˆ’ n)+ + d. Since X n โˆˆ An , we obtain โˆš โˆ’K n + ฯi n โ‰ค Xin < (e ยท X n โˆ’ n)+ + d !+ d X n (Xi โˆ’ ฯi n) = +d i=1 โˆš โ‰ค dK n + d. But this cannot hold for large n. Hence, this policy is well defined for all large n. Under the policy defined in (5.7), X n is a Markov process and its generator given by Ln f (x) = d X i=1 + ฮปni (f (x + ei ) โˆ’ f (x)) + d X i=1 d X i=1 ยตni Zin [x](f (x โˆ’ ei ) โˆ’ f (x)) ฮณin Qni [x](f (x โˆ’ ei ) โˆ’ f (x)), x โˆˆ Zd+ , where Z n [x] is as above and Qn [x] := x โˆ’ Z n [x]. It is easy to see that, for xโˆˆ / An , ! + #+ " iโˆ’1 X n xj . Qi [x] = xi โˆ’ n โˆ’ j=1 Lemma 5.1. Let X n be the Markov process corresponding to the above control. Let q be an even positive integer. Then there exists n0 โˆˆ N such that  Z T 1 q n sup lim sup E |Xฬ‚ (s)| ds < โˆž, nโ‰ฅn0 T โ†’โˆž T 0 where Xฬ‚ n = (Xฬ‚1n , . . . , Xฬ‚dn )T is the diffusion-scaled process corresponding to the process X n , as defined in (2.4). Proof. The proof technique is inspired by [6], Lemma 3.1. Define fn (x) := d X i=1 ฮฒi (xi โˆ’ ฯi n)q , ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 55 where ฮฒi , i = 1, . . . , d, are positive constants to be determined later. We first show that for a suitable choice of ฮฒi , i = 1, . . . , d, there exist constants Ci , i = 1, 2, independent of n โ‰ฅ n0 , such that Ln fn (x) โ‰ค C1 nq/2 โˆ’ C2 fn (x), (5.8) x โˆˆ Zd+ . Choose n large enough so that the policy is well defined. We define Yin := xi โˆ’ ฯi n. Note that Also, (a ยฑ 1)q โˆ’ aq = ยฑqa ยท aqโˆ’2 + O(aqโˆ’2 ), ยตni Zin [x] = ยตni xi Ln fn (x) = d X i=1 โˆ’ โˆ’ โ‰ค (5.9) i=1 d X i=1 i=1 d X d X i=1 + ฮฒi ยตni xi [qYin |Yin |qโˆ’2 + O(|Yin |qโˆ’2 )] ฮฒi (ฮณin โˆ’ ยตni )Qni [x][qYin |Yin |qโˆ’2 + O(|Yin |qโˆ’2 )] ฮฒi (ฮปni + ยตni xi + |ฮณin โˆ’ ยตni |Qin [x])O(|Yin |qโˆ’2 ) i=1 โ‰ค Then a โˆˆ R. ฮฒi ฮปni [qYin |Yin |qโˆ’2 + O(|Yin |qโˆ’2 )] d X d X + โˆ’ ยตni Qni [x]. ฮฒi qYin |Yin |qโˆ’2 (ฮปni โˆ’ ยตni xi โˆ’ (ฮณin โˆ’ ยตni )Qni [x]) ฮฒi (ฮปni + (ยตni + |ฮณin โˆ’ ยตni |)(Yin + ฯi n))O(|Yin |qโˆ’2 ) d X i=1 ฮฒi qYin |Yin |qโˆ’2 (ฮปni โˆ’ ยตni xi โˆ’ (ฮณin โˆ’ ยตni )Qni [x]), where in the last inequality we use the fact that Qni [x] โ‰ค xi for x โˆˆ Zd+ . Let โˆš ฮดin := ฮปni โˆ’ ยตni ฯi n = O( n). The last estimate is due to the assumptions in (2.1) concerning the parameters in the Halfinโ€“Whitt regime. Then (5.10) d X i=1 ฮฒi qYin |Yin |qโˆ’2 (ฮปni โˆ’ ยตni xi โˆ’ (ฮณin โˆ’ ยตni )Qni [x]) = โˆ’q d X i=1 ฮฒi ยตni |Yin |q + d X i=1 ฮฒi qYin |Yin |qโˆ’2 (ฮดin โˆ’ (ฮณin โˆ’ ยตni )Qni [x]). 56 A. ARAPOSTATHIS, A. BISWAS AND G. PANG If x โˆˆ An and n is large, then Qni [x] = uh (x) = ฬŸ((e ยท x โˆ’ n)+ vฮด (xฬ‚n )) โˆš โ‰ค (e ยท x โˆ’ n)+ + d โ‰ค 2dK n. Let x โˆˆ Acn . We use the fact that for any a, b โˆˆ R it holds that a+ โˆ’ b+ = ฮพ[a โˆ’ b] for some ฮพ โˆˆ [0, 1]. Also, !+ #+ " iโˆ’1 X nฯj = 0, i = 1, . . . , d. nฯi โˆ’ n โˆ’ j=1 Thus, we obtain maps ฮพ, ฮพฬƒ : Rd โ†’ [0, 1]d such that !+ #+ " iโˆ’1 X nฯj โˆ’ Qni [x] โˆ’Qni [x] = nฯi โˆ’ n โˆ’ j=1 = ฮพi (x)(nฯi โˆ’ xi ) โˆ’ ฮพหœi (x) iโˆ’1 X (xj โˆ’ nฯj ), x โˆˆ Acn . j=1 Hence, from (5.10) we obtain d X i=1 ฮฒi qYin |Yin |qโˆ’2 (ฮปni โˆ’ ยตni xi โˆ’ (ฮณin โˆ’ ยตni )Qni [x]) d d X X โˆš ฮฒi ((1 โˆ’ ฮพi (x))ยตni + ฮพi (x)ฮณin )|Yin |q ฮฒi |Yin |qโˆ’1 โˆ’ q โ‰ค O( n)q i=1 i=1 +q d X i=1 ฮฒi Yin |Yin |qโˆ’2 ฮดin โˆ’ (ฮณin โˆ’ ยตni )ฮพฬƒi (x) where we used the fact that on An we have !+ #+ " iโˆ’1 X โˆš = O( n) xj xi โˆ’ n โˆ’ j=1 iโˆ’1 X Yjn j=1 ! , โˆ€i. Observe that there exists ฯ‘ > 0, independent of n due to (2.1), such that (1 โˆ’ ฮพi (x))ยตni + ฮพi (x)ฮณin โ‰ฅ min(ยตni , ฮณin ) โ‰ฅ ฯ‘ for all n โˆˆ N, all x โˆˆ Rd , and all i = 1, . . . , d. As a result, we obtain d X i=1 ฮฒi qYin |Yin |qโˆ’2 (ฮปni โˆ’ ยตni xi โˆ’ (ฮณin โˆ’ ยตni )Qni [x]) 57 ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME d d X X โˆš n qโˆ’1 ฮฒi |Yin |q ฮฒi |Yi | โˆ’ qฯ‘ โ‰ค O( n)q (5.11) i=1 i=1 +q d X i=1 ฮฒi Yin |Yin |qโˆ’2 ฮดin โˆ’ (ฮณin โˆ’ ยตni )ฮพฬƒi (x) iโˆ’1 X j=1 ! Ynj . We next estimate the last term on the right-hand side of (5.11). Let ฮบ := ฯ‘ . Using Youngโ€™s inequality, we obtain the estisupn,i |ฮณin โˆ’ ยตni |, and ฮต1 := 8ฮบ mate q iโˆ’1 iโˆ’1 X 1 X n n qโˆ’1 j n q Yj . |Yi | Yn โ‰ค ฮต1 |Yi | + qโˆ’1 ฮต 1 j=1 j=1 Therefore, q d X i=1 ฮฒi Yin |Yin |qโˆ’2 โˆ’(ฮณin โˆ’ ยตni )ฮพฬƒi (x) โ‰ค qฮบ d X ฮต1 ฮฒi |Yin |q โ‰ค qฮบ d X ฮต1 ฮฒi |Yin |q i=1 i=1 + + iโˆ’1 ฮฒi X ฮต1qโˆ’1 j=1 ฮฒi qโˆ’1 ฮต1qโˆ’1 iโˆ’1 X Yjn j=1 Yjn d ! q! iโˆ’1 X |Yjn |q j=1 ! ! d iโˆ’1 qฯ‘ X ฮฒi qโˆ’1 X n q n q = ฮฒi |Yi | + q d |Yj | . 8 ฮต1 i=1 j=1 We choose ฮฒ1 = 1 and for i โ‰ฅ 2, we define ฮฒi by ฮตq1 ฮฒi := q min ฮฒj . d jโ‰คiโˆ’1 With this choice of ฮฒi it follows from above that q d X i=1 ฮฒi Yin |Yin |qโˆ’2 โˆ’(ฮณin โˆ’ ยตni )ฮพฬƒi (x) iโˆ’1 X j=1 Ynj ! Using the preceding inequality in (5.11), we obtain (5.12) d X i=1 d qฯ‘ X โ‰ค ฮฒi |Yin |q . 4 i=1 ฮฒi qYin |Yin |qโˆ’2 (ฮปni โˆ’ ยตni xi โˆ’ (ฮณin โˆ’ ยตni )Qni [x]) d d X โˆš 3 X ฮฒi |Yin |q . โ‰ค O( n)q ฮฒi |Yin |qโˆ’1 โˆ’ qฯ‘ 4 i=1 i=1 58 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Combining (5.9) and (5.12), we obtain Ln fn (x) โ‰ค (5.13) d X i=1 d X โˆš O(n)O(|Yin |qโˆ’2 ) O( n)O(|Yin |qโˆ’1 ) + i=1 d 3 X ฮฒi |Yin |q . โˆ’ qฯ‘ 4 i=1 By Youngโ€™s inequality, for any ฮต > 0, we have the bounds โˆš โˆš O( n)O(|Yin |qโˆ’1 ) โ‰ค ฮต[O(|Yin |qโˆ’1 )]q/(qโˆ’1) + ฮต(1โˆ’q) [O( n)]q , O(n)O(|Yin |qโˆ’2 ) โ‰ค ฮต[O(|Yin |qโˆ’2 )]q/(qโˆ’2) + ฮต(1โˆ’q/2) [O(n)]q/2 . Thus, choosing ฮต properly in (5.13) we obtain (5.8). We proceed to complete the proof of the lemma by applying (5.8). First, we observe that E[supsโˆˆ[0,T ] |X n (s)|p ] is finite for any p โ‰ฅ 1 as this quantity is dominated by the Poisson arrival process. Therefore, from (5.8) we see that  Z T n n n Ln fn (X (s)) ds E[fn (X (T ))] โˆ’ fn (X (0)) = E 0 โ‰ค C1 n q/2 T โˆ’ C2 E Z T 0  fn (X (s)) ds , n which implies that # "Z d d T X X ฮฒi (Xฬ‚in (0))q . C2 E ฮฒi (Xฬ‚in (s))q ds โ‰ค C1 T + 0 i=1 i=1 Hence, the proof follows by dividing both sides by T and letting T โ†’ โˆž.  Proof of Theorem 2.2. Let r be the given running cost with polynomial growth with exponent m in (2.8). Let q = 2(m + 1). Recall that rฬƒ(x, u) = r((e ยท x)+ u) for (x, u) โˆˆ Rd ร— S. Then rฬƒ is convex in u and satisfies (3.11) with the same exponent m. For any ฮด > 0, we choose vฮด โˆˆ USSM such that vฮด is a continuous precise control with invariant probability measure ยตฮด and Z (5.14) rฬƒ(x, vฮด (x))ยตฮด (dx) โ‰ค ฬบโˆ— + ฮด. Rd We also want the control vฮด to have the property that vฮด (x) = (0, . . . , 0, 1) outside a large ball. To obtain such vฮด , we see that by Theorems 4.1, 4.2 and ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 59 Remark 4.2 we can find vฮดโ€ฒ and a ball Bl for l large, such that vฮดโ€ฒ โˆˆ USSM , vฮดโ€ฒ (x) = ed for |x| > l, vฮดโ€ฒ is continuous in Bl , and Z ฮด rฬƒ(x, vฮดโ€ฒ (x))ยตโ€ฒฮด (dx) โˆ’ ฬบโˆ— < , 2 d R where ยตโ€ฒฮด is the invariant probability measure corresponding to vฮดโ€ฒ . We note that vฮดโ€ฒ might not be continuous on โˆ‚Bl . Let {ฯ‡n : n โˆˆ N} be a sequence c of cut-off functions such that ฯ‡n โˆˆ [0, 1], it vanishes on Blโˆ’(1/n) , and it n n takes the value 1 on Blโˆ’(2/n) . Define the sequence vฮด (x) := ฯ‡ (x)vฮดโ€ฒ (x) + (1 โˆ’ ฯ‡n (x))ed . Then vฮดn โ†’ vฮดโ€ฒ , as n โ†’ โˆž, and the convergence is uniform on the complement of any neighborhood of โˆ‚Bl . Also by Proposition 3.1 the corresponding invariant probability measures ยตnฮด are exponentially tight. Thus, Z Z โ€ฒ โ€ฒ rฬƒ(x, vฮดn (x))ยตnฮด (dx) โˆ’โ†’ 0. rฬƒ(x, vฮด (x))ยตฮด (dx) โˆ’ Rd Rd nโ†’โˆž Combining the above two expressions, we can easily find vฮด which satisfies (5.14). We construct a scheduling policy as in Lemma 5.1. By Lemma 5.1, we see that for some constant K1 it holds that  Z T 1 q n (5.15) |Xฬ‚ (s)| ds < K1 , q = 2(m + 1). sup lim sup E nโ‰ฅn0 T โ†’โˆž T 0 Define vh (x) := ฬŸ((e ยท x โˆ’ n)+ vฮด (xฬ‚n )), โˆš vฬ‚h (xฬ‚n ) := ฬŸ( n(e ยท xฬ‚n )+ vฮด (xฬ‚n )). Since vฮด (xฬ‚n ) = (0, . . . , 0, 1) when |xฬ‚n | โ‰ฅ K, it follows that Qn [X n ] = X n โˆ’ Z n [X n ] = vh (X n ) P n for large n, provided that dโˆ’1 i=1 Xi โ‰ค n. Define ( dโˆ’1 ) X โˆš xฬ‚ni > ฯd n . Dn := x : i=1 Then   1 n r(Qฬ‚ (t)) = r โˆš vฬ‚h (Xฬ‚ (t)) + r(Xฬ‚ n (t) โˆ’ Zฬ‚ n (t))I{Xฬ‚ n (t)โˆˆDn } n   1 n โˆ’ r โˆš vฬ‚h (Xฬ‚ (t)) I{Xฬ‚ n (t)โˆˆDn } . n n 60 A. ARAPOSTATHIS, A. BISWAS AND G. PANG Define, for each n, the mean empirical measure ฮจnT by  Z T 1 IA (Xฬ‚ n (t)) dt . ฮจnT (A) := E T 0 By (5.15), the family {ฮจnT : T > 0, n โ‰ฅ 1} is tight. We next show that  Z Z T 1 n (5.16) lim lim sup E r((e ยท x)+ vฮด (x))ยตฮด (dx). r(Qฬ‚ (t)) dt = nโ†’โˆž T โ†’โˆž T Rd 0 For each n, select a sequence {Tkn : k โˆˆ N} along which the โ€œlim supโ€ in (5.16) is attained. By tightness, there exists a limit point ฮจn of ฮจnT n . Since ฮจn has k support on a discrete lattice, we have     Z Z 1 1 n r โˆš vฬ‚h (x) ฮจn (dx). r โˆš vฬ‚h (x) ฮจT n (dx) โˆ’โ†’ k kโ†’โˆž d n n d R R Therefore, 1 lim sup E T โ†’โˆž T Z T 0    1 r โˆš vฬ‚h (x) ฮจn (dx) ยฑ E n , r(Qฬ‚ (t)) dt โ‰ถ n d R n Z where E n = lim sup T โ†’โˆž 1 E T Z 0 T    1 r(Qฬ‚n (t)) + r โˆš vฬ‚h (Xฬ‚ n (t)) I{Xฬ‚ n (t)โˆˆDn } dt . n By (5.15), the family {ฮจn : n โ‰ฅ 1} is tight. Hence, it has a limit ฮจ. By definition, we have 1 2d โˆš vฬ‚h (x) โˆ’ (e ยท x)+ vฮด (x) โ‰ค โˆš . n n Thus, using the continuity property of r and (2.8) it follows that   Z Z 1 n r โˆš vฬ‚h (x) ฮจ (dx) โˆ’โ†’ r((e ยท x)+ vฮด (x))ฮจ(dx), nโ†’โˆž n d d R R along some subsequence. Therefore, in order to complete the proof of (5.16) we need to show that lim sup E n = 0. nโ†’โˆž Since the policies are work-conserving, we observe that 0 โ‰ค Xฬ‚ n โˆ’ Zฬ‚ n โ‰ค (e ยท Xฬ‚ n )+ , and therefore for some positive constants ฮบ1 and ฮบ2 , we have   1 n r โˆš vฬ‚h (Xฬ‚ (t)) โˆจ r(Xฬ‚ n (t) โˆ’ Zฬ‚ n (t)) โ‰ค ฮบ1 + ฮบ2 [(e ยท Xฬ‚ n )+ ]m . n ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 61 Given ฮต > 0 we can choose n1 so that for all n โ‰ฅ n1 ,  Z T 1 + m n โˆš โˆš [(e ยท Xฬ‚ (s)) ] I{|Xฬ‚ n (s)|>(ฯd / d) n} ds โ‰ค ฮต, lim sup E T โ†’โˆž T 0 p where we use (5.15). We observe that Dn โŠ‚ {|xฬ‚n | > ฯd d/n}. Thus, (5.16) holds. In order to complete the proof, we only need to show that ฮจ is the invariant probability measure corresponding to vฮด . This can be shown using the convergence of generators as in the proof of Theorem 2.1.  6. Conclusion. We have answered some of the most interesting questions for the ergodic control problem of the Markovian multi-class many-server queueing model. This current study has raised some more questions for future research. One of the interesting questions is to consider nonpreemptive policies and try to establish asymptotic optimality in the class of nonpreemptive admissible polices [7]. It will also be interesting to study a similar control problem when the system has multiple heterogeneous agent pools with skill-based routing. It has been observed that customersโ€™ service requirements and patience times are nonexponential [10] in some situations. It is therefore important and interesting to address similar control problems under general assumptions on the service and patience time distributions. Acknowledgements. We thank the anonymous referee for many helpful comments that have led to significant improvements in our paper. Ari Arapostathis acknowledges the hospitality the Department of Industrial and Manufacturing Engineering in Penn State while he was visiting at the early stages of this work. Guodong Pang acknowledges the hospitality of the Department of Electrical and Computer Engineering at University of Texas at Austin while he was visiting for this work. Part of this work was done while Anup Biswas was visiting the Department of Industrial and Manufacturing Engineering in Penn State. Hospitality of the department is acknowledged. REFERENCES [1] Arapostathis, A., Borkar, V. S. and Ghosh, M. K. (2012). Ergodic Control of Diffusion Processes. Encyclopedia of Mathematics and Its Applications 143. Cambridge Univ. Press, Cambridge. MR2884272 [2] Arisawa, M. and Lions, P.-L. (1998). On ergodic stochastic control. Comm. Partial Differential Equations 23 2187โ€“2217. MR1662180 [3] Atar, R. (2005). Scheduling control for queueing systems with many servers: Asymptotic optimality in heavy traffic. Ann. Appl. Probab. 15 2606โ€“2650. MR2187306 [4] Atar, R. and Biswas, A. (2014). Control of the multiclass G/G/1 queue in the moderate deviation regime. Ann. Appl. Probab. 24 2033โ€“2069. MR3226171 [5] Atar, R., Giat, C. and Shimkin, N. (2010). The cยต/ฮธ rule for many-server queues with abandonment. Oper. Res. 58 1427โ€“1439. MR2560545 62 A. ARAPOSTATHIS, A. BISWAS AND G. PANG [6] Atar, R., Giat, C. and Shimkin, N. (2011). On the asymptotic optimality of the cยต/ฮธ rule under ergodic cost. Queueing Syst. 67 127โ€“144. MR2771197 [7] Atar, R., Mandelbaum, A. and Reiman, M. I. (2004). Scheduling a multi class queue with many exponential servers: Asymptotic optimality in heavy traffic. Ann. Appl. Probab. 14 1084โ€“1134. MR2071417 [8] Bogachev, V. I., Krylov, N. V. and Roฬˆckner, M. (2001). On regularity of transition probabilities and invariant measures of singular diffusions under minimal conditions. Comm. Partial Differential Equations 26 2037โ€“2080. MR1876411 [9] Borkar, V. S. (1989). Optimal Control of Diffusion Processes. Pitman Research Notes in Mathematics Series 203. Longman, Harlow. MR1005532 [10] Brown, L., Gans, N., Mandelbaum, A., Sakov, A., Shen, H., Zeltyn, S. and Zhao, L. (2005). Statistical analysis of a telephone call center: A queueingscience perspective. J. Amer. Statist. Assoc. 100 36โ€“50. MR2166068 [11] Budhiraja, A., Ghosh, A. and Liu, X. (2014). Scheduling control for Markovmodulated single-server multiclass queueing systems in heavy traffic. Queueing Syst. 78 57โ€“97. MR3238008 [12] Budhiraja, A., Ghosh, A. P. and Lee, C. (2011). Ergodic rate control problem for single class queueing networks. SIAM J. Control Optim. 49 1570โ€“1606. MR2817491 [13] Dai, J. G. and Tezcan, T. (2008). Optimal control of parallel server systems with many servers in heavy traffic. Queueing Syst. 59 95โ€“134. MR2430811 [14] Dieker, A. B. and Gao, X. (2013). Positive recurrence of piecewise Ornsteinโ€“ Uhlenbeck processes and common quadratic Lyapunov functions. Ann. Appl. Probab. 23 1291โ€“1317. MR3098433 [15] Gamarnik, D. and Stolyar, A. L. (2012). Multiclass multiserver queueing system in the Halfin-Whitt heavy traffic regime: Asymptotics of the stationary distribution. Queueing Syst. 71 25โ€“51. MR2925789 [16] Gamarnik, D. and Zeevi, A. (2006). Validity of heavy traffic steady-state approximation in generalized Jackson networks. Ann. Appl. Probab. 16 56โ€“90. MR2209336 [17] Garnett, O., Mandelbaum, A. and Reiman, M. I. (2002). Designing a call center with impatient customers. Manuf. Serv. Oper. Manag. 4 208โ€“227. [18] Gilbarg, D. and Trudinger, N. S. (1983). Elliptic Partial Differential Equations of Second Order, 2nd ed. Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences] 224. Springer, Berlin. MR0737190 [19] Gurvich, I. (2014). Diffusion models and steady-state approximations for exponentially ergodic Markovian queues. Ann. Appl. Probab. 24 2527โ€“2559. MR3262510 [20] Gyoฬˆngy, I. and Krylov, N. (1996). Existence of strong solutions for Itoฬ‚โ€™s stochastic equations via approximations. Probab. Theory Related Fields 105 143โ€“158. MR1392450 [21] Halfin, S. and Whitt, W. (1981). Heavy-traffic limits for queues with many exponential servers. Oper. Res. 29 567โ€“588. MR0629195 [22] Harrison, J. M. and Zeevi, A. (2004). Dynamic scheduling of a multiclass queue in the Halfinโ€“Whitt heavy traffic regime. Oper. Res. 52 243โ€“257. MR2066399 [23] Ichihara, N. and Sheu, S.-J. (2013). Large time behavior of solutions of Hamiltonโ€“ Jacobiโ€“Bellman equations with quadratic nonlinearity in gradients. SIAM J. Math. Anal. 45 279โ€“306. MR3032978 [24] Kallenberg, O. (2002). Foundations of Modern Probability, 2nd ed. Springer, New York. MR1876169 ERGODIC CONTROL IN THE HALFINโ€“WHITT REGIME 63 [25] Kim, J. and Ward, A. R. (2013). Dynamic scheduling of a GI/GI/1 + GI queue with multiple customer classes. Queueing Syst. 75 339โ€“384. MR3110643 [26] Kocฬงagฬ†a, Y. L. and Ward, A. R. (2010). Admission control for a multi-server queue with abandonment. Queueing Syst. 65 275โ€“323. MR2652045 [27] Krylov, N. V. (1980). Controlled Diffusion Processes. Applications of Mathematics 14. Springer, New York. Translated from the Russian by A. B. Aries. MR0601776 [28] Mandelbaum, A. and Stolyar, A. L. (2004). Scheduling flexible servers with convex delay costs: Heavy-traffic optimality of the generalized cยต-rule. Oper. Res. 52 836โ€“855. MR2104141 [29] Ocone, D. and Weerasinghe, A. (2003). Degenerate variance control in the onedimensional stationary case. Electron. J. Probab. 8 no. 24, 27 pp. (electronic). MR2041825 [30] Pang, G., Talreja, R. and Whitt, W. (2007). Martingale proofs of many-server heavy-traffic limits for Markovian queues. Probab. Surv. 4 193โ€“267. MR2368951 [31] Stannat, W. (1999). (Nonsymmetric) Dirichlet operators on L1 : Existence, uniqueness and associated Markov processes. Ann. Scuola Norm. Sup. Pisa Cl. Sci. (4) 28 99โ€“140. MR1679079 [32] van Mieghem, J. A. (1995). Dynamic scheduling with convex delay costs: The generalized cยต rule. Ann. Appl. Probab. 5 809โ€“833. MR1359830 [33] Yosida, K. (1980). Functional Analysis, 6th ed. Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences] 123. Springer, Berlin. MR0617913 A. Arapostathis A. Biswas Department of Electrical and Computer Engineering The University of Texas at Austin 1616 Guadalupe St., UTA 7.508 Austin, Texas 78701 USA E-mail: [email protected] [email protected] G. Pang The Harold and Inge Marcus Department of Industrial and Manufacturing Engineering College of Engineering Pennsylvania State University University Park, Pennsylvania 16802 USA E-mail: [email protected]
3cs.SY
1 Role Playing Learning for Socially Concomitant Mobile Robot Navigation arXiv:1705.10092v1 [cs.RO] 29 May 2017 Mingming Li, Rui Jiang, Shuzhi Sam Ge, Fellow, IEEE, and Tong Heng Lee, Member, IEEE Abstractโ€”In this paper, we present the Role Playing Learning (RPL) scheme for a mobile robot to navigate socially with its human companion in populated environments. Neural networks (NN) are constructed to parameterize a stochastic policy that directly maps sensory data collected by the robot to its velocity outputs, while respecting a set of social norms. An efficient simulative learning environment is built with maps and pedestrians trajectories collected from a number of real-world crowd data sets. In each learning iteration, a robot equipped with the NN policy is created virtually in the learning environment to play itself as a companied pedestrian and navigate towards a goal in a socially concomitant manner. Thus, we call this process Role Playing Learning, which is formulated under a reinforcement learning (RL) framework. The NN policy is optimized end-toend using Trust Region Policy Optimization (TRPO), with consideration of the imperfectness of robotโ€™s sensor measurements. Simulative and experimental results are provided to demonstrate the efficacy and superiority of our method. l Index Termsโ€”Socially concomitant navigation, mobile robot, neural network, reinforcement learning I. I NTRODUCTION The capability to navigate in densely populated and dynamic environments is one of the most important features that enable the deployment of mobile robots in unstructured environment, such as schools, shopping malls and transportation hubs. The key difference between the problem of navigating among humans and the traditional path planning and obstacle avoidance problems is that humans tend to smoothly evade each other interactively and cooperatively, rather than remaining static or maintaining an indifferent trajectory dynamics. In other words, there are social norms that need to be understood and complied to achieve maximum comfort of all involved pedestrians during navigation. We refer to this as the problem of social navigation, which aims to model such social norms and develop a robotic navigation policy that is socially acceptable to the pedestrians around. For social navigation, the traditional approaches based on Dynamic Window Approach (DWA) [1] or potential fields [2], [3] are usually of limited efficacy as pedestrians are simply regarded as uncooperative obstacles. An illustrative example is the freezing robot problem (FRP) [4], [5], where a mobile robot will be stuck in a narrow corridor when facing a crowd of people if it lacks the ability to predict the joint collision avoidance behaviors of human pedestrians. To this M. Li, R. Jiang, S. S. Ge and T. H. Lee are with the Department of Electrical and Computer Engineering, and the Social Robotics Lab, Smart System Institute (SSI), National University of Singapore, Singapore 117576 (e-mail: li [email protected]; rui [email protected]; [email protected]; [email protected]). end, researches have been done to understand the principles of humansโ€™ joint collision avoidance strategies and one of the pioneering works are the social force model (SFM) [6], [7]. Other joint collision avoidance model such as reciprocal velocity obstacles (RVO) have been proposed in [8], [9], [10], with an underlying assumption that all involved agents adopt the same collision avoidance strategies. These ideas are also applied to visual tracking of pedestrians [11], [12]. More recently, several attempts are made to learn probabilistic models of pedestriansโ€™ trajectories during joint collision avoidance, based on which the robotโ€™s navigation decision is generated such that it is able to behave naturally and correctly in similar situations [13], [5], [14], [15]. In this paper, we propose to augment the dimensions of human-robot interaction in social navigation by further endowing robot with appropriate group behaviors when it is travelling with a human companion. This capability is highly desirable for assistive mobile robots [16], [17], [18], which serve as assistants and companions and are expected to travel along with theirx human partners in not only home environment but also possibly crowded public areas. In other words, apart from understanding the collision avoidance behaviors of pedestrians, the robot also needs to consider the motion of its companion so as to maintain a sense of affinity when they are travelling together towards a certain goal. We call this socially concomitant navigation (SCN) and it is more challenging than the aforementioned social navigation problem, where the robot is assumed to travel alone with a simpler pursuit of reaching a specific goal while being free of collision. To address the problem of SCN, we develop a new learning scheme called Role Playing Learning (RPL). Particularly, we formulate such problem under the framework of Partially Observable Markov Decision Process (POMDP) and reinforcement learning (RL). A neural network (NN) is used to parameterize the navigation policy of the robot, which is optimized to gives proper steering commands for the next time instance based on the robotโ€™s current and previous observations to its surroundings. To facilitate the RL process, we create a simulative navigation environment by mirroring a collections of real world pedestrians data sets and develop an on-policy optimization method called Partially Observable Trust Region Policy Optimization (PO-TRPO). In each run in an optimization iteration, the robot will attempt to play itself as a companion of a randomly chosen pedestrian by executing the NN navigation policy. The NN policy is then optimized using PO-TRPO based on a batch of collected trajectories. Compared to the existing analytically derived or data-driven approaches, our RPL scheme has the following advantages: 2 1) RPL scheme is less restrictive. It does not rely on the assumption that the robot and other agents (pedestrians) share the same decision-making models [8], [9], [10], [5], [14] or that the navigation goals of pedestrians are known [5], [14]. 2) The formulation of RPL scheme is more generalizable and flexible. Our formulation contain no manuallydefined feature and domain knowledge (e.g., statistics of pedestriansโ€™ behaviors). It is not hardware-specific and can be easily modified to incorporate kinematics of different mobile robot platforms, sensor specifications and navigation objectives. In addition, unlike [15], [14], the learned navigation policy operates without assess to the global map of the environment. Therefore, it is not environment-specific and is well generalizable to unmet real-world scenarios. 3) We explicitly consider the noise and limitation of the robotโ€™s sensor measurements. Most approaches for social navigation assume that the robot has full and accurate knowledge of interested variables, such as positions or distance of pedestrians and obstacles [8], [9], [10], [14]. On the contrary, our RPL schemes is rooted from the situation where the robot can only perceive those lie within its sensorโ€™s Field of View (FoV), with the existence of measurement noise. 4) As a RL-based approach, RPL is efficient. Although RPL aims at solving tasks that involve interaction among robot, humans and physical environment, it does not require participation of human in both data collection and learning, which is known to be tedious and timeconsuming. Instead, the learning process is safely automated in a simulative yet realistic environment with no human intervention. We evaluate the performance of our approach in both simulations and real-world experiments, by comparing it with a baseline planner based on RVO [8] and humans, repectively. We also show that, with some tricks, the learned navigation policy can still be effective when the navigation scenario is reduced to the aforementioned social navigation, which means the robot is travelling without human companion. The remainder of this paper is organized as follows. Related work is first reviewed in Section II. In Section III, the problem of SCN is formulated as a POMDP and associated definitions are given. RPL scheme and PO-TRPO algorithm are described in Section IV. Sections V and VI provide extensive results of simulation and experiment, followed by some concluding remarks in Section VII. II. R ELATED W ORK The problems of robot navigation in populated and dynamic environment can be addressed from a number of angles, which can be largely classified into two groups as in the following subsections. A. Interactive Behaviors Models Many researches have been proposed to describe the interactive navigation behaviors of humans by fitting a computational model to the observed pedestrians trajectories [19]. In this way, the robotโ€™s path planner is able to understand pedestriansโ€™ intention during joint collision avoidance and actively calculate an optimal route towards its goal. In the field of robotics, a majority of work in this direction is done via inverse reinforcement learning (IRL) [20], which learns a cost function that explains the observed behaviors. For example, maximum entropy IRL [21] is adopted in a number works [22], [23], [24], [25], [26] for discrete human behavior prediction and route planning. However, discrete representation is less desirable when modeling trajectories, which are in nature continuous and has higher order dynamics, such as velocities and acceleration. Instead, [15] adopts Maximum-A-Posteriori Bayesian IRL [27] to learn appropriate navigation behavior of a specific mobile robot from a set of demonstration trajectories. Note that, the demonstration data in [15] is specific to configurations of the robot and its sensor and has to be collected via human operation, which could be time-consuming. On the other hand, [13], [14] learns probabilistic models of composite trajectories of pedestrians from video data by maximum entropy learning and IRL. To better capture the characteristics of observed trajectories, they propose to develop their models based on a set of features that are hand-crafted according to the domain knowledge from psychological studies. In addition, those features contain velocities and accelerations of pedestrians, which, in practice, are hard to precisely measure. Besides, interacting Gaussian process (IGP) is derived in [5] to model the joint trajectories of pedestrian while explicitly considering the effects of observation noise. Nevertheless, the design of IGP also requires several hand-crafted kernels that are formulated based on the priori information in a specific application scenario. Other than researchers in robotics, the community of computer vision also possess great interest in pedestrian modeling. One of the important topics is trajectory prediction in video space. In [11], Linear Trajectory Avoidance (LTA) is developed as a dynamic model for pedestrians in video space for shortterm trajectory prediction and it is integrated into visual tracking system. Gaussian process is adopted in [28] to learn the motion pattern of pedestrians. Recently, Social LSTM is proposed in [29] for human trajectory prediction in crowd space. Similarly, the feature of social sensitivity is developed in [30] to analyze trajectories of pedestrians and bicyclists. While the above methods can effectively predict the navigation intention of pedestrians in videos, it is still unclear how to apply these model to navigation of robot in real scenarios. B. Steering Models In contrast to learning behavior models of pedestrians, a more direct perspective is to develop a steering model that outputs the immediate navigation actions given the robotโ€™s current observation to the environment. One of the pioneering work in this direction is the social force model (SFM) [6], which uses energy/potential functions to encode the social status of pedestrian. Then, the navigation motivation of a pedestrian can be derived by taking the gradients of these energy functions. Following this idea, subsequent work [31], [32], [33], [12] 3 propose to infer the optimal parameters of the energy function by fitting them to video data. However, they are likely to produce suboptimal results if the demonstration data from humans are imperfect. In [34], the authors integrate a people tracker and an iterative Aโˆ— planner, with which the robot actively follows the pedestrian travelling in a similar direction to navigate through crowded environment. [35] follow the same idea and formulate the choice of a pedestrian to follow as a Multi-Policy Decision Making process. On the other hands, [36] develops a hierarchical POMDP for predictive navigation in dynamic environment. The idea is to predict the motion of pedestrians and generate a environment-specific cost map for path planning and obstacle avoidance. Other than navigating in a pedestrian-aware manner, several reactive collision avoidance techniques have also been developed, such as DWA [1], [37], velocity obstacles [38] and reciprocal velocity obstacles (RVO) [8], [9], [10]. The common idea of these methods is to treat pedestrians as moving obstacles and reactively update the planner every short periods to achieve collision avoidance. As mentioned in Section I, these methods are less effective for social navigation as they lack predictive abilities and are based on some restrictive assumptions, such as accurate knowledge of moving agentsโ€™ velocities [37] and that all agents adopt the identical collision avoidance strategy [8], [9], [10]. Our proposed navigation policy belongs to the steering models. It takes an observation vector as input and outputs the navigation action through a stochastic neural networks. During RPL, our policy is optimized by the PO-TRPO algorithm, which is derived based on the recent advances in deep reinforcement learning (DRL) [39], [40]. DRL exploits the massive representation power of deep neural networks (DNN) [41] to build a complex yet sophisticated decision model, with which an agent can directly learn from raw signals instead of carefully crafted feature and tends to act more intelligently. Recently, there are several attempts in using DNN and DRL for robot navigation. For example, an end-to-end motion planner is learned in [42] to map raw sensor data of a laser range finder onto steering commands of a mobile robot. In [43], a decentralized multi-agent collision avoidance policy is learned via DRL, which can be thought as a DRL version of the original RVO approach [8]. Finally, a target-driven visual navigation policy for home environment is learned in [44] via DRL. They create a set 3D virtual home environments for effective and efficient training of the agent, which shares a similar idea with our proposed RPL scheme. III. P ROBLEM F ORMULATION To formulate the problem of socially concomitant navigation, we gives the following rules of SCN: 1) The robot should reach its goal as fast as possible; 2) The robot should not collide with any of the pedestrians or its companion, or run into any obstacle; 3) The robot should not run too far away from its companion. The above rules serve as a generic description of the robotโ€™s desired performance during navigation. To give concrete definitions, consider the navigation process as an infinite-horizon discounted POMDP in discrete time, defined by the tuple (S, A, F, O, p0 , r, ฮณ). S is a finite set of states s reflecting the navigation status of the robot. A is a finite set of actions a. In this paper, it is defined as a twosome of the translational and rotational velocities of a synchro-drive mobile robot, i.e., a = [vT , vR ]. F : S ร— A โ†’ S is state-transition mapping, which is characterized by the dynamics of the robot, the other humans and the environment. Without loss of generality, we assume deterministic state transition, i.e., si+1 = F (si , ai ), where si , ai are the state and action taken at time ti . O is the set of the robotโ€™s observation o to the state s and ฮฒ(o|s) denotes the conditional observation probability distribution. Note that, in practice, the robotโ€™s observation has only incomplete access to s or is subject to certain measurement noise, which implies o 6= s. p0 : S โ†’ R is the initial state distribution, i.e., s0 โˆผ p0 . r : S โ†’ R is a scalar reward given to the robot and ฮณ โˆˆ (0, 1] is the reward discount factor. Robot motion dynamics: In this paper, synchro-drive mobile robots are considered, whose motion equation can be approximated by assuming the robotโ€™s velocities to be constant within a certain short time period [ti , ti+1 ] [1] with length โˆ†t = ti+1 โˆ’ ti . Particularly, let ฯ†r (ti ) and ฯr (ti ) = [xr (ti ), yr (ti )] denote the robotโ€™s heading and its positions in a 2D Cartesian space at time ti , respectively. vT (ti ) โˆˆ [0, vฬ„T ] and vR (ti ) โˆˆ [โˆ’vฬ„R , vฬ„R ] represent the robotโ€™s translational and rotational velocities. Define โˆ†xr = xr (ti+1 ) โˆ’ xr (ti ) and โˆ†yr = yr (ti+1 ) โˆ’ yr (ti ). When the robot has nonzero rotational velocity, i.e., vR (ti ) 6= 0, we have vT (ti )(sin ฯ†r (ti ) โˆ’ sin(ฯ†r (ti ) + vR (ti )โˆ†t)) (1) vR (ti ) vT (ti )(cos ฯ†r (ti ) โˆ’ cos(ฯ†r (ti ) + vR (ti )โˆ†t)) โˆ†yr = (2) vR (ti ) โˆ†xr = โˆ’ Otherwise, when vR (ti ) = 0, โˆ†xr = vT (ti ) cos ฯ†r (ti ) (3) โˆ†yr = vT (ti ) sin ฯ†r (ti ) (4) With the above formulations, our goal is optimizing a stochastic navigation policy Pฮธ : O ร— A โ†’ [0, 1] with parameters ฮธ in order to maximize the expected discounted reward: ฮท(Pฮธ ) = Eฯ„ [ โˆž X ฮณ i r(si , ai )] (5) i=0 where ฯ„ = (s0 , o0 , a0 , s1 , o1 , a1 , ยท ยท ยท ) denotes the whole trajectory and ai โˆผ Pฮธ (ai |oi ). The specific definitions of the above ingredients for SCN will be elaborated as follows: State: Given ฯr and ฯ†r , define the distance d and direction ฯ† of a point ฯ = [x, y] to the robot as follows: p d(ฯ) = (x โˆ’ xr )2 + (y โˆ’ yr )2 (6) y โˆ’ yr ) โˆ’ ฯ†r (7) ฯ†(ฯ) = arctan( x โˆ’ xr Then, the robotโ€™s distance to the goal located at ฯg = [xg , yg ] are computed as dg = d(ฯg ) and ฯ†g = ฯ†(ฯg ) denotes the offset angle between the robotโ€™s current heading ฯ†r and its goal. Similarly, we can define the twosomes (djped , ฯ†jped ), 4 (djcom , ฯ†jcom ) or (djobs , ฯ†jobs ) to describe the relative position of a pedestrians ฯjped , a companion ฯjcom or an obstacle ฯjobs to the robot. With such definitions, the state s is defined to incorporate the information related to the robotโ€™s navigation status as follows: s = [dg , ฯ†g , a, pped , pcom , pobs ] (8) where a is the current action vector and n n ped ped ] , ฯ†ped pped = [d1ped , ฯ†1ped , ยท ยท ยท , dped (9) pcom = [dcom , ฯ†com ] (10) Lโˆ’ Lโˆ’ Rโˆ’ Rโˆ’ L+ L+ R+ R+ pobs = [dF obs , dobs , ฯ†obs , dobs , ฯ†obs , dobs , ฯ†obs , dobs , ฯ†obs ](11) The vector pped includes the distances and directions of nped closest pedestrians while pcom includes those of the robotโ€™s companion. The vector pobs is a compact description to the robotโ€™s perception of the surrounding environment. Particularly, the boundaries of the occupied space (obstacles) in the environment are represented as a finite point set Z = {ฯ1obs , ฯ2obs , ยท ยท ยท , ฯjobs , ยท ยท ยท }. Then, the 9 variables in pobs are defined based on the following assumption Assumption 1: An obstacle ฯobs โˆˆ Z has no effect on the robotโ€™s navigation decision if it satisfies d(ฯobs ) > dยฏobs , where dยฏobs is a predefined finite constant. By Assumption 1, it is sufficient to consider only obstacles in Z that are closed enough to the robot, whose distances are less than dยฏobs . In practice, this limit may correspond to the robotโ€™s perception range. Let Zฬ„ = {ฯ|ฯ โˆˆ Z, dฯ โ‰ค dยฏobs } (12) The components in vector pobs are described as follows: The distance to the nearest obstacle located at heading of the robot, i.e., dF obs = min ฯโˆˆZฬ„ and |ฯ†(ฯ)|โ‰ควซฯ d(ฯ) (13) where วซฯ is a small constant. L R R For dL obs , ฯ†obs , dobs , ฯ†obs , they represent the distance and direction of the closest and farthest obstacles on the robotโ€™s R left (ฯL obs ) and right side (ฯobs ), respectively, which are defined mathematically as follows: โˆ’ ฯL obs = arg min d(ฯ) (14) ฯโˆˆZฬ„ and ฯ†(ฯ)>วซฯ โˆ’ ฯR obs = arg min d(ฯ) Fig. 1: Illustration of the state variables in Eq. (8). The blue, yellow and green circles represent the robot, its companion (Com.) and the pedestrians (Ped.) respectively. The red dashed circle with a radii dยฏobs represents the boundary of the set Zฬ„ in Eq. 12. The black arrow shows the current heading of the robot. Considering the robotโ€™s current position as the origin, the polar coordinates of the pedestrians, the companion, the closest( and the farthest) obstacles in each direction are compactly represented as vectors pped , pcom , pobs . account in order to develop a robust and practical navigation system. To this end, we define o as the robotโ€™s observation to the true state s as follows: o = [dg , ฯ†g , a, pฬ‚ped , pฬ‚com , pฬ‚obs ] By Eq. (18), we assume that the robot has accurate information about the goal position and its current taken action (i.e., the velocity commands output to the robotโ€™s motor) while its observations to pped , pcom , pobs may be imperfect. Particularly, consider the Field of Views (FoVs) for the robotโ€™s pedestrian and obstacle detectors illustrated as Fig. 2. Mathematically, let finite point sets Fped and Fobs denote the current FoVs of pedestrian and obstacle detectors, characโˆ’ + + โˆ’ + terized by threesomes (ฯ†+ ped , ฯ†ped , dped ) and (ฯ†obs , ฯ†obs , dobs ), respectively. The robotโ€™s observations to the pedestriansโ€™ relative positions are obtained as (15) nped nped ] , ฯ†ฬ‚ped pฬ‚ped = [dห†1ped , ฯ†ฬ‚1ped , ยท ยท ยท , dห†ped ฯโˆˆZฬ„ and ฯ†(ฯ)<โˆ’วซฯ + ฯL obs = arg max d(ฯ) (16) = arg max d(ฯ) dห†jped (17) ฯโˆˆZฬ„ and ฯ†(ฯ)<โˆ’วซฯ Then, the variables in pobs can be simply determined as the distance and directions of the above points according to Eqs. (6) and (7). Figure. 1 provides a comprehensive illustration of the state variables pped , pcom and pobs . Observation: As discussed in the previous sections, sensors mounted on the robot are always subject to various kinds of limitation and measurement noise, which must be taken into (19) where ฯโˆˆZฬ„ and ฯ†(ฯ)>วซฯ + ฯR obs (18) = ( djped + dหœped , if ฯjped โˆˆ Fped d+ else ped , (20) ฯ†jped , if ฯjped โˆˆ Fped ฯ€, if else (21) and ฯ†ฬ‚jped =  for j = 1, ยท ยท ยท , nped , with dหœped being the measurement noise/error. 5 Fig. 2: Field of Views of the pedestrians (green) and obstacles (blue) detectors. The arrow (ฯ† = 0) points towards the + current heading of the robot. The constants ฯ†+ ped , ฯ†obs and โˆ’ โˆ’ ฯ†ped , ฯ†obs denote the maximum and minimum offset angles + in the corresponding FoVs. Finally, d+ ped and dobs represent the maximum detection ranges for the pedestrian and obstacle detectors, respectively. The values of these constants should be determined according the specific configurations of the robotโ€™s sensor and the corresponding detection algorithms. Any pedestrian/obstacle outside the FoVs is not observable and therefore will be omitted. sensors, such as range sensors [45], [46], RGB-D [47], Timeof-Flight (ToF) [48] and omnidirectional cameras [49], as long as the interested positions can be extracted/estimated from the sensorโ€™s raw measurements. Remark 3: The mathematical definitions of the variables in observations pฬ‚ped , pฬ‚com , pฬ‚obs are given for better understanding and are required only in the simulative RPL process. In practice, it is clear that these values can be directly measured via the robotโ€™s onboard sensors without accessing the actual 2-D Cartesian coordinates [x, y] of the considered point sets (e.g., Z, Fped and Fobs ). For example, consider a robot equipped with a laser range finder. These distances and offset angles can be easily obtained from the returned ranges array[50]. Reward function: A scalar reward will be given to the robot as an award of reaching the goal or a penalty of colliding with obstacles/pedestrians/companions or losing its companions. Particularly, at time ti , the process of SCN will be terminated if any of the following three termination conditions is true. 1) Goal Reaching Condition dg (ti ) โ‰ค 0.8 (29) 2) Collision Conditions Similarly, define pฬ‚obs = ห†Lโˆ’ Lโˆ’ ห†Rโˆ’ Rโˆ’ ห†L+ L+ ห†R+ R+ [dห†F obs , dobs , ฯ†ฬ‚obs , dobs , ฯ†ฬ‚obs , dobs , ฯ†ฬ‚obs , dobs , ฯ†ฬ‚obs ] (22) Compared to the states in (13) to (17), only the obstacles within Fobs are observable. Thus, dห†F obs is formulated as dห†F obs = min ฯโˆˆZฬ„โˆฉFobs and |ฯ†(ฯ)|โ‰ควซฯ d(ฯ) + dหœobs (23) where dหœobs is the measurement noise/error for obstacle detection. The closest observed obstacles on the robotโ€™s left and right sides are defined in a similar way as: โˆ’ ฯฬ‚L obs = arg min d(ฯ) + dหœobs (24) ฯโˆˆZฬ„โˆฉFobs and ฯ†(ฯ)>วซฯ โˆ’ ฯฬ‚R obs = d(ฯ) + dหœobs arg min (25) ฯโˆˆZฬ„โˆฉFobs and ฯ†(ฯ)<โˆ’วซฯ + ฯฬ‚L obs = arg max d(ฯ) + dหœobs (26) ฯโˆˆZฬ„โˆฉFobs and ฯ†(ฯ)>วซฯ + ฯฬ‚R obs = arg max d(ฯ) + dหœobs (27) ฯโˆˆZฬ„โˆฉFobs and ฯ†(ฯ)<โˆ’วซฯ Then, their distance and directions to the robot are calculated using Eqs. (6) and (7). For observation to the robotโ€™s companions, we rely on the following assumptions. com Assumption 2: The companions ฯ1com , ยท ยท ยท , ฯncom are always observable to the robot. Then, pฬ‚com = [dห†com , ฯ†com ], where dห†com = dcom + dหœcom (28) Remark 1: By Eqs. (20) and (23) to (28), it is implied that the observation/measurement noises dหœped , dหœobs and dหœcom are additive and independent in different observations. A typical example of such noise is the Additive Gaussian White Noise (AGWN). Remark 2: Our general formulations of states (8) and observations (18) are applicable to various types of onboard min djped (ti ) โ‰ค 0.4 (30) dcom (ti ) โˆ’ Lโˆ’ F min(dobs (ti ), dobs (ti ), dR obs (ti )) โ‰ค 0.4 (31) โ‰ค 0.2 (32) j 3) Stray Condition dcom (ti ) โ‰ฅ 2 Based on the above three will be given to the robot as ๏ฃฑ 10000, ๏ฃด ๏ฃด ๏ฃฒ โˆ’10000, r= ๏ฃด ๏ฃด ๏ฃณ โˆ’10|vR |, (33) terminal conditions, a reward r follows: if (29) if (30) or (31) or ((32) or (33) else (34) Clearly, a positive reward will be given to the robot if it reaches its goal and it will receive a large negative reward if it collides with anything or be stray from its companion. Otherwise, the robot will receive an intermediate reward โˆ’10|vR |, which penalizes the robot for its rotational velocity to encourage a smoother trajectory with less turning behaviors. IV. ROLE P LAYING L EARNING In this section, we described the RPL scheme to learn an effective navigation policy Pฮธ (a|o) for SCN in an efficient data-driven manner. The core idea is to transform the crowd trajectories data collected from real-world into a simulative and dynamic navigation environment, where the robot can play itself as a virtual pedestrian and iteratively improve the performance of Pฮธ (a|o) via Partially Observable Trusted Region Policy Optimization (PO-TRPO). Consider a set of simulative navigation environment E = {E1 , ยท ยท ยท , Ej , ยท ยท ยท }. Each environment Ej = (Tj , Mj ) contains a set of pedestrian trajectories Tj = {ฯk0:Tk } and a binary map Mj that annotates the 2-D Cartesian coordinates of 6 obstacles/occupied space in the environment. With E, the abstract process of RPL is described by the following pseudo codes in Algorithm 1. Algorithm 1 Role Playing Learning Initialize navigation policy Pฮธ for Iter = 0, 1, ยท ยท ยท , MaxIter do while Number of collected sample time steps โ‰ค Batch size do Randomly choose an environment Ej from E and then a trajectory ฯk0:Tk from Tj . Initialize the robotโ€™s position at ฯk0 and initial velocities [vT , vR ] = [0, 0]. Set ฯg = ฯkTk . Choose the robotโ€™s heading such that ฯ†g = 0. Choose SCN Mode with probability 0.5 if SCN Mode then Assign ฯkT0 :Tk as the trajectory of the robotโ€™s companion, where T0 = arg minT โ€ฒ kฯkT โ€ฒ โˆ’ ฯkTk k โ‰ฅ 0.6 else Create a synthesized companion that moves along the robot end if Assign all other trajectories in Tj as pedestrians. while None of the termination conditions in (29) to (33) is satisfied do Update the states and observations of the robot according to Eqs. (8) and (18). Let the robot execute its policy Pฮธ . Update the robotโ€™s position according to dynamics (1) to (4) Calculate the current reward from Eq. (34) Update the positions of the companion and pedestrians according to the trajectories in Tj . end while end while Update Pฮธ using PO-TRPO. end for Companion Synthesization in non-SCN mode: As described in Algorithm 1, RPL actually incorporates two different navigation scenarios: the SCN proposed in this paper and the traditional social navigation scenario, where the robot has no human companion. This helps develop a navigation policy adaptable to both situations, with no restrictive assumption on the existence of companion. Particularly, the companion position vector pcom and its observation pฬ‚com are synthesized, with dcom = dห†com = 0.8 for every time step while ฯ†com = ฯ†g . It is clear that the synthesized pcom is equivalent to the situation where the companion is travelling non-distractively along the robot with a constant distance and guarantee that termination conditions (31) and (33) are always false. On the other hand, in SCN mode, the companion is assigned with a truncated trajectory ฯkT0 :Tk such that the initial robotcompanion distance is sufficiently large. In this paper, we construct a deep policy neural network to parameterize the navigation policy Pฮธ , whose structure is shown in Fig. 3. The policy network Pฮธ is to be trained with the Trust Region Policy Optimization (TRPO) [40] method. Fig. 3: Structure of the deep policy network Pฮธ . At time ti , the observation vector oi is input to the feature network, which is a feedforward multi-layer perceptron (MLP). The output of the feature network is then fed to a LSTM network [51], a recurrent network for aggregation of the information collected through the navigation process. The LSTM networkโ€™s outputs are assigned as the mean vector ยต โˆˆ R2 of the diagonal Gaussian unit N (ยต, ฮฃ) on the right. The covariance matrix ฮฃ = ฯƒ 2 I โˆˆ R2ร—2 , however, is independent of oi amd it is designed to be gradually decreasing during training and fixed during tests and experiments. Finally, the actions ai = [vT , VR ] are drawn according to N (ยต, ฮฃ). However, the original TRPO method is derived based on fully observable MDP, which can not be directly applied to our problem due to the imperfect observation in our formulation and practice. Thus, we proposed to extend the original TRPO algorithm as PO-TRPO, which will be described in the following subsections. A. Trusted Region Policy Optimization The TRPO [40] algorithm is an effective on-policy optimization method for large nonlinear policies and tends to give monotonic improvement during the iterative optimization process. To be specific, a fully observable MDP is considered by TRPO and therefore the policy to be optimized is formulated as Pฮพโˆ— (a|s), where ฮพ is the parameter vector of the policy P โˆ— . Note that, Pฮพโˆ— (a|s) determines the action a directly from the true state s, which differs from our observation-based policy Pฮธ (a|o). Let us consider the following standard definitions of the state-action value function Qฮพ (si , ai ), the value function Vฮพ (si ) and the advantage function Aฮพ (si , ai ): Qฮพ (si , ai ) = Esi+1 ,ai+1 ,ยทยทยท [ โˆž X ฮณ l r(si+l )], (35) l=0 Vฮพ (si ) = Eai ,si+1 ,ยทยทยท [ โˆž X ฮณ l r(si+l )], (36) l=0 Aฮพ (si , ai ) = Qฮพ (si , ai ) โˆ’ Vฮพ (si ) (37) ai โˆผ Pฮพโˆ— (a|s), si+1 = F (si , ai ) (38) where In addition, define ฮฝฮพ as the discounted visitation frequencies ฮฝฮพ (s) = p(s0 = s) + ฮณp(s1 = s) + ฮณ 2 p(s2 = s) + ยท ยท ยท (39) where s0 โˆผ p0 , ai and siโ‰ฅ1 are generated according to Pฮพโˆ— and F . Let ฮพ โˆ’ denote the old parameters in last iteration. TRPO proposes to optimize the parameters ฮพ iteratively regarding the following objective function: 7 Algorithm 2 PO-TRPO maximize subject to Esโˆผฮฝฮพโˆ’ ,aโˆผqโˆ— [ Pฮพโˆ— (a|s) q(a|s) Aฮพ (a|s)] โˆ— Esโˆผฮฝฮพโˆ’ [DKL (Pฮพโˆ’ (ยท|s) k Pฮพโˆ— (ยท|s))] โ‰ค (40) โˆ’ วซ (41) where q โˆ— (a|s) is the importance sampling distribution and DKL (Pฮพโˆ—โˆ’ k Pฮพโˆ— ) is the Kullback-Leibler divergence between the old and current policies. Compute the estimated advantages Aฬ‚i for all time steps using GAE with the estimated value function Vฬ‚ฮถ . Update ฮธ with objective function (49) and constraints (50) Update ฮถ with objective function (47) and constraints (48) V. S IMULATION B. Partially Observable TRPO As mentioned, our navigation problem is considered as a POMDP. The policy Pฮธ (ai |oi ) depends on the observation oi instead of the true state. Therefore, we write the objective function (40) and the constraint (41) as maximize subject to Esโˆผฮฝฮธโˆ’ ,a,oโˆผq [ P o ฮฒ(o|s)Pฮธ (a|o) Aฮธโˆ’ (a|s)] q(a,o|s) Esโˆผฮฝฮธโˆ’ [DKL (Pฮธโˆ’ (ยท|o) k Pฮธ (ยท|o))] โ‰ค วซ (42) (43) For PO-TRPO, samples are collected by executing the old policy Pฮธโˆ’ (a|o) to generate a set of trajectories, such as s0 , o0 , a0 , s1 , o1 , a1 , ยท ยท ยท , sT โˆ’1 , oT โˆ’1 , aT โˆ’1 , sT . Therefore, q(ai , oi |si ) = ฮฒ(oi |si )Pฮธโˆ’ (ai |oi ) (44) where i = 0, ยท ยท ยท , T โˆ’ 1. Next, for a trajectory s0:T , we use the generalized advantage estimation (GAE) [39] to construct an empirical estimation Aฬ‚ of the advantage function Aฮธโˆ’ (ai |si ) as the following: Aฬ‚i = T โˆ’i X V (ฮณฮป)l ฮดi+l (45) l=0 where ฮดiV = ri + ฮณ Vฬ‚ฮถ (si+1 ) โˆ’ Vฬ‚ฮถ (si ) (46) As a data-driven approach, our deep neural network policy requires a massive amount of data to learn the socially concomitant navigation behavior. In this section, we describe how to construct a simulative environment according to the proposed RPL scheme. Particularly, the environments, the deep neural network policy and the PO-TRPO algorithm (Algorithm 2) are developed under the framework of RLLAB [53]. We make use of trajectories of interacting pedestrians collected from five different data sets, which includes the ETH and Hotel video clips from the ETH Walking Pedestrians (EWAP) [11], the motion capture (MC) data set from [14], as well as the Zara and UCY video clips from [32]. Note that, the Zara and UCY data sets have multiple subsets: Zara01, Zara02, Zara03, UCY01 and UCY03. Thus, there are totally 8 different RPL environments, i.e., E = {E1 , ยท ยท ยท , E8 }. The details of these 8 environments are summarized in Tab. I. TABLE I: Details of the 8 RPL environments Name No. Trajectories Name No. Trajectories ETH 365 Zara02 204 Hotel 420 Zara03 137 MC 324 UCY01 413 Zara01 148 UCY03 434 Each trajectory in these environment provides the ID and a sequences of 2-D Cartesian positions of a pedestrian with a sampling period โˆ†t = 0.1 second. In addition, eight binary grid maps M1 , ยท ยท ยท , M8 representing the occupied space/static obstacles are given. However, these maps are kept unknown to the robot throughout training and evaluation. They are only used to simulate the robotโ€™s perception to the environment as the state pobs and observation pฬ‚obs . Without loss of generality, 1ฮถ we use the ETH data set as the evaluation environment and Finally, as the conditional observation probability distribuall other data sets in the Tab. I as training environments. In tion ฮฒ(o|s) is independent of parameters ฮธ and time, we obtain other words, the learned policyโ€™s performance will be assessed an estimation of the objective function (42) and the constraints in an RPL environment that is excluded during training, (43) by replacing the expectations with sample averages as: which reflects whether it can properly generalize to uncovered PK PTk Pฮธ (aki |oki ) k 1 (49) situations. maximize Jฮธ = PK T k Aฬ‚i k=1 i=0 Pฮธโˆ’ (ak i |oi ) k=1 k As some of the trajectories in these environments are ฮธโˆ’ subject to Dฬ„KL (Pฮธโˆ’ , Pฮธ ) โ‰ค วซ (50) of people who were wandering or remained approximately stationary, they are excluded from the candidates of the robotโ€™s where companion but will still be considered as pedestrians when the Tk K X X 1 ฮธโˆ’ k k Dฬ„KL (Pฮธโˆ’ , Pฮธ ) = PK DKL (Pฮธโˆ’ (ยท|oi ) k Pฮธ (ยท|oi ))] robot is navigating in the same environment. We use a feed-forward neural network with 2 hidden layers T k=1 k k=1 i=0 (51) as the feature network in our NN policy, containing 256 and which has the same form as the one obtained in [39], except 64 Tanh units, respectively. Its output is then fed to a LSTM that the policy Pฮธ (a|o) is conditioned on observation o instead. network with 64 units. The variance of of the Gaussian output Finally, the constrained optimization problem described in unit ฯƒ is chosen to be linearly decaying from 0.5 to 0.05 in 100 (49) and (50) is solved by conjugate gradient algorithm [52] training iterations, which effectively encourages exploration algorithm. To summarize, the pseudo code for PO-TRPO during the early stage of learning and ensures convergence update in Algorithm 1 is given as below: of the navigation policy. For GAE, a 3 layer feed-forward and Vฬ‚ฮถ (si ) is the estimation of the value function (36) with parameters ฮถ (and ฮถ โˆ’ being the old parameters). By collecting a set of K trajectories {sk0:Tk , ok0:Tk , ak0:Tk }K k=1 , Vฬ‚ฮถ is obtained by solving the following constrained regression problem [39]: PK PTk PTk โˆ’i l k 2 minimize J1ฮถ = k=1 i=0 kVฬ‚ฮถ (ski )โˆ’ l=0 ฮณ ri+l k (47) PK PTk kVฮถ (ski )โˆ’Vฮถโˆ’ (ski )k โ‰ค วซ1 (48) subject to k=1 i=0 2J โˆ’ 8 network with 256,64,16 Tanh units are used, with ฮณ = 0.995 and ฮป = 0.96. The update step size for policy network is adaptively chosen as วซ = 0.01/ฯƒ. For GAE update, a fixed step size วซ1 = 0.1 is used. The update batch size (Batch size in Algorithm 1) is 50000. In RPL, we consider at most 3 pedestrians (i.e., np = 3). Thus, the state pped and observation pฬ‚ped will only describe the 3 closest pedestrians and omit the others. For the situation where less that 3 pedestrians are perceived, dummy static pedestrians will be created in the remote corner of the environment so as to maintain the dimensions of pped and pฬ‚ped . Considering a Kobuki Turtlebot 2 with a Hokuyo URG04LX laser range finder [50] mounted on its top, we specify the sensor limitation of the robot in simulation as follows: 2ฯ€ (52) ฯ†+ = ฯ†+ ped obs = 3 2ฯ€ ฯ†โˆ’ = ฯ†โˆ’ (53) ped obs = โˆ’ 3 The measurement noises dหœped , dหœcom and dหœobs are modeled 2 2 2 by zero-mean Gaussian N (0, ฯƒped ), N (0, ฯƒcom ) and N (0, ฯƒobs ) with their variances specified as follows: ฯƒped ฯƒcom ฯƒobs = 0.01djped (54) = = 0.01djcom 0.01djobs (55) (56) Finally, the maximum translational and rotational velocities are assigned as 0.7m/s and ฯ€3 rad/s, i.e., 0 โ‰ค vT โ‰ค 0.7 and |vR | โ‰ค ฯ€3 and โˆ†t = 0.1. An example of our RPL environment constructed from the ETH data set is illustrated in Fig. 4 (a) Real-world Environment A. Results We trained our deep policy network for 1200 iterations with the data from RPL environments except for the held-out ETH environment. The curve of average discounted return obtained from each batch of trajectories is visualized in Fig. 5 Fig. 5: Average discounted return as RPL progresses We compare the performance of our policy with a planner based on RVO [8], where the robot, its companion and the surrounding pedestrians are treated agents. In every time steps, the positions and velocities of all agents are given to the planner. Note that, for fair comparison, the agentsโ€™ positions are subject to noise described in (54) and (55). For observations to obstacles, we assume the planner has full and perfect knowledge as required in the original RVO algorithm. With this protocol, we update the robotโ€™s position according to the plannerโ€™s output and update the positions of the other agents according to their own trajectories in the RPL environments. The same termination conditions in Section III are applied to the robot directed by the RVO-based planner to determine whether the robot has conducted an successful navigation. For both of our policy and the RVO-based planner, we conduct 300 trials in the evaluation environment and compute the rates (in percentages) of different terminal conditions (RG: the robot reaches the goal successfully; HC/HP/HO: the robot hits a companion/pedestrian/obstacle; and LC: the robot loses its companion). The performance statistics of our policy and the RVO-based planner in SCN scenarios are listed in Tab. II. (b) Simulative Environment for RPL Fig. 4: An illustrative example our RPL simulative environment. The black curve represents the trajectory of the robot navigating toward its goal (the red dot). The yellow curve denotes the trajectory of the robotโ€™s companion. Besides, there are a number of blue curves representing the pedestrians perceived by the robot and the green lines denotes the fences around the entrance of the university (bottom center). Note that, all trajectories of pedestrians are not synthesized but captured from the video. Thus, the robot can be thought as playing a role as an extra person in an realistic environment. TABLE II: Rates of different terminal conditions of our policy and RVO-based planner in SCN scenarios Terminal Condition Our policy RVO RG 77 29.7 LC 5.7 47 HC 6.7 0.3 HP 9.6 23 HO 1 0 It can bee seen from Tab. II that our policy performs much better than the RVO-based planner in SCN. The RVO-based planner has a much lower success rate (29.7%) while its rate of LC is 47%, suggesting that it frequently losses its companion in SCN. Clearly, this is due to the fact that RVO is in nature a collision avoidance algorithm. Thus, it simply takes the robotโ€™s 9 companion as another normal agent and the robot tends to stay far behind its companion to avoid collision instead of actively following it. On the contrary, our policy achieves a much higher success rate (77%). This indicates that it learns to effectively balance the objectives of SCN so that the robot is able to reach the prescribed goal while maintaining its distance to its companion and avoiding collision with other agents in the environment. In addition to SCN, the scenarios without companion are also tested, which, as analyzed in the previous sections, reduces to the traditional social navigation scenarios. The comparative results are shown in Tab. III. TABLE III: Rates of different terminal conditions of our policy and RVO-based planner in traditional social navigation scenarios Terminal Condition Our policy RVO RG 84 80 HP 13.7 18 Fig. 6: The narrow corridor where experiments are performed HO 2.3 2 For situations without companion, our policy still outperforms the RVO-based planner with higher success rate (84% to 80%) and lower HP rate (13.7% to 18%). Finally, it is worth noting that the RVO-based planner requires velocities of the companion/pedestrians and an accurate global map of the static obstacles. Conversely, our policy depends only on position measurements that are directly accessible from the robotโ€™s onboard sensors, which is therefore much simpler and more practical. (a) Trajectories of the robot (moving from left to right) and other two pedestrians (moving from right to left). VI. E XPERIMENTS In experiments, we assess the performance of our developed navigation policy by comparing it with humans in the same scenarios. Particularly, a robot and a human are to repeat each specific navigation scenario for 10 times, respectively. Then, the the following two metrics are calculated: 1) Average minimum distance to the pedestrians (Dฬ„ped ): the average of the minimum distance between the robot/compared human to other pedestrians throughout a trajectory . 2) Average maximum distance to the companion (Dฬ„com ): the average of the maximum distance between the robot/compared human to its/his companion throughout a trajectory. We use the same mobile platform (a synchron-drive Turtlebot 2 with a Kobuki base) and the same laser range finder (Hokuyo URG-04LX) simulated in last section. For pedestrian detection and localization, we adopt the ROS-compatible leg tracker in [54]. We use an ultra wideband (UWB) indoor positioning system to localize the companion and the navigation goal, which can then be easily mapped to the observations pฬ‚com and dg , ฯ†g based on the odometry of the robot. Finally, a laptop is placed onboard as the processing unit and the policy is operated with a period of 0.1 second. The experiments are conducted in a narrow corridor with width of 1.56 meters as shown in Fig. 6, which is a typical scenario that requires pedestrians to navigate cooperatively. (b) Human control experiment in a similar navigation scenario. The black trajectory is from left to right and the other two are from right to left. Fig. 7: Comparison between the robot with our policy and human control experiment in a social navigation scenario A. Scenario 1: Traditional Social Navigation In this subsection, we examine our methodโ€™s performance in traditional social navigation scenario. Particularly, the robot is required to pass the corridor with two oncoming pedestrians and arrive at a goal that is 7 meters ahead. In addition, a control experiment of 3 humans (one as the compared human and the other two as pedestrians) is conducted in the same space. The metric Dฬ„ped is computed. Example trajectories of the robot and the human control are shown in Fig. 7. In the robotic experiments, the trajectories of pedestrians are obtained from the robotโ€™s laser range finder while the robotโ€™s trajectory is based on its own odometry sensor. On the other hand, all trajectories in the human control experiments are captured using the UWB localization system. From Fig. 7, it is clear that the robot with our policy is 10 able understand humanโ€™s cooperative behavior for collision avoidance and navigate in an appropriate manner such that both itself and the other two pedestrians can successfully pass through the corridor. Specifically, when observing the two pedestrians (blue and purple) 4 meters ahead. The robot started to approach the wall on its left side so as to create free space on the right for the pedestrians to smoothly walk through. By comparing both figures in Fig. 7, we can see that the robot is as proactive as human since both black trajectories in Fig. 7(a) and Fig. 7(b) started to make space for the oncoming pedestrians at the early stage of cooperative avoidance process. As for the performance metrics, the average minimal distance to pedestrians for our robot is Dฬ„ped = 0.35m. Although it is smaller than that of the human control experiments (Dฬ„ped =0.56m), this value still indicates a safe and decent navigation behavior of our robot as its radius is only 0.17m. (a) Trajectories of the robot and its companion (moving from left to right) and a pedestrian (moving from right to left). B. Scenario 2: Socially Concomitant Navigation In this subsection, the scenario of SCN is studied. A human companion initially standing in front of the robot will start to walk through the same corridor while another pedestrian is passing from the other end. As described in the previous sections, the robot with our policy should closely navigate with its companion and avoid the oncoming pedestrian cooperatively. An additional metric Dฬ„com is used to evaluate the performance of our policy by comparing with the statistics obtained from another 10 human control experiments. Example trajectories are shown in Fig. 8 and the performance metrics Dฬ„ped and Dฬ„com are summarized in Tab. IV. TABLE IV: Performance metrics of the robot and human controls in SCN scenarios Robot Compared Human Dฬ„ped (m) 0.49 0.37 Dฬ„com (m) 1.05 1 As shown in Fig. 8 and Tab. IV, the robot is able to achieve both objectives of SCN. On one hand, it is effectively engaged into the joint collision avoidance process. The resulted behavior is similar to that observed in the last subsection and the robot even has a slightly larger Dฬ„ped . On the other hand, the average maximum distance Dฬ„com is 1.05m, which is within the limit (2m) we specified in the learning process and nearly the same as that of the compared human, showing that the robot can actively navigate along with its companion instead of deviating to other areas or lagging itself behind. This shows that the robot driven by our policy is able to understand the pace of its companion and achieve a similar sense of companionship in terms of distance. In sum, the above results demonstrate the practical efficacy of our methods for both the traditional social navigation and the more complicated SCN scenarios. It proves that the policy learned from our RPL simulative environment is transferable to uncovered real-world situations. VII. C ONCLUSIONS In this paper, the problem of socially concomitant navigation (SCN) has been investigated and formulated under a POMDP (b) Human control experiment in a similar SCN. The black (compared human) and orange (companion) trajectories are from left to right and the blue (pedestrian) trajectory is from right to left. Fig. 8: Comparison between the robot with our policy and human control experiment in a SCN scenario framework, with explicit considerations of the limitation and inaccuracy of mobile robotsโ€™ onboard sensors. The Partially Observable TRPO (PO-TRPO) algorithm has been proposed for optimization of navigation policies. The Role Playing Learning (RPL) scheme has been developed to enable efficient and safe reinforcement learning of navigation policies by mirroring a large amount of real-world pedestrian trajectories into simulative environments. Comparative simulation and experiment studies have demonstrated the efficacy and superiority of our policy in both SCN and traditional social navigation scenarios. R EFERENCES [1] D. F. W. B. S. Thrun, D. Fox, and W. Burgard, โ€œThe dynamic window approach to collision avoidance,โ€ IEEE Transactions on Robotics and Automation, vol. 4, p. 1, 1997. [2] Y. K. Hwang and N. Ahuja, โ€œA potential field approach to path planning,โ€ IEEE Transactions on Robotics and Automation, vol. 8, no. 1, pp. 23โ€“32, 1992. [3] S. S. Ge and Y. J. Cui, โ€œNew potential functions for mobile robot path planning,โ€ IEEE Transactions on robotics and automation, vol. 16, no. 5, pp. 615โ€“620, 2000. [4] P. Trautman and A. Krause, โ€œUnfreezing the robot: Navigation in dense, interacting crowds,โ€ in Intelligent Robots and Systems (IROS), 2010 IEEE/RSJ International Conference on, 2010, pp. 797โ€“803. [5] P. Trautman, J. Ma, R. M. Murray, and A. Krause, โ€œRobot navigation in dense human crowds: Statistical models and experimental studies of humanโ€“robot cooperation,โ€ The International Journal of Robotics Research, vol. 34, no. 3, pp. 335โ€“356, 2015. [6] D. Helbing and P. Molnar, โ€œSocial force model for pedestrian dynamics,โ€ Physical review E, vol. 51, no. 5, p. 4282, 1995. [7] D. Helbing, I. Farkas, and T. Vicsek, โ€œSimulating dynamical features of escape panic,โ€ Nature, vol. 407, no. 6803, pp. 487โ€“490, 2000. 11 [8] J. Van Den Berg, S. J. Guy, M. Lin, and D. Manocha, โ€œReciprocal nbody collision avoidance,โ€ in Robotics research, 2011, pp. 3โ€“19. [9] J. Van Den Berg, P. Abbeel, and K. Goldberg, โ€œLqg-mp: Optimized path planning for robots with motion uncertainty and imperfect state information,โ€ The International Journal of Robotics Research, vol. 30, no. 7, pp. 895โ€“913, 2011. [10] J. Van den Berg, M. Lin, and D. Manocha, โ€œReciprocal velocity obstacles for real-time multi-agent navigation,โ€ in Robotics and Automation, 2008. ICRA 2008. IEEE International Conference on, 2008, pp. 1928โ€“1935. [11] S. Pellegrini, A. Ess, K. Schindler, and L. Van Gool, โ€œYouโ€™ll never walk alone: Modeling social behavior for multi-target tracking,โ€ in 2009 IEEE 12th International Conference on Computer Vision, 2009, pp. 261โ€“268. [12] K. Yamaguchi, A. C. Berg, L. E. Ortiz, and T. L. Berg, โ€œWho are you with and where are you going?โ€ in Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on, 2011, pp. 1345โ€“1352. [13] M. Kuderer, H. Kretzschmar, C. Sprunk, and W. Burgard, โ€œFeature-based prediction of trajectories for socially compliant navigation.โ€ in Robotics: science and systems, 2012. [14] H. Kretzschmar, M. Spies, C. Sprunk, and W. Burgard, โ€œSocially compliant mobile robot navigation via inverse reinforcement learning,โ€ The International Journal of Robotics Research, p. 0278364915619772, 2016. [15] B. Kim and J. Pineau, โ€œSocially adaptive path planning in human environments using inverse reinforcement learning,โ€ International Journal of Social Robotics, vol. 8, no. 1, pp. 51โ€“66, 2016. [16] A. Bicchi, A. Fagiolini, and L. Pallottino, โ€œTowards a society of robots,โ€ IEEE Robotics & Automation Magazine, vol. 17, no. 4, pp. 26โ€“36, 2010. [17] H.-M. Gross, C. Schroeter, S. Mueller, M. Volkhardt, E. Einhorn, A. Bley, C. Martin, T. Langner, and M. Merten, โ€œProgress in developing a socially assistive mobile home robot companion for the elderly with mild cognitive impairment,โ€ in Intelligent Robots and Systems (IROS), 2011 IEEE/RSJ International Conference on, 2011, pp. 2430โ€“2437. [18] H. Wang and X. P. Liu, โ€œAdaptive shared control for a novel mobile assistive robot,โ€ IEEE/ASME Transactions on Mechatronics, vol. 19, no. 6, pp. 1725โ€“1736, 2014. [19] B. D. Argall, S. Chernova, M. Veloso, and B. Browning, โ€œA survey of robot learning from demonstration,โ€ Robotics and autonomous systems, vol. 57, no. 5, pp. 469โ€“483, 2009. [20] P. Abbeel and A. Y. Ng, โ€œApprenticeship learning via inverse reinforcement learning,โ€ in Proceedings of the twenty-first international conference on Machine learning, 2004, p. 1. [21] B. D. Ziebart, A. L. Maas, J. A. Bagnell, and A. K. Dey, โ€œMaximum entropy inverse reinforcement learning.โ€ in AAAI, vol. 8, 2008, pp. 1433โ€“ 1438. [22] N. D. Ratliff, J. A. Bagnell, and M. A. Zinkevich, โ€œMaximum margin planning,โ€ in Proceedings of the 23rd international conference on Machine learning, 2006, pp. 729โ€“736. [23] B. D. Ziebart, N. Ratliff, G. Gallagher, C. Mertz, K. Peterson, J. A. Bagnell, M. Hebert, A. K. Dey, and S. Srinivasa, โ€œPlanning-based prediction for pedestrians,โ€ in Intelligent Robots and Systems, 2009. IROS 2009. IEEE/RSJ International Conference on, 2009, pp. 3931โ€“ 3936. [24] P. Henry, C. Vollmer, B. Ferris, and D. Fox, โ€œLearning to navigate through crowded environments,โ€ in Robotics and Automation (ICRA), 2010 IEEE International Conference on, 2010, pp. 981โ€“986. [25] P. Vernaza and D. Bagnell, โ€œEfficient high dimensional maximum entropy modeling via symmetric partition functions,โ€ in Advances in Neural Information Processing Systems, 2012, pp. 575โ€“583. [26] K. M. Kitani, B. D. Ziebart, J. A. Bagnell, and M. Hebert, โ€œActivity forecasting,โ€ in European Conference on Computer Vision. Springer, 2012, pp. 201โ€“214. [27] J. Choi and K.-E. Kim, โ€œMap inference for bayesian inverse reinforcement learning,โ€ in Advances in Neural Information Processing Systems, 2011, pp. 1989โ€“1997. [28] K. Kim, D. Lee, and I. Essa, โ€œGaussian process regression flow for analysis of motion trajectories,โ€ in Computer vision (ICCV), 2011 IEEE international conference on, 2011, pp. 1164โ€“1171. [29] A. Alahi, K. Goel, V. Ramanathan, A. Robicquet, L. Fei-Fei, and S. Savarese, โ€œSocial lstm: Human trajectory prediction in crowded spaces,โ€ in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 961โ€“971. [30] A. Robicquet, A. Sadeghian, A. Alahi, and S. Savarese, โ€œLearning social etiquette: Human trajectory understanding in crowded scenes,โ€ in European Conference on Computer Vision, 2016, pp. 549โ€“565. [31] A. Johansson, D. Helbing, and P. K. Shukla, โ€œSpecification of the social force pedestrian model by evolutionary adjustment to video tracking [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] data,โ€ Advances in complex systems, vol. 10, no. supp02, pp. 271โ€“288, 2007. A. Lerner, Y. Chrysanthou, and D. Lischinski, โ€œCrowds by example,โ€ in Computer Graphics Forum, vol. 26, no. 3. Wiley Online Library, 2007, pp. 655โ€“664. D. Helbing and A. Johansson, โ€œPedestrian, crowd and evacuation dynamics,โ€ in Encyclopedia of Complexity and Systems Science, 2009, pp. 6476โ€“6495. J. Muฬˆller, C. Stachniss, K. Arras, and W. Burgard, โ€œSocially inspired motion planning for mobile robots in populated environments,โ€ in Proc. of International Conference on Cognitive Systems, 2008. D. Mehta, G. Ferrer, and E. Olson, โ€œAutonomous navigation in dynamic social environments using multi-policy decision making,โ€ in Intelligent Robots and Systems (IROS), 2016 IEEE/RSJ International Conference on, 2016, pp. 1190โ€“1197. A. F. Foka and P. E. Trahanias, โ€œProbabilistic autonomous robot navigation in dynamic environments with human motion prediction,โ€ International Journal of Social Robotics, vol. 2, no. 1, pp. 79โ€“94, 2010. M. Seder and I. Petrovic, โ€œDynamic window based approach to mobile robot motion control in the presence of moving obstacles,โ€ in Robotics and Automation, 2007 IEEE International Conference on, 2007, pp. 1986โ€“1991. P. Fiorini and Z. Shiller, โ€œMotion planning in dynamic environments using velocity obstacles,โ€ The International Journal of Robotics Research, vol. 17, no. 7, pp. 760โ€“772, 1998. J. Schulman, P. Moritz, S. Levine, M. Jordan, and P. Abbeel, โ€œHighdimensional continuous control using generalized advantage estimation,โ€ arXiv preprint arXiv:1506.02438, 2015. J. Schulman, S. Levine, P. Moritz, M. I. Jordan, and P. Abbeel, โ€œTrust region policy optimization,โ€ CoRR, abs/1502.05477, 2015. Y. LeCun, Y. Bengio, and G. Hinton, โ€œDeep learning,โ€ Nature, vol. 521, no. 7553, pp. 436โ€“444, 2015. M. Pfeiffer, M. Schaeuble, J. Nieto, R. Siegwart, and C. Cadena, โ€œFrom perception to decision: A data-driven approach to end-toend motion planning for autonomous ground robots,โ€ arXiv preprint arXiv:1609.07910, 2016. Y. F. Chen, M. Liu, M. Everett, and J. P. How, โ€œDecentralized noncommunicating multiagent collision avoidance with deep reinforcement learning,โ€ arXiv preprint arXiv:1609.07845, 2016. Y. Zhu, R. Mottaghi, E. Kolve, J. J. Lim, A. Gupta, L. Fei-Fei, and A. Farhadi, โ€œTarget-driven visual navigation in indoor scenes using deep reinforcement learning,โ€ arXiv preprint arXiv:1609.05143, 2016. D.-G. Choi, Y. Bok, J.-S. Kim, and I. S. Kweon, โ€œExtrinsic calibration of 2-d lidars using two orthogonal planes,โ€ IEEE Transactions on Robotics, vol. 32, no. 1, pp. 83โ€“98, 2016. L. M. Miller and T. D. Murphey, โ€œOptimal planning for target localization and coverage using range sensing,โ€ in Automation Science and Engineering (CASE), 2015 IEEE International Conference on, 2015, pp. 501โ€“508. F. Endres, J. Hess, J. Sturm, D. Cremers, and W. Burgard, โ€œ3-d mapping with an rgb-d camera,โ€ IEEE Transactions on Robotics, vol. 30, no. 1, pp. 177โ€“187, 2014. S. Foix, G. Alenya, J. Andrade-Cetto, and C. Torras, โ€œObject modeling using a tof camera under an uncertainty reduction approach,โ€ in Robotics and Automation (ICRA), 2010 IEEE International Conference on, 2010, pp. 1306โ€“1312. M. Liu and R. Siegwart, โ€œTopological mapping and scene recognition with lightweight color descriptors for an omnidirectional camera,โ€ IEEE Transactions on Robotics, vol. 30, no. 2, pp. 310โ€“324, 2014. L. Kneip, F. Taฬ‚che, G. Caprari, and R. Siegwart, โ€œCharacterization of the compact hokuyo urg-04lx 2d laser range scanner,โ€ in Robotics and Automation, 2009. ICRAโ€™09. IEEE International Conference on, 2009, pp. 1447โ€“1454. S. Hochreiter and J. Schmidhuber, โ€œLong short-term memory,โ€ Neural computation, vol. 9, no. 8, pp. 1735โ€“1780, 1997. J. Nocedal and S. J. Wright, โ€œConjugate gradient methods,โ€ Numerical optimization, pp. 101โ€“134, 2006. Y. Duan, X. Chen, R. Houthooft, J. Schulman, and P. Abbeel, โ€œBenchmarking deep reinforcement learning for continuous control,โ€ arXiv preprint arXiv:1604.06778, 2016. A. Leigh, J. Pineau, N. Olmedo, and H. Zhang, โ€œPerson tracking and following with 2d laser scanners,โ€ in Robotics and Automation (ICRA), 2015 IEEE International Conference on, 2015, pp. 726โ€“733.
2cs.AI
arXiv:1301.2418v1 [math.AC] 11 Jan 2013 BORNES EFFECTIVES DES FONCTIONS Dโ€™APPROXIMATION DES SOLUTIONS FORMELLES Dโ€™ร‰QUATIONS BINOMIALES GUILLAUME ROND Rรฉsumรฉ. The aim of this paper is to give an effective version of the Strong Artin Approximation Theorem for binomial equations. First we give an effective version of the Greenberg Approximation Theorem for polynomial equations, then using the Weierstrass Preparation Theorem, we apply this effective result to binomial equations. We prove that the Artin function of a system of binomial equations is bounded by a doubly exponential function in general and that it is bounded by an affine function if the the order of the approximated solutions is bounded. 1. Introduction Dans [Gr], M. Greenberg a montrรฉ le thรฉorรจme suivant (k est un corps quelconque) : Thรฉorรจme 1.1. [Gr] Soit I un idรฉal de k[t, X] (X := (X1 , ..., Xn )). Alors il existe une fonction ฮฒ : N โˆ’โ†’ N telle que : โˆ€i โˆˆ N, โˆ€xj (t) โˆˆ k[[t]], 1 โ‰ค j โ‰ค n tels que f (t, x(t)) โˆˆ (t)ฮฒ(i) โˆ€f โˆˆ I โˆƒxj (t) โˆˆ k[[t]], 1 โ‰ค j โ‰ค n, tels que f (t, x(t)) = 0 โˆ€f โˆˆ I et xj (t) โˆ’ xj (t) โˆˆ (t)i โˆ€j. De plus il existe deux constantes a et b telles que โˆ€i โˆˆ N ฮฒ(i) โ‰ค ai + b. La plus petite fonction ฮฒ vรฉrifiant cette propriรฉtรฉ est appelรฉe fonction dโ€™approximation de Greenberg ou fonction de Artin-Greenberg de I. Dans [Ar], M. Artin a gรฉnรฉralisรฉ ce rรฉsultat au cas oรน t est remplacรฉ par un nombre fini quelconque de variables en montrant lโ€™existence dโ€™une fonction dโ€™approximation dans ce cas. On peut รฉnoncer son thรฉorรจme sous la forme suivante (dans le cas particulier oรน t est remplacรฉ par deux variables t et z, mais seul ce cas nous intรฉressera par la suite) : Thรฉorรจme 1.2. [Ar] Soit I un idรฉal de k[t, z, X] (X := (X1 , ..., Xn )). Alors il existe une fonction ฮฒ : N โˆ’โ†’ N telle que : โˆ€i โˆˆ N, โˆ€xj (t, z) โˆˆ k[[t, z]], 1 โ‰ค j โ‰ค n, tels que f (t, z, x(t, z)) โˆˆ (t, z)ฮฒ(i) โˆ€f โˆˆ I โˆƒxj (t, z) โˆˆ k[[t, z]], 1 โ‰ค j โ‰ค n tels que f (t, z, x(t, z)) = 0 โˆ€f โˆˆ I et xj (t, z)โˆ’xj (t, z) โˆˆ (t, z)i โˆ€j. La plus petite fonction vรฉrifiant cette propriรฉtรฉ est appelรฉe fonction de Artin de I. On peut remarquer que si I est un idรฉal de k[X] on peut parler de sa fonction de Artin-Greenberg et de sa fonction de Artin en faisant rรฉfรฉrence ร  la fonction de Artin-Greenberg de Ik[t, X] et ร  la fonction de Artin de Ik[t, z, X]. Malheureusement, la preuve donnรฉe par M. Artin (qui utilise essentiellement le thรฉorรจme des fonctions implicites et le thรฉorรจme de prรฉparation de Weierstrass) nโ€™apporte que trรจs peu dโ€™information sur la nature de la croissance de cette fonction (exceptรฉe que celle-ci est constructive [La]), et pendant longtemps sโ€™est posรฉe la question de savoir si toute fonction 2000 Mathematics Subject Classification. Primary 13B40 ; Secondary 13P99, 14B12. 1 2 GUILLAUME ROND de Artin รฉtait bornรฉe par une fonction affine. On peut mentionner quโ€™il existe une maniรจre diffรฉrente de celle de M. Artin pour montrer lโ€™existence dโ€™une fonction dโ€™approximation qui utilise les ultraproduits [B-D-L-v.D] et qui nโ€™est pas constructive et donc qui nโ€™apporte aucune information sur ces fonctions dโ€™approximation. Dans [Ro2] est prรฉsentรฉ un exemple dโ€™un idรฉal dont la fonction de Artin nโ€™est pas bornรฉe par une fonction affine (cโ€™est le seul exemple connu jusquโ€™ร  prรฉsent, lโ€™exemple donnรฉ dans [Ro3] concernant le cas oรน les variables t et z sont remplacรฉes par trois variables). Dans cet exemple il est montrรฉ que la fonction de Artin considรฉrรฉe est minorรฉe par une fonction polynomiale de degrรฉ 2. Nรฉanmoins on ne sait rien de plus sur cette fonction de Artin et on ne connait toujours aucune borne gรฉnรฉrale sur aucun exemple autre que quelques cas connus oรน la fonction de Artin est majorรฉe par une fonction affine. Pour mieux comprendre la croissance des fonctions de Artin, il serait intรฉressant dโ€™avoir des exemples pour lesquels on ait des bornes effectives de leur fonction de Artin. On peut remarquer que lโ€™exemple citรฉ de [Ro2] a la particularitรฉ dโ€™รชtre un idรฉal principal engendrรฉ par un binรดme. Le but de ce travail est justement de donner des bornes gรฉnรฉrales pour la fonction de Artin dโ€™un idรฉal binomial I. Le principe gรฉnรฉral est le suivant : il est plus facile dโ€™essayer de donner des bornes sur les fonctions de Artin dโ€™une famille dโ€™idรฉaux que sur un idรฉal en particulier. En effet, la preuve de M. Artin et ses avatars utilisent toujours une rรฉcurrence sur la hauteur de I : si I est premier, soit on peut utiliser le thรฉorรจme des fonctions implicites et on construit la solution approchรฉe cherchรฉe, soit on remplace I par I + (ฮด) oรน ฮด est un mineur de la matrice jacobienne de I bien choisi et on augmente ainsi la hauteur de I. Cependant, le nouvel idรฉal obtenu nโ€™est plus premier a priori et lโ€™utilisation du thรฉorรจme des fonctions implicites nรฉcessitant de travailler avec un idรฉal premier, il faut remplacer I par ses idรฉaux premiers associรฉs et de borner la fonction de Artin de I par celles de ses idรฉaux premiers associรฉs. Il se trouve que lโ€™on connait des bornes sur le degrรฉ de gรฉnรฉrateurs de ces idรฉaux premiers en fonction du degrรฉ des gรฉnรฉrateurs de I. Il est donc assez naturel dโ€™essayer de trouver une fonction qui majore toutes les fonctions de Artin des idรฉaux engendrรฉ par des polynรดmes de degrรฉ d fixรฉ. Cette stratรฉgie fonctionne comme lโ€™a montrรฉ M. Artin, i.e. on peut choisir la mรชme fonction ฮฒ dans le thรฉorรจme 1.2 pour tous les idรฉaux engendrรฉs par des polynรดmes de degrรฉ infรฉrieur ร  une valeur fixรฉe (c.f. [Ar]). Nรฉanmoins, il nโ€™est pas possible dโ€™avoir plus dโ€™informations sur cette fonction de Artin "uniforme" que le fait que celle-ci soit constructible (cf. [La]). Dans notre travail, nous montrons nรฉanmoins que cette stratรฉgie donne une borne effective des fonctions de Artin-Greenberg, cโ€™est-ร -dire donne une borne effective sur les coefficients a et b du thรฉorรจme 1.1 en fonction du degrรฉ d des gรฉnรฉrateurs de I et du nombre n de variables Xi (c.f. thรฉorรจme 3.1). Celle-ci est assez grande (polynomiale en d, doublement exponentielle en n) mais a le mรฉrite dโ€™รชtre uniforme. Ensuite, grรขce au lemme 4.1, nous utilisons le thรฉorรจme de prรฉparation de Weierstrass de maniรจre ร  ramener la majoration de la fonction de Artin dโ€™un idรฉal binomial ร  deux majorations (cf. section 4) : โ€ข La majoration de la fonction de Artin dโ€™un idรฉal binomial dont les solutions approchรฉes รฉvitent le lieu singulier (et donc dans ce cas cette fonction est majorรฉe par une fonction affine). โ€ข La majoration des fonctions de Artin-Greenberg dโ€™une famille dโ€™idรฉaux (JD )DโˆˆN engendrรฉs par des polynรดmes dรฉpendant dโ€™un nombre croissant de variables mais dont le degrรฉ est bornรฉ par le degrรฉ des gรฉnรฉrateurs de I. Pour cela on utilise donc le thรฉorรจme 3.1. On en dรฉduit deux choses (sur un corps algรฉbriquement clos de caractรฉristique nulle) : si lโ€™on borne lโ€™ordre des solutions approchรฉes xj (t, z), 1 โ‰ค j โ‰ค n, alors la fonction de Artin dโ€™un idรฉal binomial est majorรฉe par une fonction affine, et en gรฉnรฉral la fonction de Artin dโ€™un BORNES EFFECTIVES DES FONCTIONS Dโ€™APPROXIMATION DES SOLUTIONS FORMELLES Dโ€™ร‰QUATIONS BINOMIALES 3 idรฉal binomial est majorรฉe par une fonction doublement exponentielle (c.f. thรฉorรจme 4.2). Malheureusement on nโ€™a aucune maniรจre de savoir si cette derniรจre borne est raisonnable ou pas. En effet la famille dโ€™idรฉaux (JD ) nโ€™est pas quelconque, mais semble tout de mรชme assez difficile ร  apprรฉhender : ces idรฉaux ne sont pas rรฉduits en gรฉnรฉral et il est vite impossible de calculer leur radical ou une dรฉcomposition primaire de ceux-ci du fait du nombre rapidement important de variables qui entrent en jeu. 2. Rappels sur certaines bornes effectives en algรจbre commutative Nous allons commencer par rappeler quelques rรฉsultats classiques en algรจbre commutative effective que nous allons utiliser librement dans la suite. Thรฉorรจme 2.1. [He][Te] Soit I un idรฉal de k[u], u := (u1 , ..., un ), I = (f1 , ..., fp ) avec deg (fr ) โ‰ค d pour 1 โ‰ค r โ‰ค p. Soit I = Q1 โˆฉ ยท ยท ยท โˆฉ Qs une dรฉcomposition primaire minimale โˆš โˆš โˆš (i.e telle que Q ,..., Q soient tous distincts). On a alors I = P l s 1 โˆฉ ยท ยท ยท โˆฉ Ps avec โˆš Pl := Ql pour 1 โ‰ค l โ‰ค s. On a alors les rรฉsultats suivants : โˆš e a) Soit e := min{n, p}(n + 2)(d + 1)min{n,p}+1 โ‰ค (n + 2)2 (d + 1)n+1 . On a I โŠ‚ I. b) On s โ‰ค dmin{n,p} . c) Il existe une fonction ฮป1 (n, d), polynomiale en d et de degrรฉ exponentiel en n, tel que chaque Pl est engendrรฉ par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร  ฮป1 (n, d). d) Il existe une fonction ฮป2 (n, d), polynomiale en d et de degrรฉ exponentiel en n, tel que chaque Ql est engendrรฉ par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร  ฮป1 (n, d). Proposition 2.2. [S] Soient I1 ,..., Iq , q idรฉaux de k[u1 , ..., un ] engendrรฉs par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร  d. Alors I := I1 โˆฉ ยท ยท ยท โˆฉ Iq est engendrรฉ par des polynรดmes de nโˆ’1 degrรฉ infรฉrieur ou รฉgal ร  n((q โˆ’ 1)d)2 +d Dรฉmonstration. ร‰crivons Ii = (fi,1 , ..., fi,si ) oรน deg (fi,j ) โ‰ค d pour tous entiers i et j. Tout systรจme de gรฉnerateurs de I, notรฉ g (1) , ..., g (s) correspond ร  un systรจme gรฉnรฉrateur, notรฉ (s) (1) {ui,j , ..., ui,j } pour 1 โ‰ค i โ‰ค q et 1 โ‰ค j โ‰ค si , du k[u1 , ..., un ]-module dรฉfini par les รฉquations (f1, 1 U1, 1 + ยท ยท ยท + f1,s1 U1,s1 ) โˆ’ (fi,1 Ui, 1 + ยท ยท ยท + fi,si Ui,si ) = 0, 2 โ‰ค i โ‰ค q (l) (l) et reliรฉ par g (l) = fi,1 ui, 1 + ยท ยท ยท + fi,si ui,si pour 1 โ‰ค l โ‰ค s. Dโ€™aprรจs la proposition 55 de [S], (1) (s) (l) nโˆ’1 il existe un tel systรจme {ui,j , ..., ui,j } tel que deg (ui,j ) โ‰ค n((q โˆ’ 1)d)2 l. On en dรฉduit le rรฉsultat. pour tous i, j et  3. Borne effective de la fonction de Artin-Greenberg dans le cas polynomial Dans cette partie nous allons redรฉmontrer le thรฉorรจme de Greenberg en suivant essentiellement sa preuve mais en faisant attention ร  la complexitรฉ de chaque รฉtape. Dans toute cette partie k dรฉsigne un corps de caractรฉristique nulle. Thรฉorรจme 3.1. [Gr][Ar] Pour tous n, d, i โˆˆ N, il existe ฮฒ : N โˆ’โ†’ N tel que pour tout idรฉal I de k[t, x], avec x = (x1 , ..., xn ), tel que deg (fr ) โ‰ค d pour tout r, pour tout i โˆˆ N et pour tout x(t) โˆˆ k[[t]]n tel que f (t, x(t)) โˆˆ (t)ฮฒ(i) pour tout f โˆˆ I, il existe x(t) โˆˆ k[[t]]n tel que f (t, x(t)) = 0 pour tout f โˆˆ I et x(t) โˆ’ x(t) โˆˆ (t)i . De plus ฮฒ peut รชtre choisie affine, de la forme i 7โˆ’โ†’ a(n, d)i + b(n, d) oรน a(n, d) et b(n, d) sont bornรฉs par une fonction polynomiale en d de degrรฉ exponentiel en n. 4 GUILLAUME ROND Dรฉfinition 3.2. Nous noterons dans la suite ฮฒ(n, d, i) le plus petit entier ฮฒ(i) qui vรฉrifie les conclusions du thรฉorรจme 3.1. Nous allons noter ฮฒh (n, d, i) le plus petit entier qui vรฉrifie les conclusions du thรฉorรจme 3.1 pour tout idรฉal I quelconque de hauteur h engendrรฉ par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร  d, et ฮฒhp (n, d, i) le plus petit entier qui vรฉrifie les conclusions du thรฉorรจme 3.1 pour tout idรฉal I premier de hauteur h engendrรฉ par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร  d. Thรฉorรจme 3.3. Pour tous n, d, dโ€ฒ , i, j โˆˆ N, nous avons les relations suivantes : (1) p ฮฒn+1 (n, d, i) โ‰ค 2 (2) ฮฒk (n, d, i) โ‰ค (n + 3)2 (d + 1)2n+3 max {ฮฒhp (n, ฮป1 (n + 1, d), i)} (3) ฮฒkp (n, d, i) โ‰ค (eโ€ฒ + 1)ฮฒk+1 (n, k(d โˆ’ 1), i) + 1   n n+2 . eโ€ฒ := (n + 3)2 1 + ฮป2 (n + 1, d) + (n + 1)((dn+1 โˆ’ 2)ฮป2 (n + 1, d))2 h>k Ce thรฉorรจme implique directement le thรฉorรจme 3.1. Nous allons donner une preuve du thรจorรจme 3.1 en montrant au fur et ร  mesure les inรฉgalitรฉs (1), (2) et (3) du thรฉorรจme 3.3. โ€ข Si ht(I) = n + 1 et I est premier, alors I est un idรฉal maximal. Supposons quโ€™il existe x(t) โˆˆ k[[t]]x tel que f (t, x(t)) โˆˆ (t)2 pour tout f โˆˆ I, et notons ฯ• : k[t, x] โˆ’โ†’ k le k-homomorphisme dรฉfini par ฯ•(h) = h(0, x(0)). Alors I โŠ‚ Ker(ฯ•), mais Ker(ฯ•) รฉtant un idรฉal propre de k[t, x] et I maximal, nous avons I = Ker(ฯ•). Donc en particulier t โˆˆ I, mais clairement t โˆˆ / Ker(ฯ•โ€ฒ ) ce qui contredit lโ€™existence de x(t). Donc on peut prendre ici ฮฒ = 2, le thรฉorรจme 3.1 est alors valable car lโ€™hypothรจse nโ€™est jamais vรฉrifiรฉe, et on a lโ€™รฉgalitรฉ (1). โ€ข Supposons que ht(I) = k, oรน I = (f1 , ..., fp ), et que le thรฉorรจme 3.1 est vrai pour tout idรฉal de hauteur strictement plus grande que k. โˆš Soit I = P1 โˆฉ ยท ยท ยท โˆฉ Ps la dรฉcomposition primaire du radical de I, oรน ht(Pl ) = hl . Notons Ps e := (n + 1)(n + 3)(d + 1)n+2 . Alors lโ€™entier ฮฒ โ€ฒ := e. l=1 ฮฒhpl (n, ฮป1 (n + 1, d), i) satisfait โ€ฒ les conditions du thรฉorรจme 3.1 pour I. En effet soit x(t) โˆˆ k[[t]]n tel que f (t, x(t)) โˆˆ (t)ฮฒ p ฮฒ (n,ฮป(n+1,d),i) pour tout f โˆˆ I. Donc il existe un entier l tel que g(t, x(t)) โˆˆ (t) hl pour tout g โˆˆ Pl . En effet, dans le cas contraire, pour tout l, il existerait gl โˆˆ Pl tel que ฮฒ p (n,ฮป(n+1,d),i) gl (t, x(t)) โˆˆ / (t) hl . Notons alors g := (g1 ...gs )e . On a g โˆˆ I par dรฉfinition de โ€ฒ e et des Pl , mais g(t, x(t)) โˆˆ / (t)ฮฒ ce qui contredit ce qui prรฉcรจde, et donc il existe un entier l tel que g(t, x(t)) โˆˆ (t)ฮฒhl (n,ฮป(n+1,d),i) pour tout g โˆˆ Pl . Donc il existe x(t) โˆˆ k[[t]]n tel que g(t, x(t)) = 0 pour tout g โˆˆ Pl et tel que x(t) โˆ’ x(t) โˆˆ (t)i . Comme I โŠ‚ Pl , on obtient la conclusion voulue. On a montrรฉ ainsi lโ€™inรฉgalitรฉ (2). โ€ข Nous supposons donc maintenant que I = (f1 , ..., fp ) est premier de hauteur k. Alors k[t, x]I est rรฉgulier, et on peut supposer que f1 , ..., fk engendrent Ik[t, x]I . Il existe donc un 1 ,...,fk ) , notรฉ ฮด, tel que ฮด โˆˆ / I (cf. par exemple mineur dโ€™ordre k de la matrice jacobienne โˆ‚(fโˆ‚(t,x) proposition 1 [Wa]). Notons J := (f1 , ..., fp , ฮด). On a alors ht(J) = k + 1. Remarquons que deg (ฮด) โ‰ค k(d โˆ’ 1). Notons alors I โ€ฒ := (f1 , ..., fk ) et soit I โ€ฒ = Q1 โˆฉ ยท ยท ยท โˆฉ Qq une dรฉcomposition primaire rรฉduite BORNES EFFECTIVES DES FONCTIONS Dโ€™APPROXIMATION DES SOLUTIONS FORMELLES Dโ€™ร‰QUATIONS BINOMIALES 5 de I โ€ฒ . Nous allons renumรฉroter les Ql de telle sorte que Ql โŠ‚ I pour 1 โ‰ค l โ‰ค s et Ql 6โŠ‚ I pour l > s. Or Ik[t, x]I = I โ€ฒ k[t, x]I et Q1 k[t, x]I โˆฉ ยท ยท ยท โˆฉ Qs k[t, x]I est une dรฉcomposition primaire rรฉduite de Ik[t, x]I (cf. Theorem 17, chapter 4 [Z-S]), donc s = 1 et I = Q1 . Soit J โ€ฒ := Q2 โˆฉ ยท ยท ยท โˆฉ Qq si q 6= 1 et J โ€ฒ = A si q = 1. On pose alors J = J โ€ฒ si I 6โŠ‚ J โ€ฒ et J := A si I โŠ‚ J โ€ฒ . On a donc I โ€ฒ = I โˆฉ J et J 6โŠ‚ I. Chaque idรฉal Ql est engendrรฉ par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร  ฮป2 (n + 1, d). Donc J โ€ฒ est engendrรฉ par des polynรดmes de degrรฉ infรฉrieur ou รฉgal ร  (n + 1)((q โˆ’ 2)ฮป2 (n + โˆš n 1, d))2 + ฮป2 (n + 1, d). On a ฮด โˆˆ I + J (cf. lemma 7 [Wa]). Notons   n n+2 . eโ€ฒ := (n + 3)2 1 + ฮป2 (n + 1, d) + (n + 1)((dn+1 โˆ’ 2)ฮป2 (n + 1, d))2 โ€ฒ Alors ฮด e โˆˆ I + J car q โ‰ค dn+1 . Soit ฮฑ := (e + 1)โ€ฒ ฮฒk+1 (n, k(d โˆ’ 1), i) + 1 Soit x(t) โˆˆ k[[t]]n tel que f (t, x(t)) โˆˆ (t)ฮฑ pour tout f โˆˆ I. Cas 1 : Si ฮด(t, x(t)) โˆˆ (t)ฮฒk+1 (n,k(dโˆ’1),i) , comme ฮฑ โ‰ฅ ฮฒk+1 (n, k(d โˆ’ 1), i), par dรฉfinition de ฮฒk+1 , il existe x(t) โˆˆ k[[t]]n tel que f (t, x(t)) = ฮด(t, x(t)) = 0 pour tout f โˆˆ I et x(t) โˆ’ x(t) โˆˆ (t)i , et on a la conclusion voulue. Cas 2 : Supposons maintenant que ฮด(t, x(t)) โˆˆ / (t)ฮฒk+1 (m,k(dโˆ’1),i) . En dรฉrivant la relation โ€ฒ fr (t, x(t)) โˆˆ (t)(e +1)ฮฒk+1 (n,k(dโˆ’1),i)+1 par rapport ร  t, on obtient X โˆ‚fr โ€ฒ โˆ‚fr โˆ‚xฮป (t) (t, x(t)) (t, x(t)) = โˆ’ mod. (t)(e +1)ฮฒk+1 (n,k(dโˆ’1),i) . โˆ‚t โˆ‚xฮป โˆ‚t ฮป On en dรฉduit lโ€™existence dโ€™un mineur dโ€™ordre k de la matrice jacobienne de f , encore notรฉ โˆ‚(f1 ,...,fk ) ฮด, qui ne fait intervenir que des dรฉrivรฉes partielles par rapport aux xฮป (i.e. ฮด = โˆ‚(x 1 ,...,xk ) quitte ร  renommer les variables xฮป ), tel que ฮด(t, x(t)) โˆˆ / (t)ฮฒk+1 (n,k(dโˆ’1),i) . En particulier ฮดโˆˆ / (f1 , ..., fp ). Par dรฉfinition de ฮฑ et en utilisant le thรฉorรจme des fonctions implicites de Tougeron (c.f. thรฉorรจme 3.2 [To] ou Lemma 5.11 [Ar]), il existe x(t) โˆˆ k[[t]]n tel que fr (t, x(t)) = 0, โ€ฒ pour 1 โ‰ค r โ‰ค k, et x(t) โˆ’ x(t) โˆˆ (t)e ฮฒk+1 (n,k(dโˆ’1),i) . On a alors ฮด(t, x(t)) โˆ’ ฮด(t, x(t)) โˆˆ โ€ฒ (t)e ฮฒk+1 (n,k(dโˆ’1),i) et eโ€ฒ โ‰ฅ 1. Donc ฮด(t, x(t)) โˆˆ / (t)ฮฒk+1 (n,k(dโˆ’1),i) . Pp โ€ฒ โ€ฒ Or ฮด e โˆˆ I + J, donc ฮด e = r=1 hr fr + h0 oรน h0 โˆˆ J. Comme fr (t, x(t)) โˆ’ fr (t, x(t)) โˆˆ โ€ฒ (t)e ฮฒk+1 (n,k(dโˆ’1),i) et fr (t, x(t)) โˆˆ (t)ฮฑ , pour 1 โ‰ค r โ‰ค p, on voit que โ€ฒ fr (t, x(t)) โˆˆ (t)e ฮฒk+1 (n,k(dโˆ’1),i) pour 1 โ‰ค r โ‰ค p โ€ฒ (car ฮฑ โ‰ฅ eโ€ฒ ฮฒk+1 (n, k(d โˆ’ 1), i)). Donc nรฉcessairement h0 (t, x(t)) โˆˆ / (t)e ฮฒk+1 (n,k(dโˆ’1),i) , dโ€™oรน โ€ฒ h0 (t, x(t)) 6= 0. Or h0 fr โˆˆ I โˆฉJ = I = (f1 , ..., fk ) pour 1 โ‰ค r โ‰ค p. On en dรฉduit fr (t, x(t)) = 0 pour 1 โ‰ค r โ‰ค p. Comme ฮฒk+1 (n, k(d โˆ’ 1), i) โ‰ฅ i, on a x(t) โˆ’ x(t) โˆˆ (t)i ce qui conclut la dรฉmonstration. 6 GUILLAUME ROND 4. Fonction de Artin dโ€™un idรฉal binomial Pour รฉtudier la fonction de Artin dโ€™un idรฉal binomial, nous allons mettre les xi (t, z) sous forme de Weierstrass et nous allons utiliser le lemme suivant : Lemme 4.1. Soit k un corps quelconque. Soient P = u(x)(a0 (e x)+a1 (e x)xn +ยท ยท ยท+adโˆ’1 (e x)xdโˆ’1 n + d eโˆ’1 e xn ) et Q = v(x)(b0 (e x) + b1 (e x)xn + ยท ยท ยท + beโˆ’1 (e x)xn + xn ) โˆˆ k[[x1 , ..., xn ]] deux polynรดmes de Weierstrass en xn (avec x = (x1 , ..., xn ) et x e := (x1 , ..., xnโˆ’1 )) tels que P โˆ’ Q โˆˆ (x)i avec iโˆ’d i > d. Alors d = e, u(x)โˆ’v(x) โˆˆ (x) et aj (e x)โˆ’bj (e x) โˆˆ (e x)iโˆ’d+ord(P )โˆ’j pour 0 โ‰ค j โ‰ค dโˆ’1. Dรฉmonstration. Tout dโ€™abord comme i > d, on voit que e = d car (P โˆ’Q)(0, ..., 0, xn ) โˆˆ (xn )i et le terme constant de u est รฉgal au terme constant de v. De mรชme ord(P ) = ord(Q). Dโ€™autre part, si P โˆ’ Q โˆˆ (x)i alors uโˆ’1 P โˆ’ uโˆ’1 Q โˆˆ (x)i . On peut donc supposer que u = 1. La division de Weirstrass de xdn par P par rapport ร  la variable xn est la suivante : x)xdโˆ’1 โˆ’ ยท ยท ยท โˆ’ a0 (e x)). xdn = 1.P + R(x) = P + (โˆ’adโˆ’1 (e n Considรฉrons la division de Weierstrass de xdn par Q par rapport ร  la variable xn : xdn = C(x)Q + Rโ€ฒ (x) = C(x)Q + Ddโˆ’1 (e x)xdโˆ’1 + ยท ยท ยท + D0 (e x). n Par unicitรฉ dans le thรฉorรจme de division de Weierstrass, on a C(x) = v โˆ’1 (x) et Dj (e x) = โˆ’bj (e x) pour 0 โ‰ค j โ‰ค d โˆ’ 1. Cette division peut se faire de maniรจre algorithmique. En effet on construit les suites (Ck (x))k et (Rk (x))k par rรฉcurrence de la maniรจre qui suit : on pose xdn = C0 (x)Q + R0 avec C0 (x) = 1. Puis par induction, pour k โ‰ฅ 0, si xdn = Ck (x)Q+Rk (x), on considรจre le plus petit monรดme de Rk divisible par xdn , notรฉ Mk , et on pose k Q. Alors la suite (ord(Rk+1 (x) โˆ’ Rk (x)))k est strictement croissante Rk+1 (x) := Rk (x) โˆ’ M xd n et (Rk (x))k converge vers Rโ€ฒ (x) pourP la topologie (x)-adique. De mรชme la suite (deg (Mk ))k k est strictement croisssante et C(x) = k M xd . En particulier, comme R0 (x)โˆ’R(x) = Qโˆ’P โˆˆ n (x)i , M0 est un monรดme de degrรฉ supรฉrieur ou รฉgal ร  i, et C(x) โˆ’ 1 โˆˆ (x)iโˆ’d . On en dรฉduit que R(x) โˆ’ Rโ€ฒ (x) โˆˆ (x)i , donc aj (e x) โˆ’ bj (e x) โˆˆ (x)iโˆ’d+ord(P )โˆ’j , pour 0 โ‰ค j โ‰ค d โˆ’ 1.  Nous allons maintenant รฉtudier la fonction de Artin dโ€™un idรฉal binomial. Soit k un corps algรฉbriquement clos et soit I un idรฉal de k[[t, z]][X1 , ..., Xn ] engendrรฉ par f1 ,..., fp avec fk := ak X ฮฑk + bk X ฮฒk oรน ak , bk โˆˆ k et ฮฑk , ฮฒk โˆˆ Nn pour 1 โ‰ค k โ‰ค p. Considรฉrons xj (t, z) โˆˆ k[[t, z]], 1 โ‰ค j โ‰ค n, tels que fk (xj (t, z)) โˆˆ (t, z)i , 1 โ‰ค k โ‰ค p. On peut supposer, quitte ร  faire un changement linรฉaire de coordonnรฉes en t et z, que les xj sont rรฉguliรจres en la variable z. On a donc xj (t, z) = uj (t, z)(xj,0 (t) + xj,1 (t)z + ยท ยท ยท + xj,dj โˆ’1 (t)z dj โˆ’1 + z dj ) oรน dj est lโ€™ordre de P xj (t, z) avec xj,l โˆˆ (t)k[[t]], pour 1 โ‰ค j โ‰ค n et 0 โ‰ค l โ‰ค dj . Supposons que i > j ฮฑk,j dj pour tout k. En utilisant le lemme 4.1, on a alors X X ฮฒk,j dj , 1 โ‰ค k โ‰ค p, ฮฑk,j dj = Dk := j j fk (u1 (t, z), ..., un (t, z)) โˆˆ (t, z)iโˆ’Dk , 1 โ‰ค k โ‰ค p et Pd (xj,l (t)) โˆˆ (t)iโˆ’d oรน Pd (Xj,l ) โˆˆ k[Xj,l , 1โ‰คjโ‰คn, 0โ‰คlโ‰คdj โˆ’1 ] est le coefficient de z d dans Y ฮฒk,j ฮฑk,j Y Xj,0 + ยท ยท ยท + Xj,dj โˆ’1 z dj โˆ’1 + z dj Xj,0 + ยท ยท ยท + Xj,dj โˆ’1 z dj โˆ’1 + z dj + j j BORNES EFFECTIVES DES FONCTIONS Dโ€™APPROXIMATION DES SOLUTIONS FORMELLES Dโ€™ร‰QUATIONS BINOMIALES 7 Notons D := maxk Dk . On obtient alors deux systรจmes dโ€™รฉquations indรฉpendants lโ€™un de lโ€™autre : (1) fk (u1 (t, z), ..., un (t, z)) โˆˆ (t, z)iโˆ’D , 1 โ‰ค k โ‰ค p (2) Pd (xj,l (t)) โˆˆ (t)iโˆ’D , 0 โ‰ค d โ‰ค D โˆ’ 1. On va chercher la fonction dโ€™approximation de Artin de ces deux systรจmes, le premier ayant une fonction de Artin bornรฉe par une fonction affine puisque ui (0, 0) 6= 0 pour tout i et que le lieu singulier dโ€™une variรฉtรฉ torique est inclus dans lโ€™union des axes de coordonnรฉes, et le second รฉtant un systรจme ร  coefficients dans k[[t]]. Thรฉorรจme 4.2. Soit k un corps algรฉbriquement clos de caractรฉristique nulle. Alors on a les propriรฉtรฉs suivantes : i) Pour tout dโ€ฒ โˆˆ N et pour tout d := (d1 , ...., dn ) โˆˆ Nn , il existe ad,dโ€ฒ , bd,dโ€ฒ vรฉrifiant la propriรฉtรฉ suivante : Soit I un idรฉal binomial de k[U1 , ..., Un ] engendrรฉ par des binรดmes f1 , ..., fp de degrรฉ infรฉrieur ร  dโ€ฒ . Soit i โˆˆ N et soient x1 (t, z),..., xn (t, z) โˆˆ k[[t, z]] tels que ord(xj (t, z)) = dj et fk (xj (t, z)) โˆˆ (t, z)ad,dโ€ฒ i+bd,dโ€ฒ , pour tous k. Alors il existe xj (t, z) โˆˆ k[[t, z]], tels que fk (xj (t, z)) = 0 pour tout k et tels que xj (t, z) โˆ’ xj (t, z) โˆˆ (t, z)i pour tout j. ii) Pour tout dโ€ฒ โˆˆ N il existe une fonction doublement exponentielle en i, notรฉe ฮฒdโ€ฒ , telle que pour tout idรฉal binomial I de k[U1 , ..., Un ] engendrรฉ par des binรดmes de degrรฉ infรฉrieur ร  dโ€ฒ , la fonction de Artin de Ik[[t, z]][U ] est bornรฉe par ฮฒdโ€ฒ . Dรฉmonstration. Nous allons dโ€™abord montrer i) dont on dรฉduira ensuite ii). Supposons, comme prรฉcรฉdemment, que I est engendrรฉ par les fk := ak X ฮฑk + bk X ฮฒk , oรน ak , bk โˆˆ k et ฮฑk , ฮฒk โˆˆ Nn pour 1 โ‰ค โˆš k โ‰ค p. โˆš Lโ€™idรฉal I รฉtant un idรฉal binomial, I est encore un idรฉal binomial et, si I = I1 โˆฉ ยท ยท ยท โˆฉ Iq est โˆš I, alors les I sont des idรฉaux binomiaux [E-S]. une dรฉcomposition primaire minimale de k โˆš e Soit e โˆˆ N tel que I โŠ‚ I. Supposons que fl (u1 (t, z), ..., un (t, z)) โˆˆ (t, z)qei , 1 โ‰ค l โ‰ค โˆšp oรน uj,0 := uj (0, 0) 6= 0 pour tout j. Alors g(u1 (t, z), ..., un (t, z)) โˆˆ (t, z)qi pour tout g โˆˆ I, et donc il existe un entier k tel que g(u1 (t, z), ..., un (t, z)) โˆˆ (t, z)i pour tout g โˆˆ Ik . Comme Ik est un idรฉal premier binomial de k[U ] alors (k[U ]/Ik )(U1 โˆ’u1,0 ,...,Un โˆ’un,0 ) est rรฉgulier car u1,0 ...un,0 6= 0 (le lieu singulier dโ€™une variรฉtรฉ torique est toujours inclus dans lโ€™union des hyperplans de coordonnรฉes). Donc k โˆ’โ†’ (k[U ]/Ik )(U1 โˆ’u1,0 ,...,Un โˆ’un,0 ) est lisse, donc k[[t, z]] โˆ’โ†’ (k[[t, z]][U ]/Ik )(t,z,U1 โˆ’u1,0 ,...,Unโˆ’un,0 ) est lisse ; ceci implique quโ€™il existe uj (t, z) โˆˆ k[[t, z]], 1 โ‰ค j โ‰ค n, tels que g(u1 (t, z), ..., un (t, z)) = 0 pour tout g โˆˆ Ik et uj (t, z) โˆ’ uj (t, z) โˆˆ (t, z)i . Soit i โˆ’โ†’ ai + b la fonction de Artin de lโ€™idรฉal de k[[t]][Xj,l ] engendrรฉ par les Pd (Xj,l ), 0 โ‰ค d โ‰ค D โˆ’ 1. Posons ad := max{qe, a} et bd := b + D. Dโ€™aprรจs les thรฉorรจmes 2.1 et 3.1, on voit que ad et bd peuvent รชtre bornรฉes par une fonction dรฉpendant uniquement de dโ€ฒ . Soit i โˆˆ N, on a alors ad i + bd > D. Dโ€™aprรจs ce qui prรฉcรจde, si fk (xj (t, z)) โˆˆ (t, z)ad i+bd โˆ€k, alors fk (u1 (t, z), ..., un (t, z)) โˆˆ (t, z)qei , 1 โ‰ค k โ‰ค p 8 GUILLAUME ROND et Pd (xj,l (t)) โˆˆ (t)ai+b , 0 โ‰ค d โ‰ค D. Donc il existe uj (t, z) โˆˆ k[[t, z]], 1 โ‰ค j โ‰ค n, tels que g(u1 (t, z), ..., un (t, z)) = 0 pour tout g โˆˆ I et uj (t, z) โˆ’ uj (t, z) โˆˆ (t, z)i , et il existe xj,l (t) โˆˆ k[[t]] tels que Pd (xj,l (t)) = 0, 0 โ‰ค d โ‰ค D, et xj,l (t) โˆ’ xj,l (t) โˆˆ (t)i . On pose alors xj = uj (t, z)(xj, 0 + xj,1 t + ยท ยท ยท + xj,dj โˆ’1 tdj โˆ’1 + tdj ). On a bien fk (xj (t, z)) = 0, 1 โ‰ค k โ‰ค p, et xj (t, z)โˆ’ xj (t, z) โˆˆ (t, z)i , 1 โ‰ค j โ‰ค n. Ceci prouve i). On peut remarquer que aPet b sont bornรฉes par une fonction polynomiale en maxk {|ฮฑk |, |ฮฒk |} de degrรฉ exponentiel en j dj , dโ€™aprรจs le thรฉorรจme 3.1. Donc il existe une constante C telle P j dj . Notons aEd et bEd les plus petites constantes satisfaisant i) pour lโ€™idรฉal que ad , bd โ‰ค C C engendrรฉ par les fk , k โˆˆ E, Poรน E est un sous-ensemble de {1, ..., p}. Lร  encore il existe une C constante CE telle que CE E aEd , bEd โ‰ค C C P j dj jโˆˆE dj majore aEd et bEd . Donc en posant C := maxE CE on a pour tout sous-ensemble E de {1, ..., p}. C ni Soit xj (t, z) โˆˆ k[[t, z]], 1 โ‰ค j โ‰ค n, tels que fk (xj (t, z)) โˆˆ (t, z)C (i+1) , 1 โ‰ค k โ‰ค p. Si dj := ord(xj (t, z)) โ‰ฅ i, alors on pose xj (t, z) = 0, sinon on pose xj (t, z) = xj (t, z). Alors fk (xj (t, z)) = 0 ou fk (xj (t, z)) = fk (xj (t, z)) selon lโ€™entier k. On peut donc remplacer les xj (t, z) par les xj (t, z) et supposer que ord(xj (t, z)) < i pour tout j. On supposer que P P ni C C (i+1) > D := maxk { j ฮฑk,j dj , j ฮฒk,j dj } en choisissant i assez grand. Comme dj < i, 1 โ‰ค j โ‰ค n, on a fk (xj (t, z)) โˆˆ (t, z)ad i+bd , 1 โ‰ค k โ‰ค p. On applique alors i), et on a lโ€™existence de xj (t, z) โˆˆ k[[t, z]] tels que fk (xj (t, z)) = 0, 1 โ‰ค k โ‰ค p, et xj (t, z) โˆ’ xj (t, z) โˆˆ (t, z)i , 1 โ‰ค j โ‰ค n. Ceci prouve ii).  Exemple 4.3. Dans [Ro2], il est montrรฉ que la fonction de Artin du polynรดme X 2 โˆ’ ZY 2 nโ€™est pas bornรฉe par une fonction affine. On voit que la non-linรฉaritรฉ de la fonction de Artin dans ce cas provient du fait que les fonctions de Artin-Greenberg des systรจmes Pd (Xj,l ) = 0, 0 โ‰ค d โ‰ค D, sont bornรฉes par des fonctions affines dont les coefficients croissent vite en fonction de lโ€™ordre des xj,l (t). Exemple 4.4. On peut remarquer que la famille de solutions approchรฉes de lโ€™รฉquation X 2 โˆ’ Y 3 dans [Ro1] sont des solutions dont lโ€™ordre est bornรฉ. Exemple 4.5. Soit f := X 2 โˆ’ Y 3 . Si x(t, z), y(t, z) โˆˆ k[[t, z]] vรฉrifient ord(x(t, z)) = 3 et ord(y(t, z)) = 2, on peut รฉcrire x(t, z) = u(t, z)(x0 (t) + x1 (t)z + x2 (t)z 2 + z 3 ) y(t, z) = v(t, z)(y0 (t) + y1 (t)z + z 2 ). Si x2 (t, z) โˆ’ y 3 (t, z) โˆˆ (t, z)i avec i > 6, alors u2 (t, z) โˆ’ v 3 (t, z) โˆˆ (t, z)iโˆ’6 et les xj (t) et yj (t) sont solutions du systรจme suivant modulo (t)iโˆ’6 : ๏ฃฑ 2x2 โˆ’ 3y1 = 0 ๏ฃด ๏ฃด ๏ฃด 2 2 ๏ฃด x + 2x ๏ฃด 1 โˆ’ 3y1 โˆ’ 3y0 = 0 2 ๏ฃด ๏ฃฒ 3 2x0 + 2x1 x2 โˆ’ y1 โˆ’ 6y0 y1 = 0 x21 + 2x0 x2 โˆ’ 3y0 y12 โˆ’ 3y02 = 0 ๏ฃด ๏ฃด ๏ฃด ๏ฃด 2x0 x1 โˆ’ 3y02 y1 = 0 ๏ฃด ๏ฃด ๏ฃณ x20 โˆ’ y03 = 0 On peut vรฉrifier ร  lโ€™aide de Macaulay2 [M2] que lโ€™idรฉal de k[x0 , x1 , x2 , y0 , y1 ] dรฉfini par ces polynรดmes nโ€™est pas rรฉduit. Ceci semble assez gรฉnรฉral. On peut remarquer que les variรฉtรฉs BORNES EFFECTIVES DES FONCTIONS Dโ€™APPROXIMATION DES SOLUTIONS FORMELLES Dโ€™ร‰QUATIONS BINOMIALES 9 algรฉbriques dรฉfinies par Pd (Xj,l ) = 0, 0 โ‰ค d โ‰ค D, sont trรจs proches des espaces de jets de la variรฉtรฉ dรฉfinie par I qui ne sont pas rรฉduits en gรฉnรฉral. Exemple 4.6. On considรจre ici le problรจme suivant : soient p et q deux entiers premiers entre eux. Si x(t, z) est une sรฉrie formelle telle que xp (t, z) est proche dโ€™une puissance qiรจme, est-ce que x(t, z) est proche dโ€™une puissance q-iรจme ? Y a-t-il une fonction qui mesure le rapport entre la distance de xp (t, z) ร  une puissance q-iรจme et celle de x(t, z) ร  une puissance q-iรจme ? On a la rรฉponse suivante : Proposition 4.7. Soient p et q premiers entre eux. Il existe une fonction ฮฒ : N โˆ’โ†’ N telle que pour tout x โˆˆ k[[t, z]], si il existe u(t, z) โˆˆ k[[t, z]] telle que xp (t, z) โˆ’ uq (t, z) โˆˆ (t, z)ฮฒ(i) , alors il existe v(t, z) โˆˆ k[[t, z]] telle que x(t, z) โˆ’ v q (t, z) โˆˆ (t, z)i . On peut choisir pour ฮฒ une fonction doublement exponentielle en i. Pour tout d โˆˆ N, si on se restreint ร  tous les x(t, z) dont lโ€™ordre vaut d, alors on peut choisir pour ฮฒ une fonction affine. Dรฉmonstration. Soit ฮฒ la fonction de Artin de X p โˆ’ Y q . Supposons que xp (t, z) โˆ’ uq (t, z) โˆˆ (t, z)ฮฒ(i) . Alors il existe xโ€ฒ (t, z), uโ€ฒ (t, z) โˆˆ k[[t, z]] tels que xโ€ฒp (t, z) โˆ’ uโ€ฒq (t, z) = 0 et x(t, z) โˆ’ xโ€ฒ t(t, z), u(t, z) โˆ’ uโ€ฒ (t, z) โˆˆ (t, z)i . Comme p et q sont premiers entre eux et que k[[t, z]] est factoriel il existe v(t, z) โˆˆ k[[t, z]] tel que xโ€ฒ (t, z) = v q (t, z) et uโ€ฒ (t, z) = v p (t, z). On a alors le rรฉsultat avec le thรฉorรจme 4.2.  Rรฉfรฉrences [Ar] M. Artin, Algebraic approximation of structures over complete local rings, Publ. Math. IHES, 36, (1969), 23-58. [B-D-L-v.D] J. Becker, J. Denef, L. Lipshitz, L. van den Dries, Ultraproducts and Approximation in Local Rings I, Inventiones math., 51, 189-203 (1979). [E-S] D. Eisenbud, B. Sturmfels, Binomial ideals, Duke Math. J., 84, (1996), no. 1, 1-45. [Gr] M. J. Greenberg, Rational points in henselian discrete valuation rings, Publ. Math. IHES, 31, (1966), 59-64. [He] G. Hermann, Die Frage der endlich vielen Schritte in der Theorie der Polynomideale, Math. Ann., 95, (1926), no. 1, 736-788. [La] D. Lascar, Caractรจre effectif des thรฉorรจmes dโ€™approximation dโ€™Artin, C. R. Acad. Sci. Paris Sรฉr. A-B, 287, (1978), no. 14, A907-A910. [M2] D. R. Grayson, M. E. Stillman, Macaulay 2, a software system for research in algebraic geometry, Available at ttp ://www.math.uiuc.edu/Macaulay2/ [Ro1] G. Rond, ร€ propos de la fonction de Artin en dimension N โ‰ฅ 2, C. R. Math. Acad. Sci. Paris, 340, no. 8, (2005), 577-580. [Ro2] G. Rond, Sur la linรฉaritรฉ de la fonction de Artin, Annales Scientifiques de lโ€™ร‰cole Normale Supรฉrieure, vol. 38, no. 6, (2005), 979-988. [Ro3] G. Rond, Lemme dโ€™Artin-Rees, thรฉorรจme dโ€™Izumi et fonction de Artin, Journal of Algebra, vol. 299, no. 1, (2006), 245-275. [S] A. Seidenberg, Constructions in Algebra, Trans. A.M.S., 197, (oct 1974) ; 273-313. [Te] B. Teissier, Rรฉsultats rรฉcents dโ€™algรจbre commutative effective, Sรฉminaire Bourbaki, Vol. 1989/90, Astรฉrisque, No. 189-190, (1990), Exp. No. 718, 107-131. [To] J.-C. Tougeron, Idรฉaux de fonctions diffรฉrentiables, Ergebnisse der Mathematik und ihrer Grenzgebiete, Band 71. Springer-Verlag, Berlin-New York, (1972). [Wa] J. J. Wavrik, A theorem on solutions of analytic equations with applications to deformations of complex structures, Math. Ann., 216, (1975), 127-142. [Z-S] O. Zariski, P. Samuel, Commutative Alegbra I, D. Van Nostrand Company, Inc., Princeton, New Jersey, 1958. 10 GUILLAUME ROND IML, Campus de Luminy, Case 907, 13288 Marseille Cedex 9, France E-mail address: [email protected]
0math.AC
Estimation in the convolution structure density model. Part II: adaptation over the scale of anisotropic classes. arXiv:1704.04420v1 [math.ST] 14 Apr 2017 O.V. Lepski โˆ— T. Willer โˆ— Institut de Matheฬmatique de Marseille Aix-Marseille Universiteฬ 39, rue F. Joliot-Curie 13453 Marseille, France e-mail: [email protected] e-mail: [email protected] Abstract: This paper continues the research started in Lepski and Willer (2016). In the framework of the convolution structure density model on Rd , we address the problem of adaptive minimax estimation with Lp โ€“loss over the scale of anisotropic Nikolโ€™skii classes. We fully characterize the behavior of the minimax risk for different relationships between regularity parameters and norm indexes in the definitions of the functional class and of the risk. In particular, we show that the boundedness of the function to be estimated leads to an essential improvement of the asymptotic of the minimax risk. We prove that the selection rule proposed in Part I leads to the construction of an optimally or nearly optimally (up to logarithmic factor) adaptive estimator. AMS 2000 subject classifications: 62G05, 62G20. Keywords and phrases: deconvolution model, density estimation, oracle inequality, adaptive estimation, kernel estimators, Lp โ€“risk, anisotropic Nikolโ€™skii class. 1. Introduction In the present paper we will be interested in the adaptive estimation in the convolution structure density model. Our considerations here continue the research started in Lepski and Willer (2016). Thus, we observe i.i.d. vectors Zi โˆˆ Rd , i = 1, . . . , n, with a common probability density p satisfying the following structural assumption p = (1 โˆ’ ฮฑ)f + ฮฑ[f โ‹† g], f โˆˆ Fg (R), ฮฑ โˆˆ [0, 1], (1.1) where ฮฑ โˆˆ [0, 1] and g : Rd โ†’ R are supposed to be known and f : Rd โ†’ R is the function to be estimated. Recall that for two functions f, g โˆˆ L1 Rd Z   f (x โˆ’ z)g(z)ฮฝd (dz), x โˆˆ Rd , f โ‹† g (x) = Rd  and for any ฮฑ โˆˆ [0, 1], g โˆˆ L1 Rd and R > 1, n o Fg (R) = f โˆˆ B1,d (R) : (1 โˆ’ ฮฑ)f + ฮฑ[f โ‹† g] โˆˆ P Rd . โˆ— This work has been carried out in the framework of the Labex Archimeฬ€de (ANR-11-LABX-0033) and of the A*MIDEX project (ANR-11-IDEX-0001-02), funded by the โ€Investissements dโ€™Avenirโ€ French Government program managed by the French National Research Agency (ANR). 1 imsart-generic ver. 2014/10/16 file: DSDM-adap-ArXivl.tex date: April 17, 2017  Furthermore P Rd denotes the set of probability densities on Rd , Bs,d (R) is the ball of radius  R > 0 in Ls Rd := Ls Rd , ฮฝd , 1 โ‰ค s โ‰ค โˆž and ฮฝd is the Lebesgue measure on Rd . At last, for any Pd  R U โˆˆ L1 Rd let UฬŒ (t) := Rd U (x)eโˆ’i j=1 xj tj ฮฝd (dx), t โˆˆ Rd , be the Fourier transform of U .  The convolution structure density model (1.1) will be studied for an arbitrary g โˆˆ L1 Rd and f โˆˆ Fg (R). Then, except in the case ฮฑ = 0, the function f is not necessarily a probability density. We want to estimate f using the observations Z (n) = (Z1 , . . . , Zn ). By estimator, we mean any  d (n) n Z -measurable map fห† : R โ†’ Lp R . The accuracy of an estimator fห† is measured by the Lp โ€“risk 1/p  , p โˆˆ [1, โˆž), Rn(p) [fห†, f ] := Ef kfห† โˆ’ f kpp where Ef denotes the expectation with respect to the probability measure Pf of the observations Z (n) = (Z1 , . . . , Zn ). Also, k ยท kp , p โˆˆ [1, โˆž), is the Lp -norm on Rd . The objective is to construct an estimator of f with a small Lp โ€“risk. 1.1. Adaptive estimation   (p)  Let F be a given subset of Lp Rd . For any estimator fหœn define its maximal risk by Rn fหœn ; F =  (p)  supf โˆˆF Rn fหœn ; f and its minimax risk on F is given by   ฯ†n (F) := inf Rn(p) fหœn ; F . fหœn (1.2) Here, the infimum is taken over all possible estimators. An estimator whose maximal risk is bounded by ฯ†n (F)  up to some constant factor is called minimax on F. Let Fฯ‘ , ฯ‘ โˆˆ ฮ˜ be a collection of subsets of Lp Rd , ฮฝd , where ฯ‘ is a nuisance parameter which may have a very complicated structure. The problem of adaptive estimation can be formulated as follows: is it possible to construct a single estimator fห†n which would be simultaneously minimax on each class Fฯ‘ , ฯ‘ โˆˆ ฮ˜, i.e.   (p) ห† lim sup ฯ†โˆ’1 n (Fฯ‘ )Rn fn ; Fฯ‘ < โˆž, โˆ€ฯ‘ โˆˆ ฮ˜? nโ†’โˆž We refer to this question as the problem of minimax adaptive estimation over the scale {Fฯ‘ , ฯ‘ โˆˆ ฮ˜}. If such an estimator exists, we will call it optimally adaptive. Using the modern statistical language we call the estimator fห†n nearly optimally adaptive if   (p) ห† fn ; Fฯ‘ < โˆž, โˆ€ฯ‘ โˆˆ ฮ˜. lim sup ฯ†โˆ’1 n (Fฯ‘ )Rn nโ†’โˆž ln n We will be interested in adaptive estimation over the scale   ~ L ~ ~r, L, ~ โˆฉ Fg,โˆž (R, Q), ฯ‘ = ฮฒ, ~ R, Q , Fฯ‘ = N~r,d ฮฒ,  ~ L ~ is the anisotropic Nikolskii class, see Definition 1 below. As it was explained in where N~r,d ฮฒ,    ~ L ~ ~r, L ~ , ฮฒ, ~ โˆˆ (0, โˆž)d ร— [1, โˆž]d ร— (0, โˆž)d Part I, the adaptive estimation over the scale N~r,d ฮฒ, can be viewed as the adaptation to anisotropy and inhomogeneity of the function to be estimated. Recall also that  Fg,โˆž(R, Q) := f โˆˆ Fg (R) : (1 โˆ’ ฮฑ)f + ฮฑ[f โ‹† g] โˆˆ Bโˆž,d (Q) , 2 so f โˆˆ Fg,โˆž (R, Q) simply means that the common density of observations p is uniformly bounded by Q. It is easy to see that if ฮฑ = 1 and kgkโˆž < โˆž then Fg,โˆž (R, Q) = Fg (R) for any Q โ‰ฅ Rkgkโˆž . Let us briefly discuss another example. Let r > 1 and L < โˆž be arbitrary but a priory chosen numbers. Assume that the considered collection of anisotropic Nikolโ€™skii classes obeys the following ~ โˆˆ (0, L]d . Suppose also that kgks < โˆž, where 1/s = 1 โˆ’ 1/r. restrictions: ~r โˆˆ [r, โˆž]d and L  ~ L ~ โˆฉ Fg,โˆž (R, Q) = Then, there exists Q0 completely determined by r, L and R such that N~r,d ฮฒ,  ~ L ~ โˆฉ Fg (R) for any Q > Q0 kgks . N~r,d ฮฒ, Additionally, we will study the adaptive estimation over the collection   ~ L ~ ~r, L, ~ โˆฉ Fg (R) โˆฉ Bโˆž,d (Q), ฯ‘ = ฮฒ, ~ R, Q . Fฯ‘ = N~r,d ฮฒ, We will show that the boundedness of the underlying function allows to improve considerably the accuracy of estimation. 1.2. Historical notes The minimax adaptive estimation is a very active area of mathematical statistics and the interested reader can find a very detailed overview as well as several open problems in adaptive estimation in the recent paper, Lepski (2015). Below we will discuss only the articles whose results are relevant to our consideration, i.e. the density setting under Lp -loss, from a minimax perspective.  Let us start with the following remark. If one assumes additionally that f, g โˆˆ P Rd the convolution structure density model can be interpreted as follows. The observations Zi โˆˆ Rd , i = 1, . . . , n, can be written as a sum of two independent random vectors, that is, Zi = Xi + วซi Yi , i = 1, . . . , n, (1.3) where Xi , i = 1, . . . , n, are i.i.d. d-dimensional random vectors with common density f to be estimated. The noise variables Yi , i = 1, . . . , n, are i.i.d. d-dimensional random vectors with known common density g. At last ฮตi โˆˆ {0, 1}, i = 1, . . . , n, are i.i.d. Bernoulli random variables with P(ฮต1 = 1) = ฮฑ, where ฮฑ โˆˆ [0, 1] is supposed to be known. The sequences {Xi , i = 1, . . . , n}, {Yi , i = 1, . . . , n} and {วซi , i = 1, . . . , n} are supposed to be mutually independent. The observation scheme (1.3) can be viewed as the generalization of two classical statistical models. Indeed, the case ฮฑ = 1 corresponds to the standard deconvolution model Zi = Xi + Yi , i = 1, . . . , n. Another โ€extremeโ€ case ฮฑ = 0 correspond to the direct observation scheme Zi = Xi , i = 1, . . . , n. The โ€intermediateโ€ case ฮฑ โˆˆ (0, 1), considered for the first time in Hesse (1995), is understood as partially contaminated observations. Direct case, ฮฑ = 0 There is a vast literature dealing with minimax and minimax adaptive density estimation, see for example, Efroimovich (1986), Hasminskii and Ibragimov (1990), Golubev (1992), Donoho et al. (1996), Devroye and Lugosi (1997), Rigollet (2006), Rigollet and Tsybakov (2007), Samarov and Tsybakov (2007), Birgeฬ (2008), Gineฬ and Nickl (2009), Akakpo (2012), Gach et al. (2013), Lepski (2013), among many others. Special attention was paid to the estimation of densities with unbounded support, see Juditsky and Lambertโ€“Lacroix (2004), Reynaudโ€“Bouret et al. (2011). The most developed results can be found in Goldenshluger and Lepski (2011), Goldenshluger and Lepski (2014) and in Section 2 we will compare in detail our results with those obtained in these papers. 3 Intermediate case, ฮฑ โˆˆ (0, 1) To the best of our knowledge, adaptive estimation in the case of partially contaminated observations has not been studied yet. We were able to find only two papers dealing with minimax estimation. The first one is Hesse (1995) (where the discussed model was introduced in dimension 1) in which the author evaluated the Lโˆž -risk of the proposed estimator over a functional class formally corresponding to the Nikolโ€™skii class Nโˆž,1 (2, 1). In Yuana and Chenb (2002) the latter result  was developed to the multidimensional setting, i.e. to the minimax es~ timation on Nโˆž,d 2, 1 . The most intriguing fact is that the accuracy of estimation in partially contaminated noise is the same as in the direct observation scheme. However none of these articles studied the optimality of the proposed estimators. We will come back to the aforementioned papers in Section 1.3.1 in order to compare the assumptions imposed on the noise density g. Deconvolution case, ฮฑ = 1 First let us remark that the behavior of the Fourier transform of the function g plays an important role in all the works dealing with deconvolution. Indeed ill-posed problems correspond to Fourier transforms decaying towards zero. Our results will be established for โ€moderatelyโ€ ill posed problems, so we detail only results in papers studying that type of operators. This assumption means that there exist ~ยต = (ยต1 , . . . , ยตd ) โˆˆ (0, โˆž)d and ฮฅ1 > 0, ฮฅ2 > 0 such that the Fourier transform gฬŒ of g satisfies: ฮฅ1 d Y (1 + j=1 t2j )โˆ’ ยตj 2 โ‰ค gฬŒ(t) โ‰ค ฮฅ2 d Y (1 + t2j )โˆ’ j=1 ยตj 2 , โˆ€t = (t1 , . . . , td ) โˆˆ Rd . (1.4) Some minimax and minimax adaptive results in dimension 1 over different classes of smooth functions can be found in particular in Stefanski and Carroll (1990), Fan (1991), Fan (1993), Pensky and Vidakovic (1999), Fan and Koo (2002), Comte and al. (2006), Hall and Meister (2007), Meister (2009), Lounici and Nickl (2011), Kerkyacharian et al. (2011). There are very few results in the multidimensional setting. It seems that Masry (1993) was the first paper where the deconvolution problem was studied for multivariate densities. It is worth noting that Masry (1993) considered more general weakly dependent observations and this paper formally does not deal with the minimax setting. However the results obtained in this paper could be formally compared with the estimation under Lโˆž -loss over the isotropic Hoฬˆlder class of regularity  2, i.e. Nโˆž,d ~2, 1 which is exactly the same setting as in Yuana and Chenb (2002) in the case of partially contaminated observations. Let us also remark that there is no lower bound result in Masry (1993). The most developed results in the deconvolution model were obtained in Comte and Lacour (2013) and Rebelles (2016) and in Section 2 we will compare in detail our results with those obtained in these papers. 1.3. Lower bound for the minimax Lp -risk  We have seen that the problem of optimal adaptation over  the collection Fฯ‘ , ฯ‘ โˆˆ ฮ˜ is formulated as the โ€attainabilityโ€ of the family of minimax risks ฯ†n (Fฯ‘ ), ฯ‘ โˆˆ ฮ˜ by a single estimator. Although it is not necessary, the following โ€two-stageโ€ approach is used for the majority of problems related to the minimax adaptive estimation. The first step consists in finding a lower bound for ฯ†n (Fฯ‘ ) for any ฯ‘ โˆˆ ฮ˜ while the second one consists in constructing an estimator โ€attainingโ€, at least asymptotically, this bound. We adopt this strategy in our investigations and below we present several lower bound results recently obtained in Lepski and Willer (2017). 4 1.3.1. Assumptions on the function g imposed in Lepski and Willer (2017) Let Jโˆ— denote the set of all subsets of {1, . . . , d}. Set J = Jโˆ— โˆช โˆ… and for any J โˆˆ J let |J| denote the cardinality of J while {j1 < ยท ยท ยท < j|J| } denotes its elements. |J | For any J โˆˆ Jโˆ— define the operator DJ = โˆ‚tj โˆ‚ยทยทยทโˆ‚tj and let Dโˆ… denote the identity operator. For 1 |J |  any I, J โˆˆ J define DI,J = DI DJ and note that obviously DI,J = DJ,I . Assumption 1 (ฮฑ 6= 1). DJ gฬŒ exists for any J โˆˆ Jโˆ— and supJโˆˆJโˆ— DJ gฬŒ โˆž < โˆž; Assumption 2 (ฮฑ = 1). DJ gฬŒ exists for any J โˆˆ Jโˆ— and supJโˆˆJโˆ— gฬŒ โˆ’1 DJ gฬŒ there exists ~ ยต = (ยต1 , . . . , ยตd ) โˆˆ (0, โˆž)d and ฮฅ > 0 such that ยตj Q |gฬŒ(t)| โ‰ค ฮฅ dj=1 (1 + t2j )โˆ’ 2 , โˆ€t = (t1 , . . . , td ) โˆˆ Rd . Assumption 3 (ฮฑ = 1). g is a bounded function. Assumption 4 (ฮฑ = 1). DI,J gฬŒ exists for any I, J โˆˆ J and supI,JโˆˆJ DI,J gฬŒ Z Y  g(z) zj2 dz < โˆž. sup JโˆˆJโˆ— Rd  โˆž 1 < โˆž. Moreover, < โˆž. Moreover jโˆˆJ It is worth noting that all the bounds in Lepski and Willer (2017) are obtained under Assumptions 1 and 2. Assumption 3 is used when the estimation of unbounded functions is considered; we come back to this assumption in Section 2.4.2. As to Assumption 4, it seems purely technical and does not appear in upper bound results. We also recall that the lower bounds in Lepski and Willer (2017) are proved under the condition:  d gโˆˆP R . 1.3.2. Some lower bounds from Lepski and Willer (2017) ~ (ฮฑ) = ~ ~ (ฮฑ) = (0, . . . , 0), ฮฑ โˆˆ [0, 1), and introduce for any ฮฒ~ โˆˆ (0, โˆž)d , ~r โˆˆ [1, โˆž]d Set ยต ยต, ฮฑ = 1, ยต d ~ โˆˆ (0, โˆž) the following quantities. and L d X 2ยตj (ฮฑ) + 1 1 = , ฮฒ(ฮฑ) ฮฒj j=1 d X 2ยตj (ฮฑ) + 1 1 = , ฯ‰(ฮฑ) ฮฒj rj j=1 L(ฮฑ) = d Y 2ยตj (ฮฑ)+1 ฮฒj Lj . (1.5) j=1 Define for any 1 โ‰ค s โ‰ค โˆž and ฮฑ โˆˆ [0, 1] ฮบฮฑ (s) = ฯ‰(ฮฑ)(2 + 1/ฮฒ(ฮฑ)) โˆ’ s ฯ„ (s) = 1 โˆ’ 1/ฯ‰(0) + 1/(sฮฒ(0)). (1.6)   General case. Remind that z(ฮฑ) = ฯ‰(ฮฑ)(2 + 1/ฮฒ(ฮฑ))ฮฒ(0)ฯ„ (โˆž) + 1, pโˆ— = maxl=1,...,d rl โˆจ p. Set ฬบ(ฮฑ) = ๏ฃฑ ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃฒ ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃณ 1โˆ’1/p 1โˆ’1/ฯ‰(ฮฑ)+1/ฮฒ(ฮฑ) , ฮฒ(ฮฑ) 2ฮฒ(ฮฑ)+1 , ฯ„ (p)ฯ‰(ฮฑ)ฮฒ(0) , z(ฮฑ) โˆ— ฯ‰(ฮฑ)(1โˆ’p /p) , ฮบฮฑ (pโˆ— ) 5 ฮบฮฑ (p) > pฯ‰(ฮฑ); 0 < ฮบฮฑ (p) โ‰ค pฯ‰(ฮฑ); ฮบฮฑ (p) โ‰ค 0, ฯ„ (pโˆ— ) > 0; ฮบฮฑ (p) โ‰ค 0, ฯ„ (pโˆ— ) โ‰ค 0. (1.7) โˆ— /p) Here and later we assume 0/0 = 0, which implies in particular that ฯ‰(ฮฑ)(1โˆ’p = 0 if pโˆ— = p and ฮบฮฑ (pโˆ— ) ฮบฮฑ (p) = 0. Recall also that ฮบฮฑ (pโˆ— )/pโˆ— = โˆ’1 if pโˆ— = โˆž. Put at last ๏ฃฑ L(ฮฑ)nโˆ’1 , ฮบฮฑ (p) > 0; ๏ฃด ๏ฃด ๏ฃฒ L(ฮฑ)nโˆ’1 ln(n), ฮบฮฑ (p) โ‰ค 0, ฯ„ (pโˆ— ) โ‰ค 0; ฮดn = ๏ฃด ๏ฃด ฮบฮฑ (p) ๏ฃณ โˆ’ ฮบฮฑ (p) โ‰ค 0, ฯ„ (pโˆ— ) > 0. [L(0)] ฯ‰(ฮฑ)pฯ„ (p) L(ฮฑ)nโˆ’1 ln(n), Theorem 1 (Lepski and Willer (2017)). Let L0 > 0 and 1 โ‰ค p < โˆž be fixed.  ~ โˆˆ [L0 , โˆž)d , ~ยต โˆˆ (0, โˆž)d , R > 1 and g โˆˆ P Rd , Then for any ฮฒ~ โˆˆ (0, โˆž)d , ~r โˆˆ [1, โˆž]d , L ~ such that satisfying Assumptions 1โ€“4, there exists c > 0 independent of L lim inf inf nโ†’โˆž sup fหœn f โˆˆN ~~ ~ r ,d ฮฒ,L โˆฉFg (R)   ฮด nโˆ’ฬบ(ฮฑ) R(n) fหœn ; f โ‰ฅ c, p where the infimum is taken over all possible estimators. Following the terminology used in Lepski and Willer (2017), we will call the set of parameters satisfying ฮบฮฑ (p) > pฯ‰(ฮฑ) the tail zone, satisfying 0 < ฮบฮฑ (p) โ‰ค pฯ‰(ฮฑ) the dense zone and satisfying ฮบฮฑ (p) โ‰ค 0 the sparse zone. In its turn, the latter zone is divided into two sub-domains: the sparse zone 1 corresponding to ฯ„ (pโˆ— ) > 0 and the sparse zone 2 corresponding to ฯ„ (pโˆ— ) โ‰ค 0. Bounded case. Introduce ฯ(ฮฑ) = ๏ฃฑ ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃฒ ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃณ 1โˆ’1/p 1โˆ’1/ฯ‰(ฮฑ)+1/ฮฒ(ฮฑ) , ฮฒ(ฮฑ) 2ฮฒ(ฮฑ)+1 , ฯ„ (p)ฯ‰(ฮฑ)ฮฒ(0) , z(ฮฑ) ฯ‰(ฮฑ) p , ฮบฮฑ (p) > pฯ‰(ฮฑ); 0 < ฮบฮฑ (p) โ‰ค pฯ‰(ฮฑ); ฮบฮฑ (p) โ‰ค 0, ฯ„ (โˆž) > 0; (1.8) ฮบฮฑ (p) โ‰ค 0, ฯ„ (โˆž) โ‰ค 0. Theorem 2 (Lepski and Willer (2017)). Let L0 > 0 and 1 โ‰ค p < โˆž be fixed.  ~ โˆˆ [L0 , โˆž)d , Q > 0, ~ยต โˆˆ (0, โˆž)d and g โˆˆ P Rd , Then for any ฮฒ~ โˆˆ (0, โˆž)d , ~r โˆˆ [1, โˆž]d , L ~ such that satisfying Assumptions 1 and 2 there exists c > 0 independent of L   โˆ’ฯ(ฮฑ) (n) หœ sup lim inf inf ฮด R f ; f โ‰ฅ c, n n p   nโ†’โˆž fหœ n ~L ~ โˆฉP Rd โˆฉBโˆž,d (Q) f โˆˆN~r,d ฮฒ, where the infimum is taken over all possible estimators. 1.4. Assumptions on the function g The selection rule from the family of linear estimators, the Lp -norm oracle inequalities obtained in Part I and all the adaptive results presented in the paper are established under the following condition imposed on the function g. Assumption 5. (1) if ฮฑ 6= 1 then there exists ฮต > 0 such that 1 โˆ’ ฮฑ + ฮฑgฬŒ(t) โ‰ฅ ฮต, โˆ€t โˆˆ Rd ; (2) if ฮฑ = 1 then there exists ยต ~ = (ยต1 , . . . , ยตd ) โˆˆ (0, โˆž)d and ฮฅ0 > 0 such that ยตj Q |gฬŒ(t)| โ‰ฅ ฮฅ0 dj=1 (1 + t2j )โˆ’ 2 , โˆ€t = (t1 , . . . , td ) โˆˆ Rd . 6 Comparing this condition with Assumption 2 from Section 1.3.1, we can assert that both are coherent if ฮฑ = 1. Indeed, in this case, we come the following assumption, which is well-known in the literature: ยตj ยตj Q Q ฮฅ0 dj=1 (1 + t2j )โˆ’ 2 โ‰ค |gฬŒ(t)| โ‰ค ฮฅ dj=1 (1 + t2j )โˆ’ 2 , โˆ€t โˆˆ Rd . referred to as a moderately ill-posed statistical problem, cf. (1.4). In particular, the assumption is checked for the centered multivariate Laplace law. Note first that Assumption 5 is in some sense weaker than Assumption 1 when ฮฑ โˆˆ (0, 1), since it does not require regularity properties of the function g. Moreover both assumptions are not too restrictive. They are verified for many distributions, including centered multivariate Laplace and Gaussian ones. Note also that Assumption 5 always holds with ฮต = 1 โˆ’ 2ฮฑ if ฮฑ < 1/2. Additionally, it holds with ฮต = 1 โˆ’ ฮฑ if gฬŒ is a real positive function. The latter is true, in particular, for any probability law obtained by an even number of convolutions of a symmetric distribution with itself. Next, our Assumption 5 is weaker than the conditions imposed in Hesse (1995) and Yuana and Chenb (2002). In these papers gฬŒ โˆˆ C(2) Rd , gฬŒ(t) 6= 0 for any t โˆˆ Rd and 1 โˆ’ ฮฑ + ฮฑgฬŒ(t) โ‰ฅ 1 โˆ’ ฮฑ, โˆ€t โˆˆ Rd . 2. Adaptive estimation over the scale of anisotropic Nikolโ€™skii classes We start this section by recalling the definition of the pointwise selection rule proposed in Part I. 2.1. Pointwise selection rule  R Let K : Rd โ†’ R be a continuous function belonging to L1 Rd such that R K = 1. Set  k  d e , k โˆˆ Z and let Hd = ~h = (h1 , . . . , hd ) : hj โˆˆ H, j = 1, . . . , d . Recall that Hisotr = Q d d d ~ ~ H : h = (h, . . . , h), h โˆˆ H . Set V~h = j=1 hj and let for any h โˆˆ H  K~h (t) = V~โˆ’1 K t1 /h1 , . . . , td /hd , t โˆˆ Rd . H =  ~h โˆˆ h Later on for any u, v โˆˆ Rd the operations and relations u/v, uv, u โˆจ v,u โˆง v, u โ‰ฅ v, au, a โˆˆ R, are understood in coordinate-wise sense. In particular u โ‰ฅ v means that uj โ‰ฅ vj for any j = 1, . . . , d.  For any ~h โˆˆ (0, โˆž)d let M ยท, ~h satisfy the operator equation Z   ~ g(t โˆ’ y)M t, ~h dt, y โˆˆ Rd . (2.1) K~h (y) = (1 โˆ’ ฮฑ)M y, h + ฮฑ Rd Introduce for any ~h โˆˆ Hd and x โˆˆ Rd fb~h (x) = nโˆ’1 n X i=1  bn x, ~h = U   where Mโˆž = (2ฯ€)โˆ’d ฮตโˆ’1 KฬŒ n  1X  ฯƒ b2 x, ~h = M 2 Zi โˆ’ x, ~h ; n  M Zi โˆ’ x, ~h , s i=1    b2 x, ~h 2ฮปn ~h ฯƒ 4Mโˆž ฮปn ~h + , Q n 3n dj=1 hj (hj โˆง 1)ยตj (ฮฑ) 1 + ฮฅโˆ’1 0 k1 1ฮฑ=1 1 ฮฑ6=1 7  โˆจ 1 and d X    1 + ยตj (ฮฑ) ln(hj ) . ฮปn ~h = 4 ln(Mโˆž ) + 6 ln (n) + (8p + 26) j=1 Let H be an arbitrary subset of For any ~h โˆˆ H and x โˆˆ Rd introduce h i  bn x, ~ฮท bn x, ~h โˆจ ~ฮท โˆ’ 4U b~ (x) = sup fb~ (x) โˆ’ fb~ฮท (x) โˆ’ 4U ; R hโˆจ~ ฮท h Hd . + ฮท โˆˆH ~  bnโˆ— x, ~h = U sup ฮท โˆˆH: ~ ~ ฮทโ‰ฅ~h  bn x, ~ฮท , U (2.2) (2.3) h i b~ (x) + 8U bnโˆ— x, ~h . and define ~h(x) = arg inf ~hโˆˆH R h Our final estimator is fbh(x) (x), x โˆˆ Rd and we will call (2.2) the pointwise selection rule. ~ Remark 1. Note that the estimator fb~h depends on H and later on we will consider two choices d of the parameter set H, namely H = Hd and H = Hisotr . So, to present our results we will write b f~h,H in order to underline the aforementioned dependence. The choice H = Hd will be used when d the adaptation is studied over anisotropic Nikolโ€™skii classes while H = Hisotr will be used when the considered scale consists of isotropic classes. 2.2. Anisotropic Nikolโ€™skii classes Let (e1 , . . . , ed ) denote the canonical basis of Rd . For some function G : Rd โ†’ R1 and real number u โˆˆ R define the first order difference operator with step size u in direction of the variable xj by โˆ†u,j G(x) = G(x + uej ) โˆ’ G(x), j = 1, . . . , d. By induction, the k-th order difference operator with step size u in direction of the variable xj is defined as   k X k kโˆ’1 l+k k โˆ†u,j G(x) = โˆ†u,j โˆ†u,j G(x) = (โˆ’1) โˆ†ul,j G(x). (2.4) l l=1 ~ = Definition 1. For given vectors ~r = (r1 , . . . , rd ) โˆˆ [1, โˆž]d ฮฒ~ = (ฮฒ1 , . . . , ฮฒd ) โˆˆ (0, โˆž)d and L d d 1 (L1 , . . . , Ld ) โˆˆ (0, โˆž) we say that a function G : R โ†’ R belongs to the anisotropic Nikolskii class ~ L ~ if N~r,d ฮฒ, (i) kGkrj โ‰ค Lj for all j = 1, . . . , d; (ii) for every j = 1, . . . , d there exists natural number kj > ฮฒj such that k j โˆ†u,j G rj โ‰ค Lj |u|ฮฒj , โˆ€u โˆˆ R, โˆ€j = 1, . . . , d. If ฮฒj = ฮฒ โˆˆ (0, โˆž), rj = r โˆˆ [1, โˆž] and Lj = L โˆˆ (0, โˆž) for any j = 1, . . . , d the corresponding Nikolskii class, denoted furthermore Nr,d (ฮฒ, L), is called isotropic. 8 2.3. Construction of kernel K First, we recall that all results concerning the Lp risk of the pointwise selection rule, established in Part I, are proved under the following assumption imposed on the kernel K. Assumption 6. There exist k1 > 0 and k2 > 0 such that Z KฬŒ(t) Rd d Y (1 + t2j ) j=1 ยตj (ฮฑ) 2 dt โ‰ค k1 , Z Rd KฬŒ(t) 2 d Y (1 + t2j )ยตj (ฮฑ) dt โ‰ค k22 . (2.5) j=1 use the following specific kernel K in the definition of the estimatorโ€™s family  Next, we will d ~ b f~h (ยท), h โˆˆ H [see, e.g., Kerkyacharian et al. (2001) or Goldenshluger and Lepski (2014)]. Let โ„“ beR an integer number, and let K : R1 โ†’ R1 be a compactly supported continuous function satisfying R1 K(y)dy = 1, and K โˆˆ C(R1 ). Put Kโ„“ (y) = โ„“   X โ„“ i=1 1 y , (โˆ’1)i+1 K i i i (2.6) and add the following structural condition to Assumption 6. Q Assumption 7. K(x) = dj=1 Kโ„“ (xj ), โˆ€x โˆˆ Rd . The kernelRK constructed in this way is bounded, compactly supported, belongs to C(Rd )โˆฉL1 (Rd ) and satisfies Rd K = 1. Some examples of kernels satisfying simultaneously Assumptions 6 and 7 can be found for instance in Comte and Lacour (2013). 2.4. Main results Introduce the following notations: ฮดn = L(ฮฑ)nโˆ’1 ln(n) and ๏ฃฑ ๏ฃด [ln(n)]t(H) , ๏ฃด ๏ฃด ๏ฃด ๏ฃด ( 1 ๏ฃด ๏ฃฒ ln p (n) โˆจ [ln(n)]t(H) , d โˆ’ 1, H = Hd ; t(H) = bn (H) = 1 d ๏ฃด 0, H = Hisotr , ๏ฃด ln p (n), ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃณ 1, ฮบฮฑ (p) > pฯ‰(ฮฑ); ฮบฮฑ (p) = pฯ‰(ฮฑ); ฮบฮฑ (p) = 0; otherwise, 2.4.1. Bounded case The we address is the adaptive estimation over the collection of the functional classes  first problem  ~ ~ . N~r,d ฮฒ, L โˆฉ Fg (R) โˆฉ Bโˆž,d (Q) ฮฒ,~ ~ r ,L,R,Q ~ As it was  conjectured in Lepski and Willer (2017), the boundedness of the function belonging to ~ L ~ โˆฉ Fg (R) is a minimal condition allowing to eliminate the inconsistency zone. The results N~r,d ฮฒ, obtained in Theorem 3 below together with those from Theorem 2 confirm this conjecture.  Theorem 3. Let ฮฑ โˆˆ [0, 1], โ„“ โˆˆ Nโˆ— and g โˆˆ L1 Rd , satisfying Assumption 5, be fixed. Let K satisfy Assumptions 6 and 7. 9 ~ โˆˆ (0, โ„“]d , ~r โˆˆ (1, โˆž]d and L ~ โˆˆ [L0 , โˆž)d 1) Then for any p โˆˆ (1, โˆž), Q > 0, R > 0, L0 > 0, ฮฒ ~ such that: there exists C < โˆž, independent of L, โˆ’1 โˆ’ฯ(ฮฑ) (n)   lim sup sup ฮดn Rp fb~h,H ; f โ‰ค C, bn H d  nโ†’โˆž ~L ~ โˆฉFg (R)โˆฉBโˆž,d (Q) f โˆˆN~r,d ฮฒ, where ฯ(ฮฑ) is defined in (1.8). 2) For any p โˆˆ (1, โˆž), Q > 0, R > 0, L0 > 0, ฮฒ โˆˆ (0, โ„“], r โˆˆ [1, โˆž] and L โˆˆ [L0 , โˆž) there exists C < โˆž, independent of L, such that: โˆ’1 โˆ’ฯ(ฮฑ) (n)   d lim sup sup ฮดn Rp fb~h,Hd ; f โ‰ค C, bn Hisotr  isotr nโ†’โˆž f โˆˆNr,d ฮฒ,L โˆฉFg (R)โˆฉBโˆž,d (Q) Some remarks are in order. 10 . Our estimation procedure is completely data-driven, i.e. inde~ ~r, L, ~ R, Q, and the assertions of Theorem 3 are completely new if ฮฑ 6= 0. Comparing pendent of ฮฒ, the results obtained in Theorems 2 and 3 we can assert that our estimator is optimally-adaptive if ฮบฮฑ (p) < 0 and nearly optimally adaptive if 0 < ฮบฮฑ (p) < pฯ‰(ฮฑ). The construction of an estimation procedure which would be optimally-adaptive when ฮบฮฑ (p) โ‰ฅ 0 is an open problem, and we conjecture that the lower bounds for the asymptotics of the minimax risk found in Theorem 2 are sharp in order. This conjecture in the case ฮฑ = 1 is partially confirmed by the results obtained in Comte and Lacour (2013) and Rebelles (2016). Since both articles deal with the estimation of unbounded functions we will discuss them in the next section. It is worth noting that all the previous statements are true not only for the convolution structure density model but also, in view of Theorem 2, for the observation scheme (1.3) as well. 20 . We note that the asymptotic of the minimax risk under partially contaminated observations, ฮฑ โˆˆ (0, 1), is independent of ฮฑ and coincides with the asymptotic of the risk in the direct observation model, ฮฑ = 0. For the first time this phenomenon was discovered in Hesse (1995) and Yuana and Chenb (2002). In the very recent paper Lepski (2017), in the particular case ~r = (p, . . . , p), p โˆˆ (1, โˆž) the optimally adaptive estimator was built. It is easy to check that independently of the value of ฮฒ~ and ~ ยต, the corresponding set of parameters belongs to the dense zone. Note however that our estimator is only optimally-adaptive in this zone, but it is applied to a much more general collection of functional classes. It is worth noting that the estimator procedure, used in Lepski (2017), has nothing in common with our pointwise selection rule. 30 . As to the direct observation scheme, ฮฑ = 0, our results coincide with those obtained recently in Goldenshluger and Lepski (2014), when pฯ‰(0) > ฮบ0 (p). However, for the tail zone pฯ‰(0) โ‰ค ฮบ0 (p), our bound is slightly better since the bound obtained in the latter paper contains an additional d factor ln p (n). It is interesting to note that although both estimator constructions are based upon local selections from the family of kernel estimators, the selection rules are different. 40 . Let us finally discuss the results corresponding to the tail zone, ฮบฮฑ (p) > pฯ‰(ฮฑ). First, the lower bound for the minimax risk is given by [L(ฮฑ)nโˆ’1 ]ฯ(ฮฑ) while the accuracy provided by our estimator is dโˆ’1 ln p (n)[L(ฮฑ)nโˆ’1 ln(n)]ฯ(ฮฑ) . As we mentioned above, the passage from [L(ฮฑ)nโˆ’1 ]ฯ(ฮฑ) to [L(ฮฑ)nโˆ’1 ln(n)]ฯ(ฮฑ) seems to be an unavoidable payment for the application of a local selection scheme. It is interesting to note that dโˆ’1 the additional factor ln p (n) disappears in the dimension d = 1. First, note that if ฮฑ = 0 the onedimensional setting was considered in Juditsky and Lambertโ€“Lacroix (2004) and Reynaudโ€“Bouret et al. 10 (2011). The setting of Juditsky and Lambertโ€“Lacroix (2004) corresponds to r = โˆž, while Reynaudโ€“Bouret et al. (2011) deal with the case of p = 2 and ฯ„ (2) > 0. Both settings rule out the sparse zone. The rates of convergence found in these papers are easily recovered from our results corresponding to the tail and dense zones. Next, we remark that the aforementioned factor appears only when anisotropic functional classes are considered. Indeed, in view of the second assertion of Theorem 3 our estimator is nearly optimally adaptive on the tail zone in the isotropic case. The natural question arising in this context, dโˆ’1 is whether the ln p (n)-factor is an unavoidable payment for anisotropy of the underlying function or not? At last, we note that in the isotropic case our results remain true when the corresponding Nikolโ€™skii class is defined in L1 -norm on Rd (r = 1). It is worth noting that the analysis of the proof of the theorem allows us to assert that if rj = 1, j โˆˆ J for some J 6= {1, . . . , d} the first statement remains true up to some logarithmic factor. However the asymptotic of the maximal risk of our estimator if rj = 1 for any j = 1, . . . , d remains unknown. 50 . We finish our discussion with the following remark. If ฮฑ 6= 1 the assumption f โˆˆ Fg,โˆž (R, Q) implies in many cases that f is uniformly bounded and, therefore, Theorem 3 is applicable. In particular it is always the case if the model (1.3) is considered. Indeed f, g โˆˆ P Rd in this case, which implies kf kโˆž โ‰ค (1 โˆ’ ฮฑ)โˆ’1 kpkโˆž โ‰ค (1 โˆ’ ฮฑ)โˆ’1 Q. Another case is kgkโˆž < โˆž and recall that this assumption was used in the proofs of Theorems 1 and 2, Assumption 3. We obviously have that   kf kโˆž โ‰ค (1 โˆ’ ฮฑ)โˆ’1 Q + ฮฑRkgkโˆž . More generally kf kโˆž โ‰ค (1โˆ’ฮฑ)โˆ’1 (Q+ฮฑD) if f โˆˆ Fg,โˆž (R, Q) and kf โ‹†gkโˆž โ‰ค D. Since the definition of the Nikolโ€™skii class implies that kf krโˆ— โ‰ค Lโˆ— , where r โˆ— = supj=1,...,d rj and Lโˆ— = supj=1,...,d Lj , the latter condition can be verified in particular if kgkq < โˆž, 1/q = 1 โˆ’ 1/r โˆ— . All saying above explains why we study the estimation of unbounded functions only in the case ฮฑ = 1. 2.4.2. Unbounded case, ฮฑ = 1 The problem   we address now is the adaptive estimation over the collection of functional classes ~ L ~ โˆฉ Fg,โˆž (R, Q) ~ ~ . N~r,d ฮฒ, ฮฒ,~ r,L,R,Q As we already mentioned, if additionally kgkโˆž < 0 then Fg,โˆž (R, Q) = Fg (R) for any Q โ‰ฅ Rkgkโˆž and, therefore, in view of Theorem 1 discussed in Section 1.3, there is no consistent estimator if either p = 1 or ฮบฮฑ (p) โ‰ค 0, ฯ„ (p) โ‰ค 0, pโˆ— = p. Analyzing the proof of the latter theorem, we come to the following assertion. Conjecture 1. Let ฮฑ = 1 and assume that Assumption 4 is fulfilled. Suppose additionally that Assumption 2 holds with minj=1,...,d ยตj > 1/p. Then, the assertion of Theorem 1 remains true if   ~ L ~ L ~ โˆฉ Fg (R) by N~r,d ฮฒ, ~ โˆฉ Fg,โˆž (R, Q). one replaces N~r,d ฮฒ, The latter result is formulated as a conjecture only because we will not prove it in the present paper. Its proof is postponed to Part III where the adaptive estimation over the collection   ~ L ~ โˆฉ Fg,u (R, Q) โˆฉ Bq,d (Q) ~ ~ N~r,d ฮฒ, ฮฒ,~ r,L,R,Q,u,q introduced in Part I will be studied. For this reason, later on we will only consider the parameters ~ ~r belonging to the set Pp,~ยต defined below. ฮฒ, n o ~ ~r : ฮบฮฑ (p) โ‰ค 0, ฯ„ (p) โ‰ค 0, max rj โ‰ค p . Pp,~ยต = (0, โˆž)d ร— [1, โˆž]d \ ฮฒ, j=1,...,d 11 For given p > 1 and ~ ยต โˆˆ (0, โˆž)d the latter set consists of the class parameters for which a uniform consistent estimation is possible.  Theorem 4. Let โ„“ โˆˆ Nโˆ— and g โˆˆ L1 Rd , satisfying Assumption 5 be fixed and let K satisfy Assumptions 6 and 7.  ~ ~r) โˆˆ Pp,~ยต โˆฉ (0, โ„“]d ร— 1) Then for any p > [minj=1,... ยตj ]โˆ’1 , R, Q > 0, 0 < L0 โ‰ค Lโˆž < โˆž, ฮฒ, ~ โˆˆ [L0 , Lโˆž ]d there exists C < โˆž, independent of L, ~ such that: (1, โˆž]d and L lim sup nโ†’โˆž sup  ~L ~ โˆฉFg,โˆž (R,Q) f โˆˆN~r,d ฮฒ, bn H d โˆ’1   ฮดnโˆ’ฬบ(1) Rp(n) fb~h,Hd ; f โ‰ค C, where ฬบ(ยท) is defined in (1.7).  2) For any p > [minj=1,... ยตj ]โˆ’1 , R, Q > 0, 0 < L0 โ‰ค Lโˆž < โˆž, (ฮฒ, r) โˆˆ Pp,~ยต โˆฉ (0, โ„“] ร— (1, โˆž] and L โˆˆ [L0 , Lโˆž ] there exists C < โˆž, independent of L, such that: lim sup nโ†’โˆž sup  f โˆˆNr,d ฮฒ,L โˆฉFg,โˆž (R,Q) d bn Hisotr โˆ’1  ฮดnโˆ’ฬบ(1) R(n) fb~h,Hd p isotr  ; f โ‰ค C. Some remarks are in order. 10 . Note that kgk1 < โˆž, kgkโˆž < โˆž implies that kgk2 < โˆž and, therefore the Parseval identity together with Assumption 5 allows us to assert that kgkโˆž < โˆž โ‡’ ยตj > 1/2, โˆ€j = 1, . . . , d. (2.7) Hence, the condition p > [minj=1,... ยตj ]โˆ’1 is automatically checked if p โ‰ฅ 2 and kgkโˆž < โˆž. Also, it is worth noting that considering the adaptation over the collection of isotropic classes, we do not require that the coordinates of ~ยต would be the same. The latter is true for the second assertion of Theorem 3 as well. At last, analyzing the proof of the theorem, we can assert that the second assertion remains true under the slightly weaker assumption p > d(ยต1 + ยท ยท ยท + ยตd )โˆ’1 . 20 . The assertion of Theorem 1 has no analogue in the existing literature except the results obtained in Comte and Lacour (2013) and Rebelles (2016). Comte and Lacour (2013) deals with the particular case p = 2, ~r = (2, . . . , 2) while Rebelles (2016) studied the case ~r = (p, . . . , p), p โˆˆ (1, โˆž). It is easy to check that in both papers whatever the value of ฮฒ~ and ~ยต, the corresponding set of parameters belongs to the dense zone. Note also that the estimation procedures used in Comte and Lacour (2013) as well as in Rebelles (2016), if p โ‰ฅ 2, (both based on a global version of the Goldenshluger-Lepski method) are optimally-adaptive. They attain the asymptotic of minimax risks corresponding to the dense zone found in Theorem 1, while our method is only nearly optimally adaptive. However, it is well-known that the global selection from the family of standard kernel estimators leads to correct results only if ~r = (p, . . . , p) when the Lp -risk is considered, see, for instance Goldenshluger and Lepski (2011). On the other hand, estimation procedures based on a local selection scheme, which can be applied to the estimation of functions belonging to much more general functional classes, often do not lead to an optimally adaptive method. Fortunately, the loss of accuracy inherent to local procedures is logarithmic w.r.t. the number of observations. 30 . Together with Theorems 1 and 2, Theorems 3 and 4 provide the full classification of the asymptotics of the minimax risks over anisotropic/isotropic Nikolskii classes for the class parameters belonging to the sparse zone and, up to some logarithmic factor, belonging to the tail and dense zones as well as the boundaries. We mean that the results of these theorems are valid for any 12 ~ โˆˆ (0, โˆž)d . Indeed, for given ฮฒ~ and L ~ one can choose L0 = fixed ฮฒ~ โˆˆ (0, โˆž)d , ~r โˆˆ (1, โˆž]d and L minj=1,...d Lj , Lโˆž = maxj=1,...d Lj and the number โ„“, used in the kernel construction (2.6), as any integer strictly larger than maxj=1,...d ฮฒj . 2.4.3. Open problems Let us briefly discuss some unresolved adaptive estimation problems in the convolution structure density model. Construction of an optimally-adaptive estimator As we already mentioned the proposed pointwise selection rule leads to an optimal adaptive estimator only for the class parameters belonging to the sparse zone (in both bounded and unbounded case). We conjecture that the construction of an optimally-adaptive estimator for all values of the nuisance parameters via pointwise selection is impossible, and other methods should be invented. It is worth noting that no optimally-adaptive estimator is known neither in the density model nor in the density deconvolution even in dimension 1. In dimension larger than 1, one of the intriguing questions is related to the eventual price to pay dโˆ’1 for anisotropy (ln p (n)-factor) discussed in the remark 40 after Theorem 3. Adaptive estimation of unbounded functions We were able to study the unbounded case only if ฮฑ = 1. The estimation of unbounded densities under direct as well as partially contaminated observations remain open problems. We conjecture that the results obtained in the case ฮฑ = 1 are not true anymore for ฮฑ 6= 1 (neither upper bounds nor lower bound), but correct (or nearly correct) upper bounds for the asymptotics of the minimax risk can still be deduced from the oracle inequalities proved in Part I. In the case ฮฑ = 1 there are at least two interesting problems. First, all our results are valid under the condition p > [minj=1,... ยตj ]โˆ’1 . How the absence of this assumption may have effects on the accuracy of estimation is absolutely unclear. Next, let us mention that the lower bound result proved in Theorem 1 holds only under the consideration of the convolution structure density model. Could the same bounds be established in the deconvolution model (1.3)? Adjustment of โ€lowerโ€ and โ€upper boundโ€ assumptions to each other Comparing the assertions of Theorems 1 and 2 with those of Theorem 3 and 4, we remark that the obtention of the corresponding lower bounds for the minimax risk requires additional, rather restrictive, assumptions on the function g. Can they be weakened or even removed? 3. Proof of Theorems 3 and 4 The proofs are based on the application of Theorem 3 from Part I and on some auxiliary assertions presented below. In the subsequent proof c, c1 , c2 , C, C1 , C2 . . ., stand for constants that can depend on g, L0 , Lโˆž , ~ ~r, d and p, but are independent of L ~ and n. These constants can be different on different Q, R, ฮฒ, appearances. 3.1. Important concepts from Part I and proof outline In this section we recall the definition of some important quantities that appeared in Theorem 3 of Part I and discuss the facts which should be established to make this theorem applicable. 13 I0 . Theorem 3 (Part I) deals with the minimax result over a class F being an arbitrary subset of Fg,u (R, D) โˆฉ Bq,d (D) defined in Section 2.3 of Part I. In Theorem 3 we will consider F =  ~ L ~ โˆฉ Bโˆž,d (Q) and, therefore, F โŠ‚ Fg,โˆž (R, D) โˆฉ Bโˆž,d (Q) with D = Q[1 โˆ’ ฮฑ + ฮฑkgk1 ]. This N~r,d ฮฒ, makes Theorem 3 (Part I) with u = โˆž applicable in this case.  ~ L ~ ~r and L ~ โˆฉ Fg,โˆž (Q). We will show that for any ฮฒ, ~ one In Theorem 4 we consider F = N~r,d ฮฒ,  ~ L ~ โŠ‚ Bq,d (D) and, therefore, Theorem 3 (Part I) is can find q > 1 and D > 0 such that N~r,d ฮฒ, applicable with u = โˆž. The latter inclusions are mostly based on the embedding of anisotropic Nikolโ€™skii spaces used in the proof of Proposition 3 and on Lemma 1. II0 . The application of Theorem 3 (Part I) in the case u = โˆž requires to compute    J ~h, v = j โˆˆ {1, . . . , d} : hj โˆˆ Vj (v) , Vj (v) = v โˆˆ H : Bj,โˆž,F (v) โ‰ค cv ,   X sj  โˆ’sj ; v Bj,sj ,F hj ฮ›~s (v, F, โˆž) = inf ~hโˆˆH(v,2)  ฮ›~s v, F = inf ~hโˆˆH(v)  X ยฏ ~h,v) jโˆˆJ( v โˆ’sj ยฏ ~h,v) jโˆˆJ(  Bj,sj ,F hj sj +v โˆ’2 Fn2   ~h ,  1/2 Qd P โˆ’ 12 โˆ’ยตj (ฮฑ) (nh) where remind Fn ~h = ln n + dj=1 | ln hj | and c > 0 is a universal j=1 j (hj โˆง 1) constant completely determined by the kernel Kโ„“ and the dimension d. In the next section we propose quite sophisticated constructions of vectors h(ยท, s) and ~h(ยท, s), s โˆˆ [1, โˆž] and show, Propositions 1 and 2, that ~ h(v, 1) โˆˆ H(v), v โˆˆ [v, 1], ~ h(v, โˆž) โˆˆ H(v, 2), v โˆˆ [v, v], ~h(v, โˆž) โˆˆ H(v, 2). (3.1) Here v is defined in (3.15), v, v are defined in (3.16) and v โˆˆ {1, v1 , v3 , v, v โˆง v3 }, where v1 , v3 are defined in (3.18) and v is given in (3.19). In Proposition 3 we prove that for any ~h โˆˆ Hd Bj,r j ,N~ r,d and if ฯ„ (pโˆ— ) > 0 then additionally B   hj โ‰ค C1 Lj hฮฒj , j ~L ~ ฮฒ,   hj โ‰ค C1 Lj hฮณj , j ~~ j,qj ,N~r,d ฮฒ,L j = 1, . . . , d. (3.2) j = 1, . . . , d, (3.3) ~ At last the definition of where ~ฮณ and ~q are defined in (3.12) below and C1 is independent of L. ~ h(ยท, s) and h(ยท, s), s โˆˆ [1, โˆž] together with (3.2) allows us to assert, see (3.26), that    ~ J h(v, 1), v โЇ Jโˆž , J ~ h(v, โˆž), v โЇ Jโˆž , J ~h(v, โˆž), v โЇ Jโˆž , โˆ€v > 0, (3.4) where Jโˆž = {j = 1, . . . , d : rj = โˆž}. Thus, putting ฮป1 (v) = X jโˆˆJยฏโˆž ฮป2 (v) = X jโˆˆJยฏโˆž r ฮฒ r  v โˆ’rj Lj j hj (v, โˆž) j j , ฮป= X jโˆˆJยฏโˆž q ฮณ q  vโˆ’qj Lj j hj (v, โˆž) j j ; d Y r ฮฒ r  (hj (v, 1))โˆ’1โˆ’2ยตj (ฮฑ) , v โˆ’rj Lj j hj (v, 1) j j + v โˆ’2 (ln n/n) j=1 14 we obtain in view of (3.1), (3.2) and (3.4) that   ~ L ~ , โˆž โ‰ค C1 ฮป1 (v), ฮ›~r v, N~r,d ฮฒ,  ~ L ~ ฮ›~r v, N~r,d ฮฒ, โ‰ค C1 ฮป2 (v), โˆ€v โˆˆ [v, v]; (3.5) โˆ€v โˆˆ [v, 1] (3.6) To get (3.6) we have used that for all n large enough and all v โˆˆ [v, 1]  Q ~ Fn h(v, 1)) โ‰ค C2 (ln n/n) dj=1 (hj (v, 1))โˆ’1โˆ’2ยตj (ฮฑ) , ~ This follows from assertions (4.1) and (4.3) established in the proof where C2 is independent of L. of Proposition 1. We deduce from (3.5) and (3.6), the following bound. i h     ~ L ~ L ~ , โˆž โˆง ฮ›~r v, N~r,d ฮฒ, ~ (3.7) ฮ›~r v, N~r,d ฮฒ, โ‰ค C1 ฮป2 (v)1[v,v] (v) + ฮป1 (v)1[v,v] (v) . Moreover, if ฯ„ (pโˆ— ) > 0 we get in view of (3.1), (3.3) and (3.4)   ~ L ~ , โˆž โ‰ค C1 vp ฮป. vp ฮ›~q v, N~r,d ฮฒ, (3.8) 3.2. Special set of bandwidths The bandwidthโ€™s construction presented below as well as auxiliary statements from the next section will be exploited not only for proving Theorems 3 and 4, but also in the consideration forming Part III of this work. By this reason we formulate them in a bit more general form than what is needed for our current purposes. Set for any r, s โˆˆ [1, โˆž] sฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) โˆ’ r, (s+ฯ‰(ฮฑ)) โˆ’1  โˆ’d and let 20d max(2cKโ„“ kKโ„“ kโˆž , kKโ„“ k1 ) ฮบฮฑ (r, s) = Recall that c = that C1 appeared in (3.2)) ฮฑ โˆˆ [0, 1]. L > 0 be any number satisfying (recall L โ‰ค 1 โˆง (C1โˆ’1 c) โˆง L0 . (3.9) Recall that ฮดn = L(ฮฑ)nโˆ’1 ln n and introduce for any v > 0, s โˆˆ [1, โˆž] and j = 1, . . . , d LLโˆ’1 j e j (v, s) = ฮท  ฮฒ1  j aโˆ’2 ฮดn  ฮณ1  โˆ’2 j a LLโˆ’1 ฮดn j b j (v, s) = ฮท sฯ‰(ฮฑ) (s+ฯ‰(ฮฑ))ฮฒj rj sฯ…(ฮฑ) (s+ฯ…(ฮฑ))ฮณj qj 1 v ฮฒj v 1 ฮณj โˆ’ sฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) (s+ฯ‰(ฮฑ))ฮฒ r j j sฯ…(ฮฑ)(2+1/ฮณ(ฮฑ)) โˆ’ (s+ฯ…(ฮฑ))ฮณ q j j ; (3.10) , (3.11) where we have put pยฑ = [supjโˆˆJยฏโˆž rj ] โˆจ p, Jยฏโˆž is complimentary to Jโˆž and (  ฮฒj ฯ„ (pยฑ ) pยฑ , j โˆˆ Jยฏโˆž , j โˆˆ Jยฏโˆž , ฯ„ (rj ) , qj = , ฮณj = โˆž, j โˆˆ Jโˆž , ฮฒj , j โˆˆ Jโˆž . d X 2ยตj (ฮฑ) + 1 1 := , ฮณ(ฮฑ) ฮณj j=1 (3.12) d X 2ยตj (ฮฑ) + 1 1 := . ฯ…(ฮฑ) ฮณj qj j=1 The constant a > 0 will be chosen differently in accordance with some special relationships between ~ ~r, ~ the parameters ฮฒ, ยต, ฮฑ and p. Determine hj (ยท, s) and hj (ยท, s), j = 1, . . . , d, from the relations  e j (v, s) , v > 0; hj (v, s) = max h โˆˆ H : h โ‰ค ฮท (3.13)  b j (v, s) , v > 0, hj (v, s) = max h โˆˆ H : h โ‰ค ฮท (3.14)   ~ s) = h1 (ยท, s), . . . , hd (ยท, s) and ~h(ยท, s) = h1 (ยท, s), . . . , hd (ยท, s) . and set h(ยท, 15 3.3. Auxiliary statements All the results formulated below are proved in Section 4. Let โˆ’ ฯ‰(ฮฑ) ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) z(v) = 2 aโˆ’2 ฮดn ฯ‰(ฮฑ)+u v u+ฯ‰(ฮฑ) , and remark that z(ยท) โ‰ก 2 if u = โˆž. Note also that z(v) โ‰ฅ 2, โˆ€v โ‰ฅ aโˆ’2 ฮดn  u โˆˆ [1, โˆž], 1 2+1/ฮฒ(ฮฑ) = v. (3.15) Introduce the following notations: ยต(ฮฑ) = minj=1,...,d ยตj (ฮฑ), X= d X ยตj (ฮฑ) 1 1 โˆ’ = , 2ฮฒ(1) 2ฮฒ(0) ฮฒj Y = j=1 d X ยตj (ฮฑ) 1 1 โˆ’ = . 2ฯ‰(1) 2ฯ‰(0) ฮฒj rj j=1 Recall that z(ฮฑ) = ฯ‰(ฮฑ)(2 + 1/ฮฒ(ฮฑ))ฮฒ(0)ฯ„ (โˆž) + 1 and define 1 v = (aโˆ’2 ฮดn ) 1โˆ’1/ฯ‰(ฮฑ)+1/ฮฒ(ฮฑ) , v = aโˆ’2 ฮดn  ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0) z(ฮฑ)+ฯ‰(ฮฑ)/u . (3.16) Set uโˆ— = [โˆ’ฯ„ (โˆž)ฮฒ(0)]โˆ’1 if ฯ„ (โˆž) < 0 and let uโˆ— = โˆž if ฯ„ (โˆž) โ‰ฅ 0. Put finally y = uโˆ— โˆจ pโˆ— . ~ ~r, L0 , Lโˆž , ~ ~ โˆˆ [L0 , Lโˆž ]d . Then, Proposition 1. Let ฮฒ, ยต, ฮฑ and p be given. Assume that L ~ such that for all n large enough 1) there exists a > 0 independent of L ~ h(v, 1) โˆˆ H(v), โˆ€v โˆˆ [v, 1], ~ and u such that for all n large enough 2) there exists a > 0 independent of L  ~h(v, u) โˆˆ H v, z(v) if either ฮบฮฑ (pโˆ— , u) < 0, ฯ„ (โˆž) โ‰ฅ 0 or ฮบฮฑ (pโˆ— , u) < 0, ฯ„ (pโˆ— ) > 0, Y โ‰ฅ [X + 1]yโˆ’1 โˆ’ 1/u. Remark 2. Note that if ฮฑ 6= 1, the condition Y โ‰ฅ [X + 1]yโˆ’1 โˆ’ 1/u simply means u โ‰ค uโˆ— โˆจ pโˆ— , since X = Y = 0. On the other hand if ฮฑ = 1 this condition holds if ฯ„ (โˆž) โ‰ฅ 0 whatever the values ~ ยต of ฮฒ, ~ and ~r, since Y > 0. Also, note that ยต(1) + 1/u โˆ’ 1/y โ‰ฅ 0 โ‡’ Y โ‰ฅ [X + 1]yโˆ’1 โˆ’ 1/u. (3.17) Indeed, since rj โ‰ค pโˆ— โ‰ค y for any j = 1, . . . , d we have Y โˆ’ [X + 1]yโˆ’1 + 1/u โ‰ฅ ยต(1)[1 โˆ’ ฯ„ (y)] โˆ’ 1/y + 1/u โ‰ฅ ยต(1) โˆ’ 1/y + 1/u and (3.17) follows. To get the last inequality we have used that ฯ„ (uโˆ— ) = 0 and that ฯ„ (ยท) is strictly decreasing, so ฯ„ (y) โ‰ค 0. In particular we deduce from (3.17) that the condition Y > [X +1]yโˆ’1 โˆ’1/u is always fulfilled in the case u = uโˆ— . Recall that v โ†’ 0, n โ†’ โˆž, is defined in (3.15) and introduce the following quantities. v1 = aโˆ’2 ฮดn  1 1โˆ’u/ฯ‰(0)+1/ฮฒ(0) , v2 = aโˆ’2 ฮดn  uฯ‰(1) ฮบ1 (pโˆ— ,u)(ฯ‰(1)+u) , v3 = aโˆ’2 ฮดn where ฯ€(u) = [1/ฯ‰(0) โˆ’ 1/u][1 + X] โˆ’ 1/ฮฒ(0)[Y + 1/u]. Define also v = v1{ฯ„ (pโˆ— )>0} + v2 1{ฯ„ (pโˆ— )โ‰ค0} 16 โˆ’ Y +1/u ฯ€(u)โˆจ0 , (3.18) (3.19) Note that v1 โ†’ โˆž, n โ†’ โˆž, if โˆž > u โ‰ฅ uโˆ— โˆจ pโˆ— (it will be proved in Proposition 2 below). However v1 = 1 if u = โˆž. As it is shown in the proof of Proposition 1, formulae (4.11), v < v for all n large enough. Also v2 โ†’ โˆž, n โ†’ โˆž, if ฮบ1 (pโˆ— , u) < 0. At last v3 โ†’ โˆž, n โ†’ โˆž, since ฯ‰(0) > ฯ‰(1). Moreover v3 = โˆž if ฯ€(u) โ‰ค 0. Introduce finally ๏ฃฑ ๏ฃด [v, 1], pโˆ— = โˆž ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด [v, v1 ], ฮฑ 6= 1, pโˆ— < โˆž; ๏ฃด ๏ฃด ๏ฃฒ [v, v3 ], ฮฑ = 1, pโˆ— < โˆž, ฮบฮฑ (pโˆ— , u) โ‰ฅ 0; Iu (ฮฑ) = ๏ฃด ๏ฃด ๏ฃด ๏ฃด ฮฑ = 1, pโˆ— < โˆž, ฮบฮฑ (pโˆ— , u) < 0, Y โ‰ฅ [X + 1]yโˆ’1 โˆ’ 1/u; [v, v], ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃณ [v, v โˆง v ], ฮฑ = 1, pโˆ— < โˆž, ฮบ (pโˆ— , u) < 0, Y < [X + 1]yโˆ’1 โˆ’ 1/u, 3 ฮฑ ~ ~r, L0 , Lโˆž , ~ ~ โˆˆ [L0 , Lโˆž ]d , u โˆˆ [uโˆ— โˆจ pโˆ— , โˆž]. Proposition 2. Let ฮฒ, ยต, ฮฑ and p be given and let L ~ Then, there exists a > 0 independent of L and u such that for all n large enough  ~ h(v, u) โˆˆ H v, z(v) , v โˆˆ Iu (ฮฑ). In the current paper we will use the statements of Proposition 1 and 2 only with u = โˆž. In this context we remark that ฮบฮฑ (ยท) โ‰ก ฮบฮฑ (ยท, โˆž). Proposition 3. Let โ„“ โˆˆ Nโˆ— , p > 1 and K satisfying Assumption 7 be fixed. Then for any ฮฒ~ โˆˆ (0, โ„“]d , ~ โˆˆ (0, โˆž)d one can find C1 > 0 independent of L ~ such that (3.2) holds. If ~r โˆˆ [1, โˆž]d and L โˆ— additionally ฯ„ (p ) > 0 then (3.3) is fulfilled as well. At last, (3.2) and (3.3) remain true if one replaces the quantity B by Bโˆ— . The quantities Bj,s,F(ยท) and Bโˆ—j,s,F(ยท) are introduced in Part I but the reader can find them in the proof of the proposition. Let us also present the following auxiliary results which will be useful in the sequel. Their proofs are postponed to Appendix. Lemma 1. For any u โˆˆ [1, โˆž] ฮบฮฑ (pโˆ— , u) โ‰ค 0, ฯ„ (pโˆ— ) > 0, Y โ‰ฅ [X + 1]y โˆ’1 โˆ— โˆ’ 1/u, ฯ„ (p ) > 0, โ‡’ โ‡’ z(ฮฑ) + ฯ‰(ฮฑ)/u > 0; (3.20) z(ฮฑ)/ฯ‰(ฮฑ) โˆ’ 1 + 2/u โ‰ฅ 0. (3.21) Let Y โˆ’ [X + 1]yโˆ’1 > 0 and ฮบ1 (pโˆ— , โˆž) โ‰ฅ 0. Then there exists s > pโˆ— such that ฯ„ (s) > 0, s โ‰ฅ (1 + X)/Y. (3.22) We finish this section with the following observations which will be useful in the sequel. If ฮบฮฑ (pโˆ— ) โ‰ฅ 0 one has ฬบ(ฮฑ) = ^ ฮฒ(ฮฑ) 1 โˆ’ 1/p := r(ฮฑ), 1 โˆ’ 1/ฯ‰(ฮฑ) + 1/ฮฒ(ฮฑ) 2ฮฒ(ฮฑ) + 1 If ฮบฮฑ (pโˆ— ) < 0 one has ฯ(ฮฑ) = r(ฮฑ) ^ ฯ‰(ฮฑ) p .  ฯ‰(ฮฑ)(1 โˆ’ pโˆ— /p) 1{ฯ„ (pโˆ— )>0} + 1{ฯ„ (pโˆ— )โ‰ค0} ; ฬบ(ฮฑ) = r(ฮฑ) z(ฮฑ) ฮบฮฑ (pโˆ— )  ^  ฯ„ (p)ฯ‰(ฮฑ)ฮฒ(0) ฯ‰(ฮฑ) ฯ(ฮฑ) = r(ฮฑ) 1{ฯ„ (โˆž)>0} + 1 . z(ฮฑ) p {ฯ„ (โˆž)โ‰ค0} 17 ^  ฯ„ (p)ฯ‰(ฮฑ)ฮฒ(0) (3.23) (3.24) (3.25) 3.4. Concluding remarks Let us collect some bounds for several terms appearing in Theorem 3 (Part I) and used in the proofs of Theorems 3 and 4 simultaneously.  ฮฒ1 j , j โˆˆ J . Then, (3.4) follows 10 . First we remark that hj (ยท, 1) โ‰ก hj (ยท, โˆž) โ‰ก hj (ยท, โˆž) โ‰ค LLโˆ’1 โˆž j from (3.2) and (3.9) because for any j โˆˆ Jโˆž and v > 0       B (3.26) ~ ~ hj (v, 1) = B ~ ~ hj (v, โˆž) = B ~ ~ hj (v, โˆž) โ‰ค cv. j,โˆž,N~r,d ฮฒ,L j,โˆž,N~r,d ฮฒ,L j,โˆž,N~r,d ฮฒ,L ~ s), s โˆˆ {1, โˆž} that 20 . We deduce from the definition of h(ยท, ฯ‰(ฮฑ) ฮป1 (v) โ‰ค c1 ฮดnฯ‰(ฮฑ) v โˆ’ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) , v โˆˆ Iโˆž (ฮฑ), ฮป2 (v) โ‰ค c1 ฮดnฯ‰(ฮฑ)+1 v โˆ’ ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) ฯ‰(ฮฑ)+1 , v โˆˆ [v, 1]. It yields together with (3.7) and the definitions of v and v, choosing v = v,  ฯ‰(ฮฑ) Z v ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ))     pโˆ’ pโˆ’1 ~ ~ ~ ~ ฯ‰(ฮฑ)+1 v ฮ›~r v, N~r,d ฮฒ, L , โˆž โˆง ฮ›~r v, N~r,d ฮฒ, L dv โ‰ค c2 ฮดnฯ‰(ฮฑ)+1 v 1{ฮบฮฑ (p)>pฯ‰(ฮฑ)} v ฯ‰(ฮฑ) pโˆ’ ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) ฯ‰(ฮฑ)+1 1{ฮบฮฑ (p)<pฯ‰(ฮฑ)} + ฮดnฯ‰(ฮฑ) v pโˆ’ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) 1{ฮบฮฑ (p)>0}  ฯ‰(ฮฑ)  ฯ‰(ฮฑ)+1 ฯ‰(ฮฑ) ฯ‰(ฮฑ) pโˆ’ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) 1{ฮบฮฑ (p)<0} + ln (n) ฮดn 1{ฮบฮฑ (p)=pฯ‰(ฮฑ)} + ฮดn 1{ฮบฮฑ (p)=0} +ฮดn v +ฮดnฯ‰(ฮฑ)+1 v =: An + c2 ฮดnฯ‰(ฮฑ) v pโˆ’ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) 1{ฮบฮฑ (p)<0} . (3.27) After elementary computations and taking into account (3.23), we obtain An โ‰ค c3 bpn (H)ฮดnpฯ(ฮฑ) , An โ‰ค c3 bpn (H)ฮดnpฬบ(ฮฑ) . (3.28) These bounds are not surprising because ฬบ(ฮฑ) = ฯ(ฮฑ) if ฮบฮฑ (p) โ‰ฅ 0. At last, if ฯ„ (pโˆ— ) > 0, we get from (3.8) thanks to the definition of ~h(ยท, โˆž) and the presentation proved in (4.6) with u = โˆž ฯ‰(ฮฑ)ฯ„ (p)ฮฒ(0)   ~ L ~ , โˆž โ‰ค c4 ฮดn z(ฮฑ) . vp ฮ›~q v, N~r,d ฮฒ, pโˆ’1 30 . At last, choosing v = v, we obtain โ„“H (v) โ‰ค c6 ฮดn1โˆ’1/ฯ‰(ฮฑ)+1/ฮฒ(ฮฑ) ln n (3.23), (3.24) and (3.25): โ„“H (v) โ‰ค c6 bpn (H)ฮดnpฯ(ฮฑ) , โ„“H (v) โ‰ค c6 bpn (H)ฮดnpฬบ(ฮฑ) . (3.29) t(H) , which yields by (3.30) 3.5. Proof of Theorem 3 As it has already been mentioned we will apply Theorem 3 (Part I) with u = โˆž, q = โˆž, D = Q[1 โˆ’ ฮฑ + ฮฑkgk1 ] โˆจ Q and v = v. 10 . Consider the cases ฮบฮฑ (pโˆ— ) โ‰ฅ 0, or ฮบฮฑ (pโˆ— ) < 0, ฯ„ (โˆž) โ‰ค 0. Choose v = 1 and remark that the statements of Propositions 1 and 2 hold for any v โˆˆ [v, v]. Indeed, it suffices to note that Iโˆž (ฮฑ) โЇ [v, v] := [v, 1], because v1 , v2 , v3 > 1 and v โ‰ฅ 1 if ฯ„ (โˆž) < 0 since in this case v > 1 by (3.20). Then we can apply all the bounds obtained above, and in particular we get from (3.5)   ~ L ~ , โˆž โ‰ค C1 ฮป1 (1) โ‰ค c5 ฮดnฯ‰(ฮฑ) โ‰ค c5 bpn (H)ฮดnpฯ(ฮฑ) , ฮ›~r 1, N~r,d ฮฒ, (3.31) 18 since ฯ‰(ฮฑ) โ‰ฅ pฯ(ฮฑ) in both considered cases in view of the second equality in (3.23) and of (3.25). Applying the third assertion of Theorem 3 (Part I), we obtain from (3.27), (3.28), (3.31) and (3.30)  1 p (p) b p pฯ(ฮฑ) sup โ‰ค c7 bn (H)ฮดnฯ(ฮฑ) , Rn [f~h(ยท) , f ] โ‰ค C (c2 + c3 + c5 + c6 )bn (H)ฮดn ~L ~ โˆฉFg (R) f โˆˆN~r,d ฮฒ, and the assertion of Theorem 3 follows in both considered cases. 20 . Consider the case ฮบฮฑ (pโˆ— ) < 0, ฯ„ (โˆž) > 0. Choose v = v and remark that the statements of Propositions 1 and 2 hold hold for any v โˆˆ [v, v]. Indeed, ฯ„ (โˆž) > 0 implies v < 1 and, therefore, v = v โˆง v3 = v. We deduce from (3.27), (3.28), (3.29) and (3.30), applying the first assertion of Theorem 3 (Part I) that 1  ฯ‰(ฮฑ)ฯ„ (p)ฮฒ(0) p z(ฮฑ) p pฯ(ฮฑ) (p) b + (c3 + c6 )bn (H)ฮดn sup Rn [f~h(ยท) , f ] โ‰ค C c8 ฮดn โ‰ค c9 bn (H)ฮดnฯ(ฮฑ) . (3.32) ~L ~ โˆฉFg (R) f โˆˆN~r,d ฮฒ, Here we have also used (3.25). This completes the proof of Theorem 3. 3.6. Proof of Theorem 4 In the following we assume pโˆ— < โˆž, since pโˆ— = โˆž implies by definition of the anisotropic Nikolโ€™skii  ~ ~ class that N~r,d ฮฒ, L โŠ‚ Bโˆž,d (Lโˆž ). Hence, the results in that case follow from Theorem 3 since ฬบ(ฮฑ) = ฯ(ฮฑ) when pโˆ— = โˆž. Moreover, we remark that the imposed condition p > [minj=1,... ยตj ]โˆ’1 implies Y โ‰ฅ [X + 1]yโˆ’1 โˆ’ 1/u in view of (3.17) proved in Remark 2. This, first, makes the second assertion of Proposition 1 applicable. Next, it allows (recall that pโˆ— < โˆž and ฮฑ = 1) to rewrite Iโˆž (1) appeared in Proposition 2 as Iโˆž (1) = [v, v3 ]1{ฮบ1 (pโˆ— )โ‰ฅ0} + [v, v]1{ฮบ1 (pโˆ— )<0} . 10 . Consider the case ฮบฮฑ (pโˆ— ) < 0, ฯ„ (pโˆ— ) > 0. ~ โˆˆ [L0 , Lโˆž ] we remark that in view of Nikolโ€™skii (1977) [Theorem Taking into account that L ~ L ~ โŠ‚ Bpโˆ— ,d (c9 Lโˆž ), where c9 is independent of L. ~ Thus, Theorem 3 (Part 6.9.1, Section 6.9] N~r,d ฮฒ, โˆ— I) is applicable with u = โˆž, q = p and D = c9 Lโˆž โˆจ Q. Choose v = v and remark that the statements of Propositions 1 and 2 hold since v = v. The assertion of the theorem is obtained from (3.27), (3.28), (3.29), (3.30), (3.24) and the first assertion of Theorem 3 (Part I) by the same computations that led to (3.32). 20 . Consider the case ฮบ1 (pโˆ— ) < 0, ฯ„ (pโˆ— ) โ‰ค 0. Recall that pโˆ— > p in this case because it is necessary for the existence of an uniformly  consistent estimator. Since the definition of the anisotropic ~ L ~ โŠ‚ Bpโˆ— ,d (Lโˆž ), we assert that the second assertion of Theorem Nikolโ€™skii class implies that N~r,d ฮฒ, 3 (Part I) is applicable with u = โˆž, q = pโˆ— and D = Lโˆž โˆจ Q. Choose v = v2 and note that v = v2 in the considered case. Thus, we deduce from (3.27), (3.28), (3.30) and (3.24) sup  ~L ~ โˆฉFg,โˆž (R,Q) f โˆˆN~r,d ฮฒ, Rn(p) [fb~h(ยท) , f ] โ‰คC  ฯ‰(1)โˆ’ cโ€ฒ2 ฮดn ฯ‰(1)ฮบ1 (p,โˆž) ฮบ1 (pโˆ— ,โˆž) + (c3 + c6 )bpn (H)ฮดnpฬบ(ฮฑ) ฯ‰(1)(pโˆ’pโˆ— ) ฮบ1 (pโˆ— ,โˆž) + ฮดn 1 p , and the assertion of the theorem follows in this case. 30 . It remains to study the case ฮบ1 (pโˆ— ) โ‰ฅ 0. Let s be an arbitrary number satisfying (3.22) of Lemma 1. Since ฯ„ (s) > 0 and s > pโˆ— we can assert in view of Nikolโ€™skii (1977) [Theorem 6.9.1, ~ L ~ โŠ‚ Bs,d (c9 Lโˆž ), where c9 is independent of L. ~ Thus, Theorem 3 (Part) is Section 6.9] N~r,d ฮฒ, 19 applicable with u = โˆž, q = s and D = c10 Lโˆž โˆจ Q. Choosing v = v3 , we deduce from (3.27), (3.28), (3.30) and from the second assertion of Theorem 3 (Part 2) sup  ~L ~ โˆฉFg,โˆž (R,Q) f โˆˆN~r,d ฮฒ, Rn(p) [fb~h(ยท) , f ] 1  Y (sโˆ’p) p [1+X]/ฯ‰(0)โˆ’Y /ฮฒ(0) p pฬบ(ฮฑ) . โ‰ค C (c3 + c6 )bn (H)ฮดn + ฮดn (3.33) Since either pโˆ— /ฯ‰(0) = 1/ฮฒ(0), ฮบ1 (pโˆ— ) > 0 or pโˆ— /ฯ‰(0) > 1/ฮฒ(0), ฮบ1 (pโˆ— ) โ‰ฅ 0 and s > pโˆ— โ‰ฅ p we get Y (s โˆ’ p) [ฯ‰(0) โˆ’ ฯ‰(1)](s โˆ’ p) = >0 [1 + X]/ฯ‰(0) โˆ’ Y /ฮฒ(0) ฮบ1 (pโˆ— , โˆž) + pโˆ— โˆ’ ฯ‰(0)/ฮฒ(0) Simple algebra shows that Y (s โˆ’ p) p โ‰ฅ [1 + X]/ฯ‰(0) โˆ’ Y /ฮฒ(0) 2 + 1/ฮฒ(1) โ‡” sY ฯ‰(1) โ‰ฅ p(X + 1)[2 + 1/ฮฒ(1)]โˆ’1 Using again ฮบ1 (pโˆ— ) โ‰ฅ 0 and pโˆ— โ‰ฅ p we obtain   sY ฯ‰(1) 2 + 1/ฮฒ(1) = sฮบ1 (pโˆ— )Y + spโˆ— Y โ‰ฅ spY โ‰ฅ p(X + 1) since s satisfies (3.22) of Lemma 1. Thus, we have for all n large enough Y (sโˆ’p) p pฬบ(ฮฑ) ฮดn[1+X]/ฯ‰(0)โˆ’Y /ฮฒ(0) โ‰ค ฮดn2+1/ฮฒ(1) โ‰ค bpn (H)ฮดn and the assertion of the theorem in the case ฮบ1 (pโˆ— ) โ‰ฅ 0 follows from (3.33) and the first equality in (3.23). Theorem 4 is proved. 4. Proofs of Propositions 1, 2 and 3 The proof of Lemma 2 is postponed to Appendix. ~ ~r, ~ Lemma 2. For any ฮฒ, ยต, p โ‰ฅ 1 and ฮฑ โˆˆ [0, 1] the following is true.  โˆ’1   1/ฮณ(ฮฑ) โˆ’ 1/ฮฒ(ฮฑ) = ฯ„ (โˆž)ฮฒ(0) 1/ฯ‰(ฮฑ) โˆ’ 1/ฯ…(ฮฑ) . 4.1. Proof of Proposition 1 We start the proof with several remarks which will be useful in the sequel. First, obviously there  ~ ~r, ยต ~ such that exists 0 < T := T ฮฒ, ~ , p < โˆž independent of L lim (ln n)โˆ’1 sup nโ†’โˆž sup sup d n X ฮฑโˆˆ{0,1} sโˆˆ[1,โˆž] vโˆˆ[v,1โˆจv] j=1  o = T. ln hj (v, 1) + ln hj (v, s) (4.1) Next, for any s โˆˆ [1, โˆž] and any v > 0 d  ฯ‰(ฮฑ) 2sโˆ’ฯ‰(ฮฑ)/ฮฒ(ฮฑ) โˆ’1โˆ’2ยตj (ฮฑ) ln n Y โˆ’ 1 โˆ’ 1 e j (v, s) = a2 L ฮฒ(ฮฑ) aโˆ’2 ฮดn ฯ‰(ฮฑ)+s v s+ฯ‰(ฮฑ) = 2L ฮฒ(ฮฑ) a2 v 2 zโˆ’1 (v). ฮท n (4.2) j=1 1) Let us proceed to the proof of the first assertion. First we remark that for all n โ‰ฅ 3 ~ h(v, 1) โˆˆ (0, 1]d , 20 โˆ€v โˆˆ [v, 1]. (4.3) Indeed for any v > 0 we have since L โ‰ค L0 , ฮฒ r e j j j (v, 1) โ‰ค aโˆ’2 ฮดn ฮท  ฯ‰(ฮฑ) 1+ฯ‰(ฮฑ) v rj โˆ’ ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) 1+ฯ‰(ฮฑ) , j โˆˆ Jยฏโˆž . (4.4) Therefore, for any v โˆˆ [v, 1] one has in view of the definition of v ฮฒ r e j j j (v, 1) โ‰ค aโˆ’2 ฮดn ฮท  ฯ‰(ฮฑ) 1+ฯ‰(ฮฑ) v 1โˆ’ ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) 1+ฯ‰(ฮฑ) โ‰ค aโˆ’2 ฮดn Note that for any j โˆˆ Jโˆž e j (v, 1) = LLโˆ’1 ฮท j v  ฮฒ1 j  ฯ‰(ฮฑ) 1+ฯ‰(ฮฑ) v 1โˆ’ ฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) 1+ฯ‰(ฮฑ) = 1, j โˆˆ Jยฏโˆž . 1 โ‰ค v ฮฒj โ‰ค 1, โˆ€v โ‰ค 1. e j (ยท, 1) by construction. and the proof of (4.3) is completed since hj (ยท, 1) โ‰ค ฮท   d+2 Pd ยตj (ฮฑ) โˆ’ 1 j=1 Set T0 = T + 2 e L ฮฒ(ฮฑ) and remark that in view of (4.1), (4.2) and (4.3) for all n large enough and any v โˆˆ [v, 1]  ~ Gn h(v, 1) โ‰ค โ‰ค 1 (T + 2) ln n T0 L ฮฒ(ฮฑ) ln n โ‰ค  1+ยตj (ฮฑ) Q Q 1+ยตj (ฮฑ) e j (v, 1) n dj=1 hj (v, 1) n dj=1 ฮท 1 ฯ‰(ฮฑ) 2โˆ’ฯ‰(ฮฑ)/ฮฒ(ฮฑ) 2 T0 L ฮฒ(ฮฑ) ln n 1+ฯ‰(ฮฑ) ฮด 1+ฯ‰(ฮฑ) v 1+ฯ‰(ฮฑ) = T a . n 0  Qd 1+2ยตj (ฮฑ) e j (v, 1) n j=1 ฮท (4.5) Here we have taken into account that hj (v, s) โ‰ฅ eโˆ’1 ฮท j (v, s). Since ฯ‰(ฮฑ) 2 T0 a 1+ฯ‰(ฮฑ) ฮดnฯ‰(ฮฑ)+1 v denoting a = p 2โˆ’ฯ‰(ฮฑ)/ฮฒ(ฮฑ) 1+ฯ‰(ฮฑ) โ‰ค T0 a2 v โ‡” v โ‰ฅ v, a/T0 we assert that  ~ 1) โ‰ค av, Gn h(v, โˆ€v โˆˆ [v, 1]. The first assertion is established. 2) Before proving the second assertion, let us make several remarks. 10 . For any u โˆˆ [1, โˆž] the following is true. b j (v, u) = LLโˆ’1 ฮท j v  ฮฒ1 j b j (v, u) = LLโˆ’1 ฮท j , j โˆˆ Jโˆž ,  ฮณ1 j aโˆ’2 ฮดn (pยฑ )ฮฒ(0)  ฮณฯ‰(ฮฑ)ฯ„ [z(ฮฑ)+ฯ‰(ฮฑ)/u] j , j โˆˆ Jยฏโˆž . (4.6) b j (v, u) since, remind ฮณj = ฮฒj , qj = โˆž if The first equality follows directly from the definition of ฮท j โˆˆ Jโˆž . Thus, let us prove the second equality. We have ฮณ q b j j j (v, u) = LLโˆ’1 ฮท j pยฑ aโˆ’2 ฮดn  uฯ…(ฮฑ) u+ฯ…(ฮฑ) v pยฑ โˆ’ uฯ…(ฮฑ)(2+1/ฮณ(ฮฑ)) u+ฯ…(ฮฑ) , โˆ€j โˆˆ Jยฏโˆž . Here we have used that qj = pยฑ for any j โˆˆ Jยฏโˆž . Using the definition of v we get ฮณ q b j j j (v, u) ฮท = p ยฑ LLโˆ’1 j โˆ’2 a ฮดn Using the definition of z(ฮฑ) we obtain  (โˆž)ฮฒ(0) uฯ…(ฮฑ) + ฯ‰(ฮฑ)ฯ„ u+ฯ…(ฮฑ) z(ฮฑ)+ฯ‰(ฮฑ)/u 21 h pยฑ โˆ’ uฯ…(ฮฑ)(2+1/ฮณ(ฮฑ)) u+ฯ…(ฮฑ) i , โˆ€j โˆˆ Jยฏโˆž . A :=   uฯ…(ฮฑ) ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0) uฯ…(ฮฑ)(2 + 1/ฮณ(ฮฑ)) ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0)pยฑ + pยฑ โˆ’ = u + ฯ…(ฮฑ) z(ฮฑ) + ฯ‰(ฮฑ)/u u + ฯ…(ฮฑ) z(ฮฑ) + ฯ‰(ฮฑ)/u    uฯ…(ฮฑ) 1 + ฯ‰(ฮฑ)/u โˆ’ ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0) 1/ฮณ(ฮฑ) โˆ’ 1/ฮฒ(ฮฑ) . + (u + ฯ…(ฮฑ))(z(ฮฑ) + ฯ‰(ฮฑ)/u) We obtain applying Lemma 2 A= uฯ…(ฮฑ)ฯ‰(ฮฑ)[1/s + 1/ฯ…(ฮฑ)] ฯ‰(ฮฑ)ฯ„ (pยฑ )ฮฒ(0)pยฑ ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0)pยฑ + = . z(ฮฑ) + ฯ‰(ฮฑ)/u (u + ฯ…(ฮฑ))(z(ฮฑ) + ฯ‰(ฮฑ)/u) z(ฮฑ) + ฯ‰(ฮฑ)/u The second formula in (4.6) is established. 20 . Next, let us prove that ~h(v, u) โˆˆ (0, 1]d , โˆ€u โˆˆ [1, โˆž]. (4.7) If Jโˆž 6= โˆ…, which is equivalent to pโˆ— = โˆž, the definition of v implies that v โ‰ค 1 for all n large enough, since ฯ„ (pโˆ— ) = ฯ„ (โˆž) > 0 and in view of (3.20). We deduce from the first equality in (4.6) b j (v, u) = LLโˆ’1 hj (v, u) โ‰ค ฮท j v  ฮฒ1 1 โ‰ค v ฮฒj โ‰ค 1, j โˆ€j โˆˆ Jโˆž . and (4.7) is proved for any j โˆˆ Jโˆž . It remains to note that ฯ„ (pยฑ ) โ‰ฅ ฯ„ (pโˆ— ) since pโˆ— โ‰ฅ pยฑ and therefore, if ฯ„ (pโˆ— ) โ‰ฅ 0 we have b j (v, u) โ‰ค 1, hj (v, u) โ‰ค ฮท โˆ€j โˆˆ Jยฏโˆž , for all n large enough in view of (3.20) of Lemma 1, the second equality in (4.6) and since LLโˆ’1 j โ‰ค 1. This completes the proof of (4.7). 30 . For any u โˆˆ [1, โˆž] one has aโˆ’2 ฮดn d Y j=1 โˆ’1โˆ’2ยตj (ฮฑ) bj ฮท aโˆ’2 ฮดn d Y j=1 (v, u) โ‰ค T โˆ’1 (ฮฑ) aโˆ’2 ฮดn โˆ’1 b โˆ’1 ฮท (0) aโˆ’2 ฮดn j (v, u) โ‰ค T 1โˆ’ ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0)/ฮฒ(ฮฑ)+1 1โˆ’ z(ฮฑ)+ฯ‰(ฮฑ)/u ; (4.8) ฯ‰(ฮฑ) z(ฮฑ)+ฯ‰(ฮฑ)/u (4.9) j (ฮฑ) Q j (ฮฑ)  1+2ยต   1+2ยต Q โˆ’1 โˆ’1 ฮฒj ฮณj where we have denoted T ฮฑ = inf Lโˆˆ[L . d ~ jโˆˆJโˆž LLj jโˆˆJยฏโˆž LLj 0 ,Lโˆž ] Indeed, we have in view of (4.6) and the definition of v d Y j=1 1+2ยตj (ฮฑ) bj ฮท d Y j=1 where we have put (v, u) โ‰ฅ T โˆ’1 (ฮฑ) aโˆ’2 ฮดn b j (v, u) โ‰ฅ T โˆ’1 (0) aโˆ’2 ฮดn ฮท 1 ฮฒโˆž (ฮฑ) = P jโˆˆJโˆž 1+2ยต(ฮฑ) , ฮณยฑ1(ฮฑ) ฮฒj ฮณ ฯ‰(ฮฑ)ฯ„ (pยฑ )ฮฒ(0) ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0) + ยฑ (ฮฑ)[z(ฮฑ)+ฯ‰(ฮฑ)/u] ฮฒโˆž (ฮฑ)[z(ฮฑ)+ฯ‰(ฮฑ)/u] ฮณ = ฯ‰(ฮฑ)ฯ„ (pยฑ )ฮฒ(0) ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0) + ยฑ (0)[z(ฮฑ)+ฯ‰(ฮฑ)/u] ฮฒโˆž (0)[z(ฮฑ)+ฯ‰(ฮฑ)/u] P jโˆˆJยฏโˆž 1+2ยต(ฮฑ) . ฮณj Note that for any ฮฑ โˆˆ [0, 1] X (1 + 2ยต(ฮฑ))ฯ„ (rj ) ฯ„ (โˆž) ฯ„ (โˆž) 1 ฯ„ (โˆž) ฯ„ (pยฑ ) + = = + . + ฮณยฑ (ฮฑ) ฮฒโˆž (ฮฑ) ฮฒj ฮฒโˆž (ฮฑ) ฮฒ(ฮฑ) ฯ‰(ฮฑ)ฮฒ(0) ยฏ jโˆˆJโˆž 22 , and (4.8) and (4.9) are established. 40 . Simple algebra shows that for any u โˆˆ [1, โˆž] aโˆ’2 ฮดn 1โˆ’ ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0)/ฮฒ(ฮฑ)+1 z(ฮฑ)+ฯ‰(ฮฑ)/u = 2v2 zโˆ’1 (v), and we deduce from (4.8) for any u โˆˆ [1, โˆž] (recall that z โ‰ก 2 if u = โˆž) ฮดn d Y j=1 โˆ’1โˆ’2ยตj (ฮฑ) bj ฮท (v, u) โ‰ค 2T โˆ’1 (ฮฑ)a2 v2 zโˆ’1 (v). (4.10) Let us also prove that for any u โˆˆ [1, โˆž] and all n large enough v > v := aโˆ’2 ฮดn  1 2+1/ฮฒ(ฮฑ) โ‡’ z(v) โ‰ฅ 2. (4.11) The latter inclusion follows from (3.15). Indeed, if ฯ„ (โˆž) โ‰ค 0 then v โ‰ฅ 1 โ‰ฅ v. If ฯ„ (โˆž) > 0 1 1 + ฯ‰(ฮฑ)/u ฯ‰(ฮฑ)ฯ„ (โˆž)ฮฒ(0) โˆ’ =โˆ’ <0 z(ฮฑ) + ฯ‰(ฮฑ)/u 2 + 1/ฮฒ(ฮฑ) [z(ฮฑ) + ฯ‰(ฮฑ)/u][2 + 1/ฮฒ(ฮฑ)] in view of (3.20), so v > v. Note at last that for any u โˆˆ [1, โˆž] vzโˆ’1 (v) = 2 aโˆ’2 ฮดn  ฯ‰(ฮฑ)ฯ„ (u)ฮฒ(0) z(ฮฑ)+ฯ‰(ฮฑ)/u . (4.12) 50 . Let us proceed to the proof of the second assertion. Let us choose a < aT (ฮฑ)/(4T0 ) < 1. We have in view of (4.1), (4.8) and (4.10) similarly to (4.5)  Fn2 ~h(v, u) โ‰ค Q d T0 ฮดn j=1 โˆ’1 2 2 โˆ’1 2 2 โˆ’1 1+2ยตj (ฮฑ) โ‰ค 2T0 T (ฮฑ)a v z (v) โ‰ค a v z (v). (4.13) b j (v, u) ฮท  Thus to prove the assertion all we need to show is that ~h(v, u) โˆˆ H(v), i.e. Gn ~h(v, u) โ‰ค av. Let us distinguish three cases. 50 a. Let ฯ„ (โˆž) โ‰ฅ 0. We remark that the definition of v in this case yields v โ‰ค 1 for all n large enough and we obtain from (4.10) and (4.11) that ฮดn d Y j=1 โˆ’1โˆ’2ยตj (ฮฑ) bj ฮท (v, u) โ‰ค T โˆ’1 (ฮฑ)a2 v. (4.14) Then we have in view of (4.1), (4.7), (4.8) and (4.14) similarly to (4.5)  Gn ~h(v, u) โ‰ค Q d T0 ฮดn j=1 โˆ’1 2 1+2ยตj (ฮฑ) โ‰ค T0 T (ฮฑ)a v โ‰ค av. b j (v, u) ฮท (4.15) 50 b. Let ฯ„ (โˆž) < 0, ฯ„ (pโˆ— ) > 0 and ฮฑ 6= 1. Then by assumption u โ‰ค p, and thus ฯ„ (u) โ‰ฅ 0. We get from (4.10) and (4.12) ฮดn d Y j=1 โˆ’1โˆ’2ยตj (ฮฑ) bj ฮท (v, uโˆ— ) โ‰ค 4T โˆ’1 (ฮฑ)a2 v, 23 (4.16)  so Gn ~h(v, u) โ‰ค av follows from (4.15) and (4.13). 50 c. Let ฯ„ (โˆž) < 0, ฯ„ (pโˆ— ) > 0, ฮฑ = 1. We have as previously  G2n ~h(u) โ‰ค (T + 2) ln n (T + 2) ln n 1+2ยตj (ฮฑ) Qd n j=1 hj (v, u) n j=1 hj (v, u)   T (0)aโˆ’2 ฮดn 2 โˆ’1 4 2 โˆ’1 โ‰ค 2T0 T (1)T1 a v z (v) Qd . b j (v, u) j=1 ฮท Qd (4.17) Here we have used (4.10) and put T1 = T โˆ’1 (0)Lโˆ’1/ฮฒ(0) . Our goal now is to show that for any u โˆˆ [1, โˆž] and all n large enough โˆ’2 T (0)a ฮดn z โˆ’1 (v) d Y j=1 b โˆ’1 ฮท j (v, u) โ‰ค 1. (4.18) In view of (4.9) and of the definition of z(ยท) in order to establish (4.18) it suffices to show that z(1)/ฯ‰(1) โˆ’ 1 + 2/u โ‰ฅ 0. Since we assumed ฯ„ (โˆž) < 0 and ฯ„ (pโˆ— ) > 0, then necessarily uโˆ— > pโˆ— since ฯ„ (uโˆ— ) = 0 and ฯ„ (ยท) is strictly decreasing. Hence, the required results follows from (3.21). Thus, (4.18) is proved. Then choosing a such that T0 (2T โˆ’1 (1)T1 )1/2 a2 โ‰ค a, we obtain from (4.17) and (4.18) that for all all n large enough  Gn ~h(v, u) โ‰ค T0 (2T โˆ’1 (ฮฑ)T1 )1/2 a2 v โ‰ค av. The second assertion is proved 4.2. Proof of Proposition 2 We start the proof with several remarks which will be useful in the sequel. 10 . Let us show that for all n large enough ~ h(v, u) โˆˆ (0, 1]d , โˆ€v โˆˆ Iu (ฮฑ), โˆ€u โ‰ฅ uโˆ— โˆจ pโˆ— . e j (ยท, u), j = 1, . . . , d, In view of the definition of ฮท ฮฒ r e j j j (v, u) = LLโˆ’1 ฮท j rj  โˆ’2 a ฮดn uฯ‰(ฮฑ) u+ฯ‰(ฮฑ) v rj โˆ’ uฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) u+ฯ‰(ฮฑ) , (4.19) j โˆˆ Jยฏโˆž . (4.20) Therefore, for any v โˆˆ [v0 , 1] one has, taking into account that L โ‰ค L0 ,  ฮฒ r e j j j (v, u) โ‰ค aโˆ’2 ฮดn ฮท uฯ‰(ฮฑ) u+ฯ‰(ฮฑ) v 1โˆ’ uฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) u+ฯ‰(ฮฑ)  โ‰ค aโˆ’2 ฮดn uฯ‰(ฮฑ) u+ฯ‰(ฮฑ) 1โˆ’ v0 uฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) u+ฯ‰(ฮฑ) = 1, j โˆˆ Jยฏโˆž . It remains to note that v > v0 for all n large enough and, therefore, e j (v, u) โ‰ค 1, j โˆˆ Jยฏโˆž , ฮท โˆ€v โˆˆ [v, 1] โˆฉ Iu (ฮฑ). e j (ยท, u), j = 1, . . . , d, We also have in view of the definition of ฮท  ฮฒ1 j โ‰ค 1, e j (v, u) = LLโˆ’1 ฮท v j 24 j โˆˆ Jโˆž , (4.21) for any v โ‰ค 1. This together with (4.21) proves (4.19) in the cases when Iu (ฮฑ) = [v, 1]. Noting that pโˆ— < โˆž is equivalent to Jโˆž = โˆ…, we deduce from (4.20) for any v โ‰ฅ 1  ฮฒ r e j j j (v, u) โ‰ค aโˆ’2 ฮดn ฮท uฯ‰(ฮฑ) u+ฯ‰(ฮฑ) v pโˆ— โˆ’ uฯ‰(ฮฑ)(2+1/ฮฒ(ฮฑ)) u+ฯ‰(ฮฑ) Thus, if ฮบฮฑ (pโˆ— , u) โ‰ฅ 0 then for any v โ‰ฅ 1  ฮฒ r e j j j (v, u) โ‰ค aโˆ’2 ฮดn ฮท uฯ‰(ฮฑ) u+ฯ‰(ฮฑ)  โ‰ค aโˆ’2 ฮดn uฯ‰(ฮฑ) u+ฯ‰(ฮฑ) v โˆ’ฮบฮฑ (p โˆ— ,u) , j = 1, . . . , d. โ†’ 0, n โ†’ โˆž, j = 1, . . . , d. This together with (4.21) yields (4.19) in the case ฮบฮฑ (pโˆ— , u) โ‰ฅ 0, pโˆ— < โˆž, whatever the value of ฮฑ. Let ฮฑ = 1, pโˆ— < โˆž, ฮบฮฑ (pโˆ— , u) < 0, ฯ„ (pโˆ— ) > 0. Then v = v and we have for any j = 1, . . . , d and v โˆˆ [1, v] in view of the definition of v  ฮฒ r ฮฒ r e j j j (v, u) โ‰ค ฮท e j j j (v, u) = aโˆ’2 ฮดn ฮท ฮบ (pโˆ— ,u)ฯ‰(1)ฯ„ (โˆž)ฮฒ(0) uฯ‰(1) โˆ’ 1 z(1)+ฯ‰(1)/u u+ฯ‰(1)  = aโˆ’2 ฮดn pโˆ— ฯ„ (pโˆ— )ฯ‰(1) z(1)+ฯ‰(1)/u โ†’ 0, n โ†’ โˆž, in view of (3.20). Hence, (4.19) holds in this case. Let ฮฑ = 1, ฮบฮฑ (pโˆ— , u) < 0, ฯ„ (pโˆ— ) โ‰ค 0. Then v = v2 and we have for any v โˆˆ [1, v2 ] in view of the definition of v2  ฮฒ r ฮฒ r e j j j (v, u) โ‰ค ฮท e j j j (v2 , u) = aโˆ’2 ฮดn ฮท uฯ‰(1) u+ฯ‰(1) โˆ’ฮบ1 (pโˆ— ,u) v2 = 1, j = 1, . . . , d. and, therefore (4.19) holds in this case. Let ฮบฮฑ (pโˆ— , u) < 0, ฮฑ 6= 1, u < โˆž. First we note that ฯ„ (โˆž) < 0 and u โ‰ฅ uโˆ— โˆจ pโˆ— imply  1 โˆ’ u/ฯ‰(0) + 1/ฮฒ(0) = 1 โˆ’ u + uฯ„ (u) โ‰ค 1 โˆ’ u + uฯ„ uโˆ— โˆจ pโˆ— โ‰ค 1 โˆ’ u < 0,  since either ฯ„ (pโˆ— ) โ‰ค 0 or uโˆ— > pโˆ— and ฯ„ uโˆ— โˆจ pโˆ— = 0. Thus v1 โ†’ โˆž, n โ†’ โˆž and, therefore, for any v โˆˆ [1, v1 ] uฯ‰(0)  ฮฒ r ฮฒ r โˆ’ฮบ (pโˆ— ,u) e j j j (v, u) โ‰ค ฮท e j j j (v1 , u) = aโˆ’2 ฮดn u+ฯ‰(0) v1 0 , j = 1, . . . , d. ฮท     Note that 1 โˆ’ u/ฯ‰(0) + 1/ฮฒ(0) = ฮบ0 (pโˆ— , u) 1/u + 1/ฯ‰(0) โˆ’ (u โˆ’ pโˆ— ) 1/u + 1/ฯ‰(0) and, therefore โˆ’ ฮบ0 (pโˆ— , u) uฯ‰(0) โ‰ฅโˆ’ , 1 โˆ’ u/ฯ‰(0) + 1/ฮฒ(0) u + ฯ‰(0)  โˆ’ uฯ‰(0) โˆ’ฮบ (pโˆ— ,u) which yields v1 0 โ‰ค aโˆ’2 ฮดn u+ฯ‰(0) . It remains to note that if ฯ„ (โˆž) โ‰ฅ 0 then uโˆ— = โˆž and, therefore u = โˆž. It implies v1 = 1 and Iu (ฮฑ) = [v, 1] and this case has been already treated. This completes the proof of (4.19).  ~ ~r, ~ยต, p < โˆž independent of L ~ such that 20 . Remark that there obviously exists 0 < S := S ฮฒ, โˆ’1 lim (ln n) nโ†’โˆž sup sup sup d X ฮฑโˆˆ{0,1} uโˆˆ[1,โˆž] vโˆˆIu (ฮฑ) j=1  ln hj (v, u) = S. Hence, in view of (4.19) one has for all n large enough and v โˆˆ Iu (ฮฑ) p   (S + 2) ln n (S + 2) ln n ~ ~ Fn h(v, u) โ‰ค โˆš Q (4.22) . , Gn h(v, u) โ‰ค Q 1+ยตj (ฮฑ) 1  +ยต (ฮฑ) n dj=1 hj (v, u) n dj=1 hj (v, u) 2 j 25 Pd   โˆ’ 1 e j (v, u) and setting S0 = S + 2 ed+2 j=1 ยตj L ฮฒ(1) we Taking into account that hj (v, u) โ‰ฅ eโˆ’1 ฮท obtain from (4.2) for any ฮฑ โˆˆ [0, 1] and v โˆˆ Iu (ฮฑ) (S + 2)n โˆ’1 ln (n) d Y j=1 1+2ยตj (ฮฑ) hj (v, s) โ‰ค 2S0 a2 v 2 zโˆ’1 (v). (4.23) From now on we choose a โ‰ค a/(2S0 ) < 1. It yields in view of (4.22) and (4.23)  ~ Fn2 h(v, u) โ‰ค a2 v 2 zโˆ’1 (v), โˆ€v โˆˆ Iu (ฮฑ). (4.24) 30 . Since  (4.24) holds, to finish the proof of Proposition (2) all we need to show is that Gn ~h(v, u) โ‰ค av, โˆ€v โˆˆ Iu (ฮฑ). Let us distinguish three cases. 30 a. Let pโˆ— = โˆž or ฮฑ 6= 1, u = โˆž. First we note that in these cases Iu (ฮฑ) = [v, 1]. Next in view of the second inequality in (4.22), (4.19), (4.23) and (4.24) we obtain  ~ Gn h(v, u) โ‰ค n (S + 2) ln n 2 2 โˆ’1 1+2ยตj (ฮฑ) โ‰ค a v z (v) โ‰ค av, โˆ€v โˆˆ Iu (ฮฑ). j=1 hj (v, u) Qd (4.25) To get the last inequality we have used that a < 1, z(ยท) โ‰ฅ 2 and v โ‰ค 1. 30 b. Let ฮฑ 6= 1, pโˆ— < โˆž, u < โˆž. We have in view of the second inequality in (4.22) and (4.23)  h(v, u) โ‰ค a2 v 2 zโˆ’1 (v), โˆ€v โˆˆ Iu (0). Gn ~ uฯ‰(0) uโˆ’ฯ‰(0)โˆ’ฯ‰(0)/ฮฒ(0)  u+ฯ‰(0) , and since For any u 6= โˆž, simple algebra shows that vzโˆ’1 (v) = aโˆ’2 ฮดn u+ฯ‰(0) v โˆ— u โ‰ฅ u , which implies u โˆ’ ฯ‰(0) โˆ’ ฯ‰(0)/ฮฒ(0) > 0, the result follows from sup vzโˆ’1 (v) = v1 zโˆ’1 (v1 ) = 1. vโˆˆIu (0) 30 c. Let ฮฑ = 1, pโˆ— < โˆž. We have in view of the second inequality in (4.22) and (4.23)  G2n ~ h(v, u) โ‰ค n (S + 2) ln n (S + 2) ln n  1+2ยตj (ฮฑ) Qd n j=1 hj (v, u) j=1 hj (v, u) Qd โ‰ค S1 a2 a2 v 2 zโˆ’1 (v) Qd aโˆ’2 ฮดn e j (v, u) j=1 ฮท v โˆˆ Iu (1), , (4.26) where we have denoted S1 = S0 Lโˆ’1/ฮฒ(0) . Our goal now is to show that for all n large enough โˆ’2 sup a vโˆˆIu (1) ฮดn z โˆ’1 (v) d Y j=1 We easily compute for any v > 0 aโˆ’2 ฮดn zโˆ’1 (v) d Y j=1  โˆ’2 โˆ’1 e โˆ’1 ฮท j (v, u) = z (v) a ฮดn 26 e โˆ’1 ฮท j (v, u) โ‰ค 1. uฯ‰(1) 1โˆ’ (ฯ‰(1)+u)ฯ‰(0) v (4.27) uฯ‰(1)(2+1/ฮฒ(1)) 1 โˆ’ ฮฒ(0) (u+ฯ‰(1))ฯ‰(0) . (4.28) Denoting the right hand side of the obtained inequality by P (v) we obviously have โˆ’2 sup a ฮดn z โˆ’1 (v) vโˆˆIu (1) d Y j=1   e โˆ’1 ฮท v) , j (v, u) โ‰ค max P (v), P (e (4.29) e โˆˆ {v3 , v, v โˆง v3 }. Remarking that z(v) = 2 we easily compute that for any u โˆˆ [1, โˆž] where v  P (v) = 2โˆ’1 aโˆ’2 ฮดn 2+1/ฮฒ(ฮฑ)โˆ’1/ฮฒ(0 2+1/ฮฒ(ฮฑ) โ†’ 0, n โ†’ โˆž. (4.30) Moreover we obviously have  P (v) = 2โˆ’1 aโˆ’2 ฮดn 2uฯ‰(1)(Y +1/u) ฯ‰(1)+u v 2uฯ‰(1)ฯ€(u) u+ฯ‰(1) , v > 0. (4.31) e = v3 . 30 c1. Consider the case ฮบ1 (pโˆ— , u) โ‰ฅ 0. Here v If ฯ€(u) โ‰ค 0 then v3 = โˆž and we deduce from (4.31) sup P (v) = P (v) โ†’ 0, n โ†’ โˆž, (4.32) vโ‰ฅv thanks to (4.30). If ฯ€(u) > 0 the definition of v3 implies that P (v3 ) = 1. (4.33) Both last results together with (4.29) and (4.30) prove (4.27) in the case ฮบ1 (pโˆ— , u) โ‰ฅ 0. e = v. 30 c2. Consider the case ฮบ1 (pโˆ— , u) < 0, Y โ‰ฅ [X + 1]yโˆ’1 โˆ’ 1/u. Here v โˆ— โˆ— โˆ— If ฯ„ (p ) > 0 then v = v. Moreover y = u since u = โˆž if ฯ„ (โˆž) โ‰ฅ 0 and ฯ„ (uโˆ— ) = 0 if ฯ„ (โˆž) < 0. Hence in view of (3.21) of Lemma 1 z(1)/ฯ‰(1) โˆ’ 1 + 2/u โ‰ฅ 0. We have in view of the definition of v Note that,  P (v) = 2โˆ’1 aโˆ’2 ฮดn uฯ‰ 2 (1)ฯ„ (โˆž)ฮฒ(0)ฯ€(u) uฯ‰(1)(1/ฯ‰(1)โˆ’1/ฯ‰(0)+2/u) + [u+ฯ‰(1)][z(ฮฑ)+ฯ‰(ฮฑ)/u] ฯ‰(1)+u . (4.34) uฯ‰(1)(1/ฯ‰(1) โˆ’ 1/ฯ‰(0) + 2/u) uฯ‰ 2 (1)ฯ„ (โˆž)ฮฒ(0)ฯ€(u) + ฯ‰(1) + u [u + ฯ‰(1)][z(1) + ฯ‰(1)/u] ฯ‰(1)ฯ„ (โˆž) ฯ‰(1)[1 โˆ’ 1/u] ฯ‰(1)[1/ฯ‰(0) โˆ’ 1/u] โˆ’ =1โˆ’ > 0. = 1โˆ’ z(1) + ฯ‰(1)/u z(1) + ฯ‰(1)/u z(1) + ฯ‰(1)/u To get the last inequality we have used that 1โˆ’ ฯ‰(1)[1 โˆ’ 1/u] >0 z(1) + ฯ‰(1)/u โ‡” z(1)/ฯ‰(1) โˆ’ 1 + 2/u > 0. Thus, we conclude that P (v) โ‰ค 1, which together with (4.30) implies (4.27) in the considered case. If ฯ„ (pโˆ— ) < 0 then v = v2 . Moreover y = pโˆ— . We have in view of the definition of v2  P (v2 ) = 2โˆ’1 aโˆ’2 ฮดn uฯ‰(1)(1/ฯ‰(1)โˆ’1/ฯ‰(0)+2/u) [uฯ‰(1)]2 ฯ€(u) + ฯ‰(1)+u ฮบ1 (pโˆ— ,u)[u+ฯ‰(1)]2 27 . (4.35) After routine computations we come to the following equality [uฯ‰(1)]2 ฯ€(u) uฯ‰(1)(1/ฯ‰(1) โˆ’ 1/ฯ‰(0) + 2/u) + ฯ‰(1) + u ฮบ1 (pโˆ— , u)[u + ฯ‰(1)]2   2uฯ‰(1)pโˆ— Y โˆ’ (X + 1)(y)โˆ’1 + 1/u โ‰ฅ 0. = โˆ’ ฮบ1 (pโˆ— , u)[u + ฯ‰(1)] Hence, P (v2 ) โ‰ค 1 for all n large enough, which together with (4.30) allows us to assert (4.27) in the considered case. e = v โˆง v3 . 30 c3. Consider the case ฮบ1 (pโˆ— , u) < 0, Y < [X + 1]yโˆ’1 โˆ’ 1/u. Here v If ฯ€(u) โ‰ค 0 the required result follows from (4.32). If ฯ€(u) > 0 then by (4.31) P (ยท) is strictly increasing and, therefore,   P v โˆง v3 โ‰ค P v3 = 1 in view of (4.33). This completes the proof (4.27). p Finally to conclude in the case 30 c, choosing a โ‰ค 1/S1 , we deduce from (4.26) and (4.27) that for all n large enough  โˆš Gn ~ h(v, u) โ‰ค S1 aav โ‰ค av, v โˆˆ Iu (1). 4.3. Proof of Proposition 3 In view of Lemma 5 in Lepski (2015), if ฯ„ (pโˆ— ) > 0 then   ~ L ~ โІ N~q,d ~ฮณ , c2 L ~ , N~r,d ฮฒ, (4.36) ~ Note also that ฮณj โ‰ค ฮฒj for any j = 1, . . . , d. where c2 is independent on L.     ~ ~r or ~ฮณ , ~q and without further mentioning the couple ~ฮณ , ~q is used 10 . Let ~ฯ€ , ~s be either ฮฒ, below under the condition ฯ„ (pโˆ— ) > 0. We obviously have for any ~h โˆˆ H Z    Kโ„“ (u) f x + uhej โˆ’ f (x) ฮฝ1 (du) bh,f,j (x) := sup hโˆˆH: hโ‰คh = sup hโˆˆH: hโ‰คh For j = 1, . . . , d we have Z R R   Kโ„“ (u) โˆ†uh,j f (x) ฮฝ1 (du) . Z X โ„“    โ„“ 1  u  โˆ†hu,j f (x) ฮฝ1 (du) Kโ„“ (u)โˆ†uh,j f (x)ฮฝ1 (du) = (โˆ’1)i+1 Kโ„“ i i R i=1 i R Z Z โ„“   X     โ„“ = (โˆ’1)โ„“โˆ’1 Kโ„“ (z) (โˆ’1)i+โ„“ โˆ†izh,j f (x) ฮฝ1 (dz) = (โˆ’1)โ„“โˆ’1 Kโ„“ (z) โˆ†โ„“zh,j f (x) ฮฝ1 (dz). i R R Z i=1 The last equality follows from the definition of the โ„“-th order difference operator (2.4). Hence, for any j โˆˆ Jโˆž we have in view of the definition of the Nikolโ€™skii class (remind that ฮณj = ฮฒj , j โˆˆ Jโˆž ) 28 kbh,f,j kโˆž โ‰ค sup Z hโˆˆH: hโ‰คh R Kโ„“ (z) This yields for any h โˆˆ H โˆ†โ„“zh,j f (ยท) ฮฝ (dz) โˆž 1 โ‰ค Lj sup hโˆˆH: hโ‰คh ฯ€ hj j Z R Kโ„“ (z) |z|ฯ€j ฮฝ1 (dz).  (h) โ‰ค c1 Lj hฯ€j , B (4.37) ~L ~ j,โˆž,N~r,d ฮฒ, and the first and the second assertions of the proposition are proved for any j โˆˆ Jโˆž . Let j โˆˆ Jยฏโˆž . Choosing k from the relation ek = h (recall that h โˆˆ H), we have for any x โˆˆ Rd Z Z  โ„“    bh,f,j (x) = sup Kโ„“ (z) โˆ†zek ,j f (x) ฮฝ1 (dz) =: lim sup Kโ„“ (z) โˆ†โ„“zek ,j f (x) ฮฝ1 (dz) . kโ‰คk lโ†’โˆ’โˆž lโ‰คkโ‰คk R R We have in view of monotone convergence theorem and the triangle inequality Z   Kโ„“ (z) โˆ†โ„“zek ,j f (ยท) ฮฝ1 (dz) bh,f,j s = lim sup j lโ†’โˆ’โˆž lโ‰คkโ‰คk โ‰ค k X k=โˆ’โˆž Z R R sj   Kโ„“ (z) โˆ†โ„“zek ,j f (ยท) ฮฝ1 (dz) . sj By the Minkowski inequality for integrals [see, e.g., (Folland 1999, Section 6.3)], we obtain bv,f,j sj โ‰ค Z k X k=โˆ’โˆž R |Kโ„“ (z)| โˆ†โ„“zek ,j f sj ฮฝ1 (dz), j = 1, . . . , d.  ~ L ~ and (4.36), we have for any j = 1, . . . , d, Taking into account that f โˆˆ N~r,d ฮฒ, bh,f,j sj โ‰ค Z  k X ekฯ€j โ‰ค c1 Lj hฯ€j , |Kโ„“ (z)| |z| ฮฝ1 (dz) Lj ฮฒj R k=โˆ’โˆž โˆ€h โˆˆ Hd . This proves the first and the second assertions of the proposition for any j โˆˆ Jยฏโˆž .  ~ L ~ and recall that 20 . Set F = N~r,d ฮฒ, Z X X    โˆ— Kโ„“ (u) f x + uhej โˆ’ f (x) ฮฝ1 (du) Bj,sj ,F (h) := sup โ‰ค sup f โˆˆF hโˆˆH: hโ‰คh R sj f โˆˆF hโˆˆH: hโ‰คh (4.38) bh,f,j sj Hence, the third assertion follows from (4.37) and (4.38). 5. Appendix 5.1. Proof of Lemma 1 Note that z(ฮฑ) + ฯ‰(ฮฑ)/s = ฯ‰(ฮฑ)(2 + 1/ฮฒ(ฮฑ))ฮฒ(0)ฯ„ (pโˆ— ) + 1 โˆ’ ฯ‰(ฮฑ)(2 + 1/ฮฒ(ฮฑ))(pโˆ— )โˆ’1 + ฯ‰(ฮฑ)/s = ฯ‰(ฮฑ)(2 + 1/ฮฒ(ฮฑ))ฮฒ(0)ฯ„ (pโˆ— ) โˆ’ (pโˆ— )โˆ’1 (1 + ฯ‰(ฮฑ)/s)ฮบฮฑ (pโˆ— , s), 29 . and (3.20) follows. On the other hand we have  z(ฮฑ)/ฯ‰(ฮฑ) โˆ’ 1 + 2/u = 2 + 2X ฮฒ(0)ฯ„ (โˆž) + 2Y + 2/u and (3.21) is checked if ฯ„ (โˆž) โ‰ฅ 0 since X, Y โ‰ฅ 0. If ฯ„ (โˆž) < 0 and ฯ„ (pโˆ— ) > 0 then we note first that necessarily uโˆ— > pโˆ— since ฯ„ (uโˆ— ) = 0 and ฯ„ (ยท) is strictly decreasing. Hence y = uโˆ— and   z(ฮฑ)/ฯ‰(ฮฑ) โˆ’ 1 + 2/u = 2 + 2X ฮฒ(0)ฯ„ (โˆž) + 2Y + 2/u = 2 Y โˆ’ (X + 1)yโˆ’1 + 1/u โ‰ฅ 0 and (3.21) is established. Let us prove (3.22). First we note that (3.22) is obvious if ฯ„ (โˆž) โ‰ฅ 0 because in this case ฯ„ (s) > 0 for any s โ‰ฅ 1. Thus, from now on we will assume that ฯ„ (โˆž) < 0. Next, if uโˆ— > pโˆ— then (3.22) holds. Indeed, in this case 0 < Y โˆ’ [X + 1]yโˆ’1 = Y โˆ’ [X + 1](uโˆ— )โˆ’1 implies uโˆ— > (X + 1)/Y . Hence any number from the interval pโˆ— โˆจ (X + 1)/Y, uโˆ— satisfies (3.22). At last, note that if pโˆ— โ‰ฅ uโˆ— we have 0โ‰ค ฮบฮฑ (pโˆ— , โˆž) ฯ‰(ฮฑ) = 2 + 2X โˆ’ 2pโˆ— Y + 1/ฮฒ(0) โˆ’ pโˆ— /ฯ‰(0)   = 2y (1 + X)yโˆ’1 โˆ’ Y + 1/ฮฒ(0) โˆ’ pโˆ— /ฯ‰(0) < 0, since 1/ฮฒ(0) โ‰ค pโˆ— /ฯ‰(0) in view of rj โ‰ค pโˆ— for any j = 1, . . . , d. The obtained contradiction completes the proof of (3.22). 5.2. Proof of Lemma 2 Indeed, 1/ฮณ(ฮฑ) โˆ’ 1/ฮฒ(ฮฑ) = 1/ฮณยฑ (ฮฑ) โˆ’ 1/ฮฒยฑ (ฮฑ) = X 1 + 2ยตj (ฮฑ)   ฯ„ (rj )/ฯ„ (pยฑ ) โˆ’ 1 ฮฒj jโˆˆJยฑ  โˆ’1 X 1 + 2ยตj (ฮฑ)  โˆ’1   = ฮฒ(0)ฯ„ (pยฑ ) (1/rj โˆ’ 1/pยฑ ) = ฯ„ (pยฑ )ฮฒ(0) 1/ฯ‰(ฮฑ) โˆ’ 1/(ฮฒยฑ (ฮฑ)pยฑ ) . ฮฒj jโˆˆJยฑ Moreover, in view of the latter inequality 1/ฯ‰(ฮฑ) โˆ’ 1/ฯ…(ฮฑ) = 1/ฯ‰(ฮฑ) โˆ’ 1/(pยฑ ฮณยฑ (ฮฑ))  โˆ’1   = 1/ฯ‰(ฮฑ) โˆ’ 1/(pยฑ ฮฒยฑ (ฮฑ)) โˆ’ ฯ„ (pยฑ )ฮฒ(0)pยฑ 1/ฯ‰(ฮฑ) โˆ’ 1/(ฮฒยฑ (ฮฑ)pยฑ )   โˆ’1   = 1 โˆ’ ฯ„ (pยฑ )ฮฒ(0)pยฑ 1/ฯ‰(ฮฑ) โˆ’ 1/(ฮฒยฑ (ฮฑ)pยฑ ) .  โˆ’1 It remains to note that 1 โˆ’ ฯ„ (pยฑ )ฮฒ(0)pยฑ = ฯ„ (โˆž)/ฯ„ (pยฑ ) and the lemma follows. References Akakpo, N. (2012). Adaptation to anisotropy and inhomogeneity via dyadic piecewise polynomial selection. Math. Methods Statist. 21, 1โ€“28. 30 Birgeฬ, L. (2008). Model selection for density estimation with L2 โ€“loss. arXiv:0808.1416v2, http://arxiv.org Comte, F., Rozenholc, Y. and Taupin, M.-L. (2006). Penalized contrast estimator for adaptive density deconvolution. Canad. J. Statist., 34, 3, 431โ€“452. Comte, F. and Lacour, C. (2013). Anisotropic adaptive kernel deconvolution. Ann. Inst. H. Poincareฬ Probab. Statist. 49, 2, 569โ€“609. Fan, J. (1991). On the optimal rates of convergence for nonparametric deconvolution problems. Ann. Statist., 19, 3, 1257โ€“1272. Fan, J. (1993). Adaptively local one-dimensional subproblems with application to a deconvolution problem. Ann. Statist., 21, 2, 600โ€“610. Fan, J. and Koo, J. (2002). Wavelet deconvolution. IEEE Trans. Inform. Theory, 48, 734โ€“747. Devroye, L. and Lugosi, G. (1997). Nonasymptotic universal smoothing factors, kernel complexity and Yatracos classes. Ann. Statist. 25, 2626โ€“2637. Donoho, D. L., Johnstone, I. M., Kerkyacharian, G. and Picard, D. (1996). Density estimation by wavelet thresholding. Ann. Statist. 24, 508โ€“539. Efroimovich, S. Yu. (1986). Non-parametric estimation of the density with unknown smoothness. Theory Probab. Appl. 30, 557โ€“568. Folland, G. B. (1999). Real Analysis. Second edition. Wiley, New York. Gach, D., Nickl, R., and Spokoiny, V. (2013). Spatially adaptive density estimation by localised Haar projections. Ann. Inst. H.Poincareฬ (Probab-Stat) 49, 900โ€“914. Gineฬ E. and Nickl, R. (2009). An exponential inequality for the distribution function of the kernel density estimator, with application to adaptive estimation. Probab. Theory and Related Fields 143, 569โ€“596. Goldenshluger, A. and Lepski, O.V. (2011). Bandwidth selection in kernel density estimation: oracle inequalities and adaptive minimax optimality. Ann. Statist. 39, 1608โ€“1632. Goldenshluger, A. and Lepski, O.V. (2014). On adaptive minimax density estimation on Rd . Probab. Theory Related Fields, 159, 479โ€“543. Golubev, G.K. (1992). Non-parametric estimation of smooth probability densities. Probl. Inform. Transm. 1, 52โ€“62. de Guzman, M. (1975). Differentiation of Integrals in Rn . With appendices by Antonio Crdoba, and Robert Fefferman, and two by Roberto Moriyn. Lecture Notes in Mathematics, Vol. 481. Springer-Verlag, Berlin-New York. Hall, P. and Meister, A. (2007). A ridge-parameter approach to deconvolution. Ann. Statist., 35, 4, 1535โ€“1558. Hasminskii, R. and Ibragimov, I. (1990). On density estimation in the view of Kolmogorovโ€™s ideas in approximation theory. Ann. Statist. 18, 999โ€“1010. Hesse, C. H. (1995). Deconvolving a density from partially contaminated observations. Journal of Multivariate Analysis 55, 246โ€“260. Juditsky, A. and Lambertโ€“Lacroix, S. (2004). On minimax density estimation on R. Bernoulli 10, 187โ€“220. Kerkyacharian, G., Lepski, O. and Picard, D. (2001). Nonlinear estimation in anisotropic multiโ€“index denoising. Probab. Theory Related Fields 121, 137โ€“170. Kerkyacharian, G., Thanh, M. and Picard, D. (2011). Localized spherical deconvilution. Ann. Statist. 39, 2, 1042โ€“1068. Lepski, O.V. (2013). Multivariate density estimation under sup-norm loss: oracle approach, adaptation and independence structure. Ann. Statist. 41, 2, 1005โ€“1034. 31 Lepski, O.V. (2015). Adaptive estimation over anisotropic functional classes via oracle approach. Ann. Statist. 43, 3, 1178โ€“1242. Lepski, O.V., and Willer T. (2017). Lower bounds in the convolution structure density model. Bernoulli, 23, 2, 884-926. Lepski, O.V., and Willer T. (2016). Estimation in the convolution structure density model. Part I: oracle inequalities. Annals of Statist., submitted. Lepski, O.V. (2017). A new approach to estimator selection. Bernoulli, to appear. arXiv:1603.03934v1, http://arxiv.org. Lounici, K. and Nickl, R. (2011). Global uniform risk bounds for wavelet deconvolution estimators. Ann. Statist. 39, 2, 201โ€“231. Masry, E. (1993). Strong consistency and rates for deconvolution of multivariate densities of stationary processes. Stochastic processes and their applications, 47, 1, 53โ€“74. Meister, A. (2009). Deconvolution problems in nonparametric statistics, 193, Lecture Notes in Statistics. Springer-Verlag, Berlin. Nikolโ€™skii, S. M. (1977). Priblizhenie Funktsii Mnogikh Peremennykh i Teoremy Vlozheniya. (in Russian). [Approximation of functions of several variables and imbedding theorems.] Second edition, revised and supplemented. Nauka, Moscow. Pensky, M. and Vidakovic, B. (1999) Adaptive wavelet estimator for nonparametric density deconvolution. Ann. Statist., 27, 6, 2033โ€“2053. Rebelles, G. (2016) Structural adaptive deconvolution under Lp -losses. Math. Methods Statist. 25, 1, 26-53. Reynaud-Bouret, P., Rivoirard, V. and Tuleau-Malot, C. (2011). Adaptive density estimation: a curse of support? J. Statist. Plann. Inference 141, 115-139. Rigollet, P. (2006). Adaptive density estimation using the blockwise Stein method. Bernoulli 12, 351โ€“370. Rigollet, P. and Tsybakov, A. B. (2007). Linear and convex aggregation of density estimators. Math. Methods Statist. 16, 260โ€“280. Samarov, A. and Tsybakov, A. (2007). Aggregation of density estimators and dimension reduction. Advances in Statistical Modeling and Inference, 233โ€“251, Ser. Biostat., 3, World Sci. Publ., Hackensack, NJ. Stefanski, L. A. (1990). Rates of convergence of some estimators in a class of deconvolution problems. Statist. Probab. Lett., 9, 229โ€“235. Stefanski, L. A. and Carroll, R.J.(1990). Deconvoluting kernel density estimators. Statistics, 21, 1696-184. Yuana, M. and Chenb, J. (2002). Deconvolving multidimensional density from partially contaminated observations. Journal of Statistical Planning and Inference. 104, 147โ€“160. 32
10math.ST
D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA arXiv:1502.05990v5 [math.ST] 8 Nov 2017 Jie Yang1 , Liping Tong2 and Abhyuday Mandal3 1 University of Illinois at Chicago, 2 Advocate Health Care and 3 University of Georgia Abstract: Cumulative link models have been widely used for ordered categorical responses. Uniform allocation of experimental units is commonly used in practice, but often suffers from a lack of efficiency. We consider D-optimal designs with ordered categorical responses and cumulative link models. For a predetermined set of design points, we derive the necessary and sufficient conditions for an allocation to be locally D-optimal and develop efficient algorithms for obtaining approximate and exact designs. We prove that the number of support points in a minimally supported design only depends on the number of predictors, which can be much less than the number of parameters in the model. We show that a D-optimal minimally supported allocation in this case is usually not uniform on its support points. In addition, we provide EW D-optimal designs as a highly efficient surrogate to Bayesian D-optimal designs. Both of them can be much more robust than uniform designs. Key words and phrases: Approximate design, exact design, multinomial response, cumulative link model, minimally supported design, ordinal data. 1. Introduction In this paper we determine optimal and efficient designs for factorial experiments with qualitative factors and ordered categorical responses, or simply ordinal data. Design of experiment with multinomial response, and ordered categories in particular, is becoming increasingly popular in a rich variety of scientific disciplines, especially when human evaluations are involved (Christensen (2015)). Examples include a wine bitterness study (Randall (1989)), potato pathogen experiments (Omer et al. (2000)), a radish seedlingโ€™s damping-off study (Krause et al. (2001)), a polysilicon deposition study (Wu (2008)), beef cattle research (Osterstock et al. (2010)), and a toxicity study (Agresti (2013)). This research is motivated by an odor removal study conducted by the textile engineers at the University of Georgia. The scientists studied the manufacture of bio-plastics containing odorous volatiles, that need to be removed before commercialization. For that purpose, a 22 factorial experiment was conducted using algae and synthetic plastic resin blends. The factors were types of algae (x1 : raffinated or solvent extracted algae (โˆ’), catfish pond algae (+)) and synthetic resins (x2 : polyethylene (โˆ’), 2 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL polypropylene (+)). The response Y had three ordered categories: serious odor (j = 1), medium odor (j = 2), and almost no odor (j = 3). Following traditional factorial design theory, a pilot study with equal numbers (10 in this case) of replicates at each experimental setting was conducted, a uniform design. The results are summarized in Table 1, where yij represents the number of responses falling into the jth category under the ith experimental setting. As demonstrated later (Section 4), the best design identified by our research could improve the efficiency by 25% with only three experimental settings involved. Table 1: Pilot Study of Odor Removal Study Experimental setting i 1 2 3 4 Factor Algae x1 + + โˆ’ โˆ’ level Resin x2 + โˆ’ + โˆ’ Summarized responses (Y , odor) Serious Medium No odor yi1 yi2 yi3 2 6 2 7 2 1 0 0 10 0 2 8 For such kind of ordinal response Y with J categories and d predictors x = (x1 , . . . , xd )T , the most popular model in practice was first the proportional odds model (also known as cumulative logit model, see Liu and Agresti (2005) for a detailed review). McCullagh (1980) extended it to the cumulative link model (also known as ordinal regression model) g (P (Y โ‰ค j | x)) = ฮธj โˆ’ ฮฒ T x, j = 1, . . . , J โˆ’ 1 (1.1) where g is a general link function, with the proportional odds model as a special case when g is the logit link. Examples include the complementary log-log link for the polysilicon deposition study (see Example 6) and the cauchit link for the toxicity study (see Example 9). We adopt the cumulative link model (1.1). When there are only two categories (J = 2), the cumulative link model (1.1) is essentially a generalized linear model for binary data (McCullagh and Nelder (1989); Dobson and Barnett (2008)). For optimal designs under generalized linear models, there is a growing body of literature (see Khuri et al. (2006), Atkinson et al. (2007), Stufken and Yang (2012), and references therein). In this case, it is known that the minimum number of experimental settings required by a nondegenerate Fisher information matrix is d + 1, which equals the number of parameters (Fedorov (1972); 2 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 3 Yang and Mandal (2015)). A design with the least number of experimental settings, known as a minimally supported design, is of practical significance with a specified regression model due to the cost of changing settings. It is also known that the experimental units should be uniformly assigned when a minimally supported design is adopted for binary response, or under a univariate generalized linear model (Yang and Mandal (2015)). When J โ‰ฅ 3, the cumulative link model is a special case of the multivariate generalized linear model (McCullagh (1980)). The relevant results in the optimal design literature are meagre and restricted to the logit link function (Zocchi and Atkinson (1999); Perevozskaya et al. (2003)). Here we obtain theoretical results and efficient algorithms for general link functions and reveal that the optimal designs with J โ‰ฅ 3 are quite different from the cases with J = 2. We prove that the minimum number of experimental settings is still d + 1, but strictly less than the number of parameters d + J โˆ’ 1 (Theorems 3 and 4). This counter-intuitive result is due to the multinomial-type responses: from a single experimental setup, the summarized responses have J โˆ’ 1 degrees of freedom, requiring fewer distinct experimental settings in a minimally supported design. For the same reason, the allocation of replicates in a minimally supported design is usually not uniform (Section 5), which differs from the traditional factorial design theory. As with generalized linear models, the information matrix under cumulative link models depends on unknown parameters. Different approaches have been proposed to solve the dependence of optimal designs on unknown parameters, including local optimality (Chernoff (1953)), Bayesian approach (Chaloner and Verdinelli (1995)), a maximin approach (Pronzato and Walter (1988); Imhof (2001)), and a sequential procedure (Ford et al. (1989)). As pointed out by Ford, Torsney, and Wu (1992), locally optimal designs are not only important when good initial parameters are available from previous experiments, but can also be a benchmark for designs chosen to satisfy experimental constraints. We mainly focus on locally optimal designs. For situations where local values of the parameters are difficult to obtain, but the experimenter has an idea of the range of parameters with or without a prior distribution, we recommend EW optimal designs, where the Fisher information matrix is replaced by its expected values (Atkinson et al. (2007); Yang, Mandal, and Majumdar (2016)). We compare Bayesian Doptimal designs (Chaloner and Verdinelli (1995)) with EW D-optimal designs for ordinal data. As a surrogate for Bayesian designs, an EW design is much easier to find and retains high efficiency with respect to Bayesian criterion (Section 6). 3 4 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL Among various optimal design criteria, D-optimality, which maximizes the determinant of Fisher information matrix, is the most frequently used (Zocchi and Atkinson (1999)) and often performs well according to other criteria (Atkinson et al. (2007)). We study D-optimal designs. In the design literature, one type of experiment deals with quantitative or continuous factors only. Such a design problem includes the identification of a set of design points {xi }i=1,...,m and the corresponding weights {pi }i=1,...,m (see, for example, Atkinson et al. (2007) and Stufken and Yang (2012)). Numerical algorithms are typically used for cases with two or more factors (see, for example, Woods et al. (2006)). Another type of experiment employs qualitative or discrete factors, where the set of design points {xi }i=1,...,m is predetermined and only the weights {pi }i=1,...,m are to be optimized (see, for example, Yang and Mandal (2015)). One can pick grid points of continuous factors and turn the first kind of problem into the second. Tong, Volkmer, and Yang (2014, Section 5) also bridged the gap between the two types of problems in a way that results involving discrete factors can be applied to the cases with continuous factors. We concentrate on the second kind of design problems and assume that {xi }i=1,...,m are given and fixed. This paper is organized as follows. In Section 2, we describe the preliminary setup and obtain the Fisher information matrix for the cumulative link model with a general link, generalizing Perevozskaya et al. (2003). We also identify a necessary and sufficient condition for the Fisher information matrix to be positive definite, which determines the minimum number of experimental settings required. In Sections 3 and 4, we provide theoretical results and numerical algorithms for searching locally D-optimal approximate or exact designs. In Section 5, we identify analytic D-optimal designs for special cases to illustrate that a D-optimal minimally supported design is usually not uniform on its support points. In Section 6, we illustrate by examples that the EW D-optimal design can be highly efficient with respect to Bayesian D-optimality. We make concluding remarks in Section 7 and relegate additional proofs and results to the supplementary materials. 2. Fisher Information Matrix and Its Determinant Suppose there are m (m โ‰ฅ 2) predetermined experimental settings. For the ith experimental setting with corresponding predictors xi = (xi1 , . . . , xid )T โˆˆ Rd (d โ‰ฅ 1), there are ni experimental units assigned to it. Among the ni experimental units, the kth one generates a response Vik which belongs to one of J (J โ‰ฅ 2) ordered categories. As shown in Example 2, the dimension d of the predictors can be significantly larger than the number of factors considered in the experiment, which allows more flexible models. 4 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 5 2.1 General setup In many applications, Vi1 , . . . , Vini are regarded as i.i.d. discrete random variables. Let ฯ€ij = P (Vik = j), where i = 1, . . . , m; j = 1, . . . , J; and k = 1, . . . , ni . Let Yij = #{k | Vik = j} be the number of Vik โ€™s falling into the jth category. Then (Yi1 , . . . , YiJ ) โˆผ Multinomial(ni ; ฯ€i1 , . . . , ฯ€iJ ) . Assumption 1. 0 < ฯ€ij < 1, i = 1, . . . , m; j = 1, . . . , J. Let ฮณij = P (Vik โ‰ค j) = ฯ€i1 + ยท ยท ยท + ฯ€ij , j = 1, . . . , J. Based on Assumption 1, 0 < ฮณi1 < ฮณi2 < ยท ยท ยท < ฮณi,Jโˆ’1 < ฮณiJ = 1 for each i = 1, . . . , m. Consider independent multinomial observations (Yi1 , . . . , YiJ ), i = 1, . . . , m with corresponding predictors x1 , . . . , xm . Under a cumulative link model or ordinal regression model (McCullagh (1980); Agresti (2013); Christensen (2015)), there exists a link function g and parameters of interest ฮธ1 , . . . , ฮธJโˆ’1 , ฮฒ = (ฮฒ1 , . . . , ฮฒd )T , such that g(ฮณij ) = ฮธj โˆ’ xTi ฮฒ, j = 1, . . . , J โˆ’ 1. (2.1) This leads to m(J โˆ’1) equations in d + J โˆ’1 parameters (ฮฒ1 , . . . , ฮฒd , ฮธ1 , . . . , ฮธJโˆ’1 ). Assumption 2. The link g is differentiable and its derivative g โ€ฒ > 0. Assumption 2 is satisfied for commonly used link functions including logit (log(ฮณ/(1 โˆ’ ฮณ)), probit (ฮฆโˆ’1 (ฮณ)), log-log (โˆ’ log(โˆ’ log(ฮณ))), complementary log-log (log(โˆ’ log(1โˆ’ฮณ))), and cauchit (tan(ฯ€(ฮณโˆ’1/2))) (McCullagh and Nelder (1989); Christensen (2015)). Some relevant formulas of these link functions are provided in the supplementary materials (Section S.1). According to Assumption 2, g is strictly increasing, and then ฮธ1 < ฮธ2 < ยท ยท ยท < ฮธJโˆ’1 . Example 1. Consider the logit link g(ฮณ) = log(ฮณ/(1 โˆ’ ฮณ)) with two predictors and three ordered categories. Model (2.1) consists of 2m equations g(ฮณij ) = ฮธj โˆ’ xi1 ฮฒ1 โˆ’ xi2 ฮฒ2 , i = 1, . . . , m; j = 1, 2 and parameters (ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 ). Under Assumptions 1 and 2, ฮธ1 < ฮธ2 .  Example 2. Suppose the model consists of three covariates x1 , x2 , x3 and a few second-order predictors, g(ฮณij ) = ฮธj โˆ’ xi1 ฮฒ1 โˆ’ xi2 ฮฒ2 โˆ’ xi3 ฮฒ3 โˆ’ xi1 xi2 ฮฒ12 โˆ’ x2i1 ฮฒ11 โˆ’ x2i2 ฮฒ22 , where i = 1, . . . , m; j = 1, . . . , J โˆ’ 1. Then the number of predictors is d = 6.  Under the cumulative link model (2.1), the log-likelihood function (up P PJ to a constant) is l(ฮฒ1 , . . . , ฮฒd , ฮธ1 , . . . , ฮธJโˆ’1 ) = m j=1 Yij log(ฯ€ij ), where i=1 5 6 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL ฯ€ij = ฮณij โˆ’ ฮณi,jโˆ’1 with ฮณij = g โˆ’1 (ฮธj โˆ’ xTi ฮฒ) for j = 1, . . . , J โˆ’ 1 and ฮณi0 = 0, ฮณiJ = 1. Perevozskaya et al. (2003) obtained a detailed form of the Fisher information matrix for logit link and one predictor. Our result is for general link and d predictors; its proof is relegated to the supplementary materials (Section S.3). Theorem 1. Under Assumptions 1 and 2, the Fisher information matrix can be written as m X F= ni Ai (2.2) i=1 where Ai is the (d + J โˆ’ 1) ร— (d + J โˆ’ 1) matrix     Ai1 Ai2 (ei xis xit )s=1,...d;t=1,...,d (โˆ’xis cit )s=1,...,d;t=1,...,Jโˆ’1 = ATi2 Ai3 (โˆ’cis xit )s=1,...,Jโˆ’1;t=1,...,d Ai3 and Ai3 is the (J โˆ’ 1) ร— (J โˆ’ 1) symmetric tri-diagonal matrix with diagonal entries ui1 , . . . , ui,Jโˆ’1, and off-diagonal entries โˆ’bi2 , . . . , โˆ’bi,Jโˆ’1 when J โ‰ฅ P 3, where ei = Jj=1 ฯ€ijโˆ’1 (gij โˆ’gi,jโˆ’1 )2 > 0 with gij = (g โˆ’1 )โ€ฒ (ฮธj โˆ’xTi ฮฒ) > 0 for โˆ’1 j = 1, . . . , J โˆ’ 1 and gi0 = giJ = 0; cit = git [ฯ€itโˆ’1 (git โˆ’ gi,tโˆ’1 ) โˆ’ ฯ€i,t+1 (gi,t+1 โˆ’ โˆ’1 โˆ’1 โˆ’1 2 git )]; uit = git (ฯ€it + ฯ€i,t+1 ) > 0; and bit = gi,tโˆ’1 git ฯ€it > 0. Ai3 contains only one entry ui1 when J = 2. As the Fisher information matrix, F is always positive semi-definite, |F| โ‰ฅ 0 (Fedorov (1972)). As a special case, Ai is the Fisher information at the experimental setting xi (also known as a design point or support point) and thus is positive semi-definite. 2.2 Determinant of Fisher information matrix Among different criteria for optimal designs, D-criterion looks for the allocation maximizing |F|, the determinant of F. Here, a D-optimal design with m predetermined design points x1 , . . . , xm could either be an integerPm valued allocation (n1 , n2 , . . . , nm ) maximizing |F| with fixed n = i=1 ni > 0, known as an exact design; or a real-valuedPallocation (p1 , p2 , . . . , pm ) m maximizing |nโˆ’1 F| with pi = ni /n โ‰ฅ 0 and i=1 pi = 1, known as an approximate design. Theorem 2. The determinant of the Fisher information matrix, X cฮฑ1 ,...,ฮฑm ยท nฮฑ1 1 ยท ยท ยท nฮฑmm , |F| = ฮฑ1 +ยทยทยท+ฮฑm =d+Jโˆ’1 6 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 7 is an order-(d + J โˆ’ 1) homogeneous polynomial of (n1 , . . . , nm ) and X |Aฯ„ | . (2.3) cฮฑ1 ,...,ฮฑm = ฯ„ โˆˆ(ฮฑ1 ,...,ฮฑm ) The proof of Theorem 2 is relegated to the supplementary materials (Section S.3). Given a map ฯ„ : {1, 2, . . . , d + J โˆ’ 1} โ†’ {1, . . . , m}, Aฯ„ in (2.3) is a (d + J โˆ’ 1) ร— (d + J โˆ’ 1) matrix whose kth row is the same as the kth row of Aฯ„ (k) , k = 1, . . . , d + J โˆ’ 1. We take ฯ„ โˆˆ (ฮฑ1 , . . . , ฮฑm ) where ฮฑi = #{j : ฯ„ (j) = i} for each i = 1, . . . , m. In order to obtain analytic properties of |F|, we need some lemmas. The first of them covers Lemma 1 in Perevozskaya et al. (2003) as a special case: Lemma 1. Rank(Ai ) = Rank(Ai3 ) = J โˆ’ 1. Furthermore, Ai3 is positive definite and J Jโˆ’1 Y Y 2 ฯ€itโˆ’1 > 0 |Ai3 | = gis ยท s=1 โˆ’1 โ€ฒ where gis = (g ) (ฮธs โˆ’ xTi ฮฒ) t=1 > 0 for s = 1, . . . , J โˆ’ 1. Example 3. Suppose d = 2, J = 3, with link function g. According to Theorem 2, |F| is then an order-4 homogeneous polynomial of (n1 , . . . , nm ). Based on Lemma S.4 and Lemma S.5 in the supplementary materials (Section S.2), we can remove all the terms of the form n4i , n3i nj , or n2i n2j from |F|. Therefore, |F| = m X X cijk ยท n2i nj nk + i=1 j<k,j6=i,k6=i X cijkl ยท ni nj nk nl i<j<k<l for some coefficients cijk and cijkl .  Based on Lemmas S.4 and S.5, in order to keep cฮฑ1 ,...,ฮฑm 6= 0, the largest possible ฮฑi is J โˆ’ 1 and the fewest possible number of positive ฮฑi โ€™s is d + 1. Theorem 3. |F| > 0 only if m โ‰ฅ d + 1. To determine whether d + 1 experimental settings or support points are enough to keep the Fisher information matrix positive definite, we study the leading term of |F| with max1โ‰คiโ‰คm ฮฑi = J โˆ’ 1.PFor example, ai0 = J โˆ’ 1 m for some 1 โ‰ค i0 โ‰ค m. From Lemma S.5 and i=1 ฮฑi = d + J โˆ’ 1, to have cฮฑ1 ,...,ฮฑm 6= 0, there must exist 1 โ‰ค i1 < i2 < ยท ยท ยท < id โ‰ค m which are different from i0 , such that, ฮฑi1 = ยท ยท ยท = ฮฑid = 1. A lemma provides an explicit formula for such a coefficient cฮฑ1 ,...,ฮฑm : 7 8 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL Lemma 2. Suppose ฮฑi0 = J โˆ’ 1 and ฮฑi1 = ยท ยท ยท = ฮฑid = 1. Then cฮฑ1 ,...,ฮฑm = d Y eis ยท |Ai0 3 | ยท |X1 [i0 , i1 , . . . , id ]|2 s=1 where X1 = (1 X) is an m ร— (d + 1) matrix with 1 = (1, . . . , 1)T , X = (x1 , . . . , xm )T , and X1 [i0 , i1 , . . . , id ] is the sub-matrix consisting of the i0 th, i1 th, . . . , id th rows of X1 . The proof of Lemma 2 is in the supplementary materials (Section S.3). To find D-optimal allocations, we write |F| = f (n1 , . . . , nm ) for an order(d + J โˆ’ 1) homogeneous polynomial function f . The D-optimal exact design problem is to find an integer-valued allocation (n1 , . . . , nm ) maximizing f (n1 , . . . , nm ) subject to ni โˆˆ {0, 1, . . . , n}, i = 1, . . . , m and n1 + ยท ยท ยท + nm = n with given positive integer n. Denote pi = ni /n, i = 1, . . . , m. According to Theorem 1, f (n1 , . . . , nm ) = m X i=1 ni Ai = n m X pi Ai = nd+Jโˆ’1 f (p1 , . . . , pm ) (2.4) i=1 Due to (2.4), Theorems 2 and 3 can be directly applied to approximate design problems too: find a real-valued allocation (p1 , . . . , pm ) maximizing f (p1 , p2 , . . . , pm ) subject to 0 โ‰ค pi โ‰ค 1, i = 1, . . . , m and p1 + ยท ยท ยท + pm = 1. According to Lemma 1, |Ai0 3 | > 0. Thus cฮฑ1 ,...,ฮฑm in Lemma 2 is positive as long as X1 [i0 , . . . , id ] is of full rank. Theorem 3 implies that a minimally supported design contains at least d + 1 support points, while the following theorem states a necessary and sufficient condition for the minimum number of support points to be exactly d + 1: Theorem 4. f (p) > 0 for some p = (p1 , . . . , pm )T if and only if the extended design matrix X1 = (1 X) is of full rank d + 1. The minimal number of experimental settings required can thus be strictly less than the number of parameters. In the odor removal study, for example, the main-effects cumulative link model (2.1) involves four independent parameters โ€“ two ฮฒโ€™s for the covariates (d = 2) and two ฮธโ€™s for the intercepts (J โˆ’ 1 = 2) โ€“ while a minimally supported design could involve only three experimental settings. For multinomial responses with J = 3 categories, we get two degrees of freedom from each experimental setting. Here the optimal allocation of experimental units is often not uniform (see Section 4), contrary to the case of binary responses (Yang, Mandal, and Majumdar (2016); Yang and Mandal (2015)). 8 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 9 3. D-optimal Approximate Design A (locally) D-optimal approximate design is a real-valued allocation p = (p1 , . . . , pm )T maximizing f (p) = f (p1 , . . . , pm ) with pre-specified values of parameters. The solution always exists since f is continuous and the set of feasible Pm allocations S := {(p1 , . . . , pm )T โˆˆ Rm | pi โ‰ฅ 0, i = 1, . . . , m; i=1 pi = 1} is convex and compact. A nontrivial D-optimal approximate design problem requires an assumption. Assumption 3. m โ‰ฅ d + 1 and Rank(X1 ) = d + 1. Assumption 3 is adopted throughout. With it, the set of valid allocations P S+ := {p = (p1 , . . . , pm )T โˆˆ S | f (p) > 0} is nonempty. Since F = m i=1 ni Ai = Pm n i=1 pi Ai is linear in p and ฯ†(ยท) = log | ยท | is concave on positive semi-definite matrices, f (p) = n1โˆ’dโˆ’J |F| is log-concave (Silvey (1980)) and thus S+ is also convex. Theorem 5. A feasible allocation p = (p1 , . . . , pm )T satisfies f (p) > 0 if and only if Rank(X1 [{i | pi > 0}]) = d + 1, where X1 [{i | pi > 0}] is the sub-matrix consisting of the {i | pi > 0}th rows of X1 . As a direct conclusion of Theorem 5, S+ contains all p whose coordinates are all strictly positive. A special case is the uniform allocation pu = (1/m, . . . , 1/m)T . A necessary and sufficient condition for an approximate design to be Doptimal is of the general-equivalence-theorem type (Kiefer (1974); Pukelsheim (1993); Atkinson et al. (2007); Stufken and Yang (2012); Fedorov and Leonov (2014); Yang, Mandal, and Majumdar (2016)), which is convenient when searching for numerical solutions. Following Yang, Mandal, and Majumdar (2016), for a given p = (p1 , . . . , pm )T โˆˆ S+ and i โˆˆ {1, . . . , m}, we set   1โˆ’z 1โˆ’z 1โˆ’z 1โˆ’z p1 , . . . , piโˆ’1 , z, pi+1 , . . . , pm (3.1) fi (z) = f 1 โˆ’ pi 1 โˆ’ pi 1 โˆ’ pi 1 โˆ’ pi with 0 โ‰ค z โ‰ค 1. Here fi (z) is well defined as long as pi < 1. Theorem 6. Suppose p = (p1 , . . . , pm )T โˆˆ S+ and i โˆˆ {1, . . . , m}. For 0 โ‰ค z โ‰ค 1, Jโˆ’1 X aj z j (1 โˆ’ z)Jโˆ’1โˆ’j (3.2) fi (z) = (1 โˆ’ z)d j=0 tโˆ’1 ) where a0 = fi (0), (aJโˆ’1 , . . . , a1 = Bโˆ’1 s,t=1,...,Jโˆ’1 , and c = Jโˆ’1 c, BJโˆ’1 = (s T d+Jโˆ’1 โˆ’d Jโˆ’1 (c1 , . . . , cJโˆ’1 ) with cj = (j + 1) j fi (1/(j + 1)) โˆ’ j fi (0). )T Following the lift-one algorithm proposed in Yang, Mandal, and Majumdar (2016), we have parallel results and an algorithm for our case. For simplicity, we also call it the lift-one algorithm. 9 10 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL Theorem 7. Given an allocation p = (pโˆ—1 , . . . , pโˆ—m )T โˆˆ S+ , p is D-optimal if and only if for each i = 1, . . . , m, fi (z), 0 โ‰ค z โ‰ค 1 attains it maximum at z = pโˆ—i . A lift-one algorithm 1โ—ฆ Start with an allocation p0 = (p1 , . . . , pm )T satisfying f (p0 ) > 0. 2โ—ฆ Set up a random order of i going through {1, 2, . . . , m}. 3โ—ฆ For each i, determine fi (z) according to Theorem 6, with J determinants fi (0), fi (1/2), fi (1/3), . . . , fi (1/J) calculated according to (3.1). 4โ—ฆ Use the quasi-Newton method with gradient defined in (S.13) to find zโˆ— maximizing fi (z) with 0 โ‰ค z โ‰ค 1. If fi (zโˆ— ) โ‰ค fi (0), let zโˆ— = 0. Take (i) pโˆ— = (p1 (1 โˆ’ zโˆ— )/(1 โˆ’ pi ), . . . , piโˆ’1 (1 โˆ’ zโˆ— )/(1 โˆ’ pi ), zโˆ— , pi+1 (1 โˆ’ zโˆ— )/(1 โˆ’ (i) pi ), . . . , pm (1 โˆ’ zโˆ— )/(1 โˆ’ pi ))T , so f (pโˆ— ) = fi (zโˆ— ). (i) (i) 5โ—ฆ Replace p0 with pโˆ— , and f (p0 ) with f (pโˆ— ). (i) 6โ—ฆ Repeat 2โ—ฆ โˆผ 5โ—ฆ until f (p0 ) = f (pโˆ— ) for each i. Theorem 8. When the lift-one algorithm converges, the resulting p maximizes f (p). Example 4. Odor removal study Here the response was ordinal in nature, serious odor, medium odor, and no odor. We fit the cumulative link model (2.1) to the data presented in Table 1. The estimated values of the model parameters are (ฮฒห†1 , ฮฒห†2 , ฮธห†1 , ฮธห†2 )T = (โˆ’2.44, 1.09, โˆ’2.67, โˆ’0.21)T . If a follow-up experiment is planned and the estimated parameter values are regarded as the true values, the D-optimal approximate allocation found by the lift-one algorithm is po = (0.4449, 0.2871, 0, 0.2680)T . The efficiency of the uniform pu = (1/4, 1/4, 1/4, 1/4)T is (f (pu )/f (po ))1/4 = 79.7%, which is far from satisfactory.  Example 5. Wine bitterness study Christensen (2015, Table 1) aggregated the wine data from Randall (1989). It contains the output of a factorial experiment with two treatment factors each at two levels (Temperature x1 : cold (โˆ’) or warm (+); Contact x2 : no (โˆ’) or yes (+)) affecting wine bitterness. The response was ordinal with five levels (from โ€œ1โ€ being least bitter to โ€œ5โ€ being most bitter). The original design employed a uniform allocation pu = (1/4, 1/4, 1/4, 1/4)T . The estimated parameter values under the logit link are (ฮฒห†1 , ฮฒห†2 , ฮธห†1 , ฮธห†2 , ฮธห†3 , ฮธห†4 )T = (1.25, 0.76, โˆ’3.36, โˆ’0.76, 1.45, 2.99)T . If a follow-up experiment is planned regarding the estimated values of the parameters as the true values, then the D-optimal approximate allocation found by the lift-one algorithm is po = (0.2694, 0.2643, 0.2333, 0.2330)T . The efficiency of the original 10 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 11 design pu is 99.9%. Nevertheless, the corresponding efficiency may drop to 80% if |ฮฒ1 | and |ฮฒ2 | are both larger than 3 (see Figure 1(a)). In that case, the D-optimal allocations are minimally supported, see Figure 1(b); this is discussed further in Section 5.  (b) 4 4 (a) 0.8 0.8 p1=0 2 2 0.85 0.95 0.99 0.99 0.99 0.99 0.95 p1>0, p2>0, p3>0, p4>0 โˆ’2 0.9 โˆ’2 0.85 0.95 0 0 0.95 ฮฒ2 0.85 ฮฒ2 p3=0 0.9 0.9 0.9 โˆ’4 โˆ’4 โˆ’4 0.85 0.8 0.8 โˆ’2 0 2 4 p4=0 โˆ’4 ฮฒ1 p2=0 โˆ’2 0 2 4 ฮฒ1 Figure 1: Wine bitterness study with assumed true parameter values (ฮฒ1 , ฮฒ2 , โˆ’3.36, โˆ’0.76, 1.45, 2.99)T : (a) contour plot of efficiency of the original design; (b) regions for a D-optimal design to be minimally supported. In the examples we have studied, the lift-one algorithm often converges within a few iterations. The Yang, Mandal, and Majumdar (2016) lift-one algorithm is guaranteed to converge and can be applied if the lift-one algorithm here does not converge in a pre-specified number of iterations. 4. D-optimal Exact Design In the design literature, different discretization methods have been proposed to round an approximate design into an exact design for a given n, including the quota method (Kiefer (1971); Pukelsheim (1993)) and the efficient rounding procedure (Pukelsheim (1993); Pukelsheim and Rieder (1992)), which usually work well for large enough n but with no guarantee for small sample size (Imhof, Lopez-Fidalgo, and Wong (2001)). In this section, we provide a direct search for D-optimal exact designs. From Theorem 5, we have the result as follows: Corollary 1. |F| > 0 if and only if Rank(X1 [{i | ni > 0}]) = d + 1. We assume n โ‰ฅ d + 1 throughout this section. To maximize f (n) = f (n1 , . . . , nm ) = |F|, we adopt the exchange algorithm idea of Fedorov (1972). It is 11 12 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL used here to adjust ni and nj simultaneously for randomly chosen (i, j), while keeping ni + nj = c as a constant. We start with an n = (n1 , . . . , nm )T satisfying f (n) > 0. Following Yang, Mandal, and Majumdar (2016), for 1 โ‰ค i < j โ‰ค m, let fij (z) = f (n1 , . . . , niโˆ’1 , z, ni+1 , . . . , njโˆ’1 , c โˆ’ z, nj+1 , . . . , nm ) (4.1) where c = ni + nj , z = 0, 1, . . . , c, so fij (ni ) = f (n). From Theorem 2, Lemmas S.4 and S.5, we have the result as follows. Theorem 9. Suppose n = (n1 , . . . , nm )T satisfies f (n) > 0 and ni + nj โ‰ฅ J for given 1 โ‰ค i < j โ‰ค m. For z = 0, 1, . . . , ni + nj , fij (z) = J X cs z s (4.2) s=0 where c0 = fij (0), and c1 , . . . , cJ can be obtained using (c1 , . . . , cJ )T = Bโˆ’1 J (d1 , T tโˆ’1 . . . , dJ ) with BJ = (s )st as a J ร— J matrix and ds = (fij (s) โˆ’ fij (0))/s. The J ร— J matrix BJ in Theorem 9 shares the same form of BJโˆ’1 in Theorem 6. According to Theorem 9, in other to maximize fij (z) with z = 0, 1, . . . , ni + nj , one can obtain the exact polynomial form of fij (z) by calculating fij (0), fij (1), . . . , fij (J). There is no practical need to find out the exact form of fij (z) if ni + nj < J since one can simply calculate fij (z) for each z. Following Yang, Mandal, and Majumdar (2016), an exchange algorithm (see the supplementary materials, Section S.5) based on Theorem 9 could be used to search for a D-optimal exact allocation. Example 4 Odor removal study (continued) To conduct a follow-up experiment with n experimental units using the exchange algorithm, we obtain the D-optimal exact designs across different nโ€™s (Table 2). As expected, the D-optimal exact allocation (n1 , . . . , n4 )T is consistent with the D-optimal approximate allocation po = (p1 , . . . , p4 )T (last row of Table 2) for large n. The time costs in seconds (last column of Table 2) are recorded on a PC with 2GHz CPU and 8GB memory. If we rerun an experiment with n = 40, the D-optimal exact design is no = (18, 11, 0, 11)T , and the efficiency of the uniform design nu = (10, 10, 10, 10)T is (f (nu )/f (no ))1/4 = 79.7%.  Example 6. Polysilicon deposition study Wu (2008) considered an experiment for studying the polysilicon deposition process with six 3-level factors, described in details by Phadke (1989). Due to the inconvenience of counting the number of surface defects, a major evaluating characteristic, they treated it as a 5-category ordinal variable: 1 for 0 โˆผ 3 defects, 2 for 4 โˆผ 30, 3 for 12 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 13 Table 2: D-optimal Exact Designs and the Approximate Design for the Odor Removal Study n 3 10 40 100 1000 po n1 1 4 18 44 445 0.4449 n2 1 3 11 29 287 0.2871 n3 0 0 0 0 0 0 nโˆ’4 |F| 0.0002911 0.0003133 0.0003177 0.0003180 0.0003181 0.0003181 n4 1 3 11 27 268 0.2680 # iterations 1 3 3 4 5 5 Time(sec.) < 0.01 0.02 0.02 0.05 0.39 0.03 31 โˆผ 300, 4 for 301 โˆผ 1000, and 5 for 1001 and more. The original design, denoted by nu , includes 18 experimental settings based on an L18 orthogonal array. To apply a cumulative link model, we represent each 3-level factor, say A, with levels 1, 2, 3, by its linear component A1 taking values โˆ’1, 0, 1 and a quadratic component A2 taking values 1, โˆ’2, 1 (Wu and Hamada (2009)). Then the fitted model with complementary log-log link chosen by both AIC and BIC criteria (see, for example, Agresti (2013)) involves four cut-points (ฮฑห†1 , ฮฑห†2 , ฮฑห†3 , ฮฑห†4 ) = (โˆ’1.59, โˆ’0.58, 0.41, 1.22), and twelve other coefficients (ฮฒห†11 , ฮฒห†12 , ฮฒห†21 , ฮฒห†22 , . . . , ฮฒห†62 ) = (1.45, โˆ’0.22, 1.35, 0.02, โˆ’0.12, โˆ’0.34, 0.19, 0.00, 0.22, 0.08, 0.05, 0.17). When the true parameter values were assumed to be the estimated ones, we used the exchange algorithm to find a D-optimal 18-run design, denoted by no (see the supplementary materials, Section S.6, for a list of the 18 experimental settings). Compared with no , the efficiency of the original design nu is (f (nu )/f (no ))1/16 = 73.1%. In order to check the efficiency of a rounded design, we used the lift-one algorithm to find that the D-optimal approximate design contains 100 positive pi โ€™s out of the 729 distinct experimental settings. In this case, both the quota method and the efficient rounding procedure end with the same rounded design nr (see Section S.6). Its efficiency is (f (nr )/f (no ))1/16 = 86.1%.  5. Minimally Supported Design It is of practical significance to have experiment run with the minimal number of different settings. For example, the 18 experimental settings in the polysilicon deposition study (Example 6) had to be run in a sequential way and only two settings were arranged on each day (Phadke (1989)). Less experimental settings often indicate less time and less cost. Another practical application of a minimally supported design is that an optimal allocation restricted to those support points can be obtained more easily or even analytically. According to Theorem 3, a minimally supported design contains at least d+1 support points. On the other hand, according to Theorem 5 and Corollary 1, a minimally supported design could contain exactly d + 1 support points if the extended design matrix X1 = (1 X) is of full rank. 13 14 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL Example 7. Let J = 2 with a binomial response. There are d + 1 parameters, ฮธ1 , ฮฒ1 , . . . , ฮฒd . For a general link function g satisfying Assumptions 1 and 2, 2 /[ฯ€ (1 โˆ’ ฯ€ )], gi0 = gi2 = 0, gi1 = (gโˆ’1 )โ€ฒ (ฮธ1 โˆ’ xTi ฮฒ) > 0, ei = ui1 = ci1 = gi1 i1 i1 i = 1, . . . , m. Then Ai3 in Theorem 1 contains only the entry ui1 , and thus |Ai3 | = ui1 , or simply ei (Lemma 1 still holds). Assume further that the m ร— d design matrix X satisfies Assumption 3. According to Theorem 2, Lemmas S.4, S.5, and 2, given p = (p1 , . . . , pm )T , X f (p) = nโˆ’(d+1) |F| = |X1 [i0 , i1 , . . . , id ]|2 pi0 ei0 pi1 ei1 ยท ยท ยท pid eid 1โ‰คi0 <i1 <ยทยทยท<id โ‰คm (5.1) Here (5.1) is essentially the same as Lemma 3.1 in Yang and Mandal (2015). Then a minimally supported design can contain d + 1 support points and a Doptimal one keeps equal weight 1/(d+1) on all support points (Yang and Mandal (2015, Theorem 3.2)).  For univariate responses (including binomial ones) under a generalized linear model, a minimally supported design must keep equal weights on all its support points in order to keep D-optimality (Yang and Mandal (2015)). However, for multinomial responses with J โ‰ฅ 3, this is usually not the case. In this section, we use one-predictor (d = 1) and two-predictor (d = 2) cases for illustration. In order to check if a minimally supported design is D-optimal, we need a Karush-Kuhn-Tucker-type condition. Since f (p) is log-concave, the KarushKuhn-Tucker conditions (Karush (1939); Kuhn and Tucker (1951)) are also sufficient. Theorem 10. An allocation p = (pโˆ—1 , . . . , pโˆ—m )T satisfying f (p) > 0 is D-optimal if and only if there exists a ฮป โˆˆ R such that โˆ‚f (p)/โˆ‚pi = ฮป if pโˆ—i > 0 or โ‰ค ฮป if pโˆ—i = 0, i = 1, . . . , m. 5.1 Minimally supported designs with one predictor We start with d = 1 and J โ‰ฅ 3. The corresponding parameters here are ฮฒ1 and ฮธ1 , . . . , ฮธJโˆ’1 . Consider designs supported on two points (m = 2, minimally supported), and invoke Theorem 2, Lemmas S.4 and S.5. Theorem 11. If d = 1, J โ‰ฅ 3, and m = 2, the objective function is f (p1 , p2 ) = nโˆ’2 |F| = Jโˆ’1 X cs pJโˆ’s ps2 1 (5.2) s=1 T tโˆ’1 ) where (c1 , . . . , cJโˆ’1 )T = Bโˆ’1 st as a (J โˆ’ Jโˆ’1 (d1 , . . . , dJโˆ’1 ) , with BJโˆ’1 = (s J 1) ร— (J โˆ’ 1) matrix and ds = f (1/(s + 1), s/(s + 1)) ยท (s + 1) /s. 14 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 15 Q QJ โˆ’1 2 ยท 2 Actually, according to Lemma 2, c1 = e2 Jโˆ’1 g1s s=1 t=1 ฯ€1t (x1 โˆ’ x2 ) , QJโˆ’1 2 QJ โˆ’1 cJโˆ’1 = e1 s=1 g2s ยท t=1 ฯ€2t (x1 โˆ’ x2 )2 , where x1 , x2 are the predictor levels. Theorem 11 provides a way to find the exact form of f (p1 , p2 ) after calculating |F| for J โˆ’ 1 different allocations. Then the D-optimal problem is to maximize an order-J polynomial f (z, 1 โˆ’ z) for z โˆˆ [0, 1]. As a special case, the D-optimal allocation of J = 3 can be solved explicitly as follows: Corollary 2. If d = 1, J = 3, and m = 2, the objective function is f (p1 , p2 ) = p1 p2 (c1 p1 + c2 p2 ) (5.3) 2 g 2 (ฯ€ ฯ€ ฯ€ )โˆ’1 (x โˆ’ x )2 > 0, c = e g 2 g 2 (ฯ€ ฯ€ ฯ€ )โˆ’1 where c1 = e2 g11 1 2 2 1 21 22 21 22 23 12 11 12 13 (x1 โˆ’ x2 )2 > 0, and x1 , x2 are the two levels of the predictor. The D-optimal design p = (pโˆ—1 , pโˆ—2 ) is p c c1 โˆ’ c2 + c21 โˆ’ c1 c2 + c22 โˆ— p p1 , pโˆ—2 = (5.4) p1 = 2 2 2c1 โˆ’ c2 + c1 โˆ’ c1 c2 + c2 2c1 โˆ’ c2 + c21 โˆ’ c1 c2 + c22 Furthermore, pโˆ—1 = pโˆ—2 = 1/2 if and only if c1 = c2 . Under the setup of Corollary 2, pโˆ—1 = pโˆ—2 = 1/2 if ฮฒ1 = 0. In general pโˆ—1 6= pโˆ—2 , and pโˆ—1 > pโˆ—2 if and only if c1 > c2 . The following result provides conditions for D-optimality of such a minimally supported design. Its proof is relegated to the supplementary materials (Section S.3). Corollary 3. Suppose d = 1, J = 3, m โ‰ฅ 3, and let x1 , . . . , xm be the m distinct levels of the predictor. A minimally supported design p = (pโˆ—1 , pโˆ—2 , 0, . . . , 0)T is D-optimal if and only if (1) pโˆ—1 , pโˆ—2 are defined as in (5.4), (2) si3 (pโˆ—1 )2 + (si5 โˆ’ 2c1 )pโˆ—1 pโˆ—2 + (si4 โˆ’ c2 )(pโˆ—2 )2 โ‰ค 0, i = 3, . . . , m, 2 g 2 (ฯ€ ฯ€ ฯ€ )โˆ’1 (x โˆ’ x )2 > 0, where c1 , c2 are as in Corollary 2, si3 = ei g11 1 i 12 11 12 13 โˆ’1 2 2 2 si4 = ei g21 g22 (ฯ€21 ฯ€22 ฯ€23 ) (x2 โˆ’xi ) > 0, si5 = e1 (u22 ui1 + u21 ui2 โˆ’2b22 bi2 )(x1 โˆ’ x2 )(x1 โˆ’ xi ) + e2 (u12 ui1 + u11 ui2 โˆ’ 2b12 bi2 )(x2 โˆ’ x1 )(x2 โˆ’ xi ) + ei (u12 u21 + u11 u22 โˆ’ 2b12 b22 )(xi โˆ’ x1 )(xi โˆ’ x2 ). Example 8. Consider d = 1, J = 3, and m = 3 with factor levels {โˆ’1, 0, 1}. Under the logit link g, the parameters ฮฒ, ฮธ1 , ฮธ2 satisfy g(ฮณ1j ) = ฮธj +ฮฒ, g(ฮณ2j ) = ฮธj , g(ฮณ3j ) = ฮธj โˆ’ ฮฒ, j = 1, 2. We investigate when a D-optimal design is minimally supported. According to Theorem 11, a D-optimal deign satisfies p1 = p3 = 1/2 if ฮฒ = 0. Figure 2 shows cases with more general parameter values. In Figure 2(a), four regions in (ฮธ1 , ฮธ2 )-plane are occupied by minimally supported 15 16 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL (a) ฮฒ=โˆ’2 (b) ฮธ2=5 4 4 p2=0 p3=0 p1>0, p2>0, p3>0 p1=0 2 2 p3=0 0 ฮธ1 0 ฮธ2 p2=0 โˆ’2 โˆ’2 p2=0 p1=0 p1>0, p2>0, p3>0 โˆ’4 โˆ’4 p1>0, p2>0, p3>0 โˆ’4 โˆ’2 0 2 4 โˆ’4 โˆ’2 0 2 4 ฮฒ ฮธ1 Figure 2: Regions for a two-point design to be D-optimal with d = 1, J = 3, x โˆˆ {โˆ’1, 0, 1}, and logit link (note that ฮธ1 < ฮธ2 is required) designs (ฮธ1 < ฮธ2 is required). For example, regions labeled with p2 = 0 indicates a minimally supported design satisfying p2 = 0 is D-optimal given such a triple (ฮธ1 , ฮธ2 , ฮฒ = โˆ’2). From Figure 2(b), a design supported on {โˆ’1, 1} (that is, p2 = 0) is D-optimal if ฮฒ is not far from 0.  Example 9. Toxicity study Agresti (2013, Table 8.7) reported data from a developmental toxicity study with one factor (concentration of diEGdiME at five levels: 0, 62.5, 125, 250, 500 mg/kg per day) and a 3-category ordinal response (status of mouse fetus: nonlive, malformation, or normal). In this case, d = 1, J = 3, and m = 5. We fit a cumulative link model with cauchit link chosen by both AIC and BIC criteria. The estimated parameter values are (ฮฒห†1 , ฮธห†1 , ฮธห†2 )T = (โˆ’0.0176, โˆ’8.80, โˆ’5.34). If (ฮฒห†1 , ฮธห†1 , ฮธห†2 )T is regarded as the true parameter value, then the D-optimal approximate allocation found by the lift-one algorithm is po = (0, 0, 0, 0.4285, 0.5715)T , which is minimally supported. Alternatively, for each pair of indices (i, j), 1 โ‰ค i < j โ‰ค 5, we obtain the best design (pโˆ—i , pโˆ—j ) supported only on xi , xj according to Corollary 2, then check whether (pโˆ—i , pโˆ—j ) is D-optimal using Corollary 3. Here po is the only minimally supported design that is also D-optimal. With respect to po , the efficiency of the original design (roughly a uniform one) is 52.6%.  5.2 Minimally supported designs with two predictors In this section, we consider experiments with two predictors (d = 2) and a three-category response (J = 3). The parameters are ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 . For cases with J โ‰ฅ 4, similar conclusions could be obtained, but with messier notation. 16 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 17 According to Theorem 3, a minimally supported design needs three support points, for example, (xi1 , xi2 ), i = 1, 2, 3. Under Assumption 3, the 3 ร— 3 matrix X1 = (1 X) is of full rank. Following Theorem 2, Lemmas S.4, S.5, and 2, the objective function with (d, J, m) = (2, 3, 3) is f (p1 , p2 , p3 ) = |X1 |2 e1 e2 e3 ยท p1 p2 p3 (w1 p1 + w2 p2 + w3 p3 ) (5.5) 2 2 โˆ’1 > 0. Since f (p , p , p ) = 0 if p p p = 0, we where wi = eโˆ’1 1 2 3 1 2 3 i gi1 gi2 (ฯ€i1 ฯ€i2 ฯ€i3 ) need only consider p = (p1 , p2 , p3 )T satisfying 0 < p1 , p2 , p3 < 1. According to Theorem 10, p maximizes f (p1 , p2 , p3 ) only if โˆ‚f โˆ‚f โˆ‚f = = โˆ‚p1 โˆ‚p2 โˆ‚p3 (5.6) Following Tong, Volkmer, and Yang (2014), we obtain its analytic solution: Theorem 12. Without loss of generality, w1 โ‰ฅ w2 โ‰ฅ w3 > 0 . The allocation p = (pโˆ—1 , pโˆ—2 , pโˆ—3 )T maximizing f (p1 , p2 , p3 ) in (5.5) exists and is unique. It satisfies 0 < pโˆ—3 โ‰ค pโˆ—2 โ‰ค pโˆ—1 < 1 and can be obtained analytically as follows. (i) If w1 โ‰ฅ w2 = w3 , then pโˆ—1 =pโˆ†1 /(4w1 + โˆ†1 ), pโˆ—2 = pโˆ—3 = 2w1 /(4w1 + โˆ†1 ), where โˆ†1 = 2w1 โˆ’ 3w2 + 4w12 โˆ’ 4w1 w2 + 9w22 . A special case is pโˆ—1 = pโˆ—2 = pโˆ—3 = 1/3 if w1 = w2 = w3 . (ii) If w1 = w2 > w3 , then pโˆ—1 p = pโˆ—2 = โˆ†2 /[2(โˆ†2 + 2w1 )], pโˆ—3 = 2w1 /(โˆ†2 + 2w1 ), where โˆ†2 = 3w1 โˆ’ 2w3 + 9w12 โˆ’ 4w1 w3 + 4w32 . (iii) If w1 > w2 > w3 , then pโˆ—1 = y1 /(y1 + y2 + 1), pโˆ—2 = y2 /(y1 + y2 + 1), pโˆ—3 = 1/(y1 + y2 + 1), where y1 = โˆ’ b2 21/3 (3b1 โˆ’ b22 ) A1/3 + , โˆ’ 3 3A1/3 3 ร— 21/3 y2 = (w1 โˆ’ w3 )y1 (w2 โˆ’ w3 ) + (w1 โˆ’ w2 )y1 with A = โˆ’27b0 + 9b1 b2 โˆ’ 2b32 + 33/2 (27b20 + 4b31 โˆ’ 18b0 b1 b2 โˆ’ b21 b22 + 4b0 b32 )1/2 , bi = ci /c3 , i = 0, 1, 2, and c0 = w3 (w2 โˆ’ w3 ) > 0, c1 = 3w1 w2 โˆ’ w1 w3 โˆ’ 4w2 w3 +2w32 > 0, c2 = 2w12 โˆ’4w1 w2 โˆ’w1 w3 +3w2 w3 , c3 = w1 (w2 โˆ’w1 ) < 0. The proof of Theorem 12 is relegated to the supplementary materials (Section S.3). Corollary 4. Suppose d = 2, J = 3, and m = 3. Then p = (1/3, 1/3, 1/3)T is D-optimal if and only if w1 = w2 = w3 , where w1 , w2 , w3 are defined as in (5.5). Example 10. Consider a 22 factorial design problem with a three-category response and four design points (1, 1), (1, โˆ’1), (โˆ’1, 1), (โˆ’1, โˆ’1), denoted by 17 18 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL 2 2 โˆ’1 (xi1 , xi2 ), i = 1, 2, 3, 4. Take wi = eโˆ’1 i gi1 gi2 (ฯ€i1 ฯ€i2 ฯ€i3 ) , i = 1, 2, 3, 4. There are five special cases: (i) if ฮฒ1 = ฮฒ2 = 0, then w1 = w2 = w3 = w4 ; (ii) if ฮฒ1 = 0, ฮฒ2 6= 0, then w1 = w3 , w2 = w4 , but w1 6= w2 ; (iii) if ฮฒ1 6= 0, ฮฒ2 = 0, then w1 = w2 , w3 = w4 , but w1 6= w3 ; (iv) if ฮฒ1 = ฮฒ2 6= 0, then w2 = w3 , but w1 , w2 , w4 are distinct; (v) if ฮฒ1 = โˆ’ฮฒ2 6= 0, then w1 = w4 , but w1 , w2 , w3 are distinct.  Theorem 12 provides analytic forms of minimally supported designs with d = 2 and J = 3. Corollary 5. Suppose d = 2, J = 3, and m โ‰ฅ 4. Let (xi1 , xi2 ), i = 1, . . . , m be m distinct level combinations of the two predictors. With X1 = (1 X) an m ร— 3 matrix, a minimally supported design p = (pโˆ—1 , pโˆ—2 , pโˆ—3 , 0, . . . , 0)T is D-optimal if and only if pโˆ—1 , pโˆ—2 , pโˆ—3 are obtained according to Theorem 12, and |X1 [1, 2, i]|2 e1 e2 ei pโˆ—1 pโˆ—2 (w1 pโˆ—1 + w2 pโˆ—2 ) + |X1 [1, 3, i]|2 e1 e3 ei pโˆ—1 pโˆ—3 (w1 pโˆ—1 + w3 pโˆ—3 ) + |X1 [2, 3, i]|2 e2 e3 ei pโˆ—2 pโˆ—3 (w2 pโˆ—2 + w3 pโˆ—3 ) + Di pโˆ—1 pโˆ—2 pโˆ—3 โ‰ค |X1 [1, 2, 3]|2 e1 e2 e3 pโˆ—2 pโˆ—3 (2w1 pโˆ—1 + w2 pโˆ—2 + w3 pโˆ—3 ), for i = 4, . . . , m, 2 2 โˆ’1 where ej = uj1 + uj2 โˆ’ 2bj2 , wj = eโˆ’1 j gj1 gj2 (ฯ€j1 ฯ€j2 ฯ€j3 ) , j = 1, . . . , m, Di = P {j,k,s,t}โˆˆEi ej ek (us1 ut2 + us2 ut1 โˆ’ 2bs2 bt2 ) ยท |X1 [j, k, s]| ยท |X1 [j, k, t]| with the sum over Ei = {(1, 2, 3, i), (1, 3, 2, i), (1, i, 2, 3), (2, 3, 1, i), (2, i, 1, 3), (3, i, 1, 2)}. Example 11. Consider experiments with d = 2, J = 3, m = 4, and design points (1, 1), (1, โˆ’1), (โˆ’1, 1), (โˆ’1, โˆ’1). Figure 3 provides the boundary lines of regions of parameters (ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 ) for which the best three-point design is D-optimal. In particular, Figure 3(a) shows the region of (ฮฒ1 , ฮฒ2 ) for given ฮธ1 , ฮธ2 . It clearly indicates that the best three-point design tends to be D-optimal when the absolute values of ฮฒ1 , ฮฒ2 are large. The region tends to be larger as the absolute values of ฮธ1 , ฮธ2 increase. On the other hand, Figure 3(b) displays the region of (ฮธ1 , ฮธ2 ) for given ฮฒ1 , ฮฒ2 . The symmetry of the boundary lines about ฮธ1 + ฮธ2 = 0 is due to the logit link which is symmetric about 0. An interesting conclusion based on Corollary 5 is that in this case a three-point design can never be D-optimal if ฮฒ1 = 0 or ฮฒ2 = 0.  Remark 1. Extra degrees of freedom play an important role against the uniformity of D-optimal allocation in a minimally supported design. For multinomialtype responses with J categories, the total degrees of freedom from m distinct experimental settings is m(J โˆ’ 1), while a cumulative link model contains d + J โˆ’ 1 parameters. For a minimally supported design, m = d + 1 and m(J โˆ’ 1) = d + J โˆ’ 1 if and only if J = 2 (see Example 7). Then the objective function f (p) โˆ pi0 pi1 ยท ยท ยท pid and the D-optimal allocation is pi0 = pi1 = 18 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA (b) 3 10 (a) ฮธ1=1, ฮธ2=2 ฮธ1=3, ฮธ2=5 ฮธ1=.2, ฮธ2=.5 ฮฒ1=1, ฮฒ2=1 ฮฒ1=1, ฮฒ2=3 ฮฒ1=1, ฮฒ2=.2 0 ฮธ2 0 โˆ’3 โˆ’10 โˆ’2 โˆ’5 โˆ’1 ฮฒ2 1 5 2 19 โˆ’3 โˆ’2 โˆ’1 0 1 2 3 โˆ’10 ฮฒ1 โˆ’5 0 5 10 ฮธ1 Figure 3: Boundary lines for a three-point design to be D-optimal with logit link: Region of (ฮฒ1 , ฮฒ2 ) for given (ฮธ1 , ฮธ2 ) is outside the boundary lines in Panel (a); Region of (ฮธ1 , ฮธ2 ) (with ฮธ1 < ฮธ2 ) for given (ฮฒ1 , ฮฒ2 ) is between the boundary lines and ฮธ1 = ฮธ2 in Panel (b) ยท ยท ยท = pid = 1/(d + 1). However, if J โ‰ฅ 3, the degrees of freedom is strictly larger than the number of parameters and there are โ€œextraโ€ degrees of freedom. In this case, distinct experimental settings may play different roles in estimating the parameters values. For example, if d = 1, J = 3, m = 2, the objective function f (p) = p1 p2 (c1 p1 + c2 p2 ) according to Corollary 2; if d = 2, J = 3, m = 3, f (p) โˆ p1 p2 p3 (w1 p1 +w2 p2 +w3 p3 ) according to equation (5.5). The D-optimality of a uniform allocation then depends on c1 = c2 or w1 = w2 = w3 , which is not true in general. 6. EW D-optimal Design The previous sections mainly focus on locally D-optimal designs which require assumed parameter values, (ฮฒ1 , . . . , ฮฒd , ฮธ1 , . . . , ฮธJโˆ’1 ). For many applications, the experimenter may have little information about the values of parameters. Then Bayes D-optimality (Chaloner and Verdinelli (1995)) which maximizes E(log |F|) given a prior distribution on parameters provides a reasonable solution. An alternative is EW D-optimality (Yang, Mandal, and Majumdar (2016); Atkinson et al. (2007)) which essentially maximizes log |E(F)|. According to Yang, Mandal, and Majumdar (2016)โ€™s simulation study across different models and choices of priors, EW D-optimal designs are much easier to calculate and still highly efficient compared with Bayes designs. Based on Theorem 1, an EW D-optimal design that maximizes |E(F)| can be viewed as a locally D-optimal design with ei , cit , uit and bit replaced by their expectations. After the replacement, Lemma S.2 still holds. Therefore, almost all results in the previous sections can be applied directly to EW D-optimal designs. 19 20 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL The only exception is Lemma 1 which provides the formula for |Ai3 | in terms of gij and ฯ€ij . In order to find EW D-optimal designs, |Ai3 | needs to be calculated in terms of uit and bit . For example, |Ai3 | = ui1 if J = 2, |Ai3 | = ui1 ui2 โˆ’ b2i2 if J = 3, and |Ai3 | = ui1 ui2 ui3 โˆ’ ui1 b2i3 โˆ’ ui3 b2i2 if J = 4. Then the formulas of |Ai3 | in Lemma 2, c1 , c2 in Corollary 2, si3 , si4 , si5 in Corollary 3, wi in (5.5), and wj in Corollary 5 need to be written in terms of uit and bit . According to Lemma S.2, we only need to calculate E(uit ), i = 1, . . . , m; t = 1, . . . , J โˆ’ 1 and E(bit ), i = 1, . . . , m; t = 2, . . . , J โˆ’ 1 (if J โ‰ฅ 3). Then E(cit ) = P E(uit ) โˆ’ E(bit ) โˆ’ E(bi,t+1 ) and E(ei ) = Jโˆ’1 t=1 E(cit ). After that, we can use the lift-one algorithm in Section 3 or the exchange algorithm in Section 4 to find EW D-optimal designs. Example 4 : Odor Removal Study (continued) Instead of assuming the parameter values (ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 ) = (โˆ’2.44, 1.09, โˆ’2.67, โˆ’0.21), consider true values of parameters that satisfy ฮฒ1 โˆˆ [โˆ’3, โˆ’1], ฮฒ2 โˆˆ [0, 2], ฮธ1 โˆˆ [โˆ’4, โˆ’2], and ฮธ2 โˆˆ [โˆ’1, 1]. We assume that the four parameters are independently and uniformly distributed within their intervals. We use R function constrOptim to maximize ฯ†(p) = E(log |F|) and find the Bayes D-optimal allocation pb = (0.3879, 0.3264, 0.0000, 0.2857)T . The procedure costs 313 seconds computational time. In order to get the EW D-optimal design, we only need 5.43 seconds in total to calculate E(uit ), E(bit ), and find pe = (0.3935, 0.3259, 0, 0.2806)T using the lift-one algorithm. Even in terms of Bayes Optimality (Chaloner and Larntz (1989); Song and Wong (1998); Abebe et al. (2014)), the relative efficiency of pe with respect to pb is exp{(ฯ†(pe ) โˆ’ ฯ†(pb ))/4} ร— 100% = 99.99%, while the relative efficiency of the uniform allocation pu = (0.25, 0.25, 0.25, 0.25)T is 87.67%. In order to check robustness towards misspecified parameter values, we let ฮธ = (ฮฒ1 , ฮฒ2 , ฮธ1 , ฮธ2 )T run through all 0.1-grid points in [โˆ’3, โˆ’1]ร—[0, 2]ร—[โˆ’4, โˆ’2]ร— [โˆ’1, 1]. For each ฮธ, we use the lift-one algorithm to find the D-optimal allocation pฮธ and the corresponding determinant f (pฮธ ) = |F(pฮธ )|, and then calculate the efficiency (f (p)/f (pฮธ ))1/4 for p = pb , pe , and pu , respectively. Table 3 shows the summary statistics of the efficiencies. It implies that pb and pe are comparable and both of them are much better than pu in terms of robustness.  Table 3: Summary of Efficiency in Odor Removal Study Design Bayes pb EW pe Uniform pu Min. 0.8464 0.8465 0.7423 1st Quartile 0.9813 0.9802 0.8105 Median 0.9915 0.9917 0.8622 7. Discussion 20 Mean 0.9839 0.9838 0.8674 3rd Quartile 0.9964 0.9967 0.9249 Max. 1.0000 1.0000 0.9950 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 21 In this paper, we use real experiments to illustrate how much improvements the experimenter could make. Compared with our D-optimal designs, the efficiencies of the original designs are often far from satisfactory: 79.7% in Example 4, 73.1% in Example 6, and 52.6% in Example 9. More interestingly, our D-optimal designs recommended for Example 4 and Example 9 are both minimally supported. We have two surprising findings that are different from the cases under univariate generalized linear models (Yang and Mandal, 2015): (1) the minimum number of experimental settings can be strictly less than the number of parameters, and (2) the allocation of experimental units on the support points of a minimally supported design is usually not uniform. Cumulative link models are widely used for modeling ordinal data. Nevertheless, there are other models used for multinomial-type responses, including baseline-category logit model for nominal response, adjacent-categories logit model for ordinal data, and continuation-ratio logit model for hierarchical response (see Liu and Agresti (2005), Agresti (2013) for a review). The methods developed in this paper could be extended for those models as well. For further extensions, our approaches could be used for planning experiments with more than one categorical response. For example, both the paper feeder experiment and the PCB experiment analyzed by Joseph and Wu (2004) involved multiple binomial responses. Supplementary Materials The proofs of Theorems 1, 2, 4, 5, and 12, Lemma 2, and Corollaries 3 and 5 are available in the Supplementary Materials. There are also tabularized formulas for commonly used link functions, additional lemmas for Section 2 and Section 5.2, maximization of fi (z) in Section 3, exchange algorithm for D-optimal exact allocation in Section 4, and more results for Example 6. Acknowledgements We thank Dr. Suraj Sharma for providing the details of the odor removal study, and Dr. John Stufken for valuable suggestions on an early version of this paper. We also thank an associate editor and the reviewers for comments and suggestions that substantially improved the quality of the manuscript. This research is in part supported by the LAS Award for Faculty of Science at UIC. References Abebe, H. T., Tan, F. E., Van Breukelen, G. J., Serroyen, J., and Berger, M. P. (2014). On the choice of a prior for Bayesian D-optimal designs for the logistic regression model with a single predictor. Communications in Statistics - Simulation and Computation, 43, 18111824. 21 22 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL Agresti, A. (2013). Categorical Data Analysis, Third Edition. Wiley, New Jersey. Atkinson, A. C., Donev, A. N. and Tobias, R. D. (2007). Optimum Experimental Designs, with SAS. Oxford University Press, New York. Chaloner, K. and Larntz, K. (1989). Optimal Bayesian design applied to logistic regression experiments. Journal of Statistical Planning and Inference, 21, 191-208. Chaloner, K. and Verdinelli, I. (1995). Bayesian experimental design: a review. Statistical Science, 10, 273-304. Chernoff, H. (1953). Locally optimal designs for estimating parameters. Annals of Mathematical Statistics, 24, 586-602. Christensen, link R. H. models โ€“ B. (2015). estimation Analysis with of the ordinal R-package data with ordinal. cumulative Available via http://cran.r-project.org/web/packages/ordinal/vignettes/clm_intro.pdf Dobson, A. J. and Barnett, A. (2008). An Introduction to Generalized Linear Models, Third Edition. Chapman & Hall/CRC, London. Fedorov, V. V. (1972). Theory of Optimal Experiments. Academic Press, New York. Fedorov, V. V. and Leonov, S. L. (2014). Optimal Design for Nonlinear Response Models. Chapman & Hall/CRC, New York. Ford, I., Titterington, D. M., and Kitsos, C. P. (1989). Recent advances in nonlinear experimental design. Technometrics, 31, 49-60. Ford, I., Torsney, B., and Wu, C. F. J. (1992). The use of a canonical form in the construction of locally optimal designs for non-linear problems. Journal of the Royal Statistical Society, Series B, 54, 569-583. Imhof, L. A. (2001). Maximin designs for exponential growth models and heteroscedastic polynomial models. Annals of Statistics, 29, 561-576. Imhof, L., Lopez-Fidalgo, J., and Wong, W.K. (2001). Efficiencies of rounded optimal approximate designs for small samples. Statistica Neerlandica, 55, 301-318. Joseph, V. R. and Wu, C. F. J. (2004). Failure amplification method: an information maximization approach to categorical response optimization (with discussions). Technometrics, 46, 1-31. Karush, W. (1939). Minima of functions of several variables with inequalities as side constraints, M.Sc. Dissertation, Department of Mathematics, University of Chicago. Kiefer, J. (1971). The role of symmetry and approximation in exact design optimality. In Statistical Decision Theory and Related Topics, S.S. Gupta and J. Yackel (eds), 109-118, Academic Press, New York. Kiefer, J. (1974). General equivalence theory for optimum designs (approximate theory). Annals of Statistics, 2, 849-879. Khuri, A. I., Mukherjee, B., Sinha, B. K. and Ghosh, M. (2006). Design issues for generalized linear models: A review. Statistical Science, 21, 376-399. 22 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA 23 Krause, M. S., Madden, L. V. and Hoitink, H. A. J. (2001). Effect of potting mix microbial carrying capacity on biological control of Rhizoctonia damping-off of radish and Rhizoctonia crown and root rot of Poinsettia. Phytopathology, 91, 1116-1123. Kuhn, H. W. and Tucker, A. W. (1951). Nonlinear programming. Proceedings of 2nd Berkeley Symposium, Berkeley: University of California Press, 481-492. Liu, I. and Agresti, A. (2005). The analysis of ordered categorical data: An overview and a survey of recent developments. Test, 14, 1-73. McCullagh, P. (1980). Regression models for ordinal data. Journal of the Royal Statistical Society, Series B, 42, 109-142. McCullagh, P. and Nelder, J. (1989). Generalized Linear Models, Second Edition. Chapman and Hall/CRC, Boca Raton. Omer, M. A., Johnson, D. A. and Rowe, R. C. (2000). Recovery of Verticillium dahliae from North American certified seed potatoes and characterization of strains by vegetative compatibility and aggressiveness. American Journal of Potato Research, 77, 325-331. Osterstock, J. B., MacDonald, J. C., Boggess, M. M. and Brown, M. S. (2010). Analysis of ordinal outcomes from carcass data in beef cattle research. Journal of Animal Science, 88, 3384-3389. Perevozskaya, I., Rosenberger, W. F. and Haines, L. M. (2003). Optimal design for the proportional odds model. The Canadian Journal of Statistics, 31, 225-235. Phadke, M. S. (1989). Quality Engineering using Robust Design. Prentice-Hall, Englewood Cliffs. Pronzato, L. and Walter, E. (1988). Robust experiment design via maximin optimization. Mathematical Biosciences, 89, 161-176. Pukelsheim, F. (1993). Optimal Design of Experiments. John Wiley & Sons, New York. Pukelsheim, F. and Rieder, S. (1992). Efficient rounding of approximate designs. Biometrika, 79, 763-770. Randall, J. (1989). The analysis of sensory data by generalised linear model. Biometrical Journal, 31, 781-793. Silvey, S. D. (1980). Optimal Design. Chapman and Hall, London. Song, D. and Wong, W. K. (1998). Optimal two-point designs for the Michaelis-Menten model with heteroscedastic errors. Communications in Statistics - Theory and Methods, 27, 15031516. Stufken, J. and Yang, M. (2012). Optimal designs for generalized linear models. In: Design and Analysis of Experiments, Volume 3: Special Designs and Applications, K. Hinkelmann (ed.). Wiley, New York. Tong, L., Volkmer, H. W., and Yang, J. (2014). Analytic solutions for D-optimal factorial designs under generalized linear models. Electronic Journal of Statistics, 8, 1322-1344. Woods, D. C., Lewis, S. M., Eccleston, J. A. and Russell, K. G. (2006). Designs for generalized linear models with several variables and model uncertainty. Technometrics, 48, 284-292. 23 24 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL Wu, F-C. (2008). Simultaneous optimization of robust design with quantitative and ordinal data. International Journal of Industrial Engineering: Theory, Applications and Practice, 15, 231-238. Wu, C. F. J. and Hamada, M. (2009). Experiments: Planning, Analysis, and Optimization, Second Edition. Wiley, New York. Yang, J. and Mandal, A. (2015). D-optimal factorial designs under generalized linear models. Communications in Statistics - Simulation and Computation, 44, 2264-2277. Yang, J., Mandal, A., and Majumdar, D. (2016). Optimal designs for 2k factorial experiments with binary response. Statistica Sinica, 26, 385-411. Zocchi S. S. and Atkinson, A. C. (1999). Optimum experimental designs for multinomial logistic models. Biometrics, 55, 437-444. University of Illinois at Chicago E-mail: [email protected] Phone: (312) 413-3748 Fax: (312) 996-1491 Advocate Health Care E-mail: [email protected] University of Georgia E-mail: [email protected] 24 SUPPLEMENTARY MATERIALS S1 D-OPTIMAL DESIGNS WITH ORDERED CATEGORICAL DATA Jie Yang1 , Liping Tong2 and Abhyuday Mandal3 1 University of Illinois at Chicago, 2 Advocate Health Care and 3 University of Georgia Supplementary Materials S.1 Commonly Used Link Functions for Cumulative Link Models Link function logit probit log-log c-log-log cauchit g(ฮณ)   ฮณ log 1โˆ’ฮณ ฮฆโˆ’1 (ฮณ) โˆ’ log[โˆ’ log(ฮณ)] log[โˆ’ log(1 โˆ’ ฮณ)] tan[ฯ€(ฮณ โˆ’ 21 )] g โˆ’1 (ฮท) (g โˆ’1 )โ€ฒ (ฮท) eฮท 1+eฮท eฮท (1+eฮท )2 ฮฆ(ฮท) exp{โˆ’eโˆ’ฮท } 1 โˆ’ exp{โˆ’eฮท } 1 arctan(ฮท) + 21 ฯ€ ฯ†(ฮท) exp{โˆ’ฮท โˆ’ eโˆ’ฮท } exp{ฮท โˆ’ eฮท } 1 ฯ€(1+ฮท2 ) where ฮฆโˆ’1 (ยท) is the cumulative distribution function of N(0, 1), ฯ†(ยท) is the probability density function of N(0, 1), and โ€œc-log-logโ€ stands for complementary log-log. Example 1 (continued) For logit link g, g โˆ’1 (ฮท) = eฮท /(1+eฮท ) and (g โˆ’1 )โ€ฒ = g โˆ’1(1 โˆ’ g โˆ’1 ). Thus gij = (g โˆ’1)โ€ฒ (ฮธj โˆ’ xTi ฮฒ) = ฮณij (1 โˆ’ ฮณij ). With J = 3, we have ฯ€i1 + ฯ€i2 + ฯ€i3 = 1 for i = 1, . . . , m. Then for i = 1, . . . , m, gi1 = โˆ’1 ฯ€i1 (ฯ€i2 + ฯ€i3 ), gi2 = (ฯ€i1 + ฯ€i2 )ฯ€i3 , bi2 = ฯ€i1 ฯ€i3 ฯ€i2 (ฯ€i1 + ฯ€i2 )(ฯ€i2 + ฯ€i3 ), ui1 = โˆ’1 โˆ’1 2 ฯ€i1 ฯ€i2 (ฯ€i1 +ฯ€i2 )(ฯ€i2 +ฯ€i3 ) , ui2 = ฯ€i3 ฯ€i2 (ฯ€i1 +ฯ€i2 )2 (ฯ€i2 +ฯ€i3 ), ci1 = ฯ€i1 (ฯ€i1 + ฯ€i2 )(ฯ€i2 +ฯ€i3 ), ci2 = ฯ€i3 (ฯ€i1 +ฯ€i2 )(ฯ€i2 +ฯ€i3 ), ei = (ฯ€i1 +ฯ€i2 )(ฯ€i1 +ฯ€i3 )(ฯ€i2 +ฯ€i3 ).  S.2 Additional Lemmas For Section 2: Since (Yi1 , . . . , YiJ ), i = 1, . . . , m are m independent random vectors, the log-likelihood function (up to a constant) of the cumulative link model is l(ฮฒ1 , . . . , ฮฒd , ฮธ1 , . . . , ฮธJโˆ’1 ) = m X J X i=1 j=1 S1 Yij log(ฯ€ij ) S2 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL where ฯ€ij = ฮณij โˆ’ ฮณi,jโˆ’1 with ฮณij = g โˆ’1 (ฮธj โˆ’ xTi ฮฒ) for j = 1, . . . , J โˆ’ 1 and ฮณi0 = 0, ฮณiJ = 1, i = 1, . . . , m. For s = 1, . . . , d, t = 1, . . . , J โˆ’ 1,  m X โˆ‚l Yi1 = (โˆ’xis ) ยท ยท (g โˆ’1)โ€ฒ (ฮธ1 โˆ’ xTi ฮฒ) โˆ‚ฮฒs ฯ€ i1 i=1  Yi2  โˆ’1 โ€ฒ ยท (g ) (ฮธ2 โˆ’ xTi ฮฒ) โˆ’ (g โˆ’1 )โ€ฒ (ฮธ1 โˆ’ xTi ฮฒ) + ฯ€i2   YiJ  โˆ’1 โ€ฒ T +ยทยทยท + โˆ’(g ) (ฮธJโˆ’1 โˆ’ xi ฮฒ) ฯ€iJ   m X โˆ‚l Yit Yi,t+1 โˆ’1 โ€ฒ T = (g ) (ฮธt โˆ’ xi ฮฒ) โˆ’ โˆ‚ฮธt ฯ€ ฯ€i,t+1 it i=1 Since Yij โ€™s come from multinomial distributions, we know E(Yij ) = ni ฯ€ij , E(Yij2 ) = ni (ni โˆ’ 1)ฯ€ij2 + ni ฯ€ij , and E(Yis Yit ) = ni (ni โˆ’ 1)ฯ€is ฯ€it when s 6= t. Then we have the following lemma: Lemma S.1. Let F = (Fst ) be the (d+J โˆ’1)ร—(d+J โˆ’1) Fisher information matrix. (i) For 1 โ‰ค s โ‰ค d, 1 โ‰ค t โ‰ค d,   X m J X (gij โˆ’ gi,jโˆ’1)2 โˆ‚l โˆ‚l Fst = E = ni xis xit โˆ‚ฮฒs โˆ‚ฮฒt ฯ€ij i=1 j=1 where gij = (g โˆ’1 )โ€ฒ (ฮธj โˆ’xTi ฮฒ) > 0 for j = 1, . . . , J โˆ’1 and gi0 = giJ = 0. (ii) For 1 โ‰ค s โ‰ค d, 1 โ‰ค t โ‰ค J โˆ’ 1,  X    m git โˆ’ gi,tโˆ’1 gi,t+1 โˆ’ git โˆ‚l โˆ‚l = ni (โˆ’xis )git โˆ’ Fs,d+t = E โˆ‚ฮฒs โˆ‚ฮธt ฯ€ ฯ€i,t+1 it i=1 (iii) For 1 โ‰ค s โ‰ค J โˆ’ 1, 1 โ‰ค t โ‰ค d,  X    m gis โˆ’ gi,sโˆ’1 gi,s+1 โˆ’ gis โˆ‚l โˆ‚l = ni (โˆ’xit )gis โˆ’ Fd+s,t = E โˆ‚ฮธs โˆ‚ฮฒt ฯ€is ฯ€i,s+1 i=1 (iv) For 1 โ‰ค s โ‰ค J โˆ’ 1, 1 โ‰ค t โ‰ค J โˆ’ 1, ๏ฃฑ P โˆ’1 โˆ’1 2   ๏ฃฒ m ni gis (ฯ€is + ฯ€i,s+1 ), Pi=1 โˆ‚l โˆ‚l m โˆ’1 Fd+s,d+t = E = n g g (โˆ’ฯ€i,sโˆจt ), ๏ฃณ i=1 i is it โˆ‚ฮธs โˆ‚ฮธt 0, where s โˆจ t = max{s, t}. S2 if s = t if |s โˆ’ t| = 1 if |s โˆ’ t| โ‰ฅ 2 SUPPLEMENTARY MATERIALS S3 Perevozskaya et al. (2003) obtained a detailed form of Fisher information matrix for logit link and one predictor. Our expressions here are good for fairly general link and d predictors. To simplify the notations, we denote for i = 1, . . . , m, ei = J X (gij โˆ’ gi,jโˆ’1)2 j=1 cit uit ฯ€ij >0   git โˆ’ gi,tโˆ’1 gi,t+1 โˆ’ git = git , t = 1, . . . , J โˆ’ 1 โˆ’ ฯ€it ฯ€i,t+1 โˆ’1 = git2 (ฯ€itโˆ’1 + ฯ€i,t+1 ) > 0, t = 1, . . . , J โˆ’ 1 bit = gi,tโˆ’1 git ฯ€itโˆ’1 > 0, t = 2, . . . , J โˆ’ 1 (if J โ‰ฅ 3) (S.1) (S.2) (S.3) (S.4) Note that gij is defined in Lemma S.1 (i). Then we obtain the following lemma which plays a key role in calculating |F|. Lemma S.2. cit = uit โˆ’ bit โˆ’ bi,t+1 , i = 1, . . . , m; t = 1, . . . , J โˆ’ 1; ei = PJโˆ’1 PJโˆ’1 t=1 (uit โˆ’ 2bit ), i = 1, . . . , m, where bi1 = biJ = 0 for i = t=1 cit = 1, . . . , m. Lemma S.3. Rank((Ai1 Ai2 )) โ‰ค 1 where โ€œ=โ€ is true if and only if xi 6= 0. Based on Lemmas 1 and S.3, we obtain the two lemmas below on cฮฑ1 ,...,ฮฑm which significantly simplify the structure of |F| as a polynomial of (n1 , . . . , nm ). Lemma S.4. If max1โ‰คiโ‰คm ฮฑi โ‰ฅ J, then |Aฯ„ | = 0 for any ฯ„ โˆˆ (ฮฑ1 , . . . , ฮฑm ) and thus cฮฑ1 ,...,ฮฑm = 0. Proof of Lemma S.4: Without any loss of generality, we assume ฮฑ1 โ‰ฅ ฮฑ2 โ‰ฅ ยท ยท ยท โ‰ฅ ฮฑm . Then max1โ‰คiโ‰คm ฮฑi โ‰ฅ J implies ฮฑ1 โ‰ฅ J. In this case, for any ฯ„ โˆˆ (ฮฑ1 , . . . , ฮฑm ), ฯ„ โˆ’1 (1) := {i | ฯ„ (i) = 1} โŠ‚ {1, . . . , d + J โˆ’ 1} and |ฯ„ โˆ’1 (1)| = ฮฑ1 . If |ฯ„ โˆ’1 (1)โˆฉ{1, . . . , d}| โ‰ฅ 2, then |Aฯ„ | = 0 due to Lemma S.3; otherwise {d+1, . . . , d+J โˆ’1} โŠ‚ ฯ„ โˆ’1 (1) and thus |Aฯ„ | = 0 due to Lemma 1.  Thus cฮฑ1 ,...,ฮฑm = 0 according to (2.3) provided in Theorem 2. Lemma S.5. If #{i : ฮฑi โ‰ฅ 1} โ‰ค d, then |Aฯ„ | = 0 for any ฯ„ โˆˆ (ฮฑ1 , . . . , ฮฑm ) and thus cฮฑ1 ,...,ฮฑm = 0. Proof of Lemma S.5: Without any loss of generality, we assume ฮฑ1 โ‰ฅ ฮฑ2 โ‰ฅ ยท ยท ยท โ‰ฅ ฮฑm . Then #{i : ฮฑi โ‰ฅ 1} โ‰ค d indicates ฮฑd+1 = ยท ยท ยท = ฮฑm = 0. Let ฯ„ : {1, 2, . . . , d + J โˆ’ 1} โ†’ {1, . . . , m} satisfy ฯ„ โˆˆ (ฮฑ1 , . . . , ฮฑm ). Then the (d + J โˆ’ 1) ร— (d + J โˆ’ 1) matrix Aฯ„ can be written as   Aฯ„ 1 Aฯ„ 2 Aฯ„ 3 Aฯ„ 4 S3 S4 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL =  (eฯ„ (s) xฯ„ (s)s xฯ„ (s)t )s=1,...d;t=1,...,d (โˆ’xฯ„ (s)s cฯ„ (s)t )s=1,...,d;t=1,...,Jโˆ’1 (โˆ’cฯ„ (d+s)s xฯ„ (d+s)t )s=1,...,Jโˆ’1;t=1,...,d Aฯ„ 4  where the (J โˆ’1)ร—(J โˆ’1) matrix Aฯ„ 4 is either a single entry uฯ„ (d+1)1 (if J = 2) or symmetric tri-diagonal with diagonal entries uฯ„ (d+1)1 , . . . , uฯ„ (d+Jโˆ’1),Jโˆ’1 , upper off-diagonal entries โˆ’bฯ„ (d+1)2 , . . . , โˆ’bฯ„ (d+Jโˆ’2),Jโˆ’1 , and lower off-diagonal entries โˆ’bฯ„ (d+2)2 , . . . , โˆ’bฯ„ (d+Jโˆ’1),Jโˆ’1 . Note that Aฯ„ is asymmetric in general. If #{i : ฮฑi โ‰ฅ 1} โ‰ค dโˆ’1, then there exists an i0 such that 1 โ‰ค i0 โ‰ค d and |ฯ„ โˆ’1 (i0 ) โˆฉ {1, . . . , d}| โ‰ฅ 2. In this case, |Aฯ„ | = 0 according to Lemma S.3. If #{i : ฮฑi โ‰ฅ 1} = d, we may assume |ฯ„ โˆ’1 (i) โˆฉ {1, . . . , d}| = 1 for i = 1, . . . , d (otherwise |Aฯ„ | = 0 according to Lemma S.3). Suppose ฮฑ1 โ‰ฅ ฮฑ2 โ‰ฅ ยท ยท ยท โ‰ฅ ฮฑk โ‰ฅ 2 > ฮฑk+1 . Then {d + 1, . . . , d + J โˆ’ 1} โŠ‚ โˆชki=1 ฯ„ โˆ’1 (i) P and ki=1 (ฮฑi โˆ’ 1) = J โˆ’ 1. In order to show |Aฯ„ | = 0, we first replace (1) (1) Aฯ„ 1 with Aฯ„ 1 = (eฯ„ (s) xฯ„ (s)t )s=1,...d; t=1,...,d and replace Aฯ„ 2 with Aฯ„ 2 = (1) (โˆ’cฯ„ (s)t )s=1,...,d; t=1,...,Jโˆ’1 . It changes Aฯ„ into a new matrix Aฯ„ . Note that Q (1) |Aฯ„ | = ds=1 xฯ„ (s)s ยท |Aฯ„ |. According to Lemma S.2, the sum of the columns (1) of Aฯ„ 2 is (โˆ’eฯ„ (1) , . . . , โˆ’eฯ„ (d) )T , and the elementwise sum of the columns of Aฯ„ 4 is (cฯ„ (d+1)1 , cฯ„ (d+2)2 , . . . , cฯ„ (d+Jโˆ’1),Jโˆ’1 )T . Secondly, for t = 1, . . . , d, we add x1t (โˆ’eฯ„ (1) , . . . , โˆ’eฯ„ (d) , cฯ„ (d+1)1 , . . . , cฯ„ (d+Jโˆ’1),Jโˆ’1 )T to the tth column of (1) (2) (1) (2) Aฯ„ . We denote the resulting matrix by Aฯ„ . Note that |Aฯ„ | = |Aฯ„ |. We (2) (2) consider the sub-matrix Aฯ„ d which consists of the first d columns of Aฯ„ . (2) For s โˆˆ ฯ„ โˆ’1 (1), the sth row of Aฯ„ d is simply 0. For i = 2, . . . , k, the jth row (2) of Aฯ„ d is proportional to (xi1 โˆ’ x11 , xi2 โˆ’ x12 , . . . , xid โˆ’ x1d ) if j โˆˆ ฯ„ โˆ’1 (i). P (2) Therefore, Rank(Aฯ„ d ) โ‰ค (d + J โˆ’ 1) โˆ’ ฮฑ1 โˆ’ ki=2 (ฮฑi โˆ’ 1) = d โˆ’ 1, which (1) (2) leads to |Aฯ„ | = 0 and thus |Aฯ„ | = 0, |Aฯ„ | = 0. According to (2.3) in  Theorem 2, cฮฑ1 ,...,ฮฑm = 0. Lemma S.6. F = F(p) is always positive semi-definite. It is positive definite if and only if p โˆˆ S+ . Furthermore, log f (p) is concave on S. For Section 5.2: The procedure seeking for analytic solutions here follows Tong, Volkmer, and Yang (2014). As a direct conclusion of the KarushKuhn-Tucker conditions (see also Theorem 10), a necessary condition for (p1 , p2 , p3 ) to maximize f (p1 , p2 , p3 ) in (5.5) is (5.6), which are equivalent to โˆ‚f /โˆ‚p1 = โˆ‚f /โˆ‚p3 and โˆ‚f /โˆ‚p2 = โˆ‚f /โˆ‚p3 . In terms of pi , wi โ€™s, they are (p3 โˆ’ p1 )(p1 w1 + p2 w2 + p3 w3 ) = (w3 โˆ’ w1 )p1 p3 (p3 โˆ’ p2 )(p1 w1 + p2 w2 + p3 w3 ) = (w3 โˆ’ w2 )p2 p3 S4 (S.5) (S.6) SUPPLEMENTARY MATERIALS S5 Denote y1 = p1 /p3 > 0 and y2 = p2 /p3 > 0. Since p1 + p2 + p3 = 1, it implies p3 = 1/(y1 + y2 + 1), p1 = y1 /(y1 + y2 + 1), and p2 = y2 /(y1 + y2 + 1). In terms of y1 , y2 , (S.5) and (S.6) are equivalent to (1 โˆ’ y1 )(y1 w1 + y2 w2 + w3 ) = (w3 โˆ’ w1 )y1 (1 โˆ’ y2 )(y1 w1 + y2 w2 + w3 ) = (w3 โˆ’ w2 )y2 (S.7) (S.8) Lemma S.7. Suppose 0 < w3 < w2 < w1 . If (p1 , p2 , p3 ) maximizes f (p1 , p2 , p3 ) in (5.5) under the constrains p1 , p2 , p3 โ‰ฅ 0 and p1 + p2 + p3 = 1, then 0 < p3 โ‰ค p2 โ‰ค p1 < 1. The proof of the lemma above is straightforward, because otherwise one could exchange pi , pj to strictly improve f (p1 , p2 , p3 ) . Now we are ready to get solutions to equations (S.7) and (S.8) case by case. (i) w1 = w3 . In that case, (S.7) implies y1 = 1. After plugging it into (S.8), the only positive p solution is y2 = (โˆ’3w1 + 2w2 + 9w12 โˆ’ 4w1 w2 + 4w22 )/(2w2) . (ii) w2 = w3 . In that case, (S.8) implies y2 = 1. After plugging it into (S.7), the only positive p solution is y1 = (2w1 โˆ’ 3w2 + 4w12 โˆ’ 4w1 w2 + 9w22 )/(2w1 ) . (iii) w1 = w2 but w1 6= w3 . The ratio of (S.7) and (S.8) leads to y1 = y2 . After plugging it into (S.7), the only positive solution is y1 = (3w1 โˆ’ p 2 2w3 + 9w1 โˆ’ 4w1 w3 + 4w32)/(4w1 ) . (iv) w1 , w2 , w3 are distinct. Without any loss of generality, we assume 0 < w3 < w2 < w1 , because otherwise the previous elimination procedure in the order of p3 , p2 , p1 could be easily changed accordingly. Based on Lemma S.7, if (p1 , p2 , p3 ) maximizes f4 , then 0 < p3 โ‰ค p2 โ‰ค p1 < 1 and thus y1 โ‰ฅ y2 โ‰ฅ 1. The ratio of (S.7) and (S.8) leads to (1 โˆ’ y1 )/(1 โˆ’ y2 ) = (w3 โˆ’ w1 )/(w3 โˆ’ w2 ) ยท y1 /y2 , which implies y2 = (w1 โˆ’ w3 )y1 . (w2 โˆ’ w3 ) + (w1 โˆ’ w2 )y1 (S.9) Note that (w2 โˆ’ w3 ) + (w1 โˆ’ w2 )y1 โ‰ฅ w1 โˆ’ w3 > 0. After plugging (S.9) into (S.7), we get c0 + c1 y1 + c2 y12 + c3 y13 = 0 (S.10) where c0 = w3 (w2 โˆ’ w3 ) > 0, c1 = 3w1 w2 โˆ’ w1 w3 โˆ’ 4w2 w3 + 2w32 > 0, c2 = 2w12 โˆ’ 4w1 w2 โˆ’ w1 w3 + 3w2 w3 , c3 = w1 (w2 โˆ’ w1 ) < 0. S5 S6 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL Lemma S.8. Suppose 0 < w3 < w2 < w1 . Then equation (S.10) has one and only one solution y1โˆ— โ‰ฅ 1. Furthermore, y1โˆ— > 1. Proof of Lemma S.8: In order to locate the roots of equation (S.10), we let f1 (y1 ) = c0 + c1 y1 + c2 y12 + c3 y13 . Then f1 (1) = c0 + c1 + c2 + c3 = (w1 โˆ’ w3 )2 > 0. On the other hand, the first derivative of f1 is f1โ€ฒ (y1 ) = a0 +a1 y1 +a2 y12 , where a0 = 3w1 w2 โˆ’ w1 w3 โˆ’ 4w2 w3 + 2w32 = w1 (w2 โˆ’ w3 ) + 2(w1 โˆ’ w2 )w2 + 2(w2 โˆ’ w3 )2 > 0, a1 = 2(2w12 โˆ’ 4w1 w2 โˆ’ w1 w3 + 3w2 w3 ), and a2 = 3w1 (w2 โˆ’ w1 ) < 0. Therefore, a21 โˆ’ 4a0 a2 > a21 โ‰ฅ 0 and f1โ€ฒ (y1 ) = a2 (y1 โˆ’ y11 )(y1 โˆ’ y12 ), where p p โˆ’a1 + a21 โˆ’ 4a0 a2 โˆ’a1 โˆ’ a21 โˆ’ 4a0 a2 y11 = < 0, y12 = > y11 2a2 2a2 It can be verified that y12 < 1 if and only if w1 < 2(w2 + w3 ). There are two cases: Case (i): If y12 < 1, then f1โ€ฒ (y1 ) < 0 for all y1 > 1. That is, f1 (y1 ) strictly decreases after y1 = 1. Since f1 (1) > 0 and f1 (โˆž) = โˆ’โˆž, then there is one and only one solution in (1, โˆž); Case (ii): If y12 โ‰ฅ 1, then f1โ€ฒ (y1 ) โ‰ฅ 0 for y1 โˆˆ [1, y12 ] and f1โ€ฒ (y1 ) < 0 for y1 โˆˆ (y12 , โˆž). That is, f1 (y1 ) increases in [1, y12 ] and then strictly decreases in (y12 , โˆž). Again, due to f1 (1) > 0 and f1 (โˆž) = โˆ’โˆž, there is one and only one solution in (1, โˆž). In either case, the conclusion is justified.  S.3 Additional Proofs Proof of Theorem 1 It is a direct conclusion of Lemmas S.1 and S.2.  Examples of Ai3 in Theorem 1 include (ui1 ), ๏ฃถ ๏ฃซ ๏ฃซ ๏ฃถ u โˆ’b 0 0 i1 i2   ui1 โˆ’bi2 0 ๏ฃฌ โˆ’bi2 ui1 โˆ’bi2 ui2 โˆ’bi3 0 ๏ฃท ๏ฃท ๏ฃญ ui2 โˆ’bi3 ๏ฃธ , ๏ฃฌ , โˆ’bi2 ๏ฃญ โˆ’bi2 ui2 0 โˆ’bi3 ui3 โˆ’bi4 ๏ฃธ 0 โˆ’bi3 ui3 0 0 โˆ’bi4 ui4 for J = 2, 3, 4, or 5 respectively. Proof of Theorem 2 To study the structure of |F| as a polynomial (i) function of (n1 , . . . , nm ), we denote the (k, l)th entry of Ai by akl . Given a row map ฯ„ : {1, 2, . . . , d + J โˆ’ 1}  โ†’ {1, . . . , m}, we define a (d + J โˆ’ 1) ร— (ฯ„ (k)) whose kth row is given by the kth row of (d + J โˆ’ 1) matrix Aฯ„ = akl S6 SUPPLEMENTARY MATERIALS S7 A Pฯ„m(k) . For a power index (ฮฑ1 , . . . , ฮฑm ) with ฮฑi โˆˆ {0, 1, . . . , d + J โˆ’ 1} and i=1 ฮฑi = d + J โˆ’ 1, we denote ฯ„ โˆˆ (ฮฑ1 , . . . , ฮฑm ) if ฮฑi = #{j : ฯ„ (j) = i} for each i = 1, . . . , m. In terms of the construction of Aฯ„ , it says that ฮฑi rows of Aฯ„ are from the matrix Ai . According to the Leibniz formula for the determinant, |F| = m X X ni Ai = i=1 (โˆ’1) sgn(ฯƒ) ฯƒโˆˆSd+J โˆ’1 d+Jโˆ’1 m Y X k=1 (i) ni ak,ฯƒ(k) i=1 where ฯƒ is a permutation of {1, 2, . . . , d + J โˆ’ 1}, and sgn(ฯƒ) is the sign or signature of ฯƒ. Therefore, cฮฑ1 ,...,ฮฑm = X (โˆ’1) sgn(ฯƒ) ฯƒโˆˆSd+J โˆ’1 = X = d+Jโˆ’1 Y ak,ฯƒ(k) d+Jโˆ’1 Y ak,ฯƒ(k) (ฯ„ (k)) ฯ„ โˆˆ(ฮฑ1 ,...,ฮฑm ) k=1 X ฯ„ โˆˆ(ฮฑ1 ,...,ฮฑm ) ฯƒโˆˆSd+J โˆ’1 X X (โˆ’1) sgn(ฯƒ) (ฯ„ (k)) k=1 |Aฯ„ | ฯ„ โˆˆ(ฮฑ1 ,...,ฮฑm )  Proof of Lemma 2 To simplify the notations, we let is = s + 1, s = 0, . . . , d. That is, ฮฑ1 = J โˆ’ 1, ฮฑ2 = ยท ยท ยท = ฮฑd+1 = 1. There are only two types of ฯ„ โˆˆ (ฮฑ1 , . . . , ฮฑm ), such that, |Aฯ„ | may not be 0. ฯ„ of type I: There exist 1 โ‰ค k โ‰ค d, 2 โ‰ค l โ‰ค d + 1, and 1 โ‰ค q โ‰ค J โˆ’ 1, such that, ฯ„ (k) = 1 and ฯ„ (d + q) = l. Following a similar procedure as in the proof of Lemma S.5, we obtain |Aฯ„ | = d+1 Y d ei ยท |A13 | ยท (โˆ’1) |X1 [1, 2, . . . , d + 1]| ยท (โˆ’1) sgn(ฯ„ ) d Y xฯ„ (s)s ยท s=1 i=2 clq el ฯ„ of type II: ฯ„ (d + 1) = ยท ยท ยท = ฯ„ (d + J โˆ’ 1) = 1 and {ฯ„ (1), . . . , ฯ„ (d)} = {2, . . . , d + 1}. It can be verified that |Aฯ„ | = d+1 Y d ei ยท |A13 | ยท (โˆ’1) |X1 [1, 2, . . . , d + 1]| ยท (โˆ’1) sgn(ฯ„ ) d Y s=1 i=2 S7 xฯ„ (s)s S8 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL According to Theorem 2, X X |Aฯ„ | + |Aฯ„ | cฮฑ1 ,...,ฮฑm = ฯ„ of type I ฯ„ of type II ๏ฃซ d X d+1 d+1 X Y ei ยท |A13 | ยท (โˆ’1)d |X1 [1, 2, . . . , d + 1]| ยท ๏ฃญ = i=2 k=1 l=2 ฯ„ โˆˆSd+1 :ฯ„ (k)=1,ฯ„ (d+1)=l (โˆ’1)sgn(ฯ„ ) d Y s=1 = xฯ„ (s)s Jโˆ’1 X clq q=1 el X + = (โˆ’1)sgn(ฯ„ ) d Y s=1 ฯ„ โˆˆSd+1 :ฯ„ (d+1)=1 ๏ฃถ xฯ„ (s)s ๏ฃธ d Y d+1 Y ei ยท |A13 | ยท (โˆ’1) |X1 [1, 2, . . . , d + 1]| ยท d+1 Y ei ยท |A13 | ยท (โˆ’1)d |X1 [1, 2, . . . , d + 1]| ยท (โˆ’1)d |X1 [1, 2, . . . , d + 1]| d i=2 = X i=2 d+1 Y X ฯ„ โˆˆSd+1 (โˆ’1) sgn(ฯ„ ) xฯ„ (s)s s=1 ei ยท |A13 | ยท |X1 [1, 2, . . . , d + 1]|2 i=2 where Sd+1 is the set of permutations of {1, . . . , d + 1}. The general case with i0 , i1 , . . . , id can be obtained similarly.  Proof of Theorem 4 Suppose Rank(X1 ) = d + 1. Then there exist i0 , . . . , id โˆˆ {1, . . . , m}, such that, |X1 [i0 , i1 , . . . , id ]| = 6 0. According to Lemma S.4, f (p) can be regarded as an order-(J โˆ’ 1) polynomial of pi0 . Let pi0 = x โˆˆ (0, 1) and pi = (1โˆ’x)/(mโˆ’1) for i 6= i0 . Based on Lemma 2, f (p) can be written as d d+1   1โˆ’x 1โˆ’x Jโˆ’2 Jโˆ’1 + aJโˆ’2 x fi0 (x) = aJโˆ’1 x mโˆ’1 mโˆ’1  d+Jโˆ’2 d+Jโˆ’1  1โˆ’x 1โˆ’x + ยท ยท ยท + a1 x + a0 , where mโˆ’1 mโˆ’1 d Y X eiโ€ฒs |X1 [i0 , iโ€ฒ1 , . . . , iโ€ฒd ]|2 > 0 aJโˆ’1 = |Ai0 3 | {iโ€ฒ1 ,...,iโ€ฒd }โŠ‚{1,...,m}\{i0 } s=1 Therefore, limxโ†’1โˆ’ (1 โˆ’ x)โˆ’d x1โˆ’J fi0 (x) = (m โˆ’ 1)โˆ’d aJโˆ’1 > 0. That is, f (p) > 0 for pi0 = x close enough to 1 and pi = (1 โˆ’ x)/(m โˆ’ 1) for i 6= i0 . S8 SUPPLEMENTARY MATERIALS S9 In order to justify that the condition Rank(X1 ) = d+1 is also necessary, we only need to show that f (p) โ‰ก 0 if Rank(X1 ) โ‰ค d. Actually, for any (1) ฯ„ : {1, . . . , d + J โˆ’ 1} โ†’ {1, . . . , m}, we construct Aฯ„ as in the proof Qd (1) of Lemma S.5. Then |Aฯ„ | = s=1 xฯ„ (s)s ยท |Aฯ„ |. Similar as in the proof of Lemma S.5, for t = 1, . . . , d, we add xฯ„ (1)t (โˆ’eฯ„ (1) , . . . , โˆ’eฯ„ (d) , cฯ„ (d+1)1 , (1) . . . , cฯ„ (d+Jโˆ’1),Jโˆ’1 )T to the tth column of Aฯ„ . We denote the resulting (3) (1) (3) matrix by Aฯ„ . Note that |Aฯ„ | = |Aฯ„ |. We consider the sub-matrix (3) (3) Aฯ„ d which consists of the first d columns of Aฯ„ . For s โˆˆ ฯ„ โˆ’1 (ฯ„ (1)), (3) (3) the sth row of Aฯ„ d is simply 0. For s = 2, . . . , k, the sth row of Aฯ„ d is eฯ„ (s) (xฯ„ (s)1 โˆ’ xฯ„ (1)1 , . . . , xฯ„ (s)d โˆ’ xฯ„ (1)d ). For s = 1, . . . , J โˆ’ 1, the (d + s)th (3) row of Aฯ„ d is โˆ’cฯ„ (d+s)s (xฯ„ (d+s)1 โˆ’ xฯ„ (1)1 , . . . , xฯ„ (d+s)d โˆ’ xฯ„ (1)d ). We claim (3) (3) that Rank(Aฯ„ d ) โ‰ค d โˆ’ 1. Otherwise, if Rank(Aฯ„ d ) = d, then there exist i1 , . . . , id โˆˆ {2, . . . , d + J โˆ’ 1}, such that, the sub-matrix consisting of the (3) i1 th, . . . , id th rows of Aฯ„ d is nonsingular. Then the sub-matrix consisting of the ฯ„ (1)th, ฯ„ (i1 )th, . . . , ฯ„ (id )th rows of X1 is nonsingular, which implies (3) Rank(X1 ) = d + 1. The contradiction implies Rank(Aฯ„ d ) โ‰ค d โˆ’ 1. Then (3) |Aฯ„ | = 0 and thus |Aฯ„ | = 0 for each ฯ„ . Based on Theorem 2, |F| โ‰ก 0 and thus f (p) โ‰ก 0.  Proof of Theorem 5 Combining Theorem 1 and Theorem 4, it is straightforward that f (p) = 0 if Rank( X1 [{i | pi > 0}]) โ‰ค d. We only need to show that f (p) > 0 if Rank(X1 [{i | pi > 0}]) = d + 1. Due to Theorem 1, we only need to verify the case pi > 0, i = 1, . . . , m, because otherwise we may simply remove all support points with pi = 0. Suppose pi > 0, i = 1, . . . , m and Rank(X1 ) = d + 1. Then there exist i0 , . . . , id โˆˆ {1, . . . , m}, such that, |X1 [i0 , . . . , id ]| = 6 0. According to the proof of Theorem 4, for each i โˆˆ {i0 , . . . , id }, there exists an วซi โˆˆ (0, 1), such that, f (p) > 0 as long as pi = x โˆˆ (1 โˆ’ วซi , 1) and pj = (1 โˆ’ x)/(m โˆ’ 1) for j 6= i. On the other hand, for each i โˆˆ / {i0 , . . . , id }, if we denote the jth row of X1 by ฮฑj , j = 1, . . . , m, then ฮฑi = a0 ฮฑi0 + ยท ยท ยท + ad ฮฑid for some real numbers a0 , . . . , ad . Since ฮฑi 6= 0, then at least one ai 6= 0. Without any loss of generality, we assume a0 6= 0. Then it can be verified that |X1 [i, i1 , . . . , id ]| = 6 0 too. Following the proof of Theorem 4 again, for such an i โˆˆ / {i0 , . . . , id }, there also exists an วซi โˆˆ (0, 1), such that, f (p) > 0 as long as pi = x โˆˆ (1 โˆ’ วซi , 1) and pj = (1 โˆ’ x)/(m โˆ’ 1) for j 6= i. Let วซโˆ— = min{mini วซi , (m โˆ’ 1) mini pi , 1 โˆ’ 1/m}/2. For i = 1, . . . , m, denote ฮดi = (ฮดi1 , . . . , ฮดim )T โˆˆ S with ฮดii = 1 โˆ’ วซโˆ— and ฮดij = วซโˆ— /(m โˆ’ 1) for j 6= i. It can be verified that p = a1 ฮด1 + ยท ยท ยท + am ฮดm with ai = (pi โˆ’ วซโˆ— /(m โˆ’ 1))/(1 โˆ’ S9 S10 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL mวซ P โˆ— /(m โˆ’ 1)). By the choice of วซโˆ— , f (ฮดi ) > 0, ai > 0, i = 1, . . . , m, and  i ai = 1. Then f (p) > 0 according to Lemma S.6. Proof of Corollary 3 In order to check when a minimally supported design supported only on {x1 , x2 } is D-optimal, we add one more support point, that is, x3 . According to Theorem 2, Lemmas S.4, S.5, and 2, the objective function for a D-optimal approximate design on {x1 , x2 , x3 } is f (p1 , p2 , p3 ) = p1 p2 (c210 p1 + c120 p2 ) + p1 p3 (c201 p1 + c102 p3 ) + p2 p3 (c021 p2 + c012 p3 ) + c111 p1 p2 p3 , where c210 c120 c201 c102 c021 c012 c111 = = = = = = = 2 2 e2 g11 g12 (ฯ€11 ฯ€12 ฯ€13 )โˆ’1 (x1 โˆ’ x2 )2 > 0 2 2 e1 g21 g22 (ฯ€21 ฯ€22 ฯ€23 )โˆ’1 (x1 โˆ’ x2 )2 > 0 2 2 e3 g11 g12 (ฯ€11 ฯ€12 ฯ€13 )โˆ’1 (x1 โˆ’ x3 )2 > 0 2 2 e1 g31 g32 (ฯ€31 ฯ€32 ฯ€33 )โˆ’1 (x1 โˆ’ x3 )2 > 0 2 2 e3 g21 g22 (ฯ€21 ฯ€22 ฯ€23 )โˆ’1 (x2 โˆ’ x3 )2 > 0 2 2 e2 g31 g32 (ฯ€31 ฯ€32 ฯ€33 )โˆ’1 (x2 โˆ’ x3 )2 > 0 e1 (u22 u31 + u21 u32 โˆ’ 2b22 b32 )(x1 โˆ’ x2 )(x1 โˆ’ x3 ) + e2 (u12 u31 + u11 u32 โˆ’ 2b12 b32 )(x2 โˆ’ x1 )(x2 โˆ’ x3 ) + e3 (u12 u21 + u11 u22 โˆ’ 2b12 b22 )(x3 โˆ’ x1 )(x3 โˆ’ x2 ) Based on Theorem 10, the design p = (pโˆ—1 , pโˆ—2 , 0)T is D-optimal if and only if โˆ‚f (p)/โˆ‚f (p1 ) = โˆ‚f (p)/โˆ‚f (p2 ) โ‰ฅ โˆ‚f (p)/โˆ‚f (p3 ) Similar conclusions could be justified for x4 , . . . , xm if m โ‰ฅ 4.  Proof of Theorem 12 According to the solutions provided by the software Mathematica, the largest root of equation (S.10) after simplification is b2 21/3 (3b1 โˆ’ b22 ) A1/3 y1 = โˆ’ โˆ’ + (S.11) 3 3A1/3 3 ร— 21/3 where A = โˆ’27b0 + 9b1 b2 โˆ’ 2b32 + 33/2 (27b20 + 4b31 โˆ’ 18b0 b1 b2 โˆ’ b21 b22 + 4b0 b32 )1/2 , and bi = ci /c3 , i = 0, 1, 2. Note that the calculation of A and thus y1 should be regarded as operations among complex numbers since the expression under square root could be negative. Nevertheless, y1 at the end would be a real number. Thus we are able to provide the analytic solution maximizing f (p1 , p2 , p3 ).  Proof of Corollary 5 In order to check when a minimally supported design is D-optimal, we first add the four design points, that is, we consider S10 SUPPLEMENTARY MATERIALS S11 four design points (xi1 , xi2 ), i = 1, 2, 3, 4 and check when the D-optimal design could be constructed on the first three design points. Let X1 be defined as in Lemma 2. In this case, X1 is a 4 ร— 3 matrix. Following Theorem 2, Lemmas S.4, S.5, and 2, the objective function for a minimally supported design at (d, J, m) = (2, 3, 4) is f (p1 , p2 , p3 , p4 ) = + + + + c1111 p1 p2 p3 p4 |X1 [1, 2, 3]|2e1 e2 e3 ยท p1 p2 p3 (w1 p1 + w2 p2 + w3 p3 ) |X1 [1, 2, 4]|2e1 e2 e4 ยท p1 p2 p4 (w1 p1 + w2 p2 + w4 p4 ) |X1 [1, 3, 4]|2e1 e3 e4 ยท p1 p3 p4 (w1 p1 + w3 p3 + w4 p4 ) |X1 [2, 3, 4]|2e2 e3 e4 ยท p2 p3 p4 (w2 p2 + w3 p3 + w4 p4 ) 2 2 โˆ’1 where ei = ui1 + ui2 โˆ’ 2bi2 , wi = eโˆ’1 i gi1 gi2 (ฯ€i1 ฯ€i2 ฯ€i3 ) , i = 1, 2, 3, 4, and X ei ej (uk1 ul2 + uk2ul1 โˆ’ 2bk2 bl2 ) ยท |X1[i, j, k]| ยท |X1[i, j, l]| (S.12) c1111 = 1โ‰คi<jโ‰ค4 with {i, j, k, l} = {1, 2, 3, 4} given 1 โ‰ค i < j โ‰ค 4. According to Theorem 10, a minimally supported design p = (pโˆ—1 , pโˆ—2 , pโˆ—3 , 0)T in this case is D-optimal if and only if โˆ‚f /โˆ‚p1 = โˆ‚f /โˆ‚p2 = โˆ‚f /โˆ‚p3 โ‰ฅ โˆ‚f /โˆ‚p4 at p. Then โˆ‚f /โˆ‚p1 = โˆ‚f /โˆ‚p2 = โˆ‚f /โˆ‚p3 at p is equivalent to (1) of Corollary 5, and โˆ‚f /โˆ‚p4 โ‰ค โˆ‚f /โˆ‚p1 at p leads to (2) of Corollary 5 since the forms of โˆ‚f /โˆ‚pi at p, i = 1, 2, 3 will not change if more than four design points (i.e., m > 4) are added into consideration. Note that |X1 [1, 2, 3]|2e1 e2 e3 pโˆ—2 pโˆ—3 (2w1pโˆ—1 + w2 pโˆ—2 + w3 pโˆ—3 ) in (2) of Corollary 5 is equal to โˆ‚f /โˆ‚p1 at p. It could be replaced with |X1 [1, 2, 3]|2e1 e2 e3 pโˆ—1 pโˆ—3 (w1 pโˆ—1 + 2w2 pโˆ—2 +w3 pโˆ—3 ) (i.e., โˆ‚f /โˆ‚p2 ), or |X1 [1, 2, 3]|2e1 e2 e3 pโˆ—1 pโˆ—2 (w1 pโˆ—1 +w2pโˆ—2 +2w3pโˆ—3 ) (i.e., โˆ‚f /โˆ‚p3 ), since these three are all equal.  S.4 Maximization of fi (z) in Section 3 According to Theorem 6, fi (z) is an order-(d + J โˆ’ 1) polynomial of z. In other to determine its coefficients a0 , a1 , . . . , aJโˆ’1 as in (3.2), we need to calculate fi (0), fi (1/2), fi (1/3), . . . , fi (1/J), which are J determinants defined in (3.1). Note that Bโˆ’1 Jโˆ’1 is a matrix determined by J โˆ’ 1 only. For example, โˆ’1 B1 = 1 for J = 2, ๏ฃซ ๏ฃถ   3 โˆ’3 1 2 โˆ’1 4 โˆ’ 32 ๏ฃธ , B2โˆ’1 = , B3โˆ’1 = ๏ฃญ โˆ’ 52 โˆ’1 1 1 1 โˆ’1 2 2 S11 S12 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL ๏ฃซ ๏ฃถ 4 โˆ’1 19 ๏ฃท โˆ’7 11 2 6 ๏ฃท 7 โˆ’4 โˆ’1 ๏ฃธ 2 1 1 1 โˆ’2 2 6 4 โˆ’6 ๏ฃฌ โˆ’ 13 3 B4โˆ’1 = ๏ฃฌ 3 ๏ฃญ 2 1 โˆ’6 for J = 3, 4, or 5 respectively. Once a0 , . . . , aJโˆ’1 in (3.2) are determined, the maximization of fi (z) on z โˆˆ [0, 1] is numerically straightforward since it is a polynomial and its derivative fiโ€ฒ (z) is given by (1โˆ’z)d Jโˆ’1 X jaj z jโˆ’1 (1โˆ’z)Jโˆ’1โˆ’j โˆ’(1โˆ’z)dโˆ’1 Jโˆ’1 X (d+J โˆ’1โˆ’j)aj z j (1โˆ’z)Jโˆ’1โˆ’j j=0 j=1 (S.13) S.5 Exchange algorithm for D-optimal exact allocation in Section 4 Exchange algorithm for D-optimal allocation (n1 , . . . , nm )T given n > 0: 1โ—ฆ Start with an initial design n = (n1 , . . . , nm )T such that f (n) > 0. 2โ—ฆ Set up a random order of (i, j) going through all pairs {(1, 2), (1, 3), . . . , (1, m), (2, 3), . . . , (m โˆ’ 1, m)}. 3โ—ฆ For each (i, j), let c = ni + nj . If c = 0, let nโˆ—ij = n. Otherwise, there are two cases. Case one: 0 < c โ‰ค J, we calculate fij (z) as defined in (4.1) for z = 0, 1, . . . , c directly and find z โˆ— which maximizes fij (z). Case two: c > J, we first calculate fij (z) for z = 0, 1, . . . , J; secondly determine c0 , c1 , . . . , cJ in (4.2) according to Theorem 9; thirdly calculate fij (z) for z = J + 1, . . . , c based on (4.2); fourthly find z โˆ— maximizing fij (z) for z = 0, . . . , c. For both cases, we define nโˆ—ij = (n1 , . . . , niโˆ’1 , z โˆ— , ni+1 , . . . , njโˆ’1, c โˆ’ z โˆ— , nj+1 , . . . , nm )T Note that f (nโˆ—ij ) = fij (z โˆ— ) โ‰ฅ f (n) > 0. If f (nโˆ—ij ) > f (n), replace n with nโˆ—ij , and f (n) with f (nโˆ—ij ). 4โ—ฆ Repeat 2โ—ฆ โˆผ 3โ—ฆ until convergence, that is, f (nโˆ—ij ) = f (n) in step 3โ—ฆ for any (i, j). S12 SUPPLEMENTARY MATERIALS S.6 S13 More on Example 6: Polysilicon Deposition Study Table S.1 shows the list of experimental settings for the polysilicon deposition study. The factors are decomposition temperature(A), decomposition pressure(B), nitrogen flow (C), silane flow(D), setting time(E), cleaning method(F ). Column 1 provides original indices of experimental settings out of 729 distinct ones. For each experimental setting labelled โ€œ1โ€ in a design, 9 responses are collected (Phadke (1989)) and assumed to be independent. Table S.1: Polysilicon Deposition Study: Experimental Settings for the Original, Rounded Approximate, and D-optimal Exact Designs Index 1 76 89 98 111 116 122 130 167 181 199 201 243 258 286 290 291 294 299 301 313 331 336 339 350 365 376 384 394 399 407 421 461 464 495 501 505 521 522 536 557 558 569 588 625 631 641 671 679 A 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 B 1 1 2 2 2 2 2 2 3 3 3 3 3 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 1 1 1 1 1 1 1 1 2 2 2 2 2 3 3 C 1 3 1 1 2 2 2 2 1 1 2 2 3 1 2 2 2 2 3 3 3 1 1 1 1 2 2 3 3 3 1 1 3 3 1 1 1 2 2 2 3 3 1 1 3 3 3 1 2 D 1 3 1 2 1 1 2 3 1 3 2 2 3 2 2 3 3 3 1 1 2 1 2 2 3 2 3 1 2 3 1 2 1 1 1 2 3 1 1 3 2 2 1 3 1 2 3 3 1 E 1 2 3 3 1 3 2 2 2 1 1 1 3 2 3 1 1 2 1 2 3 3 1 2 3 2 3 2 3 1 1 3 1 2 3 2 1 3 3 2 3 3 1 1 2 1 1 2 2 F 1 1 2 2 3 2 2 1 2 1 1 3 3 3 1 2 3 3 2 1 1 1 3 3 2 2 1 3 1 3 2 1 2 2 3 3 1 2 3 2 2 3 2 3 1 1 2 2 1 Original 1 1 1 0 0 0 1 0 0 0 0 1 1 1 0 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 1 1 0 0 0 0 0 1 0 1 0 0 1 0 1 0 1 1 Rounded 0 0 0 0 0 1 0 0 0 1 1 0 0 0 1 0 1 0 0 1 0 1 1 1 1 0 0 0 1 1 0 0 1 1 1 0 0 0 0 1 0 1 1 0 0 0 0 0 0 D-optimal 0 0 0 1 1 0 0 1 1 0 1 0 1 0 0 0 0 1 1 0 1 1 1 0 0 1 0 0 0 0 1 0 0 0 0 1 1 1 0 0 0 0 0 0 1 0 1 0 0 Table S.2 shows the model matrix for the D-optimal design no found for the polysilicon deposition study. In this table, each 3-level factor is represented by its linear component and quadratic component. Thus there are level combinations of 12 predictors. S13 S14 JIE YANG, LIPING TONG AND ABHYUDAY MANDAL Table S.2: Polysilicon Deposition Study: Model Matrix for the D-optimal Design Index 98 111 130 167 199 243 294 299 313 331 336 365 407 501 505 521 625 641 A1 โˆ’1 โˆ’1 โˆ’1 โˆ’1 โˆ’1 โˆ’1 0 0 0 0 0 0 0 1 1 1 1 1 A2 1 1 1 1 1 1 โˆ’2 โˆ’2 โˆ’2 โˆ’2 โˆ’2 โˆ’2 โˆ’2 1 1 1 1 1 B1 0 0 0 1 1 1 โˆ’1 โˆ’1 โˆ’1 0 0 0 1 โˆ’1 โˆ’1 โˆ’1 0 0 B2 โˆ’2 โˆ’2 โˆ’2 1 1 1 1 1 1 โˆ’2 โˆ’2 โˆ’2 1 1 1 1 โˆ’2 โˆ’2 C1 โˆ’1 0 0 โˆ’1 0 1 0 1 1 โˆ’1 โˆ’1 0 โˆ’1 โˆ’1 โˆ’1 0 1 1 C2 1 โˆ’2 โˆ’2 1 โˆ’2 1 โˆ’2 1 1 1 1 โˆ’2 1 1 1 โˆ’2 1 1 S14 D1 0 โˆ’1 1 โˆ’1 0 1 1 โˆ’1 0 โˆ’1 0 0 โˆ’1 0 1 โˆ’1 โˆ’1 1 D2 โˆ’2 1 1 1 โˆ’2 1 1 1 โˆ’2 1 โˆ’2 โˆ’2 1 โˆ’2 1 1 1 1 E1 1 โˆ’1 0 0 โˆ’1 1 0 โˆ’1 1 1 โˆ’1 0 โˆ’1 0 โˆ’1 1 0 โˆ’1 E2 1 1 โˆ’2 โˆ’2 1 1 โˆ’2 1 1 1 1 โˆ’2 1 โˆ’2 1 1 โˆ’2 1 F1 0 1 โˆ’1 0 โˆ’1 1 1 0 โˆ’1 โˆ’1 1 0 0 1 โˆ’1 0 โˆ’1 0 F2 โˆ’2 1 1 โˆ’2 1 1 1 โˆ’2 1 1 1 โˆ’2 โˆ’2 1 1 โˆ’2 1 โˆ’2
10math.ST
Contextual Bandits with Stochastic Experts Rajat Sen1 , Karthikeyan Shanmugam2 , and Sanjay Shakkottai1 1 arXiv:1802.08737v1 [stat.ML] 23 Feb 2018 2 The University of Texas at Austin IBM Research, Thomas J. Watson Center February 27, 2018 Abstract We consider the problem of contextual bandits with stochastic experts, which is a variation of the traditional stochastic contextual bandit with experts problem. In our problem setting, we assume access to a class of stochastic experts, where each expert is a conditional distribution over the arms given a context. We propose upper-confidence bound (UCB) algorithms for this problem, which employ two different importance sampling based estimators for the mean reward for each expert. Both these estimators leverage information leakage among the experts, thus using samples collected under all the experts to estimate the mean reward of any given expert. This leads to instance dependent regret bounds of ยต)M log T /โˆ†), where ฮป(ยต ยต) is a term that depends on the mean rewards of the experts, โˆ† is the O (ฮป(ยต smallest gap between the mean reward of the optimal expert and the rest, and M quantifies the inforยต) is typically O(log N ). mation leakage among the experts. We show that under some assumptions ฮป(ยต We implement our algorithm with stochastic experts generated from cost-sensitive classification oracles and show superior empirical performance on real-world datasets, when compared to other state of the art contextual bandit algorithms. 1 Introduction Modern machine learning applications like recommendation engines [24, 11, 25], computational advertising [28, 10], A/B testing in medicine [29, 30] are inherently online. In these settings the task is to take sequential decisions that are not only profitable but also enable the system to learn better in future. For instance in a computational advertising system, the task is to sequentially place advertisements on usersโ€™ webpages with the dual objective of learning the preferences of the users and increasing the click-through rate on the fly. A key attribute of these systems is the well-known exploration (searching the space of possible decisions for better learning) and exploitation (taking decisions that are more profitable) trade-off. A principled method to capture this trade-off is the study of multi-armed bandit problems [12]. K-armed stochastic bandit problems have been studied for several decades. These are formulated as a sequential process, where at each time step any one of the K-arms can be selected. Upon selection of the k-th arm, the arm returns a stochastic reward with an expected reward of ยตk . Starting from the work of [21], a major focus has been on regret, which is the difference in the total reward that is accumulated from the genie optimal policy (one that always selects the arm with the maximum expected reward) from that of the chosen online policy. The current state-of-art algorithms achieve a regret of O((K/โˆ†) log T ) [12, 7, 4, 5], which is order-wise optimal [21]. Here, โˆ† corresponds to the gap in expected reward between the best arm and the next best one. Additional side information can be incorporated in this setting through the framework of contextual bandits. In the stochastic setting, it is assumed that at each time-step nature draws (x, r1 , ..., rK ) from a fixed but unknown distribution. Here, x โˆˆ X represents the context vector, while r1 , ..., rK are the rewards of the K-arms [22]. The context x is revealed to the policy-designer, after which she decides to choose an arm a โˆˆ {1, 2, ..., K}. Then, the reward ra is revealed to the policy-designer. In the computational advertising example, the context can be thought of as the browsing history, age, gender etc. of an user arriving in 1 the system, while r1 , ..., rK are generated according to the probability of the user clicking on each of the K advertisements. The task here is to learn a good mapping from the space of contexts X to the space of arms [K] = {1, 2, ..., K} such that when the decisions are taken according to that mapping, the mean reward observed is high. A popular model in the stochastic contextual bandits literature is the experts setting [3, 18, 22]. The task is to compete against the best expert in a class of experts ฮ  = {ฯ€1 , ..., ฯ€N}, where  each expert ฯ€ โˆˆ ฮ  is a function mapping X โ†’ [K]. The mean reward of an expert ฯ€ is defined as E rฯ€(X) , where X is the random variable denoting the context and the expectation is taken over the unknown distribution over (x, r1 , ..., rK ). The best expert is naturally defined as the expert with the highest mean reward. The expected difference in rewards of a genie policy that always chooses the best expert and the online algorithm employed by the policy-designer is defined as the regret. This problem has been well-studied in the literature, where a popular approach is to reduce the contextual bandit problem to supervised learning techniques through argmin-oracles [8].  p KT polylog(N ) at time This leads to powerful algorithms with instance-independent regret bounds of O T [3, 18]. In practice the class of experts are generated online by training cost-sensitive classification oracles [3, 18]. Once trained, the resulting classifiers/oracles can provide reliable confidence scores given a new context, especially if they are well-calibrated [17]. These confidence scores effectively are a K-dimensional probability vector, where the k th entry is the probability of the classifier/oracle choosing the k th arm as the best, given a context. Motivated by this observation, we propose a variation of the traditional experts setting, which we term contextual bandits with stochastic experts. We assume access to a class of stochastic experts ฮ  = {ฯ€1 , ..., ฯ€N }, which are not deterministic. Instead, each expert ฯ€ โˆˆ ฮ , is a conditional probability distribution over the arms given a context. For an expert ฯ€ โˆˆ ฮ  the conditional distribution is denoted by ฯ€V |X (v|x) where V โˆˆ [K] is the random variable denoting the arm chosen and X is the context. An additional benefit is that this setting allows us to derive regret bounds in terms of closeness of these soft experts quantified by divergence measures, rather than in terms of the total number of arms K. As before, the task is to compete against the expert in the class with the highest mean reward. The expected reward of a stochastic expert ฯ€ is defined as EX,V โˆผฯ€(V |X) [rV ], i.e the mean reward observed when the arm is drawn from the conditional distribution ฯ€(V |X). We propose upper-confidence (UCB) style algorithms for the contextual bandits with stochastic experts problem, that employ two importance sampling based estimators for the mean rewards under various experts. We prove instance-dependent regret guarantees for our algorithms. The main contributions of this paper are listed in the next section. 1.1 Main Contributions The contributions of this paper are three-fold: (i) (Importance Sampling based Estimators): The key components in our approach are two importance sampling based estimators for the mean rewards under all the experts. Both these estimators are based on the observation that samples collected under one expert can be reweighted by likelihood/importance ratios and averaged to provide an estimate for the mean reward under another expert. This sharing of information is termed as information leakage and has been utilized before under various settings [23, 27, 10]. The first estimator that we use is an adaptive variant of the well-known clipping technique, which was proposed in [27]. The estimator is presented in Eq. (3). However, we carefully adapt the clipping threshold in an online manner, in order to achieve regret guarantees. We also propose an importance sampling variant of the classical median of means estimator (see [26, 13]). This estimator is also designed to utilize the samples collected under all experts together to estimate the mean reward under any given expert. We define the estimator in Eq. (6). To the best of our knowledge, importance sampling has not been used in conjunction with the median of means technique in the literature before. We provide novel confidence guarantees for this estimator which depends on chi-square divergences between the conditional distributions under the various experts. This may be of independent interest. 2 (ii) (Instance Dependent Regret Bounds): We propose the contextual bandits with stochastic experts problem. We design two UCB based algorithms for this problem, based on the two importance sampling based estimators mentioned above. We show that utilizing the information leakage between the experts leads to regret guarantees that scale sub-linearly in N , the number of experts. The information leakage between any two experts in the first estimator is governed by a pairwise log-divergence measure (Def. 2). For the second estimator, chi-square divergences (Def. 3) characterize the leakage.   ยต We show that the regret of our UCB algorithm based on these two estimators scales as 1 : O ฮป(ยตโˆ†)M log T . Here, M is related to the largest pairwise divergence values under the two divergence measures used. โˆ† ยต) is a parameter that is the gap between the mean rewards of the optimal expert and the second best. ฮป(ยต only depends on the gaps between mean rewards of the optimum experts and various sub-optimal ones. It is a normalized sum of difference in squares of the gaps of adjacent sub-optimal experts ordered by their gaps. Under the assumption that the suboptimal gaps (except that of the second best arm) are uniformly ยต) is O(log N ) in expectation. We distributed in a bounded interval, we can show that the parameter ฮป(ยต define this parameter explicitly in Section 6. For the clipped estimator we show that M = M 2 log2 (1/โˆ†) where M is the largest pairwise log-divergence associated with the clipped estimator. For the median of means estimator, M = ฯƒ 2 where ฯƒ 2 is the largest pairwise chi-squared divergence. Naively treating each expert as an arm would lead to a regret scaling of O(N log T /โˆ†). However, this ignores p information leakage. Existing instance-independent bounds for contextual bandits scale as KT poly log(N ) [3]. Our problem dependent bounds have a near optimal dependence on โˆ† and does not depend on K, the numbers of arms. However, it depends on the divergence measure associated with the information leakage in the problem (M or ฯƒ parameters). Besides our analysis, we empirically show that this divergence based approach rivals or performs better than very efficient heuristics for contextual bandits (like bagging etc.) on real-world data sets. (iii) (Empirical Validation): We empirically validate our algorithm on three real world data-sets [20, 19, 1] against other state of the art contextual bandit algorithms [22, 3] implemented in Vowpal Wabbit [2]. In our implementation, we use online training of cost-sensitive classification oracles [8] to generate the class of stochastic experts. We show that our algorithms have better regret performance on these data-sets compared to the other algorithms. 2 Related Work Contextual bandits has been studied in the literature for several decades, starting with the simple setting of discrete contexts [12], to linear contextual bandits [16] and finally the general experts setting [18, 3, 22, 6, 9]. In this work, we focus on the experts setting. Contextual bandits with expertsโˆšwas first studied in the adversarial setting, where there are algorithms with the optimal regret scaling O( KT log N ) [6]. In this paper, we are more interested in the stochastic version of the problem, where the context and the rewards of the arms are generated from an unknown but fixed distribution. The first strategies to be explored in this setting and epsilon-greedy [22] style strategies that achieve a  โˆš were explore-then-commit regret scaling of O K log N T 2/3 in the instance-independent case. Following this there have been several p efforts to design adaptive algorithms that achieve a O( KT polylog(N )) instance-independent regret scaling. Notable among these are [18, 3]. These algorithms map the contextual bandit problem to supervised learning and assume access to cost-sensitive classification oracles. These algorithms have been heavily optimized in Vowpal Wabbit [2]. We study the contextual bandits with stochastic experts problem, where the experts are not deterministic functions mapping contexts to arms, but are conditional distributions over the arms given a context. 1 Tighter regret bounds are derived in Theorems 1 and 2. Here, we only mention the Corollaries of our approach, that are easy to state. 3 We show that we can achieve instance-dependent regret guarantees for this problem, that can scale as O ((M log N/โˆ†) log T ) under some assumptions. Here, โˆ† is the gap between the mean reward of the best expert and the second best and M is a divergence term between the experts. Our algorithms are based on importance sampling based estimators which leverage information leakage among stochastic experts. We use an adaptive clipped importance sampling estimator for the mean rewards of the experts, that was introduced in [27]. In [27], the estimator was studied in a best-arm/pure explore setting, while we study a cumulative regret problem where we need to adjust the parameters of the estimator in an online manner. In addition, we introduce an importance sampling based median of means style estimator in this paper, that can leverage the information leakage among experts. 3 Problem Setting and Definitions The general stochastic contextual bandit problem with K arms is defined as a sequential process for T discrete time-steps [22], where T is the time-horizon of interest. At each time t โˆˆ {1, 2, ยท ยท ยท , T } nature draws a vector (xt , r1 (t), ..., rK (t)) from an unknown but fixed probability distribution. Here, ri (t) โˆˆ [0, 1] is the reward of arm i. The context vector xt โˆˆ X is revealed to the policy-designer, whose task is then to choose an arm out the K possibilities. Only the reward rv(t) (t) of the chosen arm v(t), is then revealed to the policy-designer. We will use rv(t) in place of rv(t) (t) for notational convenience. โ‡ก(V |X) X V Y Figure 1: Bayesian Network denoting the joint distribution of the random variables at a given time-step, under our contextual bandit setting. X denotes the context, V denotes the chosen arm, while Y denotes the reward from the chosen arm that also depends on the context observed. The distribution of the reward given the chosen arm and the context, and the marginal of the context remain fixed over all time slots. However, the conditional distribution of the chosen arm given the context is dependent on the stochastic expert at that time-step. Stochastic Experts: We consider a class of stochastic experts ฮ  = {ฯ€1 , ยท ยท ยท , ฯ€N }, where each ฯ€i is a conditional probability distribution ฯ€V |X (v|x) where V โˆˆ [K] is the random variable denoting the arm chosen and X is the context. We will use the shorthand ฯ€i (V |X) to denote the conditional distribution corresponding to expert i, for notational convenience. The observation model at each time step t is as follows: (i) A context xt is observed. (ii) The policy-designer chooses a stochastic expert ฯ€k(t) โˆˆ ฮ . An arm v(t) is drawn from the probability distribution ฯ€k(t) (V |xt ), by the policy-designer. (iv) The stochastic reward yt = rv(t) is revealed. The joint distribution of the random variables X, V, Y denoting the context, arm chosen and reward observed respectively at time t, can be modeled by the Bayesian Network shown in Fig. 1. The joint distribution factorizes as follows, p(x, v, y) = p(y|v, x)p(v|x)p(x) (1), where p(y|v, x) (the reward distribution given the arm and the context), and p(x) (marginal distribution of the context) is determined by the natureโ€™s distribution and are fixed for all time-steps t = 1, 2, ..., T . On the other hand p(v|x) (distribution of the arm 4 chosen given the context) depends on the expert selected at each round. At time t, p(v|x) = ฯ€k(t) (v|x) that is the conditional distribution encoded by the stochastic expert chosen at time t. Now we are at a position to define the objective of the problem. Regret: The objective in our contextual bandit problem is to perform as well as the best expert in the class of experts. We will define pk (x, v, y) , p(y|v, x)ฯ€k (v|x)p(x) as the distribution of the corresponding random variables when the expert chosen is ฯ€k โˆˆ ฮ . The expected reward of expert k is now denoted by, ยตk = Epk (x,v,y) [Y ], where Ep(.) denotes expectation with respect to distribution p(.). The best expert is given by k โˆ— = arg maxkโˆˆ[N ] ยตk . The objective is to minimize the regret till time T , which is defined as  PT R(T ) = t=1 ยตโˆ— โˆ’ ยตk(t) , where ยตโˆ— = ยตkโˆ— . Note that this is analogous to the regret definition for the deterministic expert setting [22]. Let us define โˆ†k , ยตโˆ— โˆ’ ยตk as the optimality gap in terms of expected reward, for expert k. Let ยต , {ยต1 , ..., ยตN }. Now we will define some divergence metrics that will be important in describing our algorithms and theoretical guarantees. 3.1 Divergence Metrics In this section we will define some f -divergence metrics that will be important in analyzing our estimators. Similar divergence metrics were defined in [27] to analyze the clipped estimator in (3) in the context of a best arm identification problem. In addition to the divergence metric in [27], we will also define the chi-square divergence metric which will be useful in analyzing the median of means based estimator (6). First, we define conditional f -divergence. Definition 1. Let f (ยท) be a non-negative convex function such that f (1) = 0. For two joint distributions pX,Y (x, y) and qX,Y (x, y) (and the associated conditionals), the conditional f -divergence Df (pX|Y kqX|Y ) is given by: i h  pX|Y (X|Y ) . Df (pX|Y kqX|Y ) = EqX,Y f qX|Y (X|Y ) Recall that ฯ€i is a conditional distribution of V given X. Thus, Df (ฯ€i kฯ€j ) is the conditional f -divergence between the conditional distributions ฯ€i and ฯ€j . Note that in this definition the marginal distribution of X is the marginal of X given by natureโ€™s inherent distribution over the contexts. In this work we will be concerned with two specific f -divergence metrics that are defined as follows. Definition 2. (Mij measure) [27] Consider the function f1 (x) = x exp(x โˆ’ 1) โˆ’ 1. We define the following log-divergence measure: Mij = 1 + log(1 + Df1 (ฯ€i kฯ€j )), โˆ€i, j โˆˆ [N ]. The Mij -measures will be crucial in analyzing one of our estimators (clipped estimator) defined in Section 5. Definition 3. (ฯƒij measure) Df2 (ฯ€i kฯ€j ) is known as the chi-square divergence between the respective con2 ditional distributions, where f2 (x) = x2 โˆ’ 1. Let ฯƒij = 1 + Df2 (ฯ€i kฯ€j ). The ฯƒij -measures are important in analyzing our second estimator (median of means) defined in Section 5. 4 A Meta-Algorithm In this section, we propose a general upper-confidence bound (UCB) style strategy that utilizes the structure of the problem to converge to the best expert much faster than a naive UCB strategy that treats each expert as an arm of the bandit problem. One of the key observations in this framework is that rewards collected under one expert can give us valuable information about the mean under another expert, owing to the Bayesian Network factorization of the joint distribution of X, V and Y . We propose two estimators for the mean rewards of different experts, that leverage this information leakage among experts, through importance sampling. These estimators are defined in Section 5. We propose a meta-algorithm (Algorithm 1) that is designed to use these estimators and the corresponding confidence intervals, to control regret. 5 Algorithm 1 D-UCB: Divergence based UCB for contextual bandits with stochastic experts 1: 2: 3: 4: 5: 6: 7: For time step t = 1, observe context x1 and choose a random expert ฯ€ โˆˆ ฮ . Play an arm drawn from the conditional distribution ฯ€(V |x1 ). for t = 2, ..., T do Observe context xt Let k(t) = arg maxk Uk (t โˆ’ 1) , ยตฬ‚k (t โˆ’ 1) + sk (t โˆ’ 1). Select an arm v(t) from the distribution ฯ€k(t) (V |xt ). Observe the reward Y (t). end for Here, ยตฬ‚k (t) denotes an estimate for the mean reward for expert k at time t, while sk (t) denotes the upper confidence bound for the corresponding estimator at time t. We propose two estimators that utilize all the samples observed under various experts to provide an estimate for the mean reward under expert k. The first estimator denoted by ยตฬ‚ck (t) (Section 5, Eq. (3)) is a clipped importance sampling estimator inspired by [27]. If this estimator is used, then sk (t) is set as in Equation. (4). The second estimator denoted by ยตฬ‚m k (t) (Section 5, Eq. (6)) is a median of means based importance sampling estimator. If this estimator is used, then sk (t) is set as in Equation. (7). 5 Estimators and Confidence Bounds In this section we define two estimators for estimating the mean rewards under a given expert. Both these estimators can effectively leverage the information leakage between samples collected under various experts, through importance sampling. One key observation that enables us in doing so is the following equation,   ฯ€k (V |X) . (2) ยตk = Epj (x,v,y) Y ฯ€j (V |X) This has been termed as information leakage and has been leveraged before in the literature [27, 23, 10] in best-arm identification settings. Recall that the subscript pj (x, v, y) denotes that the expectation is taken under the joint distribution in (1), where p(v|x) = ฯ€j (v|x) i.e. under the distribution imposed by expert ฯ€j . However, even under this distribution we can technically estimate the mean reward under expert ฯ€k . The above equation is the motivation behind our estimators. Now, we will introduce our first estimator. Clipped Estimator: This estimator was introduced in [27] in the context of a pure exploration problem. Here, we analyze this estimator in a cumulative regret setting, where the parameters of the estimator need to be adjusted differently. Let ni (t) denote the number of times expert i has been invoked by Algorithm 1 till time t, for all i โˆˆ [N ]. We define the fraction ฮฝi (t) , ni (t)/t. We will also define Ti (t) as the subset of time-steps among {1, .., t}, in which the expert i was selected. Let ยตฬ‚ck (t) be the estimate of the mean reward of expert k from samples collected till time t. The estimator is given by, ยตฬ‚ck (t) =   N 1 X X 1 ฯ€k (Vj (s)|Xj (s)) ฯ€k (Vj (s)|Xj (s)) Yj (s) ร—1 โ‰ค 2 log(2/(t))Mkj . Zk (t) j=1 Mkj ฯ€j (Vj (s)|Xj (s)) ฯ€j (Vj (s)|Xj (s)) (3) sโˆˆTj (t) Here, Aj (s) is the value of the random variable A at time s drawn using expert j, where A can be the P r.vโ€™s X,Y or V . We set Zk (t) = j nj (t)/Mkj . (t) is an adjustable term which controls the bias-variance trade-off for the estimator. 6 Intuition: The clipped estimator is a weighted average of the samples collected under different experts, where each sample is scaled by the importance ratio as suggested by (2). We also clip the importance ratios which are larger than a clipper level. This clipping introduces bias but decreases variance. The clipper level is carefully chosen to trade-off bias and variance. The clipper level values and the weights are dependent on the divergence terms Mkj โ€™s. When the divergence Mkj is large, it means that the samples from expert j is not valuable for estimating the mean for expert k. Therefore, a weight of 1/Mkj is applied. Similarly, the clipper level is set at 2 log(2/(t))Mkj to restrict the aditive bias to (t). The upper confidence term in Algorithm 1 for the estimator ยตฬ‚ck (t) is chosen as, sck (t) = at time t, where ฮฒ(t) is such that, ฮฒ(t) log(2/ฮฒ(t)) โˆš = 3 ฮฒ(t) 2 c1 t log t Zk (t) . (4) We set c1 = 16 in our analysis. The upper confidence bound is derived using Lemma 1. Lemma 1. Consider the estimator in Eq. (3). We have the following confidence bound at time t,  2 ! Zk (t) ฮด2 t c . P (ยตk โˆ’ ฮด โˆ’ (t)/2 โ‰ค ยตฬ‚k (t) โ‰ค ยตk + ฮด) โ‰ฅ 1 โˆ’ 2 exp โˆ’ 8(log(2/(t)))2 t The lemma is implied by Theorem 4 in [27]. We include the proof in Section A in the appendix. The lemma shows that the clipped estimator can pool samples from all experts, in order to estimate the mean under expert k. The variance of the estimator depends on Zk (t), which depends on the log-divergences and number of times each expert has been invoked. Median of Means Estimator: Now we will introduce our second estimator which is based on the wellknown median of means technique of estimation. Median of means estimators are popular for statistical estimation when the underlying distributions are heavy-tailed [13]. The estimator for the mean under the k th expert at time t is obtained through the following steps: (i) We divide the total samples into l(t) = bc2 log(1/ฮด(t))c groups, such that the fraction of samples from each expert is preserved. We choose c2 = 8 for our analysis. Let us index the groups as r = 1, 2..., l(t). This means that there are at least bni (t)/l(t)c samples from expert i in each group. (ii) We calculate the empirical mean of expert k from the samples in each group through importance sampling. (iii) The median of these means is our estimator. (r) Now we will setup some notation. P Let Tj โІ {1, 2, ..., t} be the indices of the samples from expert j that lie in group r. Let W (r, t) = k i ni (r, t)/ฯƒki , where ni (r, t) is the number of samples from expert i in group P r. Let n(r, t) = i ni (r, t). Then the mean of expert k estimated from group r is given by, (r) ยตฬ‚k (t) = N X X 1 1 ฯ€k (Vj (s)|X(s)) Yj (s) . Wk (r, t) j=1 ฯƒ ฯ€ kj j (Vj (s)|Xj (s)) (r) (5) sโˆˆTj The median of means estimator for expert k is then given by,   (1) (l(t)) ยตฬ‚m (t) . k (t) , median ยตฬ‚k (t), ยท ยท ยท , ยตฬ‚k (6) Intuition: The mean of every group is a weighted average of samples from each expert, rescaled by the importance ratios. This is similar to the clipped estimator in Eq. (3). However, here the importance ratios are not clipped at a particular level. In this estimator, the bias-variance trade-off is controlled by taking the median of means from l(t) groups. The number of groups l(t) needs to be carefully set in-order to control the bias-variance trade-off. The upper confidence bound used in conjunction with this estimator at time t is given by, 7 sm k (t) 1 = Wk (t) r c3 log(1/ฮด(t)) t (7) where Wk (t) = minrโˆˆ[l(t)] Wk (r, t)/n(r, t) and ฮด(t) is set as 1/t2 in our algorithm. This choice is inspired by the following lemma. Lemma 2. Let ฮด(t) โˆˆ (0, 1). Then the estimator in (6) has the following confidence bound, ! r c3 log(1/ฮด(t)) 1 m โ‰ฅ 1 โˆ’ ฮด(t). (8) P |ยตฬ‚k (t) โˆ’ ยตk | โ‰ค Wk (t) t We provide the proof of this lemma in Section B in the appendix. The constant c3 is 64. 6 Theoretical Results In this section, we provide instance dependent regret guarantees for Algorithm 1 for the two estimators proposed - a) The clipped estimator (3) and b) The median of means estimator (6). Let โˆ† = mink6=kโˆ— โˆ†k be the gap in the expected reward between the optimum expert and the second best. We define a parameter ยต), later in the section, that depends only on the gaps of the expected rewards of various experts from the ฮป(ยต optimal one. ยต)M 2 log2 (6/โˆ†) log T /โˆ†). SimiFor the Algorithm 1 that uses the clipped estimator, regret scales as O(ฮป(ยต ยต)ฯƒ 2 log T /โˆ†). Here M is the maxlarly, for the case of the median of means estimator, regret scales as O(ฮป(ยต 2 imum log-divergence and ฯƒ is the maximum chi-square divergence between two experts, respectively. When the gaps between the optimum expert and sub-optimal ones are distributed uniformly at random in ยต) parameter is at most O(log N ) in expectation. In contrast, if the [ฮด2 , 1] (ฮด2 > 0), we show that the ฮป(ยต experts were used as separate arms, a naive application of UCB-1 [5] bounds would yield a regret scaling of  log T . This can be prohibitively large when the number of experts are large. O N โˆ† For ease of exposition of our results, let us re-index the experts using indices {(1), (2), ..., (N )} such that 0 = โˆ†(1) โ‰ค โˆ†(2) โ‰ค ... โ‰ค โˆ†(N ) . The regret guarantees for our clipped estimator are provided under the following assumption. Assumption 1. Assume the log-divergence terms (2) are bounded for all i, j โˆˆ [N ]. Let M = maxi,j Mij . Now we are at a position to present one of our main theorems that provides regret guarantees for Algorithm 1 using the estimator (3). Theorem 1. Suppose Assumption 1 holds. Then the regret of Algorithm 1 at time T using estimator (3), is bounded as follows: ! N โˆ’1  N X C1 M 2 log2 (6/โˆ†(k) ) log T  C1 M 2 log2 (6/โˆ†(N ) ) log T ฮณ(โˆ†(k) ) ฯ€2 X R(T ) โ‰ค + โˆ†(i) + 1โˆ’ โˆ†(N ) 3 i=2 โˆ†(k) ฮณ(โˆ†(k+1) ) k=2 Here, C1 is an universal constant and ฮณ(x) = 2 x . log2 (6/x) We defer the proof of Theorem 1 to Appendix A. We now present Theorem 2 that provides regret guarantees for Algorithm 1 using the estimator (6). The theorem holds under the following assumption. Assumption 2. Assume the chi-square terms (3) are bounded for all i, j โˆˆ [N ]. Let ฯƒ = maxi,j ฯƒij . Theorem 2. Suppose Assumption 2 holds. Then the regret of Algorithm 1 at time T using estimator (6), is bounded as follows: ! ! N โˆ’1 N X โˆ†2(k) C2 ฯƒ 2 log T C2 ฯƒ 2 log T ฯ€2 X R(T ) โ‰ค + 1โˆ’ 2 + โˆ†(i) โˆ†(N ) โˆ†(k) โˆ†(k+1) 3 i=2 k=2 Here, C2 is an universal constant. 8 0.6 1.0 1.0 0.8 0.9 Average Loss 0.8 Average Loss Average Loss 1.0 0.6 0.4 0.7 0.2 0.4 0 500 1000 1500 Time-Steps: T (a) 0.8 0 2500 5000 7500 Time-Steps: T 10000 0.6 0 (b) 5000 10000 15000 Time-Steps: T (c) 20000 (d) Figure 2: In all these plots, the progressive validation loss [3] till time T has been plotted as a function of time T . (a) Performance of the algorithms on the Drug Consumption dataset [19]. (b) Performance of the algorithms on the Stream Analytics dataset [1]. (c) Performance of the algorithms on the Letters dataset [20]. (d) Legend. . The proof of Theorem 2 has been deferred to Appendix B. Now, we will delve deeper into the instance dependent terms in Theorems 1 and 2.  of Theorem 1 and 2 imply the following corollary.  The proofs PN โˆ’1 โˆ†2(k) ยต) , 1 + k=2 1 โˆ’ โˆ†2 Corollary 1. Let ฮป(ยต . We have the following regret bounds: (k+1) (i) For Algorithm 1 with estimator (3), R(T ) โ‰ค O  M 2 log2 (6/โˆ†(2) ) log T โˆ†(2) (ii) Similarly for Algorithm 1 with estimator (6), R(T ) โ‰ค O  ฯƒ 2 log T โˆ†(2)   ยต), โˆ†1 min ฮป(ยต . (2)   ยต), โˆ†1 min ฮป(ยต . (2) Corollary 1 leads us to our next result. In Corollary 2 we show that when the โˆ† gaps are uniformly ยต) is O(log N ), in expectation. distributed, then the ฮป(ยต Corollary 2. Consider a generative model where โˆ†(3) โ‰ค ... โ‰ค โˆ†(N ) are the order statistics of N โˆ’ 2 random variables drawn i.i.d uniform over the interval [โˆ†(2) , 1]. Let pโˆ† denote the measure over these โˆ†โ€™s. Then we have the following:  2  M log N log2 (1/โˆ†(2) ) log T (i) For Algorithm 1 with estimator (3), Epโˆ† [R(T )] = O . โˆ†(2)  2  log T (ii) For Algorithm 1 with estimator (6), Epโˆ† [R(T )] = O ฯƒ logโˆ†N . (2) Remark 1. Note that our guarantees do not have any term containing K - the number of arms. This dependence is implicitly captured in the divergence terms among the experts. In fact when the number of arms K is very large, we expect our divergence based algorithms to perform comparatively better than other algorithms, whose guarantees explicitly depend on K. This phenomenon is observed in practice in ยต) our empirical validation on real world data-sets in Section 7. We also show empirically, that the term ฮป(ยต grows very slowly with the number of experts on real-world data-sets. This empirical result is included in Appendix D. 7 Empirical Results In this section, we will empirically test our algorithms on three real-world multi-class classification datasets, against other state of the art algorithms for contextual bandits with experts. Any multi-class classification dataset can be converted into a contextual bandit scenario, where the features are the contexts. At each time-step, the feature (context) of a sample point is revealed, following which the contextual bandit algorithm chooses one of the K classes, and the reward observed is 1 if its the correct class otherwise it is 0. This is bandit feedback as the correct class is never revealed, if not chosen. This method has been widely used to benchmark contextual bandit algorithms [9, 3], and is in fact implemented in Vowpal Wabbit [2]. 9 Our algorithm is run in batches. At the starting of each batch, we add experts trained on prior data through cost-sensitive classification oracles [8] and also update the divergence terms between experts, which are estimated from data observed so far. During each batch, Algorithm 1 is deployed with the current set of experts. The pseudo-code for this procedure is provided in Algorithm 2. We use XgBoost [15] and Algorithm 2 Batched D-UCB with cost-sensitive classification experts 1: 2: 3: 4: 5: 6: 7: 8: Let ฮ  = {ฯ€1 }, which is an expert that chooses arms randomly. For time steps t = 1 to 3K, choose an arm sampled from expert ฯ€1 . t = 3K + 1. Add experts to ฮ  trained on observed data and update divergences. while t <= T do โˆš for s = t to t + O( t) do Deploy Algorithm 1 with experts in ฮ . end for โˆš Let t = t + O( t). Add experts to ฮ  trained on observed data and update divergences. end while Logistic Regression in scikit-learn [14] with calibration, as the base classifiers for our cost-sensitive oracles. Bootstrapping is used to generate different experts. At the starting of each batch 4 new experts are added. The constants are set as c1 = 1, c2 = 4 and c3 = 2 in practice. All the settings are held fixed over all three data-sets, without any parameter tuning. We provide more details in Appendix D. In the appendix we also show that the gap dependent term in our theoretical bounds grows much slower compared to UCB-1 bounds (Fig. 3), as the number of experts increase in the stream analytics dataset [1]. An implementation of our algorithm can be found here 2 . We compare against Vopal Wabbit implementations of the following algorithms: (i) -greedy [22] - parameter set at โ€™โ€“epsilon 0.06โ€™. (ii) First (Greedily selects best expert) - parameter set at โ€™โ€“first 100โ€™. (iii) Online Cover [3] - parameter set at โ€™โ€“cover 5โ€™ (iv) Bagging (Simulates Thompson Sampling through bagged classifiers) - parameter set at โ€™โ€“bag 7โ€™. Drug Consumption Data: This dataset [19] is a part of UCI repository. It has data from 1885 respondents with 32 dimensional continuous features (contexts) and their history of drug use. There are 19 drugs under study (19 arms). For each entry, if the bandit algorithm selects the drug most recently used, the reward observed is 1, o.w. 0 reward is observed. The performance of the algorithms are shown in Fig. 2a. We see that D-UCB (Algorithm 2) with median of moments clearly performs the best in terms of average loss, followed by D-UCB with the clipped estimator. D-UCB with median of moments converges to an average loss of 0.4 within 1885 samples. Stream Analytics Data: This dataset [1] has been collected using the stream analytics client. It has 10000 samples with 100 dimensional mixed features (contexts). There are 10 classes (10 arms). For each entry, if the bandit algorithm selects the correct class, the reward observed is 1, o.w. 0 reward is observed. The performance of the algorithms are shown in Fig. 2b. In this data-set bagging performs the best closely followed by the two versions of D-UCB (Algorithm 2). Bagging is a strong competitor empirically, however this algorithm lacks theoretical guarantees. Bagging converges to an average loss of 8%, while D-UCB with median of moments converges to an average loss of 10%. Letters Data: This dataset [20] is a part of the UCI repository. It has 20000 samples of hand-written English letters, each with 17 hand-crafted visual features (contexts). There are 26 classes (26 arms) corresponding to 26 letters. For each entry, if the bandit algorithm selects the correct letter, the reward observed is 1, o.w. 0 reward is observed. The performance of the algorithms are shown in Fig. 2c. Both versions of D-UCB significantly outperform the others. The median of moments based version converges to an average loss of 0.62, while the clipped version converges to an average loss of 0.68. 2 https://github.com/rajatsen91/CB StochasticExperts 10 Conclusion We study the problem of contextual bandits with stochastic experts. We propose two UCB style algorithms, that use two different importance sampling estimators, which can leverage information leakage between the stochastic experts. We provide instance-dependent regret guarantees for our UCB based algorithms. Our algorithms show strong empirical performance on real-world datasets. We believe that this paper introduces an interesting problem setting for studying contextual bandits, and opens up opportunities for future research that may include better regret bounds for the problem and an instance-dependent lower-bound. Acknowledgment This work is partially supported by NSF SaTC 1704778, ARO W911NF-17-1-0359, and the US DoT supported D-STOP Tier 1 University Transportation Center. References [1] Stream analytics dataset. http://bit.ly/2HD8bNH. Accessed: 2018-2-10. [2] Vowpal wabbit. https://github.com/JohnLangford/vowpal_wabbit. Accessed: 2017-10-10. [3] Alekh Agarwal, Daniel Hsu, Satyen Kale, John Langford, Lihong Li, and Robert Schapire. Taming the monster: A fast and simple algorithm for contextual bandits. In International Conference on Machine Learning, pages 1638โ€“1646, 2014. [4] Shipra Agrawal and Navin Goyal. Analysis of thompson sampling for the multi-armed bandit problem. In Conference on Learning Theory, pages 39โ€“1, 2012. [5] Peter Auer. Using confidence bounds for exploitation-exploration trade-offs. Journal of Machine Learning Research, 3(Nov):397โ€“422, 2002. [6] Peter Auer, Nicolo Cesa-Bianchi, Yoav Freund, and Robert E Schapire. The nonstochastic multiarmed bandit problem. SIAM journal on computing, 32(1):48โ€“77, 2002. [7] Peter Auer and Ronald Ortner. Ucb revisited: Improved regret bounds for the stochastic multi-armed bandit problem. Periodica Mathematica Hungarica, 61(1-2):55โ€“65, 2010. [8] Alina Beygelzimer and John Langford. The offset tree for learning with partial labels. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 129โ€“138. ACM, 2009. [9] Alina Beygelzimer, John Langford, Lihong Li, Lev Reyzin, and Robert Schapire. Contextual bandit algorithms with supervised learning guarantees. In Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, pages 19โ€“26, 2011. [10] Leฬon Bottou, Jonas Peters, Joaquin Quinฬƒonero-Candela, Denis X Charles, D Max Chickering, Elon Portugaly, Dipankar Ray, Patrice Simard, and Ed Snelson. Counterfactual reasoning and learning systems: The example of computational advertising. The Journal of Machine Learning Research, 14(1):3207โ€“ 3260, 2013. [11] Djallel Bouneffouf, Amel Bouzeghoub, and Alda Lopes Gancฬงarski. A contextual-bandit algorithm for mobile context-aware recommender system. In International Conference on Neural Information Processing, pages 324โ€“331. Springer, 2012. [12] Seฬbastien Bubeck, Nicolo Cesa-Bianchi, et al. Regret analysis of stochastic and nonstochastic multiarmed bandit problems. Foundations and Trends R in Machine Learning, 5(1):1โ€“122, 2012. [13] Seฬbastien Bubeck, Nicolo Cesa-Bianchi, and Gaฬbor Lugosi. Bandits with heavy tail. IEEE Transactions on Information Theory, 59(11):7711โ€“7717, 2013. 11 [14] Lars Buitinck, Gilles Louppe, Mathieu Blondel, Fabian Pedregosa, Andreas Mueller, Olivier Grisel, Vlad Niculae, Peter Prettenhofer, Alexandre Gramfort, Jaques Grobler, et al. Api design for machine learning software: experiences from the scikit-learn project. arXiv preprint arXiv:1309.0238, 2013. [15] Tianqi Chen and Carlos Guestrin. Xgboost: A scalable tree boosting system. In Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining, pages 785โ€“794. ACM, 2016. [16] Wei Chu, Lihong Li, Lev Reyzin, and Robert E Schapire. Contextual bandits with linear payoff functions. In International Conference on Artificial Intelligence and Statistics, pages 208โ€“214, 2011. [17] Ira Cohen and Moises Goldszmidt. Properties and benefits of calibrated classifiers. In PKDD, volume 3202, pages 125โ€“136. Springer, 2004. [18] Miroslav Dudik, Daniel Hsu, Satyen Kale, Nikos Karampatziakis, John Langford, Lev Reyzin, and Tong Zhang. Efficient optimal learning for contextual bandits. arXiv preprint arXiv:1106.2369, 2011. [19] Elaine Fehrman, Awaz K Muhammad, Evgeny M Mirkes, Vincent Egan, and Alexander N Gorban. The five factor model of personality and evaluation of drug consumption risk. In Data Science, pages 231โ€“242. Springer, 2017. [20] Peter W Frey and David J Slate. Letter recognition using holland-style adaptive classifiers. Machine learning, 6(2):161โ€“182, 1991. [21] Tze Leung Lai and Herbert Robbins. Asymptotically efficient adaptive allocation rules. Advances in applied mathematics, 6(1):4โ€“22, 1985. [22] John Langford and Tong Zhang. The epoch-greedy algorithm for multi-armed bandits with side information. In Advances in neural information processing systems, pages 817โ€“824, 2008. [23] Finnian Lattimore, Tor Lattimore, and Mark D Reid. Causal bandits: Learning good interventions via causal inference. In Advances in Neural Information Processing Systems, pages 1181โ€“1189, 2016. [24] Lei Li, Dingding Wang, Tao Li, Daniel Knox, and Balaji Padmanabhan. Scene: a scalable two-stage personalized news recommendation system. In Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval, pages 125โ€“134. ACM, 2011. [25] Lihong Li, Wei Chu, John Langford, and Robert E Schapire. A contextual-bandit approach to personalized news article recommendation. In Proceedings of the 19th international conference on World wide web, pages 661โ€“670. ACM, 2010. [26] Gaฬbor Lugosi and Shahar Mendelson. Sub-gaussian estimators of the mean of a random vector. arXiv preprint arXiv:1702.00482, 2017. [27] Rajat Sen, Karthikeyan Shanmugam, Alexandros G. Dimakis, and Sanjay Shakkottai. Identifying best interventions through online importance sampling. In Proceedings of the 34th International Conference on Machine Learning, volume 70 of Proceedings of Machine Learning Research, pages 3057โ€“3066, International Convention Centre, Sydney, Australia, 2017. PMLR. [28] Liang Tang, Romer Rosales, Ajit Singh, and Deepak Agarwal. Automatic ad format selection via contextual bandits. In Proceedings of the 22nd ACM international conference on Conference on information & knowledge management, pages 1587โ€“1594. ACM, 2013. [29] Cem Tekin, Onur Atan, and Mihaela Van Der Schaar. Discover the expert: Context-adaptive expert selection for medical diagnosis. IEEE Transactions on Emerging Topics in Computing, 3(2):220โ€“234, 2015. [30] Cem Tekin, Jinsung Yoon, and Mihaela van der Schaar. Adaptive ensemble learning with confidence bounds for personalized diagnosis. In AAAI Workshop: Expanding the Boundaries of Health Informatics Using AI, 2016. 12 A Clipped Estimator As mentioned in Section 5, the motivating equation guiding the design of our estimators is Eq. (2). This equation tells us that even when the statistics of the samples observed are governed by the distribution of (X, V, Y ) under expert j, we can infer the mean of expert k. Such observations were made in [23, 27] in the context of best arm identification problems. Suppose we observe t samples under expert ฯ€j . Guided by Eq. (2), one might come up with the following naive importance sampled estimator for the mean under expert k (ยตk ): t ยตฬ‚k = ฯ€k (Vj (s)|Xj (s)) 1X Yj (s) . t s=1 ฯ€j (Vj (s)|Xj (s)) However, it is not possible to derive good confidence interval for the above estimator because even though the reward variable Y is bounded, the reweighing term ฯ€k (Vj (s)|Xj (s))/ฯ€j (Vj (s)|Xj (s)) can be unbounded and in some case heavy-tailed. The key idea is to come up with robust estimators that have good variance properties. One approach of controlling the variance of such estimators is to clip that the samples that are too large. This leads to the following clipped estimator [27]: t ยตฬ‚k = ฯ€k (Vj (s)|Xj (s)) 1X Yj (s) ร—1 t s=1 ฯ€j (Vj (s)|Xj (s))   ฯ€k (Vj (s)|Xj (s)) โ‰ค ฮทkj . ฯ€j (Vj (s)|Xj (s)) (9) The clipping makes the estimator biased, however it helps in controlling the variance. The clipper level ฮทkj which depends on the relationship between ฯ€k and ฯ€j needs to be set carefully to control the bias-variance trade-off. In [27], it has been shown that if the log-divergence measure Mkj (defined in (2)) is bounded, then a good choice is ฮทkj = 2 log(2/)Mkj , if we want an additive bias of at most (t)/2 (Theorem 3 in [27]). This idea can be generalized to estimating the mean of expert k, while observing samples from all the other experts. This leads to the clipped estimator in Eq. (3). Lemma 1 provides confidence guarantees for this estimator. The proof of this lemma follows from Theorem 4 in [27], but we include it here for completeness. In what follows, we will abbreviate Epj (.) [.] as Ej [.]. In this section let ยตฬ‚k (t) = ยตฬ‚ck (t). Proof of Lemma 1. Note that from Lemma 3 in [27] it follows that: Ej [ยตฬ‚k (t)] โ‰ค ยตk โ‰ค Ej [ยตฬ‚k (t)] + (t) . 2 (10) For the sake of analysis, let us consider the rescaled version ยตฬ„k (t) = (Zk (t)/t)ยตฬ‚k (t) which can be written as:   N ฯ€k (Vj (s)|Xj (s)) ฯ€k (Vj (s)|Xj (s)) 1XX 1 Yj (s) ร—1 โ‰ค 2 log(2/(t))Mkj . ยตฬ„k (t) = t j=0 Mkj ฯ€j (Vj (s)|Xj (s)) ฯ€j (Vj (s)|Xj (s)) (11) sโˆˆTj Since Yj (s) โ‰ค 1, we have every random variable in the sum in (11) bounded by 2 log(2/(t)) Let, ยตฬ„k = E[ยตฬ„k (t)]. Therefore by Chernoff bound, we have the following chain:   ฮด2 t P (|ยตฬ„k (t) โˆ’ ยตฬ„k | โ‰ค ฮด) โ‰ค 2 exp โˆ’ 8(log(2/(t)))2     t t t ฮด2 t =โ‡’ P |ยตฬ„k (t) โˆ’ ยตฬ„k |โ‰คฮด โ‰ค 2 exp โˆ’ Zk (t) Zk (t) Zk (t) 8(log(2/(t)))2     2 t ฮด t =โ‡’ P |ยตฬ‚k (t) โˆ’ ยตฬ‚k | โ‰ค ฮด โ‰ค 2 exp โˆ’ Zk (t) 8(log(2/(t)))2  2 ! ฮด2 t Zk (t) =โ‡’ P (|ยตฬ‚k (t) โˆ’ ยตฬ‚k | โ‰ค ฮด) โ‰ค 2 exp โˆ’ 8(log(2/(t)))2 t 13 (12) Now we can combine Equations (12) and (10) to obtain: ฮด2 t P (ยตk โˆ’ ฮด โˆ’ (t)/2 โ‰ค ยตฬ‚k (t) โ‰ค ยตk + ฮด) โ‰ฅ 1 โˆ’ 2 exp โˆ’ 8(log(2/(t)))2  Zk (t) t 2 ! Now, we will prove Theorem 1. Note that we will re-index the experts such that 0 = โˆ†(1) โ‰ค โˆ†(2) โ‰ค ... โ‰ค โˆ†(N ) . Note that throughout this proof Uk (t), ยตฬ‚k (t) and sk (t) in Algorithm 1 are defined as in Equations (3) and (4) respectively. Before we proceed let us prove some key lemmas. First we prove that with high enough probability the upper confidence bound estimate for the optimal expert k โˆ— is greater than the true mean ยตโˆ— . Lemma 3. We have the following confidence bound at time t, 1 . t2 P (Ukโˆ— (t) โ‰ค ยตโˆ— ) โ‰ฅ 1 โˆ’ Proof. We have the following chain,   1 3ฮฒ(t) P (Ukโˆ— (t) โ‰ฅ ยตโˆ— ) = P (ยตฬ‚kโˆ— (t) โ‰ฅ ยตโˆ— โˆ’ skโˆ— (t)) = P ยตฬ‚kโˆ— (t) โ‰ฅ ยตโˆ— โˆ’ โ‰ฅ 1 โˆ’ 2. 2 t The last inequality is obtained by setting ฮด = ฮฒ(t) and (t) = ฮฒ(t) in Lemma 1. Next we prove that for a large enough time t, the UCB estimate of the k th expert is less than that of ยตโˆ— . 2 2 k ) log T Lemma 4. We have the following confidence bound at time t > 144M log โˆ†(6/โˆ† , 2 k P (Uk (t) < ยตโˆ— ) โ‰ฅ 1 โˆ’ 1 . t2 Proof. We have the following chain,   3ฮฒ(t) P (Uk (t) > ยตโˆ— ) = P ยตฬ‚k (t) > ยตโˆ— โˆ’ 2   (i) โˆ†k โ‰ค P ยตฬ‚k (t) > ยตโˆ— โˆ’ 2   (ii) โˆ†k โ‰ค P ยตฬ‚k (t) > ยตk + 2 (iii) โ‰ค 1 . t2 2 2 k ) log T Here, (i) follows from the fact that Zkt(t) โ‰ฅ 1/M , t > 144M log โˆ†(6/โˆ† and the definition of ฮฒ(t). (ii) is 2 k by definition of โˆ†k . Finally the concentration bound in (iii) follows from Lemma 1. Note that Lemmas 3 and 4 together imply, P (k(t) = k) โ‰ค for k 6= k โˆ— and t > 144M 2 log2 (6/โˆ†k ) log T โˆ†2k . 14 2 t2 (13) Proof of Theorem 1. Let Tk = 144M 2 log2 (6/โˆ†(k) ) log T โˆ†2(k) for k = 2, .., N . The regret of the algorithm can be bounded as, R(T ) โ‰ค โˆ†(N ) TN + โ‰ค โˆ†(N ) TN + โ‰ค = N โˆ’3 X k=0 k=0 โˆ†(N โˆ’kโˆ’1) P (1{k(t) โˆˆ {(1), ..., (N โˆ’ k โˆ’ 1)}) + k=0 t=TN โˆ’k ๏ฃซ TN โˆ’kโˆ’1 ๏ฃญโˆ†(N โˆ’kโˆ’1) (TN โˆ’kโˆ’1 โˆ’ TN โˆ’k ) + 144M 2 log2 (6/โˆ†(N ) ) log T ฯ€2 + โˆ†(N ) 3 X N X ! โˆ†(i) P (1{k(t) = (i)}) i=N โˆ’k ๏ฃถ N X 2โˆ†(i) ๏ฃธ t2 t=TN โˆ’k i=N โˆ’k !  N ฮณ(โˆ†(N โˆ’kโˆ’1) ) ฯ€2 X 1โˆ’ + โˆ†(N ) TN + โˆ†(i) ฮณ(โˆ†(N โˆ’k) ) 3 i=2 ! N โˆ’1  N X X 144M 2 log2 (6/โˆ†(k) ) log T  ฮณ(โˆ†(k) ) โˆ†(i) + 1โˆ’ . โˆ†(k) ฮณ(โˆ†(k+1) ) i=2 144M 2 log2 (6/โˆ†(N โˆ’kโˆ’1) ) log T โˆ†(N โˆ’kโˆ’1) Here, ฮณ(x) = B N โˆ’3 X N โˆ’3 TNX โˆ’kโˆ’1 X  (14) k=2 2 x . log2 (6/x) Median of Means Estimator The median of means estimator is popular for estimating statistics under heavy-tailed distribution [13, 26]. We shall see that the median of means based estimator in Eq. (6) has good variance properties, when the chi-square divergence (Assumption 2) are bounded. Before proving Lemma 2, we will be establishing some intermediate results. Lemma 5. Consider the quantity ยตฬ‚rk (t) in Eq. (5). The variance of this quantity is upper bounded as follows: Var[ยตฬ‚rk (t)] โ‰ค 1 1 ฯƒ2 . โ‰ค 2 m Wk (t) m where m = bt/l(t)c. Proof. We have the following chain, Var[ยตฬ‚rk (t)]   N X X 1 1 ฯ€k (Vj (s)|X(s)) = 2 Var Yj (s) ร— ฯ€ (V (s)|X (s)) Wk (r, t)2 j=1 ฯƒkj j j j (r) sโˆˆTj โ‰ค 1 Wk (r, t)2 N X X j=1 sโˆˆT (r) 1 2 Var ฯƒkj  ฯ€k (Vj (s)|X(s)) ฯ€j (Vj (s)|Xj (s))  j m = Wk (r, t)2 1 =  m PN 1 nj (r,t) j=1 n(r,t).ฯƒkj โ‰ค 2 1 1 . m Wk (t)2 (15) Now, we can apply Chebyshev to conclude that for all r โˆˆ [l(t)], 15 P |ยตฬ‚rk (t) 1 โˆ’ ยตk | โ‰ค Wk (t) r 4 m ! โ‰ฅ 3 . 4 (16) Now we will prove Lemma 2. Proof of Lemma 2. In light of Eq. (16), the probability that the median is not within distance ยตk is bounded as, r ! 4 1 m P |ยตฬ‚k (t) โˆ’ ยตk | > Wk (t) m 1 Wk (t) q 4 m of โ‰ค P (Bin(l(t), 1/4) > l(t)/2) โ‰ค ฮด(t). This concludes the proof. Note that we will re-index the experts such that 0 = โˆ†(1) โ‰ค โˆ†(2) โ‰ค ... โ‰ค โˆ†(N ) . Note that throughout this proof Uk (t), ยตฬ‚k (t) and sk (t) in Algorithm 1 are defined as in Equations (6) and (7) respectively. Before we proceed let us prove some key lemmas. Now we prove lemmas analogous to Lemmas 4 and 3. Lemma 6. We have the following confidence bound at time t, P (Ukโˆ— (t) โ‰ค ยตโˆ— ) โ‰ฅ 1 โˆ’ 1 . t2 The proof follows directly from Lemma 2. Lemma 7. We have the following confidence bound at time t > P (Uk (t) < ยตโˆ— ) โ‰ฅ 1 โˆ’ 256ฯƒ 2 log T โˆ†2k , 1 . t2 Proof. We have the following chain, 1 P (Uk (t) > ยต ) = P ยตฬ‚k (t) > ยต โˆ’ Wk (t)   (i) โˆ†k โˆ— โ‰ค P ยตฬ‚k (t) > ยต โˆ’ 2   (ii) โˆ†k โ‰ค P ยตฬ‚k (t) > ยตk + 2 โˆ— โˆ— (iii) โ‰ค r 64 log t t ! 1 . t2 Here, (i) follows from the fact that Wk1(t) โ‰ค ฯƒ and t > concentration bound in (iii) follows from Lemma 2. 256ฯƒ 2 log T โˆ†2k . (ii) is by definition of โˆ†k . Finally the Note that Lemma 7 and 6 together imply that, P (k(t) = k) โ‰ค for k 6= k โˆ— and t > 256ฯƒ 2 log T โˆ†2k . 16 2 t2 (17) Proof of Theorem 2. Let Tk = R(T ) โ‰ค โˆ†(N ) TN + N โˆ’3 TNX โˆ’kโˆ’1 X k=0 t=TN โˆ’k 256ฯƒ 2 log T โˆ†2(k) for k = 2, .., N . The regret of the algorithm can be bounded as, P (1{k(t) โˆˆ {(1), ..., (N โˆ’ k โˆ’ 1)}) ร— โˆ†(N โˆ’kโˆ’1) + ! N X โˆ†(i) P (1{k(t) = (i)}) i=N โˆ’k ๏ฃถ N X 2โˆ†(i) ๏ฃธ ๏ฃญโˆ†(N โˆ’kโˆ’1) (TN โˆ’kโˆ’1 โˆ’ TN โˆ’k ) + โ‰ค โˆ†(N ) TN + t2 t=TN โˆ’k i=N โˆ’k k=0 ! ! N N โˆ’3 X โˆ†2(N โˆ’kโˆ’1) ฯ€2 X 512ฯƒ 2 log T + โˆ†(N ) TN + โ‰ค 1โˆ’ โˆ†(i) โˆ†(N โˆ’kโˆ’1) โˆ†2(N โˆ’k) 3 i=2 k=0 ! ! N โˆ’1 N X 512ฯƒ 2 log T โˆ†2(k) 512ฯƒ 2 log T ฯ€2 X = . + โˆ†(i) + 1โˆ’ 2 โˆ†(N ) 3 i=2 โˆ†(k) โˆ†(k+1) N โˆ’3 X ๏ฃซ TN โˆ’kโˆ’1 X (18) k=2 C Instance Dependent Terms In this section we devote our attention to the instance dependent terms in Theorems 1 and 2. We will first prove Corollary 1. Proof of Corollary 1. We will prove the two statements about the two estimators separately, (i) Going back to Lemma 4 in the proof of Theorem 1, we get that, P(Uk (t) < ยตโˆ— ) โ‰ฅ 1 โˆ’ when t > 144M 2 log2 (6/โˆ†(2) ) log T โˆ†2k 1 t2 . This simply follows from the fact that โˆ†(2) is the smallest gap. Therefore, the chain leading to Eq. (14) follows with the new definition of Tk = 144M 2 log2 (6/โˆ†(2) ) log T โˆ†2(k) . Hence, the regret of Algorithm 1 under estimator (3) is bounded as follows: 144M 2 log2 (6/โˆ†(2) ) log T R(T ) โ‰ค โˆ†(2) = 1+ N โˆ’1 X k=2 ยต)M 2 log2 (6/โˆ†(2) ) log T 144ฮป(ยต ฯ€2 + โˆ†(2) 3 N X 1โˆ’ โˆ†2(k) !! โˆ†2(k+1) ! โˆ†(i) . ฯ€2 + 3 N X ! โˆ†(i) i=2 (19) i=2 We can analyze the same terms in an alternate manner. From Eq. (14) in the proof of Theorem 1, it follows that the regret of Algorithm 1 under the clipped estimator is bounded by, ! ฯ€2 X R(T ) โ‰ค โˆ†(N ) T2 + โˆ†(i) . 3 i Using the definition of T2 in (14) we obtain: R(T ) โ‰ค 144M 2 log2 (6/โˆ†(2) ) log T 1 ร— . โˆ†(2) โˆ†(2) Combining the above equation with (19) we get the desired result. 17 (ii) Theorem 2 immediately implies that ยต)ฯƒ 2 log T ฯ€2 256ฮป(ยต + R(T ) โ‰ค โˆ†(2) 3 N X ! โˆ†(i) , i=2 for the median of means estimator. We can alternately analyze the regret as follows. From Eq. (18) in the proof of Theorem 2, it follows that the regret of Algorithm 1 under the median of means estimator is bounded by, ! ฯ€2 X R(T ) โ‰ค โˆ†(N ) T2 + โˆ†(i) . 3 i Using the definition of T2 in (18) we obtain: R(T ) โ‰ค 256ฯƒ 2 log T 1 ร— . โˆ†(2) โˆ†(2) Combining the equations above we get the desired result. Now we will work under the assumption that the gaps in the means of the experts are generated according to the generative model in Corollary 2. ยต)] = O(log N ). Proof of Corollary 2. In light of Corollary 1, we just need to prove that Epโˆ† [ฮป(ยต Now, we will assume that {โˆ†(i) } for i = 3, ..., N , are order statistics of N โˆ’ 2 i.i.d uniform r.vs over the interval [โˆ†(2) , 1]. Note that by Jensenโ€™s we have the following: " 2 #   โˆ†(k) โˆ†(k) 2 1โˆ’E . โ‰ค1โˆ’E โˆ†2(k+1) โˆ†(k+1) (20) Let X = โˆ†(k) and Y = โˆ†(k+1) for k โ‰ฅ 3. The joint pdf of X, Y is given by, (N โˆ’ 2)! f (x, y) = (k โˆ’ 1)!(N โˆ’ 3 โˆ’ k)!  x โˆ’ โˆ†(2) 1 โˆ’ โˆ†(2) kโˆ’1   y โˆ’ โˆ†(2) N โˆ’3โˆ’k 1 ร— 1โˆ’ . 1 โˆ’ โˆ†(2) (1 โˆ’ โˆ†(2) )2 Therefore, we have the following chain:  Z 1     Z y x โˆ’ โˆ†(2) kโˆ’1 y โˆ’ โˆ†(2) N โˆ’3โˆ’k X x (N โˆ’ 2)! 1 = ร— 1โˆ’ dxdy 2 Y y (k โˆ’ 1)!(N โˆ’ 3 โˆ’ k)! 1 โˆ’ โˆ† 1 โˆ’ โˆ† (1 โˆ’ โˆ† (2) (2) (2) ) y=โˆ†(2) x=โˆ†(2) Z 1 Z b (1 โˆ’ โˆ†(2) )a + โˆ†(2) (N โˆ’ 2)! kโˆ’1 N โˆ’3โˆ’k = ร— (a) (1 โˆ’ b) dadb (1 โˆ’ โˆ† )b + โˆ† (k โˆ’ 1)!(N โˆ’ 3 โˆ’ k)! (2) (2) b=0 a=0 Z 1 Z b a (N โˆ’ 2)! kโˆ’1 N โˆ’3โˆ’k ร— (a) (1 โˆ’ b) dadb โ‰ฅ b=0 a=0 b (k โˆ’ 1)!(N โˆ’ 3 โˆ’ k)! k = . k+1  E 18 Combining this with Eq (20) yields, Epโˆ† "N โˆ’1 X k=2 1โˆ’ โˆ†2(k) !# โˆ†2(k+1) N โˆ’1  X k2 โ‰ค1+ 1โˆ’ (k + 1)2 k=3  N โˆ’1  X 2k + 1 =1+ (k + 1)2  k=3 โ‰ค1+ N โˆ’1 X k=3 2 k+1 (21) โ‰ค 1 + 2 log N. D More on Empirical Results Instance Dependent Term In this section we provide more details about our empirical results under the following sub-headings. D-UCB Term UCB1 Term 200 150 100 50 0 25 50 75 100 Number of Experts: N Figure 3: We plot the instance-dependent terms from D-UCB bounds (the term in Theorem 2 involving the gaps (22)) and that of UCB-1 bounds (23) as the number of experts grows in the stream analytics dataset. It can be observed that the instance dependent term from D-UCB grows at a much slower pace with the number of experts, and in fact stops increasing after a certain point. Training of Stochastic Experts: In Algorithm 2, new experts are added before starting a new batch. These stochastic experts are classifying functions trained using cost-sensitive classification oracles on data observed so far, which uses the ideas in [8]. The key idea is to reduce the cost-sensitive classification problem into importance weighted classification, which can be solved using binary classifiers by providing weights to each samples. Suppose a context x is observed and Algorithm 2 chooses an expert ฯ€i and draws an arm a from the conditional distribution ฯ€i (V |x). Suppose the reward observed is r(a). Then the training sample (x, a) with a sample weight of r(a)/ฯ€i (a|x) is added to the dataset for training the next batch of experts. It has been shown that this importance weighing yields good classification experts. These classifiers can provide confidence scores for arms, given a context and hence can serve as stochastic experts. 4 different experts are added at the beginning of each batch, out of which three are trained by XgBoost as baseclassifier while one is trained by logistic regression. Diversity is maintained among the experts added by training them on bootstrapped versions of the data observed so far, and also through selecting different hyper-parameters. Note that the parameter selection scheme is not tuned per dataset, but is held fixed for all three datasets. 19 Estimating Divergence Parameters: Both our divergence metrics Mij โ€™s and ฯƒij โ€™s can be estimated from data observed so far, during a run of Algorithm 2. These divergences do not depend on the arm chosen, but only on the context distribution and the conditional distributions encoded by the expert. Therefore, they can be easily estimated from data observed. Suppose, n contexts have been observed so far {x1 , ..., xn }. We are interested in estimating ฯƒij that isPthe chi-square divergence between ฯ€i and ฯ€j . An estimator for n this would be the empirical mean (1/n) ร— k=1 Df2 (ฯ€i (.|xk )kฯ€j (.|xk )). Note that the distribution over the arms ฯ€j (.|xk ) is nothing but the confidence scores observed through evaluation of the classifying oracle ฯ€j on the features/context xi . In order to be robust, we use the median of means estimator instead of the simple empirical mean for estimating the divergences. Empirical Analysis of Instance Dependent terms: In this section we empirically validate that our instance dependent terms in Theorem 1 and 2 are indeed much smaller compared to corresponding terms in the UCB-1 [5] regret bounds, even in real problem where our generative assumptions do not hold. In order to showcase this, we plot the instance-dependent term in Theorem 2 which is given by, ! N โˆ’1 X โˆ†2(k) 1 1 1โˆ’ 2 + (22) โˆ†(k) โˆ†(k+1) โˆ†(N ) k=2 along with the corresponding term in UCB-1 bounds given by, N X k=2 1 , โˆ†(k) (23) as the number of stochastic experts grow in the stream dataset experiments in Section 7. The true means of the experts have been estimated in hindsight over the whole dataset. The plot is shown in Fig. 3. It can be observed that the term in the bounds of D-UCB grows at a much slower pace, and in fact stops increasing with the number of experts after a certain point. 20
2cs.AI
TRANSACTIONS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000โ€“000 S 0002-9947(XX)0000-0 arXiv:1601.08231v5 [math.RA] 22 Jan 2018 GENERALIZED NIL-COXETER ALGEBRAS OVER DISCRETE COMPLEX REFLECTION GROUPS APOORVA KHARE Abstract. We define and study generalized nil-Coxeter algebras associated to Coxeter groups. Motivated by a question of Coxeter (1957), we construct the first examples of such finite-dimensional algebras that are not the โ€˜usualโ€™ nil-Coxeter algebras: a novel 2-parameter type A family that we call N CA (n, d). We explore several combinatorial properties of N CA (n, d), including its Coxeter word basis, length function, and Hilbertโ€“Poincareฬ series, and show that the corresponding generalized Coxeter group is not a flat deformation of N CA (n, d). These algebras yield symmetric semigroup module categories that are necessarily not monoidal; we write down their Tannakaโ€“ Krein duality. Further motivated by the Broueฬโ€“Malleโ€“Rouquier (BMR) freeness conjecture [J. reine angew. math. 1998], we define generalized nil-Coxeter algebras N CW over all discrete real or complex reflection groups W , finite or infinite. We provide a complete classification of all such algebras that are finite-dimensional. Remarkably, these turn out to be either the usual nilCoxeter algebras, or the algebras N CA (n, d). This proves as a special case โ€“ and strengthens โ€“ the lack of equidimensional nil-Coxeter analogues for finite complex reflection groups. In particular, generic Hecke algebras are not flat deformations of N CW for W complex. Contents 1. Introduction and main results 2971 2. Background and motivation 2977 3. Proof of Theorem A: Tannakian formalism for semigroup categories 2979 4. Proof of Theorem B: Distinguished basis of words 2980 5. Proof of Theorem C, primitive elements, and categorification 2987 6. Proof of Theorem D: Finite-dimensional generalized nil-Coxeter algebras2990 Acknowledgments 2996 References 2996 1. Introduction and main results Throughout this paper, k will denote a fixed unital commutative ground ring. In this paper we define and study generalized nil-Coxeter algebras associated to Coxeter groups, and more generally to all discrete complex reflection groups, 2010 Mathematics Subject Classification. 20F55 (Primary), 20F05, 20C08 (Secondary). Key words and phrases. Complex reflection group, generalized Coxeter group, generalized nilCoxeter algebra, length function. c XXXX American Mathematical Society 2971 2972 APOORVA KHARE finite or infinite. These are algebras that map onto the associated graded algebras of (generic) Hecke algebras over complex reflection groups and of Iwahoriโ€“Hecke algebras over Coxeter groups. As we discuss, working with these algebras allows for a broader class than the corresponding reflection groups. We begin with real groups. Coxeter groups and their associated Hecke algebras play an important role in representation theory, combinatorics, and mathematical physics. Each such group is defined by a Coxeter matrix, i.e. a symmetric โ€œintegerโ€ matrix M := (mij )i,jโˆˆI with I finite and mii = 2 6 mij 6 โˆž โˆ€i 6= j. The Artin >0 monoid BM associated to M is generated by {Ti : i โˆˆ I} modulo the braid relations Ti Tj Ti ยท ยท ยท = Tj Ti Tj ยท ยท ยท for all i 6= j with mij < โˆž, with precisely mij factors on either side. The Artin group (or generalized braid group) BM is the group generated by these relations; typically we use {si : i โˆˆ I} to denote its generators. There are three well-studied algebras associated to the matrix M : the group algebra kW (M ) of the Coxeter group, the 0-Hecke algebra [Ca, No], and the nil-Coxeter algebra N C(M ) [FS] (also called the nilCoxeter algebra, nil Coxeter algebra, and nil Hecke ring in the literature). These are all free k-modules, with a โ€œCoxeter word basisโ€ {Tw : w โˆˆ W (M )} and length function `(Tw ) := `(w) in W (M ); in each of them the Ti satisfy a quadratic relation. In a sense, the usual nil-Coxeter algebras N C(M ) are better-behaved than all other generic Hecke algebras (in which Ti2 = ai Ti + bi for scalars ai , bi , see [Hum, Chapter 7]): the words Tw have unique lengths and form a monoid together with 0. Said differently, the algebras N C(M ) are the only generic Hecke algebras that are graded with Ti homogeneous of positive degree. Indeed, if deg Ti = 1 โˆ€i, then Q d โˆ’1 and di are N C(M ) has Hilbertโ€“Poincareฬ polynomial iโˆˆI [di ]q , where [d]q := qqโˆ’1 the exponents of W (M ). We now introduce the main objects of interest in the present work: generalized Coxeter matrices and their associated nil-Coxeter algebras (which are always Z>0 graded). Definition 1.1. Define a generalized Coxeter matrix to be a symmetric โ€˜integerโ€™ matrix M := (mij )i,jโˆˆI with I finite, 2 6 mij 6 โˆž โˆ€i 6= j, and mii < โˆž โˆ€i. Now fix such a matrix M . (1) Given an integer vector d = (di )iโˆˆI with di > 2 โˆ€i, define M (d) to be the matrix replacing the diagonal in M by d. (2) The generalized Coxeter group W (M ) is the quotient of the braid group ii BM2 by the order relations sm = 1 โˆ€i, where M2 is the Coxeter matrix i M ((2, . . . , 2)). We remark that we used the familiar Artin group BM2 associated to the Coxeter group W (M2 ); we could just as well have written BM , since the diagonals of the matrices M2 and M play no role in BM2 = BM . (3) The braid diagram, or Coxeter graph of M (or of W (M )) has vertices indexed by I, and for each pair i 6= j of vertices, mij โˆ’ 2 edges between them. (4) Define the corresponding generalized nil-Coxeter algebra as follows (with M2 as above): (1.2) >0 kBM khTi , i โˆˆ Ii 2 N C(M ) := = , (Ti Tj Ti ยท ยท ยท = Tj Ti Tj ยท ยท ยท, Timii = 0, โˆ€i 6= j โˆˆ I) (Timii = 0 โˆ€i) | {z } | {z } mij times mij times GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2973 where we omit the braid relation Ti Tj Ti ยท ยท ยท = Tj Ti Tj ยท ยท ยท if mij = โˆž. (5) Given d = (di )iโˆˆI as above, define WM (d) := W (M (d)) and N CM (d) := N C(M (d)). We are interested in the family of (generalized) nil-Coxeter algebras for multiple reasons: category theory, real reflection groups, complex reflection groups, and deformation theory. We elaborate on these motivations in this section and the next. 1.1. Tannakaโ€“Krein duality for semigroup categories. In [Kho], the representation categories Rep N C(An ) were used to categorify the Weyl algebra. For now we highlight two properties of generalized nil-Coxeter algebras N C(M ) which also have categorical content: (i) for no choice of coproduct on N C(M ) can it be a bialgebra (shown below); and (ii) every algebra N C(M ) is equipped with a cocommutative coproduct โˆ† : Ti 7โ†’ Ti โŠ— Ti for all i โˆˆ I. Viewed through the prism of representation categories, the coproduct in (ii) equips Rep N C(M ) with the structure of a symmetric semigroup category [ES, ยง13,14]. Note by (i) that the simple module k does not serve as a unit object, whence Rep N C(M ) is necessarily not monoidal. It is natural to apply the Tannakian formalism to such categories with โ€œtensorโ€ structure. We record the answer which, while not surprising once formulated, we were unable to find in the literature. Definition 1.3. A semigroup-tensor category is a semigroup category (C, โŠ—) which is also additive and such that โŠ— is bi-additive. Theorem A. Let A be an associative unital algebra over a field k, C := Rep A, and F : C โ†’ Veck the forgetful functor. (1) Any semigroup-tensor structure on C together with a tensor structure on F equips A with a coproduct โˆ† : A โ†’ A โŠ— A that is an algebra map. (2) If the semigroup-tensor structure on C is braided (respectively, symmetric), then (A, โˆ†) is a quasi-triangular (respectively, triangular) algebra with coproduct. This simply means there exists an invertible element R โˆˆ A โŠ— A satisfying the โ€˜hexagon relationsโ€™ (1 โŠ— โˆ†)R = R13 R12 , and such that โˆ† 1 โŠ— 1. op = Rโˆ†R โˆ’1 (โˆ† โŠ— 1)R = R13 R23 , . Triangularity means further that RR21 = Notice that generalized nil-Coxeter algebras are indeed examples of such triangular algebras, with a (cocommutative) coproduct but no counit. Such algebras are interesting in the theory of PBW deformations of smash product algebras; see Section 2. We also show below how to obtain an โ€œhonestโ€ symmetric tensor category from each algebra N C(M ), via a central extension. As noted above, Theorem A is in a sense โ€œexpectedโ€, and serves to act more as motivation. That the algebras N C(M ) provide concrete examples of symmetric, nonmonoidal semigroup-tensor categories is novel. The main results below now focus on the algebras N C(M ) themselves. 1.2. Real reflection groups and novel family of finite-dimensional nilCoxeter algebras. Our next result constructs a novel family of generalized nilCoxeter algebras of type A, which are finite-dimensional. Classifying the finitedimensional objects in Coxeter-type settings in algebra and combinatorics has been 2974 APOORVA KHARE a subject of tremendous classical and modern interest, including Weyl, Coxeter, and complex reflection groups, their nil-Coxeter and associated Hecke algebras; but also finite type quivers, Kleinian singularities, the McKayโ€“Slodowy correspondence, simple Lie algebras, etc. A very recent setting involves the classification of finite-dimensional Nichols algebras. Some of the prominent ingredients in the study of these algebras are common to the present work. See [GHV, HV1, HV2] for more details. Another famous recent classification is that of finite-dimensional pointed Hopf algebras [AnSc], which turn out to arise from generalized small quantum groups. With these motivations, our goal is to similarly classify all generalized nil-Coxeter algebras, and our next result presents the first novel family of such examples. We remark that in equation (1.2), in generalizing the โ€œorder relationsโ€ from Ti2 = 0 to Timii = 0 we were also motivated by another such setting: the classical work of Coxeter [Cox3], which investigated generalized Coxeter matrices M for which the group W (M ) is finite. Specifically, Coxeter considered the (type A) Artin braid group BAnโˆ’1 , and instead of quotienting by the relations s2i = 1 to obtain the symmetric group Sn , he worked with spi = 1 โˆ€i โˆˆ I. Coxeter was interested in computing for which (n, p) is the quotient group WAnโˆ’1 ((p, . . . , p)) a finite group, and what is its order. He showed (see also [As]) that WAnโˆ’1 ((p, . . . , p)) is finite if and only if n1 + p1 > 21 , in which case the size of the quotient group is 1โˆ’n  1 1 1 ยท n!/nnโˆ’1 . Coxeterโ€™s result was extended by Koster in his thesis + โˆ’ n p 2 [Ko] to completely classify the โ€œgeneralized Coxeter groupsโ€ W (M ) that are finite. These turn out to be precisely the finite Coxeter groups and the Shephard groups. Parallel to the above classical works, we wish to understand for which matrices M is the algebra N C(M ) finitely generated as a k-module. If W (M ) is a Coxeter group, then dim N C(M ) = |W (M )|. Few other answers are known. For instance, Marin [Mar] has shown that the algebra N CA2 ((m, n)) is not finitely generated when m, n > 3. However, apart from the usual nil-Coxeter algebras, to our knowledge no other finitely generated algebras N C(M ) were known to date. In the following result, following Coxeterโ€™s construction in type A above, we exhibit the first such finite-dimensional family of algebras N C(M ). Theorem B. Given integers n > 1 and d > 2, define the k-algebra (1.4) N CA (n, d) := N CAn ((2, . . . , 2, d)). In other words, N CA (n, d) is generated by T1 , . . . , Tn , with relations: (1.5) (1.6) (1.7) โˆ€ 0 < i < n; Ti Ti+1 Ti = Ti+1 Ti Ti+1 , Ti Tj = Tj Ti , T12 = ยทยทยท = 2 Tnโˆ’1 = Tnd โˆ€ |i โˆ’ j| > 1; = 0. Then N CA (n, d) is a free k-module, with k-basis of n!(1 + n(d โˆ’ 1)) generators {Tw : w โˆˆ Sn } t {Tw Tnk Tnโˆ’1 Tnโˆ’2 ยท ยท ยท Tm+1 Tm : w โˆˆ Sn , k โˆˆ [1, dโˆ’1], m โˆˆ [1, n]}. In particular, for all l โˆˆ [1, n โˆ’ 1], the subalgebra Rl generated by T1 , . . . , Tl is isomorphic to the usual nil-Coxeter algebra N CAl ((2, . . . , 2)). GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2975 Remark 1.8. We adopt the following notation in the sequel without further reference: let (1.9) wโ—ฆ โˆˆ Sn+1 , wโ—ฆ0 โˆˆ Sn , wโ—ฆ00 โˆˆ Snโˆ’1 denote the respective longest elements, where the symmetric group Sl+1 corresponds to the k-basis of the algebra Rl for l = n โˆ’ 2, n โˆ’ 1, n. The algebras N CA (n, d) have not been studied previously for d > 2, and we begin to explore their properties. When d = 2, N CA (n, d) specializes to the usual nilCoxeter algebra of type An . In this vein, we present three properties of N CA (n, d) akin to the usual nil-Coxeter algebras. Theorem C. Fix integers n > 1 and d > 2. (1) The algebra N CA (n, d) has a length function that restricts to the usual length function `Anโˆ’1 on Rnโˆ’1 ' N CAnโˆ’1 ((2, . . . , 2)) (from Theorem B), and (1.10) `(Tw Tnk Tnโˆ’1 ยท ยท ยท Tm ) = `Anโˆ’1 (w) + k + n โˆ’ m, for all w โˆˆ Sn , k โˆˆ [1, d โˆ’ 1], and m โˆˆ [1, n]. (2) There is a unique longest word Twโ—ฆ0 Tndโˆ’1 Tnโˆ’1 ยท ยท ยท T1 of length ln,d := `Anโˆ’1 (wโ—ฆ0 ) + d + n โˆ’ 2. (3) If k is a field, then N CA (n, d) is local, with unique maximal ideal m generated by T1 , . . . , Tn . For all k, the ideal m is nilpotent with m1+ln,d = 0. We also study the algebra N CA (n, d) in connection to Khovanovโ€™s categorification of the Weyl algebra. See Proposition 5.6 below. 1.3. Complex reflection groups and BMR freeness conjecture. Determining the finite-dimensionality of the algebras N C(M ) is strongly motivated by the study of complex reflection groups and their Hecke algebras. Recall that such groups were enumerated by Shephardโ€“Todd [ST]; see also [Coh, LT]. Subsequently, Popov [Pop1] classified the infinite discrete groups generated by affine unitary reflections; in the sequel we will term these infinite complex reflection groups. For more on these groups, see e.g. [BS, Hug1, Hug2, Mal, ORS, ReS] and the references therein. For complex reflection groups, an important program is the study of generic Hecke algebras over them, as well as the associated BMR freeness conjecture of Broueฬ, Malle, and Rouquier [BMR1, BMR2] (see also the recent publications [Et, Lo, Mar, MP] and the thesis [Ch]). This conjecture connects the dimension of a generic Hecke algebra to the order of the underlying reflection group. Here we will study this connection for the corresponding nil-Coxeter algebras, which we define as follows given [Be, BMR2]. Definition 1.11. Suppose W is a discrete (finite or infinite) complex reflection group, together with a finite generating set of complex reflections {si : i โˆˆ I}, the ii order relations sm = 1 โˆ€i, a set of braid relations {Rj : j โˆˆ J} โ€“ each involving i words with at least two distinct reflections si โ€“ and for the infinite non-Coxeter complex reflection groups W listed in [Mal, Tables I, II], one more order relation R0m0 = 1. Now define I0 := I t {0} for these infinite non-Coxeter complex reflection 2976 APOORVA KHARE groups W , and I0 := I otherwise. Given an integer vector d โˆˆ NI0 with di > 2 โˆ€i, define the corresponding generalized nil-Coxeter algebra to be (1.12) N CW (d) := ({Rj0 , j โˆˆ khTi , i โˆˆ Ii , = 0 โˆ€i โˆˆ I, (R00 )d0 = 0) J}, Tidi where the braid relations Rj are replaced by the corresponding relations Rj0 in the alphabet {Ti : i โˆˆ I}, and similarly for R00 if R0m0 = 1 in W . There is also the notion of the corresponding braid diagram as in [BMR2, Tables 1โ€“4] and [Mal, Tables I, II]; this is no longer always a Coxeter graph. Note by [Pop1, ยง1.6] that in the above definition, one has to work with a specific presentation for complex reflection groups, as there is no canonical (minimal) set of generating reflections. See [Ba] for related work. There is no known finite-dimensional generalized nil-Coxeter algebra associated to a finite complex reflection group. Indeed, Marin mentions in [Mar] that a key difference between real and complex reflection groups W is the lack of nil-Coxeter algebras of dimension precisely |W | for the latter. This was verified in some cases for complex reflection groups in loc. cit. Our final result shows this assertion โ€“ and in fact a stronger statement โ€“ for all discrete finite and infinite, real and complex reflection groups. Even stronger (a priori ): we provide a complete classification of finite-dimensional generalized nil-Coxeter algebras for all such groups. Notice by [Pop1, Theorem 1.4] that it suffices to consider only the groups whose braid diagram is connected. Theorem D. Suppose W is any irreducible discrete real or complex reflection group. In other words, W is a real reflection group with connected braid diagram, or a complex reflection group with connected braid diagram and presentation given as in [BMR2, Tables 1โ€“4], [Mal, Tables I, II], or [Pop1, Table 2]. Also fix an integer vector d with di > 2 โˆ€i (including possibly for the additional order relation as in [Mal]). Then the following are equivalent: (1) The generalized nil-Coxeter algebra N CW (d) is finitely generated as a kmodule. (2) Either W is a finite Coxeter group and di = 2 โˆ€i, or W is of type An and d = (2, . . . , 2, d) or (d, 2, . . . , 2) for some d > 2. (3) The ideal m generated by {Ti : i โˆˆ I} is nilpotent. If these assertions hold, there exists a length function and a unique longest element in N CW (d), say of length l; now m1+l = 0. In other words, the only finite-dimensional examples (when k is a field) are the usual nil-Coxeter algebras, and the algebras N CA (n, d). Note also that all of the above results are characteristic-free. A key tool in proving both Theorems B and D is a diagrammatic calculus, which is akin to crystal theory from combinatorics and quantum groups. 1.4. Further questions and Organization of the paper. To our knowledge, the algebras N CA (n, d) for d > 2 are a novel construction โ€“ and in light of Theorem D, the only finite-dimensional generalized nil-Coxeter algebras other than the โ€˜usualโ€™ ones. In particular, a further exploration of their properties is warranted. We conclude this section by discussing some further directions. GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2977 (1) Nil-Coxeter algebras are related to flag varieties [BGG, KK], categorification [Kho, KL], and symmetric function theory [BSS]. Also recall, the divided difference operator representation of the usual type A nil-Coxeter algebra N CA (n, 2) is used to define Schubert polynomials [FS, LS], and the polynomials the Ti simultaneously annihilate are precisely the symmetric polynomials. It will be interesting to determine if N CA (n, d), d > 2 has a similar โ€œnaturalโ€ representation as operators on a polynomial ring; and if so, to consider the polynomials one obtains analogously. (See [Mar] for a related calculation.) We observe here that for d > 2, the algebra N CA (n, d) does not โ€œcome fromโ€ a finite reflection group, as it is of larger dimension than the corresponding generalized Coxeter group, by equation (2.1) below. (2) Given both the connection to Coxeter groups as well as the crystal methods used below, it will be interesting to explore if the algebras N CA (n, d) are connected to crystals over some Lie (super)algebra. (3) Our proof of Theorem D below involves a case-by-case argument, running over all discrete complex reflection groups. A type-free proof of this result would be desirable. The paper is organized as follows. In Section 2 we elaborate on our motivations and make additional remarks. In the following four sections we prove, in turn, the four main theorems above. 2. Background and motivation In this section we elaborate on some of the aforementioned motivations for studying generalized nil-Coxeter algebras and their finite-dimensionality. First, these algebras are interesting from a categorical perspective, as their module categories are symmetric semigroup-tensor categories (see Definition 1.3) but are not monoidal. We will discuss in the next section a Tannakaโ€“Krein duality for such categories, as well as a central extension to a symmetric tensor category. The second motivation comes from real reflection groups: we provide a novel family of finite-dimensional algebras N CA (n, d) of type A (akin to the work of Coxeter [Cox3] and Koster [Ko]). In this context, it is remarkable (by Theorem D) that the algebras N CA (n, d) and the usual nil-Coxeter algebras N CW ((2, . . . , 2)) are the only finite-dimensional examples. As Theorem C shows, the algebras N CA (n, d) for d > 2 are similar to their โ€œusualโ€ nil-Coxeter analogues for d = 2. Note however that these algebras also differ in key aspects. See Theorem 5.2 and Proposition 5.3, which show in particular that for N CA (n, d) with d > 2, there are multiple โ€œmaximalโ€ words, i.e., words killed by left- and right-multiplication by every generator Ti . A more fundamental difference arises out of considerations of flat deformations, which we make precise in the remarks around equation (2.1) below. Our third motivation comes from complex reflection groups and is of much recent interest: the BMR freeness conjecture, which discusses the equality of dimensions of generic Hecke algebras and (the group algebra of) the underlying finite complex reflection group. In this paper we study the associated graded algebra, i.e. where all deformation parameters are set to zero. As shown by Marin [Mar] in some of the cases, non-Coxeter reflection groups do not come equipped with finite-dimensional nil-Coxeter analogues. We make this precise in a strong way in 2978 APOORVA KHARE Theorem D above, for all complex reflection groups W . In particular, Theorem D shows that generic Hecke algebras are not flat deformations of their underlying (associated graded) nil-Coxeter analogues for complex W . This is a property shared by the algebras N CA (n, d) for d > 2 (but not by Iwahoriโ€“Hecke algebras of Coxeter groups W = W (M ), which are flat deformations of N C(M )). Indeed, if Mn,d denotes the generalized Coxeter matrix corresponding to N CA (n, d), then we claim that: (2.1) ( (n + 1)!, if d > 2 is even, dim N CA (n, d) = n!(1 + n(d โˆ’ 1)) > |W (Mn,d )| = 1, if d > 2 is odd. To see (2.1), if mij is odd for any generalized Coxeter matrix M = M (d), then si , sj are conjugate in W (M ), whence sgi = sgj = 1 in W (M ) for g = gcd(di , dj ). On the other hand, N CM (d) surjects onto the nil-Coxeter algebra N CM ((2, . . . , 2)) if di > 2 โˆ€i. Now if di , dj > 2 are coprime, say, then si generates the trivial subgroup of W (M ), while Ti does not vanish in N C(M ). The generic Hecke algebras discussed above fit in a broader framework of deformation theory, which provides a fourth motivation behind this paper (in addition to the question of flatness discussed above). The theory of flat/PBW deformations of associative algebras is an area of sustained activity, and subsumes Drinfeld Hecke/orbifold algebras [Dr], graded affine Hecke algebras [Lu], symplectic reflection algebras and rational Cherednik algebras [EG], infinitesimal and other Hecke algebras, and other programs in the literature. We also highlight the program of Shepler and Witherspoon; see [SW1, SW2] and the references therein. In all of these settings, a bialgebra A (usually a Hopf algebra) acts on a vector space V and hence on a quotient SV of its tensor algebra, and one characterizes the deformations of this smash-product algebra A n SV which are flat, also termed the โ€œPBW deformationsโ€. In this regard, the significance of the generalized nil-Coxeter algebras N C(M ) is manifold. First, the above bialgebra settings were extended in recent work [Kha] to the framework of โ€œcocommutative algebrasโ€ A, which also include the algebras N CW (d). Moreover, we characterized the PBW deformations of A n Sym(V ), thereby extending in loc. cit. the PBW theorems in the previously mentioned works. The significance of our framework incorporating A = N CW (d) along with the previously studied algebras, is that the full Hopf/bialgebra structure of A โ€“ specifically, the antipode or even counit โ€“ is not required in order to characterize the flat deformations of A n Sym(V ). Coming to finite-dimensionality, it was shown in the program of Shepler and Witherspoon (see e.g. [SW2]), and then in [Kha], that when the algebra A with coproduct is finite-dimensional over a field k, it is possible to characterize the graded k[t]-deformations of A n Sym(V ), whose fiber at t = 1 has the PBW property. For A = N CW (d), this deformation-theoretic consideration directly motivates our classification result in Theorem D. We conclude with a third connection to the aforementioned active program on PBW deformations. We studied in [Kha] the case when (A, m, โˆ†) is local with โˆ†(m) โŠ‚ m โŠ— m. In this setting, if m is a nilpotent two-sided ideal, then one obtains a lot of information about the deformations of A n Sym(V ), including understanding the PBW deformations, as well as their center, abelianization, and GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2979 modules, especially the simple modules. Now if A = N CW (d) then m is generated by the Ti ; this explains the interest above in understanding when m is nilpotent. Theorem D shows that this condition is in fact equivalent to the generalized nilCoxeter algebra being finite-dimensional. 3. Proof of Theorem A: Tannakian formalism for semigroup categories The remainder of this paper is devoted to proving the four main theorems in the opening section. We begin by studying the representation category of N C(M ) for a generalized Coxeter matrix M . The first assertion is that this category can never be a monoidal category in characteristic zero, and it follows from the following result. Proposition 3.1. Suppose k is a field of characteristic zero and M is a generalized Coxeter matrix. Then N C(M ) is not a bialgebra. The result fails to hold in positive characteristic. Indeed, for any prime p > 2 the algebra (Z/pZ)[T ]/(T p ) is a bialgebra, with coproduct โˆ†(T ) := 1 โŠ— T + T โŠ— 1 and counit ฮต(T ) := 0. Proof. Note there is a unique possible counit, ฮต : Ti 7โ†’ 0 โˆ€i โˆˆ I. Now suppose โˆ† : N C(M ) โ†’ N C(M ) โŠ— N C(M ) is such that (id โŠ—ฮต) โ—ฆ โˆ† = id = (ฮต โŠ— id) โ—ฆ โˆ† on N C(M ). Setting m := ker ฮต to be the ideal generated by {Ti : i โˆˆ I}, it follows that (3.2) โˆ†(Ti ) โˆˆ 1 โŠ— Ti + Ti โŠ— 1 + m โŠ— m. Note that m โŠ— m constitutes the terms of higher โ€˜total degreeโ€™ in โˆ†(Ti ), in the Z>0 -grading on N C(M ). Now if โˆ† is multiplicative, then raising (3.2) to the mii th power yields:  mX ii โˆ’1  mii 0 = โˆ†(Ti )mii = Tik โŠ— Timii โˆ’k + higher degree terms. k k=1 This is impossible as long as the image of Ti in N C(M ) is nonzero; assuming this, it follows โˆ† cannot be multiplicative, hence not a coproduct on N C(M ). Finally, N C(M ) surjects onto the usual nil-Coxeter algebra N C(M2 ) with M2 = M ((2, . . . , 2)). As N C(M2 ) has a Coxeter word basis indexed by W (M ), it follows that Ti is indeed nonzero in N C(M ).  As a consequence of Proposition 3.1 and the Tannakian formalism in [ES, Theorem 18.3], for any generalized Coxeter matrix M the module category Rep N C(M ) is necessarily not a tensor category. That said, the map โˆ† : Ti 7โ†’ Ti โŠ— Ti is a coproduct on N C(M ), i.e. a coassociative algebra map. The cocommutativity of โˆ† implies Rep N C(M ) is a symmetric semigroup category. We now outline how to show the first theorem above, which seeks to understand Tannakaโ€“Krein duality for such categories (possibly without unit objects). Proof of Theorem A. The proof of part (1) follows that of [ES, Theorem 18.3]; one now ignores the last statement in that proof. The additional data required in the two braided versions in part (2) can be deduced from the proof of [ES, Proposition 14.2].  2980 APOORVA KHARE We conclude this section by passing from Rep N C(M ) to an โ€œhonestโ€ tensor category โ€“ say with k a field. Alternately, via the Tannakian formalism in [ES, g Theorem 18.3], we produce a bialgebra N C(M ) that surjects onto N C(M ). Namely, g N C(M ) is generated by {Ti : i โˆˆ I} and an additional generator Tโˆž , subject to the braid relations on the former set, as well as 2 := Tโˆž , โˆ€i โˆˆ I. Timii = Ti Tโˆž = Tโˆž Ti = Tโˆž g Note that N C(M ) is no longer Z>0 -graded; but it is a central extension: g 0 โ†’ kTโˆž โ†’ N C(M ) โ†’ N C(M ) โ†’ 0. Now asking for all Ti and Tโˆž to be grouplike yields a unique bialgebra structure g on N C(M ): e : Ti 7โ†’ Ti โŠ— Ti , โˆ† Tโˆž 7โ†’ Tโˆž โŠ— Tโˆž , ฮตe : Ti , Tโˆž 7โ†’ 1, g and hence a monoidal category structure on Rep N C(M ), as claimed. 4. Proof of Theorem B: Distinguished basis of words We now prove our main theorems on the algebras N C(M ) โ€“ specifically, the family N CA (n, d) โ€“ beginning with Theorem B. Note that if d = 2 then the algebra N CA (n, d) is the usual nil-Coxeter algebra, while if n = 1 then the algebra is k[T1 ]/(T1d ). Theorems B and C are easily verified for these cases, e.g. using [Hum, Chapter 7]. Thus, we assume throughout their proofs below that n > 2 and d > 3. We begin by showing the k-rank of N CA (n, d) is at most n!(1 + n(d โˆ’ 1)). Notice that N CA (n, d) is spanned by words in the Ti . We now claim that a word in the Ti is either zero in N CA (n, d), or equal by the braid relations to a word in which all occurrences of Tn are successive, in a monomial Tnk for some 1 6 k 6 d โˆ’ 1. To show the claim, consider a word T := ยท ยท ยท Tna Tw Tnb ยท ยท ยท , where a, b > 0 and Tw = Ti1 ยท ยท ยท Tik is a word in T1 , . . . , Tnโˆ’1 . Rewrite T using the braid relations if required, so that w โˆˆ Sn has minimal length, say k. We may assume k > 0, else we would be done. Now using the braid relations Ti Tn = Tn Ti for i 6 n โˆ’ 2, further assume that i1 = ik = n โˆ’ 1 (otherwise the factors may be โ€˜moved pastโ€™ the Tn using the braid relations). Similarly, i2 = ikโˆ’1 = n โˆ’ 2, and so on. Thus, if Tw 6= 0, then assume by the minimality of `(w) that Tw = Tnโˆ’1 Tnโˆ’2 ยท ยท ยท Tm+1 Tm Tm+1 ยท ยท ยท Tnโˆ’2 Tnโˆ’1 , for some 1 6 m 6 n โˆ’ 1. We next claim that the following relation holds in the Artin braid group Bn , hence in N CAn (d) for any d: (4.1) Tnโˆ’1 ยท ยท ยท Tm ยท ยท ยท Tnโˆ’1 = Tm Tm+1 ยท ยท ยท Tnโˆ’2 Tnโˆ’1 Tnโˆ’2 ยท ยท ยท Tm+1 Tm . This is shown by descending induction on m 6 n โˆ’ 1. Hence, (4.2) Tna ยท (Tnโˆ’1 ยท ยท ยท Tm ยท ยท ยท Tnโˆ’1 ) ยท Tnb = Tna ยท (Tm ยท ยท ยท Tnโˆ’2 Tnโˆ’1 Tnโˆ’2 ยท ยท ยท Tm ) ยท Tnb = (Tm ยท ยท ยท Tnโˆ’2 )Tnaโˆ’1 (Tn Tnโˆ’1 Tn )Tnbโˆ’1 (Tnโˆ’2 ยท ยท ยท Tm ) = (Tm ยท ยท ยท Tnโˆ’2 )Tnaโˆ’1 (Tnโˆ’1 Tn Tnโˆ’1 )Tnbโˆ’1 (Tnโˆ’2 ยท ยท ยท Tm ). If max(a, b) = 1 then the claim follows; if a > 1 then the last expression contains 2 the substring (Tn Tnโˆ’1 Tn )Tnโˆ’1 = Tnโˆ’1 Tn Tnโˆ’1 = 0; and similarly if b > 1. This shows the claim. GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2981 We now prove the upper bound on the k-rank. Notice that T1 , . . . , Tnโˆ’1 generate a subalgebra Rnโˆ’1 โŠ‚ N CA (n, d) in which the nil-Coxeter relations for WAnโˆ’1 = Sn are satisfied. Hence the map : N CAnโˆ’1 ((2, . . . , 2))  Rnโˆ’1 := hT1 , . . . , Tnโˆ’1 i is an algebra map. Now notice by equation (4.2) that every nonzero word in N CA (n, d) \ Rnโˆ’1 is of the form T = Tw Tnk Tw0 , where 1 6 k 6 d โˆ’ 1, w, w0 โˆˆ WAnโˆ’1 , and hence Tw , Tw0 โˆˆ Rnโˆ’1 . By a similar reasoning as above, assuming w0 of minimal length in Snโˆ’1 , we may rewrite T such that Tw0 = Tnโˆ’1 ยท ยท ยท Tm for some 1 6 m 6 n. Carrying out this operation yields Tw00 Tnk Tnโˆ’1 ยท ยท ยท Tm for some reduced word w00 โˆˆ WAnโˆ’1 (i.e., such that Tw00 is nonzero in N CAnโˆ’1 ((2, . . . , 2))). Thus, N CA (n, d) = Rnโˆ’1 + dโˆ’1 X n X k=1 m=1 Rnโˆ’1 ยท Tnk ยท (Tnโˆ’1 ยท ยท ยท Tm ). As Rnโˆ’1 has at most n! generators, it follows that N CA (n, d) has at most (1 + n(d โˆ’ 1)) ยท n! generators, which shows the desired upper bound on its k-rank. The hard part of the proof involves showing that the words Tw Tnk Tnโˆ’1 ยท ยท ยท Tm form a k-basis of N CA (n, d). We will require the following technical lemma on the symmetric group and its nil-Coxeter algebra. A proof is included for completeness. Lemma 4.3. Suppose W = WAnโˆ’1 = Sn is the symmetric group, with simple reflections s1 , . . . , snโˆ’1 labelled as usual. Then every element w of WAnโˆ’1 \WAnโˆ’2 = Sn \ Snโˆ’1 can be written in reduced form as w = w0 snโˆ’1 ยท ยท ยท sm0 , where w0 โˆˆ Snโˆ’1 = WAnโˆ’2 and m0 โˆˆ [1, n โˆ’ 1] are unique. Given such an element w โˆˆ Sn , we have in the usual nil-Coxeter algebra N CAn ((2, . . . , 2)): ( Tw0 Tnโˆ’1 ยท ยท ยท Tmโˆ’1 ยท Tn ยท ยท ยท Tm0 , if m0 < m, (4.4) Tn ยท Tw ยท Tn ยท ยท ยท Tm = 0 otherwise. Note that equation (4.4) can be thought of as a statement on lengths in the symmetric group. Proof. We first claim that w โˆˆ WAnโˆ’1 \ WAnโˆ’2 has a reduced expression in which snโˆ’1 occurs exactly once. The proof is by induction on n: clearly the claim is true for n = 2. Now given the claim for n โˆ’ 2 > 2, consider any reduced expression for w that contains a sub-word snโˆ’1 w00 snโˆ’1 , where w โˆˆ WAnโˆ’2 . By the induction hypothesis, w00 = w0 snโˆ’2 ยท ยท ยท sm for some w0 โˆˆ WAnโˆ’3 and m โˆˆ [1, n โˆ’ 1]. Hence if m 6 n โˆ’ 2, then w = ยท ยท ยท snโˆ’1 (w0 snโˆ’2 snโˆ’3 ยท ยท ยท sm ) snโˆ’1 = ยท ยท ยท w0 (snโˆ’1 snโˆ’2 snโˆ’1 )(snโˆ’3 ยท ยท ยท sm ) ยท ยท ยท , and by the braid relations, this equals a reduced expression for w โˆˆ WAnโˆ’1 , with one less occurrence of snโˆ’1 . A similar analysis works if m = n โˆ’ 1. Repeatedly carrying out this procedure proves the claim. We can now prove the uniqueness of w0 , m0 as in the lemma. By the previous paragraph, write w โˆˆ WAnโˆ’1 \ WAnโˆ’2 as w = w1 snโˆ’1 w2 , with w1 , w2 โˆˆ WAnโˆ’2 and w2 of smallest possible length, say w2 = si1 ยท ยท ยท sik for i1 , . . . , ik 6 n โˆ’ 2. Using the braid relations, clearly i1 = nโˆ’2, hence i2 = nโˆ’3 (by minimality of k). Choose the smallest l > 3 such that il 6= n โˆ’ 1 โˆ’ l. We now produce a contradiction assuming that such an integer l exists. If il < n โˆ’ 1 โˆ’ l, then we may move sil past the preceding terms, contradicting the minimality of k. Clearly il 6= n โˆ’ l, else w2 was 2982 APOORVA KHARE not reduced. Thus il > n โˆ’ 1 โˆ’ l, whence w2 is of the form snโˆ’2 ยท ยท ยท sil sil โˆ’1 sil ยท ยท ยท . Now verify in WAnโˆ’1 that w = w1 snโˆ’1 snโˆ’2 ยท ยท ยท sil +1 sil sil โˆ’1 sil ยท ยท ยท = w1 snโˆ’1 ยท ยท ยท sil +1 sil โˆ’1 sil sil โˆ’1 ยท ยท ยท = w1 sil โˆ’1 ยท snโˆ’1 ยท snโˆ’2 ยท ยท ยท sil +1 sil sil โˆ’1 ยท ยท ยท , which contradicts the minimality of k. Thus such an integer l cannot exist, which proves that w = w1 snโˆ’1 ยท ยท ยท sm0 for some m0 โˆˆ [1, n โˆ’ 1]. We next claim that the integer m0 is unique for w โˆˆ WAn \ WAnโˆ’1 . We first make the sub-claim that if w โˆˆ WAnโˆ’1 is reduced, then so is wsn snโˆ’1 ยท ยท ยท sm . To see why, first recall [Hum, Lemma 1.6, Corollary 1.7], which together imply that if wฮฑ > 0 for any finite Coxeter group W , any w โˆˆ W , and any simple root ฮฑ > 0, then `(wsฮฑ ) = `(w)+1. Now the sub-claim follows by applying this result successively to (wsn ยท ยท ยท sj+1 , ฮฑj ) for j = n, nโˆ’1, ยท ยท ยท , m. Next, define Cm := WAnโˆ’1 ยทsn snโˆ’1 ยท ยท ยท sm , with Cn+1 := WAnโˆ’1 . It follows by the sub-claim above that |Cm | = |WAnโˆ’1 | = n! for all m. Hence, (n + 1)! = |WAn | 6 n+1 X m=1 |Cm | 6 n+1 X n! = (n + 1)!. m=1 Fn+1 This shows that WAn = m=1 Cm , which proves the uniqueness of m in the above claim. Now write w1 in reduced form to obtain that w0 = wsm0 ยท ยท ยท snโˆ’1 is also unique. It remains to show equation (4.4) in N CAn ((2, . . . , 2)). Using the above analysis, write Tw = Tw0 Tnโˆ’1 ยท ยท ยท Tm0 ; since Tn commutes with Tw0 , we may assume w0 = 1. First suppose m0 > m. Then it suffices to prove that (Tn ยท ยท ยท Tm0 )2 = 0 for all 1 6 m0 6 n. Without loss of generality we may work in the subalgebra generated by Tm0 , . . . , Tn , and hence suppose m0 = 1. We now prove by induction that (Tn ยท ยท ยท T1 )2 = 0. This is clear if n = 1, 2, and for n > 2, (Tn ยท ยท ยท T1 )2 = Tn Tnโˆ’1 Tn ยท Tnโˆ’2 ยท ยท ยท T1 ยท Tnโˆ’1 ยท ยท ยท T1 = Tnโˆ’1 Tn ยท (Tnโˆ’1 ยท ยท ยท T1 )2 = 0. Next suppose m0 < m; once again we may suppose m0 = 1. We prove the result by induction on n, the base case of n = 2 (and m = 2) being easy. Thus, for 1 < m 6 n, we compute: Tn ยท ยท ยท T1 ยท Tn ยท ยท ยท Tm = Tn Tnโˆ’1 Tn ยท Tnโˆ’2 ยท ยท ยท T1 ยท Tnโˆ’1 ยท ยท ยท Tm = Tnโˆ’1 Tn ยท (Tnโˆ’1 ยท ยท ยท T1 ) ยท (Tnโˆ’1 ยท ยท ยท Tm ) = Tnโˆ’1 Tn ยท (Tnโˆ’2 ยท ยท ยท Tmโˆ’1 ) ยท (Tnโˆ’1 ยท ยท ยท T1 ) = Tnโˆ’1 Tnโˆ’2 ยท ยท ยท Tmโˆ’1 ยท Tn Tnโˆ’1 ยท ยท ยท T1 .  Remark 4.5. Notice that equation (4.4) holds in any algebra containing elements T1 , . . . , Tn that satisfy the braid relations and T12 = 0. In particular, (4.4) holds in N CA (n, d) for n > 1. Returning to the proof of Theorem B, we now introduce a diagrammatic calculus akin to crystal theory. We first write out the n = 2 case, in order to provide intuition for the case of general n. Let M be a free k-module, with basis given by the nodes in the graph in Figure 1 below. In the figure, the node 122 1 should be thought of as T1 T22 T1 (applied to the unit 1N CA (2,d) , i.e., to the generating basis vector corresponding to โˆ…), and similarly for the other nodes. The arrows denote the action of T1 and T2 ; all remaining GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2983 1 0 12d 1 122 1 ยทยทยท 1 1 0 2 ยทยทยท 2 22 1 2 2 2 2 2 1 2d 1 โˆ… 1 21 12 1 22 2 ยทยทยท 2 1 122 2d 0 1 ยทยทยท 0 12d 2 wโ—ฆ Figure 1. Regular representation for N CA (2, d), with d0 = d โˆ’ 1 generator actions on nodes yield zero. Now one verifies by inspection that the defining relations in N CA (2, d) are satisfied by this action on M . Therefore M is an N CA (2, d)-module of k-rank 4d โˆ’ 2 = 2!(1 + 2(d โˆ’ 1)). Since M is generated by the basis vector corresponding to the node โˆ…, we have a surjection : N CA (2, d)  M that sends T1 , T2k , T1 T2k , T2k T1 , T1 T2k T1 to the corresponding basis vectors in the free k-module M . Now the result for n = 2 follows by the upper bound on the k-rank, proved above. The strategy is similar for general n, but uses the following more detailed notation. For each w โˆˆ Sl with l 6 n, let Tw denote the corresponding (welldefined) word in the alphabet {T1 , . . . , Tlโˆ’1 }, and let Rlโˆ’1 denote the subalgebra of N CA (n, d) generated by these letters. Now define a free k-module M of k-rank n!(1 + n(d โˆ’ 1)), with basis elements the set of words (4.6) B := {B(w, k, m) : w โˆˆ Sn , k โˆˆ [1, d โˆ’ 1], m โˆˆ [1, n]} t {B(w) : w โˆˆ Sn }. We observe here that the basis vectors B(w, k, m), B(w) are to be thought of as corresponding respectively to the words (4.7) Tw Tnk Tnโˆ’1 ยท ยท ยท Tm , Tw , w โˆˆ Sn , k โˆˆ [1, d โˆ’ 1], m โˆˆ [1, n]. Definition 4.8. An expression for a word in N CA (n, d) of the form (4.7) will be said to be in standard form. We now define an N CA (n, d)-module structure on M , via defining a directed graph structure on B (or more precisely, on B t {0}) that we now describe. The following figure (Figure 2 below) may help in visualizing the structure. The figure should be thought of as analogous to the central hexagon and either of the two โ€œarmsโ€ in Figure 1. We begin by explaining the figure. Each node (wkm) (or (w)) corresponds to the basis vector B(w, k, m) (or B(w)). Notice that the vectors {B(w, 1, m)} t {B(w)} are in bijection with the Coxeter word basis of the usual nil-Coxeter algebra N CAn ((2, . . . , 2)). Let V1 denote their span, of k-rank (n + 1)!. Now given 1 6 m 6 n and 1 6 k 6 d โˆ’ 1 =: d0 , define Vk,m to be the span L of the basis elements {B(w, k, m) : w โˆˆ Sn }, of k-rank n!. Then M = V1 โŠ• k>1,m Vk,m . Note as a special case that in Figure 1, the central hexagon spans V1 , the nodes 2k 1, 12k 1 span Vk,1 , and 2k , 12k span Vk,2 . We now define the N CA (n, d)-action: 2984 APOORVA KHARE n 11m w0 1m V1 12m n w0 2m n n ยทยทยท n 1d0 m ยทยทยท V2,m w0 d0 m n Vd0 ,m Figure 2. Regular representation for N CA (n, d), with d0 = d โˆ’ 1 โ€ข Let V1,n+1 denote the k-span of {B(w) : w โˆˆ Sn }. Then for 1 6 m 6 n + 1, each V1,m has a distinguished basis in bijection with Sn ; the same holds for each Vk,m with k โˆˆ [2, d โˆ’ 1] and m โˆˆ [1, n]. Now equip all of the above spaces Vk,m with the corresponding module structure over the usual nil-Coxeter algebra of type Anโˆ’1 . Such a structure is uniquely determined, if given w = si1 ยท ยท ยท sil โˆˆ Sn with all ij < n, we set Tw ยท B(1, k, m) := B(w, k, m) and Tw ยท B(1) := B(w). โ€ข We next define the action of Tn on M . Via Lemma 4.3, write w โˆˆ Sn as w0 snโˆ’1 ยท ยท ยท sm0 with w0 , m0 unique. Now using the previous paragraph, it follows that B(w, k, m) = Tw0 Tnโˆ’1 ยท ยท ยท Tm0 ยท B(1, k, m). Correspondingly, if w โˆˆ Snโˆ’1 (i.e., m0 = n), define Tn ยท B(w, k, m) := 1(k 6 d โˆ’ 2)B(w, k + 1, m), Tn ยท B(w) := B(w, 1, n). 0 โ€ข On the other hand, suppose m 6 n โˆ’ 1. If k > 2, then define Tn ยท B(w, k, m) := 0. Otherwise define Tn ยท B(w) := B(w0 , 1, m0 ) with w0 , m0 as in Lemma 4.3, and (see Equation 4.4): ( B(w0 snโˆ’1 ยท ยท ยท smโˆ’1 , 1, m0 ), if m0 < m, (4.9) Tn ยท B(w, 1, m) := 0 otherwise. It remains to show that the above graph structure indeed defines an N CA (n, d)module structure on M ; then a similar argument as above (in the n = 2 case) completes the proof. In the following argument, we will occasionally use Lemma 4.3 (as well as Remark 4.5) without reference. First notice that the algebra relations involving only T1 , . . . , Tnโˆ’1 are clearly satisfied on M as it is a Rnโˆ’1 -free module by construction. To verify that the relations involving Tn hold on M , notice (e.g. via Figure 2) that the k-basis B of M can be partitioned into three subsets: B1 := {B(w, k, m) : k > 1, m โˆˆ [1, n], w โˆˆ Snโˆ’1 } t {B(w) : w โˆˆ Snโˆ’1 }, (4.10) B2 := {B(w, k, m) : k > 2, m โˆˆ [1, n], w โˆˆ Sn \ Snโˆ’1 }, B3 := {B(w, 1, m) : m โˆˆ [1, n], w โˆˆ Sn \ Snโˆ’1 } t {B(w) : w โˆˆ Sn \ Snโˆ’1 }. Recall by the opening remarks in Section 4 that n > 2 and d > 3. We first show that the relation Tnd = 0 holds as an equality of linear operators on each vector b โˆˆ B, and hence on the k-module M . We separately consider the cases b โˆˆ Bi for i = 1, 2, 3, as in (4.10). GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2985 (1) If b = B(w, k, m) โˆˆ B1 , then b lies in the โ€œtop rowsโ€ of Figure 2. It is easily verified that Tndโˆ’kโˆ’1 ยท B(w, k, m) = B(w, d โˆ’ 1, m), and this is killed by Tn , as desired. The same reasoning shows that Tnd kills b = B(w) for w โˆˆ Snโˆ’1 . (2) Let b = B(w, k, m) โˆˆ B2 . Then the relation holds on b since Tn ยท B(w, k, m) = 0. (These correspond to vectors in Vk,m for k > 2, which do not lie in the โ€œtop rowsโ€ in Figure 2.) (3) Finally, let b โˆˆ B3 ; thus w โˆˆ Sn \ Snโˆ’1 , and we write w = w0 snโˆ’1 ยท ยท ยท sm0 by Lemma 4.3. It follows from Remark 4.5 that Tn2 ยท B(w, 1, m) = 0 and Tnd ยท B(w) = Tndโˆ’1 ยท B(w0 , 1, m0 ) = 0. We next show that the relation Ti Tn = Tn Ti holds on B for all i 6 n โˆ’ 2. We consider the same three cases as in (4.10). (1) Fix w โˆˆ Snโˆ’1 . If b = B(w, k, m) with k > 1, then verify using the aforementioned action that both Ti Tn ยท B(w, k, m) and Tn Ti ยท B(w, k, m) equal B(si w, k + 1, m) if `(si w) > `(w) and k 6 d โˆ’ 2, and 0 otherwise. Similarly, Ti Tn ยท B(w) = 1(`(si w) > `(w))B(si w, 1, n) = Tn Ti ยท B(w). (2) Let b = B(w, k, m) with w โˆˆ Sn \Snโˆ’1 and k > 2. Then Ti Tn ยทB(w, k, m) = 0. To compute Tn Ti ยท B(w, k, m), since i 6 n โˆ’ 2, it follows that si w โˆˆ Sn \ Snโˆ’1 . If Ti Tw = 0 then we are done since B(w, k, m) = Tw ยทB(1, k, m). Else note that si w โˆˆ Sn \ Snโˆ’1 , whence Tn Ti ยท B(w, k, m) = Tn ยท B(si w, k, m) = 0 from above. (3) Finally, let w โˆˆ Sn \ Snโˆ’1 and write w = w0 snโˆ’1 ยท ยท ยท sm0 by Lemma 4.3. First suppose b = B(w, 1, m). If `(si w) < `(w), then it is not hard to show that both Ti Tn ยท B(w, 1, m) and Tn Ti ยท B(w, 1, m) vanish. Otherwise both terms are equal to B(si w0 snโˆ’1 ยท ยท ยท smโˆ’1 , 1, m0 ). A similar analysis shows that if `(si w) < `(w), then Ti Tn ยท B(w) = Tn Ti ยท B(w) = 0, otherwise Ti Tn ยท B(w) = Tn Ti ยท B(w) = B(si w0 , 1, m0 ). Next, we show that the braid relation Tnโˆ’1 Tn Tnโˆ’1 = Tn Tnโˆ’1 Tn holds on B. This is the most involved computation to carry out. We consider the same three cases as above. (1) Fix w โˆˆ Snโˆ’1 . If b = B(w, k, m) with k > 2, then it is easily verified that both sides of the braid relation kill B(w, k, m). If instead k = 1, then Tn Tnโˆ’1 Tn ยท B(w, 1, m) = Tn Tnโˆ’1 ยท B(w, 2, m) = 0. To compute the other side, first notice B(w, 1, m) = Tn ยท B(wsnโˆ’1 ยท ยท ยท sm ). Hence, Tn Tnโˆ’1 ยท B(w, 1, m) = Tn Tnโˆ’1 Tn ยท B(wsnโˆ’1 ยท ยท ยท sm ). Now if the braid relation holds on B(w) for all w โˆˆ Sn , then Tnโˆ’1 Tn Tnโˆ’1 ยท B(w, 1, m) = Tnโˆ’1 ยท Tn Tnโˆ’1 Tn ยท B(wsnโˆ’1 ยท ยท ยท sm ) 2 = Tnโˆ’1 Tnโˆ’1 Tn Tnโˆ’1 ยท B(wsnโˆ’1 ยท ยท ยท sm ) โˆˆ Tnโˆ’1 ยท M = 0, where the last equality follows from the definition of M as an Rnโˆ’1 -module. It thus suffices for this case to verify that the braid relation holds on B(w) for w โˆˆ Sn . This is done by considering the following four sub-cases. (a) If w โˆˆ Snโˆ’2 commutes with snโˆ’1 , sn , then both Tn Tnโˆ’1 Tn ยท B(w) and Tnโˆ’1 Tn Tnโˆ’1 ยท B(w) are easily seen to equal B(snโˆ’1 w, 1, n โˆ’ 1). 2986 APOORVA KHARE (b) Suppose w = w0 snโˆ’2 ยท ยท ยท sm0 โˆˆ Snโˆ’1 \ Snโˆ’2 , with w0 โˆˆ Snโˆ’2 and m0 โˆˆ [1, nโˆ’2]. Then using Remark 4.5 and the Rnโˆ’1 -module structure of M , we compute: Tn Tnโˆ’1 Tn ยท B(w) = Tn Tnโˆ’1 ยท B(w, 1, n) = Tn ยท B(w0 snโˆ’1 ยท ยท ยท sm0 , 1, n) = B(w0 snโˆ’1 , 1, m0 ), Tnโˆ’1 Tn Tnโˆ’1 ยท B(w) = Tnโˆ’1 Tn ยท B(w0 snโˆ’1 ยท ยท ยท sm0 ) = Tnโˆ’1 ยท B(w0 , 1, m0 ) = B(snโˆ’1 w0 , 1, m0 ), whence we are done since snโˆ’1 commutes with w0 โˆˆ Snโˆ’2 . (c) In the last two sub-cases, w = w0 snโˆ’1 ยท ยท ยท sm0 โˆˆ Sn \ Snโˆ’1 with m0 โˆˆ [1, n โˆ’ 1]. As in the previous two sub-cases, first suppose w0 โˆˆ Snโˆ’2 . Similar to the above computations, one verifies that both Tn Tnโˆ’1 Tn ยท B(w) and Tnโˆ’1 Tn Tnโˆ’1 ยท B(w) vanish. (d) Finally, suppose w = w00 snโˆ’2 ยท ยท ยท sm ยท snโˆ’1 ยท ยท ยท sm0 with m โˆˆ [1, n โˆ’ 2], m0 โˆˆ [1, n โˆ’ 1], and w00 โˆˆ Snโˆ’2 . Then one verifies that Tn Tnโˆ’1 Tn ยท B(w) = 1(m < m0 )B(w00 snโˆ’2 ยท ยท ยท sm0 โˆ’1 , 1, m) = Tnโˆ’1 Tn Tnโˆ’1 ยท B(w). (2) Next suppose b โˆˆ B2 is of the form B(w, k, m) with k > 2 and w = w0 snโˆ’1 ยท ยท ยท sm0 โˆˆ Sn \ Snโˆ’1 . Then Tn ยท B(w, k, m) = 0 by definition, so Tn Tnโˆ’1 Tn ยท B(w, k, m) = 0. To show that Tnโˆ’1 Tn Tnโˆ’1 kills B(w, k, m), we consider two sub-cases. If w0 โˆˆ Snโˆ’2 , then Tnโˆ’1 ยท B(w, k, m) = 0 and we are done. Otherwise suppose w0 = w00 snโˆ’2 ยท ยท ยท sm00 โˆˆ Snโˆ’1 \ Snโˆ’2 , with m00 โˆˆ [1, n โˆ’ 2]. Now compute using Remark 4.5 and the relations verified above: Tnโˆ’1 Tn Tnโˆ’1 ยท B(w, k, m) = Tnโˆ’1 Tn ยท B(w00 snโˆ’1 ยท ยท ยท sm00 snโˆ’1 ยท ยท ยท sm0 , k, m) = 1(m00 < m0 )Tnโˆ’1 Tn ยท B(w00 snโˆ’2 ยท ยท ยท sm0 โˆ’1 snโˆ’1 ยท ยท ยท sm00 , k, m) = 1(m00 < m0 )Tnโˆ’1 ยท 0 = 0, where the penultimate equality uses that k = 2. (3) Finally, suppose b โˆˆ B3 . By the analysis in the first case above, we only need to consider b = B(w, 1, m) with w = w0 snโˆ’1 ยท ยท ยท sm0 โˆˆ Sn \ Snโˆ’1 . It is now not hard to show that both Tn Tnโˆ’1 Tn ยท B(w, 1, m) and Tnโˆ’1 Tn Tnโˆ’1 ยท B(w, 1, m) vanish if w0 โˆˆ Snโˆ’2 . On the other hand, if w0 = w00 snโˆ’2 ยท ยท ยท sm00 โˆˆ Snโˆ’1 \ Snโˆ’2 , then repeated use of Remark 4.5 (and equation (4.4)) shows that Tnโˆ’1 Tn Tnโˆ’1 ยท B(w, 1, m) = Tnโˆ’1 Tn Tnโˆ’1 ยท B(w00 ยท snโˆ’2 ยท ยท ยท sm00 ยท snโˆ’1 ยท ยท ยท sm0 , 1, m) = 1(m00 < m0 )Tnโˆ’1 Tn ยท B(w00 ยท snโˆ’2 ยท ยท ยท sm0 โˆ’1 ยท snโˆ’1 ยท ยท ยท sm00 , 1, m) = 1(m00 < m0 )1(m00 < m)Tnโˆ’1 ยท B(w00 ยท snโˆ’2 ยท ยท ยท sm0 โˆ’1 ยท snโˆ’1 ยท ยท ยท smโˆ’1 , 1, m00 ) = 1(m00 < m0 )1(m00 < m)1(m0 < m)B(w00 snโˆ’2 ยท ยท ยท smโˆ’2 snโˆ’1 ยท ยท ยท sm0 โˆ’1 , 1, m) = 1(m00 < m0 < m)B(w00 snโˆ’2 ยท ยท ยท smโˆ’2 snโˆ’1 ยท ยท ยท sm0 โˆ’1 , 1, m). GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2987 Notice this calculation shows the โ€œbraid-likeโ€ action of Tn , Tnโˆ’1 on strings of the type Tnโˆ’2 ยท ยท ยท Tm00 , Similarly, one shows that Tnโˆ’1 ยท ยท ยท Tm0 , Tn ยท ยท ยท Tm . Tn Tnโˆ’1 Tn ยท B(w, 1, m) = 1(m00 < m0 < m)B(w00 snโˆ’2 ยท ยท ยท smโˆ’2 snโˆ’1 ยท ยท ยท sm0 โˆ’1 , 1, m), which verifies that the last braid relation holds in the last case. Thus the algebra relations hold on all of M , making it an N CA (n, d)-module generated by B(1), as claimed. In particular, N CA (n, d) ' M as k-modules, by the analysis in the first part of this proof. This completes the proof of all but the last assertion in Theorem B. Finally, the nil-Coxeter algebra N CAl ((2, . . . , 2)) surjects onto Rl , and Rl ' Rl ยท B(โˆ…) โŠ‚ V1 is free of k-rank (l + 1)! from above. Hence Rl ' N CAl ((2, . . . , 2)), as desired.  5. Proof of Theorem C, primitive elements, and categorification In this section we continue our study of the algebras N CA (n, d), starting with Theorem C. Proof of Theorem C. We retain the notation of Theorem B. Via the k-module isomorphism M ' N CA (n, d), we identify the basis element B(w, k, m) with Tw Tnk Tnโˆ’1 ยท ยท ยท Tm and B(w) with Tw , where w โˆˆ Sn , k โˆˆ [1, d โˆ’ 1], and m โˆˆ [1, n]. Let ` : B โ†’ Z>0 be as in equation (1.10). We now claim that if T = Ti1 ยท ยท ยท Til is any nonzero word in N CA (n, d), then l is precisely the length of T when expressed (uniquely) in standard form (4.7). The proof is by induction on l. For l = 1, Ti is already in standard form (and nonzero). Now given a word T = Ti T 0 of length l + 1 (so T 0 has length l and satisfies the claim), write T 0 via the induction hypothesis as a word in standard form of length l. Now the proof of Theorem B shows that applying any Ti to this standard form for T 0 either yields zero or has length precisely l + 1. This proves the claim. The above analysis shows (1) and (2). Now suppose k is a field. Then the algebra N CA (n, d) has a maximal ideal m = h{Ti : i โˆˆ I}i; in fact, m has k-corank 1 by the proof of Theorem B. Moreover, m is local because any element of A \ m is invertible. (In particular, one understands representations of the algebra N CA (n, d), e.g. by [Kha, ยง6.1].) The aforementioned claim also proves that ml+1 = 0, where l := `Anโˆ’1 (wโ—ฆ0 ) + d + n โˆ’ 2. This is because any nonzero word can be expressed in standard form without changing the length.  As an immediate consequence, we have: Corollary 5.1. If k is a field and T1 , . . . , Tn all have graded degree 1, the Hilbertโ€“ Poincareฬ series of N CA (n, d) is the polynomial n Y qn โˆ’ 1 , [n]q ! := [j]q . [n]q ! (1 + [n]q [d โˆ’ 1]q ), where [n]q := qโˆ’1 j=1 The proof also uses the standard result that the Hilbertโ€“Poincareฬ series of the usual nil-Coxeter algebra N CA (n, 2) is [n]q ! (see e.g. [Hum, ยง3.12, 3.15]). Next, we discuss a property that was explored in [Kho] for the usual nil-Coxeter algebras N CA (n, 2): these algebras are always Frobenius. We now study when the 2988 APOORVA KHARE algebras N CA (n, d) are also Frobenius for d > 3. As the following result shows, this only happens in the degenerate case of n = 1, i.e., k[T1 ]/(T1d ). Theorem 5.2. Suppose k is a field. Given n > 1 and d > 2, the algebra N CA (n, d) is Frobenius if and only if n = 1 or d = 2. One checks via equation (2.1) that these conditions are further equivalent to (the group algebra of) the โ€œgeneralized Coxeter groupโ€ W (Mn,d ) being a flat deformation of N CA (n, d). The proof of Theorem 5.2 crucially uses the knowledge of โ€œmaximalโ€, i.e., primitive words in the algebra N CA (n, d). Formally, given a generalized Coxeter matrix M , say that an element x โˆˆ N C(M ) is left (respectively, right) primitive if mx = 0 (respectively, xm = 0), cf. Theorem C(3). Now x is primitive if it is both left- and right-primitive. Denote these sets of elements respectively by PrimL (N C(M )), PrimR (N C(M )), Prim(N C(M )). Proposition 5.3. Every generalized nil-Coxeter algebra N C(M ) is equipped with an anti-involution ฮธ that fixes each generator Ti . Now ฮธ is an isomorphism : PrimL (N C(M )) โ†โ†’ PrimR (N C(M )). Moreover, the following hold. (1) If W (M ) is a finite Coxeter group with unique longest word wโ—ฆ , then PrimL (N C(M )) = PrimR (N C(M )) = Prim(N C(M )) = kTwโ—ฆ . (2) If N C(M ) = N CA (1, d), then PrimL (N C(M )) = PrimR (N C(M )) = Prim(N C(M )) = k ยท T1dโˆ’1 . (3) If N C(M ) = N CA (n, d) with n > 2 and d > 3, then: (a) PrimL (N C(M )) is spanned by Twโ—ฆ := Twโ—ฆ0 Tn Tnโˆ’1 ยท ยท ยท T1 and the n(d โˆ’ 2) words {Twโ—ฆ0 Tnk Tnโˆ’1 ยท ยท ยท Tm : k โˆˆ [2, d โˆ’ 1], m โˆˆ [1, n]}. (b) Prim(N C(M )) is spanned by the d โˆ’ 1 words Twโ—ฆ0 Tnk Tnโˆ’1 ยท ยท ยท T1 , where 1 6 k 6 d โˆ’ 1. In all cases, the map ฮธ fixes both Prim(N C(M )) as well as the lengths of all nonzero words. Proof. The first two statements are obvious since ฮธ preserves the defining relations in kh{Ti : i โˆˆ I}i. The assertion in (1) is standard โ€“ see e.g. [Hum, Chapter 7] โ€“ and (2) is easily verified. We next classify the left-primitive elements as in (3)(a). Suppose for some k > 2 and 1 6 m 6 n that T = Twโ—ฆ0 Tnk Tnโˆ’1 ยท ยท ยท Tm . Then clearly Ti T = 0 for all i < n, and Tn T = 0 since k > 2, as discussed in the proof of Theorem B. Similarly, if T = Twโ—ฆ then Ti T = 0 for i < n, and we also computed in the proof of Theorem B that Twโ—ฆ = T1 ยท ยท ยท Tnโˆ’1 Tn Twโ—ฆ0 . Hence, Tn Twโ—ฆ = T1 ยท ยท ยท Tnโˆ’2 (Tn Tnโˆ’1 Tn )Twโ—ฆ0 = T1 ยท ยท ยท Tnโˆ’1 Tn (Tnโˆ’1 Twโ—ฆ0 ) = 0. To complete the proof of (3)(a), it suffices to show that no nonzero linear combination of the remaining words of the form Tw Tnk Tnโˆ’1 ยท ยท ยท Tm is left-primitive. Suppose first that there is a word w โˆˆ WAnโˆ’1 such that the coefficient of Tw is nonzero. In that case, choose such an element w of smallest length, and left-multiply the linear combination by Tndโˆ’1 Twโ—ฆ0 wโˆ’1 . As discussed in the proof of Theorem B, this kills all terms Tw0 Tnk Tw00 with w0 , w00 โˆˆ WAnโˆ’1 and k > 1. Moreover, by [Hum, Chapter 7], GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2989 left-multiplication by Twโ—ฆ0 wโˆ’1 also kills all terms of the same length that are not Tw . Thus we are left with Tndโˆ’1 Twโ—ฆ0 wโˆ’1 Tw = Tndโˆ’1 Twโ—ฆ0 6= 0, so the linear combination was not left-primitive. The other case is that all words in the linear combination are of the form Tw Tnk Tnโˆ’1 ยท ยท ยท Tm with k > 1. Once again, choose w โˆˆ WAnโˆ’1 of smallest length for which the corresponding word has nonzero coefficient, and left-multiply by Twโ—ฆ0 wโˆ’1 . This yields a nonzero linear combination by the analysis in Theorem B, which proves the assertion about left-primitivity. We next identify the primitive elements in N C(M ) = N CA (n, d). The first claim is that Tk := Twโ—ฆ0 Tnk Tnโˆ’1 ยท ยท ยท T1 is fixed by ฮธ. Indeed, we compute using the braid relations in type A that ฮธ fixes Twโ—ฆ0 โˆˆ Rnโˆ’1 and Twโ—ฆ00 โˆˆ Rnโˆ’2 . Hence, (5.4) ฮธ(Tk ) = T1 ยท ยท ยท Tnโˆ’1 Tnk Twโ—ฆ00 Tnโˆ’1 ยท ยท ยท T1 = T1 ยท ยท ยท Tnโˆ’1 Twโ—ฆ00 Tnk Tnโˆ’1 ยท ยท ยท T1 = Tk . Using this we claim that Tk is right-primitive. Indeed, if i < n, then Tk Ti = T1 ยท ยท ยท Tnโˆ’1 Tnk Twโ—ฆ0 Ti = 0, while for i = n, we compute: Tk Tn = Twโ—ฆ0 Tnk Tnโˆ’1 Tn ยท Tnโˆ’2 ยท ยท ยท T1 = Tnkโˆ’1 Twโ—ฆ0 Tnโˆ’1 ยท Tn Tnโˆ’1 Tnโˆ’2 ยท ยท ยท T1 = 0. We now claim that no linear combination of the remaining left-primitive elements listed in (3)(a) is right-primitive. Indeed, let m0 denote the minimum of the mvalues in words with nonzero coefficients; then m0 > 1 by the above analysis. Now right-multiply by Tm0 โˆ’1 ยท ยท ยท T1 . This kills all elements with m-value > m0 + 1, since Tm0 โˆ’1 commutes with Tn Tnโˆ’1 ยท ยท ยท Tm , hence can be taken past them to multiply against Twโ—ฆ0 and be killed. The terms with m-value equal to m0 are not killed, by the analysis in Theorem B. It follows that such a linear combination is not rightprimitive, which completes the classification of the primitive elements in (3)(b). Next, that Prim(N C(M )) is fixed by ฮธ was shown in equation (5.4). Moreover, if N C(M ) equals N CA (n, d) or kW (M ) with W (M ) finite, then it is equipped with a suitable length function `. Now ฮธ preserves the length because the algebra relations are `-homogeneous and preserved by ฮธ.  Remark 5.5. In light of Proposition 5.3, it is natural to ask how to write rightprimitive words in standard form. More generally, given w = w0 snโˆ’1 ยท ยท ยท sm0 for unique w0 โˆˆ Snโˆ’1 and m0 โˆˆ [1, n] (via Lemma 4.3), we have: Tm ยท ยท ยท Tnโˆ’1 Tnk Tw = e = sm ยท ยท ยท snโˆ’1 w0 . Twe Tnk Tnโˆ’1 ยท ยท ยท Tm0 , where w With Proposition 5.3 in hand, we turn to the Frobenius property of N CA (n, d). The following proof reveals that N CA (n, d) is Frobenius if and only if Prim(N C(M )) is one-dimensional. Proof of Theorem 5.2. For finite Coxeter groups W (M ), the corresponding nilCoxeter algebras N C(M ) are indeed Frobenius; see e.g. [Kho, ยง2.2]. It is also easy to verify that N CA (1, d) = k[T1 ]/(T1d ) is Frobenius, by using the symmetric bilinear form uniquely specified by: ฯƒ(T1i , T1j ) = 1(i + j = d โˆ’ 1). Thus, it remains to show that for n > 2 and d > 3, the algebra N CA (n, d) is not Frobenius. Indeed, if N CA (n, d) is Frobenius with nondegenerate invariant bilinear form ฯƒ, then for each nonzero primitive p there exists a vector ap such that 0 6= ฯƒ(p, ap ) = ฯƒ(pap , 1). It follows that we may take ap = 1 for all p. Now the linear functional ฯƒ(โˆ’, 1) : Prim(N CA (n, d)) โ†’ k is nonsingular, whence dimk Prim(N CA (n, d)) = 1. Thus n = 1 or d = 2 by Proposition 5.3.  2990 APOORVA KHARE We conclude this section by discussing the connection of N CA (n, d) to the categorification by Khovanov [Kho] of the Weyl algebra Wn := Zhx, โˆ‚i/(โˆ‚x = 1 + xโˆ‚). Namely, the usual type A nil-Coxeter algebra An := N CA (n, 2) is a bimodule over Anโˆ’1 , and this structure was studied in loc. cit., leading to the construction of tensor functors categorifying the operators x, โˆ‚. We now explain how the algebra N CA (n, d) fits into this framework. Proposition 5.6. For all n > 1 and d > 2, we have an isomorphism of Anโˆ’1 bimodules: dโˆ’1 M  N CA (n, d) ' Anโˆ’1 โŠ• Anโˆ’1 โŠ—Anโˆ’2 Anโˆ’1 . k=1 When d = 2, this result was shown in [Kho, Proposition 5]. For general d > 2, using the notation of [Kho], this result implies in the category of Anโˆ’1 -bimodules that the algebra N CA (n, d) corresponds to 1 + (d โˆ’ 1)xโˆ‚ (including the previously known case of d = 2). In particular, Proposition 5.6 strengthens Theorems B and C, which explained a left Anโˆ’1 -module structure on N CA (n, d) (namely, that N CA (n, d) is free of rank 1 + n(d โˆ’ 1)). Proof of Proposition 5.6. From the proof of Theorem B, the algebra N CA (n, d) โˆผ has a โ€˜regular representationโ€™ ฯ• : M โˆ’โ†’ N CA (n, d), sending B(w) 7โ†’ Tw and k B(w, k, m) 7โ†’ Tw Tn Tnโˆ’1 ยท ยท ยท Tm for w โˆˆ Sn , k โˆˆ [1, d โˆ’ 1], and m โˆˆ [1, n]. Also recall the subspaces Vk,m defined in the discussion following equation (4.7): Vk,m = L wโˆˆSn kB(w, k, m). Ln By Theorem B, Mk := m=1 ฯ•(Vk,m ) is a free left Anโˆ’1 -module of rank one. It is also a free right Anโˆ’1 -module of rank one, using the anti-involution ฮธ from Proposition 5.3 and Remark 5.5. In fact, the uniqueness of the standard form (4.7) shown in the proof of Theorem B, implies that for all 1 6 k 6 d โˆ’ 1, the map ฯ•k : Anโˆ’1 โŠ—Anโˆ’2 Anโˆ’1 โ†’ Mk , a โŠ— a0 7โ†’ aTnk a0 , is an isomorphism of Anโˆ’1 -bimodules. Now the result follows from (the proof of) Theorem B.  Remark 5.7. Notice that the proof of Proposition 5.6 also categorifies Corollary 5.1. 6. Proof of Theorem D: Finite-dimensional generalized nil-Coxeter algebras We now prove Theorem D, which classifies the generalized nil-Coxeter algebras of finite k-rank. The bulk of the proof involves showing (1) =โ‡’ (2). We again employ the diagrammatic calculus used to show Theorem B, now applied to the five diagrams in Figure 3 below. We begin by assuming that W = W (M ) is a generalized Coxeter group, and classify the algebras N C(M ) that have finite k-rank. Following this classification, we address the remaining finite complex reflection groups W (and all d), followed by the infinite discrete complex reflection groups with their Coxeter-type presentations. Case 1. Suppose mii = 2 for all i โˆˆ I. In this case W (M ) is a Coxeter group, so by e.g. [Hum, Chapter 7], N C(M ) has a k-basis in bijection with W (M ), which must therefore be finite. GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2991 ฮฑ B1 ฮฒ1 B2 ยทยทยท Bm 0 ฮฒm0 Bm ฮณ A + C ฮฑ ฮฑ A ฮณ B10 B + ฮฒ1 ยทยทยท 0 Bm 0 ฮฒm 0 0 Bm Fig. 3.2 (m0 = m โˆ’ 1) ฮณ ฮฑ B20 ฮณ D C Fig. 3.1 ฮฑ B1 ฮฒ1 B2 ยทยทยท Bm 0 ฮฒm 0 D C ฮด ฮฑ B10 s t ฮฒ1 B + ฮด ฮณ A + A Bm B20 ยทยทยท 0 Bm 0 ฮฒm 0 ฮณ 0 Bm Fig. 3.4 (m0 = m โˆ’ 1) u C Fig. 3.3 ฮฑ B1 ฮฒ1 B2 ยทยทยท Bm 0 ฮฒm0 Bm ฮณ A + ฮฑ B10 ฮฒ1 B20 ยทยทยท 0 Bm 0 ฮฒm0 0 Bm Fig. 3.5 (m0 = m โˆ’ 1) Figure 3. Modules for the infinite-dimensional generalized nilCoxeter algebras Case 2. Suppose mฮฑฮฑ , mฮณฮณ > 3 for some ฮฑ, ฮณ โˆˆ I with mฮฑฮณ > 3. In this case we appeal to Figure 3.1 and work as in the proof of [Mar, Proposition 3.2]. Thus, fix a free k-module M with basis given by the countable set {Ar , Br , Cr , Dr : r > 1}, and define an N C(M )-action via Figure 3.1. Namely, Ti kills all basis vectors for all i โˆˆ I, with the following exceptions: Tฮฑ (Ar ) := Br , Tฮณ (Br ) := Cr , Tฮณ (Cr ) := Dr , Tฮฑ (Dr ) := Ar+1 , โˆ€r > 1. 2992 APOORVA KHARE (The โ€œ+โ€ at the head of an arrow refers precisely to the index increasing by 1.) It is easy to verify that the defining relations of N C(M ) hold in Endk (M ), as they hold on each Ar , Br , Cr , Dr . Therefore M is a module over N C(M ) that is generated by A1 , but is not finitely generated as a k-module. As N C(M )  M , N C(M ) is also not a finitely generated k-module. This approach is used in the remainder of the proof, to obtain a k-basis and the N C(M )-action on it, from the diagrams in Figure 3. Thus we only mention the figure corresponding to each of the cases below. Case 3. Figure 3.1 is actually a special case of Figure 3.2, and was included to demonstrate a simpler case. Now suppose more generally that there are two nodes ฮฑ, ฮณ โˆˆ I such that mฮฑฮฑ , mฮณฮณ > 3. Since the Coxeter graph is connected, there exist nodes ฮฒ1 , . . . , ฮฒmโˆ’1 for some m > 1 (in the figure we write m0 := m โˆ’ 1), such that ฮฑ โ†โ†’ ฮฒ1 โ†โ†’ ยทยทยท โ†โ†’ ฮฒmโˆ’1 โ†โ†’ ฮณ is a path (so each successive pair of nodes is connected by at least a single edge). Now appeal to Figure 3.2, i.e., define an N C(M )-module structure on the free k-module 0 0 M := spank {Ar , B1r , . . . , Bmr , Cr , B1r , . . . , Bmr : r > 1}, where each Ti kills all basis vectors above, except for the actions obtained from Figure 3.2. Once again, M is generated by A1 , so proceed as above to show that N C(M ) is not finitely generated. Case 4. The previous cases reduce the situation to a unique vertex ฮฑ in the Coxeter graph of M for which mฮฑฮฑ > 3. The next two steps show that ฮฑ is adjacent to a unique node ฮณ, and that mฮฑฮณ = 3. First suppose ฮฑ is adjacent to ฮณ with mฮฑฮณ > 4. Now appeal to Figure 3.3, setting (s, t, u) (ฮฑ, ฮฑ, ฮณ), and define an N C(M )module structure on M := spank {Ar , Br , Cr : r > 1}. Then proceed as above. Case 5. Next suppose ฮฑ is adjacent in the Coxeter graph to two nodes ฮณ, ฮด. By the previous case, mฮฑฮณ = mฮฑฮด = 3. Now appeal to Figure 3.4 with m = 1, to define 0 an N C(M )-module structure on M := spank {Ar , B1r , B1r , Cr , Dr : r > 1}, and proceed as in the previous cases. We now observe that if N C(M ) is finitely generated, then so is N CM ((2, . . . , 2)), which corresponds to the Coxeter group WM ((2, . . . , 2)). Hence the Coxeter graph of M is of finite type. These graphs were classified by Coxeter [Cox1, Cox2]. We now rule out all cases other than type A, in which case the above analysis shows that d = (2, . . . , 2, d) or (d, 2, . . . , 2). Case 6. First notice that dihedral types (i.e., types G2 , H2 , I) are already ruled out by the above cases. The same cases also rule out one possibility in types B, C, H, where we may now set n > 3. For the remaining cases of types B, C, H, assume that the Coxeter graph is labelled ฮฑ โ†โ†’ ฮฒ1 โ†โ†’ ยทยทยท โ†โ†’ ฮฒmโˆ’1 โ†โ†’ ฮณ, with mฮฑฮฑ > 3, mฮณฮณ = 2, mฮฒmโˆ’1 ฮณ > 4. In this case we construct the N C(M )-module M by appealing to Figure 3.5; now proceed as above. Case 7. The next case is of type Dn , with n > 4. Notice that ฮฑ is an extremal (i.e., pendant) vertex by the above analysis. First assume ฮฑ is the extremal node GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2993 on the โ€œlong armโ€ of the Coxeter graph. Now appeal to Figure 3.4 with m = n โˆ’ 2, to construct an N C(M )-module M . The other sub-case is when ฮฑ is one of the other two extremal nodes in the Dn -graph. Define the quotient algebra N C 0 (M ) whose Coxeter graph is of type D4 (i.e., where we kill the n โˆ’ 4 generators Ti in the long arm that are the furthest away from ฮฑ). Now repeat the construction in the previous paragraph, using Figure 3.4 with m = 2. It is easy to verify that the space M is a module for N C 0 (M ), hence for the algebra N CD4 ((2, 2, 2, mฮฑฮฑ )). This allows us to proceed as in the previous sub-case and show that N C 0 (M ) is not finitely generated, whence neither is N C(M ). Case 8. If the Coxeter graph is of type E, then we may reduce to the Dn -case by the analysis in the previous case. Hence it follows using Figure 3.4 that N C(M ) is not finitely generated. Case 9. If the Coxeter graph is of type F4 , then we may reduce to the Bn -case by the analysis in Case 7. It now follows from Case 6 that N C(M ) is not finitely generated. This completes the classification for generalized Coxeter groups W (M ). We now appeal to the classification and presentation of all finite complex reflection groups, whose Coxeter graph is connected. These groups and their presentations are listed in [BMR2, Tables 1โ€“4]. In what follows, we adopt the following notation: if W = Gm for 4 6 m 6 37, then the corresponding generalized nil-Coxeter algebras will be denoted by N Cm (d). Similarly if W = G(de, e, r), then we work with N C(de,e,r) (d). In what follows, we will often claim that N CW (d) is not finitely generated (over k), omitting the phrase โ€œunless it is the usual nil-Coxeter algebra over a finite Coxeter groupโ€. Case 10 (Exceptional types with finite Coxeter graph). If W = Gm for m = 4, 8, 16, 25, 32, then its Coxeter graph is of type A. This case has been addressed above; thus the only possibility that N CW (d) has finite rank is that it equals N CAn ((2, . . . , 2, d)) for d > 2, as desired. Next if W = Gm for m = 5, 10, 18, 26, then its Coxeter graph is of type B, which was also addressed above and never yields an algebra of finite k-rank. Now suppose W = G29 . Then s, t, u form a sub-diagram of type B3 , whence the quotient algebra 0 N C29 generated by Ts , Tt , Tu is not finitely generated, by arguments as in Case 7 above. It follows that N C29 (d) is also not finitely generated. The next case is if W = Gm for m = 6, 9, 14, 17, 20, 21. In this case the Coxeter graph is of dihedral type, which was also addressed above. Case 11 (All other exceptional types). For the remaining exceptional values of m โˆˆ [4, 37], with W not a finite Coxeter group, we will appeal to Figure 3.3. There are three cases: first, suppose m = 31. In this case, set (s, t, u) (s, u, t) in Figure 3.3 and define an N Cm (d)-module M that is k-free with basis {Ar , Br , Cr : r > 1}. Now proceed as above. Next if m = 33, 34, then set (s, t, u) (w, t, u) in Figure 3.3 to define an N Cm (d)-module M , and proceed as above. Finally, fix any other m, i.e., m = 7, 11, 12, 13, 15, 19, 22, 24, 27. In this case, use Figure 3.3 to define an N Cm (d)-module M , and proceed as above. 2994 APOORVA KHARE Case 12 (The infinite families). It remains to consider the six infinite families enumerated in [BMR2], which make up the family G(de, e, r). Three of the families consist of finite Coxeter groups of types A, B, I, which were considered above. We now consider the other three families. (a) Suppose W = G(de, e, r) with e > 3. Then by [BMR2, Table 1], consider 0 the quotient algebra N C(de,e,r) of N C(de,e,r) (d) which is generated by s, t := 0 0 t2 , u := t2 , by killing all other generators Ti . The generators of N C(de,e,r) now satisfy the relations Tsds = Ttdt = Tudu = 0, Ts Tt Tu = Tt Tu Ts , T T T T ยท ยท ยท = T T Tu Ts ยท ยท ยท . } | u s {zt u } | s t {z (e+1) times (e+1) times 0 Thus, use Figure 3.3 to define an N C(de,e,r) -module structure on M , and proceed as above to show that N C(de,e,r) (d) is not finitely generated. (b) Suppose W = G(2d, 2, r) with d > 2; see [BMR2, Table 2]. Apply a similar argument as in the previous sub-case, using the same generators and the same figure. (c) Suppose W = G(e, e, r) with e > 2 and r > 2. If e = 2, then G(2, 2, r) is a finite Coxeter group, hence was addressed above. Next, if r > 3 then killing Ts reduces to (a quotient of) the Dn -case, which was once again addressed above. Finally, suppose r = 3 6 e. Setting s := t3 , t := t02 , u := t2 , the generators of N C(e,e,3) satisfy Tsds = Ttdt = Tudu = 0, 2 2 (Ts Tt Tu ) = (Tt Tu Ts ) , Ts Tt Ts = Tt Ts Tt , Ts Tu Ts = Tu Ts Tu , T T Tu Tt ยท ยท ยท = Tt Tu Tt Tu ยท ยท ยท . | u t {z } | {z } e times e times Once again, use Figure 3.3 to define an N C(e,e,3) -module structure on M , and proceed as above. This completes the proof of (1) =โ‡’ (2) for finite complex reflection groups. Next, by e.g. [Hum, Chapter 7], for no infinite Coxeter group W is N CW ((2, . . . , 2)) a finitely generated k-module, whence the same result holds for N CW (d) when all di > 2. We now use the classification of the (remaining) infinite complex reflection groups W associated to a connected braid diagram. These groups were described in [Pop1] and subsequently in [Mal]. Thus, there exists a complex affine space E with group of translations V ; choosing a basepoint v0 โˆˆ E, we can identify the semidirect product GL(V ) n V with the group A(E) of affine transformations of E. Moreover, W โŠ‚ A(E). Define Lin(W ) to be the image of W in the factor group GL(V ), and Tran(W ) to be the subset of W in V , i.e., (6.1) Tran(W ) := W โˆฉ V, Lin(W ) := W/ Tran(W ). It remains to consider three cases for irreducible infinite complex reflection groups W. Case 13. The group W is noncrystallographic, i.e., E/W is not compact. Then by [Pop1, Theorem 2.2], there exists a real form ER โŠ‚ E whose complexification is E, i.e., ER โŠ—R C = E. Moreover, by the same theorem, restricting the elements of W to ER yields an affine Weyl group WR . Hence if N CW (d) is a finitely generated k-module, then so is N CWR ((2, . . . , 2)), which is impossible. GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2995 Case 14. The group W is a genuine crystallographic group, i.e., E/W is compact and Lin(W ) is not the complexification of a real reflection group. Such groups were studied by Malle in [Mal], and Coxeter-type presentations for these groups were provided in Tables I, II in loc. cit. Specifically, Malle showed that these groups are quotients of a free monoid by a set of braid relations and order relations, together with one additional order relation R0m0 = 1. We now show that for none of these groups W is the algebra N CW (d) (defined in Definition 1.11) a finitely generated k-module. To do so, we proceed as above, by specifying the sub-figure in Figure 3 that corresponds to each of these groups. There are three sub-cases: (1) Suppose W is the group [G(3, 1, 1)] in [Mal, Table I], or [Km ] in [Mal, Table II] for m = 4, 8, 25, 32. For these groups we appeal to Figure 3.1 and proceed as in Case 2 above. (2) For W = [K33 ], [K34 ], notice that it suffices to show the claim that given f3 Coxeter graph (i.e., a 4-cycle) with nodes labelled ฮฑ1 , . . . , ฮฑ4 in the A clockwise fashion, the corresponding algebra N CA f3 (d) is not a finitely generated k-module. For this we construct a module M , using Figure 4 below with n = 4. Now proceeding as above shows the claim, and hence the result for [K33 ], [K34 ]. Bn ฮฑn B1 + ฮฑ1 .. . ยทยทยท B2 Figure 4. Module M for N CAfn (d) (3) For the remaining cases in [Mal, Tables I, II], we appeal to Figure 3.3 as in Case 11 above, with three suitably chosen generators in each case. Case 15. Finally, we consider the remaining โ€œnongenuine, crystallographicโ€ cases as in [Pop1, Table 2]. Thus, E/W is compact and Lin(W ) is the complexification of a real reflection group. In these cases, verify by inspection from [Pop1, Table 2] that the cocycle c is always trivial. Thus W = Lin(W )nTran(W ), with W 0 := Lin(W ) a finite Weyl group, and Tran(W ) a lattice of rank 2|I 0 |, where I 0 indexes the simple reflections in the Weyl group W 0 . We now claim that the corresponding family of generalized nil-Coxeter algebras N CW (d) are not finitely generated as k-modules. To show the claim requires a presentation of W in terms of generating reflections. The following recipe for such a presentation was communicated to us by Popov [Pop2]. Notice from e.g. [Pop1, Table 2] that Tran(W ) is a direct sum of two Lin(W )-stable lattices ฮ›1 and ฮ›2 = ฮฑฮ›1 (with ฮฑ 6โˆˆ R), each of rank |I 0 |. Thus, ฮ›1 โˆผ = ฮ›2 as ZW 0 -modules, 0 with W = Lin(W ) a finite real reflection group as above. Moreover, for j = 1, 2, the semidirect product Sj := W 0 n ฮ›j is a real crystallographic reflection group whose fundamental domain is a simplex; this yields a presentation of Sj via |I 0 | + 1 generating reflections in the codimension-one faces of this simplex. One now combines these presentations for S1 , S2 to obtain a system of |I 0 | + 2 generators for 2996 APOORVA KHARE W ; see in this context the remarks following [Mal, Theorem 3.1]. In this setting, it follows by [Pop1, Theorem 4.5] that each Sj is isomorphic, as a real reflection group, f0 over W 0 , since the Coxeter type of Sj is determined to the affine Weyl group W by the Coxeter types of W 0 and ฮ›j . Thus W is in some sense a โ€˜double affine Weyl groupโ€™. (For simply-laced W 0 , it is also easy to verify by inspection from [Pop1, Table 2] that ฮ›j is isomorphic as a ZW 0 -module to the root lattice for W 0 , whence f0 for j = 1, 2.) Sj โˆผ =W Equipped with this presentation of W from [Pop2], we analyze N CW (d) as follows. Fix a ZW 0 -module isomorphism ฯ• : ฮ›1 โ†’ ฮ›2 , and choose affine reflections s0j โˆˆ Sj , corresponding to ยต1 and ยต2 = ฯ•(ยต1 ) respectively, which together with f0 . Then W  W f0 upon the simple reflections {si : i โˆˆ I 0 } โŠ‚ W generate Sj โˆผ =W quotienting by the relation: s01 = s02 . Using the presentation of N CW (d) via the corresponding |I 0 | + 2 generators {Ti : i โˆˆ I 0 } t {T01 , T02 }, N CW (d)  N CW ((2, . . . , 2))  N CW ((2, . . . , 2))/(T01 โˆ’T02 ) โˆผ = N C f0 ((2, . . . , 2)), W and this last term is an affine Weyl nil-Coxeter algebra, hence is not finitely generated as a k-module. Therefore neither is N CW (d), as desired. This shows that (1) =โ‡’ (2); the converse follows by [Hum, Chapter 7] and Theorem B. We now show that (2) and (3) are equivalent. Note from the above case-bycase analysis that if N CW (d) is not finitely generated, then either it surjects onto an affine Weyl nil-Coxeter algebra N CW f0 ((2, . . . , 2)), or one can define a module M as above, and for each r > 1 there exists a word Twr โˆˆ N CW (d), expressed using O(r) generators, which sends the k-basis vector A1 โˆˆ M to Ar . It follows in both cases that m is not nilpotent. Next, if W = W (M ) is a finite Coxeter group, then it is well-known (see e.g. [Hum, Chapter 7]) that m is nilpotent. Finally, if N C(M ) = N CA (n, d), then m is nilpotent by Theorem C. This shows (2) โ‡โ‡’ (3). The final statement on the length function ` and the longest element also follows from [Hum, Chapter 7] and Theorem C.  Remark 6.2. If M is a generalized Coxeter matrix with some mij = โˆž, then we can similarly work with M the k-span of {ar , br : r > 1}, where Ti : ar 7โ†’ br , br 7โ†’ 0, Tj : br 7โ†’ ar+1 , ar 7โ†’ 0, and all other Tk kill M . It follows that N C(M ) once again has infinite k-rank. Acknowledgments The author is grateful to Ivan Marin, Vladimir Popov, and Victor Reiner for informative and stimulating correspondences; and to James Humphreys for carefully going through an earlier draft and providing valuable feedback. The author also thanks Daniel Bump, Gunter Malle, Eric Rowell, Travis Scrimshaw, and Bruce Westbury for useful references and discussions. The author is partially supported by a Young Investigator Award from the Infosys Foundation. References [AnSc] [As] Nicolaฬs Andruskiewitsch and Hans-Juฬˆrgen Schneider, On the classification of finitedimensional pointed Hopf algebras, Annals of Mathematics 171(1):375โ€“417, 2010. Joachim Assion, A proof of a theorem of Coxeter, C. R. Math. Rep. Acad. Sci. Canada 1(1):41โ€“44, 1978/79. GENERALIZED NIL-COXETER ALGEBRAS OVER COMPLEX REFLECTION GROUPS2997 [Ba] Tathagata Basak, On Coxeter diagrams of complex reflection groups, Transactions of the American Mathematical Society 364(9):4909โ€“4936, 2012. [BSS] Chris Berg, Franco Saliola, and Luis Serrano, Pieri operators on the affine nilCoxeter algebra, Transactions of the American Mathematical Society 366(1):531โ€“546, 2014. [BGG] Joseph N. Bernstein, Israel M. Gelfand, and Sergei I. Gelfand, Schubert cells and cohomology of the spaces G/P , Russian Mathematical Surveys 28(2):1โ€“26, 1973. [BS] Joseph N. Bernstein and Ossip Schwarzman, Complex crystallographic Coxeter groups and affine root systems, Journal of Nonlinear Mathematical Physics 13(2):163โ€“182, 2006. [Be] David Bessis, Zariski theorems and diagrams for braid groups, Inventiones mathematicae 145(3):487โ€“507, 2001. [BMR1] Michel Broueฬ, Gunter Malle, and Raphaeฬˆl Rouquier, On complex reflection groups and their associated braid groups, Representations of groups (Banff, 1994), CMS Conference Proceedings 16:1โ€“13, American Mathematical Society, Providence, 1995. [BMR2] Michel Broueฬ, Gunter Malle, and Raphaeฬˆl Rouquier, Complex reflection groups, braid groups, Hecke algebras, Journal fuฬˆr die reine und angewandte Mathematik 500:127โ€“190, 1998. [Ca] Roger W. Carter, Representation theory of the 0-Hecke algebra, Journal of Algebra 104(1):89โ€“103, 1986. [Ch] Eirini Chavli, The Broueฬโ€“Malleโ€“Rouquier conjecture for the exceptional groups of rank 2, Ph.D. thesis, 2016. [Coh] Arjeh M. Cohen, Finite complex reflection groups, Annales scientifiques de lโ€™Eฬcole Normale Supeฬrieure, Seฬr. 4, 9(3):379โ€“436, 1976. [Cox1] Harold S.M. Coxeter, Discrete groups generated by reflections, Annals of Mathematics 35(3):588โ€“621, 1934. [Cox2] Harold S.M. Coxeter, The complete enumeration of finite groups of the form Ri2 = (Ri Rj )kij = 1, Journal of the London Mathematical Society s1-10(1):21โ€“25, 1935. [Cox3] Harold S.M. Coxeter, Factor groups of the braid group, Proceedings of the 4th Canadian Mathematical Congress (Banff, 1957), University of Toronto Press, 95โ€“122, 1959. [Dr] Vladimir G. Drinfeld, Degenerate affine Hecke algebras and Yangians, Functional Analysis and its Applications 20(1):58โ€“60, 1986. [Et] Pavel Etingof, Proof of the Broueฬโ€“Malleโ€“Rouquier conjecture in characteristic zero (after I. Losev and I. Marinโ€“G. Pfeiffer), Arnold Mathematical Journal 3(3):445โ€“449, 2017. [EG] Pavel Etingof and Victor Ginzburg, Symplectic reflection algebras, Calogero-Moser space, and deformed Harish-Chandra homomorphism, Inventiones mathematicae 147(2):243โ€“ 348, 2002. [ES] Pavel Etingof and Olivier Schiffmann, Lectures on Quantum Groups, Lectures in Mathematical Physics, International Press, Somerville, MA, 1998. [FS] Sergey Fomin and Richard Stanley, Schubert polynomials and the nil-Coxeter algebra, Advances in Mathematics 103(2):196โ€“207, 1994. [GHV] Matฤฑฬas Granฬƒa, Istvaฬn Heckenberger, and Leandro Vendramin, Nichols algebras of group type with many quadratic relations, Advances in Mathematics 227(5):1956โ€“1989, 2011. [HV1] Istvaฬn Heckenberger and Leandro Vendramin, A classification of Nichols algebras of semi-simple Yetter-Drinfeld modules over non-abelian groups, Journal of the European Mathematical Society 19(2):299โ€“356, 2017. [HV2] Istvaฬn Heckenberger and Leandro Vendramin, The classification of Nichols algebras over groups with finite root system of rank two, Journal of the European Mathematical Society 19(7):1977โ€“2017, 2017. [Hug1] Mervyn C. Hughes, Complex reflection groups, Communications in Algebra 18(12):3999โ€“ 4029, 1990. [Hug2] Mervyn C. Hughes, Extended root graphs for complex reflection groups, Communications in Algebra 27(1):119โ€“148, 1999. [Hum] James E. Humphreys, Reflection groups and Coxeter groups, Cambridge studies in advanced mathematics no. 29, Cambridge University Press, Cambridge-New YorkMelbourne, 1990. [Kha] Apoorva Khare, Generalized nil-Coxeter algebras, cocommutative algebras, and the PBW property, AMS Contemporary Mathematics 688:139โ€“168, 2017. [Kho] Mikhail Khovanov, NilCoxeter algebras categorify the Weyl algebra, Communications in Algebra 29(11):5033โ€“5052, 2001. 2998 [KL] [KK] [Ko] [LS] [LT] [Lo] [Lu] [Mal] [Mar] [MP] [No] [ORS] [Pop1] [Pop2] [ReS] [ST] [SW1] [SW2] APOORVA KHARE Mikhail Khovanov and Aaron D. Lauda, A diagrammatic approach to categorification of quantum groups I, Representation Theory 13:309โ€“347, 2009. Bertram Kostant and Shrawan Kumar, The nil Hecke ring and cohomology of G/P for a Kac-Moody group G, Advances in Mathematics 62(3):187โ€“237, 1986. David W. Koster, Complex reflection groups, Ph.D. thesis, University of Wisconsin, 1975. Alain Lascoux and Marcel-Paul Schuฬˆtzenberger, Fonctorialiteฬ des polynoฬ‚mes de Schubert, Invariant Theory (R. Fossum, W. Haboush, M. Hochster and V. Lakshmibai, Eds.), Contemporary Mathematics Volume 88, pages 585โ€“598, American Mathematical Society, Providence, 1989. Gustav I. Lehrer and Donld E. Taylor, Unitary reflection groups, Australian Mathematical Society Lecture Series Volume 20, Cambridge University Press, Cambridge, 2009. Ivan Losev, Finite-dimensional quotients of Hecke algebras, Algebra & Number Theory 9(2):493โ€“502, 2015. George Lusztig, Affine Hecke algebras and their graded version, Journal of the American Mathematical Society 2:599โ€“635, 1989. Gunter Malle, Presentations for crystallographic complex reflection groups, Transformation Groups 1(3):259โ€“277, 1996. Ivan Marin, The freeness conjecture for Hecke algebras of complex reflection groups, and the case of the Hessian group G26 , Journal of Pure and Applied Algebra 218(4):704โ€“720, 2014. Ivan Marin and Goฬˆtz Pfeiffer, The BMR freeness conjecture for the 2-reflection groups, Mathematics of Computation, published online, 2016. P.N. Norton, 0-Hecke algebras, Journal of the Australian Mathematical Society A, 27(3):337โ€“357, 1979. Peter Orlik, Victor Reiner, and Anne V. Shepler, The sign representation for Shephard groups, Mathematische Annalen 322(3):477โ€“492, 2002. Vladimir L. Popov, Discrete complex reflection groups, Communications of the Mathematical Institute, vol. 15, Rijksuniversiteit Utrecht, 89 pp., 1982. Vladimir L. Popov, personal communication, Feb. 2016. Victor Reiner and Anne V. Shepler, Invariant derivations and differential forms for reflection groups, preprint, arXiv:1612.01031. Geoffrey C. Shephard and John A. Todd, Finite unitary reflection groups, Canadian Journal of Mathematics 6:274โ€“304, 1954. Anne V. Shepler and Sarah Witherspoon, A Poincareฬโ€“Birkhoffโ€“Witt theorem for quadratic algebras with group actions, Transactions of the American Mathematical Society 366(12):6483โ€“6506, 2014. Anne V. Shepler and Sarah Witherspoon, Poincareฬโ€“Birkhoffโ€“Witt Theorems, Commutative Algebra and Noncommutative Algebraic Geometry, Volume I: Expository Articles (D. Eisenbud, S.B. Iyengar, A.K. Singh, J.T. Stafford, and M. Van den Bergh, Eds.), Mathematical Sciences Research Institute Proceedings Volume 67, pages 259โ€“290, Cambridge University Press, Cambridge, 2015. Department of Mathematics, Indian Institute of Science, Bangalore โ€“ 560012, India E-mail address: [email protected]
4math.GR
Feudal Reinforcement Learning for Dialogue Management in Large Domains Inฬƒigo Casanueva1 , Paweล‚ Budzianowski1 , Pei-Hao Su2 , Stefan Ultes1 , Lina Rojas-Barahona1 , Bo-Hsiang Tseng1 and Milica GasฬŒicฬ1 1 Department of Engineering, University of Cambridge, UK 2 PolyAI Limited, London, UK [email protected] arXiv:1803.03232v1 [cs.CL] 8 Mar 2018 Abstract Reinforcement learning (RL) is a promising approach to solve dialogue policy optimisation. Traditional RL algorithms, however, fail to scale to large domains due to the curse of dimensionality. We propose a novel Dialogue Management architecture, based on Feudal RL, which decomposes the decision into two steps; a first step where a master policy selects a subset of primitive actions, and a second step where a primitive action is chosen from the selected subset. The structural information included in the domain ontology is used to abstract the dialogue state space, taking the decisions at each step using different parts of the abstracted state. This, combined with an information sharing mechanism between slots, increases the scalability to large domains. We show that an implementation of this approach, based on Deep-Q Networks, significantly outperforms previous state of the art in several dialogue domains and environments, without the need of any additional reward signal. 1 Introduction Task-oriented Spoken Dialogue Systems (SDS), in the form of personal assistants, have recently gained much attention in both academia and industry. One of the most important modules of a SDS is the Dialogue Manager (DM) (or policy), the module in charge of deciding the next action in each dialogue turn. Reinforcement Learning (RL) (Sutton and Barto, 1999) has been studied for several years as a promising approach to model dialogue management (Levin et al., 1998; Henderson et al., 2008; Pietquin et al., 2011; Young et al., 2013; Casanueva et al., 2015; Su et al., 2016). However, as the dialogue state space increases, the number of possible trajectories needed to be explored grows exponentially, making traditional RL methods not scalable to large domains. Hierarchical RL (HRL), in the form of temporal abstraction, has been proposed in order to mitigate this problem (Cuayaฬhuitl et al., 2010, 2016; Budzianowski et al., 2017; Peng et al., 2017). However, proposed HRL methods require that the task is defined in a hierarchical structure, which is usually handcrafted. In addition, they usually require additional rewards for each subtask. Space abstraction, instead, has been successfully applied to dialogue tasks such as Dialogue State Tracking (DST) (Henderson et al., 2014b), and policy transfer between domains (GasฬŒicฬ et al., 2013, 2015; Wang et al., 2015). For DST, a set of binary classifiers can be defined for each slot, with shared parameters, learning a general way to track slots. The policy transfer method presented in (Wang et al., 2015), named Domain Independent Parametrisation (DIP), transforms the belief state into a slot-dependent fixed size representation using a handcrafted feature function. This idea could also be applied to large domains, since it can be used to learn a general way to act in any slot. In slot-filling dialogues, a HRL method that relies on space abstraction, such as Feudal RL (FRL) (Dayan and Hinton, 1993), should allow RL scale to domains with a large number of slots. FRL divides a task spatially rather than temporally, decomposing the decisions in several steps and using different abstraction levels in each sub-decision. This framework is especially useful in RL tasks with large discrete action spaces, making it very attractive for large domain dialogue management. In this paper, we introduce a Feudal Dialogue Policy which decomposes the decision in each turn into two steps. In a first step, the policy decides if it takes a slot independent or slot dependent action. Then, the state of each slot sub-policy is abstracted to account for features related to that slot, and a primitive action is chosen from the previously selected subset. Our model does not require any modification of the reward function and the hierarchical architecture is fully specified by the structured database representation of the system (i.e. the ontology), requiring no additional design. 2 Main belief state (๐‘) ๐œ™1 (๐‘) ๐œ™* (๐‘) ๐‘„,10 Qฯ€ (b, a) = E{R|bt = b, at = a} (1) PT โˆ’1 (ฯ„ โˆ’t) rฯ„ and ฮณ is a discount where R = ฯ„ =t ฮณ factor, with 0 โ‰ค ฮณ โ‰ค 1. The objective of RL is to find an optimal policy ฯ€ โˆ— , i.e. a policy that maximizes the expected return in each belief state. In Value-based algorithms, the optimal policy can be found by greedily taking the action which maximises Qฯ€ (b, a). In slot-filling SDSs the belief state space B is defined by the ontology, a structured representation of a database of entities that the user can retrieve by talking to the system. Each entity has a set of properties, refereed to as slots S, where each of the slots can take a value from the set Vs . The belief state b is then defined as the concatenation of the probability distribution of each slot, plus a set of general features (e.g. the communication function used by the user, the database search method...) (Henderson et al., 2014a). The set A is defined as a set of summary actions, where the actions can be either slot dependent (e.g. request(food), confirm(area)...) or slot independent1 (e.g. hello(), inform()...). The belief space B is defined by the ontology, therefore belief states of different domains will have different shapes. In order to transfer knowledge between domains, Domain Independent Parametrization (DIP) (Wang et al., 2015) proposes to abstract the belief state b into a fixed 1 We include the summary actions dependent on all the slots, such as inform(), in this group. - ๐œ‹* Argmax over master actions ๐‘„,* - โ€ฆ ๐‘„,* ( ) Argmax over slot independent primitives ๐‘„,10 / ๐‘") ๐œ‹2 " โ€ฆ ๐œ‹"# ๐œ‹"( " โ€ฆ ๐œ™") (๐‘) ๐‘"# ๐‘"( ๐œ‹1 ๐‘* Background Dialogue management can be cast as a continuous MDP (Young et al., 2013) composed of a continuous multivariate belief state space B, a finite set of actions A and a reward function R(bt , at ). At a given time t, the agent observes the belief state bt โˆˆ B, executes an action at โˆˆ A and receives a reward rt โˆˆ R drawn from R(bt , at ). The action taken, a, is decided by the policy, defined as the function ฯ€(b) = a. For any policy ฯ€ and b โˆˆ B, the Q-value function can be defined as the expected (discounted) return R, starting from state b, taking action a, and then following policy ฯ€ until the end of the dialogue at time step T : ๐œ™"( (๐‘) ๐œ™"# (๐‘) ๐‘1 " ๐œ‹") " " " ๐‘„,(/ โ€ฆ ๐‘„,(/ ๐‘„,#/ โ€ฆ ๐‘„,#/ โ€ฆ ๐‘„,)/ โ€ฆ ๐‘„,)/ ( ) ( ) ( ) Argmax over slots and slot dependent primitives Figure 1: Feudal dialogue architecture used in this work. The sub-policies surrounded by the dashed line have shared parameters. The simple lines show the data flow and the double lines the sub-policy decisions. size representation. As each action is either slot independent or dependent on a slot s, a feature function ฯ†dip (b, s) can be defined, where s โˆˆ Sโˆชsi and si stands for slot independent actions. Therefore, in order to compute the policy, Q(b, a) can be approximated as Q(ฯ†dip (b, s), a), where s is the slot associated to action a. Wang et al. (2015) presents a handcrafted feature function ฯ†dip (b, s). It includes the slot independent features of the belief state, a summarised representation of the joint belief state, and a summarised representation of the belief state of the slot s. Section 4 gives a more detailed description of the ฯ†dip (b, s) function used in this work. 3 Feudal dialogue management FRL decomposes the policy decision ฯ€(b) = a in each turn into several sub-decisions, using different abstracted parts of the belief state in each subdecision. The objective of a task oriented SDS is to fulfill the users goal, but as the goal is not observable for the SDS, the SDS needs to gather enough information to correctly fulfill it. Therefore, in each turn, the DM can decompose its decision in two steps: first, decide between taking an action in order to gather information about the user goal (information gathering actions) or taking an action to fulfill the user goal or a part of it (information providing actions) and second, select a (primitive) action to execute from the previously selected subset. In a slot-filling dialogue, the set of information gathering actions can be defined as the set of slot dependent actions, while the set of information providing actions can be defined as the remaining actions. The architecture of the feudal policy proposed by this work is represented schematically in Figure 1. The (primitive) actions are divided between two subsets; slot independent actions Ai (e.g. hello(), inform()); and slot dependent actions Ad (e.g. request(), confirm())2 . In addition, a set of master m m actions Am = (am i , ad ) is defined, where ai corresponds to taking an action from Ai and am d to taking an action from Ad . Then, a feature function ฯ†s (b) = bs is defined for each slot s โˆˆ S, as well as a slot independent feature function ฯ†i (b) = bi and a master feature function ฯ†m (b) = bm . These feature functions can be handcrafted (e.g. the DIP feature function introduced in section 2) or any function approximator can be used (e.g. neural networks trained jointly with the policy). Finally, a master policy ฯ€m (bm ) = am , a slot independent policy ฯ€i (bi ) = ai and a set of slot specific policies ฯ€s (bs ) = ad , one for each s โˆˆ S, are defined, where am โˆˆ Am , ai โˆˆ Ai and ad โˆˆ Ad . Contrary to other feudal policies, the slot specific sub-policies have shared parameters, in order to generalise between slots (following the idea used by Henderson et al. (2014b) for DST). The differences between the slots (size, value distribution...) are accounted by the feature function ฯ†s (b). Therefore ฯ€m (bm ) is defined as: ฯ€m (bm ) = argmax Qm (bm , am ) (2) am โˆˆAm If ฯ€m (bm ) = am i , the sub-policy run is ฯ€i : ฯ€i (bi ) = argmax Qi (bi , ai ) (3) ai โˆˆAi Else, if ฯ€m (bm ) = am d , ฯ€d is selected. This policy runs each slot specific policy, ฯ€s , for all s โˆˆ S, choosing the action-slot pair that maximises the Q function over all the slot sub-policies. ฯ€d (bs |โˆ€s โˆˆ S) = argmax Qs (bs , ad ) (4) ad โˆˆAd ,sโˆˆS Then, the summary action a is constructed by joining ad and s (e.g. if ad =request() and s=food, then the summary action will be request(food)). A pseudo-code of the Feudal Dialogue Policy algorithm is given in Appendix A. Domain Cambridge Restaurants San Francisco Restaurants Laptops SER Masks User Env. 1 0% on Std. Code CR SFR LAP Env. 2 0% off Std. # constraint slots 3 6 11 Env. 3 15% on Std. Env. 4 15% off Std. # requests 9 11 21 # values 268 636 257 Env. 5 15% on Unf. Env. 6 30% on Std. Table 1: Sumarised description of the domains and environments used in the experiments. Refer to (Casanueva et al., 2017) for a detailed description. 4 Experimental setup The models used in the experiments have been implemented using the PyDial toolkit (Ultes et al., 2017)3 and evaluated on the PyDial benchmarking environment (Casanueva et al., 2017). This environment presents a set of tasks which span different size domains, different Semantic Error Rates (SER), and different configurations of action masks and user model parameters (Standard (Std.) or Unfriendly (Unf.)). Table 1 shows a summarised description of the tasks. The models developed in this paper are compared to the state-ofthe-art RL algorithms and to the handcrafted policy presented in the benchmarks. 4.1 DIP-DQN baseline An implementation of DIP based on Deep-Q Networks (DQN) (Mnih et al., 2013) is implemented as an additional baseline (Papangelis and Stylianou, 2017). This policy, named DIP-DQN, uses the same hyperparameters as the DQN implementation released in the PyDial benchmarks. A DIP feature function based in the description in (Wang et al., 2015) is used, ฯ†dip (b, s) = ฯˆ0 (b) โŠ• ฯˆj (b) โŠ• ฯˆd (b, s), where: โ€ข ฯˆ0 (b) accounts for general features of the belief state, such as the database search method. โ€ข ฯˆj (b) accounts for features of the joint belief state, such as the entropy of the joint belief. โ€ข ฯˆd (b, s) accounts for features of the marginal distribution of slot s, such as the entropy of s. Appendix B shows a detailed description of the DIP features used in this work. 4.2 Feudal DQN policy A Feudal policy based on the architecture described in sec. 3 is implemented, named FDQN. Each sub-policy is constructed by a DQN policy 2 Note that the actions of this set are composed just by the communication function of the slot dependent actions, thus reducing the number of actions compared to A. 3 The implementation of the models can be obtained in www.pydial.org Env. 1 Env. 2 Env. 3 Env. 4 Env. 5 Env. 6 Task CR SFR LAP CR SFR LAP CR SFR LAP CR SFR LAP CR SFR LAP CR SFR LAP Feudal-DQN Suc. Rew. 89.3% 11.7 71.1% 7.1 65.5% 5.7 97.8% 13.1 95.4% 12.4 94.1% 12.0 92.6% 11.7 90.0% 9.7 89.6% 9.4 91.4% 11.2 90.3% 10.2 88.7% 9.8 96.3% 11.5 88.9% 7.9 78.8% 5.2 90.6% 10.4 83.0% 7.1 78.5% 6.0 DIP-DQN Suc. Rew. 48.8% -2.8 25.8% -7.4 26.6% -8.8 85.5% 9.6 85.7% 8.4 89.5% 9.7 86.1% 8.9 59.3% 0.2 71.5% 3.1 82.6% 8.7 86.1% 9.2 74.8% 6.0 74.4% 2.9 75.5% 3.2 64.4% -0.4 83.4% 8.1 71.9% 3.9 66.5% 2.7 Bnch. Rew. 13.5 11.7 10.5 12.2 9.6 7.3 11.9 8.6 6.7 10.7 7.7 5.5 10.5 4.5 4.1 10.0 3.9 3.6 Hdc. Rew. 14.0 12.4 11.7 14.0 12.4 11.7 11.0 9.0 8.7 11.0 9.0 8.7 9.3 6.0 5.3 9.7 6.4 5.5 Table 2: Success rate and reward for Feudal-DQN and DIP-DQN in the 18 benchmarking tasks, compared with the reward of the best performing algorithm in each task (Bnch.) and the handcrafted policy (Hdc.) presented in (Casanueva et al., 2017). (Su et al., 2017). These policies have the same hyperparameters as the baseline DQN implementation, except for the two hidden layer sizes, which are reduced to 130 and 50 respectively. As feature functions, subsets of the DIP features are used: ฯ†m (b) = ฯ†i (b) = ฯˆ0 (b) โŠ• ฯˆj (b) ฯ†s (b) = ฯˆ0 (b) โŠ• ฯˆj (b) โŠ• ฯˆd (b, s) โˆ€s โˆˆ S The original set of summary actions of the benchmarking environment, A, has a size of 5 + 3 โˆ— |S|, where |S| is the number of slots. This set is divided in two subsets4 : Ai of size 6 and Ad of size 4. Each sub-policy (including ฯ€m ) is trained with the same sparse reward signal used in the baselines, getting a reward of 20 if the dialogue is successful or 0 otherwise, minus the dialogue length. 5 Results The results in the 18 tasks of the benchmarking environment after 4000 training dialogues are presented in Table 2. The same evaluation procedure of the benchmarks is used, presenting the mean over 10 different random seeds and testing every seed for 500 dialogues. The FDQN policy substantially outperforms every other other policy in all the environments except Env. 1. The Figure 2: Learning curves for Feudal-DQN and DIPDQN in Env. 4, compared to the two best performing algorithms in (Casanueva et al., 2017) (DQN and GPSarsa). The shaded area depicts the mean ยฑ the standard deviation over ten random seeds. performance increase is more considerable in the two largest domains (SFR and LAP), with gains up to 5 points in accumulated reward in the most challenging environments (e.g. Env. 4 LAP), compared to the best benchmarked RL policies (Bnch.). In addition, FDQN consistently outperforms the handcrafted policy (Hdc.) in environments 2 to 6, which traditional RL methods could not achieve. In Env. 1, however, the results for FDQN and DIP-DQN are rather low, specially for DIP-DQN. Surprisingly, the results in Env. 2, which only differs from Env. 1 in the absence of action masks (thus, in principle, is a more complex environment), outperform every other algorithm. Analysing the dialogues individually, we could observe that, in this environment, both policies are prone to โ€œoverfitโ€ to an action 5 . The performance of FDQN and DIP-DQN in Env. 4 is also better than in Env. 3, while the difference between these environments also lies in the masks. This suggests that an specific action mask design can be helpful for some algorithms, but can harm the performance of others. This is especially severe in the DIP-DQN case, which shows good performance in some challenging environments, but it is more unstable and prone to overfit than FDQN. However, the main purpose of action masks is to reduce the number of dialogues needed to train a policy. Observing the learning curves shown in Figure 2, the FDQN model can learn a nearoptimal policy in large domains in about 1500 dialogues, even if no additional reward is used, making the action masks unnecessary. 4 An additional pass() action is added to each subset, which is taken whenever the other sub-policy is executed. This simplifies the training algorithm. 5 The model overestimates the value of an incorrect action, continuously repeating it until the user runs out of patience. 6 Conclusions and future work We have presented a novel dialogue management architecture, based on Feudal RL, which substantially outperforms the previous state of the art in several dialogue environments. By defining a set of slot dependent policies with shared parameters, the model is able to learn a general way to act in slots, increasing its scalability to large domains. Unlike other HRL methods applied to dialogue, no additional reward signals are needed and the hierarchical structure can be derived from a flat ontology, substantially reducing the design effort. A promising approach would be to substitute the handcrafted feature functions used in this work by neural feature extractors trained jointly with the policy. This would avoid the need to design the feature functions and could be potentially extended to other modules of the SDS, making textto-action learning tractable. In addition, a single model can be potentially used in different domains (Papangelis and Stylianou, 2017), and different feudal architectures could make larger action spaces tractable (e.g. adding a third subpolicy to deal with actions dependent on 2 slots). Acknowledgments This research was funded by the EPSRC grant EP/M018946/1 Open Domain Statistical Spoken Dialogue Systems References Paweล‚ Budzianowski, Stefan Ultes, Pei-Hao Su, Nikola MrksฬŒicฬ, Tsung-Hsien Wen, Inigo Casanueva, Lina M. Rojas Barahona, and Milica GasฬŒicฬ. 2017. Subdomain modelling for dialogue management with hierarchical reinforcement learning. In Proc of SIGDIAL. Inฬƒigo Casanueva, Paweล‚ Budzianowski, Pei-Hao Su, Nikola MrksฬŒicฬ, Tsung-Hsien Wen, Stefan Ultes, Lina Rojas-Barahona, Steve Young, and Milica GasฬŒicฬ. 2017. A benchmarking environment for reinforcement learning based task oriented dialogue management. arXiv preprint arXiv:1711.11023 . Inigo Casanueva, Thomas Hain, Heidi Christensen, Ricard Marxer, and Phil Green. 2015. Knowledge transfer between speakers for personalised dialogue management. In Proceedings of the 16th Annual Meeting of the Special Interest Group on Discourse and Dialogue. pages 12โ€“21. Heriberto Cuayaฬhuitl, Steve Renals, Oliver Lemon, and Hiroshi Shimodaira. 2010. Evaluation of a hierar- chical reinforcement learning spoken dialogue system. Computer Speech & Language 24(2):395โ€“429. Heriberto Cuayaฬhuitl, Seunghak Yu, Ashley Williamson, and Jacob Carse. 2016. Deep reinforcement learning for multi-domain dialogue systems. NIPS Workkshop . Peter Dayan and Geoffrey E Hinton. 1993. Feudal reinforcement learning. In Advances in neural information processing systems. pages 271โ€“278. Milica GasฬŒicฬ, Catherine Breslin, Matthew Henderson, Dongho Kim, Martin Szummer, Blaise Thomson, Pirros Tsiakoulis, and Steve Young. 2013. Pomdpbased dialogue manager adaptation to extended domains. In Proceedings of the SIGDIAL Conference. Milica GasฬŒicฬ, Nikola MrksฬŒicฬ, Pei-hao Su, David Vandyke, Tsung-Hsien Wen, and Steve Young. 2015. Policy committee for adaptation in multidomain spoken dialogue systems. In Automatic Speech Recognition and Understanding (ASRU), 2015 IEEE Workshop on. IEEE, pages 806โ€“812. James Henderson, Oliver Lemon, and Kallirroi Georgila. 2008. Hybrid reinforcement/supervised learning of dialogue policies from fixed data sets. Computational Linguistics 34(4):487โ€“511. M. Henderson, B. Thomson, and J. Williams. 2014a. The Second Dialog State Tracking Challenge. In Proc of SIGdial. M. Henderson, B. Thomson, and S. J. Young. 2014b. Word-based Dialog State Tracking with Recurrent Neural Networks. In Proc of SIGdial. Esther Levin, Roberto Pieraccini, and Wieland Eckert. 1998. Using markov decision process for learning dialogue strategies. In Acoustics, Speech and Signal Processing, 1998. Proceedings of the 1998 IEEE International Conference on. IEEE, volume 1, pages 201โ€“204. Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Alex Graves, Ioannis Antonoglou, Daan Wierstra, and Martin Riedmiller. 2013. Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602 . Alexandros Papangelis and Yannis Stylianou. 2017. Single-model multi-domain dialogue management with deep learning. In International Workshop for Spoken Dialogue Systems. B. Peng, X. Li, L. Li, J. Gao, A. Celikyilmaz, S. Lee, and K.-F. Wong. 2017. Composite Task-Completion Dialogue System via Hierarchical Deep Reinforcement Learning. ArXiv e-prints . Olivier Pietquin, Matthieu Geist, Senthilkumar Chandramohan, and Herveฬ Frezza-Buet. 2011. Sampleefficient batch reinforcement learning for dialogue management optimization. ACM Transactions on Speech and Language Processing (TSLP) 7(3):7. Pei-Hao Su, Pawel Budzianowski, Stefan Ultes, Milica Gasic, and Steve Young. 2017. Sample-efficient actor-critic reinforcement learning with supervised data for dialogue management. Proceedings of SigDial . Pei-Hao Su, Milica Gasic, Nikola Mrksic, Lina RojasBarahona, Stefan Ultes, David Vandyke, TsungHsien Wen, and Steve Young. 2016. Continuously learning neural dialogue management. arXiv preprint arXiv:1606.02689 . Richard S. Sutton and Andrew G. Barto. 1999. Reinforcement Learning: An Introduction. MIT Press. Stefan Ultes, Lina M. Rojas-Barahona, Pei-Hao Su, David Vandyke, Dongho Kim, Inฬƒigo Casanueva, Paweล‚ Budzianowski, Nikola MrksฬŒicฬ, Tsung-Hsien Wen, Milica GasฬŒicฬ, and Steve J. Young. 2017. Pydial: A multi-domain statistical dialogue system toolkit. In ACL Demo. Association of Computational Linguistics. B DIP features This section gives a detailed description of the DIP feature functions ฯ†dip (b, s) = ฯˆ0 (b) โŠ• ฯˆj (b) โŠ• ฯˆd (b, s) used in this work. The differences with the features used in (Wang et al., 2015) and (Papangelis and Stylianou, 2017) are the following: โ€ข No priority or importance features are used. โ€ข No Potential contribution to DB search features are used. โ€ข The joint belief features ฯˆj (b) are extended to account for large-domain aspects. Feature function Feature description Feature size ฯˆ0 (b) last user dialogue act (bin) * DB search method (bin) * # of requested slots (bin) offer happened * last action was Inform no venue * normalised # of slots (1/# of slots) normalised avg. slot length (1/avg. # of values) 7 6 5 1 1 1 1 ฯˆj (b) prob. of the top 3 values of bj prob. of *NONE* value of bj entropy of bj diff. between top and 2nd value probs. (bin) # of slots with top value not *NONE* (bin) 3 1 1 5 5 ฯˆd (b, s) prob. of the top 3 values of s prob. of *NONE* value of s diff. between top and 2nd value probs. (bin) entropy of s # of values of s with prob. > 0 (bin) normalised slot length (1/# of values) slot length (bin) entropy of the distr. of values of s in the DB 3 1 5 1 5 1 10 1 Zhuoran Wang, Tsung-Hsien Wen, Pei-Hao Su, and Yannis Stylianou. 2015. Learning domainindependent dialogue policies via ontology parameterisation. In SIGDIAL Conference. pages 412โ€“416. Steve Young, Milica GasฬŒicฬ, Blaise Thomson, and Jason D Williams. 2013. Pomdp-based statistical spoken dialog systems: A review. Proceedings of the IEEE 101(5):1160โ€“1179. A Feudal Dialogue Policy algorithm Algorithm 1 Feudal Dialogue Policy 1: for each dialogue turn do 2: observe b 3: bm = ฯ†m (b) 4: am = argmax Qm (bm , am ) total am โˆˆAm 5: 6: 7: if am == am i then bi = ฯ†i (b) a = argmax Qi (bi , ai ) . drop to ฯ€i ai โˆˆAi 8: 9: 10: else am == am . drop to ฯ€d d then bs = ฯ†s (b) โˆ€s โˆˆ S slot, act = argmax Qs (bs , ad ) sโˆˆS,ad โˆˆAd a = join(slot, act) end if 13: execute a 14: end for 11: 12: 64 Table 3: List of features composing the DIP features. the tag (bin) denotes that a binary encoding is used for this feature. Some of the joint features ฯˆj (b) are extracted from the joint belief bj , computed as the Cartesian product of the beliefs of the individual slots. * denotes that these features exist in the original belief state b.
2cs.AI
IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS: CONSISTENCY AND FISHER INFORMATION arXiv:1707.04371v1 [math.ST] 14 Jul 2017 JEREMIE HOUSSINEAUโˆ— , SUMEETPAL S. SINGHโ€  , AND AJAY JASRAโ€ก Abstract. Learning the model parameters of a multi-object dynamical system from partial and perturbed observations is a challenging task. Despite recent numerical advancements in learning these parameters, theoretical guarantees are extremely scarce. In this article, we study the identifiability of these parameters and the consistency of the corresponding maximum likelihood estimate (MLE) under assumptions on the different components of the underlying multi-object system. In order to understand the impact of the various sources of observation noise on the ability to learn the model parameters, we study the asymptotic variance of the MLE through the associated Fisher information matrix. For example, we show that specific aspects of the multi-target tracking (MTT) problem such as detection failures and unknown data association lead to a loss of information which is quantified in special cases of interest. Key words. Identifiability, Consistency, Fisher Information AMS subject classifications. 62F12, 62B10 1. Introduction. A multi-object dynamical system is comprised of an unknown and randomly varying number of objects, each of which is a partially observed Markov process. Multi-target tracking refers to the problem of estimating the state of each of these objects from noisy observations that are also corrupted by detection failures and false detections (a.k.a. false alarms). This type of problem arises in many different fields such as Systems Biology [2], Robotics [12], Computer Vision [14] or Surveillance [16]. Different formulations of multi-target tracking exist, including extensions of the single-target approach to multiple targets [1] as well as formulations based on simple point processes [10]. One of the main challenges in multi-target tracking is the uncertainty in the data association, which refers to the problem of finding the right pairing between targets and recorded observations over time, a task further confounded by the corruption of these observations with false positives and detection failures. Inferentially, multitarget tracking is notoriously difficult to solve as it involves an exponentially growing numbers of possible configurations for the data association. Over the past decade there has been significant advancements towards more practical solutions to this inference problem. Some of these include solutions based on sequential Monte Carlo (SMC) [19], hierarchical SMC [15] or Gaussian mixtures [18]. In this article, both the MTT observation model and the motion model of the constituent individual targets are assumed unknown and are instead parameterised and to be inferred from the data. Although multi-target tracking has been an active research field for decades, questions concerning the identifiability and the consistency of the corresponding model parameter estimates have not received the appropriate attention. In this paper we aim to address this gap and shed some light on this issue. Building on results from the literature on Markov processes (e.g. see [9, 6]), we prove both identifiability and the consistency of the MLE of the MTT model parameters in Theorem 3. Specifically, as each constituent target of the MTT model is a partially observed Markov process, in Theorem 2 we show that identifiability transfers โˆ— DSAP, National University of Singapore. Email: [email protected] of Engineering, University of Cambridge and The Alan Turing Institute. Email: [email protected] โ€ก DSAP, National University of Singapore. Email: [email protected] โ€  Department 1 2 J. HOUSSINEAU, S.S. SINGH AND A. JASRA from single to multiple targets under appropriate assumptions. The practical implications of results regarding identifiability include the understanding of the behaviour of Markov chain Monte Carlo (MCMC) techniques in multi-target tracking [13, 8], which is conditioned by the likelihood ratio between the correct parameter value and all the other possible values. The consistency of the maximum likelihood estimator raises the question of its asymptotic normality and the corresponding variance, which in turns motivates the study of the Fisher information matrix for this class of problems. It is demonstrated in Theorem 4 that there is a strict loss of information in the presence of data association uncertainty or detection failures. We characterise the Fisher information more precisely in specific illustrated cases, e.g. we show that when increasing the number of targets there is no gain in the Fisher information for the model parameters which are common to all targets if large uncertainties on the origin of the corresponding observations persist (see subsection 5.3). The Fisher information matrix is useful in applications such as sensor management [7] which aims at optimising the position of the sensor or at finding the best ratio between probability of false alarm and probability of detection. The proof of identifiability of the MTT model as well as our approach for studying the asymptotic variance of the MLE for the MTT model parameters are original and, to the best of our knowledge, the first of their kind. Consistency of the data association problem in MTT has been studied in [17] in the context of the estimation of multiple splitting and merging targets observed without noise over a fixed time interval during which n observations of the multiple targets are made at discrete times. The result in [17] is limited to the case where the number n of observation tends to infinity which effectively amounts to saying that targets are observed infinitely many times over a fixed interval which is a scenario not typically encountered in practice. In any case, our theoretical results and proof techniques are entirely different as they pertain to the MTT model parameters and not the data association. Point-process-based theoretical studies of MTT have also been conducted in [4, 5] for the stability of specific inference methods. The structure of the article is as follows: after introducing the required notations and background concepts in section 2 and section 3, the consistency of the maximum likelihood estimator is established along with its asymptotic normality for a large class of multi-object systems in section 4. Finally, in order to better understand the effect of the various parameters on the asymptotic variance, the Fisher information matrix is computed for important special cases of multi-object systems in section 5. The article concludes in section 6. 2. Notations. All random variables will be defined on the same probability space (โ„ฆ, F, P) and the expectation of a random variable X w.r.t. the probability measure P is denoted E[X]. Probability densities will be denoted by lower-case letters while probability measures will be denoted by capital letter. Similarly, random variables will be denoted with capital letters whereas their realisations will be in lower-case. The time is indexed by the set N of positive integers and for every time t โˆˆ N, a . finite sequence yt of Mt โˆˆ N0 = N โˆช {0} observation points in the observation space Y is made available. This space can be assumed to be a subset of the Euclidean space Rd with d > 0. The sequences of observations of the form (y1 , . . . , yn ) will be denoted y1:n . In the standard formulation of multi-target tracking, no more than one observation is associated with a given object at a given time step and, conversely, observations are originated from one object only. IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 3 Objectsโ€™ states are modelled as elements of a set X which is assumed to be a 0 subset of the Euclidean space Rd with d0 > 0; usually satisfying d0 โ‰ฅ d. They are propagated independently according to a Markov kernel density fฮธ from the state space X to itself, which depends on a parameter ฮธ from a compact set ฮ˜. Densities on X are defined w.r.t. a reference measure ยต. The true value of the parameter ฮธ is denoted ฮธโˆ— . The random variable Xt describing the state at time t only depends on the state xtโˆ’1 at time t โˆ’ 1 as follows Xt โˆผ fฮธ (ยท | xtโˆ’1 ). This transition does not depend on time so that the associated Markov chain is said to be homogeneous. The observation process at time t given the state xt is modelled by Yt โˆผ gฮธ (ยท | xt ) where gฮธ is a likelihood function from X to Y, also parametrised by ฮธ, so that the observation Yt at time t is independent from the states and observations at other times. The process (Xt , Yt )tโ‰ฅ1 is usually referred to as a hidden Markov model (HMM). Its law under the parameter ฮธ โˆˆ ฮ˜ is denoted Pฬ„ฮธ when initialised with its stationary distribution assuming it exists, and Pฮธ (ยท | x0 ) when initialised at x0 โˆˆ X. 3. Background. The definition of specific properties of Markov chains that will be used in the following sections is given here for completeness. Let (Xt )tโ‰ฅ0 be a X-valued Markov chain with transition density f and let P (ยท | x) be the probability measure on (XN0 , X โŠ—N0 ), where X โŠ—N0 is the cylinder ฯƒ-algebra on XN0 , characterising the chain when initialised at point x โˆˆ X. Also, let ฯ„A be the return time to a set A โІ X defined as ฯ„A = inf{t โ‰ฅ 1 : Xt โˆˆ A}. Consider the following concepts: A set A โІ X is said to be accessible if ฯ„A < โˆž has positive probability under P (ยท | x) for all x โˆˆ X. The Markov chain (Xt )tโ‰ฅ0 is said to be R phi-irreducible if there exists a density ฯ† on X such that for any subset A โІ X, A ฯ†(x)dx > 0 implies that A is accessible. A set A โІ X is said to be Harris recurrent if the event ฯ„A < โˆž happens almost surely under P (ยท | x) for all x โˆˆ X. A phi-irreducible Markov chain is said to be Harris recurrent if any accessible set is Harris recurrent. A density q is called invariant if for all x โˆˆ X it holds that Z q(x) = f (x | x0 )q(x0 )dx0 . A phi-irreducible Markov chain is called positive if it admits an invariant probability density. More details about these notions expressed in a measure-theoretic formulation can be found in [11]. These concepts will be useful when considering the long-time behaviour of the Markov chains involved in multi-target tracking problems. 4. Consistency of the maximum likelihood estimator. 4.1. The multi-target tracking model. Throughout this section, the true number of objects in the considered system will be assumed to be fixed and will be โˆ— denoted by K โˆ— โˆˆ N. We consider a Markov chain (Xt )tโ‰ฅ0 in XK with components independently evolving via the Markov transition fฮธ S from X to X. Observations at . time t are gathered into a vector yt in the space Yร— = kโ‰ฅ0 Yk where Y0 is a notation for the set containing the empty sequence only. The observation yt is a superposition of 4 J. HOUSSINEAU, S.S. SINGH AND A. JASRA 1. the independent observation of components of Xt via the likelihood gฮธ from X to Y followed by a Bernoulli thinning with parameter pD corresponding to detection failure, and 2. false alarms, or clutter, generated independently of the object-originated observations and assumed to come from an i.i.d. process whose cardinality at each time is Poisson with parameter ฮป and common distribution Pฯˆ which depends on the parameter ฯˆ in a compact set ฮจ and which true value is denoted ฯˆ โˆ— . The number of objects K โˆ— is not assumed to be known so that it will also be considered as a parameter of the model. The parameter for the multi-target model is then . . defined as ฮธ = [ฮธ, K, pD , ฮป, ฯˆ]t โˆˆ ฮ˜ = ฮ˜ ร— S T ร— (0, 1) ร— S C ร— ฮจ where t is the vector T C transposition and where S and S are compact subsets of N and (0, โˆž) respectively, with โ€œTโ€ and โ€œCโ€ standing for target and clutter respectively. The true parameter ฮธ โˆ— is assumed to be an interior point of ฮ˜. Special parameter sets that are not subsets of ฮ˜ can also be introduced by fixing one or several parameters to special values, for . . . instance ฮ˜ฮป=0 = ฮ˜ ร— S T ร— (0, 1), ฮ˜pD =1 = ฮ˜ ร— S T ร— S C ร— ฮจ or ฮ˜ฮป=0,pD =1 = ฮ˜ ร— S T correspond respectively to cases where the parameters ฮป, pD or both have known values that are outside of their domain of definition in ฮ˜. Alternatively, if the value of a parameter is known but inside of its domain of definition, e.g. it is known that K = 1, then the corresponding hyperplane will be expressed as ฮ˜|K=1 . Although the Poisson distribution is not defined for the parameter ฮป = 0, this parameter value is simply assumed to represent the case where there is no false alarm. The Markov transition fฮธ associated with the K-target process (Xt )t can simply be expressed as fฮธ (x | x0 ) = K Y fฮธ (xi | x0i ), i=1 0 K for any x, x โˆˆ X , the likelihood however takes a more sophisticated form so that additional notations are required. Let Sym(k) be the symmetric group over k letters and uk be the uniform distribution over Sym(k), also let qฮธ be a distribution on {0, 1}K characterised by . |d| qฮธ (d) = pD (1 โˆ’ pD )Kโˆ’|d| , for any d โˆˆ {0, 1}K . The variable d is such that di = 1 if and only if target i is detected for any i โˆˆ {1, . . . , K}. The K-target likelihood gฮธ (yt | xt ) of the observations yt โˆˆ Yร— at time t given the state x โˆˆ XK is characterised by X  . (1) gฮธ (yt | x) = Poฮป (Mt โˆ’ |d|) dโˆˆ{0,1}K |d|โ‰คMt ร— X Mt Y ฯƒโˆˆSym(Mt ) i=|d|+1 |d| pฯˆ yt,ฯƒ(i) Y gฮธ yt,ฯƒ(i) | xr(i)   uMt (ฯƒ)qฮธ (d) , i=1 where Poฮป denotes the Poisson distribution with parameter ฮป, where |d| is the 1-norm of d, i.e. the number of detected targets and where r(i) is the ith detected target that is the integer verifying |d1:r(i) | = i. This choice of the likelihood gฮธ corresponds to a marginalisation over the observation-to-track data association. Note that |d| โ‰ค K for any d โˆˆ {0, 1}K so that gฮธ (y | x) = 0 for any x โˆˆ XK if ฮป = 0 and if the number IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 5 of observations in y, denoted #y, is strictly greater than K. The law of the joint Markov chain (Xt , Yt )t under the parameter ฮธ โˆˆ ฮ˜ is denoted Pฬ„ฮธ when initialised by the stationary distribution and Pฮธ (ยท | x0 ) when assumed to start at the state x0 โˆˆ XK . The corresponding densities are written accordingly with lower-case letters. The objective is to study the ratio pฮธ (y1:n | x0 )/pฮธโˆ— (y1:n | x00 ) for any x0 โˆˆ XK โˆ— and any x00 โˆˆ XK . The assumptions that are considered for this purpose are detailed in the next section. 4.2. Assumptions and transferability. In order to bring a better understanding of multi-object systems as a combination of single-object systems corrupted by clutter, assumptions are primarily made on individuals systems. The properties of multi-object systems will be deduced from these whenever this is possible. A.1 The constants (2) ฯ„โˆ’ = inf inf ฮธโˆˆฮ˜ (x,x0 )โˆˆX2 fฮธ (x | x0 ) and ฯ„+ = sup sup fฮธ (x | x0 ) ฮธโˆˆฮ˜ (x,x0 )โˆˆX2 satisfy ฯ„โˆ’ > 0 and ฯ„+ < โˆž. The condition on ฯ„โˆ’ in Assumption A.1 ensures that any point of the state space can be reached from any other point in a single time step (otherwise fฮธ (x | x0 ) = 0 would hold for at least one pair (x, x0 ) โˆˆ X2 ) while the condition on ฯ„+ ensures the transition is sufficiently regular when compared to the reference measure ยต, i.e. the transition should be diffuse (in the sense that there should be no concentration of probability mass on a single point of the state space). Under Assumption A.1 it also holds that K K ฯ„โˆ’ โ‰ค fฮธ (x | x0 ) โ‰ค ฯ„+ (3) for any x, x0 โˆˆ XK , so that fฮธ straightforwardly satisfies the same type of conditions as fฮธ , since S T is compact and hence K is finite. Let ฮ ฮธ be the transition kernel of the joint Markov chain (Xt , Yt )t on X ร— Y defined as ฮ ฮธ (x, y | x0 , y 0 ) = gฮธ (y | x)fฮธ (x | x0 ). The property (3) is sufficient to ensure that the joint kernel defined as ฮ ฮธ (x, y | x0 , y 0 ) = gฮธ (y | x)fฮธ (x | x0 ), for any x, x0 โˆˆ XK and any y, y 0 โˆˆ Yร— is positive Harris-recurrent and aperiodic. In the next assumption, the expectations Eฬ„ฮธโˆ— [ยท], Eฯˆโˆ— [ยท] and Eฬ„ฮธโˆ— [ยท] are taken with respect to Pฬ„ฮธโˆ— , Pฯˆโˆ— and Pฬ„ฮธโˆ— respectively, also Bikp denotes the binomial distribution with success probability p and k trials. A.2 The constant . (4) bฬ‚T sup gฮธ (y | x) + = (ฮธ,x,y)โˆˆฮ˜ร—Xร—Y satisfies bฬ‚T + < โˆž, the target- and clutter-related functions Z Z T bT : y โ†’ 7 inf g (y | x)dx and b : y โ†’ 7 sup gฮธ (y | x)dx, ฮธ โˆ’ + ฮธโˆˆฮ˜ bC โˆ’ ฮธโˆˆฮ˜ : y 7โ†’ inf pฯˆ (y) ฯˆ and bC + : y 7โ†’ sup pฯˆ (y), ฯˆ satisfy (6a) bT โˆ’ (y) > 0 and bT + (y) < โˆž (6b) bC โˆ’ (y) > 0 and bC + (y) < โˆž 6 J. HOUSSINEAU, S.S. SINGH AND A. JASRA for any y โˆˆ Y as well as (7) Eฬ„ฮธโˆ— [| log bT โˆ’ (Y )|] < โˆž and Eฯˆโˆ— [| log bC โˆ’ (Y )|] < โˆž, and it holds that (8) Eฬ„ฮธโˆ—  log inf BiK pD โˆ— Poฮป (#Y ) ฮธโˆˆฮ˜  < โˆž. Assumption A.2 ensures that all points of the observation space Y can be reached from at least some states in X via (6a) although gฮธ (y | x) = 0 might hold for some (x, y) โˆˆ X ร— Y. Equation (7) will ensure boundedness in the calculations related to identifiability. The upper bound (4) of the likelihood function is also assumed to be finite so that no concentration of probability mass is allowed at any point of X ร— Y. It is demonstrated in the following lemma that the upper and lower bounds considered in Assumption A.2 for a single target and for the clutter common distribution are sufficient to guarantee the same type of result for multiple targets. The proof is in Appendix B. Lemma 1 (Transfer of boundedness). Under Assumption A.2, it holds that the constant   . bฬ‚+ = sup sup gฮธ (y | x) ฮธโˆˆฮ˜ (x,y)โˆˆXK ร—Yร— is finite and that the functions Z bโˆ’ : y 7โ†’ inf gฮธ (y|x)dx ฮธโˆˆฮ˜ Z and b+ : y 7โ†’ sup gฮธ (y|x)dx, ฮธโˆˆฮ˜ verify bโˆ’ (y) > 0 and b+ (y) < โˆž for any y โˆˆ Yร— as well as Eฬ„ฮธโˆ— [| log bโˆ’ (Y )|] < โˆž. An important result that follows from the assumptions introduced so far is the uniform forgetting of the conditional Markov chain: it can be proved under Assumptions A.1 and A.2 that for any k, l โˆˆ N0 such that k โ‰ค l and any parameter ฮธ โˆˆ ฮ˜, it holds that Z Z Z pฬ„ฮธ (xt | xk , yk+1:l )p(xk )dxk โˆ’ pฬ„ฮธ (xt | xk , yk+1:l )p0 (xk )dxk dxt โ‰ค ฯtโˆ’k ฮธ , for all t โ‰ฅ k, all probability densities p, p0 on XK and all sequences of observations . yk+1:l , where ฯฮธ = 1 โˆ’ (ฯ„โˆ’ /ฯ„+ )K . The K-target forgetting rate ฯฮธ will generally be smaller than the single-target rate 1โˆ’ฯ„โˆ’ /ฯ„+ , although mixing is still guaranteed since K is finite and hence ฯฮธ โˆˆ [0, 1). It is also possible to conclude about the pointwise convergence of the log-likelihood function to the function ` defined on ฮ˜ as follows   ` : ฮธ 7โ†’ Eฬ„ฮธโˆ— `Yโˆ’โˆž:0 (ฮธ) , where `yโˆ’โˆž:0 is defined on ฮ˜ for any realisation yโˆ’โˆž:0 of the observation process as `yโˆ’โˆž:0 : ฮธ 7โ†’ lim log pฬ„ฮธ (y0 | yโˆ’m:โˆ’1 , xโˆ’mโˆ’1 ), mโ†’โˆž and this limit does not depend on xโˆ’mโˆ’1 . Indeed, under Assumptions A.1 and A.2, it holds for all K โˆˆ S T and all x0 โˆˆ XK that (9) 1 log pฮธ (Y1:n | x0 ) = `(ฮธ), nโ†’โˆž n lim Pฬ„ฮธโˆ— -a.s. IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 7 This result shows that for any realisation y1:โˆž of the observation process, the empirical average nโˆ’1 log pฮธ (y1:n | x0 ) will converge to `(ฮธ) irrespectively of the assumed initial state x0 . A continuity assumption is required in order to turn the pointwise convergence result of (9) into a uniform convergence result. A.3 For all x, x0 โˆˆ X and all y โˆˆ Y, the mappings ฮธ 7โ†’ fฮธ (x | x0 ), ฮธ 7โ†’ gฮธ (y | x) and ฯˆ 7โ†’ pฯˆ (y) are continuous. It follows directly from Assumption A.3 that for all K โˆˆ S T , all x, x0 โˆˆ XK and all y โˆˆ Yร— , the mappings ฮธ 7โ†’ fฮธ (x | x0 ) and ฮธ 7โ†’ gฮธ (y | x) are continuous on the hyperplane of ฮ˜ made of parameters with a number of targets equal to K, since these mappings are sums and products of continuous functions. Although the continuity for the multi-target Markov kernel and likelihood function is limited to hyperplanes, the result of [6, Lemma 4] can be extended to: for all ฮธ โˆˆ ฮ˜   0 lim Eฬ„ฮธโˆ— sup `Yโˆ’โˆž:0 (ฮธ ) โˆ’ `Yโˆ’โˆž:0 (ฮธ) = 0, ฮดโ†’0 |ฮธ 0 โˆ’ฮธ|โ‰คฮด where | ยท | is the 1-norm on ฮ˜, since ฮธ 0 and ฮธ will be in the same hyperplane for ฮด small enough. The addition of the continuity assumption enables the derivation of the following result regarding the uniform convergence of the log-likelihood function: Under Assumptions A.1 to A.3, it holds that (10) lim sup sup nโ†’โˆž ฮธโˆˆฮ˜ x โˆˆXK 0 1 log pฮธ (Y1:n | x0 ) โˆ’ `(ฮธ) = 0, n Pฬ„ฮธโˆ— -a.s. Since the conditional log-likelihood function log pฮธ (y1:n | x0 ) is continuous and uniformly bounded, it follows from (10) that ` is also continuous on the hyperplanes of ฮ˜ of constant target number. The following identifiability assumption is considered in order to show the consistency of the maximum likelihood estimator A.4 Pฬ„ฮธ = Pฬ„ฮธโˆ— if and only if ฮธ = ฮธโˆ— and Pฯˆ = Pฯˆโˆ— if and only if ฯˆ = ฯˆ โˆ— Assumption A.4 is fundamental since there would be no chance to discriminate the true value ฮธโˆ— among all the other possible ฮธ โˆˆ ฮ˜ \ {ฮธโˆ— } if some of these parameters did yield the same law for the observations. For instance, if the colour of the target is considered as a parameter but if the likelihood of the observations does not depend on this characteristics of the target, e.g. if the observations come from a radar, then any ฮธ obtained by changing the colour in ฮธโˆ— would induce a law Pฬ„ฮธ that is equal to Pฬ„ฮธโˆ— and Assumption A.4 would not be verified. It is shown in the next theorem that identifiability of the multi-target problem can be deduced from the identifiability of the single-target one under important special cases. The proof is in Appendix C. Theorem 2 (Transfer of identifiability). Under Assumption A.4 it holds that a) if the true parameter ฮธ โˆ— is in ฮ˜ฮป=0 , then it holds that Pฬ„ฮธ = Pฬ„ฮธโˆ— if and only if ฮธ = ฮธ โˆ— for any ฮธ โˆˆ ฮ˜ฮป=0 , b) if the true parameter ฮธ โˆ— is in the subset ฮ˜|K=1 of ฮ˜ made of parameters of the form (ฮธ, K, pD , ฮป, ฯˆ) with K = 1, then it holds that Pฬ„ฮธ = Pฬ„ฮธโˆ— if and only if ฮธ = ฮธ โˆ— for any ฮธ โˆˆ ฮ˜|K=1 . It is more challenging to prove that identifiability transfers to the whole parameter set ฮ˜ and this property is assumed to hold rather than demonstrated. A.5 Pฬ„ฮธ = Pฬ„ฮธโˆ— if and only if ฮธ = ฮธ โˆ— . Assumption A.5 is not a stringent condition since Theorem 2 shows that the single-target identifiability is sufficient to ensure multi-target identifiability in some 8 J. HOUSSINEAU, S.S. SINGH AND A. JASRA important special cases. Moreover, if there exists a ฮธ 6= ฮธ โˆ— such that Pฬ„ฮธ = Pฬ„ฮธโˆ— then ฮธ has to satisfy very specific equations including โˆ— K โˆ— Poฮปโˆ— . BiK pD โˆ— Poฮป = Bipโˆ— D Assumption A.5 would not hold for pโˆ—D = 0 since identifiability w.r.t. ฮธโˆ— and K โˆ— would clearly be lost in this case because of the absence of observations from the targets. The same remark can be made about K โˆ— = 0 for the identifiability w.r.t. ฮธโˆ— since there is obviously no way to learn about the dynamics and observation of the targets if none of them is present. The different assumptions considered here are combined in the next section in order to prove the consistency of the maximum likelihood estimator. 4.3. Consistency and asymptotic normality. As a consequence of (9) and by the dominated convergence theorem it holds that for any ฮธ โˆˆ ฮ˜, any infinite โˆ— observation sequence y1:โˆž and any initial states x0 โˆˆ XK and x00 โˆˆ XK (11a) lim nโ†’โˆž (11b) pฮธ (y1:n | x0 ) 1 log = `(ฮธ) โˆ’ `(ฮธ โˆ— ) n pฮธโˆ— (y1:n | x00 )    pฬ„ฮธ (Y0 | Yโˆ’m:โˆ’1 ) Yโˆ’m:โˆ’1 โ‰ค 0, = lim Eฬ„ฮธโˆ— Eฬ„ฮธโˆ— log mโ†’โˆž pฬ„ฮธโˆ— (Y0 | Yโˆ’m:โˆ’1 ) where the inequality holds since the conditional expectations are Kullback-Leibler divergences. Yet, it could happen that some ฮธ โˆˆ ฮ˜ would verify pฬ„ฮธ (Y0 | yโˆ’m:โˆ’1 ) = pฬ„ฮธโˆ— (Y0 | yโˆ’m:โˆ’1 ) Pฬ„ฮธโˆ— -almost surely for all m โˆˆ N0 and for all yโˆ’m:โˆ’1 , which would compromise identifiability. However, Assumption A.5 is equivalent to ฮธ = ฮธ โˆ— if and only if   pฬ„ฮธ (Y1:n ) Eฬ„ฮธโˆ— log = 0, โˆ€n โ‰ฅ 1. pฬ„ฮธโˆ— (Y1:n ) The objective is to show that this, in turn, is equivalent to ฮธ = ฮธ โˆ— if and only if `(ฮธ) โˆ’ `(ฮธ โˆ— ) = 0 since this is the term that appears in (11). Following the same line of arguments as [6, Proposition 3], we find that under Assumptions A.1 to A.3 and A.5, it holds that `(ฮธ) = `(ฮธ โˆ— ) if and only if ฮธ = ฮธ โˆ— , from which we conclude that the considered approach allows for studying the identifiability of ฮธ โˆ— . Applying the strict Jensen inequality to the conditional expectation in the r.h.s. of (11), it indeed follows that lim nโ†’โˆž pฮธ (y1:n | x0 ) 1 < 0, log n pฮธโˆ— (y1:n | x00 ) for any ฮธ 6= ฮธ โˆ— , which implies that the likelihood of the observation sequence y1:n under the parameter ฮธ decreases exponentially fast when compared to the likelihood under ฮธ โˆ— , irrespectively of the assumed initial states x0 and x00 . Denoting ฮธฬ‚n,x0 the argument of the maximum of log pฮธ (y1:n | x0 ), the consistency of the maximum likelihood estimator can be expressed as in Theorem 3 below. This theorem also states the asymptotic normality of the estimator which makes use of the Fisher information. The latter involves differentiation with respect to the parameter ฮธ, however since the number of target K is a natural number, differentiations has to be performed for a IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 9 fixed K. This is what is understood by default when writing โˆ‡ฮธ . Under assumptions, the Fisher information matrix can be expressed as h i 1 Eฬ„ฮธโˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1:n ) ยท โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1:n )t , nโ†’โˆž n I(ฮธ โˆ— ) = lim where ยทt is the matrix transposition. Theorem 3. Under Assumptions A.1 to A.3 and A.5, it holds that lim ฮธฬ‚n,x0 = ฮธ โˆ— nโ†’โˆž for any x0 โˆˆ XK with K โˆˆ N. Considering additionally Assumptions A.6 to A.8 (see Appendix A) and assuming that I(ฮธ โˆ— ) is positive definite, it holds that โˆš  n(ฮธฬ‚n,x0 โˆ’ ฮธ โˆ— ) โ†’ N 0, I(ฮธ โˆ— )โˆ’1 , for any x0 โˆˆ XK and any K โˆˆ N, where โ†’ denotes the convergence in distribution as n tends to infinity and where N (0, V ) is the normal distribution with mean 0 and variance V . The proof of Theorem 3 follows from Lemma 1 combined with [6, Theorems 1 and 4]. It can be demonstrated that the result of Theorem 3 also holds for the special parameter sets ฮ˜ฮป=0 , ฮ˜pD =1 and ฮ˜ฮป=0,pD =1 . These special-parameter sets will be used to understand the behaviour of the Fisher information matrix in simple cases in the next section. 5. Analysis of the Fisher information. Theorem 3 guarantees the convergence of the maximum likelihood estimator under certain conditions and proves the asymptotic normality of the estimator, the variance of the latter being the inverse of the Fisher information matrix. It is therefore of interest to understand how the Fisher information behaves in different multi-target configurations. This section is structured as follows: an equivalent observation model for which the Fisher information matrix is easier to study is introduced in subsection 5.1 and yields a characterisation of the configurations in which the information loss induced by data association uncertainty and detection failures is strictly positive. Qualitative estimates of the information loss are then obtained when isolating the different sources of loss from subsection 5.2 to subsection 5.4. Each of these qualitative estimates are confirmed by numerical results on simulated data obtained by direct Monte Carlo integration of the original expression of the Fisher information, so as to confirm the validity of the derived alternative expressions. Henceforth, if A and B are two square matrices of the same dimensions then A โ‰ฅ B is understood as A โˆ’ B โ‰ฅ 0, i.e. A โˆ’ B is positive semi-definite, and A > B stand for A โˆ’ B > 0, i.e. A โˆ’ B is positive definite. Example 1. Assuming that ฮธ โˆ— is in ฮ˜pD =1 and that the data association is known, the joint probability of the observations becomes pฬ„ฮธโˆ— (y1:n ) = n  Y Poฮปโˆ— (Mt โˆ’ K โˆ— ) Mt Y pฯˆโˆ— yt,i   i=K โˆ— +1 t=1 Z ร— โˆ— ฯ€ฮธร—K (x0 ) โˆ— n Y Kโˆ— h i Y gฮธโˆ— (yt,i | xt,i )fฮธโˆ— (xt,i | xtโˆ’1,i ) dx0:n . t=1 i=1 10 J. HOUSSINEAU, S.S. SINGH AND A. JASRA The score is then found to be โˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (y1:n ) = K X i=1 โˆ‡ฮธ log pฬ„ฮธโˆ— (y1:n,i )+ n  X Mt โˆ’ K โˆ— t=1 ฮปโˆ— โˆ’1+ Mt X  โˆ‡ฮธ log pฯˆโˆ— (yt,i ) i=K โˆ— +1 so that, because of the independence between the targets and clutter, I(ฮธ โˆ— ) = K โˆ— I(ฮธ โˆ— ) + 1 + ฮปโˆ— I C (ฮธ โˆ— ), ฮปโˆ— with I(ฮธ โˆ— ) and I C (ฮธ โˆ— ) the Fisher information for the distribution of one target and one clutter point respectively, where the gradient is taken w.r.t. ฮธ, that is h i 1 I(ฮธ โˆ— ) = lim Eฬ„ฮธโˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1:n ) ยท โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1:n )t nโ†’โˆž n h i C โˆ— I (ฮธ ) = Eฯˆโˆ— โˆ‡ฮธ log pฯˆโˆ— (Y ) ยท โˆ‡ฮธ log pฯˆโˆ— (Y )t . In spite of its simplicity, Example 1 yields important remarks: unsurprisingly, if there is no missing information and no data association uncertainty, the information increases with the number of targets. Similarly, if the Fisher information of the clutter distribution pฯˆโˆ— increases, then the overall information increases too. The interpretation for the Poisson parameter ฮปโˆ— is less straightforward, the main objective is however to study the Fisher information w.r.t. the targets rather than the false alarms so that it is of interest to compute the score without differentiating with respect to ฯˆ or ฮป. Although the Fisher information becomes more difficult to compute when pโˆ—D โˆˆ (0, 1), some conclusions can be drawn by focusing on the cardinality. Since the parameter ฮธ does not affect the cardinality, only the term E[โˆ‡pD log qฮธโˆ— (D) ยท โˆ‡pD log qฮธโˆ— (D)t ] = K โˆ— /(pโˆ—D (1 โˆ’ pโˆ—D )) remains when computing the Fisher information matrix, with D the random variable โˆ— induced by Y on {0, 1}K . This term is minimal when pโˆ—D = 0.5 and increases when pโˆ—D goes toward 0 or 1. This is not sufficient to conclude since the fact that information is lost when detection failures happen is not taken into account in the cardinality and the information is the same for, e.g. pโˆ—D equal to 0.99 or 0.01. Indeed, it is equally easy to estimate pโˆ—D when an observation is always or never received. For this reason, it is useful to consider the information w.r.t. ฮธโˆ— only. The objective will therefore be to characterise how the Fisher information h i 1 (13) I(ฮธโˆ— ) = lim Eฬ„ฮธโˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1:n ) ยท โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1:n )t , nโ†’โˆž n of a multi-object dynamical system behaves when compared to the information of the unperturbed system that excludes false alarms, detection failures and for which data association is known. We refer to the difference between (13) and the latter as the information loss. Since the Fisher information of the unperturbed system is a quantity that depends on the number of objects in the system, the aim is to express the information loss as a function of the single-object Fisher information matrix I(ฮธโˆ— ). The Fisher information matrix of the unperturbed multi-object system is clearly equal to K โˆ— I(ฮธโˆ— ) because of the independence between the targetsโ€™ observation in the absence of data association uncertainty. In order to compute I(ฮธโˆ— ), we have to take the IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 11 logarithm of the probability density function โˆ— pฬ„ฮธโˆ— (y1:n , x0:n ) = ฯ€ฮธร—K (x0 ) โˆ— n Y   gฮธโˆ— (yt | xt )fฮธโˆ— (xt | xtโˆ’1 ) . t=1 However, the presence of a sum in the term gฮธโˆ— (yt | xt ) prevents from further analysing the Fisher information in a general setting. To avoid directly dealing with these sums, an equivalent observation model which depends explicitly on the assignment is introduced in the next section. This observation model is an important contribution since it allows us to understand the behaviour of the Fisher information for multitarget tracking. 5.1. Alternative observation model. Let dH be the Hamming metric on the symmetric group Sym(k) characterised by letting dH (ฯƒ, ฯƒ 0 ) be the number of points moved by ฯƒ 0 โ—ฆ ฯƒ โˆ’1 for any given ฯƒ, ฯƒ 0 โˆˆ Sym(k). For instance, if k = 5 and if ฯƒ and ฯƒ 0 are given in Cauchyโ€™s two-line notation as     1 2 3 4 5 1 2 3 4 5 ฯƒ= and ฯƒ0 = 1 5 2 4 3 1 3 5 4 2 then dH (ฯƒ, ฯƒ 0 ) = 3 since ฯƒ 0 โ—ฆ ฯƒ โˆ’1 (i) 6= i if and only if i is in the set {2, 3, 5}. Let โŠ• be the vector concatenation operator such that if y = [y1 , . . . , yn ]t โˆˆ Yn and 0 t ] โˆˆ Ym then y 0 = [y10 , . . . , ym . 0 t y โŠ• y 0 = [y1 , . . . , yn , y10 , . . . , ym ] โˆˆ Yn+m . โˆ— Let Rd be the matrix of size |d| ร— K โˆ— such that (Rd )i,j = ฮดj,r(i) for any d โˆˆ {0, 1}K , i.e. Rd has as many lines as there are detected targets and can be seen as a mask matrix that removes the observations of non-detected ones. Let Sฯƒ be the permutation matrix corresponding to ฯƒ โˆˆ Sym(k) for any k โ‰ฅ 1, i.e. the matrix defined as ๏ฃฎ ๏ฃน eฯƒ(1) . ๏ฃฏ ๏ฃบ Sฯƒ = ๏ฃฐ ... ๏ฃป , eฯƒ(K โˆ— ) with ei the row vector with 1 at the ith position and 0 elsewhere. The observation model with known data association is written as (14) Yt = h(Xt ) + ฮท with h and ฮท the multi-target observation function and the observation noise respectively, where ฮท is i.i.d. across its K โˆ— components. The false alarms are defined as a random variable Yฬ‚ in Yร— , independent of Yt , such that Yฬ‚i โˆผ pฯˆ and Yฬ‚i is independent of Yฬ‚j for any 1 โ‰ค i, j โ‰ค #Yฬ‚ . The observation model of interest can then be defined for given integers ฮฑ > 0 and 0 โ‰ค ฮฒ โ‰ค K โˆ— as  (15) Ytฮฑ,ฮฒ = Sฯ‚ (RD Yt ) โŠ• Yฬ‚ , โˆ— . where D is a random element of Bฮฒ = {d0 โˆˆ {0, 1}K : |1 โˆ’ d0 | โ‰ค ฮฒ} having as a distribution the restriction qฮธฮฒ of qฮธ to Bฮฒ and where ฯ‚ is a random permutation ฮฑ drawn from the uniform law uฮฑ k with k = #Yฬ‚ + |d| on the set Ak defined by . Aฮฑ k = {ฯƒ โˆˆ Sym(k) : dH (id, ฯƒ) โ‰ค ฮฑ} 12 J. HOUSSINEAU, S.S. SINGH AND A. JASRA with id denoting the identity function. Henceforth, the letter ฯ‚ will be used for a random permutation and ฯƒ for a realisation. The case ฮฑ = 0 is not considered to avoid redundancy: it holds that A0k = A1k = {id} for any k โ‰ฅ 1 since permutations that are different from the identity move at least two points. The case of Example 1 is recovered by considering ฮฑ = 1 and ฮฒ = 0, i.e. ฯ‚ = id and D = 1 almost surely, whereas the full data-association problem corresponds to the choice ฮฑ = โˆž and ฮฒ = โˆž. The cardinality of Aฮฑ k is found to be Nkฮฑ = ฮฑ   X k i=0 i !i, with !i the subfactorial of i which is equal to the number of derangements of i letters, where a derangement refers to a permutation that moves all the elements of its domain. The subfactorial !i is defined via the same recurrence relation as the factorial i!, i.e. as !i = (i โˆ’ 1)(!(i โˆ’ 1)+!(i โˆ’ 2)), but with the initialisation !0 = 1 and !1 = 0. The expression of Nkฮฑ can be justified as follows: the number of permutations moving a number of points less or equal to ฮฑ is also the number of permutations moving exactly i points, i.e. the number of derangements of i points, multiplied by the number of ways of picking i points among k, for all 0 โ‰ค i โ‰ค ฮฑ. It holds that Nkk = k! since n   X n !n = n! โˆ’ !(n โˆ’ i). i i=1 The alternative observation model (15) brings insight about the Fisher information matrix I ฮฑ,ฮฒ (ฮธโˆ— ) corresponding to the observation model (15), when compared to the unperturbed case. The corresponding information loss is defined as ฮฑ,ฮฒ โˆ— . Iloss (ฮธ ) = K โˆ— I(ฮธโˆ— ) โˆ’ I ฮฑ,ฮฒ (ฮธโˆ— ). ฮฑ,ฮฒ โˆ— In some cases, the relative information loss Iloss (ฮธ )/(K โˆ— I(ฮธโˆ— )) will be used instead. The next theorem is the central result of this section, its proof can be found in Appendix D. Theorem 4. Under Assumptions A.1, A.2 and A.6 to A.8, the information ฮฑ,ฮฒ โˆ— ฮฑ,ฮฒ โˆ— loss Iloss (ฮธ ) verifies Iloss (ฮธ ) โ‰ฅ 0 for any ฮฑ โ‰ฅ 1 and any ฮฒ โ‰ฅ 0, the inequality being strict if either ฮฑ > 1 or ฮฒ > 0 and if I(ฮธโˆ— ) 6= 0. Notice that the condition ฮฑ > 1 would not be sufficient to make the inequality in Theorem 4 strict if ฮปโˆ— were equal to 0 since data association might have no influence in some specific configurations, e.g. when the individual likelihood does not depend on the objectsโ€™ state. Theorem 4 does not provide a quantitative characterisation of the information loss. Doing so is challenging in the general case, yet, the behaviour of the information loss can be analysed for special cases, and such will be the objective in the remainder of this section. One of the advantages with the modified observation model (15) is that the Fisher identity can be utilised as an alternative way of computing the score function based on the unobserved random variables in this model: (16)   ฮฑ,ฮฒ ฮฑ,ฮฒ โˆ‡ฮธ log pฬ„ฮธ (y1:n ) = Eฬ„ฮธ โˆ‡ฮธ log pฬ„ฮธ (Y1:n , ฯ‚1:n , D1:n , X0:n ) | Y1:n = y1:n , 13 IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS where ฯ€ฮธร—K (x0 ) pฬ„ฮธ (y1:n , ฯƒ1:n , d1:n , x0:n ) = n  Y Poฮป (Mt โˆ’ |dt |) t=1 ร— |d| Mt Y pฯˆ (yt,ฯƒt (i) ) i=|dt |+1 Y i=1 gฮธ (yt,ฯƒt (i) | xt,r(i) ) K Y  . ฮฒ fฮธ (xt,i | xtโˆ’1,i )uฮฑ Mt (ฯƒt )qฮธ (dt ) i=1 The simplification of the expression of โˆ‡ฮธ log pฬ„ฮธ (y1:n ) is only notational. The random ฮฑ,ฮฒ = y1:n in (16), so variables ฯ‚1:n , D1:n and X0:n are conditioned on the event Y1:n that their respective distributions are now the conditional distributions given the observations, which are more complex than their priors. Yet, the Fisher identity enabled to move the sums and integrals outside of the logarithm, hence making easier the analysis of the Fisher information matrix. 5.2. Single static target with false alarm. Consider the case of one almostsurely detected static target with state x โˆˆ X which observation is corrupted by false alarms and unknown data association. The corresponding ฮธ โˆ— is in the hyperplane ฮ˜pD =1 |K=1 of the special parameter set ฮ˜pD =1 composed of parameters for which K = 1. It is sufficient to study one time step since the observations at different times become independent in this case and it holds that h i 1 I(ฮธโˆ— ) = lim Eฬ„ฮธโˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1:n ) ยท โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1:n )t nโ†’โˆž n h i = Eฬ„ฮธโˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1 ) ยท โˆ‡ฮธ log pฬ„ฮธโˆ— (Y1 )t . Making use of the Fisher identity (16), the Fisher information matrix I โˆž,0 (ฮธโˆ— ) can be expressed as I โˆž,0 (ฮธโˆ— ) = Eฮธโˆ— X M  ci (Y )cj (Y )โˆ‡ฮธ log gฮธโˆ— (Yi | x) ยท โˆ‡ฮธ log gฮธโˆ— (Yj | x)t , i,j=1 where M = #Y and where ci (y) = gฮธโˆ— (yi | x)/pฯˆโˆ— (yi ) . uM (ฯƒ | y) = PM โˆ— โˆ— j=1 gฮธ (yj | x)/pฯˆ (yj ) ฯƒโˆˆSym(M ) X ฯƒ(1)=i Identifying the parameter ฮธโˆ— is most challenging when the distribution of the false alarm is equal to the one of the target-originated observation at ฮธโˆ— , i.e. pฯˆโˆ— = gฮธโˆ— (ยท | x), since all the observations will look alike for ฮธ close to ฮธโˆ— . In this case it holds that ci (Y ) = 1/M for any 1 โ‰ค i โ‰ค M so that m X Poฮปโˆ— (m โˆ’ 1) X   Eฮธโˆ— โˆ‡ฮธ log gฮธโˆ— (Yi | x) ยท โˆ‡ฮธ log gฮธโˆ— (Yi | x)t | m 2 m i=1 mโ‰ฅ1 h 1 i =E I(ฮธโˆ— ) N +1 I โˆž,0 (ฮธโˆ— ) = where the expectation is taken w.r.t. the random variable N โˆผ Poฮปโˆ— . It follows that the relative information loss is equal to E[N/(N + 1)] so that it is strictly increasing 14 J. HOUSSINEAU, S.S. SINGH AND A. JASRA 1 0.9 0.8 relative loss 0.7 0.6 0.5 0.4 E[N/(N+1)] Gaussian U([-5,5]) U([-10,10]) U([-25,25]) U([-50,50]) U([-100,100]) 0.3 0.2 0.1 0 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 log(6+1) Fig. 1: Information loss as a function of the Poisson parameter ฮป in log-scale, calculated with 5 ร— 105 samples (Gaussian: worst-case scenario; U ([โˆ’a, a]): uniform distribution over [โˆ’a, a]). with ฮปโˆ— and tends to 1 when ฮปโˆ— tends to infinity. This result is supported by the experiments displayed in Figure 1 where the observation of one static target in X = R at x = 0 is corrupted by false alarms. The observation model is assumed to be linear and Gaussian with variance ฮธ such that ฮธโˆ— = 1. Cases where the false alarm is uniform over the subset [โˆ’a, a] with a โˆˆ {5, 10, 25, 50, 100} are also considered. The scenario where the false alarm is distributed in the same way as the target-originated observation at ฮธโˆ— , i.e. pฯˆโˆ— = gฮธโˆ— (ยท | x), is also confirmed to be the worst-case scenario. In the next two sections, the focus will be on understanding the role played specifically by unknown data association and detection failures. 5.3. Unknown data association. In order to set the focus on data association, it is assumed that ฮธ โˆ— belongs to the special parameter set ฮ˜ฮป=0,pD =1 . In these conditions, the joint probability of the observations and states becomes โˆ— (19) pฬ„ฮธโˆ— (y1:n , x0:n ) = ฯ€ฮธร—K (x0 ) โˆ— ร— n Y Y Kโˆ— X t=1 ฯƒโˆˆSym(K โˆ— )    gฮธโˆ— (yt,ฯƒ(i) | xt,i )fฮธโˆ— (xt,i | xtโˆ’1,i ) uK โˆ— (ฯƒ) . i=1 The sum in the previous expression makes it difficult to directly compute the Fisher information matrix. Some insight about it can however be obtained by considering static objects as in the following example. Example 2. Let x1 , . . . , xK โˆ— be the known position of K โˆ— static objects. The joint distribution of the observations is then found to be pฮธโˆ— (y1:n ) = n Y X t=1 ฯƒโˆˆSym(K โˆ— ) Y Kโˆ—  gฮธโˆ— (yt,ฯƒ(i) | xi )uK โˆ— (ฯƒ) . i=1 In this simplified setting, we can assume that gฮธโˆ— has finite support so that the objectsโ€™ QK โˆ— state can be chosen far enough from each other for i=1 gฮธโˆ— (Yt,ฯƒ(i) | xi ) = 0 to hold P-a.s. whenever ฯƒ 6= id. In this case, and as expected, there is no loss of information IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 15 when compared to the case with known data association. A less intuitive result can be found when all the objectsโ€™ state are equal to a given x โˆˆ X. In this situation, it holds that all permutations are equally probable so that โˆ— pฮธโˆ— (y1:n ) = n Y K Y gฮธโˆ— (yt,i | x), t=1 i=1 and once again, there is no loss of information. These two cases correspond to extreme configurations where the uncertainty on the data association is either resolvable or irrelevant. The Fisher identity can be used to provide an expression of the Fisher information for static objects as follows. For any fixed x1 , . . . , xK โˆ— , the Fisher information for ฮฑ = โˆž (fully unknown association) and ฮฒ = 0 can be deduced from   โˆ‡ฮธ log pฮธ (y) = Eฮธ โˆ‡ฮธ log pฮธ (Y , ฯ‚) | Y = y X = K X โˆ‡ฮธ log gฮธ (yฯƒ(i) | xi )uK (ฯƒ|y). ฯƒโˆˆSym(K) i=1 The Fisher information matrix I ฮฑ,ฮฒ (ฮธโˆ— ) with ฮฑ = โˆž, ฮฒ = 0 and without false alarm is found to be   I โˆž,0 (ฮธโˆ— ) = Eฮธโˆ— โˆ‡ฮธ log pฮธโˆ— (Y โˆž,0 ) ยท โˆ‡ฮธ log pฮธโˆ— (Y โˆž,0 )t โˆ— X = K X   Eฮธโˆ— uK โˆ— (ฯƒ|Y )uK โˆ— (ฯƒ 0 |Y ) Scoi (Yฯƒ(i) ) ยท Scoj (Yฯƒ0 (j) )t ฯƒ,ฯƒ 0 โˆˆSym(K โˆ— ) i,j=1 โˆ— = K X   Eฮธโˆ— ci,k (Y )cj,l (Y ) Scoi (Yk ) ยท Scoj (Yl )t i,j,k,l=1 with Scoi (y) = โˆ‡ฮธ log gฮธโˆ— (y | xi ) for any y โˆˆ Y and with X ci,k (y) = uK โˆ— (ฯƒ|y) ฯƒโˆˆSym(K โˆ— ) ฯƒ(i)=k โˆ— = gฮธโˆ— (yk | xi ) X Y  gฮธโˆ— (yฯƒ(j) | xj ) ฯƒโˆˆSym(K โˆ— ) j6=i ฯƒ(i)=k X K Y โˆ’1 gฮธโˆ— (yฯƒ(j) | xj ) ฯƒโˆˆSym(K โˆ— ) j=1 โˆ— for any y โˆˆ YK and any i, k โˆˆ {1, . . . , K โˆ— }. The term ci,k (y) is the conditional probability for the object with state xi to have generated observation k given all observations y. In order to obtain a quantitative characterisation of the information loss, a special likelihood has to be introduced. We consider an observation model of the same form as the one displayed in Figure 2, i.e. such that Y is compact and there exists a collection โˆ— of disjoint subsets {Bi }K i=1 of Y such that gฮธ (ยท | xi ) uniformly distributes a probability mass  > 0 outside of Bi . An example of such a distribution is given in Figure 2 for two objects. Then, for K objects, (23) I โˆž,0 (ฮธโˆ— ) = K X i,j,k,l=1 k,l โˆ— Ei,j (ฮธ ) J. HOUSSINEAU, S.S. SINGH AND A. JASRA probability density 16 0.4 g3 (.|x 1 ) g (.|x ) 3 0.3 2 0.2 0.1 0 -10 -8 -6 -4 -2 0 2 4 6 8 10 y Fig. 2: Example of likelihood with two objects at states x1 and x2 .   k,l โˆ— . with Ei,j (ฮธ ) = Eฮธโˆ— ci,k (Y )cj,l (Y ) Scoi (Yk ) ยท Scoj (Yl )t for any i, j, k, l โˆˆ {1, . . . , K}. The objective is now to understand the behaviour of I โˆž,0 (ฮธโˆ— ) when K is large. The order of the term ci,k (y) is in O(1) when i = k and in O(K โˆ’1 ) when i 6= k. The order of the summand in (23) can then be determined for the different values of i, j, k, l. For instance: โ€ข If i 6= k 6= l 6= j then Z โˆ‡ฮธ gฮธโˆ— (yk | xi ) ยท โˆ‡ฮธ gฮธโˆ— (yl | xj )t 2 k,l โˆ— c (y)c (y) dy, (24) Ei,j (ฮธ ) = i,k j,l k,l |Y \ Bk |2 Ci,j gฮธโˆ— (yk | xi )gฮธโˆ— (yl | xj ) k,l . where Ci,j = {y โˆˆ YK : yk โˆˆ Bi , yl โˆˆ Bj }, because gฮธโˆ— (y | xk ) = /|Y \ Bk | for all y โˆˆ / Bk and because Bi โˆฉ Bk = โˆ… since i 6= k. When K increases, Y needs to be augmented at least linearly to ensure that the family {Bi }K i=1 is disjoint and (24) shows inverse proportionality with |Y|2 , so that it is of order O(K โˆ’4 ) at most. There are O(K 4 ) terms of this form in the sum in the r.h.s. of (23) so that the sum of these terms is of order O(1) at most. k,l โˆ— โ€ข If k = l and i 6= j then Ei,j (ฮธ ) = 0 since in this case it holds that Scoi (yk ) ยท Scoj (yk )t = 0 for any y โˆˆ YK which follows from the facts that Scoi (y) 6= 0 when y โˆˆ Bi only and that Bi โˆฉ Bj = โˆ…. โ€ข If i = j = k = l then Z โˆ‡ฮธ gฮธโˆ— (yi | xi ) ยท โˆ‡ฮธ gฮธโˆ— (yi | xi )t k,l โˆ— dy, Ei,j (ฮธ ) = 1Bi (yi )ci,i (y)2 gฮธโˆ— (yi | xi ) which does not depend on K or |Y| and is therefore of order O(1). Following the same principles for the other values of i, j, k, l, we find that I โˆž,0 (ฮธโˆ— ) is of order O(K). Since the information in the idealised observation model, i.e. when data association is known, is equal to KI(ฮธโˆ— ), it follows that the relative loss is constant. In other words, for a large number of targets, adding more targets increases the information at the same rate as in the idealised model. Validation via simulations. The special likelihood is taken of the form ( . N (y; xk + m, 1) if y โˆˆ Bk = (xk + m โˆ’ r, xk + m + r) gฮธ (y | xk ) = /|Y \ Bk | otherwise, R with  = 0.1 and with r characterised by Bk N (y; xk , 1)dy = 1 โˆ’  via Bk . In this case, the displacement m is considered as the parameter ฮธ and the true value is ฮธโˆ— = 0. The relative information loss associated with this likelihood is displayed in Figure 3a under two different configurations. The first one (Constant observation space in the 17 IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 0.2 5 0.18 4.5 0.16 4 3.5 0.12 , relative loss 0.14 3 0.1 2.5 Constant observation space Adaptive observation space 0.08 2 0.06 1.5 0.04 1 0.02 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 0 7 0.5 1 1.5 2 2.5 3 3.5 = Number of targets (a) For a varying number of objects for the (b) For varying association uncertainty ฮฑ and special likelihood (105 MC runs). spatial separation ฯ„ (104 MC runs). 1 0.7 experimental 1-p 0.9 D 0.6 0.8 0.7 relative loss relative loss 0.5 0.4 0.3 0.6 0.5 0.4 0.3 0.2 0.2 0.1 0.1 0 0 1 2 3 4 5 6 number of targets 7 8 9 10 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 pD (c) For a varying number of objects with sep- (d) For a varying probability of detection pD , aration ฯ„ = 1 and ฮฑ = โˆž (104 MC runs). compared to 1 โˆ’ pD . Fig. 3: Information loss with association uncertainty (3a-3c) or detection failures (3d). figure) corresponds to the case where the observation space is large enough to meet the requirements associated with (23); the relative loss can be seen to increase linearly with the number of targets. The second case (Adaptive observation space in the figure) corresponds to the case where the observation space has to be augmented to fit new targets and shows a constant relative information loss. This last result is consistent with the conclusion above that the information loss is of the same order as the number of targets when the observation space has to be augmented. Further simulations. Five static objects on X = R at positions xi = ฯ„ (i โˆ’ 3) with i โˆˆ {1, . . . , 5} are observed via a linear Gaussian model with variance equal to 1. The objective is to understand how the Fisher information matrix I ฮฑ,0 (ฮธโˆ— ) evolves with ฮฑ and with the position of the objects. It is assumed that ฮธ parametrises the variance of the Gaussian observation model only, so that I ฮฑ,0 (ฮธโˆ— ) is a scalar. The relative information loss is displayed in Figure 3b and confirms the intuition that the information loss increases with ฮฑ, except in the case ฮฑ = 1 where there is no loss by 18 J. HOUSSINEAU, S.S. SINGH AND A. JASRA definition since A1k = {id} for any k โ‰ฅ 1 so that the data association is known in this case. Also, the loss is increased when the individual likelihoods overlap while being increasingly different and then decreases when the overlap becomes negligible. The maximum is reached when ฯ„ = 1, that is when the distance |xi โˆ’ xiโˆ’1 | between two consecutive objects is 1 for any i โˆˆ {2, . . . , 5}. The fact that there is no loss when ฯ„ = 0 follows from the irrelevance of data association uncertainty when all objects are at the same position, as explained in Example 2. To better understand the behaviour w.r.t. the number of targets, Figure 3c displays the relative information loss for 1 to 10 targets in the case of full data association uncertainty with ฯ„ = 1. The results for the two sets of simulations are consistent and show the same trend: the relative information loss increases with the number of targets but tend to stabilise. To sum up, there is no loss for 1 target by construction, the loss is linear in the number of targets when there are sufficiently many, and it increases the fastest during the transition between these two modes. 5.4. Detection failures. In this section, the case of detection failures is analysed when assuming that there are no false alarms, that is when ฮธ โˆ— is in the specialparameter set ฮ˜ฮป=0 . To establish our main result in this section (Theorem 5), we will use the concept of missing information (see for instance [3] in the context of Approximate Bayesian Computation). ฮฑ,ฮฒ โˆ— Theorem 5. Assuming ฮธ โˆ— โˆˆ ฮ˜ฮป=0 , the information loss Iloss (ฮธ ) for known data association with unconstrained detection failures, i.e for ฮฑ = 1, ฮฒ = โˆž, is found to be 1,โˆž โˆ— . Iloss (ฮธ ) = (1 โˆ’ pโˆ—D )K โˆ— I(ฮธโˆ— ). The proof can be found in Appendix E. It follows from Theorem 5 that in the considered configuration the Fisher information matrix I 1,โˆž (ฮธโˆ— ) can be made arbitrary close to 0 by making pโˆ—D tend to 0. Also, there is no loss at all when pโˆ—D = 1, as expected. In order to verify the result of Theorem 5 in practice, a single-object scenario with detection failures and without false alarms is considered. The object starts at time t = 0 from the position x0 = 0 and evolves in X = R according to a random walk with standard deviation 0.1 until time n = 50. The observation is linear and Gaussian with variance equal to 1. The integral over the state space in the expression of the score is computed by Monte Carlo simulation with 103 samples while the expectation in the Fisher information utilises 104 samples. The relative information loss is displayed in Figure 3d and confirms the coefficient 1 โˆ’ pD found analytically in Theorem 5. The next example shows how the Fisher information evolves in general when adding new objects without involving them in data association uncertainty. Example 3. The Fisher information I ฮฑ,ฮฒ (ฮธโˆ— , K) of a K-object problem can be related to the information I ฮฑ,ฮฒ (ฮธโˆ— , K + N ) where the N new objects are not perturbed by data-association uncertainties, i.e. when the random variable ฯ‚ in the observation . model (15) verifies ฯ‚|D = id almost surely with D = {|d1:K+1 |, . . . , |d1:N |}. It then follows from Theorem 5 that I ฮฑ,ฮฒ (ฮธโˆ— , K + N ) = I ฮฑ,ฮฒ (ฮธโˆ— , K) + pโˆ—D N I(ฮธโˆ— ) for any ฮฑ > 0 and any ฮฒ โ‰ฅ 0. This example gives an upper bound for the increase of the Fisher information when the number of objects is increased, since it depicts the case where there is no data association uncertainty for these objects. This would correspond in practice to a case where the added objects are in an area where there is IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 19 no false alarm and where these objects are โ€œfarโ€ from the existing objects as well as โ€œfarโ€ from each other, where โ€œfarโ€ depends on the likelihood. 6. Conclusion. The first important result in this article is the proof of consistency of the maximum likelihood estimator for multi-target tracking under weak conditions, where weak means that these conditions are as often as possible applying to the single-target dynamics and observation. Asymptotic normality holds under additional assumptions and the second part of the article brings understanding to the asymptotic variance of the maximum likelihood estimate by analysing the Fisher information matrix corresponding to multi-target tracking. Qualitative results are obtained in the general case, that is, the Fisher information decreases with data association uncertainty, detection failures and in the presence of false alarms. Quantitative results are also derived in important special cases: a) one static target with false alarm and unknown data association, b) multiple static targets with unknown data association under a particular observation model, and c) multiple targets with detection failures. Future works include the study of identifiability of specific observation-to-track associations, instead of marginalising over all possibilities as considered in this article. Such an approach involves additional challenges since the parameters to be learned increase in dimensionality with time, so that it is not a special case of the results presented here. Acknowledgement. All authors were supported by the Singapore ministry of education tier 1 grant number R-155-000-182-114. Appendix A. Assumptions for Theorem 3. The following assumptions are required for the proof of the asymptotic normality of the maximum P likelihood estimator in multi-target tracking. The norm k ยท k is defined as kM k = i,j |Mi,j | for any matrix M . A.6 For all K โˆˆ S T , all x, x0 โˆˆ XK and all y โˆˆ Yร— , the mappings ฮธ 7โ†’ fฮธ (x | x0 ) and ฮธ 7โ†’ gฮธ (y | x) are twice continuously differentiable on the hyperplane of ฮ˜ made of parameters with a number of target equal to K. A.7 It holds that sup sup kโˆ‡ฮธ log fฮธ (x | x0 )k < โˆž and ฮธโˆˆฮ˜ x,x0 โˆˆXK sup sup ฮธโˆˆฮ˜ x,x0 โˆˆXK kโˆ‡2ฮธ log fฮธ (x | x0 )k < โˆž and that h i Eฬ„ฮธโˆ— sup sup kโˆ‡ฮธ log gฮธ (Y | x)k < โˆž ฮธโˆˆฮ˜ xโˆˆXK h i Eฬ„ฮธโˆ— sup sup kโˆ‡2ฮธ log gฮธ (Y | x)k < โˆž. ฮธโˆˆฮ˜ xโˆˆXK S A.8 For all y โˆˆ Yร— , there exists an integrable function hy : kโ‰ฅ0 Xk โ†’ R+ such that supฮธโˆˆฮ˜ gฮธ (y | x) โ‰ค hy (x). For all ฮธ โˆˆ ฮ˜ and for all x โˆˆ XK , there exist integrable functions h1x , h2x : Yร— โ†’ R+ such that kโˆ‡ฮธ gฮธ (y | x)k โ‰ค h1x (y) and kโˆ‡2ฮธ gฮธ (y | x)k โ‰ค h2x (y). Appendix B. Proof of Lemma 1. It follows from Assumption A.2 that the supremum bC + of the clutter density p(ฮป,ฯˆ) characterised for any k โˆˆ N0 and any 20 J. HOUSSINEAU, S.S. SINGH AND A. JASRA y โˆˆ Yk by p(ฮป,ฯˆ) (y) = Poฮป (k) sup ฮปโˆˆS C X Qk i=1 pฯˆ (yi ) verifies bC + < โˆž since  sup p(ฮป,ฯˆ) (y) = sup k โˆ’ฮป X (ฮปbC +) e ฮปโˆˆS C kโ‰ฅ0 k kโ‰ฅ0 (ฯˆ,y)โˆˆฮจร—Y k! C = sup eฮป(b+ โˆ’1) < โˆž, ฮปโˆˆS C and since all the terms in the sum are positive. It then holds that bฬ‚+ โ‰ค sup (pD ,K,y)โˆˆ(0,1)ร—S T ร—Yร— โ‰ค sup (pD ,K)โˆˆ(0,1)ร—S T bC + Kโˆง#y X  i=0  K i Kโˆ’i (pD bT + ) (1 โˆ’ pD ) i T K bC + (1 โˆ’ pD + pD b+ ) < โˆž, which concludes the first part of the proof. For any k โˆˆ N0 and any y โˆˆ Yk Z X gฮธ (y | x)dx โ‰ฅ k Y  T  bโˆ’ (yi ) โˆง bC โˆ’ (yi ) Poฮป (k โˆ’ |d|)qฮธ (d) dโˆˆ{0,1}K i=1 |d|โ‰คk = Kโˆงk k XY  T  K bโˆ’ (yi ) โˆง bC โˆ’ (yi ) Poฮป (k โˆ’ d)BipD (d) d=0 i=1 = BiK pD โˆ— Poฮป (k) k Y  T  bโˆ’ (yi ) โˆง bC โˆ’ (yi ) i=1 โ‰ฅ inf ฮธโˆˆฮ˜ BiK pD k Y  T  โˆ— Poฮป (k) bโˆ’ (yi ) โˆง bC โˆ’ (yi ) . i=1 It also holds that inf ฮธโˆˆฮ˜ BiK pD โˆ— Poฮป (k) > 0 for any k โˆˆ N0 since the support of Poฮป is N0 for any ฮป โˆˆ S C which guarantees that the convolution has also N0 as a support so that the infimum is strictly greater than zero. It follows that bโˆ’ (y) > 0 and, considering (8), that Eฬ„ฮธโˆ— [| log bโˆ’ (Y )|] < โˆž. Similarly, for any k โˆˆ N0 and any y โˆˆ Yk b+ (y) โ‰ค sup BiK pD โˆ— Poฮป (k) ฮธโˆˆฮ˜ k Y  T  b+ (yi ) โˆจ bC + (yi ) , i=1 which is finite when k is finite. In the infinite case, noticing that Poฮป (k โˆ’ K)pK D is the leading term in the convolution, we find that h i k T C lim sup b+ (y) โ‰ค sup lim KpK D Poฮป (k โˆ’ K) sup b+ (y) โˆจ b+ (y) kโ†’โˆž yโˆˆYk ฮธโˆˆฮ˜ kโ†’โˆž yโˆˆY โˆ’ฮป ikโˆ’K e C sup bT (y) โˆจ b (y) <โˆž + + kโ†’โˆž (k โˆ’ K)! yโˆˆY โ‰ค sup cฮธ lim ฮธโˆˆฮ˜ h where cฮธ is a finite constant, which concludes the proof of the lemma. Appendix C. Proof of Theorem 2. The two cases of Theorem 2 are proved separately as follows: IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 21 a) When ฮธ โˆˆ ฮ˜ฮป=0 , the joint probability of the observations when the system is initialised with its stationary distribution is characterised by Z Pฬ„ฮธ (B) = 1B (y1:n ) n Y  K  n Y Y gฮธ (yt | xt ) ฯ€ฮธ (x0,i ) fฮธ (xt,i | xtโˆ’1,i ) dy1:n dx0:n , t=1 t=1 i=1 for any measurable subset B = B1 ร— ยท ยท ยท ร— Bn of (Yร— )n with . gฮธ (y | x) = X dโˆˆ{0,1}K |d|=m  X m Y   gฮธ yฯƒ(i) | xr(i) um (ฯƒ)qฮธ (d) . ฯƒโˆˆSym(m) i=1 for any m โˆˆ N0 and any (x, y) โˆˆ XK ร— Ym . Assuming that Bt is a measurable subset of YK of the form At ร— ยท ยท ยท ร— At for any 1 โ‰ค t โ‰ค n, then the sum over d collapses to a single term where all targets are detected and all the terms in the sum over ฯƒ are equal, so that . wฮธ1 = Pฬ„ฮธ (B) Z Y n h K  i Y  Kn = pD ฯ€ฮธ (x0 ) 1At (yt,i )gฮธ yt,i | xt,i fฮธ (xt,i | xtโˆ’1,i ) dy1:n dx0:n . i=1 t=1 A second case that can be considered is when Bt represents the configuration where there are m โ‰ค K observations without considering their locations for all 1 โ‰ค t โ‰ค n, i.e. Bt = Y ร— ยท ยท ยท ร— Y, in which case it holds that n . wฮธ2,m = Pฬ„ฮธ (B) = BiK pD (m) If (K, pD ) 6= (K โˆ— , pโˆ—D ) then we can show that wฮธ2,K = wฮธ2,K and wฮธ2,Kโˆ’1 = wฮธ2,Kโˆ’1 โˆ— โˆ— cannot hold at the same time for any ฮธ โˆˆ ฮ˜ฮป=0 . Alternatively, if (K, pD ) = (K โˆ— , pโˆ—D ) then wฮธ1 6= wฮธ1 โˆ— follows easily from the identifiability of ฮธโˆ— . These two cases considered together show that the distributions associated to ฮธ and ฮธ โˆ— differ in some subset of the multi-target observation space so that Pฬ„ฮธ 6= Pฬ„ฮธโˆ— . b) When ฮธ โˆˆ ฮ˜|K=1 , the multi-target likelihood becomes gฮธ (y | x) = (1 โˆ’ pD )Poฮป (m) m Y i=1 pฯˆโˆ— (yi ) + m Y  pD X gฮธโˆ— yi | x Poฮป (m โˆ’ 1) pฯˆโˆ— (yj ), m i=1 1โ‰คjโ‰คm j6=i for any m โˆˆ N0 and any (x, y) โˆˆ X ร— Ym . Marginalising over the location of the observations at each time step and considering the case where there are m observations, i.e. Bt = Y ร— ยท ยท ยท ร— Y, gives . wฮธm = Pฬ„ฮธ (B) = (1 โˆ’ pD )Poฮป (m) + pD Poฮป (m โˆ’ 1), mโ‰ฅ1 . and wฮธ0 = (1 โˆ’ pD )eโˆ’ฮป . Assuming that ฮธ 6= ฮธ โˆ— and considering that (pD , ฮป) 6= (pโˆ—D , ฮปโˆ— ) it follows that wฮธ0 = wฮธ0 โˆ— , wฮธ1 = wฮธ1 โˆ— and wฮธ2 = wฮธ2 โˆ— cannot all hold at the same time, which concludes the proof. Appendix D. Proof of Theorem 4. 22 J. HOUSSINEAU, S.S. SINGH AND A. JASRA Lemma 6. For given integers m and K, let Pฮธ be a family of probability measures on YmK indexed by ฮธ โˆˆ ฮ˜ and let pฮธ denote the corresponding probability density w.r.t. a common reference measure, for all ฮธ, on YmK . Assume that pฮธ (y1 , . . . , ym ) > 0 for any ฮธ and (y1 , . . . , ym ). For any integers ฮฑ โ‰ฅ 1 and ฮฒ โ‰ฅ 0, let the random vectors (Y10 , . . . , Ym0 ) be conฮฑ,ฮฒ ฮฑ,ฮฒ ditionally independent given (Y1 , . . . , Ym ), with law PYฮฑ,ฮฒ 0 |Y1:m = PY 0 |Y1 . . . PY 0 |Ym 1:m 1 m is defined as in (15) via a process of thinning, augmentation with and each PYฮฑ,ฮฒ 0 i |Yi clutter with density pฯˆ on Y and random permutation. Assume pฯˆ > 0. 1. Consider any ฮธ and (ฮฑ, ฮฒ) such that ฮฑ > 1 or ฮฒ > 0. If f (Y1 , . . . , Ym ) = E[f (Y1 , . . . , Ym )|Y10 , . . . , Ym0 ] then f (Y1 , . . . , Ym ) is constant almost surely. 2. Let the probability measure of (Y10 , . . . , Ym0 ) be Pฮธฮฑ,ฮฒ and its corresponding ฮฑ,ฮฒ probability density be pฮฑ,ฮฒ are differฮธ . Assume that the densities pฮธ and pฮธ entiable w.r.t. ฮธ then (32) E[โˆ‡ฮธ log pฮธ (Y1 , . . . , Ym ) ยท โˆ‡ฮธ log pฮธ (Y1 , . . . , Ym )t ] ฮฑ,ฮฒ 0 0 0 0 t โ‰ฅ E[โˆ‡ฮธ log pฮฑ,ฮฒ ฮธ (Y1 , . . . , Ym ) ยท โˆ‡ฮธ log pฮธ (Y1 , . . . , Ym ) ], with the inequality being strict if and only if ฮฑ > 1 or ฮฒ > 0 and if the l.h.s. is strictly greater than 0. Proof of Part 1 of Lemma 6. When ฮฑ = 1 and ฮฒ > 0, which corresponds to no random permutation (or no observation association uncertainty) but only random thinning, the result follows from Lemma 11 and Remark 4. When ฮฑ > 1 and ฮฒ = 0, which corresponds to no random thinning but only random permutation, the result follows from Corollary 9. When ฮฑ โ‰ฅ 1 and ฮฒ > 0, i.e. both random thinning and random permutation are present, the result of Lemma 11 based on YD , i.e. for (ฮฑ = 1, ฮฒ > 0), can be extended to the random variable YD0 = Sฯ‚ (YD โŠ• Yฬ‚ ) as follows: 1. By noticing that ฯƒ(YD0 ) โІ ฯƒ(ฯ‚, YD , Yฬ‚ ) (i.e. the ฯƒ-algebra generated by YD0 is . coarser than the one generated by Yฬ„D = (ฯ‚, YD , Yฬ‚ )). Indeed, for any C = B1 ร— B2 ร— ยท ยท ยท โˆˆ B(Yร— ) with all but finitely many Bi equal to Y, it holds that [ YD0โˆ’1 (C) = Yฬ„Dโˆ’1 ({ฯƒ} ร— Bฯƒ(1) ร— Bฯƒ(2) ร— . . . ) โˆˆ ฯƒ(Yฬ„D ) ฯƒ where the inclusion follows by countable union. The family of subsets of the same form as C is a generating family of B(Yร— ) from which the result follows. The result extends straightforwardly to any collection of m thinned observation vectors being independently perturbed by false alarm and permutation since the corresponding ฯƒalgebra is generated by the set of rectangles of the form C1 ร—ยท ยท ยทร—Cm with Ci โˆˆ B(Yร— ). 2. As a consequence of 1, the fact that f (Y ) = E[f (Y ) | YD0 ] a.s. implies that   E[f (Y ) | Yฬ„D ] = E E[f (Y ) | YD0 ] | Yฬ„D = E[f (Y ) | YD0 ] a.s., so that, since Yฬ‚ , ฯ‚ and YD are independent, it holds that f (Y ) = E[f (Y ) | Yฬ„D ] = E[f (Y ) | YD ] a.s., which under the assumption of Lemma 11 implies that f (Y ) is constant almost surely. As in 1, the same result holds for collection of m observation vectors. IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 23 Proof of Part 2 of Lemma 6. Let Y be the K measurements of K targets, Yฬ‚ be the clutter, ฯ‚ the random permutation, D the K dimensional vector of deletions. Let Y 0 = Sฯ‚ ((RD Y ) โŠ• Yฬ‚ ). The missing target generated observations are Ym = RD0 Y where D 0 = 1 โˆ’ D. Let pY 0 ,ฯ‚,D,Ym (y 0 , ฯƒ, d, ym ) denote the joint pdf/pmf of (Y 0 , Ym , D, ฯ‚) that depends implicitly on ฮธ. Using the change of variable formula, noting that (Y , Yฬ‚ ) = F (Y 0 , Ym , D, ฯ‚) where the mapping F is a permutation of (Y 0 , Ym ) and hence the Jacobian of the transformation has determinant 1, it follows that pY 0 ,Ym ,D,ฯ‚ (y 0 , ym , d, ฯƒ) = pY ,Yฬ‚ ,D,ฯ‚ (F (y 0 , ym , d, ฯƒ), d, ฯƒ) for y 0 = Sฯƒ ((Rd y) โŠ• yฬ‚), ym = Rd0 y where d0 = 1 โˆ’ d. โˆ‡ฮธ log pY ,Yฬ‚ ,D,ฯ‚ (y, yฬ‚, d, ฯƒ) = โˆ‡ฮธ log pY (y), we deduce that Since it holds that โˆ‡ฮธ log pY 0 ,Ym ,D,ฯ‚ (y 0 , ym , d, ฯƒ) = โˆ‡ฮธ log pY (FT (y 0 , ym , d, ฯƒ)) where FT (y 0 , ym , d, ฯƒ) is the projection of F (y 0 , ym , d, ฯƒ) on the coordinates describing Y . Now it follows that, almost surely, โˆ‡ฮธ log pY 0 ,Ym ,D,ฯ‚ (Y 0 , Ym , D, ฯ‚) = โˆ‡ฮธ log pY (Y ). Let pY 0 denote the density of Y 0 . Then โˆ‡ฮธ log pY 0 (Y 0 ) = EPฮธ [โˆ‡ฮธ log pY (Y ) | Y 0 ]. (33) 0 Applying (33) to the joint random variables Y1:m and Y1:m defined in the lemma, it follows that   0 0 โˆ‡ฮธ log pฮฑ,ฮฒ ฮธ (Y1:m ) = EPฮธ โˆ‡ฮธ log pฮธ (Y1:m ) | Y1:m . Let v โˆˆ Rdฮ˜ , then Jensenโ€™s inequality applied to the function x 7โ†’ x2 and to the random variable v t โˆ‡ฮธ log pฮธ (Y1:m ) yields  2  2  0 0 EPฮธ v t โˆ‡ฮธ log pฮธ (Y1:m ) | Y1:m โ‰ค EPฮธ v t โˆ‡ฮธ log pฮธ (Y1:m ) | Y1:m almost surely, so that ฮฑ,ฮฒ t v t EP ฮฑ,ฮฒ [โˆ‡ฮธ log pฮฑ,ฮฒ ฮธ (Y1:m ) ยท โˆ‡ฮธ log pฮธ (Y1:m ) ]v ฮธ   2  0 = EP ฮฑ,ฮฒ EPฮธ v t โˆ‡ฮธ log pฮธ (Y1:m ) | Y1:m ฮธ t โ‰ค v EPฮธ [โˆ‡ฮธ log pฮธ (Y1:m ) ยท โˆ‡ฮธ log pฮธ (Y1:m )t ]v which proves (32). Since Jensenโ€™s inequality has been applied to a strictly convex function, the case of equality: ฮฑ,ฮฒ t v t EP ฮฑ,ฮฒ [โˆ‡ฮธ log pฮฑ,ฮฒ ฮธ (Y1:m ) ยท โˆ‡ฮธ log pฮธ (Y1:m ) ]v ฮธ = v t EPฮธ [โˆ‡ฮธ log pฮธ (Y1:m ) ยท โˆ‡ฮธ log pฮธ (Y1:m )t ]v, 0 holds if and only if, for all v โˆˆ Rdฮ˜ , v t โˆ‡ฮธ log pฮธ (Y1:m ) = E[v t โˆ‡ฮธ log pฮธ (Y1:m ) | Y1:m ] 0 0 is ฯƒ(Y1:m )-measurable. Part 1 of the lemma shows that โˆ‡ฮธ log pฮธ (Y1:m ) is ฯƒ(Y1:m )measurable if and only if it is constant a.s.. Given that EPฮธ [โˆ‡ฮธ log pฮธ (Y1:m )] = 0 it follows that the function itself is equal to 0 since it is constant, hence proving the lemma. 24 J. HOUSSINEAU, S.S. SINGH AND A. JASRA The observation model (15) does not imply the equality of the gradients of log pฮธ (Y 0 , Y ) and log pฮธ (Y ) w.r.t. ฮธ since Pฮธ (dY 0 | Y ) depends on pD , ฮป and ฯˆ which are parameters included in ฮธ. The interest is however in the information loss w.r.t. ฮธ so that the result of Lemma 6 is satisfying. Proof of Theorem 4. The considered perturbed observation model has the same ฮฑ,ฮฒ properties as the one studied in [3], i.e. that โˆ‡ฮธ log pฮฑ,ฮฒ ) = โˆ‡ฮธ log pฮธ (Y ) ฮธ (Y , Y holds almost surely. The result of [3, Lemma 3] and [3, Remark 9] can therefore be used directly in the context of interest to give h i (m) ฮฑ,ฮฒ โˆ— โˆ— Iloss (ฮธ ) = Eฬ„ฮธโˆ— I ฮฑ,ฮฒ (ฮธ ) , Yโˆ’โˆž:โˆ’1 ,Ym:โˆž ฮฑ,ฮฒ where, for any Yโˆ’โˆž:โˆ’1 , any Ym:โˆž and any integer m โ‰ฅ 1, I (m) โˆ— ฮฑ,ฮฒ (ฮธ ) Yโˆž:โˆ’1 ,Ym:โˆž = h  1 ฮฑ,ฮฒ Eฬ„ฮธโˆ— โˆ‡ฮธ log pฮธโˆ— Y0:mโˆ’1 | Yโˆ’โˆž:โˆ’1 , Ym:โˆž ยท m i  ฮฑ,ฮฒ t ฮฑ,ฮฒ โˆ‡ฮธ log pฮธโˆ— Y0:mโˆ’1 | Yโˆ’โˆž:โˆ’1 , Ym:โˆž Yโˆ’โˆž:โˆ’1 , Ym:โˆž h  1 ฮฑ,ฮฒ โˆ’ Eฬ„ฮธโˆ— โˆ‡ฮธ log pฮธโˆ— Y0:mโˆ’1 | Yโˆ’โˆž:โˆ’1 , Ym:โˆž ยท m i  ฮฑ,ฮฒ t ฮฑ,ฮฒ โˆ‡ฮธ log pฮธโˆ— Y0:mโˆ’1 | Yโˆ’โˆž:โˆ’1 , Ym:โˆž Yโˆ’โˆž:โˆ’1 , Ym:โˆž . The objective is to prove that (36) h (m) Eฬ„ฮธโˆ— I ฮฑ,ฮฒ Yโˆ’โˆž:โˆ’1 ,Ym:โˆž i (ฮธโˆ— ) = 0 for all m โ‰ฅ 1 implies that I(ฮธโˆ— ) = 0. From Lemma 6 applied to the involved conฮฑ,ฮฒ ) = 0 almost surely ditional laws, (36) implies that โˆ‡ฮธ log pฮธโˆ— (Y0:mโˆ’1 | Yโˆ’โˆž:โˆ’1 , Ym:โˆž ฮฑ,ฮฒ for almost all Yโˆ’โˆž:โˆ’1 and almost all Ym:โˆž . Following the same principle as in [3, Lemma 4], it follows that if (36) holds for all m โ‰ฅ 1 then โˆ‡ฮธ log pฮธโˆ— (Y0 | Yโˆ’โˆž:โˆ’1 ) = 0 almost surely, which in turn implies that I(ฮธโˆ— ) = 0. D.1. Supporting results for the proof of Part 1 of Lemma 6. D.1.1. Supporting results for the proof of Lemma 6 for permutation uncertainty but no deletion, i.e. (ฮฑ > 1, ฮฒ = 0). Lemma 7 (Randomly permuting a random vector.). Let Y = (Y1 , . . . , Yn ) and Yฬ‚ = (Yn+1 , . . . , Yn+m ). Let ฯ‚ denote the randomised permutation which is independent of (Y , Yฬ‚ ) and let Z = (Yฯ‚(1) , . . . , Yฯ‚(m+n) ). Assume ฯ‚ permits, at the least, the exchange of any two indices, i.e. P(ฯ‚(i) = j, ฯ‚(j) = i, {ฯ‚(k) = k : k 6= i, j}) > 0 for all i, j. Furthermore, P(ฯ‚ = (1, . . . , n)) > 0. Assume the law of (Y , Yฬ‚ ) satisfies ฮฝ n+m  PY ,Yฬ‚  ฮฝ n+m where ฮฝ is some probability measure and ฮฝ n+m the product probability measure on Yn+m . If f (Y ) = E[f (Y )|Z], then f (Y ) is a constant almost surely. Proof of Lemma 7. The proof is completed for the case m = 1 and easily generalised to m > 1. Likewise, to present the arguments we employ in the clearest way, we consider the case (n = 2, m = 1). (The case n + m = 2 sheds too little light to make the generalisation apparent.) IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 25 Let g(Z) = E[f (Y )|Z]. For any ฯƒ such that P(ฯ‚ = ฯƒ) > 0, E[|f (Y ) โˆ’ g(Yฯƒ(1) , . . . , Yฯƒ(n+1) )|I[ฯ‚=ฯƒ] ] = 0. Since ฯ‚ is independent of (Y , Yฬ‚ ), we have E[|f (Y ) โˆ’ g(Yฯƒ(1) , . . . , Yฯƒ(n+1) )|] = 0 and thus g(Yฯƒ(1) , . . . , Yฯƒ(n+1) ) = g(Yฯƒ0 (1) , . . . , Yฯƒ0 (n+1) ) almost surely for any other ฯƒ 0 such that P(ฯ‚ = ฯƒ 0 ) > 0. Now consider the case (n = 3, m = 1). The preceding statements imply, PY ,Y almost everywhere, (37) g(Y1 , Y2 , Y3 ) = f (Y1 , Y2 ) (38) g(Y1 , Y2 , Y3 ) = g(Y3 , Y2 , Y1 ) (39) g(Y1 , Y2 , Y3 ) = g(Y1 , Y3 , Y2 ). Indeed these also hold ฮฝ 3 almost every. (Due to the assumption of mutual absolutely continuity, statements holds PY ,Y almost everywhere if and only if they hold ฮฝ 3 almost every.) We will show that the further implication (40) f (Y1 , Y2 ) = f (Y3 , Y2 ) = f (Y1 , Y3 ) holds ฮฝ 3 almost everywhere may be derived. Once this is done, to complete the proof, we will further manipulate (40) under the assumption that the random variables Yi are independently and identically distributed with respect to measure ฮฝ to show that f = c, for some constant c, ฮฝ 3 almost everywhere. From the first equality of (40), f (Y1 , Y2 ) = Eฮฝ 3 (f (Y3 , Y2 )|Y1 , Y2 ) = Eฮฝ 3 (f (Y3 , Y2 )|Y2 ) = h(Y2 ) for some function h. That is f (Y1 , Y2 ) collapses to a function of variable Y2 only, which is denoted by h(Y2 ). Using the second equality of (40), h(Y2 ) = f (Y1 , Y3 ) and thus it must be that h is a constant as Yi are independent. We now verify (37)-(38) implies f (Y1 , Y2 ) = f (Y3 , Y2 ) of (40). We have Eฮฝ 3 [|f (Y1 , Y2 ) โˆ’ g(Y3 , Y2 , Y1 )|] = 0 and a change of variable gives Eฮฝ 3 [|f (Y3 , Y2 )โˆ’g(Y1 , Y2 , Y3 )|] = 0. The same procedure applied to (37)-(39) shows the second equality of (40). Corollary 8 extends Lemma 7 to the situation when Yฬ‚ therein follows the law of a clutter process as defined in Section 5.1 (see 15.) Corollary 8. Let (Yฬ‚1 , Yฬ‚2 , . . .) be an infinite sequence of independent Y-valued random variables with Yฬ‚i โˆผ Pฯˆ . Let Y = (Y1 , . . . , YK ) be a vector of Y-valued random variables which is independent of (Yฬ‚1 , Yฬ‚2 , . . .). Let Mฬ‚ โˆˆ N0 be non-negative random variable independent of (Y , Yฬ‚1:โˆž ). Let Z = Sฯ‚ (Y โŠ• Yฬ‚ ) where Yฬ‚ = Yฬ‚1:Mฬ‚ and Sฯ‚ is the random permutation matrix defined as in (15) of Section 5.1. Assume (Pฯˆ )K  PY  (Pฯˆ )K . If f (Y ) = E[f (Y )|Z], then f (Y ) is a constant almost surely. Proof. Let g(Z) = E[f (Y )|Z] then E[|f (Y ) โˆ’ g(Z)||Mฬ‚ = m] = 0 for all m such that P(Mฬ‚ = m) > 0. Since Mฬ‚ is independent of (Y , Yฬ‚1:โˆž ) and the random permutation matrix is itself independent of (Y , Yฬ‚1:โˆž ) given Mฬ‚ = m, the law of (Y , Z) 26 J. HOUSSINEAU, S.S. SINGH AND A. JASRA conditioned on Mฬ‚ = m satisfies the assumptions of Lemma 7. Thus, by Lemma 7, E[|f (Y ) โˆ’ g(Z)||Mฬ‚ = m] = 0 implies f (Y ) = cm almost surely for some constant cm . (It is clear that cm is independent of m.) The next results extends Corollary 8 to the setting where a sequence of vectors (Y1 , . . . , Ym ), with Yi โˆˆ YK , is observed indirectly through the sequence of vectors (Z1 , . . . , Zm ) where each Zi is generated as in Corollary 8 by augmenting Yi with clutter and then randomly permuting it. Corollary 9. Let (Y1 , . . . , Ym ) be a sequence of random vectors with Yi โˆˆ YK . Let (Z1 , . . . , Zm ) be conditionally independent given (Y1 , . . . , Ym ), i.e. PZ1:m |Y1:m = PZ1 |Y1 . . . PZm |Ym and each PZi |Yi is defined as in Corollary 8. Assume (41) (Pฯˆ )K+m  PY1:m  (Pฯˆ )K+m If f (Y1:m ) = E[f (Y1:m )|Z1:m ], then f (Y1:m ) is a constant almost surely. In particular, (41) holds if both (Y1 , . . . , Ym ) and Pฯˆ have positively valued probability densities, i.e. p(y1 , . . . , ym ) > 0 and pฯˆ (y) > 0, w.r.t. the dominating measures ฮฝ K+m and ฮฝ for some measure ฮฝ on Y. Proof. Due to the conditional independence assumption, E[f (Y1:m )|Z1 , Y2:m ] = E[f (Y1:m )|Z1 , Y2:m , Z2:m ] and since f (Y1:m ) = E[f (Y1:m )|Z1:m ], we have f (Y1:m ) = E[f (Y1:m )|Z1 , Y2:m ] or f (Y1 , y2:m ) = E[f (Y1:m )|Z1 , y2:m ] PY1 ,Z1 |y2:m โˆ’ a.s. for PY2:m almost all y2:m . Invoking Corollary 8 we thus have f (Y1 , Y2:m ) = g1 (Y2:m ) a.s. for some function g1 . Proceeding in this way we can similarly show f (Y1:iโˆ’1 , Yi , Yi+1:m ) = gi (Y1:iโˆ’1 , Yi+1:m ) for i = 1, . . . , m. We can now invoke assumption (41) to show that f (Y1:m ) must be a constant almost surely in a manner similar to the proof of Lemma 7; details omitted. The final statement of the corollary is straightforward. D.1.2. Supporting results for the proof of Lemma 6 for deletion but no permutation uncertainty, i.e. (ฮฑ = 1, ฮฒ > 0). The following result is an intermediate result intended to convey the main idea of the analysis while the actual full blown version is contained in Lemma 11 below. Lemma 10. Let Y = (Y1 , Y2 ), D โˆˆ {1, 2}, Y and D are independent and 0 < P(D = 1) < 1. Assume for any measurable set C that P(Y1 โˆˆ C|Y2 โˆˆ C) < 1 whenever 0 < P(Y1 โˆˆ C) < 1. Then f (Y ) = E[f (Y )|YD ] implies f (Y ) = c almost surely for some constant c. Remark 1. The random variables (Y1 , Y2 ) can always be relabelled if the assumption is met by P(Y2 โˆˆ ยท|Y1 โˆˆ ยท). The assumption is to be interpreted to mean that if Y1 is not concentrated in C then the event Y2 โˆˆ C does not imply Y1 โˆˆ C. This assures some independence between the random variables. Remark 2. The assumption is satisfied without the need of densities. For example the assumption is satisfied when Y1 and Y2 are independent. If Y = (Y1 , Y2 ) has a density, then the assumption is satisfied if p(y1 , y2 ) > 0. Indeed in this case P(Y1 โˆˆ C c , Y2 โˆˆ C) > 0 for all C โŠ‚ Y. IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 27 Proof of Lemma 10. The conditional expectation can always be expressed as follows: there exists a function g such that E[f (Y )|YD ] = g(YD ) or g(YD ) is a version of the conditional expectation. Thus we have 0 = E[|f (Y ) โˆ’ g(YD )|] = P(D = 1)E[|f (Y ) โˆ’ g(Y1 )|] + P(D = 2)E[|f (Y ) โˆ’ g(Y2 )|] which follows from the independence of D and Y . Since 0 < P(D = 1) < 1, both expectation terms must be zero and hence g(Y1 ) = g(Y2 ) almost surely: E[|g(Y1 ) โˆ’ g(Y2 )|] โ‰ค E[|f (Y ) โˆ’ g(Y1 )|] + E[|f (Y ) โˆ’ g(Y2 )|] = 0. For any measurable set B, let A = g โˆ’1 (B). Since g(Y1 ) = g(Y2 ) almost surely, we have P(g(Y1 ) โˆˆ B) = P(g(Y1 ) โˆˆ B, g(Y2 ) โˆˆ B) = P(g(Y2 ) โˆˆ B) or that (42) P(Y1 โˆˆ A) = P(Y1 โˆˆ A, Y2 โˆˆ A) = P(Y2 โˆˆ A). We can now show that g(Y1 ) = c, for some constant c, almost surely. (Assuming the converse is true we will arrive at a contradiction.) If g(Y1 ) = c does not hold almost surely then there exist a set B such that 0 < P(g(Y1 ) โˆˆ B) < 1 and let A = g โˆ’1 (B) and thus 0 < P(Y1 โˆˆ A) < 1. But (42) implies P(Y1 โˆˆ A|Y2 โˆˆ A) = 1 which violates the assumption. Lemma 11 (Multiple deletions for K > 2.). Let Y = (Y1 , . . . , YK ) be a random vector, D โІ {1, . . . , K} and YD denote the thinned version where components not in D have been removed. Assume 0 < P(D = ฯƒ) < 1 for all subsets ฯƒ โŠ‚ {1, . . . , K} such that |ฯƒ| = K โˆ’ 1. Furthermore, assume the following: โ€ข For each i, j โˆˆ {1, . . . , K}, i 6= j, let Z โІ Y1:K\{i,j} . If P((Yi , Z) โˆˆ A) < 1 and IA (Yi , Z) 6= E[IA (Yi , Z)|Z] then P((Yi , Z) โˆˆ A|(Yj , Z) โˆˆ A) < 1. (Here f 6= g means P(f 6= g) > 0.) Then f (Y ) = E[f (Y )|YD ] implies f (Y ) = c almost surely for some constant c. Remark 3. The assumption of Lemma 11 is more easily understood as follows: for each i, j โˆˆ {1, . . . , K}, i 6= j, let Z โІ Y1:K\{1,j} . If P(Yi โˆˆ A|Z โˆˆ B) < 1 then P(Yi โˆˆ A|Z โˆˆ B, Yj โˆˆ A) < 1 Unfortunately stating the assumption via (measurable) rectangle sets is not sufficient as the product sigma algebra is much richer than just measurable rectangles. In fact, if the set A of IA (Yi , Z) in the assumption of Lemma 11 is the measurable rectangle IA (Yi )IB (Z) then the assumption reduces to that in this remark. Remark 4. The main assumption of Lemma 11 is satisfied if ฮฝ1 ร— ยท ยท ยท ร— ฮฝK  PY  ฮฝ1 ร— ยท ยท ยท ร— ฮฝK where ฮฝi are probability measures, i.e. PY and ฮฝ1 ร— ยท ยท ยท ร— ฮฝK are mutually absolutely continuous. (The proof of this fact uses Lemma 12 and the fact that trace of a set is measurable; this is omitted.) Proof of Remark 3. The condition IA (Yi , Z) 6= E[IA (Yi , Z)|Z] translates to IA (Yi )IB (Z) 6= E[IA (Yi )IB (Z)|Z] and from Lemma 12 this implies that for all measurable sets C in the range of Z E[IA (Yi )IB (Z)] 6= E[IC (Z)]. Taking C = B this then implies P(Yi โˆˆ A, Z โˆˆ B) < P(Z โˆˆ B) and so P(Yi โˆˆ A|Z โˆˆ B) < 1. 28 J. HOUSSINEAU, S.S. SINGH AND A. JASRA Clearly the probability P((Yi , Z) โˆˆ A|(Yj , Z) โˆˆ A) of the assumption of Lemma 11 for the rectangle is P(Yi โˆˆ A|Yj โˆˆ A, Z โˆˆ B). Proof of Lemma 11. The random variable YD belongs to Yร— , that is to the disk 0 joint union โˆชK k=0 Y with Y โ‰ก โˆ…. Thus we can write 0 = E[|f (Y ) โˆ’ g(YD )|] = K X X E[|f (Y ) โˆ’ gi (Yฯƒ )|I[D=ฯƒ] ] i=0 ฯƒ:|ฯƒ|=i = K X X E[|f (Y ) โˆ’ gi (Yฯƒ )|]P(D = ฯƒ) i=0 ฯƒ:|ฯƒ|=i where g0 is a constant, gi : Yi โ†’ R are measurable functions and independence of D and Y has been invoked. If P(D = โˆ…) > 0 then it is trivial since this implies E[|f (Y ) โˆ’ g0 |] = 0. So assume P(D = โˆ…) = 0. Having assumed 0 < P(D = ฯƒ) < 1 for all subsets ฯƒ โŠ‚ {1, . . . , K} such that |ฯƒ| = K โˆ’ 1, we focus on these terms only: X E[|f (Y ) โˆ’ gKโˆ’1 (Yฯƒ )|]P(D = ฯƒ) ฯƒ:|ฯƒ|=Kโˆ’1 which also implies (43) gKโˆ’1 (Yฯƒ ) = gKโˆ’1 (Yฯƒ0 ) or IA (Yฯƒ ) = IA (Yฯƒ0 ) almost surely โˆ’1 for all ฯƒ, ฯƒ 0 and A = gKโˆ’1 (B) for a measurable set B in R. For example, when ฯƒ = (1, 3, . . . , K), ฯƒ = (2, 3, . . . , K) and Z = (Y3 , . . . , YK ), we get P((Y1 , Z) โˆˆ A) = P((Y1 , Z) โˆˆ A, (Y2 , Z) โˆˆ A) = P((Y2 , Z) โˆˆ A). Henceforth we refer to gKโˆ’1 simply as g. We need to show that g(Yฯƒ ) = c, for some constant c, almost surely. If this is not the case then there exists subsets of variables Yi โˆˆ Yฯƒ , Z โŠ‚ Yฯƒ and Yi โˆˆ / Z (recall ฯƒ โŠ‚ {1, . . . , K} with |ฯƒ| = K โˆ’ 1) such that (44) g(Yฯƒ ) = E[g(Yฯƒ )|Yi , Z] a.s. and g(Yฯƒ ) 6= E[g(Yฯƒ )|Z] a.s. The interpretation is that g(Yฯƒ ) can potentially be a function of the reduced set of variables (Yi , Z) (as asserted by the first equality) but it must genuinely be a function of at least the variable Yi . For clarity and simplicity assume i = 1 and Z = (Y3 , . . . , YK ). Consider the terms in the sum due to ฯƒ = (1, 3, . . . , K) and ฯƒ = (2, 3, . . . , K). By Lemma 13 below, there exists a measurable set A = g โˆ’1 (B) such that 0 < P(A) < 1 and IA (Y1 , Z) 6= E[IA (Y1 , Z)|Z]. But (43) implies P((Y1 , Z) โˆˆ A|(Y2 , Z) โˆˆ A) = 1 which violates the main assumption of the lemma. The following two lemmas concerns the random variables declared in the statement of Lemma 11 Lemma 12. IA (Yi , Z) = E[IA (Yi , Z)|Z] a.s. if and only if there exits a set C in ฯƒ(Z) such that IA (Yi , Z) = IC almost surely. IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 29 Proof. Let F denote E[IA (Yi , Z)|Z] and let C = {ฯ‰ : F (ฯ‰) = 1}. Clearly C โˆˆ ฯƒ(Z) and we show IA (Yi , Z) = IC almost surely. The set IA (Yi , Z) 6= F has measure zero and is comprised of the disjoint sets {ฯ‰ : IA (Yi , Z) = 1, F 6= 1}, {ฯ‰ : IA (Yi , Z) = 0, F = 1} and {ฯ‰ : IA (Yi , Z) = 0, F 6= 0, F 6= 1}. Thus the result follows since IC and IA (Yi , Z) differ precisely on the first two sets. (The reverse implication is obvious.) Lemma 13. If g(Yi , Z) 6= E[g(Yi , Z)|Z] then there exists a measurable function IA (Yi , Z) such that 0 < P((Yi , Z) โˆˆ A) < 1 and IA (Yi , Z) 6= E[IA (Yi , Z)|Z]. Proof. The proof is complete once we show that g(Yi , Z) 6= E[g(Yi , Z)|Z] implies there exists a set A0 โˆˆ ฯƒ(g) such that IA0 6= E[IA0 |Z], which in turn implies 0 < P(A0 ) < 1. (Here we write ฯƒ(g), rather than ฯƒ(g(Yi , Z)), for the smallest ฯƒ-algebra with respect to which the random variable g(Yi , Z) is measurable.) Note that for every A0 โˆˆ ฯƒ(g) there exists a measurable set B in R such that A0 = {ฯ‰ : (Yi (ฯ‰), Z(ฯ‰)) โˆˆ g โˆ’1 (B)}. Assume that IA0 = E[IA0 |Z] almost surely for all A0 โˆˆ ฯƒ(g). Then by Lemma 12, for each A0 โˆˆ ฯƒ(g) there is a set C in ฯƒ(Z) such that IA0 = IC almost surely. This will violate g(Yi , Z) 6= E[g(Yi , Z)|Z] if g(Yi , Z) = IA0 and hence also if g was a simple function; if we replace each indicator function (measurable set) of the simple function with its almost sure counterpart from ฯƒ(Z) then it becomes ฯƒ(Z) measurable. In the general case, the result may be established since g may be approximated by a sequence of simple functions {gn } tending to g and each simple function gn itself has a ฯƒ(Z) measurable version, say g n , and g n = gn . Thus  E[gn |Z] = E[g  n |Z] = gn . Letting g = E[g(Yi , Z)|Z], we see that E[|g โˆ’ g|] = lim E |gn โˆ’ E[gn |Z]| = 0. Appendix E. Proof of Theorem 5. The case where K โˆ— = 1 is first considered so that the number of observations Mt at time t can only be equal to zero or one. The joint probability of the observations and states becomes pฬ„ฮธ (y1:n , x0:n ) = ฯ€ฮธ (x0 ) n Y   (1 โˆ’ pD )1โˆ’Mt (pD gฮธ (yt | xt ))Mt fฮธ (xt | xtโˆ’1 ) , t=1 where yt is the empty sequence when Mt = 0. The size of yt at any time t can be made explicit in this expression for the sake of clarity as follows pฬ„ฮธ (y1:n , x0:n , m1:n ) = ฯ€ฮธ (x0 ) n Y   (1 โˆ’ pD )1โˆ’mt (pD gฮธ (yt | xt ))mt fฮธ (xt | xtโˆ’1 ) . t=1 Yt Let be a noisy version of the original observation Yt for any t โ‰ฅ 1 so that the HMM (Xt , Yt )t is equal in law to the HMM (Xt , Yt + Zt )t where (Zt )t is an i.i.d. sequence of random variables which common law is the uniform distribution over the ball of radius 1 and centre 0. A switching process (st )t is also introduced as follows: st = 1 when the target is detected and st = 0 otherwise. In order to study the Fisher information more easily, we introduce an alternative observation model where a detection failure at time t is replaced by an observation Yt from the target. The law of this observation model is n Y  st  pฬ„ฮธ (yฬƒ1:n , x0:n , s1:n ) = ฯ€ฮธ (x0 ) pD (1 โˆ’ pD )1โˆ’st gฮธ (yฬƒt | xt )fฮธ (xt | xtโˆ’1 ) = ฯ€ฮธ (x0 ) t=1 n h Y t=1 i [pD gฮธ (yt | xt )]st [(1 โˆ’ pD )gฮธ (yt | xt )]1โˆ’st fฮธ (xt | xtโˆ’1 ) 30 J. HOUSSINEAU, S.S. SINGH AND A. JASRA where yฬƒt = yt if st = 1 and yฬƒt = yt if st = 0. The quantity of interest is  pฬ„ฮธ (yฬƒ0 , s0 | yโˆ’โˆž:โˆ’1 , y1:โˆž )=  ), [pD gฮธ (y0 | x0 )]s0 [(1 โˆ’ pD )gฮธ (y0 | x0 )]1โˆ’s0 pฬ„ฮธ (x0 | yโˆ’โˆž:โˆ’1 , y1:โˆž which we compare with the full-detection case   pฬ„ฮธ (y0 | yโˆ’โˆž:โˆ’1 , y1:โˆž ) = gฮธ (y0 | x0 )pฬ„ฮธ (x0 | yโˆ’โˆž:โˆ’1 , y1:โˆž ). To justify the equivalence of the two observation model for the considered purpose, we can verify that the score โˆ‡ฮธ log pฬ„ฮธ (y0 , m0 | yโˆ’โˆž:โˆ’1 ) is equal to the score  โˆ‡ฮธ log pฬ„ฮธ (yฬƒ0 , s0 | yโˆ’โˆž:โˆ’1 , y1:โˆž ) when  โ†’ โˆž. With the required modifications and  after [3, Theorem 5], it follows that the loss of information Iloss (ฮธโˆ— ) when replacing the original observations by the -perturbed ones can be expressed as h i    Iloss (ฮธโˆ— ) = Eฬ„ฮธโˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (Y0 | Yโˆ’โˆž:โˆ’1 , Y1:โˆž ) ยท โˆ‡ฮธ log pฬ„ฮธโˆ— (Y0 | Yโˆ’โˆž:โˆ’1 , Y1:โˆž )t h i   โˆ’ pD Eฬ„ฮธโˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (Y0 | Yโˆ’โˆž:โˆ’1 , Y1:โˆž ) ยท โˆ‡ฮธ log pฬ„ฮธโˆ— (Y0 | Yโˆ’โˆž:โˆ’1 , Y1:โˆž )t h i   โˆ’ (1 โˆ’ pD )Eฬ„ฮธโˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (Y0 | Yโˆ’โˆž:โˆ’1 , Y1:โˆž ) ยท โˆ‡ฮธ log pฬ„ฮธโˆ— (Y0 | Yโˆ’โˆž:โˆ’1 , Y1:โˆž )t . Considering the limit  โ†’ โˆž, it follows that .  Iloss (ฮธโˆ— ) = lim Iloss (ฮธโˆ— ) โ†’โˆž h i = (1 โˆ’ pD )Eฬ„ฮธโˆ— โˆ‡ฮธ log pฬ„ฮธโˆ— (Y0 | Yโˆ’โˆž:โˆ’1 ) ยท โˆ‡ฮธ log pฬ„ฮธโˆ— (Y0 | Yโˆ’โˆž:โˆ’1 )t . In the multi-target case, it simply holds that the information loss is equal to (1 โˆ’ pโˆ—D )K โˆ— I(ฮธโˆ— ) since targetsโ€™ detection are independent when the data association is known, which terminates the proof of the proposition. REFERENCES [1] S. S. Blackman, Multiple-target tracking with radar applications, Artech House, 1986. [2] N. Chenouard et al., Objective comparison of particle tracking methods, Nature methods, 11 (2014). [3] T. A. Dean, S. S. Singh, A. Jasra, and G. W. Peters, Parameter estimation for hidden Markov models with intractable likelihoods, Scandinavian Journal of Statistics, 41 (2014). [4] P. Del Moral, Mean field simulation for Monte Carlo integration, 2013. [5] P. Del Moral and J. Houssineau, Particle association measures and multiple target tracking, in Theoretical Aspects of Spatial-Temporal Modeling, Springer, 2015, pp. 1โ€“30. [6] R. Douc, E. Moulines, and T. Ryden, Asymptotic properties of the maximum likelihood estimator in autoregressive models with Markov regime, The Annals of Statistics, 32 (2004). [7] A. Doucet, B.-N. Vo, C. Andrieu, and M. Davy, Particle filtering for multi-target tracking and sensor management, in Proceedings of the Fifth International Conference on Information Fusion, vol. 1, IEEE, 2002, pp. 474โ€“481. [8] L. Jiang, S. S. Singh, and S. Yฤฑldฤฑrฤฑm, Bayesian tracking and parameter learning for nonlinear multiple target tracking models, IEEE Transactions on Signal Processing, 63 (2015). [9] B. G. Leroux, Maximum-likelihood estimation for hidden Markov models, Stochastic processes and their applications, 40 (1992). [10] R. P. S. Mahler, Multitarget Bayes filtering via first-order multitarget moments, IEEE Transactions on Aerospace and Electronic Systems, 39 (2003). [11] S. P. Meyn and R. L. Tweedie, Markov chains and stochastic stability, Springer Science & Business Media, 2012. IDENTIFICATION OF MULTI-OBJECT DYNAMICAL SYSTEMS 31 [12] J. Mullane, B.-N. Vo, M. D. Adams, and B.-T. Vo, A random-finite-set approach to Bayesian SLAM, IEEE Transactions on Robotics, 27 (2011). [13] S. Oh, S. Russell, and S. Sastry, Markov chain Monte Carlo data association for multi-target tracking, IEEE Transactions on Automatic Control, 54 (2009). [14] K. Okuma, A. Taleghani, N. De Freitas, J. J. Little, and D. G. Lowe, A boosted particle filter: Multitarget detection and tracking, in European Conference on Computer Vision, Springer, 2004, pp. 28โ€“39. [15] M. Pace and P. Del Moral, Mean-field PHD filters based on generalized Feynman-Kac flow, Journal of selected topics in signal processing, special issue on multi-target tracking, (2013). [16] Y. Pailhas, J. Houssineau, Y. Petillot, and D. E. Clark, Tracking with MIMO sonar systems: applications to harbour surveillance, IET Radar, Sonar & Navigation, (2016). [17] C. B. Storlie, J. Hannig, T. C. Lee, et al., Statistical consistency of the data association problem in multiple target tracking, Electronic Journal of Statistics, 5 (2011). [18] B.-N. Vo and W.-K. Ma, The Gaussian mixture probability hypothesis density filter, IEEE Transactions on Signal Processing, 54 (2006). [19] B.-N. Vo, S. Singh, and A. Doucet, Sequential Monte Carlo methods for multitarget filtering with random finite sets, IEEE Transactions on Aerospace and Electronic Systems, 41 (2005).
10math.ST
1 Advanced Quantizer Designs for FDD-based FD-MIMO Systems Using Uniform Planar Arrays arXiv:1703.10739v3 [cs.IT] 3 Nov 2017 Jiho Song, Member, IEEE, Junil Choi, Member, IEEE, Taeyoung Kim, Member, IEEE, and David J. Love, Fellow, IEEE UPA structure is known as full-dimension (FD) MIMO because of its ability to exploit both vertical and horizontal domain beamforming [5]โ€“[10]. To fully exploit FD-MIMO, accurate channel state information (CSI) for both domains is critical. Channel estimation techniques relying upon time division duplexing (TDD) can leverage channel reciprocity if the transmit and receive arrays are calibrated [11], [12]. Most current cellular systems, however, exploit frequency division duplexing (FDD) where the receiver should estimate, quantize, and feed back the downlink CSI to the transmitter. The high dimensionality of a massive MIMO channel could cause large overheads for downlink channel training and quantization processes [13]โ€“[19]. We focus on CSI quantization for FD-MIMO in this paper and refer to [18]โ€“[20] and the references therein for the massive MIMO downlink training problem. The majority of CSI quantization codebooks have been designed under the assumption of spatially uncorrelated Rayleigh fading channels, which are uniformly distributed on the unit hypersphere when normalized. To quantize these channels, the codewords in a codebook should cover the unit sphere Index Termsโ€”Massive MIMO, full-dimension MIMO, uniform as uniformly as possible [21]โ€“[23]. For spatially correlated channels, the codebooks have been carefully shaped based on planar arrays, Kronecker product codebooks. the prior knowledge of channel statistics [24]โ€“[28]. Although most previous codebooks have been designed based I. I NTRODUCTION on analytical channel models, it is difficult to represent the ASSIVE multiple-input multiple-output (MIMO) sys- properties of true three-dimensional (3D) channels for FDtems are a strong candidate to fulfill the throughput MIMO. The 3D spatial channel model (SCM) in [4], [29], requirements for fifth generation (5G) cellular networks [2]. which is an extension of the 2D SCM [30], has been extensively To maximize the number of antennas in a limited area, two- used to mimic the measured channel variations for 3GPP dimensional antenna arrays, e.g., uniform planar arrays (UPAs) standardization. Although the 3D SCM is a stochastic channel and cylindrical arrays, that host antennas in both vertical and model, it provides limited insights into practical CSI quantizer horizontal domains are being prominently considered in practice designs. Therefore, it is necessary to develop a simple channel [3], [4]. Among various 2D array solutions, UPAs are of great model that accurately represents the properties of the 3D-SCM interest to simplify signal processing for three-dimensional channel with UPA antennas. In this paper, we define a simple 3D channel model using the (3D) channels for FD-MIMO. Massive MIMO employing a sum of a finite number of scaled array response vectors. Based J. Song and D. J. Love are with the School of Electrical and Computer on this simplified channel model, we develop CSI quantizers Engineering, Purdue University, West Lafayette, IN 47907 (e-mail: {jihosong, for UPA scenarios. We first carry out performance analysis of djlove}@purdue.edu). J. Choi is with the Department of Electrical Engineering, POSTECH, Pohang, Kronecker product (KP) CSI quantizers [1], [9]. Our analytical Gyeongbuk 37673, Korea (e-mail:[email protected]). studies on the KP CSI quantizers provide design guidelines on T. Kim, is with Samsung Electronics Co., Ltd., Suwon, Korea how to develop a quantizer for a narrowband, single frequency (email:[email protected]). Parts of this paper were presented at the Globecom, Washington, DC USA, tone CSI using limited feedback resources. In the proposed December 4-8, 2016 [1]. quantizer, we concentrate on detecting/quantizing dominant This work was supported in part by Communications Research Team (CRT), radio paths in true channels. To maximize quantization quality, Samsung Electronics Co. Ltd., and the ICT R&D program of MSIP/IITP [2017(B0717-17-0002), Development of Integer-Forcing MIMO Transceivers we also develop a codebook for combiners that cophases and for 5G & Beyond Mobile Communication Systems]. scales the quantized beams. Both vertical and horizontal doAbstractโ€”Massive multiple-input multiple-output (MIMO) systems, which utilize a large number of antennas at the base station, are expected to enhance network throughput by enabling improved multiuser MIMO techniques. To deploy many antennas in reasonable form factors, base stations are expected to employ antenna arrays in both horizontal and vertical dimensions, which is known as full-dimension (FD) MIMO. The most popular two-dimensional array is the uniform planar array (UPA), where antennas are placed in a grid pattern. To exploit the full benefit of massive MIMO in frequency division duplexing (FDD), the downlink channel state information (CSI) should be estimated, quantized, and fed back from the receiver to the transmitter. However, it is difficult to accurately quantize the channel in a computationally efficient manner due to the high dimensionality of the massive MIMO channel. In this paper, we develop both narrowband and wideband CSI quantizers for FDMIMO taking the properties of realistic channels and the UPA into consideration. To improve quantization quality, we focus on not only quantizing dominant radio paths in the channel, but also combining the quantized beams. We also develop a hierarchical beam search approach, which scans both vertical and horizontal domains jointly with moderate computational complexity. Numerical simulations verify that the performance of the proposed quantizers is better than that of previous CSI quantization techniques. M 2 mains are searched during beam quantization, which involves a heavy computational complexity. We thus develop a hierarchical beam search approach to reduce the complexity. We also develop a wideband quantizer for broadband communication by evolving the dual codebook structure in LTEAdvanced [31], [32]. In the dual codebook structure, a first layer quantizer is used to search correlated CSI between multiple frequency tones. Unless dominant paths are gathered in a single cluster, the LTE-Advanced codebook is not effective because only adjacent radio paths are selected and quantized using the same resolution codebook. We thus concentrate on detecting adjacent and/or sperate paths within each wideband resource block (RB) based on the proposed hierarchical beam search approach. In addition, a second layer quantizer is designed to refine the beam direction of the quantized wideband CSI according to the channel vectors in a narrowband RB. When comparing our approach to the LTE-Advanced codebook, the refined beams are cophased and scaled in our approach, while the LTE-Advanced codebook only cophase adjacent beams without considering beam refinement. In Section II, we describe FD-MIMO systems employing UPAs and discuss a simple channel model that mimics true 3D SCM channels. In Section III, we review previously reported KP codebooks. In Section IV, we develop a narrowband CSI quantizer that takes multiple radio paths into account and conduct performance analysis to develop a design guideline for CSI quantizers. In Section V, we also propose a wideband CSI quantizer assuming a multi-carrier framework. In Section VI, we present simulation results, and the conclusion follows in Section VII. Throughout this paper, C denotes the field of complex numbers, N denotes the semiring of natural numbers, CN (ยต, ฯƒ 2 ) denotes the complex normal distribution with mean ยต and variance ฯƒ 2 , [a, b] is the closed interval between a and b, U(a, b) denotes the uniform distribution in the closed interval [a, b], d e is the ceiling function, ฮ“(n) denotes the complete gamma function, Ea [ยท] is the expectation of independent random variable a, k ยท kp is the p-norm, is the Hadamard product, โŠ— is the Kronecker product, 0a is the a ร— 1 all zeros vector, IN is the N ร— N identity matrix, 1a,b is the a ร— b all ones matrix, Aa,b , vn {A}, and eign {A} denote (a, b)th entry, the n-th dominant eigenvector, and the principal eigenvalue of the matrix A. Also, aH , aโˆ— , (a)` , a[a:b] denote the conjugate transpose, element-wise complex conjugate, `-th entry, and subvector including entries between [a, b] of the column vector a, respectively. antenna structure [3]. Assuming a multi-carrier framework, an input-output expression is defined as โˆš y[w] = ฯh[w]H f [w]s[w] + n[w], (1) where y[w] is the received baseband symbol, ฯ is the signalto-noise ratio (SNR), h[w] โˆˆ CM is the block fading MISO channel, f [w] โˆˆ CM is the unit-norm transmit beamformer, s[w] โˆˆ C is the data symbol with the power constraint E[|s[w]|2 ] โ‰ค 1, and n[w] โˆผ CN (0, 1) is the additive white Gaussian noise. Note that w โˆˆ {1, ยท ยท ยท , W } denotes the frequency tone in the multi-carrier framework. To facilitate quantizer designs, we mimic the 3D-SCM and define a simplified channel model with a few radio paths according to P  . X โˆ’j2ฯ€ h[w] = e wโˆ’ W2โˆ’1 4tp ฮฑp dM (ฯˆpv , ฯˆph , w), (2) p=1 while the true 3D-SCM is used to present numerical results in Section VI. In (2), P is the number of dominant paths, 4 is the subcarrier spacing, tp is the excess tap delay of the p-th radio path, ฮฑp is the channel gain of the p-th radio path, and dM (ฯˆpv , ฯˆph , w) is the p-th radio path at given angles (ฯˆpv , ฯˆph ). In the UPA scenario, a radio path for the w-th frequency tone is represented as . dM (ฯˆ v , ฯˆ h , w) = dMv (ฯˆ v , w) โŠ— dMh (ฯˆ h , w) (3) where the array response vector dMa (ฯˆa , w) is defined as 2ฯ€da 2ฯ€da a a T 1  . dMa (ฯˆ a , w) = โˆš 1, ej ฮป[w] ฯˆ , ยท ยท ยท , ej ฮป[w] (Ma โˆ’1)ฯˆ , Ma (4) for a โˆˆ {v, h}. In (4), ฯˆ v = sin ฯ†v and ฯˆ h = sin ฯ†h cos ฯ†v [33]. Note that da is the antennas spacing, ฯ†a is the angle for the array vector, and ฮป[w] is the wavelength for the w-th frequency tone CSI . ฮป[w] = 1+ 4 fc ฮปc wโˆ’ W +1 2  (5) where fc is the center frequency satisfying c = fc ฮปc with the speed of light c. Without loss of generality, a narrowband representation of channels is defined by plugging2 w = W2+1 into (2) h= P X dM (ฯˆpv , ฯˆph )ฮฑp (6) p=1 II. S YSTEM M ODEL We consider multiple-input single-output (MISO) systems1 . employing M = Mv Mh transmit antennas at the base station and a single receive antenna at the user, where Mv is the number of rows and Mh is the number of columns of the UPA 1 Although we mainly discuss MISO channel quantization to simplify presentation, the proposed channel quantizer can be easily extended to multipleinput multiple-output (MIMO) systems. The extension of the MISO channel quantizer will be discussed in Section IV-C. = Da   . where D = dM (ฯˆ1v , ฯˆ1h ), ยท ยท ยท , dM (ฯˆpv , ฯˆph ) โˆˆ CM ร—P is the . set of radio paths and a = [ฮฑ1 , ยท ยท ยท , ฮฑP ]T โˆˆ CP is the set of complex channel gains. In the narrowband assumption, w is dropped for simplicity. We assume that the beam directions are uniformly distributed in both vertical and horizontal domains such as ฯˆpv , ฯˆph โˆผ U(โˆ’1, 1) and are independent of channel gains ฮฑp โˆผ CN (0, 1). 2 We consider the W +1 -th 2 subcarrier to ignore beam squinting effects [34]. 3 In the limited feedback beamforming approach, each user chooses a transmit beamformer among codewords in the . codebook F = {f1 , ยท ยท ยท , f2BT } such that vectors, the channel vector h in (6) is decomposed into both vertical and horizontal domains based on the singular value decomposition [9] yielding f = arg max |hH fฬƒ |2 , rank (Hฬ„) h= X (uk โŠ— vkโˆ— )ฯƒk , (8) k=1 where BT denotes the total feedback overhead. Based on the assumption that both transmitter and receiver know the prede- where the reshaped channel is given in a matrix form T fined codebook, the BT -bit index of the selected beamformer .  Hฬ„ = h[1:Mh ] , ยท ยท ยท , h[(Mv โˆ’1)Mh +1:Mv Mh ] โˆˆ CMv ร—Mh . is fed back to the transmitter over the feedback link. The majority of channel quantization codebooks have been In (8), ฯƒk denotes the k-th dominant singular value, uk โˆˆ CMv designed for spatially correlated and uncorrelated Rayleigh denotes the k-th dominant left singular vector, and vk โˆˆ CMh fading channels [21]โ€“[28]. These analytical channel models rely denotes the k-th dominant right singular vector of Hฬ„. The final upon rich scattering environments so that each radio path has a codeword is then obtained as f = cv โŠ— (ch )โˆ— , where limited effect on channel characterization. Thus, most previous v 2 cv = arg max |uH ch = arg max |v1H cฬƒh |2 . 1 cฬƒ | , beamformer codebooks focus on covering the unit hypersphere v v cฬƒ โˆˆAB /2 cฬƒh โˆˆAh BT /2 T as uniformly as possible without considering each radio path individually. However, the analytical channel models are much Despite the advantage of a KP codebook, it has some issues. different than realistic channel models that assume only a Even with a line-of-sight (LOS) channel, a dominant radio path few dominant scatterers. Therefore, this line-packing codebook may not be accurately quantized by searching each domain design approach may not be effective when the number of separately. Also, it is not always effective to quantize only antennas is large. To accurately quantize high-dimensional a single radio path because even u1 โŠ— v1โˆ— may consist of massive MIMO channels, it is important to tailor the codebook multiple paths. Although the quantizer in [9] considers adding to the realistic channels consisting of a limited number of radio two beams in u1 โŠ— v1โˆ— , the performance improvement is limited paths. because the beams are not combined properly. fฬƒ โˆˆF III. K RONECKER P RODUCT C ODEBOOK R EVIEW - S INGLE B EAM C ASE IV. P ROPOSED NARROWBAND Q UANTIZER - M ULTIPLE B EAMS C ASE It is critical in FDD massive MIMO systems to quantize and feedback information about the high-dimensional channels to the transmitter [13]โ€“[19]. Thus, CSI quantization codebooks have been developed to tailor the feedback link with limited overhead to the massive MIMO channels [15]โ€“[17]. Among various CSI quantization techniques, KP codebooks are of great interest to quantize the channels in a computationally efficient manner by considering the 2D antenna structure [9], [10]. Based on the channel model in (6), KP codebooks are designed to quantize a radio path with UPA structure [6]โ€“[8]. Most KP codebooks are based on the assumption that the covariance matrix of the channels is approximated by the KP of covariance matrices of vertical and horizontal domains such that [35]   . Rh = Eh hhH Prior work has verified that most 3D SCM channel realizations are well modeled with only a few resolvable 2D radio paths [1], [9]. Thus, we assume that the channel vector on a single frequency tone can be represented by a combination of a set of multiple radio paths and its corresponding channel gain vector [1]. In (6), the array response vectors in D and the channel gain vector a contain different types of channel information. Thus, we focus on quantizing D and a using different codebooks in this paper. In our narrowband quantizer, we aim to find ' Rv โŠ— Rh . Thus, a KP codebook is of the form  F = f โˆˆ CM : f = cv โŠ— (ch )โˆ— , cv โˆˆ AvBT /2 , ch โˆˆ AhBT /2 , to quantizes a single dominant path with the discrete Fourier transform (DFT) codebook  AaB = aMa (1/Q), ยท ยท ยท , aMa (Q/Q) (7) consisting of the Q = 2B codewords iT 2q 2q 1 h . 1, ejฯ€( Q โˆ’1) , ยท ยท ยท , ejฯ€(Ma โˆ’1)( Q โˆ’1) . aMa (q/Q) = โˆš Ma Most previous KP codebooks quantize the first dominant vector in each domain separately [6]โ€“[9]. To find singular h Cz ' (9) khk2 kCzk2 . by constructing a set of N beams C = [c1 , ยท ยท ยท , cN ] โˆˆ CM ร—N . and a unit-norm weight vector z = [z1 , ยท ยท ยท , zN ]T โˆˆ CN . The radio paths constituting the channels are represented by the Kronecker product of array response vectors as in (3). Thus, each 2D beam in C can be defined by a combination of quantized array response vectors in vertical and horizontal domains such that . cn = cvn โŠ— chn , n = 1, ยท ยท ยท , N. We assume that Bn -bit is reserved to quantize the n-th array response vector can in the domain a and Bc -bit is reserved to quantize the weight vector z. To construct C and z under the condition of a limited PN feedback overhead of BT = Bc + n=1 2Bn -bits, the following questions should be properly addressed. 1) Beam quantization: How should the radio paths in the channel be chosen and quantized? 4 Algorithm 1 Beam quantization Initialization 1: Create an initial empty matrix C0 Beam quantization 2: for 1 โ‰ค n โ‰ค N 3: Given DFT codebooks (cฬƒv , cฬƒh ) โˆˆ AvBn ร— AhBn 4: Construct beam set Cn|cฬƒv ,cฬƒh = [Cnโˆ’1 , cฬƒv โŠ— cฬƒh ] be defined to effectively quantize and combine the limited 5: Quantize radio path cn = cvn โŠ— chn , where number of radio paths? (cvn , chn ) = arg maxcฬƒv ,cฬƒh โˆˆAvB ร—AhB In the following subsections, we address our channel quantin n  โˆ’1 H eig1 (CH Cn|cฬƒv ,cฬƒh hhH Cn|cฬƒv ,cฬƒh zation procedure across two separate quantization phases and n|cฬƒv ,cฬƒh Cn|cฬƒv ,cฬƒh ) 6: Update beam set Cn = [Cnโˆ’1 , cvn โŠ— chn ] โˆˆ CM ร—n evaluate quantization loss at each phase. 7: end for Remark 1: The quantized channel vector can be viewed as Final update a representation of the channel using an analog beamsteering 8: Quantized radio paths C = [c1 , ยท ยท ยท , cN ] โˆˆ CM ร—N matrix C, which is realized by a set of radio frequency phase 9: Unquantized vector shifters, and a baseband beamformer z. Therefore, the proposed  Hweight โˆ’1 H zฬ„ = v (C C) C hhH C โˆˆ CN 1 approach follows the hybrid beamforming architecture in [36]. 2) Beam combining: How should the quantized beams be cophased and scaled? 3) Feedback resource allocation: For a given total feedback overhead BT , how should the feedback-bit allocation scenario . rN = [B1 , ยท ยท ยท , BN , Bc ]T โˆˆ NN +1 (10) A. Phase I: Beam Quantization In the beam quantization phase, we aim to construct a selected set of quantized 2D beams C. It is well known that the DFT codebook is an effective solution to quantize array response vectors so that we quantize the n-th array response vector can with the DFT codebook AaBn . In our beam quantization approach, we select and quantize the 2D DFT beams sequentially. In the n-th update, the quantized DFT vectors and the unquantized weight vector3 are obtained by solving the maximization problem (cvn , chn , zฬ„n ) = arg max h n (cฬƒv ,cฬƒh ,zฬƒ)โˆˆAv Bn ร—ABn ร—C hH Cn|cฬƒv ,cฬƒh zฬƒ Cn|cฬƒv ,cฬƒh zฬƒ 2 2 2 , (11) . where Cn|cฬƒv ,cฬƒh = [c1 , ยท ยท ยท , cnโˆ’1 , cฬƒv โŠ— cฬƒh ] โˆˆ CM ร—n , and {c1 , ยท ยท ยท , cnโˆ’1 } includes previously selected DFT beams. In (11), we do not quantize the weight vector zฬ„n โˆˆ Cn in each update because it is not practical to construct a codebook for weight vectors that constantly change its dimension. The problem of choosing the n-th DFT beam is then simplified to 2! hH Cn|cฬƒv ,cฬƒh zฬƒ v h (cn , cn ) = arg max max 2 zฬƒโˆˆCn h Cn|cฬƒv ,cฬƒh zฬƒ 2 cฬƒv ,cฬƒh โˆˆAv Bn ร—ABn  (a) โˆ’1 = arg max eig1 (CH n|cฬƒv ,cฬƒh Cn|cฬƒv ,cฬƒh ) h cฬƒv ,cฬƒh โˆˆAv Bn ร—ABn H CH n|cฬƒv ,cฬƒh hh Cn|cฬƒv ,cฬƒh , (12) where (a) is derived from the unquantized weight vector, which is computed based on the generalized Rayleigh quotient [37], such that zฬ„n|cฬƒv ,cฬƒh = arg max = H zฬƒH (CH n|cฬƒv ,cฬƒh hh Cn|cฬƒv ,cฬƒh )zฬƒ zฬƒH (CH C v h )zฬƒ zฬƒโˆˆCn n|cฬƒv ,cฬƒh n|cฬƒ ,cฬƒ  H โˆ’1 H v1 (Cn|cฬƒv ,cฬƒh Cn|cฬƒv ,cฬƒh ) Cn|cฬƒv ,cฬƒh hhH Cn|cฬƒv ,cฬƒh . 3 The bar on the top of weight vectors denotes the unquantized weight vectors. The beam quantization approach gives a set of N quantized beams C = [c1 , ยท ยท ยท , cN ] โˆˆ CM ร—N (13) and the unquantized weight vector  zฬ„ = v1 (CH C)โˆ’1 CH hhH C โˆˆ CN . (14) A separate beam quantization should be performed to compute each codeword candidate based on Algorithm 1. In the following Section IV-E, a practical beam search technique will be proposed to quantize a single dominant beam with moderate computational complexity as well as compute multiple codeword candidates in a hierarchical fashion. We also evaluate quantization loss due to the beam quantization as a function of the number of beams N and the feedback overhead Bn for DFT codebooks. Assuming the unquantized weight vector zฬ„, the beamforming gain between the channel vector h and the set of DFT beams C   . Gbq = Eh |hH Czฬ„|2 /kCzฬ„k22   |hH Czฬƒ|2 (15) = Eh max 2 zฬƒโˆˆCN kCzฬƒk2 is averaged over channel realizations h in Lemma 1. Before presenting the lemma, we make the following assumption. Assumption 1: Assuming a channel vector h has already been decomposed into a set of radio paths D and channel gains a as in (6), the column vectors for each domain a โˆˆ {h, v} . in C are separately selected as can = aMa (qn /2Bn ) โˆˆ AaBn , where qn = arg max qโˆˆ{1,ยทยทยท ,2Bn } 2 a Bn dH ) . Ma (ฯˆn )aMa (q/2 (16) Considering half-wavelength antenna spacing da = ฮป2 , the beamforming gain between the n-th array response vector and . a a 2 the selected DFT vector ฮ“2na = E |dH is derived Ma (ฯˆn )cn | in Appendix A as   M a โˆ’1 X 2(Ma โˆ’ q) sin ฯ€q/2Bn 1 2 ฮ“na = 2 Ma + . Ma ฯ€q/2Bn q=1 5 Eh [(cv1 โŠ— ch1 )H hhH (cv1 โŠ— ch1 )] ๏ฃฏ .. R=๏ฃฐ . Eh [(cvN โŠ— chN )H hhH (cv1 โŠ— ch1 )] ๏ฃฎ ยทยทยท .. . ยทยทยท Lemma 1: A lower bound of the beamforming gain Gbq in (15) is approximated as   N X P X P M ฮ“2nv ฮ“2nh โˆ’ 1 Gbq ' N+ . M +N โˆ’1 qP n=1 q=n Please check Appendix B for the proof. B. Phase II: Beam Combining In the beam combining phase, we aim to compute a weight vector z, which is used to combine beams in C. To quantize weight vector H z = arg max zฬƒโˆˆZBc 2 |h Czฬƒ| , kCzฬƒk22 (17) we design the codebook including U = 2Bc unit-norm . combiners ZBc = {z1 , ยท ยท ยท , zU }. To study a codebook design framework, we model the effective channel vector based on the Kronecker correlation model as 1 CH h ' R 2 w โˆˆ CN , (18)   . where the covariance matrix R = Eh CH hhH C โˆˆ CN ร—N in (19) is analytically computed in Appendix C and random variables w = [w1 , ยท ยท ยท , wN ]T โˆˆ W denotes the weight vector that is subject to the equal gain subset โˆš .  W = w โˆˆ CN : wn = ejฯ‘n / N , ฯ‘n โˆผ U(0, 2ฯ€) . In our codebook design approach, we pick a set of codewords {z1 ยท ยท ยท zU } that maximize where the inequality in (a) is based on kCzu k22 โ‰ค kCk22 kzu k22 and kzu k22 = 1, and (b) is approximated by plugging the Kronecker correlation model in (18) into the maximizer. Based on the correlated Grassmannian beamforming algorithm in [24], codewords are then obtained by setting Note that I โˆˆ N denotes the phase quantization level. We also evaluate the quantization loss due to the beam combining as a function of the number of codewords U = 2Bc in the codebook ZBc that quantizes the baseband combiner zฬ„ in (14). To analyze quantization performance of ZBc , the normalized beamforming gain between the normalized effective channel and the selected unit-norm combiner z   . Gbc = EhH C |hH Cz|2 /khH Ck22   2 |eH u Rw| ' Ew max (20) uโˆˆ{1,ยทยทยท ,U } (wH Rw)(eH u Reu ) is averaged over the effective channel CH h. Because it is not easy to compute in a closed form, we only derive the normalized beamforming gain in the special case of N = 2 based on the following assumption. Assumption 2: For simple analysis, we assume that the . combiner is selected as z = zuฬ‚ , where . uฬ‚ = arg max cos2 ฮธu . uโˆˆ{1,ยทยทยท ,U } . Note that ฮธu = arccos |wH eu |. Lemma 2: In the special case of N = 2, the normalized beamforming gain Gbc in (20) is approximated as   1 U ฯ€ Gbc ' 1 + sin . 2 ฯ€ U Please check Appendix D for the proof. C. MIMO Channel Quantizer In our MIMO channel quantization approach, DFT beams are chosen to maximize the sum of the channel gains of each receive antenna. The DFT vectors are quantized by solving the rewritten problem  โˆ’1 (cvn , chn ) = arg max eig1 (CH n|cฬƒv ,cฬƒh Cn|cฬƒv ,cฬƒh ) h cฬƒv ,cฬƒh โˆˆAv Bn ร—ABn H CH n|cฬƒv ,cฬƒh HMIMO HMIMO Cn|cฬƒv ,cฬƒh . 1 zu = R 2 eu /kR 2 eu k2 and picking a set of equal gain vectors {e1 ยท ยท ยท eU } maximizing q 2 %min = min 1 โˆ’ |eH a eb | , 1โ‰คa<bโ‰คU where equal gain vectors eu โˆˆ EN are restricted to โˆš  .  EN = e โˆˆ CN : (e)n = ej2ฯ€ฯ•n / N , ฯ•n โˆˆ 1/I ยท ยท ยท I/I (19) Before investigating feedback allocation solutions, we extend the proposed quantizer to MIMO channel scenarios. Assuming a MIMO system employing V receive antennas at each user, the channel matrix is defined as   HMIMO = h1 , ยท ยท ยท , hV โˆˆ CM ร—V . |hH Czu |2 1โ‰คuโ‰คU kCzu k2 2 (a) |hH Czu |2 โ‰ฅ min 1โ‰คuโ‰คU kCk22 1 H 2 (b) w H R 2 zu ' min , 1โ‰คuโ‰คU kCk22 ฯƒmin = min 1 ๏ฃน Eh [(cv1 โŠ— ch1 )H hhH (cvN โŠ— chN )] ๏ฃบ .. ๏ฃป. . v h H H v h Eh [(cN โŠ— cN ) hh (cN โŠ— cN ) . After constructing a selected set of DFT beams, we next compute T orthogonal weight vectors to compute a precoding matrix for spatial multiplexing. For a given set of beams C, we compute the beamformer for the t-th layer transmission ft = Czฬ„t /kCzฬ„t k2 โˆˆ CM , where the unquantized weight vector  N zฬ„t = vt (CH C)โˆ’1 CH HMIMO HH MIMO C โˆˆ C 6 3.5 3 2.5 Beamforming gain G(M,P,N,rN) N Beamforming gain G(M,P,N,r ) 3 2 1.5 r ={8,0} 1 1 r2={4,3,2} r ={4,3,2} 0.5 2 r2={3,3,4} 2.5 2 1.5 r2={5,4,2} 1 r2={4,4,4} 6x6 8x8 r2={6,3,2} r3={5,2,2,2} 0.5 r3={3,2,2,2} 0 4x4 r1={10,0} r3={4,3,2,2} r3={3,3,3,2} 10x10 12x12 14x14 16x16 18x18 20x20 0 4x4 6x6 8x8 10x10 12x12 14x14 16x16 18x18 20x20 Mv ร— Mh (a) BT = 16-bits Mv ร— Mh (b) BT = 20-bits Fig. 1. Cross correlation G(M, P, N, rN ) over different feedback-bit allocation scenarios with P โˆˆ {3, 4, 5}. is computed based on the generalized Rayleigh quotient [37]. where M is the number of antennas, P is the number of beams The precoding matrix is then constructed as in h, N is the number of dominant beams to be quantized,   and rN is the feedback-bit allocation scenario in (10). M ร—T F = f1 , ยท ยท ยท , fT โˆˆ C , In the proposed quantizer, the feedback scenario are chosen where T โ‰ค V denotes the maximum transmission rank.4 as    N, rN = arg max EP G(M, P, Nฬƒ , rฬƒNฬƒ ) (23) D. Feedback Resource Allocation In our KP codebook procedure, quantizing more beams with a high resolution codebook increases the beamforming gain at the cost of increased feedback overhead. To effectively allocate limited feedback overhead resources, we must derive the beamforming gain between the randomly generated channel vectors h and the selected codeword Cz/kCzk2 using  H  |h Cz|2 . G = Eh , (21) kCzk22 as a function of the feedback-bit allocation scenario5 rN in (10). However, inter-dependencies across both quantization phases in Section IV-A and Section IV-B make it hard to compute the beamforming gain in a closed form. To simplify analysis, we make the following assumption. Assumption 3: Assuming the quantization phases in Section IV-A and Section IV-B work independently, the channel quantization quality in the proposed KP codebook procedure is evaluated by the combination of the quantization losses in both phases. Based on Assumption 3 that both quantization phases are independent of each other, the beamforming gain in the proposed quantizer is defined by the mixture of Gbq and Gbc such as, . G(M, P, N, rN ) = Gbq Gbc (22) 2 2  P P M ฮ“ ฮ“ โˆ’1 N P nv nh Gbc P N + n=1 q=n q = , M +N โˆ’1 4 Note that designing a beam combining codebook and a feedback resource allocation algorithm that support multi layer MIMO transmission are interesting topics for future research. 5 In r , B for n โˆˆ {1, ยท ยท ยท , N } denotes the size in bits of the DFT n N codebooks Aa Bn in the domain a, and Bc denotes the size in bits of the codebook for combiners ZBc . (Nฬƒ ,rฬƒNฬƒ )โˆˆN ร—NNฬƒ +1 by evaluating all possible scenarios rฬƒNฬƒ = [Bฬƒ1 , ยท ยท ยท , BฬƒNฬƒ , Bฬƒc ]T . that considers Nฬƒ beams in N = {1, 2, 3}. Note that the possible feedback scenarios are subject to the total feedback PNฬƒ overhead BT = Bฬƒc + n=1 2Bฬƒn -bits. In (23), the expectation is taken over the number of dominant paths P since P varies depending on the channel environments. By assuming P is equally probable from 3 to 5, we plot the arithmetic mean of G(M, P, Nฬƒ , rNฬƒ ) in Fig. 1 with different numbers of antennas and feedback bits. As shown in the figure, quantizing one or two beams give the best performance under practical UPA scenarios and feedback overheads. Therefore, we construct the codebook F1 for quantizing a single 2D DFT beam and the codebook F2 combining two quantized 2D DFT beams based on the predefined feedback-bit allocation scenarios6 r1 = [B1 + BฬŒ1 , 0] โˆˆ N2 , r2 = [B1 , B2 , Bc ] โˆˆ N3 , (24) respectively. The final codebook is then defined such that . F = F1 โˆช F 2 . Remark 2: In most of channel realizations, the inter-user interference due to the remained paths is negligible because most of channel gains are contained in the first and second dominant beams [1], [9]. Based on the codebook subset restriction algorithm in [?], [?], severe inter-user interference could be mitigated by reporting the remained paths having a considerable amount of channel gains. 6 The total feedback overhead for feedback scenarios are B = 2B + 2BฬŒ 1 1 T bits and BT = 2B1 + 2B2 + Bc -bits, where 2BฬŒ1 = 2B2 + Bc . 7 Normalized cross correlation 0.8 (a) Wideband resource blocks (b) Narrowband resource blocks 0.7 0.6 0.5 ฮณc 1 0.4 4x4 Fig. 2. An overview of wideband model having multiple tones. ฮณh 6x6 8x8 10 x 10 12 x 12 14 x 14 16 x 16 M v x Mh E. Beam Search Approach It is necessary to search both vertical and horizontal domains jointly to scan for the dominant beams in a channel vector. However, this joint approach increases a computational complexity. For example, it is required to carry out 22(B1 +BฬŒ1 ) vector computations to scan a single 2D DFT beam under the feedback-bit allocation scenario r1 in (24). To reduce the heavy computational complexity that comes with detecting the single dominant beam, we propose a multi-round beam search technique as follows. Round 1: For the channel vector h, the first dominant beam is chosen using DFT codebooks AvB1 and AhB1 in (7), which have low-resolution DFT vectors. The DFT beam is given by c1 = cv1 โŠ— ch1 , (cv1 , ch1 ) = (25) H h 2 |h (cฬƒ โŠ— cฬƒ )| . arg max h (cฬƒv ,cฬƒh )โˆˆAv B ร—AB 1 v 1 Later, the selected 2D DFT beam in (25) will be a baseline that guides the generation of two codeword candidates. Round 2: In this round, 2BฬŒ1 -bits are assigned for constructing the two codeword candidates. 1) To support channel realizations having a single dominant beam, a codeword is computed based on the feedback-bit allocation scenario r1 in (24) by scanning beam directions near c1 from Round 1. The first codeword is given by f1 = dฬŒM (ฮธ1v , ฮธ1h ) 2) To support channel realizations having multiple dominant beams, a codeword is computed based on the feedback-bit allocation scenario r2 in (24) by choosing an additional DFT beam to combine with c1 . The second codeword is given by f2 = (cv2 , ch2 , z) = [c1 , cv2 โŠ— ch2 ]z , k[c1 , cv2 โŠ— ch2 ]zk2 arg max h (cฬƒv ,cฬƒh ,zฬƒ)โˆˆAv B ร—AB ร—ZBc 2 hH [c1 , cฬƒv โŠ— cฬƒh ]zฬƒ k[c1 , cฬƒv โŠ— cฬƒh ]zฬƒk2 2 2 using B2 -bits size DFT codebooks AvB2 and AhB2 and Bc -bits size codebook ZBc , which is developed to combine the two 2D DFT beams as explained in the Section IV-B. Considering our CSI quantization technique, the second codebook is then defined such that  v    cฬƒ1 โŠ— cฬƒh1 , cฬƒv2 โŠ— cฬƒh2 zฬƒ . M  F2 = f2 โˆˆ C : f2 =  v cฬƒ1 โŠ— cฬƒh1 , cฬƒv2 โŠ— cฬƒh2 zฬƒ 2 over cฬƒv1 โˆˆ AvB1 , cฬƒh1 โˆˆ AhB1 , cฬƒv2 โˆˆ AvB2 , cฬƒh2 โˆˆ AhB2 , and zฬƒ โˆˆ ZBc . Round 3: Using the two codeword candidates f1 โˆˆ F1 and f2 โˆˆ F2 , the final codeword is selected with an additional bit 2 f = arg max hH fฬƒ . c1 , (ฮธ1v , ฮธ1h ) = arg max hH dฬŒM (ฮธฬƒv , ฮธฬƒh ) Fig. 3. Normalized beamforming gains between subcarrier channel vectors. (B = 5, dv = 0.8ฮป, dh = 0.5ฮป, w โˆˆ {1, ยท ยท ยท , 150}) (27) fฬƒ โˆˆ{f1 ,f2 } c1  2 BฬŒ ฮธฬƒ v ,ฮธฬƒ h โˆˆTB 1 1 . โˆš where dฬŒM (ฮธv , ฮธh ) = M dM (ฮธv , ฮธh ) is defined to shift the beam directions7 and the BฬŒ1 -bit size codebook   โˆ’BฬŒ1 1 โˆ’ 2โˆ’BฬŒ1 BฬŒ1 โˆ’(B1 +BฬŒ1 ) 1 โˆ’ 2 T B1 = โˆ’ :2 : (26) 2B1 +1 2B1 +1 is designed for refining beam directions of any DFT beams. In our CSI quantization approach, the first codebook is then defined such that .  F1 = f1 โˆˆ CM : f1 = (cฬƒv1 โŠ— cฬƒh1 ) dฬŒM (ฮธฬƒv , ฮธฬƒh ) V. P ROPOSED W IDEBAND Q UANTIZER We develop a wideband quantizer that takes multiple frequency tones into account. Before developing practical quantizers, we overview a broadband system model adopted in 3GPP LTE-Advanced. As shown in Fig. 2(a), W total frequency tones are divided into L wideband RBs where each wideband RB includes W L channels. Each wideband RB is written in a matrix form as   W H` = h[1 + (` โˆ’ 1)W /L], ยท ยท ยท , h[`W/L] โˆˆ CM ร— L . over cฬƒv1 โˆˆ AvB1 , cฬƒh1 โˆˆ AhB1 , and ฮธฬƒv , ฮธฬƒh โˆˆ TBBฬŒ11 . As depicted in Fig. 2(b), each wideband RB is divided into R narrowband RBs   H` = H`,1 , ยท ยท ยท , H`,R , 7 โˆš The Hadamard product formulation satisfies the following formulation M dM (ฮธ1 , ฮธ3 ) dM (ฮธ2 , ฮธ4 ) = dM (ฮธ1 + ฮธ2 , ฮธ3 + ฮธ4 ). where H`,r โˆˆ CM ร— LR denotes the narrowband RB that is written in a matrix form. W 8 3.5 3.6 Numerical (N=2, P=5) Numerical (N=2, P=4) Numerical (N=2, P=3) Analytical (N=2, P=5) Analytical (N=2, P=4) Analytical (N=2, P=3) 3.2 Beamforming gain Beamforming gain 3 Numerical (N=2, P=5) Numerical (N=2, P=4) Numerical (N=2, P=3) Analytical (N=2, P=5) Analytical (N=2, P=4) Analytical (N=2, P=3) 3.4 2.5 2 3 2.8 2.6 2.4 2.2 1.5 2 1.8 1 8x8 10 x 10 12 x 12 14 x 14 16 x 16 18 x 18 20 x 20 1.6 8x8 10 x 10 12 x 12 Mv ร— Mh 14 x 14 16 x 16 18 x 18 20 x 20 Mv ร— Mh (a) B1 = 4, B2 = 4, Bc = 2 (BT = 18) (b) B1 = 5, B2 = 4, Bc = 2 (BT = 20) Fig. 4. Beamforming gain comparison between the numerical results G in (21) and the analytical results G(M, P, N, rN ) in (22). Next, the correlation between the channel vectors is studied numerically based on the cross correlations over w1 6= w2  2  h[w1 ]H h[w2 ] . ฮณh = Eh[w] , kh[w1 ]k22 kh[w2 ]k22  2 . ฮณc1 = Eh[w] c1 [w1 ]H c1 [w2 ] , codeword quantizes channel vectors H`,r in the r = dR( wL W โˆ’ e-th wideband RB ` โˆ’ 1)e-th narrowband RB of the ` = d wL W by refining the beam direction of c1|` according to f1|`,r = dฬŒM (ฮธ1v , ฮธ1h ) (ฮธ1v , ฮธ1h ) = arg max B ฮธฬƒ v ,ฮธฬƒ h โˆˆTB N1 W1 c1|` , v h HH `,r dฬŒM (ฮธฬƒ , ฮธฬƒ ) c1|`  2 2 where h[w] denotes 3D-SCM channel vectors and c1 [w] with BN1 -bit codebooks in (26). denotes the dominant 2D DFT beam that is chosen from the Round 2: The second codeword is computed to support the v h DFT codebooks AB and AB in (7) for subcarrier w. As shown channel scenario having two dominant beams. The proposed in Fig. 3, it is verified that the dominant 2D DFT beams in quantizer only refines the direction of c1|` as well as combines the different subcarriersโ€™ channel vectors are highly correlated. with the second 2D DFT beam c2|` . The second codeword is Based on empirical studies, the wideband quantizer is designed   in such a way that the correlated information, i.e., the dominant dฬŒM (ฮธ2v , ฮธ2h ) c1|` , c2|` z  f2|`,r =  , 2D DFT beam, is shared between neighboring subcarriers. dฬŒM (ฮธ2v , ฮธ2h ) c1|` , c2|` z 2 Level 1 (Wideband resource block): We choose two 2D  2  v h HH c1|` , c2|` zฬƒ DFT beams that are close to the channel vectors in each `,r dฬŒM (ฮธฬƒ , ฮธฬƒ ) v h (ฮธ2 , ฮธ2 , z2 ) = arg max   wideband RB. For supporting the `-th wideband RB, the first dฬŒM (ฮธฬƒv , ฮธฬƒh ) c1|` , c2|` zฬƒ 2 2 ฮธฬƒ v ,ฮธฬƒ h ,zฬƒ 2D DFT beam is chosen as over ฮธฬƒv , ฮธฬƒh โˆˆ TBBN2 in (26) and zฬƒ โˆˆ ZBc . Out of 2BN1 -bits c1|` = cv1 โŠ— ch1 , (28) allocated for eachW1narrowband RB, 2B bits are assigned for N2 v h 2 refining the first 2D DFT beam and B c bits are assigned for (cv1 , ch1 ) = arg max HH (cฬƒ โŠ— cฬƒ ) ` 2 h (cฬƒv ,cฬƒh )โˆˆAv combining the two 2D DFT beams. BW1 ร—ABW1 Round 3: Among the two codeword candidates, the final with BW1 -bit DFT codebooks. Next, the second 2D DFT beam codeword is selected with an additional bit according to is chosen using BW2 -bit DFT codebooks as 2 f`,r = arg max HH (30) `,r fฬƒ 2 . c2|` = cv2 โŠ— ch2 , (29) fฬƒ โˆˆ{f1|`,r ,f2|`,r } (cv2 , ch2 ) = arg max max cฬƒv ,cฬƒh zฬƒโˆˆZBc v h HH ` [c1|` , cฬƒ โŠ— cฬƒ ]zฬƒ k[c1|` , cฬƒv โŠ— cฬƒh ]zฬƒk2 2 VI. S IMULATION R ESULTS 2 over (cฬƒv , cฬƒh ) โˆˆ AvBW2 ร— AhBW2 . Level 2 (Narrowband resource block): Within the `-th wideband RB, the set of 2D DFT beams c1|` and c2|` will be a baseline that guide the quantization of channel vectors in each narrowband RB. To construct each set of two codeword candidates, 2BN1 -bits are allocated for each narrowband RB. Round 1: The first codeword is computed to support the channel scenario having a single dominant beam. The first We verify the performance of our CSI quantizers. Before evaluating the proposed quantizers, we pause to validate the accuracy of the approximated beamforming gain in (22). The beamforming gain between the simplified channel h and the quantized channel Cz/kCzk2 is computed as in (21). For numerical simulations, 10, 000 channels in (6) are generated by assuming a fixed number of the ray-like beams P โˆˆ {3, 4, 5}. In Fig. 4, it is shown that the approximated formula in (22) gives a tight lower bound on the numerical results in (21). 9 0.8 0.9 Prop. N-i (BN=21) Prop. N-ii (B N=19) 0.8 Prop. N-iii (B N=17) 0.75 Enh. KP-i (BN=22) Enh. KP-ii (B N=20) 0.7 KP (BN=22) 0.65 0.6 0.55 0.5 Prop. N-ii (B N=19) 0.7 Prop. N-iii (B N=17) 0.65 Enh. KP-i (BN=22) 0.6 Enh. KP-ii (B N=20) KP (BN=22) 0.55 0.5 0.45 0.4 0.35 0.45 4x4 Prop. N-i (BN=21) 0.75 Normalized beamforming gain GN Normalized beamforming gain GN 0.85 0.3 6x6 8x8 10 x 10 12 x 12 M v x Mh 14 x 14 16 x 16 4x4 6x6 (a) dv = 0.8ฮป, dh = 0.5ฮป 8x8 10 x 10 12 x 12 M v x Mh 14 x 14 16 x 16 (b) dv = 1.6ฮป, dh = 1.0ฮป Fig. 5. Normalized beamforming gain of narrowband quantizers. TABLE I 3D-SCM SIMULATION PARAMETERS . Tx antennas Rx antennas Scenario Carrier frequency fc Subcarrier spacing 4 Vertical antenna spacing dv Horizontal antenna spacing dh 4 ร— 4 to 20 ร— 20 Co-polarized UPA 1 Co-polarized UPA UMi NLOS 2 GHz 15 KHz 0.8ฮปc , 1.6ฮปc 0.5ฮปc , 1.0ฮปc We now evaluate the narrowband quantizers using simulations. Numerical results are obtained through Monte Carlo simulations with 10, 000 channel realizations. For generating 3D-SCM channels, we use the parameters in Table I. We evaluate the normalized beamforming gain of narrowband quantizer  H 2 |f h| . GN = Eh , khk22 where f is the final codeword8 that is chosen in (27). We compare the beamforming gains of the proposed quantizer with that of the KP codebooks in [6], [7] and the enhanced KP codebook in [9]. Note that the feedback-bit allocation9 of each quantizer is listed in Table II and the computational complexity10 VN and feedback overhead11 BN are summarized in Table III. In Figs. 5(a) and 5(b), the normalized beamforming gains of the three quantizers are plotted with different antenna spacing 8 The perfect CSI beamformer gives the normalized beamforming gain of one. 9 The feedback-bit allocation scenarios for the proposed narrowband quantizers are predefined in (24). 10 We count the number of vector computations to evaluate the complexity. 11 The feedback overhead (per each frequency tone CSI) is assessed by the combination of the overheads for both the first and second rounds in Section IV-E. TABLE II F EEDBACK CONFIGURATIONS OF NARROWBAND QUANTIZER Prop. N-i Prop. N-ii Prop. N-iii Enh. KP-i Enh. KP-ii KP codebook 1st round B1 = 5 B1 = 5 B1 = 4 B1 + B2 B1 + B2 B1 = 11 2nd BฬŒ1 BฬŒ1 BฬŒ1 B1 B1 round = 5, B2 = 4, B2 = 4, B2 = 5, B2 = 5, B2 = 4, Bc = 2 = 3, Bc = 2 = 3, Bc = 2 =5 =4 BN 21 19 17 22 20 22 VN 3,072 1,536 768 2,176 1,120 4,096 TABLE III F EEDBACK OVERHEADS AND COMPLEXITY COMPARISONS Prop. quantizer Enhanced KP KP codebook Feedback overhead BN 2(B1 + B2 ) + Bc + 1 2(B1 + B2 + 1) 2B1 Vector computations VN 22B1 + 22B2 +Bc +1  2 2B1 +B2 + 2B1 + 2B2 2B1 +1 scenarios. The proposed quantizer searches both vertical and horizontal domains jointly, while other KP codebooks search beams lying in each domain independently and integrate the results later. The 2D DFT beams, which are quantized in the proposed quantizer, are aligned by cophasing and scaling each beam. On the contrary, the quantized beams in the enhanced KP codebook [9] are simply added up together without considering phase alignment. For these reasons, the proposed quantizer generates higher beamforming gains than those of other KP codebooks. We next evaluate the normalized beamforming gain of the wideband quantizer according to  H 2 . GW = Eh[w] f`,r h[w]/kh[w]k2 , where f`,r is the chosen codeword in (30). In Figs. 6(a) and 6(b), the normalized beamforming gains of wideband quantizer are compared with those of the narrowband quantizers. In the legend, the first alphabet denotes the type of quantizer, the 10 0.7 0.6 W-I-1 (BW =136) W-II-2 (BW =65) 0.6 N-ii-1 (BN =152) N-ii-2 (BN =19) 0.55 W-I-2 (BW =83) 0.55 W-II-1 (BW =120) 0.5 0.45 Normalized beamforming gain G W 0.65 Normalized beamforming gain G W W-I-1 (BW =136) W-I-2 (BW =83) W-II-1 (BW =120) W-II-2 (BW =65) 0.5 N-ii-1 (BN =152) N-ii-2 (BN =19) 0.45 0.4 0.35 0.3 0.4 8x8 10 x 10 12 x 12 14 x 14 M v x Mh 16 x 16 18 x 18 20 x 20 0.25 8x8 10 x 10 (a) dv = 0.8ฮป, dh = 0.5ฮป 12 x 12 14 x 14 M v x Mh 16 x 16 18 x 18 20 x 20 (b) dv = 1.6ฮป, dh = 1.0ฮป Fig. 6. Normalized beamforming gain comparison between the narrowband and wideband quantizers. TABLE IV F EEDBACK OVERHEADS FOR EACH WIDEBAND AND NARROWBAND RB W-I W-II Level 1: Wideband RB BW1 = 5, BW2 = 5 BW1 = 5, BW2 = 5 Level 2: Narrowband RB BN1 = 3, BN2 = 2, Bc = 2 BN1 = 2, BN2 = 1, Bc = 2 TABLE V W IDEBAND CONFIGURATIONS FOR NARROWBAND AND WIDEBAND QUANTIZERS N-1 N-2 Narrowband quantizer 1 codeword / 75 tones 1 codeword / 600 tones W-1 W-2 Wideband quantizer L = 4, R = 2 L = 1, R = 9 second alphabet denotes the feedback-bit allocation scenario in Table IV, and the final digit represents the wideband configuration12 in Table V. The total feedback overhead of the proposed wideband quantizer is defined as BW = 2(BW1 + BW2 )L + (2BN1 + 1)RL. Numerical results verify that wideband quantizers outperforms narrowband quantizers because it exploits correlation between frequency tone CSIs. The wideband quantizers also reduce feedback overhead because they can maintain quantization performance with less overhead compared to narrowband quantizers. VII. C ONCLUSION In this paper, advanced CSI quantizers based on the KP codebook structure are proposed for FD-MIMO systems using UPAs. In the proposed quantizer designs, we focused on detecting and quantizing a limited number of dominant 2D beams in 3D channel vectors by exploiting DFT codebooks. 12 In the LTE setup of scheme W-3, the first 8 narrowband RBs have 72 tone CSIs and the ninth narrowband RB has 24 tone CSIs. The codebook for combiners was designed to cophase and scale the quantized 2D DFT beams. Furthermore, we analytically derived a design guideline for practical quantizers, which is based on FD-MIMO systems with predefined feedback-bit allocation scenarios. We then developed CSI quantizers by taking the predefined feedback scenarios into account. First, a narrowband quantizer was proposed to quantize and/or combine one or two dominant 2D DFT beams. To detect and quantize beams properly, we also developed a multi-round beam search approach that scans both vertical and horizontal domains jointly under the moderate computational complexity. To reduce total feedback overhead, we also proposed a wideband quantizer that utilizes the correlated information between multiple frequency tones. Numerical simulations verified that the proposed narrowband quantizer gives better quantization performance than previous CSI quantization techniques, and the proposed wideband quantizer further improves the quantization performance with less feedback overhead compared to the narrowband quantizer in wideband settings. A PPENDIX A C ORRELATION BETWEEN ARRAY RESPONSE VECTOR AND DFT CODEWORD We discuss the correlation between the array response vector in the domain a and the selected DFT codeword to quantify the quantization performance of DFT codebooks by evaluating  .  a a 2 ฮ“2na = E dH Ma (ฯˆn )cn h i 2 a =E max dH Ma (ฯˆn )aMa (q/Qn ) qโˆˆ{1,ยทยทยท ,Qn } =  1 E max Ma2 qโˆˆ{1,ยทยทยท ,Qn } M a โˆ’1 X m=0 a eโˆ’jฯ€m(ฯˆn โˆ’2q/Qn +1) 2 11 (a) =  MX 2 a โˆ’1 a 1 โˆ’jฯ€m(ฯˆn โˆ’2qn /Qn +1) e , E Ma2 m=0 where (a) is rewritten with the index of selected codeword qn = arg min q={1,ยทยทยท ,Qn } ฯˆna โˆ’ 2q/Qn + 1 . To complete the lower bound in (31), we first compute the expectation of two-norm squared of the effective channel vector h i   2 E khH Ck22 = E hH [cv1 โŠ— ch1 , ยท ยท ยท , cvN โŠ— chN ] 2 N h i X 2 = E hH (cvn โŠ— chn ) n=1   N X P X M ฮ“2nv ฮ“2nh โˆ’ 1 (a) 1 The expectation over ฯˆna โˆผ U(โˆ’1, 1) is rewritten by defining = PN + , (32) . M q the new random variable as ฯˆ = ฯˆna โˆ’ 2qn /Qn + 1, which n=1 q=n follows U(โˆ’1/Qn , 1/Qn ) because |ฯˆna โˆ’2qn /Qn +1| โ‰ค 1/Qn . where (a) is derived by using the correlation between The correlation formula13 is then computed over ฯˆ, as the  channel vector and the n-th selected DFT codeword  MX  MX  E |hH (cvn โŠ— chn )|2 that will be discussed in Appendix E. 2 a โˆ’1 a โˆ’1 M a โˆ’1 X 1 1 = 2E eโˆ’jฯ€mฯˆ eโˆ’jฯ€(mโˆ’`)ฯˆ E We next consider the set of N DFT vectors C in (13). The 2 Ma M a m=0 `=0 m=0 expectation of two-norm squared of C is approximated as    1   M a โˆ’1 M a โˆ’1 Z X X Qn 2 cos ฯ€(m โˆ’ `)ฯˆ   1 2 H H = 2 Ma + dฯˆ E kCk2 = E max xฬƒ (C C)xฬƒ 1 Ma 2/Qn xฬƒโˆˆCN `=0 m>` โˆ’ Qn      M ' max xฬƒH E CH C xฬƒ (33) a โˆ’1 M a โˆ’1 X X 2 sin ฯ€(m โˆ’ `)/Qn N 1 xฬƒโˆˆC = 2 Ma +   Ma ฯ€(m โˆ’ `)/Qn subject to kxฬƒk22 = 1. Note that E CH C is computed as `=0 m>`   ๏ฃฎ v H v ๏ฃน M a โˆ’1 X 2(Ma โˆ’ q) sin ฯ€q/Qn 1 (c1 ) c1 โŠ— (ch1 )H ch1 ยท ยท ยท (cv1 )H cvn โŠ— (ch1 )H chn = 2 Ma + . ๏ฃฏ ๏ฃบ .. .. .. Ma ฯ€q/Qn E๏ฃฐ ๏ฃป q=1 . . . (cvn )H cv1 โŠ— (chn )H ch1 ยท ยท ยท (cvn )H cvn โŠ— (chn )H chn ๏ฃน ๏ฃฎ 1 ยท ยท ยท Mv1Mh A PPENDIX B ๏ฃบ ๏ฃฏ .. .. .. L OWER BOUND OF NORMALIZED BEAMFORMING GAIN (34) =๏ฃฐ ๏ฃป . . . 1 ยทยทยท 1 Remark 3: To simplify analysis, we consider the first order Mv Mh Taylor expansion of the bivariate variables, which is derived where ca = a (q /Q ) with Q = 2Bn is chosen as in Ma n n n n as in [38], (16). Because we assume that beam directions are uniformly distributed ฯˆna โˆผ U(โˆ’1, 1), can can be chosen as one of E[A]  E[A]  โˆ‚ E[B] A E[A] โˆ‚ E[B] Qn = 2Bn codewords in the DFT codebook AaBn with equal ' + (A โˆ’ E[A]) + (B โˆ’ E[B]).  B E[B] โˆ‚A โˆ‚B probabilities. For this reason, we can obtain E (cac )H cad in (34) by computing its arithmetic mean of the beamforming Expectation of the bivariate variables is then approximated as gain between two different codewords (c 6= d) as     A E[A] E[A] Qc Qd   1 X X H E . 'E = E (cac )H cad = a (qc /Qc )aMa (qd /Qd ) B E[B] E[B] Qc Qd q =1 q =1 Ma c d " Q Q # Qc X Qd The beamforming gain Gbq in Lemma 1 is lower bounded M c d a โˆ’1 X X X X j2ฯ€mqd โˆ’j2ฯ€mqc 1 as = 1+ e Qd e Qc Ma Qc Qd q =1 q =1   q =1 m=1 q =1 c c d d " |hH Czฬƒ|2  # M a โˆ’1  Gbq = E max X 1 1 โˆ’ ej2ฯ€m 1 โˆ’ eโˆ’j2ฯ€m 2 2 zฬƒโˆˆCN kCzฬƒk2 = Q + j2ฯ€m j2ฯ€m   Ma Q2 (a) 1 โˆ’ e โˆ’ Qc 1 โˆ’ e Qd maxzฬƒโˆˆCN |hH Czฬƒ|2 m=1 โ‰ฅ E 1 kCk2 . (35) =  H 2 2 M a kh Ck2 (b)   =E Based on E CH C , the expectation of two-norm squared kCk22  H 2 of C in (33) is approximated as (c) E kh Ck2   ' , (31)      E kCk22 E kCk22 ' eig1 E CH C eig1 {1N,N } M โˆ’ 1 = + where the inequality in (a) is based on kCzฬƒk22 โ‰ค kCk22 kzฬƒk22 . M M and kzฬƒk22 = 1, (b) holds when zฬƒ = CH h/kCH hk2 , and (c) (a) M + N โˆ’ 1 = , (36) is derived based on Remark 3. M where (a) is derived because eig1 {1N,N } = N , which holds 13 Assuming Q > M /2, the correlation formula is always positive, i.e., a a ฮ“2na > 0, because |ฯˆ| < 2/Ma . when xฬƒ = โˆš1N [1, ยท ยท ยท , 1]T โˆˆ CN . 12 E[(cvc โŠ— chc )H hhH (cvd โŠ— chd )] = X P โˆ—  X P v v H h h ฮฑpโˆ— (dH Mv (ฯˆp )cc )(dMv (ฯˆp )cc ) p=1  v v H h h ฮฑqโˆ— (dH Mv (ฯˆq )cd )(dMv (ฯˆq )cd ) q=1 P X      h H  v v h H h h = E |ฮฑp |2 E (cvc )H dMv (ฯˆpv )dH Mv (ฯˆp )cd E (cc ) dMv (ฯˆp )dMv (ฯˆp )cd . (37) p=1 Finally, the lower bound of Gbq in (31) is approximated by plugging the derived formulas in (32) and (36) into (31) as Gbq   N X P X P M ฮ“2nv ฮ“2nh โˆ’ 1 ' N+ . M +N โˆ’1 qP n=1 q=n A PPENDIX C Case 4: p 6= c, p 6= d, c 6= d.   a a E (cac )H dMa (ฯˆpa )dH Ma (ฯˆp )cd  MX  M a โˆ’1 a โˆ’1 X 2q 2qc a 1 โˆ’jฯ€m(ฯˆpa โˆ’ Q d +1) d = 2E ejฯ€`(ฯˆp โˆ’ Qc +1) e Ma m=0 = 1 Ma2 `=0 M a โˆ’1 M a โˆ’1 X X `=0 C OVARIANCE MATRIX OF EFFECTIVE CHANNEL VECTOR is Each entry of R in (19)  rewritten in (37). Note that a a E (cac )H dMa (ฯˆpa )dH (ฯˆ )c p Ma d in (37) is computed depending on the different cases as follows: Case 1: p = c = d.   a a 2 E (cac )H dMa (ฯˆpa )dH Ma (ฯˆp )cd = ฮ“ac , ejฯ€(`โˆ’m) m=0 h iZ mq c j2ฯ€( Q d โˆ’ `q Qc ) d E e 1 โˆ’1 = 1 Ma2 M a โˆ’1 X a ejฯ€(`โˆ’m)ฯˆp a dฯˆp 2 h i q qc j2ฯ€m( Qd โˆ’ Q ) c d E e m=0 1 , = Ma2 (a) where (a) is derived by computing the arithmetic mean. where ฮ“2ac is derived in Appendix A. Case 2: p = 6 c, c = d. i h   2 a a H a E (cac )H dMa (ฯˆpa )dH (ฯˆ )c = E d (ฯˆ )a (q /Q ) M c c Ma p d Ma p a (a) = 1 , Ma where qc is chosen as in (16). Note that (a) is derived by computing the arithmetic mean. Case 3: p = c, c 6= d.    H  a a a a E (cac )H dMa (ฯˆpa )dH Ma (ฯˆp )cd = ฮ“ac E dMa (ฯˆc )cd (a) ฮ“ac = , Ma where (a) is derived because   H   a a a E dH Ma (ฯˆc )cd = E dMa (ฯˆc )aMa (qd /Qd ) Ma โˆ’1 h i 2q 1 X โˆ’jฯ€m(ฯˆca โˆ’ Q d +1) d E e = Ma m=0 M a โˆ’1 Z 1 X eโˆ’jฯ€mฯ† (b) 1 = dฯ† Ma m=0 โˆ’1 2 = 1 . Ma Note that (b) is derived because ฯ†, ฯˆca โˆผ U(โˆ’1, 1) with the . d definition of ฯ† = ฯˆca โˆ’ 2q Qd + 1 for any qd โˆˆ {1, ยท ยท ยท , Qd } in (16). A PPENDIX D Q UANTIZATION PERFORMANCE OF ZBc The normalized beamforming gain between the effective channel vector and the selected combiner is lower bounded as   2 |eH bc uฬ‚ Rw| G =E (wH Rw)(eH uฬ‚ Reuฬ‚ )  H  |euฬ‚ R(euฬ‚ cos ฮธuฬ‚ + kuฬ‚ sin ฮธuฬ‚ )|2 (a) = E (wH Rw)(eH uฬ‚ Reuฬ‚ ) " # 2 |eH eH jโˆ eH Rk 2 uฬ‚ Reuฬ‚ uฬ‚ Rkuฬ‚ | uฬ‚ 1+ H tan ฮธuฬ‚ e uฬ‚ cos ฮธuฬ‚ =E wH Rw |euฬ‚ Reuฬ‚ |  H  (b) euฬ‚ Reuฬ‚ cos2 ฮธuฬ‚ 'E wH Rw H (c) E[e Reuฬ‚ cos2 ฮธuฬ‚ ] uฬ‚ ' (38) E[wH Rw] . In (38), (a) is based on w = euฬ‚ cos ฮธuฬ‚ + kuฬ‚ sin ฮธuฬ‚ with euฬ‚ โŠฅ H kuฬ‚ , (b) is approximated because |eH uฬ‚ Rkuฬ‚ |  |euฬ‚ Reuฬ‚ | and tan ฮธuฬ‚  1, and (c) is approximated based on Remark 3 in Appendix B. Although Gbc is simplified in (38), it is still difficult to solve in most cases. In the special case of N = 2, the equal gain vectors can be defined as . ejฮฝ w = โˆš [1, ejฯ… ]T , 2 2ฯ€u . 1 eu = โˆš [1, ej U ]T 2 13 using ฮฝ, ฯ… โˆผ U(โˆ’ฯ€, ฯ€), and the beamforming gain in (38) is then derived such as H 2 E[eH uฬ‚ Reuฬ‚ cos ฮธuฬ‚ ] (a) E[euฬ‚ Reuฬ‚ (1 + cos ฮฝฬ‚)] = H E[w Rw] 2E[wH Rw]  H  PU (b) `=1 E euฬ‚ Reuฬ‚ (1 + cos ฮฝฬ‚) | uฬ‚ = ` = 2U E[wH Rw] PU U R Uฯ€ H ฯ€ e` Re` (1 + cos ฯ„ )dฯ„ `=1 2ฯ€ โˆ’ U = 2U E[wH Rw] PU 1 H e Re`  U ฯ€ 1 + sin = U `=1H ` 2E[w Rw] ฯ€ U  U ฯ€ (c) 1 = 1 + sin . 2 ฯ€ U . Note that (a) is derived based on the definition ฯ…ฬ‚ = ฯ…โˆ’ 2ฯ€Uuฬ‚ that ฯ€ ฯ€ 2ฯ€ uฬ‚ ฯ€ follows U(โˆ’ U , U ) because |ฯ…โˆ’ U | โ‰ค U , ฯ… โˆผ U(โˆ’ฯ€, ฯ€), and uฬ‚ = arg min |ฯ… โˆ’ 2ฯ€u U | based on Assumption 2. In addition, uโˆˆ{1,ยทยทยท ,U } (b) is derived by computing its arithmetic mean because uฬ‚ is equally probable from 1 to U , and (c) is derived because E[wH Rw] = (R1,1 + R2,2 )/2 + |R1,2 |E[cos(ฯ… + โˆ R1,2 )] = (R1,1 + R2,2 )/2, and the arithmetic mean of eH ` Re` is derived as U X eH Re` ` `=1 U U R1,1 + R2,2 X |R1,2 | cos 2ฯ€` U + โˆ R1,2 = + 2 U  `=1 = (R1,1 + R2,2 )/2. A PPENDIX E C ORRELATION BETWEEN CHANNEL VECTOR AND DFT CODEWORD We derive a correlation between the channel in (6) and the n-th selected 2D DFT beam h i 2 E hH (cvn โŠ— chn )  X  P  H 2 โˆ— H v v h h =E ฮฑp dMv (ฯˆp )cn dMh (ฯˆp )cn p=1 P i    h H (a) X  2 v v 2 = E |ฮฑp |2 E dH E dMh (ฯˆph )chn Mv (ฯˆp )cn p=1 P X    2 2 E |ฮฑp |2 (b)  2 = E |ฮฑn | ฮ“nv ฮ“nh + M v Mh p6=n     2 2 P โˆ’ E |ฮฑn |2 2 = E |ฮฑn | ฮ“nv ฮ“nh + , M (b) is derived because h i h i 2 a a 2 a E dH = E dH Ma (ฯˆp )cn Ma (ฯˆp )aMa (qn /Qn )  MX  M a โˆ’1 a โˆ’1 X 2qn a 1 n +1) jฯ€`(ฯˆpa โˆ’ 2q โˆ’jฯ€m(ฯˆ โˆ’ +1) p Q Q n n e e = 2E Ma m=0 `=0 a Z Ma โˆ’1 M a โˆ’1 X   1 ejฯ€(`โˆ’m)ฯˆp a 2qn 1 X E ejฯ€(mโˆ’`)( Qn โˆ’1) = 2 dฯˆp Ma 2 โˆ’1 m=0 = 1 Ma2 `=0 M a โˆ’1 M a โˆ’1 X X m=0 m=` 1 = . Ma To complete the formula in (39), we compute the power of the n-th largest channel gain E[|ฮฑn |2 ]. Without loss of generality, we assume that the magnitude of channel gains are in descending order, i.e., |ฮฑ1 |2 โ‰ฅ ยท ยท ยท โ‰ฅ |ฮฑP |2 . The channel gain . A = |ฮฑp |2 follows ฯ‡22 that is characterized by the cumulative distribution function (cdf) of FA (a) = 1 โˆ’ eโˆ’a because ฮฑp โˆผ CN (0, 1). We now consider the k-th order statistic (k-th smallest order statistic) of P i.i.d exponentially . distributed random variables Ak = |ฮฑP โˆ’k+1 |2 . Then, we refer to [39] for defining the pdf of Ak , yielding   P โˆ’1 fAk (a) = P (1 โˆ’ eโˆ’a )kโˆ’1 eโˆ’a(P โˆ’k+1) kโˆ’1   kโˆ’1   P โˆ’1 X kโˆ’1 (a) = P (โˆ’1)q eโˆ’a(q+P โˆ’k+1) , k โˆ’ 1 q=0 q where (a) is derived based on the binomial expansion formula. Then, the expectation of k-th order statistic is defined as  q Z โˆž X P ! kโˆ’1   kโˆ’1 q (โˆ’1) E Ak = aeโˆ’a(q+(P โˆ’k+1)) da (P โˆ’ k)!(k โˆ’ 1)! 0 q=0   P X P !(โˆ’1)qโˆ’(P โˆ’k+1) (q โˆ’ 1) ยท ยท ยท (q โˆ’ (P โˆ’ k)) = (P โˆ’ q)!q! q(P โˆ’ k)! q=P โˆ’k+1   P P qโˆ’(P โˆ’k+1)  qโˆ’1qโˆ’2 q โˆ’ (P โˆ’ k) (a) X q (โˆ’1) = ยทยทยท q 1 2 P โˆ’k q=1 " P   # P โˆ’k  P P q+1 X 1 X (b) X P q (โˆ’1) = (โˆ’1)q + q ` q=1 q q=1 `=1 " #   P โˆ’k P   P X P 1 (c) X 1 X P q 0 (โˆ’1) โˆ’ (โˆ’1) + = ` q=0 q 0 q q=1 `=1 (d) = โˆ’ P โˆ’k X `=1 (39)  .  a a 2 where ฮ“2na = E dH is derived in Appendix A. Ma (ฯˆn )cn Note that (a) is derived because E[ฮฑpโˆ— ฮฑq ] = 0 when p 6= q and  sin(ฯ€(` โˆ’ m))  2qn E ejฯ€(mโˆ’`)( Qn โˆ’1) ฯ€(` โˆ’ m) = P 1 X1 + ` q=1 q P X q=P โˆ’k+1 1 . q PP Notice that (a) is derived because q=b f (q)(q โˆ’ b) = PP q=b+1 f (q)(q โˆ’ b) + f (b)(b โˆ’ b) for any function f (ยท), (b) 14 (Pq )(โˆ’1)q+1 PP = PP (Pq )(โˆ’1)qโˆ’1 , (c) q=1 q q Pn 1 (nk)(โˆ’1)k+1 is derived based on = k=1 k , and (d) is k Pn k=1 derived based on k=0 (โˆ’1)k nk = 0. We now compute the n-th largest channel gain as is derived because q=1 Pn P     X 1 E |ฮฑn |2 = E AP โˆ’n+1 = . q q=n Finally, the correlation coefficient is rewritten by plugging |ฮฑn |2 into (39).   P X  1 M ฮ“2nv ฮ“2nh โˆ’ 1 2 E hH (cvn โŠ— chn ) = P+ . M q q=n R EFERENCES [1] J. Song, J. Choi, K. Lee, T. Kim, J. Y. Seol, and D. J. Love, โ€œAdvanced quantizer designs for FD-MIMO systems using uniform planar arrays,โ€ in Proceedings of IEEE Global Telecommunications Conference, Dec. 2016. [2] T. L. Marzetta, โ€œNoncooperative cellular wireless with unlimited numbers of base station antennas,โ€ IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3590โ€“3600, Nov. 2010. [3] R. C. Hansen, Phased array antennas, 2nd ed. Hoboken: WileyInterscience, 2009. [4] Y. H. Nam, B. L. Ng, K. Sayana, Y. Li, J. Zhang, Y. Kim, and J. Lee, โ€œFull-dimension MIMO for next generation cellular technology,โ€ IEEE Communications Magazine, vol. 51, no. 6, pp. 172โ€“179, Jun. 2013. [5] R1-150381, Discussions on FD-MIMO codebook enhancements, 3GPP TSG RAN WG1 #80 Std., Feb. 2015. [6] R1-150057, Codebook enhancements for EBF/FD-MIMO, 3GPP TSG RAN WG1 #80 Std., Feb. 2015. [7] R1-150560, Codebook for 2D antenna arrays, 3GPP TSG RAN WG1 #80 Std., Feb. 2015. [8] J. Li, X. Su, J. Zeng, Y. Zhao, S. Yu, L. Xiao, and X. Xu, โ€œCodebook design for uniform rectangular arrays of massive antennas,โ€ in Proceedings of IEEE Vehicular Technology Conference, Jun. 2013. [9] J. Choi, K. Lee, D. J. Love, T. Kim, and R. W. Heath, โ€œAdvanced limited feedback designs for FD-MIMO using uniform planar arrays,โ€ in Proceedings of IEEE Global Telecommunications Conference, Dec. 2015. [10] J. Choi, T. Kim, D. J. Love, and J. Y. Seol, โ€œExploiting the preferred domain of FDD massive MIMO systems with uniform planar arrays,โ€ in Proceedings of IEEE International Conference on Communications, Jun. 2015. [11] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, โ€œMassive MU-MIMO downlink TDD systems with linear precoding and downlink pilots,โ€ in Proceedings of Allerton Conference on Communication, Control, and Computing, Oct. 2013. [12] R. Rogalin, O. Y. Bursalioglu, H. Papadopoulos, G. Caire, A. F. Molisch, A. Michaloliakos, V. Balan, and K. Psounis, โ€œScalable synchronization and reciprocity calibration for distributed multiuser MIMO,โ€ IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 1815โ€“ 1831, Mar. 2014. [13] B. Hassibi and B. M. Hochwald, โ€œHow much training is needed in multiple-antenna wireless links?โ€ IEEE Transactions on Information Theory, vol. 49, no. 4, pp. 951โ€“963, Apr. 2003. [14] C. K. Au-Yeung and D. J. Love, โ€œOn the performance of random vector quantization limited feedback beamforming in a MISO system,โ€ IEEE Transactions on Wireless Communications, vol. 6, no. 2, pp. 458โ€“462, Feb. 2007. [15] C. K. Au-Yeung, D. J. Love, and S. Sanayei, โ€œTrellis coded line packing: large dimensional beamforming vector quantization and feedback transmission,โ€ IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 1844โ€“1853, Apr. 2011. [16] J. Choi, A. Chance, D. J. Love, and U. Madhow, โ€œNoncoherent trellis coded quantization: a practical limited feedback technique for massive MIMO systems,โ€ IEEE Transactions on Communications, vol. 61, no. 12, pp. 5016โ€“5029, Dec. 2013. [17] J. Choi, D. J. Love, and T. Kim, โ€œTrellis-extended codebooks and successive phase adjustment: a path from LTE-advanced to FDD massive MIMO systems,โ€ IEEE Transactions on Wireless Communications, vol. 14, no. 4, pp. 2007โ€“2016, Apr. 2015. [18] J. Choi, D. J. Love, and P. Bidigare, โ€œDownlink training techniques for FDD massive MIMO systems: open-loop and closed-loop training with memory,โ€ IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 802โ€“814, Dec. 2014. [19] S. Noh, M. D. Zoltowski, Y. Sung, and D. J. Love, โ€œPilot beam pattern design for channel estimation in massive MIMO systems,โ€ IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 787โ€“801, Oct. 2014. [20] Y. Han, J. Lee, and D. J. Love, โ€œCompressed sensing-aided downlink channel training for FDD massive MIMO systems,โ€ to appear in IEEE Transactions on Communications, 2017. [21] K. K. Mukkavilli, A. Sabharwal, E. Erkip, and B. Aazhang, โ€œOn beamforming with finite rate feedback in multiple-antenna systems,โ€ IEEE Transactions on Information Theory, vol. 49, no. 10, pp. 2562โ€“ 2579, Jan. 2003. [22] D. J. Love, R. W. Heath, and T. Strohmer, โ€œGrassmannian beamforming for multiple-input multiple-output wireless systems,โ€ IEEE Transactions on Information Theory, vol. 49, no. 10, pp. 2735โ€“2747, Oct. 2003. [23] D. J. Love, R. W. Heath, V. K. Lau, D. Gesbert, B. D. Rao, and M. Andrews, โ€œAn overview of limited feedback in wireless communication systems,โ€ IEEE Journal on Selected Areas in Communications, vol. 26, no. 8, pp. 1341โ€“1365, Oct. 2008. [24] D. J. Love and R. W. Heath, โ€œGrassmannian beamforming on correlated MIMO channels,โ€ in Proceedings of IEEE Global Telecommunications Conference, Nov. 2004. [25] โ€”โ€”, โ€œLimited feedback diversity techniques for correlated channels,โ€ IEEE Transactions on Vehicular Technology, vol. 55, no. 2, pp. 718โ€“722, Mar. 2006. [26] P. Xia and B. G. Georgios, โ€œDesign and analysis of transmit-beamforming based on limited-rate feedback,โ€ IEEE Transactions on Signal Processing, vol. 54, no. 5, pp. 1853โ€“1863, May 2006. [27] V. Raghavan, A. M. Sayeed, and V. V. Veeravalli, โ€œLimited feedback precoder design for spatially correlated MIMO channels,โ€ in Proceedings of Conference on Information Sciences and Systems, Mar. 2007. [28] V. Raghavan, J. Choi, and D. J. Love, โ€œDesign guidelines for limited feedback in the spatially correlated broadcast channel,โ€ IEEE Transactions on Communications, vol. 63, no. 7, pp. 2524โ€“2540, Jul. 2015. [29] Study on 3D channel model for LTE, 3GPP TR 36.873 V12.0.0 Std., Sep. 2014. [30] Spatial channel model for mutiple input multiple output simulations, 3GPP TR 25.996 V6.1.0 Std., Sep. 2003. [31] R1-103378, Performance evaluations of Rel.10 feedback framework, 3GPP TSG RAN WG1 #61 Std., May 2010. [32] R1-105011, Way forward on 8Tx codebook for Rel.10 DL MIMO, 3GPP TSG RAN WG1 #61 Std., Aug. 2010. [33] Y. Han, S. Jin, X. Li, Y. Huang, L. Jiang, and G. Wang, โ€œDesign of double codebook based on 3D dual-polarized channel for multiuser MIMO system,โ€ EURASIP Journal on Advances in Signal Processing, vol. 2014, no. 1, pp. 1โ€“13, Jul. 2014. [34] R. J. Mailloux, Phased array antenna handbook, 2nd ed. Artech House, 2005. [35] D. Ying, F. W. Vook, T. Thomas, D. J. Love, and A. Ghosh, โ€œKronecker product correlation model and limited feedback codebook design in a 3D channel model,โ€ in Proceedings of IEEE International Conference on Communications, Jun. 2014. [36] O. E. Ayach, S. Rajagopal, S. Abu-Surra, Z. Pi, and R. W. Heath, โ€œSpatially sparse precoding in millimeter wave MIMO systems,โ€ IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1499โ€“1513, Mar. 2014. [37] M. Borga, โ€œLearning multidimensional signal processing,โ€ Ph.D. dissertation, Linkoฬˆping University, Linkoฬˆping, Sweden, 1998, SE-581 83. [38] A. Stuart and K. Ord, Kendallโ€™s advanced theory of statistics: distribution theory, 6th ed. London: Arnold, 1998. [39] H. David, Order statistics, 2nd ed. New York: John Wiley and Sons, 1980.
7cs.IT
Fast Distributed Algorithms for Testing Graph Properties Keren Censor-Hillelโˆ— Eldar Fischerโˆ— Gregory Schwartzmanโˆ— Yadu Vasudevโˆ— arXiv:1602.03718v3 [cs.DC] 2 May 2016 May 3, 2016 Abstract We initiate a thorough study of distributed property testing โ€“ producing algorithms for the approximation problems of property testing in the CONGEST model. In particular, for the so-called dense graph testing model we emulate sequential tests for nearly all graph properties having 1-sided tests, while in the general and sparse models we obtain faster tests for trianglefreeness, cycle-freeness and bipartiteness, respectively. In addition, we show a logarithmic lower bound for testing bipartiteness and cycle-freeness, which holds even in the stronger LOCAL model. In most cases, aided by parallelism, the distributed algorithms have a much shorter running time as compared to their counterparts from the sequential querying model of traditional property testing. The simplest property testing algorithms allow a relatively smooth transitioning to the distributed model. For the more complex tasks we develop new machinery that may be of independent interest. โˆ— Technion โ€“ Israel Institute of Technology, Department of Computer Science. [email protected], [email protected], [email protected], [email protected]. Supported in part by the Israel Science Foundation (grant 1696/14). 1 Introduction The performance of many distributed algorithms naturally depends on properties of the underlying network graph. Therefore, an inherent goal is to check whether the graph, or some given subgraph, has certain properties. However, in some cases this is known to be hard, such as in the CONGEST model [31]. In this model, computation proceeds in synchronous rounds, in each of which every vertex can send an O(log n)-bit message to each of its neighbors. Lower bounds for the number of โˆš rounds of type โ„ฆฬƒ( n + D) are known for verifying many global graph properties, where n is the number of vertices in the network and D is its diameter (see, e.g. Das-Sarma et al. [36])1 . To overcome such difficulties, we adopt the relaxation used in graph property testing, as first defined in [18, 20], to the distributed setting. That is, rather than aiming for an exact answer to the question of whether the graph G satisfies a certain property P , we settle for distinguishing the case of satisfying P from the case of being วซ-far from it, for an appropriate measure of being far. Apart from its theoretical interest, this relaxation is motivated by the common scenario of having distributed algorithms for some tasks that perform better given a certain property of the network topology, or given that the graph almost satisfies that property. For example, Hirvonen et al. [24] show an algorithm for finding a large cut in triangle-free graphs (with additional constraints), and for finding an (1 โˆ’ วซ)-approximation if at most an วซ fraction of all edges are part of a triangle. Similarly, Pettie and Su [32] provide fast algorithms for coloring triangle-free graphs. We construct fast distributed algorithms for testing various graph properties. An important byproduct of this study is a toolbox that we believe will be useful in other settings as well. 1.1 Our contributions We provide a rigorous study of property testing methods in the realm of distributed computing under the CONGEST model. We construct 1-sided error distributed วซ-tests, in which if the graph satisfies the property then all vertices output accept, and if it is วซ-far from satisfying the property then at least one vertex outputs reject with probability at least 2/3. Using the standard amplification method of invoking such a test O(log n) times and having a vertex output reject if there is at least one invocation in which it should output reject, gives rejection with higher probability at the price of a multiplicative O(log n) factor for the number of rounds. The definition of a graph being วซ-far from satisfying a property is roughly one of the following (see Section 2 for precise definitions): (1) Changing any วซn2 entries in the adjacency matrix does not give a graph that satisfies the property (dense model), or (2) changing any วซ ยท max{n, m} entries in the adjacency matrix does not give a graph that satisfies the property, where m is the number of edges (general model). A particular case here is when the degrees are bounded by some constant d, and any resulting graph must comply with this restriction as well (sparse model). In a sequential วซ-test, access to the input is provided by queries, whose type depends on the model. In the dense model these are asking whether two vertices v, u are neighbors, and in the general and sparse models these can be either asking what the degree of a vertex v is, or asking what the i-th neighbor of v is (the ordering of neighbors is arbitrary). While a sequential วซ-test can touch only a small handful of vertices with its queries, in a distributed test the lack of ability to communicate over large distances is offset by having all n vertices operating in parallel. Our first contribution is a general scheme for a near-complete emulation in the distributed 1 Here โ„ฆฬƒ hides factors that are polylogarithmic in n. 1 context of วซ-tests originating from the dense graph model (Section 3). This makes use of the fact that in the dense model all (sequential) testing algorithms can be made non-adaptive, which roughly means that queries do not depend on responses to previous queries (see Section 2 for definition). In fact, such tests can be made to have a very simple structure, allowing the vertices in the distributed model to โ€œband togetherโ€ for an emulation of the test. There is only one additional technical condition (which we define below), since in the distributed model we cannot handle properties whose counter-examples can be โ€œsplitโ€ to disjoint graphs. For example, the distributed model cannot hope to handle the property of the graph having no disjoint union of two triangles, a property for which there exists a test in the dense model. Theorem 3.4 Any วซ-test in the dense graph model for a non-disjointed property that makes q queries can be converted to a distributed วซ-test that takes O(q 2 ) communication rounds. We next move away from the dense graph model to the sparse and general models, that are sometimes considered to be more realistic. In the general model, there exists no test for the property of containing no triangle that makes a number of queries independent of the number of graph vertices [2]. Here the distributed model can do better, because the reason for this deficiency is addressed by having all vertices operate concurrently. In Section 4 we adapt the interim lemmas used in the best testing algorithm constructed in [2], and construct a distributed algorithm whose number of rounds is independent of n. Theorem 4.1 Algorithm 2 is a distributed วซ-test in the general graph model for the property of containing no triangles, that requires O(วซโˆ’2 ) rounds. The sparse and general models inherently require adaptive property testing algorithms, since there is no other way to trace a path from a given vertex forward, or follow its neighborhood. Testing triangle freeness sequentially uses adaptivity only to a small degree. However, other problems in the sparse and general models, such as the one we explore next, have a high degree of adaptivity built into their sequential algorithms, and we need to take special care for emulating it in the distributed setting. In the sparse model (degrees bounded by a constant d), we adapt ideas from the bipartiteness testing algorithm of [19], in which we search for odd-length cycles. Here again the performance of a distributed algorithm surpasses that of the test (a number of rounds polylogarithmic in n vs. a โˆš number of queries which is โ„ฆ( n) โ€“ a lower bound that is given in [20]). The following is proved in Section 5. Theorem 5.2 Algorithm 4 is a distributed วซ-test in the bounded degree graph model for the property of being bipartite, that requires O(poly(วซโˆ’1 log(nวซโˆ’1 ))) rounds. In the course of proving Theorem 5.2 we develop a method that we consider to be of independent interest2 . The algorithm works by performing 2n random walks concurrently (two starting from each vertex). The parallel execution of random walks despite the congestion restriction is achieved by making sure that the walks have a uniform stationary distribution, and then showing that congestion is โ€œclose to averageโ€, which for the uniform stationary distribution is constant. In Section 6 we show a fast test for cycle-freeness. This makes use of a combinatorial lemma that we prove, about cycles that remain in the graph after removing edges independently with probability วซ/2. The following summarizes our result for testing cycle-freeness. 2 This technique was recently independently and concurrently devised in [17] for a different use. 2 Theorem 6.3 Algorithm 6 is a distributed วซ-test in the general graph model for the property of being cycle-free, that requires O(log n/วซ) rounds. We also prove lower bounds for testing bipartiteness and cycle-freeness (matching the upper bound for the latter). Roughly speaking, these are obtained by using the probabilistic method with alterations to construct graphs which are far from being bipartite or cycle-free, but all of their cycles are of length that is at least logarithmic. This technique bears some similarity to the classic result by Erdรถs [13], which showed the existence of graphs with large girth and large chromatic number. The following are given in Section 7. Theorem 7.1 Any distributed 1/100-test for the property of being bipartite requires โ„ฆ(log n) rounds of communication. Theorem 7.3 Any distributed 1/100-test for the property of being cycle-free requires โ„ฆ(log n) rounds of communication. Roadmap: The paper is organized as follows. The remainder of this section consists of related work and historical background on property testing. Section 2 contains formal definitions and some mathematical tools. The emulation of sequential tests for the dense model is given in Section 3. In Section 4 we give our distributed test for triangle-freeness. In Section 5 we provide a distributed test for bipartiteness, along with our new method of executing many random walks, and in Section 6 we give our test for cycle-freeness. Section 7 gives our logarithmic lower bounds for testing bipartiteness and cycle-freeness. We conclude with a short discussion in Section 8. 1.2 Related work The only previous work that directly relates to our distributed setting is due to Brakerski and Patt-Shamir [8]. They show a tolerant property testing algorithm for finding large (linear in size) near-cliques in the graph. An วซ-near clique is a set of vertices for which all but an วซ-fraction of the pairs of vertices have an edge between them. The algorithm is tolerant, in the sense that it finds a linear near-clique if there exists a linear วซ3 -near clique. That is, the testing algorithm considers two thresholds of being close to having the property (in this case โ€“ containing a linear size clique). We are unaware of any other work on property testing in this distributed setting. Testing in a different distributed setting was considered in Arfaoui et al. [5]. They study testing for cycle-freeness, in a setting where each vertex may collect information of its entire neighborhood up to some distance, and send a short string of bits to a central authority who then has to decide whether the graph is cycle-free or not. Related to having information being sent to, or received by, a central authority, is the concept of proof-labelling schemes, introduced by Korman et al. [27] (for extensions see, e.g., Baruch et al. [6]). In this setting, each vertex is given some external label, and by exchanging labels the vertices need to decide whether a given property of the graph holds. This is different from our setting in which no information other than vertex IDs is available. Another setting that is related to proof-labelling schemes, but differs from our model, is the prover-verifier model of Foerster et al. [15]. Sequential property testing has the goal of computing without processing the entire input. The wider family of local computation algorithms (LCA) is known to have connections with distributed computing, as shown by Parnas and Ron [30] and later used by others. A recent study by Gรถรถs et 3 al. [23] proves that under some conditions, the fact that a centralized algorithm can query distant vertices does not help with speeding up computation. However, they consider the LOCAL model, and their results apply to certain properties that are not influenced by distances. Finding induced subgraphs is a crucial task and has been studied in several different distributed models (see, e.g., [9, 11, 12, 26]). Notice that for finding subgraphs, having many instances of the desired subgraph can help speedup the computation, as in [11]. This is in contrast to algorithms that perform faster if there are no or only few instances, as explained above, which is why we test for, e.g., the property of being triangle-free, rather for the property of containing triangles. (Notice that these are not the same, and in fact every graph with 3/วซ or more vertices is วซ-close to having a triangle.) Parallelizing many random walks was addressed in [1], where the question of graph covering via random walks is discussed. It is shown there that for certain families of graphs there is a substantial speedup in the time it takes for k walks starting from the same vertex to cover the graph, as compared to a single walk. No edge congestion constraints are taken into account. โˆš In [37], it is shown how to perform,โˆš under congestion, a single random walk of length L in Oฬƒ( LD) rounds, and k random walks in Oฬƒ( kLD + k) rounds, where D is the diameter of the graph. Our method has no dependence on the diameter, allowing us to perform a multitude of short walks much faster. 1.3 Historical overview The first papers to consider the question of property testing were [7] and [35]. The original motivations for defining property testing were its connection to some Computerized Learning models, and the ability to leverage some properties to construct Probabilistically Checkable Proofs (PCPs โ€“ this is related to property testing through the areas of Locally Testable Codes and Locally Decodable Codes, LTCs and LDCs). Other motivations since then have entered the fray, and foremost among them are sublinear-time algorithms, and other big-data considerations. Since virtually no property can be decidable without reading the entire input, property testing introduces a notion of the allowable approximation to the original problem. In general, the algorithm has to distinguish inputs satisfying the property, from inputs that are วซ-far from it. For more information on the general scheme of โ€œclassicalโ€ property testing, consult the surveys [14, 21, 33]. The older of the graph testing models discussed here is the dense model, as defined in the seminal work of Goldreich, Goldwasser and Ron [18]. The dense graph model has historically kickstarted combinatorial property testing in earnest, but it has some shortcomings. Its main one is the distance function, which makes sense only if we consider graphs having many edges (hence the name โ€œdense modelโ€) โ€“ any graph with o(n2 ) edges is indistinguishable in this model from an empty graph. The stricter and at times more plausible distance function is one which is relative to the actual n number of edges, rather than the maximum 2 . The general model was defined in [2], while the sparse model was defined already in [20]. The main difference between the sparse and the general graph models is that in the former there is also a guaranteed upper bound d on the degrees of the vertices, which is given to the algorithm in advance (the query complexity may then depend on d, either explicitly, or more commonly implicitly by considering d to be a constant). 4 2 Preliminaries 2.1 Additional background on property testing While the introduction provided rough descriptions of the different property testing models, here we provide more formal definitions. The dense model for property testing is defined as follows. Definition 2.1 (dense graph model [18]). The dense graph model considers as objects graphs that are given by their adjacency matrix. Hence it is defined by the following features. โ€ข Distance: Two graphs with n vertices each are considered to be วซ-close if one can be obtained from the other by deleting and inserting at most วซn2 edges (this is, up to a constant factor, the same as the normalized Hamming distance). โ€ข Querying scheme: A single query of the algorithm consists of asking whether two vertices u, v โˆˆ V form a graph edge in E or not. โ€ข Allowable properties: All properties have to be invariant under permutations of the input that pertain to graph isomorphisms (a prerequisite for them being graph properties). The number of vertices n is given to the algorithm in advance. As discussed earlier, the sparse and general models for property testing relate the distance function to the actual number of edges in the graph. They are formally defined as follows. Definition 2.2 (sparse [20] and general [2] graph models). These two models consider as objects graphs given by their adjacency lists. They are defined by the following features. โ€ข Distance: Two graphs with n vertices and m edges (e.g. as defined by the denser of the two) are considered to be วซ-close if one can be obtained from the other by deleting and inserting at most วซ max{n, m} edges3 . โ€ข Querying scheme: A single query consists of either asking what is the degree of a vertex v, or asking what is the iโ€™th neighbor of v (the ordering of neighbors is arbitrary). โ€ข Allowable properties: All properties have to be invariant under graph isomorphisms (which here translate to a relabeling that affects both the vertex order and the neighbor ids obtained in neighbor queries), and reordering of the individual neighbor lists (as these orderings are considered arbitrary). In this paper, we mainly refer to the distance functions of these models, and less so to the querying scheme, since the latter will be replaced by the processing scheme provided by the distributed computation model. Note that most property testing models get one bit in response to a query, e.g., โ€œyes/noโ€ in response to โ€œis uv an edgeโ€ in the dense graph model. However, the sparse and general models may receive log n bits of information for one query, e.g., an id of a neighbor of a vertex. Also, the degree of a vertex, which can be given as an answer to a query in the general model, takes log n bits. Since the distributed CONGEST model allows passing a vertex id or a vertex degree along an edge in O(1) rounds, we can equally relate to all three graph models. Another important point is the difference between 1-sided and 2-sided testing algorithms, and the difference between non-adaptive and adaptive algorithms. 3 Sometimes in the sparse graph model the allowed number of changes is วซdn, as relates to the maximum possible number of edges; when d is held constant the difference is not essential. 5 Definition 2.3 (types of algorithms). A property testing algorithm is said to have 1-sided error if there is no possibility of error on accepting satisfying inputs. That is, an input that satisfies the property will be accepted with probability 1, while an input วซ-far from the property will be rejected with a probability that is high enough (traditionally this means a probability of at least 2/3). A 2-sided error algorithm is also allowed to reject satisfying inputs, as long as the probability for a correct answer is high enough (traditionally at least 2/3). A property testing algorithm is said to be non-adaptive if it decides all its queries in advance (i.e. based only on its internal coin tosses and before receiving the results of any query), while only its accept/reject output may depend on the actual input. An adaptive algorithm may make each query in turn based on the results of its previous queries (and, as before, possible internal coin tosses). In the following we address both adaptive and non-adaptive algorithms. However, we restrict ourselves to 1-sided error algorithms, since the notion of 2-sided error is not a good match for our distributed computation model. 2.2 Mathematical background An important role in our analyses is played by the Multiplicative Chernoff Bound (see, e.g., [29]), hence we state it here for completeness. Fact 2.4. Suppose that X1 , ..., Xn are independent random variables taking values in {0, 1}. Let X denote their sum and let ยต = E[X] denote its expected value. Then, for any ฮด > 0, eโˆ’ฮด )ยต , (1 โˆ’ ฮด)(1โˆ’ฮด) eฮด P r[X > (1 + ฮด)ยต] < ( )ยต . (1 + ฮด)(1+ฮด) P r[X < (1 โˆ’ ฮด)ยต] < ( Some convenient variations of the bounds above are: P r[X โ‰ฅ (1 + ฮด)ยต] < eโˆ’ฮดยต/3 , โˆ’ฮด2 ยต/3 P r[X โ‰ฅ (1 + ฮด)ยต] < e , ฮด โˆˆ (0, 1) P r[X โ‰ค (1 โˆ’ ฮด)ยต] < e , ฮด โˆˆ (0, 1). โˆ’ฮด2 ยต/2 3 ฮดโ‰ฅ1 Distributed emulation of sequential tests in the dense model We begin by showing that under a certain assumption of being non-disjointed, which we define below, a property P that has a sequential test in the dense model that requires q queries can be tested in the distributed setting within O(q 2 ) rounds. We prove this by constructing an emulation that translates sequential tests to distributed ones. For this we first introduce a definition of a witness graph and then adapt [22, Theorem 2.2], restricted to 1-sided error tests, to our terminology. Definition 3.1. Let P be a property of graphs with n vertices. Let Gโ€ฒ be a graph with k < n vertices. We say that Gโ€ฒ is a witness against P , if it is not an induced subgraph of any graph that satisfies P . 6 Notice that if Gโ€ฒ has an induced subgraph H that is a witness against P , then by the above definition Gโ€ฒ is also a witness against P . The work of [22] transforms tests of graphs in the dense model to a canonical form where the query scheme is based on vertex selection. This is useful in particular for the distributed model, where the computational work is essentially based in the vertices. We require the following special case for 1-sided error tests. Lemma 3.2 ( [22, Theorem 2.2]). Let P be a property of graphs with n vertices. If there exists a 1-sided error วซ-test for P with query complexity q(n, วซ), then there exists a 1-sided error วซ-test for P that uniformly selects a set of q โ€ฒ = 2q(n, วซ) vertices, and accepts if and only if the induced subgraph is not a witness against P . Our emulation leverages Lemma 3.2 under an assumption on the property P , which we define as follows. Definition 3.3. We say that P is a non-disjointed property if for every graph G that does not satisfy P and an induced subgraph Gโ€ฒ of G such that Gโ€ฒ is a witness against P , Gโ€ฒ has some connected component which is also a witness against P . We call such components witness components. We are now ready to formally state our main theorem for this section. Theorem 3.4. Any วซ-test in the dense graph model for a non-disjointed property that makes q queries can be converted to a distributed วซ-test that takes O(q 2 ) communication rounds. The following lemma essentially says that not satisfying a non-disjointed property cannot rely on subgraphs that are not connected, which is exactly what we need to forbid in a distributed setting. Lemma 3.5. The property P is a non-disjointed property if and only if all minimal witnesses that are induced subgraphs of G are connected. Here minimal refers to the standard terminology, which means that no proper induced subgraph is a witness against P . Proof. First, if P is non-disjointed and G does not satisfy P , then for every subgraph Gโ€ฒ of G that is a witness against P , Gโ€ฒ has a witness component. If Gโ€ฒ is minimal then it must be connected, since otherwise it contains a connected component which is a witness against P , which contradicts the minimality of G. For the other direction, if all the minimal witnesses that are induced subgraphs of G are connected, then every induced subgraph Gโ€ฒ that is a witness against P is either minimal, in which case it is connected, or is not minimal, in which case there is a subgraph H of Gโ€ฒ which is connected and a minimal witness against P . The connected component C of Gโ€ฒ which contains H is a witness against P (otherwise H is not a witness against P ), and hence it follows that P is non-disjointed. Next, we give the distributed test (Algorithm 1). The test has an outer loop in which each vertex picks itself with probability 5q/n, collects its neighborhood of a certain size of edges between picked vertices in an inner loop, and rejects if it identifies a witness against P . The outer loop repeats two times because not only does the sequential test have an error probability, but also with some 7 small probability we may randomly pick too many or not enough vertices in order to emulate it. Repeating the main loop twice reduces the error probability back to below 1/3. In the inner loop, each vertex collects its neighborhood of picked vertices and checks if its connected component is a witness against P . To limit communications this is done only for components of picked vertices that are sufficiently small: if a vertex detects that it is part of a component with too many edges then it accepts and does not participate until the next iteration of the outer loop. Algorithm 1: Emulation algorithm with input q for property P Variables: Uv edges known to v, Uvโ€ฒ edges to update and send (temporary variables) 1 perform 2 times 2 reset the state for all vertices 3 for each vertex v simultaneously 4 Vertex v picks itself with probability 5q/n 5 if v is picked then 6 Notify all neighbors that v is picked 7 Set Uvโ€ฒ = {(v, u) โˆˆ E| u is picked} and Uv = โˆ… 8 perform 10q times # At each iteration Uv is a subgraph of vโ€™s connected component 9 Uvโ€ฒ = Uvโ€ฒ \Uv # only need recently discovered edges 10 Uv = Uv โˆช Uvโ€ฒ # add them to Uv 11 if |Uv | โ‰ค 100q 2 then # donโ€™t operate if there are too many edges 12 Send Uvโ€ฒ to all picked neighbours of v # propagate known edges 13 14 15 16 17 18 19 Wait until the time bound for all other vertices to finish this iteration Set Uvโ€ฒ to the union of edge sets received from neighbors if Uv โˆช Uvโ€ฒ is a witness against P then Vertex v outputs reject (ending all operations) else Wait until the time bound for all other vertices to finish this iteration of the outermost loop Every vertex v that did not reject outputs accept To analyze the algorithm, we begin by proving that there is a constant probability for the number of picked vertices to be sufficient and not too large. Lemma 3.6. The probability that the number of vertices picked by the algorithm is between q and 10q is more than 2/3 . Proof. For every v โˆˆ V , we denote by Xv the indicator variable for the event that vertex v is picked. P Note that these are all independent random variables. Using the notation X = vโˆˆV Xv gives that E[X] = 5q, because each vertex is picked with probability 5q/n. Using the Chernoff Bound from Fact 2.4 with ฮด = 4/5 and ยต = 5q, we can bound the probability of having too few picked vertices: P r[X < q] = P r[X < (1 โˆ’ ฮด)ยต] < ( 1 5 eโˆ’4/5 )5q = ( 4 )q < . e 10 (1 โˆ’ (4/5))(1โˆ’(4/5)) 8 For bounding the probability that there are too many picked vertices, we use the other direction of the Chernoff Bound with ฮด = 1 and ยต = 5q, giving: P r[X > 10q] = P r[X > (1 + ฮด)ยต] < ( e5 q 2 e 5q ) = ( ) < . 22 210 10 Thus, with probability at least 2/3 it holds that q โ‰ค X โ‰ค 10q. Now, we can use the guarantees of the sequential test to obtain the guarantees of our algorithm. Lemma 3.7. Let P be a non-disjointed graph property. If G satisfies P then all vertices output accept in Algorithm 1. If G is วซ-far from satisfying P , then with probability at least 2/3 there exists a vertex that outputs reject. Proof. First, assume that G satisfies P . Vertex v outputs reject only if it is part of a witness against P , which is, by definition, a component that cannot be extended to some H that satisfies P . However, every component is an induced subgraph of G itself, which does satisfy P , and thus every component can be extended to G. This implies that no vertex v outputs reject. Now, assume that G is วซ-far from satisfying P . Since the sequential test rejects with probability at least 2/3, the probability that a sample of at least q vertices induces a graph that cannot be extended to a graph that satisfies P is at least 2/3 . Because P is non-disjointed, the induced subgraph must have a connected witness against P . We note that a sample of more than q vertices does not reduce the rejection probability. Hence, if we denote by A the event that the subgraph induced by the picked vertices has a connected witness against P , then P r[A] โ‰ฅ 2/3, conditioned on that at least q vertices were picked. However, a sample that is too large may cause a vertex to output accept because it cannot collect its neighborhood. We denote by B the event that the number of vertices sampled is between q and 10q, and by Lemma 3.6 its probability is at least 2/3. We bound P r[A โˆฉ B] using Bayesโ€™ Theorem, obtaining P r[A โˆฉ B] = P r[A|B]P r[B] โ‰ฅ (2/3)2 . Since the outer loop consists of 2 independent iterations, this gives a probability of at least 1 โˆ’ (1 โˆ’ 4/9)2 โ‰ฅ 2/3 for having a vertex that outputs reject. We now address the round complexity. Each vertex only sends and receives information from its q-neighborhood about edges between the chosen vertices. If too many vertices are chosen we detect this and accept. Otherwise we only communicate the chosen vertices and their edges, which requires O(q 2 ) communication rounds using standard pipelining 4 . Together with Lemma 3.7, this proves Theorem 3.4. 3.1 Applications: k-colorability and perfect graphs Next, we provide some examples of usage of Theorem 3.4. A result by Alon and Shapira [4] states that all graph properties closed under induced subgraphs are testable in a number of queries that depends only on วซโˆ’1 . We note that, except for certain specific properties for which there are ad-hoc proofs, the dependence is usually a tower function in วซโˆ’1 or worse (asymptotically larger). From this, together with Lemma 3.2 and Theorem 3.4, we deduce that if P is a non-disjointed property closed under induced subgraphs, then it is testable, for every fixed วซ, in a constant number of communication rounds. 4 Pipelining means that each vertex has a buffer for each edge, which holds the information (edges between chosen vertices, in our case) it needs to send over that edge. The vertex sends the pieces of information one after the other. 9 Example โ€“ k-colorability: The property of being k-colorable is testable in a distributed manner by our algorithm. All minimal graphs that are witnesses against P (not k-colorable) are connected, and therefore according to Lemma 3.5 it is a non-disjointed property. It is closed under induced subgraphs, and by [3] there exists a 1-sided error วซ-test for k-colorability that uniformly picks O(k log(k)/วซ2 ) vertices, and its number of queries is the square of this expression (note that the polynomial dependency was already known by [18]). Our emulation implies a distributed 1-sided error วซ-test for k-colorability that requires O(poly(kวซโˆ’1 )) rounds. Example โ€“ perfect graphs: A graph G is said to be perfect if for every induced subgraph Gโ€ฒ of G, the chromatic number of Gโ€ฒ equals the size of the largest clique in Gโ€ฒ . Another characterization of a perfect graph is via forbidden subgraphs: a graph is perfect if and only if it does not have odd holes (induced cycles of odd length at least 5) or odd anti-holes (the complement graph of an odd hole) [10]. Both odd holes and odd anti-holes are connected graphs. Since these are all minimal witnesses against the property, according to Lemma 3.5 it is a non-disjointed property. Using the result of Alon-Shapira [4] we know that the property of a graph being perfect is testable. Our emulation implies a distributed 1-sided error วซ-test for being a perfect graph that requires a number of rounds that depends only on วซ. 4 Distributed test for triangle-freeness In this section we show a distributed วซ-test for triangle-freeness. Notice that since triangle-freeness is a non-disjointed property, Theorem 3.4 gives a distributed วซ-test for triangle-freeness under the dense model with a number of rounds that is O(q 2 ), where q is the number of queries required for a sequential วซ-test for triangle-freeness. However, for triangle-freeness, the known number of queries is a tower function in log(1/วซ) [16]. Here we leverage the inherent parallelism that we can obtain when checking the neighbors of a vertex, and show a test for triangle-freeness that requires only O(วซโˆ’2 ) rounds (Algorithm 2). Importantly, our algorithm works not only for the dense graph model, but for the general graph model (where distances are relative to the actual number of edges), which subsumes it. In the sequential setting, a test for triangle-freeness in the general model requires a number of queries that is some constant power of n by [2]. Our proof actually follows the groundwork laid in [2] for the general graph model โ€“ their algorithm picks a vertex and checks two of its neighbors for being connected, while we perform the check for all vertices in parallel. Theorem 4.1. Algorithm 2 is a distributed วซ-test in the general graph model for the property of containing no triangles, that requires O(วซโˆ’2 ) rounds. Our line of proof follows that of [2], by distinguishing edges that connect two high-degree vertices โˆš โˆ’1 from those that do not. Formally, let b = 2 วซ m, where m is the number of edges in the graph, and denote B = {v โˆˆ V | deg(v) โ‰ฅ b}. We say that an edge e = (u, v) is light if v 6โˆˆ B or u 6โˆˆ B, and otherwise, we say that it is heavy. That is, the set of heavy edges is H = {(u, v) โˆˆ E | u โˆˆ B, v โˆˆ B}. We begin with the following simple claim about the number of heavy edges. Claim 4.2. The number of heavy edges, |H|, is at most วซm/2. Proof. The number of heavy edges is |H| โ‰ค |B|(|B| โˆ’ 1)/2 < |B|2 /2. Since |B|b โ‰ค 2m, we get that โˆš โˆš2m = วซm. This gives that |H| โ‰ค 21 |B|2 โ‰ค วซm/2. |B| โ‰ค 2m โˆ’1 b = 2 วซ m 10 Algorithm 2: Triangle freeness test 1 2 3 4 5 6 7 8 9 10 11 12 for each vertex v simultaneously perform 32วซโˆ’2 times Pick w1 , w2 โˆˆ N (v), w1 6= w2 uniformly at random Send w2 to w1 # Ask w1 if it is a neighbor of w2 foreach wu sent by u โˆˆ N (v) do # Asked by u if v is a neighbor of w if wu โˆˆ N (v) then Send โ€œyesโ€ to u else Send โ€œnoโ€ to u if received โ€œyesโ€ from w1 then reject (ending all operations) accept (for vertices that did not reject) Next, we fix an iteration i of the algorithm. Every vertex v chooses two neighbors w1 , w2 . Let A = {(v, w1 ) โˆˆ E | v โˆˆ V \ B}, where w1 is the first of the two vertices chosen by the low-degree vertex v. Let T = {e โˆˆ E | e is a light edge in a triangle}, and let AT = T โˆฉ A. We say that an edge (v, w1 ) โˆˆ AT is matched if (v, w2 ) is in the same triangle as (v, w1 ). If (v, w1 ) โˆˆ AT is matched then {v, w1 , w2 } is a triangle that is detected by v. We begin with the following lemma that states that if G is วซ-far from being triangle-free, then in any iteration i we can bound the expected number of matched edges from below by วซ2 /8. Let Y be the number of matched edges. Lemma 4.3. The expected number of matched edges by a single iteration of the algorithm, E[Y ], is greater than วซ2 /8. Proof. For every e โˆˆ AT , let Ye be a random variable indicating whether e is matched. Then P Y = eโˆˆAT Ye , giving the following bound: E[Y |AT ] = E[ X eโˆˆAT Ye |AT ] = X eโˆˆAT P r[e is matched] โ‰ฅ |AT |/b, (1) where the last inequality follows because a light edge in AT is chosen by a vertex with degree at most b, hence the third triangle vertex gets picked with probability at least 1/b. Next, we argue that E[|AT |] โ‰ฅ |T |/b. To see why, for every edge e, let Xe be a random variable P indicating whether e โˆˆ A. Let X = eโˆˆT Xe = |AT |. Then, E[|AT |] = E[X] = E[ X eโˆˆT Xe ] = X eโˆˆT E[Xe ] = X eโˆˆT P r[e โˆˆ A] โ‰ฅ |T |/b, (2) where the last inequality follows because a light edge has at least one endpoint with degree at most b. Hence, this edge gets picked by it with probability at least 1/b. It remains to bound |T | from below, for which we claim that |T | โ‰ฅ วซm/2. To prove this, first notice that, since G is วซ-far from being triangle free, it has at least วซm triangle edges, since otherwise 11 we can just remove all of them and make the graph triangle free with less than วซm edge changes. By Claim 4.2, the number of heavy edges satisfies |H| โ‰ค วซ/2m. Subtracting this from the number of triangle edges gives that at least วซm/2 edges are light triangle edges, i.e., |T | โ‰ฅ วซm/2. (3) Finally, by Inequalities (1), (2) and (3), using iterated expectation we get: E[Y ] = EAT [E[Y |AT ]] โ‰ฅ E[ |T | วซm 1 |AT | ]โ‰ฅ 2 โ‰ฅ = วซ2 /8. b b 2 4วซโˆ’1 m We can now prove the correctness of our algorithm, as follows. Lemma 4.4. If G is triangle-free then all vertices output accept in Algorithm 2. If G is วซ-far from being triangle-free, then with probability at least 2/3 there exists a vertex that outputs reject. Proof. If G is triangle free then in each iteration v receives โ€œnoโ€ from w1 and after all iterations it returns accept. Assume that G is วซ-far from being triangle-free. Let Zi,v be an indicator variable for the event that vertex v detects a triangle at iteration i. First, we note that the indicators are independent, since a vertex detecting a triangle does not affect the chance of another vertex detecting a triangle (note that the graph is fixed), and the iterations are done independently. Now, let P โˆ’2 P number of detections over all iterations. Z = 32วซ i=1 vโˆˆV Zi,v , and notice that Z is the total P Lemma 4.3 implies that for a fixed i, it holds that E[ vโˆˆV Zi,v ] = E[Y ] โ‰ฅ วซ2 /8, which sums to: ๏ฃฎ โˆ’2 32วซ X E[Z] = E ๏ฃฐ X i=1 vโˆˆV ๏ฃน Zi,v ๏ฃป = โˆ’2 32วซ X i=1 E " X v # Zi,v โ‰ฅ โˆ’2 32วซ X วซ2 /8 = 4. i=1 Using the Chernoff Bound from Fact 2.4 with ฮด = 3/4 and ยต โ‰ฅ 4 gives P r[Z < 1] โ‰ค P r[Z < (1 โˆ’ ฮด)ยต] < ( eโˆ’3/4 )4 = 4/e3 < 2/3, (1 โˆ’ (3/4))(1โˆ’(3/4)) and hence with probability at least 2/3 at least one triangle is detected and the associated vertex outputs reject, which completes the proof. In every iteration, each vertex initiates only two messages of size O(log n) bits, one sent to w1 and one sent back by w1 . Since there are O(วซโˆ’2 ) iterations, this implies that the number of rounds is O(วซโˆ’2 ) as well. This, together with Lemma 4.4, completes the proof of Theorem 4.1. 5 Distributed bipartiteness test for bounded degree graphs In this section we show a distributed วซ-test for being bipartite for graphs with degrees bounded by d. Our test builds upon the sequential test of [19] and, as in the case of triangle freeness, takes advantage of the ability to parallelize queries. While the number of queries of the sequential test is 12 โˆš โ„ฆ( n) [20], the number of rounds in the distributed test is only polylogarithmic in n and polynomial in วซโˆ’1 . As in [19], we assume that d is a constant, and omit it from our expressions (it is implicit in the O notation for L below). Let us first outline the algorithm of [19], since our distributed test borrows from its framework and our analysis is in part derived from it. The sequential test basically tries to detect odd cycles. It consists of T iterations, in each of which a vertex s is selected uniformly at random and K random walks of length L are performed starting from the source s. If, in any iteration with a chosen source s, there is a vertex v which is reached by an even prefix of a random walk and an odd prefix of a random walk (possibly the same walk), then the algorithm rejects, as this indicates the existence of an odd cycle. Otherwise, the algorithm accepts. To obtain an วซ-test the parameters โˆš are chosen to be T = O(วซโˆ’1 ), K = O(วซโˆ’4 n log1/2 (nวซโˆ’1 )), and L = O(วซโˆ’8 log6 n). The main approach of our distributed test is similar, except that a key ingredient is that we can afford to perform much fewer random walks from every vertex, namely O(poly(วซโˆ’1 log nวซโˆ’1 )). This is because we can run random walks in parallel originating from all vertices at once. However, a crucial challenge that we need to address is that several random walks may collide on an edge, violating its congestion bound. To address this issue, our central observation is that lazy random walks (chosen to have a uniform stationary distribution) provide for a very low probability of having too many of these collisions at once. The main part of the analysis is in showing that with high probability there will never be too many walks concurrently in the same vertex, so we can comply with the congestion bound. We begin by formally defining the lazy random walks that we use. Definition 5.1. A lazy random walk over a graph G with degree bound d is a random walk, that is, a (memory-less) sequence of random variables Y1 , Y2 , . . . taking values from the vertex set V , where the transition probability P r[Yk = v|Ykโˆ’1 = u] is 1/2d if uv is an edge of G, 1 โˆ’ deg(u)/2d if u = v, and 0 in all other cases. The stationary distribution for the lazy random walk of Definition 5.1 is uniform [34, Section 8]. Next, we describe a procedure to handle one iteration of moving the random walks (Algorithm 3), followed by our distributed test for bipartiteness using lazy random walks from every vertex concurrently (Algorithm 4). It is quite immediate that Algorithm 3 takes O(ฮพ) communication rounds. Our main result here is that Algorithm 4 is indeed a distributed วซ-test for bipartiteness. Theorem 5.2. Algorithm 4 is a distributed วซ-test in the bounded degree graph model for the property of being bipartite, that requires O(poly(วซโˆ’1 log(nวซโˆ’1 ))) rounds. The number of communication rounds is immediate from the algorithm โ€“ it is dominated by the L calls to Algorithm 3, making a total of O(ฮพL) rounds, which is indeed O(poly(วซโˆ’1 log(nวซโˆ’1 ))). To prove the rest of Theorem 5.2 we need some notation, and a lemma from [19] that bounds from below the probabilities for detecting odd cycles if G is วซ-far from being bipartite. Given a source s, if there is a vertex v which is reached by an even prefix of a random walk wi from s and an odd prefix of a random walk wj from s, we say that walks wi and wj detect a violation. Let ps (k, โ„“) be the probability that, out of k random walks of length โ„“ starting from s, there are two that detect a violation. Using this notation, ps (K, L) is the probability that the sequential algorithm outlined in the beginning rejects in an iteration in which s is chosen. Since we are only interested in walks of length L, we denote ps (k) = ps (k, L). A good vertex is a vertex for which this probability is bounded as follows. 13 Algorithm 3: Move random walks once with input ฮพ Variables: Wv walks residing in v (multiset), Hv history of walks through v Input: ฮพ, the maximum congestion per vertex allowed # each walk is characterized by (i, u) where i is the number of actual moves and u is the origin vertex 1 for each vertex v simultaneously 2 if |Wv | โ‰ค ฮพ then # give up if exceeded the maximum allowed 3 for every (i, u) in Wv do 4 draw next destination w (according to the lazy walk scheme) 5 if w 6= v then # walk exits v 6 send (i + 1, u) to w 7 remove (i, u) from Wv 8 9 wait until the maximum time for all other vertices to process up to ฮพ walks add the walks received by v to Wv and Hv # walks entering v Algorithm 4: Distributed bipartiteness test Variables: Wv walks residing in v (multiset), Hv history of walks through v 1 perform ฮท = O(วซโˆ’9 log(nวซโˆ’1 )) times 2 for each vertex v simultaneously 3 initialize Hv and Wv with two copies of the walk (0, v) 4 5 6 7 8 9 perform L = O(วซโˆ’8 log6 n) times move walks using Algorithm 3 with input ฮพ = ฮณ + 2 = 3(2 ln n + ln L) + 2 for each vertex v simultaneously if Hv contains (i, u) and (j, u) for some u, even i and odd j then reject (ending all operations) # odd cycle found accept (for vertices that did not reject) Definition 5.3. A vertex s is called good if ps (K) โ‰ฅ 1/10. In [19] it was proved that being far from bipartite implies having many good vertices. Lemma 5.4 ( [19]). If G is วซ-far from being bipartite then at least an วซ/16-fraction of the vertices are good. In contrast to [19], we do not perform K random walks from every vertex in each iteration, but rather only 2. Hence, what we need for our analysis is a bound on ps (2). To this end, we use K as a parameter, and express ps (2) in terms of K and ps (K). Lemma 5.5. For every vertex s, ps (2) โ‰ฅ 2ps (K)/K(K โˆ’ 1). Proof. Fix a source vertex s. For every i, j โˆˆ [K], let qi,j be the probability of walks wi , wj from s detecting a violation. Because different walks are independent, we conclude that for every i 6= j it 14 holds that qi,j = ps (2). Let Ai,j be the event of walks wi , wj detecting a violation. We have ps (K) = P r[โˆชi,j Ai,j ] โ‰ค X i,j P r[Ai,j ] = ps (2)K(K โˆ’ 1)/2, which implies that ps (2) โ‰ฅ 2ps (K)/K(K โˆ’ 1). Using this relationship between ps (2) and K and ps (K), we prove that our algorithm is an วซ-test. First we prove this for the random walks themselves, ignoring the possibility that Algorithm 3 will skip moving random walks due to its condition in Line 2. Lemma 5.6. If G is วซ-far from being bipartite, and we perform ฮท iterations of starting 2 random walks of length L from every vertex, then the probability that no violation is detected is bounded by 1/4. Proof. Assume that G is วซ-far from being bipartite. By Lemma 5.4, at least nวซ/16 vertices are P good, which means that for each of these vertices s, ps (K) โ‰ฅ 1/10. This implies that sโˆˆV ps (K) โ‰ฅ nวซ/160. Now, let Xi,s be a random variable indicating whether there are two random walks starting P P at s that detect a violation. Let X = ฮทi=0 sโˆˆV Xi,s . We prove that P r[X < 1] < 1/4. First, we P bound E[ sโˆˆV Xi,s ] for some fixed i: E[X] = E " ฮท XX i=0 sโˆˆV = ฮท X X i=0 sโˆˆV = = # Xi,s = ps (2) โ‰ฅ ฮท X X E[Xi,s ] i=0 sโˆˆV ฮท X X i=0 sโˆˆV ฮท X X 2ps (K) K(K โˆ’ 1) ฮท X nวซ 2 2 ps (K) โ‰ฅ K(K โˆ’ 1) i=0 sโˆˆV K(K โˆ’ 1) i=0 160 ฮทnวซ ฮทnวซ โ‰ฅ . 80K(K โˆ’ 1) 80K 2 For ฮท = 320K 2 /nวซ = O(วซโˆ’9 log(nวซโˆ’1 )) it holds that E[X] โ‰ฅ 4. Using the Chernoff Bound of Fact 2.4 with ฮด = 3/4 and ยต โ‰ฅ 4 gives: P r[X < 1] โ‰ค P r[X < (1 โˆ’ ฮด)ยต] < ( eโˆ’3/4 4 )4 = 3 < 1/4, (1โˆ’(3/4)) e (1 โˆ’ (3/4)) which completes the proof. As explained earlier, the main hurdle on the road to prove Theorem 5.2 is in proving that the allowed congestion will not be exceeded. We prove the following general claim about the probability for k lazy random walks of length โ„“ from each vertex to exceed a maximum congestion factor of ฮพ walks allowed in each vertex at the beginning of each iteration. Here, an iteration is a sequence of rounds in which all walks are advanced by one step (whether or not they actually switch vertices). Lemma 5.7. With probability at least 1 โˆ’ 1/n, running k lazy random walks of length โ„“ originating from every vertex will not exceed the maximum congestion factor of ฮพ = ฮณ + k = 3(2 ln n + ln โ„“) + k walks allowed in each vertex at the beginning of each iteration, if ฮณ > k. 15 We show below that plugging k = 2, โ„“ = L and ฮณ = 3(2 ln n + ln L) in Lemma 5.7, together with Lemma 5.6, gives the correctness of Algorithm 4. To prove Lemma 5.7, we argue that it is unlikely for any vertex to have more than k + ฮณ walks in any iteration. Given that this is indeed the case in every iteration, the lemma follows by a union bound. We denote by Xv,i the random variable whose value is the number of random walks at vertex v at the beginning of the i-th iteration. That is, it is equal to the size of the set Wv in the description of the algorithm. Lemma 5.8. For every vertex v โˆˆ V and every iteration i it holds that E[Xv,i ] = k. Proof. Let us first define random variables for our walks. Enumerating our kn walks (k from each of the n vertices) arbitrarily, let Y1r , Y2r , . . . denote the sequence corresponding to the rโ€™th walk, that is, Yir is the vertex where the rโ€™th walk is stationed at the beginning of the iโ€™th iteration. In particular, Xv,i = |{r : Yir = v}|. Now let us define new random variables Zit in the following manner: First, we choose uniformly ฯƒ(t) for all 1 โ‰ค i โ‰ค โ„“ and 1 โ‰ค t โ‰ค kn. at random a permutation ฯƒ : [rk] โ†’ [rk]. Then we set Zit = Yi t t The main thing to note is that for any fixed t, Z1 , Z2 , . . . is a random walk (as it is equal to one of the random walks Y1r , Y2r , . . .). But also, for every t, Z1t is uniformly distributed over the vertex set of G, because we started with exactly k random walks from every vertex. Additionally, since the uniform distribution is stationary for our lazy walks, this means that the unconditional distribution of each Zit is also uniform. ฯƒ(t) = v}| = |{t : Now, since ฯƒ is a permutation, it holds that Xv,i = |{r : Yir = v}| = |{t : Yi P kn t t Zi = v}|. The expectation (by linearity of expectation) is thus E[Xv,i ] = t=1 P r[Zi = v] = k. We can now prove Lemma 5.7. Proof of Lemma 5.7. We first claim that for every iteration i โˆˆ [โ„“] and every vertex v โˆˆ V , with probability at least 1 โˆ’ 1/โ„“n it holds that Xv,i โ‰ค k + ฮณ. To show this, first fix some v โˆˆ V . Let Zj,i be the indicator variable for the event of walk wj residing at vertex v at the beginning of iteration i, P where j โˆˆ [kn]. Then Xv,i = kn j=1 Zj,i , and the variables Zj,i , where j โˆˆ [kn], are all independent. We use the Chernoff Bound of Fact 2.4 with ฮด = ฮณ/k โ‰ฅ 1 and ยต = k as proven in Lemma 5.8, obtaining: P r[Xv,i > k + ฮณ] = P r[Xv,i > (ฮณ/k + 1)k] < eโˆ’ฮดยต/3 = eโˆ’ฮณ/3 = eโˆ’(2 ln n+ln โ„“) = 1/โ„“n2 . Applying the union bound over all vertices v โˆˆ V and all iterations i โˆˆ [โ„“], we obtain that with probability at least 1 โˆ’ 1/n it holds that Xv,i โ‰ค k + ฮณ for all v and i. Lemma 5.9. If G is bipartite then all vertices output accept in Algorithm 4. If G is วซ-far from being bipartite, then with probability at least 2/3 there exists a vertex that outputs reject. Proof. If G is bipartite then all vertices output accept in Algorithm 4, because there are no odd cycles and thus no violation detecting walks. If G is วซ-far from bipartite, we use Lemma 5.6, in conjunction with Lemma 5.7 with parameters k = 2, โ„“ = L and ฮณ = 3(2 ln n + ln L) as used by Algorithm 4. By a union bound the probability to accept G will be bounded by 1/4 + 1/n < 1/3 (assuming n > 12), providing for the required bound on the rejection probability. Lemma 5.9, with the communication complexity analysis of Algorithm 4, gives Theorem 5.2. 16 6 Distributed test for cycle-freeness In this section, we give a distributed algorithm to test if a graph G with m edges is cycle-free or if at least วซm edges have to be removed to make it so. Intuitively, in order to search for cycles, one can run a breadth-first search (BFS) and have a vertex output reject if two different paths reach it. The downside of this exact solution is that its running time depends on the diameter of the graph. To overcome this, a basic approach would be to run a BFS from each vertex of the graph, but for shorter distances. However, running multiple BFSs simultaneously is expensive, due to the congestion on the edges. Instead, we use a simple prioritization rule that drops BFS constructions with lower priority, which makes sure that one BFS remains alive.5 Instead, our technique consists of three parts. First, we make the graph G sparser, by removing each of its edges independently with probability วซ/2. We denote the sampled graph by Gโ€ฒ and prove that if G is far from being cycle-free then so is Gโ€ฒ , and in particular, Gโ€ฒ contains a cycle. Then, we run a partial BFS over Gโ€ฒ from each vertex, while prioritizing by ids: each vertex keeps only the BFS that originates in the vertex with the largest id and drops the rest of the BFSs. The length of this procedure is according to a threshold T = 20 log n/วซ. This gives detection of a cycle that is contained in a component of Gโ€ฒ with a low diameter of up to T , if such a cycle exists, since a surviving BFS covers the component. Such a cycle is also a cycle in G. If no such cycle exists in Gโ€ฒ , then Gโ€ฒ has a some component with diameter larger than T . For large components, we take each surviving BFS that reached some vertex v at a certain distance โ„“, and from v we run a new partial BFS in the original graph G. These BFSs are again prioritized, this time according to the distance โ„“. Our main tool here is proving a claim that says that with high probability, if there is a shortest path in Gโ€ฒ of length T /2 between two vertices, then there is a cycle in G between them of length at most T . This allows our BFSs on G to find such a cycle. We start with the following combinatorial lemma that shows the above claim. Lemma 6.1. Given a graph G, let Gโ€ฒ be obtained by deleting each edge in G with probability วซ/2, independently of other edges. Then, with probability at least 1 โˆ’ 1/n3 , every vertex v โˆˆ Gโ€ฒ that has a vertex w โˆˆ Gโ€ฒ at a distance 10 log n/วซ, has a closed path passing through it in G, that contains a simple cycle, of length at most 20 log n/วซ. Proof. First, we show that for every pair u, v of vertices in G that are at a distance of โ„“ = 10 log n/วซ, one of the shortest paths between u and v is removed in the graph Gโ€ฒ with high probability. For a pair of vertices u and v at a distance โ„“ in G, the probability that a shortest path is not removed is (1 โˆ’ วซ/2)โ„“ , which is at most 1/n5 . Therefore, by a union bound over all pairs of vertices, with probability at least 1 โˆ’ 1/n3 , at least one edge is removed from at least one shortest path between every pair of vertices that are at a distance of 10 log n/วซ. Conditioned on this, we prove the lemma. Now, suppose that v and w are two vertices in Gโ€ฒ at a distance of 10 log n/วซ. Let P โ€ฒ be this shortest path in Gโ€ฒ . Suppose P is the shortest path between v and w in G. If |P | < 10 log n/วซ, then this path is no longer present in Gโ€ฒ (and thus distinct from P โ€ฒ ) and P โˆช P โ€ฒ is a closed path in G, passing through v that has a simple cycle of length at most 20 log n/วซ. If |P | = 10 log n/วซ, then there are at least two shortest paths between v and w in G of length 10 log n/วซ, the one in Gโ€ฒ and 5 A more involved analysis of multiple prioritized BFS executions was used in [25], allowing all BFS executions to fully finish in a short time without too much delay due to congestion. Since we require a much weaker guarantee, we can avoid the strong full-fledged prioritization algorithm of [25] and settle for a simple rule that keeps one BFS tree alive. Also, the multiple BFS construction of [28] does not fit our demands as it may not reach all desired vertices within the required distance, in case there are many vertices that are closer. 17 one that was removed, which we choose for P . Therefore, P โˆช P โ€ฒ is a closed path passing through v of length at most 20 log n/วซ, and hence contains a simple cycle of length at most 20 log n/วซ in it. Next, we prove that indeed there is a high probability that Gโ€ฒ contains a cycle if G is far from being cycle-free. Claim 6.2. If G is วซ-far from being cycle-free, then with probability at least 1 โˆ’ eโˆ’วซ วซ/4-far from being cycle-free. 2 m/32 , Gโ€ฒ is Proof. The graph Gโ€ฒ is obtained from G by deleting each edge with probability วซ/2 independently of other edges. The expected number of edges that are deleted is วซm/2. Therefore, by the Chernoff Bound from Fact 2.4, the probability that at least 3วซm/4 edges are deleted is at most exp(โˆ’วซ2 m/32), and the claim follows. We now describe a multiple-BFS algorithm that takes as input a length t and a priority condition P over vertices, and starts performing a BFS from each vertex of the graph. This is done for t steps, in each of which a vertex keeps only the BFS with the highest priority while dropping the rest. Each vertex also maintains a list Lv of BFSs that have passed through it. The list Lv is a list of 3-tuples (idu , โ„“, idp ), where idu is the id of the root of the BFS, โ„“ is the depth of v in this BFS tree and idp is the id of the parent of v in the BFS tree. Initially, each vertex v sets Lv to include a BFS starting from itself, and then continues this BFS by sending the tuple (idv , 1, idv ) to all its neighbors, where idv is the identifier of the vertex v. In an intermediate step, each vertex v may receive a BFS tuple from each of its neighbors. The vertex v then adds these BFS tuples to the list Lv and chooses one among Lv according to the priority condition P, proceeding with the respective BFS and discontinuing the rest. Even when a BFS is discontinued, the information that the BFS reached v is stored in the list Lv . Algorithm 5 gives a formal description of the breadth-first search that we use in the testing algorithm for cycle-freeness. Algorithm 5: BFS with a priority condition Input: Length L, Priority condition P Variables: Lv list of BFS tuples passing through v 1 for each vertex v simultaneously 2 Initialize Lv to {(idv , 0, idv )}. 3 Send (idv , 1, idv ) to all neighbors of v. 4 5 6 7 8 9 perform L times times for each vertex v simultaneously if v receives (idu1 , โ„“1 , idp1 ), . . . , (idur , โ„“r , idpr ) from its neighbors then Add (idu1 , โ„“1 , idp1 ), . . . , (idur , โ„“r , idpr ) to Lv . Select (iduj , โ„“j , idpj ) from Lv according to P over idui Send (iduj , โ„“j + 1, idv ) to all neighbors of v except pj . We now give more informal details of the test for cycle-freeness. By Lemma 6.1, we know that if there is a vertex v in Gโ€ฒ that has a vertex w at a distance of T /2 = 10 log n/วซ, then there is a closed 18 path in G starting from v that contains a cycle of length 20 log n/วซ. In the first part, each vertex gets its name as its vertex id, and performs a BFS on the graph Gโ€ฒ in the hope of finding a cycle. The BFS is performed using Algorithm 5, where the priority condition in the intermediate steps is selecting the BFS with the lowest origin id. If the cycle is present in a component of diameter at most 20 log n/วซ in Gโ€ฒ , then it is discovered during this BFS. To check if there is a cycle, one needs to find if there are appropriate tuples (idu , โ„“, idp ) and (idu , โ„“โ€ฒ , idpโ€ฒ ) in Lv , for some vertex v. If no cycle is discovered in this step, then we change the ids of the vertices in the following way: The id of each vertex v is now a tuple (โ„“, v) where โ„“ is the largest depth at which v occurs in a BFS tree among all the breadth-first searches that reached v. We perform a BFS in G using Algorithm 5, where the priority condition is to pick the BFS whose root has the lexicographically highest id. If there is some vertex with โ„“ โ‰ฅ 10 log n/วซ, then the highest priority vertex is such a vertex, and by Lemma 6.1, the BFS starting from that vertex will detect a cycle in G. Algorithm 6 gives a formal description of the tester for cycle-freeness. Algorithm 6: Cycle-freeness test Variables: Lv list of BFS tuples passing through v, vertex identifier idv # Construct Gโ€ฒ by deleting edges with probability วซ/2. 1 for each vertex v simultaneously 2 For each neighbor u < v, mark the edge e = (u, v) โˆˆ G with probability วซ/2 for deletion. 3 Send each marked edge e = (u, v) to its corresponding u. 4 Set idv = v. 5 6 7 8 9 10 11 12 13 14 15 16 17 for each vertex v simultaneously Delete all edges incident on v that have been marked for deletion. # Search for cycles in small diameter components. use Algorithm 5 to perform BFS on Gโ€ฒ for 20 log n/วซ steps, with the priority condition being choosing the BFS with the lowest root id. for each vertex v simultaneously If Lv contains two tuples (idu , โ„“, idp ) and (idu , โ„“โ€ฒ , idpโ€ฒ ), output reject. Set idv = (โ„“j , v) where โ„“j is the highest among all tuples (idui , โ„“i , idpi ) in Lv . use Algorithm 5 to perform BFS on G for 10 log n/วซ steps, with the priority condition being choosing the BFS with the lexicographically highest root id. for each vertex v โˆˆ G simultaneously If Lv contains two tuples (idu , โ„“j , idp ) and (idu , โ„“โ€ฒ , idpโ€ฒ ), output reject. for each vertex v โˆˆ G simultaneously output accept, if v did not output reject yet. We now prove the correctness of the algorithm. Theorem 6.3. Algorithm 6 is a distributed วซ-test in the general graph model for the property of being cycle-free, that requires O(log n/วซ) rounds. Proof. Notice that a vertex in Algorithm 6 outputs reject only when it detects a cycle. Therefore, if G is cycle-free, then every vertex outputs accept with probability 1. 19 Suppose that G is วซ-far from being cycle-free. Notice that, with probability at least 1 โˆ’ 1/n3 , the assertion of Lemma 6.1 holds. Furthermore, from Claim 6.2, we know that Gโ€ฒ is วซ/4-far from 2 being cycle-free, with probability 1 โˆ’ eโˆ’วซ m/32 , and hence contains at least one cycle. This cycle could be in a component of diameter less than 20 log n/วซ or it could be in a component of diameter at least 20 log n/วซ in Gโ€ฒ . We analyse the two cases separately. Suppose there is a cycle in a component C of Gโ€ฒ of diameter at most 20 log n/วซ. Let u be the vertex with the smallest id in C. In Algorithm 6, the BFS starting at u is always propagated at any intermediate vertex due to the priority condition. Furthermore, since the diameter of C is at most 20 log n/วซ, this BFS reaches all vertices of C. Hence, this BFS detects the cycle and at least one vertex in C outputs reject. On the other hand, if the cycle is present in a component in G of diameter at least 20 log n/วซ, then after Step 11 of the algorithm, each vertex v gets the length of the longest path from the origin, among all the BFSs that reached v, as the first component of its id. The vertex v that gets the lexicographically highest id in the component has a vertex w that is at least 10 log n/วซ away in Gโ€ฒ , since the radius of the component is at least half the diameter. Therefore, by Lemma 6.1, it is part of a cycle of length at most 20 log n/วซ in G. Hence, the vertex with the highest priority in the BFS on G is a vertex u that has a vertex at a distance of at least 10 log n/วซ in Gโ€ฒ , and there is a walk through u that contain a simple cycle of length at most 20 log n/วซ. At least one vertex on this simple cycle will output reject when Algorithm 6 is run on G. The number of rounds is O(log n/วซ) since Algorithm 6 performs two breadth-first searches in the graph with this number of rounds. 7 Lower bounds for testing bipartiteness and cycle-freeness In this section, we prove that any distributed algorithm for วซ-testing bipartiteness or cycle-freeness in bounded-degree graphs requires โ„ฆ(log n) rounds of communication6 . We construct boundeddegree graphs that are วซ-far from being bipartite, such that all cycles are of length โ„ฆ(log n). We argue that any distributed algorithm that runs in O(log n) rounds does not detect a witness for nonbipartiteness. We also show that the same construction proves that every distributed algorithm for วซ-testing cycle-freeness requires โ„ฆ(log n) rounds of communication. Formally, we prove the following theorem. Theorem 7.1. Any distributed 1/100-test for the property of being bipartite requires โ„ฆ(log n) rounds of communication. To prove Theorem 7.1, we show the existence of a graph Gโ€ฒ that is far from being bipartite, but all of its cycles are at least of logarithmic length. Since in T rounds of a distributed algorithm, the output of every vertex cannot depend on vertices that are at distance greater than T from it, no vertex can detect a cycle in Gโ€ฒ in less than O(log n) rounds, which proves Theorem 7.1. To prove the existence of Gโ€ฒ we use the probabilistic method with alterations, and prove the following. Lemma 7.2. Let G be a random graph on n vertices where each edge is present with probability 1000/n. Let Gโ€ฒ be obtained by removing all edges incident with vertices of degree greater than 2000, and one edge from each cycle of length at most log n/ log 1000. Then with probability at least 1/2 โˆ’ eโˆ’100 โˆ’ eโˆ’n , Gโ€ฒ is 1/100-far from being bipartite. 6 Our lower bound applies even to the less restricted LOCAL model of communication, which does not limit the size of the messages. 20 Since a graph that is วซ-far from being bipartite is also วซ-far from being cycle-free, we immediately obtain the same lower bound for testing cycle-freeness, as follows. Theorem 7.3. Any distributed 1/100-test for the property of being cycle-free requires โ„ฆ(log n) rounds of communication. The rest of this section is devoted to proving Lemma 7.2. We need to show three properties of (a) that it is far from being bipartite, (b) that it does not have small cycles, and (c) that its maximum degree is bounded. We begin with the following definition, which is similar in spirit to being far from satisfying a property and which will assist us in our proof. Gโ€ฒ : Definition 7.4. A graph G is k-removed from being bipartite if at least k edges have to be removed from G to make it bipartite. Note that a graph G with maximum degree d, is ฮต-far from being bipartite if it is ฮตdn-removed from being bipartite. Let G be a random graph on n vertices where for each pair of vertices, an edge is present with probability 1000/n. The expected number of edges in the graph is 500(n โˆ’ 1). Since the edges are sampled independently with probability 1000/n, by the Chernoff Bound from Fact 2.4, with probability at least 1 โˆ’ eโˆ’10n the graph has at least 400n edges. We now show that G is far from being bipartite, with high probability. Lemma 7.5 (far from being bipartite). With probability at least 1 โˆ’ eโˆ’199n , G is 20n-far from being bipartite. Proof. Fix a bipartition (L, R) of the vertex set of G such that |L| โ‰ฅ n/2. For each pair of vertices u, v โˆˆ L, let Xu,v be a random variable which is 1 if the edge (u, v) is present in G and 0 P otherwise. Its expected value is E[Xu,v ] = 1000/n. The random variable X = u,vโˆˆL Xu,v counts  the number of edges within L. By the linearity of expectation, E[X] โ‰ฅ n/2 2 1000/n โ‰ฅ 30n. Since the random variables Xu,v are independent, by the Chernoff Bound from Fact 2.4, we have that Pr[X < 20n] โ‰ค exp(โˆ’200n). Therefore, with probability at least 1 โˆ’ exp(โˆ’200n), there are at least 20n edges within L. The total number of such bipartitions of G is at most 2nโˆ’1 . Taking a union bound over all such bipartitions, the probability that at least one of the bipartitions contains less than 20n edges within its L side is at most exp(โˆ’199n), and the lemma follows. The expected degree of a vertex v in G is 1000(1โˆ’ 1/n). Therefore, by the Chernoff Bound from Fact 2.4, the probability that the degree of v is greater than 2000 is at most exp(โˆ’300(1 โˆ’ 1/n)). We now show that, with sufficiently high probability, the number of edges that are incident with high degree vertices is small. We can remove all such edges to obtain a bounded-degree graph that is still far from being bipartite. Lemma 7.6 (mostly bounded degrees). With probability at least 1 โˆ’ eโˆ’100 , there are at most n edges that are incident with vertices of degree greater than 2000 in G. Proof. For a pair u, v of vertices, the probability that there is an edge between them and that one of u or v is of degree greater than 2000 is Pr[(u, v) โˆˆ E] ยท Pr[u or v has degree โ‰ฅ 2000|(u, v) โˆˆ E]. This is at most (1000/n) ยท 2 ยท exp(โˆ’300(1 โˆ’ 1/n)). Therefore, the expected number of edges that are incident with a vertex of degree greater than 2000 is at most 1000n ยท exp(โˆ’300(1 โˆ’ 1/n)). By Markovโ€™s inequality, the probability that there are at least n edges that are incident with vertices of degree greater than 2000 is at most 1000 ยท exp(โˆ’300(1 โˆ’ 1/n)). This completes the proof of the lemma. 21 We now bound the number of cycles of length at most O(log n) in the graph G. Lemma 7.7 (few small cycles). With probability at least 1/2, there are at most 2n cycles of length at most log n/ log 1000 in G. Proof. For any k fixed vertices, the probability that there is a cycle among the k vertices is at most k!(1000/n)k . Therefore the expected number of cycles in G of length at most k is at most 1000k . For k = log n/ log 1000, this means that the expected number of cycles in G of length at most log n/ log 1000 is n. Therefore, with probability at least 1/2 there are at most 2n cycles of length at most log n/ log 1000 in G. We are now ready to prove Lemma 7.2, completing our lower bounds. Intuitively, since G does not contain many high degree vertices and many small cycles, removing them to obtain Gโ€ฒ only changes the distance from being bipartite by a small term. Proof. With probability 1 โˆ’ eโˆ’n , there are at least 400n edges in G and by Lemma 7.5 G is 20nremoved from being bipartite. By Lemma 7.6, with probability at least 1 โˆ’ eโˆ’100 , there are at most n edges incident with vertices of degree greater than 2000 and by Lemma 7.7 with probability at least 1/2 there are at most 2n cycles of length at most log n/ log 1000. Hence, with probability at least 1/2 โˆ’ eโˆ’100 โˆ’ eโˆ’n , Gโ€ฒ is a graph with degree at most 2000 that is 17n-removed from being bipartite. Therefore, Gโ€ฒ is 1/100-far from being bipartite. 8 Discussion This paper initiates a thorough study of distributed property testing. It provides an emulation technique for the dense graph model and constructs fast distributed algorithms for testing trianglefreeness, cycle-freeness and bipartiteness. We also present lower bounds for both bipartiteness and triangle freeness. This work raises many important open questions, the immediate of which is to devise fast distributed testing algorithms for additional problems. One example is testing freeness of other small subgraphs. More ambitious goals are to handle dynamic graphs, and to find more general connections between testability in the sequential model and the distributed model. Finally, there is fertile ground for obtaining additional lower bounds in this setting, in order to fully understand the complexity of distributed property testing. References [1] Noga Alon, Chen Avin, Michal Kouckรฝ, Gady Kozma, Zvi Lotker, and Mark R. Tuttle. Many random walks are faster than one. Combinatorics, Probability & Computing, 20(4):481โ€“502, 2011. [2] Noga Alon, Tali Kaufman, Michael Krivelevich, and Dana Ron. Testing triangle-freeness in general graphs. SIAM J. Discrete Math., 22(2):786โ€“819, 2008. [3] Noga Alon and Michael Krivelevich. Testing k-colorability. SIAM J. Discrete Math., 15(2):211โ€“ 227, 2002. 22 [4] Noga Alon and Asaf Shapira. A characterization of the (natural) graph properties testable with one-sided error. SIAM J. Comput., 37(6):1703โ€“1727, 2008. [5] Heger Arfaoui, Pierre Fraigniaud, David Ilcinkas, and Fabien Mathieu. Distributedly testing cycle-freeness. In Graph-Theoretic Concepts in Computer Science - 40th International Workshop, WG 2014, Nouan-le-Fuzelier, France, June 25-27, 2014. Revised Selected Papers, pages 15โ€“28, 2014. [6] Mor Baruch, Pierre Fraigniaud, and Boaz Patt-Shamir. Randomized proof-labeling schemes. In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, PODC 2015, Donostia-San Sebastiรกn, Spain, July 21 - 23, 2015, pages 315โ€“324, 2015. [7] Manuel Blum, Michael Luby, and Ronitt Rubinfeld. Self-testing/correcting with applications to numerical problems. J. Comput. Syst. Sci., 47(3):549โ€“595, 1993. [8] Zvika Brakerski and Boaz Patt-Shamir. Distributed discovery of large near-cliques. Distributed Computing, 24(2):79โ€“89, 2011. [9] Keren Censor-Hillel, Petteri Kaski, Janne H. Korhonen, Christoph Lenzen, Ami Paz, and Jukka Suomela. Algebraic methods in the congested clique. In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, PODC 2015, Donostia-San Sebastiรกn, Spain, July 21 - 23, 2015, pages 143โ€“152, 2015. [10] Maria Chudnovsky, Neil Robertson, Paul Seymour, and Robin Thomas. The strong perfect graph theorem. ANNALS OF MATHEMATICS, 164:51โ€“229, 2006. [11] Danny Dolev, Christoph Lenzen, and Shir Peled. "tri, tri again": Finding triangles and small subgraphs in a distributed setting - (extended abstract). In Distributed Computing - 26th International Symposium, DISC 2012, Salvador, Brazil, October 16-18, 2012. Proceedings, pages 195โ€“209, 2012. [12] Andrew Drucker, Fabian Kuhn, and Rotem Oshman. The communication complexity of distributed task allocation. In ACM Symposium on Principles of Distributed Computing, PODC โ€™12, Funchal, Madeira, Portugal, July 16-18, 2012, pages 67โ€“76, 2012. [13] Paul Erdรถs. Graph theory and probability. canad. J. Math, 11:34G38, 1959. [14] Eldar Fischer. The art of uninformed decisions: A primer to property testing. Current Trends in Theoretical Computer Science: The Challenge of the New Century, I:229โ€“264, 2004. [15] Klaus-Tycho Foerster, Thomas Luedi, Jochen Seidel, and Roger Wattenhofer. Local checkability, no strings attached. In Proceedings of the 17th International Conference on Distributed Computing and Networking, ICDCN 2016, Singapore, January 4-7, 2016., 2016. [16] Jacob Fox. A new proof of the graph removal lemma. CoRR, abs/1006.1300, 2010. [17] Mohsen Ghaffari, Fabian Kuhn, and Hsin-Hao Su. Manuscript. 2016. [18] Oded Goldreich, Shafi Goldwasser, and Dana Ron. Property testing and its connection to learning and approximation. J. ACM, 45(4):653โ€“750, 1998. 23 [19] Oded Goldreich and Dana Ron. A sublinear bipartiteness tester for bounded degree graphs. Combinatorica, 19(3):335โ€“373, 1999. [20] Oded Goldreich and Dana Ron. Property testing in bounded degree graphs. Algorithmica, 32(2):302โ€“343, 2002. [21] Oded Goldreich and Dana Ron. Algorithmic aspects of property testing in the dense graphs model. In Property Testing - Current Research and Surveys [outgrow of a workshop at the Institute for Computer Science (ITCS) at Tsinghua University, January 2010], pages 295โ€“ 305, 2010. [22] Oded Goldreich and Luca Trevisan. Three theorems regarding testing graph properties. Random Struct. Algorithms, 23(1):23โ€“57, 2003. [23] Mika Gรถรถs, Juho Hirvonen, Reut Levi, Moti Medina, and Jukka Suomela. Non-local probes do not help with graph problems. CoRR, abs/1512.05411, 2015. [24] Juho Hirvonen, Joel Rybicki, Stefan Schmid, and Jukka Suomela. Large cuts with local algorithms on triangle-free graphs. CoRR, abs/1402.2543, 2014. [25] Stephan Holzer and Roger Wattenhofer. Optimal distributed all pairs shortest paths and applications. In Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing, PODC โ€™12, pages 355โ€“364, New York, NY, USA, 2012. ACM. [26] Jarkko Kari, Martรญn Matamala, Ivan Rapaport, and Ville Salo. Solving the induced subgraph problem in the randomized multiparty simultaneous messages model. In Structural Information and Communication Complexity - 22nd International Colloquium, SIROCCO 2015, Montserrat, Spain, July 14-16, 2015, Post-Proceedings, pages 370โ€“384, 2015. [27] Amos Korman, Shay Kutten, and David Peleg. Proof labeling schemes. Distributed Computing, 22(4):215โ€“233, 2010. [28] Christoph Lenzen and David Peleg. Efficient distributed source detection with limited bandwidth. In ACM Symposium on Principles of Distributed Computing, PODC โ€™13, Montreal, QC, Canada, July 22-24, 2013, pages 375โ€“382, 2013. [29] Michael Mitzenmacher and Eli Upfal. Probability and computing - randomized algorithms and probabilistic analysis. Cambridge University Press, 2005. [30] Michal Parnas and Dana Ron. Approximating the minimum vertex cover in sublinear time and a connection to distributed algorithms. Theor. Comput. Sci., 381(1-3):183โ€“196, 2007. [31] David Peleg. Distributed Computing: A Locality-Sensitive Approach. Society for Industrial and Applied Mathematics, 2000. [32] Seth Pettie and Hsin-Hao Su. Distributed coloring algorithms for triangle-free graphs. Inf. Comput., 243:263โ€“280, 2015. [33] Dana Ron. Property testing: A learning theory perspective. Foundations and Trends in Machine Learning, 1(3):307โ€“402, 2008. 24 [34] Dana Ron. Algorithmic and analysis techniques in property testing. Foundations and Trends in Theoretical Computer Science, 5(2):73โ€“205, 2009. [35] Ronitt Rubinfeld and Madhu Sudan. Robust characterizations of polynomials with applications to program testing. SIAM J. Comput., 25(2):252โ€“271, 1996. [36] Atish Das Sarma, Stephan Holzer, Liah Kor, Amos Korman, Danupon Nanongkai, Gopal Pandurangan, David Peleg, and Roger Wattenhofer. Distributed verification and hardness of distributed approximation. SIAM J. Comput., 41(5):1235โ€“1265, 2012. [37] Atish Das Sarma, Danupon Nanongkai, Gopal Pandurangan, and Prasad Tetali. Distributed random walks. J. ACM, 60(1):2, 2013. 25
8cs.DS
arXiv:1802.07995v2 [math.PR] 23 Feb 2018 Multidimensional multiscale scanning in Exponential Families: Limit theory and statistical consequences Claudia Koฬˆnig [email protected] Institute for Mathematical Stochastics, University of Goฬˆttingen Axel Munk [email protected] Institute for Mathematical Stochastics, University of Goฬˆttingen and Felix Bernstein Institute for Mathematical Statistics in the Bioscience, University of Goฬˆttingen and Max Planck Institute for Biophysical Chemistry, Goฬˆttingen, Germany Frank Werner1 [email protected] Institute for Mathematical Stochastics, University of Goฬˆttingen and Max Planck Institute for Biophysical Chemistry, Goฬˆttingen, Germany In this paper we consider the problem of finding anomalies in a d-dimensional field of independent random variables tYi uiPt1,...,nud , each distributed according to a onedimensional natural exponential family F โ€œ tFฮธ uฮธPฮ˜ . Given some baseline parameter ฮธ0 P ฮ˜, the field is scanned using local likelihood ratio tests to detect from a (large) d given system of regions R those regions R ฤ‚ t1, ..., nu with ฮธi โ€ฐ ฮธ0 for some i P R. We provide a unified methodology which controls the overall family wise error (FWER) to make a wrong detection at a given error rate. Fundamental to our method is a Gaussian approximation of the asymptotic distribution of the underlying multiscale scanning test statistic with explicit rate of convergence. From this, we obtain a weak limit theorem which can be seen as a generalized weak invariance principle to non identically distributed data and is of independent interest. Furthermore, we give an asymptotic expansion of the procedures power, which yields minimax optimality in case of Gaussian observations. Keywords: exponential families, multiscale testing, invariance principle, scan statistic, weak limit, family wise error rate AMS classification numbers: Primary 60F17, 62H10, Secondary 60G50, 62F03. 1 Introduction Suppose we observe an independent, d-dimensional field Y of random variables Yi โ€ž Fฮธi , 1 Corresponding i P Ind :โ€œ t1, ..., nud , author 1 (1) where each observation is drawn from the same given one-dimensional natural exponential family model F โ€œ tFฮธ uฮธPฮ˜ , but with potentially different parameters ฮธi . Prominent examples include Yi with varying normal means ยตi or a Poisson field with varying intensities ฮปi . Given some baseline parameter ฮธ0 P ฮ˜ (e.g. all ยตi โ€œ 0 for a Gaussian field), we consider the problem of finding anomalies (hot spots) in the field Y , i.e. we aim to identify those regions R ฤ‚ Ind where ฮธi โ€ฐ ฮธ0 d for some i P R. Here R runs through a given family of candidate regions R P Rn ฤ‚ 2In with the power set 2X of some set X. For simplicity, we will suppress the subindex n whenever it is clear from the context, i.e. write R โ€œ Rn in what follows. Such problems occur in numerous areas of application ranging from astronomy and biophysics to genetics engineering, specific examples include detection in radiographic images (Kazantsev et al., 2002), genome screening (Jiang et al., 2016) and object detection in astrophysical image analysis (Friedenberg and Genovese, 2013), to mention a few. Our setting includes the important special cases of Gaussian (Arias-Castro et al., 2005; Sharpnack and Arias-Castro, 2016), Bernoulli (Walther, 2010), and Poisson random fields (Zhang et al., 2016). Extensions to models without exponential family structure as well as replacing the baseline parameter ฮธ0 by a varying field of known baseline intensities can be treated as well (cf. Remark 2.1 below), but to keep the presentation simple, we restrict ourselves to the afore mentioned setting. Inline with the above mentioned references (see also Section 1.2), the problem of finding hot spots is regarded as a multiple testing problem, i.e. many โ€™localโ€™ tests on the regions R are performed simultaneously, while keeping the overall error of wrong detections controllable. For a fixed region R P R the likelihood ratio test (LRT) for the testing problem @ i P R : ฮธi โ€œ ฮธ0 (HR,n ) D i P R s.t. ฮธi โ€ฐ ฮธ0 , (KR,n ) vs. is a powerful test in general, and often known to have certain optimality properties (depending on the structure of R, see e.g. Lehmann and Romano (2005)). Therefore, the LRT will always be considered throughout this paper as the โ€™localโ€™ test. We stress, however, that our methodology could also be used for other systems of local tests, provided they obey a sufficiently well behaving asymptotic expansion. The LRT is based on the test statistic d ล› ห™ ห† supฮธฤ…0 iPR fฮธ pYi q ล› , (2) TR pY, ฮธ0 q :โ€œ 2 log iPR fฮธ0 pYi q where fฮธ denotes the density of Fฮธ , and HR,n is rejected when TR pY, ฮธ0 q is too large. As it is not known a priori which regions R might contain anomalies, i.e. for which R P R the alternative (KR,n ) might hold true, it is of great importance to control the family wise error arising from the multiple test decisions of the local tests based on TR pY, ฮธ0 q, R P R. Obviously, without any further restriction on the complexity of R this error cannot be controlled. To this end, we will assume that the regions R can be represented as a sequence of discretized regions in ห‡ ( R โ€œ Rn :โ€œ R ฤ‚ Ind ห‡ R โ€œ Ind X nRหš for some Rหš P Rหš (3) d for some system of subsets (e.g. all hypercubes) of the unit cube Rหš ฤ‚ 2r0,1s , to be specified later. This gives rise to the sequence of multiple testing problems HR,n vs. KR,n simultaneously over Rn . (4) The aim of this paper is to provide methodology to control (asymptotically) the family wise error rate (FWER) ฮฑ P p0, 1q when (4) is considered as a multiple testing problem, i.e. to provide a multiple test ฯ† for (4) (see e.g. Dickhaus, 2014) such that sup PHR,n rโ€œany false rejection by ฯ†โ€s ฤ ฮฑ ` op1q RPRn 2 as n ร‘ 8. (5) In words, this ensures that the probability of making any wrong detection is controlled by a given error level ฮฑ, as n ร‘ 8. This task has been the focus of several papers during the last decades, for a detailed discussion see Section 1.2. We contribute to this field by providing a general theory for a unifying method in the model (1), which includes not only Gaussian (Arias-Castro et al., 2005; Sharpnack and Arias-Castro, 2016; Kou, 2017; Cheng and Schwartzman, 2017), but also Bernoulli (Walther, 2010) or Poissonian observations (Kulldorff et al., 2005; Rivera and Walther, 2013; Tu, 2013; Zhang et al., 2016). In view of (Arias-Castro et al., 2011), where also observations from exponential families as in (1) are discussed, but the local tests are always as in the Gaussian case, we emphasize that our local test are of type (2), hence exploiting the likelihood in the exponential family, which will result in improved power (see Frick et al. (2014) for d โ€œ 1). Our main technical contribution is to prove a weak limit theorem for the asymptotic distribution of our test statistic for general exponential family models as in (1) and arbitrary dimension d. This can be viewed as a โ€multiscaleโ€ weak invariance principle for independent but not necessarily identically distributed r.v.โ€™s. Further, we will provide an asymptotic expansion of the testโ€™s power which leads to minimax optimal detection of the test in specific models. 1.1 Multiscale testing Our test will be of scanning-type, controlling the FWER by the maximum over the local LRT statistics in (2), i.e. Tn โ€ Tn pY, ฮธ0 , Rn , vq :โ€œ max rTR pY, ฮธ0 q ยด penv p|R|qs . RPRn Here |R| denotes the number of points in R. The values b penv prq :โ€œ 2v plog pnd {rq ` 1q (6) (7) where log denotes the natural logarithm, act as a scale penalization, which is necessary to guarantee optimal detection power on all scales simultaneously as it prevents smaller regions from dominating the overall test statistic, as noticed by Duฬˆmbgen and Spokoiny (2001) and others (see e.g. Duฬˆmbgen and Walther, 2008; Walther, 2010; Frick et al., 2014). The constant v in (6) can be any upper bound of VRหš which is given as the complexity of Rหš , measured in terms of the packing number (see Remark 2.2 below). Whenever Rหš has finite VC-dimension ฮฝ pRหš q, we can choose VRหš โ€œ ฮฝ pRหš q, however, the test will have better detection properties if v is as small as possible with this property (see Section 2.3). Hence, from this point of view it is advantageous to know exactly the complexity VRหš of Rหš , a topic which has received less attention than computing VC-dimensions. Therefore, we compute the packing numbers for three important examples of Rหš , namely hyperrectangles, hypercubes and halfspaces explicitly in the appendix. To construct a test which controls the FWER (5), we have to find a sequence of universal global thresholds q1ยดฮฑ,n such that P0 rTn ฤ… q1ยดฮฑ,n s ฤ ฮฑ ` op1q, (8) where P0 :โ€œ PHI d ,n corresponds to the case that no anomaly is present. Such a threshold suffices, n as it can be readily seen that โ€œ โ€ฐ sup PHR,n rโ€œany false rejection in Rโ€s ฤ P0 โ€œany false rejection in Ind โ€ . RPRn Given q1ยดฮฑ,n , the multiple test then will reject whenever Tn ฤ› q1ยดฮฑ,n , and each local test rejects if TR pY, ฮธ0 q ฤ› q1ยดฮฑ,n ` penv p|R|q. Due to (6) and (8), any of these rejections is correct with probability ฤ› 1 ยด ฮฑ, asymptotically. To obtain the thresholds q1ยดฮฑ,n we provide a Gaussian approximation of the scan statistic (6) under P0 given by ห‡ ห‡ ๏ฌ€ ยซ ห‡รฟ ห‡ ห‡ ห‡ ยด1{2 Mn โ€ Mn pRn , vq :โ€œ max |R| (9) ห‡ Xi ห‡ ยด penv p|R|q RPRn ห‡iPR ห‡ 3 with i.i.d. standard normal r.v.โ€™s Xi , i P Ind (Thm. 2.4). We also give a rate of convergence of this approximation (Thm. 2.5), which is determined by the smallest scale in Rn . Based on these results, we obtain the P0 -limiting distribution of Tn as that of ยซ ๏ฌ€ หš ` ห˜ |W pR q| a M โ€ M pRหš , vq :โ€œ sup ยด penv nd |Rหš | ฤƒ 8 a.s., (10) |Rหš | Rหš PRหš d where W is white noise on r0, 1s and (with a slight abuse of notation) |Rหš | denotes the Lebesgue measure of Rหš P Rหš . This holds true as soon as Rหš and Rn have a finite complexity, Rหš consists of sets with a sufficiently regular boundary (see Assumption 1 below), and the smallest scales |Rn | of the system Rn are restricted suitably, see (12) and the discussion there. In case of Rหš being the subset of all hypercubes, we will also give an asymptotic expansion of the above testโ€™s power, which allows to determine the necessary average strength of an anomaly such that it will be detected with asymptotic probability 1. This is only possible due to the penalization in (6), as otherwise the asymptotic distribution is not a.s. finite. If the anomaly is sufficiently small, we show that the anomalies which can be detected with asymptotic power one by the described multiscale testing procedure are the same as those of the oracle single scale test, which knows the size (scale) of the anomaly in advance. This generalizes findings of Sharpnack and Arias-Castro (2016) to situations where not only the mean of the signal is allowed to change, but its whole distribution. Furthermore, if the observations are Gaussian, our test with properly chosen v achieves the asymptotic optimal detection boundary, i.e. no test can have larger power in a minimax sense, asymptotically. Note finally, that weak convergence of Tn to M as in (10) can be viewed as a generalized weak invariance principle as the r.h.s. does not depend on any unknown quantity, and hence can be e.g. simulated generically in advance for any given system R as soon as a bound for the complexity of Rหš can be determined. 1.2 Literature review and connections to existing work Scan statistics and scanning-type procedures based on the maximum over an ensemble of local tests have received much attention in the literature over the past decades. To determine the quantile, a common option is to approximate the tails of the asymptotic distribution suitably, as done e.g. by Siegmund and Venkatraman (1995); Siegmund and Yakir (2000); Naus and Wallenstein (2004); Pozdnyakov et al. (2005); Fang and Siegmund (2016) for d โ€œ 1, by Haiman and Preda (2006) for d โ€œ 2, and by Jiang (2002) in arbitrary dimensions. If the random field is sufficiently smooth (in contrast to the setting here) the Gaussian kinematic formula can be employed, see e.g. Taylor and Worsley (2007), Adler (2000). We also mention Alm (1998), who considers the situation of a fixed rectangular scanning set in two and three dimensions. In all these papers, no penalization has been used, which automatically leads to a preference for small scales of order logpnq (see e.g. Kabluchko and Munk, 2009) and to an extreme value limit, in contrast to (10). Arias-Castro et al. (2017) study the case of an unknown null distribution and propose a permutation based approximation, which is shown to perform well in the natural exponential family setting (1), however, only for d โ€œ 1. Conceptually most related to our work are weak limit theorems for scale penalized scan statistics, which have e.g. been obtained by Frick et al. (2014) and Sharpnack and Arias-Castro (2016). However, these results are either limited to special situations such as Gaussian observations, or to d โ€œ 1. If a limit exists, the quantiles of the finite sample statistic can be bounded the quantiles by limiting ones as e.g. done by Duฬˆmbgen and Spokoiny (2001); Rivera and Walther (2013). Our results can be interpreted in both ways as we provide a Gaussian approximation of the scan statistic in (6) by (9) and that we obtain (10) as a weak limit. Weak limit theorems for Tn as in (6) are immediately connected to those for partial sum processes. Classical KMT-like approximations (see e.g. Komloฬs et al., 1976; Rio, 1993; Massart, 1989) provide in fact a strong coupling of the whole process pTR pY, ฮธ0 qqRPRn to a Gaussian version. Results of this form have been employed for d โ€œ 1 previously in Schmidt-Hieber et al. (2013); 4 Frick et al. (2014). Proceeding like this for general d will restrict the system Rn to scales rn s.t. |R| ฤ› rn where ndยด1 logpnq โ€œ o prn q (11) as n ร‘ 8, which is unfeasibly large for d ฤ› 2. Therefore, we take a different route and employ a coupling of the maxima in (6) and (9), which relies on recent results by Chernozhukov et al. (2014), see also Proksch et al. (2017). However, in contrast to the present paper, they do not consider the local LR statistic and require that the largest scale has to go to zero. This leads to an extreme value type limit in contrast to (10) which incorporates all (larger) scales. To make use of Chernozhukov et al.โ€™s (2014) coupling results in our general setting, we provide a symmetrizationlike upper bound for the expectation of the maximum of a partial sum process by a corresponding Gaussian version, cf. Proposition 3.2. Doing so we are able to approximate the distribution of Tn in (6) by (9) as soon as we restrict ourselves to R P Rn with |R| ฤ› rn where the smallest scales only need to satisfy log12 pnq โ€œ o prn q as n ร‘ 8, (12) which compared to (11) allows for considerably smaller scales whenever d ฤ› 2. Note that the lower scale restriction (12) does not to depend on d. However, as we consider sets in Ind here, d the corresponding lower an bound for sets in Rหš ฤ‚ 2r0,1s is nยดd log12 pnq โ€œ o pan q, which in fact depends on d as now the volume of the largest possible set has been standardized to one (see (3) and Theorem 2.9 below) and coincides with the sampling rate nยดd up to a poly-log-factor. In contrast, (11) gives nยด1 logpnq โ€œ o pan q, independent of d, which only for d โ€œ 1 achieves the ยด` ห˜1{10 ยฏ 12 ยดd sampling rate n . Under (12) we also obtain OP log pnq{rn as rate of convergence of this approximation (see (18) below). Also the asymptotic power of scanning-type procedures has been discussed in the literature. We mention Walther (2010) who studies the detection of spacial clusters in a two dimensional Bernoulli field, or Kabluchko (2011) who gives exact asymptotic expansions in a Gaussian setting. To obtain optimal power on all scales, proper penalization is necessary, as e.g. stressed by Arias-Castro et al. (2005) and Sharpnack and Arias-Castro (2016), who provide optimality results in one- and twodimensional Gaussian fields, respectively. Butucea and Ingster (2013) for d โ€œ 2 and Kou (2017) for general d provide optimality of scanning procedures for Gaussian fields. We are able to generalize these results in case of Rหš being the set of all hypercubes to our exponential family model (1), despite the fact that under the alternative the whole distribution in (1) might change, whereas for Gaussian fields typically only the mean changes. Doing so we obtain sharp detection thresholds, which are known to be minimax in the Gaussian situation, if the parameter v in the penalization (41) is chosen to be equal to the packing number of the system of hypercubes. In contrast, if v is chosen to be the VC-dimension, the detection power turns out to be suboptimal. This emphasizes the importance of knowledge of the packing number explicitly, and an illustrative example for this will also be given in Example 2.8. As a potential alternative, weaker error measures which do not control the FWER, such as the false discovery rate (FDR) could be controlled (see e.g. Benjamini and Hochberg, 1995; Benjamini and Yekutieli, 2001; Li et al., 2016), but this is a different task and beyond the scope of our paper. 2 Theory In this section we will summarize our theoretical findings. In Section 2.1 we give an overview and details on our precise setting and present our assumptions on the set of candidate regions Rหš . Section 2.2 provides the validity of the Gaussian approximation in (9) and determines the P0 -limiting distribution of Tn . In Section 2.3 we derive an asymptotic expansion of the detection power. 5 2.1 Setting and Assumptions In the following we assume that F โ€œ tFฮธ uฮธPฮ˜ in (1) is a one-dimensional exponential family, which is regular and minimal, i.e. the Lebesgue densities of Fฮธ are of the form fฮธ pxq โ€œ hpxq exp pxฮธ, xy ยด ฯˆpฮธqq, the natural parameter space * " ลผ exppฮธxq dx ฤƒ 8 N โ€œ ฮธ P Rd : Rd is open and the cumulant transform ฯˆ is strictly convex on N . Then, the moment generating function exists and the random variables Yi have sub-exponential tails, see Casella and Berger (2002) and Brown (1986) for details. Let ฯ† pxq :โ€œ supฮธPฮ˜ rฮธ ยจ x ยด ฯˆ pฮธqs be the Legendre-Fenchel conjugate of ฯˆ and J px, ฮธq :โ€œ ฯ† pxq ยด rฮธ ยจ x ยด ฯˆ pฮธqs , then the LRT statistic TR pY, ฮธ0 q in (2) can be written as g หœ ยธ f รฟ รฟ f e pฮธ ยจ Yi ยด ฯˆpฮธqq ยด pฮธ0 ยจ Yi ยด ฯˆpฮธ0 qq TR pY, ฮธ0 q โ€œ 2 sup ฮธ iPR iPR b ห˜ ` โ€œ 2 |R| J Yฬ„R , ฮธ0 (13) ห˜ ` ล™ with Yฬ„R โ€œ |R|ยด1 iPR Yi . Note that by definition it holds J Yฬ„R , ฮธ0 ฤ› 0. Remark 2.1. If observations are not drawn from an exponential family as in (1), or if ฮธ0 P ฮ˜ is replaced by a field pฮธi qiPInd of known baseline intensities, then the representation of the LRT statistic TR as in (13) is not valid anymore. Our proofs rely on a third-order Taylor expansions of TR and on the sub-exponential tails of the random variables Yi (see Theorem 2.5 below), but not explicitly on the exponential family structure. Therefore, if in more general models corresponding assumptions are posed (see also Arias-Castro et al., 2017, Sec. 2.2), our results do immediately generalize to this situation. To control the supremum in (10), we have to restrict the system of regions Rหš suitably. To this end, we have to introduce some notation. For a set Rหš P Rหš and x P r0, 1sd we define d px, BRหš q :โ€œ inf yPBRหš }x ยด y}2 where BRหš denotes the topological boundary of Rหš , i.e. BRหš โ€œ ห Rหš z pRหš q . Furthermore we define the วซยดannulus Rหš pวซq around the boundary of Rหš for some วซ ฤ… 0 as ! ) d ห‡ Rหš pวซq :โ€œ x P r0, 1s ห‡ d px, BRหš q ฤƒ วซ . Assumption 1 (Complexity and regularity of Rหš ). (a) The VC-Dimension of the set Rหš is bounded by ฮฝ pRหš q ฤƒ 8. (b) There exists some constant C ฤ… 0 such that |Rหš pวซq| ฤ Cวซ for all วซ ฤ… 0 and all Rหš P Rหš with the Lebesgue measure |ยจ|. Let us briefly comment on the above assumption. Remark 2.2. โ€ข Assumption 1(a) is a standard assumption to control the complexity of the set indexed process, see e.g. Massart (1989); van der Vaart and Wellner (1996); Duฬˆmbgen and Spokoiny (2001). โ€ข Assumption 1(a) immediately implies an upper bound for the cardinality # pRn q of Rn in (3), this is there exist constants c1 , c2 ฤ… 0 such that # pRn q ฤ c1 nc2 . (14) This will allow us to apply recent results by Chernozhukov et al. (2014) to couple the process in (6) with a Gaussian version as in (9). 6 โ€ข In the following, we will also need a bound for the complexity of Rหš in terms of the packing number. The packing number Kpวซ, ฯ, Wq of a subset W of Rหš w.r.t. a metric ฯ is given by the maximum number m of points W1 , . . . , Wm P W s.t. ฯpWi , Wj q ฤ… วซ for all i โ€ฐ j, i.e. by the largest number of วซ-balls w.r.t. ฯ which can be packed inside W, see e.g. van der Vaart and Wellner (1996, Def. 2.2.3). In the following we will consider the symmetric difference R1หš โ–ณ R2หš :โ€œ pR1หš Y R2หš q z pR1หš X R2หš q , and the corresponding metric ฯหš pR1หš , R2หš q :โ€œ b |R1หš โ–ณ R2หš |, for R1หš , R2หš P Rหš R1หš , R2หš P Rหš . Suppose that there exists a positive number VRหš and constants k1 , k2 ฤ… 0 such that ยด ยฏ K pฮดuq1{2 , ฯหš , tR P Rหš : |R| ฤ ฮดu ฤ k1 uยดk2 ฮด ยดVRหš (15) (16) for all u, ฮด P p0, 1s. If Assumption 1(a) is satisfied, then (16) holds true with VRหš โ€œ ฮฝ pRหš q, which basically follows from the relationship between capacity and covering numbers and van der Vaart and Wellner (1996, Thm. 2.6.4). However, (16) might also be satisfied for considerably smaller numbers VRหš (see the examples below). โ€ข We stress that that the assumption on the boundary smoothness (b) is satisfied whenever Rหš consists of regular Borel sets Rหš only, i.e. Rหš is a Borel set and |BRหš | โ€œ 0 for all Rหš P Rหš . Example 2.3. d 1. Consider!the set S หš of all hyperrectangles in r0,)1s , i.e. each S หš P S หš is of the form S หš โ€œ d ห‡ rs, ts :โ€œ x P r0, 1s ห‡ si ฤ xi ฤ ti for 1 ฤ i ฤ d . According to van der Vaart and Wellner (1996, Ex. 2.6.1) we have ฮฝ pS หš q โ€œ 2d, and more refined computations in the appendix (cf. Lemma 5.1) show that VS หš โ€œ 2d ยด 1 ` วซ with arbitrary วซ ฤ… 0. Obviously, the corresponding discretization Sn consists of hyperrectangles in Ind , which are determined by their upper left and lower right corners, i.e. # pSn q ฤ n2d . As S หš consists only of regular Borel sets, the assumption on the boundary smoothness is also satisfied. d 2. We may also consider the (smaller) set Qหš of all hypercubes in r0, 1s , i.e. each Qหš P Qหš is d of the form rt, t ` hs with t P r0, 1s and 0 ฤƒ h ฤ 1 ยด max1ฤiฤd ti . As Qหš ฤ‚ S หš , Assumption 1 is satisfied. More precisely, according to (Despres, 2014), ฮฝ pQหš q โ€œ t 3d`1 2 u, and refined computations in the appendix (cf. Lemma 5.2) show VQหš โ€œ 1 independent of d (as opposed to the VC-dimension). d 3. Let Hหš be the set of all half-spaces in r0, 1s , i.e. ! ) ( d ห‡ Hหš :โ€œ Ha,ฮฑ | ฮฑ P R, a P Sdยด1 , Ha,ฮฑ :โ€œ x P r0, 1s ห‡ xx, ay ฤ› ฮฑ . The VC-dimension of Hหš is ฤ d ` 1 (see e.g. Devroye and Lugosi, 2001, Cor. 4.2), which proves that Assumption 1 is satisfied. On the other hand, we prove that VHหš โ€œ 2 (cf. Lemma 5.3 the appendix). 2.2 Limit theory Now we are in position to show that the quantiles of the multiscale statistic in (6) can be approximated uniformly by those of the Gaussian version in (9), and furthermore that Mn pRn , vq in (9) converges to a non-degenerate limit for v ฤ› VRหš . For the former we require a lower bound on the d smallest scale as given in (12). Given a discretized set of candidate regions Rn ฤ‚ 2In and c ฤ… 0 we introduce ห‡ ( Rn|c :โ€œ R P Rn ห‡ |R| ฤ› c . With this notation we can formulate our main theorem: 7 Theorem 2.4 (Weak P0 limit). Let Yi , i P Ind be a field of random variables as in (1), Rหš satisfy Assumption 1 and let prn qn be a sequence such that (12) holds true. Then it holds under P0 that ห˜ D ` Tn Y, ฮธ0 , Rn|rn , v ร‘ M pRหš , vq n ร‘ 8, as (17) with M pRหš , vq as in (10) for any fixed v P R. If furthermore v ฤ› VRหš in (16), then M pRหš , vq is almost surely finite and non-degenerate. Note that M does not depend on any unknown quantities and can e.g. be simulated. However, for practical purposes it is advantageous to use the finite sample Gaussian approximation in (9) to simulate quantiles for Tn as in (6). This is justified by the following theorem: Theorem 2.5 (Gaussian approximation). Let Yi , i P Ind be a field of random variables as in (1), and let Rหš be a set of candidate regions satisfying Assumption 1(a) and let prn qn ฤ‚ p0, 8q be a sequence such that (12) holds true. Let v P R be fixed. (a) Then it holds ห˜ ห˜ ` ` Tn Y, ฮธ0 , Rn|rn , v ยด Mn Rn|rn , v โ€œ OP หœห† log12 pnq rn ห™1{10 ยธ (18) as n ร‘ 8 with Mn as in (9). (b) For all q P R we have ห‡ โ€œ ` ห˜ โ€ฐห‡ ห˜ โ€ฐ โ€œ ` lim ห‡P0 Tn Y, ฮธ0 , Rn|rn , v ฤ… q ยด P Mn Rn|rn , v ฤ… q ห‡ โ€œ 0. nร‘8 (19) Remark 2.6. Theorems 2.4 and 2.5 are compatible in the sense that for any set of candidate regions satisfying Assumption 1, v P R and any rn ร‘ 0 satisfying (12) it holds ห˜ D ` Mn Rn|rn , v ร‘ M pRหš , vq as n ร‘ 8, (20) with M pRหš , vq as in (10). Example 2.7. Suppose that Rหš is a set of candidate regions satisfying Assumption 1. Let us discuss three important examples of the model (1). ` ห˜ 1. Gaussian fields: Let Yi โ€ž N ฮธ, ฯƒ 2 where the variance ฯƒ 2 ฤ… 0 is fixed. In this case, ฯˆpฮธq โ€œ 12 ฮธ2 , and ห‡ ห‡ a ห‡Y R ยด ฮธ0 ห‡ TR pY, ฮธ0 q โ€œ |R| ฯƒ 2. Bernoulli fields: Let Yi โ€ž Bin p1, pq with p P p0, 1q. The cases p โ€œ 0 and p โ€œ 1 have to be excluded to obtain a natural exponential family. However, in these cases one would screen the field correctly, anyway. The natural parameter of this exponential family is ฮธ โ€œ log pp{p1 ยด pqq, and using ฯˆ pฮธq โ€œ log p1 ` exp pฮธqq we compute g ยจ ยป ห› f หœ ยธ๏ฌ f Y 1 ยด Y f R R ๏ฌ‚. TR pY, ฮธ0 q โ€œ e2|R| โ€“Y R log ห exppฮธ q โ€šยด p1 ยด Y R q log 1 0 1`exppฮธ0 q exppฮธ0 q`1 3. Poisson fields: Let Yi โ€ž Poipฮปq with ฮป P R. Again, ฮป โ€œ 0 has to be excluded, but this case is again trivial. The natural parameter of the exponential family is ฮธ โ€œ log pฮปq, and using ฯˆ pฮธq โ€œ exp pฮธq we compute d โ€ž ห† ๏šพ ห™ YR ยด pY R ยด exppฮธ0 qq . TR pY, ฮธ0 q โ€œ 2|R| Y R log exppฮธ0 q 8 Example 2.8 (P0 -limiting distribution in the hyperrectangle / hypercube case). Recall Example d 2.3 and let S หš be the set of all hyperrectangles and Qหš be the set of all hypercubes in r0, 1s . Then for prn qn as in (12) it holds under P0 that for any วซ ฤ… 0 max rTS pY, ฮป0 q ยด penv p|S|qs SPSn |S|ฤ›rn D ร‘ sup 0ฤsฤƒtฤ1 ยซ and ๏ฌ€ ` d ห˜ |W prs, tsq| a ยด penv n |rs, ts| |rs ยด ts| max rTQ pY, ฮป0 q ยด penv p|Q|qs QPQn |Q|ฤ›rn D ร‘ sup tPr0,1sd hPp0,1ยดmax1ฤiฤd ti s โ€ž ยด ยฏ |W prt, t ` hsq| d ยด pen phnq v hd{2 ๏šพ d as n ร‘ 8, where W is white noise on r0, 1s . Monte-Carlo simulations (by means of (9) with n โ€œ 96 and d โ€œ 2) of the densities of the right-hand sides with different values of v are shown in Figure 1. The smallest possible values of v which can be chosen according to Example 2.3 are given by the packing number, i.e. v โ€œ 3 ` วซ and v โ€œ 1 respectively. The corresponding results are depicted in the top row of Figure 1 with วซ โ€œ 0 for simplicity. Alternatively, we can use the VC-dimension v โ€œ 4 and v โ€œ 3 respectively, which lead to the simulated distributions shown in the bottom row of Figure 1. This nicely illustrates that using a larger value of v will lead to larger quantiles and hence a loss of detection power: As the distributions of Mn pS n , 4q and Mn pQn , 3q are extremely close, detecting in the system of squares is not easier than detecting in the system of rectangles, even though the latter is by far bigger and more complex. The explanation for this is the penalization (41), which by appropriate choice of the parameter v can be tailored to the system Rหš . 2.3 Asymptotic power In this section we will analyze the power of our multiscale testing approach in the hypercube-case. The detection power clearly depends on the size and strength of the anomaly. To describe the latter, we will frequently employ the functions mpฮธq :โ€œ ฯˆ 1 pฮธq โ€œ E rY s , vpฮธq :โ€œ ฯˆ 2 pฮธq โ€œ V rY s for Y โ€ž Fฮธ . Heuristics The key point for the following power considerations is that the observations in (1) can be approximated as a v pฮธi q Fฮธi ยด m pฮธi q Yi ยด m pฮธ0 q m pฮธi q ยด m pฮธ0 q a a a โ€ž `a , (21) v pฮธ0 q v pฮธ0 q v pฮธ0 q v pฮธi q ยด1{2 i.e. as โ€™signalโ€™ v pฮธ0 q pm pฮธi q ยด m pฮธa 0 qq, which is non zero on the anomaly only, aplus a standardized noise component pFฮธi ยด m pฮธi qq { v pฮธi q which is scaled by a factor vi :โ€œ v pฮธi q {v pฮธ0 q. In case of Gaussian observations with variance 1, one has vi โ€ 1 and recovers the situation considered by Sharpnack and Arias-Castro (2016). Whenever the โ€™signalโ€™ part in (21) is strong enough, the anomaly should be detected. In the following, we will make this statement mathematically precise and also give a comparison of the multiscale testing procedure with an oracle procedure. 9 1 600 600 0.8 400 400 200 200 0.6 0.4 0.2 0 0 0 2 0 (a) Mn pS n , 3q 0 2 (b) Mn pQn , 1q 0 2 (c) Comparison 1 600 600 0.8 400 400 200 200 0.6 0.4 0.2 0 0 0 2 0 (d) Mn pS n , 4q 0 2 (e) Mn pQn , 3q 0 2 (f) Comparison Figure 1: Simulated densities of the weak limits. The histograms are obtained from 104 runs of the test statistic (9). For the comparison, the corresponding densities have been estimated ), Mn pQn , vq ( )). Top row: optimal by a standard kernel estimator (Mn pS n , vq ( calibration with the covering number, bottom row: alternative calibration using the VC-dimension. d Considered alternatives Consider a given family pQหšn qnPN of hypercube anomalies Qหšn ฤ‚ r0, 1s with Lebesgue measure |Qหšn | โ€œ an P p0, 1q. The corresponding discretized anomalies Qn :โ€œ d Ind X nQหšn ฤ‚ Ind have size |Qn | โ€ž nd an . We will consider alternatives Ki,n in (4) where ฮธn P ฮ˜n s.t. (22) ฮธin โ€œ ฮธ1n IQn . The parameters ฮธ1n determine the total strength of the anomaly, which is given by ยตn pQn q :โ€œ a m pฮธ1n q ยด m pฮธ0 q a |Qn | . v pฮธ0 q Clearly, any anomaly with fixed size or strength can be detected with asymptotic probability 1. Therefore, we will consider vanishing anomalies in the sense that an ล’ 0, ยตn pQn q ร• 8, as n ร‘ 8. (23) Furthermore, we will restrict to parameters ฮธ1n in (22) which yield uniformly bounded variances and uniform sub-exponential tails, this is ฤ E rexp psY qs ฤ C for all 0 ฤ s ฤ t and ฮธ P tฮธ0 u Y tฮธ1n u , (24) v ฤ vi โ€œ d nPN v pฮธ1n q ฤ vฬ„ v pฮธ0 q for all i P Ind , n P N (25) for Y โ€ž Fฮธ with constants t ฤ… 0, C ฤ… 0 and 0 ฤƒ v ฤƒ vฬ„ ฤƒ 8. In case of Gaussian observations with variance ฯƒ 2 , (24) and (25) are obviously satisfied, for a Poisson field this means that the intensities are bounded away from zero and infinity. 10 d Oracle and multiscale procedure Recall that by Qหš is the set of all hypercubes in r0, 1s (cf. Example 2.3), and Qn its discretization (cf. (3)). If the size an of the anomaly is known, but its position is then one would naturally ห‡ still unknown, ( restrict the set of candidate regions to RหšO :โ€œ Qหš P Qหš ห‡ |S หš | โ€œ an , and consequently scan only over (cf. (3)) ห‡ ( d ห‡ d หš หš หš RO n :โ€œ Q ฤ‚ In Q โ€œ In X nQ for some Q P RO . As for the true anomaly Qหš P RหšO , its discretized RO n . This gives ` versionO Qnห˜ alsoOsatisfies Qn P O rise to an oracle test, which rejects whenever Tn Y, ฮธ0 , Rn , v ฤ… q1ยดฮฑ,n where q1ยดฮฑ,n is the 1 ยด ฮฑ ` ห˜ quantile of Mn RnO , v as in (9). Similar as in Theorem 2.5 one can show that this quantile sequence ensures the oracle test to have asymptotic level ฮฑ. The asymptotic power of this oracle test can be seen as a benchmark for any multiscale test. To obtain a competitive multiscale ` ห˜ procedure, let us choose some rn satisfying (12), and furthermore assume that rn โ€œ o nd an , as otherwise the multiscale procedure will never be able to detect the true anomaly (as it is not contained in the set of candidate regions which we scan over). As now position and size of the anomaly are unknown, we consider all such sets in RหšMS โ€œ Qหš as candidate regions and consequently scan over ห‡ ( d ห‡ d หš หš หš RMS n|rn :โ€œ Q ฤ‚ In Q โ€œ In X nQ for some Q P Q and |Q| ฤ› rn . ` ห˜ Clearly the true anomaly Qหš satisfies Qหš P RหšMS , and by rn โ€œ o nd an its discretized version Qn also satisfies Qn P RMS n|rn . This gives rise to a multiscale test, which rejects whenever ยฏ ยด ยฏ ยด Mn pRMS n|rn ,v q MS MS MS Tn Y, ฮธ0 , RMS is the 1 ยด ฮฑ quantile of M :โ€œ q where q , v ฤ… q , v R n 1ยดฮฑ,n 1ยดฮฑ,n 1ยดฮฑ n|rn n|rn as in (9). Theorem 2.5 ensures that the multiscale test has asymptotic level ฮฑ. M pQหš ,v q หš ฤƒ 8 whenever v ฤ› VQหš โ€œ 1, and it holds Now, due to Theorem 2.4 q1ยดฮฑ :โ€œ q1ยดฮฑ O MS หš q1ยดฮฑ,n ฤ q1ยดฮฑ,n ฤ q1ยดฮฑ ฤƒ8 for all n P N and v ฤ› 1. Asymptotic power We will now show that the multiscale procedure described above (which requires no a priori knowledge on the scale of the anomaly) asymptotically detects the same anomalies with power 1 as the oracle benchmark procedure for a known scale. Hence, the penalty choice to calibrate all scales as in (6) (where Rหš โ€œ Qหš ), renders the adaptation to all scales for free, at least asymptotically. This can be seen as a structural generalization of (Sharpnack and Arias-Castro, 2016, Thms. 2 and 4), as under the alternative the whole distribution in (1) and not just its mean might change. Also the power considerations in Proksch et al. (2017) restrict to this simpler case. Theorem 2.9. In the setting described above, let an ล’ 0 be a sequence of scales such that 12 plog nq {nd โ€œ o pan q as n ร‘ 8. Denote by ห™ ห† ห™ ห† ` ห˜ ยตยดx x`ยต 2 `ฮฆ , xฤ›0 F x, ยต, ฯƒ :โ€œ ฮฆ ยด ฯƒ ฯƒ the survival function of a folded normal distribution with parameters ยต P R and ฯƒ 2 ฤ… 0, where ฮฆ is the cumulative distribution function of N p0, 1q. Let furthermore v ฤ› VQหš โ€œ 1. If (23) is satisfied, then the following holds true: (a) The single scale procedure has asymptotic power โ€ฐ โ€œ ` ห˜ O Pฮธn Tn Y, ฮธ0 , RO n , v ฤ… q1ยดฮฑ,n d หœ โ€œ ฮฑ ` p1 ยด ฮฑqF O q1ยดฮฑ,n ` 2v log ห† ยธ ห™ n n ? m pฮธ q ยด m pฮธ q 1 v pฮธ q 0 1 1 a ` op1q. , nd{2 an , an v pฮธ0 q v pฮธ0 q 11 ` ห˜ (b) If an โ€œ o nฮฑยดd with ฮฑ ฤ… 0 sufficiently small, then the multiscale procedure has asymptotic power โ€ ยด ยฏ ฤฑ MS Pฮธn Tn Y, ฮธ0 , RMS , v ฤ… q 1ยดฮฑ,n n|rn d หœ ฤ› ฮฑ ` p1 ยด ฮฑqF MS q1ยดฮฑ,n ` 2v log ห† ยธ ห™ m pฮธ1n q ยด m pฮธ0 q v pฮธ1n q 1 d{2 ? a , ` op1q. ,n an an v pฮธ0 q v pฮธ0 q Remark 2.10. In (Sharpnack and Arias-Castro, 2016) a` similar ห˜ result in case of Gaussian observations is shown. Note that the condition that an โ€œ o nฮฑยดd with ฮฑ ฤ… 0 sufficiently small is missing there, but is however necessary for the proof to work. In (Proksch et al., 2017) it suffices to assume an ล’ 0, as the maximum can be explicitly controlled due to its Gumbel-limit. The above Theorem allows us to explicitly describe those anomalies which will be detected with asymptotic power 1: Corollary 2.11. Under the setting in this section and the Assumptions of Theorem 2.9 any such anomaly is detected with asymptotic power 1 either by the single scale or the multiscale testing procedure if and only if c ยด ยฏ ? 2v pฮธ0 q log a1n ยด nd{2 an |m pฮธ1n q ยด m pฮธ0 q| a ร‘ ยด8 (26) v pฮธ1n q as n ร‘ 8. ห˜ ` Example 2.12. 1. In case of Gaussian observations Yi โ€ž N โˆ†n IQn , ฯƒ 2 with variance ฯƒ 2 , where the baseline mean is 0 and โˆ†n the size of the anomaly, this yields detection if and only if d ห† ห™ 1 d{2 ? as n ร‘ 8. |โˆ†n | n an ร ฯƒ 2v log an If we calibrate the statistic with the packing number v โ€œ VQหš โ€œ 1 (cf. Example 2.3), then this coincides with the well known asymptotic detection boundary for hypercubes, see e.g. Arias-Castro et al. (2005); Frick et al. (2014) for d โ€œ 1, Butucea and Ingster (2013) for d โ€œ 2, or Kou (2017) for general d. ห˜ ` 2. For Bernoulli r.v.โ€™s Yi โ€ž Ber p0 IQcn ` pn IQn with p0 , pn P p0, 1q s.t. p0 ` pn ฤ 1, the condition (26) reads as follows: c ยด ยฏ ? 2p0 p1 ยด p0 q log a1n ยด nd{2 an |pn ยด p0 | a ร‘ ยด8. pn p1 ยด pn q Note, that the minimax detection rate is unknown in this case to best of our knowledge. ห˜ ` 3. For a Poisson field Yi โ€ž Poi ฮป0 IQcn ` ฮปn IQn with ฮป0 , ฮปn ฤ… 0, Theorem 2.9 and Corollary 2.11 can only be applied if ฮปn is a bounded sequence. In this case, (26) reduces to c ยด ยฏ ? 2ฮป0 log a1n ยด nd{2 an |ฮปn ยด ฮป0 | ? ร‘ ยด8. ฮปn Again, the minimax detection rate is unknown in this case to best of our knowledge. 12 3 Auxiliary results Our results rely heavily on a coupling result which allows us to replace the maximum over partial sums of standardized NEF r.v.โ€™s by a maximum over a corresponding Gaussian version. This can be obtained from recent results by Chernozhukov et al. (2014) as soon as certain moments can be controlled, which is the purpose of the following two Lemmata, proofs can be found in Section 4. In what follows, the letter C ฤ… 0 denotes some constant, which might change from line to line. We start with controlling the maximum of powers of uniformly sub-exponential random variables: Lemma 3.1. Let Wi , i โ€œ 1, 2, . . . be independent sub-exponential random variables s.t. there exist k1 ฤ… 1 and k2 ฤ… 0 s.t. P r|Wi | ฤ… ts ฤ k1 exppยดk2 tq (27) for all i. Then for all m P N there exists a constant C, s.t. for all N ฤ› 2 ๏šพ โ€ž E max |Wi |m ฤ C plog N qm . 1ฤiฤN It is well-known that the above bound can be improved for sub-Gaussian random variables to โ€ž ๏šพ a (28) E max |Xi | ฤ C log N . 1ฤiฤN Now we will show that the maximum over the partial sum process of independent random variables can be bounded by the maximum over the corresponding Gaussian version. The latter can be controlled as in (28) by exploiting the fact that a maximum over dependent Gaussian random variables is always bounded by a maximum over corresponding independent Gaussian random variables (see e.g. SฬŒidaฬk, 1967) ๏ฌ€ ยซ a |XI | (29) ฤ C log p# pIqq E max a IPI |I| i.i.d. with Xi โ€ž N p0, 1q and XI :โ€œ ล™ Xi . This allows us to prove the following: iPI Lemma 3.2. Let pZi qiโ€œ1,...,N be independent random variables with E rZi s โ€œ 0 and denote ZI :โ€œ ล™ Zi . If I is an arbitrary index set of sets tIuIPI , then there exists a constant C ฤ… 0 independent iPI of I s.t. ยซ ๏ฌ€ โ€ž ๏šพ a |ZI | E max a ฤ C log p# pIqq E max |Zi | . IPI 1ฤiฤN |I| With the help of these two lemmata, the following coupling result can then be shown: Theorem 3.3 (Coupling). Let Zi , i P Ind independent, E rZi s โ€œ 0, V rZi s โ€œ 1, such that (27) is satisfied for all i with uniform constants k1 ฤ… 1 and k2 ฤ… 0. Let furthermore vi P rv, vs, i P Ind with i.i.d. 0 ฤƒ v ฤ v ฤƒ 8 independent of i and n, and Xi โ€ž N p0, 1q, i โ€œ 1, . . . , nd , and Rn , s.t. inequality (14) holds. Then หœห† ห™1{6 ยธ รฟ log10 pnq 1 รฟ ยด1{2 vi Xi โ€œ OP vi Zi ยด max |R| . max a RPRn : RPRn : rn |R| iPR iPR |R|ฤ›rn |R|ฤ›rn 13 4 Proofs In this section we will give all proofs. In the following we will denote by pn the cardinality of Rn , i.e. pn :โ€œ #pRn q, which by (14) satisfies logppn q โ€ž log n. Recall that C denotes a generic constant which might differ from line to line. 4.1 Proof of the auxiliary results We start with proving the auxiliary statements from section 3. Proof of Lemma 3.1. Let hptq :โ€œ k1 exppยดk2 tq, then โ€ž ๏šพ โ€ž ๏šพ N P max |Wi | ฤ… t โ€œ 1 ยด P max |Wi | ฤ t ฤ 1 ยด p1 ยด hptqq ฤ N hptq. 1ฤiฤN 1ฤiฤN Let tฬ„ โ€œ hยด1 p1{N q ฤ C logpN q, then โ€ž ๏šพ โ€ž ๏šพ ลผ8 m mยด1 E max |Wi | โ€œm t P max |Wi | ฤ… t dt 1ฤiฤN 1ฤiฤN 0 ลผ tฬ„ ลผ8 tmยด1 N hptq dt tฬ„ 0 ลผ8 m tmยด1 exppยดk2 tq dt ฤ pC logpN qq ` k1 mN ฤm tmยด1 dt ` m tฬ„ m ฤ C plog N q , where the last inequality follows from integration by parts. i.i.d. Proof of Lemma 3.2. Let Xi โ€ž N p0, 1q and ri be i.i.d. Rademacher random variables, i.e. they take the values ห˜1 with probability 1{2. Step (i): Since the Xi are symmetric ห‡ ห‡ ห‡๏ฌ€ ห‡๏ฌ€๏ฌ€ ยซ ยซ ยซ ห‡ 1 ห‡ห‡รฟ 1 ห‡ห‡รฟ ห‡ห‡ ห‡ (30) E max a ห‡ Xi ห‡ โ€œ Er E max a ห‡ ri Xi ห‡ . I ห‡ I |I| ห‡iPI ห‡ |I| ห‡iPI By Lemma 4.5 of (Ledoux and Talagrand, 1991) and choosing F ptq โ€œ t, ฮทi โ€œ Xi and xi :โ€œ pci,I qI , where ci,I :โ€œ ?1 ItiPIu (a scaled indicator function) and as norm the max ยดnorm, we obtain |I| Er ห‡ ห‡ ห‡๏ฌ€ c ห‡๏ฌ€ ยซ ฯ€ 1 ห‡ห‡รฟ ห‡ห‡ 1 ห‡ห‡รฟ ห‡ห‡ E max a ห‡ Xi ห‡ . max a ห‡ ri ห‡ ฤ I I 2 |I| ห‡iPI ห‡ |I| ห‡iPI ห‡ ยซ (31) Step (ii): Let pZi1 q1ฤiฤN be a sequence of independent copies of pZi q1ฤiฤN and define the symฤ‚i :โ€œ Zi ยด Z 1 and equally the symmetrized version of ZI by Z ฤ‚I :โ€œ metrized version of Zi by Z i ล™ 1 iPI pZi ยด Zi q. Then by using the same argument as in (30) and Fubiniโ€™s theorem, we derive ๏ฌ€ ยซ ๏ฌ€ ยซ 1 ห‡ห‡ ฤ‚ ห‡ห‡ 1 E max a |ZI | ฤ 2E max a ห‡ZI ห‡ I I |I| |I| ห‡ ห‡๏ฌ€๏ฌ€ ยซ ยซ 1 ห‡ห‡รฟ ฤ‚ ห‡ห‡ โ€œ 2Er E max a ห‡ Zi ri ห‡ I ห‡ |I| ห‡iPI ห‡๏ฌ€๏ฌ€ ห‡ ยซ ยซ 1 ห‡ห‡รฟ ฤ‚ ห‡ห‡ โ€œ 2E Er max a ห‡ Zi ri ห‡ I ห‡ |I| ห‡iPI ห‡ ห‡๏ฌ€๏ฌ€ ยซ ยซ 1 ห‡ห‡รฟ ห‡ห‡ฤ‚ห‡ห‡ ห‡ห‡ โ€œ 2E Er max a ห‡ ห‡Zi ห‡ ri ห‡ , I ห‡ |I| ห‡iPI 14 where the last equality holds in view of the symmetry of ri . Now we will use the contraction principle, i.e. Theorem 4.4 of (Ledoux and Talagrand, 1991) with F ptq โ€œ t conditionally on |Zฤ‚i pฯ‰q| , which is independent of pri q. By choosing xi as in Step (i) we get (after ฮฑi :โ€œ ฤ‚ max |Zj pฯ‰q| j ฤ‚j pฯ‰q|) multiplying both sides with max |Z j Er Therefore ห‡๏ฌ€ ห‡ ยซ โ€ž ห‡ ห‡๏šพ 1 ห‡ห‡รฟ ห‡ห‡ฤ‚ ห‡ห‡ ห‡ห‡ 1 ห‡ฤ‚ ห‡ max a ห‡ ห‡Zi pฯ‰qห‡ ri ห‡ ฤ E max ห‡Zi pฯ‰qห‡ Er max ? I 1ฤiฤN I ห‡ ห‡ I |I| iPI ยซ ห‡๏ฌ€ ห‡ ห‡รฟ ห‡ ห‡ ห‡ ห‡ ri ห‡ . ห‡iPI ห‡ ห‡๏ฌ€ ห‡ ๏ฌ€ ยซ โ€ž ห‡ ห‡๏šพ 1 1 ห‡ห‡รฟ ห‡ห‡ ห‡ฤ‚ ห‡ E max a |ZI | ฤ 2E max ห‡Zi pฯ‰qห‡ Er max a ห‡ ri ห‡ I 1ฤiฤN I |I| |I| ห‡iPI ห‡ ห‡ ห‡๏ฌ€ ยซ โ€ž ๏šพc 1 ห‡ห‡รฟ ห‡ห‡ ฯ€ E max a ห‡ Xi ห‡ ฤ 4E max |Zi | I 1ฤiฤN 2 |I| ห‡iPI ห‡ ยซ ๏ฌ€ โ€ž ๏šพ ? |XI | , โ€œ 8ฯ€E max |Zi | E max a 1ฤiฤN I |I| ยซ where we used (31) in the second inequality. Now the statement follows from (29). Proof of Theorem 3.3. Enumerate each region in Rn by j, 1 ฤ j ฤ pn and define vi Xij :โ€œ a Zi ItiPRj u It|Rj |ฤ›rn u , |Rj | Xi :โ€œ pXij qjโ€œ1,...,pn , for some sequence rn . Then Z :โ€œ max 1ฤjฤpn ล™N iโ€œ1 (32) d i โ€œ 1, . . . , N โ€œ n , Xij satisfies 1 รฟ D vi Zi . Z โ€œ max a RPRn : |R| iPR |R|ฤ›rn Recall that logppn q ร€ logpnq. According to (Chernozhukov et al., 2014, Cor. 4.1) we find that ล™N for every ฮด ฤ… 0 there exists a Gaussian version Zฬƒ :โ€œ max iโ€œ1 vi Nij with independent random 1ฤjฤpn vectors N1 , . . . , Nn in Rpn , Ni โ€ž N p0, E rXi Xit sq, 1 ฤ i ฤ N , such that ห‡ ฤฑ โ€ห‡ ( logpnq ห‡ ห‡ P ห‡Z ยด Zฬƒ ห‡ ฤ… 16ฮด ร€ ฮด ยด2 B1 ` ฮด ยด1 pB2 ` B4 q logpnq logpnq ` nd where ห‡ ห‡๏ฌ€ N ห‡รฟ ห‡ ห‡ ห‡ B1 :โ€œ E max ห‡ pXij Xik ยด E rXij Xik sqห‡ 1ฤj,kฤpn ห‡ ห‡ iโ€œ1 ยซ ๏ฌ€ N รฟ 3 B2 :โ€œ E max |Xij | ยซ 1ฤjฤpn B4 :โ€œ N รฟ iโ€œ1 E โ€ž iโ€œ1 3 max |Xij | It 1ฤjฤpn max |Xij |ฤ…ฮด{ logppn _nqu 1ฤjฤpn B1 can be controlled as follows. With Xij from (32) we derive ห‡๏ฌ ห‡ ยป ห‡ ห‡ รฟ 2 2 ห‡ ห‡ v pZ ยด 1q i i ห‡๏ฌ‚ ห‡ โ€“ a max B1 โ€œ E ห‡ ห‡ 1ฤj,kฤpn : ห‡ |R ||R | j k ห‡ iPR XR j k |R |,|R |ฤ›r j k n 15 ๏šพ . ยป โ€œ Eโ€“ max 1ฤj,kฤpn : |Rj |,|Rk |ฤ›rn ห‡๏ฌ ห‡ a ห‡ ห‡ รฟ ห‡ |Rj X Rk | ห‡ห‡ 1 2 2 a a vi pZi ยด 1qห‡ห‡๏ฌ‚ . ห‡ |Rj ||Rk | ห‡ |Rj X Rk | iPRj XRk ห‡ Using the restriction on the size of the rectangles we find: d d |Rj X Rk | | mint|Rj |, |Rk |u| 1 ฤ ฤ ? . |Rj ||Rk | |Rj ||Rk | rn ล™ Denote Vi :โ€œ vi2 pZi2 ยด 1q, I :โ€œ Rj X Rk P I ฤ‚ Ind and SI :โ€œ iPI Vi . Now ยซ ๏ฌ€ |SI | 1 . B1 ฤ ? E max a IPI rn |I| Using Lemma 3.2 we obtain C a log p#pIqq E B1 ฤ ? loooooomoooooon rn ? โ€ž It remains to estimate E โ€ž |vi2 pZi2 max 1ฤiฤN logpnq โ€ž max 1ฤiฤN |vi2 pZi2 ๏šพ ยด 1q| ๏šพ โ€ž ๏šพ 2 2 ยด 1q| โ€œ E max vi |Zi ยด 1| 1ฤiฤN ๏šพ โ€ž 2 2 ฤ E max v |Zi ยด 1| 1ฤiฤN โ€ž ๏šพ 2 2 ฤ v E max |Zi | ` v 2 . 1ฤiฤN So in total we get by Lemma 3.1 a ห† 5 ห™1{2 ห˜ logpnq ` 2 log pnq B1 ร€ ? v C logpN q2 ` v 2 ร€ . rn rn For B2 we compute B2 ฤ 1 1{2 prn q E โ€ž 3 max |vi Zi | 1ฤiฤN ฤ v3 ๏šพ E 1{2 prn q โ€ž ๏šพ ห† 6 ห™1{2 log pnq max |Zi |3 ร€ , 1ฤiฤN rn where we again used Lemma 3.1. Now let ฮด ฤ… 0 be fixed. Then ๏ฌ ยป N 3 รฟ |v Z | i i ๏ฌ‚ B4 ฤ E โ€“ max I |vi Zi | ฮด u ฤ… plog 1ฤjฤpn : |Rj |3{2 tmax pq |Rj |1{2 j iโ€œ1 |Rj |ฤ›rn ๏ฌ€ ยซ N 3 ฤ 3{2 max E |vi Zi | I 1{2 ฮดr u t|Zi |ฤ… |v | n rn 1ฤiฤN i log p Now let rn ฤ… ยด 2d|vi | ฮด ยฏ2 plog nq2`2ฮณ for some ฮณ ฤ… 1 for n ฤ› no pฮด, dq and hence B4 ฤ N โ€œ โ€ฐ max E |vi |3 |Zi |3 It|Zi |ฤ…plog nqฮณ u 3{2 rn 1ฤiฤN 16 ฤ N v3 3{2 rn 3 max 1ฤiฤN N v3 ลผ8 ลผ8 plog nqฮณ t2 P r|Zi | ฤ… ts dt t2 exppยดk2 tq dt 3{2 plog nqฮณ rn ลผ N v3 1 8 u2 exppยดuq du. โ€œ 3k1 3{2 3 k ฮณ rn 2 k2 plog nq ฤ 3k1 For u large enough s.t. u2 ฤ exppu{2q, i.e. for n ฤ› n1 pฮด, d, ฮณq, it holds ห† ห™ ลผ8 ยด uยฏ 3k1 v 3 N 3k1 v 3 N k2 ฮณ B4 ฤ du โ€œ exp ยด plog nq , exp ยด k23 rn3{2 k2 plog nqฮณ 2 k23 rn3{2 2 and then furthermore k2 2 ฮณ plog nq ฤ› pd log nq which implies B4 ฤ 3k1 v 3 nd 1 3k1 v 3 ยดd n โ€œ . 3 3 3{2 k2 prn q k2 prn q3{2 In conclusion we obtain ห† 10 ห™1{2 ห™1{2 ห† 7 โ€ ฤฑ log pnq log pnq ` ฮด ยด3 P |Z ยด Zฬƒ| ฤ… 16ฮด ร€ฮด ยด2 rn rn ห† 4 ห™1{2 log pnq logpnq ` ฮด ยด3 , ` rn3 nd which yields the claim. 4.2 Proofs of Section 2.2 Let us now prove the results from Section 2.2, including Theorems 2.4 and 2.5. We start with a Taylor expansion of Tn , which will allows us to apply Theorem 3.3. Lemma 4.1. Let Rn be a collection of sets s.t. (14) holds, วซ ฤ… 0 and prn qn ฤ‚ p0, 8q be a sequence, s.t. plog nq10`วซ {rn ร‘ 0. Suppose Yi โ€ž Fฮธ0 P F , i P Ind , are i.i.d. random variables, and recall that ยด1 ล™ for R P Rn we denote Y R :โ€œ |R| iPR Yi . Then it holds ห‡ ห‡ หœห† ห™1{4 ยธ ห‡ ห‡ 1 |Y R ยด mpฮธ0 q| ห‡ log3 pnq ห‡ 2 a max ห‡TR pY, ฮธ0 q ยด |R| ห‡ โ€œ OP RPRn : ห‡ rn vpฮธ0 q ห‡ |R|ฤ›rn as n ร‘ 8. Proof. For independent Gaussian random variables Xi โ€ž N p0, 1q it follows from (28) and(14) that ห‡๏ฌ€ ยซห‡ ห‡ รฟ ห‡ห‡ a ห‡ ยด1{2 Xi ห‡ ฤ C log n, E ห‡ max |R| ห‡ ห‡RPRn iPR hence รฟ 1 a max |R|ยด1{2 Xi โ€œ oP p1q. logpnq RPRn : iPR |R|ฤ›rn Combining this result with Theorem 3.3 (with vi โ€œ 1 for all i) we obtain ห‡ ห‡ 1 ห‡ห‡ รฟ Yi ยด mpฮธ0 q ห‡ห‡ 1 ? a max a ห‡ โ€œ oP p1q. ห‡ log n RPRn : |R| ห‡iPR vpฮธ0 q ห‡ |R|ฤ›rn 17 (33) Together with (14) it follows ห‡ ห‡ max ห‡Y R ยด mpฮธ0 qห‡ ฤ C RPRn : |R|ฤ›rn ห† logpnqvpฮธ0 q rn ห™ 12 p1 ` oP p1qq ร‘ 0, n ร‘ 8. ? Therefore, Y R ฤ… mpฮธ0 q{ 2 in probability if n is` large uniformly ห˜ enough โ€œ โ€ฐ over R, s.t. |R| ฤ› rn . Now we are in position to analyze JpY R , ฮธ0 q โ€œ ฯ† Y R ยด ฮธ0 Y R ยด ฯˆ pฮธ0 q in the definition of TR , ล› see (13). As the sup pฮธ pYi q is attained at that ฮธ for which ฯˆ 1 pฮธq โ€œ Y R we derive ฮธPฮ˜ iPR ` ห˜ ฯ†pY R q โ€œ xmยด1 pY R q, Y R y ยด ฯˆ mยด1 pY R q , and therefore ` ห˜ ` ห˜ JpY R , ฮธ0 q โ€œ xmยด1 pY R q, Y R y ยด ฯˆ mยด1 pY R q ยด xฮธ0 , Y R y ยด ฯˆpฮธ0 q ` ` ห˜ ห˜ โ€œ xmยด1 pY R q ยด ฮธ0 , Y R y ยด ฯˆ mยด1 pY R q ยด ฯˆpฮธ0 q . Note that Yฬ„R P Dpmยด1 q for large enough n, as the latter is an open set. A Taylor expansion of ฯˆ around ฮธ0 and one of second order of mยด1 around mpฮธ0 q, yields ยจ TR pY, ฮธ0 q โ€œ ห2|R| หœ Y R ยด mpฮธ0 q a vpฮธ0 q ยธ2 ` 2|R|sn หœ ยธห›1{2 Y R ยด mpฮธ0 q โ€š a vpฮธ0 q (34) with sn s.t. |sn pxq| ฤ cx3 ` oP p1q for some c ฤ… 0. Consequently ห‡ ห‡ ห‡1 2 pY R ยด mpฮธ0 qq2 ห‡ห‡ ห‡ TR pY, ฮธ0 q ยด |R| max ห‡ RPRn : ห‡ 2 vpฮธ0 q |R|ฤ›rn ร€ max |R| RPRn : |R|ฤ›rn ยด 12 โ€œ max |R| RPRn : |R|ฤ›rn |Y R ยด mpฮธ0 q|3 ` oP p1q vpฮธ0 q3{2 ห‡ล™ ห‡3 ห‡ ห‡ ห‡ iPR pYi ยด mpฮธ0 qq ห‡ ห‡ a a ห‡ ` oP p1q ห‡ |R| vpฮธ0 q ห‡ ฤplog3 pnqrnยด1 q1{2 ` oP p1q, 1 where we again used (33). Now |a ยด b| ฤ |a2 ยด b2 | 2 yields the claim. Now we are in position to prove Theorem 2.5. So far we have only shown that the maximum over the local likelihood ratio statistics can be approximated by Gaussian versions, but we did not include the scale penalization penv p|R|q in (7). To include this in the approximation result, we will slice the maximum into scales, where the penalty-term is almost constant. Then, we show that we may bound the maximum over all scales by the sum of the maximum over theses families. The price to pay is an additional logpnq factor on the smallest scale. Proof of Theorem 2.5. (a) It follows from the triangle inequality |}x}8 ยด }y}8 | ฤ }x ยด y}8 , Lemma 4.1 and (12) that ห‡ ห‡ ห‡ ห‡ max pTR pY, ฮธ0 q ยด penv p|R|qq ยด ห‡ RPRn : ห‡|R|ฤ›r n 18 max RPRn : |R|ฤ›rn ห‡ ห‡ ยธห‡ห‡ หœห† ห™1{4 ยธ ห‡ Y ยด mpฮธ q ห‡ ห‡ log3 pnq ห‡ ห‡ R 0 1{2 ห‡ |R| ห‡ a . ห‡ ยด penv p|R|q ห‡ โ€œ OP ห‡ rn vpฮธ0 q ห‡ ห‡ หœ Define Y R :โ€œ |R|ยด1{2 X R :โ€œ |R|ยด1{2 รฟ iPR รฟ หœ Yi ยด mpฮธ0 q a vpฮธ0 q Xi , iPR ยธ i.i.d. Xi โ€ž N p0, 1q. With this notation and a symmetry argument we find from the proof of Theorem 3.3 with vi โ€ 1 that ห‡ ๏ฌ ยปห‡ ห‡ ห‡ ห† 10 ห™1{2 ห‡ R ห‡ห‡ ห‡ Rห‡ ห‡ log pnq P โ€“ห‡ห‡ max ห‡Y ห‡ ยด max ห‡X ห‡ห‡ห‡ ฤ… ฮด ๏ฌ‚ ร€ ฮด ยด3 . RPRn : RPRn : rn ห‡ ห‡|R|ฤ›r |R|ฤ›r n n 12 1{10 Let ฮดn :โ€œ pplog pnq{rn q ล’ 0. Now define วซj :โ€œ jฮดn , j P N and Rn,j :โ€œ tR P Rn | exppวซj q ฤƒ |R| ฤƒ exppวซj`1 qu . Then the set of candidate regions Rn can be written as * " ฤŸ ` ห˜ 1 1 log log12 pnq , . . . , logpnd q Rn|rn โ€œ Rn,j , J :โ€œ ฮดn ฮดn jPJ with |J| ฤ logpnd q ฮดn . If we abbreviate penj :โ€œ penv pexp pวซj qq โ€œ d ห† ห† 2v log nd exppวซj q ห™ ห™ `1 , then the slicing above implies penj`1 ฤ penv p|R|q ฤ penj , ยด? ? ? ยฏ ? Using a ยด b โ€œ pa ยด bq{ a ` b , we get for all R P Rn,j . 0 ฤ penj ยด penj`1 2vpวซj`1 ยด วซj q a โ€œa . 2v rlogpnd q ` 1 ยด วซj s ` 2v rlogpnd q ` 1 ยด วซj`1 s The largest index in J is ฮด1n logpnd q and therefore the maximal value of วซi is given by วซฬ„ โ€œ logpnd q and logpnd q ` 1 ยด วซฬ„ โ€œ 1. Therefore, c 2vpวซj`1 ยด วซj q v ? โ€œ ฮดn 0 ฤ penj ยด penj`1 ฤ . 2 2 2v This means that for n ร‘ 8 the penalty terms penv p|R|q, R P Rn,j can be considered as constant. Now straight forward computations show that ห‡ ห‡ ห‡ ห‡ ห‡ ห˜ `ห‡ R ห‡ ห˜ห‡ `ห‡ R ห‡ ห‡ max ห‡Y ห‡ ยด penv p|R|q ยด max ห‡X ห‡ ยด penv p|R|q ห‡ ห‡ RPRn : ห‡ RPRn : ห‡|R|ฤ›r ห‡ |R|ฤ›rn n c ห‡ ห‡ ห‡ ห‡ห‡ ห‡ ห‡ ห‡ v ฤ max ห‡ห‡ max ห‡Y R ห‡ ยด max ห‡X R ห‡ห‡ห‡ ` ฮดn . RPRn,j jPJ RPRn,j 2 d q Now the claim follows from |J| ฤ logpn ฮดn . (b) This is a direct consequence of (a). 19 We will now continue with the proof of Theorem 2.4. Taking into account the result of Theorem 2.5, we only have to prove Remark 2.6, which will be done in the following. Lemma 4.2. Let Rหš satisfy Assumption 1 and be equipped with the canonical metric ฯหš as in (15) i.i.d. d and define Rn as in (3). Furthermore let W denote white noise on r0, 1s . For Xi โ€ž N p0, 1q, d i P In define Zn pRหš q :โ€œ nยดd{2 รฟ i{nPRหš รฟ D Xi โ€œ nยดd{2 iPt1,...,nud |nRหš X Ai | Xi , Rหš P Rหš where Ai โ€œ pi1 ยด 1, i1 s ห† . . . ห† pid ยด 1, id s is the unit cube with upper corner i. Then it holds D Zn ร‘ W, n ร‘ 8. Proof. Note that Rหš is totally bounded w.r.t. ฯหš . We will show the assumptions of (Kosorok, 2008, Thm. 2.1): 1. Tightness: The white noise W is tight. 2. Totally boundedness: By Markovโ€™s inequality and standard bounds on the modulus of continuity, we obtain using Assumption 1(a) that ๏ฌ ยป โ€” Pหš โ€” โ€“ sup หš หš Rหš 1 ,R2 PR หš ฯpRหš 1 ,R2 qฤฮด ยป ๏ฌƒ |Zn pR1หš q ยด Zn pR2หš q| ฤ… วซ๏ฌƒ ๏ฌ‚ ๏ฌ ๏ฌƒ 1 โ€” sup |Zn pR1หš q ยด Zn pR2หš q|๏ฌƒ ฤ Eโ€” ๏ฌ‚ โ€“ วซ Rหš ,Rหš PRหš 1 2 หš ฯpRหš 1 ,R2 qฤฮด ลผฮดa ร€ uยด2ฮฝpRหš q ยด 1 du 0 which tends to 0 as ฮด ล’ 0. 3. Finite dimensional convergence: The convergence of the finite-dimensional laws is an application of the central limit theorem for random fields (Dedecker, 1998, Thm 2.2) and (Dedecker, 2001, Lemma 2), which shows that ห‡ หš ห‡ ห‡nR X Zd ห‡ ร‘ |Rหš | nd for regular Borel sets Rหš ฤ‚ r0, 1sd with |Rหš |q ฤ… 0. Consequently, the central limit theorem shows for any fixed Rหš P Rหš that D Zn pRหš q ร‘ N p0, |Rหš |q as nร‘8 A similar computation shows that Cov pZn pR1หš q, Zn pR2หš qq ร‘ |R1หš X R2หš | for all R1หš , R2หš P R. This shows finite dimensional convergence. 20 Now we want to apply the generalized version of the continuous mapping theorem (see e.g. Billingsley, 2013, Thm. 5.5). For c ฤ› 0 and x P CpBpr0, 1sdq, Rq, where Bpr0, 1sdq denote the Borel sets of r0, 1sd define ยธ หœ หš ` ห˜ |xpR q| a ยด penv nd |Rหš | hc pxq :โ€œ sup |Rหš | Rหš PRหš : |Rหš |ฤ…cd hcn pxq :โ€œ max RPRn : |R|ฤ…pcnqd หœ ยธ |xpR{nq| a ยด penv p|R|q . |R|{nd The necessary conditions to apply the continuous mapping theorem are given by the following Lemma: ห˜ ` Lemma 4.3. Consider hc , hcn as functions CpBpr0, 1sdq, Rq, } ยจ }8 ร‘ R. i) hc is uniformly continuous and phcn qnPN is a sequence of equi-continuous functions, (uniformly in n). ii) For pxn qn P CpBpr0, 1sdq, Rq, s.t. xn ร‘ x it holds hcn pxn q ร‘ hc pxq, n ร‘ 8. Proof. i) Let วซ ฤ… 0, choose ฮด โ€œ วซcd{2 . Consider two functions x, y P CpBpr0, 1sdq, Rq s.t. dpx, yq โ€œ sup ||xpRหš q| ยด |ypRหš q|| ฤƒ ฮด. By using |max ai ยด max bi | ฤ max |ai ยด bi | we find Rหš ฤ‚r0,1sd |hcn pxq ยด hcn pyq| ห‡ ห‡ ห‡ |xpR{nq| ยด |ypR{nq| ห‡ ฮด ห‡ ห‡ a ฤ max ห‡ ห‡ ฤ d{2 โ€œ วซ. d RPRn ห‡ ห‡ c |R|{n d |R|ฤ…pcnq Similar arguments yield the uniform continuity of hc . ii) Let pxn qn , x P CpBpr0, 1sdq, Rq, s.t. xn ร‘ x. Since the functions phcm qmPN are equicontinuous, for any วซ ฤ… 0 we can find an N1 P N s.t. @n ฤ… N1 @m : |hcm pxn q ยด hcm pxq| ฤƒ วซ . 2 Given วซ and N1 and n ฤ… N1 with |hcm pxn q ยด hcm pxq| ฤƒ 2วซ , choose m โ€œ n. Then |hcn pxn q ยด hcn pxq| ฤƒ วซ{2. (35) Now let us define ( A :โ€œ Rหš P Rหš : |Rหš | ฤ› cd , ( Bn :โ€œ R{n P Rหš : R P Rn , |R| ฤ› pcnqd . The set A is a compact set w.r.t. the metric ฯหš defined in (15), w.r.t. which Rหš is totally d bounded. Furthermore Bn is a finite subset of A. If we fix x P Bpr0, 1s q and introduce g : A ร‘ R by ยธ หœ |xpRหš q| หš หš ยด penv p|R |q , Rหš P Rหš , gpR q :โ€œ a |Rหš | then it holds gpRหš q. hc pxq โ€œ sup gpRหš q ฤ hcn pxq โ€œ max หš R PBn Rหš PA 21 (36) since Bn is a subset of A. Straight forward computations show that g is continuous w.r.t. r P A s.t. hc pxq โ€œ gpRq. r Now ฯหš , which implies by compactness of A that there exists an R r r let Rn P Bn be a sequence s.t. Rn ร‘ R, n ร‘ 8 w.r.t. ฯ. Then gpRn q ร‘ gpRq as n ร‘ 8 and hence (36) hc pxq ฤ› hcn pxq ฤ› gpRn q ร‘ gpRฬƒq โ€œ hc pxq. Consequently there exists a N2 P N s.t. @n ฤ… N2 it holds |hc pxq ยด hcn pxq| ฤƒ วซ{2, which together with (35) implies |hcn pxn q ยด hc pxq| ฤ วซ for all n ฤ… maxtN1 , N2 u. Now we are in position to prove Remark 2.6: Proof of Remark 2.6. By Proposition 4.2 and the generalized version of the continuous mapping theorem (see e.g. Billingsley, 2013, Thm. 5.5) we get D hcn pZn q ร‘ hc pW q, n ร‘ 8. The functions hcn and hc have been defined such that ยด ยฏ and hc pW q โ€œ M Rหš|cd , v , ` ห˜ hcn pZn q โ€œ Mn Rn|pcnqd , v , i.e. for all c ฤ… 0 holds ยด ยฏ ` ห˜ D Mn Rn| pcnqd , v ร‘ M Rหš|cd , v n ร‘ 8. as ยฏ ยด D Since M Rหš|cd , v ร‘ M pRหš , vq , c ร‘ 0, we get ` ห˜ lim lim Mn Rn| pcnqd , v โ€œ M pRหš , vq . cร‘0 nร‘8 It can also readily be seen from the definition that ห˜ โ€ฐ โ€œ ` lim inf P Mn Rn| rn , v ฤ t ฤ› P rM pRหš , vq ฤ ts . nร‘8 Now let c ฤ… 0 be fixed and assume rn ฤƒ pcnqd for all n P N. Then we obtain altogether that ห˜ โ€ฐ โ€œ ` P rM pRหš , vq ฤ ts ฤ lim inf P Mn Rn| rn , v ฤ t nร‘8 โ€œ ` ห˜ โ€ฐ ฤ lim sup P Mn Rn| pcnqd , v ฤ t nร‘8 ร‘ P rM pRหš , vq ฤ ts as c ล’ 0, which yields the claim. Proof of Theorem 2.4. The main statement follows from Theorem 2.5 together with Remark 2.6. It remains to show a.s. boundedness and non-degenerateness of M pRหš , vq. We apply (Duฬˆmbgen and Spokoiny, 2001, Thm. 6.1) with ฯหš as in (15) and ฯƒ 2 pRหš q :โ€œ |Rหš | , XpRหš q :โ€œ W pRหš q. 22 Let us check the three conditions from their theorem: i) ฯƒ 2 pR1หš q ฤ ฯƒ 2 pR2หš q ` ฯหš pR1หš , R2หš q2 for all R1หš , R2หš P Rหš is obviously fulfilled since R1หš X R2หš ฤ‚ R2หš and R1หš zR2หš ฤ‚ R1หš โ–ณ R2หš . Since V rW pRหš qs โ€œ |Rหš |, ห† 2ห™ โ€ ฤฑ 1 ฮท . (37) P rXpRหš q ฤ… ฯƒpRหš qฮทs โ€œ P W pRหš q ฤ… ฮท p|Rหš |q1{2 ฤ exp ยด 2 2 ii) For โ€ ฤฑ P r|XpR1หš q ยด XpR2หš q| ฤ… ฯpR1หš , R2หš qฮทs โ€œ P |W pR1หš q ยด W pR2หš q| ฤ… |R1หš โ–ณ R2หš |q1{2 ฮท 2 2 we compute that W pR1หš qยดW pR2หš q โ€ž N p0, ฯƒR โ€œ |R1หš |`|R2หš |ยด2 CovpW pR1หš q, W pR2หš qq หš หš q, ฯƒ หš R1 ,Rหš 1 ,R2 2 and |R1หš โ–ณ R2หš | โ€œ |R1หš | ` |R2หš | ยด 2 |R1หš X R2หš |. With CovpW pR1หš q, W pR2หš qq โ€œ |R1หš X R2หš | we consequently find หœ ยธ ห† 2ห™ ฮท 2 |R1หš โ–ณ R2หš | ฮท หš หš หš หš P r|XpR1 q ยด XpR2 q| ฤ… ฯpR1 , R2 qฮทs ฤ exp ยด โ€œ exp ยด . 2 2 ฯƒR 2 หš หš ,R 1 2 iii) Is fulfilled by Assumption 1(a) (cf. Remark 2.2). (37) holds with ยดW pRหš q as well, hence we get that the statistic M pRหš , vq ฤƒ 8 a.s. Nondegenerateness is obvious, as M is always larger than the value of the local statistic on one fixed scale, which is non-degenerate. 4.3 Proofs of Section 2.3 Let us now prove the results from Section 2.3, namely Theorem 2.9 and Corollary 2.11. First we introduce some abbreviations to ease notation. Let O q หš :โ€œ q1ยดฮฑ,n , MS q :โ€œ q1ยดฮฑ,n and denote the total signal on Q P Qn by ยด1{2 ยตn pQq :โ€œ |Q| รฟ mpฮธn q ยด mpฮธ0 q |Q X Qn | m pฮธ1n q ยด m pฮธ0 q i a a โ€œ a . vpฮธ0 q |Q| v pฮธ0 q iPQ For brevity introduce the Gaussian process ห‡ ห‡ ห‡ ห‡ รฟ 1 ห‡ ห‡ n vi Xi ห‡ ยด penv p|Q|q , ฮณ pQq :โ€œ ห‡ยต pQq ` |Q|ยด 2 ห‡ ห‡ iPQ (38) Q P Qn a i.i.d. with Xi โ€ž N p0, 1q and vi โ€œ v pฮธi q {v pฮธ0 q. Let us now start with the analysis of the oracle procedure. As a preparation we require to leave out a suitable subset of hypercubes close to the true anomaly Qn . Therefore, choose a sequence ฮตn such that ฮตn ล’ 0 but ฮตn ยตn pQn q ร‘ 8 and denote the set of all hypercubes which are close to the anomaly by ห‡ ( Un :โ€œ Q P Qn pan q ห‡ ยตn pQq ฤ› ยตn pQn q p1 ยด ฮตn q . Furthermore define the extended neighborhood of the anomaly by ห‡ ( U :โ€œ Q P Qn pan q ห‡ Q X Q1 โ€ฐ H for some Q1 P Un , its complement by T :โ€œ Qn pan q zU. By definition, tฮณ pQquQPT and tฮณ pQquQPUn are independent, which will allow us to compute the asymptotic power of the single-scale procedure. For a sketch of Un and U see Figure 2. 23 Figure 2: Exemplary elements of the sets Un , U and T in d โ€œ 2: The anomaly is shown in red, the hatched cubes belong to Un , the dotted cubes to U, and all black cubes belong to T . By definition, for all Q P Un and Q1 P T it holds Q X Q1 โ€œ H, which implies independence of tฮณ pQquQPT and tฮณ pQquQPUn . Lemma 4.4. Consider the setting from Section 2.3 and recall that q หš is the p1 ยด ฮฑqยดquantile of Mn pQn pan qq as in (9). Then ห‡ ห‡ 1 ห‡ล™ ห‡ (a) max |Q|ยด 2 ห‡ iPQ vi Xi ห‡ โ€œ OP p1q as n ร‘ 8 QPU โ€ž ๏šพ (b) lim P max ฮณ pQq ฤ q หš โ€œ 1 ยด ฮฑ nร‘8 QPT 2 Proof. We starta with bounding the covering number N pU, ฯ, วซq w.r.t. the canonical metric ฯ pQ, Q1 q โ€œ 1 2 ยด 2 |Q X Q | { |Q| |Q1 |. First note that all sets in U have fixed size |Qn |. Hence, given some วซ ฤ… 0, one has ยฏ ห‡ ห‡ ยด ` ห˜2 ห‡Q X Q1 ห‡ ฤ› 1 ยด วซ |Qn | , ฯ Q, Q1 ฤ วซ รด 2 ห˜ T P` วซ 1 2 1 i.e. ฯ pQ, Q q ฤ วซ if and only if Q X Q contains at least 1 ยด 2 |Q ? n | many voxels. Consequently, as we onlyP`deal with it is straight forward to construct a วซ-covering of U with cardinality ห˜ cubes, T ฤ 5 |Qn | { 1 ยด 2วซ |Qn | , i.e. 5 |Qn | T. N pU, ฯ, วซq ฤ P` 2ห˜ 1 ยด วซ2 |Qn | (a) It follows from Dudleyโ€™s entropy integral (see e.g. Marcus and Rosen, 2006, Thm. 6.1.2) with any fixed Q1 P U that ห‡ ห‡๏ฌ€ ยซ ห‡รฟ ห‡ ห‡ ห‡ E max |Q|ยด1{2 ห‡ vi Xi ห‡ QPU ห‡ ห‡ iPQ ห‡ห‡๏ฌ€ ห‡๏ฌ€ ห‡ ห‡ ห‡ ห‡ ห‡ ยซ ยซ ห‡ห‡ ห‡ ห‡ ห‡รฟ ห‡รฟ ห‡ ห‡รฟ ห‡ห‡ ห‡ ห‡ ห‡ ห‡ ห‡ ห‡ 1 ยด1{2 ยด1{2 ยด |Q | v X ฤE |Q1 |ยด1{2 ห‡ vi Xi ห‡ ` E max v X |Q| ห‡ห‡ ห‡ ห‡ ห‡ ห‡ i i i i ห‡ห‡ ห‡ ห‡ ห‡iPQ1 ห‡iPQ1 Q,Q1 PU ห‡ ห‡iPQ d c c ห™ ห† ลผ2a ลผ2 2v 2 2v 2 วซ2 `C `C dวซ ฤƒ 8 ฤ log N pU, ฯ, วซq dวซ ฤ ยด log 1 ยด ฯ€ ฯ€ 2 0 0 which by Markovโ€™s inequality proves the claim. (b) A direct consequence of (a) is that ห‡ ห‡ ยซ ๏ฌ€ ห‡รฟ ห‡ ห‡ ยด 12 ห‡ max |Q| ห‡ vi Xi ห‡ ยด penv p|Q|q โ€œ oP p1q. QPU ห‡iPQ ห‡ 24 Furthermore note that ยตn pQq โ€œ 0 and vi โ€ 1, i P Q for Q P T . Consequently ห‡ ห‡ ๏ฌ€ ๏ฌ€ ยซ ยซ โ€ž ๏šพ ห‡รฟ ห‡ 1 ห‡ ห‡ Xi ห‡ ยด penv p|Q|q ฤ q หš P max ฮณ pQq ฤ q หš โ€œP max |Q|ยด 2 ห‡ ห‡iPQ ห‡ QPT QPT ห‡ ห‡ ๏ฌ€ ๏ฌ€ ยซ ยซ ห‡รฟ ห‡ ห‡ หš ยด 12 ห‡ Xi ห‡ ยด penv p|Q|q ฤ q ` op1q โ€œP max |Q| ห‡ ห‡iPQ ห‡ QPQn pan q โ€œP rMn pQn pan qq ฤ q หš s ` op1q which yields the claim. With this Lemma at hand, we are now in position to derive the asymptotic power of the oracle procedure: Proof of Theorem 2.9(a). To analyze Pฮธn rTn pY, ฮธ0 , Qn pan qq ฤ… q หš s, we start with showing a ฤ› in the statement of Theorem 2.9(a). By Lemma 4.1 and the triangle inequality we can replace Tn pY, ฮธ0 , Qn pan qq by ห‡ ห‡ ๏ฌ€ ยซ ห‡ รฟ Y ยด mpฮธ q ห‡ i 0 ห‡ ยด 12 ห‡ a max |Q| ห‡ ห‡ ยด penv p|Q|q ห‡iPQ QPQn pan q vpฮธ0 q ห‡ up to oP p1q. Furthermore (21) and Theorem 3.3 allow us to approximate the latter sum by a Gaussian version, i.e. โ€ž ๏šพ n หš หš max ฮณ pQq ฤ… q ` op1q. Pฮธn rTn pY, ฮธ0 , Q pan qq ฤ… q s โ€œ P n QPQ pan q Now we derive P โ€ž max n QPQ pan q โ€ž" ฮณ pQq ฤ… q หš ๏šพ * " *๏šพ หš หš max ฮณ pQq ฤ… q X max ฮณ pQq ฤ q QPT QPQn pan q โ€ž" * " *๏šพ หš หš `P max ฮณ pQq ฤ… q X max ฮณ pQq ฤ… q QPT QPQn pan q โ€ž" * " *๏šพ โ€ž ๏šพ โ€œP max ฮณ pQq ฤ q หš X max ฮณ pQq ฤ… q หš ` P max ฮณ pQq ฤ… q หš QPT QPU QPT โ€ž" * ๏šพ โ€ž ๏šพ ฤ›P max ฮณ pQq ฤ q หš X tฮณ pQn q ฤ… q หš u ` P max ฮณ pQq ฤ… q หš QPT QPT โ€ž ๏šพ โ€ž ๏šพ โ€œP max ฮณ pQq ฤ q หš P rฮณ pQn q ฤ… q หš s ` P max ฮณ pQq ฤ… q หš โ€œP QPT QPT where we exploited Qn P U and independence of tฮณ pQquQPT and ฮณ pQn q. Lemma 4.4(b) states that P rmaxQPT ฮณ pQq ฤ q หš s โ€œ 1 ยด ฮฑ ` op1q and hence Pฮธn rTn pY, ฮธ0 , Qn pan qq ฤ… q หš s ฤ› ฮฑ ` p1 ยด ฮฑq P rฮณ pQn q ฤ… q หš s ` op1q. Furthermore note that ฮณ pQn q ` penv p|Qn |q follows a folded normal distribution with parameters ยด1 ล™ 2 ยต โ€œ ยตn pQn q and ฯƒ 2 โ€œ |Qn | iPQn vi , this is ห‡ ` ห˜ห‡ ฮณ pQn q โ€ž ห‡N ยต, ฯƒ 2 ห‡ ยด penv p|Qn |q . We compute ยตn pQn q โ€œ a m pฮธ1n q ยด m pฮธ0 q a nd an 2, 5C p1 ` o p1qq , v pฮธ0 q 25 (39) รฟ v pฮธ1n q , v pฮธ0 q iPQn b ` ห˜ penv p|Q|q โ€œ 2v log aยด1 ` op1q n |Qn |ยด1 vi2 โ€œ (40) for all Q P Qn pan q , (41) which yields by continuity of F and Qn P Qn pan q the proposed lower bound. For the upper bound (i.e. ฤ in the statement of Theorem 2.9(a)) we proceed as before and obtain Pฮธn rTn pY, ฮธ0 , Qn pan qq ฤ… q หš s โ€ž" * " *๏šพ หš หš โ€œฮฑ ` P max ฮณ pQq ฤ q n X max ฮณ pQq ฤ… q ` op1q QPT QPU โ€ž" * " * " *๏šพ หš หš หš โ€œฮฑ ` P max ฮณ pQq ฤ q X max ฮณ pQq ฤ… q X max ฮณ pQq ฤ… q QPT QPU QPUn โ€ž" * " * " *๏šพ หš หš หš ` P max ฮณ pQq ฤ q X max ฮณ pQq ฤ… q X max ฮณ pQq ฤ q ` op1q QPT QPU QPUn โ€ž" * " *๏šพ โ€ž ๏šพ หš หš หš ฤฮฑ ` P max ฮณ pQq ฤ q X max ฮณ pQq ฤ… q ` P max ฮณ pQq ฤ… q ` op1q QPT QPUn QPU zUn โ€ž ๏šพ โ€ž ๏šพ หš หš โ€œฮฑ ` p1 ยด ฮฑq P max ฮณ pQq ฤ… q ` P max ฮณ pQq ฤ… q ` op1q QPUn QPU zUn where we used independence of tฮณ pQquQPT and tฮณ pQquQPUn . From Lemma 4.4(a) we obtain ห‡ ห‡ ห‡ ห‡ ห‡ ห‡ ห‡ ห‡ ห‡ ยด 21 รฟ ห‡ ห‡ ห‡ ยด 12 รฟ vi Xi ห‡ ฤ max ห‡|Q| vi Xi ห‡ โ€œ OP p1q max ห‡|Q| QPU ห‡ ห‡ ห‡ ห‡ QPU zUn iPQ iPQ and further by definition of Un that ยตn pQq ฤ p1 ยด ฮตn q ยตn pQn q for all Q P UzUn . Exploiting (41) this implies โ€ž ๏šพ หš P max ฮณ pQq ฤ… q QPU zUn โ€ž ๏šพ b ` ยด1 ห˜ n หš ฤP p1 ยด ฮตn q ยต pQn q ` OP p1q ยด 2 log an ฤ… q โ€ž ๏šพ b ` ยด1 ห˜ n n หš โ€œP ยต pQn q ยด 2 log an ยด ฮตn ยต pQn q ` OP p1q ฤ… q โ€œ op1q b ` ห˜ if ยตn pQn q ยด 2 log aยด1 ร‘ C P rยด8, 8q (as ฮตn ยตn pQn q ร‘ 8 by construction), and if ยตn pQn q ยด n b ` ห˜ 2 log aยด1 ร‘ 8, then nothing has to be shown. Altogether this gives n โ€ž ๏šพ Pฮธn rTn pY, ฮธ0 , Qn pan qq ฤ… q หš s ฤ ฮฑ ` p1 ยด ฮฑq P max ฮณ pQq ฤ… q หš ` op1q. QPUn With similar arguments as in Lemma 4.4 we obtain from ฮตn ล’ 0 that โ€ž ๏šพ หš P max ฮณ pQq ฤ… q โ€œ P rฮณ pQn q ` oP p1q ฤ… q หš s QPUn and hence the claim is proven. Now we turn to the multiscale procedure. As here different scales are considered, the set U is not large enough any more. Especially, we cannot construct a subset V such that tฮณ pQquV c and ฮณ pQn q are independent and maxQPV ฮณ pQq is still negligible. Due to this, the corresponding proof in Sharpnack and Arias-Castro (2016) is incomplete. To overcome this difficulty, we follow the 26 idea to distinguish if the anomaly Qn has asymptotically an effect on ฮณ pQq or not. Whenever Q is sufficiently large compared to Qn , the impact will ยด ยฏ asymptotically be negligible. ยดฮณ For some sequence วซn ล’ 0 with วซn โ€œ O |Qn | with some ฮณ ฤ… 0 we introduce # d n ฮดn :โ€œ วซn max ยต pQn q , logpnq |Qn | rn +ยด1 , (42) ห‡ ( V :โ€œ Q P Qn |rn ห‡ ยตn pQq ฤ› ฮดn ยตn pQn q and its complement T 1 :โ€œ Qn |rn zV. For a sketch see Figure 3. Figure 3: Exemplary elements of the sets V and T 1 in d โ€œ 2: The anomaly is shown in red, the hatched cubes belong to V and the dotted cubes to T 1 . However, the intersections marked in black are small enough such that they have asymptotically no influence on ฮณ pQq. Opposed to the oracle procedure, we do not have independence of tฮณ pQquQPT 1 and ฮณ pQn q. However, asymptotically a similar property holds true as shown in the following Lemma: Lemma 4.5. Consider the setting from Section 2.3 and recall that q is the p1 ยด ฮฑqยดquantile of Mn pQn |rn q as in (9). Then the following statements hold true as n ร‘ 8: ห‡ ห‡ ยดa ยฏ a 1 ล™ ห‡ ห‡ ln p|Qn |q ` ln pยด ln pm pฮธ1n q ยด m pฮธ0 qqq (a) max ห‡|Q|ยด 2 iPQ vi Xi ห‡ โ€œ OP QPV ห‡ ห‡ ห‡ ห‡ ห‡ ยด 12 ล™ ห‡ (b) max1 ห‡|Q| vi Xi ห‡ โ€œ oP p1q QPT ห‡ ห‡ iPQXQn โ€ž ๏šพ (c) P max1 ฮณ pQq ฤ q โ€œ 1 ยด ฮฑ ` op1q QPT Proof. Let us again start with the canonical metric abounding the covering number NnpV, ฯ, วซq w.r.t. n 1 2 1 1 ฯ pQ, Q q โ€œ 2 ยด 2 |Q X Q | { |Q| |Q |. For all Q P V it holds ยต pQq ฤ› ฮดn ยต pQn q, which implies ฮดn a |Q X Qn | |Qn | |Qn | ฤ a ฤa . |Q| |Q| Consequently, V contains only cubes Q with rn ฤ |Q| ฤ ฮดnยด2 |Qn |.?For a fixed scale k, V contains at most pC |Qn |q Qโ€™s with |Q| โ€œ k, and for the set ofP`such Qโ€™s ห˜ Tan วซ-covering can be constructed as in the proof of Lemma 4.4 with at most C |Qn | { 1 ยด 2วซ k elements, which gives N pV, ฯ, วซq ฤ C ยด2 tฮดn |Qn |u รฟ kโ€œrn ห™ยด1 ห† ห™ ห† วซ2 |Qn | |Qn | P` ห˜ T ฤC 1ยด . |Qn | ln 2 ฮดn2 rn 1 ยด 2วซ k 27 (a) Again with the help of Dudleyโ€™s entropy integral we find ห‡ ห‡๏ฌ€ ยซ ห‡รฟ ห‡ ห‡ ยด1{2 ห‡ E max |Q| ห‡ vi Xi ห‡ QPV ห‡iPQ ห‡ c ลผ 2a 2v 2 `C log N pV, ฯ, วซq dวซ ฤ ฯ€ 0 d ห† ห† หœ ห™ห™ยธ a |Qn | ln p|Qn |q ` ln ln ฤC ฮดn2 rn ห™ ห† b a ln p|Qn |q ` ln pยด ln pm pฮธ1n q ยด m pฮธ0 qqq ฤC ยด ยฏ ยดฮณ where we used วซn โ€œ O |Qn | with some ฮณ ฤ… 0. Now Markovโ€™s inequality gives the claim. a 1 n (b) For Q P T it holds ยต pQq ฤƒ ฮดn ยตn pQn q and hence |Q X Qn | ฤ ฮดn |Q| |Qn |. Consequently ห‡๏ฌ€ ห‡ ยซ ห‡ ห‡ รฟ ห‡ ยด1{2 ห‡ vi Xi ห‡ E max1 |Q| ห‡ ห‡ QPT ห‡iPQXQ n ห‡ ห‡๏ฌ€ ยซ 1 ห‡ รฟ ห‡ a ห† |Qn | ห™ 4 ห‡ ยด1{2 ห‡ E max |Q X Qn | ฤ ฮดn vi Xi ห‡ ห‡ ห‡ ห‡ rn QPQn |rn iPQXQn ฤC vฬ„ a ฮดn ห† |Qn | rn ห™ 14 a logpnq where we used (29). As the right-hand side converges to 0 by (42), this proves the claim. (c) This can now be deduced from (a) and (b) as follows. For all Q P T 1 it holds ยตn pQq ฤ ฮดn ยตn pQn q and hence ห‡ ยปห‡ ๏ฌ ห‡ ห‡ ห‡ ยด1 รฟ ห‡ max ฮณ pQq ยด max1 โ€“ห‡ห‡|Q| 2 vi Xi ห‡ห‡ ยด penv p|Q|q๏ฌ‚ QPT 1 QPT ห‡ ห‡ iPQzQn ห‡๏ฌ€ ห‡ ยซ ห‡ ห‡ ห‡ ห‡ ยด1 รฟ vi Xi ห‡ ฤ max1 ยตn pQq ` ห‡|Q| 2 ห‡ QPT ห‡ iPQXQn ห‡ ห‡ ห‡ ห‡ ห‡ ยด 21 รฟ ห‡ pbq n ฤฮดn ยต pQn q ` max1 ห‡|Q| vi Xi ห‡ โ€œ oP p1q (43) QPT ห‡ ห‡ iPQXQ n n where the last estimate follows from ฮดn ยต pQn q ล’ 0. Furthermore, as V contains only scales ฤ ฮดnยด2 |Qn | we obtain that ห‡ ยซห‡ ๏ฌ€ ห‡ ห‡ ห‡ ยด 12 รฟ ห‡ max ห‡|Q| Xi ห‡ ยด penv p|Q|q QPV ห‡ ห‡ iPQ ห‡ ๏ฌ€ ยซห‡ ห‡ ห‡ ` ยด2 ห˜ ห‡ ยด 12 รฟ ห‡ Xi ห‡ ยด penv ฮดn |Qn | ฤ max ห‡|Q| QPV ห‡ ห‡ iPQ ห™ ห† b a ` ห˜ paq n ln p|Qn |q ` ln pยด ln pm pฮธ1 q ยด m pฮธ0 qqq ยด penv ฮดnยด2 |Qn | โ€œ OP โ€œoP p1q, (44) where we used |Qn | โ€œ o pnฮฑ q with ฮฑ ฤ… 0 sufficiently small. Consequently โ€ž ๏šพ P max1 ฮณ pQq ฤ q QPT 28 (43) โ€œ pbq โ€œ (44) โ€œ โ€œ ห‡ ยปห‡ ๏ฌ ๏ฌ ห‡ ห‡ ห‡ ยด1 รฟ ห‡ P โ€“ max1 โ€“ห‡ห‡|Q| 2 vi Xi ห‡ห‡ ยด penv p|Q|q๏ฌ‚ ฤ q ๏ฌ‚ ` op1q QPT ห‡ ห‡ iPQzQn ห‡ ๏ฌ€ ๏ฌ€ ยซห‡ ยซ ห‡ ห‡ ห‡ ยด 12 รฟ ห‡ Xi ห‡ ยด penv p|Q|q ฤ q ` op1q P max1 ห‡|Q| ห‡ QPT ห‡ iPQ ห‡ ๏ฌ€ ๏ฌ€ ยซห‡ ยซ ห‡ ห‡ ห‡ ยด 12 รฟ ห‡ Xi ห‡ ยด penv p|Q|q ฤ q ` op1q P max ห‡|Q| ห‡ QPQn |rn ห‡ ยป iPQ P rMn pQn |rn q ฤ qs ` op1q which yields the claim. Proof of Theorem 2.9(b). For the multiscale procedure we have to compute a lower bound for Pฮธn rTn pY, ฮธ0 , Qn |rn q ฤ… qs. Similar to the Proof of Theorem 2.9(a) we obtain Pฮธn rTn pY, ฮธ0 , Qn |rn q ฤ… qs โ€ž" * ๏šพ โ€ž ๏šพ ฤ›P max1 ฮณ pQq ฤ q X tฮณ pQn q ฤ… qu ` P max1 ฮณ pQq ฤ… q ` op1q. QPT QPT By Lemma 4.5(b) we furthermore get โ€ž ๏šพ P max1 ฮณ pQq ฤ q QPT ห‡ ยซ ๏ฌ€ ๏ฌ€ ยซห‡ ห‡ ห‡ 1 รฟ ห‡ n ห‡ vi Xi ห‡ ยด penv p|Q|q ฤ q โ€œP max1 ห‡ยต pQq ` a QPT ห‡ ห‡ |Q| iPQ ห‡ ๏ฌ ๏ฌ ยป ยปห‡ ห‡ ห‡ รฟ ห‡ ห‡ n 1 vi Xi ห‡ห‡ ยด penv p|Q|q๏ฌ‚ ฤ q ๏ฌ‚ ` op1q, โ€œP โ€“ max1 โ€“ห‡ห‡ยต pQq ` a QPT |Q| iPQzQn ห‡ ห‡ which shows by independence that โ€ž" * ๏šพ P max1 ฮณ pQq ฤ q X tฮณ pQn q ฤ… qu QPT โ€ž ๏šพ โ€œP max1 ฮณ pQq ฤ q P rฮณ pQn q ฤ… qs ` op1q. QPT Now the proof can be concluded as the one of Theorem 2.9(a). Proof of Corollary 2.11. The procedures have asymptotic power 1 if and only if ยธ หœ n n a ? m pฮธ q ยด m pฮธ q v pฮธ q 0 1 1 a , ร‘1 F qฬ„ ` ยด2 log pan q, nd{2 an v pฮธ0 q v pฮธ0 q as n ร‘ 8 with qฬ„ P tq หš , qu respectively. The straight-forward estimate ห™ ห† ห™* " ห† ` ห˜ ยตยดx ยดx ยด ยต 2 ,ฮฆ F x, ยต, ฯƒ ฤ› max ฮฆ ฯƒ ฯƒ shows that this is the case if and only if x`ยต ร‘ ยด8 ฯƒ or xยดยต ร‘ ยด8. ฯƒ Inserting the values for x, ยต and ฯƒ and noting that q หš , q are uniformly bounded by the p1 ยด ฮฑqยดquantile of M pQหš , vq gives the claim. 29 5 Appendix Recall the packing number K pวซ, ฯ, Wq from Remark 2.2. In this appendix we compute the packing numbers given in Example 2.3, which will be done by means of the covering number. The covering number N pวซ, ฯ, Wq of a subset W ฤ‚ Rหš w.r.t. a metric ฯ is given by the minimal number of balls of radius วซ ฤ… 0 needed to cover W (cf. van der Vaart and Wellner, 1996, Def. 2.2.3). It is immediately clear, that ยฏ ยดวซ , ฯ, W , N pวซ, ฯ, Wq ฤ K pวซ, ฯ, Wq ฤ N 2 ยด ห‡ (ยฏ 1{2 and hence it sufficed to compute N pฮดuq , ฯหš , R P Rหš ห‡ |R| ฤ ฮด with ฯหš as in (15) to show (16). In the following, we will use the notation from Example 2.3. Lemma 5.1. For any วซ ฤ… 0 there exists a constant C depending only on the dimension d and วซ such that for all u, ฮด P p0, 1s it holds ยด ยฏ K pฮดuq1{2 , ฯหš , tS P S หš : |S| ฤ ฮดu ฤ Cuยดp2d`วซq ฮด ยดp2dยด1`วซq , i.e. (16) holds true with k1 โ€œ C, k2 โ€œ 2d ` วซ and VS หš โ€œ 2d ยด 1 ` วซ. Proof. We approximate the hyper-rectangles in W โ€œ tS P S หš : |S| ฤ ฮดu by hyper-rectangles with ห‡ (d vertices in the lattice Lm :โ€œ mi ห‡ i โ€œ 0, . . . , m where m has to be specified later. The set of 1 all hyper-rectangles with such vertices and size ฤ ฮด will be denoted by Wm . For S P W denote ล›d by k1 , . . . , kd the edge lengths. Then jโ€œ1 kj ฤ ฮด and ki ฤ 1. It is immediately clear that there 1 exists an approximating hyper-rectangle S 1 P Wm such that ห‡ ` หš` ห˜ห˜2 ห‡ โ€œ ห‡S โ–ณ S 1 ห‡ ฯ S, S 1 ฤ 2 pk2 ยจ ... ยจ kd ` k1 ยจ k3 ยจ ... ยจ kd ` . . . ` k1 ยจ . . . ยจ kdยด1 q ยจ ฤ d . m 1 2m (45) 1{2 d Hence, we obtain ฯหš pS, S 1 q ฤ pฮดuq if we choose m :โ€œ ฮดu . Now we have to compute the 1 cardinality of Wd{pฮดuq . First note that the number of possible left bottom vertices is bounded from 1 above by md โ€œ #Lm . If we denote the edge lengths of S 1 P Wm by l1 , . . . , ld , we can find integers ล›d ij d i1 , ..., id such that lj โ€œ m and jโ€œ1 ij ฤ ฮดm โ€œ: N . Therefore, we obtain ยด ยฏ 1 N pฮดuq1{2 , ฯหš , tS P S หš : |S| ฤ ฮดu ฤ #Wm ฤ md ยจ #PN (46) ! ) ห‡ ล›d with PN :โ€œ pi1 , . . . , id q P Nd ห‡ jโ€œ1 ij ฤ N . To compute #PN , we employ Minkowskiโ€™s theo- ห‡ rem (cf. Cassels, 1997, Sec. III.2.2), which ensures that the Lebesgue volume โˆ†d pN q of px1 , . . . , xd q P r1, N sd ห‡ x1 ยจ . . . is comparable with #PN up to a factor of 2d . It can readily be shown by induction that โˆ†d pN q โ€œ 1 dยด1 N plog N q . pd ยด 1q! Inserting this into (46), we obtain ยด ยฏ N pฮดuq1{2 , ฯหš , tS P S หš : |S| ฤ ฮดu ฤmd หš #PN ` ห˜ ฤ2d md โˆ†d ฮดmd ` ห˜dยด1 ร€ฮดm2d log ฮดmd 30 โ€ ยด ยฏฤฑdยด1 โ€œฮด ยดp2dยด1q uยด2d log dd ฮด ยดpdยด1q uยดd dยด1 dยด1 ร€ฮด ยดp2dยด1q plogp1{ฮดqq uยด2d plogp1{uqq where we used px ` yqdยด1 ฤ cxdยด1 y dยด1 for x, y ฤ› 1. This proves the claim. Lemma 5.2. There exists a constant C depending only on the dimension d such that for all u, ฮด P p0, 1s it holds ยด ยฏ K pฮดuq1{2 , ฯหš , tQ P Qหš : |Q| ฤ ฮดu ฤ Cฮด ยด1 uยดpd`1q , i.e. (16) holds true with k1 โ€œ C, k2 โ€œ d ` 1 and VQหš โ€œ 1. Proof. We proceed as in the Proof of Lemma 5.1. In contrast to hyper-rectangles, we obtain here instead of (45) the better estimate dยด1 ห‡ dฮด d ` หš` ห˜ห˜2 ห‡ ฯ Q, Q1 โ€œ ห‡Q โ–ณ Q1 ห‡ ฤ . m d . Furthermore, the cardinality as all edges have the same length, i.e. we can choose m :โ€œ ฮด1{d u 1 of Wm is bounded by the number of lower left vertices times the number of possibilities for an adjacent vertex, which gives ยด ยฏ 1 #Wm ฤ md ยจ ฮด 1{d m โ€œ md`1 ฮด 1{d . Therefore we finally obtain ยด ยฏ 1 N pฮดuq1{2 , ฯหš , tS P S หš : |S| ฤ ฮดu ฤ #Wd{pฮด 1{d uq ห† ห™d`1 d ฤ ฮด 1{d โ€œ dd`1 uยดpd`1q ฮด ยด1 , ฮด 1{d u which proves the claim. Lemma 5.3. There exists a constant C depending only on the dimension d such that for all u, ฮด P p0, 1s it holds ยด ยฏ K pฮดuq1{2 , ฯหš , tH P Hหš : |H| ฤ ฮดu ฤ Cฮด ยด2 uยด2 , i.e. (16) holds true with k1 โ€œ C, k2 โ€œ 2 and VHหš โ€œ 2. ห‡ ( ห‡ i โ€œ 1, ..., N, j โ€œ 1, ..., m with numbers a1 , ..., aN P Sdยด1 and ฮฑ1 , ..., ฮฑm P Proof. Let W โ€œ H N,m a ,ฮฑ i j โ€ ? ฤฑ ? 0, d . Note that Ha,ฮฑ โ€œ H for ฮฑ ฤ… d by definition and Pythagorasโ€™ theorem. It is convenient to choose ฮฑ1 , ..., ฮฑm as equidistant, e.g. ฮฑi :โ€œ i ยด 12 ? dn, m i โ€œ 1, . . . , m. Furthermore we choose a1 , ..., aN as a maximal system of points in Sdยด1 such that ?paj , ak q ฤ› 1 ` 1 ห˜ dยด1 for all j โ€ฐ k. This implies that m หœห† ห™ 1 ยธ N ฤ 1 dยด1 dยด1 S aj S ฤ‚ m jโ€œ1 ห‡ ( with the spherical cap Sa pฮธ0 q โ€œ e P Sdยด1 ห‡ ?pa, eq ฤ ฮธ0 . Note that ฮธลŸ0 |Sa pฮธ0 q| โ€ž ฯ€0ลŸ 0 dยด2 psin tq psin tq 31 dยด2 dt dt โ€ž ฮธ0dยด1 โ€ ? ฤฑ for small values of ฮธ0 . Now, for any given a P Sdยด1 and ฮฑ P 0, d , we can find 1 ฤ i ฤ N and 1 ฤ j ฤ m such that |a ยด ai | ฤ ห† 1 m 1 ห™ dยด1 , ? d |ฮฑ ยด ฮฑj | ฤ . m Now we split ห‡ ห‡ ห˜ห˜2 ` หš` ฤ |Ha,ฮฑ โ–ณ Hai ,ฮฑ | ` ห‡Hai ,ฮฑ โ–ณ Hai ,ฮฑj ห‡ ฯ Ha,ฮฑ , Hai ,ฮฑj and since Hai ,ฮฑ โ–ณ Hai ,ฮฑj is a d ยด 1-dimensional space of width ฤ 1 ` 1 ห˜ dยด1 of hyperpyramids with opening angle ฤ m , we obtain ? d m and Ha,ฮฑ โ–ณ Hai ,ฮฑ is a union ห˜ห˜2 ` หš` C ฤ ฯ Ha,ฮฑ , Hai ,ฮฑj m where C is some generic constant depending only on d. Hence if we choose m โ€œ C ยด1 ฮด ยด1 uยด1 , then for each H P tH P Hหš : |H| ฤ ฮดu there exists H 1 P WN,m such that ฯหš pS, S 1 q ฤ pฮดuq1{2 . Now we have to estimate N . By elementary geometry it follows that หœ ห† ห™ 1 ยธ หœห† ห™ 1 ยธ N N ฤ ฤ 1 1 dยด1 1 dยด1 dยด1 S aj ฤ‚S ฤ‚ , S aj 2 m m jโ€œ1 jโ€œ1 and furthermore up to boundary points, the sets on the left-hand side are disjoint. Therefore we obtain for the volumes that ห‡ ห‡ หœ ห† ห™ 1 ยธห‡ หœห† ห™ 1 ยธห‡ ห‡ ห‡ 1 1 dยด1 ห‡ห‡ ห‡ห‡ dยด1 ห‡ห‡ 1 dยด1 ห‡ห‡ ห‡ ห‡ N ห‡Saj ฤ N ห‡Saj ห‡ฤ S ห‡ ห‡ ห‡ ห‡ ห‡ 2 m m which implies N โ€ž m. Consequently, #WN,m โ€ž m2 which proves the claim. Acknowledgements The authors gratefully acknowledge financial support by the German Research Foundation DFG through subproject A04 of CRC 755. We also thank Katharina Proksch for many helpful comments on the proof of Theorem 2.5. References Adler, R. J. (2000). On excursion sets, tube formulas and maxima of random fields. Annals of Applied Probability, pages 1โ€“74. Alm, S. E. (1998). Approximation and simulation of the distributions of scan statistics for Poisson processes in higher dimensions. Extremes, 1(1):111โ€“126. Arias-Castro, E., Candeฬ€s, E. J., and Durand, A. (2011). Detection of an anomalous cluster in a network. Ann. Statist., 39(1):278โ€“304. Arias-Castro, E., Castro, R. M., Taฬnczos, E., and Wang, M. (2017). Distribution-free detection of structured anomalies: permutation and rank-based scans. Journal of the American Statistical Association, (to appear). Arias-Castro, E., Donoho, D. L., and Huo, X. (2005). Near-optimal detection of geometric objects by fast multiscale methods. IEEE Trans. Inform. Theory, 51(7):2402โ€“2425. 32 Benjamini, Y. and Hochberg, Y. (1995). Controlling the false discovery rate: a practical and powerful approach to multiple testing. J. Roy. Statist. Soc. Ser. B, 57(1):289โ€“300. Benjamini, Y. and Yekutieli, D. (2001). The control of the false discovery rate in multiple testing under dependency. Ann. Statist., 29(4):1165โ€“1188. Billingsley, P. (2013). Convergence of Probability Measures. John Wiley & Sons. Brown, L. D. (1986). Fundamentals of statistical exponential families with applications in statistical decision theory. lecture notes. 9:x+283. Butucea, C. and Ingster, Y. I. (2013). Detection of a sparse submatrix of a high-dimensional noisy matrix. Bernoulli, 19(5B):2652โ€“2688. Casella, G. and Berger, R. L. (2002). Statistical inference, volume 2. Duxbury Pacific Grove, CA. Cassels, J. W. S. (1997). An introduction to the geometry of numbers. Classics in Mathematics. Springer-Verlag, Berlin. Corrected reprint of the 1971 edition. Cheng, D. and Schwartzman, A. (2017). Multiple testing of local maxima for detection of peaks in random fields. Ann. Statist., 45(2):529โ€“556. Chernozhukov, V., Chetverikov, D., and Kato, K. (2014). Gaussian approximation of suprema of empirical processes. Ann. Statist., 42(4):1564โ€“1597. Dedecker, J. (1998). A central limit theorem for stationary random fields. Probab. Theory Related Fields, 110(3):397โ€“426. Dedecker, J. (2001). Exponential inequalities and functional central limit theorems for random fields. ESAIM Probab. Statist., 5:77โ€“104. Despres, C. J. (2014). The vapnik-chervonenkis dimension of norms on Rd . arXiv preprint arXiv:1412.6612. Devroye, L. and Lugosi, G. (2001). Combinatorial Methods in Density Estimation. Springer Series in Statistics. Springer-Verlag, New York. Dickhaus, T. (2014). Simultaneous Statistical Inference. Springer, Heidelberg. With applications in the life sciences. Duฬˆmbgen, L. and Spokoiny, V. G. (2001). Multiscale testing of qualitative hypotheses. Ann. Statist., 29(1):124โ€“152. Duฬˆmbgen, L. and Walther, G. (2008). Multiscale inference about a density. 36(4):1758โ€“1785. Ann. Statist., Fang, X. and Siegmund, D. (2016). Poisson approximation for two scan statistics with rates of convergence. Ann. Appl. Probab., 26(4):2384โ€“2418. Frick, K., Munk, A., and Sieling, H. (2014). Multiscale change point inference. J. R. Stat. Soc. Ser. B. Stat. Methodol., 76(3):495โ€“580. With 32 discussions by 47 authors and a rejoinder by the authors. Friedenberg, D. A. and Genovese, C. R. (2013). Straight to the source: detecting aggregate objects in astronomical images with proper error control. J. Amer. Statist. Assoc., 108(502):456โ€“468. Haiman, G. and Preda, C. (2006). Estimation for the distribution of two-dimensional discrete scan statistics. Methodol. Comput. Appl. Probab., 8(3):373โ€“381. Jiang, T. (2002). Maxima of partial sums indexed by geometrical structures. Ann. Probab., 30(4):1854โ€“1892. 33 Jiang, Y., Qiu, Y., Minn, A. J., and Zhang, N. R. (2016). Assessing intratumor heterogeneity and tracking longitudinal and spatial clonal evolutionary history by next-generation sequencing. PNAS, 113(37):E5528โ€“E5537. Kabluchko, Z. (2011). Extremes of the standardized Gaussian noise. Stochastic Process. Appl., 121(3):515โ€“533. Kabluchko, Z. and Munk, A. (2009). Shaoโ€™s theorem on the maximum of standardized random walk increments for multidimensional arrays. ESAIM Probab. Stat., 13:409โ€“416. Kazantsev, I., Lemahieu, I., Salov, G., and Denys, R. (2002). Statistical detection of defects in radiographic images in nondestructive testing. Signal Processing, 82(5):791 โ€“ 801. Komloฬs, J., Major, P., and Tusnaฬdy, G. (1976). An approximation of partial sums of independent RVโ€™s, and the sample DF. II. Z. Wahrscheinlichkeitstheorie und Verw. Gebiete, 34(1):33โ€“58. Kosorok, M. R. (2008). Introduction to Empirical Processes and Semiparametric Inference. Springer Series in Statistics. Springer, New York. Kou, J. (2017). Identifying the support of rectangular signals in gaussian noise. arXiv preprint arXiv:1703.06226. Kulldorff, M., Heffernan, R., Hartman, J., Assuno, R., and Mostashari, F. (2005). A spacetime permutation scan statistic for disease outbreak detection. PLOS Medicine, 2(3). Ledoux, M. and Talagrand, M. (1991). Probability in Banach Spaces, volume 23 of Ergebnisse der Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics and Related Areas (3)]. Springer-Verlag, Berlin. Isoperimetry and processes. Lehmann, E. L. and Romano, J. P. (2005). Testing Statistical Hypotheses. Springer Texts in Statistics. Springer, New York, third edition. Li, H., Munk, A., and Sieling, H. (2016). FDR-control in multiscale change-point segmentation. Electron. J. Stat., 10(1):918โ€“959. Marcus, M. B. and Rosen, J. (2006). Markov processes, Gaussian processes, and local times, volume 100 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge. Massart, P. (1989). Strong approximation for multivariate empirical and related processes, via KMT constructions. Ann. Probab., 17(1):266โ€“291. Naus, J. I. and Wallenstein, S. (2004). Multiple window and cluster size scan procedures. Methodol. Comput. Appl. Probab., 6(4):389โ€“400. Pozdnyakov, V., Glaz, J., Kulldorff, M., and Steele, J. M. (2005). A martingale approach to scan statistics. Ann. Inst. Statist. Math., 57(1):21โ€“37. Proksch, K., Werner, F., and Munk, A. (2017+). Multiscale scanning in inverse problems. arXiv preprint arXiv:1611.04537, (to appear in Ann. Statist.). Rio, E. (1993). Strong approximation for set-indexed partial-sum processes, via KMT constructions. II. Ann. Probab., 21(3):1706โ€“1727. Rivera, C. and Walther, G. (2013). Optimal detection of a jump in the intensity of a Poisson process or in a density with likelihood ratio statistics. Scand. J. Stat., 40(4):752โ€“769. Schmidt-Hieber, J., Munk, A., and Duฬˆmbgen, L. (2013). Multiscale methods for shape constraints in deconvolution: confidence statements for qualitative features. Ann. Statist., 41(3):1299โ€“1328. Sharpnack, J. and Arias-Castro, E. (2016). Exact asymptotics for the scan statistic and fast alternatives. Electron. J. Stat., 10(2):2641โ€“2684. 34 Siegmund, D. and Venkatraman, E. S. (1995). Using the generalized likelihood ratio statistic for sequential detection of a change-point. Ann. Statist., 23(1):255โ€“271. Siegmund, D. and Yakir, B. (2000). Tail probabilities for the null distribution of scanning statistics. Bernoulli, 6(2):191โ€“213. Taylor, J. E. and Worsley, K. J. (2007). Detecting sparse signals in random fields, with an application to brain mapping. Journal of the American Statistical Association, 102(479):913โ€“ 928. Tu, I.-P. (2013). The maximum of a ratchet scanning process over a Poisson random field. Statist. Sinica, 23(4):1541โ€“1551. van der Vaart, A. W. and Wellner, J. A. (1996). Weak Convergence and Empirical Processes. Springer Series in Statistics. Springer-Verlag, New York. With applications to statistics. SฬŒidaฬk, Z. (1967). Rectangular confidence regions for the means of multivariate normal distributions. J. Amer. Statist. Assoc., 62:626โ€“633. Walther, G. (2010). Optimal and fast detection of spatial clusters with scan statistics. Ann. Statist., 38(2):1010โ€“1033. Zhang, N. R., Yakir, B., Xia, L. C., and Siegmund, D. (2016). Scan statistics on Poisson random fields with applications in genomics. Ann. Appl. Stat., 10(2):726โ€“755. 35
10math.ST
Space-Efficient Latent Contracts Michael Greenberg arXiv:1604.02474v4 [cs.PL] 6 Jun 2017 Pomona College [email protected] Abstract. Standard higher-order contract monitoring breaks tail recursion and leads to space leaks that can change a programโ€™s asymptotic complexity; space-efficiency restores tail recursion and bounds the amount of space used by contracts. Space-efficient contract monitoring for contracts enforcing simple type disciplines (a/k/a gradual typing) is well studied. Prior work establishes a space-efficient semantics for manifest contracts without dependency [11]; we adapt that work to a latent calculus with dependency. We guarantee space efficiency when no dependency is used; we cannot generally guarantee space efficiency when dependency is used, but instead offer a framework for making such programs space efficient on a case-by-case basis. 1 Introduction Findler and Felleisen [6] brought design-by-contract [17] into the higher-order world, allowing programmers to write pre- and post-conditions on functions to be checked at runtime. Pre- and post-conditions are easy in first-order languages, where itโ€™s very clear who is to blame when a contract is violated: if the precondition fails, blame the caller; if the post-condition fails, blame the callee. In higher-order languages, however, itโ€™s harder to tell who calls whom! Who should be to blame when a pre-condition on a higher-order function fails? For example, consider the following contract: (pred(ฮปx :Int. x > 0) 7โ†’ pred(ฮปy:Int. y โ‰ฅ 0)) 7โ†’ pred(ฮปz :Int. z mod 2 = 0) This contract applies to a function (call it f , with type (Intโ†’Int)โ†’Int) that takes another function (call it g, with type Intโ†’Int) as input. The contract says that g will only be called with positives and only return naturals; f must return an even number. If f returns an odd number, f is to blame; if g returns a negative number, then it, too is to blame. But what if g is called with a non-positive number, say, โˆ’1? Who is to blame then? Findler and Felleisenโ€™s insight was that even in a higher-order setting, there are only two parties to blame. Here, g was given to f , so any bad values given to g here are due to some nefarious action on f โ€™s partโ€”blame f ! That is, the higher-order case generalizes pre- and post-conditions so that the negative positions of a contract all blame the caller while the positive positions all blame the callee. Dependent contractsโ€”where the codomain contract can refer to the functionโ€™s argumentโ€”are particularly useful. For example, the square root function, 2 Greenberg sqrt, satisfies the contract: x :pred(ฮปy:Real. y โ‰ฅ 0) 7โ†’ pred(ฮปz :Real. abs (x โˆ’ z โˆ— z ) < ) That is, sqrt takes a non-negative real, x , and returns a non-negative real z thatโ€™s within  of the square root of x . (The dependent variable x is bound in the codomain; the variable y is local to the domain predicate.) 1.1 Contracts leak space While implementations of contracts have proven quite successful (particularly so in Racket [8,19]), there is a problem: contracts leak space. Why? The default implementation of contracts works by wrapping a function in a function proxy. For example, to check that f = ฮปx :Int. x + 1 satisfies the contract C = pred(ฮปz :Int. z mod 2 = 0) 7โ†’ pred(ฮปz :Int. z mod 2 = 0), we monitor the function by wrapping it in a function proxy monl (C , f ). When this proxy is called with an input v , we first check that v satisfies C โ€™s domain contract (i.e., that v is even), then we run f on v to get some result v 0 , and then check that v 0 satisfies C โ€™s codomain contract (that the result is even). Here the contract will always fail blaming l : one of v and v 0 will always be odd. Contracts leak space in two ways. First, there is no bound on the number of function proxies that can appear on a given function. More grievously, contracts break tail recursion. To demonstrate the issue with with tail calls, weโ€™ll use the simplest example of mutual recursion: detecting parity. let odd = ฮปx :Int. if (x = 0) false (even (x โˆ’ 1)) and even = ฮปx :Int. if (x = 0) true (odd (x โˆ’ 1)) Functional programmers will expect this program to run in constant space, because it is tail recursive. Adding a contract breaks the tail recursion. If we add a contract to odd and call odd 5, what contract checks accumulate (Fig. 1)?1 Notice how the checks accumulate in the codomain? Even though the mutually recursive calls to even and odd are syntactically tail calls, we canโ€™t bound the number of codomain checks that occur. That is, we canโ€™t bound the size of the stack, and tail recursion is broken! Even though thereโ€™s only one function proxy on odd, our contracts create a space leak. 1.2 Overview and contributions Space efficiency for gradual types [24] (a/k/a contracts constrained to type tests) is well studied [14,15,25,9,23]; Greenberg [11] developed a space-efficient semantics for general, non-dependent contracts. He used a manifest calculus, conflating contracts and types; however, contracts are typically implemented in latent calculi, where contracts are distinct from whatever types may exist. Greenberg โ€œbelieve[s] it would be easy to design a latent version of eidetic ฮปH , following the translations in Greenberg, Pierce, and Weirich (GPW)โ€ [12]; in this paper, 1 Readers may observe that the contract betrays a deeper knowledge of numbers than the functions themselves. We offer this example as minimal, not naturally occurring. Space-Efficient Latent Contracts 3 = monlodd (x :pred(ฮปx :Int. x โ‰ฅ 0) 7โ†’ pred(ฮปb:Bool. b or (x mod 2 = 0)), ฮปx :Int. if (x = 0) false (even (x โˆ’ 1))) and even = ฮปx :Int. if (x = 0) true (odd (x โˆ’ 1)) let odd odd 5 โˆ’โ†’โˆ—C monlodd (pred[x 7โ†’5] (. . . ), even 4) โˆ’โ†’โˆ—C monlodd (pred[x 7โ†’5] (. . . ), monlodd (pred[x 7โ†’3] (. . . ), odd monlodd (pred(ฮปx :Int. x โ‰ฅ 0), 3))) โˆ— โˆ’โ†’C monlodd (pred[x 7โ†’5] (. . . ), monlodd (pred[x 7โ†’3] (. . . ), even 2)) โˆ’โ†’โˆ—C monlodd (pred[x 7โ†’5] (. . . ), monlodd (pred[x 7โ†’3] (. . . ), monlodd (pred[x 7โ†’1] (. . . ), odd monlodd (pred(ฮปx :Int. x โ‰ฅ 0), 1)))) โˆ— โˆ’โ†’C monlodd (pred[x 7โ†’5] (. . . ), monlodd (pred[x 7โ†’3] (. . . ), monlodd (pred[x 7โ†’1] (. . . ), even 0))) Fig. 1. Contracts break tail recursion we show that belief to be well founded by giving a space-efficient semantics for a (dependent!) variant of contract PCF (CPCF) [3,4]. The rest of this paper discusses a formulation of contracts that enjoys sound space efficiency; that is, where we slightly change the implementation of contracts so that (a) programs are observationally equivalent to the standard semantics, but (b) contracts consume a bounded amount of space. In this paper, weโ€™ve omitted some of the more detailed examples and motivationโ€”we refer curious readers to Greenberg [11], though we intend the paper to be self-contained. We follow Greenbergโ€™s general structure, defining two forms of dependent CPCF: CPCFC is the classic semantics; CPCFE follows the space-efficient eidetic semantics. We are able to prove space efficiency without dependency, bounding the amount of space consumed by contracts; we are unable to prove space efficiency in general with dependency, but instead offer a framework that allows for dependent contracts to be made space efficient. We offer two primary contributions: adapting Greenbergโ€™s work to a latent calculus and extending the possibility of space efficiency to dependent contracts. There are some other, smaller, contributions as well. First, adding in nontermination moves beyond Greenbergโ€™s strongly normalizing calculi, showing that the POPL 2015 paperโ€™s result isnโ€™t an artifact of strong normalization (where we can, in theory, bound the size of the any termโ€™s evaluation in advance, not just contracts). Second, the simpler type system here makes it clear which type system invariants are necessary for space-efficiency and which are bookkeeping for proving that the more complicated manifest type system is sound. Third, by separating contracts and types, we can give tighter space boundsโ€”the types function from Greenberg collects types that are never used in a contract, while we collect exactly contracts. Finally, we explore how space efficiency can be attained in dependent contracts. While we canโ€™t give a guarantee for dependent 4 Greenberg Types Terms B T e ::= ::= ::= op k w v C c r ::= ::= ::= ::= ::= ::= ::= Bool | Int | . . . B | T1 โ†’T2 x | k | e1 op e2 | e1 e2 | ฮปx :T . e | ยต(x :T ). e | if e1 e2 e3 | errl | monl (C , e) | mon(c, e) add1 | sub1 | . . . true | false | 0 | 1 | . . . v | errl k | ฮปx :T . e | monl (x :C1 7โ†’ C2 , v ) | mon(x :c1 7โ†’ c2 , ฮปx :T . e) predฯƒ (e) | x :C1 7โ†’ C2 r | x :c1 7โ†’ c2 nil | predlฯƒ (e); r Fig. 2. Syntax of classic and space-efficient CPCF contracts, we show that itโ€™s possible to achieve and discuss different ways to do so. 2 Classic and space-efficient Contract PCF We present classic and space-efficient CPCF as separate calculi sharing syntax and some typing rules (Fig. 2 and Fig. 3), and a single, parameterized operational semantics with some rules held completely in common (Fig. 4) and others specialized to each system (Fig. 5). The formal presentation is modal, with two modes: C for classic and E for space-efficient. While much is shared between the two modesโ€”types, T ; the core syntax of expressions, e; most of the typing rulesโ€”we use colors to highlight parts that belong to only one system. Classic CPCF is typeset in salmon while space-efficient CPCF is in periwinkle. 2.1 Contract PCF (CPCF) Plain CPCF is an extension of Plotkinโ€™s 1977 PCF [18], developed first by Dimoulas and Felleisen [3,4] (our syntax is in Fig. 2). It is a simply typed language with recursion. The typing rules are straightforward (Fig. 3). The operational semantics for the generic fragment also uses conventional rules (Fig. 4). Dimoulas and Felleisen use evaluation contexts to offer a concise description of their system; we write out our relation in full, giving congruence rules (E*L, E*R, EIf) and error propagating rules (E*Raise) explicitlyโ€”we will need to restrict congruence for casts, and our methods are more transparent written with explicit congruence rules than using the subtly nested evaluation contexts of Herman et al. [14,15], which are error prone [10]. Contracts are CPCFโ€™s distinguishing feature. Contracts, C , are installed via monitors, written monl (C , e); such a monitor says โ€œensure that e satisfies the contract C ; if not, the blame lies with label l โ€. Monitors only apply to appropriate types (TMon). There are two kinds of contracts in CPCF: predicate contracts over base type, written predฯƒ (e), and function contracts, written x :C1 7โ†’ C2 . Space-Efficient Latent Contracts 5 Predicate contracts predฯƒ (e) have two parts: a predicate on base types, e, which identifies which values satisfy the contract; and a closing substitution ฯƒ which keeps track of values substituted into the contract. For example, if ฮน is the identity substitution mapping variables to themselves: โ€“ predฮน (ฮปx :Int. x > 0) identifies the positives; โ€“ predฮน (ฮปx :Int. x > y) identifies numbers greater than an unspecified number y; and, โ€“ pred[y7โ†’47] (ฮปx :Int. x > y) identifies numbers greater than 47. When the closing substitution ฯƒ is the identity mapping ฮน, we write pred(e) instead of predฮน (e). In CPCFC , closing substitutions will map each variable to either (a) itself or (b) a value. Substitution into contracts is a non-issue without dependency: each contract is just closed. Having introduced dependency, we use explicit closing substitutions rather than direct substitution for three reasons: first, it simplifies our space efficiency proof for simple contracts (Sec. 4.1); second, explicitness lets us distinguish the contract pred[x 7โ†’0] (ฮปx :Int. x = 0) from pred[x 7โ†’0] (ฮปx :Int. 0 = 0); third, it emphasizes that contracts are just another form of closure. Predicates are solely over base types, not functions. Function contracts x :C1 7โ†’ C2 are satisfied by functions satisfying their parts: functions whose inputs all satisfy C1 and whose outputs all satisfy C2 . Function contracts are dependent: the codomain contract C2 can refer back to the input to the function. For example, the contract x :pred(ฮปz :Int. z > 0) 7โ†’ pred(ฮปy:Int. y > x ) is satisfied by increasing functions on the positives. Note that x is bound in the codomain, but z is not.2 When function contracts arenโ€™t dependent, we omit the binder at the front, e.g., pred(ฮปx :Int. x > 0) 7โ†’ pred(ฮปx :Int. x > 0) means operators on positives. We check that contracts are satisfied at runtime. We use explicit, delayed substitutions to keep track of which values are substituted into predicate contracts. To help with our proof of space efficiency, we donโ€™t track variables that donโ€™t appear in the predicate: ( predฯƒ (e)[v /x ] = predฯƒ[x 7โ†’v ] (e) x โˆˆ fv(ฯƒ(e)) predฯƒ (e) otherwise Alpha equivalence allows us to give fresh names to variables in the domain of ฯƒ by consistently renaming those variables inside of the predicate e. Only holding on to substitutions that close up free variables in e is a way of modeling closures. A dependent predicate closes over some finite number of variables; a compiled representation would generate a closure with a corresponding number of slots in the closing environment. Restricting substitutions to exactly those variables appearing free in the predicate serves another purpose: we can easily recover space-efficiency bounds for programs without dependent contracts (Sec. 4.1). 6 Greenberg ฮ“`e:T Typing rules x :T โˆˆ ฮ“ ฮ“`x :T TVar ฮ“ ` k : ty(k ) ฮ“, x :T1 ` e12 : T2 ฮ“ ` ฮปx :T1 . e12 : T1 โ†’T2 ty(op) = T1 โ†’T2 โ†’T ฮ“ ` e1 : T 1 ฮ“ ` e 2 : T 2 ฮ“ ` e1 op e2 : T TConst TAbs ฮ“, x :T ` e : T ฮ“ ` ยต(x :T ). e : T TOp ฮ“ ` e1 : T1 โ†’T2 ฮ“ ` e2 : T1 ฮ“ ` e1 e2 : T2 ฮ“ ` e1 : Bool ฮ“ ` e2 : T ฮ“ ` e3 : T ฮ“ ` if e1 e2 e3 : T ฮ“`e:T ฮ“`C :T ฮ“ ` monl (C , e) : T TMon 0 0 ฮ“, ฮ“ ` e : B โ†’Bool ฮ“ ` ฯƒ ฮ“ ` predฯƒ (e) : B TPred TCNil ฮ“ ` c1 : T1 ฮ“, x :T1 ` c2 : T2 ฮ“ ` x :c1 7โ†’ c2 : T1 โ†’T2 โˆ…`ฮน TId TMonC ฮ“ ` C1 : T1 ฮ“, x :T1 ` C2 : T2 ฮ“ ` x :C1 7โ†’ C2 : T1 โ†’T2 TFun ฮ“`r :B ฮ“ ` predlฯƒ (e); r : B Closing substitutions TApp TIf ฮ“`e:T ฮ“`c:T ฮ“ ` mon(c, e) : T ฮ“ ` predฯƒ (e) : B ฮ“ ` nil : B TRec ฮ“`c:T ฮ“`C :T Contract typing TBlame ฮ“ ` errl : T TCPred TCFun ฮ“`ฯƒ ฮ“ ` ฯƒ x :T ` v : T ฮ“, x :T ` ฯƒ[x 7โ†’ v ] Fig. 3. Typing rules of classic and space-efficient CPCF TMap Space-Efficient Latent Contracts e1 โˆ’โ†’m e2 Operational semantics (ฮปx :T . e) v โˆ’โ†’m e[v /x ] EBeta k1 op k2 โˆ’โ†’m [[op]] (k1 , k2 ) ยต(x :T ). e โˆ’โ†’m e[ยต(x :T ). e/x ] EIfTrue if true e2 e3 โˆ’โ†’m e2 e1 โˆ’โ†’m e10 e1 e2 โˆ’โ†’m e10 e2 EOpL e1 โˆ’โ†’m e10 e3 โˆ’โ†’m if e10 e2 e3 errl e2 โˆ’โ†’m errl errl op e2 โˆ’โ†’m errl EIf EAppLRaise EOpLRaise EDelta EFix EIfFalse if false e2 e3 โˆ’โ†’m e3 e2 โˆ’โ†’m e20 v1 e2 โˆ’โ†’m v1 e20 EAppL e1 โˆ’โ†’m e10 e1 op e2 โˆ’โ†’m e10 op e2 if e1 e2 7 EAppR e2 โˆ’โ†’m e20 v1 op e2 โˆ’โ†’m v1 op e20 if errl e2 e3 โˆ’โ†’m errl v1 errl โˆ’โ†’m errl v1 op errl โˆ’โ†’m errl EOpR EIfRaise EAppRRaise EOpRRaise Fig. 4. Shared operational semantics of CPCF 2.2 Classic Contract PCF (CPCFC ) Classic CPCF gives a straightforward semantics to contracts (Figs. 4 and 5), largely following the seminal work by Findler and Felleisen [6]. To check a predicate contract, we simply test it (EMonPred), returning either the value or an appropriately labeled error. Function contracts are deferred: monl (x :C1 7โ†’ C2 , v ) is a value, called a function proxy. When a function proxy is applied, it unwraps the proxy, monitoring the argument with the domain contract, running the function, and then monitoring the return value with the codomain contract (EMonApp). Our semantics may seem to be lax, where no monitor is applied to dependent uses of the argument in the codomain monitor [12]. In fact, it is agnostic: we could be picky by requiring that function contract monitors monl (x :C1 7โ†’ C2 , e) have 2 Concrete syntax for such predicates can be written much more nicely, but we ignore such concerns here. 8 Greenberg EMonPred monl (predฯƒ (e1 ), v2 ) โˆ’โ†’C if (ฯƒ(e1 ) v2 ) v2 errl monl (x :C1 7โ†’ C2 , v1 ) v2 โˆ’โ†’C monl (C2 [v2 /x ], v1 monl (C1 , v2 )) e โˆ’โ†’C e 0 โˆ’โ†’C monl (C , e 0 ) monl (C , e) EMon monl (C , errl 0 ) โˆ’โ†’C errl 0 monl (C , e) โˆ’โ†’E mon(labell (C ), e) mon(nil, v1 ) โˆ’โ†’E v1 EMonCNil mon(x :c1 7โ†’ c2 , v1 ) v2 โˆ’โ†’E mon(c2 [v2 /x ], v1 mon(c1 , v2 )) EMonC EMonRaise EMonLabel mon(predlฯƒ (e); r , v1 ) โˆ’โ†’E if (ฯƒ(e) v1 ) mon(r , v1 ) errl e 6= mon(c 0 , e 00 ) e โˆ’โ†’E e 0 mon(c, e) โˆ’โ†’E mon(c, e 0 ) EMonApp EMonCPred EMonCApp mon(c, errl ) โˆ’โ†’E errl mon(c2 , mon(c1 , e)) โˆ’โ†’E mon(join(c1 , c2 ), e) EMonCRaise EMonCJoin Fig. 5. Operational semantics of classic and space-efficient CPCF the substitution [x 7โ†’ monl (C1 , x )] throughout C2 ; we could be indy by having 0 [x 7โ†’ monl (C1 , x )] throughout C2 [4]. We default to a lax rule to make our proof of soundness easier, but weโ€™ll have as a corollary that classic and space-efficient semantics yield the same result regardless of what the closing substitutions do in the codomain (Sec. 3). Standard congruence rules allow for evaluation inside of monitors (EMon) and the propagation of errors (EMonRaise). Metatheory We prove CPCFC โ€™s type system sound with a minimum fuss, using the usual syntactic methods. The only subtlety is that we must be careful when proving the substitution property, since we have slightly changed the definition. In this section, we only consider the typing rules for CPCFC , i.e., those typeset on white and salmon. Lemma 1 (Weakening). โ€“ If ฮ“ ` e : T and x 6โˆˆ fv(e) then ฮ“, x :T 0 ` e : T . โ€“ If ฮ“ ` C : T and x 6โˆˆ fv(C ) then ฮ“, x :T 0 ` C : T . Space-Efficient Latent Contracts 9 Proof. By mutual induction on the terms and contracts. Lemma 2 (Substitution). If โˆ… ` v : T1 , then โ€“ ฮ“1 , x :T1 , ฮ“2 ` e : T2 implies ฮ“1 , ฮ“2 ` e[v /x ] : T2 , and โ€“ ฮ“1 , x :T1 , ฮ“2 ` C : T2 implies ฮ“1 , ฮ“2 ` C [v /x ] : T2 . Proof. By mutual induction the terms and contracts. (e = y) By case analysis on x = y, using weakening (Lemma 1) as appropriate. (e = k ) Immediate. (e = e1 op e2 ) By the IHs. (e = e1 e2 ) By the IHs. (e = ฮปy:T . e1 ) By case analysis on x = y, narrowing when the two are equal. (e = ยต(y:T ). e1 ) By case analysis on x = y, narrowing when the two are equal. (e = if e1 e2 e3 ) By the IHs. (e = errl ) Immediate. (e = monl (C , e)) By the IHs. (C = predฯƒ (e)) We have ฮ“1 , x :T1 , ฮ“2 ` predฯƒ (e) : T2 and we must show that ฮ“1 , ฮ“2 ` predฯƒ (e)[v /x ] : T2 . By inversion, we know that: T2 = B for some base type B ; ฮ“1 , x :T1 , ฮ“2 , ฮ“0 ` e : B โ†’Bool; and ฮ“0 ` ฯƒ. There are two cases. In both cases, we use TPred. (x โˆˆ fv(e)) The substitution is actually stored in ฯƒ. We find ฮ“1 , ฮ“2 , ฮ“0 , x :T1 ` e : B by the IH on e and ฮ“0 , x :T1 ` ฯƒ[x 7โ†’ v ] by TMap and our assumption. (x 6โˆˆ fv(e)) The substitution is ignored, and e[v /x ] = e. We find ฮ“1 , ฮ“2 , ฮ“0 ` e : B by the IH and ฮ“0 ` ฯƒ by assumption. (C = x :C1 7โ†’ C2 ) By the IHs. As a corollary, closing substitutions ฯƒ close up exactly their context ฮ“0 . Lemma 3 (Closing substitutions). If ฮ“0 ` ฯƒ and ฮ“, ฮ“0 ` e : T then ฮ“ ` ฯƒ(e) : T . Proof. By induction on ฮ“0 , using substitution (Lemma 2). Lemma 4 (Progress). If โˆ… ` e : T then either (a) e is some value, v ; (b) e is some error, errl ; or, (c) e โˆ’โ†’C e 0 . Proof. By induction on the typing derivation. ( TVar) Contradictoryโ€”variables arenโ€™t well typed in the empty context. ( TConst) k is a value. ( TBlame) errl is an error. ( TAbs) Function abstractions are values. ( TRec) Takes a step by EFix. ( TOp) By the IH, e1 is a value, error, or steps. In the latter two cases, we step by EOpLRaise or EOpL, respectively. By the IH, e2 is a value, error, or steps. In the latter two cases we step by EOpRRaise or EOpR. If both are values, then we step by EDelta. 10 Greenberg ( TApp) By the IH, e1 is a value, error, or steps. In the latter two cases, we step by EAppLRaise or EAppL, respectively. By the IH, e2 is a value, error, or steps. In the latter two cases we step by EAppRRaise or EAppR. If both are values, we know that e1 is either a function or a function proxy; we step by either EBeta or EMonApp, depending on the shape of e1 . ( TIf) By the IH, e1 is a value, error, or steps. In the latter two cases, we step by EIfRaise or EIf, respectively./ If e1 is a value, it must be either true or false; we step by EIfTrue or EIfFalse, depending on the shape of e1 . ( TMon) By the IH, e is either a value, error, or steps. In the latter two cases, we step by EMonRaise or EMon, respectively. If e is a value, we step by EMonPred or EMonApp, depending on the shape of the contract C . Lemma 5 (Preservation). If โˆ… ` e : T and e โˆ’โ†’C e 0 then โˆ… ` e 0 : T . Proof. By induction on the typing derivation, with cases on the step taken. ( TVar) Contradictoryโ€”variables arenโ€™t well typed in the empty context. ( TConst) Contradictoryโ€”constants are normal forms. ( TBlame) Contradictoryโ€”errors are normal forms. ( TAbs) Contradictoryโ€”functions are normal forms. ( TRec) We must have stepped by EFix; by substitution (Lemma 2) and TFix. ( TOp) If we stepped by an EOpRaise* rule, we are done by TBlame. If we stepped by a congruence rule, EOp*, we are done by the IH and TOp. If we stepped by EDelta, by the assumption that built-in operations have sound denotations. ( TApp) If we stepped by an EAppRaise* rule, we are done by TBlame.If we stepped by a congruence rule, EApp*, we are done by the IH and TApp. If we stepped by EBeta, by substitution. (Lemma 2) If we stepped by EMonApp, then: the domain is well typed by TMon; we can apply the proxied function by TApp; the codomain check is well formed by substitution (Lemma 2); and the entire resulting term is well typed by TMon again. ( TIf) If we stepped by EIfRaise, by TBlame. If we stepped by EIf, by the IH and TIf. If we stepped by EIfTrue or EIfFalse, by assumption. ( TMon) If we stepped by EMonRaise, the resulting error is well typed by TBlame. If we stepped by EMon, by the IH and TMon. If we stepped by EMonPred, then: we have โˆ… ` ฯƒ(e) : B โ†’Bool by closing substitution (Lemma 3); we can type the condition by TApp; the then branch is well typed by assumption; the false branch is well typed by TBlame; and the whole lot is well typed by TIf. 2.3 Space-efficient Contract PCF (CPCFE ) How can we recover tail calls in CPCF? CPCFC will happily wrap arbitrarily many function proxies around a value, and thereโ€™s no bound on the number of Space-Efficient Latent Contracts 11 labell (predฯƒ (e1 )) = predlฯƒ (e1 ) labell (x :C1 7โ†’ C2 ) = x :labell (C1 ) 7โ†’ labell (C2 ) join(nil, r2 ) = r2 join(predlฯƒ (e); r1 , r2 ) = predlฯƒ (e); drop(join(r1 , r2 ), predฯƒ (e)) join(x :c11 7โ†’ c12 , x :c21 7โ†’ c22 ) = x :join(c21 , c11 ) 7โ†’ join(wrap(c12 , x , c22 ), c22 ) drop(nil, predฯƒ (e)) = nil drop(predlฯƒ2 (e2 ); r , predฯƒ1 (e1 )) = ( drop(r , predฯƒ2 (e2 )) predlฯƒ2 (e2 ); drop(r , predฯƒ1 (e1 )) wrap(predlฯƒ (e), x , c) = wrap(nil, x , c) = wrap(predlฯƒ (e); r , x , c) = wrap(y:c1 7โ†’ c2 , x , c) = predฯƒ1 (e1 ) โŠƒ predฯƒ2 (e2 ) predฯƒ1 (e1 ) 6โŠƒ predฯƒ2 (e2 ) ๏ฃฑ l ๏ฃด x 6โˆˆ fv(ฯƒ(e)) ๏ฃฒpredฯƒ (e) predlฯƒ[x 7โ†’mon(join(c 0 ,c),e)] (e) ฯƒ(x ) = mon(c 0 , e) ๏ฃด ๏ฃณ predlฯƒ[x 7โ†’mon(c,ฯƒ(x ))] (e) otherwise nil wrap(predlฯƒ (e), x , c); wrap(r , x , c) y:wrap(c1 , x , c) 7โ†’ wrap(c2 , x , c) Fig. 6. Contract labeling and predicate stack management codomain contract checks that can accumulate. The key idea is joining contracts. Weโ€™ll make two changes to the language: weโ€™ll bound function proxies so each function has at most one, and weโ€™ll bound stacks to avoid redundant checking. We ultimately show that contracts without dependency use constant space, but that the story for dependent functions is more complex (Sec. 4). Fortuitously, our notion of join solves both of our problems, working identically for both simple and dependent contracts. To ensure a function value can have only one proxy, we change the semantics of monitoring: when monitoring a proxied value, we join the new monitor and the old one. To bound the size of stacks contract checks, we join pending contracts to avoid redundancy. The join operation works on labeled contracts, which (a) move the label from the monitor into the contract and (b) allow us to keep track of many predicates at once (Fig. 6). Concretely, labeled contracts use the metavariable c (as opposed to C ), comprising function contracts as usual (x :c1 7โ†’ c2 ) and predicate stacks, r (Fig. 2). A predicate stack r is a list of labeled predicates predl (e), where nil is the empty stack. The join operation takes two labeled contracts and combines them, eliminating redundant contracts as it goes. To join a new and an old predicate stack, we keep new contracts and eliminate redundant old ones; only more โ€œrecentโ€ contracts are kept. Joining functions works contravariantly, being careful to maintain correct substitution behavior using wrap. 12 Greenberg Finally, we establish what we mean by โ€œredundantโ€ using predicate implication: when does one contract imply another? Definition 6 (Predicate implication). Let predฯƒ1 (e1 ) โŠƒ predฯƒ2 (e2 ) be a relation on predicates such that: (Reflexivity) If โˆ… ` predฯƒ (e) : B then predฯƒ (e) โŠƒ predฯƒ (e). (Transitivity) If predฯƒ1 (e1 ) โŠƒ predฯƒ2 (e2 ) and predฯƒ2 (e2 ) โŠƒ predฯƒ3 (e3 ), then predฯƒ1 (e1 ) โŠƒ predฯƒ3 (e3 ). (Substitutivity) When ฮ“i 1 , x :T 0 , ฮ“i 2 ` predฯƒi (ei ) : T and โˆ… ` v : T 0 , if predฯƒ1 (e1 ) โŠƒ predฯƒ2 (e2 ) then predฯƒ1 (e1 )[v /x ] โŠƒ predฯƒ2 (e2 )[v /x ]. (Adequacy) If โˆ… ` predฯƒi (ei ) : T and predฯƒ1 (e1 ) โŠƒ predฯƒ2 (e2 ) then โˆ€k โˆˆ KB . ฯƒ1 (e1 ) k โˆ’โ†’m true implies ฯƒ2 (e2 ) k โˆ’โ†’m true. (Decidability) For all โˆ… ` predฯƒ1 (e1 ) : B and โˆ… ` predฯƒ2 (e2 ) : B , it is decidable whether predฯƒ1 (e1 ) โŠƒ predฯƒ2 (e2 ) or predฯƒ1 (e1 ) 6โŠƒ predฯƒ2 (e2 ). The entire development of space-efficiency is parameterized over this implication relation, โŠƒ, characterizing when one first-order contract subsumes another. We write 6โŠƒ for the negation of โŠƒ. The โŠƒ relation is a total pre-order (a/k/a a preference relation)โ€”it would be a total order, but it may not necessarily enjoy anti-symmetry. For example, we could have predฮน (ฮปx :Int. x โ‰ฅ 0) โŠƒ predฮน (ฮปx :Int. x + 1 > 0) and vice versa, even though the two predicates arenโ€™t equal. You can also view โŠƒ as a total order up-to contextual equivalence. There is at least one workable implication relation: syntactic equality. We say predฯƒ1 (e1 ) โŠƒ predฯƒ2 (e2 ) iff e1 = e2 and ฯƒ1 = ฯƒ2 . Since weโ€™ve been careful to store only those values that are actually referenced in the closure of the predicate, the steps to determine these equalities are finite and computable at runtime. For example, suppose we wish to show that pred[y7โ†’47] (ฮปx :Int. x > y) โŠƒ pred[y7โ†’47] (ฮปx :Int. x > y). The code partโ€”the predicate ฮปx :Int. x > yโ€”is the same; an implementation might observe that the function pointers are equal. The environment has only one slot, for y, with the value 47 in it; an implementation might compare the two environments slot-by-slot. We could have given an operational semantics which behaves more like an implementation, explicitly generating conditionals and merge operations in the terms themselves, but we believe our slightly more abstract presentation is more digestible. Substitution in the codomain: lax, picky, and indy We extend Greenbergโ€™s notion of join to account for dependency with a new function, wrap. Greenberg, Pierce, and Weirich identified two variants of latent contracts in the literature, differing in their treatment of the dependent substitution of arguments in the codomain: picky, where we monitor the value substituted in the codomain with the domain contract; and lax, where the actual parameter value substituted into the codomain is unmonitored [12]. There is a third variant, indy, which applies a monitor to the argument value but uses a different blame label [4]. These different models of substitution all exhibit different behavior for abusive contracts, where the codomain contract violates the domain contract. Space-Efficient Latent Contracts 13 There is another source of substitutions in the codomain: multiple function proxies. How do the monitors unfold when we have two function proxies? In the classic lax semantics, we find (leaving the domain check unevaluated): mon(x :c11 7โ†’ c12 , mon(x :c21 7โ†’ c22 , f )) v โˆ’โ†’C mon(c12 [v /x ], mon(x :c21 7โ†’ c22 , f ) mon(c11 , v )) โˆ’โ†’C mon(c12 [v /x ], mon(c22 [mon(c11 , v )/x ], f mon(c21 , mon(c11 , v )))) Even though weโ€™re using the lax semantics, we substitute contracts into the codomain. For the space-efficient semantics to be sound, it must behave exactly like the classic semantics: no matter what joins happen, CPCFE must replicate the contract substitutions done in CPCFC . We can construct an abusive contract in CPCFC โ€”even though it has lax semanticsโ€”by having the inner function proxy abuse the outer one (Fig. 7). Why was blame raised? Because c2 โ€™s codomain contract abused c1 โ€™s domain contract. Even though CPCFC has a lax semantics, wrapping multiple function proxies leads to monitoring domains from one contract in the codomain of anotherโ€”a situation ripe for abuse. Space-efficiency means joining contracts, so how can we emulate this classicsemantics substitution behavior? We use the wrap function, forcing a substitution when two function contracts are joined. By keeping track of these substitutions at every join, any joins that happen in the future will be working on contracts which already have appropriate substitutions. CPCFE uses labeled contracts (Fig. 2); substitution for labeled predicate contracts is explicit and delayed, as for ordinary contracts: ( predlฯƒ[x 7โ†’v ] (e) x โˆˆ fv(ฯƒ(e)) l predฯƒ (e)[v /x ] = predlฯƒ (e) otherwise nil[v /x ] = nil (predlฯƒ (e); r )[v /x ] = predlฯƒ (e)[v /x ]; r [v /x ] We do not do any joining when a substitution occurs (but see Sec. 6). In CPCFE , closing substitutions map each variable to (a) itself ([x 7โ†’ x ]), (b) a monitor on itself ([x 7โ†’ mon(c, x )]), or (c) a value. We add an evaluation rule taking ordinary contract monitors monl (C , e) to labeled-contract monitors mon(c, e) by means of the labeling function label (EMonLabel). Space-efficiency comes by restricting congruence to only apply when there are abutting monitors (cf. EMonC here in CPCFE to EMon in CPCFC ). When two monitors collide, we join them (EMonCJoin). Checking function contracts is as usual (EMonCApp is the same as EMonApp, only the latter works over labeled contracts); checking predicate stacks proceeds straightforwardly predicate-bypredicate (EMonCNil and EMonCPred). Metatheory We prove CPCFE โ€™s type system sound; the proof follows that for CPCFC , though there are more evaluation rules to consider here. We only consider the typing rules for CPCFE , i.e., those typeset on white and periwinkle. 14 Greenberg C1 = f :(pred(ฮปx :Int. x > 0) 7โ†’ pred(ฮปx :Int. x > 0)) 7โ†’ pred(ฮปx :Int. x > 0) C2 = f :(pred(ฮปx :Int. true) 7โ†’ pred(ฮปx :Int. true)) 7โ†’ pred(ฮปx :Int. f 0 = 0) Referring to the domains as Ci 1 and codomains as Ci 2 โˆ’โ†’C โˆ’โ†’C โˆ’โ†’C โˆ’โ†’C โˆ’โ†’โˆ—C โˆ’โ†’C โˆ’โ†’โˆ—C โˆ’โ†’C โˆ’โ†’โˆ—C โˆ’โ†’โˆ—C โˆ’โ†’C โˆ’โ†’C โˆ’โ†’C โˆ’โ†’C โˆ’โ†’C โˆ’โ†’C โˆ’โ†’C โˆ’โ†’โˆ—C monl1 (C1 , monl2 (C2 , ฮปf :(Intโ†’Int). f 5)) (ฮปx :Int. x ) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C2 , ฮปf :(Intโ†’Int). f 5) monl1 (C11 , (ฮปx :Int. x ))) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], (ฮปf :(Intโ†’Int). f 5) monl2 (C21 , monl1 (C11 , (ฮปx :Int. x ))))) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], monl2 (C21 , monl1 (C11 , (ฮปx :Int. x ))) 5)) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], monl2 (pred(ฮปx :Int. true), monl1 (C11 , (ฮปx :Int. x )) monl2 (pred(ฮปx :Int. true), 5)))) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], monl2 (pred(ฮปx :Int. true), monl1 (C11 , (ฮปx :Int. x )) 5))) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], monl2 (pred(ฮปx :Int. true), monl1 (pred(ฮปx :Int. x > 0), (ฮปx :Int. x ) monl1 (pred(ฮปx :Int. x > 0), 5))))) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], monl2 (pred(ฮปx :Int. true), monl1 (pred(ฮปx :Int. x > 0), (ฮปx :Int. x ) 5)))) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], monl2 (pred(ฮปx :Int. true), monl1 (pred(ฮปx :Int. x > 0), 5)))) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], monl2 (pred(ฮปx :Int. true), 5))) monl1 (C12 [(ฮปx :Int. x )/f ], monl2 (C22 [monl1 (C11 , ฮปx :Int. x )/f ], 5)) monl1 (C12 [(ฮปx :Int. x )/f ], if ((ฮปx :Int. monl1 (C11 , ฮปx :Int. x ) 0 = 0) 5) 5 errl2 ) monl1 (C12 [(ฮปx :Int. x )/f ], if (monl1 (C11 , ฮปx :Int. x ) 0 = 0) 5 errl2 ) monl1 (C12 [(ฮปx :Int. x )/f ], if (monl1 (pred(ฮปx :Int. x > 0), (ฮปx :Int. x ) monl1 (pred(ฮปx :Int. x > 0), 0)) = 0) l2 5 err ) monl1 (C12 [(ฮปx :Int. x )/f ], if (monl1 (pred(ฮปx :Int. x > 0), (ฮปx :Int. x ) (if ((ฮปx :Int. x > 0) 0) 0 errl2 )) = 0) l2 5 err ) monl1 (C12 [(ฮปx :Int. x )/f ], if (monl1 (pred(ฮปx :Int. x > 0), (ฮปx :Int. x ) (if (0 > 0) 0 errl2 )) = 0) l2 5 err ) monl1 (C12 [(ฮปx :Int. x )/f ], if (monl1 (pred(ฮปx :Int. x > 0), (ฮปx :Int. x ) (if false 0 errl2 )) = 0) 5 errl2 ) monl1 (C12 [(ฮปx :Int. x )/f ], if (monl1 (pred(ฮปx :Int. x > 0), (ฮปx :Int. x ) errl2 ) = 0) 5 errl2 ) errl2 Fig. 7. Abusive function proxies in CPCFC Space-Efficient Latent Contracts 15 Lemma 7 (Weakening). โ€“ If ฮ“ ` e : T and x 6โˆˆ fv(e) then ฮ“, x :T 0 ` e : T . โ€“ If ฮ“ ` C : T and x 6โˆˆ fv(C ) then ฮ“, x :T 0 ` C : T . โ€“ If ฮ“ ` c : T and x 6โˆˆ fv(c) then ฮ“, x :T 0 ` c : T . Proof. By mutual induction on the terms and contracts. Lemma 8 (Substitution). If โˆ… ` v : T1 , then โ€“ ฮ“1 , x :T1 , ฮ“2 ` e : T2 implies ฮ“1 , ฮ“2 ` e[v /x ] : T2 , and โ€“ ฮ“1 , x :T1 , ฮ“2 ` C : T2 implies ฮ“1 , ฮ“2 ` C [v /x ] : T2 . โ€“ ฮ“1 , x :T1 , ฮ“2 ` c : T2 implies ฮ“1 , ฮ“2 ` c[v /x ] : T2 . Proof. By mutual induction the terms, contracts, and labeled contracts. (e = y) By case analysis on x = y, using weakening (Lemma 7) as appropriate. (e = k ) Immediate. (e = e1 op e2 ) By the IHs. (e = e1 e2 ) By the IHs. (e = ฮปy:T . e1 ) By case analysis on x = y, narrowing when the two are equal. (e = ยต(y:T ). e1 ) By case analysis on x = y, narrowing when the two are equal. (e = if e1 e2 e3 ) By the IHs. (e = errl ) Immediate. (e = monl (C , e)) By the IHs. (C = predฯƒ (e)) We have ฮ“1 , x :T1 , ฮ“2 ` predฯƒ (e) : T2 and we must show that ฮ“1 , ฮ“2 ` predฯƒ (e)[v /x ] : T2 . By inversion, we know that: T2 = B for some base type B ; ฮ“1 , x :T1 , ฮ“2 , ฮ“0 ` e : B โ†’Bool; and ฮ“0 ` ฯƒ. There are two cases. In both cases, we use TPred. (x โˆˆ fv(e)) The substitution is actually stored in ฯƒ. We find ฮ“1 , ฮ“2 , ฮ“0 , x :T1 ` e : B by the IH on e and ฮ“0 , x :T1 ` ฯƒ[x 7โ†’ v ] by TMap and our assumption. (x 6โˆˆ fv(e)) The substitution is ignored, and e[v /x ] = e. We find ฮ“1 , ฮ“2 , ฮ“0 ` e : B by the IH and ฮ“0 ` ฯƒ by assumption. (C = x :C1 7โ†’ C2 ) By the IHs. (c = nil) Immediate. (c = predlฯƒ (e); r ) As for the predicate contracts above, using the IH to show that r is still well typed. (c = x :c1 7โ†’ c2 ) By the IHS. As a corollary, closing substitutions ฯƒ close up exactly their context ฮ“0 . Lemma 9 (Closing substitutions). If ฮ“0 ` ฯƒ and ฮ“, ฮ“0 ` e : T then ฮ“ ` ฯƒ(e) : T . Proof. By induction on ฮ“0 , using substitution (Lemma 8). Lemma 10 (Progress). If โˆ… ` e : T then either (a) e is some value, v ; (b) e is some error, errl ; or, (c) e โˆ’โ†’E e 0 . Proof. By induction on the typing derivation. 16 Greenberg ( TVar) Contradictoryโ€”variables arenโ€™t well typed in the empty context. ( TConst) k is a value. ( TBlame) errl is an error. ( TAbs) Function abstractions are values. ( TRec) Takes a step by EFix. ( TOp) By the IH, e1 is a value, error, or steps. In the latter two cases, we step by EOpLRaise or EOpL, respectively. By the IH, e2 is a value, error, or steps. In the latter two cases we step by EOpRRaise or EOpR. If both are values, then we step by EDelta. ( TApp) By the IH, e1 is a value, error, or steps. In the latter two cases, we step by EAppLRaise or EAppL, respectively. By the IH, e2 is a value, error, or steps. In the latter two cases we step by EAppRRaise or EAppR. If both are values, we know that e1 is either a function or a function proxy; we step by either EBeta or EMonCApp, depending on the shape of e1 . ( TIf) By the IH, e1 is a value, error, or steps. In the latter two cases, we step by EIfRaise or EIf, respectively./ If e1 is a value, it must be either true or false; we step by EIfTrue or EIfFalse, depending on the shape of e1 . ( TMon) We step by EMonLabel. ( TMonC) If the inner term e is a monitor, we step by EMonCJoin. Otherwise, by the IH, the inner term is a value, an error, or steps. If itโ€™s an error, we step by EMonCRaise. If it steps, we step by EMonC (knowing already that that e isnโ€™t a monitor). If e is a value, we either step by EMonCNil, step by EMonCPred, or have a value already (when e is a function). Lemma 11. If ฮ“ ` C : T then ฮ“ ` labell (C ) : T . Proof. By induction on the typing derivation, using TCPred and TCNil in the predicate case and TCFun in the function case. Lemma 12. If ฮ“ ` r1 : T and ฮ“ ` r2 : T then ฮ“ ` join(r1 , r2 ) : T . Proof. By induction on the typing derivation of r1 . Lemma 13. If ฮ“ ` c1 : T and ฮ“ ` c2 : T then ฮ“ ` join(c1 , c2 ) : T . Proof. By induction on the typing derivation of c1 , using Lemma 12 in the base case and substitution (Lemma 8). Lemma 14 (Preservation). If โˆ… ` e : T and e โˆ’โ†’E e 0 then โˆ… ` e 0 : T . Proof. By induction on the typing derivation, with cases on the step taken. ( TVar) Contradictoryโ€”variables arenโ€™t well typed in the empty context. ( TConst) Contradictoryโ€”constants are normal forms. ( TBlame) Contradictoryโ€”errors are normal forms. ( TAbs) Contradictoryโ€”functions are normal forms. Space-Efficient Latent Contracts 17 ( TRec) We must have stepped by EFix; by substitution (Lemma 8) and TFix. ( TOp) If we stepped by an EOpRaise* rule, we are done by TBlame. If we stepped by a congruence rule, EOp*, we are done by the IH and TOp. If we stepped by EDelta, by the assumption that built-in operations have sound denotations. ( TApp) If we stepped by an EAppRaise* rule, we are done by TBlame.If we stepped by a congruence rule, EApp*, we are done by the IH and TApp. If we stepped by EBeta, by substitution. (Lemma 8) If we stepped by EMonCApp, then: the domain is well typed by TMon; we can apply the proxied function by TApp; the unmonitored codomain well formed by substitution (Lemma 8); and the entire resulting term is well typed by TMon again. ( TIf) If we stepped by EIfRaise, by TBlame. If we stepped by EIf, by the IH and TIf. If we stepped by EIfTrue or EIfFalse, by assumption. ( TMon) Immediate from the assumptions, since labeling contracts preserves typing (Lemma 11). ( TMonC) If we stepped by EMonCRaise, the resulting error is well typed by TBlame. If we stepped by EMonC, by the IH and TMon. If we stepped by EMonCJoin, then by Lemma 13; if by EMonCNil, then by the assumptions . If we stepped by EMonCPred, then: we have โˆ… ` ฯƒ(e) : B โ†’Bool by closing substitution (Lemma 9); we can type the condition by TApp; the then branch is well typed by assumption; the false branch is well typed by TBlame; and the whole lot is well typed by TIf. Lemma 15 (Determinism). If e1 โˆ’โ†’E e2 and e1 โˆ’โ†’E e20 , then e2 = e20 . Proof. By induction on the first derivation. Recall that we exclude the CPCFC rules, so only EMonLabel fires on monitors. EMonC and EMonCJoin carefully avoid overlapping. 3 Soundness for space efficiency CPCFC and CPCFE are operationally equivalent, even though their cast semantics differ. We can make this connection formal by proving that every CPCF term either: (a) diverges in both CPCFC and CPCFE or (b) reduces to equivalent terms in both CPCFC and CPCFE . One minor technicality: some of the forms in our language are necessary only for runtime or only appear in one of the two calculi. We characterize source programs as those which omit runtime terms. Definition 16 (Source program). A well typed source program does not use TBlame or TMonC (and so TCNil, TCPred, and TCFun cannot be used). Lemma 17 (Associativity of join on predicate stacks). join(r1 , join(r2 , r3 )) = join(join(r1 , r2 ), r3 ). Proof. By induction on r1 . (r1 = nil) Immediate. 18 Greenberg (r1 = predl (e); r10 ) The IH is join(r10 , join(r2 , r3 )) = join(join(r10 , r2 ), r3 ). We calculate: join(r1 , join(r2 , r3 )) = join((predlฯƒ (e); r10 ), join(r2 , r3 )) = predlฯƒ (e); drop(join(r10 , join(r2 , r3 )), predฯƒ (e)) = predlฯƒ (e); drop(join(join(r10 , r2 ), r3 ), predฯƒ (e)) = join(predlฯƒ (e); drop(join(r10 , r2 ), predฯƒ (e)), r3 ) = join(join((predlฯƒ (e); r10 ), r2 ), r3 ) = join(join(r1 , r2 ), r3 ) (IH) Lemma 18 (Associativity of join). join(c1 , join(c2 , c3 )) = join(join(c1 , c2 ), c3 ). Proof. By induction on c1 . In the predicate stack case, by Lemma 17. In the function case, we calculate: join(x :c11 7โ†’ c12 , join(x :c21 7โ†’ c22 , x :c31 7โ†’ c32 )) = join(x :c11 7โ†’ c12 , x :join(c31 , c21 ) 7โ†’ join(wrap(c22 , x , c31 ), c32 )) = x :join(join(c31 , c21 ), c11 ) 7โ†’ join(wrap(c12 , x , join(c31 , c21 )), join(wrap(c22 , x , c31 ), c32 )) (IH) = x :join(c31 , join(c21 , c11 )) 7โ†’ join(wrap(join(wrap(c12 , x , c21 ), c22 ), x , c31 ), c32 ) = join(x :c31 7โ†’ c32 , x :join(c21 , c11 ) 7โ†’ join(wrap(c12 , x , c21 ), c22 )) = join(x :c31 7โ†’ c32 , join(x :c11 7โ†’ c12 , x :c21 7โ†’ c22 )) Lemma 19 (Idempotence of predicate stacks). If: โ€“ โˆ… ` k : B, โ€“ e k โˆ’โ†’โˆ—E true, and โ€“ โˆ… ` join(r1 , r2 ) : B , then mon(join(r1 , r2 ), k ) โˆ’โ†’โˆ—E w iff mon(join(r1 , drop(r2 , predฯƒ (e))), k ) โˆ’โ†’โˆ—E w . Proof. By induction on length of r1 , observing that ฯƒ(e) k โˆ’โ†’โˆ—E true is redundantly (but successfully) checked on the left more than on the right. Greenberg identified the key property for proving soundness of a space efficient semantics: to be sound, the space-efficient semantics must recover a notion of congruence for checking. In his manifest setting, he calls it cast congruence; since CPCF uses contract monitors, we call it monitor congruence. Lemma 20 (Monitor congruence (single step)). If โˆ… ` e1 : T and โˆ… ` c : T and e1 โˆ’โ†’E e2 , then mon(c, e1 ) โˆ’โ†’โˆ—E w iff mon(c, e2 ) โˆ’โ†’โˆ—E w . Proof. By cases on the step taken to find e1 โˆ’โ†’E e2 . In the easy case, thereโ€™s no joining of coercions and the same rule can apply in both derivations. In the more interesting case, two contract monitors join. In either case, it suffices to show that the terms are ultimately confluent, since determinism (Lemma 15)will do the rest. Space-Efficient Latent Contracts 19 Join-free reductions ( EFix) We give this case explicitly, as the original proof in Greenberg [11] doesnโ€™t talk about fixpoints. We must show mon(c, ยต(x :T ). e) โˆ’โ†’โˆ—E w iff mon(c, e[ยต(x :T ). e/x ]). The former steps to the latter immediately by EMonC and EFix, so we are done by determinism (Lemma 15). The following cases are all similar: EDelta, EBeta, EIfTrue, EIfFalse, EAppL, EAppR, EOpL, EOpR, EIf, EMonLabel, EMonCApp, and all of the E*Raise rules. A word about EMonCApp: one might think that this is a joining reduction, but in fact it is not: if we can unwrap in the inner step, then the function proxy isnโ€™t able to join with the outer monitor. Joining reductions ( EMonCNil) We must show that mon(c, mon(nil, v1 )) โˆ’โ†’โˆ—E w โ‡” mon(c, v1 ) โˆ’โ†’โˆ—E w . The terms are confluent: mon(c, mon(nil, v1 )) โˆ’โ†’E mon(join(nil, c), v1 ) = mon(c, v1 ). ( EMonCPred) We must show that: mon(r2 , mon((predlฯƒ (e); r1 ), v1 )) โˆ’โ†’โˆ—E w โ‡” mon(r2 , if (ฯƒ(e) v1 ) mon(r1 , v1 ) errl ) โˆ’โ†’โˆ—E w The left-hand side steps: mon(join((predlฯƒ (e); r1 ), r2 ), v1 ) โˆ’โ†’C mon(predlฯƒ (e); drop(join(r1 , r2 ), predฯƒ (e)), v1 ) by EMonCJoin, which in turn steps to if (ฯƒ(e) v1 ) mon(drop(join(r1 , r2 ), predฯƒ (e)), v1 ) errl . By cases on the behavior of ฯƒ(e) v1 . โ€ข If ฯƒ(e) v1 โˆ’โ†’โˆ—E true, then both sides reduce by EIfTrue (using EMonC on the right). The left hand side reduces to mon(drop(join(r1 , r2 ), predฯƒ (e)), v1 ) while the right hand side is mon(join(r1 , r2 ), v1 ). By idempotence of contracts (Lemma 19). โ€ข If ฯƒ(e) v1 โˆ’โ†’โˆ—E false, then both sides reduce by EIfFalse (using EMonC on the right); the right reduces by EMonRaise, and both sides are errl . โ€ข Finally, if ฯƒ(e) v1 diverges, then both terms diverge. 20 Greenberg ( EMonC) We must show that: mon(c, mon(c 0 , e)) โˆ’โ†’โˆ—E w โ‡” mon(c, mon(c 0 , e 0 )) โˆ’โ†’โˆ—E w given that e โˆ’โ†’E e 0 and knowing that e isnโ€™t another monitor. Both sides step by EMonCJoin, and then the left steps by EMon, to find mon(join(c 0 , c), e 0 ). ( EMonCJoin) We must show that: mon(c, mon(c2 , mon(c1 , e))) โˆ’โ†’โˆ—E w โ‡” mon(c, mon(join(c1 , c2 ), e)) โˆ’โ†’โˆ—E w The left-hand side joins to mon(join(c1 , join(c, c2 )), e) while the right-hand side joins to mon(join(join(c1 , c2 ), c), e). We have confluence, by associativity of join (Lemma 18). ( EMonCRaise) We must show that: mon(c, mon(c 0 , errl )) โˆ’โ†’โˆ—E w โ‡” mon(c, errl ) โˆ’โ†’โˆ—E w The left-hand steps by EMonCJoin, and then both sides can step by EMonCRaise to errl . Lemma 21 (Monitor congruence). If โ€“ โˆ… ` e1 : T , โ€“ โˆ… ` c : T , and โ€“ e1 โˆ’โ†’โˆ—E e2 , then mon(c, e1 ) โˆ’โ†’โˆ—E w iff mon(c, e2 ) โˆ’โ†’โˆ—E e2 . Diagrammatically: โˆ— E e2 e1 โ‡“ mon(c, e2 ) E w E โˆ— โˆ— mon(c, e1 ) Proof. By induction on the derivation of e1 โˆ’โ†’โˆ—E e2 , using single-step monitor congruence (Lemma 20). It is particularly satisfying that the key property for showing soundness of space efficiency can be proved independently of the inefficient semantics. Implementors can work entirely in the context of the space-efficient semantics, knowing that congruence ensures soundness. We show the observational equivalence of CPCFC and CPCFE by logical relations (Fig. 8), which gives us contextual equivalenceโ€”the strongest equivalence we could ask for. Lemma 22 (Similar contracts are logically related). If ฮ“ ` C1 โˆผ C2 : T and ฮ“ ` v1 ' v2 : T then ฮ“ ` monl (C1 , v1 ) ' monl (C2 , v2 ) : T . Space-Efficient Latent Contracts Result rules 21 e1 โˆผ e2 : T k โˆผ k : B โ‡โ‡’ ty(k ) = B v11 โˆผ v21 : T1 โ†’T2 โ‡โ‡’ โˆ€e12 โˆผ e22 : T1 . v11 e12 ' v21 e22 : T2 errl โˆผ errl : T Term rules e1 ' e2 : T e1 ' e2 : T โ‡โ‡’ (e1 diverges โˆง e2 diverges)โˆจ(e1 โˆ’โ†’โˆ—C w1 โˆงe2 โˆ’โ†’โˆ—E w2 โˆงw1 โˆผ w2 : T ) Contract rules (invariant relation) ฮ“ ` C1 โˆผ C2 : T ฮ“ ` predฯƒ1 (e1 ) โˆผ predฯƒ2 (e2 ) : B โ‡โ‡’ ฮ“ ` ฯƒ1 (e1 ) ' ฯƒ2 (e2 ) : B โ†’Bool ฮ“ ` x :C11 7โ†’ C12 โˆผ x :C21 7โ†’ C22 : T1 โ†’T2 โ‡โ‡’ ฮ“ ` C11 โˆผ C21 : T1 โˆง ฮ“, x :T1 ` C12 โˆผ C22 : T2 Closing substitutions and open terms ฮ“ |= ฮด ฮ“ ` e1 ' e 2 : T ฮ“ |= ฮด โ‡โ‡’ โˆ€x โˆˆ dom(ฮ“). ฮด1 (x ) โˆผ ฮด2 (x ) : ฮ“(x ) ฮ“ ` e1 ' e2 : T โ‡โ‡’ โˆ€ฮ“ |= ฮด. ฮด1 (e1 ) ' ฮด2 (e2 ) : T Fig. 8. Logical relation between classic and space-efficient CPCF Proof. By induction on the type index of the invariant relation ฮ“ ` C1 โˆผ C2 : T . Let ฮ“ |= ฮด be given; we must show that ฮด1 (monl (C1 , v1 )) ' ฮด2 (monl (C2 , v2 )) : T2 . The right-hand side steps by EMonLabel to mon(labell (ฮด2 (C2 )), ฮด2 (e2 )). If T = B , then Ci = predฯƒi (ei ), and each side reduces to if (ฮดi (ฯƒi (ei )) ฮดi (vi )) ฮดi (vi ) errl (by EMonPred on the left and EMonCPred on the right). By the assumption in the invariant relation, the conditions of the if co-terminate. The two sides behave exactly the same when the conditions diverge, raise blame, or return false. When they return true, they return related values. The more interesting case is when T = T1 โ†’T2 ; we must show that: ฮด1 (monl (x :C11 7โ†’ C12 , v1 )) โˆผ ฮด2 (mon(x :labell (C21 ) 7โ†’ labell (C22 ), v2 )) : T2 The left-hand side is a value; the right-hand side may or may not be a value, depending on whether v2 is proxied or not. (v2 = ฮปx :T1 . e2 ) Both sides are values. To show the logical relation, we let arguments v12 โˆผ v22 : T1 be given and must show that ฮด1 (monl (x :C11 7โ†’ C12 , v1 )) v12 ' ฮด2 (mon(x :labell (C21 ) 7โ†’ labell (C22 ), v2 )) v22 : T2 . 22 Greenberg Each side unwraps ( EMonApp and EMonCApp). Since the LR is closed under evaluation, we can use the IH on the domain and monitor (reducing on the right to convert to a monitor of labeled contracts). Note that there is no codomain monitor unless itโ€™s in Ci 2 โ€™s closing substitution already. (v2 = mon(x :c31 7โ†’ c32 , v20 )) For brevity, let c2 i = labell (C2 i ). The right-hand side steps by EMonCJoin: ฮด2 (mon(x :c21 7โ†’ c22 , mon(x :c31 7โ†’ c32 , v20 ))) โˆ’โ†’E ฮด2 (mon(join(x :c31 7โ†’ c32 , x :c21 7โ†’ c22 ), v20 )) which is mon(x :ฮด2 (join(c21 , c31 )) 7โ†’ ฮด2 (join(c32 , c22 )), ฮด2 (v20 )). Let arguments v12 โˆผ v22 : T1 be given. Now we can unwrap each side (by EMonApp and EMonCApp, respectively); we must show: monl (ฮด1 (C12 )[v12 /x ], ฮด1 (v1 ) monl (ฮด1 (C11 ), v12 )) ' mon(ฮด2 (join(wrap(c32 , x , c21 ), c22 ))[v22 /x ], ฮด2 (v20 ) mon(ฮด2 (join(c21 , c31 )), v22 )) : T2 We will use monitor congruence to resolve the extra contracts on the spaceefficient side. Since the LR is closed under evaluation, we can step the righthand side back to separate out the inner monitors, letting us recover something that behaves like v1 . That is, to show the goal above, we will show that: monl (ฮด1 (C12 )[v12 /x ], ฮด1 (v1 ) monl (ฮด1 (C11 ), v12 )) ' mon(ฮด2 (c22 )[v22 /x ], ฮด2 (mon(x :c31 7โ†’ c32 , v20 )) mon(ฮด2 (c21 ), v22 )) : T2 . We break the check apart in order to apply the IH. Before we explain how to find this relation, why is proving that these two terms related sufficient to show that our original terms are related? Itโ€™s sufficient because monitor congruence (Lemma 21) allows us to consider each of the domain and codomain monitors separately, knowing that weโ€™ll get identical behavior. Weโ€™ll see that the wrap in our original term is accounted for by codomain monitor that appears when we go through step-by-step. By the IH, we know that monl (ฮด1 (C11 ), v12 ) ' mon(ฮด2 (c21 ), v22 ) : T1 . If these terms terminate or diverge, than so will our original right-hand side domain monitor of join(c21 , c31 ), by Lemma 21. In that case weโ€™re done. If the terms yield values v13 ' v23 : T1 , we can continue. Using monitor congruence to step inside of the codomain check (Lemma 21), we have: โˆ’โ†’โˆ—E mon(ฮด2 (c22 )[v22 /x ], ฮด2 (mon(x :c31 โ†’ 7 c32 , v20 )) mon(ฮด2 (c21 ), v22 )) mon(ฮด2 (c22 )[v22 /x ], ฮด2 (mon(x :c31 โ†’ 7 c32 , v20 )) v23 ) And we must show: monl (ฮด1 (C12 )[v12 /x ], ฮด1 (v1 ) v13 ) ' mon(ฮด2 (c22 )[v22 /x ], ฮด2 (mon(x :c31 7โ†’ c32 , v20 )) v23 ) : T2 . Space-Efficient Latent Contracts 23 We can step the right hand side to: mon(ฮด2 (c22 )[v22 /x ], mon(ฮด2 (c32 )[v23 /x ], ฮด2 (v20 ) mon(c31 , v23 ))) By monitor congruence, we know mon(join(c21 , c31 ), v22 ) and mon(c31 , v23 ) coterminate: either they both diverge, both blame the same label, or reduce to a common value, v24 . Weโ€™re done in all but the last case, where we must consider: mon(ฮด2 (c22 )[v22 /x ], mon(ฮด2 (c32 )[v23 /x ], ฮด2 (v20 ) v24 )) Recall that mon(ฮด2 (c21 ), v22 ) โˆ’โ†’โˆ—E v23 ; so mon(ฮด2 (c32 )[v23 /x ], ฮด2 (v20 ) v24 ) is the same as mon(ฮด2 (wrap(c32 , x , c21 ))[v22 /x ], ฮด2 (v20 ) v24 )โ€”that is, the wrapping done in the join captures exactly the substitution that would occur if we evaluated each layer of function proxying step by step. To patch up the derivation, we use substitutivity (Definition 6, part (6)) to see that if the codomains merged before the substitution, they would also do so after the substitution. So our modified right-hand term is still in lock step with our original, where c32 sees a value monitored by c21 but c22 doesnโ€™t. Weโ€™ve assumed that ฮด1 (v1 ) ' ฮด2 (v2 ) : T1 โ†’T2 , so we know that ฮด1 (v1 ) v13 ' mon(ฮด(c32 )[v23 /x ], ฮด(v20 ) v24 ) : T2 by back-evaluating the right-hand side a few steps. If these terms diverge or go to errors together, we are done. Otherwise, they evaluate to values v10 ' v20 : T2 . It remains to see that: monl (ฮด1 (C12 )[v12 /x ], v10 ) ' mon(ฮด2 (c22 )[v22 /x ], v20 ) : T2 which we have by the IH. We can return to our original term and see that v20 is what will be given to whatโ€™s left of c22 after joining with wrap(c32 , x , c21 )โ€” monitor congruence letโ€™s us know that these monitors will evaluate the same merged and unmerged. Lemma 23 (Unwinding). If โˆ… ` ยต(x :T ). e : T , then ยต(x :T ). e โˆ’โ†’โˆ—m w iff there exists an n such that unrolling the fixpoint only n times converges to the same value, i.e., e[ยต(x :T ). . . . e[ยต(x :T ). e/x ] . . . /x ] โˆ’โ†’โˆ—m w . Proof. From left-to-right, by induction on the evaluation derivation, observing that there must be a finite number of unrollings. From right-to-left, by induction on n, observing that we can replace the substitution by its finite unrolling. Theorem 24 (CPCFC and CPCFE terms are logically related). 1. If ฮ“ ` e : T as a source program then ฮ“ ` e ' e : T . 2. If ฮ“ ` C : T as a source program then ฮ“ ` C โˆผ C : T . Proof. By mutual induction on the typing relations. 24 Greenberg Terms ฮ“ ` e : T Each case proceeds by letting ฮ“ |= ฮด be given, and then showing that both sides co-terminate, i.e., both diverge, raise blame, or return related values. ( TVar) By the definition of ฮ“ |= ฮด. ( TConst) By the definition of the LR. ( TAbs) By the IHs, letting some argument be given to show that the bodies behave similarly. ( TOp) By the IHs. ( TApp) By the IHs. ( TMu) We give this case in full, as it is new to the proof. Let ฮ“ |= ฮด; we must show that ฮด1 (ยต(x :T ). e1 ) ' ฮด2 (ยต(x :T ). e2 ) : T . Each side reduces in a single step ( EFix) to ฮดi (ei )[ฮดi (ยต(x :T ). ei )/x ], which can be rearranged into ฮดi (ei [ยต(x :T ). ei /x ]); we can rearrange this to something that looks like a dual substitution: ฮดi [ยต(x :T ). e1 , ยต(x :T ). e2 /x ](ei ). By unwinding (Lemma 23), we can see that the fixpoint on each side either (a) diverges, or (b) converge to some related values in a finite unrolling and can be replaced by a finite unrolling. In the former case, we are done because both terms diverge; in the latter case, we have ฮ“, x :T |= ฮด[ยต(x :T ). e1 , ยต(x :T ). e2 /x ] and can apply the IH. ( TMon) By the IHs and Lemma 22. ( TMonC) Contradictoryโ€”doesnโ€™t appear in source programs. ( TBlame) Contradictoryโ€”doesnโ€™t appear in source programs. Contracts ฮ“ ` C : T ( TPred) By the IH. ( TFun) By the IHs. 4 Bounds for space efficiency We have seen that CPCFE behaves the same as CPCFC (Theorem 24), but is CPCFE actually space efficient? For programs that donโ€™t use dependency, yes! With dependency, the story is more complicated. 4.1 The simple case Greenberg showed that for simple contractsโ€”without dependencyโ€”we can put a bounds on space [11]. We can recover his result in our more general framework. Observe that a given source program e starts with a finite number of predicate contracts in it. As e runs, no new predicates appear (because dependent substitutions have no effect), but predicates may accumulate in stacks. In the worst case, a predicate stack could contain every predicate contract from the original program e exactly once... but no more than that, because joins remove redundancy! Function contracts are also bounded: e starts out with function contracts Space-Efficient Latent Contracts Predicate extraction 25 preds(e), preds(C ), preds(c) : P(e ร— (Var * e)) preds(predฯƒ (e)) = preds(x ) = โˆ… S {(e, ฯƒ)} โˆช preds(e) โˆช [x 7โ†’v ]โˆˆฯƒ preds(v ) preds(k ) = โˆ… preds(ฮปx :T . e) = preds(e) preds(x :C1 7โ†’ C2 ) = preds(C1 ) โˆช preds(C2 ) preds(monl (C , e)) = preds(C ) โˆช preds(e) preds(mon(c, e)) = preds(c) โˆช preds(e) preds(nil) = โˆ… preds(e1 e2 ) = preds(e1 ) โˆช preds(e2 ) preds(predlฯƒ (e); r ) = {(e, ฯƒ)} โˆช preds(e) โˆช S 0 preds(e1 op e2 ) = preds(e1 ) โˆช preds(e2 ) [x 7โ†’e 0 ]โˆˆฯƒ preds(e ) โˆช preds(r ) preds(if e1 e2 e3 ) = preds(x :c1 7โ†’ c2 ) = preds(c1 ) โˆช preds(c2 ) preds(e1 ) โˆช preds(e2 ) โˆช preds(e3 ) preds(errl ) = โˆ… Contract size PB : N SB : N size(C ) : N PB = |{e โˆˆ preds(e) | ฮ“ ` predฯƒ (e) : B }| size(predฯƒ (e)) = SB when โˆ… ` predฯƒ (e) : B SB = L ยท PB ยท log2 PB size(x :C1 7โ†’ C2 ) = size(C1 ) + size(C2 ) Fig. 9. Predicate extraction and contract size of a certain height, and evaluation can only shrink that height. The leaves of function contracts are labeled with predicate stacks, so the largest contract we could ever see is of maximum height with maximal predicate stacks at every leaf. As the program runs, abutting monitors are joined, giving us a bound on the total number of monitors in a program (one per non-monitor AST node). We can make these ideas formal by first defining what we mean by โ€œall the predicates in a programโ€, and then showing that evaluation doesnโ€™t introduce predicates (Lemma 29). We let preds(e) be the set of predicates in a term, where a predicate is represented as a pair of term and a closing substitution. Lemma 25. preds(drop(r , pred(e))) โІ preds(r ) Proof. By induction on the predicate stack r . When r = nil, the proof is trivial; otherwise, we observe that we only lose predicates from r . Lemma 26. preds(C ) = preds(labell (C )) Proof. By induction on C ; the predicate case is immediate, while the arrow case uses the IHs. We say program e uses simple contracts when all predicates in e are closed and every predicate stack has no redundancies. As such a program reduces, no new contracts appear (and contracts may disappear). Concretely, these requirements are that if predฯƒ (e 0 ) โˆˆ e or predlฯƒ (e 0 ) โˆˆ e, we have fv(e 0 ) = โˆ… and ฯƒ = ฮน. Restricting programs to simple contracts is what lets us prove that substitution and joining donโ€™t increase the set of predicates. The โ€œno redundancyโ€ requirement 26 Greenberg 0 means that if predlฯƒ (e1 ); r โˆˆ e then โˆ€predlฯƒ0 (e2 ) โˆˆ r . predฯƒ (e1 ) 6โŠƒ predฯƒ0 (e2 ) (and that r itself has no redundancy, etc.). The following theorems only hold for programs that use simple contracts. Lemma 27. preds(e[e 0 /x ]) โІ preds(e) โˆช preds(e 0 ) Proof. By induction on e, using the absorptive property of set union. If e is a predicate contract, it has no free variables (by assumption), so the substitution doesnโ€™t hold on to anything. Lemma 28. If โˆ… ` c1 : T and โˆ… ` c2 : T then preds(join(c1 , c2 )) โІ preds(c1 ) โˆช preds(c2 ). Proof. By induction on c1 . If c1 is a predicate stack, then so must be c2 . If c1 = nil, the proof is immediate. If c1 is a non-empty predicate stack, then by Lemma 25. In the function contract case, by the IHs. Since weโ€™re using simple contracts, we know that wrap never does anything, because predicates have no free variables. Lemma 29 (Reduction is non-increasing in simple predicates). If โˆ… ` e : T and e โˆ’โ†’m e 0 then preds(e 0 ) โІ preds(e). Proof. By induction on the step taken. ( EDelta) Immediateโ€”no predicates. ( EBeta) By substitution (Lemma 27). ( EFix) Observe that the fixpoint operator introduces no preds other than its body; then by substitution (Lemma 27). ( EIfTrue) By definition: preds(e2 ) โІ preds(true) โˆช preds(e2 ) โˆช preds(e3 ). ( EIfFalse) By definition, as above. ( EMonPred) By definition: the right-hand side has no new predicates and possibly one fewer. ( EMonApp) The substitution in the codomain is ignored (Lemma 27), so the right-hand side is just a rearrangement of the left. ( EMonLabel) By definition and the fact that labeling leaves the predicate set alone (Lemma 26). ( EMonCNil) By definition. ( EMonCPred) As for EMonPred above: the right-hand side has no new predicates and possibly one fewer. ( EMonCApp) As for EMonApp: we can rearrange our constituent partsโ€” because substitutions are ignored (Lemma 27). ( EMonCJoin) By the monotonicity of join (Lemma 28), knowing that wrap does nothing. ( E*L, E*R, EIf, EMon, EMonC) By the IH. ( E*Raise) Immediateโ€”there are no predicates on the right-hand side. To compute the concrete bounds, we define PB as the number of distinct predicates at the base type B . We can represent a predicate stack at type B in SB bits, where L is the number of bits needed to represent a blame label. A Space-Efficient Latent Contracts 27 given well typed contract โˆ… ` C : T can then be represented in size(C ) bits, where each predicate stacks are represented is SB bits and function types are represented as trees of predicate stacks. Finally, since reduction is non-increasing (Lemma 29), we can bound the amount of space used by any contract by looking at the source program, e: we can represent all contracts in our program in at most s = maxC โˆˆe size(C ) spaceโ€”constant for a fixed source program. Readers familiar with Greenbergโ€™s paper (and earlier work, like Herman et al. [14]) will notice that our bounds are more precise, tracking the number of holes in contracts per type (size(C )) rather than simply computing the largest conceivable type (2height(T ) ). 4.2 The dependent case In the dependent case, we canโ€™t generally bound the number of contracts by the size of contracts used in the program. Consider the following term, where n โˆˆ N: let downTo = ยต(f :Intโ†’Int). monl (x :pred(ฮปx :Int. x โ‰ฅ 0) 7โ†’ pred(ฮปy:Int. x โ‰ฅ y), ฮปx :Int. if (x = 0) 0 (f (x โˆ’ 1))) in downTo n How many different contracts will appear in a run of this program? As downTo runs, weโ€™ll see n different forms of the predicate predlฯƒi (ฮปy:Int. x โ‰ฅ y). Weโ€™ll have one ฯƒn = [x 7โ†’ n] on the first call, ฯƒnโˆ’1 = [x 7โ†’ n โˆ’ 1] on the second call, and so on. But nโ€™s magnitude doesnโ€™t affect our measure of the size of source programโ€™s contracts. The number of distinct contracts that appear will be effectively unbounded. In the simple case, we get bounds automatically, using the smallest possible implication relationโ€”syntactic equality. In the dependent case, itโ€™s up to the programmer to identify implications that recover space efficiency. We can recover space efficiency for downTo by saying predฯƒ1 (ฮปy:Int. x โ‰ฅ y) โŠƒ predฯƒ2 (ฮปy:Int. x โ‰ฅ y) iff ฯƒ1 (x ) โ‰ค ฯƒ2 (x ). Then the codomain checks from recursive calls will be able to join: downTo n โˆ’โ†’โˆ—E monl (pred[x 7โ†’n] (. . . ), . . . ) โˆ’โ†’โˆ—E monl (pred[x 7โ†’n] (. . . ), monl (pred[x 7โ†’n โˆ’ 1] (. . . ), . . . )) โˆ’โ†’โˆ—E monl (pred[x 7โ†’n โˆ’ 1] (. . . ), . . . ) Why are we able to recover space efficiency in this case? Because we can come up with an easily decidable implication rule for our specific predicates matching how our function checks narrower and narrower properties as it recurses. Recall the mutually recursive even/odd example (Fig. 1). = monlodd (x :pred(ฮปx :Int. x โ‰ฅ 0) 7โ†’ pred(ฮปb:Bool. b or (x mod 2 = 0)), ฮปx :Int. if (x = 0) false (even (x โˆ’ 1))) and even = ฮปx :Int. if (x = 0) true (odd (x โˆ’ 1)) let odd 28 Greenberg We can make this example space-efficient by adding the implication that: predฯƒ1 (ฮปb:Bool. b or (x mod 2 = 0)) โŠƒ predฯƒ2 (ฮปb:Bool. b or (x mod 2 = 0)) iff ฯƒ1 (x ) + 2 = ฯƒ2 (x ). Suppose we put contracts on both even and odd: let odd = monlodd (x :pred(ฮปx :Int. x โ‰ฅ 0) 7โ†’ pred(ฮปb:Bool. b or (x mod 2 ฮปx :Int. if (x = 0) false (even (x and even = monleven (x :pred(ฮปx :Int. x โ‰ฅ 0) 7โ†’ pred(ฮปb:Bool. b or ((x + 1) mod 2 ฮปx :Int. if (x = 0) true (odd (x = 0)), โˆ’ 1))) = 0)), โˆ’ 1))) Now our trace of contracts wonโ€™t be homogeneous; eliding domain contracts: odd 5 โˆ’โ†’โˆ—C monlodd (pred[x 7โ†’5] (. . . ), even 4) โˆ’โ†’โˆ—C monlodd (pred[x 7โ†’5] (. . . ), monleven (pred[x 7โ†’4] (. . . ), odd 3)) โˆ’โ†’โˆ—C monlodd (pred[x 7โ†’5] (. . . ), monleven (pred[x 7โ†’4] (. . . ), monlodd (pred[x 7โ†’3] (. . . ), even 2))) โˆ— โˆ’โ†’C monlodd (pred[x 7โ†’5] (. . . ), monleven (pred[x 7โ†’4] (. . . ), monlodd (pred[x 7โ†’3] (. . . ), monleven (pred[x 7โ†’2] (. . . ), odd 1)))) โˆ— โˆ’โ†’C monlodd (pred[x 7โ†’5] (. . . ), monleven (pred[x 7โ†’4] (. . . ), monlodd (pred[x 7โ†’3] (. . . ), monleven (pred[x 7โ†’2] (. . . ), monlodd (pred[x 7โ†’1] (. . . ), even 0))))) To make these checks space efficient, weโ€™d need several implications; we write oddp for ฮปb:Bool. b or (x mod 2 = 0) and evenp for ฮปb:Bool. b or ((x + 1) mod 2 = 0). The following table gives conditions on the implication relation for the row predicate to imply the column predicate: โŠƒ predฯƒ1 (oddp ) predฯƒ1 (evenp ) predฯƒ2 (oddp ) ฯƒ1 (x ) + 2 = ฯƒ2 (x ) ฯƒ1 (x ) + 1 = ฯƒ2 (x ) predฯƒ2 (evenp ) ฯƒ1 (x ) + 1 = ฯƒ2 (x ) ฯƒ1 (x ) + 2 = ฯƒ2 (x ) Having all four of these implications allows us to eliminate any pair of checks generated by the recursive calls in odd and even, reducing the codomain checking to constant spaceโ€”here, just one check. We could define a different implication relation, where, say, predฯƒ1 (oddp ) โŠƒ predฯƒ2 (oddp ) iff ฯƒ1 (x ) mod 2 = ฯƒ2 (x ) mod 2. Such an implication would apply more generally than those in the table aboveโ€” it isnโ€™t always obvious how to define the implication relation. As usual, there is a trade-off between time and space. Itโ€™s possible to write contracts where the necessary implication relation for space efficiency amounts to checking both contracts. Consider the following tail-recursive factorial function: let any = ฮปz :Int. true let fact = ยต(f :Intโ†’Intโ†’Int). monl (x :pred(any) 7โ†’ acc:pred(any) 7โ†’ pred(ฮปy:Int. x โ‰ฅ 0), ฮปx :Int. ฮปacc:Int. if (x = 0) acc (f (x โˆ’ 1) (x โˆ— acc))) Space-Efficient Latent Contracts 29 This contract isnโ€™t wrong, just strange: if you call fact with a negative number, the program diverges and you indeed wonโ€™t get a value back out (contracts enforce partial correctness). A call of fact 3 yields monitors that check, from outside to inside, that 3 โ‰ฅ 0 and 2 โ‰ฅ 0 and 1 โ‰ฅ 0 and 0 โ‰ฅ 0. When should we say that predฯƒ1 (ฮปy:Int. x โ‰ฅ 0) โŠƒ predฯƒ1 (ฮปy:Int. x โ‰ฅ 0)? We could check that ฯƒ1 (x ) โ‰ฅ ฯƒ2 (x )... but the time cost is just like checking the original contract. More starkly, consider the following function with a strange contract (where prime is a predicate identifying prime numbers): let absurd = monl (x :pred(ฮปx :Int. true) 7โ†’ pred(ฮปy:Int. prime x ), ฮปx :Int. if (x โŠ‚ 13) 1 (absurd 11)) How does absurd 47 run? absurd 47 = monl (pred[x 7โ†’47] (ฮปy:Int. prime x ), absurd 11) = monl (pred[x 7โ†’47] (ฮปy:Int. prime x ), monl (pred[x 7โ†’11] (ฮปy:Int. prime x ), 1)) What implication relation could resolve these two unrelated checks into one? We could say that predฯƒ1 (ฮปy:Int. prime x ) โŠƒ predฯƒ2 (ฮปy:Int. prime x ) iff ฯƒ1 (x ) and ฯƒ2 (x ) are prime. Thereโ€™s no time-wise savings, but it would allow us to collapse tall stacks of monitors. 5 Where should the implication relation come from? The simplest option is to punt: derive the implication relation as the reflexive transitive closure of a programmerโ€™s rules. A programmer might specify how several different predicates interrelate as follows: 1 2 3 y : Int { x1 >= y } implies y : Int { x2 >= y } when x1 <= x2 y : Int { x1 > y } implies y : Int { x2 >= y } when x1 <= x2 + 1 y : Int { x1 > y } implies y : Int { x2 > y } when x1 <= x2 A default collection of such implications might come with the language; library programmers should be able to write their own, as well. But it is probably unwise to allow programmers to write arbitrary implications: what if theyโ€™re wrong? A good implementation would only accept verified implications, using a theorem prover or an SMT solver to avoid bogus implications. Rather than having programmers write their own implications, we could try to automatically derive the implications. Given a program, a fixed number of predicates occur, even if an unbounded number of predicate/closing substitution pairings might occur at runtime. Collect all possible predicates from the source program, and consider each pair of predicates over the same base type, pred(e1 ) and pred(e2 ) such that ฮ“ ` ei : B โ†’Bool. We can derive from the typing derivation the shapes of the respective closing substitutions, ฯƒ1 and ฯƒ2 . What are the conditions on ฯƒ1 and ฯƒ2 such that predฯƒ1 (e1 ) โŠƒ predฯƒ2 (e2 )? We are looking for a property P (ฯƒ1 , ฯƒ2 ) such that: โˆ€k โˆˆ KB , P (ฯƒ1 , ฯƒ2 ) โˆง ฯƒ1 (e1 ) k โˆ’โ†’โˆ—E true โ‡’ ฯƒ2 (e2 ) k โˆ’โ†’โˆ—E true 30 Greenberg Ideally, P is also efficiently decidableโ€”at least more efficiently than deciding both predicates. The problem of finding P can be reduced to that of finding the weakest precondition for the safety of the following function: 1 2 3 4 fun x : B = > let y0 = v 10 , ... , yn = v 1n (* ฯƒ1 โ€™s bindings *) z0 = v 20 , ... , zn = v 2m (* ฯƒ2 โ€™s bindings *) in if e1 x then ( if e2 x then () else error ) else () Since P would be the weakest precondition, we would know that we had found the most general condition for the implication relation. Whether or not the most general condition is the best condition depends on context. We should also consider a cost model for P ; programmers may want to occasionally trade space for time, not bothering to join predicates that would be expensive to test. Finding implication conditions resembles liquid type inference [20,28,16]: programmers get a small control knob (which expressions can go in P ) and then an SMT solver does the rest. The settings are different, though: liquid types are about verifying programs, while weโ€™re executing checks at runtime. 5.1 Implementation Implementation issues abound. How should the free variables in terms be represented? What kind of refactorings and optimizations can the compiler do, and how might they interfere with the set of contracts that appear in a program? When is the right moment in compilation to fix the implication relation? More generally, whatโ€™s the design space of closure representations and calling conventions for languages with contracts? 6 Extensions Generalizing our space-efficient semantics to sums and products does not seem particularly hard: weโ€™d need contracts with corresponding shapes, and the join operation would push through such shapes. Recursive types and datatypes are more interesting [22]. Findler et al.โ€™s lazy contract checking keeps contracts from changing the asymptotic time complexity of the program [7]; we may be able to adapt their work to avoid changes in asymptotic space complexity, as well. The predicates here range over base types, but we could also allow predicates over other types. If we allow predicates over higher types, how should the adequacy constraint on predicate implication (Definition 6) change? Impredicative polymorphism in the style of System F would require even more technical changes. The introduction of type variables would make our reasoning about names and binders trickier. In order to support predicates over type variables, weโ€™d need to allow predicates over higher typesโ€”and so our notion of adequacy of โŠƒ would change. In order to support predicates over quantified types, weโ€™d need to change adequacy again. Adequacy would end up looking like the logical relation used to show relational parametricity: when would we Space-Efficient Latent Contracts 31 have โˆ€ฮฑ.T1 โŠƒ โˆ€ฮฑ.T2 ? If we substitute T10 for ฮฑ on the left and T20 for ฮฑ on the right (and T10 and T20 are somehow related), then T1 [T10 /ฮฑ] โŠƒ T2 [T20 /ฮฑ]. Not only would the technicalities be tricky, implementations would need to be careful to manage closure representations correctly (e.g., what happens if polymorphic code differs for boxed and unboxed types?). We donโ€™t treat blame as an interesting algebraic structureโ€”itโ€™s enough for our proofs to show that we always produce the same answer. Changing our calculus to have a more interesting notion of blame, like indy semantics [4] or involutive blame labels [30,29], would be a matter of pushing a shallow change in the semantics through the proofs. Finally, it would make sense to have substitution on predicate stacks perform joins, saying (predlฯƒ (e); r )[v /x ] = join(predlฯƒ (e)[v /x ]; nil, r [v /x ]), so that substituting a value into a predicate stack checks for newly revealed redundancies. We havenโ€™t proved that this change would be sound, which would require changes to both type and space-efficiency soundness. In particular, weโ€™d need to (a) revise Lemma 22 and (b) simultaneously prove that substitution and joins preserve types (Lemmas 8) and 13). 7 Related work For the technique of space efficiency itself, we refer the reader to Greenberg [11] for a full description of related work. We have striven to use Greenbergโ€™s notation exactly, but we made some changes in adapting to dependent contracts: the cons operator for predicate stacks is a semi-colon, to avoid ambiguity; there were formerly two things named join, but one has been folded into the other; and our predicates have closing substitutions to account for dependency. We place one more requirement on the implication relation than Greenberg did: monotonicity under substitution, which we call substitutivity. Substitutions werenโ€™t an issue in his non-dependent system, but we must require that if a join can happen without having a value for x , then the same join happens when we know x โ€™s value. CPCF was first introduced in several papers by Dimoulas et al. in 2011 [3,4], and has later been the subject of studies of blame for dependent function contracts [5] and static analysis [27]. Our exact behavioral equivalence means we could use results from Tobin-Hochstadt et al.โ€™s static analysis in terms of CPCFC to optimize space efficient programs in CPCFE . More interestingly, the predicate implication relation โŠƒ seems to be doing some of the work that their static analysis does, so there may be a deeper relationship. Thiemann introduces a manifest calculus where the compiler optimizes casts for time efficiency: a theorem prover uses the โ€œdeltaโ€ between types to synthesize more efficient checks [26]. His deltas and our predicate implication relation are similar. He uses a separate logical language for predicates and restricts dependency (codomains can only depend on base values, avoiding abusive contracts). Sekiyama et al. [21] also use delayed substitutions in their polymorphic manifest contract calculus, but for different technical reasons. While delayed sub- 32 Greenberg stitutions resemble explicit substitutions [1] or explicit bindings [13,2], we use delayed substitutions more selectively and to resolve issues with dependency. The manifest type system in Greenbergโ€™s work is somewhat disappointing compared to the type system given here. Greenberg works much harder than we do to prove a stronger type soundness theorem... but that theorem isnโ€™t enough to help materially in proving the soundness of space efficiency. Developing the approach to dependency used here was much easier in a latent calculus, though several bugs along the way would have been caught early by a stronger type system. Type system complexity trade-offs of this sort are an old story. 7.1 Racketโ€™s implementation If contracts leak space, how is it that they are used so effectively throughout PLT Racket? Racket is designed to avoid using contracts in leaky ways. In Racket, contracts tend to go on module boundaries. Calls inside of a module then donโ€™t trigger contract checksโ€”including recursive calls, like in the even/odd example. Racket will monitor recursive calls across module boundaries, and these checks can indeed lead to space leaks. In our terms, Racket tends to implement contract checks on recursive functions as follows: downTo = monl (x :pred(ฮปx :Int. x โ‰ฅ 0) 7โ†’ pred(ฮปy:Int. x โ‰ฅ y), ยต(f :Intโ†’Int). ฮปx :Int. if (x = 0) 0 (f (x โˆ’ 1))) Note that calling downTo n will merely check that the final result is less than nโ€” none of the intermediate values. Our version of downTo above puts the contract inside the recursive knot, forcing checks every time (Sec. 4.2). Racket also offers a less thorough form of space efficiencyvia the tail-marks-match? predicate.3 We can construct a program where Racket will avoid redundant checks, but but wrapping the underlying function with the same contract twice leads to a space leak (Figure 10). We use low-level contract mechanisms here, to highlight the compromises Racket makes for space efficiency, โ€œstrik[ing] a balance between common ways that tail recursion is broken and checking that would not be too expensive in the case that there wouldnโ€™t have been any pile-up of redundant wrappersโ€.4 Finally, contracts are first-class in Racket: their monitors take two expressions, one for the contract and one to be monitored. Computing new contracts at runtime breaks our framing of space-efficiency: if we canโ€™t predetermine which contracts arise at runtime, we canโ€™t fix an implication relation in advance. We hope that CPCFE is close enough to Racketโ€™s internal model to provide insight into how to achieve space efficiency for at least some contracts in Racket. 8 Conclusion We have translated Greenbergโ€™s original result [11] from a manifest calculus [12] to a latent one [3,4]. In so doing, we have: offered a simpler explanation of the 3 4 From racket/collects/racket/contract/private/arrow.rkt. Robby Findler, personal correspondence, 2016-05-19. Space-Efficient Latent Contracts 1 2 3 4 5 6 7 8 33 ( define ( count-em-integer ? x ) ( printf " checking ~ s \ n " x ) ( integer ? x )) ( letrec ([ f ( contract (- > any / c count-em-integer ?) ( lambda ( x ) ( if ( zero ? x ) x ( f (- x 1)))) โ€™ pos โ€™ neg )]) ( f 3)) (a) Space-efficient program 1 2 3 4 5 6 7 ( letrec ([ f ( contract (- > any / c count-em-integer ?) ( contract (- > any / c count-em-integer ?) ( lambda ( x ) ( if ( zero ? x ) x ( f (- x 1)))) โ€™ pos โ€™ neg ) โ€™ pos โ€™ neg )]) ( f 3)) (a) Space-leaking program Fig. 10. Space-efficiency in Racket original result; isolated the parts of the type system required for space bounds, which were intermingled with complexities from conflating contracts and types; and, extended the original result, by covering more features (dependency and nontermination) and more precisely bounding non-dependent programs. Acknowledgments. The existence of this paper is due to comments from Sam Tobin-Hochstadt and David Van Horn that I chose to interpret as encouragement. Robby Findler provided the Racket example and helped correct and clarify a draft; Sam Tobin-Hochstadt also offered corrections and suggestions. The reviews offered helpful comments, too. References 1. Abadi, M., Cardelli, L., Curien, P.L., Leฬvy, J.J.: Explicit substitutions. Journal of Functional Programming (JFP) 1(4), 375โ€“416 (1991) 2. Ahmed, A., Findler, R.B., Siek, J., Wadler, P.: Blame for all. In: Principles of Programming Languages (POPL) (2011) 3. Dimoulas, C., Felleisen, M.: On contract satisfaction in a higher-order world. TOPLAS 33(5), 16:1โ€“16:29 (Nov 2011) 4. Dimoulas, C., Findler, R.B., Flanagan, C., Felleisen, M.: Correct blame for contracts: no more scapegoating. In: Principles of Programming Languages (POPL) (2011) 5. Dimoulas, C., Tobin-Hochstadt, S., Felleisen, M.: Complete monitors for behavioral contracts. In: Seidl, H. (ed.) Programming Languages and Systems, LNCS, vol. 7211, pp. 214โ€“233. Springer Berlin Heidelberg (2012) 6. Findler, R.B., Felleisen, M.: Contracts for higher-order functions. In: International Conference on Functional Programming (ICFP) (2002) 34 Greenberg 7. Findler, R.B., Guo, S.Y., Rogers, A.: Lazy contract checking for immutable data structures. In: Chitil, O., Horvaฬth, Z., Zsoฬk, V. (eds.) Implementation and Application of Functional Languages, pp. 111โ€“128. Springer-Verlag, Berlin, Heidelberg (2008) 8. Flatt, M., PLT: Reference: Racket. Tech. Rep. PLT-TR-2010-1, PLT Design Inc. (2010), http://racket-lang.org/tr1/ 9. Garcia, R.: Calculating threesomes, with blame. In: International Conference on Functional Programming (ICFP) (2013) 10. Greenberg, M.: Manifest Contracts. Ph.D. thesis, University of Pennsylvania (November 2013) 11. Greenberg, M.: Space-efficient manifest contracts. In: Principles of Programming Languages (POPL) (2015) 12. Greenberg, M., Pierce, B.C., Weirich, S.: Contracts made manifest. In: Principles of Programming Languages (POPL) (2010) 13. Grossman, D., Morrisett, G., Zdancewic, S.: Syntactic type abstraction. TOPLAS 22(6), 1037โ€“1080 (Nov 2000) 14. Herman, D., Tomb, A., Flanagan, C.: Space-efficient gradual typing. In: Trends in Functional Programming (TFP). pp. 404โ€“419 (Apr 2007) 15. Herman, D., Tomb, A., Flanagan, C.: Space-efficient gradual typing. Higher Order Symbol. Comput. 23(2), 167โ€“189 (Jun 2010) 16. Jhala, R.: Refinement types for haskell. In: Programming Languages Meets Program Verification (PLPV). pp. 27โ€“27. ACM, New York, NY, USA (2014) 17. Meyer, B.: Eiffel: the language. Prentice-Hall, Inc. (1992) 18. Plotkin, G.: LCF considered as a programming language. Theoretical Computer Science 5(3), 223 โ€“ 255 (1977) 19. Racket contract system (2013) 20. Rondon, P.M., Kawaguchi, M., Jhala, R.: Liquid types. In: Programming Language Design and Implementation (PLDI) (2008) 21. Sekiyama, T., Igarashi, A., Greenberg, M.: Polymorphic manifest contracts, revised and resolved. TOPLAS (2016), accepted in September; to appear 22. Sekiyama, T., Nishida, Y., Igarashi, A.: Manifest contracts for datatypes. In: Principles of Programming Languages (POPL). pp. 195โ€“207. ACM, New York, NY, USA (2015) 23. Siek, J., Thiemann, P., Wadler, P.: Blame, coercion, and threesomes: Together again for the first time. In: Programming Language Design and Implementation (PLDI) (2015) 24. Siek, J.G., Taha, W.: Gradual typing for functional languages. In: Scheme and Functional Programming Workshop (September 2006) 25. Siek, J.G., Wadler, P.: Threesomes, with and without blame. In: Principles of Programming Languages (POPL). pp. 365โ€“376. ACM, New York, NY, USA (2010) 26. Thiemann, P.: A delta for hybrid type checking. In: Wadler Festschrift. pp. 411โ€“ 432. LNCS 9600, Springer Switzerland 27. Tobin-Hochstadt, S., Van Horn, D.: Higher-order symbolic execution via contracts. In: OOPSLA. pp. 537โ€“554. ACM, New York, NY, USA (2012) 28. Vazou, N., Rondon, P.M., Jhala, R.: Abstract refinement types. In: Felleisen, M., Gardner, P. (eds.) European Symposium on Programming (ESOP). pp. 209โ€“228. Springer Berlin Heidelberg, Berlin, Heidelberg (2013) 29. Wadler, P.: A Complement to Blame. In: Ball, T., Bodik, R., Krishnamurthi, S., Lerner, B.S., Morrisett, G. (eds.) SNAPL. LIPIcs, vol. 32, pp. 309โ€“320. Schloss Dagstuhlโ€“Leibniz-Zentrum fuer Informatik (2015) Space-Efficient Latent Contracts 35 30. Wadler, P., Findler, R.B.: Well-typed programs canโ€™t be blamed. In: European Symposium on Programming (ESOP) (2009)
6cs.PL
On Expressing and Monitoring Oscillatory Dynamics Petr DluhosฬŒ, LubosฬŒ Brim, and David SฬŒafraฬnek โˆ— Faculty of Informatics Masaryk University Botanickaฬ 68a, Brno, Czech Republic [email protected] To express temporal properties of dense-time real-valued signals, the Signal Temporal Logic (STL) has been defined by Maler et al. The work presented a monitoring algorithm deciding the satisfiability of STL formulae on finite discrete samples of continuous signals. The logic has been used to express and analyse biological systems, but it is not expressive enough to sufficiently distinguish oscillatory properties important in biology. In this paper we define the extended logic STLโˆ— in which STL is augmented with a signal-value freezing operator allowing us to express (and distinguish) detailed properties of biological oscillations. The logic is supported by a monitoring algorithm prototyped in Matlab. The monitoring procedure of STLโˆ— is evaluated on a biologically-relevant case study. 1 Introduction In this paper we deal with automatic decision of the question if a given continuous signal satisfies a given temporal property. This question originally arose in the domain of analogous circuits verification [17]. The procedure deciding this question has been called monitoring [17]. A monitor is constructed for a given property allowing off-line or even on-line decision over any continuous signal arising from a technical device (real case) or a numerical simulation procedure (model case) [18]. An important fact is that the monitoring procedure is always time bounded and that validity of the given logic property (discrete nature) is decided only approximately on a signal (continuous nature). These restrictions are necessary but not limiting to significantly help in avoiding errors in systems construction [21]. In systems biology, continuous signals most typically represent the model case โ€“ theoretical behaviour of mathematical models mimicking the dynamics of biological processes. Temporal properties are employed to express biological hypothesis [19, 9, 5, 4] and the monitoring procedure provides a promising analysis tool [7, 22, 11]. Many dynamical phenomena that arise in biological systems have the form of oscillations. In physics the term oscillation represents an infinite behaviour periodically alternating certain quantities/qualities. The identifying aspect of oscillations is the fact that certain states in the phase space of the dynamical system are being repeatedly re-visited. A biological example of such phenomena are circadian rhythms. In [23] an interesting wet-lab experiment has been achieved on the cyanobacterium Cyanothece sp. that showed a relation between metabolic cycles and circadian rhythms. A mathematical model of oscillations in gene regulation of cyanobacteria has been provided in [20]. Other models targeting oscillatory behaviour can be found e.g. in [15, 14]. In contrast to physics, the notion of oscillation in biology is usually understood informally and in a wider scope. Many wet-lab experiments show oscillatory behaviour with decreasing amplitude (socalled damped oscillation). Dual notion, oscillation with increasing amplitude, is also relevant: the question targeting how many oscillations and how strongly they increase until a permanent oscillation is โˆ— The work has been supported by the Grant Agency of Czech Republic grant GAP202/11/0312. Ezio Bartocci and Luca Bortolussi (Eds.): HSB 2012 EPTCS 92, 2012, pp. 73โ€“87, doi:10.4204/EPTCS.92.6 c P. Dluhos et al. This work is licensed under the Creative Commons Attribution License. 74 On Expressing and Monitoring Oscillations achieved comes to a significant interest when tuning biological processes via mathematical models [15, 14]. When considering the population behaviour as a real-valued signal in dense-time domain, we need to quantitatively express and compactly encode the mentioned types of oscillatory phenomena. In [9], a linear-time logic with constraints over real values has been defined. It can be practically used to express many dynamical phenomena including oscillations of species concentration. The logic is interpreted over finite time-series of real-valued data obtained as discretely sampled solutions of differential equations (ODEs) (or a series of physical measurements). Formally, a technical problem may arise with the dense-time domain of considered signals. In general, in a particular interval on the time axis of the signal there may exist infinitely many points where a considered property (a predicate over real-values) changes its truth value. A rigorous semantics which treats this problem is given in [17] in terms of continuous (real-valued) signals which are required to be piece-wise affine. In such a setting, it is assumed that there exists a finite interval covering of the signal time-domain where the end points can be sampled and on which the signal behaves โ€œreasonablyโ€ in each individual time interval. The logic with such a semantics is called Signal Temporal Logic (STL) [17] and is based on the (bounded) Metric Interval Temporal Logic (MITL) [2]. Neither STL, nor other temporal logic, as far as we know, provide any possibility to express (and distinguish) the classes of oscillations such as damped oscillations or oscillations with increasing amplitude. The reason is impossibility of globally referencing (and relatively comparing) concrete signal values occurring in time points in which some local property is satisfied. Of course, in STL we can express directly any single concrete signal, but not a universal property without references to concrete values. E.g., the damped oscillation in Figure 1c can be expressed in STL as a sequence exactly reaching the 15 local extremes in the given order. In general, there can appear any number of local extremes in the observed time interval. Such a general property cannot be expressed in STL. (a) x(t) = sin( 2ฯ€t 10 ) (b) x(t) = t 2ฯ€t 20 sin( 10 ) (c) x(t) = 20 2ฯ€t t sin( 10 ) Figure 1: Various types of oscillations. In this paper, we propose an extension of STL, denoted STLโˆ— , based on enriching the logic with a signal-value freeze operator โˆ—[ฯ•] which allows referencing to a signal value in a time point when ฯ• is determined true. By means of atomic propositions enriched by variables of the form xโˆ— referring to โ€œfrozenโ€ values, we can express damped oscillations by the following formula:     G[0,60] (( F[0,10] โˆ— G[1,10] xโˆ— โ‰ฅ x + c ) โˆง ( F[0,10] โˆ— G[1,10] xโˆ— โ‰ค x โˆ’ c )). It says that โ€there is always a time instant in near future which is a local maximum for some future interval and there is also another time instant in near future which is a local minimum for some future intervalโ€. In these intervals, another local maxima and minima for more distant intervals occur, and so on. This implies that the signal values can be surrounded by a decreasing function from top and an increasing function from bottom. The constant c sets the extent of damping. P. Dluhos et al. 75 The concept of freeze quantification has been introduced in [3] to increase real-time temporal logic expressiveness by allowing every temporal operator to bind a time variable to the time it refers to. In the context of systems biology this concept has been used in Biological Oscillator Synchronisation Logic (BOSL) [6] to reason on oscillators synchronisation. In our work we shift the notion of temporal quantification to bind the real-valued signal variables to the temporal reference of time and we do it at the level of STL logic. Freezing of variable values has been used before in higher-level formalisms employing local variables [13, 1]. However, these formalisms do not support dense-time binding. It is necessary to note that when values of derivatives of signal values are known in all sampled points, some oscillatory properties can be expressed by using plain STL with predicates over derivatives. However, in such a case all needed derivatives (of all required orders) must be included within the signal. Getting these data can be computationally hard or even impossible. STLโˆ— allows to express (and monitor) oscillatory properties without the need of any additional information supporting the signals. The contribution of this paper is an extension of STL logic with signal value freeze quantification (Section 3) motivated by the need to express oscillations appearing in biology. The paper is primarily focused on a practical aspect, we give an algorithm for monitoring STLโˆ— formulae over (bounded) continuous signals (Section 4). The result is supported by a prototype implementation evaluated on a biological case study of E. coli repressilator (Section 5). Please note that a detailed discussion of STLโˆ— expressiveness is provided in a masterโ€™s thesis [10] that makes a preliminary version of this paper. 2 Background First, we briefly recall the real-valued signals over continuous time from [17]. For the purposes of this paper, we focus only on signals over Rn . Definition 2.1 Let T = [0, r], r โˆˆ Qโ‰ฅ0 , T โІ Rโ‰ฅ0 , be a finite interval (time domain of the signal). A finite length signal s is a function s : T โ†’ Rn where |s| = r denotes the length of the signal s. Definition 2.2 Given a signal s : T โ†’ Rn , n denotes the order of the signal s. We use si to denote the i-th component of the signal, si : T โ†’ R (i.e., the canonical projection to the i-th element). A signal of order n represents one finite run of a continuous-time system with n variables. A variable can represent any quantity of the system, e.g., concentration of species, its derivative or any other attribute of the signal which can be measured and quantified. To translate the properties of a signal into terms of logic, we use a function transforming real values of the signal components in every time instant to the Boolean set {0, 1}, representing satisfaction or dissatisfaction of a property over the signal. These truth values are used as propositional variables in formulae of the logic. Unlike in [17], we restrict the allowed operations on signal variables to linear combinations and simple comparisons. Such a restriction is needed for our monitoring algorithm (Section 4) and does not limit expression of the properties of our interest. Definition 2.3 Linear predicate ฮฝ of order m is a function ฮฝ : Rm โ†’ B of the form โˆ‘m i=1 ai xi โˆผ b where ai , b โˆˆ R are real coefficients, xi are input variables, โˆผโˆˆ {<, โ‰ค, >, โ‰ฅ, =} and B is a Boolean set B = {0, 1}. The predicate ฮฝ(x1 , x2 , . . . xm ) returns 1 iff the expression โˆ‘m i=1 ai xi โˆผ b is true and 0 otherwise. However, in the logic defined in this paper, we need not only to work with the values of variables acquired in a single time instant, but also with a second set of values from another time instant. For this reason, we will define an additional function extracting truth values from the signal. 76 On Expressing and Monitoring Oscillations + Definition 2.4 Atomic predicate ยต is a function ยต : Sn ร— R+ 0 ร— R0 โ†’ B where Sn is a class of signals โˆ— of order n. For each signal s โˆˆ Sn and t,t โˆˆ [0, |s|], ยต is defined by the formula: df ยต(s,t,t โˆ— ) = ฮฝ(s1 (t), . . . , sn (t), s1 (t โˆ— ), . . . , sn (t โˆ— )), where ฮฝ is a linear predicate of order 2n and si are components of the signal s. Values of the atomic predicate ยต for t > |s| or t โˆ— > |s| are considered undefined. An atomic predicate over a signal s describes a Boolean property of the signal s, i.e., if a constraint specified by the linear predicate ฮฝ is satisfied with respect to two time instants t and t โˆ— . An example of such a property is โ€under condition t โˆ— < t, the difference between values of variables s1 and s2 was higher in the time t โˆ— than in the time tโ€: ยต(s,t,t โˆ— ) = ฮฝ(s1 (t), s2 (t), s1 (t โˆ— ), s2 (t โˆ— )) = s1 (t) โˆ’ s2 (t) < s1 (t โˆ— ) โˆ’ s2 (t โˆ— ), which can be rearranged to the standard form of a linear predicate according to Definition (2.3): df ฮฝ(s1 (t), s2 (t), s1 (t โˆ— ), s2 (t โˆ— )) = s1 (t) โˆ’ s2 (t) โˆ’ s1 (t โˆ— ) + s2 (t โˆ— ) < 0. Instead of ยต(s,t,t โˆ— ) = s1 (t) โˆ’ s2 (t) < s1 (t โˆ— ) โˆ’ s2 (t โˆ— ) we usually write ยต(s,t,t โˆ— ) = x โˆ’ y < xโˆ— โˆ’ yโˆ— , denoting the variables of a signal s in time t by letters x, y, z, . . . and the same variables in time t โˆ— as xโˆ— , yโˆ— , zโˆ— , . . .. As in [17], we will avoid the undesired cases of atomic predicates where the output values of the predicate are varying infinitely often. We assume that we deal with signals that are well-behaving with respect to every ยต, that is, ยต(s) has a bounded variability and every change in ยต(s) is detected in the sense that every point t such that ยต(s[t]) 6= limt 0 โˆ’>t ยต(s[t 0 ]) is included in the sampling [17]. 3 A Logic for Oscillatory Dynamics In this section we describe the syntax and semantics of STL*. It is based on the Signal Temporal Logic (STL) [17] which we extend with the signal-value freeze operator โˆ—[ฯ•]. We consider atomic predicates restricted to linear as defined in the previous section. 3.1 Syntax The formulae of the STL* are inductively defined by the following grammar: ฯ• ::= ยตi | ยฌฯ• | ฯ•1 โˆจ ฯ•2 | ฯ•1 U[a,b] ฯ•2 | โˆ—ฯ•, where ยตi are atomic predicates from Definition 2.4, ยฌ and โˆจ are standard propositional logic operators, U[a,b] is a bounded until operator constrained by the closed nonsingular time interval [a, b] with rational end-points. The interpretation of this operator is similar to the one used in the Metric Interval Temporal Logic (MITL) [2]. Finally, โˆ— is the newly added unary signal-value freeze operator. In the standard way, we can derive additional temporal operators such as eventually ( F[a,b] ฯ• โ‰ก true U[a,b] ฯ•) and globally ( G[a,b] ฯ• โ‰ก ยฌ F[a,b] ยฌฯ•). P. Dluhos et al. 3.2 77 Semantics Formulae of STL* are interpreted over triplets (s,t,t โˆ— ) where s is a real-valued signal and t,t โˆ— โˆˆ [0, |s|] are two time instants. We write (s,t,t โˆ— ) |= ฯ•, iff a formula ฯ• is satisfied on the triplet (s,t,t โˆ— ). The satisfaction of an STL* formula is defined inductively to its structure: df (s,t,t โˆ— ) |= ยต โ‡โ‡’ ยต(s,t,t โˆ— ) = 1; (s,t,t โˆ— ) |= ยฌฯ• โ‡โ‡’ (s,t,t โˆ— ) 6|= ฯ•; (s,t,t โˆ— ) |= ฯ•1 โˆจ ฯ•2 โ‡โ‡’ (s,t,t โˆ— ) |= ฯ•1 or (s,t,t โˆ— ) |= ฯ•2 ; df df df (s,t,t โˆ— ) |= ฯ•1 U[a,b] ฯ•2 โ‡โ‡’ โˆƒt 0 โˆˆ [a + t, b + t] : (s,t 0 ,t โˆ— ) |= ฯ•2 โˆง โˆ€t 00 โˆˆ [t,t 0 ] : (s,t 00 ,t โˆ— ) |= ฯ•1 ; (s,t,t โˆ— ) |= โˆ—ฯ• (1) df โ‡โ‡’ (s,t,t) |= ฯ•. Because models for STL* are signals, we also speak about satisfaction of a formula over a signal. df Definition 3.1 The satisfaction of a formula ฯ• over a signal s is defined as: s |= ฯ• โ‡โ‡’ (s, 0, 0) |= ฯ•. The meaning of the operator โˆ—ฯ• is to freeze the values of the signal over which the formula is interpreted in the current time point so we can use these values inside the subformula ฯ•. Formula โˆ—ฯ• is true in time t = t0 iff the formula ฯ• is true with the time t โˆ— frozen in this time, i.e., t โˆ— = t0 . In combination with other temporal operators, interesting properties such as โ€the value of the variable  can beโˆ— expressed  x is nondecreasing on the interval Iโ€, ฯ•1 โ‰ก GI โˆ— G[0,ฮต] (x โ‰ค x) , where ฮต > 0 is an arbitrary constant. Or โ€at some point in the future (during  interval I) the value x increases by the value of 5 within two time unitsโ€, ฯ•2 โ‰ก FI โˆ— F[0,2] (xโˆ— + 5 = x) . To determine the satisfaction of a formula over a signal, the signal has to be of a sufficient length. The necessary length can be computed for each formula inductively to its structure as in [17]. The freeze operator does not require any additional length: df l(ยต) = 0; l(ยฌฯ•) = l(ฯ•); l(ฯ•1 โˆจ ฯ•2 ) = max(l(ฯ•1 ), l(ฯ•2 )); df df (2) df l(ฯ•1 U[a,b] ฯ•2 ) = max(l(ฯ•1 ), l(ฯ•2 )) + b; l(โˆ—ฯ•) df = l(ฯ•). From Definition 3.1 we can see that if a formula ฯ• contains an atomic predicate ยตi and there is no operator โˆ— wrapping this predicate then all variables concerning the frozen time instant t โˆ— are handled as if t โˆ— = 0. From the definition of the semantics of STL* (1) follows that in a formula with several nested operators โˆ—, the meaning of a frozen variable xโˆ— is local. I.e., it relates to the nearest operator โˆ—, because the content of the variable t โˆ— is overwritten by the most nested freeze operator โˆ—. It implies that only a single set of frozen signal values is accessible at every place in the formula. For example, in a formula:    โˆ— xโˆ— โ‰ค y UI (xโˆ— = y โˆง โˆ— G[0,5] xโˆ— โ‰ฅ y ) , (3) the first and the second occurrence of the variable xโˆ— relate to the first usage of โˆ— and address the time t = 0, in which the formula is interpreted. The third occurrence of xโˆ— , in contrast to the previous two, 78 On Expressing and Monitoring Oscillations relates to the second operator โˆ— and addresses the time instant in which the subformula on the right side of UI becomes true. Semantics restricted in this way does not excessively limit the capability of expressing various biological behaviour while remaining computationally feasible. 4 Algorithm In this section we deal with monitoring of an STL* formula, which means to determine the satisfaction of a formula over a finite length signal. The monitoring procedure introduced in this paper is inspired by constrained LTL model-checking [9] and monitoring of STL formulae [17], but needed to be extended into 2D space due to freeze operator โˆ—. It is because the task is solved simultaneously for two time instants, actual time and frozen time. The idea of the monitoring procedure is to construct a parse tree of the formula and check the satisfaction in a bottom-up manner. First step in checking a formula ฯ• over a signal s is to construct a set of time points in which the formula ฯ• is satisfied. Definition 4.1 Let ฯ• be a STL* formula and s be a real-valued signal. A set Sฯ•,s = {(t,t โˆ— ) โˆˆ [0, |s|] ร— [0, |s|] | (s,t,t โˆ— ) |= ฯ•} is called the satisfaction set of formula ฯ• over signal s. We use short-form notation Sฯ• whenever the signal s is obvious from the context. Now we inductively construct satisfaction sets for nodes on higher levels of the parse tree. The last step of the procedure is to decide if s |= ฯ• from satisfaction set for the formula ฯ•. According to Definition 3.1, it is equivalent to checking whether the satisfaction set contains the point (0, 0). Constructing the satisfaction set for a general signal can be a very difficult task. For this reason we will consider the monitoring algorithm only for piecewise linear signals. This is a reasonable requirement because in most cases we deal with time series produced by numerical simulations of modelled systems or by some measurements. These series can be interpreted as piecewise linear signals considering the values changing linearly between two adjacent points. If required, other points can be generated in between the existing points to make the signal more precise. Definition 4.2 A real-valued signal s of order n is called piecewise linear signal iff all the projections si (t) : [0, |s|] โ†’ R, i = 1, . . . , n are piecewise linear functions defined on a finite set of intervals J = T S {I1 , I2 , . . . , Im } where I j โІ [0, |s|], j = 1, . . . , m and J = 0, / J = [0, |s|]. Theorem 4.1 (Inductive construction of the satisfaction set) Let s be a piecewise linear signal and ฯ• a formula in STL*. The satisfaction set Sฯ• of the formula ฯ• over the signal s can be constructed inductively with respect to the structure of the formula ฯ•: Sยต Sยฌฯ• Sฯ•1 โˆจฯ•2 Sฯ•1 U[a,b] ฯ•2 Sโˆ—ฯ• + โˆ— {(t,t โˆ— ) โˆˆ R+ 0 ร— R0 | ยต(s,t,t ) = 1}; + R+ 0 ร— R0 \ Sฯ• ; Sฯ•1 โˆช Sฯ•2 ; {(t,t โˆ— ) โˆˆ Sฯ•1 | โˆƒt 0 โˆˆ [t + a,t + b] : (t 0 ,t โˆ— ) โˆˆ Sฯ•2 โˆง โˆ€t 00 โˆˆ [t,t 0 ] : (t 00 ,t โˆ— ) โˆˆ Sฯ•1 }; + + โˆ— = {(t,t โˆ— ) โˆˆ R+ 0 ร— R0 | (t,t) โˆˆ Sฯ• ,t โˆˆ R0 }. = = = = Proof Each of the equations follows directly from the definition of semantics of STL* (1). P. Dluhos et al. 79 The assumption of piecewise linear signals in combination with linearity of atomic predicates (Definitions 2.3, 2.4) enables us to construct satisfaction sets for atomic predicates in polynomial time and to easily compute sets belonging to higher formulae. The formalism we use for the representation of satisfaction sets are convex polytopes. Definition 4.3 Convex polytope P โІ Rn is a set {x = (x1 , x2 , . . . , xn ) โˆˆ Rnร—1 | Ax โ‰ค b} where A โˆˆ Rmร—n is a matrix and b โˆˆ Rmร—1 is a column. A convex polytope in R1 is called a line segment, in R2 a convex polygon. Each inequality โˆ‘nj=1 ai j x j โ‰ค bi in Definition 4.3 identifies a subspace of Rn . The convex polytope is obtained as intersection of these subspaces. Theorem 4.2 Assume s a piecewise linear signal and J = {I1 , . . . , Im } the set of intervals on which s is defined. Let ยต be an atomic predicate over the signal s. The predicate ยต(s,t,t โˆ— ) = โˆ‘ni=1 ai si (t) + โˆ‘ni=1 bi si (t โˆ— ) โˆผ b, โˆผโˆˆ {<, โ‰ค, >, โ‰ฅ, =} is a linear function over the signal s in variables t and t โˆ— according df to Definition 2.4. Denote Si,+j = {(t,t โˆ— ) โˆˆ Ii ร— I j | ยต(s,t,t โˆ— ) = 1} where i, j โˆˆ {1, . . . m}, Ii , I j โˆˆ J the set of time instants at which the atomic predicate ยต is satisfied over signal s on rectangular area Ii ร— I j and df Si,โˆ’j = (Ii ร— I j ) \ Si,+j its complement. For t โˆˆ Ii ,t โˆ— โˆˆ I j there can arrive two situations: 1. if โˆผ โ‰ก =, then the set Si,+j makes a line segment (possibly degenerated to a single point or an empty set); 2. if โˆผ 6โ‰ก =, then the space Ii ร— I j is divided by the line โˆ‘ni=1 ai si (t) + โˆ‘ni=1 bi si (t โˆ— ) = b into two subspaces Si,+j and Si,โˆ’j (Figure 2). (Again, there might be a degenerated case when the line โˆ‘ni=1 ai si (t) + โˆ‘ni=1 bi si (t โˆ— ) = b does not cross the rectangle {(t,t โˆ— ) โˆˆ Ii ร— I j }. In this case Si,+j = 0/ and Si,โˆ’j = Ii ร— I j or vice versa). Proof Described properties result from the linear form of atomic predicates 2.4 and from the fact that signal s behaves linearly on each interval Ii โˆˆ J , i โˆˆ {1, . . . m}. Figure 2: An illustration of the set Si,+j for a formula xโˆ— < 32 x + 28 3 on the subspace Ii ร—I j = [0, 4]ร—[10, 13]. In both cases, the set Si,+j makes a convex set easily describable by set operations over convex polytopes. In the first case, a line segment itself is a convex polytope. In the second case, either the set Si,+j is a convex polytope, or (when โˆผโˆˆ {<, >}) it is a convex polytope after subtraction of one bordering line segment, which is a polytope. S Using this algorithm we can express the satisfaction set Sยต as Sยต = i, jโˆˆ{1,...,m} Si,+j , where Si,+j are the sets described above constructed by set operations on polytopes. The set Sยต can be further simplified by 80 On Expressing and Monitoring Oscillations joining adjacent polytopes. Having satisfaction sets for atomic predicates, we could inductively construct satisfaction sets for composite formulae from Theorem 4.1 again as operations on polytopes, which could be achieved in polynomial time [8]. However, working with precise satisfaction sets as defined in Theorem 4.1 can be quite a difficult task. We have to work with polytopes of different dimensions (polygons, lines and points) and operations over sets of these objects can be unnecessarily demanding. In real-world applications, we could end up performing an expensive monitoring over noisy signals measured on imperfect devices or computed on computers with finite numerical precision. Hence think about less precise, yet faster monitoring algorithm. We can imagine a noisy signal as a signal measured or computed with finite precision. The actual values of the variables can differ from the values presented by the signal up to some error ฮต > 0. This inaccuracy in the domain of values implies also inaccuracy in the time domain. When investigating the time instant in which some event occurred (e.g., x > 0) we cannot be sure when exactly it happened. That is because the critical value x = 0 is burdened by an error and it is possible that x = 0, but also that x > 0 or x < 0 in that particular time instant. Imagine we are in the situation from Theorem 4.2, but working with a noisy signal. We cannot be sure about the border of the set Si,+j due to the error ฮต. The condition โˆ‘ni=1 ai si (t) + โˆ‘ni=1 bi si (t โˆ— ) = b defining points on the border of Si,+j could be easily broken by changing the values of the signal s by arbitrary small values from (0, ฮต). For this reason, we will ignore these border points and count them as they were in Si,+j or in Si,โˆ’j depending on what would be computationally easier. As a consequence, in the first case in Theorem 4.2, Si,+j = 0, / and in the second case, it does not matter if โˆผ โ‰ก < or โˆผ โ‰ก โ‰ค. As a result of this simplification, the set of allowed operators in atomic predicates is restricted to {<, >}. The remaining three operators lost their sense. With signals burden with some error ฮต > 0 the satisfaction of atomic predicates can be meaningfully determined only for time instants inside the satisfaction set. Hence the satisfaction of a formula using the operator =, e.g., x = b or x = y + 2, cannot be determined. Every reference to a precise value has to be replaced by a sufficiently large interval, e.g., formula x = b can be replaced by x โ‰ฅ (b โˆ’ ฮด ) โˆง x โ‰ค (b + ฮด ) for some ฮด > ฮต/2. Based on these assumptions, monitoring can be solved approximately. For every pair of intervals Ii , I j โˆˆ J , the satisfaction set on this area can be described by a single convex polygon Si,+j . For the S whole satisfaction set Sยต,s we get Sยต,s = i, jโˆˆ{1,...,m} Si,+j . The problem of construction of satisfaction sets for composite formulae from Theorem 4.1 is reduced to operations with sets of convex polytopes in plane for which efficient algorithms exist [8]. Algorithm 4.1 (Approximative monitoring algorithm for piecewise linear signals) Input: A piecewise linear signal s and an STL* formula ฯ•. Output: Answer to the question s |= ฯ•. Algorithm inductively constructs the satisfaction set Sฯ• : All the computations are performed on parts of the signal s of sufficient length. This can be computed according to (2). If the signal does not have the sufficient length, the answer returned by the algorithm might be wrong. 1. Sยต = i, jโˆˆ{1,...,m} Si,+j . The computation of the satisfaction sets Si,+j for individual intervals is performed according to Theorem 4.2, but without determining the satisfaction of the borders (as was justified in this section). S P. Dluhos et al. 81 2. Sยฌฯ• = (J ร— J ) \ Sฯ• . The result can be computed as a simple Boolean operation on polygons. It is necessary to ensure that the resulting set consists only of convex polygons, which could be achieved for example by triangulation [8]. 3. Sฯ•1 โˆจฯ•2 = Sฯ•1 โˆช Sฯ•2 . Again a Boolean polygonal operation. + + โˆ— 4. Sโˆ—ฯ• = {(t,t โˆ— ) โˆˆ R+ 0 ร— R0 | (t,t) โˆˆ Sฯ• ,t โˆˆ R0 }. The satisfaction set for the freeze operation can be computed by: (1) finding an intersection between the line t โˆ— = t and the satisfaction set Sฯ• (black line segments in Figure 3a), (2) substituting values in the second component by the whole axis t โˆ— , i.e., making a projection to the first component t and then a Cartesian product with the axis t โˆ— (Figure 3b). (a) (b) Figure 3: Example of computing satisfaction set for the formula โˆ—ฯ•. a) The satisfaction set represented as a set of (overlapping) convex polygons (different colors are used only for depicting the fact that the set consists of convex polygons) and the line t = t โˆ— . The regions of intersection of the line and the satisfaction set are depicted in black color. b) Resulting set Sโˆ—ฯ• obtained by projecting the intervals of intersection to the axis t and making a Cartesian product with the axis t โˆ— . 5. Sฯ•1 U[a,b] ฯ•2 = {(t,t โˆ— ) โˆˆ Sฯ•1 | โˆƒt 0 โˆˆ [t + a,t + b] : (t 0 ,t โˆ— ) โˆˆ Sฯ•2 โˆง โˆ€t 00 โˆˆ [t,t 0 ] : (t 00 ,t โˆ— ) โˆˆ Sฯ•1 }. To be more illustrative, we explain this part of the algorithm from the geometrical point of view, identifying values t with the horizontal axis and values t โˆ— with the vertical axis. (a) Sฯ•1 (b) Sฯ•2 (c) Sฯ•1 โˆฉ Sฯ•2 Figure 4: First step of computation of Sฯ•1 U[a,b] ฯ•2 is to find the intersection Sฯ•1 โˆฉ Sฯ•2 . For each convex polygon P โˆˆ Sฯ•1 โˆฉ Sฯ•2 (Figure 4c) the following procedure is performed: 82 On Expressing and Monitoring Oscillations (a) P โˆช Sฯ•1 (b) ordered vertices (c) rectangular polygons (stripes) Ri , i = 1, . . . , n โˆ’ 1 Figure 5: Next, the space is divided into horizontal stripes. The task is solved in each stripe separately. (a) Vertices of polygons {P} โˆช Sฯ•1 are increasingly ordered by the second component t โˆ— (duplidf cates can be removed). Denote the ordered set V = (V1 ,V2 , . . .Vn ) (Figures 5a, 5b); โˆ— )โˆˆV (b) For i = 1, . . . , n โˆ’ 1 every neighbouring pair of vertices Vi = (ti ,tiโˆ— ),Vi+1 = (ti+1 ,ti+1 specifies a rectangular polygon (stripe): df โˆ— โˆ— Ri = {(t,t โˆ— ) โˆˆ R+ 0 ร— [ti ,ti+1 ]} (Figure 5c). Ri in a form of line segment is considered empty because we do not care about the border points. df (c) The task is solved in every stripe Ri separately. For every nonempty Ri denote Pi = Ri โˆฉ P and df Si = Ri โˆฉ Sฯ•1 . Due to the way of construction of Ri , all polygons in Si and the single polygon โˆ— ) or the lower (t โˆ— = t โˆ— ) border of the stripe Pi have all their vertices on the upper (t โˆ— = ti+1 i Ri (Figure 6a). In fact, these polygons can take only the shape of a triangle or a trapezoid (Figure 7). (a) the stripe R4 โ†’ โˆ’ (b) points on the left side of the line ul (c) A4 = the rightmost polygon in S40 Figure 6: The potential polygons are identified. (The solution cannot be placed further in time than the property ฯ•2 . Moreover, the property ฯ•1 must continuously hold at all time points until ฯ•2 is satisfied.) Now we get rid of the polygons lying on the right side of Pi because their points cannot be in the solution (they represent the time past the event ฯ•2 ). To do so, we isolate the upper and lower rightmost vertices of the polygon Pi . Denote them as u = (ut , ut โˆ— ) and l = (lt , lt โˆ— ) (Figure 6b). We get a new area: โ†’ โˆ’ df R0i = {(t,t โˆ— ) โˆˆ Ri | (t,t โˆ— ) lies on the left side of the line ul }. P. Dluhos et al. 83 df The solution can lie only in this area, so we can restrict Si to Si0 = R0i โˆฉ Si . Figure 7: An example of a stripe and all possible shapes of polygons inside a stripe. (d) All the adjoining polygons (sharing an edge) in Si0 are connected to form maximal seamless convex polygons (e.g., the green and orange polygons in Figure 6b). (e) Let Ai be the rightmost polygon in Si0 (Figure 6c) (Even after connecting some polygons in Si0 their shape can still be only triangular or trapezoidal (Figure 7) so there is only one rightmost polygon in Si0 ). Then A0i = Ai โˆฉ (Pi (b, a)) is the solution for the stripe Ri (Figure 8). df The operation is defined as A (a, b) = {(x, y) โˆˆ R ร— R | โˆƒc โˆˆ (a, b) : (x + c, y) โˆˆ A} which is equal to A โŠ• (โˆ’a, โˆ’b), where โŠ• is the Minkowski sum. S 0 (f) The final satisfaction set is given by Sฯ•1 U[a,b] ฯ•2 = nโˆ’1 i=1 Ai . (a) P4 before application of the operator (b) the shifted polygon P4 (2.5, 2.5) (c) A04 = A4 โˆฉ (P4 (2.5, 2.5)), the final solution in the stripe R04 Figure 8: Last step is to consider the interval [a, b] bounding the operator U. 6. The result s |= ฯ• which is equivalent to (0, 0) โˆˆ Sฯ• is returned. Remark 4.1 The satisfaction set for temporal operator future F[a,b] ฯ• โ‰ก trueU[a,b] ฯ• (and hence G[a,b] ฯ•) can be computed more easily than according to the step 5. It can be obtained directly as S F[a,b] ฯ• = Sฯ• (b, a). 4.1 Time and space complexity Time and space complexity of all steps of the Algorithm 4.1 is proportional to the number of polygons they are working with. Number of polygons generated in step 1 is at most n2 for each atomic predicate, where n is the number of intervals on which the signal is defined. The number of polygons does not asymptotically change during the computation of operations described in other steps of the algorithm and all these functions do not work slower than O(n2 ) (see [8] for more details). The output polygons also keep small number of vertices during the process. The upper bound on the total computation time is therefore O(kn4 ), where n is the number of intervals on which the signal is defined and k is the size of the investigated formula. 84 5 On Expressing and Monitoring Oscillations Evaluation and Case Study A prototype of the approximative monitoring Algorithm 4.1 was implemented in Matlab (version R2011b). The Multi-Parametric Toolbox (MPT) package [16] (version 2.6.3) was used for the polygonal operations. We have not focused on efficiency of the implemented algorithm, our goal was to prove the concept of the presented algorithm. Detailed description of the implementation, results of the experiments and performance analysis can be found in [10]. We have studied a biological system of three transcriptional repressors which was designed and built into bacteria Escherichia coli [14]. Concentrations of involved proteins are periodically oscillating which causes periodic production of a green fluorescent protein. Intensity of fluorescence of this protein, which can be measured, gives evidence of the ongoing activity of the network (Figure 9). Figure 9: The fluorescent intensity of a colony of Escherichia coli containing the repressilator. The intensity is increasing overall due to the increasing number of individuals in the colony. The period of oscillations is lower than the time between cell division, but the whole repressilator is transmitted from generation to generation. Figure was taken from [14]. The network was modelled as a system of six differential equations: mฬ‡1 mฬ‡2 mฬ‡3 ฮฑ = โˆ’m1 + 1+p n + ฮฑ0 ; 3 ฮฑ = โˆ’m2 + 1+pn + ฮฑ0 ; 1 ฮฑ = โˆ’m3 + 1+p n + ฮฑ0 ; 2 pห™1 pห™2 pห™3 = โˆ’ฮฒ (p1 โˆ’ m1 ); = โˆ’ฮฒ (p2 โˆ’ m2 ); = โˆ’ฮฒ (p3 โˆ’ m3 ). (4) dmi df d pi , pฬ‡i = ; m1 , m2 and m3 correspond to activity of genes lacl,tetR and cl; p1 , p2 dt dt and p3 are concentrations of corresponding proteins and ฮฑ, ฮฒ , ฮฑ0 , n are constants (a typical behaviour of the system is depicted in Figure 10). The analysis of the system (4) and the estimation of parameters ฮฑ, ฮฒ , ฮฑ0 , n producing the oscillatory behaviour was originally done by means of manual qualitative analysis of ODEs [14]. However, we can perform the analysis automatically using the monitoring of STL* formulae. We can specify the desired oscillatory property by the formula: df Where mฬ‡i =   df ฯ• = G[10,190] F[0,50] โˆ— ( F[1,50] mโˆ—i < mi ) โˆง F[1,50] mโˆ—i > mi ) (5) and test the satisfaction for different values of parameters on runs of the length at least 300 minutes. The expected period has to be lower than 50 minutes. We start the testing 10 minutes later after the beginning to avoid the initial swing and end the testing 50 minutes before the end of the measurement because the signal might be cut in the middle of a period. P. Dluhos et al. 85 Figure 10: A typical signal produced by the system (4). Only variables m1 , m2 and m3 are depicted. (a) ฮฑ = 400, ฮฒ = 0.2, ฮฑ0 = 0.2, n = 2 (b) ฮฑ = 400, ฮฒ = 0.2, ฮฑ0 = 2, n = 2 Figure 11: Sample runs of the system (4) for different sets of parameters. The initial values were m1 = 0.1, m2 = 0.3, m3 = 0.2, p1 = 0.2, p2 = 0.1, p3 = 0.3. Only the values of m1 are depicted. Formula (5) is satisfied by both runs in Figure 11. To avoid the case of damped oscillations, we can add the formula:   df ฯˆ = G[10,200] โˆ— ( F[1,50] mโˆ—i โ‰ค mi ) . (6) It ensures that the values reached in each period are not decreasing. By connecting formulae (5) and (6) we get the formula ฯ• โˆง ฯˆ. It does express the desired oscillatory behaviour in Figure 11a and it is not satisfied by signals of the type depicted in Figure 11b. Another property of the repressilator can be expressed by the formula:   G[0,270] โˆ— ( F[0,30] (mโˆ—1 + 1 > m3 โˆง mโˆ—1 โˆ’ 1 < m3 ) , (7) which means that โ€the values of m1 precede the values of m3 in such sense that for every value of m1 , m3 reaches similar value in short time after m1 didโ€ (Figure 12). Full estimation of parameters could not be performed due to high time demands of the implemented monitoring algorithm [10]. A single run of the monitoring algorithm for the formulae (5), (6) or (7) over a signal sampled by 80 points took several hours on a regular PC. Reduction of the number of points describing the signal would lead to excessive loss of information. We have found out that the 86 On Expressing and Monitoring Oscillations Figure 12: Sample run of the system (4) satisfying the formula (7). The parameters were ฮฑ = 400, ฮฒ = 0.2, ฮฑ0 = 0.2, n = 2 and the initial values m1 = 0.1, m2 = 0.3, m3 = 0.2, p1 = 0.2, p2 = 0.1, p3 = 0.3. Depicted variables are m1 โ€“ red and m3 โ€“ green. bottleneck in efficiency of the prototype implementation lies in polyhedral operations performed by MPT. Since we work in 2D and need only a small subset of operations, we believe that our algorithm can be significantly accelerated when an optimal implementation is employed. Here we focused on demonstrating the applicability while leaving efficiency for future work. Different task would be to ensure that the behaviour of concentrations of the fluorescent protein in the bacteria (Figure 9) is in correspondence with the model. While it could be done only manually in [14], if we had the data, we would be able to test the properties of the measurements identically as the properties of the signals produced by ODEs. 6 Conclusion We have proposed an extended Signal Temporal Logic STLโˆ— motivated by the need to express properties of biological dynamical systems in a detail sufficient to distinguish different shapes of oscillation. We have provided a monitoring algorithm that approximately computes the truth value of an STLโˆ— formula for a given continuous (piece-wise linear) signal. The method has been prototyped in Matlab and the results achieved on a case study of oscillatory behaviour of the repressilator showed that the method satisfactorily works for signals generated by numerical simulation. However, the employed library MPT for polyhedral operations appears to be not efficient enough to satisfy the needs of practical usage. For future work on the practical side, we plan to implement more efficient algorithms for the specific polyhedral operations we use in the monitoring procedure. Another straightforward direction of future development is lifting of the robustness measure [11] to the extended logic. A very inspiring work is [12] where Time-Frequency Logic (TFL) is defined by shifting STL semantics to frequency domain. TFL provides another way to express permanent oscillations. However, nonpure oscillatory behaviour such as damped oscillations require specific elaboration in the time-domain. Joining TFL semantics with the STLโˆ— concept of real-value freezing can be an interesting step further. References [1] Accelera Organization, Inc. (2004): SystemVerilog 3.1a Language Reference Manual. [2] R. Alur, T. Feder & T. A. Henzinger (1996): The benefits of relaxing punctuality. J ACM 43(1), pp. 116โ€“146, doi:10.1145/227595.227602. [3] R. Alur & T. A. Henzinger (1994): A really temporal logic. J ACM 41(1), pp. 181โ€“203, doi:10.1145/174644.174651. P. Dluhos et al. 87 [4] P. Ballarini & M. L. Guerriero (2010): Query-based verification of qualitative trends and oscillations in biochemical systems. Theor. Comput. Sci. 411(20), pp. 2019โ€“2036, doi:10.1016/j.tcs.2010.02.010. [5] J. Barnat, L. Brim & D. SฬŒafraฬnek (2010): High-performance analysis of biological systems dynamics with the DiVin E model checker. Brief. in Bioinformatics 11, pp. 301โ€“312, doi:10.1093/bib/bbp074. [6] E. Bartocci, F. Corradini, E. Merelli & L. Tesei (2010): Detecting synchronisation of biological oscillators by model checking. Theoretical Computer Science 411(20), pp. 1999 โ€“ 2018, doi:10.1016/j.tcs.2009.12.019. [7] G. Batt, D. Ropers, H. de Jong, J. Geiselmann, R. Mateescu, M. Page & D. Schneider (2005): Validation of qualitative models of genetic regulatory networks by model checking: analysis of the nutritional stress response in Escherichia coli. In: ISMB (Supplement of Bioinformatics), pp. 19โ€“28. [8] M. de Berg, O. Cheong, M. van Kreveld & M. Overmars (2008): Computational Geometry: Algorithms and Applications, 3 edition. Springer, Berlin. [9] L. Calzone, N. Chabrier-rivier, F. Fages & S. Soliman (2006): Machine learning biochemical networks from temporal logic properties. Trans Comput Syst Biol 4220, pp. 68โ€“94, doi:10.1007/11880646 4. [10] P. DluhosฬŒ (2012): Specification and monitoring of oscillation properties in dynamical systems. Masterโ€™s thesis, Masaryk University. Available at http://is.muni.cz/th/269281/fi_m/thesis.pdf. [11] A. Donzeฬ & O. Maler (2010): Robust satisfaction of temporal logic over real-valued signals. In: FORMATSโ€™10, Springer-Verlag, Berlin, Heidelberg, pp. 92โ€“106, doi:10.1007/978-3-642-15297-9 9. [12] A. Donzeฬ, O. Maler, E. Bartocci, D. Nickovic, R. Grosu & S. Smolka (2012): On Temporal Logic and Signal Processing. Accepted to ATVA 2012. [13] C. Eisner & D. Fisman (2008): Augmenting a regular expression-based temporal logic with local variables. In: FMCAD โ€™08, IEEE Press, pp. 23:1โ€“23:8, doi:10.1.1.140.3930. [14] M. B. Elowitz & S. Leibler (2000): A synthetic oscillatory network of transcriptional regulators. Nature 403(6767), pp. 335โ€“338, doi:10.1038/35002125. [15] B. N. Kholodenko (2000): Negative feedback and ultrasensitivity can bring about oscillations in the mitogen-activated protein kinase cascades. Eur J Biochem 267(6), pp. 1583โ€“1588, doi:10.1046/j.14321327.2000.01197.x. [16] M. Kvasnica, P. Grieder & M. Baoticฬ (2004): Multi-Parametric Toolbox (MPT). [17] O. Maler & D. Nickovic (2004): Monitoring temporal properties of continuous signals. In: Proc. of FORMATS-FTRTFT, Springer, pp. 152โ€“166, doi:10.1.1.102.2905. [18] O. Maler, D. Nickovic & A. Pnueli (2008): Checking Temporal Properties of Discrete, Timed and Continuous Behaviors. In: Pillars of Computer Science, LNCS 4800, Springer, pp. 475โ€“505, doi:10.1007/978-3-54078127-1 26. [19] R. Mateescu, P. T. Monteiro, E. Dumas & H. de Jong (2011): CTRL: Extension of CTL with regular expressions and fairness operators to verify genetic regulatory networks. Theor. Comput. Sci. 412(26), pp. 2854โ€“2883, doi:10.1016/j.tcs.2010.05.009. [20] F. Miyoshi, Y. Nakayama, K. Kaizu, H. Iwasaki & M. Tomita (2007): A Mathematical Model for the KaiProtein-Based Chemical Oscillator and Clock Gene Expression Rhythms in Cyanobacteria. Journal of Biological Rhythms 22(1), pp. 69โ€“80, doi:10.1177/0748730406295749. [21] D. Nickovic & O. Maler (2007): AMT: a property-based monitoring tool for analog systems. In: Proceedings of the 5th international conference on Formal modeling and analysis of timed systems, FORMATSโ€™07, Springer-Verlag, Berlin, Heidelberg, pp. 304โ€“319. [22] A. Rizk, G. Batt, F. Fages & S. Soliman (2008): On a Continuous Degree of Satisfaction of Temporal Logic Formulae with Applications to Systems Biology. In: Proc. of CMSBโ€™08, Springer, pp. 251โ€“268, doi:10.1007/978-3-540-88562-7 19. [23] J. CฬŒervenyฬ & L. Nedbal (2009): Metabolic Rhythms of the Cyanobacterium Cyanothece sp. ATCC 51142 Correlate with Modeled Dynamics of Circadian Clock. J Biol Rhythms 24(4), pp. 295โ€“303, doi:10.1177/0748730409338367.
5cs.CE
The Lottery Ticket Hypothesis: Training Pruned Neural Networks arXiv:1803.03635v1 [cs.LG] 9 Mar 2018 Jonathan Frankle MIT CSAIL [email protected] Michael Carbin MIT CSAIL [email protected] Abstract Recent work on neural network pruning indicates that, at training time, neural networks need to be significantly larger in size than is necessary to represent the eventual functions that they learn. This paper articulates a new hypothesis to explain this phenomenon. This conjecture, which we term the lottery ticket hypothesis, proposes that successful training depends on lucky random initialization of a smaller subcomponent of the network. Larger networks have more of these โ€œlottery tickets,โ€ meaning they are more likely to luck out with a subcomponent initialized in a configuration amenable to successful optimization. This paper conducts a series of experiments with XOR and MNIST that support the lottery ticket hypothesis. In particular, we identify these fortuitously-initialized subcomponents by pruning low-magnitude weights from trained networks. We then demonstrate that these subcomponents can be successfully retrained in isolation so long as the subnetworks are given the same initializations as they had at the beginning of the training process. Initialized as such, these small networks reliably converge successfully, often faster than the original network at the same level of accuracy. However, when these subcomponents are randomly reinitialized or rearranged, they perform worse than the original network. In other words, large networks that train successfully contain small subnetworks with initializations conducive to optimization. The lottery ticket hypothesis and its connection to pruning are a step toward developing architectures, initializations, and training strategies that make it possible to solve the same problems with much smaller networks. 1 Introduction Recent work on neural network pruning (e.g., [4, 3, 2]) indicates that neural networks can be dramatically simplified once trained. After training is complete, upwards of 90% of weights can be pruned without reducing accuracy. If a network can be so pruned, then the function that it learned could have been represented by a far smaller network than that used during training. However, researchers believe1 that these smaller networks cannot be trained as readily as their larger counterparts, in spite of the fact that they are demonstrably capable of representing the desired functions. In this paper, we contend that it is indeed possible to train these smaller networks directly. In fact, these small, trainable networks are embedded within the larger models that we typically train. This paper articulates a possible explanation for the disconnect between a neural networkโ€™s representation capacity and its trainability. This conjecture, which we term the lottery ticket hypothesis, 1 [4] mentions that โ€œCNNs contain fragile co-adapted featuresโ€ and that โ€œgradient descent is able to find a good solution when the network is initially trained, but not after re-initializing some layers and retraining them...When we retrain the pruned layers, we should keep the surviving parameters instead of re-initializing them.โ€ states that training succeeds for a given network if one of its subnetworks has been randomly initialized such that it could be trained in isolationโ€”independent of the rest of the networkโ€”to high accuracy in at most the number of iterations necessary to train the original network. We refer to these fortuitously-initialized networks as winning tickets. Subnetworks and winning tickets. From the perspective of the lottery ticket hypothesis, a networkโ€™s initialization procedure can be thought of as drawing many samples from a distribution over initialized subnetworks. Ideally, the procedure manages to draw a subnetwork with the right architecture and weight initializations for optimization to succeed (a winning ticket). If a network of size m (where size is measured in units or weights) is being trained to solve a problem but a network of size n (where n โ‰ค m) is sufficient to represent the function to be learned, then the lottery ticket hypothesis views the original network as containing m n overlapping subnetworks. If the larger network is able to train successfully, it is because one of these subnetworks lucked into an initialization amenable to optimization. Metaphorically, training a network larger than is necessary to represent the function to be learned is like buying many lottery tickets. Larger networks have combinatorially more subcomponents that could facilitate successful training (i.e., more lottery tickets). The initialization strategy determines which of these subcomponents are well-situated for optimization to succeed (i.e., which tickets are winners). If a subcomponent is initialized favorably (i.e., the network picked a winning ticket), training succeeds. Identifying winning tickets. In this paper, we demonstrate that it is possible to automatically identify winning tickets by making a small but critical modification to the experiment of Han et al. [4]. We prune a trained neural networkโ€™s smallest weights (as measured by their magnitudes after training) in the same manner as Han et al.; the set of connections that survives this pruning process is the architecture of a winning ticket as anticipated by the lottery ticket hypothesis. Unique to our work, the winning ticketโ€™s weights are the values to which these connections were initialized before training began. Where Han et al. aimed to compress networks during the training process, our goal is to find small networks that can be trained independently from the start. We show that a winning ticket extracted in this fashion, when initialized with the original weights from before training, can be trained successfully in isolation at least as fast as (and typically faster than) the full network. Methodology. To empirically assess the lottery ticket hypothesis, we use the following procedure to extract winning tickets from fully-connected networks of a variety of sizes for MNIST and, as an illustrative example, from small networks for XOR. This procedure is identical to Han et al.โ€™s pruning process with the addition of the crucial last step: resetting the weights to their original values from before training. 1. Randomly initialize a neural network. 2. Train the network until it converges. 3. Prune a fraction of the network. 4. To extract the winning ticket, reset the weights of the remaining portion of the network to their values from (1) (i.e., the initializations they received before training began). If successful training really does rely on fortuitous initialization of a subcomponent of the network and pruning really does reveal this winning ticket, then the lottery ticket hypothesis predicts that the pruned networkโ€”when reset to the original initializations from before trainingโ€”will train successfully at sizes too small for a randomly-initialized or a randomly-configured network to do so. Research questions. To test the lottery ticket hypothesis, we evaluate the following research questions: How effectively do winning tickets train in comparison to the original network and to randomly sampled networks of similar size? For a variety of network configurations and perturbations of winning tickets, we measure both convergence times and test accuracy once the network has converged. How big are winning tickets relative to the size of the original network? By training on networks of various sizes, we explore whether the size of a winning ticket remains constant for a particular learning problem or grows in proportion to the size of the larger network from which it is derived. 2 10 Units DB ZL 8 Units DB ZL 6 Units DB ZL 4 Units DB ZL 2 Units DB ZL 98.5 96.8 92.5 78.3 49.1 92.9 87.5 76.8 55.3 17.6 Figure 1: Success rates of 1000 random XOR networks, each with the specified number of hidden units. DB = percent of trials that found the correct decision boundary. ZL = percent of trials that reached zero loss. How sensitive are our results to particular pruning strategies? We test two broad classes of strategies: pruning hidden units with the lowest-magnitude incoming and/or outgoing weights (for XOR) and individually pruning the lowest-magnitude weights (for MNIST). We also study whether networks can be pruned in a single step or whether they must repeatedly be pruned, retrained, and reset in an iterative process. Results. Our experimental results support the lottery ticket hypothesis. XOR. We trained a simple network with one hidden layer to learn XOR. The minimal architecture capable of representing XOR, a hidden layer with two randomly-initialized units, reached zero loss 18% of the time. In contrast, when a network with ten hidden units that reached zero loss was iteratively pruned down to a two-unit winning ticket, the winning ticket reached zero loss 80% of the time when trained with its original initializations. MNIST. Up to a certain point, winning tickets derived by pruning converged faster than and at least as accurately as the original network; after this point, convergence times and accuracy gradually and then rapidly dropped off. In a single step, we could prune networks by 75% while still finding winning tickets that, on average, converged 38% faster than the original network and matched its accuracy. Pruning iteratively by 20% at a time, winning tickets 91% smaller than the original network converged on average 39% faster. Networks iteratively pruned by up to 98% on average still converged as fast as the original network while maintaining accuracy. When winning tickets were randomly reinitialized or their weights were randomly rearranged, convergence times increased and accuracy decreased as compared to the original network. Depending on the metric of winning ticket size, winning tickets grew either gradually or marginally with network size. Contributions and implications. โ€ข We propose the lottery ticket hypothesis as a new perspective on neural network training. โ€ข We further posit that pruning uncovers the winning tickets that the lottery ticket hypothesis predicts, leading to an algorithm for extracting winning tickets from trained networks. โ€ข We apply this algorithm to empirically evaluate these conjectures on small networks. The evidence we find supports both the lottery ticket hypothesis and our contention that pruning can extract winning tickets. Although this paper focuses mainly on measurement, it has important implications for our understanding of training. The increased representation power of large networks is not necessarily required for gradient descent to learn functions with small representations. Lurking within these large networks are small, fortuitously-initialized winning tickets that are both more efficient to train (as a product of their size) and faster to converge (as a product of their initialization). By examining the initalizations and architectures of successful winning tickets, we might find new ways of designing networks that are smaller but equally-capable (if not superior). 2 Learning the XOR Function The XOR function is among the simplest examples that distinguish neural networks from linear classifiers. Before presenting our results for MNIST, we summarize the lottery ticket hypothesis as it applies to this simple computation. The XOR function has four data points: the coordinates (0, 0), (0, 1), (1, 0), and (1, 1). The first and last points should be placed in class 0 and the middle two points in class 1. Geometrically, this problem requires a nonlinear decision boundary. In this experiment, we consider the family of fully connected networks for XOR with two input units, one hidden layer (ReLU activation), and one output unit (sigmoid activation). 3 Pruning Strategy 10 Units DB ZL 4 Units (Pruned) DB ZL 2 Units (Pruned) DB ZL One-shot Product 99.2 93.3 98.0 90.3 82.4 65.3 Input Magnitude 98.9 93.5 97.9 92.2 83.8 76.5 Output Magnitude 99.0 93.3 96.9 85.9 78.6 56.1 Product 98.5 92.9 97.6 90.3 91.5 79.4 Figure 2: Success rates of different pruning strategies on 1000 trials each. DB and ZL defined as in Figure 1. The pruned columns include only those runs for which both the original ten-unit network and the pruned winning ticket found the right decision boundary or reached zero loss. The first row of the table was obtained by pruning in one shot; all subsequent rows involved pruning iteratively Although a network of this form with two hidden units is sufficient to perfectly represent the XOR function,2 the probability that a standard training approachโ€”one that randomly initializes the networkโ€™s weights and then applies gradient descentโ€”correctly learns XOR for a network with two hidden units is low relative to that for a larger network. Figure 1 contains the overall success rates (percent of networks that found the right decision boundary or reached zero loss). In 1000 training runs, a network with two hidden units learned a correct decision boundary in only 49.1% of trials. Cross-entropy loss reached 0 (meaning the network learned to output a hard 0 or 1) in only 17.6% of trials. Meanwhile, an otherwise identical network outfitted with ten hidden units learned the decision boundary in 98.5% of trials and reached 0 loss in 92.9% of trials. Figure 1 charts the loss for these and other hidden layer sizes.3 To put the central question of this paper in the concrete terms of the XOR problem, why do we need to start with a neural network with ten hidden units to ensure that training succeeds when a much smaller neural network with two hidden units can represent the XOR function perfectly? We propose the lottery ticket hypothesis as an explanation for this phenomenon. The Lottery Ticket Hypothesis. Training succeeds for a given network if one of its subnetworks (a โ€œwinning ticketโ€) has been randomly initialized such that it can be trained in isolation to high accuracy in at most the number of iterations necessary to train the original network. According to the lottery ticket hypothesis, successful networks with a large number of parameters (e.g., the XOR network with ten hidden units) should contain winning tickets comprising a small number of fortuitously-initialized weights on which training will still succeed. 2.1 Methodology To test the lottery ticket hypothesis with the XOR function, we instantiated the experiment from Part 1 with the following details: 1. Randomly initialize a network with ten hidden units. 2. Train for 10,000 iterations on the entire training set. 3. Prune a certain number of hidden units according to a particular pruning heuristic. 4. To extract the winning ticket, reset the pruned network to the original initializations. The first three steps extract the architecture of the winning ticket; the crucial final step extracts the corresponding initializations. We ran this experiment with two different classes of pruning strategies. One-shot pruning involves pruning the network in a single pass. For example, one-shot pruning a network by 80% would involve removing 80% of its units after it has been trained. In contrast, iterative pruning involves repeating steps (2) through (4) several times, removing a small portion of  n โˆ’n  1 Example satisfying weights for the first layer: โˆ’n n . Satisfying weights for the output unit: [ 1 ]. Satisfying bias for the output unit: โˆ’n/2. n โ‰ฅ 1. As n grows, the output approaches a hard 1 or 0. 3 Weights were sampled from a normal distribution centered at 0 with standard deviation 0.1; all values more than two standard deviations from the mean were discarded and resampled. Biases were initialized to 0. The network was trained for 10,000 iterations. 2 4 the units (in our case, two units) on each iteration. We find iterative pruning to be more effective for extracting smaller winning tickets; Han et al. [4] found the same for compressing large networks while maintaining accuracy. We consider three different heuristics for determining which hidden units should be pruned: โ€ข Input magnitude: remove the hidden unit with the smallest average input weight magnitudes. โ€ข Output magnitude: remove the hidden unit with the smallest output weight magnitude. โ€ข Magnitude product: remove the hidden unit with the smallest product of the magnitude of its output weight and the sum of the magnitudes of its input weights. The magnitude product heuristic achieved the best results, so we use it unless otherwise stated. 2.2 Results One-shot pruning. We generated 1000 networks with ten hidden units and pruned them down to both four and two hidden units using the magnitude product heuristic. The results of doing so appear in the first row of Figure 2. The winning tickets with two hidden units found the correct decision boundary 82.4% of the time (up from 49.1% for randomly-initialized networks with two hidden units) and reached zero loss 65.3% of the time (up from 17.6% of the time for a random network). Iterative pruning. We conducted the iterative version of the pruning experiment 1000 times, starting with networks containing ten hidden units that were eventually pruned down (in two unit increments) to networks containing a candidate winning ticket of just two hidden units. Of the 93.5% of ten hidden unit networks that reached zero loss, 84.9% 4 had a two hidden unit winning ticket that also reached zero loss (as compared to 17.6% of randomly-intialized two hidden unit networks). Likewise, of the 98.9% of ten hidden unit networks that found the correct decision boundary, 92.8% had a two-unit winning ticket that did the same (as compared to 49.1% of randomly-initialized two hidden unit networks). The four hidden unit winning tickets almost identically mirror the performance of the original ten hidden unit network. They found the correct decision boundary and reached zero loss respectively in 99% and 97% of cases where the ten hidden unit network did so. Both of these pruned trials appear in Figure 2 (under the Magnitude Product row). These experiments indicate that, although iterative pruning is more computationally demanding than one-shot pruning, it finds winning tickets at a higher rate than one-shot pruning. More importantly, they also confirm that networks with ten hidden units can be pruned down to winning tickets of two hidden units that, when initialized to the same values as they were in the original network, succeed in training far more frequently than a randomly initialized network with two hidden units. The winning tickets with four hidden units succeed nearly as frequently as the ten unit networks from which they derive. Both of these results support the lottery ticket hypothesisโ€”that large networks contain smaller, fortuitously-initialized winning tickets amenable to successful optimization. In addition to the magnitude-product pruning heuristic, we also tested the input magnitude and output magnitude heuristics. The results of doing so appear in Figure 2. The magnitude product heuristic outperformed both. We posit that this success is due to the fact that, in the XOR case when all input values are either 0 or 1, the product of input and output weight magnitudes should mimic the activation of the unit (and therefore with its influence on the output). 3 MNIST (One-shot Pruning) In this section and those that follow, we explore the lottery ticket hypothesis as applied to the MNIST dataset. Here, we analyze the behavior of one-shot pruning; in the following section, we show the additional power that iterative pruning offers. 4 These numbers are derived from the last row of Figure 2. 93.5% of networks with ten hidden units reached zero loss. 79.4% of networks started with ten units, reached zero loss, and were pruned to into two-unit networks that also reached zero loss. 79.4% of 93.5% is 84.9%. 5 3.1 Methodology We trained and pruned a network with two fully-connected layers. We used the LeNet-300-100 architecture [6], which has 784 input units (corresponding to the pixels of the 28x28 images in MNIST), a fully-connected hidden layer with 300 units, a fully-connected hidden layer with 100 units, and ten fully-connected output units (one for each class). The hidden units have ReLU activation functions, and the output units have softmax activation functions. By default, biases were initialized to 0 and weights were randomly sampled from a normal distribution with mean 0 and standard deviation 0.1 (values more than two standard deviations from the mean were discarded and resampled). Networks were optimized using stochastic gradient descent with a learning rate of 0.05. This section follows the experimental template from Section 1: 1. Randomly initialize the network. 2. Train for 50,000 iterations on 100-example mini-batches from the training data 3. Prune a certain percentage of the weights from within each hidden layer, removing those with the lowest magnitudes. 4. To extract the winning ticket, reset the values of the weights of the pruned network to their original initializations from before training. The pruning strategy we follow for MNIST removes individual weights rather than entire units. In preliminary experiments, we found this strategy to be more effective (Srinivas and Babu explore pruning by unit in [12]). We use the simplest weight-by-weight pruning heuristic possible: remove those weights with the lowest magnitudes within each hidden layer (just as in [4]). Weights connecting to the output layer are pruned by half of the percentage at which the rest of the network is pruned to avoid severing connectivity to the output units. 3.2 Results Figure 3: The test set accuracy on MNIST as training proceeds. These charts are zoomed into the very highest levels of accuracy. Each curve shows the average progression of five trials of training at the specified pruning level. Percents are the percent of the weights in each layer that remain after pruning. The error bars show the minimum and maximum values of any one of those five trials. Dots signify the moment when the corresponding colored line has converged, with error bars showing the earliest and latest convergence times amongst the five trials. Pruningโ€™s most substantial impact was on convergence times. When pruned to between 75% and 25% of the size of the original network, the winning tickets converged on average at least 25% faster while accuracy remained on average within 0.15% of the original networkโ€™s accuracy. The winning ticket that was pruned to 25% of the original size converged on average 38% faster than the original network. Further pruning caused convergence times to slowly rise and accuracy to drop. Figure 3 shows the test set accuracy and convergence behavior of winning tickets pruned to different levels as they were trained.5 Each curve is the average of five different runs starting from distinct, 5 We define convergence as the moment at which the 1000-iteration moving average of test accuracy changed by less than 0.002 for 1000 consecutive iterations. We measured test accuracy every 100 iterations. According to this definition of convergence, the one-shot-pruned winning tickets improved their test accuracy by an average of 0.0019 (standard deviation 0.00085) after convergence. We acknowledge that determining convergence times is an imprecise art, but this metric seems to adequately characterize the behavior of convergence for our purposes. 6 Figure 4: The test set accuracy on MNIST as training proceeds for winning tickets of various sizes and for winning tickets whose weights have been randomly reinitialized (control experiment 1). randomly initialized networks; error bars indicate the minimum and maximum value that any run took on at each point in the training process. The dots indicate the average convergence times for the curve in the corresponding color; error bars indicate the minimum and maximum convergence times. The left graph in Figure 3 shows that, for the first few pruning levels, convergence times decrease and accuracy increases. A winning ticket comprising 90% of the weights from the original network converges slightly faster than the original network but slower than a winning ticket with 75% of the original weights. This pattern continues until the network is pruned to about 55% of the original size, after which (as the right graph in Figure 3 shows) convergence times flatten and then, after about 35%, increase. When the winning ticket is between 10% and 15% of the original size of the network, it returns to the performance of the unpruned network. In the terms of the lottery ticket hypothesis, we attribute improving convergence times to the removal of unnecessary, noisy parts of the network as pruning hones in on the winning ticket. Convergence times reach a tipping point as pruning begins to remove weights that are essential to the winning ticket, after which convergence times increase and accuracy decreases. The lottery ticket hypothesis also predicts that this behavior is largely attributable to a confluence of initialization and architecture. To test this conjecture, we ran two control experiments: (1) retain the winning ticketโ€™s architecture but randomize its weights and (2) retain the winning ticketโ€™s weights but randomize its architecture. Control experiment 1. This experiment evaluates the extent to which initialization is a necessary component of a winning ticket. Figure 4 shows this experiment. The curves for the original network and winning tickets that are 75% and 35% of the original networkโ€™s size are the same as in Figure 3. Two curves have been added for the control experiments. Each control experiment entailed training a network that used a winning ticketโ€™s architecture but randomly reinitialized its weights from the original initialization distribution (N (0, 0.1)). We trained three control experiments for each winning ticket, so the control curves are the average of 15 experiments. Unlike the winning tickets, the control experiments converged on average more slowly than the original network, simultaneously achieving lower levels of accuracy. These differences were substantial: the average 35% and 25% winning tickets converged 1.91 and 2.28 times as fast as the corresponding average controls. The error bars on convergence times reflect that the control trials exhibited a much wider variance in behavior. For example, the earliest-converging of the 35% control trials converged faster than the average unpruned network; however, the average 35% control trial convergence time converged 27% slower than the average original network. This experiment further supports the lottery ticket hypothesisโ€™ emphasis on fortuitous initialization. Using the same pruned architecture, the original initialization not only withstood but benefited from pruning, while performance of the reinitialized network immediately suffered and steadily diminished as the network was further pruned. This outcome mirrors, on a larger scale, the result of the XOR experiment, in which networks with many hidden units could be pruned to smaller winning tickets that found the right decision boundary at a much higher rate than randomly-initialized small networks. Figure 5 provides a broader perspective on these patterns across all of the levels to which we pruned. The left graph shows the convergence time in relation to the percentage of the network remaining after pruning. The blue line is the average of the five winning ticket trials at each level. The convergence 7 Figure 5: The convergence times (left) and accuracies (right) when running the MNIST pruning experiment to various degrees of pruning. The blue line is the average of five trials with different starting initializations that prune and reuse the original initialization. Each of the multicolored lines represents three randomly reinitialized control trials (one for each trial with the original initialization). The error bars are the minimum and maximum value any trial takes on at each interval. Figure 6: The convergence times and accuracy for the five winning tickets at each level of pruning (blue line), the 15 trials where the winning ticket weights were reinitialized (orange line), and the 15 trials where the winning ticket weights were maintained but shuffled within each layer (green line). time initially decreases before leveling off between 55% and 35% and then slowly climbing again. In contrast, the multicolored lines, which represent the groups of control trials for each winning ticket, steadly require longer to converge as more of the network is pruned. In the control experiment, the error bars are much larger, suggesting wider variation in convergence times compared to the consistent convergence times of the winning tickets. The right graph in Figure 5 provides important context: how accurate are the networks at the moment they converge? The average trial that used the original initialization (the blue line) maintans accuracy within 0.15% of the original network when pruned down to 15%, after which accuracy drops off. In contrast, the accuracy of the average control trial drops below this level when the network has been pruned by about 30%, falling precipitously when pruned by 15% (0.6% below the original networkโ€™s accuracy). This experiment supports the lottery ticket hypothesisโ€™ prediction that fortuitous initialization is a necessary ingredient to make a winning ticket. The winning ticketโ€™s structure alone is insufficient to explain its success. Control experiment 2. This experiment evaluates the extent to which architecture is a necessary component of a winning ticket. For each winning ticket at each level of pruning, we randomly shuffled the locations of the weights in each hidden layer while maintaining their original initializations. The results of doing so appear in Figure 6. Just as in Figure 5, the blue line traces winning tickets pruned to various sizes. The orange line is the average of all 15 of the trials from control experiment 1 (reinitializing the winning tickets). The green line is the average of all 15 of the trials from control experiment 2 (shuffling the winning tickets without reinitializing). The convergence times for the two control experiments are similar: they start increasing immediately and increase more rapidly as the network gets smaller. The accuracy of control experiment 2 drops off slightly earlier than control experiment 1, which itself dropped off before the winning ticket did. This experiment supports the lottery ticket hypothesisโ€™ prediction that winning tickets emerge from a combination of initialization and structure. Neither initialization (control experiment 1) nor structure (control experiment 2) alone is sufficient to explain the better performance of the winning tickets. 8 Figure 7: The convergence times and accuracy of winning tickets extracted from fully-connected networks for MNIST using one-shot pruning (orange) and iterative pruning (blue). Note that the x-axis is logarithmic. Summary. The first notable result from this set of experiments is that, even when pruned to sizes much smaller than the original network, winning tickets are still able to converge at all. This supports the core prediction of the lottery ticket hypothesis: pruning reveals smaller subcomponents that were originally initialized such that they can train successfully in isolation. Not only do these networks train successfully, but they converge faster than and maintain the accuracy of the networks from which they derive. Furthermore, winning tickets emerge from a confluence of both fortuitous initalization and structure. 4 MNIST (Iterative Pruning) In the XOR experiment in Section 2, iterative pruning [4]โ€”repeatedly training, pruning, reinitializing, and pruning againโ€”arrived at winning tickets that were more likely to train successfully In this section, we find that iterative pruning makes it possible to extract winning tickets from our MNIST network that are far smaller than those generated by one-shot pruning. 4.1 Methodology We use the same experimental setup (network architecture, initialization strategy, and optimization strategy) as in Section 3. We follow a similar procedure repetitively in order to iteratively prune. 1. Randomly initialize the network. 2. Train for 50,000 iterations on 100-example mini-batches from the training data 3. Prune 20% of the weights from within each hidden layer and 10% of the weights in the output layer, removing those with the lowest magnitudes. 4. Reset the weight values of the pruned network to their initializations from before training. 5. Repeat steps (2) through (4) until the network has been pruned to the desired size. The result of the last iteration of (4) is the winning ticket. We iteratively prune the incoming weights of the first and second layers of the network by 20% and the weights of the output layer by 10%.6 We start with a network with two fully-connected hidden layers with 300 and 100 hidden units and prune the network until just under 1% of the original weights remained. Comparison to one-shot pruning. Figure 7 shows the difference in convergence times and accuracy between one-shot pruning (orange) and iterative pruning (blue). (Note that the x-axis is logarithmic in Figure 7 and in most figures in this section.) The average iteratively pruned winning tickets reach initially reach lower convergence times. These convergence times flatten when the original network is pruned to between 41% (36% faster than the original network) and 8.5% (38% faster than the original network) of the original network size, as compared to between 55% (44% faster than the original network) and 40% (41% faster than the 6 As mentioned in Section 3, we prune the output layer at a lower rate to reduce the chances of severing connectivity to any of the output units. 9 Figure 8: The convergence times and accuracy of winning tickets extracted by iteratively pruning and control experiments. The blue line is the average of five winning tickets. The orange line is control experiment 1: winning tickets that have been reinitialized. The green line is control experiment 2: winning tickets whose weights were randomly shuffled. The red line is the performance of one-shot pruning. The locations where the control trials cut off are those at which, according to our metric, they no longer converged. original network) for one-shot pruning. The average iteratively pruned network returns to the original convergence time when pruned to 1.8% (as compared to between 5% and 10% for one-shot pruning). Likewise, accuracy actually increases slightly for many winning tickets, returning to the original networkโ€™s accuracy at a winning ticket size of 2.8% on average. In contrast, one-shot pruning begins to drop off when the winning ticket is 15% of the size of the original network. Although iterative pruning can extract much smaller winning tickets than one-shot pruning, it is far more costly to find those winning tickets. Extracting a winning ticket with one-shot pruning requires training the original network a single time, regardless of how much the network is pruned. In contrast, iteratively pruning a network by 20% at each iteration until it is about 5% of the original networkโ€™s size requires training the network 14 times. However, since our goal is to understand the behavior of winning tickets rather than to find them efficiently, iterative pruningโ€™s compelling advantage is that it is able to extract smaller winning tickets that maintain convergence and accuracy performance, placing a tighter upper-bound on the size of a networkโ€™s winning ticket. 4.2 Results In this section, we re-run the control experiments from Section 3.1. Just as before, we aim to explore the extent to which architecture and initialization are responsible for a winning ticketโ€™s ability to continue to converge at such small sizes. Figure 8 contains the average results of performing control experiment 1 (randomly reinitializing the winning ticketโ€™s weights) in orange and control experiment 2 (randomly shuffling the winning ticketโ€™s weights) in green. For comparison, the curve in red is the performance of one-shot pruning. Control experiment 1. Just as with one-shot pruning, average convergence times for control experiment 1 begin increasing as soon as the network is pruned and continue to grow at a steady rate. The error bars in Figure 8 reflect that convergence times vary widely for pruned networks that are reinitialized. The average control trialโ€™s accuracy begins dropping off (more than 0.15% lower than the original networks accuracy) when the network is pruned to about 31%, whereas the average iteratively pruned network drops below this level when pruned to 1.5%. Just as with the one-shot experiment, this control trial indicates that initialization plays a critical role in making a winning ticket. Control experiment 2. Average convergence times for control trial 2 increase steadily in a pattern similar to those from control trial 1. Error bars indicate that these convergence times similarly vary widely. Accuracy begins dropping off earlier, at about 51.2% and more steeply, potentially suggesting that architecture might be more important than initialization. Summary. The control experiments for iterative pruning put the results from Section 3 in sharper relief. Iterative pruning makes it possible to extract smaller winning tickets than from one-shot pruning that reach lower convergence times than the original network while maintaining or exceeding its level of accuracy. The control experiments show that both initialization and network architecture 10 Figure 9: The distributions of the initializations of weights that survived iterative pruning across ten iterative pruning runs. The graphs contain the initializations of the network pruned to (left to rigth) 100%, 51.2%, 16.8%, and 5.50%. The blue, orange, and green lines are the distributions of initial weights for the first hidden layer, second hidden layer, and output layer, respectively. play factor into creating a winning ticket, with control trial 2 suggesting that network architecture might be slightly more important. The experiments on XOR and MNIST support the lottery ticket hypothesis. Embedded within larger networks are small subcomponents that are fortuitously initialized in a manner conducive to successful training. We extracted the winning ticket architectures by pruning and determined the corresponding initializations by resetting the winning ticketโ€™s connections to their original from before training. These networks not only trained successfully but, in the case of iteratively-pruning with the MNIST network, converged faster and more accurately. Meanwhile, neither architecture nor initialization alone could entirely account for this result. We next investigate the architecture and initializations of these small winning tickets (Section 5) and the behavior of winning tickets when subjected to a wider variety of parameters (Section 6). 5 Examining Winning Tickets In this section, we briefly explore the internal structure of winning tickets that result from iterativelypruning our MNIST network. We have already found evidence to support the claim that winning tickets arise out of a confluence of architecture and initialization. What exactly do those architectures and initializations look like? Initializations. Figure 9 shows the initialization distributions for winning tickets at four different levels of pruning. Note that these are the values of the winning ticketโ€™s weights from before training. The graph in the upper left contains the initial weights of the entire network (no pruning), which are initialized according to a normal distribution with mean 0 and standard deviation 0.1. The graph in the upper right contains the weights after iteratively pruning the network down to 51.2% of its original size. The blue, orange, and green lines are the distriutions of initial weights for the first hidden layer, second hidden layer, and output layer, respectively. At 51.2%, the remaining weights already show the impact of pruning. The first and second hidden layerโ€™s distributions are bimodal, with two peaks mirrored opposite 0. Since these distributions plot the original initializations of the weights that survive the pruning process (i.e., the weights before training), these distributions were created by removing samples from a formerly normal distribution. These peaks on the 51.2% graph appear to be the left and right tails of the original normal distribution. The missing weights have been pruned. Interestingly, pruning occurs after training and these are graphs of weights before training. In other words, for these distributions to emerge, small weights from before training must have remained small after training. The second hidden layer (orange) retains more of its center than the first hidden layer, indicating that those weights likely moved more during training. The output distribution (green) more closely resembles the original normal distribution, indicating that its weights probably moved significantly during training. One other contributing factor to the output distribution is that we prune it at a slower rate, meaning that the effects of pruning make take longer to appear. 11 Figure 10: For each unit in the current layer, how many units in the previous layer connect to it? The left graph is for the first hidden layer. The middle graph is for the second hidden layer. The right graph is for the output layer. The blue, orange, and green lines are for the winning tickets when iteratively pruned to 80%, 16.8%, and 5.50%, respectively. Each point on the line represents a single unit; the units have been sorted in descending order by the number of connections they have. These data points were collected over ten trials. The pattern for 51.2% pruning plays out in more extreme form at 16.8% (lower left graph) and 5.50% (lower right graph). The middles of the first and second hidden layer distributions continue to get hollowed out, and the same happens (albeit more slowly) to the output distribution. Even with these extreme-looking input distributions, the corresponding networks converged faster than the original network and retained the same accuracy. Considering the extent to which the particular pruning strategy we pursued left its imprint on the winning tickets, it is worth considering the impact that other pruning strategies would have and, more broadly, whether the winning tickets we found are a product of the pruning strategy we pursued or whether the pruning strategy we pursued happens to exploit a deeper reality of the way neural networks behave. Architecture. As the network is pruned, it becomes sparser. Figure 10 shows the distributions of surviving connections aggregated across ten trials7 between a unit in layer n and units in layer n โˆ’ 1 when the network is pruned to 80% (blue), 16.8% (orange), and 5.50% (green) of its original size. The left, middle, and right graphs show the first hidden layer, second hidden layer, and output layer. When pruned to 80%, the network remains almost fully-connected, with only slight differences between the units with the most and least connections. As the network is further pruned, units in the first hidden layer continue to have a roughly equal number of connections to units in the input layer. Even when the network is pruned to 5.50%, only a small fraction of the hidden units in the first layer have been eliminated entirely. The second hidden layer becomes less evenly connected as more weights are pruned. By the time the network is pruned to 5.50%, nearly a third of the units in the second hidden layer have been fully disconnected, and there is a steep decline from the best-connected units to the worst-connected. The output layer shows a less severe slope, likely because every output unit serves a clear function and because we prune the output layer at a slower rate. The winning tickets are quite sparse. Even when the network is pruned by nearly 95%, only a fraction of the units have been eliminated entirely. No units maintain a large number of connections after pruning; instead, nearly all units retain a proportionally small number of connections. 6 Exploring MNIST Parameters This section explores the sensitivity of the MNIST results to the parameters of the lottery ticket experiment. Namely, we explore the role that initialization and network size play in the properties of the winning tickets that emerge. 6.1 Initialization Although our default network was initialized from a normal distribution with mean 0 and standard deviation 0.1, we experimented with several other standard deviations to explore the effect of larger 7 We also removed any edges that did not have a path to an output unit. 12 Figure 11: The convergence times and accuracy for groups of five winning tickets initialized with various standard deviations โ‰ฅ 0.1. Figure 12: The convergence times and accuracy for groups of five winning tickets initialized with various standard deviations โ‰ค 0.1. and smaller weights on the behavior of winning tickets. One might expect that our pruning strategy would be especially vulnerable to initializing network weights too large: by selecting for the highestmagnitude weights, it might exacerbate exploding gradients. Likewise, it might be resilient to initializing network weights too small, since it will select for the largest weights after training. In this section, we present the results using the one-shot pruning strategy. The results for iterative pruning were similar. Figure 11 shows the convergence times and accuracy for winning tickets of networks initialized with standard deviations larger than 0.1 (0.2, 0.4, and 0.8). As expected, convergence times increase and accuracy decreases as the standard deviations increase. We did not explore whether the extent to which this behavior resulted from exploding gradients or weaknesses in the pruning strategy. Figure 12 contains the same information for winning tickets of networks initialized with standard deviations smaller than 0.1. A standard deviation of 0.1 produces the fastest convergence times but cedes a certain amount of accuracy in doing so. In contrast, a standard deviation of 0.025 causes winning tickets to converge more slowly but to higher-accuracy optima. This behavior suggests that there are sweet spots for both convergence times (stddev=0.1) and accuracy (stddev=0.025) and a tradeoff-space in between. 6.2 Network Size We experimented with increasing the size from the default network (layers of 300 and 100 hidden units) in order to determine whether there is a fixed winning ticket size for a particular learning problem, or whether larger networks naturally beget larger winning tickets. We consider two possible definitions of the โ€œsizeโ€ of a networkโ€™s winning ticket: โ€ข A winning ticket is the minimal network that minimizes convergence time. Since convergence times initially decrease with pruning, this heuristic looks for the winning ticket with the lowest possible convergence time. โ€ข A winning ticket is the minimal network that retains the accuracy of the original network. Accuracy remains relatively flat as smaller and smaller winning tickets are created; it then 13 Figure 13: The convergence times and accuracy for groups of five winning tickets extracted from networks of various sizes with the one-shot pruning strategy. Error bars were elided to improve readability. The legend contains the size of the network (e.g., 300-100 means a network with hidden layers of 300 and 100 units). All networks were initialized with a standard deviation of 0.05. Figure 14: The convergence times and accuracy for groups of five winning tickets extracted iteratively from networks of various sizes. Error bars were elided to improve readability. All networks were initialized with a standard deviation of 0.05. reaches a tipping point and drops off rapidly. This definition considers the winning ticket to be the last moment before this accuracy drop-off takes place. One-shot pruning. We trained networks whose sizes were multiples of the original network size. The results of doing so and applying the one-shot pruning strategy appear in Figure 13, which plots convergence times and accuracy according to the number of weights in the winning ticket. According to the convergence-based definition of a winning ticket, the winning ticket sizes increase gradually with the size of the network. The LeNet-300-100 architecture appears to reach this point at about 140,000 weights, where the LeNet-600-300 does so at about 200,000 weights. The same pattern holds for the larger architectures. Larger networks are capable of representing more sophisticated functions, so pruning larger networks may produce different network architectures that exploit this additional representation capacity to converge faster. Indeed, the larger the network, the lower the convergence times its winning tickets were able to achieve and the larger the size at which it reached them. The accuracy-based definition of a winning ticket agreed. As the bottom graph of Figure 13 illustrates, the accuracy of larger networks dropped off steeply at slightly earlier times than the accuracy of smaller networks. However, these differences were quite smallโ€”on the order of tens of thousands of weights. Although winning ticket size does seem to increase with network size by this definition, the changes were very slight and winning ticket sizes close to uniform. Iterative pruning. As Figure 14 reflects, the convergence and accuracy trends for iteratively pruning larger networks remains the same as in the one-shot case. Larger networks reach their minimum convergence times at gradually larger sizes, but accuracy plummets in unison. There are two key differences worth noting in the iterative case. 14 Figure 15: The convergence times and accuracy of winning tickets extracted by iteratively pruning by different rates on each iteration. Error bars have been elided for readability. Note that the x-axis is not logarithmic. First, both minimum convergence times and accuracy dropoffs occur at much smaller network sizes than in the one-shot experiments. This result coincides with the other iterative experiments, which demonstrate that iterative pruning creates winning tickets that can be pruned to much smaller sizes before convergence times increase and accuracy diminishes. Whereas the accuracy dropoff took place when the networks had about 150,000 weights in the one-shot experiments, it occurs when the iteratively-derived winning tickets have just tens of thousands of weights. Second, each of the accuracy graphs has a small bulge upwards just before dropping off, indicating that accuracy actually increases slightly when the winning tickets are smallest. These bulges occur at the same winning ticket size in all cases, regardless of the initial size of the network. Summary. The analysis in this subsection leaves many open questions for future research. Although we do not undertake extensive analysis of the internal structure of winning tickets in this study, comparing equally-sized winning tickets derived from networks of different sizes would shed light on the extent to which the winning tickets themselves are similar or different between various initial network sizes. 6.3 Exploring Iterative Pruning Rates Choosing the exact rate at which to prune on each iteration of iterative pruning entails balancing the performance of the resulting winning ticket with the number of iterations necessary to extract that winning ticket. Figure 15 shows the convergence times and accuracy for the LeNet-300-100 architecture iteratively pruned at different rates on each iteration. (Note that the x-axis is not logarithmic.) This experiment can be thought of as exploring middle grounds between one-shot pruning and iteratively pruning at a small rate. Although pruning by a larger percentage (e.g., 70% or 50%) on each iteration reaches smaller winning tickets faster, those winning tickets are pruned too aggressively and fail to match the convergence times or accuracy of winning tickets pruned more slowly. On the other end of the spectrum, iteratively pruning by 10% appears to achieve the best convergence times and accuracy but would require training the network 28 times to extract a winning ticket 5% of the original networkโ€™s size. For our experiments, we prune by 20%, which balances performance with the amount of training required. 6.4 Weight Resetting Before each training iteration of our iterative pruning approach, we reset the weights of the unpruned connections to their original values from before training. Doing so is part of our experiment to evaluate the lottery ticket hypothesis: exploring how well winning tickets obtained by pruning train in isolation. We conjecture that resetting before each training iteration makes it easier to find small winning tickets. In effect, each iteration is a recursive pruning problem in which a subnetwork that trains effectively when starting from the original initializations must be pruned to a slightly smaller network that does the same. In contrast, Han et al. [4] interleave training and pruning without ever resetting weights. After a round of training, low-magnitude weights are pruned and then training continues based on the trained 15 Figure 16: The convergence times and accuracy of winning tickets extracted by iteratively pruning using weight resetting between iterations (our strategy, in blue) and by continuing to use the trained weights after pruning (Han et al [4]โ€™s strategy, in orange). weights. These differences in approaches reflect two different goals: Han et al. want to produce the smallest possible trained network, while we wish to find a pruned network that trains successfully from the start. Figure 16 shows the convergence times and accuracy achieved by the winning tickets extracted using these two pruning strategies. To simulate Han et al.โ€™s strategy, we iteratively trained a network, pruned low-magnitude weights, and continued training using the trained weights. At each iteration, we copied the resulting network, reset its weights to the original initializations, and trained the network to obtain the results in Figure 16. As Figure 16 shows, Han et al.โ€™s pruning strategy is quite effective at finding small networks that rain successfully, although our strategy of resetting weights at each iteration maintains lower convergence times and higher accuracy for slightly longer. However, since Figure 16 is on a logarithmic scale, these differences appear only at very small network sizes. 7 Related Work Pruning. LeCun et al. first explored pruning as a way to reduce the size of neural networks [7]; they pruned based on the second derivative of the loss function with respect to each weight. Hassibi et al. [5] build on this approach. More recently, Han et al. [4, 3, 2] showed that these techniques could be used to substantially reduce the size of modern image-recognition networks. Since then, a rich variety of neural network pruning approaches have emerged (e.g., pruning smallest weights [4], pruning units in a Bayesian fashion [9], pruning entire convolutional filters [8, 10], fusing redundant units to increase network diversity [11]). The goal of this literature on pruning is to compress trained neural networks, reducing the size of a large model such that it can run efficiently on restricted computational platform (e.g., a mobile device) without sacrificing accuracy. In contrast, we aim to make it possible to train small neural networks from the start. In [4] and follow-up work, network compression takes place in three iterative steps. First, a large network is trained. Second, weights or units are pruned according to a heuristic. Third, the network is further trained using the already-trained weights. Han et al. find that, without this third retraining step, network performance drops off much earlier in the pruning process. Han et al. also caution that the pruned network should not be re-initialized after training, but do not consider reusing the values to which the surviving weights were initialized in the original network as we do. Our work builds off of the literature on pruning by shedding light on the mechanisms that make pruning possible. The fact that networks can be pruned while maintaining accuracy indicates that the function to be learned can be represented with a much smaller network than the one used for training. We aim to understand why pruning is possible and investigate whether small networks can be trained directly (rather than pruning large networks to smaller sizes after training). The lottery ticket hypothesis posits that large networks have small, fortuitously-initialized subnetworks that facilitate successful training. From this point of view, neural network pruning finds these winning tickets. To evaluate the lottery ticket hypothesis on small, fully-connected networks, we leverage Han 16 et al.โ€™s experimental approach, except that we make a crucial modification: after pruning we reset each weight to its original value. Our results explain or complement those of Han et al. The lottery ticket hypothesis offers insight into why Han et al. are able to prune networks. Many of the trends we see (e.g., that the accuracy of iteratively-pruned winning tickets drops off at very small winning ticket sizes or that the original initializations of pruned networks take on a bimodal distribution) parallel those that Han et al. find when continuing to train pruned networks based on their trained weights. Dropout. Dropout [13] creates a smaller subnetwork for each training iteration by randomly removing a subset of the units (or weights). At inference-time, a unitโ€™s activation is reduced by the probability that it was dropped out. Intuitively, dropout is intended to reduce overfitting and improve generalization by forcing units to remain robust to changes in the network. Follow-up work on dropout [1] has characterized training with dropout as โ€œperform[ing] gradient descent...with respect to...the ensemble of all possible subnetworksโ€ and inference with dropout as approximately computing the average over this ensemble. In the terminology of dropout, our experiment aims to discover a single, particularly successful member of this ensemble of subnetworks. Our dropout heuristic is that, after training the network once without dropout, we drop out the lowest k% of weights (by magnitude after training) with probability 1 and all other weights with probability 0. In other words, we perform an extremely aggressive, coarse-grained form of dropout based on examining the results of training the network once without dropout. However, our goal is different. Dropout is designed to regularize a network during training, a process that can be used to produce sparse networks. We aim to directly find small (and, in the case of the networks we found, sparse) networks that can be trained from start to finish without removing further weights. Our broader formulation of the lottery ticket hypothesis does closely relate to dropoutโ€™s notion of ensemble learning. The lottery ticket hypothesis views a randomly-initialized large network as a collection of a combinatorial number of small networks (i.e., lottery tickets) of which one (i.e., the winning ticket) must be initialized fortuitously to enable training to succeed. From this point of view, a large network begins with the possibility of coalescing toward one of an exponential number of subnetworks, and gradient descent drives it toward the subnetwork comprising the winning ticket that we find. 8 Limitations This work is limited in several ways. We only examine fully-connected networks, and for two of the smallest possible examples (XOR and MNIST). We do not consider convolutional networks or larger networks that better reflect real-world examples.8 Our evidence for the lottery ticket hypothesis is purely experimental; we do not offer any theoretical analysis to formally support this claim. Finally, although we analyze the structure and initialization distributions of winning tickets for MNIST, we have yet to devise a way to turn these observations into useful strategies for training smaller networks. We anticipate exploring these avenues in future work and updating this paper as we do so. 9 Conclusions and Future Work This paper proposes a new hypothesis to explain why large neural networks are amenable to substantial pruning yet the pruned networks cannot be trained effectively from scratch. This conjecture, known as the lottery ticket hypothesis, holds that training succeeds when a subcomponent of the larger network is randomly initialized in a fashion that is suitable for optimization. Furthermore, it conjectures that pruning uncovers these winning tickets. To empirically evaluate this hypothesis, we devised an experiment based on the work of Han et al. [4] where, after pruning a trained network, remaining weights are reset to their original initializations. If the lottery ticket hypothesis holds and pruning 8 However preliminary experiments with CIFAR10 on a convolutional network reflect the same behavior described in this paper for MNIST. 17 uncovers these winning tickets, then these pruned networks should train successfully in isolation when reset to their original initializations. On XOR, we found that winning tickets derived from larger networks were able to learn the decision boundary and reach zero loss far more frequently than those that were randomly initialized. On MNIST, winning tickets converged more quickly and reached higher accuracy than the original network. Control experiments supported the claim that winning tickets represent a confluence of fortuitious initialization and network architecture. This paper articulates a new perspective on neural network training and supports that view empirically. Now that a foundation has been laid, there are numerous research directions to further evaluate the lottery ticket hypothesis and exploit this perspective to improve network design and training. Larger examples. The largest network that we examine is a fully-connected network for MNIST. Repeating the experiments outlined in this paper for a convolutional network, larger networks, and harder learning tasks would make it possible to understand whether the lottery ticket hypothesis holds more generally and how it manifests in these settings. Understanding winning tickets. This paper focuses mainly on the behavioral properties of the lottery ticket hypothesis, pruning, and winning tickets. One logical next step is to systematically analyze the architectures and initializations of lottery tickets. To what extent are winning tickets unique artifacts created by randomly initializing large networks and getting lucky? To what extent is there common structure between multiple winning tickets for the same task? What do winning tickets tell us about the functions that neural networks learn for particular tasks? Lottery ticket networks. The lottery ticket hypothesis and the existence of winning tickets demonstrate that small networks can be trained from start to finish. The most concrete follow-up to this work would be to exploit the lessons learned by leveraging winning tickets to develop new network architectures and initialization regimes that allow smaller networks to be trained for a wider variety of learning tasks. Doing so could reduce the amount of computation needed to train neural networks. References [1] Pierre Baldi and Peter J Sadowski. 2013. Understanding dropout. In Advances in neural information processing systems. 2814โ€“2822. [2] Song Han, Huizi Mao, and William J. Dally. 2015. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding. CoRR abs/1510.00149 (2015). arXiv:1510.00149 http://arxiv.org/abs/1510.00149 [3] Song Han, Huizi Mao, and William J Dally. 2015. A deep neural network compression pipeline: Pruning, quantization, huffman encoding. arXiv preprint arXiv:1510.00149 10 (2015). [4] Song Han, Jeff Pool, John Tran, and William Dally. 2015. Learning both weights and connections for efficient neural network. In Advances in neural information processing systems. 1135โ€“1143. [5] Babak Hassibi, David G Stork, and Gregory J Wolff. 1993. Optimal brain surgeon and general network pruning. In Neural Networks, 1993., IEEE International Conference on. IEEE, 293โ€“ 299. [6] Yann LeCun, Lรฉon Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 86, 11 (1998), 2278โ€“2324. [7] Yann LeCun, John S Denker, and Sara A Solla. 1990. Optimal brain damage. In Advances in neural information processing systems. 598โ€“605. [8] Hao Li, Asim Kadav, Igor Durdanovic, Hanan Samet, and Hans Peter Graf. 2016. Pruning filters for efficient convnets. arXiv preprint arXiv:1608.08710 (2016). [9] Christos Louizos, Karen Ullrich, and Max Welling. 2017. Bayesian compression for deep learning. In Advances in Neural Information Processing Systems. 3290โ€“3300. 18 [10] Jian-Hao Luo, Jianxin Wu, and Weiyao Lin. 2017. Thinet: A filter level pruning method for deep neural network compression. arXiv preprint arXiv:1707.06342 (2017). [11] Zelda Mariet and Suvrit Sra. 2015. Diversity Networks: Neural Network Compression Using Determinantal Point Processes. arXiv preprint arXiv:1511.05077 (2015). [12] Suraj Srinivas and R Venkatesh Babu. 2015. Data-free parameter pruning for deep neural networks. arXiv preprint arXiv:1507.06149 (2015). [13] Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15, 1 (2014), 1929โ€“1958. 19
2cs.AI
Infinitely generated semigroups and polynomial complexity arXiv:1503.04610v2 [math.GR] 11 May 2016 J.C. Birget Abstract This paper continues the functional approach to the P-versus-NP problem, begun in [2]. Here we focus on the monoid RMP2 of right-ideal morphisms of the free monoid, that have polynomial input balance and polynomial time-complexity. We construct a machine model for the functions in RMP2 , and evaluation functions. We prove that RMP2 is not finitely generated, and use this to show separation results for time-complexity. 1 Introduction In [2] we defined the monoids of partial functions fP and RMP2 . The question whether P = NP is equivalent to the question whether these monoids are regular. The monoid fP consists of all partial functions Aโˆ— โ†’ Aโˆ— that are computable by deterministic Turing machines in polynomial time, and that have polynomial I/O-balance. The submonoid RMP2 consists of the elements of fP that are right-ideal morphisms of Aโˆ— . One-way functions (according to worst-case time-complexity) are exactly the nonregular elements of fP. It is known that one-way functions (according to worst-case time-complexity) exist iff P 6= NP. Also, f โˆˆ RMP2 is regular in fP iff f is regular in RMP2 . Hence, P = NP iff fP is regular, iff RMP2 is regular. We refer to [9, 15] for background on P and NP. The original motivation for studying RMP2 in addition to fP was that RMP2 is reminiscent of the Thompson-Higman groups [14, 16, 12, 7, 6, 5] and the Thompson-Higman monoids [4]. It also quickly turned out that RMP2 , while having the same connection to P-vs.-NP as fP, has different properties than fP (e.g., regarding the Green relations, and actions on {0, 1}ฯ‰ ; see [2, 3]). It is hard to know whether this approach will contribute to a solution of the P-vs.-NP problem, but the monoids fP and RMP2 are interesting by themselves. Above and in the rest of the paper we use the following notation and terminology. We have an alphabet A, which will be {0, 1} unless the contrary is explicitly stated, and Aโˆ— denotes the set of all strings over A, including the empty string ฮต. For x โˆˆ Aโˆ— , |x| denotes the length of the string x. For a partial function f : Aโˆ— โ†’ Aโˆ— , the domain is Dom(f ) = {x โˆˆ Aโˆ— : f (x) is defined}, and the image is Im(f ) = f (Aโˆ— ) = f (Dom(f )). When we say โ€œfunctionโ€, we mean partial function (except when we explicitly say โ€œtotal functionโ€). Similarly, for a deterministic input-output Turing machine with input-output alphabet A, the domain of the machine is the set of input words for which the machine produces an output; and the set of output words is the image of the machine. A function f : Aโˆ— โ†’ Aโˆ— is called polynomially balanced iff there exists polynomials p, q such that for all x โˆˆ Dom(f ): |f (x)| โ‰ค p(|x|) and |x| โ‰ค q(|f (x)|). The polynomial q is called an input balance function for f . As we said already, fP is the set of partial functions f : Aโˆ— โ†’ Aโˆ— that are polynomially balanced, and such that x โˆˆ Dom(f ) 7โˆ’โ†’ f (x) is computable by a deterministic polynomial-time Turing machine. Hence, Dom(f ) is in P when f โˆˆ fP, and it is not hard to show that Im(f ) is in NP. Clearly, fP is a monoid under function composition. A function f : Aโˆ— โ†’ Aโˆ— is said to be one-way (with respect to worst-case complexity) iff f โˆˆ fP, but there exists no deterministic polynomial-time algorithm which, on every input y โˆˆ Im(f ), outputs some x โˆˆ Aโˆ— such that f (x) = y. By โ€œone-wayโ€ we will always mean one-way with respect to worst-case complexity; hence, these functions are not โ€œcryptographic one-way functionsโ€ (in the sense of, e.g., 1 [8, 13, 10]). However, they are important for the P-vs.-NP problem because of the following folklore fact (see e.g., [11] p. 33): One-way functions exist iff P 6= NP. As is easy to prove (see the Introduction of [2]), f โˆˆ fP is not one-way iff f is regular in fP. By definition, an element f in a monoid M is regular iff there exists f โ€ฒ โˆˆ M such that f f โ€ฒ f = f ; in this case, f โ€ฒ is called an inverse of f .1 A monoid M is called regular iff all the elements of M are regular. In summary we have: The monoid fP is regular iff P = NP. Let us look in more detail at the monoid RMP2 . A right ideal of Aโˆ— is a subset R โІ Aโˆ— such that R Aโˆ— = R (i.e., R is closed under right-concatenation by any string). For two strings v, w โˆˆ Aโˆ— , we say that v is a prefix of w iff (โˆƒx โˆˆ Aโˆ— )[ vx = w ]. A prefix code in Aโˆ— is a set P โŠ‚ Aโˆ— such that no word in P is a prefix of another word in P . For any right ideal R there exists a unique prefix code PR such that R = PR Aโˆ— ; we say that PR generates R as a right ideal. For details, see e.g. [6, 4]; a good reference on prefix codes, and variable-length codes in general is [1]. A right-ideal morphism is a partial function h : Aโˆ— โ†’ Aโˆ— such that for all x โˆˆ Dom(h) and all w โˆˆ Aโˆ— : h(xw) = h(x) w. In that case, Dom(h) and Im(h) are right ideals. For a right-ideal morphism h, let domC(h) (called the domain code) be the prefix code that generates Dom(h) as a right ideal. Similarly, let imC(h), called the image code, be the prefix code that generates Im(h). So a right-ideal morphism h is determined by h|domC(h) (the restriction of h to its domain code). In general, imC(h) โІ h(domC(h)), and it can happen that imC(h) 6= h(domC(h)). We define RMP2 = {f โˆˆ fP : f is a right-ideal morphism of Aโˆ— }. By Prop. 2.6 in [2], f โˆˆ RMP2 is regular in RMP2 iff f is regular in fP. The monoid RMP2 is regular iff P = NP. We saw (Cor. 2.9 in [2]) that fP and RMP2 are not isomorphic, that the group of units of RMP2 is trivial (Prop. 2.12 in [2]), and that RMP2 has only one non-0 J -class (Prop. 2.7 in [2]). In [3] we will see that RMP2 has interesting actions on {0, 1}ฯ‰ , and has interesting homomorphic images (some of which are regular monoids, and some of which are regular iff P = NP). Overall, RMP2 seems to have โ€œmore structureโ€ than fP. It is proved in [2] (Section 3) that fP is isomorphic to a submonoid of RMP2 . To prove this, we use an encoding of the three-letter alphabet {0, 1, #} into words over the two-letter alphabet {0, 1}; this encoding will also be used here. First, we encode the alphabet {0, 1, #} by code(0) = 00, code(1) = 01, code(#) = 11. A word x1 . . . xn โˆˆ {0, 1, #}โˆ— is encoded to code(x1 ) . . . code(xn ). For a fixed k > 0, a k-tuple of words (u1 , . . . , ukโˆ’1 , uk ) โˆˆ {0, 1}โˆ— ร— . . . ร— {0, 1}โˆ— is encoded to code(u1 # . . . ukโˆ’1 #) uk = code(u1 ) 11 . . . code(ukโˆ’1 ) 11 uk โˆˆ {0, 1}โˆ— . A function f โˆˆ fP is encoded to f C โˆˆ RMP2 , defined by domC(f C ) = code(Dom(f ) #), so Dom(f C ) = code(Dom(f )) 11 {0, 1}โˆ— ; and f C (code(x #) v) = code(f (x) #) v, for all x โˆˆ Dom(f ) and v โˆˆ {0, 1}โˆ— ; equivalently, f C (code(x) 11 v) = code(f (x)) 11 v. Then for every L โІ {0, 1}โˆ— , code(L#) is a prefix code, which belongs to P iff L is in P. And f โˆˆ fP iff f C โˆˆ RMP2 . The transformation f 7โ†’ f C is a isomorphic embedding of fP into RMP2 ; moreover, f C is regular in RMP2 iff f is regular in fP. From here on, the alphabet denoted by A will always be {0, 1}. In [2] (Section 4) we introduced a notion of polynomial program for Turing machines with built-in polynomial counter (for input balance and time-complexity). These programs form a machine model that characterizes the functions in fP. For a polynomial program w, we let ฯ†w โˆˆ fP denote the function computed by this program. For every polynomial q of the form q(n) = a nk + a (where a, k are positive integers), we constructed an evaluation map evC q โˆˆ fP such that for every polynomial program w with built-in polynomial pw (n) โ‰ค q(n) (for all n โ‰ฅ 0), and all x โˆˆ Aโˆ— ,  evC = code(w) 11 ฯ†w (x) q code(w) 11 x 1 The terminology varies, depending on the field. In semigroup theory f โ€ฒ such that f f โ€ฒ f = f is called a semi-inverse or a pseudo-inverse of f , in numerical mathematics f โ€ฒ is called a generalized inverse, in ring theory and in category theory itโ€™s called a weak inverse. In semigroup theory the term โ€œinverseโ€ of f is only applied to f โ€ฒ if f โ€ฒ f f โ€ฒ = f โ€ฒ holds in addition to f f โ€ฒ f = f . It is easy to see that if f f โ€ฒ f = f then f โ€ฒ f f โ€ฒ (= v) satisfies f vf = f and vf v = v. 2  C if x โˆˆ Dom(ฯ†w ); if x 6โˆˆ Dom(ฯ†w ) then evC q code(w) 11 x is undefined. We used evq , with any polynomial q of degree โ‰ฅ 2 with large enough coefficient, to prove the following: First, fP is finitely generated (Theorem 4.5 in [2]). Second, evC q is complete in fP with respect to inversive polynomial reduction (Section 5 of [2]). Later in this paper (Def. 2.4 and following) we define completeness and various reductions for RMP2 , along the same lines as for fP. Note that fP and RMP2 , in their entirety, do not have evaluation maps that belong to fP, respectively RMP2 (since such maps would not have polynomially bounded complexity). That is the reason why we restrict ev and evR to complexity โ‰ค q(.), and why we need precise machine models for fP and RMP2 (as opposed to more intuitive โ€œhigher-levelโ€ models). In Section 2 we define a machine model that characterizes the functions in RMP2 ; and for any large CC enough polynomial q we construct evaluation maps evRC for the functions in RMP2 that q and evRq have balance and time-complexity โ‰ค q. We prove that evRCC is complete in RMP2 (and in fP) with q respect to inversive Turing reduction. In Section 3 we prove that RMP2 is not finitely generated, and in Section 4 we show that infinite generation has some complexity consequences, i.e., infinite generation can be used for a time-complexity lower-bound argument. 2 Machine model and evaluation maps for RMP2 The evaluation map evC q : code(w) 11 x 7โˆ’โ†’ code(w) 11 ฯ†w (x), that we constructed for fP in [2], works in particular when ฯ†w โˆˆ RMP2 (provided that ฯ†w has time-complexity and input-balance โ‰ค q). But P C evC q is not a right-ideal morphism and, moreover, ev q can evaluate functions that are not in RM2 . We want to construct an evaluation map that belongs to RMP2 , and that evaluates exactly the elements of RMP2 that have balance and complexity โ‰ค q. In [2] we constructed a machine model for fP, namely a class of Turing machines with built-in polynomial counter (for controlling the time-complexity and the input-balance). We will refine these Turing machines in order to obtain a machine model for accepting the right ideals in P, and for computing the functions in RMP2 . We will consider deterministic multi-tape Turing machines with input-output alphabet A, with a read-only input tape, and a write-only output tape. Moreover we assume that on the input tape and on the output tape, the head can only move to the right, or stay in place (but cannot move left). We assume that the input tape has a left endmarker #, and a right endmarker B (the blank symbol). At the beginning of a computation of such a machine M on input z โˆˆ Aโˆ— , the input tape has content # z B, with the input tape head on # ; initially, all other tapes are blank (i.e., they are filled with infinitely many copies of the letter B). The output tape does not need endmarkers (since it is write-only). We assume that M has a special output state qout , and that M only goes to state qout when the output is complete; the output state is a halting state (i.e., M has no transition from state qout ). An important convention for a Turing machine M with non-total input-output function fM is the following: If M on input x halts in a state that is not qout , then there is no output (even if the output tape contains a non-blank word). So, in that case, fM (x) is undefined. The content of the output tape is considered unreadable, or hidden, until the output state qout is reached. This kind of Turing machine can compute any partial recursive function (the restrictions on the input and output tapes do not limit the machine, because of the work-tapes). To compute a function in fP, we add a built-in polynomial (used as a bound on input balance and time-complexity); see Section 4 in [2]. In order to obtain a machine model for the functions in RMP2 the above Turing machines (with built-in polynomial) will be restricted so that they compute right-ideal morphisms of Aโˆ— . This is done in two steps: First, sequential functions and sequential Turing machines are introduced. From this it is easy to obtain a class of Turing machines that compute right-ideal morphisms (which are a special kind of sequential functions). Recall that by โ€œfunctionโ€ we mean partial function. By definition, a function f : Aโˆ— โ†’ Aโˆ— is sequential iff 3 for all x1 , x2 โˆˆ Dom(f ): if x1 is a prefix of x2 then f (x1 ) is a prefix of f (x2 ). Obviously, every right-ideal morphism is a sequential function. A sequential Turing machine is a deterministic multi-tape Turing machine M (with special input tape and special output tape and output state, according to the conventions above), with input-output function fM , such that the following holds. For every x โˆˆ Dom(fM ) and every word z โˆˆ Aโˆ— : in the computation of M on input xz, the input-tape head does not start reading z B until fM (x) has been written on the output tape. To โ€œread a letter โ„“โ€ (in zB) means to make a transition whose input letter is โ„“. So, the input tape has content # xz B, with the input-tape head on the left-most letter of zB (but no transition has been made on that letter yet), and the output tape now has content fM (x). Of course, at this moment the computation of M on input xz is not necessarily finished; the state is not necessarily qout , the output might still grow, and qout might be reached eventually, or not; if qout is never reached, there is no final output. The sequential Turing machines form a machine model for the partial recursive sequential functions. If we let the machines have a built-in polynomial we obtain a machine model for the sequential functions in fP. Finally, to obtain a machine model for the functions in RMP2 we take the sequential Turing machines with built-in polynomial, with the following additional condition. For every x โˆˆ Dom(fM ) and every word z โˆˆ Aโˆ— : in the computation of M on input xz, once fM (x) has been written on the output tape (after x was read on the input tape), the remaining input z is copied to the output tape; at this point the state qout is reached. We call such a machine an RMP2 -machine. The following shows how, from an fP-machine for a function f , an RMP2 -machine for f can be constructed, provided that f โˆˆ RMP2 . Let us first consider right ideals in P, rather than functions. For any polynomial program w for a Turing machine Mw that accepts a language L โˆˆ P, we construct a new polynomial program v describing a Turing machine Mv that behaves as follows: On any input x โˆˆ {0, 1}โˆ— , Mv successively examines prefixes of x until it finds a prefix, say p, that is accepted by Mw ; Mv does not read the letter of x that comes after p until it has decided that p 6โˆˆ L. As soon as Mv finds a prefix p of x such that p โˆˆ L, Mv accepts the whole input x. If Mw accepts no prefix of x, Mv rejects x. Thus, Mv accepts LAโˆ— (the right ideal generated by L); if L is a right ideal then LAโˆ— = L. If Mw has time-complexity โ‰ค T (.) (a polynomial) then Mv has time-complexity โ‰ค T (.)2 . Let us now consider functions in RMP2 . Given any polynomial program w for a function ฯ†w โˆˆ fP, we construct a new polynomial program v such that Mv , on input x, successively examines all prefixes of x until it finds a prefix p in Dom(ฯ†w ); let ฯ†w (p) = y. Then, on input x, the machine Mv outputs y z, where z is such that x = p z. Note that since p is the shortest prefix of x such that p โˆˆ Dom(ฯ†w ), we actually have p โˆˆ domC(ฯ†w ) (if Dom(ฯ†w ) is a right ideal). The machine Mv does not read the letter of x that comes after a prefix p until it has decided that p 6โˆˆ Dom(ฯ†w ) or p โˆˆ domC(ฯ†w ). Hence, the function computed by Mv is in RMP2 . This construction describes a transformation f โˆˆ fP 7โˆ’โ†’ fpref โˆˆ RMP2 , where fpref is defined as follows: fpref (x) = f (p) z, where x = p z, and p is the shortest prefix of x that belongs to Dom(f ); so, p โˆˆ domC(fpref ). Thus for every f โˆˆ fP we have: f โˆˆ RMP2 iff fpref = f . Based on RMP2 -machines we can construct evaluation maps for RMP2 . Let q be a polynomial where q(n) = a nk + a for some integers a, k โ‰ฅ 1. We define evRC q , as follows:  evRC = code(w) 11 ฯ†w (x), q code(w) 11 x for all RMP2 -programs w with built-in polynomial pw โ‰ค q, and for all x โˆˆ Dom(ฯ†w ). The details of C P the construction are the same as for evC q ; see Section 4 in [2]. Although evRq belongs to RM2 and 4 evaluates all RMP2 -programs w with built-in polynomial โ‰ค q, we will prove in Theorem 4.3 that the complexity of evRC q is higher than q. The following doubly coded evaluation function is usually more useful for RMP2 -programs. It is defined by  evRCC code(w) 11 code(u) 11 v = code(w) 11 code(ฯ†w (u)) 11 v, q when u โˆˆ domC(ฯ†w ), v โˆˆ Aโˆ— , and w is as before. CC To give a relation between evRC we will use the following partial recursive right-ideal q and evRq P morphism ฮณ, defined for very RM2 -program w โˆˆ Aโˆ— and every x โˆˆ Dom(ฯ†w ) by  ฮณ code(w) 11 x = code(w) 11 code(u) 11 v, where x = uv, and u is the shortest prefix of x such that u โˆˆ Dom(ฯ†w ); equivalently, u โˆˆ domC(ฯ†w ).  When x 6โˆˆ Dom(ฯ†w ), ฮณ code(w) 11 x is undefined. Essentially, ฮณ finds the shortest prefix of x that belongs to Dom(ฯ†w ) (or equivalently, to domC(ฯ†w )). The function ฮณ can be evaluated by examining successively longer prefixes of x until a prefix u โˆˆ Dom(ฯ†w ) is fund. So ฮณ is computable with recursive domain, when w ranges over RMP2 -programs. For any fixed RMP2 -program w, let ฮณw be ฮณ restricted to this w, i.e., ฮณw = ฮณ|code(w) 11 Aโˆ— . In other words, Dom(ฮณw ) = code(w) 11 Dom(ฯ†w ), and ฮณw (code(w) 11 uv) = code(w) 11 code(u) 11 v o by Dom(ฮณ o ) = Dom(ฯ† ) (as opposed to when u โˆˆ domC(ฯ†w ), v โˆˆ Aโˆ— . Similarly we define ฮณw w w code(w) 11 Dom(ฯ†w )), and o (uv) = code(w) 11 code(u) 11 v ฮณw o ) = Im(ฮณ ) = code(w) 11 domC(ฯ† ) 11 Aโˆ— . when u โˆˆ domC(ฯ†w ), v โˆˆ Aโˆ— . So, Im(ฮณw w w P o Then ฮณw and ฮณw belong to RM2 for every fixed w. But ฮณ itself is not polynomial-time computable, since it has to work for all possible RMP2 -programs w. Another restricted form of ฮณ that belongs to RMP2 is obtained by choosing a fixed polynomial q, and defining ฮณq as the restriction of ฮณ to the set {code(w) 11 x : w is a RMP2 -program with built-in polynomial โ‰ค q, and x โˆˆ Dom(ฯ†w )}. Hence, ฮณq โˆˆ RMP2 . We also define the functions ฯ€0 , ฯ€1 , ฯ0 , ฯ1 โˆˆ RMP2 by ฯ€a (x) = ax, ฯa (ax) = x, for all x โˆˆ {0, 1}โˆ— and a โˆˆ {0, 1}. For a word w = an . . . a1 with ai โˆˆ {0, 1} we denote ฯ€an โ—ฆ . . . โ—ฆ ฯ€a1 by ฯ€w , and ฯan โ—ฆ . . . โ—ฆ ฯa1 by ฯw . o =ฮณ โ—ฆฯ€ o Then we have: ฮณw w code(w) 11 , and ฮณw = ฮณw โ—ฆ ฯcode(w) 11 . Another important function in RMP2 is the decoding function, defined for any u, v โˆˆ Aโˆ— by decode(code(u) 11 v) = uv, so domC(decode) = {00, 01}โˆ— 11, and imC(decode) = {ฮต}. We also define a second-coordinate decoding function, for all u1 , u2 , v โˆˆ Aโˆ— , by  decode2 code(u1 ) 11 code(u2 ) 11 v = code(u1 ) 11 u2 v. So, decode2 โˆˆ RMP2 , domC(decode2 ) = {00, 01}โˆ— 11 {00, 01}โˆ— 11, and imC(decode2 ) = {00, 01}โˆ— 11. CC Now we can formulate a relation between evRC q and evRq : CC evRC โ—ฆ ฮณq . q = decode2 โ—ฆ evRq In order to show that evRCC is complete with respect to inversive reduction in RMP2 , we will q adapt the padding and unpadding functions (defined for fP in [2], Section 4) to RMP2 . Although for 5 RMP2 we keep the same names as for the corresponding (un)padding functions in fP, the functions are slightly different. The padding procedure begins with the function expand(.), defined by  expand code(w) 11 code(u) 11 v = code(ex(w)) 11 04 |code(u)| 2 +8 |code(u)|+2 01 code(u) 11 v, 2 for all u โˆˆ domC(ฯ†w ), v โˆˆ Aโˆ— , and RMP2 -programs w. The word 04 |code(u)| +8 |code(u)|+2 01 is of the 2 form code(s) for a word s โˆˆ 0โˆ— 1; and 04 |code(u)| +8 |code(u)|+2 01 code(u) is also a code word, namely 2 code(su). Since 0โˆ— 1 and its subset (00)โˆ— 01 are prefix codes, code(s) = 04 |code(u)| +8 |code(u)|+2 01 is uniquely determined as a prefix of code(su). Here, ex(w) is an RMP2 -program obtained from w so that  ฯ†ex(w) (00)h 01 code(u) 11 v = (00)h 01 code(ฯ†w (u)) 11 v, for all u โˆˆ domC(ฯ†w ), v โˆˆ Aโˆ— , and h > 0. Moreover, if n 7โ†’ a nk + a is the built-in polynomial of the program w then the built-in polynomial of ex(w) is pe (n) = ae nโŒˆk/2โŒ‰ + ae , with ae = max{12, โŒˆa/2k โŒ‰ + 1}. The detailed justification of the numbers used in the definition of expand and ex (as well as reexpand, recontr, and contr below) is given in [2], Section 4. It is important that expand uses the prefix u of x for padding (in the format code(u) 11, where u โˆˆ domC(ฯ†w )). If the whole input x were used for computing the amount of padding, expand would o , in order to isolate the not be a right-ideal morphism. This is the reason why we introduce ฮณw or ฮณw prefix u โˆˆ domC(ฯ†w ) of x. We iterate expansion (padding) by applying the following function, where ex(.) is as above:  reexpand code(ex(z)) 11 0k 01 code(u) 11 v = code(ex(z)) 11 04k 2 +8k+2 01 code(u) 11 v, where k > 0, u, v โˆˆ Aโˆ— , and z is any RMP2 -program; k is even in the context where reexpand will be used. Repeated contraction (unpadding) is carried out by applying the following function, for k > 0:  recontr code(ex(z)) 11 (00)k 01 code(y) 11 v โˆš = code(ex(z)) 11 (00)max{1, โŒŠ k/2โŒ‹โˆ’1} 01 code(y) 11 v; โˆš note that max{1, โŒŠ k/2โŒ‹ โˆ’ 1} โ‰ฅ 1. The unpadding procedure ends with the application of the function  contr code(ex(z)) 11 (00)k 01 code(y) 11 v = code(z) 11 code(y) 11 v, if 2 โ‰ค |(00)k | = 2k โ‰ค 4 |code(y)|2 + 8 |code(y)| + 2. The functions expand(.), ex(.), reexpand(.), recontr(.), and contr(.), are undefined in the cases where no output has been specified above. Lemma 2.1 Let q2 be the polynomial defined by q2 (n) = 12 n2 + 12. For any ฯ†w โˆˆ RMP2 , where w is a RMP2 -program with built-in polynomial q (of the form q(n) = a nk + a for positive integers a, k), we have for all u โˆˆ domC(ฯ†w ), v โˆˆ Aโˆ— : (โ‹†) ฯ†w (uv) m o = decode โ—ฆ ฯcode(w) 11 โ—ฆ contr โ—ฆ recontr 2m โ—ฆ evRCC q2 โ—ฆ reexpand โ—ฆ expand โ—ฆ ฮณw (uv) m o = ฯcode(w) 11 โ—ฆ decode2 โ—ฆ contr โ—ฆ recontr2m โ—ฆ evRCC q2 โ—ฆ reexpand โ—ฆ expand โ—ฆ ฮณw (uv), where m = โŒˆlog2 (a + k)โŒ‰. 6 Proof. This is similar to the proof of Prop. 4.5 in [2], with a few modifications. For u โˆˆ domC(ฯ†w ), v โˆˆ Aโˆ— , ฮณo w uv 7โˆ’โ†’ expand code(w) 11 code(u) 11 v code(ex(w)) 11 04 |code(u)| 7โˆ’โ†’ reexpand m 7โˆ’โ†’ 2 +8 |code(u)|+2 01 code(u) 11 v code(ex(w)) 11 0Nm+1 01 code(u) 11 v, where N1 = 4 |code(u)|2 + 8 |code(u)| + 2, so |0N1 01| = (2 (|code(u)| + 1))2 ; by induction, Ni = 2 + 8N Ni 01| = (2 (N 2 4 Niโˆ’1 iโˆ’1 + 2 for 1 < i โ‰ค 2m + 1, and |0 iโˆ’1 + 1)) . The above string, which will CC now be the argument of evq2 , has length > Nm+1 + 2 + |code(u)|, which is much larger than the time it takes to simulate the machine with program w on input u. So evRCC q2 can now be applied correctly. Continuing the calculation, evRCC q2 7โˆ’โ†’ code(ex(w)) 11 0Nm+1 01 code(ฯ†w (u)) 11 v recontr 2m 7โˆ’โ†’ code(w) 11 00 01 code(ฯ†w (u)) 11 v. We use 2m in recontr 2m because ฯ†w (u) could be much shorter than u; but because of polynomial input balance, |u| โ‰ค pw (|ฯ†w (u)|). Note that doing more input padding than necessary does not do any harm; and recontracting (unpadding) more than needed has no effect (by the definition of recontr). Hence contr can now be applied correctly. We complete the calculation: contr 7โˆ’โ†’ code(w) 11 code(ฯ†w (u)) 11 v decode2 7โˆ’โ†’ code(w) 11 ฯ†w (u) v ฯcode(w) 11 7โˆ’โ†’ ฯ†w (u) v. โœท Lemma 2.2. RMP2 has the following infinite generating set: {decode, ฯ0 , ฯ1 , ฯ€0 , ฯ€1 , contr, recontr, evRCC q2 , reexpand, expand} โˆช {ฮณw : w is any RMP2 -program}. Here, decode can be replaced by decode2 . Yet another infinite generating set of RMP2 is k {ฯ0 , ฯ1 , ฯ€0 , ฯ€1 } โˆช {evRC q : q is any polynomial of the form q(n) = a n + a with a, k โˆˆ Nโ‰ฅ1 }. o = ฮณ โ—ฆฯ€ Proof. The first infinite generating set follows from Lemma 2.1. Recall that ฮณw w code(w) 11 . The second generating set follows in a straightforward way from the proof of Prop. 4.5 in [2]. โœท Proposition 2.3 RMP2 is generated by a set of regular elements of RMP2 . Proof. The generators ฯ0 , ฯ1 , ฯ€0 , ฯ€1 are easily seen to be regular. Thus, using the second infinite generating set in Lemma 2.2, it is enough to factor evRC q into regular elements. We have: evRC q = ฯ2,q โ—ฆ Eq , where Eq and ฯ2,q are defined as follows: For every RMP2 -program w with built-in polynomial โ‰ค q, and every u โˆˆ domC(ฯ†w ) and v โˆˆ Aโˆ— ,  Eq code(w) 11 code(u) 11 v = code(w) 11 code(u) 11 code(ฯ†w (u)) 11 v; and for all z, y, x, v โˆˆ Aโˆ— such that |x| โ‰ค q(|y|),  ฯ2,q code(z) 11 code(x) 11 code(y) 11 v = code(z) 11 code(y) 11 v. The functions are undefined otherwise. It is easy to see that Eq and ฯ2,q have polynomial-time inversion algorithms (i.e., they are regular), and belong to RMP2 . โœท P We will show now that evRCC q2 is complete in RM2 and in fP, with respect to a certain โ€œinversive reductionโ€. We need to recall some definitions from [2] concerning reductions between functions in fP or RMP2 , and in particular, reductions that โ€œpreserve one-waynessโ€ (inversive reductions). 7 Definition 2.4 Let f1 , f2 : Aโˆ— โ†’ Aโˆ— be two polynomially balanced right-ideal morphisms. (1) We say that f2 simulates f1 (denoted by f1 4 f2 ) iff there exist ฮฑ, ฮฒ โˆˆ RMP2 such that f1 = ฮฒโ—ฆf2 โ—ฆฮฑ. (2) We have a polynomial-time Turing simulation of f1 by f2 (denoted by f1 4T f2 ) iff f1 can be computed by an oracle RMP2 -machine that can make oracle calls to f2 ; such oracle calls can, in particular, be calls on the membership problem of Dom(f2 ). In the above definition, f1 , f2 need not be polynomial-time computable. Since RMP2 is J 0 -simple (Prop. 2.7 in [2]), every f1 โˆˆ RMP2 is simulated by every f2 โˆˆ RMP2 โˆ’{0} (for each of the above simulations). Definition 2.5 (Inversive reduction). If 4X is a simulation between right-ideal morphisms (e.g., as in the previous definition) then the corresponding inversive reduction is defined as follows. We say that f1 inversively X-reduces to f2 (denoted by f1 6inv,X f2 ) iff (1) f1 4X f2 , and (2) for every inverse f2โ€ฒ of f2 there exists an inverse f1โ€ฒ of f1 such that f1โ€ฒ 4X f2โ€ฒ ; here, f2โ€ฒ and f1โ€ฒ range over all polynomially balanced right-ideal morphisms Aโˆ— โ†’ Aโˆ— . Note that J 0 -simplicity (Prop. 2.7 in [2]) does not apply for inversive reduction since f2โ€ฒ , f1โ€ฒ do not range over just RMP2 . One easily proves the following about polynomially balanced right-ideal morphisms f1 , f2 (see [2], Section 5): If f1 6inv,T f2 and f2 โˆˆ RMP2 , then f1 โˆˆ RMP2 ; if, in addition, f2 is regular, then f1 is regular (equivalently, if, in addition, f1 is one-way, then f2 is one-way). Definition 2.6 A polynomially balanced right-ideal morphism f0 is complete in a set S (of right-ideal morphisms) with respect to an (inversive) reduction 6inv,X iff f0 โˆˆ S, and for all ฯ† โˆˆ S: ฯ† 6inv,X f0 . See Section 5 of [2] for more details and properties of these simulations and reductions; in [2] the focus was on fP, whereas here we concentrate on RMP2 . The simulations in Def. 2.4 are similar to the standard notions of reductions between decision problems. The concept of inversive reduction was first introduced in [2]; it is the appropriate notion of reduction between functions when one-wayness is to be preserved under upward reduction (and regularity is to be preserved under downward reduction). In the above definitions we only refer to polynomially balanced inverses; this is justified by the following Proposition, according to which โ€œbalanced functions have balanced inversesโ€. Proposition 2.7 Suppose f is a right-ideal morphism with balance โ‰ค q(.) (where q(.) is a polynomial), and f has an inverse f1โ€ฒ with time-complexity โ‰ค T (.). Then f has an inverse f โ€ฒ with balance โ‰ค q and time-complexity โ‰ค T (.) + c q(.) (for some constant c > 1). The inverse f โ€ฒ can be chosen as a restriction of f1โ€ฒ . Proof. Let f โ€ฒ be the restriction of f1โ€ฒ to the set {y โˆˆ Dom(f1โ€ฒ ) : |y| โ‰ค q(|f1โ€ฒ (y)|) and |f1โ€ฒ (y)| โ‰ค q(|y|)}. Then f โ€ฒ obviously has balance โ‰ค q. Note that since f1โ€ฒ is an inverse of f we have Im(f ) โІ Dom(f1โ€ฒ ). To show that f โ€ฒ is an inverse of f it is sufficient to check that the domain of f โ€ฒ contains Im(f ). Let y = f (x) โˆˆ Im(f ) for some x โˆˆ Dom(f ). Then f (f1โ€ฒ (y)) = y, since f1โ€ฒ is an inverse. Checking |y| โ‰ค q(|f1โ€ฒ (y)|): |y| = |f (f1โ€ฒ (y))| โ‰ค q(|f1โ€ฒ (y)|; the inequality holds since q is a balance for f on input f1โ€ฒ (y). Checking |f1โ€ฒ (y)| โ‰ค q(|y|): |f1โ€ฒ (y)| โ‰ค q(|f (f1โ€ฒ (y))|) since q is a balance for f on input f1โ€ฒ (y); and q(|f (f1โ€ฒ (y))|) = q(|y|) since f (f1โ€ฒ (y)) = y. To find a time-complexity bound for f โ€ฒ , we first compute f1โ€ฒ (y) in time โ‰ค T (|y|); thereby we also verify that y โˆˆ Dom(f1โ€ฒ ). To check whether y is in the domain of f โ€ฒ we first compare |y| and |f1โ€ฒ (y)| in time โ‰ค |y| + 1. 8 Checking |y| โ‰ค q(|f1โ€ฒ (y)|): If |y| โ‰ค |f1โ€ฒ (y)| then we automatically have |y| โ‰ค q(|f1โ€ฒ (y)|). If |y| โ‰ฅ we compute q(|f1โ€ฒ (y)|) in time O(q(|f1โ€ฒ (y)|)) (โ‰ค O(q(|y|))), by writing the number |f1โ€ฒ (y)| in binary, and then evaluating q (see Section 4 of [2] for a similar computation). Then we check |y| โ‰ค q(|f1โ€ฒ (y)|) in time โ‰ค |y| + 1. Checking |f1โ€ฒ (y)| โ‰ค q(|y|) is done in a similar way, in time โ‰ค O(q(|y|)) + |y| + 1. โœท |f1โ€ฒ (y)| P Theorem 2.8 The map evRCC q2 is complete for RM2 with respect to inversive Turing reduction. Proof. Lemma 2.1 provides the following simulation of ฯ†w by evRCC q2 : m o ฯ†w = decode โ—ฆ ฯcode(wโ€ฒ ) 11 โ—ฆ contr โ—ฆ recontr2m โ—ฆ evRCC q2 โ—ฆ reexpand โ—ฆ expand โ—ฆ ฮณw . To obtain an inversive Turing simulation, let eโ€ฒ be any inverse of evRCC q2 . Slightly modifying the proof of Prop. 5.6 in [2], we apply eโ€ฒ to any string of the form code(ex(w)) 11 0Nm+1 11 code(p) 11 z, where p โˆˆ ฯ†w (domC(ฯ†w )), and z โˆˆ Aโˆ— ; then for any p โˆˆ imC(ฯ†w ) (โІ ฯ†w (domC(ฯ†w ))), and z โˆˆ Aโˆ— :  eโ€ฒ code(ex(w)) 11 0Nm+1 11 code(p) 11 z = code(ex(w)) 11 0Nm+1 11 code(t) 11 z, โ€ฒ โ€ฒ โ€ฒ โ€ฒ for some t โˆˆ ฯ†โˆ’1 w (p) โІ Dom(ฯ†w ). Based on e we now construct an inverse ฯ†w of ฯ†w such that ฯ†w 4T e ; for any y โˆˆ Im(ฯ†w ) we define o (y). ฯ†โ€ฒw (y) = decode โ—ฆ ฯcode(wโ€ฒ ) 11 โ—ฆ contr โ—ฆ recontr 2m โ—ฆ eโ€ฒ โ—ฆ reexpandm โ—ฆ expand โ—ฆ ฮดw o (y) is defined by Here, ฮดw o (y) = code(w) 11 code(p) 11 z, ฮดw o (.) is similar to ฮณ o (.), except that ฮด o (.) uses imC(ฯ† ), when y = pz with p โˆˆ imC(ฯ†w ), z โˆˆ Aโˆ— . So, ฮดw w w w o (.) uses domC(ฯ† ). We saw that ฮณ o โˆˆ RMP ; but unless P = NP, ฮด o will not be in RMP whereas ฮณw w w 2 w 2 in general. o (y) can be computed by an RMP -machine M that makes oracle calls to Dom(eโ€ฒ ) The value ฮดw 2 and to eโ€ฒ as follows. On input y, M considers all prefixes of y of increasing lengths, p1 , . . . , pk , until pj โˆˆ Im(ฯ†w ) is found. Since pj is the first prefix in Im(ฯ†w ), we have pj โˆˆ imC(ฯ†w ) and o (y) = code(w) 11 code(p ) 11 z. To test for each p whether p โˆˆ Im(ฯ† ), M pads p to produce ฮดw j i i w i  Nm+1 11 code(p ). 0Nm+1 11 code(pi ); if pi โˆˆ Im(ฯ†w ) then eโ€ฒ code(ex(w)) 11 โ€ข is defined on input 0 i  Thus, if code ex(w)) 11 0Nm+1 11 code(pi ) 6โˆˆ Dom(eโ€ฒ ), then pi 6โˆˆ Im(ฯ†w ). On the other hand, if code ex(w)) 11 0Nm+1 11 code(pi ) โˆˆ Dom(eโ€ฒ ), then let ti โˆˆ ฯ†โˆ’1 w (pi ) be such that  โ€ฒ N m+1 e code(ex(w)) 11 0 11 code(pi ) = code(ex(w)) 11 0Nm+1 11 code(ti ). One oracle call to eโ€ฒ yields this, and hence ti . Then we can use ฯ†w to check whether ti โˆˆ Dom(ฯ†w ); and this holds iff pi โˆˆ Im(ฯ†w ). This way, M can check whether pi โˆˆ Im(ฯ†w ). Thus, if y โˆˆ Im(ฯ†w ), M will find pj โˆˆ Im(ฯ†w ). When y 6โˆˆ Im(ฯ†w ), M produces no output; this doesnโ€™t matter since we do not care how ฯ†โ€ฒw is defined outside of Im(ฯ†w ). o (y) is known, the remaining simulation Once ฮดw decode โ—ฆ ฯcode(wโ€ฒ ) 11 โ—ฆ contr โ—ฆ recontr 2m โ—ฆ eโ€ฒ โ—ฆ reexpandm โ—ฆ expand o (y) = code(w) 11 code(p) 11 z, yields ฯ†โ€ฒ (y). of eโ€ฒ , applied to ฮดw w The function ฯ†โ€ฒw is an inverse of ฯ†w : Indeed, for x โˆˆ Dom(ฯ†w ), we have ฯ†w (x) = pz for some p โˆˆ imC(ฯ†w ), z โˆˆ Aโˆ— . Then o (pz) = code(ex(w)) 11 0Nm+1 11 code(p) 11 z; reexpandm โ—ฆ expand โ—ฆ ฮดw and applying eโ€ฒ then yields code(ex(w)) 11 0Nm+1 11 code(t) 11 z, 9 for some t โˆˆ ฯ†โˆ’1 w (p). Applying decode โ—ฆ ฯcode(wโ€ฒ ) 11 โ—ฆ contr โ—ฆ recontr2m โ€ฒ โ€ฒ now yields tz. Finally, ฯ†w (tz) = pz, since t โˆˆ ฯ†โˆ’1 w (p). So, ฯ†w ฯ†w ฯ†w (x) = ฯ†w ฯ†w (pz) = ฯ†w (tz) = pz = ฯ†w (x). โœท P We show next that evRCC q2 is not only complete for RM2 , but for all of fP. P Proposition 2.9 The map evRCC q2 (โˆˆ RM2 ) is complete for fP with respect to 6inv,T . Proof. By Prop. 5.6 in [2], evC q2 is complete in fP for inversive simulation. By Prop. 5.17 in [2], P C C C C C C C maps into evq2 6inv (evq2 ) . Moreover, (evq2 )C 6inv,T evRCC q2 ; indeed, (ev q2 ) โˆˆ RM2 (since f 7โ†’ f CC P P C C C RM2 ), and we just saw that evRq2 is complete in RM2 . Hence evq2 6inv (evq2 ) 6inv,T evRCC โœท q2 . 3 Non-finite generation In [2] we proved that fP is finitely generated, and we left open the question whether RMP2 is also finitely generated. We will now answer this question negatively. We will use the following general compactness property: If a semigroup S is finitely generated, and if ฮ“ is any infinite generating set of S, then S is generated by some finite subset of this set ฮ“. Theorem 3.1. RMP2 is not finitely generated. Proof. We saw that RMP2 is generated by the infinite set {ฯ0 , ฯ1 , ฯ€0 , ฯ€1 , decode2 , contr, recontr, evRCC q2 , reexpand, expand} โˆช {ฮณw : w is an RMP2 -program}. Let us assume, by contradiction, that RMP2 is finitely generated. Then a finite generating set can be extracted from this infinite generating set, so RMP2 is generated by ฮ“fin = {ฯ0 , ฯ1 , ฯ€0 , ฯ€1 , decode2 , contr, recontr, evRCC q2 , reexpand, expand} โˆช {ฮณi : i โˆˆ F }, where F is some finite set of RMP2 -programs. So for every ฮณw there is a word in ฮ“โˆ—fin that expresses ฮณw as a finite sequence of generators. Recall that Dom(ฮณw ) = code(w) 11 Dom(ฯ†w ), and for any x โˆˆ Dom(ฯ†w ), ฮณw (code(w) 11 x) = code(w) 11 code(u) 11 v, where x = uv and u โˆˆ domC(ฯ†w ). The proof strategy will consist in showing that there are infinitely many functions ฮณw that do not have a correct representation over ฮ“fin . More precisely, for all RMP2 -programs w and all u โˆˆ domC(ฯ†w ), we have ฮณw (code(w) 11 u) = code(w) 11 code(u) 11; so ฮณw (code(w) 11 u) โˆˆ {00, 01}โˆ— 11 {00, 01}โˆ— 11. On the other hand, we will show that there exist (infinitely many) RMP2 -programs w such that for every X โˆˆ (ฮ“fin )โˆ— that represents ฮณw , there exist (infinitely many) u โˆˆ domC(ฯ†w ) such that: X(code(w) 11 u) = code(w) 11 code(u1 ) 11 u2 , where u2 is non-empty; so, X(code(w) 11 u) 6โˆˆ {00, 01}โˆ— 11 {00, 01}โˆ— 11. Thus we obtain a contradiction. We consider the RMP2 -programs w such that domC(ฯ†w ) satisfies: (1) no word in domC(ฯ†w ) contains 11 as a subsegment; (2) for all i โˆˆ F , domC(ฯ†i ) 6= domC(ฯ†w ); (3) for any u โˆˆ domC(ฯ†w ) and any integer n > 0, there exists v โˆˆ domC(ฯ†w ) of length |v| > n such that u = u0 c, u0 is a prefix  of v, and |c| โ‰ค 4. Equivalently:   โˆ€u โˆˆ domC(ฯ†w ) โˆ€n > 0 โˆƒv โˆˆ domC(ฯ†w ), |v| > n โˆƒu0 , c, z โˆˆ Aโˆ— [ v = u0 z, u = u0 c, |c| โ‰ค 4 ]. 10 We can picture this as a path in the tree of Aโˆ— , labeled by u and ending at vertex u; at vertex u0 along this path, at distance โ‰ค 4 from vertex u, a second path branches off and ends at vertex v (of length |v| > n). The following family of examples shows that there exist infinitely many RMP2 -programs w that satisfy properties (1)-(3). In each of these examples (parameterized by a โˆˆ {0, 1}โˆ— ) we have domC(ฯ†w ) = {code(an ) 0010 : n > 0}, where a โˆˆ {0, 1}โˆ— is any fixed non-empty word (depending on w), chosen so that domC(ฯ†w ) 6= domC(ฯ†i ) for all i โˆˆ F (thus property (2) holds). Any word a that is long enough will work; indeed, for different words a the above prefix codes are different, whereas F is finite. Property (1) follows from the definition of code (namely, code(0) = 00, code(1) = 01). Property (3) holds because for every u = code(am ) 0010 and every n > 0, we can take u0 = code(am ) and v = code(an+m ) 0010. The set {code(an ) 0010 : n > 0} is a regular language, with regular expression (code(a))+ 0010. Let X โˆˆ ฮ“โˆ—fin be a representation of ฮณw , where w is any RMP2 -program from the family of examples above with properties (1)-(3). We will consider certain suffixes Si of X, over ฮ“fin . Let S0 be the shortest suffix of X such that for all u โˆˆ domC(ฯ†w ), S0 (code(w) 11 u) is of the form code(x) 11 code(y) 11 z โˆˆ {00, 01}โˆ— 11 {00, 01}โˆ— 11 {0, 1}โˆ— . Then S0 exists since X itself (representing ฮณw ) maps code(w) 11 u to code(w) 11 code(u) 11 โˆˆ {00, 01}โˆ— 11 {00, 01}โˆ— 11 {0, 1}โˆ— . Inductively we define S1 , S2 , . . . , Si , . . . , where Si is the shortest suffix of X that has Siโˆ’1 as a strict suffix, and such that for all u โˆˆ domC(ฯ†w ) we have:  Si code(w) 11 u โˆˆ {00, 01}โˆ— 11 {00, 01}โˆ— 11 {0, 1}โˆ— .  So, Si code(w) 11 u is of the form code(w1 ) 11 code(u1 ) 11 u2 with w1 , u1 , u2 โˆˆ Aโˆ— . Then X = SN for some N โ‰ฅ 0 (and |X| > N ). Theorem 3.1 now follows from the next Lemma, according to which there are (infinitely many) u โˆˆ domC(ฯ†w ) such that SN (code(w) 11 u) = code(w) 11 code(u1 ) 11 u2 , with u2 non-empty. On the other hand, X = SN , and X represents ฮณw , hence by the definition of ฮณw we have for every u โˆˆ domC(ฯ†w ): SN (code(w) 11 u) = code(w) 11 code(u) 11; so u2 is empty. Thus, the assumption that X (over the finite generating set ฮ“fin ) represents ฮณw , leads to a contradiction. Lemma 3.2 Let ฮณw be such that domC(ฯ†w ) = {code(an ) 0010 : n > 0} for some word a โˆˆ {0, 1}โˆ— , chosen so that the program w satisfies properties (1)-(3). Let X be a word over ฮ“fin that represents ฮณw , and let |X| be the length of X over ฮ“fin . Let S0 , . . . , SN be the suffixes of X defined above, with SN = X. Then there exist โ„“ and n with โ„“ > n > 0 such that for all i = 0, . . . , N and all u โˆˆ domC(ฯ†w ) with |u| โ‰ฅ โ„“: Si (code(w) 11 u) = code(w1 ) 11 code(u1 ) 11 u2 , for some w1 , u1 , u2 โˆˆ Aโˆ— . Moreover, u2 has a non-empty common suffix with u, and this common suffix has length at least n. Proof. We have for all u โˆˆ domC(ฯ†w ): Si (code(w) 11 u) = code(w1 ) 11 code(u1 ) 11 u2 , for some w1 , u1 , u2 โˆˆ Aโˆ— . We want to show that there is โ„“ such that for all u โˆˆ domC(ฯ†w ) with |u| โ‰ฅ โ„“: u2 has a non-empty (sufficiently long) suffix in common with u; the number n is an auxiliary parameter. We take u of the form u = code(am ) 0010 and use induction on i = 0, . . . , N . Proof for S0 : The only generators from ฮ“fin that can occur in S0 are ฯ€0 , ฯ€1 , ฯ0 , ฯ1 and ฮณj (for j โˆˆ F ). Indeed, the other generators in ฮ“fin (namely decode2 , contr, recontr, evRCC q2 , reexpand, expand) are only applicable to inputs of the form code(x) 11 code(y) 11 z; so, S0 would end before a generator in {decode2 , contr, recontr, evRCC q2 , reexpand, expand} can be applied. Moreover, S0 cannot start with a generator in {decode2 , contr, recontr, evRCC q2 , reexpand, expand}; indeed, for all inputs code(w) 11 u โˆˆ domC(X), u = code(am ) 0010 contains no 11, so these generators are not defined on any element of domC(X). So, S0 is over {ฯ€0 , ฯ€1 , ฯ0 , ฯ1 } โˆช {ฮณj : j โˆˆ F }. 11 The actions of ฯ€0 , ฯ€1 , ฯ0 , ฯ1 can change an input in at most |S0 | positions at the left end of the input, so these actions preserve a common suffix u2 and u of length โ‰ฅ |u| โˆ’ |S0 |. Thus, if S0 consists only of instances of ฯ€0 , ฯ€1 , ฯ0 , ฯ1 , the Lemma holds for S0 if |u| โ‰ฅ โ„“ โ‰ฅ n + |S0 | and n > 0. Suppose now that S0 contains ฮณj for some j โˆˆ F . Then (if m > |S0 |/|a|), instances of ฯ€0 , ฯ€1 , ฯ0 , ฯ1 will transform the input u = code(w) 11 code(am ) 0010 into a word code(x) 11 s code(ak ) 0010 (for some x, s โˆˆ Aโˆ— , k > 0), such that ฮณj can be applied. This action changes an input in < |S0 | positions at the left end of the input. Since ฮณj is assumed to be applicable now, we must also have x = j and s = y0 z for some y0 โˆˆ domC(ฯ†j ), z โˆˆ Aโˆ— . Then the output of ฮณj is ฮณj code(j) 11 s code(ak ) 0010 = code(j) 11 code(y0 ) 11 z code(ak ) 0010, thus the common suffix of u2 and u could decrease by length โ‰ค |y0 | under the action of ฮณj . So we let โ„“ โ‰ฅ n + |S0 | + |y0 | and n > 0. Also, at most one ฮณj (with j โˆˆ F ) occurs in S0 , since after ฮณj the output is of the form code(w1 ) 11 code(u1 ) 11 u2 , which marks the end of the action of S0 . This proves the Lemma for S0 . Inductive step โ€œSi โ†’ Si+1 โ€, for 0 โ‰ค i < N : By induction we assume that for all u โˆˆ domC(ฯ†w ) with |u| โ‰ฅ โ„“, we have Si (code(w) 11 u) = code(w1 ) 11 code(u1 ) 11 u2 for some w1 , u1 , u2 โˆˆ Aโˆ— , where u2 and u have a common suffix of length โ‰ฅ n (> 0). Let us write Si+1 = Ti+1 Si ; then Ti+1 is non-empty (by the definition of Si+1 ). We also let T0 = S0 . Claim 1: If Ti+1 contains a generator g โˆˆ {contr, recontr, evRCC q2 , reexpand, expand, decode2 }, then g is the first (i.e., rightmost) letter of Ti+1 , and g occurs only once. Indeed, if g were applicable later in Ti+1 , the output of the generator preceding g would be of the form code(w1 ) 11 code(u1 ) 11 u2 , so Si+1 would have ended before g was applied. Claim 2: If Ti+1 contains a generator g โˆˆ {contr, recontr, evRCC q2 , reexpand, expand} โˆช {ฮณj : j โˆˆ F }, then g is the last (i.e., leftmost) letter of Ti+1 , and g occurs only once. Indeed, such a generator outputs a word of the form code(w1 ) 11 code(u1 ) 11 u2 . So, Si+1 ends after such a generator. As a consequence of Claims 1 and 2, if Ti+1 contains a generator g โˆˆ {contr, recontr, evRCC q2 , reexpand, expand}, then Ti+1 consists of just g. A generator of this form does not change u2 . So we can assume for the remaining cases that Ti+1 is of the form ti+1 , or ti+1 ยท decode2 , or ฮณj ยท ti+1 , or ฮณj ยท ti+1 ยท decode2 , where j โˆˆ F and ti+1 is over the generators ฯ€0 , ฯ€1 , ฯ0 , ฯ1 . Let code(w1 ) 11 code(u1 ) 11 u2 be the input of Ti+1 (and this is also the output of Si ), where u2 and u have a common suffix of length โ‰ฅ n. โ€ข Case where Ti+1 is over the generators ฯ€0 , ฯ€1 , ฯ0 , ฯ1 : Then Ti+1 changes the input in at most |Ti+1 | positions at the left end of the input, so u2 will not be affected if โ„“ โˆ’ n โ‰ฅ |Ti+1 | (and n > 0). โ€ข Case where Ti+1 = ti+1 ยท decode2 , with ti+1 over ฯ€0 , ฯ€1 , ฯ0 , ฯ1 : The output of decode2 is of the form code(w1 ) 11 u1 u2 , so the common suffix of u2 and u is preserved by decode2 . The action of ti+1 , containing only generators from {ฯ€0 , ฯ€1 , ฯ0 , ฯ1 }, affects at most |ti+1 | positions near the left side of the input, so u2 is not changed if โ„“ โˆ’ n โ‰ฅ |Ti+1 | (and n > 0). โ€ข Case where Ti+1 = ฮณj ยท ti+1 , with ti+1 over ฯ€0 , ฯ€1 , ฯ0 , ฯ1 : Applications of ฯ€0 , ฯ€1 , ฯ0 , ฯ1 change fewer than |ti+1 | letters of the input near the left end, so the common suffix is not affected if โ„“ โˆ’ n โ‰ฅ |Ti+1 |. When ฮณj is applied, the output produced will be of the form code(j) 11 code(yi+1 ) 11 z code(an ) 0010, where yi+1 โˆˆ domC(ฯ†j ). Then u2 will not be affected if we pick โ„“ โ‰ฅ n + |Ti+1 | + |yi+1 | and n > 0. โ€ข Case where Ti+1 = ฮณj ยท ti+1 ยท decode2 , with ti+1 over ฯ€0 , ฯ€1 , ฯ0 , ฯ1 : This case can be handled as a combination of the previous two cases. m In all the aboveP cases the constraints are fulfilled PNfor all i = 0, . . . , N , and for all u = code(a ) 0010, if N m โ‰ฅ N + |X| + i=0 |yi | (using the fact that i=0 |Ti | = |X|). Note that the words yi do not depend on the choice of the input u = code(am ) 0010, whenever m is long enough; indeed, to determine all yi we can apply each Si to the infinite word code(a)ฯ‰ โˆˆ {0, 1}ฯ‰ . โœท 12 Notation. For a given polynomial q (of the form q(n) = a nk + a with integers a, k โ‰ฅ 1), let (q) S2 = {f โˆˆ RMP2 : f is computed by an RMP2 -program with built-in polynomial โ‰ค q}. (q) We call w an S2 -program iff w is an RMP2 -program with built-in balance and time-complexity polynomial โ‰ค q. (q) (q) (q) Let RM2 = hS2 i, i.e., the submonoid of RMP2 generated by the set S2 . Obviously, we have: Proposition 3.3 For any set of polynomials {qi : i โˆˆ N} of the form qi (n) = ai nki + ai , such that S (qi ) sup{ai : i โˆˆ N} = +โˆž = sup{ki : i โˆˆ N}, we have: = RMP2 . โœท iโˆˆN RM2 (q) The non-finite generation result for RMP2 also holds for RM2 , and the proof is similar. We need a few preliminary facts. (q) Lemma 3.4 For every polynomial q of the form q(n) = a nk +a with a, k โ‰ฅ 2, and every S2 -program (q) w we have: ฮณw โˆˆ S2 . Proof. Recall that ฮณw (code(w) 11 uv) = code(w) 11 code(u) 11 v, where u โˆˆ domC(ฯ†w ). The input balance of ฮณw is โ‰ค q. Indeed, the input is shorter than the output; and the output length is 2 |w| + 2 + 2 |u| + 2 + |v|, which is less than q(|code(w) 11 uv|) = q(2 |w| + 2 + |u| + 2 + |v|) when q(n) โ‰ฅ 2 n2 + 2. To compute code(w) 11 code(u) 11 v from input code(w) 11 uv, an RMP2 -machine can proceed as follows: First, the machine reads and outputs code(w) 11. Then it runs the program w on input uv, i.e., it simulates the corresponding RMP2 -machine Mw (which has built-in polynomial q), with an extra tape and a few modifications. While searching for a prefix of uv in domC(ฯ†w ), the longest prefix examined so far is kept on the extra tape; the output ฯ†w (u) of Mw will not be written on the output tape. Once u (the prefix of uv in domC(ฯ†w )) has been found (and written on the extra tape), code(u) 11 v is appended on the output tape. All this takes time โ‰ค |code(w) 11| + q(|u|) + |code(u) 11 v| = 2 |w| + 2 + q(|u|) + 2 |u| + 2 + |v|; this is < q(2 |w| + 2 + |u| + 2 + |v|) = q(|code(w) 11 uv|) when q(n) โ‰ฅ 2 n2 + 2. โœท (q) Lemma 3.5 Let q be a polynomial that is larger than a certain polynomial of degree 5. Then RM2 is generated by (q) {ฯ0 , ฯ1 , ฯ€0 , ฯ€1 , decode2 , contr, recontr, evRCC q2 , reexpand, expand} โˆช {ฮณz : z is an S2 -program}. (q) Proof. When w is an S2 -program then as a consequence of Lemma 2.1, m o ฯ†w = ฯcode(wโ€ฒ ) 11 โ—ฆ decode2 โ—ฆ contr โ—ฆ recontr2m โ—ฆ evRCC q2 โ—ฆ reexpand โ—ฆ expand โ—ฆ ฮณw , m = ฯcode(wโ€ฒ ) 11 โ—ฆ decode2 โ—ฆ contr โ—ฆ recontr2m โ—ฆ evRCC q2 โ—ฆ reexpand โ—ฆ expand โ—ฆ ฮณw โ—ฆ ฯ€code(w) 11 , (q) where q2 is a certain polynomial of degree 2. So the above generating set does indeed generate RM2 . (q) We still need to show that these generators belong to RM2 . The functions ฯ0 , ฯ1 , decode2 , contr, recontr, reexpand, expand, ฯ€0 , ฯ€1 have balance and complexity (q) (q) โ‰ค 4 (n + 1)2 . And ฮณw โˆˆ RM2 if w is an S2 -program (by Lemma 3.4). Let us verify that evRCC q2 has 5 balance โ‰ค q2 and complexity O(n ). By definition, evRCC q2 (code(w) 11 code(u) 11 v) = code(w) 11 code(ฯ†w (u)) 11 v. Then evRCC q2 has balance โ‰ค q2 , since on an output of length n = 2 |w|  + 2 + 2 |ฯ†w (u)| + 2, the input length is โ‰ค 2 |w| + 2 + 2 q2 (|ฯ†w (u)|) + 2 โ‰ค q2 2 |w| + 2 + 2 |ฯ†w (u)| + 2 = q2 (n). (q) When ฯ†w can be computed by an RM2 -machine with built-in polynomial pw (โ‰ค q2 ), then 2 2 evRCC q2 (code(w) 11 code(u) 11) can be computed in time โ‰ค c |w| pw (|u|) โ‰ค c |w| q2 (|u|) , for some 5 constant c > 0 (see the proof of Prop. 4.4 in [2]). Since q2 has degree 2, evRCC q2 has complexity O(n ). (q) Thus, there exists q of degree 5 such that the above generators belong to RM2 . 13 โœท Theorem 3.6 For any polynomial q such that q(n) = a nk + a, with k โ‰ฅ 5 and a > a0 (for some (q) constant a0 > 1), we have: RM2 is not finitely generated. (q) Proof. The proof is very similar to the proof of Theorem 3.1. We saw in Lemma 3.5 that RM2 is generated by the infinite set (q) {ฯ0 , ฯ1 , ฯ€0 , ฯ€1 , decode2 , contr, recontr, evRCC q2 , reexpand, expand} โˆช {ฮณz : z is an S2 -program}. (q) Let us assume, by contradiction, that RM2 is finitely generated. Then a finite generating set can (q) be extracted from this infinite generating set; so RM2 is generated by ฮ“fin = {ฯ0 , ฯ1 , ฯ€0 , ฯ€1 , decode2 , contr, recontr, evRCC q2 , reexpand, expand} โˆช {ฮณi : i โˆˆ F }, (q) (q) where F is some finite set of S2 -programs. For every S2 -program w let X be a word in ฮ“โˆ—fin that expresses ฮณw as a finite sequence of generators. From here on, the proof is identical to the proof of Theorem 3.1. We use the fact that domC(ฯ†w ) = {code(an ) 0010 : n > 0} is a finite-state language, so for such a program w, ฮณw has linear complexity (q) (being computable by a Mealy machine) and belongs to S2 . โœท 4 4.1 Some complexity consequences of non-finite generation Hierarchy and separation (q) Proposition 4.1 Let q be a polynomial of the form q(n) = a nk + a such that a, k โ‰ฅ 1. The set S2 , (q) and hence the monoid RM2 , are contained in a finitely generated submonoid of RMP2 . Proof. Let w be a RMP2 -program such that ฯ†w has I/O-balance and time-complexity โ‰ค q. Then evRC q can simulate ฯ†w directly, without any need of padding and unpadding. So we have for all u โˆˆ domC(ฯ†w ), v โˆˆ Aโˆ— : ฯ†w (uv) = ฯcode(w) 11 โ—ฆ evRC q โ—ฆ ฯ€code(w) 11 (uv). (q) So S2 is contained in the submonoid generated by {ฯ€0 , ฯ€1 , ฯ0 , ฯ1 , evRC q }. (Compare with Lemma 2.2 and the proof of Prop. 4.5 in [2].) โœท The proof of Prop. 4.1 yields the following chain of submonoids in which non-finitely generated and finitely generated submonoids alternate. Corollary 4.2 Let . . . < qi < qi+1 < . . . be any sequence of polynomials such that for all i โ‰ฅ 0, P P qi+1 is is large enough so that evRC qi has an RM2 -program with built-in polynomial qi+1 . Then RM2 contains a strict inclusion chain, which is infinite in the upward direction, (q ) . . . $ RM2 i (q i+1 $ hฯ€0 , ฯ€1 , ฯ0 , ฯ1 , evRC qi iRMP $ RM2 2 ) $ ... ... . Proof. The strictness of the inclusions in the chain follows from the fact that non-finite generation and finite generation alternate. โœท Theorem 4.3 Let q be a polynomial of the form q(n) = a nk + a such that a > 1, k โ‰ฅ 1. The (q) submonoid RM2 โІ RMP2 has the following properties: (1) (q) RM2 6= RMP2 . (q) (2) If q(n) โ‰ฅ 2 (n + 1)2 (for all n โˆˆ N), then RM2 contains elements of arbitrarily high polynomial balance and time-complexity. (3) (q) (q) S2 6= RM2 , if q(n) โ‰ฅ 2 (n + 1)2 . 14 (4) (q) evRC q 6โˆˆ RM2 , if k โ‰ฅ 5 and a โ‰ฅ a0 (where a0 is as in Theorem 3.6). Moreover, evRC q has balance โ‰ค q, but its time-complexity is not โ‰ค q. (5) Let q1 , q2 be polynomials of the above form, such that q1 (n) < q2 (n) for all n โˆˆ N. Suppose also that q1 (n) = a nk + a with k โ‰ฅ 5 and a โ‰ฅ a0 (as in (4)), and that q2 is large enough so that (q2 ) (q1 ) (q ) evRC $ RM2 2 . q1 โˆˆ RM2 . Then RM2 (q) Proof. (1) Since RM2 is contained in a finitely generated submonoid of RMP2 (Prop. 4.1), and RMP2 is not contained (by โІ) in a finitely generated submonoid of RMP2 (itself), inequality follows. 2 (2) Consider the function s : 0n 1x 7โ†’ 02n 1x, for all n โ‰ฅ 0, x โˆˆ {0, 1}โˆ— . Then s has time-complexity โ‰ค 2 (n + 1)2 . Indeed, a Turing machine on input 0n 1 can read this word n times, each time turning 2 an input 0 into some new letter a, and each time writing 0n on the output tape; this produces 0n in 2 the output; then one more copy of 0n is made, followed by 1. This takes time โ‰ค 2 (n + 1)2 . m Then, sm (i.e., the composition of m instances of s) has complexity โ‰ฅ 2m n2 (since the output (q) length is that high, the time must be at least that much too). Thus the functions sm โˆˆ RM2 (as m grows) have unbounded complexity, both in their degree and in their coefficient. (q) (3) By (2), RM2 contains functions with arbitrarily high polynomial balance and time-complexity, (q) whereas S2 only contains functions with balance and complexity โ‰ค q. (q) (4) By Prop. 4.1, RM2 is contained in the submonoid generated by {ฯ€0 , ฯ€1 , ฯ0 , ฯ1 , evRC q }; and we (q) (q) (q) easily see that ฯ€0 , ฯ€1 , ฯ0 , ฯ1 โˆˆ RM2 . Hence, if evRC q belonged to RM2 , the monoid RM2 would be finitely generated, contradicting Theorem 3.6. The input balance of evRC q is โ‰ค q (see Lemma 3.5, where this is proved for q2 ). It follows that the (q) C time-complexity of evRC q is not โ‰ค q, otherwise we would have evRq โˆˆ RM2 . (q ) (q ) 1 2 C (5) This follows from (4) since evRC q 6โˆˆ RM2 , but evRq โˆˆ RM2 . โœท Corollary 4.4 (Strict complexity hierarchy of submonoids in RMP2 ). There exists an infinite sequence of polynomials (qi : i โˆˆ N), each of the form qi (n) = ai nki + ai with ki , ai > 1, and with qi (n) < qi+1 (n) for all i, n โˆˆ N, such that the following holds: S (q ) (q ) (qi ) RM2 i $ RM2 i+1 for all i, and = RMP2 . iโˆˆN RM2 Moreover, RMP2 (which is not finitely generated) is the union of a โŠ‚-chain of 4-generated submonoids. Proof. The first statements follow from Theorem 4.3 (1) and Prop. 3.3. The last statement follows from Cor. 4.2. โœท (q ) Since each RM2 i contains functions of arbitrarily high polynomial complexity (by Theorem 4.3 (q ) (2)), the monoids RM2 i form a strict complexity hierarchy of a new sort, different from the usual (q) complexity hierarchies. The fact that S2 6= RMP2 could have been shown by a diagonal argument. It is not clear whether classical separation techniques from complexity theory would show the results (1), (3), (4), (5) of Theorem 4.3. Remark: The monoid fP, being finitely generated, does not contain an infinite strict complexity hierarchy of monoids (but it can contain hierarchies of sets). Indeed, we have in general: Fact. A finitely generated monoid M does not contain any infinite strict ฯ‰-chain of submonoids whose union is M . S Indeed, if we had a chain (Mi : i โˆˆ ฯ‰) with M0 $ . . . $ Mi $ Mi+1 $ . . . . . . $ S iโˆˆฯ‰ Mi = M , then there would exist j such that Mj contains a finite set of generators of M (since iโˆˆฯ‰ Mi = M ). Then Mj = M , contradicting the strict hierarchy. 15 This Fact does not hold for chains over arbitrary order types; it holds for limit ordinals. The non-finitely generated monoid RMP2 contains the encoding fPC as a submonoid (see Section 3 in [2]). And fPC is finitely generated (being an isomorphic copy of fP), and fPC contains an isomorphic copy of RMP2 . This leads to non-ฯ‰ strict chains of submonoids of fP and of RMP2 . 4.2 Irreducible functions (q) Another consequence of non-finite generation is that RMP2 and RM2 have โ€œirreducibleโ€ elements, i.e., elements that cannot be expressed by composition of lower-complexity elements. We make this precise in the next definitions. In this subsection we do not use evaluation maps, so we can use โ€œpolynomialsโ€ q(n) = a nk + a where we drop the requirement that a, k are integers, i.e., we now allow real numbers โ‰ฅ 1. Definition 4.5 The inf complexity degree of f โˆˆ RMP2 is (q) df = inf{k โˆˆ Rโ‰ฅ1 : f โˆˆ S2 for some polynomial q of the form q(n) = b nk + b, for some b > 1 }. We also define the inf complexity coefficient cf of f by cf = inf{Cf (ฮต) : ฮต โˆˆ R>0 }, where (q) Cf (ฮต) = inf{a โˆˆ Rโ‰ฅ1 : f โˆˆ S2 for some polynomial q of the form q(n) = a ndf +ฮต + a}. The inf complexity polynomial of f is the polynomial qf given by qf (n) = cf ยท (ndf + 1) (for all n โˆˆ N). (qf ) Since df and cf are defined by infimum, f might not be in S2 following. . By the definition of inf we have the Proposition 4.6 For any polynomial q(n) = a nk + a with k > df and a > cf : (q) f โˆˆ RM2 . โœท On the other hand, for every ฮต1 > 0, ฮต2 > 0: (p1 ) for any polynomial p1 (n) = b ndf โˆ’ฮต1 + b with any b > 1; (p2 ) where p2 (n) = (cf โˆ’ ฮต2 ) ยท (ndf + 1). f 6โˆˆ S2 f 6โˆˆ S2 Definition 4.7 Let us choose ฮด1 , ฮด2 โˆˆ R>0 . A function f โˆˆ RMP2 is called (ฮด1 , ฮด2 )-reducible iff (q) f โˆˆ RM2 for some polynomial q(n) = (cf โˆ’ ฮด2 ) ยท (ndf โˆ’ฮด1 + 1). And f is called (ฮด1 , ฮด2 )-irreducible iff f is not (ฮด1 , ฮด2 )-reducible. (q) (q) In other words, f is (ฮด1 , ฮด2 )-reducible iff f is a composite of elements of S2 i.e., f โˆˆ RM2 , where q(n) = (cf โˆ’ ฮด2 ) ยท (ndf โˆ’ฮด1 + 1). So, f can be factored into functions that โ€œhave strictly lower complexity than f โ€ (regarding both the degree and the coefficient). Note that in the definition of df and cf we (q) (q) used S2 , not RM2 (Def. 4.5). (q ) (q ) Proposition 4.8 For all ฮด1 , ฮด2 โˆˆ R>0 and all polynomials q1 , q2 such that RM2 1 $ RM2 2 , there (q ) (q ) exist (ฮด1 , ฮด2 )-irreducible functions in RM2 2 โˆ’ RM2 1 . (q ) (q ) Proof. By contradiction, assume that there exist ฮด1 , ฮด2 such that every f โˆˆ RM2 2 โˆ’ RM2 1 is (q ) (ฮด1 , ฮด2 )-reducible, i.e., f can be factored as f = fm โ—ฆ . . . โ—ฆ f1 , where fi โˆˆ RM2 2 (i = 1, . . . , m) with inf degree dfi < df โˆ’ ฮด1 and inf coefficient cfi < cf โˆ’ ฮด2 . By the contradiction assumption, among these (q ) (q ) factors, those that are in RM2 2 โˆ’ RM2 1 can themselves be factored into elements of degree and (q ) (q ) coefficient lower by amount ฮด1 , respectively ฮด2 . I.e., a factor fi โˆˆ RM2 2 โˆ’ RM2 1 can be factored as 16 fi = fi,mi โ—ฆ . . . fi,1 with dfi,j < dfi โˆ’ ฮด1 and cfi,j < cfi โˆ’ ฮด2 ; hence, dfi,j < df โˆ’ 2 ฮด1 and cfi,j < cf โˆ’ 2 ฮด2 , for j = 1, . . . , mi . By repeating this process we keep reducing the degree and the coefficient by at least ฮด1 , respectively ฮด2 , in each step. After a finite number of steps we obtain a factorization of f into (q ) (q ) (q ) functions in RM2 1 , contradicting the assumption that RM2 1 $ RM2 2 . โœท Remark: A finitely generated monoid, like fP, does not contain irreducible functions of arbitrarily large complexity. Indeed, all elements are expressible as a composite of elements of bounded complexity (namely the maximum complexity of the finitely many generators). Acknowledgement: The paper benefitted from the refereeโ€™s thoughtful reading and advice. References [1] J. Berstel, D. Perrin, Theory of Codes, Academic Press (1985). [2] J.C. Birget, โ€œSemigroups and one-way functionsโ€, International J. of Algebra and Computation 25.1-2 (2015) 3-36. [3] J.C. Birget, โ€œPolynomial-time right-ideal morphisms and congruencesโ€, http://arXiv.org/abs/1511.02056 (Nov. 2015). [4] J.C. Birget, โ€œMonoid generalizations of the Richard Thompson groupsโ€, J. of Pure and Applied Algebra 213(2) (2009) 264-278. [5] J.C. Birget, โ€œCircuits, coNP-completeness, and the groups of Richard Thompsonโ€, International J. of Algebra and Computation 16(1) (Feb. 2006) 35-90. [6] J.C. Birget, โ€œThe groups of Richard Thompson and complexityโ€, International J. of Algebra and Computation 14(5,6) (Dec. 2004) 569-626. [7] J.W. Cannon, W.J. Floyd, W.R. Parry, โ€œIntroductory notes on Richard Thompsonโ€™s groupsโ€, Lโ€™Enseignement Matheฬmatique 42 (1996) 215-256. [8] W. Diffie, M. Hellman, โ€œNew directions in cryptographyโ€, IEEE Trans. Information Theory 22.6 (1976) 644-654. [9] D.Z. Du, K.I. Ko, Theory of Computational Complexity, Wiley (2000). [10] O. Goldreich, Foundations of Cryptography: Basic Tools, Cambridge U.P. (2001). [11] L.H. Hemaspaandra, M. Ogihara, The Complexity Theory Companion, Springer (2002). [12] G. Higman, โ€œFinitely presented infinite simple groupsโ€, Notes on Pure Mathematics 8, The Australian National University, Canberra (1974). [13] L. Levin, โ€œThe tale of one-way functionsโ€, Problemy Peredatshi Informatsii 39.1 (2003) 92-103. [14] R. McKenzie, R.J. Thompson, โ€œAn elementary construction of unsolvable word problems in group theoryโ€, in Word Problems, (W. Boone, F. Cannonito, R. Lyndon, editors), North-Holland (1973) pp. 457-478. [15] Ch. Papadimitriou, Computational Complexity, Addison-Wesley (1994). [16] Richard J. Thompson, โ€œEmbeddings into finitely generated simple groups which preserve the word problemโ€, in Word Problems II, (S. Adian, W. Boone, G. Higman, editors), North-Holland (1980) pp. 401-441. 17
4math.GR
Simple Problems The Simplicial Gluing Structure of Pareto Sets and Pareto Fronts arXiv:1709.10377v1 [math.OC] 18 Apr 2017 Naoki Hamada Fujitsu Laboratories Ltd. 4-1-1 Kamikodanaka, Nakahara-ku Kawasaki, Japan [email protected] ABSTRACT 1.2 Related Studies in Other Fields Quite a few studies on real-world applications of multi-objective optimization reported that their Pareto sets and Pareto fronts form a topological simplex. Such a class of problems was recently named the simple problems, and their Pareto set and Pareto front were observed to have a gluing structure similar to the faces of a simplex. This paper gives a theoretical justi๏ฌcation for that observation by proving the gluing structure of the Pareto sets/fronts of subproblems of a simple problem. The simplicity of standard benchmark problems is studied. Theories concerning the easiness of covering solutions have been developed in several optimization-related ๏ฌelds as well as the EMO community. Most of them are studies on topological properties of solution sets. 1.2.1 Contractibility. The earliest work can be found in 1951 by Koopmans [11] Assertion 4.14 in which he applied the linear programming to economics and pointed out some conditions making the Pareto front contractible. Peleg [18] generalized this result and showed that the Pareto front is contractible if the feasible objective region is a convex set. Afterward, the study spread to operations CCS CONCEPTS research, and the closedness, the (arcwise) connectedness, and the โ€ขApplied computing โ†’ Multi-criterion optimization and decisioncontractibility of the Pareto set/front under general settings were making; โ€ขMathematics of computing โ†’ Evolutionary algostudied on linear programming in 1970โ€™s and on (quasi) convex prorithms; Nonconvex optimization; Geometric topology; gramming in 1980โ€™s. These results are collected in Luc [15] Section 6. Recently, similar results were obtained under more general probKEYWORDS lem classes such as the lexicographic quasiconvexity [20] and the multi-objective optimization, continuous optimization, problem class, arcwise cone-quasiconvexity [12]. The (arcwise) connectedness of strati๏ฌcation the Pareto set is a necessary condition that the homotopy method covers the solutions. ACM Reference format: Naoki Hamada. 2017. Simple Problems. In Proceedings of GECCO โ€™17 Companion, Berlin, Germany, July 15-19, 2017, 10 pages. DOI: http://dx.doi.org/10.1145/3067695.3076069 1 INTRODUCTION 1.1 Motivation The success of evolutionary multi-objective optimization (EMO) is widely spreading over various academic and industrial ๏ฌelds. Recent numerical studies showed that decomposition-based EMO algorithms such as MOEA/D [33], NSGA-III [3], and AWA [6โ€“8, 24, 25] have an ability to approximate the entire Pareto set and Pareto front of many-objective problems. In contrast to their abundance of experimental successes, the theory shedding light on why they work is still under developing. Especially, the problem class in which decomposition-based EMO algorithms can cover the entire Pareto set/front has not been understood. This paper discusses some problem class in which solutions are well-behaved for scalarization. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for pro๏ฌt or commercial advantage and that copies bear this notice and the full citation on the ๏ฌrst page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). GECCO โ€™17 Companion, Berlin, Germany ยฉ 2017 Copyright held by the owner/author(s). 978-1-4503-4939-0/17/07. . . $15.00 DOI: http://dx.doi.org/10.1145/3067695.3076069 1.2.2 Decomposition. The decomposition approach considers not only a given problem but also its subproblems each optimizing a subset of objective functions and studies the relation among their solutions. Lowe et al. [14] in 1984 showed that the weak Pareto set of a convex programming is the union of the Pareto sets of subproblems. Malivert et al. [16] extended the result to explicitly quasiconvex upper semicontinuous functions. Popovici [19] named this property the Pareto reducible and gave a su๏ฌƒcient condition independent of convexity. Ward [32] showed that the strictly Pareto solutions to a convex programming problem are completely surrounded by the Pareto solutions of subproblems. Recent studies [12, 20, 21] revealed that the Pareto reducibility of the lexicographic quasiconvex programming problem is closely related to the contractibility, through the simply shadiness [1] of the Pareto front. 1.2.3 Stratification. From pure mathematics, the singularity theory of di๏ฌ€erentiable maps gives a decomposition of solutions. In 1973, Smale [26] applied this theory to an economic problem and stated that the Pareto set of a pure exchange economy of m agents is homeomorphic to an (m โˆ’ 1)-simplex, provided the quasiconvexity and monotonicity of the agentsโ€™ utility functions. Lovison et al. [13] pointed out that each face of this simplex corresponds to the Pareto set of each subproblem optimizing a subset of objective functions. In Smale [26] and its sequels [27โ€“31], he discussed the strati๏ฌcation of Pareto critical points of generic maps GECCO โ€™17 Companion, July 15-19, 2017, Berlin, Germany N. Hamada with the transversality and rank assumption of derivatives. de Melo [2] showed that the C โˆž -maps whose Pareto critical points admit a strati๏ฌcation are generic, i.e., they form a dense subset of the space of C โˆž -maps under the Whitney topology. Recently, Lovison et al. [13] collected related works to this approach and further developed de Meloโ€™s result, and showed that local Pareto sets of su๏ฌƒciently proper maps admit a Whitney strati๏ฌcation. 1.3 Our Approach These attempts are going on in two courses: the linear/convex analysis originated by Koopmans and the global analysis by Smale. The former seems much restrictive for the global optimization nature of EMO algorithms. The latter approach is su๏ฌƒciently general but currently hard to compute. We need a handy theory for understanding the behavior of EMO algorithms. Recently, Hamada et al. [8] de๏ฌned a class of problems called the simple problem. They pointed out, without rigorous proofs, that the Pareto set and Pareto front of a simple problem are both homeomorphic to a simplex and the faces of the simplex correspond to the Pareto sets and their images of the subproblems. They also discussed that this property is closely related to scalarization. This paper gives rigorous proofs for their arguments. 1.4 Contribution (1), and the evaluation map f , depending on the context. We call the empty set โˆ… a 0-objective problem and de๏ฌne its evaluation map as the empty map โˆ… : โˆ… โ†’ R0 to a one-point set R0 = {0}. For problems f , ะด such that ะด โІ f as sets, we say that ะด is a subproblem of f and f is a superproblem of ะด. We call the set of all subproblems of a problem f the decomposition of f and denote by 2 f = {ะด | ะด โІ f }. If solutions x, y โˆˆ X to a problem f satisfy the conditions โˆ€fi โˆˆ f , fi (x) โ‰ค fi (y) and โˆƒf j โˆˆ f , f j (x) < f j (y), then we say that x f -dominates y and denote it by x โ‰บ f y. We denote f (x) = f (y) by x = f y and (x โ‰บ f y) โˆจ (x = f y) by x  f y. If a solution x โˆ— โˆˆ X to a problem f satis๏ฌes โˆ€x โˆˆ X , x 6โ‰บ f x โˆ— , then x โˆ— is called a Pareto solution to f . The set of all Pareto solutions of a problem f = { f 1 , . . . , fm } is called the Pareto set, denoted by X โˆ— (f ) or X โˆ— (f 1 , . . . , fm ). The image of X โˆ— (f ) by a map ะด is denoted by ะดX โˆ— (f ). Especially, the image f X โˆ— (f ) is called the Pareto front. Through the paper, we abbreviate the composition of mapsฯˆ โ—ฆฯ• toฯˆฯ•. The above notation, ะดX โˆ— , can be considered as ะด โ—ฆ X โˆ— by regarding X โˆ— as a map X โˆ— : 2 F โ†’ 2X . In this paper, we give a proof that the boundary of the Pareto set (resp. Pareto front) of a simple problem is the union of the interior of the Pareto sets (resp. their images) of subproblems. This property enables us to numerically compute a strati๏ฌcation of the Pareto set/front. Additionally, we investigate the simplicity of benchmark problems widely-used in the EMO community: all problems in ZDT suite [34] and DTLZ suite [4] are non-simple, ๏ฌve of problems in WFG suite [10] can be simple under a very restrictive situation, and MED problem [7] is always simple. 3 SIMPLE PROBLEM 1.5 First, we present the de๏ฌnition of simple problem and its graphical intuition. Contents The rest of the paper is organized as follows. Section 2 prepares basic notions and notations used in subsequent sections. Section 3 gives some properties of solutions to simple problems and their relation to scalarization. Section 4 discusses the simplicity of existing benchmark problems. Section 5 gives conclusions and remarks for future work. 2 PRELIMINARIES This paper considers the following n-variable m-objective problem: minimize f (x) = (f 1 (x), . . . , fm (x)) n x โˆˆX โІR : Rn โ†’ (1) where we call f Rm the evaluation map, fi : Rn โ†’ R (i = 1, . . . ,m) the i-th objective function, Rn the variable space, X โІ Rn the feasible region, x โˆˆ Rn a solution, Rm the objective space, and f (x) โˆˆ Rm an evaluation value. We will make various problems by removing some of objective functions from (1) and discuss a gluing structure of their solutions. To write such arguments clearly, we de๏ฌne the problem as a ๏ฌnite set of objective functions F = {f 1 , . . . , fm } and regard (1) as a notation for it. We abuse f to denote the problem F , the equation This section introduces the de๏ฌnition of simple problem and shows its solution structure. Section 3.1 presents the de๏ฌnition of simple problem. Section 3.2 shows some inclusion properties of solutions among subproblems. Section 3.3 shows that those solutions have the gluing structure of a topological simplex. Section 3.4 points out that this gluing structure enables decomposition-based EMO algorithms to cover the Pareto set and Pareto front. 3.1 De๏ฌnition De๏ฌnition 3.1 (simple problem [8]). A problem f is simple or has simplicity if every subproblem ะด โˆˆ 2 f satis๏ฌes the following conditions: (S1) X โˆ— (ะด) โ‰ˆ โˆ†kโˆ’1 if ะด is k-objective, (S2) ะด|X โˆ— (ะด) : X โˆ— (ะด) โ†’ Rk is an embedding. n o ร Here, โˆ†kโˆ’1 = (x 1 , . . . , xk ) โˆˆ [0, 1]k | xi = 1 is the standard (k โˆ’ 1)-simplex. By A โ‰ˆ B, we denote that topological spaces A and B are homeomorphic, which is de๏ฌned as there are continuous maps ฯˆ : A โ†’ B and ฯ• : B โ†’ A such that ฯ•ฯˆ = idA and ฯˆฯ• = idB . Such maps, ฯˆ and ฯ•, are called homeomorphisms. The topology of X โˆ— (ะด) is induced from the variable space Rn . That is, any open set U in X โˆ— (ะด) can be written as U = V โˆฉ X โˆ— (ะด) with some open set V in Rn under the Euclidean topology. Similarly, all spaces discussed in this paper are implicitly equipped with induced topologies from either the variable space Rn or the objective space Rm . By ฯ•|Aโ€ฒ : Aโ€ฒ โ†’ B, we denote the restriction of a map ฯ• : A โ†’ B to a set Aโ€ฒ โІ A, which is the composite ฯ•ฮน : Aโ€ฒ โ†’ B with the inclusion map ฮน : Aโ€ฒ ึ’โ†’ A, a 7โ†’ a. The embedding of A to Simple Problems GECCO โ€™17 Companion, July 15-19, 2017, Berlin, Germany X*(f1, f2, f3) 2 f1(x) f2(x) 1.5 minimize x 1 , x 2 โˆˆ[โˆ’2, 2] 1 RGB(x ) = (y1 (x ), y2 (x ), y3 (x ))    ( (f i โˆˆ ะด) f i โˆ’ f i (x ) / f i โˆ’ f i yi (x ) = 0 (f i < ะด)  f i = max f i (x ) | x โˆˆ X โˆ— (ะด) + 1e-16  f i = min f i (x ) | x โˆˆ X โˆ— (ะด) f3(x) 0.5 + 3(x 2 โˆ’ 1)2 x 12 x2 f 1 (x ) = x 22 f 2 (x ) = 2(x 1 โˆ’ 1)2 + 0 -0.5 -1 f 3 (x ) = 3(x 1 + 1)2 + 2(x 2 + 1)2 -1.5 -2 -2 -1.5 -1 -0.5 0 0.5 1 1.5 2 x1 X*(f1, f2) 2 1.5 1.5 0.5 0.5 0.5 x2 1 -0.5 0 -0.5 -1 -1 -1 -1.5 -1.5 -2 -2 -1.5 -1 -0.5 0 0.5 1 1.5 2 -2 -2 -1.5 -1 -0.5 x1 0 0.5 1 1.5 2 -2 1.5 1.5 0.5 0.5 -0.5 x2 0.5 x2 1 0 0 -0.5 -1 -1 -1.5 -1.5 -2 0 0.5 1 1.5 2 1 1.5 2 X*(f3) f3(x) 0 -1 -0.5 0.5 -0.5 -1.5 -2 0 1.5 1 -1 -0.5 2 f2(x) 1 -1.5 -1 x1 X*(f2) 2 f1(x) -2 -1.5 x1 X*(f1) 2 x2 0 -0.5 -1.5 -2 f1(x) f3(x) 1.5 1 0 X*(f3, f1) 2 f2(x) f3(x) 1 x2 x2 X*(f2, f3) 2 f1(x) f2(x) -2 -2 -1.5 -1 x1 -0.5 0 x1 0.5 1 1.5 2 -2 -1.5 -1 -0.5 0 0.5 1 1.5 2 x1 Figure 1: A simple 3-objective problem f = { f 1 , f 2 , f 3 } and its subproblem ะดโ€™s Pareto set X โˆ— (ะด). The Pareto sets are colored by converting the f 1 , f 2 , f 3 -coordinates to RGB using the equations in the top-right cell. are homeomorphic to โˆ†0 , a point! A map on a one-point set always satis๏ฌes (S2); there is no special implication. Finally, there is a 0-objective problem (not shown in Fig. 1) that corresponds to the Let us cultivate the intuitive understanding of this de๏ฌnition case of no objective function. This is just required for formality. with Fig. 1. When considering a simple problem, we also deal with Note that the conditions (S1) and (S2) only impose the problem its subproblems optimizing all subsets of given objective functions. structure within the Pareto set and admit an arbitrary structure The ๏ฌrst subproblem is the original problem itself optimizing all out of the Pareto set. This is contrastive to conventional probthe objectives. The example in the ๏ฌgure is 3-objective, and the lem classes such as linear/convex/polynomial programming probcondition (S1) imposes that its Pareto set, X โˆ— (f 1 , f 2 , f 3 ), is homeolems which regulate their structures over the entire domain. The morphic to โˆ†2 , a surface created by bending and stretching a trisimplicity is independent of those problem classes. In fact, evangle (without cutting and connecting). The condition (S2) guarery class of linear/convex/polynomial programming problems conantees that the restricted evaluation map f : X โˆ— (f 1 , f 2 , f 3 ) โ†’ tains both of simple problems and non-simple problems! As a ref X โˆ— (f 1 , f 2 , f 3 ) and its inverse map f โˆ’1 : f X โˆ— (f 1 , f 2 , f 3 ) โ†’ X โˆ— (f 1 , f 2 , f 3 ) sult, the simplicity characterizes a new aspect of โ€œeasiness to solveโ€. are bijective, continuous, and thus homeomorphisms. This implies 3.2 Inclusion Properties that the Pareto front, f X โˆ— (f 1 , f 2 , f 3 ), is also homeomorphic to โˆ†2 , and every point on f X โˆ— (f 1 , f 2 , f 3 ) continuously corresponds to a This section shows inclusion relations of the Pareto sets and its unique solution on X โˆ— (f 1 , f 2 , f 3 ) and vice versa. Next, we remove images for subproblems of a simple problem. To isolate the conone of objectives, resulting in three 2-objective subproblems. Their sequence of assuming the simplicity from general properties of Pareto sets, X โˆ— (f 1 , f 2 ), X โˆ— (f 2 , f 3 ), X โˆ— (f 3 , f 1 ), are homeomorphic to Pareto-optimality, we begin without the assumption. โˆ†1 by (S1), a curve without loops. By (S2), their Pareto fronts are Proposition 3.2. For any problem f (possibly non-simple) and also a curve in which each point continuously corresponds to a any subproblem ะด โІ f , the following relations hold: unique Pareto solution. Again removing an objective, we get three X โˆ— (ะด) โІ X w (ะด) โІ X w (f ) 1-objective subproblems. Their Pareto sets, X โˆ— (f 1 ), X โˆ— (f 2 ), X โˆ— (f 3 ), B is the composite ฮนฯ• : A โ†’ B of a homeomorphism ฯ• : A โ†’ B โ€ฒ and the inclusion map ฮน : B โ€ฒ ึ’โ†’ B. GECCO โ€™17 Companion, July 15-19, 2017, Berlin, Germany N. Hamada where X w (ะด) is the weak Pareto set of ะด, that is, the set of points each x โˆˆ X satisfying โˆ€y โˆˆ X , โˆƒfi โˆˆ ะด : fi (x) โ‰ค fi (y). (2) Proof. The ๏ฌrst inclusion, X โˆ— (ะด) โІ X w (ะด), is a well-known fact (see, for example, Miettinen [17] Section 2.5). The second relation, X w (ะด) โІ X w (f ), directly follows from (2).  In the de๏ฌnition of simplicity, the conditions (S1) and (S2) are imposed on all subproblems as well as a given problem, which means that the subproblems inherit the simplicity from the superproblem. Proposition 3.7. If a problem f is simple, then any subproblem ะด โІ f is simple. Proof. If ะด โІ f , then 2ะด โІ 2 f . Thus, if all the problems in 2 f satisfy (S1) and (S2), then also do in 2ะด , which implies that if f is simple, then ะด is.  However, it does not hold that X โˆ— (ะด) โІ X โˆ— (f ) in general. Example 3.3. Consider a 1-variable 2-objective problem minimize f 1 (x) = 0, f 2 (x) = x. x โˆˆ[0, 1] Clearly, the Pareto sets are X โˆ— (f 1 ) = [0, 1] and X โˆ— (f 1 , f 2 ) = {0}, which implies X โˆ— (f 1 ) * X โˆ— (f 1 , f 2 ). In contrast, simple problems do not have such ill-behaved solutions. Proposition 3.4. If a problem f is simple, then X w (f ) = X โˆ— (f ). Proof. From Proposition 3.2, we have X w (f ) โЇ X โˆ— (f ). We will prove X w (f ) โІ X โˆ— (f ) by contradiction. Suppose that a point x โˆˆ X w (f ) \ X โˆ— (f ) exists. Then, since x is weakly Pareto-optimal, the condition โˆ€y โˆˆ X , โˆƒfi โˆˆ f : fi (x) โ‰ค fi (y) (3) holds. On the other hand, since x is not Pareto-optimal, the condition โˆƒy โˆˆ X \ {x } , โˆ€fi โˆˆ f : fi (y) โ‰ค fi (x) (4) holds. A point y in (4) should satisfy (3), which means โˆƒfi โˆˆ f : fi (y) = fi (x). By (3), we have x โˆˆ X โˆ— (fi ) and thus y โˆˆ X โˆ— (fi ). This contradicts (S2); more speci๏ฌcally, fi cannot be an injection on X โˆ— (fi ).  Therefore, the simplicity ensures the inclusion relationship of Pareto sets. Proposition 3.5. For a simple problem f and any subproblem ะด โІ f , it holds that X โˆ— (ะด) โІ X โˆ— (f ). Proof. Combine Proposition 3.2 with Proposition 3.4. Therefore, propositions that hold for a simple problem also hold for its subproblems. For example, the actual assertion of Proposition 3.4 is that any subproblem of f , as well as f itself, does not have a weakly Pareto-optimal point which is not Pareto-optimal. The interpretation of Proposition 3.6 is bit more complicated: given a simple problem h, the assertion holds for any pair of problems f , ะด such that ะด โІ f โІ h. Henceforth, we will not repeat this property, but it is always valid when propositions involve simple problems. Similarly to that the empty set is a subset of every set, a 0objective problem is a subproblem of every problem. Therefore, if 0-objective problems do not exist or are not simple, then there cannot exist any simple problem. Let us check them. Proposition 3.8. There exists a 0-objective problem โˆ…; it is unique and simple. Proof. The existence and the uniqueness follow from those of the empty set and empty map. Let us check the simplicity. Since the only subproblem of โˆ… is โˆ… itself, it su๏ฌƒces to show that โˆ… satis๏ฌes (S1) and (S2). (S1): Since โˆ… is the 0-objective problem, it su๏ฌƒces to show X โˆ— (โˆ…) โ‰ˆ โˆ’1 โˆ† . It holds indeed as โˆ†โˆ’1 = โˆ… and X โˆ— (โˆ…) = โˆ…. (S2): By X โˆ— (โˆ…) = โˆ…, the restricted evaluation map, โˆ…|X โˆ— (โˆ…) : โˆ— X (โˆ…) โ†’ R0 , is the evaluation map โˆ… : โˆ… โ†’ R0 itself. Since โˆ… : โˆ… โ†’ R0 can be decomposed into a homeomorphism id : โˆ… โ†’ โˆ… and an inclusion map ฮน : โˆ… ึ’โ†’ R0 as โˆ… = ฮนid, the restriction โˆ…|X โˆ— (โˆ…) : X โˆ— (โˆ…) โ†’ R0 is an embedding.   Using this fact, we can see the topology of the image of the Pareto set. Although, the condition (S1) itself addresses only the topology of the Pareto set, combined with (S2), we show that the Pareto front and the image in the superproblem have the same topology. Now we have con๏ฌrmed that for each subproblem, the Pareto set and its image are well-behaved. The next section investigates that those solutions are nicely glued together. Proposition 3.6. For a simple problem f and any subproblem ะด โІ f , if ะด is k-objective, then The goal of this section is to give a proof that the solutions to a simple problem have a special gluing structure as shown in Figs. 2 and 3. This structure is an analogy of the faces of a simplex. A 2-simplex [v 1 ,v 2 , v 3 ] is a triangle spanned by vertices v 1 ,v 2 ,v 3 and its boundary โˆ‚[v 1 ,v 2 ,v 3 ] is the union of three edges, or 1simplices, [v 1 ,v 2 ], [v 2 , v 3 ], [v 3 ,v 1 ]. Each edge [vi , v j ] has the boundary consisting of two points, or 0-simplices, [vi ] and [v j ]. The boundary of each vertex [vk ] is the empty set, or the (โˆ’1)-simplex. We can expand these relations using A = int A โŠ” โˆ‚A and see that the boundary of a simplex is expressed as the disjoint union of the X โˆ— (ะด) โ‰ˆ ะดX โˆ— (ะด) โ‰ˆ f X โˆ— (ะด) โ‰ˆ โˆ†kโˆ’1 . Proof. By De๏ฌnition 3.1, X โˆ— (ะด) โ‰ˆ ะดX โˆ— (ะด) โ‰ˆ โˆ†kโˆ’1 is evident. We will show the nontrivial part: X โˆ— (ะด) โ‰ˆ f X โˆ— (ะด). It su๏ฌƒces to show that the restriction f |X โˆ— (ะด) is an embedding. Remember that the restriction f |X โˆ— (f ) is an embedding by de๏ฌnition and X โˆ— (ะด) โІ X โˆ— (f ) in Proposition 3.5. In general, any restriction of an embedding is again an embedding.  3.3 Gluing Properties Simple Problems GECCO โ€™17 Companion, July 15-19, 2017, Berlin, Germany open faces: X*( f3) โˆ‚[v 1 ,v 2 ,v 3 ] = int[v 1 ,v 2 ] โŠ” int[v 2 ,v 3 ] โŠ” int[v 3 ,v 1 ] X*( f2, f3) โŠ” int[v 1 ] โŠ” int[v 2 ] โŠ” int[v 3 ]. Generally, Pareto sets and their images may have a more complex topological structure. However, for a simple problem, we have seen in Proposition 3.6 that those form topological manifolds with boundary (hereafter, simply call manifolds) homeomorphic to a simplex. In a k-manifold M, a point having an open neighborhood homeomorphic to Rk is called an interior point, and the set of all interior points is called the interior of M, denoted by int M. The other points are boundary points having an open neighborhood homeomorphic to [0, โˆž) ร— Rkโˆ’1 , and the set of all boundary points is called the boundary of M, denoted by โˆ‚M. For a simple problem, a similar relation holds among Pareto sets as shown in Fig. 2: โˆ‚X โˆ— (f 1 , f 2 , f 3 ) = int X โˆ— (f 1 , f 2 ) โŠ” int X โˆ— (f 2 , f 3 ) โŠ” int X โˆ— (f 3 , f 1 ) โŠ” int X โˆ— (f 1 ) โŠ” int X โˆ— (f 2 ) โŠ” int X โˆ— (f 3 ). (5) X*( f3, f1) X*( f1, f2, f3) X*( f2) X*( f1 , f2) X*( f1) Figure 2: A simple 3-objective problem f = {f 1 , f 2 , f 3 } and its gluing structure of the Pareto sets X โˆ— (ะด) of subproblems ะด โІ f . The boundary of the Pareto set X โˆ— (ะด) of each subproblem ะด โІ f consists of the Pareto sets X โˆ— (h) of all subproblems h โŠ‚ ะด. fX*( f2) fX*( f1 , f2) The same relation holds for the images as shown in Fig. 3: fX*( f1) โˆ‚ f X โˆ— (f 1 , f 2 , f 3 ) = int f X โˆ— (f 1 , f 2 ) โŠ” int f X โˆ— (f 2 , f 3 ) โŠ” int f X โˆ— (f 3 , f 1 ) โŠ” int f X โˆ— (f 1 ) โŠ” int f X โˆ— (f 2 ) โŠ” int f X โˆ— (f 3 ). fX*( f1, f2, f3) (6) It is known that such a gluing structure of solutions commonly appears in facility location problems, studied for a long time (see for example Rodrฤฑฬguez-Chฤฑฬa et al. [22] and the references therein). It is also seen in other applications and exploited as a heuristic for practitioners [5]. Now we start to show (5) and (6) for an arbitrary number of objectives. First of all, let us see some basic properties of the Pareto front that hold for any class of problems. Lemma 3.9. For an m-objective (possibly non-simple) problem f whose Pareto front f X โˆ— (f ) forms an (m โˆ’ 1)-manifold, the projection   Rm โ†’ Ri โˆ’1 ร— {0} ร— Rmโˆ’i โ‰ƒ Rmโˆ’1 , ฯ€โˆ’i : (y1 , . . . , ym ) 7โ†’ (y1 , . . . , yi โˆ’1, 0, yi +1, . . . , ym ) restricted to int f X โˆ— (f ) is an embedding. Proof. Generally, any projection and its restriction to any open set are continuous and open, and any injective continuous open map is an embedding. Thus, it su๏ฌƒces to show that ฯ€โˆ’i is injective when restricted to int f X โˆ— (f ). If ฯ€โˆ’i |int f X โˆ— (f ) is not injective, then int f X โˆ— (f ) contains two points having the same coordinates except for the i-th value. This means that one point f -dominates another, contradicting the de๏ฌnition of the Pareto front f X โˆ— (f ).  This lemma asserts that the interior of the Pareto front can be ๏ฌ‚attened while keeping its topology and ordering. As shown in Fig. 4, the projection induces a coordinate neighborhood (ฯ€โˆ’i , U ) at any point y โˆˆ int f X โˆ— (f ) where for any points y, y โ€ฒ โˆˆ U , it holds that y j โ‰ค y jโ€ฒ โ‡” ฯ€โˆ’i (y)j โ‰ค ฯ€โˆ’i (y โ€ฒ)j for all j , i. This property is the key to investigate the interaction between the topology and the dominance-ordering on the interior of the Pareto front. fX*( f2, f3) fX*( f3, f1) fX*( f3) Figure 3: A simple 3-objective problem f = {f 1 , f 2 , f 3 } and its gluing structure of the Pareto set images f X โˆ— (ะด) for all subproblems ะด. Although the shape is di๏ฌ€erent from Fig. 2, the topology is the same. Lemma 3.10. Consider an m-objective (possibly non-simple) problem f whose Pareto front f X โˆ— (f ) forms an (m โˆ’ 1)-manifold. The following statement holds for any y โˆˆ int f X โˆ— (f ): any neighborhood U โІ f X โˆ— (f ) of y has a point that ะด-dominates y and is (f \ ะด)dominated by y for each ะด such that โˆ… โŠ‚ ะด โŠ‚ f . Proof. By Lemma 3.9, the projection ฯ€โˆ’i restricted to f X โˆ— (f ) is an embedding, and thus ฯ€โˆ’i (U ) is a neighborhood of a point ฯ€โˆ’i (y) in Rmโˆ’1 . Then, we can take an (m โˆ’ 1)-hyper-cube centered at ฯ€โˆ’i (y) in f X โˆ— (f ) and can write its vertices as (y1 ยฑ ฮต, . . . , yi โˆ’1 ยฑ ฮต,yi +1 ยฑ ฮต, . . . , ym ยฑ ฮต). Here, ฮต is a small positive number and signs, ยฑ, run over all possible combinations. Among these vertices, let ฯ€โˆ’i (v) be the one such that coordinates related to ะด โІ f โˆ’i = f \ { fi } are โˆ’ฮต and related to f โˆ’i \ ะด are +ฮต. Thus, it holds that y โ‰ปะด v and y โ‰บ(f โˆ’i \ะด) v. Especially, ะด = f โˆ’i implies y โ‰บfi v and ะด = โˆ… implies y โ‰ปfi v. Otherwise, it means that y โ‰บ f v or y โ‰ป f v, contradicting y,v โˆˆ f X โˆ— (f ). Repeating the above argument for all i, we complete the proof.  GECCO โ€™17 Companion, July 15-19, 2017, Berlin, Germany ฯ€-1 ฯ€-2 1 0.5 f3 fX*(f) 0 U ฯ€-3 0 y 0.2 0.4 0.6 0 0.2 0.4 f2 f1 0.8 0.6 0.8 1 1 Figure 4: A 3-objective (possibly non-simple) problem f = { f 1 , f 2 , f 3 } and its Pareto front projections. The projection ฯ€โˆ’i restricted to int f X โˆ— (f ) is injective and thus an embedding. By this fact, any interior point y and its neighborhood U in f X โˆ— (f ) are mapped to an interior point ฯ€โˆ’i (y) and its neighborhood ฯ€โˆ’i (U ) in ฯ€โˆ’i f X โˆ— (f ). Other than the Pareto front f X โˆ— (f ), do Lemmas 3.9 and 3.10 extend to the Pareto set image f X โˆ— (ะด) of a subproblem ะด โŠ‚ f ? The answer is NO: for general problems, the projection ฯ€โˆ’i is not an embedding of int f X โˆ— (ะด). Example 3.11. Again consider the problem in Example 3.3: minimize f 1 (x) = 0, f 2 (x) = x. x โˆˆ[0, 1] The Pareto set of the subproblem f 1 is X โˆ— (f 1 ) = [0, 1], and its image is f X โˆ— (f 1 ) = {(0, y) | 0 โ‰ค y โ‰ค 1}. The interior int f X โˆ— (f 1 ) = {(0, y) | 0 < y < 1} can be projected to ฯ€โˆ’2 int f X โˆ— (f 1 ) = f 1X โˆ— (f 1 ) = {0}, which implies ฯ€โˆ’2 |int f X โˆ— (f1 ) is not injective and thus not an embedding. Furthermore, since X โˆ— (f 1 , f 2 ) = {0}, we see that the set X โˆ— (f 1 ) \ X โˆ— (f 1 , f 2 ) = (0, 1] is weakly Pareto-optimal and not Pareto-optimal in f . The existence of these weak Pareto optima disrupts the injectivity of ฯ€โˆ’2 . Contrary, if the problem is simple, then there are no solutions that are weakly Pareto-optimal and not Pareto-optimal, which enable us to extend Lemmas 3.9 and 3.10 to the image f X โˆ— (ะด). Corollary 3.12. Consider a simple problem f and a subproblem ะด โІ f . The restriction of the projection ฯ€โˆ’i to int f X โˆ— (ะด) is an embedding. Proof. If ฯ€โˆ’i |int f X โˆ— (ะด) is not injective, then int f X โˆ— (ะด) contains two points that have the same coordinates except for the i-th value. This means that f has a weak Pareto solution which is nonPareto, contradicting Proposition 3.4.  Corollary 3.13. Consider a simple problem f and a subproblem ะด โІ f . For any y โˆˆ int f X โˆ— (ะด), the following statement holds: for any neighborhood U โІ f X โˆ— (ะด) of y, there exists a point that h-dominates y and is (ะด \ h)-dominated by y for each h such that โˆ… โŠ‚ h โŠ‚ ะด. N. Hamada Proof. Chose an objective function fi โˆˆ f \ ะด and let the remaining set be f โˆ’i = f \{ fi }. By Corollary 3.12, f X โˆ— (ะด) is mapped to f โˆ’i X โˆ— (ะด) by ฯ€โˆ’i , homeomorphically. Next,  chose another f j โˆˆ f โˆ’i \ะด and let the remainder be f โˆ’i j = f โˆ’i \ f j . Again by Corollary 3.12, f โˆ’i X โˆ— (ะด) is mapped to f โˆ’i j X โˆ— (ะด) by ฯ€โˆ’j , homeomorphically. Though the repeated application of projections as long as it is an embedding, the original Pareto set image is ๏ฌnally mapped to ะดX โˆ— (ะด). Let the composite of used projections ฯ€โˆ’i , ฯ€โˆ’j , . . . be ฯ€โˆ’โˆ— . Generally, the composite of embeddings is again an embedding. Thus, a point y โˆˆ int f X โˆ— (ะด) and its neighborhood U โІ f X โˆ— (ะด) is mapped homeomorphically to a point ฯ€โˆ’โˆ— (y) โˆˆ int ะดX โˆ— (ะด) and its neighborhood ฯ€โˆ’โˆ— (U ) โІ ะดX โˆ— (ะด). Proposition 3.6 asserts ะดX โˆ— (ะด) โ‰ˆ โˆ† |ะด |โˆ’1 , which together with Lemma 3.10 completes the proof.  By this property, we can see the simplicity ensures that Pareto set images of subproblems are located on the boundary of their superproblems. Lemma 3.14. For a simple problem f and subproblems ะด, h such that h โŠ‚ ะด โІ f , the following relation holds: โˆ‚ f X โˆ— (ะด) โЇ f X โˆ— (h). Proof. Suppose there exists a point y โˆˆ f X โˆ— (h) that is an interior point of f X โˆ— (ะด). Now, y โˆˆ int f X โˆ— (ะด) and h โŠ‚ ะด holds and thus by Corollary 3.13, some neighborhood U โІ f X โˆ— (ะด) of y has a point h-dominating y. This contradicts y โˆˆ f X โˆ— (h).  Our next question is whether a similar relation holds for the Pareto set before mapped by f . To check this, we need the following lemma: Lemma 3.15. For a simple problem f and a subproblem ะด โІ f , the map f commutes with the boundary and interior: f โˆ‚X โˆ— (ะด) = โˆ‚ f X โˆ— (ะด), โˆ— โˆ— f int X (ะด) = int f X (ะด). (7) (8) Proof. Generally, an embedding maps boundary to boundary and interior to interior. Now f is an embedding on X โˆ— (ะด) โІ X โˆ— (f ), and thus it holds that f โˆ‚ = โˆ‚ f and f int = int f .  Using this fact, we show that under the simplicity, Pareto sets of subproblems have the same relation as its images. Corollary 3.16. For a simple problem f and a (proper!) subproblem ะด โŠ‚ f , the following relation holds: โˆ‚X โˆ— (f ) โЇ X โˆ— (ะด). Proof. Since f is an embedding on X โˆ— (f ), there is the inverse map f โˆ’1 : f X โˆ— (f ) โ†’ X โˆ— (f ). Lemma 3.15 converts Lemma 3.14 to the assertion as follows: โˆ‚ f X โˆ— (f ) โЇ f X โˆ— (ะด) โ‡” f โˆ‚X โˆ— (f ) โЇ f X โˆ— (ะด) โˆ’1 โ‡” f f โˆ‚X โˆ— (f ) โЇ f โˆ’1 f X โˆ— (ะด) โ‡” โˆ‚X โˆ— (f ) โЇ X โˆ— (ะด).  The last key to the main theorem is the sphere embedding. Lemma 3.17. Every embedding f : S n โ†’ S n is surjective and thus a homeomorphism where S n is an n-sphere S n = x โˆˆ Rn+1 | kx k = 1 . Simple Problems GECCO โ€™17 Companion, July 15-19, 2017, Berlin, Germany Proof. Suppose f is not surjective. Then, there exists a point y โˆˆ S n \ f (S n ) and a stereographic projection with north pole y, denoted by ฯ€ : S n \ {y} โ†’ Rn . Generally, any stereographic projection is an embedding, and the composite of embeddings is an embedding. Therefore, ฯ€ f is an embedding of S n into Rn . This contradicts the well-known fact that S n cannot be embedded into Rn .  Remark 1. To keep the proof elementary, here we assumed that S n ึ’6 โ†’ Rn is known and derived that S n ึ’โ†’ S n is surjective. There is an alternative proof deriving both by the Mayer-Vietoris exact sequence in a uni๏ฌed fashion. Consult Hatcher [9], the two paragraphs after the proof of Proposition 2B.1 (pp. 169โ€“170). Now, we show the goal of this section. Theorem 3.18. For a simple problem f and a subproblem ะด โІ f , it holds that โˆ‚X โˆ— (ะด) = ร„ int X โˆ— (h), (9) h โŠ‚ะด โˆ‚ f X โˆ— (ะด) = ร„ int f X โˆ— (h). Proof. First, we show (10). What to be proven are: (a) if h , h โ€ฒ , then int f X โˆ— (h) โˆฉ int f X โˆ— (h โ€ฒ ) = โˆ…, ร (b) โˆ‚ f X โˆ— (ะด) = h โŠ‚ะด int f X โˆ— (h). (a) When h โŠƒ h โ€ฒ, it holds from Lemma 3.14 that โˆ‚ f X โˆ— (h) โЇ f X โˆ— (h โ€ฒ ). The same holds for the inverse case h โŠ‚ h โ€ฒ. We thus consider the case there is no inclusion relation between h and h โ€ฒ. Assume there exists a point y โˆˆ int f X โˆ— (h) โˆฉ int f X โˆ— (h โ€ฒ ), and let U be a neighborhood ofy in f X โˆ— (h โˆชh โ€ฒ ). If there exists a point z โˆˆ U \ f X โˆ— (h) โˆช f X โˆ— (h โ€ฒ ) , then y โ‰บh z and y โ‰บh โ€ฒ z hold, implying y โ‰บ(hโˆชhโ€ฒ ) z. This contradicts z โˆˆ U โІ f X โˆ— (h โˆช h โ€ฒ ). If z does not exist, then the dimension of U must be equal to that of f X โˆ— (h) or f X โˆ— (h โ€ฒ ), which contradicts dim U = h โˆช h โ€ฒ โˆ’ 1. Consequently, such y cannot exist. (b) Since Lemma 3.14 states โˆ‚ f X โˆ— (ะด) โЇ f X โˆ— (h), we have โˆ‚ f X โˆ— (ะด) โЇ f X โˆ— (h) h โŠ‚ะด โЇ ร˜ From the second to third lines, we used the general property of a map f (A) โˆช f (B) = f (A โˆช B).  3.4 Relation to Scalarization Equations (7)โ€“(10) together de๏ฌne a gluing structure of the Pareto sets and their images of subproblems of a simple problem. This structure induces a natural strati๏ฌcation1 of the Pareto set (resp. the Pareto front) where each stratum is the interior of the Pareto set (resp. its image) of a subproblem. Therefore, we can numerically compute the strati๏ฌcation by solving each subproblem. Points spreading over all strata can be a good covering of the Pareto set/front. To see why this structure enables decomposition-based EMO algorithms to cover the Pareto set/front, consider the weighted Tchebyshev-norm scalarization minimize fw (x) = max wi (fi (x) โˆ’ z i ) (10) h โŠ‚ะด ร˜ We can get (9) by converting (10) with Lamma 3.15: รƒ โˆ‚ f X โˆ— (ะด) = h โŠ‚ะด int f X โˆ— (h) รƒ โˆ— โ‡” f โˆ‚X (ะด) = h โŠ‚ะด f int X โˆ— (h) รƒ โ‡” f โˆ‚X โˆ— (ะด) = f h โŠ‚ะด int X โˆ— (h) โˆ’1 โˆ’1 รƒ โˆ— โ‡” f f โˆ‚X (ะด) = f f h โŠ‚ะด int X โˆ— (h) รƒ โ‡” โˆ‚X โˆ— (ะด) = h โŠ‚ะด int X โˆ— (h). int f X โˆ— (h). h โŠ‚ะด ร Thus, there is the inclusion map ฮน : h โŠ‚ะด int f X โˆ— (h) ึ’โ†’ โˆ‚ f X โˆ— (ะด). Generally, any inclusion map is an embedding. Combining (a) with Lemma 3.14, we have f X โˆ— (h) โˆฉ f X โˆ— (h โ€ฒ ) = f X โˆ— (h โˆฉ h โ€ฒ ). Therefore, ร โˆ— h โŠ‚ะด int f X (h) is the union of manifolds each homeomorphic to a simplex, which are glued as the faces of a simplex. This fact enร sures h โŠ‚ะด int f X โˆ— (h) โ‰ˆ โˆ‚โˆ† |ะด |โˆ’1 โ‰ˆ S |ะด |โˆ’2 . Contrary, f X โˆ— (ะด) โ‰ˆ โˆ† |ะด |โˆ’1 implies โˆ‚ f X โˆ— (ะด) โ‰ˆ โˆ‚โˆ† |ะด |โˆ’1 โ‰ˆ S |ะด |โˆ’2 . As Lemma 3.17 ensures that S n ึ’โ†’ S n is surjective, the inclusion map ฮน is surjective, ร implying that h โŠ‚ะด int f X โˆ— (h) = โˆ‚ f X โˆ— (ะด) holds. i x โˆˆX (11) where the weight w = (w 1 , . . . , wm ) is chosen from โˆ†mโˆ’1 and the utopian point is ๏ฌxed to be z i = inf x โˆˆX fi (x). Let ei be the i-th standard base in Rm whose i-th coordinate is one and the other coordinates are zero. The standard (m โˆ’ 1)-simplex is rewritten as โˆ†mโˆ’1 = [e 1 , . . . , em ]. Using the notation of the weight-optima correspondence ร˜ X โˆ— (fw ), S(W ) = w โˆˆW a well-known fact of the optima to (11) can be written as S([ei 1 , . . . , ei k ]) = X w (fi 1 , . . . , fi k ) (12) for any choice of an arbitrary number of indices i 1 , . . . , i k โˆˆ {1, . . . ,m}. If the problem is simple, then we can go further: Proposition 3.4 extends (12) to S([ei 1 , . . . , ei k ]) = X โˆ— (fi 1 , . . . , fi k ), and by Corollary 3.16 we have S(โˆ‚[ei 1 , . . . , ei k ]) = โˆ‚X โˆ— (fi 1 , . . . , fi k ). Therefore, a weight on each face gives a boundary point of each stratum with corresponding indices. Unfortunately, the Lโˆž -norm, as well as other existing scalarization methods including the weighted sum, the augmented Chebyshevnorm, PBI [33], and IPBI [23], does NOT give the correspondence between the interiors: S(int[ei 1 , . . . , ei k ]) , int X โˆ— (fi 1 , . . . , fi k ). Nevertheless, once boundary points of a stratum are obtained, we can ๏ฌnd new weights corresponding to interior points of the stratum by interpolating the weights used for the boundary points. Thus, the grid arrangement or divide-and-conquer generation of weights over [ei 1 , . . . , ei k ] practically often hit interior points of X โˆ— (fi 1 , . . . , fi k ). 1 The smoothness of the strati๏ฌcation is determined from that of the evaluation map. GECCO โ€™17 Companion, July 15-19, 2017, Berlin, Germany 4 SIMPLICITY OF BENCHMARKS This section investigates the simplicity of benchmark problems widely-used in the EMO community: ZDT suite [34], DTLZ suite [4], WFG suite [10], and MED problem [7]. 4.1 N. Hamada Proof. Every problem has an objective function ignoring some variables as follows: DTLZ1โ€“6: fm (y, z) = (1 + ะด(z))f (y1 ) DTLZ7: f 1 (y, z) = y1 DTLZ8, 9: f 1 (y, z) = y10.1 + y20.1 + ยท ยท ยท + y 0.1 โŒŠn/m โŒ‹ ZDT Suite The ZDT suite has six n-variable 2-objective problems named ZDT1โ€“ 6. The decision variables are split into the position variables y = (y1 , . . . , yk ) (0 < k < n) and the distance variables z = (z 1 , . . . , z l ) (l = n โˆ’ k), de๏ฌning the problems in the following uni๏ฌed format: minimize f (y, z) = (f 1 (y, z), f 2 (y, z)), Therefore, DTLZ1โ€“9 are all non-simple.  Furthermore, Huband et al. [10] Table VII shows that DTLZ1โ€“6 has f that is not injective on X โˆ— (f ) and DTLZ7 has a disconnected Pareto front. This is another evidence for the non-simplicity of DTLZ1โ€“7. (y,z)โˆˆY ร—Z 4.3 WFG Suite where f 1 (y, z) = f (y1 ), f 2 (y, z) = ะด(z)h(f 1 (y),ะด(z)), The WFG suite contains nine problems, WFG1โ€“9, having the form: minimize f (x) = (f 1 (x), . . . , fm (x)), X = Y ร— Z = (Y1 ร— ยท ยท ยท ร— Yk ) ร— (Z 1 ร— ยท ยท ยท ร— Zl ), Y1 = [0, 1], ( [โˆ’5, 5] Y2 , . . . , Yk , Z 1 , . . . , Zl = [0, 1] (y,z)โˆˆY ร—Z where fi (x) = xm + 2i ร— hi (x 1 , . . . , xmโˆ’1 ),  Y โ†’ X 1 ร— ยท ยท ยท ร— Xmโˆ’1 , tY : (y1, . . . , yk ) 7โ†’ (x 1 , . . . , xmโˆ’1 ),  Z โ†’ Xm , tZ : (z 1, . . . , z l ) 7โ†’ xm , (ZDT4), (otherwise). Users can make di๏ฌ€erent problems by changing placeholder functions f , ะด, h. For the concrete speci๏ฌcation of f , ะด, h for ZDT1โ€“6, see Zitzler et al. [34]. The above general formulas are enough to show that the problems are non-simple. X = X 1 ร— ยท ยท ยท ร— Xm = [0, 1]m , Y = [0, 2] ร— [0, 4] ร— ยท ยท ยท ร— [0, 2k], Z = [0, 2k + 2] ร— [0, 2k + 4] ร— ยท ยท ยท ร— [0, 2n]. Theorem 4.1. ZDT1โ€“6 are all non-simple, independent of the choice of variable dimension n and position-variable dimension k. Additionally, this suite cannot create simple problems no matter how f , ะด, h are speci๏ฌed unless their domains are modi๏ฌed. Proof. First, we exclude ZDT5 from the following analysis since it is a binary-variable problem which is clearly non-simple. Then, for ZDT1โ€“4, 6, the function f de๏ฌning f 1 depends on a single variable, y1 . The other variables can take an arbitrary value on the optima of f , and thus X โˆ— (f 1 ) = Y1โˆ— (f ) ร— Y2 ร— ยท ยท ยท ร— Yk ร— Z . This means X โˆ— (f 1 ) 6โ‰ˆ โˆ†0 and contradicts the simplicity condition (S1). Consequently, ZDT1โ€“6 are all non-simple.  The reason why this suite cannot be simple is that f depends only on y1 . Generally, when the problem has an objective function independent of some variables, its Pareto set extends to higher dimensions than usual, contradicting the simplicity condition (S1). The existence of unused variables is a quick test for non-simplicity. 4.2 DTLZ Suite The DTLZ suite consists of nine problems named DTLZ1โ€“9. Their decision variables are split into position variables y and distance variables z, as ZDT, but the number of objectives m can be set arbitrarily. See Deb et al. [4] for de๏ฌnition. Theorem 4.2. DTLZ1โ€“9 are all non-simple, independent of the choice of variable dimension n, objective dimension m, and positionvariable dimension k. The functions h 1 , . . . , hm , tY , t Z are placeholders. In this suite, the variables y and z are mapped by the transformation functions tY and t Z to the position variables x 1 , . . . , xmโˆ’1 and the distance variable xm , then passed to the objective functions fi . For this reason, y and z are called the position-related variables and the distancerelated variables, respectively. For the concrete de๏ฌnition, see Huband et al. [10]. Theorem 4.3. WFG2, 4, 5, 9 are always non-simple. WFG1, 3, 6โ€“8 are simple if and only if the dimension of the position-related variables y is k = 1. Here, one can set k = 1 only when the number of objectives is m = 2 because Huband et al. [10] Table XIV shows that these problems require k mod (m โˆ’ 1) = 0. Proof. First, consider WFG2. Huband et al. [10] Table XIV shows that WFG2 has a disconnected Pareto front. Such a front cannot be homeomorphic to โˆ†mโˆ’1 , which contradicts the property of a simple problem shown in Proposition 3.6. The following discussion treats the rest of the problems. Let us check the properties of the Pareto set X โˆ— (f ) in the transformed variable space X = [0, 1]m and the map f on X โˆ— (f ). As described in Huband et al. [10], all problems2 have X โˆ— (f ) = [0, 1]mโˆ’1 ร— {0} . By the properties of the shape functions hi shown in Huband et al. [10] Table X, f is an embedding upon X โˆ— (f ) if and only if m = 2.3 For 2 As opposed to Huband et al. [10], WFG2 actually has a di๏ฌ€erent Pareto set in which x 1 is conditioned to be Pareto-optimal. To avoid a complication caused by this di๏ฌ€erence, we ๏ฌrst ๏ฌnished WFG2. 3 Except for Disconnected used only in WFG2. Simple Problems GECCO โ€™17 Companion, July 15-19, 2017, Berlin, Germany 4.4 MED m > 2, it holds that f (0, x 2 , . . . , xmโˆ’1 , 0) = 0, and thus f is not injective on X โˆ— (f ). Since the transformation functions, tY and t Z , are surjective as described in Huband et al. [10], the composite evaluation map f t : (tY ,tZ ) This is a single problem, MED, de๏ฌned as follows: minimize f (x) = (f 1 (x), . . . , fm (x)), n x โˆˆX =R where fi (x) = x โˆ’ xiโˆ— xiโˆ— f Y ร— Z โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โ†’ X โˆ’ โ†’ Rm is not injective on the Pareto set (Y ร— Z )โˆ— (f t) in the untransformed variable space Y ร— Z for m > 2. This does not meet the simplicity condition (S2). In the case of k > m โˆ’1, the transformation function tY involves Reduction: Weighted Sum or Reduction: Non-separable to decrease the dimension of Y . By examining Huband et al. [10] Table XI, we can see that both functions are not injective. Therefore, tY maps two di๏ฌ€erent points y, y โ€ฒ โˆˆ Y to the same Pareto solution (x 1 , . . . , xmโˆ’1 ) โˆˆ [0, 1]mโˆ’1 , contradicting the simplicity condition (S2). There remains the case k = 1 and m = 2 where the problems may be simple. First, let us consider the 1-objective subproblems. From Huband et al. [10] Table X, we have X โˆ— (f 1 ) = {(0, 0)} , X โˆ— (f 2 ) = {(1, 0)} . This implies that the simplicity condition (S1) for these problems is equivalent to the following criterion: tYโˆ’1 (0), tYโˆ’1 (1), t Zโˆ’1 (0) are all a point. Since (S2) automatically follows from (S1) when the problem is 1objective, the above criterion is a necessary and su๏ฌƒcient condition for the simplicity. We can see from Huband et al. [10] Table XI that tYโˆ’1 (0) and t Zโˆ’1 (0) are always a point, but it depends on the case whether tYโˆ’1 (1) is a point or not. WFG4, 5, 9 introduce Shift: Deceptive or Shift: Multi-modal into tY , making tYโˆ’1 (1) not a point. Thus, these problems are non-simple. For WFG1, 3, 6โ€“8, tYโˆ’1 (1) becomes a point, and their 1-objective subproblems are simple. Next, let us consider their 2-objective subproblems. It holds that X โˆ— (f 1 , f 2 ) = [0, 1] ร— {0} , and it has been con๏ฌrmed that f = {f 1 , f 2 } is an embedding on X โˆ— (f 1 , f 2 ) and t Zโˆ’1 (0) is a point. Therefore, the equivalent condition to the simplicity is as follows: tYโˆ’1 : [0, 1] โ†’ [0, 2] embedding. For k = 1 and m = 2, the transformation function tY in WFG1, 3, 6โ€“8 can be simpli๏ฌed into the form tY (y) = y ฮฑ . Thus, its inverse, tYโˆ’1 (x) = x 1/ฮฑ , is an embedding. Now, we have checked that WFG1, 3, 6โ€“8 are simple if and only if k = 1 and m = 2.  Note that Huband et al. [10] Table XIV describes that WFG3 has a degenerate Pareto front, which seems to be an evidence that WFG3 is always non-simple. However, the degeneracy actually occurs only when m > 2. In our analysis for m = 2, the Pareto front of WFG3 forms a line segment, which does not disrupt the simplicity. pi , = (0, . . . , 0, 1 , 0, . . . , 0), | {z } | {z } i โˆ’1 (13) nโˆ’i 0 < pi < โˆž. The front-shape parameters, pi , which determine the convexity of the Pareto front, are user-speci๏ฌed parameters as well as the variable dimension n and the number of objectives m. Theorem 4.4. MED is always simple independent of the choice of parameters n,m,pi . Additionally, changing individual optima, xiโˆ— , does not break the simplicity as long as they are a๏ฌƒnely independent. Proof. First, consider the case of pi = 1. This corresponds to a facility location problem under the L2 -norm. The Pareto set of this โˆ— [32]. Thus, if problem is known as the convex hull of x 1โˆ— , . . . , xm โˆ— โˆ— m โ‰ค n + 1 holds and x 1 , . . . , xm are a๏ฌƒnely independent, then the โˆ— . Indeed, convex hull is the (m โˆ’ 1)-simplex spanned by x 1โˆ— , . . . , xm by the de๏ฌnition of xiโˆ— , this problem can be de๏ฌned only when โˆ— are a๏ฌƒnely independent. Thus, the Pareto m โ‰ค n, and x 1โˆ— , . . . , xm โˆ— set X (f ) is an (m โˆ’ 1)-simplex, which ensures that the problem f satis๏ฌes the simplicity condition (S1). Analyzing the gradient of the L2 -norm, we can see that the map f is an embedding on X โˆ— (f ), which satis๏ฌes (S2). The same argument applies to the subproblems, con๏ฌrming that they satisfy (S1) and (S2); the problem f is simple. The case pi , 1 can be considered as the composite of fi in the case of pi = 1 and the pi -th power. Since any positive power is an order-preserving homeomorphism [0, โˆž) โ†’ [0, โˆž), the composition preserves the simplicity of the facility location problem.  5 CONCLUSIONS In this paper, we have discussed the simple problem and showed that the Pareto sets of its subproblems (resp. their images) constitute a strati๏ฌcation of its Pareto set (resp. its Pareto front). This topological property gives a theoretical guarantee that decompositionbased EMO algorithms can obtain an entire approximation of the Pareto set as well as the Pareto front. We have also investigated the simplicity of benchmark problems widely-used in the EMO community. All problems in the ZDT and DTLZ suites are non-simple. The WFG suite contains ๏ฌve simple problems under a very restrictive situation but usually does not, whereas the MED problem is always simple. We believe that the absence of simple problems in the standard benchmark suites is a considerable gap between the benchmark and the real-world since there are many evidences that a large portion of nowadays applications seems to be simple. Additionally, real-world applications involving simulations can be black-box; it would be important to develop an estimation method for the simplicity of black-box problems from a ๏ฌnite set of approximate solutions. GECCO โ€™17 Companion, July 15-19, 2017, Berlin, Germany REFERENCES [1] J. Benoist. 2003. Contractibility of E๏ฌƒcient Frontier of Simply Shaded Sets. Journal of Global Optimization 25, 3 (2003), 321โ€“335. DOI: http://dx.doi.org/10.1023/A:1022448811953 [2] W. de Melo. 1976. On the Structure of the Pareto Set of Generic Mappings. Boletim da Sociedade Brasileira de Matemaฬtica โ€“ Bulletin of the Brazilian Mathematical Society 7, 2 (1976), 121โ€“126. DOI:http://dx.doi.org/10.1007/BF02584786 [3] K. Deb and H. Jain. 2014. An Evolutionary Many-Objective Optimization Algorithm Using Reference-Point-Based Nondominated Sorting Approach, Part I: Solving Problems With Box Constraints. IEEE Transactions on Evolutionary Computation 18, 4 (Aug 2014), 577โ€“601. DOI: http://dx.doi.org/10.1109/TEVC.2013.2281535 [4] K. Deb, L. Thiele, M. Laumanns, and E. Zitzler. 2005. Scalable Test Problems for Evolutionary Multiobjective Optimization. In Evolutionary Multiobjective Optimization, A. Abraham, L. Jain, and R. Goldberg (Eds.). Springer London, 105โ€“145. DOI:http://dx.doi.org/10.1007/1-84628-137-7 6 [5] R.M. Everson, D.J. Walker, and J.E. Fieldsend. 2013. Edges of Mutually Nondominating Sets. In Proceedings of the 15th Annual Conference on Genetic and Evolutionary Computation (GECCO โ€™13). ACM, New York, NY, USA, 607โ€“614. DOI:http://dx.doi.org/10.1145/2463372.2463452 [6] N. Hamada, Y. Nagata, S. Kobayashi, and I. Ono. 2010. Adaptive Weighted Aggregation: A Multiobjective Function Optimization Framework Taking Account of Spread and Evenness of Approximate Solutions. In Proceedings of the 2010 IEEE Congress on Evolutionary Computation (CEC 2010). 787โ€“794. [7] N. Hamada, Y. Nagata, S. Kobayashi, and I. Ono. 2011. Adaptive Weighted Aggregation 2: More Scalable AWA for Multiobjective Function Optimization. In Proceedings of the 2011 IEEE Congress on Evolutionary Computation (CEC 2011). 2375โ€“2382. [8] N. Hamada, Y. Nagata, S. Kobayashi, and I. Ono. 2011. On Scalability of Adaptive Weighted Aggregation for Multiobjective Function Optimization. In Proceedings of the 2011 IEEE Congress on Evolutionary Computation (CEC 2011). 669โ€“678. [9] A. Hatcher. 2002. Algebraic Topology. Cambridge University Press, Cambridge, New York. http://opac.inria.fr/record=b1122188 [10] S. Huband, P. Hingston, L. Barone, and L. While. 2006. A Review of Multiobjective Test Problems and a Scalable Test Problem Toolkit. IEEE Transactions on Evolutionary Computation 10, 5 (Oct. 2006), 477โ€“506. DOI: http://dx.doi.org/10.1109/TEVC.2005.861417 [11] T.C. Koopmans. 1951. Analysis of Production as an E๏ฌƒcient Combination of Activities. In Activity Analysis of Production and Allocation (Proceedings of a Conference) (Cowles Commission Monograph), T.C. Koopmans (Ed.). John Wiley & Sons, Inc., New York, 33โ€“97. [12] D. La Torre and N. Popovici. 2010. Arcwise Cone-Quasiconvex Multicriteria Optimization. Operations Research Letters 38, 2 (2010), 143โ€“146. DOI: http://dx.doi.org/10.1016/j.orl.2009.11.003 [13] A. Lovison and F. Pecci. 2014. Hierarchical Strati๏ฌcation of Pareto Sets. ArXiv e-prints (July 2014). arXiv:math.OC/1407.1755 http://arxiv.org/abs/1407.1755. [14] T.J. Lowe, J.-F. Thisse, J.E. Ward, and R.E. Wendell. 1984. On E๏ฌƒcient Solutions to Multiple Objective Mathematical Programs. Management Science 30, 11 (1984), 1346โ€“1349. DOI:http://dx.doi.org/10.1287/mnsc.30.11.1346 [15] D.T. Luc. 1989. Theory of Vector Optimization. Lecture Notes in Economics and Mathematical Systems, Vol. 319. Springer-Verlag. [16] C. Malivert and N. Boissard. 1994. Structure of E๏ฌƒcient Sets for Strictly Quasi Convex Objectives. Journal of Convex Analysis 1 (1994), 143โ€“150. [17] K.M. Miettinen. 1999. Nonlinear Multiobjective Optimization. International Series in Operations Research & Management Science, Vol. 12. Springer-Verlag, GmbH. [18] B. Peleg. 1972. Topological Properties of the E๏ฌƒcient Point Set. Proc. Amer. Math. Soc. 35, 2 (1972), 531โ€“536. http://www.jstor.org/stable/2037641 [19] N. Popovici. 2005. Pareto Reducible Multicriteria Optimization Problems. Optimization 54, 3 (2005), 253โ€“263. DOI: http://dx.doi.org/10.1080/02331930500096213 [20] N. Popovici. 2006. Structure of E๏ฌƒcient Sets in Lexicographic Quasiconvex Multicriteria Optimization. Operations Research Letters 34, 2 (2006), 142โ€“148. DOI: http://dx.doi.org/10.1016/j.orl.2005.03.003 [21] N. Popovici. 2007. Explicitly quasiconvex set-valued optimization. Journal of Global Optimization 38, 1 (2007), 103โ€“118. DOI: http://dx.doi.org/10.1007/s10898-006-9085-1 [22] A.M. Rodrฤฑฬguez-Chฤฑฬa and J. Puerto. 2002. Geometrical Description of the Weakly E๏ฌƒcient Solution Set for Multicriteria Location Problems. Annals of Operations Research 111 (2002), 181โ€“196. DOI:http://dx.doi.org/10.1023/A:1020905820371 [23] H. Sato. 2014. Inverted PBI in MOEA/D and Its Impact on the Search Performance on Multi and Many-objective Optimization. In Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation (GECCO โ€™14). ACM, New York, NY, USA, 645โ€“652. DOI:http://dx.doi.org/10.1145/2576768.2598297 [24] T. Shioda and I. Ono. 2015. Adaptive Weighted Aggregation with Enhanced Relocation and Its Performance Evaluation. Transaction of the Japanese Society for Evolutionary Computation 6, 2 (2015), 104โ€“117. DOI: N. Hamada http://dx.doi.org/10.11394/tjpnsec.6.104 [25] T. Shioda and I. Ono. 2015. Adaptive Weighted Aggregation with Step Size Control Weight Adaptation for Multiobjective Continuous Function Optimization. SICE Journal of Control, Measurement, and System Integration 8, 5 (2015), 303โ€“ 311. DOI:http://dx.doi.org/10.9746/jcmsi.8.303 [26] S. Smale. 1973. Global Analysis and Economics I: Pareto Optimum and a Generalization of Morse Theory. In Dynamical Systems, M. M. Peixoto (Ed.). Academic Press, 531โ€“544. DOI:http://dx.doi.org/10.1016/B978-0-12-550350-1.50044-8 [27] S. Smale. 1974. Global Analysis and Economics IIA: Extension of a Theorem of Debreu. Journal of Mathematical Economics 1, 1 (1974), 1โ€“14. DOI: http://dx.doi.org/10.1016/0304-4068(74)90031-7 [28] S. Smale. 1974. Global Analysis and Economics III: Pareto Optima and Price Equilibria. Journal of Mathematical Economics 1, 2 (1974), 107โ€“117. DOI: http://dx.doi.org/10.1016/0304-4068(74)90002-0 [29] S. Smale. 1974. Global Analysis and Economics IV: Finiteness and Stability of Equilibria with General Consumption Sets and Production. Journal of Mathematical Economics 1, 2 (1974), 119โ€“127. DOI: http://dx.doi.org/10.1016/0304-4068(74)90003-2 [30] S. Smale. 1974. Global Analysis and Economics V: Pareto Theory with Constraints. Journal of Mathematical Economics 1, 3 (1974), 213โ€“221. DOI: http://dx.doi.org/10.1016/0304-4068(74)90013-5 [31] S. Smale. 1976. Global Analysis and Economics VI: Geometric Analysis of Pareto Optima and Price Equilibria under Classical Hypotheses. Journal of Mathematical Economics 3, 1 (1976), 1โ€“14. DOI: http://dx.doi.org/10.1016/0304-4068(76)90002-1 [32] J. Ward. 1989. Structure of E๏ฌƒcient Sets for Convex Objectives. Mathematics of Operations Research 14, 2 (1989), 249โ€“257. [33] Q. Zhang and H. Li. 2007. MOEA/D: A Multiobjective Evolutionary Algorithm Based on Decomposition. IEEE Transactions on Evolutionary Computation 11, 6 (December 2007), 712โ€“731. DOI:http://dx.doi.org/10.1109/TEVC.2007.892759 [34] E. Zitzler, K. Deb, and L. Thiele. 2000. Comparison of Multiobjective Evolutionary Algorithms: Empirical Results. IEEE Transaction on Evolutionary Computation 8, 2 (2000), 173โ€“195. DOI:http://dx.doi.org/10.1162/106365600568202
9cs.NE
Distributed Spanner Approximation Keren Censor-Hillelโˆ— Michal Doryโˆ— arXiv:1802.03160v1 [cs.DS] 9 Feb 2018 February 12, 2018 Abstract We address the fundamental network design problem of constructing approximate minimum spanners. Our contributions are for the distributed setting, providing both algorithmic and hardness results. Our main hardness result shows that โˆšan ฮฑ-approximation for the minimum directed kspanner โˆš โˆšproblem for k โ‰ฅ 5 requires โ„ฆ(n/ ฮฑ log n) rounds using deterministic algorithms or โ„ฆ( n/ ฮฑ log n) rounds using randomized ones, in the Congest model of distributed computing. Combined with the constant-round O(n )-approximation algorithm in the Local model of [Barenboim, Elkin and Gavoille, 2016], as well as a polylog-round (1 + )-approximation algorithm in the Local model that we show here, our lower bounds for the Congest model imply a strict separation between the Local and Congest models. Notably, to the best of our knowledge, this is the first separation between these models for a local approximation problem. Similarly, a separation between the directed and undirected cases is implied. We also prove that the minimum weighted k-spanner problem for k โ‰ฅ 4 requires a near-linear number of rounds in the Congest model, for directed or undirected graphs. In addition, we show lower bounds for the minimum weighted 2-spanner problem in the Congest and Local models. On the algorithmic side, apart from the aforementioned (1 + )-approximation algorithm for minimum k-spanners, our main contribution is a new distributed construction of minimum 2-spanners that uses only polynomial local computations. Our algorithm has a guaranteed approximation ratio of O(log(m/n)) for a graph with n vertices and m edges, which matches the best known ratio for polynomial time sequential algorithms [Kortsarz and Peleg, 1994], and is tight if we restrict ourselves to polynomial local computations. An algorithm with this approximation factor was not previously known for the distributed setting. The number of rounds required for our algorithm is O(log n log โˆ†) w.h.p, where โˆ† is the maximum degree in the graph. Our approach allows us to extend our algorithm to work also for the directed, weighted, and client-server variants of the problem. It also provides a Congest algorithm for the minimum dominating set problem, with a guaranteed O(log โˆ†) approximation ratio. โˆ— Technion, Department of Computer Science, {ckeren,smichald}@cs.technion.ac.il. Supported in part by the Israel Science Foundation (grant 1696/14). 1 Introduction A k-spanner of a graph G is a sparse subgraph of G that preserves distances up to a multiplicative factor of k. First introduced in the late 80โ€™s [56, 57], spanners have been central for numerous applications, such as synchronization [2, 3, 57], compact routing tables [4, 12, 58, 64], distance oracles [6, 62, 65], approximate shortest paths [25, 32], and more. Due to the prominence of spanners for many distributed applications, it is vital to have distributed algorithms for constructing them. Indeed, there are many efficient distributed algorithms for finding sparse spanners in undirected graphs, which give a global guarantee on the size of the spanner. A prime example are algorithms that construct (2k โˆ’ 1)-spanners with O(n1+1/k ) edges, for a graph with n vertices [7, 17, 18, 28, 40], which is optimal in the worst case assuming Erdoฬ‹sโ€™s girth conjecture [33]. As opposed to finding spanners with the best worst-case sparsity, this paper focuses on the network design problem of approximating the minimum k-spanner, which is a fundamental optimization problem. This is particularly crucial for cases in which the worst-case sparsity is ฮ˜(n2 ) such as 2spanners (complete bipartite graphs) or directed spanners. Spanner approximation is at the heart of a rich line of recent work in the sequential setting, presenting approximation algorithms [8,14,15,21,23], as well as hardness of approximation results [19, 31, 45]. There are only few distributed spanner approximation algorithms known to date. A distributed algorithm with an expected approximation ratio of O(log n) for the minimum 2-spanner problem is e โˆšn) for given in [21]. This was recently extended to k > 2, achieving an approximation ratio of O( directed k-spanners [22], which matches the best approximation known in the sequential setting [8]. Yet, in the distributed setting, it is possible to obtain better approximations if local computation is not polynomially bounded. A constant time O(n )-approximation algorithm for directed or undirected minimum k-spanner, which takes exp(O(1/)) + O(k) rounds for any constant  > 0 and a positive integer k, is given in [5]. In addition, we show a polylogarithmic time (1+)-approximation algorithm for these problems, following the framework of a recent algorithm for covering problems [39] (see Section 6). This approximation is much better than the best approximation that can be acheived in the sequential setting, due to the hardness results of [19, 31]. All these algorithms work in the classic Local model of distributed computing [51], where vertices exchange messages of unbounded size in synchronous rounds. A natural question is whether we can obtain good approximations efficiently also in the Congest model [54], where the messages exchanged are bounded by O(log n) bits. In the undirected case, efficient constructions of (2k โˆ’ 1)-spanners with O(n1+1/k ) edges in the Congest model [7, 28] imply O(n1/k )-approximations, since any spanner of a connected graph has at least n โˆ’ 1 edges. However, for directed graphs there are no efficient algorithms in the Congest model. Our contribution in this paper is twofold. We provide the first hardness of approximation results for minimum k-spanners in the distributed setting. Our main hardness result shows that there are no efficient approximation algorithms for the directed k-spanner problem for k โ‰ฅ 5 in the Congest model. This explains why all the current approximation algorithms for the problem require large messages, and also creates a strict separation between the directed and undirected variants of the problem, as the latter admits efficient approximations in the Congest model. In addition, we provide new distributed algorithms for approximating the minimum k-spanner problem and several variants in the Local model. Our main algorithmic contributaion is an algorithm for minimum 2-spanners that uses only polynomial local computations and guarantees an approximation ratio of O(log m n ), which matches the best known approximation for polynomial sequential algorithms [46]. On the way to obtaining our results, we develop new techniques, both algorithmically and for obtaining our lower bounds, which can potentially find use in studying various related problems. 1 1.1 1.1.1 Our contributions Hardness of approximation We show several negative results implying hardness of approximating various spanner problems in both the Local and Congest models. While there are many recent hardness of approximation results for spanner problems in the sequential setting [14, 19, 31, 45], to the best of our knowledge ours are the first for the distributed setting. (I.) Directed k-spanner for k โ‰ฅ 5 in the CONGEST model: Perhaps our main negative result is a proof for the hardness of approximating the directed k-spanner problem for k โ‰ฅ 5 in the Congest model. Theorem 1.1. Any (perhaps randomized) distributed ฮฑ-approximation algorithm in the Congest โˆš n n . model for the directed k-spanner problem for k โ‰ฅ 5 takes โ„ฆ( โˆšฮฑยทlog n ) rounds, for 1 โ‰ค ฮฑ โ‰ค 100 When restricting attention to deterministic algorithms, we prove a stronger lower bound of e โˆš โ„ฆ( nฮฑ ), for any ฮฑ โ‰ค nc for a constant c > 1. For example, this gives that a constant or a polylogarithmic approximation ratio for the directed e โˆšn) rounds using randomized algorithms or k-spanner problem in the Congest model requires โ„ฆ( e โ„ฆ(n) rounds using deterministic algorithms. Even an approximation ratio of only n is hard and e 1/2โˆ’/2 ) rounds using randomized algorithms or โ„ฆ(n e 1โˆ’/2 ) rounds using deterministic requires โ„ฆ(n ones, for any 0 <  < 1. Moreover, in the deterministic case, even an approximation ratio of nc , for e โˆšn) rounds. This is to be contrasted with an approximation of n, appropriate values of c, requires โ„ฆ( which can be obtained without any communication by taking the entire graph, since any k-spanner has at least n โˆ’ 1 edges. LOCAL vs. CONGEST. The major implication of the above is a strict separation between the Local and Congest models, since the former admits a constant-round O(n )-approximation algorithm [5]1 and a polylogarithmic (1 + )-approximation algorithm (see Section 6) for directed k-spanners. Such a separation was previously known only for global problems (problems that are subject to an โ„ฆ(D) lower bound, where D is the diameter of the graph), and for local decision problems (such as determining whether the graph contains a k-cycle). To the best of our knowledge, ours is the first separation for a local approximation problem. Directed vs. undirected. Our lower bound also separates the undirected and directed kspanner problems, since there are efficient algorithms in the Congest model for constructing (2k โˆ’ 1)-spanners with O(n1+1/k ) edges [28, 40] which imply an O(n1/k )-approximation. The best randomized algorithm for the task takes k rounds [28], and the best deterministic algorithm is a recent algorithm which takes O(n1/2โˆ’1/k ) rounds for a constant even k [40]. Achieving the e 1/2โˆ’1/2k ) rounds using randomization, or same approximation for directed graphs necessitates โ„ฆ(n e 1โˆ’1/2k ) rounds using deterministic algorithms. โ„ฆ(n (II.) Weighted k-spanner for k โ‰ฅ 4 in the CONGEST model: In addition to the above main result, we consider weighted k-spanners, and show that any ฮฑ-approximation for the weighted e n ) rounds, and that โ„ฆ(n) e undirected k-spanner problem for k โ‰ฅ 4 requires โ„ฆ( rounds are needed for k the weighted directed k-spanner problem. 1 In [5], a constant time randomized algorithm for directed k-spanner is presented. However, the deterministic network decomposition presented in [5] gives a polylogarithmic deterministic approximation for directed k-spanner as well, which shows the separation also for the deterministic case. 2 Weighted vs. unweighted. As these lower bounds hold also for randomized algorithms, we obtain yet another separation, between the weighted and the unweighted variants of the problem, since the aforementioned k-round (2k โˆ’ 1)-spanner constructions imply an O(n1/k ) approximation for the unweighted case. LOCAL vs. CONGEST. Since both the constant-round algorithm for approximating kspanners within a factor of O(n ) [5] and the (1 + )-approximation algorithm that we give in Section 6 are suitable for the weighted case, our hardness result for the weighted case implies the separation between the Local and Congest models also when having weights. This holds also for the undirected weighted case. (III.) Weighted 2-spanner in the LOCAL and CONGEST models: Finally, we show lower bounds for the weighted 2-spanner problem, which, in a nutshell, are obtained by a reduction that captures the intuition that approximating the minimum weight 2-spanner is at least as hard as approximating the minimum vertex cover (MVC). We emphasize that the reduction from the set cover problem to the unweighted 2-spanner problem given in [45] is inherently sequential, by requiring the addition of a vertex that is connected to all other vertices in the graph, and hence is unsuitable for the distributed setting. q Our reduction implies that โ„ฆ( logloglogโˆ†โˆ† ) or โ„ฆ( logloglogn n ) rounds are required for a logarithmic approximation ratio for weighted 2-spanner in the Local model, by plugging in the lower bounds e 2 ) lower bound for an exact solution for MVC given in [48]. In addition, our reduction implies an โ„ฆ(n for weighted 2-spanner in the Congest model, by using the near-quadratic lower bound for exact MVC given recently in [11]. This is tight up to logarithmic factors since O(n2 ) rounds allow learning the entire graph topology and solving essentially all natural graph problems. 1.1.2 Distributed approximation algorithms We show new distributed algorithms for approximating minimum k-spanners. Our main algorithmic contribution is a new algorithm for the minimum 2-spanner problem that uses only polynomial local computations (see Section 4). In addition, we show that if local computation is not polynomially bounded it is possible to achieve (1 + )-approximation for minimum k-spanners (see Section 6). (I.) Distributed (1 + )-approximation of minimum k-spanners: In Section 6, we present (1+ )-approximation algorithms for spanner problems, following the framework of a recent algorithm for covering problems [39]. We show the following. Theorem 1.2. There is a randomized algorithm with complexity O(poly(log n/)) in the Local model that computes a (1 + )-approximation of the minimum k-spanner w.h.p, where k is a constant. The algorithm is quite general and can be adapted similarly to additional variants. Theorem 1.2 shows that although spanner problems are hard to approximate in the sequential setting, it is possible to achieve extremely strong approximations for them efficiently in the Local model. This demonstrates the power of the Local model. However, the algorithm is based on learning neighborhoods of polylogarithmic size and solving NP-complete problems (finding optimal spanners). It is desirable to design also algorithms that work with more realistic assumptions. We next focus on the 2-spanner problem and show a new algorithm that uses only polynomial local computations and uses the power of the Local model only for learning neighborhoods of diameter 2. 3 (II.) Distributed approximation of minimum 2-spanners: If we restrict ourselves to polynomial local computations, the best algorithm for the minimum 2-spanner problem is the O(log n)-round O(log n)-approximation in expectation of Dinitz and Krauthgamer [21],2 which solves even the more general problem of finding fault-tolerant spanners. However, this still leaves several open questions regarding minimum 2-spanners. First, the best approximation to the problem in the sequential setting is O(log m n ) where m is the number of edges in the graph. Can we achieve such approximation also in the distributed setting? Second, the approximation ratio holds only in expectation. Can we design an algorithm that guarantees the approximation ratio? Third, this algorithm requires learning neighborhoods of logarithmic radius, and hence a direct implementation of it in the Congest model is not efficient. Can we design a more efficient algorithm in the Congest model? We design a new algorithm for the minimum 2-spanner problem, answering some of these questions. Our algorithm obtains an approximation ratio of O(log m n ) always, within O(log n log โˆ†) rounds w.h.p,3 where โˆ† is the maximum vertex degree, summarized as follows. Theorem 1.3. There is a distributed algorithm for the minimum 2-spanner problem in the Local model that guarantees an approximation ratio of O(log m n ), and takes O(log n log โˆ†) rounds w.h.p. Our approximation ratio of O(log m n ) matches that of the best approximation in the sequential setting up to a constant factor [46], and is tight if we restrict ourselves to polynomial local computations [45]. In addition, the approximation ratio of our algorithm is guaranteed, rather than only holding in expectation. This is crucial for the distributed setting since, as opposed to the sequential setting, running the algorithm several times and choosing the best solution completely blows up the complexity because learning the cost of the solution requires collecting global information. Note that although our algorithm can be converted into an algorithm with a guaranteed polylogarithmic time complexity and an approximation ratio that holds only in expectation, the opposite does not hold. Another feature of our algorithm is that it uses the power of the Local model only for learning the 2-neighborhood of vertices. A direct implementation of our algorithm in the Congest model yields an overhead of O(โˆ†) rounds, which is efficient for small values of โˆ†. We address this issue further in Section 1.3. (III.) Distributed approximation of additional 2-spanners: The techniques we develop for constructing and analyzing our spanner have the advantage of allowing us to easily extend our construction to the directed, weighted and client-server variants of the problem. We obtain the same approximation ratio for the directed case as in the undirected case, and for the weighted case we give an approximation ratio of O(log โˆ†), both improving upon the O(log n) approximation in expectation of [21]. For the client-server 2-spanner case, which to the best of our knowledge ours is the first distributed approximation, we obtain an approximation ratio that matches that of the sequential algorithm [29]. (IV.) Distributed approximation of MDS: Finally, our technique also gives an efficient algorithm for the minimum dominating set (MDS) problem, which obtains an approximation ratio of O(log โˆ†) always. Our algorithm for MDS works even in the Congest model and takes O(log n log โˆ†) rounds w.h.p. The MDS problem has been studied extensively by the distributed 2 In [21], a time complexity of O(log2 n) rounds is claimed. However, the algorithm is based on sampling a certain decomposition O(log n) times independently, which takes O(log n) rounds each time. From the independence of the decompositions, the computations can be parallelized in the Local model, achieving a time complexity of O(log n) rounds. See also [22]. 3 As standard in this setting, a high probability refers to a probability that is at least 1 โˆ’ n1c for a constant c โ‰ฅ 1. 4 computing community, with several efficient algorithms for MDS in the Congest obtaining an approximation ratio of O(log โˆ†) in expectation [43, 48, 49]. To the best of our knowledge, our algorithm is the first that guarantees this approximation ratio always. 1.2 1.2.1 Technical overview Hardness of approximation We prove Theorem 1.1 by a reduction from 2-party communication problems, as has been proven fruitful for various lower bounds for the Congest model [1, 11, 24, 35, 42, 63]. In principle, a family of graphs is constructed depending on the input strings of the two players, such that the solution to the required Congest problem uniquely determines whether the input strings of the players satisfy a certain Boolean predicate. The most common usage is of set-disjointness, although other 2-party communication problems have been used as well [10, 26, 34, 55]. The two players can simulate a distributed algorithm for solving the Congest problem, and deduce their output for the 2-party communication problem accordingly. This yields a lower bound for the Congest problem, based on known lower bounds for the communication complexity of the 2-party problem, by incorporating the cost of the simulation itself. The prime caveat in using this framework for approximation problems is that in the above examples a modification of a single input bit has a slight influence on the graph. For example, when showing a lower bound for computing the diameter, any bit of the input affects the distance between one pair of vertices [1, 35, 42]. This is sufficient when computing some global property of the graph. Indeed, the distance between a single pair of vertices can change the diameter of the graph. The challenge in designing a construction for approximating k-spanners is that now any single bit needs to affect drastically the size of the minimum k-spanner. In more detail, any k-spanner has at least n โˆ’ 1 edges and, hence, for a meaningful lower bound for an ฮฑ-approximation, any input bit must affect at least โ„ฆ(ฮฑn) edges. We manage to overcome the above challenge by constructing a graph that captures this requirement and allows a reduction from set-disjointness. The main technical ingredient is a dense component in which many edges are affected by single input bits. This component resides in its entirety within the set of vertices that is simulated by a single player of the two, thus resulting in a non-symmetric graph construction. This is crucial for our proof, as otherwise the density of this component would imply a dense cut between the two sets of vertices simulated by the players, which in turn would nullify the achievable lower bound. For having this property, we believe that our construction may give rise to follow-up lower bound constructions for additional local approximation problems. Our graph construction is designed using several parameters, which allows us to show trade-offs between the time complexity of an algorithm and its approximation ratio, and gives lower bounds even for large values of ฮฑ. Our stronger lower bounds for the deterministic case are obtained using the 2-party gapdisjointness problem rather than the more common set-disjointness problem. Since gap-disjointness allows more slack, we obtain stronger lower bounds, at the price of them holding only for deterministic algorithms. We believe that the flexibility of the gap-disjointness problem may be useful in showing additional strong lower bounds for approximation problems. Our stronger lower bounds for the weighted case are obtained by assigning weights to the edges of the graph in a manner which allows us to shave off certain edges that affect the bound. 5 1.2.2 Distributed approximation of minimum 2-spanners Our algorithm for approximating minimum 2-spanners is inspired by the sequential greedy algorithm of Kortsarz and Peleg [46], in which dense stars are added to the spanner one by one, obtaining an approximation ratio of O(log m n ). A star is a subset of edges between a vertex v and some of its neighbors. The density of a star is the ratio between the number of edges 2-spanned by the star and the size of the star, where an edge e = {u, v} is 2-spanned by a star S if S includes a path of length two between u and v. A roughly intuition for the greedy algorithm is that if S is a dense star then adding its edges to the spanner allows 2-spanning many edges by adding only a small number of edges to the spanner. A direct implementation of this greedy approach in the distributed setting is highly expensive, since deciding upon the densest star inherently requires collecting global information. Moreover, one would like to leverage the ability of the distributed setting to add multiple stars to the spanner simultaneously. To address both sources of inefficiency, rather than computing the star that is the densest in the entire graph, we compute all the stars that are the densest in their local 2neighborhood. While greatly speeding up the running time, adding all of these locally densest stars to the spanner is too extreme, and results in a poor approximation ratio. Instead, we consider these stars as candidates for being added to the spanner. The key challenge is then to break symmetry among the candidates, while balancing the need to choose many stars in parallel (for a fast running time) with the need to bound the overlap in spanned edges among the candidates (for a small approximation ratio). We tackle this conflict by constructing a voting scheme for breaking symmetry by choosing among the stars based on a random permutation. Interestingly, our approach is inspired by a parallel algorithm for set cover [60]. We let each edge vote for the first candidate that 2-spans it according to the random permutation. A candidate that receives a number of votes which is at least 18 of the edges it 2-spans is added to the spanner, and we continue this process iteratively. Since we add to the spanner only stars receiving many votes, this approach guarantees that there is not too much overlap in the edges 2-spanned by different stars, which eventually culminates in a proof of an approximation ratio of O(log m n ), which matches the one obtained by the greedy approach. A tricky obstacle lies in showing that our algorithm completes in O(log n log โˆ†) rounds w.h.p. This is because, as opposed to the set cover case, there may be as many as 2โˆ† different stars centered at each vertex, and a vertex may be required to add candidate stars multiple times during the execution of the algorithm. It turns out that an arbitrary choice for a candidate among all densest stars centered at a vertex is incapable of providing an efficient time complexity. To overcome this issue, we design a subtle mechanism for proposing a candidate star, and pair it with a proof that our algorithm indeed completes in the claimed number of rounds. 1.3 Discussion While our results in this paper significantly advance the state-of-the-art in distributed approximation of minimum k-spanners, intriguing questions remain open. First, the landscape of the trade-offs between the approximation ratio and the running time of distributed minimum k-spanner algorithms is yet to be fully mapped. For example, the O(log โˆ†) factor in the running time of our approximation algorithm for weighted 2-spanner is tight up to an O(log log โˆ†) factor, due to our reduction from MVC and the known lower bounds for it. However, it remains open whether the O(log n) factor is necessary. Additional gaps remain open for other various approximation ratios. In particular, an interesting question is to show a lower bound for approximating the undirected unweighted 6 minimum k-spanner problem. A curious question is whether our algorithm can be efficiently made to work in the Congest model. A direct implementation would yield an overhead of O(โˆ†) for the running time, for computing the densities of stars, and for sending the candidate stars. We emphasize that knowing the density of the neighborhood of vertices is crucial for additional algorithms, such as the state-of-the-art (โˆ† + 1)-coloring algorithm of Harris et al. [41]. Another interesting question is to design an efficient deterministic algorithm achieving the same approximation ratio. For larger values of the stretch k, our lower bounds imply a strict separation between the Local and Congest models for the number of rounds required for approximating directed minimum k-spanners. Such a separation was previously known only for global problems (problems that are subject to an โ„ฆ(D) lower bound, where D is the diameter of the graph), and for local decision problems (such as determining whether the graph contains a k-cycle). Interestingly, ours is the first separation for a local approximation problem. It is a central open question whether such separations hold also for local symmetry breaking problems. Interestingly, our algorithm, as well as other distributed approximation algorithms for the minimum k-spanner in the Local model, work also for directed graphs, achieving the same approximation ratio and round complexity. However, our hardness results create a strict separation between the undirected and directed variants in the Congest model. It will be interesting to show such separations for other problems. 1.4 Additional related work Spanners have been studied extensively in the distributed setting, producing many efficient algorithms for finding sparse spanners in undirected graphs [7, 17, 18, 27, 28, 40]. These algorithms construct (2k โˆ’ 1)-spanners with O(n1+1/k ) edges for any fixed k โ‰ฅ 2, with the fastest completing in k rounds [17, 28], which is tight [17]. Many additional works construct various non-multiplicative spanners in the distributed setting, such as [59] and the excellent overview within. Many recent studies address spanner approximations in the sequential setting. The greedy algorithm of [46] achieves an approximation ratio of O(log m n ) for the minimum 2-spanner problem. This was extended to the weighted, directed and client-server cases [29,45]. Approximation algorithms for the directed k-spanner problem for k > 2 are given in [8,9,20,23,30], with the best approximation โˆš e 1/3 ) for k = 3, 4 [8, 23]. These ratio of O( n log n) for k > 4, and an approximation ratio of O(n approximation ratios are matched by a recent distributed O(k log n)-round algorithm, that uses only polynomial local computations [22]. Approximation algorithms are given also for pairwise spanners and distance preservers [14], for spanners with lowest maximum degree [13, 15, 22, 47], for fault-tolerant spanners [21, 23], and more. Hardness of approximation results in the sequential setting give that for k = 2, no polynomial algorithm gives an approximation ratio better than ฮ˜(log n) [45], which shows that the sequential greedy algorithm is optimal. For k > 2, the problem is even harder. For any constant  > 0 and k โ‰ฅ 3 there are no polynomial-time algorithms that approximate the k-spanner problem within a 1โˆ’ factor better than 2(log n)/k [19], or the directed k-spanner problem within a factor better than 1โˆ’ 2(log n) [31]. Similar results are known for additional variants [14, 31]. Spanner problems are closely related to covering problems such as set cover, minimum dominating set (MDS), and minimum vertex cover. Indeed, some of the ingredients of our algorithms borrow ideas from distributed and parallel algorithms for such problems. Our symmetry breaking scheme is inspired by the parallel algorithm for set cover of Rajagopalan and Vazirani [60], however, the general structure of this algorithm requires global coordination and hence is not suitable for the distributed setting. There are also several ideas inspired by the distributed MDS algorithm of Jia et 7 al. [43], such as, rounding the densities and comparing densesties in 2-neighborhoods. However, [43] breaks the symmetry between the candidates in a different way which results in an approximation ratio of O(log โˆ†) in expectation. The connection between spanners to set cover is used also in [9] where they show that covering the edges of a graph by stars is also useful for approximating the directed k-spanner problem for k > 2. In this context, we also mention the distributed algorithm of [37] for the minimum connected dominating set problem, which also uses stars as the main component for its construction. Our work is, however, incomparable, especially since the minimum connected dominating set problem is a global problem, admitting an โ„ฆ(D) lower bound even in the Local model. 1.5 Preliminaries Let G = (V, E) be a connected undirected graph with n vertices and maximum degree โˆ†. Let S โІ E be a subset of the edges, and let k โ‰ฅ 1. We say that an edge e = {u, v} is covered by S if there is a path of length at most k between u and v in S. A k-spanner of G is a subgraph of G that covers all the edges of G. A k-spanner of a subgraph G0 โІ G is a subgraph of G that covers all the edges of G0 . For a directed graph, we say that a directed edge e = (u, v) is covered by a subset of edges S, if S includes a directed path of length at most k from u to v, and define a k-spanner for a directed graph accordingly. In the minimum k-spanner problem the input is a connected undirected graph G = (V, E) and the goal is to find the minimum size k-spanner of G. The directed k-spanner problem is defined accordingly, with respect to directed graphs. In the weighted k-spanner problem each edge e has a non-negative weight w(e) and the goal P is to find the k-spanner of G having minimum cost, where the cost of a spanner H is w(H) = eโˆˆH w(e).4 In the client-server k-spanner problem, introduced in [29], the input is a connected undirected graph G = (V, E) that its edges are divided to two types: clients C and servers S (there may be edges e โˆˆ C โˆฉ S), and the goal it to find the minimum size k-spanner of C that includes only edges of S. In the distributed setting, the input for the k-spanner problem is the communication graph G itself. Each vertex initially knows only the identities of its neighbors, and needs to output a subset of its edges such that the union of all outputs is a k-spanner. The communication in the network is bidirectional, even when solving the directed k-spanner problem. Roadmap: In Section 2, we present our hardness of approximation results for directed and weighted k-spanners in the Congest model. In Section 3, we provide hardness of approximation results for weighted 2-spanners. In Section 4, we present our algorithm for the minimum 2-spanner problem and show its extensions to other variants. In Section 5, we describe our MDS algorithm. Finally, in Section 6, we show our (1 + )-approximation for minimum k-spanners. 2 Hardness of approximation in the CONGEST model In this section, we prove hardness of approximation results for approximating k-spanners in the Congest model. As explained in Section 1.2.1, we build upon the previous used framework of reducing 2-party communication problems to distributed problems for the Congest model. The key technical challenge that we overcome is how to plant a dense subgraph into the construction, 4 There is another variant of the weighted k-spanner problem, in which the weight of an edge represents a length. We emphasize that in our case all the edges have length 1. 8 without inducing a large cut between the vertices simulated by the two players, but while still having the choice of edges taken from the dense subgraph to the spanner depend on both inputs. We describe a graph construction that allows us to provide a reduction from problems of 2-party communication. In the latter setting, two players, Alice and Bob, receive input strings a = (a1 , ..., aN ) and b = (b1 , ..., bN ), respectively, of size N . Their goal is to solve a problem related to their inputs, while communicating a minimum number of bits. For example, the set disjointness problem requires the players to decide if their input strings represent disjoint subsets of [N ], that is, they need to decide if there is a bit 1 โ‰ค i โ‰ค N such that ai = bi = 1. The communication complexity of set disjointness is known to be linear in the length of the strings [50, 61]. Lemma 2.1. Solving the set disjointness problem on input strings of size N , requires exchanging โ„ฆ(N ) bits, even using randomized protocols. We start by showing that approximating the directed k-spanner problem in the Congest model is hard for k โ‰ฅ 5, and then modify our construction to provide hardness results for the weighted case. The general approach is to build a dense graph G, where some of its edges depend on the inputs of Alice and Bob, such that if the inputs of Alice and Bob are disjoint then there is a sparse 5-spanner in G (which is also a k-spanner for k โ‰ฅ 5), and otherwise any k-spanner has many edges. By simulating the distributed approximation algorithm for the k-spanner problem, Alice and Bob solve set disjointness. Hence, depending on the parameters of our graph construction, a communication lower bound for the latter would imply a lower bound on the number of rounds required for the former. In [35,42], a reduction from set disjointness is used in order to show a lower bound for computing the diameter of a graph. The main idea is that each bit of the inputs affects the distance between two vertices in the graph, and if the distance between any of these pairs of vertices is long it affects the diameter of the graph. This idea is useful also for showing lower bound for spanner problems, and indeed one of the elements in our construction is similar to the constructions in [35,42]. However, the main difference in our case is that the distance between one pair of vertices in the graph does not affect significantly the size of the minimum spanner. In order to overcome it, we suggest the following construction. Our graph consists of two subgraphs. One of them depends on the inputs, and the other one is a complete bipartite graph D that each of its sides is divided to blocks of size ฮฒ. We connect the two subgraphs in such a way that each bit i of the inputs affects ฮฒ 2 edges of D, which must be added to the spanner if and only if ai = bi = 1. Let `, ฮฒ be positive integers. We construct a graph G = G(`, ฮฒ) according to the parameters ` and ฮฒ. Later we plug-in different values of ` and ฮฒ in order to obtain several trade-offs. The graph G(`, ฮฒ) is a directed graph, with V = X1 โˆชX2 โˆชY1 โˆชY2 โˆชY3 , where X1 = {x1i |1 โ‰ค i โ‰ค `}โˆช{x2i |1 โ‰ค i โ‰ค `}, Y1 = {yi1 |1 โ‰ค i โ‰ค `} โˆช {yi2 |1 โ‰ค i โ‰ค `}, X2 = {xij |1 โ‰ค i โ‰ค `, 1 โ‰ค j โ‰ค ฮฒ}, Y2 = {yij |1 โ‰ค i โ‰ค `, 1 โ‰ค j โ‰ค ฮฒ}, and Y3 = {yi3 |1 โ‰ค i โ‰ค `}. See Figure 1 for an illustration. The set of edges consists of a matching between X1 and Y1 that includes all the directed edges 1 (xi , yi1 ) and (x2i , yi2 ), for 1 โ‰ค i โ‰ค `. In addition, there is a complete bipartite graph D between the vertices of X2 and Y2 that includes all the directed edges (xij , yrs ) for 1 โ‰ค i, r โ‰ค `, 1 โ‰ค j, s โ‰ค ฮฒ. For each vertex xij โˆˆ X2 there is an edge (xij , x1i ). For each vertex yij โˆˆ Y2 there is an edge (yi3 , yij ). In addition, the graph includes the edges (yi2 , yi3 ), for 1 โ‰ค i โ‰ค `. In addition, the two input strings a, b of length `2 bits, denoted by aij , bij for 1 โ‰ค i, j โ‰ค `, affect G in the following way. The edge (x1i , x2j ) is in G if and only if aij = 0, and the edge (yi1 , yj2 ) is in G if and only if bij = 0. 9 ๐‘‹2 ๐‘Œ2 ๐‘ฅ11 ๐‘ฆ11 ๐‘ฅ12 ๐‘ฆ12 ๐‘‹1 ๐‘Œ1 ๐‘ฅ11 ๐‘ฆ11 ๐‘ฅ21 ๐‘ฆ21 ๐‘ฅโ„“1 ๐‘ฆโ„“1 ๐‘ฅ12 ๐‘ฆ12 ๐‘ฅ22 ๐‘ฆ22 ๐‘ฅโ„“2 ๐‘ฆโ„“2 ๐‘Œ3 ๐‘ฅ1๐›ฝ ๐‘ฆ13 ๐‘ฆ1๐›ฝ ๐‘ฆ23 ๐‘ฅโ„“1 ๐‘ฆโ„“1 ๐‘ฅโ„“2 ๐‘ฆโ„“2 ๐‘ฅโ„“๐›ฝ ๐‘ฆโ„“๐›ฝ ๐‘ฆโ„“3 Figure 1: The graph G, with some of its edges omitted for clarity. The red dashed edges are examples of optional edges which depend on the input strings a and b. Note that the number of vertices in G is n = ฮ˜(`ฮฒ), and that D consists of (`ฮฒ)2 = ฮ˜(n2 ) edges, and recall the goal of constructing a sparse k-spanner for G with k โ‰ฅ 5. Since D is a dense subgraph, taking its edges to the spanner would be expensive. However, in order to avoid taking the edges of D to the spanner, the spanner must include a directed path of length at most k between every pair of vertices xij , yrs , which does not include edges of D. The existence of such a path depends on the input strings in the following way. Claim 2.2. If one of the edges (x1i , x2r ), (yi1 , yr2 ) is in G, there is a directed path of length 5 between the vertices xij , yrs that does not contain edges of D. Otherwise, the only directed path from xij to yrs is the path that consists of the edge (xij , yrs ). Proof. Note that any directed path from xij to yrs that does not include the edges of D must begin with the edge (xij , x1i ) and must end with the two edges (yr2 , yr3 ), (yr3 , yrs ). Hence, the existence of such a path depends on whether there is a directed path from x1i to yr2 . We show that there is a directed path of length 2 from x1i to yr2 if at least one of the edges (x1i , x2r ), (yi1 , yr2 ) is in G. Otherwise, there is no directed path of any length from x1i to yr2 . Let P be a directed path from x1i to yr2 . The path P must cross the cut between X1 to Y1 either by the edge (x1i , yi1 ) or by the edge (x2r , yr2 ), since any path (of any length) from x1i can only cross the cut through the edge (x1i , yi1 ) or by an edge of the form (x2j , yj2 ). However, if j 6= r, yr2 is not reachable from yj2 . If P crosses by the edge (x1i , yi1 ) the only way to reach yr2 from yi1 is by the edge (yi1 , yr2 ). In the second case, the edge (x1i , x2r ) must be the first edge in the path. In conclusion, if one of the edges (x1i , x2r ), (yi1 , yr2 ) is in G, then there is a directed path of length 5 between the vertices xij , yrs that does not contain edges of D. Otherwise, there is no directed path of any length from x1i to yr2 . In this case, the only directed path from xij to yrs is the path that consists of the edge (xij , yrs ). 10 Claim 2.2 captures the essence of why our construction is suitable for an approximation problem. Next, we use our graph construction and this claim in order to show our hardness results. 2.1 Randomized directed k-spanner In this section, we address the โˆšdirected k-spanner problem for k โ‰ฅ 5, and show that obtaining an n ฮฑ-approximation requires โ„ฆ( โˆšฮฑ log ) rounds in the Congest model, even when using randomized n algorithms. Lemma 2.3. Let G = G(`, ฮฒ) for ฮฒ โ‰ฅ `, let k โ‰ฅ 5, and let c = 7. If the input strings a, b are disjoint, then there is a k-spanner of size at most c`ฮฒ for G. Otherwise, any k-spanner for G includes at least ฮฒ 2 edges of D. Proof. If the input strings a, b are disjoint, then for every pair of indexes i, r at least one of the edges (x1i , x2r ), (yi1 , yr2 ) is in G. Hence, by Claim 2.2, there is a directed path of length at most 5 between every two vertices xij , yrs , which does not contain edges of D. This gives a 5-spanner of size at most c`ฮฒ edges for G by taking all the edges not in D, since there are at most 2`ฮฒ + 2`2 + 3` such edges, which is at most c`ฮฒ since ` โ‰ค ฮฒ and c = 7. This is also a k-spanner for any k โ‰ฅ 5. If the input strings are not disjoint, then there is a pair of indexes i, r such that neither of the edges (x1i , x2r ), (yi1 , yr2 ) is in G. Hence, by Claim 2.2, there is no directed path between the vertices xij , yrs except for the path that includes the edge (xij , yrs ). Therefore, we need to take all the edges (xij , yrs ) to the spanner for all values of j and s, which means adding ฮฒ 2 edges of D to the spanner. Let k โ‰ฅ 5 and let A be a distributed ฮฑ-approximation algorithm for the minimum k-spanner problem. Denote by T (n) the time complexity of A on a graph with n vertices. The approximation ratio ฮฑ = ฮฑ(n) of the algorithm A may depend on n, and we assume that it is a monotonic increasing function of n, and that if n = ฮ˜(n0 ), then ฮฑ(n) = ฮ˜(ฮฑ(n0 )). Our goal is to show that A can be used to solve set disjointness. If ฮฑ ยท c`ฮฒ < ฮฒ 2 , then by Lemma 2.3, the algorithm A gives a protocol for set disjointness, in which case we show a lower bound of โ„ฆ( log` n ) on the time complexity of A, as stated in the following lemma. Lemma 2.4. Let G = G(`, ฮฒ). If there is a threshold t such that if the input strings a, b are disjoint, an optimal spanner of G has at most t edges, and otherwise each spanner of G includes more than ฮฑ(n) ยท t edges of D, then T (n) = โ„ฆ( log` n ). Proof. We use A to solve set disjointness on input strings of length N = `2 in the following way. Let a, b be two input strings of length N , given to Alice and Bob respectively. We take the graph G = G(`, ฮฒ) and define VB = Y1 , VA = V \ VA . Since the input strings a and b affect only edges between vertices within VA and within VB respectively, it holds that Alice knows all the edges adjacent to vertices in VA and Bob knows all the edges adjacent to vertices in VB . The cut between VA to VB consists of ฮ˜(`) edges: the 2` edges of the matching between X1 to Y1 , and the ` edges between Y1 to Y3 . Now Alice and Bob simulate A on G as follows. Alice simulates the vertices in VA and Bob simulates the vertices in VB . At each round, Alice and Bob exchange the messages going over the cut between VA and VB in either direction. Messages that are sent between vertices in VA or between vertices in VB are simulated locally by Alice and Bob, without any communication. Since the size of messages is O(log n) bits, and the size of the cut is ฮ˜(`), they can simulate one round of A by exchanging at most O(` ยท log n) bits, and therefore they can simulate the entire execution of A by exchanging at most O(T (n) ยท ` ยท log n) bits. 11 At the end of the simulation, Alice knows which of the edges of D are taken to the spanner. If there are more than ฮฑ(n) ยท t edges of D in the spanner, Alice concludes that the input strings are not disjoint, and otherwise she concludes that they are disjoint. To show that this produces the correct output, recall the condition of the lemma that if the input strings are disjoint then the size of an optimal spanner is at most t and otherwise it is more than ฮฑ(n) ยท t. Therefore, if the input strings are disjoint, since A is an ฮฑ(n)-approximation algorithm, it constructs a spanner with at most ฮฑ(n) ยท t edges, in which case Alice indeed outputs that the input strings are disjoint. Otherwise, if the input strings are not disjoint, the size of any spanner is more than ฮฑ(n) ยท t edges, in which case Alice indeed outputs that the input strings are not disjoint. Hence, Alice and Bob solve set disjointness by exchanging O(T (n) ยท ` ยท log n) bits. However, any (perhaps randomized) protocol that solves disjointness on inputs of size N = `2 requires exchanging ` `2 โ„ฆ(`2 ) bits by Lemma 2.1. This gives T (n) = โ„ฆ( `ยทlog n ) = โ„ฆ( log n ). Using Lemma 2.3 and Lemma 2.4, we prove our following main theorem. Theorem 1.1. Any (perhaps randomized) distributed ฮฑ-approximation algorithm in the Congest โˆš n n . model for the directed k-spanner problem for k โ‰ฅ 5 takes โ„ฆ( โˆšฮฑยทlog n ) rounds, for 1 โ‰ค ฮฑ โ‰ค 100 Proof. We show that there is a threshold t that distinguishes whether the inputs are disjoint. Then, using Lemma 2.4, we get a lower bound on the round complexity of A. 0 We define G = G(`, ฮฒ) with the following choice of the q parameters ฮฒ, `. Let n be a positive integer, and let c = 7. Let q = dฮฑ(n0 )ce + 1. Let ` = b n 100 ฮฑ(n) โ‰ค ensures that cq โ‰ค n = ฮ˜(`ฮฒ) = ฮ˜(q`2 ) = ฮ˜(q ยท n0 , n0 q ) n0 cq c, and let ฮฒ = q`. The requirement which shows that ` is positive. The number of vertices in G is = ฮ˜(n0 ). In addition, note that n โ‰ค c`ฮฒ, since the number of 0 vertices in G is 2`ฮฒ + 5`, which gives n โ‰ค c`ฮฒ = cq`2 โ‰ค cq ยท ncq = n0 . Let t = c`ฮฒ. By Lemma 2.3, If the inputs are disjoint, there is a k-spanner for G having at most t = c`ฮฒ edges, and otherwise any k-spanner for G includes at least ฮฒ 2 edges of D. By the definition of q, it holds that ฮฑ(n0 ) ยท c < q, which gives ฮฑ(n0 ) ยท c`ฮฒ < q`ฮฒ = ฮฒ 2 . Since n โ‰ค n0 , it holds that ฮฑ(n) โ‰ค ฮฑ(n0 ), which gives ฮฑ(n) ยท t = ฮฑ(n) ยท c`ฮฒ < ฮฒ 2 . q Hence, t satisfies the conditions of Lemma 2.4, which gives T (n) = โ„ฆ( log` n ). Since ` = ฮ˜( nq ) = โˆš q n ). ฮ˜( ฮฑ(n) ), it holds that T (n) = โ„ฆ( log` n ) = โ„ฆ( โˆš n ฮฑ(n)ยทlog n Theorem 1.1 shows that achieving a constant or a polylogarithmic approximation ratio for the e โˆšn) rounds, and even achieving an directed k-spanner problem in the Congest model requires โ„ฆ( e 1/2โˆ’/2 ) rounds, for any 0 <  < 1. approximation ratio of n is hard, requiring โ„ฆ(n This proves a strict separation between the Local and Congest models, since there is a constant round O(n )-approximation algorithm [5], and a polylogarithmic (1 + )-approximation algorithm (see Section 6) for directed k-spanner in the Local model. It also separates the undirected and directed k-spanner problems, since there are randomized k-round algorithms in the Congest model for constructing (2k โˆ’ 1)-spanners with O(n1+1/k ) edges [28]. These algorithms obtain an approximation ratio of O(n1/k ) for the undirected minimum (2k โˆ’ 1)-spanner problem in k rounds, where achieving the same approximation for the directed e 1/2โˆ’1/2k ) rounds according to Theorem 1.1. problem requires โ„ฆ(n 2.2 Deterministic directed k-spanner We next show that any deterministic algorithm solving the directed k-spanner problem for k โ‰ฅ 5, n requires โ„ฆ( โˆšฮฑยทlog ) rounds. The trick that allows a stronger lower bound is that we use a different n 12 problem from communication complexity, which we refer to as the gap disjointness problem. This problem is also mentioned in [34]. In the gap disjointness problem, Alice and Bob receive the input strings a = (a1 , ..., aN ) and b = (b1 , ..., bN ), respectively, and their goal is to distinguish whether their input strings are disjoint N or are far from being disjoint. The inputs are far from being disjoint if there are at least 12 indexes i, such that ai = bi = 1. If the inputs are neither disjoint nor far from being disjoint, any output of Alice and Bob is valid. The gap disjointness problem can be easily solved by randomized protocols exchanging O(1) bits. However, solving the problem deterministically requires exchanging โ„ฆ(N ) bits. Lemma 2.5. Solving the gap disjointness problem deterministically on input strings of size N requires exchanging โ„ฆ(N ) bits. For a proof of Lemma 2.5, see example 5.5 in [50], where it is shown that approximating the size of the intersection |a โˆฉ b| requires exchanging โ„ฆ(N ) bits. The proof relies only on showing that distinguishing between disjoint inputs and inputs with intersection of more than N6 bits is difficult N (note that any such inputs have intersection of size at least 12 ). Hence, the exact same proof shows that solving gap disjointness requires exchanging โ„ฆ(N ) bits using a deterministic protocol. In order to use set disjointness for the proof of Theorem 1.1, it was necessary to devise a construction where each bit of the input affects many edges of the spanner, in order to argue that even if there is only one index i such that ai = bi = 1, then the players can correctly decide whether the inputs are disjoint by checking the size of the spanner. However, when we use gap disjointness, the players need to distinguish only between the case that the inputs are disjoint and the case that they are far from being disjoint, which allows much more flexibility and gives stronger lower bounds for the deterministic case. Lemma 2.6. Let G = G(`, ฮฒ) for 1 โ‰ค ฮฒ โ‰ค `, let k โ‰ฅ 5 and let c = 7. If the input strings a, b are disjoint, then there is a k-spanner of size at most c`2 . If the input strings are far from being disjoint, 2 any k-spanner for G includes at least ฮฒ12 `2 edges of D. Proof. If the input strings are disjoint, taking all the edges not in D is a 5-spanner, as shown in the proof of Lemma 2.3. These are at most 2`ฮฒ + 2`2 + 3` edges not in D, which is at most c`2 since ฮฒ โ‰ค ` and c = 7. This is also a k-spanner for any k โ‰ฅ 5. `2 If the input strings are far from being disjoint then there are at least 12 pairs (i, r) such that `2 1 2 1 2 none of the edges (xi , xr ), (yi , yr ) are in G. Hence, by Claim 2.2, there are at least 12 pairs (i, r) such that there is no directed path between the vertices xij , yrs except for the path that consists of the edge (xij , yrs ). For each such pair, we need to take all the directed edges (xij , yrs ) to the spanner for all the values of j and s, which means adding ฮฒ 2 edges to the spanner. Summing over 2 `2 all the 12 pairs, we get that any k-spanner must include at least ฮฒ12 `2 edges of D. Let k โ‰ฅ 5 and let A be a deterministic distributed ฮฑ-approximation algorithm for the minimum k-spanner problem. Denote by T (n) the round complexity of A on a graph with n vertices. The following lemma adapts Lemma 2.4 to the gap disjointness problem. Its proof is the same as the proof of Lemma 2.4, with the difference that now Alice concludes that the input strings are far from being disjoint if and only if the constructed spanner has more than ฮฑ(n) ยท t edges of D. Also, now the lower bound holds only for the deterministic case, since it relies on the communication complexity of gap disjointness. Lemma 2.7. Let G = G(`, ฮฒ). If there is a threshold t such that if the input strings a, b are disjoint then an optimal k-spanner of G has at most t edges, and if the input strings are far from being disjoint then each k-spanner of G includes more than ฮฑ(n) ยท t edges of D. Then, T (n) = โ„ฆ( log` n ). 13 Using Lemma 2.6 and Lemma 2.7, we show the following. Theorem 2.8. Any deterministic distributed ฮฑ-approximation algorithm in the Congest model n for the directed k-spanner problem for k โ‰ฅ 5 takes โ„ฆ( โˆšฮฑยทlog ) rounds, for 1 โ‰ค ฮฑ โ‰ค cn0 for a constant n c0 > 1. Proof. We construct the graph G = G(`, ฮฒ) withp the following choice for the parameters `, ฮฒ. Let n0 n0 be a positive integer, and let c = 7. Let ฮฒ = d 12ฮฑ(n0 )ce + 1, and let ` = b cฮฒ c. 0 The number of vertices in G is n = ฮ˜(`ฮฒ) = ฮ˜( nฮฒ ฮฒ) = ฮ˜(n0 ). In addition, it holds that n โ‰ค c`ฮฒ 0 n since the number of vertices in G is 2`ฮฒ + 5`, which gives n โ‰ค c`ฮฒ โ‰ค cฮฒ cฮฒ = n0 . In order to use Lemma 2.6 we need to verify that ฮฒ โ‰ค `. Note that p n = c1 `ฮฒpfor a constant 2 โ‰ค c1 โ‰ค c. It follows that ฮฒ โ‰ค ` if and only if c1 ฮฒ 2 โ‰ค n. Since ฮฒ =q ฮ˜( ฮฑ(n)) = c2 ฮฑ(n) for a constant c2 , if we choose c0 = c1 c22 , we get that if ฮฑ(n) โ‰ค n c0 , then ฮฒ โ‰ค n c1 , which gives c1 ฮฒ 2 โ‰ค n as needed. We now define t = c`2 . By Lemma 2.6, if the input strings a, b are disjoint, then there is a k-spanner of size at most t = c`2 . Otherwise, if the input strings are far from being disjoint, then any 2 k-spanner for G includes at least ฮฒ12 `2 edges of D. By the choice of ฮฒ and since n โ‰ค n0 , it holds that 2 12ฮฑ(n) ยท c < ฮฒ 2 , which gives ฮฑ(n) ยท t = ฮฑ(n) ยท c`2 < ฮฒ12 `2 , which shows that t satisfies the conditions of Lemma 2.7. Using Lemma 2.7 we get that T (n) = โ„ฆ( log` n ). Note that now ` = ฮ˜( ฮฒn ) = ฮ˜( โˆš n ), ฮฑ(n) which shows that T (n) = โ„ฆ( โˆš n ). ฮฑ(n)ยทlog n Theorem 2.8 shows that achieving a constant or a polylogarithmic approximation ratio for the e directed k-spanner problem in the Congest model requires โ„ฆ(n) rounds for any deterministic  e 1โˆ’/2 ) rounds, for algorithm. In addition, even an approximation ratio of n is hard, requiring โ„ฆ(n n any 0 <  < 1. Notably, even an approximation ratio of c for appropriate values of c is hard, e โˆšn) rounds. This is to be contrasted with the fact that obtaining an approximation requiring โ„ฆ( ratio of n requires no communication, since any k-spanner has at least n โˆ’ 1 edges. Theorem 2.8 separates the Local and the Congest models, since the deterministic network decomposition described in [5] gives a deterministic O(n )-approximation for directed k-spanner for a constant k in polylogarithmic time in the Local model. It also separates the undirected and directed k-spanner problems for deterministic algorithms. Currently the best deterministic algorithm in the Congest model for the undirected k-spanner problem, is a recent algorithm [40] which constructs (2kโˆ’1)-spanners of size O(n1+1/k ) in O(n1/2โˆ’1/k ) rounds for a constant even k (in the Local nodel there is a k-round deterministic algorithm for this problem [17]). This gives an O(n1/k )-approximation for undirected (2k โˆ’ 1)-spanners. Achieving the e 1โˆ’1/2k ) rounds according to Theorem 2.8. same approximation for the directed problem requires โ„ฆ(n 2.3 Weighted k-spanner We extend our construction to the weighted case, showing that any approximation for the weighted e k-spanner in the Congest model takes โ„ฆ(n) rounds for k โ‰ฅ 4, even for randomized algorithms. A similar result holds for the weighted undirected case. In the weighted case, rather than guaranteeing that each input bit affects many edges of the spanner, we simply assign weight 0 to all the edges that are not in D and weight 1 to all the edges of D. Hence, taking even a single edge from D is very expensive if we can avoid it. This allows us to show a simpler construction, obtaining a stronger lower bound for the weighted case, as follows. We build a graph Gw (`) = Gw = (Vw , Ew ) which is the same as G, except for the following differences (see Figure 2). We define ฮฒ = 1, and change the set of vertices to be Vw = V \ Y3 . 14 Since ฮฒ = 1, the vertices in X2 and Y2 are only of the form xi1 , yi1 for 1 โ‰ค i โ‰ค `. We change their names from xi1 , yi1 to xi and yi , respectively. For each 1 โ‰ค i โ‰ค ` we replace the two edges (yi2 , yi3 ), (yi3 , yi1 ) โˆˆ E by the edge (yi2 , yi ) โˆˆ Ew . Since ฮฒ = 1, the size of the cut between Y1 and the rest of the graph is still ฮ˜(`). ๐‘‹2 ๐‘Œ2 ๐‘ฅ1 ๐‘ฆ1 ๐‘ฅ2 ๐‘ฆ2 ๐‘ฅโ„“ ๐‘ฆโ„“ ๐‘‹1 ๐‘Œ1 ๐‘ฅ11 ๐‘ฆ11 ๐‘ฅ21 ๐‘ฆ21 ๐‘ฅโ„“1 ๐‘ฆโ„“1 ๐‘ฅ12 ๐‘ฆ12 ๐‘ฅ22 ๐‘ฆ22 ๐‘ฅโ„“2 ๐‘ฆโ„“2 Figure 2: The graph Gw , with some of its edges omitted for clarity. The red dashed edges are examples of optional edges which depend on the input strings a and b. The following theorem states our lower bound for the weighted directed case. Theorem 2.9. Any (perhaps randomized) distributed ฮฑ-approximation algorithm in the Congest model for the weighted directed k-spanner problem for k โ‰ฅ 4 takes โ„ฆ( logn n ) rounds. Proof. Let n = 6` for a positive integer `, and let Gw = Gw (`). Note that the number of vertices in Gw is exactly n. There is a 4-spanner of cost 0 for Gw if and only if there is a path of length at most 4 of edges of weight 0 between every pair of vertices xi , yj . A path of length at most 4 between xi and yj that includes only edges of weight 0, must start with the edge (xi , x1i ) and must end with the edge (yj2 , yj ). Following the proof of Claim 2.2, we argue that there is such a path if and only if one of the edges (x1i , x2j ), (yi1 , yj2 ) is in Gw . Otherwise, there is no directed path of weight 0 between xi and yj . It follows that for every k โ‰ฅ 4, there is a k-spanner of cost 0 for Gw if and only if the inputs a and b are disjoint. Hence, a distributed ฮฑ-approximation algorithm A for the weighted k-spanner problem can be used to solve set disjointness: we define VB = Y1 , VA = V \ VB and let Alice and Bob simulate the algorithm on Gw as before. At the end of the simulation, Alice concludes that the inputs are disjoint if and only if none of the edges of D are taken to the spanner. If the inputs are disjoint, then there is a spanner of cost 0. Hence, for any ฮฑ โ‰ฅ 1, an ฮฑapproximation must return a spanner of cost 0 if such exists. Otherwise, any spanner must include at least one of the edges of D which proves that the output of Alice is indeed correct. As in the proof of Lemma 2.4, we get that T (n) = โ„ฆ( log` n ). Since n = 6`, this gives T (n) = โ„ฆ( logn n ). We prove a similar bound for the weighted undirected k-spanner problem for k โ‰ฅ 4. In the undirected case, we would like to construct a similar graph Gw , with only modifying all of its edges to be undirected. It would still hold that there is a path of length at most 4 of edges of weight 0 15 between the vertices xi , yj if and only if one of the edges {x1i , x2j }, {yi1 , yj2 } is in Gw , following the same proof. However, since the edges are undirected, there may be a path of length longer than 4 of edges of weight 0 between the vertices xi , yj , even if none of the edges {x1i , x2j }, {yi1 , yj2 } is in Gw , which requires us to modify our construction in order for our bounds to apply also for k > 4. We change the construction of Gw as follows. For each 1 โ‰ค i โ‰ค ` we replace the edge {yi2 , yi } by a path of length k โˆ’ 3, by adding to the graph k โˆ’ 4 vertices yi3 , ..., yikโˆ’2 and the required edges for constructing the path {yi2 , yi3 , ..., yikโˆ’2 , yi }. All of the edges of the path have weight 0. Any path of length at most k of edges of weight 0 between xi to yj must start with the edge {xi , x1i } and must end with the path of length k โˆ’ 3 that we added between yj2 to yj . Hence, there is a path of length at most k between xi to yj of edges of weight 0 if and only if there is a path of length 2 between x1i and yj2 . This can only happen if one of the edges {x1i , x2j }, {yi1 , yj2 } is in the graph. The rest of the proof is exactly the same as in the directed case. However, we added ฮ˜(k`) vertices to the graph. Hence, the number of vertices in the graph is n = ฮ˜(k`) and not ฮ˜(`) as e n ) to the undirected before, which gives ` = ฮ˜( nk ). This allows us to prove a lower bound of โ„ฆ( k e problem (which is still โ„ฆ(n) for small values of k). Theorem 2.10. Any (perhaps randomized) distributed ฮฑ-approximation algorithm in the Congest n model for the weighted undirected k-spanner problem for k โ‰ฅ 4 takes โ„ฆ( kยทlog n ) rounds. 3 Hardness of approximation of weighted 2-spanner In this section, we show that approximating the weighted 2-spanner problem is at least as hard as approximating the (unweighted) minimum vertex cover (MVC) problem. Therefore, known lower bounds for MVC translate directly to lower bounds for the weighted 2-spanner problem. In the MVC problem the input is a graph G = (V, E) and the goal is to find a minimum set of vertices C that covers all the edges. That is, it is required that for each edge e = {v, u}, at least one of v and u is in C. Let G = (V, E) be an input graph to the MVC problem. We construct a new graph GS = (VS , ES ) in the following way (see Figure 3). For each vertex v โˆˆ V , there are 3 vertices in VS : v1 , v2 , v3 . We connect these 3 vertices by a triangle, where the edge {v1 , v2 } has weight 1, and the edges {v1 , v3 }, {v2 , v3 } have weight 0. In addition, for each edge {v, u} โˆˆ E, there are 3 edges in ES : {v1 , u1 }, {v2 , u2 }, both having weight 0, and one of the edges {v1 , u2 }, {u1 , v2 }, according to the order of the IDs of v and u, having weight 2. 0 ๐‘ฃ3 0 ๐‘ฃ1 1 0 ๐‘ฃ2 ๐‘ข1 2 ๐‘ข3 1 ๐‘ข2 0 0 0 Figure 3: For each vertex v โˆˆ G, there is a corresponding triangle in GS between the vertices v1 , v2 , v3 . The edge {v, u} โˆˆ G has 3 corresponding edges in GS : {v1 , u1 }, {v2 , u2 }, {v1 , u2 }. We show that a solution for the weighted 2-spanner problem in GS gives a solution for MVC in G. 16 Claim 3.1. The cost of the minimum 2-spanner in GS is exactly the size of the minimum vertex cover in G. Proof. Let C be a minimum vertex cover in G. We construct a 2-spanner HC for GS as follows. First, HC includes all the edges having weight 0. In addition, for every v โˆˆ C, we add to HC the edge {v1 , v2 }. Note that these edges have weight 1, and all the other edges we add to HC have weight 0, hence, the cost of HC is exactly |C|. We now show that HC is a 2-spanner. All the edges having weight 0 in GS are added to the spanner, and hence they are covered. All the edges having weight 1 are covered by edges of weight 0, since an edge {v1 , v2 } is covered by the path {v1 , v3 }, {v3 , v2 }. Let {v1 , u2 } be an edge of weight 2 in GS , and let {v, u} be the corresponding edge in G. Since C is a vertex cover, at least one of the vertices v, u is in C. In the former case, we add {v1 , v2 } to HC , hence, the edge {v1 , u2 } is covered by the path {v1 , v2 }, {v2 , u2 } (note that {v2 , u2 } has weight 0 and is included in HC ). In the latter case, {v1 , u2 } is covered by the path {v1 , u1 }, {u1 , u2 }. Hence, HC is a 2-spanner having cost |C|. In the other direction, let H be a minimum cost 2-spanner in GS having cost w(H). We construct a vertex cover CH in G with size w(H). We start by converting H into a 2-spanner H 0 with the same cost. First, H 0 contains all the edges having weight 0 in GS and all the edges having weight 1 in H. In addition, if H includes an edge {v1 , u2 } having weight 2, we replace it in H 0 by the two edges {v1 , v2 }, {u1 , u2 }, each having weight 1. This transformation clearly cannot increase the cost. We next show that H 0 is still a 2-spanner. Since H 0 includes all the edges having weight 0 in GS , it covers all the edges of weight 0 or 1 by edges of weight 0, as explained above. In addition, any edge of weight 2 that is covered in H by a path of length 2 that includes only edges of weight 0 or 1, is covered in H 0 in the same way. Let e = {x1 , y2 } be an edge of weight 2, covered in H by a path P of length at most 2 that includes the edge e0 = {v1 , u2 } โˆˆ H having weight 2 (e0 may be different than e). It holds that e0 6โˆˆ H 0 , since e0 has weight 2, hence, we added the edges {v1 , v2 } and {u1 , u2 } to H 0 . Since P has length at most 2, it follows that x1 = v1 or y2 = u2 . In the first case, e = {v1 , y2 } and the path {v1 , v2 }, {v2 , y2 } covers e (we added {v1 , v2 } to H 0 , and since {v1 , y2 } โˆˆ ES , then {v2 , y2 } is also in ES and has weight 0). In the second case, e = {x1 , u2 } and {x1 , u1 }, {u1 , u2 } is a path of length 2 that covers e in H 0 . Therefore, H 0 is a 2-spanner with the same cost of H. We define CH = {v|{v1 , v2 } โˆˆ H 0 }. The size of CH is exactly w(H 0 ) since the edges {v1 , v2 } โˆˆ H 0 are exactly all the edges of H 0 having weight 1, and H 0 includes only edges of weight 0 or 1. In addition, we claim that CH is a vertex cover. Let {v, u} โˆˆ E, then one of the edges {v1 , u2 } or {u1 , v2 } is in ES . Assume w.l.o.g that e = {v1 , u2 } โˆˆ ES . Note that e 6โˆˆ H 0 since it has weight 2. Since H 0 is a 2-spanner it includes a path of the form {v1 , x}, {x, u2 } that covers e. It must hold that x = v2 or x = u1 (if, for example, x = w1 such that w1 = 6 u1 , then the edge {w1 , u2 } has weight 2 and is not in H 0 ). Hence, at least one of the edges {v1 , v2 }, {u1 , u2 } is in H 0 , which means that at least one of v, u is in CH as needed. In conclusion, the cost of a minimum 2-spanner in GS is exactly the size of the minimum vertex cover in G. We can now relate the above to the number of rounds required for distributed algorithms that solve or approximate these two problems. Lemma 3.2. Let A be a distributed ฮฑ-approximation algorithm for the weighted 2-spanner problem that takes T (n) rounds on a graph with n vertices. Then there is an ฮฑ-approximation algorithm for MVC that takes 3T (3n) rounds on a graph with n vertices. Proof. We describe an algorithm AM V C that approximates MVC. Let G be an input graph for MVC. The algorithm AM V C simulates A on the graph GS , in the following way. Each vertex 17 v โˆˆ V simulates AM V C on the vertices v1 , v2 , v3 . Each time a message is sent on one of the 3 edges corresponding to an edge {v, u} โˆˆ E, we send this message over the edge {v, u} โˆˆ E. Since we may need to send 3 different messages on this edge, each round of A can be simulated in three rounds of AM V C .5 When A finishes, we convert the solution H to a vertex cover CH as described in the proof of Claim 3.1, without any communication. From Claim 3.1, it follows that if H is an ฮฑ-approximation for the weighted 2-spanner problem in GS , then CH is an ฮฑ-approximation for MVC in G. Let n be the number of vertices in G. The number of vertices in GS is 3n from the definition of GS , hence the time complexity of simulating A on GS is 3T (3n). Lemma 3.2 shows that if A works in the Congest model, then AM V C works in the Congest model as well. Hence, lower bounds for approximating MVC in both the Local and the Congest models give lower bounds for the weighted 2-spanner problem. This gives the following results. Theorem 3.3. To obtain a constant or a polylogarithmic approximation ratio for the weighted 2-spanner problem, even in the Local model, q there are graphs on which every distributed algorithm log โˆ† requires at least โ„ฆ( log log โˆ† ) rounds and โ„ฆ( logloglogn n ) rounds. Theorem 3.3 follows from Theorem 14 in [48] and from Lemma 3.2. Note that the number of vertices and the maximum degree in GS are equal up to a constant factor to the number of vertices and maximum degree in G. In addition, Theorem 13 in [48], allows us to show trade-offs between the time complexity of a distributed algorithm for weighted 2-spanner to the approximation ratio it gets. Theorem 3.4. For every integer k > 0, there are graphs G, such that in k communication rounds in the Local model, every distributed algorithm for the weighted 2-spanner problem on G has !  1  1โˆ’o(1) k+1 n 4k2 approximation ratios of at least โ„ฆ and โ„ฆ โˆ† k . k In the Congest model, solving MVC optimally takes โ„ฆ which carries over to exact spanners, as follows.  n2 log2 n  rounds (see Theorem 2 in [11]), Theorem 3.5. Any distributed in the Congest model that solves the weighted 2-spanner   algorithm n2 problem optimally requires โ„ฆ log2 n rounds. All of these lower bounds hold also for randomized algorithms. Remarks: Our reduction from MVC can be adapted to obtain additional bounds. First, by changing the weights of all edges having weight 2 to have weight 1, we obtain that an ฮฑ-approximation for the weighted 2-spanner problem gives a 2ฮฑ-approximation for MVC. This implies the lower bounds of Theorem 3.3 and Theorem 3.4 also for graphs with 0, 1 weights. This can be viewed as lower bounds for the 2-spanner augmentation problem, in which we are given an initial set of edges and need to augment it with the minimal number of edges that induces a 2-spanner. Further, the same lower bounds hold for the directed weighted case. We modify the construction such that the edges of the triangle for vertex v are (v1 , v2 ), (v1 , v3 ), (v3 , v2 ). For an edge {v, u} โˆˆ E, ES includes 5 directed edges: (v1 , u1 ), (u1 , v1 ), (v2 , u2 ), (u2 , v2 ) and one of the edges (v1 , u2 ), (u1 , v2 ). The weights of all the edges remain as in the undirected case. 5 In the Local model we can send these 3 messages in one round. However, we spend three different rounds in order for the simulation to work also in the Congest model. 18 4 Distributed approximation for 2-spanner problems Here we present our distributed approximation algorithm for the minimum 2-spanner problem. We need the following terminology and notation. A v-star is a non-empty subset of edges between v and a subset of its neighbors. The density S| of a star S with respect to a subset of edges H, denoted by ฯ(S, H), equals |C |S| , where CS is the set of edges of H 2-spanned by the star S, where an edge e = {u, w} is 2-spanned by the v-star S if S includes the edges {v, u}, {v, w}. Note that S covers all the edges 2-spanned by S and also the edges of S, but it 2-spans only non-star edges. The densest v-star with respect to H is the v-star having maximal density with respect to H. The density of a vertex v with respect to H, denoted by ฯ(v, H), is the density of the densest v-star. If H is clear from the context, we refer to ฯ(S, H) and ฯ(v, H) as the density of S and the density of v, and denote them by ฯ(S) and ฯ(v), respectively. The rounded density of a star S with respect to H, denoted by ฯฬƒ(S, H), is obtained by rounding ฯ(S, H) to the closest power of 2 that is greater than ฯ(S, H). Similarly, the rounded density of a vertex v with respect to H, denoted by ฯฬƒ(v, H), is obtained by rounding ฯ(v, H) to the closest power of 2 that is greater than ฯ(v, H). The full v-star is the star that includes all the edges between v and its neighbors. The 2-neighborhood of a vertex v consists of all the vertices at distance at most 2 from v. In our algorithm, each vertex v maintains a set Hv that includes all the edges 2-spanned by the full v-star that are still not covered by the edges added to the spanner. The algorithm proceeds in iterations, where in each iteration the following is computed: 1. Each vertex v computes its rounded density ฯv = ฯฬƒ(v, Hv ), and sends it to its 2-neighborhood. 2. Each vertex v such that ฯv โ‰ฅ ฯu for each u in its 2-neighborhood and ฯ(v, Hv ) โ‰ฅ 1 is a candidate. Let Sv be a v-star with density at least ฯ4v , chosen according to Section 4.1 (a choice which is central for our analysis to carry through). Vertex v informs its neighbors about Sv . Let Cv be the edges of Hv 2-spanned by Sv . 3. Each candidate v chooses a random number rv โˆˆ {1, ..., n4 } and sends it to its neighbors.6 4. Each uncovered edge that is 2-spanned by at least one of the candidates, votes for the first candidate that 2-spans it according to the order of the values rv . If there is more than one candidate with the same minimum value, it votes for the one with minimum ID. 5. Each star Sv for which v receives at least spanner. |Cv | 8 votes from edges it 2-spans is added to the 6. Each vertex v updates the set Hv in its 2-neighborhood by removing from it edges that are now covered. 7. If the maximal density in the 2-neighborhood of v is at most 1, v adds to the spanner all the edges adjacent to it that are still not covered, and outputs the edges adjacent to it that were added to the spanner during the algorithm. At the end of the algorithm all the edges are covered by spanner edges, since we add to the spanner edges that are not 2-spanned during the algorithm. 6 Knowing the exact value of n is unnecessary, and the typical assumption that the vertices know a polynomial upper bound on n suffices. 19 Since all the candidates have maximal rounded density in their 2-neighborhood, it follows that all the candidates that cover the same edge have the same rounded density, which is crucial in the analysis. In addition, rounding the densities guarantees that there are only O(log โˆ†) possible values for the maximal rounded density, which allows us to show an efficient time complexity. Each iteration takes constant number of rounds in the Local model. For example, to calculate ฯฬƒ(v, Hv ), each vertex v learns all the edges between its neighbors that are still uncovered, by having each vertex u send to its neighbors a list of its neighbors w such that the edges {u, w} are still not covered. We next show that the algorithm requires only polynomial local computations. We can compute the densest v-star in polynomial time as in the sequential algorithm (see Lemma 2.1 in [46]). This is the maximal density problem, that can be solved in polynomial time using flow techniques [36]. This allows us to compute the rounded density of a vertex. We next explain how we choose the star Sv in polynomial time. Other computations in the algorithm are clearly polynomial. 4.1 Choosing the star Sv In step 2 of each iteration, a candidate vertex v chooses a v-star with density at least ฯ4v . However, there may be multiple v-stars with such density, and choosing an arbitrary star between them does not meet our claimed round complexity, and it is crucial to choose the stars in a certain way. In addition, we have to find such star using only polynomial local computations. We next describe how to choose the star Sv . Let Hvi be the subset Hv at the beginning of iteration i. It holds that Hvi+1 โІ Hvi for all i. Let ฯ = ฯฬƒ(v, Hvi ). The star Svi that v chooses in iteration i is defined as follows. If i is the first iteration in which v is a candidate with rounded density ฯ, then Svi is chosen as follows. First, v computes the densest v-star, denote it by S. Now, if there is an edge e such that ฯ(S โˆช {e}, Hvi ) โ‰ฅ ฯ4 , then v adds such an edge to S. Otherwise, if there is a disjoint v-star S 0 such that ฯ(S 0 , Hvi ) โ‰ฅ ฯ4 , then v adds the edges of S 0 to S. Now v continues in the same manner until there is no edge or disjoint star it can add to S without decreasing the density below ฯ4 . The resulting star is Svi . If v is already a candidate with rounded density ฯ in iteration i โˆ’ 1, then if ฯ(Sviโˆ’1 , Hvi ) โ‰ฅ ฯ4 , we define Svi = Sviโˆ’1 . Otherwise, if Sviโˆ’1 contains a star with density at least ฯ4 with respect to Hvi , we define Svi as follows. v starts by computing the densest v-star S that is contained in Svi , and then adds to it edges or disjoint stars as before, however, it only considers adding edges or disjoint stars from Sviโˆ’1 . This guarantees that Svi โІ Sviโˆ’1 . If Sviโˆ’1 does not contain a star with density at least ฯ4 with respect to Hvi , v chooses an arbitrary v-star with rounded density ฯ. (We later show that this never happens). The computations are polynomial. v adds edges to S at most n times. Each time it adds edges it does the following computation: it checks if there is an edge such that ฯ(S โˆช {e}, Hvi ) โ‰ฅ ฯ4 , and since there are at most n optional edges, the computation is polynomial. It also checks if there is a disjoint star with density at least ฯ4 . To compute this, it computes the densest star that is disjoint to S. 4.2 Analysis In this section, we present the analysis of our distributed approximation algorithm for the minimum 2-spanner problem, and prove the following theorem. Theorem 1.3. There is a distributed algorithm for the minimum 2-spanner problem in the Local model that guarantees an approximation ratio of O(log m n ), and takes O(log n log โˆ†) rounds w.h.p. Let H be the set of edges of the spanner produced by the algorithm. When the algorithm ends, โˆ— all the edges are covered, hence H is a 2-spanner. We show that its size it at most O(log m n )|H |, 20 where H โˆ— is the set of edges of a minimum 2-spanner. Afterwards, we show that the time complexity of the algorithm is O(log n log โˆ†) rounds, w.h.p. 4.2.1 Approximation ratio We start by showing that our algorithm guarantees an approximation ratio of O(log m n ). The analysis of the sequential algorithm of [46] that obtains the same approximation ratio strongly depends on the facts that stars are added to the spanner one by one and that the star that is added at each step has maximal rounded density. These allow dividing the edges to several subsets according to the order in which they are covered in the algorithm, and bounding the number of edges in each subset. Our analysis borrows ideas from the above analysis, but requires a more sophisticated accounting, since our algorithm adds multiple stars in each iteration, with varying densities. In addition to overcoming these uncertainties, a compelling aspect of our approach is that it easily extends to other variants of the problem, such as the client-server 2-spanner problem [29]. To show the approximation ratio, we assign each edge e โˆˆ E a value cost(e) such that the sum of the costs of all edges is closely related both to |H| and |H โˆ— |, by satisfying  X m โˆ— |H |, |H| โ‰ค 8 cost(e) โ‰ค O log n eโˆˆE which implies our claimed approximation ratio. We write H = H1 โˆช H2 , where H1 are edges added to the spanner during the algorithm, and H2 are edges added to the spanner at the end of the algorithm, when the maximal density in the 2-neighborhood of a vertex is at most 1. For an edge e โˆˆ H2 , we set cost(e) = 1. For an edge e โˆˆ H1 , let i be the iteration in which e is first covered in the algorithm. The edge e may be covered by a candidate star Sv that it votes for and is added to the spanner at iteration i. In this case, we set cost(e) = ฯ1 , where ฯ is the density of the star Sv that e chooses at iteration i. Another option is that e is covered as a result of adding other stars to the spanner at iteration i: it may be covered either by a different star than the one it votes for, or by a path of length 2 that is created by edges added to the spanner at iteration i together with edges added at previous iterations. In each of these cases, we set cost(e) = 0. We first show the left inequality above. P Lemma 4.1. |H| โ‰ค 8 ยท eโˆˆE cost(e). P P |H1 | โ‰ค 8 P Proof. ToPprove that |H| โ‰ค 8 eโˆˆE cost(e), it is enough to show thatP eโˆˆE\H2 cost(e) and |H2 | โ‰ค 8 eโˆˆH2 cost(e). The second inequality follows since |H2 | = eโˆˆH2 1 = eโˆˆH2 cost(e). We next prove the first inequality. P Let Stars be the set of stars added to H1 in the algorithm. It holds that |H1 | โ‰ค SโˆˆStars |S|, since each edge of H1 is included in at least one star. Let Sv be a star added to H1 at iteration i, having density ฯ at that iteration. Recall that we add Sv to the spanner since it gets at least |C8v | votes from the edges it 2-spans. Denote by V otes(Sv ) the set of edges that vote for Sv at iteration i. For each e โˆˆ V otes(Sv ), we defined cost(e) = ฯ1 , which gives, X eโˆˆV otes(Sv ) cost(e) โ‰ฅ 1 |Cv | |Sv | |Cv | |Sv | ยท = ยท = . ฯ 8 |Cv | 8 8 P Hence, for each S โˆˆ Stars, |S| โ‰ค 8 ยท eโˆˆV otes(S) cost(e). For each edge e, there is at most one star S โˆˆ Stars such that e โˆˆ V otes(S), since an edge votes for at most one star at the iteration in which 21 it is covered. In addition, an edge e โˆˆ V otes(S) is 2-spanned during the algorithm, which means that e 6โˆˆ H2 . Hence, we get X X X X |H1 | โ‰ค |S| โ‰ค 8 ยท cost(e) โ‰ค 8 ยท cost(e). SโˆˆStars SโˆˆStars eโˆˆV otes(S) eโˆˆE\H2 This completes the proof of Lemma 4.1. P To bound eโˆˆE cost(e) from above, let r = m n , and f = dlog re. We divide the edges of E f +1 to f + 2 subsets {Ej }j=0 according to their costs, and show that for each j, the sum of costs โˆ— of P edges in Ej is at most โˆ—O(|H |). Since there are f + 2 = O(log r) subsets, we conclude that eโˆˆE cost(e) โ‰ค O(log r)|H |. Let E0 = {e : cost(e) = 0} and Ef +1 = H2 . Note that all the edges not in E0 and Ef +1 are edges that were 2-spanned in the algorithm by the candidate star they vote for. We divide these edges to f subsets as follows. Let E1 = {e 6โˆˆ H2 : 0 < cost(e) โ‰ค 2r }, and for 2 โ‰ค j โ‰ค f , let jโˆ’1 j Ej = {e 6โˆˆ H2 : 2 r < cost(e) โ‰ค 2r }. For each edge e, it holds that cost(e) โ‰ค 1, since the density of stars added to H1 during the algorithm is at least 1, and since we defined cost(e) = 1 for edges f +1 Ef . e โˆˆ H2 . Hence, for each edge e, we have cost(e) โ‰ค 2r , which gives E = โˆชfj=0 P Lemma 4.2. For every 0 โ‰ค j โ‰ค f + 1, eโˆˆEj cost(e) = O(|H โˆ— |). P Proof. For j = 0, the claim holds trivially. For j = 1, it holds that eโˆˆE1 cost(e) โ‰ค 2r ยท |E| โ‰ค 2n = O(|H โˆ— |), where the last equality follows from the fact that any 2-spanner for G has at least n โˆ’ 1 edges, since G is connected. For 2 โ‰ค j โ‰ค f , let Hjโˆ— be the set of edges of a minimum 2-spanner for Ej . For each P vertex v, let โˆ— Sj (v) be the full v-star in Hjโˆ— . We define Starsj = {Sjโˆ— (v)}vโˆˆV . We next show that eโˆˆEj cost(e) โ‰ค P P P P 9 SโˆˆStarsj |S|. To prove this, we write eโˆˆEj cost(e) = eโˆˆEj โˆฉStarsj cost(e)+ eโˆˆEj \Starsj cost(e). P P Since cost(e) โ‰ค 1, we get eโˆˆEj โˆฉStarsj cost(e) โ‰ค SโˆˆStarsj |S|. P P We now show that eโˆˆEj \Starsj cost(e) โ‰ค 8 SโˆˆStarsj |S|. Consider a specific star S โˆˆ Starsj , and let (e1 , ..., e` ) be the edges of Ej 2-spanned by S according to the order in which they were 2-spanned in the algorithm, breaking ties arbitrarily. Note that all the edges in Ej for 1 โ‰ค j โ‰ค f are 2-spanned in the algorithm as explained above. The density of S at the beginning of the iteration ` in which e1 is 2-spanned is at least |S| , since S may 2-span additional edges that are not in Ej . Since all the candidates that 2-span an edge have the same rounded density because they all have maximal rounded density in their 2-neighborhood, it holds that the density of the star Sv that ` ` 2-spans e1 is at least 4|S| , as v chooses a star with density at least ฯ4v โ‰ฅ 4|S| . Hence, cost(e1 ) โ‰ค 4|S| ` . This gives, ` โ‰ค 4|S| cost(e1 ) โ‰ค each edge e โˆˆ Ej , cost(e) r 4|S|, where the 2jโˆ’1 2j โ‰ค r . Therefore, ` X i=1 cost(ei ) โ‰ค last inequality follows since e1 โˆˆ Ej . Note that for 2j 2j r `โ‰ค ยท jโˆ’1 4|S| = 8|S|. r r 2 Let CS be the set of edges of Ej 2-spanned by the star S. Since Hjโˆ— is a 2-spanner for Ej , every edge e โˆˆ Ej \ Starsj is 2-spanned by at least one star S โˆˆ Starsj . Summing over all the stars in Starsj gives X X X X cost(e) โ‰ค cost(e) โ‰ค 8 |S|. eโˆˆEj \Starsj SโˆˆStarsj eโˆˆCS 22 SโˆˆStarsj P Note that SโˆˆStarsj |S| = 2|Hjโˆ— |, since each edge of Hjโˆ— is included in exactly two stars in Starsj . In addition |Hjโˆ— | โ‰ค |H โˆ— | since H โˆ— covers all the edges P of E, and in particular all the edges of Ej , and Hjโˆ— is the minimum 2-spanner of Ej . This gives eโˆˆEj cost(e) = O(|H โˆ— |), which completes the proof for 2 โ‰ค j โ‰ค f . For j = f + 1, we define Hjโˆ— and Starsj as before. Let S โˆˆ Starsj , and let (e1 , ..., e` ) be the edges of Ej = H2 that are 2-spanned by S according to the order in which they were added to H2 in the algorithm, breaking ties arbitrarily. It must hold that ` โ‰ค |S|, as otherwise the density of S is greater than P` one at the iteration in which e1 is added to H2 , which contradicts the algorithm. This P gives i=1 cost(eโˆ—i ) โ‰ค ` โ‰ค |S|. Following the same arguments for the case 2 โ‰ค j โ‰ค f , we get eโˆˆEj cost(e) = O(|H |), which completes the proof. P Lemmas 4.1 and 4.2 give |H| โ‰ค 8 eโˆˆE cost(e) โ‰ค O(log r)|H โˆ— |, which proves the following claimed approximation ratio. Lemma 4.3. The approximation ratio of the algorithm is O(log m n ). 4.2.2 Time complexity We now show that our algorithm completes in O(log n log โˆ†) rounds, w.h.p. In [43, 60], a potential function argument is given for analyzing the set cover and minimum dominating set problems that are addressed. We analyze our algorithm along a similar argument, but our algorithm necessitates a more intricate analysis, mainly due to the fact that each vertex may be the center of multiple stars that are added during the algorithm, rather than being chosen only once for a dominating set. The latter may contain at most n vertices, while for the spanner constructed by our algorithm there are initially n2โˆ† possible stars which may constitute it. Nevertheless, we show how to get a time complexity of O(log n log โˆ†) rounds for our minimum 2-spanner algorithm, which matches the time complexity of the above set cover and dominating set algorithms. The crucial component in proving our small time complexity is showing that as long as the rounded density of v does not change between iterations, v always chooses a star Sv that is equal to or contained in the star that it chooses in the previous iteration. As explained in Section 4.1, if the rounded density of v is the same in iterations i and i + 1, v tries to choose a star Svi+1 which is contained in Svi . We show that this is always the case. The following will be useful in our analysis. Observation 1. Let x1 , x2 , ..., xn be non-negative numbers, and let y1 , y2 , ..., yn be positive numbers, then   Pn   xi xi xi i=1 min โ‰ค Pn โ‰ค max . i i yi yi i=1 yi n o n o x In addition, the inequalities become equalities only if for all j, yjj = mini xyii = maxi xyii . Observation 1 follows from writing Pn i=1 xi = Pn xi i=1 yi ยท yi . We now prove the following. Claim 4.4. Let v be a candidate star in iteration i. If ฯฬƒ(v, Hvi ) = ฯฬƒ(v, Hvi+1 ) = ฯ, then v chooses a star contained in Svi in iteration i + 1. Proof. Assume to the contrary that there is an iteration i such that ฯฬƒ(v, Hvi ) = ฯฬƒ(v, Hvi+1 ) = ฯ, and there is no star contained in Svi with density at least ฯ4 with respect to Hvi+1 . Let i0 be the first 0 iteration in which ฯฬƒ(v, Hvi0 ) = ฯ, and let i0 be the first iteration after i0 where ฯฬƒ(v, Hvi ) = ฯ and 0 0 ฯ there is no star contained in Svi โˆ’1 with density at least 4 with respect to Hvi . Let S โˆ— be the densest 23 0 0 0 v-star with respect to Hvi . Then ฯ(S โˆ— , Hvi ) โ‰ฅ ฯ2 since ฯฬƒ(v, Hvi ) = ฯ. Let S0 be the full v-star, and let (S1 , S2 , ..., Sk ) be the sequence of stars chosen by v between iteration i0 and iteration i0 โˆ’ 1 in the order in which they were chosen. For all 0 โ‰ค j โ‰ค k, it holds that Sj โІ Sjโˆ’1 , since i0 is the first iteration in which this does not hold. We next show by induction that S โˆ— โІ Sj for all 0 โ‰ค j โ‰ค k. In particular this will give S โˆ— โІ Sk . 0 Hence, at iteration i0 there is a star contained in Svi โˆ’1 = Sk with density at least ฯ4 , in contradiction to the definition of i0 . For j = 0, the claim holds trivially since S0 is the full v-star. Assume that S โˆ— โІ Sjโˆ’1 , and assume to the contrary that S โˆ— * Sj . Note that both Sj and S โˆ— are contained in Sjโˆ’1 by the induction hypothesis. Let j 0 be the iteration in which Sj is chosen. Since S โˆ— * Sj , we can write S โˆ— = S1 โˆช S2 where S1 = S โˆ— โˆฉ Sj and S2 = S โˆ— \ Sj . It holds that 0 0 0 0 2 |+|C12 | ฯ(S โˆ— , Hvj ) โ‰ฅ ฯ(S โˆ— , Hvi ) โ‰ฅ ฯ2 . We can write ฯ(S โˆ— , Hvi ) = |C1 |+|C where C1 are edges of Hvi |S1 |+|S2 | 2-spanned by S1 , C2 are edges 2-spanned by S2 , and C12 are edges 2-spanned by S โˆ— with one 0 endpoint in S1 and one endpoint in S2 . Since S โˆ— is the densest star with respect to Hvi it follows 0 12 | 1| โˆ— i0 that |C2 |+|C โ‰ฅ ฯ(S โˆ— , Hvi ) โ‰ฅ ฯ2 , as otherwise by Observation 1, |C |S2 | |S1 | > ฯ(S , Hv ), which shows that S1 is a denser star than S โˆ— . This shows that at least one of 0 0 In the first case, ฯ(S2 , Hvj ) โ‰ฅ ฯ(S2 , Hvi ) = |C2 | |S2 | |C2 | |S2 | and |C12 | |S2 | is at least ฯ4 . โ‰ฅ ฯ4 , which shows that S2 is a disjoint star to ฯ 12 | Sj with density at least ฯ4 that is contained in Sjโˆ’1 . In the second case, |C |S2 | โ‰ฅ 4 . For an edge e all the edges of C e = {v, u} โˆˆ S2 , denote by C12 12 with endpoint u. It follows that there is an ฯ e edge e โˆˆ S2 such that |C12 | โ‰ฅ 4 . By Observation 1 and since the density of Sj is at least ฯ4 we |C |+|C e | j 12 get ฯ(Sj โˆช {e}) โ‰ฅ |S โ‰ฅ ฯ4 , where Cj are the edges 2-spanned by Sj . Either way we get a j |+1 contradiction to the definition of Sj . This completes the proof. The rest of the analysis is based on a potential function argument which is described in [43, 60] for the set cover and minimum dominating set problems. Let ฯ = maxvโˆˆV ฯv at the beginning of P iteration i. We define the potential function ฯ† = v:ฯv =ฯ |Cv |, where Cv is the set of edges of Hv that are 2-spanned by the star Sv which v chooses at iteration i. Note that the potential function may increase between iterations if the value of ฯ changes. However, since we round the values ฯv to powers of two, there may be only O(log โˆ†) different values for ฯ. The obstacle is that ฯ† may increase between iterations even if the value of ฯ does not change, because a vertex v might change the stars Sv in different iterations. However, by Claim 4.4, as long as the rounded density of the vertex remains the same among iterations, it always chooses a star that is contained in the star that it chooses in the previous iteration. Hence, the size of the set of edges Cv can only decrease between the end of the last iteration to the beginning of the next one. It follows that as long as ฯ does not change, the value of ฯ† can only decrease between iterations. Our goal is to show that if the value of ฯ does not change between iterations, the potential function ฯ† decreases by a multiplicative factor between iterations in expectation. Having this, we get a time complexity of O(log n log โˆ†) rounds w.h.p. The following lemma shows that if the value of ฯ does not change between iterations, the potential function ฯ† decreases by a multiplicative factor between iterations in expectation. The proof follows the lines of the proofs in [43, 60], and is included here for completeness. We say that an iteration is legal if the random numbers rv chosen by the candidates in this iteration are different. Lemma 4.5. If ฯ† and ฯ†0 are the potentials at the beginning and end of a legal iteration, then E[ฯ†0 ] โ‰ค c ยท ฯ† for some positive constant c < 1. 24 In order to prove Lemma 4.5 we need the following definitions. Let s(e) be the number of candidates that 2-span the edge e. For a candidate v, we sort the edges in Cv according to s(e) in non-increasing order. Let T (v) and B(v) be the sets of the first d|Cv |/2e edges, and the last d|Cv |/2e edges in the sorted order, respectively. Indeed, if |Cv | is odd, the sets T (v) and B(v) share an edge. For a pair (Sv , e), where Sv is a candidate star that 2-spans e, we say that (Sv , e) is good if e โˆˆ T (v). We next show that if e โˆˆ T (v) chooses Sv in a legal iteration, then the star Sv is added to the spanner with constant probability. Claim 4.6. Let i be a legal iteration. If e, e0 are both 2-spanned by S in iteration i, and s(e) โ‰ฅ s(e0 ), then P r[e0 chooses S|e chooses S] โ‰ฅ 12 . Proof. Let Ne , Ne0 , Nb be the number of candidates that 2-span e but not e0 , e0 but not e, and both e and e0 , respectively. P r[e and e0 choose S] P r[e chooses S|e chooses S] = = P r[e chooses S] 0 1 Ne +Ne0 +Nb 1 Ne +Nb = |Ne | + |Nb | . |Ne | + |Ne0 | + |Nb | It holds that Ne โ‰ฅ Ne0 since s(e) โ‰ฅ s(e0 ). This gives, P r[e0 chooses S|e chooses S] = |Ne | + |Nb | 1 |Ne | + |Nb | โ‰ฅ โ‰ฅ . |Ne | + |Ne0 | + |Nb | 2|Ne | + |Nb | 2 Claim 4.7. If (Sv , e) is a good pair in a legal iteration i, then P r[Sv is chosen|e chooses Sv ] โ‰ฅ 31 . Proof. Assume that e chooses Sv . Denote by X the number of edges in B(v) that choose Sv , and let X 0 = |B(v)| โˆ’ X. Note that e โˆˆ T (v) since (Sv , e) is good, therefore s(e) โ‰ฅ s(e0 ) for any edge e0 โˆˆ B(v). By Claim 4.6, any edge e0 โˆˆ B(v) chooses Sv with probability at least 12 . Hence, E[X] โ‰ฅ |B2v | . Equivalently, E[X 0 ] โ‰ค |B2v | . Using Markovโ€™s inequality we get P r[X < |Bv | 3 3 2 ] = P r[X 0 > |Bv |] โ‰ค P r[X 0 โ‰ฅ E[X 0 ]] โ‰ค . 4 4 2 3 Hence, we get P r[X โ‰ฅ |B4v | ] โ‰ฅ 13 . Since |Bv | โ‰ฅ |C2v | , it holds that X โ‰ฅ |C8v | with probability at least |Cv | 1 3 . In this case, at least 8 edges choose Sv , and it is added to the spanner. This completes the proof. We can now bound the value of the potential function, by proving Lemma 4.5. Proof of Lemma 4.5. Let ฯ† and ฯ†0 be the potential function at the beginning and end Pvalues of the P P of a legal iteration i. It holds that ฯ† = v:ฯv =ฯ |Cv | = (Sv ,e) 1 = e s(e), where we sum over all the edges 2-spanned by candidates having rounded density ฯ, and over all the pairs (Sv , e) where v is a candidate having rounded density ฯ that 2-spans e. Note that the rounded density of all the candidates that 2-span an edge e is the same, since they have maximal rounded density in their 2-neighborhood. If the edge e chooses the star Sv , and the star Sv is added to the spanner, ฯ† decreases by s(e). We ascribe this decrease to the pair (Sv , e). Since e chooses only one candidate, 25 any decrease in ฯ† is ascribed only to one pair. Hence, we get X P r[e chooses Sv , Sv is chosen] ยท s(e) E[ฯ† โˆ’ ฯ†0 ] โ‰ฅ (Sv ,e) โ‰ฅ X P r[e chooses Sv ] ยท P r[Sv is chosen|e chooses Sv ] ยท s(e) (Sv ,e) is good โ‰ฅ X (Sv ,e) is good 1 1 1 ยท ยท s(e) = s(e) 3 3 X 1. (Sv ,e) is good Since at least half of the pairs are good, we get E[ฯ† โˆ’ ฯ†0 ] โ‰ฅ 16 ฯ†, or equivalently E[ฯ†0 ] โ‰ค 56 ฯ†, which completes the proof. In conclusion, we get the following. Lemma 4.8. The time complexity of the algorithm is O(log n log โˆ†) rounds w.h.p. Proof. It holds that the maximum density of a star of size k is at most O(k 2 ) and the algorithm terminates when the maximum density is at most 1. Since densities are rounded to powers of 2, ฯ = maxvโˆˆV ฯv may obtain at most O(log โˆ†) values, where โˆ† is the maximum degree. In addition, by Lemma 4.5, if ฯ has the same value at iterations j and j + 1, and j is a legal iteration, then the value of ฯ† decreases between these iterations by a factor of at least 1/c in expectation. Since the random numbers rv are chosen from {1, ..., n4 }, they are different w.h.p, giving that if ฯ has the same value in any two consecutive iterations then the value of ฯ† decreases between these iterations by a constant factor in expectation. Since ฯ† โ‰ค n3 , after O(log (n3 )) = O(log n) iterations in expectation, the value of ฯ must decrease. This shows that the time complexity is O(log n log โˆ†) rounds in expectation. A Chernoff bound then gives that this also holds w.h.p. Lemma 4.3 and Lemma 4.8 complete the proof of Theorem 1.3. 4.3 Additional 2-spanner approximations Here we show that the algorithm extends easily to the following variants: the directed 2-spanner problem, the weighted 2-spanner problem and the client-server 2-spanner problem. We describe the differences in the algorithm and analysis in each of these cases. 4.3.1 Directed 2-spanner approximation In the directed case we consider directed stars. A v-star 2-spans a directed edge (u, w) if it includes the directed edges (u, v), (v, w). A v-star may include both ingoing and outgoing edges of v. The definition of densities follows the definition in the undirected case. In order to give an algorithm that requires only polynomial local computations for the directed variant, we show how to approximate the rounded density and the densest star in the directed case. The rest of the analysis follows the undirected case, and gives the following. Theorem 4.9. There is a distributed algorithm for the directed 2-spanner problem in the Local model that guarantees an approximation ratio of O(log m n ), and takes O(log n log โˆ†) rounds w.h.p. To compute an approximation for the densest (directed) v-star, we look at all the edges between neighbors of v, and remove all the directed edges (u, w) that cannot be 2-spanned by a v-star (such an edge can be 2-spanned by a v-star, only if the two directed edges (u, v), (v, w) exist in the graph). 26 Now we ignore the directions of edges and compute the densest v-star as in the undirected case. Let Sv be the star computed. Let ฯU = ฯU (Sv ) be the undirected density of v (when ignoring edges that cannot be 2-spanned by a directed path), and let ฯD be the directed density of v. We will show that ฯU ฯU 2 โ‰ค ฯD โ‰ค ฯU , and that 2 โ‰ค ฯD (Sv ), which shows that Sv gives a 2-approximation for the densest directed v-star. When computing ฯD (Sv ) we replace each undirected edge {v, u} in Sv by the two directed edges (v, u), (u, v) if both of them exist in the graph, or by the one that exists otherwise. Claim 4.10. ฯU 2 โ‰ค ฯD (Sv ). Proof. Let Cv be the edges 2-spanned by Sv in the undirected case. Since Sv is the densest v| undirected v-star, ฯU = ฯU (Sv ) = |C |Sv | . The directed star Sv 2-spans all the edges in Cv (some of them may be counted twice in the directed case, which only increases the density), and it contains at most twice edges because we replaced each undirected edge by at most two edges, which gives |Cv | ฯD (Sv ) โ‰ฅ 2|S = ฯ2U . v| Claim 4.11. ฯU 2 โ‰ค ฯD โ‰ค ฯU . Proof. By Claim 4.10, ฯ2U โ‰ค ฯD (Sv ) โ‰ค ฯD . We next show ฯD โ‰ค ฯU . Let SD be the densest directed v-star, and let CD be the directed edges 2-spanned by SD . We write CD = C1 โˆช C2 where an edge (u, w) โˆˆ CD is in C2 if and only if the edge (w, u) is also in CD . We write SD = S1 โˆช S2 where an edge (v, u) โˆˆ SD is in S2 if and only if the edge (u, v) is also in SD . Now we look at the undirected density of SD (if we have two directed edges (w, u), (u, w) they are replaced by one undirected edge). ฯU (SD ) = |C1 | + |S1 | + |C2 | 2 |S2 | 2 = |C1 | 2 |S1 | 2 + + |C1 |+|C2 | 2 |S1 |+|S2 | 2  โ‰ฅ min |C1 | |C1 | + |C2 | , |S1 | |S1 | + |S2 |   = min  |C1 | , ฯD , |S1 | where the second inequality follows from Observation 1, and the last equality follows since SD is the 1 |+|C2 | densest directed v-star, and its directed density equals |C |S1 |+|S2 | . We next show that |C1 | |S1 | โ‰ฅ ฯD . Since ฯD = |C1 |+|C2 | |S1 |+|S2 | , if |C1 | |S1 | < ฯD , we get by Observation 1 2| that |C |S2 | > ฯD . Note that the directed star S2 2-spans all the directed edges in C2 (and it may 2-span additional edges), because all the edges in C2 appear in both directions, which means that the paths that 2-span them also appear in both directions in SD , which means that all the edges of these paths are in S2 . This shows that S2 is a directed star with density greater 1| than ฯD , in contradiction to the definition of ฯD . In conclusion |C |S1 | โ‰ฅ ฯD , which shows that n o 1| ฯU โ‰ฅ ฯU (SD ) โ‰ฅ min |C |S1 | , ฯD = ฯD . Claims 4.10 and 4.11 show that we can approximate the directed density and the densest directed star using polynomial local computations. Having this, we can adapt the algorithm to the directed 2-spanner problem. We approximate the directed density of v with ฯD (Sv ), which gives a 2-approximation. Then, we round the value of it to the closest power of two that is greater than ฯD (Sv ), and denote the rounded value by ฯv , this is a 2-approximation to the rounded density of v.7 While the value of ฯv remains the same we choose stars similarly to the undirected case, the only difference is that when we look for a dense disjoint star, we do not necessarily find the densest directed disjoint star but a 2-approximation for it. For the analysis to work, we need to look for 7 Since we compute an approximation to the density, the value of ฯv may increase between iterations. To avoid such cases, we always define it to be the minimum between the value in the last iteration and the value computed in the current iteration. This is always a 2-approximation for the rounded density since the density can only decrease between iterations. 27 disjoint stars with density at least ฯ8v and not ฯ4v as in the undirected case, and we add edges or disjoint stars to the star S we choose as long as the density of S is at least ฯ8v . The rest of the analysis is similar, the constants change sightly since we choose stars that are less dense, and work with an approximation to the density. 4.3.2 Weighted 2-spanner approximation In the weighted case, the cost of a spanner is w(H), rather than |H| as in the unweighted case. This requires several changes in the algorithm and the analysis. Let W be the ratio between the maximum and minimum positive weights of an edge. We show the following. Theorem 4.12. There is a distributed algorithm for the weighted 2-spanner problem in the Local model that guarantees an approximation ratio of O(log โˆ†), and takes O(log n log (โˆ†W )) rounds w.h.p. P We next describe the differences in the weighted case. For a star S, we define w(S) = eโˆˆS w(e). |CS | If w(S) 6= 0, we define ฯ(S, H) = w(S) , where CS is the set of edges of H 2-spanned by the star S. If w(S) = 0, we define ฯ(S, H) = 0. We emphasize that we take the number of potentially 2-spanned edges and not the sum of their weights, since, intuitively, all edges need to be covered (as opposed to taking the sum of weights of the edges of the star, which is due to the need to optimize the cost of the spanner). In the beginning of the algorithm we add all the edges of weight 0 to the spanner. By doing this, all the edges covered by stars S of weight 0 are already covered. Hence, the algorithm should only consider stars for which w(S) > 0. When we round the densities to the closest power of two, we include also negative powers of two, since the density of a star may be smaller than 1, depending on the weights. A slight difference is that now a vertex terminates if the density in its 1 2-neighborhood is at most wmax where wmax is the maximal weight of an edge adjacent to a vertex in its 2-neighborhood. In such case, it adds to the spanner all the edges adjacent to it that are still not covered. We denote by H2 all these edges. The rest of the algorithm is the same, according to the new definition of ฯ. As was observed in the sequential algorithm for the weighted case [45], we can find the densest star in the weighted case using flow techniques as well. We next describe the differences in the analysis. The cost of the solution obtained by the algorithm is now w(H), and the cost of an optimal solution is w(H โˆ— ). We give to edges e 6โˆˆ H2 a cost as in the unweighted case, but depending on the new definition of the density ฯ. In addition, for edges e โˆˆ H2 we define cost(e) = w(e). Our goal is to show that X w(H) โ‰ค 8 cost(e) โ‰ค O(log โˆ†)w(H โˆ— ). eโˆˆE P The proof that w(H) โ‰ค 8 PeโˆˆE cost(e) is the same as the proof of Lemma P 4.1 with minor changes. Note that w(H2 ) = eโˆˆH2 cost(e) by definition. Now w(H1 ) โ‰ค SโˆˆStars w(S), for the same P reason as in the unweighted case. In addition, the new definition of ฯ, gives that w(S) โ‰ค 8 eโˆˆV otes(S) cost(e), and the rest of the proof follows. However, the difference from the unweighted case is that we can no longer show an approximation ratio of O(log m n ). This is because the density of stars added in the algorithm may now be smaller than 1, and because the weight of an optimal 2-spanner may be smaller than n โˆ’ 1. Still, we show an approximation ratio of O(log โˆ†). Some elements of our analysis have similar analogues in the classic analysis of the greedy set cover algorithm [16, 44, 53]. First, instead of Lemma 4.2 we show the following. 28 cost(e) โ‰ค O(log โˆ†)w(H โˆ— ). P โˆ— 0 Proof. First, we show that eโˆˆE 0 cost(e) โ‰ค O(log โˆ†)w(H P ), where E = E \ (H2 โˆฉ E0 ) and E0 are edges with cost 0. Edges in E0 clearly do not affect eโˆˆE cost(e). All the edges not in E0 or H2 are 2-spanned in the algorithm, as in the unweighted case. For each vertex v, let S โˆ— (v) be the full v-star in H โˆ— . We define Starsโˆ— = {S โˆ— (v)}vโˆˆV . Consider a star S โˆˆ Starsโˆ— and let (e1 , ..., e` ) be the sequence of edges 2-spanned by S according to the order in which they are 2-spanned in the algorithm. Assume first that w(S) 6= 0. The density of S at the ` beginning of the iteration in which e1 is 2-spanned is w(S) . All the candidates that 2-span e1 have the same rounded density since they all have maximal rounded density in their 2-neighborhood. In ` particular, the density of the star that 2-spans e1 is at least 4w(S) , as v chooses a star with density Lemma 4.13. at least ฯv 4 โ‰ฅ P eโˆˆE ` 4w(S) . Hence, cost(e1 ) โ‰ค iteration in which ej is 2-spanned is at ` X cost(ej ) โ‰ค 4w(S) ยท j=1 4w(S) ` . Similarly, the density of S at the beginning of 4w(S) least `โˆ’j+1 w(S) , which gives cost(ej ) โ‰ค `โˆ’j+1 . This gives, ` X j=1 the 1 = O(log `)w(S) = O(log โˆ†)w(S). `โˆ’j+1 The last equality is because the number of edges ` 2-spanned by a star is at most โˆ†2 . For a star S โˆˆ Starsโˆ— such that w(S) = 0, note that cost(e) = 0 for all the edges 2-spanned by S, since they are all covered P`at the beginning of the algorithm without voting for any candidate. Hence, we get in this case j ) = 0 = O(log โˆ†)w(S).P j=1 cost(eP P eโˆˆE eโˆˆE 0 โˆฉStarsโˆ— cost(e) P We now write P0 cost(e) = P + eโˆˆE 0 \Starsโˆ— cost(e). It holds that cost(e) โ‰ค w(S). We next bound 0 โˆ— โˆ— eโˆˆE โˆฉStars SโˆˆStars eโˆˆE 0 \Starsโˆ— cost(e). Let CS be the set of edges 2-spanned by the star S. Since H โˆ— is a 2-spanner, every edge e โˆˆ E 0 \ Starsโˆ— is 2-spanned by at least one star S โˆˆ Starsโˆ— . Summing over all the stars in Starsโˆ— we get, X X X X cost(e) โ‰ค cost(e) โ‰ค O(log โˆ†) w(S). eโˆˆE 0 \Starsโˆ— SโˆˆStarsโˆ— eโˆˆCS SโˆˆStarsโˆ— P P In conclusion, eโˆˆE P 0 cost(e) = O(log โˆ†) โˆ— SโˆˆStarsโˆ— w(S). It holds P that SโˆˆStarsโˆ— w(S) = 2w(H ) since each edge of H โˆ— is included in exactly two stars. โˆ— This gives, eโˆˆE 0 cost(e) = O(log โˆ†)w(H P ). To complete the proof, we bound eโˆˆH2 cost(e). Let H2โˆ— be an optimal spanner for H2 . We define Starsโˆ— as before, with respect to H2โˆ— . Let S โˆˆ Starsโˆ— and let (e1 , ..., e` ) be the sequence of edges of H2 2-spanned by S according to the order in which they are added to H2 in the algorithm. ` 1 From the definition of H2 it must hold that w(S) โ‰ค wmax where wmax is the maximal weight in the 2-neighborhood of e1 (which in particular contains P the star S and P all the edges 2-spanned by it), as otherwise e1 was not added to H2 . This givesP `i=1 cost(e) = `i=1 w(e) โ‰ค ` ยท wmax โ‰ค w(S). โˆ— โˆ— โˆ— Following as before, this 2 )). Since |H2 | โ‰ค |H |, Pthe same arguments P P gives eโˆˆH2 cost(e) โ‰ค O(w(H โˆ— we get eโˆˆE cost(e) = eโˆˆE 0 cost(e) + eโˆˆH2 cost(e) = O(log โˆ†)w(H ). This completes the proof. P In conclusion, we get w(H) โ‰ค 8 eโˆˆE cost(e) โ‰ค O(log โˆ†)w(H โˆ— ), which completes the proof of the O(log โˆ†)-approximation ratio, giving the following lemma. Lemma 4.14. The approximation ratio of the algorithm is O(log โˆ†). To prove the round complexity, there are minor changes in the proof of Claim 4.4. First, we replace the size of a star |S| by its cost w(S) in order to work with the new definition of ฯ. Note 29 that adding edges of weight 0 to a star can only increase its density, which shows that all the v-stars chosen in the algorithm, and in particular the star Sj , contain all the edges of weight 0 adjacent to v. This shows that the star S2 = S โˆ— \ Sj includes only edges with positive weight. The proof carries over if w(S1 ) 6= 0. If w(S1 ) = 0, then all the edges 2-spanned by S1 are already 2-spanned at 0 |+|C12 | 1 |+|C2 |+|C12 | the beginning of the algorithm which shows ฯ2 โ‰ค ฯ(S โˆ— , Hvi ) = |Cw(S = |C2w(S , as needed. 1 )+w(S2 ) 2) In addition, in the second case of the proof instead of showing that there is an edge e โˆˆ S2 with e e | โ‰ฅ ฯ , we show that |C12 | โ‰ฅ ฯ . |C12 4 4 w(e) The number of possible densities depends on the weights, in the following way. Let Wmax , Wmin max be the maximum and the minimum positive weights of an edge. Recall that W = W Wmin . The 2 maximum density of a star is at most Wโˆ†min since a star 2-spans at most โˆ†2 edges. In addition, the 1 algorithm terminates when the maximum density is Wmax . Since we round the densities to powers of two, there may at most O(log โˆ†W ) different non-zero values for the densities. The rest of the proof is exactly the same as in the unweighted case. 4.3.3 Client-server 2-spanner approximation Recall that in the Client-Server 2-spanner problem, the edges of the graph are divided to two types: clients and servers, and the goal is to cover all the client edges with server edges. Let C be the set of client edges, let V (C) be all the vertices that touch client edges, and let โˆ†S be the maximum degree in the subgraph of G that includes all the server edges. We show the following. Theorem 4.15. There is a distributed algorithm for the client-server 2-spanner problem in the Local model that guarantees an approximation ratio of O(min{log |V|C| (C)| , log โˆ†S }), and takes O(log n log โˆ†S ) rounds w.h.p. There are slight differences in the algorithm. First, throughout the algorithm and analysis, S| we consider only stars composed of server edges, and for each such star we define ฯ(S, H) = |C |S| , where CS is the set of client edges of H 2-spanned by the star S. The set of edges Hv that a vertex v maintains consists only of client edges 2-spanned by the star that includes all the server edges adjacent to v. Now v terminates if the maximal density in its 2-neighborhood is below 12 and not at most 1 as before (since not all the client edges are server edges, perhaps the best way to cover a client edge is to take a path of length 2 that covers it, the density of the corresponding star is 12 ). Now cost(e) โ‰ค 2 which changes slightly the constants in the analysis. When v terminates, it adds an uncovered edge e to the spanner only if e is both a client and a server edge. These edges are the edges of H2 . Note that since not all the edges are server edges, there may be client edges that cannot be covered by server edges, in which case there is no solution to the problem, and our algorithm covers only all the edges that may be covered by server edges. When we analyze the algorithm, we assume that there is a solution to the problem, otherwise H โˆ— is not defined. For other cases, we can restrict the client edges to be only edges that can be covered by server edges, and get a new problem that has an optimal solution H โˆ— , and the approximation ratio we get is w.r.t to H โˆ— . For the analysis, there are slight differences as follows. First, we give costs only to client edges, since these are the only edges we need to cover. We give the costs as in the minimum 2-spanner algorithm. In particular, cost(e) = 1 for e โˆˆ H2 . Our goal is to show that   X |C| |H| โ‰ค 8 cost(e) โ‰ค O log |H โˆ— |. |V (C)| eโˆˆC 30 P The proof that |H| โ‰ค 8 eโˆˆC  cost(e) is exactly the same as the proof of Lemma 4.1. We next P |C| โˆ— show that eโˆˆC cost(e) โ‰ค O log |V|C| (C)| |H |. Let r = |V (C)| , and f = dlog re. We define the sets Ej according to the new definition of r. Let E1 = {e โˆˆ C \ H2 : 0 < cost(e) โ‰ค 2r }, and for jโˆ’1 j 2 โ‰ค j โ‰ค f + 1, let Ej = {e โˆˆ C \ H2 : 2 r < cost(e) โ‰ค 2r }. We define E0 as before, and Ef +2 = H2 . Since the stars added to H1 in the algorithm have density at least 12 , then cost(e) โ‰ค 2 for each edge +2 e โˆˆ C. This gives, C = โˆชfj=0 Ej . We next show the following. P Lemma 4.16. For every 0 โ‰ค j โ‰ค f + 2, eโˆˆEj cost(e) = O(|H โˆ— |). Proof. For j = 0, 2 โ‰ค j โ‰ค f + 1, and j = f + 2 the proof follows 0, 2 โ‰ค j โ‰ค f and P the cases j = 2 j = f + 1 in the proof of Lemma 4.2. For j = 1, it holds that eโˆˆE1 cost(e) โ‰ค r ยท |C| โ‰ค 2|V (C)| = O(|H โˆ— |). In the first inequality, we use the fact that we give costs only to edges of C. The last edges, which we prove next. equality follows from the fact that H โˆ— includes at least |V (C)| 4 Let GC = (V (C), C), and let C1 , ..., C` be the connected components of GC . Note that each connected component of GC includes at least two vertices (since it includes at least one edge of C), which means that the number ` of connected components is at most |V (C)| . For a connected P` 2 component Ci , denote by ni the number of vertices in Ci , so that |V (C)| = i=1 ni . For a connected component Ci , denote by Hi all the edges of H โˆ— that cover the edges in Ci . It holds that |Hi | โ‰ฅ ni โˆ’1 since Ci is connected, and the edges of Hi need to connect all the vertices in Ci , otherwise there is an edge in Ci which is not covered in H โˆ— . In addition, for each edge e โˆˆ Hi , at least one of the vertices of e is in Ci , otherwise it cannot cover an edge in Ci . It follows that an edge e โˆˆ H โˆ— can be in at most two different subsets Hi , Hj . This gives ` ` ` i=1 i=1 i=1 1X |V (C)| |V (C)| |V (C)| 1X 1X 1 |H | โ‰ฅ โˆ’ = , |Hi | โ‰ฅ (ni โˆ’ 1) = ni โˆ’ ` โ‰ฅ 2 2 2 2 2 4 4 โˆ— which completes the proof. P Pf +2 P โˆ— By Lemma 4.16, we get cost(e) = eโˆˆC eโˆˆEj cost(e) = O(log r)|H |. Since |H| โ‰ค j=0 P P 8 ยท eโˆˆC cost(e), we have |H| โ‰ค 8 eโˆˆC cost(e) โ‰ค O(log r)|H โˆ— |, which shows an approximation ratio of O(log |V|C| (C)| ). P In addition, we can show that eโˆˆC cost(e) โ‰ค O(log โˆ†S ), following the proof of Lemma 4.13, by replacing w(S) and w(H) by |S| and |H|. This shows an approximation ratio of O(log โˆ†S ) to the problem. Note that in the minimum 2-spanner problem, m n is half of the average degree in G, and โˆ† is the maximum degree in G, hence an approximation ratio of O(log m n ) is better than O(log โˆ†). However, |C| in the client-server variant, it may be the case that โˆ†S โ‰ค |V (C)| depending on the client and server edges in G. The time analysis is the same as in the minimum 2-spanner problem. Note that there may be at most O(log โˆ†S ) different values for ฯ because we consider only stars composed of server edges. This completes the proof of Theorem 4.15. 5 Distributed approximation for MDS In this section, we show that our algorithm can be modified to give an efficient algorithm for the minimum dominating set (MDS) problem, guaranteeing an approximation ratio of O(log โˆ†). In the MDS problem the goal is to find a minimum set of vertices D such that each vertex is either in D or has a neighbor in D. Our algorithm for MDS has the same structure of the algorithm of Jia et 31 al. [43], but it differs from it in the mechanism for symmetry breaking. Our approach guarantees an approximation ratio of O(log โˆ†), where in [43] the O(log โˆ†)-approximation ratio holds only in expectation. The following states our results for MDS. Theorem 5.1. There is a distributed algorithm for the minimum dominating set problem in the Congest model that guarantees an approximation ratio of O(log โˆ†), and takes O(log n log โˆ†) rounds w.h.p. For MDS, we define the star Sv centered at the vertex v as the set of vertices that contains v and all of its neighbors. Note that there is only one star centered at each vertex, which simplifies both the algorithm and its analysis. The density of a star S with respect to a subset of vertices U , denoted by ฯ(S, U ), is defined as |S โˆฉ U |. The density of a vertex v with respect to U , denoted by ฯ(v, U ), is defined as |Sv โˆฉ U |. The definition of the rounded density is the same as for our algorithm for the minimum 2-spanner problem. A vertex v maintains a set Uv that contains all the vertices in Sv that are still not covered by the vertices that have already been added to the dominating set, where a vertex is covered by a set if it is in that set or has a neighbor in that set. Our algorithm proceeds in iterations, where in each iteration the following is computed: 1. Each vertex v computes its rounded density ฯv = ฯฬƒ(v, Uv ), and sends it to its 2-neighborhood. 2. Each vertex v such that ฯv โ‰ฅ ฯu for each u in its 2-neighborhood is a candidate. Vertex v informs its neighbors that it is a candidate. Let Cv = Sv โˆฉ Uv . 3. Each candidate v chooses a random number rv โˆˆ {1, ..., n4 } and sends it to its neighbors. 4. Each uncovered vertex that is covered by at least one of the candidates, votes for the first candidate that covers it according to the order of the values rv . If there is more than one candidate with the same minimum value, it votes for the one with the minimum ID. 5. If v receives at least |Cv | 8 votes from vertices it covers then it is added to the dominating set. 6. Each vertex updates the set Uv by removing from it vertices that are now covered. If Uv = โˆ…, v outputs 1 if and only if it was added to the dominating set in the previous step. A crucial difference from our spanner approximation algorithm is that the densities are now based on the number of uncovered neighbors of v, and not the number of uncovered edges that can be potentially covered by a star. For this reason, all the computations in the algorithm can be implemented efficiently in the Congest model. The analysis of our MDS algorithm follows the same lines as the analysis of our minimum 2-spanner algorithm. We denote by D the dominating set produced by the algorithm, and by Dโˆ— a minimum dominating set. We assign each vertex v with a value cost(v), which equals ฯ1 if v is covered for the first timeP by a candidate having density ฯ that v votes for, and otherwise, cost(v) = 0. We show that |D| โ‰ค 8 vโˆˆV cost(v) โ‰ค O(log โˆ†)|Dโˆ— |, which implies our claimed approximation ratio. P Lemma 5.2. |D| โ‰ค 8 ยท uโˆˆV cost(u). Proof. The proof is similar to the proof of Lemma 4.1. For a vertex v โˆˆ D we denote by V otes(v) the vertices that vote for v. If v is added to D then it holds that at least |C8v | vertices vote 32 1 ฯ, where ฯ is the density of v, which is |Cv |, by P definition. Hence, for each vertex v โˆˆ D, it holds that uโˆˆV otes(v) cost(u) โ‰ฅ ฯ1 ยท |C8v | = 18 . Since each vertex otes(v), summing over all the vertices in D gives that P u is Pin at most one set V P |D| โ‰ค 8 ยท vโˆˆD uโˆˆV otes(v) cost(u) โ‰ค 8 ยท uโˆˆV cost(u). P The proof that vโˆˆV cost(v) โ‰ค O(log โˆ†)|Dโˆ— | is similar to the proof of Lemma 4.13, where Starsโˆ— isPreplaced by Dโˆ— , edges are replaced by vertices, and w(S) is replaced by 1 (note that the P โˆ— equality SโˆˆStarsโˆ— w(S) = 2w(H ) is replaced by vโˆˆDโˆ— 1 = |Dโˆ— |). Together with Lemma 5.2, this proves the approximation ratio of O(log โˆ†). For the time analysis, the main difference is that for each vertex v there is only one star Sv , which simplifies the proof (Claim 4.4 is no longer required). Let ฯ = maxvโˆˆV ฯv at the beginning of P iteration i. We define the potential function ฯ† = v:ฯv =ฯ |Cv |. If the value of ฯ does not change between iterations, the value of ฯ† can only decrease between iterations. By the definition of the densities, the density of a vertex v is a at most |Sv | which is at most โˆ† + 1. Since we round the densities there may be at most O(log โˆ†) different values for ฯ. Following the same analysis as in the analysis of our minimum 2-spanner algorithm (with the difference that edges are replaced by vertices, and a candidate is a vertex and not a star) we can show that if the value of ฯ does not change between iterations, then the potential function ฯ† decreases by a multiplicative factor between iterations in expectation. This gives a time complexity of O(log n log โˆ†) rounds w.h.p. Together with the approximation ratio, this proves Theorem 5.1. for it. The cost of each of these vertices is 6 Distributed (1 + )-approximation for spanner problems In this section, we show distributed (1 + )-approximation algorithms for spanner problems, following the framework of a recent algorithm for covering problems [39] (see Section 7).8 In a nutshell, the vertices invoke a network decomposition algorithm on the graph Gr , for a value of r = O(log n/) that can be computed by all vertices locally, given  and a polynomial bound on n. This decomposes the graph into clusters of logarithmic diameter, colored by a logarithmic number of colors. Finally, by increasing order of colors, the vertices of each color select edges for the spanner. We show that indeed clusters of the same color can make their choices in parallel, and that the method of choosing edges to the spanner results in a (1 + ) approximation factor, giving the following. Theorem 1.2. There is a randomized algorithm with complexity O(poly(log n/)) in the Local model that computes a (1 + )-approximation of the minimum k-spanner w.h.p, where k is a constant. Proof. We start by describing a sequential (1 + )-approximation algorithm, and then explain how to implement it in the Local model using network decomposition. In the algorithm, the vertices start adding edges to the spanner H, which is initialized to be empty, while keeping track of all the edges covered by edges of H. At the beginning, all the edges are uncovered. To describe how this is done, we need the following notation. For a given integer d, denote by Bd (v) the subgraph of all the vertices within distance at most d from v and all the edges between them. For a vertex v and d โ‰ฅ 1, let g(v, d) be the size of an optimal spanner for all of the uncovered edges in Bd (v) (notice that the spanner can use both covered or uncovered edges of the whole graph G). We process the vertices according to a given order v1 , v2 , ..., vn . In step i, we look for the smallest radius ri such that g(vi , ri + 2k) โ‰ค (1 + )g(vi , ri ). Since an optimal spanner has size at most n2 , increasing the radius without the condition being met can only happen at most ri = O(log n/) times. We add to H an optimal spanner for all the uncovered edges in Bri +2k (vi ), and mark all 8 The presentation of the framework in [39] is slightly different and goes through an intermediate SLOCAL model. 33 the edges covered by the new edges of H as covered. In particular, all the edges of Bri +2k (vi ) are covered after this step. Note that an optimal spanner for Bri +2k (vi ) is contained in Bri +3k (vi ), which shows that step i depends only on a polylogarithmic neighborhood around vi . We next prove the approximation ratio of the algorithm. Denote by Ei all the edges of Bri (vi ) that are uncovered before step i. Since all the edges of Bri +2k (vi ) are covered after step i, it follows that Ei and Ej are at distance at least 2k + 1 for i 6= j. Let H โˆ— be an optimal spanner, and let Hiโˆ— be the minimum set of edges in H โˆ— that covers Ei . By the definition of a k-spanner, Hiโˆ— is contained in Bri +k (vi ), which shows that the subsets Hiโˆ— are disjoint. In step i, we added to H at most (1 + )g(vi , ri ) โ‰ค (1 + )|Hiโˆ— | edges, where the inequality follows since g(vi , ri ) is the size of an optimal spanner for Ei where Hiโˆ— is a spanner for Ei . Since โˆชni=1 Hiโˆ— โІ H โˆ— and the subsets Hiโˆ— are disjoint, summing over all i gives |H| โ‰ค (1 + )|H โˆ— |, which completes the approximation ratio proof. We now show how to implement the algorithm in the Local model (see also Proposition 3.2 in [38]). Let r = O(log n/) be such that r > ri + 4k for all i, and consider the graph Gr on the same set of vertices, where two vertices are connected if they are at distance at most r in the network graph G. Notice that in the Local model, any algorithm on Gr can be simulated by the vertices of G with an overhead of r rounds. The vertices invoke the randomized network decomposition algorithm of Linial and Saks [52] on the graph Gr . This algorithm decomposes a graph into clusters of diameter O(log n) that are colored with O(log n) colors, within O(log2 n) rounds. Invoked on Gr , this completes in poly(log n/) rounds. We assign a vertex v the label (qv , IDv ) where qv is the color of the cluster of v and IDv is the id of v. The lexicographic increasing order of the labels provides the order of the vertices. The distributed k-spanner algorithm runs in O(log n) phases, where in each phase `, the vertices of color ` are active, and collect all of the information of their cluster in Gr and its neighbors. Since the diameter of each cluster is at most O(log n), this completes in poly(log n/) rounds. Each vertex of the cluster then locally simulates the sequential algorithm for all the vertices in its cluster, according to their order. It can do so, since the sequential algorithm depends only on r-neighborhoods of vertices, and every two vertices in the same r-neighborhood are neighbors in Gr , which means they are either in the same cluster or in two clusters with different colors. This guarantees that the algorithm can indeed be executed in parallel for vertices of the same color. This completes the proof. The correctness of the algorithm relies only on the fact that the definition of k-spanners is local: an optimal spanner for Bd (v) is contained in Bd+k (v). Hence, the algorithm can be adapted similarly to the weighted, directed and client-server variants. In the weighted case the complexity is O(poly(log (nW )/)), where W is the ratio between the maximum and minimum positive weights of an edge. Acknowledgment: We would like to thank Seri Khoury for fruitful discussions. References [1] Amir Abboud, Keren Censor-Hillel, and Seri Khoury. Near-linear lower bounds for distributed distance computations, even in sparse networks. In Proceedings of the 30th International Symposium on Distributed Computing (DISC), pages 29โ€“42, 2016. [2] Baruch Awerbuch, Boaz Patt-Shamir, David Peleg, and Michael Saks. Adapting to asynchronous dynamic networks. In Proceedings of the twenty-fourth annual ACM symposium on Theory of computing (STOC), pages 557โ€“570, 1992. 34 [3] Baruch Awerbuch and David Peleg. Network synchronization with polylogarithmic overhead. In Proceedings of the 31st Annual Symposium on Foundations of Computer Science (FOCS), pages 514โ€“522, 1990. [4] Baruch Awerbuch and David Peleg. Routing with polynomial communication-space trade-off. SIAM Journal on Discrete Mathematics, 5(2):151โ€“162, 1992. [5] Leonid Barenboim, Michael Elkin, and Cyril Gavoille. A fast network-decomposition algorithm and its applications to constant-time distributed computation. Theoretical Computer Science, 2016. [6] Surender Baswana and Sandeep Sen. Approximate distance oracles for unweighted graphs in expected O(n2 ) time. ACM Transactions on Algorithms (TALG), 2(4):557โ€“577, 2006. [7] Surender Baswana and Sandeep Sen. A simple and linear time randomized algorithm for computing sparse spanners in weighted graphs. Random Structures & Algorithms, 30(4):532โ€“ 563, 2007. [8] Piotr Berman, Arnab Bhattacharyya, Konstantin Makarychev, Sofya Raskhodnikova, and Grigory Yaroslavtsev. Approximation algorithms for spanner problems and directed steiner forest. Information and Computation, 222:93โ€“107, 2013. [9] Piotr Berman, Sofya Raskhodnikova, and Ge Ruan. Finding sparser directed spanners. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), pages 424โ€“435, 2010. [10] Keren Censor-Hillel, Telikepalli Kavitha, Ami Paz, and Amir Yehudayoff. Distributed construction of purely additive spanners. In International Symposium on Distributed Computing (DISC), pages 129โ€“142, 2016. [11] Keren Censor-Hillel, Seri Khoury, and Ami Paz. Quadratic and near-quadratic lower bounds for the CONGEST model. In 31st International Symposium on Distributed Computing, DISC 2017, October 16-20, 2017, Vienna, Austria, pages 10:1โ€“10:16, 2017. [12] Shiri Chechik. Compact routing schemes with improved stretch. In Proceedings of the 2013 ACM symposium on Principles of distributed computing (PODC), pages 33โ€“41, 2013. [13] Eden Chlamtaฬc and Michael Dinitz. Lowest degree k-spanner: Approximation and hardness. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM), pages 80โ€“95, 2014. [14] Eden ChlamtaฬcฬŒ, Michael Dinitz, Guy Kortsarz, and Bundit Laekhanukit. Approximating spanners and directed steiner forest: Upper and lower bounds. In Proceedings of the TwentyEighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 534โ€“553, 2017. [15] Eden Chlamtac, Michael Dinitz, and Robert Krauthgamer. Everywhere-sparse spanners via dense subgraphs. In IEEE 53rd Annual Symposium on Foundations of Computer Science (FOCS), pages 758โ€“767, 2012. [16] Vasek Chvatal. A greedy heuristic for the set-covering problem. Mathematics of operations research, 4(3):233โ€“235, 1979. 35 [17] Bilel Derbel, Cyril Gavoille, David Peleg, and Laurent Viennot. On the locality of distributed sparse spanner construction. In Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing (PODC), pages 273โ€“282, 2008. [18] Bilel Derbel, Mohamed Mosbah, and Akka Zemmari. Sublinear fully distributed partition with applications. Theory of Computing Systems, 47(2):368โ€“404, 2010. [19] Michael Dinitz, Guy Kortsarz, and Ran Raz. Label cover instances with large girth and the hardness of approximating basic k-spanner. ACM Transactions on Algorithms (TALG), 12(2):25, 2016. [20] Michael Dinitz and Robert Krauthgamer. Directed spanners via flow-based linear programs. In Proceedings of the forty-third annual ACM symposium on Theory of computing (STOC), pages 323โ€“332, 2011. [21] Michael Dinitz and Robert Krauthgamer. Fault-tolerant spanners: better and simpler. In Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing (PODC), pages 169โ€“178, 2011. [22] Michael Dinitz and Yasamin Nazari. Distributed distance-bounded network design through distributed convex programming. In Proceedings of the The 21st International Conference on Principles of Distributed Systems (OPODIS), 2017. [23] Michael Dinitz and Zeyu Zhang. Approximating low-stretch spanners. In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 821โ€“840, 2016. [24] Andrew Drucker, Fabian Kuhn, and Rotem Oshman. On the power of the congested clique model. In Proceedings of the 2014 ACM symposium on Principles of distributed computing (PODC), pages 367โ€“376, 2014. [25] Michael Elkin. Computing almost shortest paths. ACM Transactions on Algorithms (TALG), 1(2):283โ€“323, 2005. [26] Michael Elkin. An unconditional lower bound on the time-approximation trade-off for the distributed minimum spanning tree problem. SIAM J. Comput., 36(2):433โ€“456, 2006. [27] Michael Elkin. A near-optimal distributed fully dynamic algorithm for maintaining sparse spanners. In Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing (PODC), pages 185โ€“194, 2007. [28] Michael Elkin and Ofer Neiman. Efficient algorithms for constructing very sparse spanners and emulators. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 652โ€“669, 2017. [29] Michael Elkin and David Peleg. The client-server 2-spanner problem with applications to network design. In 8th International Colloquium on Structural Information and Communication Complexity (SIROCCO), pages 117โ€“132, 2001. [30] Michael Elkin and David Peleg. Approximating k-spanner problems for k > 2. Theoretical Computer Science, 337(1):249โ€“277, 2005. 36 [31] Michael Elkin and David Peleg. The hardness of approximating spanner problems. Theory of Computing Systems, 41(4):691โ€“729, 2007. [32] Michael Elkin and Jian Zhang. Efficient algorithms for constructing (1+ฮต, ฮฒ)-spanners in the distributed and streaming models. In Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing (PODC), pages 160โ€“168, 2004. [33] Paul Erdoฬ‹s. Extremal problems in graph theory. In Theory Of Graphs And Its Applications, Proceedings of Symposium Smolenice, pages 29โ€“36. Publ. House Cszechoslovak Acad. Sci., Prague, 1964. [34] Orr Fischer, Tzlil Gonen, and Rotem Oshman. Distributed property testing for subgraphfreeness revisited. CoRR, abs/1705.04033, 2017. [35] Silvio Frischknecht, Stephan Holzer, and Roger Wattenhofer. Networks cannot compute their diameter in sublinear time. In Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms (SODA), pages 1150โ€“1162, 2012. [36] Giorgio Gallo, Michael D Grigoriadis, and Robert E Tarjan. A fast parametric maximum flow algorithm and applications. SIAM Journal on Computing, 18(1):30โ€“55, 1989. [37] Mohsen Ghaffari. Near-optimal distributed approximation of minimum-weight connected dominating set. In Proceedings of the 41st International Colloquium on Automata, Languages, and Programming (ICALP), pages 483โ€“494, 2014. [38] Mohsen Ghaffari, David G Harris, and Fabian Kuhn. On derandomizing local distributed algorithms. arXiv preprint arXiv:1711.02194, 2017. [39] Mohsen Ghaffari, Fabian Kuhn, and Yannic Maus. On the complexity of local distributed graph problems. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing (STOC), pages 784โ€“797. ACM, 2017. [40] Ofer Grossman and Merav Parter. Improved deterministic distributed construction of spanners. In 31st International Symposium on Distributed Computing, DISC 2017, October 16-20, 2017, Vienna, Austria, pages 24:1โ€“24:16, 2017. [41] David G Harris, Johannes Schneider, and Hsin-Hao Su. Distributed (โˆ†+1)-coloring in sublogarithmic rounds. In Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing (STOC), pages 465โ€“478, 2016. [42] Stephan Holzer and Roger Wattenhofer. Optimal distributed all pairs shortest paths and applications. In Proceedings of the 2012 ACM symposium on Principles of distributed computing (PODC), pages 355โ€“364. ACM, 2012. [43] Lujun Jia, Rajmohan Rajaraman, and Torsten Suel. An efficient distributed algorithm for constructing small dominating sets. Distributed Computing, 15(4):193โ€“205, 2002. [44] David S Johnson. Approximation algorithms for combinatorial problems. Journal of computer and system sciences, 9(3):256โ€“278, 1974. [45] Guy Kortsarz. On the hardness of approximating spanners. Algorithmica, 30(3):432โ€“450, 2001. [46] Guy Kortsarz and David Peleg. Generating sparse 2-spanners. Journal of Algorithms, 17(2):222โ€“ 236, 1994. 37 [47] Guy Kortsarz and David Peleg. Generating low-degree 2-spanners. SIAM Journal on Computing, 27(5):1438โ€“1456, 1998. [48] Fabian Kuhn, Thomas Moscibroda, and Roger Wattenhofer. Local computation: Lower and upper bounds. Journal of the ACM (JACM), 63(2):17, 2016. [49] Fabian Kuhn and Rogert Wattenhofer. Constant-time distributed dominating set approximation. In Proceedings of the twenty-second annual symposium on Principles of distributed computing (PODC), pages 25โ€“32, 2003. [50] Eyal Kushilevitz and Noam Nisan. Communication Complexity. Cambridge University Press, New York, NY, USA, 1997. [51] Nathan Linial. Locality in distributed graph algorithms. SIAM J. Comput., 21(1):193โ€“201, 1992. [52] Nathan Linial and Michael Saks. Low diameter graph decompositions. Combinatorica, 13(4):441โ€“ 454, 1993. [53] Laฬszloฬ Lovaฬsz. On the ratio of optimal integral and fractional covers. Discrete mathematics, 13(4):383โ€“390, 1975. [54] David Peleg. Distributed Computing: A Locality-Sensitive Approach. SIAM, 2000. [55] David Peleg and Vitaly Rubinovich. A near-tight lower bound on the time complexity of distributed minimum-weight spanning tree construction. SIAM J. Comput., 30(5):1427โ€“1442, 2000. [56] David Peleg and Alejandro A Schaฬˆffer. Graph spanners. Journal of graph theory, 13(1):99โ€“116, 1989. [57] David Peleg and Jeffrey D Ullman. An optimal synchronizer for the hypercube. SIAM Journal on computing, 18(4):740โ€“747, 1989. [58] David Peleg and Eli Upfal. A trade-off between space and efficiency for routing tables. Journal of the ACM (JACM), 36(3):510โ€“530, 1989. [59] Seth Pettie. Distributed algorithms for ultrasparse spanners and linear size skeletons. Distributed Computing, 22(3):147โ€“166, 2010. [60] Sridhar Rajagopalan and Vijay V Vazirani. Primal-dual rnc approximation algorithms for set cover and covering integer programs. SIAM Journal on Computing, 28(2):525โ€“540, 1998. [61] Alexander A. Razborov. On the distributional complexity of disjointness. Theoretical Computer Science, 106(2):385โ€“390, 1992. [62] Liam Roditty, Mikkel Thorup, and Uri Zwick. Deterministic constructions of approximate distance oracles and spanners. In International Colloquium on Automata, Languages, and Programming (ICALP), pages 261โ€“272, 2005. [63] Atish Das Sarma, Stephan Holzer, Liah Kor, Amos Korman, Danupon Nanongkai, Gopal Pandurangan, David Peleg, and Roger Wattenhofer. Distributed verification and hardness of distributed approximation. SIAM Journal on Computing, 41(5):1235โ€“1265, 2012. 38 [64] Mikkel Thorup and Uri Zwick. Compact routing schemes. In Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures (SPAA), pages 1โ€“10, 2001. [65] Mikkel Thorup and Uri Zwick. Approximate distance oracles. Journal of the ACM (JACM), 52(1):1โ€“24, 2005. 39
8cs.DS
arXiv:1704.04782v1 [cs.DC] 16 Apr 2017 A Security Monitoring Framework For Virtualization Based HEP Infrastructures A. Gomez Ramirez1 , M. Martinez Pedreira2 , C. Grigoras2 , L. Betev2 , C. Lara1 and U. Kebschull1 for the ALICE Collaboration 1 2 Infrastructure and Computer Systems for Data Processing (IRI), Goethe-University Frankfurt CERN, Geneva, Switzerland E-mail: [email protected] Abstract. High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attacks without administrator intervention. We describe a novel framework that accomplishes these requirements, with a proof of concept implementation for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment that improves the security by isolating services and Jobs without a significant performance impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention and Detection Systems on Grid computing. This dataset is composed of resource consumption measurements (such as CPU, RAM and network traffic), logfiles from operating system services, and system call data collected from production Jobs running in an ALICE Grid test site and a big set of malware. This malware was collected from security research sites. Based on this dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs. 1. Introduction Frequently in HEP computing, and also in general purpose Grid computing, user supplied code and data are deployed and executed in farms around the world, while the exact location is normally irrelevant. This allows scientists from many areas beyond physics to use huge computational power to solve complicated scientific problems, such as weather modeling, brain simulation, among others. However it also creates cyber-security challenges. Operators and administrators need tools to monitor for security incidents. User code and data should be isolated from different users, also from the physical computers and networks, in order to restrict access to sensitive elements in the organizations. We propose a novel paradigm and developed a framework that focus on protecting and monitoring user payload execution. Moreover, it enforces isolation in the environment in such a way that Jobs cannot access sensitive resources. This tool enables the Job behavior analysis in order to detect possible intrusions. This is accomplished by collecting and processing data generated by Jobs such as logs, system calls and resource consumption data. Traditional Intrusion Detection and Prevention Systems (IDPS) perform attack detection by using fixed rules based on signatures, identical to traditional monitoring systems. Therefore, we employ Machine Learning (ML) to overcome the mentioned drawbacks, achieving generalization among attack variants. Currently there is no tool that provides isolation, while monitoring security incidents by ML algorithms in Grid computing [1]. The authors have defined a threat model that guides the design and implementation of the described framework [1]. It is devised to detect attackers in the protected system trying actions like the following: โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข Exploit unknown or unfixed software/hardware vulnerabilities. Listen to user network traffic to gather sensitive clear text information. Perform a โ€™man in the middleโ€™ attack. Tamper other user Jobs. Escalate privileges. Access sensitive server configuration data. As a proof of concept we are implementing the described framework for the ALICE Grid at CERN. ALICE (A Large Ion Collider Experiment) is a dedicated Pbโ€“Pb detector designed to exploit the physics potential of nucleus-nucleus interactions at the Large Hadron Collider at CERN [2, 3]. The ALICE experiment has developed the ALICE production environment (AliEn) [4], which implements many components of the Grid technologies that are needed to analyze HEP data. Through AliEn, the computing centers that participate in the ALICE Grid can be seen and used as a single entity. Any available node executes Jobs and file access is transparent to the user, wherever in the world a file might be [5]. Figure 1 shows a picture of the ALICE Grid. Figure 1. ALICE Grid computing farms aroud the world. This document is organized as follows: section 2 introduces a security by isolation strategy for a distributed system. Section 3 explains a method for collecting relevant data from the isolated infrastructure. Section 4 shows how the collected data can be used to determine the security status of the system. In section 5 we detail our Intrusion Detection and Prevention model. Section 6 summarizes the current state of the project and the challenges faced in the design and implementation of the desired methodology. Finally, section 7 gives conclusions on the work done. 2. Security by isolation Security by isolation enforces application space separation [8]. The idea is that, if one process is compromised and utilized to attack the entire system, other components can stay untouched. Several technologies provide secure isolation. Virtual Machines (VM) and Linux Containers (LC) are very popular examples. 2.1. Linux containers LC are an extension of the virtual memory concept to allow the isolation of network interfaces, the PID tree and mount points [9]. Separation of containers from the rest of the system is enforced by the Kernel, so they can not affect the host or other containers. LC technology uses namespaces and Cgroups [10] to have a private view of the system and a limited resource assignment. Containers provide a set of advantages over VM. They are lightweight and fast, boot in milliseconds and have just a few MB of intrinsic disk and memory usage. It has been shown [11], that they provide a better performance than VMs. Commonly, VM are used in Grid and Cloud computing to achieve isolation, however LC performance and comparable security features make it a suitable alternative[6, 7]. 2.2. Proposed isolation architecture We propose the usage of LC to enforce HEP Grid site user isolation, also extensible to broader scientific computing and clouds. To achieve this we require a batch Job orchestrator allowing the execution of user processes in containers on computing clusters. Section 6 gives further details about this requirement and the selected solution. As shown in Figure 2, we switch from an environment without isolation, where Jobs have access to the server and other user Jobs, to an environment where Jobs run in their one process space, without access to other Jobs or sensitive components. Pilot Job Bob's Grid Alice's Grid Job Job Bob's Grid Job Container Pilot Job Alice's Grid Job Pilot Job Container Figure 2. Desired isolation scenario. An isolated environment for Job execution is not enough. Jobs could still perform several kind of attacks or not allowed activities such as, Distributed Denegation of Service (DDoS), Bitcoin mining, malware/botnet hosting, among others. Consequently, we need to monitor the activity and detect incidents inside the LC, as described in the next sections. 3. Monitoring data mining HEP distributed computing systems use continuous automated monitoring to help administrators to find and fix situations affecting the normal operation [12]. The resulting monitoring data can be used to find or even predict software and hardware failures. It is a valuable source of security information as well. In this document we focus on the measurement of metrics related to the batch Jobs being submitted to the distributed system. There are several relevant metrics that we can collect, for instance: โ€ข Job and system logs. โ€ข System call sequence. โ€ข Resource usage data (such as CPU, RAM and network traffic). Furthermore our goal is to chose the best information about Job behavior without affecting the habitual performance. We decided to employ data mining and intelligent algorithms, given their ability to find correlations and analyze trends in big datasets [13], in order to provide a better understanding of security related events. 4. Machine learning based security monitoring Machine Learning is a set of mathematical models that simulate the human learning abilities[14, 15]. In the context of Intrusion Detection, ML helps analyzing big amounts of data by learning the expected behavior and identifying abnormal situations. Traditional industrial IDS use rather fixed rules and search for known attack signatures. However they have problems when unknown or slightly different intrusion methods are used [13]. We have selected supervised training to analyze the collected data. In supervised training, a set of already classified and tagged data (training dataset) is used to model a function (for example a Neural Network) in order to make it able to classify new unseen data (test dataset) [16]. Figure 3. Monitored data gathering and processing. 4.1. Training dataset We have collected a training and testing dataset by gathering monitoring data from production ALICE Grid Jobs (Figure 3). Additionally we have executed a big set of Linux malware samples. The data on the first part is tagged as normal data and the second as malicious. This dataset is utilized to compare several Machine Learning algorithms to find the one that gives the best accuracy. Following is the list of ML algorithms selected. They will be tested to define which one gives the best accurate results for our dataset: โ€ข Support Vector Machines. โ€ข Multilayer Neural Networks. โ€ข Recurrent Neural Networks. Figure 4 shows a scheme of the proposed architecture for the ML usage. Figure 4. Proposed architecture. 5. Intrusion prevention and detection When analyzing Job monitoring data, our goal is finding security incidents. This security incidents can be found by analyzing anomalies in the system, things that go beyond the common state, probably caused by malicious software. Besides, even if our execution environment is sandboxed, there are many possible attacks that can still affect the distributed infrastructure. If a userโ€™s Job is misbehaving, the proposed framework should raise an alarm and perform predefined actions, for instance terminate the malicious processes. Figure 5 shows the desired implementation of the proposed system regarding Intrusion Detection. Intrusion Detection and Prevention โ€ข Alerts for Admins โ€ข Automated Actions Figure 5. Proposed Intrusion Detection in the worker nodes. 5.1. Challenges Improving the provided security should not impact the system performance. This is especially important in HEP computing. On the other hand, we also need innovative ways to analyze the trace and log data in an efficient way. Another important challenge is to reduce the amount of false positives and false negatives, since the system administrators rely on the accuracy of the security monitoring framework. 6. Proof of concept and testing environtment So far we have already deployed a testing ALICE Grid site based on AliEn [4] in a local Linux cluster, with five Ubuntu 14.04 nodes. In order to orchestrate and run the Jobs inside Linux Containers we have tested three different tools that offer such functionality: โ€ข Kubernetes [17]. โ€ข Apache Mesos [18]. โ€ข Docker Swarm [19]. At the end we have decided to work with Docker Swarm, because it allows to carry out the simplest deployment, which is an important requirement for our research environment. We use Docker [20] as LC engine, with Centos 6 [21] container images. We have developed AliEn interfaces for the mentioned batch systems. CVMFS [22] is installed on the hosts and shared as a volume inside the AliEn container to allow access to HEP libraries. Currently we execute one Job per container. This is useful to increase the traceability between different Jobs. Also, this is the natural micro service model for LC. As a monitoring infrastructure for collecting data from normal Grid Jobs we have Prometheus [23] and Sysdig [24]. Prometheus allows to take resource usage data directly from containers and collect it via a RESTful interface. Sysdig enables to capture system calls in Linux OS in a fast a reliable way. We have develop a custom Python library to integrate these tools and make them fit our needs. This infrastructure has been utilized for the execution and measurement of ALICE production Jobs, that are tagged as normal Jobs. A network isolated machine was used for malware data collection. This machine has the same setup as the Grid worker nodes. We have downloaded a set of 10000 Linux malware samples from a security research web site [25]. We ran the samples and collected the same information as for the normal Jobs (logs, sequence of system calls, resource usage data). Finally we obtained a combined dataset that allows to train and test our selected Machine Learning algorithms. A representation of the implemented components are shown in the Figure 6. 7. Conclusions Distributed computing is a fundamental component of High Energy Physics collaborations. Improving security in this kind of infrastructures requires innovative tools to automatically detect security related incidents. Security by isolation is also necessary to protect sensitive components allowing traceability on Job activities. We propose the usage of Linux Containers in order to provide isolation without highly decreasing the expected performance. We use Machine Learning techniques to provide generalization, overcoming common IDS difficulties on finding even slightly different threats. We describe the ongoing development process of a new security monitoring framework for Linux Containers based HEP infrastructures. This is being tested as a proof of concept for the ALICE experiment at CERN. We have collected a dataset of normal and malicious monitoring information from Grid Jobs and malware samples, that will be utilized to train and test ML algorithms. These algorithms should enable autonomous Intrusion Detection and Prevention as an important component of the proposed new framework. As future work we plan to explore how our approach can be used to detect anomalies that go beyond the security scope, for instance to find hardware failures or even human mistakes. Acknowledgments Authors acknowledge assistance from CERN security department specially Stefan Lueders and Romain Wartel. This work is supported by the German Federal Ministry of Education and Research. SYSDIG โ€ข System calls โ€ข Connections โ€ข Resource usage Figure 6. Proof of concept implementation. References [1] Gomez Ramirez A, Lara C and Kebschull U 2015 JPCS. Intrusion Prevention and Detection in Grid Computing - The ALICE Case. [2] The ALICE collaboration 1995 ALICE - Technical Proposal for A Large Ion Collider Experiment at the CERN LHC, CERN, Geneve, Rep. CERN-LHCC-95-71; LHCC-P-3. [3] The ALICE collaboration 2008 JINST. The ALICE Experiment at the CERN LHC, , vol. 3, no. 08, Aug. [4] Begnasco S et al. 2015 JPCS. AliEn: ALICE environment on the GRID. IOP Publishing. [5] Christoph E et al. 2005 Technical Design Report LCG. LHC computing Grid: Technical Design Report. Version 1.06. 20 Jun 2005. CERN, Geneve. Available from: https://cds.cern.ch/record/840543. [6] Abed A, Clancy C and Levy C 2015 Security and Trust Management, Lecture Notes in Computer Science. Intrusion Detection System for Applications Using Linux Containers. Springer International Publishing. [7] Modi C et al. 2013 JNCA. A survey of intrusion detection techniques in Cloud. Jan;36(1):42-57. [8] Mansfield-Devine S 2010 Computer Fraud & Security. Security through isolation. 5, 8 - 11. 1361-3723. [9] Graber S, 2014 Ubuntu Foundations Team, LXC 1.0: Blog post series. [updated 2014 Jan 17; cited 2015 May 11]. Available from: https://www.stgraber.org/2013/12/20/lxc-1-0-blog-post-series/ [10] Menage P 2007 Proceedings of the Linux Symposium. Adding Generic Process Containers to the Linux Kernel. June 27. [11] Shiseki A 2016 The 22nd International Conference on Computing in High Energy and Nuclear Physics, CHEP 2016. Cloud Computing as a Scientific and Technical Application Development and Execution Platform. October 10-14. [12] Lara C et al. 2011 JPCS. Autonomous System Management for the ALICE High-Level-Trigger Cluster using the SysMES Framework. doi:10.1088/1742-6596/331/5/052003. [13] Azad V 2013 IJITCS. Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets. 75-90. [14] Yuping L et al. 2012 IJACT. An Intrusion Detection Approach Using SVM and Multiple Kernel Method. Jan 31;4(1):463-9. [15] Gascon H et al. 2014 ACM Press; 2013. Structural detection of android malware using embedded call graphs. [cited 2014 Nov 17]. p. 45-54. Available from: http://dl.acm.org/citation.cfm?doid=2517312.2517315 [16] Bishop C 2006 Library of Congress ISBN Pattern recognition and machine learning. New York. Springer. [17] Google, Kubernetes. 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: http://kubernetes.io/ [18] Apache foundation, Mesos 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: https://mesos.apache.org/ [19] Docker, Docker Swarm 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: https://docs.docker.com/swarm/ [20] Docker, Docker 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: https://docs.docker.com [21] CentOS Project, Centos6 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: https://www.centos.org/ [22] Buncic P et al 2008 Proceedings of the XII. International Workshop on Advanced Computing and Analysis Techniques in Physics Research (ACAT08). CernVM - a virtual appliance for LHC applications. Erice, PoS(ACAT08)012. [23] Prometheus 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: https://prometheus.io/ [24] Draios, Sysdig 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: http://www.sysdig.org/ [25] VirusShare 2016 [updated 2016 Dec 1; cited 2016 Dec.1]. Available from: https://virusshare.com/about.4n6
2cs.AI
Can Machines Think in Radio Language? arXiv:1710.02648v3 [cs.AI] 15 December 2017 Yujian Li College of Computer Science, Beijing University of Technology, Beijing 100124, China Email: [email protected] Abstract: People can think in auditory, visual and tactile forms of language, so can machines principally. But is it possible for them to think in radio language? According to a first principle presented for general intelligence, i.e. the principle of language's relativity, the answer may give an exceptional solution for robot astronauts to talk with each other in space exploration. Keywords: The principle of languageโ€™s relativity; First principle; Radio language; Space exploration. Figure 1. Two robonauts are talking about the earth in a Morse-code radio language on the moon. One says โ€œTHE EARTH IS OUR HOMEโ€, the other โ€œIT IS TRULY BEAUTIFULโ€. This is a potential application of Morse code to artificial intelligence in the future, beyond classical transmission of text information between people. In computer science, one of the biggest unsolved problems is to develop intelligent machines. Since a seminal paper by Turing on the topic of artificial intelligence [1], the central question โ€œCan machines think?โ€ began to excite interest in building systems that learn and think like people. That is a fascinating dream! Recently, the interest has been renewed again because of impressive progress with deep learning [2], in spite of great difficulties such as the Character Challenge and the Frostbite Challenge [3], to perform a variety of tasks as rapidly and flexibly as people do. What does it mean for a system to learn and think like a person? Lake et al. argued that this system should build causal models of the world, ground learning in intuitive theories of physics and psychology, and harness compositionality and learning-to-learn [3]. They claimed that these key ideas of core ingredients would play an active and important role in producing human-like learning and thought. Undoubtedly, their claim is attractive and promising for the ultimate dream of implementing machines with human-level general intelligence. However, the claim says little about a personโ€™s ability to communicate and think in natural language, which is clearly vital for human intelligence [4]. The question is, how to develop a capacity of language for machines? Language is a basic tool in human society, playing an essential role in communication and thought. People are accustomed to thinking in sound language (sound thinking). In different countries, people generally speak different languages. There are about 5000๏พ7000 languages spoken all over the world, 90% of them used by less than 100000 people. As estimated by UNESCO (The United Nationsโ€™ Educational, Scientific and Cultural Organization), the most widely spoken languages are: Mandarin Chinese, English, Spanish, Hindi, Arabic, Bengali, Russian, Portuguese, Japanese, German and French. In practice, a language usually takes forms of speech and text, but can be encoded into whistle, sign or braille. This may lead to an interesting question, can machines think in language with other forms, e.g. radio? To all appearance, a Chinese can think in Chinese, an American can think in English, a Spanish can think in Spanish, and so on. From the viewpoint of daily life, all these forms of language, even including other forms such as whistle, sign and braille, should be equivalent for people to think about the world. In my opinion, this quite common point can be generalized as a first principle to establish a theory of mind (and intelligence more broadly), termed the principle of languageโ€™s relativity, or โ€œthe principle of symbolic relativityโ€ [5]. The principle is described as follows. All admissible forms of language are equivalent for an intelligent system to think about the world. In the principle of languageโ€™s relativity, an admissible form means that the system can use it for thinking, i.e. the formulation of thoughts about the world. Therefore, the principle can be stated in other words, All admissible forms of language are equivalent with respect to the formulation of thoughts about the world. Note that this principle is named with inspiration from the principle of relativity in physics [6], namely, All admissible frames of reference are equivalent with respect to the formulation of the fundamental laws of physics. That is, physic laws are the same in all reference frames - inertial or non-inertial. By analogy, it can be stated that, thoughts about the world are the same in all language forms โ€“ speech, text, whistle, sign or braille. Therefore, in this sense a language form can also be regarded as a reference frame to formulate thoughts. If taken as the first postulate of intelligence theory, the principle of languageโ€™s relativity implies that language is independent of modality. This explains why any human language can be encoded into a lot of different media such as using auditory, visual, and tactile stimuli. Moreover, it can give profound and original insights to guide engineering future generations of intelligent machines. For example, principally robots can think in radio language. Such robots would be tremendously useful in space exploration, where radio language is much more convenient for them to talk with each other than sound language for lack of air. Since no person have an inborn ability to receive and send radio waves, the radio form of language is not admissible for human. Thus, radio language is a novel and creative idea for robots to think, although radio itself is certainly very ordinary for information transmission and remote control. Clearly, thinking in radio language (radio thinking), is a different way to implement intelligence than people can. One may argue that, even without language, artificial intelligence (e.g. by residual network [7], deep Q-network [8] and AlphoGo [9]) could equal or even beat human intelligence in deep learning performance of some tasks such as object recognition, video games and board games. In practical realization, it is still reasonable to require that an intelligent machine is able to communicate through language. It goes without saying, language is an essential ability for general intelligence. Yet nobody is quite sure of what intelligence is. Perhaps in most general purpose, intelligence measures an agentโ€™s ability to achieve goals in a wide range of environments [10]. Nonetheless, this informal definition, together with the mathematic description [10], plays a limited role in design of intelligent machines, albeit bringing together some key features from many expert definitions of human intelligence. To understand the nature of intelligence, not only a far-reaching definition is further expected, but also a comprehensive theory. What does this theory look like? At the very least, it should contain just a few first principles at the system level. The few principles must be fundamental and independent in all phenomena of intelligence, and cannot be deduced from any other principles in physics, chemistry and biology. Although these principles may not lead to anything like Maxwell equations or E=mc2, they should capture the essential characteristics of intelligence comprehensively in perspectives between science and philosophy. More importantly, they should be able to make a guide to engineering intelligent machines, especially with some different intelligence from human. โ€œHuman-likeโ€ implicates imitation before grasping the nature of intelligence clearly, while โ€œhuman-differentโ€ implicates creation after understanding genuinely. One of such principles is the principle of languageโ€™s relativity, others to be certain. Obviously, the principle is independent of physics, chemistry and biology. Furthermore, it can account for modalityindependence of language, and give rise to a revolutionary idea of radio thinking. As a high-level intelligence envisaged for future robot astronauts, the importance of radio thinking should be emphasized again. It may overturn a public view of how robonauts talk with each other in space exploration. Imagine two robonauts are talking about the earth on the moon (see Figure 1). Traditionally, people think that they would talk in sound language, just as could be seen in some science fiction films. Nevertheless, in reality they cannot do so at all without air. Alternatively, they can talk with each other in a Morse-code radio language that lacks any neural mechanisms. This is an excellent thought experiment to show that, although human language is an ability developed on the basis of neural mechanisms in the brain, intelligent machines may have a capacity of radio language not based on these mechanisms. Thereby, high-level intelligence may not be brain-like. The brain-like intelligence tries to achieve intelligence as demonstrated by brains [11], preferably those of highly evolved creatures. But the nature of intelligence can be understood in a brain-different way, just like the secret of how to fly. Indeed, without flapping its wings, an airplane can fly in a bird-different way based on the theory of aerodynamics, not the birdโ€™s brain. For space exploration, autonomous robonauts would be extremely helpful on the moon or the other planets. Since the environments change, there are a lot of barriers to implement these robonauts. But they should require certain kinds of human-different intelligence for high-level autonomy in actions. For example, radio thinking helps them to plan, and radio talking helps them to collaborate. Kirobo is the worldโ€™s first talking robot sent into space [12]. However, Kirobo was tasked to be a companion, not an explorer. It could talk in sound language only inside the spacecraft. Radio talking may be an exceptional solution outside. It is a terrific endeavor to engineer machines with general intelligence. A theory of intelligence requires a few first principles, for example, the principle of languageโ€™s relativity. Where are other principles in the Universe? What are their implications in science? How do they play roles in technology? These questions are the challenges set ahead for remarkable years of discovery. References [1] Turing, A. M. Computing Machinery and Intelligence. Mind 49, 433-460 (1950). [2] LeCun, Y., Bengio, Y. & Hinton, G. E. Deep learning. Nature 521, 436-444 (2015). [3] Lake, B. M., Ullman, T. D., Tenenbaum, J. B., Gershaman, S. J. Building machines that learn and think like people. Behavioral and Brain Sciences, accepted for publication, https://doi.org/10.1017/S0140525X16001837. [4] Mikolov, T., Joulin, A., & Baroni, M. A Roadmap towards Machine Intelligence. arXiv preprint: 1511.08130 (2016). [5] Yujian Li. Reveal the secrets of consciousness ๏‚พ also on theory of cognitive relativity. In 100 Interdisciplinary Science Puzzles of the 21st Century. Science Press, Beijing, 2005, edited by Xixian Li et al. [6] https://en.wikipedia.org/wiki/Principle_of_relativity. [7] He, K., Zhang, X., Ren, S., et al. Deep residual learning for image recognition. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2016), 770-778. [8] Mnih, V., Kavukcuoglu, K., Silver D., et al. Human-level control through deep reinforcement learning. Nature 518, 529-533 (2015). [9] Silver, D., Huang, A., Maddison, C. J., et al. Mastering the game of Go with deep neural networks and tree search. Nature 529, 484-489 (2016). [10] Legg, S., Hutter, M. Universal Intelligence: A Definition of Machine Intelligence. Minds & Machines 17, 391-444 (2007). [11] Sendhoff, B., Kรถrner, E., Sporns, O. Creating Brain-like Intelligence. LANAI 5436, 1-14 (2009). [12] http://www.telegraph.co.uk/news/science/space/10221399/Talking-robot-astronaut-blasts-into-space.html.
2cs.AI
1 Interpreting Deep Visual Representations via Network Dissection arXiv:1711.05611v1 [cs.CV] 15 Nov 2017 Bolei Zhouโˆ— , David Bauโˆ— , Aude Oliva, and Antonio Torralba Abstractโ€”The success of recent deep convolutional neural networks (CNNs) depends on learning hidden representations that can summarize the important factors of variation behind the data. However, CNNs often criticized as being black boxes that lack interpretability, since they have millions of unexplained model parameters. In this work, we describe Network Dissection, a method that interprets networks by providing labels for the units of their deep visual representations. The proposed method quantifies the interpretability of CNN representations by evaluating the alignment between individual hidden units and a set of visual semantic concepts. By identifying the best alignments, units are given human interpretable labels across a range of objects, parts, scenes, textures, materials, and colors. The method reveals that deep representations are more transparent and interpretable than expected: we find that representations are significantly more interpretable than they would be under a random equivalently powerful basis. We apply the method to interpret and compare the latent representations of various network architectures trained to solve different supervised and self-supervised training tasks. We then examine factors affecting the network interpretability such as the number of the training iterations, regularizations, different initializations, and the network depth and width. Finally we show that the interpreted units can be used to provide explicit explanations of a prediction given by a CNN for an image. Our results highlight that interpretability is an important property of deep neural networks that provides new insights into their hierarchical structure. Index Termsโ€”Convolutional Neural Networks, Network Interpretability, Visual Recognition, Interpretable Machine Learning. F 1 I NTRODUCTION BSERVATIONS of hidden units in large deep neural networks have revealed that human-interpretable concepts sometimes emerge as individual latent variables within those networks. For example, object detector units emerge within networks trained to recognize places [1]; part detectors emerge in object classifiers [2]; and object detectors emerge in generative video networks [3]. This internal structure has appeared in situations where the networks are not constrained to decompose problems in any interpretable way. The emergence of interpretable structure suggests that deep networks may be learning disentangled representations spontaneously. While it is commonly understood that a network can learn an efficient encoding that makes economical use of hidden variables to distinguish the input, the appearance of a disentangled representation is not well understood. A disentangled representation aligns its variables with a meaningful factorization of the underlying problem structure, and encouraging disentangled representations is a significant area of research [4]. If the internal representation of a deep network is partly disentangled, one possible path for understanding its mechanisms is to detect disentangled structure, and simply read out the human interpretable factors. We address the following three key issues about the deep visual representations in this work: โ€ข What is a disentangled representation of neural networks, and how can its factors be quantified and detected? โ€ข Do interpretable hidden units reflect a special alignment of feature space, or are interpretations a chimera? โ€ข What differences in network architectures, data sources, and training conditions lead to the internal representations with greater or lesser entanglement? O โ€ข โ€ข B. Zhou and D.Bau contributed equally to this work. B. Zhou, D. Bau, A.Oliva, and A. Torralba are with CSAIL, MIT, MA, 02139. E-mail: {bzhou, davidbau, oliva, torralba}@csail.mit.edu To examine these issues, we propose a general analytic framework, Network Dissection, for interpreting deep visual representations and quantifying their interpretability. Using Broden, a broadly and densely labeled dataset, our framework identifies hidden unitsโ€™ semantics for any given CNN, then aligns them with human-interpretable concepts. Building upon the preliminary result published at [5], we begin with a detailed description of the methodology of Network Dissection. We use the method to interpret a variety of deep visual representations trained with different network architectures (AlexNet, VGG, GoogLeNet, ResNet, DenseNet) and supervisions (supervsied training on ImageNet for object recognition and on Places for scene recognition, along with various self-taught supervision tasks). We show that interpretability is an axis-aligned property of a representation that can be destroyed by rotation without affecting discriminative power. We further examine how interpretability is affected by different training datasets, training regularizations such as dropout [6] and batch normalization [7], and fine-tuning between different data sources. Our experiments reveal that units emerge as semantic detectors in the intermediate layers of most deep visual representations, while the degree of interpretability can vary widely across changes in architecture and training. We conclude that representations learned by deep networks are more interpretable than previously thought, and that measurements of interpretability provide insights about the structure of deep visual representations that that are not revealed by their classification power alone1 . 1.1 Related Work Visualizing deep visual representations. Though CNN models are notoriously known as black boxes, a growing number of 1. Code, data, and more dissection results are available at the project page http://netdissect.csail.mit.edu/. 2 techniques have been developed to visualize the internal representations of convolutional neural networks. The behavior of a CNN can be visualized by sampling image patches that maximize activation of hidden units [1], [8], [9], or by using variants of backpropagation to identify or generate salient image features [8], [10], [11]. Back-propagation together with a natural image prior can be used to invert a CNN layer activation [12], and an image generation network can be trained to invert the deep features by synthesizing the input images [13]. [14] further synthesizes the prototypical images for individual units by learning a feature code for the image generation network from [13].These visualizations reveal the image patterns that have been learned in a deep visual representation and provide a qualitative guide to the interpretation and interpretability of units. In [1], a quantitative measure of interpretability was introduced: human evaluation of visualizations to determine which individual units behave as object detectors in a network trained to classify scenes. However, human evaluation is not scalable to increasingly large networks such as ResNet [15], with more than 100 layers. Therefore the aim of the present work is to develop a scalable method to go from qualitative visualization to quantitative interpretation. Analyzing the properties of deep visual representations. Various intrinsic properties of deep visual representations have been explored. Much research has focused on studying the power of CNN layer activations to be used as generic visual features for classification [16], [17]. The transferability of activations for a variety of layers has been analyzed, and it has been found that higher layer units are more specialized to the target task [18]. Susceptibility to adversarial input reveals that discriminative CNN models are fooled by particular image patterns [19], [20]. Analysis of correlation between different random initialized networks reveal that many units converge to the same set of representations after training [21]. The question of how representations generalize has been investigated by showing that a CNN can easily fit a random labeling of training data even under explicit regularization [22]. Our work focuses on another less explored property of deep visual representations: interpretability. Unsupervised learning of deep visual representations. Recent work on unsupervised learning or self-supervised learning exploits the correspondence structure that comes for free from unlabeled images to train networks from scratch [23], [24], [25], [26], [27]. For example, CNN is trained by predicting image context [23], by colorizing gray images [28], [29], by solving image puzzle [24], and by associating the images with ambient sounds [30]. The resulting deep visual representations learned from different unsupervised learning tasks are compared by evaluating them as generic visual features on classification datasets such as Pascal VOC. Our work provides an alternative approach to compare deep visual representations in terms of their interpretability, beyond just their discriminative power. 2 F RAMEWORK OF N ETWORK D ISSECTION The notion of a disentangled representation rests on the human perception of what it means for a concept to be mixed up. Therefore we define the interpretability of deep visual representation in terms of the degree of alignment with a set of human-interpretable concepts. Our quantitative measurement of interpretability for deep visual representations proceeds in three steps: 1) Identify a broad set of human-labeled visual concepts. TABLE 1 Statistics of each label type included in the dataset. Category scene object part material texture color Classes 468 584 234 32 47 11 Sources ADE [32] ADE [32], Pascal-Context [34] ADE [32], Pascal-Part [35] OpenSurfaces [33] DTD [36] Generated Avg sample 38 491 854 1,703 140 59,250 2) Gather the response of the hidden variables to known concepts. 3) Quantify alignment of hidden variableโˆ’concept pairs. This three-step process of network dissection is reminiscent of the procedures used by neuroscientists to understand similar representation questions in biological neurons [31]. Since our purpose is to measure the level to which a representation is disentangled, we focus on quantifying the correspondence between a single latent variable and a visual concept. In a fully interpretable local coding such as a one-hot-encoding, each variable will match exactly with one human-interpretable concept. Although we expect a network to learn partially nonlocal representations in interior layers [4], and past experience shows that an emergent concept will often align with a combination of a several hidden units [2], [17], our present aim is to assess how well a representation is disentangled. Therefore we measure the alignment between single units and single interpretable concepts. This does not gauge the discriminative power of the representation; rather it quantifies its disentangled interpretability. As we will show in Sec. 3.2, it is possible for two representations of perfectly equivalent discriminative power to have very different levels of interpretability. To assess the interpretability of any given CNN, we draw concepts from a new broadly and densely labeled image dataset that unifies labeled visual concepts from a heterogeneous collection of labeled data sources, described in Sec. 2.1. We then measure the alignment of each hidden unit of the CNN with each concept by evaluating the feature activation of each individual unit as a segmentation model for each concept. To quantify the interpretability of a layer as a whole, we count the number of distinct visual concepts that are aligned with a unit in the layer, as detailed in Sec. 2.2. 2.1 Broden: Broadly and Densely Labeled Dataset To be able to ascertain alignment with both low-level concepts such as colors and higher-level concepts such as objects, we have assembled a new heterogeneous dataset. The Broadly and Densely Labeled Dataset (Broden) unifies several densely labeled image datasets: ADE [32], OpenSurfaces [33], Pascal-Context [34], Pascal-Part [35], and the Describable Textures Dataset [36]. These datasets contain examples of a broad range of objects, scenes, object parts, textures, and materials in a variety of contexts. Most examples are segmented down to the pixel level except textures and scenes, which are given for full images. In addition, every image pixel in the dataset is annotated with one of the eleven common color names according to the human perceptions classified by van de Weijer [37]. Samples of the types of labels in the Broden dataset are shown in Fig. 1. The purpose of Broden is to provide a ground truth set of exemplars for a broad set of visual concepts. The concept labels in Broden are normalized and merged from their original datasets so 3 red (color) yellow (color) wrinkled (texture) meshed (texture) wood (material) fabric (material) foot (part) door (part) airplane (object) waterfall (object) art studio (scene) beach (scene) Fig. 1. Samples from the Broden Dataset. The ground truth for each concept is a pixel-wise dense annotation. Top activated images Segmented images using the binarized unit activation map Semantic segmentation annotations Segmented annotations Fig. 2. Scoring unit interpretability by evaluating the unit for semantic segmentation. that every class corresponds to an English word. Labels are merged based on shared synonyms, disregarding positional distinctions such as โ€˜leftโ€™ and โ€˜topโ€™ and avoiding a blacklist of 29 overly general synonyms (such as โ€˜machineโ€™ for โ€˜carโ€™). Multiple Broden labels can apply to the same pixel: for example, a black pixel that has the Pascal-Part label โ€˜left front cat legโ€™ has three labels in Broden: a unified โ€˜catโ€™ label representing cats across datasets; a similar unified โ€˜legโ€™ label; and the color label โ€˜blackโ€™. Only labels with at least 10 image samples are included. Table 1 shows the number of classes per dataset and the average number of image samples per label class. Totally there are 1197 visual concept classes included. 2.2 Scoring Unit Interpretability The proposed network dissection method evaluates every individual convolutional unit in a CNN as a solution to a binary segmentation task to every visual concept in Broden, as illustrated in Fig. 3. Our method can be applied to any CNN using a forward pass without the need for training or backpropagation. For every input image x in the Broden dataset, the activation map Ak (x) of every internal convolutional unit k is collected. Then the distribution of individual unit activations ak is computed. For each unit k , the top quantile level Tk is determined such that P (ak > Tk ) = 0.005 over every spatial location of the activation map in the dataset. To compare a low-resolution unitโ€™s activation map to the inputresolution annotation mask Lc for some concept c, the activation map is scaled up to the mask resolution Sk (x) from Ak (x) using bilinear interpolation, anchoring interpolants at the center of each unitโ€™s receptive field. Sk (x) is then thresholded into a binary segmentation: Mk (x) โ‰ก Sk (x) โ‰ฅ Tk , selecting all regions for which the activation exceeds the threshold Tk . These segmentations are evaluated against every concept c in the dataset by computing intersections Mk (x)โˆฉLc (x), for every (k, c) pair. The score of each unit k as segmentation for concept c is reported as a the intersection over union score across all the images in the dataset, P |Mk (x) โˆฉ Lc (x)| IoUk,c = P , (1) |Mk (x) โˆช Lc (x)| where | ยท | is the cardinality of a set. Because the dataset contains some types of labels which are not present on some subsets of inputs, the sums are computed only on the subset of images that have at least one labeled concept of the same category as c. The value of IoUk,c is the accuracy of unit k in detecting concept c; we consider one unit k as a detector for concept c if IoUk,c exceeds a threshold. Our qualitative results are insensitive to the IoU threshold: different thresholds denote different numbers of units as concept detectors across all the networks but relative orderings remain stable. For our comparisons we report a detector if IoUk,c > 0.04. Note that one unit might be the detector for multiple concepts; for the purpose of our analysis, we choose the top ranked label. To quantify the interpretability of a layer, we count the number unique concepts aligned with units. We call this the number of unique detectors. Figure 2 summarizes the whole process of scoring unit interpretability: By segmenting the annotation mask using the receptive field of units for the top activated images, we compute the IoU for each concept. The IoU evaluating the quality of the segmentation of a unit is an objective confidence score for interpretability that is comparable across networks. Thus this score enables us to compare interpretability of different representations and lays the basis for the experiments below. Note that network dissection works only as well as the underlying dataset: if a unit matches a human-understandable concept that is absent in Broden, then it will not score well for interpretability. Future versions of Broden will be expanded to include more kinds of visual concepts. 3 INTERPRETING DEEP VISUAL REPRESENTATIONS For testing we prepare a collection of CNN models with different network architectures and supervision of primary tasks, as listed in Table 2. The network architectures include AlexNet [38], GoogLeNet [39], VGG [40], ResNet [15], and DenseNet [41]. For supervised training, the models are trained from scratch (i.e., not pretrained) on ImageNet [42], Places205 [43], and Places365 [44]. ImageNet is an object-centric dataset, which contains 1.2 million images from 1000 classes. Places205 and Places365 are 4 Freeze trained network weights Upsample target layer Car Person Grass Door t Uni e n O tion va Acti Fabric Pixel-wise segmentation Blue Conv Conv Conv Conv Network being probed Conv Input image Evaluate on segmentation tasks Fig. 3. Illustration of network dissection for measuring semantic alignment of units in a given CNN. Here one unit of the last convolutional layer of a given CNN is probed by evaluating its performance on various segmentation tasks. Our method can probe any convolutional layer. TABLE 2 Tested CNN Models Training none Supervised Self Network AlexNet AlexNet GoogLeNet VGG-16 ResNet-152 DenseNet-161 AlexNet dataset or task random ImageNet, Places205, Places365, Hybrid. ImageNet, Places205, Places365. ImageNet, Places205, Places365, Hybrid. ImageNet, Places365. ImageNet, Places365. context, puzzle, egomotion, tracking, moving, videoorder, audio, crosschannel,colorization. objectcentric, transinv. two subsets of the Places Database, which is a scene-centric dataset with categories such as kitchen, living room, and coast. Places205 contains 2.4 million images from 205 scene categories, while Places365 contains 1.6 million images from 365 scene categories. โ€œHybridโ€ refers to a combination of ImageNet and Places365. For self-supervised training tasks, we select several recent models trained on predicting context (context) [23], solving puzzles (puzzle) [24], predicting ego-motion (egomotion) [25], learning by moving (moving) [26], predicting video frame order (videoorder) [45] or tracking (tracking) [27], detecting object-centric alignment (objectcentric) [46], colorizing images (colorization) [28], inpainting (contextencoder) [47], predicting cross-channel (crosschannel) [29], predicting ambient sound from frames (audio) [30], and tracking invariant patterns in videos (transinv) [48]. The self-supervised models we analyze are comparable to each other in that they all use AlexNet or an AlexNetderived architecture, with one exception model transinv [48], which uses VGG as the base network. In the following experiments, we begin by validating our method using human evaluation. Then, we use random unitary rotations of a learned representation to test whether interpretability of CNNs is an axis-independent property; we find that it is not, and we conclude that interpretability is not an inevitable result of the discriminative power of a representation. Next, we analyze all the convolutional layers of AlexNet as trained on ImageNet [38] and as trained on Places [43], and confirm that our method reveals detectors for higher-level concepts at higher layers and lower-level concepts at lower layers; and that more detectors for higher-level concepts emerge under scene training. Then, we show that different network architectures such as AlexNet, VGG, and ResNet yield different interpretability, while differently supervised training tasks and self-supervised training tasks also yield a variety of levels of interpretability. Additionally we show the impact of different training conditions, examine the relationship between discriminative power and interpretability, and investigate a possible way to improve the interpretability of CNNs by increasing their width. Finally we utilize the interpretable units as explanatory factors to the prediction given by a CNN. 3.1 Human Evaluation of Interpretations Using network dissection, we analyze the interpretability of units within all the convolutional layers of Places-AlexNet and ImageNetAlexNet, then compare with human interpretation. Places-AlexNet is trained for scene classification on Places205 [43], while ImageNet-AlexNet is the identical architecture trained for object classification on ImageNet [38]. Our evaluation was done by raters on Amazon Mechanical Turk (AMT). As a baseline description of unit semantics, we used human-written descriptions of each unit from [1]. These descriptions were collected by asking raters to write words or short phrases to describe the common meaning or pattern selected by each unit, based on a visualization of the top image patches. Three descriptions and a confidence were collected for each unit. As a canonical description we chose the most common description of a unit (when raters agreed), and the highest-confidence description (when raters did not agree). Some units may not be interpretable. To identify these, raters were shown the canonical descriptions of visualizations and asked whether they were descriptive. Units with validated descriptions are taken as the set of interpretable units. To compare these baseline descriptions to network-dissectionderived labels, we ran the following experiment. Raters were shown a visualization of top images patches for an interpretable unit, along with a word or short phrase description, and they were asked to vote (yes/no) whether the given phrase was descriptive of most of the image patches. The baseline human-written descriptions were randomized with the labels derived using net dissection, and the origin of the labels was not revealed to the raters. Table 3 summarizes the results. The number of interpretable units is shown for each layer, and average positive votes for descriptions of interpretable units are shown, both for humanwritten labels and network-dissection-derived labels. Human labels are most highly consistent for units of conv5, suggesting that humans have no trouble identifying high-level visual concept detectors, while lower-level detectors are more difficult to label. 5 Fig. 4. The annotation interface used by human raters on Amazon Mechanical Turk. Raters are shown descriptive text in quotes together with fifteen images, each with highlighted patches, and must evaluate whether the quoted text is a good description for the highlighted patches. TABLE 3 Human evaluation of our Network Dissection approach. Interpretable units Human consistency Network Dissection conv1 57/96 82% 37% conv2 126/256 76% 56% conv3 247/384 83% 54% conv4 258/384 82% 59% conv5 194/256 91% 71% Similarly, labels given by network dissection are best at conv5, and are found to be less descriptive for lower layers. Comparison of the human interpretation and the labels predicted by network dissection is plotted in Fig. 5. A sample of units is shown together with both automatically inferred interpretations and manually assigned interpretations taken from [1]. We can see that the predicted labels match the human annotation well, though sometimes they capture a different description of a visual concept, such as the โ€˜crosswalkโ€™ predicted by the algorithm compared to โ€˜horizontal linesโ€™ given by the human for the third unit in conv4 of Places-AlexNet in Fig. 5. Confirming intuition, color and texture concepts dominate at lower layers conv1 and conv2 while more object and part detectors emerge in conv5. 3.2 Measurement of Axis-aligned Interpretability We conduct an experiment to determine whether it is meaningful to assign an interpretable concept to an individual unit. Two possible hypotheses can explain the emergence of interpretability in individual hidden layer units: Hypothesis 1. Interpretability is a property of the representation as a whole, and individual interpretable units emerge because interpretability is a generic property of typical directions of representation space. Under this hypothesis, projecting to any direction would typically reveal an interpretable concept, and interpretations of single units in the natural basis would not be more meaningful than interpretations that can be found in any other direction. Hypothesis 2. Interpretable alignments are unusual, and interpretable units emerge because learning converges to a special basis that aligns explanatory factors with individual units. In this model, the natural basis represents a meaningful decomposition learned by the network. Hypothesis 1 is the default assumption: in the past it has been found [19] that with respect to interpretability โ€œthere is no distinction between individual high level units and random linear combinations of high level units.โ€ Network dissection allows us to re-evaluate this hypothesis. We apply random changes in basis to a representation learned by AlexNet. Under hypothesis 1, the overall level of interpretability should not be affected by a change in basis, even as rotations cause the specific set of represented concepts to change. Under hypothesis 2, the overall level of interpretability is expected to drop under a change in basis. We begin with the representation of the 256 convolutional units of AlexNet conv5 trained on Places205 and examine the effect of a change in basis. To avoid any issues of conditioning or degeneracy, we change basis using a random orthogonal transformation Q. The rotation Q is drawn uniformly from SO(256) by applying 2 Gram-Schmidt on a normally-distributed QR = A โˆˆ R256 with positive-diagonal right-triangular R, as described by [49]. Interpretability is summarized as the number of unique visual concepts aligned with units, as defined in Sec. 2.2. Denoting AlexNet conv5 as f (x), we find that the number of unique detectors in Qf (x) is 80% fewer than the number of unique detectors in f (x). Our finding is inconsistent with hypothesis 1 and consistent with hypothesis 2. We also test smaller perturbations of basis using Qฮฑ for 0 โ‰ค ฮฑ โ‰ค 1, where the fractional powers Qฮฑ โˆˆ SO(256) are chosen to form a minimal geodesic gradually rotating from I to Q; these intermediate rotations are computed using a Schur decomposition. Fig. 6 shows that interpretability of Qฮฑ f (x) decreases as larger rotations are applied. Fig. 7 shows some examples of the linearly combined units. Each rotated representation has exactly the same discriminative power as the original layer. Writing the original network as g(f (x)), note that g 0 (r) โ‰ก g(QT r) defines a neural network that processes the rotated representation r = Qf (x) exactly as the original g operates on f (x). We conclude that interpretability is neither an inevitable result of discriminative power, nor is it a prerequisite to discriminative power. Instead, we find that interpretability is a different quality that must be measured separately to be understood. We repeat the complete rotation (ฮฑ = 1) on Places365 and ImageNet 10 times, the result is shown in Fig. 8. We observe the drop of interpretability for both of the network, while it drops more for the AlexNet on Places365. It is because originally the interpretability of AlexNet on Places365 is higher than AlexNet on ImageNet thus the random rotation damages more. 3.3 Network Architectures with Supervised Learning How do different network architectures affect disentangled interpretability of the learned representations? We apply network dissection to evaluate a range of network architectures trained on ImageNet and Places. For simplicity, the following experiments focus on the last convolutional layer of each CNN, where semantic detectors emerge most. Results showing the number of unique detectors that emerge from various network architectures trained on ImageNet and Places are plotted in Fig. 9. In terms of network architecture, we find that interpretability of ResNet > DenseNet > VGG > 6 h:green sky (object) Places veined (texture) orange (color) h:color yellow lacelike (texture) ImageNet red (color) h:grid pattern perforated (texture) h:yellow food (material) h:red woven (texture) h:yellow banded (texture) yellow (color) h:striped sky (object) h:blue grid (texture) sky (object) conv1 h:corrugated tree (object) h:black&white banded (texture) h:pink or red lined (texture) red (color) h:grass chequered (texture) h:sky grass (object) h:bed h:tree car (object) h:car h:pattern crosswalk (part) h:horiz. lines mountain (scene) h:orange muzzle (part) h:animal face wheel (part) h:blue sky swirly (texture) h:round cat (object) h:nosed head (part) h:face leg (part) h:mesh dotted (texture) conv2 h:windows bed (object) conv3 h:montain h:wheels h:animal faces h:leg conv5 conv4 Fig. 5. Comparison of the interpretability of all five convolutional layers of AlexNet, as trained on classification tasks for Places (top) and ImageNet (bottom).Four examples of units in each layer are shown with identified semantics. The segmentation generated by each unit is shown on the three Broden images with highest activation. Top-scoring labels are shown above to the left, and human-annotated labels are shown above to the right. Some disagreement can be seen for the dominant judgment of meaning. For example, human annotators mark the first conv4 unit on Places as a โ€˜windowsโ€™ detector, while the algorithm matches the โ€˜chequeredโ€™ texture. Rotation of Representation 20 30 20 10 0 10 rotate 0.4 rotate 0.6 rotate 0.8 rotate 1 Fig. 6. Interpretability over changes in basis of the representation of AlexNet conv5 trained on Places. The vertical axis shows the number of unique interpretable concepts that match a unit in the representation. The horizontal axis shows ฮฑ, which quantifies the degree of rotation. Baseline (individual units) car (single unit 87) skyscraper (single unit 94) Rotate 1 (linear combinations) IoU 0.16 car (combination, closest to unit 173) IoU 0.16 skyscraper (combination, closest to unit 94) IoU 0.06 IoU 0.05 tree (single unit 228) IoU 0.10 tree (combination, closest to unit 228) IoU 0.02 head (single unit 3) IoU 0.09 head (combination, closest to unit 70) IoU 0.02 closet (single unit 107) IoU 0.06 closet (combination, closest to unit 34) IoU 0.02 random combination AlexNet on ImageNet object scene part material texture color 20 15 10 5 0 baseline random combination Fig. 8. Complete rotation (ฮฑ = 1) repeated on AlexNet trained on Places365 and ImageNet respectively. Rotation reduces the interpretability significantly for both of the networks. 350 Number of unique detectors rotate 0.2 baseline 25 300 250 200 object scene part material texture color 150 100 50 0 R es N en et se 15 N 2-P e R t16 lac es N 1- es D en et Pla 36 se 15 ce 5 N 2-I s3 et 16 ma 65 1 g VG -Im eNe G ag t -P eN la e VG ces t 20 G V G oo G 5 g G H G LeN -Pla ybr id oo c e gL t- es G eN Pla 36 oo e ce 5 gL t-P s3 eN la 65 et ces VG Ima 205 g Al ex G-I eN N ma et et - ge A Pla Ne Al lex ces t ex Ne 3 N t- 65 Al et-P Hyb ex rid l a N e ce Al t-Im s20 ex a 5 N ge et -ra Net nd om 0 baseline object scene part material texture color Number of unique detectors 30 AlexNet on Places365 40 Number of unique detectors object scene part material texture color D Number of unique detectors 40 Fig. 9. Interpretability across different architectures trained on ImageNet and Places. Fig. 7. Visualizations of the best single-unit concept detectors of five concepts taken from individual units of AlexNet conv5 trained on Places (left), compared with the best linear-combination detectors of the same concepts taken from the same representation under a random rotation (right). For most concepts, both the IoU and the visualization of the top activating image patches confirm that individual units match concepts better than linear combinations. In other cases, (e.g. head detectors) visualization of a linear combination appears highly consistent, but the IoU reveals lower consistency when evaluated over the whole dataset. GoogLeNet > AlexNet. Deeper architectures usually appear to allow greater interpretability, though individual layer structure is different across architecture. Comparing training datasets, we find Places > ImageNet. As discussed in [1], one scene is composed of multiple objects, so it may be beneficial for more object detectors to emerge in CNNs trained to recognize scenes. AlexNet VGG-16 GoogLeNet ResNet-152 DenseNet-161 bi ca cy r cl e po ol ca ai tab t rp le la ho ne us m e ot bu or s bi ke be to d ile s t ho ky rs w e at e do r si g bo nk ttl e se ch a ai bo r o co k st w ov ro e a bo tr d ok ack bu cas i m ld e o in tv unt g m ai on n ito tra r sn in ow bi sh rd e la lf sh mp w e in g ep do ra w ss p ba an e pa thtu in b tin g s cu of sh a sk cu ion ys rta cr in a pe pe rs r o ta n ce ble ilin se g pl at a fe nt w nc si ash e de e st wa r ai lk rw a ๏ฌ y ๏ฌ‚o eld w pl er at bo e a ch an tre t si de e gn li bo er ar d units Densenet (Imagenet) 26 13 Closet 57 objects do g ca t ca h ai ors r rp e la ne bu s bi rd b m t ed ot ra or in b bo ike tt to le i po wa let ol te ta r bl c e sh ow pe eep r b so m icy n ou cl nt e ho ain u gr se as ro s a pl d ba an th t tu b se bo a ok ch po a tte si ir n tv dpl k m an on t i si st tor w gn ov in b e do oa w rd pa n sh e sn elf ow ro c ๏ฌe k ta ld ce ble il ๏ฌ‚o ing w e tre r e te n s t sk fe ofa ys n cr ce a w pe as r he bo r bo pl at ok at si ca e de se w be p alk dc illo lo w th e ea s ra rth ilin g cu sea sh t io n pa l sa m n co ben d m ch pu t w la er ar m dr p ob e 86 43 62 objects units Resnetยญ152 (Imagenet) ca be r d ai bu rp s la w ne at po d er ol og ta bl e m ou ca t pa nta i in n ti gr ng as ro s a bo d o to k ce ile ilin t tra g in bi sk cy y c ho le sk h rse ys ou cr se ap po e tte so r dp fa la n si t n pl k an m bo t ot tt or le bi k bo e at pe tree rs on se a w tra at ck er fa la ll m p te n bi t rd se s at w tove as he si raili r de n w w st a g or ai lk k rw ch sur ay gr andface an e ds lier t cu and rta ch in ๏ฌ‚ ai w bu ow r in i er do ld in tv wpa g m n on e i br tor id bo ge ok ba ca ll s ea e r sh th el ca f sw s iv sno e el w ch sh air ee pa p l pi m t p ch gr illow o co un un d t t er ca able bi ne ๏ฌe t si cra ld be gnb dle o dc a lo rd th fe es nc e co w units Densenet (Places) 36 18 73 objects la n tra e in ca bu r b s ho ed us e c m d at ou o nt g a ho in r w se at gr er a bo ss ttl e tre bo e at bu sof ild a in to g il pl et an m ot bi t o po rb rd ol ike ta bl e sk y te nt se po a b tte o dp ok la fe nt bi nce cy pa c in le tin r g pe oad rs cu on rta in si sn nk ow ta bl e w b she in at l do ht f ch wp ub an an e s de sk tai lier ys rw cr ay ap st er ov ro e c tra k ck w ๏ฌeld si ash de e w r a ch lk a co ir w or ๏ฌ‚ ur k ow t su e w rfac r at e e br rfal id l be ge n sh ch ee tv rai p m lin on g i m tor irr bo p or ok alm ca se rp ai 37 19 61 objects units Resnetยญ152 (Places) 7 0 0 0 0 Fig. 10. Histogram of the object detectors from the ResNet and DenseNet trained on ImageNet and Places respectively. layer161 unit 1639 IoU=0.225 layer161 unit 2035 IoU=0.199 layer161 unit 1126 IoU=0.076 layer161 unit 1492 IoU=0.282 layer161 unit 1518 IoU=0.205 layer161 unit 1788 IoU=0.201 layer161 unit 2028 IoU=0.113 layer161 unit 1356 IoU=0.067 layer161 unit 1519 IoU=0.155 layer161 unit 1512 IoU=0.125 res5c unit 2011 IoU=0.171 res5c unit 1573 IoU=0.217 res5c unit 264 IoU=0.125 res5c unit 674 IoU=0.265 res5c unit 1243 IoU=0.172 res5c unit 9 IoU=0.161 res5c unit 1718 IoU=0.195 res5c unit 766 IoU=0.094 res5c unit 74 IoU=0.256 res5c unit 963 IoU=0.156 inception_5b unit 758 IoU=0.159 inception_4e unit 750 IoU=0.203 inception_4e unit 56 IoU=0.139 inception_4e unit 824 IoU=0.168 inception_4e unit 92 IoU=0.164 inception_5b unit 235 IoU=0.136 inception_4e unit 225 IoU=0.152 inception_4e unit 714 IoU=0.105 inception_5b unit 603 IoU=0.154 inception_4e unit 759 IoU=0.144 conv5_3 unit 213 IoU=0.125 conv5_3 unit 142 IoU=0.205 conv5_3 unit 85 IoU=0.086 conv5_3 unit 191 IoU=0.153 conv5_3 unit 151 IoU=0.150 conv5_3 unit 107 IoU=0.065 conv5_3 unit 491 IoU=0.112 conv4_3 unit 336 IoU=0.068 conv5_3 unit 20 IoU=0.149 conv5_3 unit 204 IoU=0.077 conv5 unit 235 IoU=0.017 conv5 unit 180 IoU=0.090 conv5 unit 55 IoU=0.087 conv5 unit 10 IoU=0.040 conv5 unit 13 IoU=0.101 conv3 unit 255 IoU=0.015 conv5 unit 250 IoU=0.051 conv5 unit 16 IoU=0.062 conv5 unit 174 IoU=0.029 conv5 unit 28 IoU=0.049 Dog Plant Bus Airplane Fig. 11. Comparison of several visual concept detectors identified by network dissection in DenseNet, ResNet, GoogLeNet, VGG, and AlexNet. Each network is trained on Places365. The two highest-IoU matches among convolutional units of each network is shown. The segmentation generated by each unit is shown on the four maximally activating Broden images. Some units activate on concept generalizations, e.g., GoogLeNet 4eโ€™s unit 225 on horses and dogs, and 759 on white ellipsoids and jets. 8 147 50 13 25 textures 1 color 39 textures 1 color 37 2 colors units airplane train car bus bed house cat dog mountain horse water grass bottle tree boat sofa building toilet plant bird motorbike pool table sky tent sea book pottedplant fence bicycle painting road person curtain sink snow table shelf bathtub windowpane chandelier stairway skyscraper stove rock track ๏ฌeld washer sidewalk chair court ๏ฌ‚ower work surface waterfall bridge bench sheep railing tvmonitor mirror palm bookcase highway closet nursery art gallery skyscraper corridor reception airport terminal cockpit shoe shop attic classroom lighthouse playground bakery-shop youth hostel dining room volleyball court-outdoor jacuzzi-indoor conference room sauna landing deck of๏ฌce mountain snowy auditorium alley castle bowling alley laundromat gas station windmill 160 scenes game room subway interior operating room playroom sandbox staircase pantry escalator-indoor ๏ฌre escape forest-broadleaf parking garage-indoor bathroom carrousel gymnasium-indoor 14 parts badlands cubicle-of๏ฌce cemetery butchers shop 4 materials rope bridge dinette-vehicle beauty salon amusement arcade forest-needleleaf street waiting room airplane cabin dolmen golf course bus interior corn ๏ฌeld ice skating rink-indoor beach poolroom-home elevator-door home theater greenhouse-indoor zen garden gazebo-exterior art studio park theater-indoor procenium martial arts gym coast ๏ฌeld-cultivated living room bullring slum balcony-interior television studio catwalk water tower ice cream parlor bank vault creek desert-sand 19 21 textures 139 10 textures 1 color Resnetยญ152 (Places) 0 9 5 0 1 object 1 scene 8 parts 1 material creek desert-sand vineyard supermarket kindergarden classroom locker room warehouse-indoor building facade bridge aqueduct pasture river 29 objects ๏ฌ‚orist shop-indoor waterfall-block car interior-backseat orchard boxing ring music studio crevasse ball pit amusement park archive galley cloister-indoor fountain hay๏ฌeld lobby topiary garden garage-indoor jewelry shop bar temple-east asia earth ๏ฌssure amphitheater home of๏ฌce desert-vegetation batters box parlor rubble shopfront clothing store kasbah kitchen junkyard bookstore shopping mall-indoor museum-indoor cavern-indoor swimming pool-outdoor natural history museum greenhouse-outdoor dam barn doorway-outdoor apartment building-outdoor medina ๏ฌeld-wild hot spring mountain campsite ballroom market-outdoor arrival gate-outdoor driveway inn-indoor excavation window seat construction site library-indoor clean room utility room hangar-indoor artists loft basketball court-outdoor football ๏ฌeld roundabout screen crosswalk body headboard wheel head hair roof shop window coach back pillow balcony torso monitor food tile carpet paper dotted 83 scenes cracked strati๏ฌed lined cobwebbed potholed 5 parts chequered 1 material spiralled ๏ฌ‚ecked interlaced zigzagged freckled polka-dotted veined frilly banded striped perforated grooved ๏ฌbrous grid lacelike scaly porous meshed swirly pleated gauzy 21 textures crystalline crosshatched matted paisley studded pitted bubbly sprinkled bumpy marbled braided red Resnetยญ152 continued ... units 17 objects 1 scene 44 14 Alexnet (Egomotion) 8 8 textures dog cat grass tree bicycle sea sky water road car painting windowpane mountain motorbike book sidewalk bus mountain snowy wheel hair head ear muzzle arm leg screen food zigzagged dotted chequered banded cobwebbed waf๏ฌ‚ed perforated striped polka-dotted frilly spiralled studded honeycombed grid meshed sprinkled veined porous cracked interlaced crosshatched red yellow 4 4 objects 1 scene 1 part 92 units 0 6 0 sky ceiling grass tree forest-broadleaf head banded lined dotted perforated grid chequered crosshatched spiralled 12 units bus airplane bed train pool table dog car horse house road boat motorbike tree grass water seat cat shelf ground sea skyscraper stove fence work surface toilet bottle sofa sink building cockpit conference room street closet poolroom-home classroom nursery ball pit highway corridor airport terminal attic bathroom castle art gallery alley dining room of๏ฌce kitchen bar mountain snowy living room staircase shoe shop skyscraper lighthouse water tower gazebo-exterior subway interior bowling alley 60 objects bakery-shop waiting room cathedral-indoor landing deck laundromat auditorium gas station crevasse ice skating rink-indoor windmill bus interior pantry greenhouse-indoor amphitheater supermarket casino-indoor utility room cloister-indoor building facade bookstore reception viaduct car interior-backseat rope bridge cubicle-of๏ฌce airplane cabin warehouse-indoor gymnasium-indoor bridge park sauna escalator-outdoor badlands pagoda waterfall-fan playroom galley waterfall-block lake-natural apartment building-outdoor jacuzzi-indoor campsite library-indoor kindergarden classroom artists loft bullring carrousel 47 scenes junkyard bow window-outdoor creek hay๏ฌeld ski slope mountain crosswalk screen head shop window coach food 12 parts potholed paisley 2 materials striped cobwebbed lined sprinkled interlaced studded banded dotted frilly strati๏ฌed spiralled woven grooved ๏ฌbrous meshed crystalline bumpy scaly braided 22 21 Alexnet (Imagenet) 0 72 13 textures Alexnet (Puzzle Solving) sky ball pit veined chequered meshed striped dotted perforated studded lacelike frilly cobwebbed red units 8 2 parts units airplane bus car road grass plant windowpane person bed train motorbike horse tree house water pool table table toilet boat mountain dog painting book curtain ๏ฌ‚ower building grandstand bridge railing swimming pool tent signboard chair work surface skyscraper bottle chandelier seat stove shelf track cabinet cushion 44 objects sofa snow waterfall pillow sink sea rock desk sidewalk plate palm ground sky 13 scenes swivel chair ๏ฌ‚oor fence ceiling ball pit skyscraper mountain snowy bakery-shop laundromat closet cockpit shoe shop corridor 13 parts conference room 1 material castle forest-needleleaf ๏ฌeld-cultivated windmill staircase classroom escalator-indoor playground pantry of๏ฌce bowling alley cemetery desert-sand highway street amusement park lighthouse creek nursery corn ๏ฌeld 20 textures wheat ๏ฌeld 1 colorshopping mall-indoor attic cavern-indoor youth hostel sandbox bar reception childs room casino-indoor bookstore pagoda gymnasium-indoor waterfall-fan slum art gallery butchers shop hair wheel drawer screen head crosswalk roof balcony seat cushion pot shop window hand carpet food chequered striped waf๏ฌ‚ed meshed paisley dotted banded swirly cracked strati๏ฌed lined polka-dotted perforated grid sprinkled lacelike ๏ฌbrous interlaced frilly spiralled potholed woven freckled studded veined red 4 9 5 0 5 objects 1 scene units car grass airplane mountain painting tree ceiling dog bus road pool table water horse skyscraper plant motorbike cat bed sea track sink ๏ฌeld stairway shelf work surface building house waterfall ground sidewalk book chair 32 objects sky windowpane ๏ฌ‚oor toilet person railing 6 scenes washer signboard table ๏ฌ‚ower chandelier bird 6 parts ball pit skyscraper 2 materials mountain snowy closet swimming pool-outdoor stadium-baseball coast corridor auditorium creek highway conference room jacuzzi-indoor hair head screen wheel roof headboard crosswalk seat cushion drawer leg arm body shop window food 25 textures chequered 1 color perforated striped grid spiralled dotted swirly lined meshed studded paisley banded polka-dotted cobwebbed grooved strati๏ฌed porous honeycombed woven interlaced red 0 units car tree grass sea mountain highway head hair banded lined chequered studded zigzagged striped perforated ๏ฌ‚ecked grid cracked meshed gauzy dotted units 10 35 Alexnet (Ambient Sound) Googlenet (Places) 5 7 colors VGGยญ16 (Places) 0 17 textures AlexNetยญGAPWide (Places) 6 5 scenes water grass tree car plant windowpane road mountain airplane skyscraper dog sea ceiling building person horse bed track book pool table cabinet chair painting waterfall sidewalk sink shelf sky house stove ๏ฌ‚oor bus mountain snowy ball pit pantry building facade skyscraper street hair wheel head screen crosswalk shop window food wood lined dotted banded studded grid honeycombed paisley zigzagged waf๏ฌ‚ed meshed cracked strati๏ฌed chequered perforated sprinkled potholed grooved pleated matted freckled swirly spiralled woven ๏ฌbrous cobwebbed red Alexnet (Places) 3 6 objects 0 20 grass road sky water tree dog ball pit forest-broadleaf mountain snowy building facade highway chequered lined banded porous lacelike veined grid frilly ๏ฌ‚ecked perforated cracked strati๏ฌed potholed freckled studded woven polka-dotted purple orange red yellow blue pink green 10 units 0 Fig. 12. Comparison of unique detectors of all types on a variety of architectures. More results are at the project page. Alexnet (Video Tracking) 61 objects 279 9 20 10 60 40 20 0 80 2 nv co 3 nv co 4 nv co nv co 5 nv co 3-3 co nv 4-3 co 5-1 nv -2 v5 n co 60 40 20 0 c e a 2 b b -s2 n-4 n-4 n-5 n-5 n-3 orm x7 tio tio tio tio tio 2-n ep ep ep ep ep nv inc inc inc inc inc co -3 v5 n co c ResNet152 on Places365 200 object scene part material texture color 100 0 1 nv co GoogLeNet on Places365 120 object scene part material texture color Number of unique detectors Number of unique detectors Number of unique detectors 30 VGG16 on Places365 80 object scene part material texture color Number of unique detectors AlexNet on Places365 40 object scene part material texture color 150 100 50 0 -1 BN -7 v1 on 16 -1 ise w Elt 8 -23 ise 8 5 e-3 wis Elt w Elt 8 7 e-4 wis Elt Elt 10 e-5 wis 10 5 0 80 1 10 0 2 nv co 3 nv co 4 nv co nv co 5 nv co 3-3 co nv 4-3 co 5-1 nv - v5 n co object scene part material texture color 2 -3 40 scene part material texture color 80 60 colorization tracking 0.091 dotted (texture) 40 10 0.140 chequered (texture) 0.167 20 0.063 perforated (texture) 0.085 head (part) 0 a e c 2 2 b b 7-s n-5 n-4 n-4 n-5 n-3 orm tio tio tio tio tio -7x 2-n ep ep ep ep ep v1 nv n inc inc inc inc inc co co head (part) 0.061 sky (object) 0.056 grass (object) 0 -1 16 BN 0.069 sky (object) Elt e-1 wis 8 Elt 3 e-2 wis 0.120 58 78 10 e-3 e-4 e-5 wis wis wis Elt Elt Elt 0.048 red-c (color) 0.100 20 la c et es -Im 36 ag 5 eN e t ob rac t je kin ct ce g nt r tra ic ns in v au di o m co ovi n lo riz g at io n p cr os uz sc zle ha eg nn om el ot io co n nt f r e a Al ex me xt or N e co t-r der nt an ex do te m nc od er et -P N N ex Fig. 15. The top ranked concepts in the three top categories in four selfsupervised networks. Some object and part detectors emerge in audio. Detectors for person heads also appear in puzzle and colorization. A variety of texture concepts dominate models with self-supervised training. Al ex Al puzzle 20 car (object) v5 n co scene part material texture color chequered (texture) 0.102 head (part) 0 Fig. 14. Semantic detectors emerge across different supervision of the primary training task. All these models use the AlexNet architecture and are tested at conv5. Fig. 10 shows the histogram of object detectors identified inside ResNet and DenseNet trained on ImageNet and Places respectively. DenseNet161-Places365 has the largest number of unique object detectors among all the networks. The emergent detectors differ across both training data source and architecture. The most frequent object detectors in the two networks trained on ImageNet are dog detectors, because there are more than 100 dog categories out of the 1000 classes in the ImageNet training set. Fig. 11 shows the examples of object detectors grouped by object categories. For the same object category, the visual appearance of the unit as detector varies not only within the same network but also across different networks. DenseNet and ResNet has such good detectors for bus and airplane with IoU > 0.25. Fig. 12 showcases the unique interpretable units of all types on a variety of networks. Fig. 13 shows the unique interpretable detectors over different layers for different network architectures trained on Places365. We observe that more object and scene detectors emerge at the higher layers across all architectures: AlexNet, VGG, GoogLeNet, and ResNet. This suggests that representation ability increases over layer depth. Because of the compositional structure of the CNN layers, the deeper layers should have higher capacity to represent concepts with larger visual complexity such as objects and scene parts. Our measurements confirm this, and we conclude that higher network depth encourages the emergence of visual concepts with higher semantic complexity. 3.4 40 audio 30 20 60 nv co 30 50 Number of unique detectors 100 scene part material texture color 40 Number of unique detectors 15 Number of unique detectors scene part material texture color 20 Number of unique detectors Number of unique detectors AlexNet on ImageNet VGG16 on ImageNet GoogLeNet on ImageNet ResNet152 on ImageNet Fig. and ResNet152 trained on Places365. All five conv layers of 25 13. Comparison of interpretability of 50 the layers for AlexNet, VGG16, GoogLeNet, 100 60 object the selected layers of VGG, GoogLeNet, object object object AlexNet and and ResNet are included. CNNs to predict the neighborhoods of two image patches, while [28] trains networks by colorizing images. Totally we investigate 12 networks trained for different self-supervised learning tasks. How do different supervisions affect those internal representations? Here we compare the interpretability of the deep visual representations resulting from self-supervised learning and supervised learning. We keep the network architecture the same as AlexNet for each model (one exception is the recent model transinv which uses VGG as the base network). Results are shown in Fig. 14. We observe that training on Places365 creates the largest number of unique detectors. Self-supervised models create many texture detectors but relatively few object detectors; apparently, supervision from a self-taught primary task is much weaker at inferring interpretable concepts than supervised training on a large annotated dataset. The form of self-supervision makes a difference: for example, the colorization model is trained on colorless images, and almost no color detection units emerge. We hypothesize that emergent units represent concepts required to solve the primary task. Fig. 15 shows some typical visual detectors identified in the self-supervised CNN models. For the models audio and puzzle, some object and part detectors emerge. Those detectors may be useful for CNNs to solve the primary tasks: the audio model is trained to associate objects with a sound source, so it may be useful to recognize people and cars; while the puzzle model is trained to align the different parts of objects and scenes in an image. For colorization and tracking, recognizing textures might be good enough for the CNN to solve primary tasks such as colorizing a desaturated natural image; thus it is unsurprising that the texture detectors dominate. Representations from Self-supervised Learning Recently many work have explored a novel paradigm for unsupervised learning of CNNs without using millions of annotated images, namely self-supervised learning. For example, [23] trains deep 3.5 Representations from Captioning Images To further compare the representations from supervised learning and self-supervised learning, we train a CNN from scratch using 10 COCO captioning dataset: AlexNet on Places205 Number of unique detectors Train from Scratch 40 30 20 object scene part material texture color 10 0 10 0 10 2 10 4 10 6 10 4 10 6 Validation accuracy 0.6 Fig. 16. Example images in the COCO captioning dataset, the CNN+LSTM image captioning model, and the network dissection result. Training ResNet18 from scratch using the supervision from captioning images leads to a lot of emergent object detectors. Number of unique detectors 100 object scene part material texture color 80 60 200 Number of detectors object scene part material texture color 150 100 0.4 0.2 0 10 0 10 2 Training iteration Fig. 18. The evolution of the interpretability of conv5 of Places205AlexNet over 3,000,000 training iterations. The accuracy on the validation at each iteration is also plotted. The baseline model is trained to 300,000 iterations (marked at the red line). 40 50 20 0 ba se lin re e pe at re 1 pe at re 2 pe N oD at3 ro Ba po u tc hN t or m ba se lin e re pe at 1 re pe at 2 re pe a N oD t3 ro Ba pou t tc hN or m 0 Fig. 17. Effect of regularizations on the interpretability of CNNs. the supervision of captioning images, which generates natural language sentence to describe the image contents. Specially we use the image captioning data from COCO dataset [50], where the images in COCO dataset are annotated with five image captions. Then we train a CNN plus LSTM as the image captioning model similar to [51]. Features of ResNet18 are used as input to the LSTM for generating image captions. The CNN+LSTM architecture and the network dissection results on the last convolutional layer of the ResNet18 are shown in Fig.16. We can see that many object detectors emerge in the CNN, and conclude that supervision from natural language captions contains high-level semantics to train the CNN. 3.6 Training Conditions Training conditions such as the number of training iterations, dropout [6], batch normalization [7], and random initialization [21], are known to affect the representation learning of neural networks. To analyze the effect of training conditions on interpretability, we take the Places205-AlexNet as the baseline model and prepare several variants of it, all using the same AlexNet architecture. For the variants Repeat1, Repeat2 and Repeat3, we randomly initialize the weights and train them with the same number of iterations. For the variant NoDropout, we remove the dropout in the FC layers of the baseline model. For the variant BatchNorm, we apply batch normalization at each convolutional layer of the baseline model. Repeat1, Repeat2, Repeat3 all have nearly the same top-1 accuracy 50.0% on the validation set. The variant without dropout has top-1 accuracy 49.2%. The variant with batch norm has top-1 accuracy 50.5%. Fig. 17 shows the interpretability of units in the CNNs over different training conditions. We find several effects: 1) Comparing different random initializations, the models converge to similar levels of interpretability, both in terms of the unique detector number and the total detector number; this matches observations of convergent learning discussed in [21]. 2) For the network without dropout, more texture detectors emerge but fewer object detectors. 3) Batch normalization seems to decrease interpretability significantly. The batch normalization result serves as a caution that discriminative power is not the only property of a representation that should be measured. Our intuition for the loss of interpretability under batch normalization is that the batch normalization โ€˜whitensโ€™ the activation at each layer, which smooths out scaling issues and allows a network to easily rotate axes of intermediate representations during training. While whitening apparently speeds training, it may also have an effect similar to random rotations analyzed in Sec. 3.2 which destroy interpretability. As discussed in Sec. 3.2, however, interpretability is neither a prerequisite nor an obstacle to discriminative power. Finding ways to capture the benefits of batch normalization without destroying interpretability is an important area for future work. Fig. 18 plots the interpretability of snapshots of the baseline model at different training iterations along with the accuracy on the validation set. We can see that object detectors and part detectors begin emerging at about 10,000 iterations (each iteration processes a batch of 256 images). We do not find evidence of transitions across different concept categories during training. For example, units in conv5 do not turn into texture or material detectors before becoming object or part detectors. In Fig. 19, we keep track of six units over different training iteration. We observe that some units start converging to the semantic concept at early stage. For example, unit138 starts detecting mountain snowy as early as at iteration 2446. We also observe that units evolve over time: unit74 and unit108 detect road first before they start detecting car and airplane respectively. 11 Fig. 19. The interpretations of units change over iterations. Each row shows the interpretation of one unit. Fine-tuning a pre-trained network to a target domain is commonly used in transfer learning. The deep features from the pre-trained network show good generalization across different domains. The pre-trained network also makes the training converge faster and results in better accuracy, especially if there is not enough training data at the target domain. Here we analyze what happens inside the representation and how the interpretation of the internal units evolve during the transfer learning. We run two sets of experiments: fine-tuning Places-AlexNet to ImageNet and fine-tuning ImageNet-AlexNet to Places. We want to see how individual units mutate across domains. The interpretability results of the model checkpoints at different fine-tuning iteration are plotted in Fig. 20. We can see that the training indeed converges faster compared to the network trained from scratch on Places in Fig. 18. The interpretations of the units also change over finetuning. For example, the number of unique object detectors first drop then keep increasing for the network trained on ImageNet being fine-tuned to Places365, while it is slowly dropping for the network trained on Places being fine-tuned to ImageNet. Fig. 21 shows some examples of the individual unit evolution happening in the network trained from ImageNet to Places365 and the network trained from Places365 to ImageNet. For each network, we show six units with their interpretation at the beginning of finetuning and at the end of fine-tuning. For example, in the network fine-tuned from ImageNet to Places365, unit15 which detects the white dogs first, mutates to detect waterfall; unit136 and unit144 which detect dogs first, mutate to detect horse and cow respectively, as a lot of scene categories in Places such as pasture and corral contain such animals. On the other hand, in the network fine-tuned from Places365 to ImageNet, a lot of units mutate to various kinds of dog detectors. Interestingly though those units mutate to detect different concepts, those concepts share low-level similarity such as colors and textures. In Fig. 22, we zoom into two units from each of the two finetuning processes and plot the history of concept evolution. We can see that some units switch its top ranked label several times before converging to some concept: unit15 in the fine-tuning of ImageNet to Places365 flipped to white, crystalline, before reaches the waterfall concept. On the other hand, some units switch faster, for example unit132 in the fine-tuning of Places365 to ImageNet switches from hair to dog at early stage of fine-tuning. 3.8 Layer Width vs. Interpretability From AlexNet to ResNet, CNNs for visual recognition have grown deeper in the quest for higher classification accuracy. Depth has been shown to be important to high discrimination ability, and we have seen in Sec. 3.3 that interpretability can increase with depth as well. However, the width of layers (the number of units per Number of unique detectors Transfer Learning between Places and ImageNet Validation accuracy 3.7 Places365 to ImageNet 50 ImageNet to Places365 40 object scene part material 30 texture color 40 30 20 20 10 10 0 10 0 10 2 10 4 10 6 0 10 0 0.6 0.6 0.4 0.4 0.2 0.2 0 0 10 10 2 10 4 10 6 10 2 0 0 10 10 Training iteration 2 10 4 10 4 10 6 10 6 Training iteration Fig. 20. a) Fine-tune AlexNet from ImageNet to Places365. b) Fine-tune AlexNet from Places365 to ImageNet. ImageNet to Places365 Before After Places365 to ImageNet Before After Fig. 21. Units mutate from a) the network fine-tuned from ImageNet to Places365 and b) the network fine-tuned from Places365 to ImageNet. Six units are shown with their semantics at the beginning of the finetuning and at the end of the fine-tuning. layer) has been less explored. One reason is that increasing the number of convolutional units in a layer significantly increases computational cost while yielding only marginal improvements in classification accuracy. Nevertheless, some recent work [52] shows that a carefully designed wide residual network can achieve classification accuracy superior to the commonly used thin and deep counterparts. To explore how the width of layers affects interpretability of CNNs, we do a preliminary experiment to test how width affects emergence of interpretable detectors. We remove the FC layers of the AlexNet, then triple the number of units at the conv5, i.e., from 256 units to 768 units, as AlexNet-GAP-Wide. We further triple the number of units for all the previous conv layers except conv1 for the standard AlexNet, as AlexNet-GAP-WideAll. Finally we put a global average pooling layer after conv5 and fully connect the 12 ImageNet to Places365 before before after unit15 after unit100 Places365 to ImageNet after before before after unit132 unit31 Fig. 22. The history of one unit mutation during the fine-tuning from ImageNet to Places365 (top) and Places365 to ImageNet (low). Number of unique detectors 140 object scene part material texture color 120 100 80 60 40 3.10 20 AlexNet AlexNet-GAP-Wide nv 1 nv 2 co nv 3 co nv 4 co nv 5 co co v3 nv 4 co nv 5 co v2 co n v1 co n co n co co nv 1 nv 2 co nv 3 co nv 4 co nv 5 0 AlexNet-GAP-WideAll Fig. 23. Comparison of the standard AlexNet, AlexNet-GAP-Wide, and AlexNet-GAP-WideAll. Widening the layer brings the emergence of more detectors. Networks are trained on Places365. pooled 768-feature activations to the final class prediction. After training on Places365, the AlexNet-GAP-Wide and the AlexNet-GAP-WideAll obtain similar classification accuracy on the validation set as the standard AlexNet (โˆผ 0.5% top1 accuracy lower and higher), but it has many more emergent unique concept detectors at conv5 for AlexNet-GAP-Wide and at all the conv layers for AlexNet-GAL-WideAll, as shown in Fig. 23. We have also increased the number of units to 1024 and 2048 at conv5, but the number of unique concepts does not significantly increase further. This may indicate a limit on the capacity of AlexNet to separate explanatory factors; or it may indicate that a limit on the number of disentangled concepts that are helpful to solve the primary task of scene classification. 3.9 the performance on the test split. We compute the classification accuracy averaged across classes. We include the event8 [53], action40 [54], indoor67 [55], sun397 [56], caltech101 [57], and caltech256 [58]. The classification accuracies on six image datasets using the deep features are plotted in Fig. 24. We can see that the deep features from supervised trained networks perform much better than the ones from the self-supervised trained networks. Networks trained on Places have better features for scene-centric datasets such as sun397 and indoor67, while networks trained on ImageNet have better features for object-centric datasets such as caltech101 and action40. Fig. 25 plots the number of the unique object detectors for each representation over that representationโ€™s classification accuracy on three selected datasets. We can see there is positive correlation between them. Thus the supervision tasks that encourage the emergence of more concept detectors may also improve the discrimination ability of deep features. Interestingly, on some of the object centric dataset, the best discriminative representation is the representation from ResNet152-ImageNet, which has fewer unique object detectors compared to the ResNet152-Places365. We hypothesize that the accuracy on a representation when applied to a task is dependent not only on the number of concept detectors in the representation, but on how well the concept detectors captures the characteristics of the hidden factors in the transferred dataset. Discrimination vs. Interpretability Activations from the higher layers of pre-trained CNNs are often used as generic visual features (noted as deep features), generalizing very well to other image datasets [16], [43]. It is interesting to bridge the generalization of the deep visual representation as generic visual features with their interpretability. Here we first benchmark the deep features from several networks on six image classification datasets for their discriminative power. For each network, we feed in the images and extract the activation at the last convolutional layer as the visual feature, then train a linear SVM with C = 0.001 on the train split and evaluate Explaining the Predictions for the Deep Features After we interpret the units inside the deep visual representation, we show that the unit activation along with the interpreted label can be used to explain the prediction given by the deep features. Previous work [59] uses the weighted sum of the unit activation maps to highlight which image regions are most informative to the prediction, here we further decouple at individual unit level to segment the informative image regions. We first plot the Class-specific units. After the linear SVM is trained, we can rank the elements of the feature according to their SVM weights to obtain the elements of the deep features which contribute most to that class. Those elements are units that act as explanatory factors, and we call those top ranked units associated with each output class class-specific units. Fig. 27 shows the classspecific units of ResNet152-ImageNet and ResNet152-Places365 for one class from action40 and sun397 respectively. For example, for the Walking the dog class from action40, the top three classspecific units from ResNet152-ImageNet are two dog detection unit and one person detection unit; for the Picnic area class from sun397, the top three class-specific units from ResNet152-Places365 are plant detection unit, grass detection unit, and fence detection unit. The intuitive match between visual detectors and the classes they explain suggests that visual detectors from CNNs behave as the bag-of-semantic-words visual features. We further use the individual units identified as concept detectors to build an explanation of the individual image prediction given by a classifier. The procedure is as follows: Given any image, let the unit activation of the deep feature (for ResNet the GAP activation) be [x1 , x2 , ..., xN ], where each xn represents the value summed up from the activation map P of unit n. Let the top predictionโ€™s SVM response be s = n wn xn , where [w1 , w2 , ..., wN ] is the SVMโ€™s learned weight. We get the top ranked units in Figure 26 by ranking [w1 x1 , w2 x2 , ..., wN xN ], which are the unit activations weighted by the SVM weight for the event8 0.973 0.966 0.963 0.955 0.946 0.933 0.928 0.927 0.923 0.920 0.918 0.916 0.904 0.904 0.897 0.875 0.852 0.838 0.836 0.829 0.825 0.806 0.782 0.739 0.688 0.621 0.551 0.5 0.766 0.748 0.708 0.691 0.691 0.674 0.563 0.555 0.555 0.527 0.527 0.520 0.498 0.492 0.485 0.484 0.353 0.351 0.347 0.346 0.329 0.299 0.271 0.241 0.208 0.187 0.177 1 Accuracy Accuracy 1 13 action40 0.8 0.6 0.4 0.2 0 R es R Net es 1 N 52 e R es t50 Ima -Im g N e et 15 VG ag Ne e t 2 VG -P G-H Ne G la t o G og VG G-I ce ybr oo Le G m s3 id gL N -P ag 65 e l e Al ex eNe t-Imace Ne N V t-P a s3 t et G l ge 6 -P G ac N 5 Al la -P e e ex ce la s3 t N s3 ce 65 e G Al Al t-P 65- s20 oo ex ex la G 5 gL N Ne ce AP s e Al Al eN t-I t-H 20 ex ex et ma yb 5 N N -P g rid et et la eN -P -P ce e la la s2 t ce ce 0 s2 s3 5 05 65 -B co cr lo au N os riz d sc at io ha ion tr nn ob ack el je co ing ct nt ce ex n t eg p tric om uz ot zle Al ex fra m ion N m ov et eo in -ra rd g nd er om R es R Ne G esNt15 o 2 R og et5 -Im es Le 0 a N N -Im ge et et a N 15 -I g e 2- ma eN t Pl ge e t a VG VG ce Ne s t G VG - G-H 36 G 5 oo G Im y gL VG -P ag bri eN G la eN d G et -Places et oo gL Ale -Pl ce 20 a A A eN xN ce s3 5 Al lex lex et- et- s3 65 ex Ne N Pl Hy 65 N t-P et- ac br et l Im es id Al Pla ace ag 205 e c s e Al xN es 20 Ne ex et 36 5- t N -P 5- BN et la G -P ce A la s3 P ce 6 s 5 co co 20 lo n 5 riz te cr at xt os io sc au n ha di tra nn o c el ob je p king c u eg tce zzl n e Al ex om tric N m oti et o - o n fra ran vin m do g eo m rd er 0 indoor67 0.4 Accuracy 0.6 1 0.8 0.6 0.4 0.2 0.2 0 0 R es R Net e 1 G 15 oo sNe 52 Accuracy gL t5 -Im VG2-P eN 0-I ag l G ac G et ma eN -P es oo -Im g e R e t es G gL VG VGlac 36 oo e G G es 5 VG VG ag Ne N 0.690 et G G eN t R gL Ne -P -H 36 es e t- la y 5 Al 15 -I -H e 0.666 N P b ex 2- m y t Al ReNet et- lacces rid N Pl ag bri 0.657 ex s 15 P e 20 e a Al Al t-Im ce eN d N Ne 2- lac s3 5 0.655 ex ex a s3 et et t5 Im e 65 A -P 0 a s2 A N le le e Ne ge 65 0.649 G la -Im ge 05 xN xN t-P t-H Ne Al oog V ces ag Ne 0.629 et et la yb t ex L GG 36 e t -P -P ce ri 0.605 N eN - 5- Ne la la s3 d e I ce ce 6 0.597 Al t-P et-I ma GA t s2 s2 5 ex la m ge P 05 05 a 0.515 Al N ce g N A e ex et s2 eN t co co -BN l e 0.513 N P 05 e xN cr lo n et la - t et VG os riz tex 0.513 Al Al -P ce BN -P G sc at t ex ex la s2 la -P ha ion 0.472 N Ne ce 05 ce la n et t- s3 0.460 s3 ce ne -Im H 6 VG 65 s3 l ag ybr 5 G 0.454 -G 65 oo eN id cr G A gL 0.447 os co e eN Pla puz P sc nt t G 0.381 c ha ex es zle e oo t t n 20 P gL Number of unique nobject detectors 0.287 e eN lac au 5 co tra aud l 0.271 es di et lo ck io -P tr 36 o 0.268 r i ob lacack 5 ob izat ng 0.250 je es ing je p ion ct 2 ct u 0.250 ce 05 c z Al ego ent zle n 0.208 ex m ric eg mo tric o A N m ti om vi 0.188 l f et e r xN am o ng -ra ov on 0.160 fra n in et eo tion -ra rd m do g 0.142 eo m nd er rd 0.105 om er 0.102 R es R es G N o e R Ne G ogL t15 oo e 2 G es t15 oo Ne 2 Accuracy gL Ne -Pl gL t5 Im eN t-P ac eN 0- ag e l es I et ma eN VG t-P ace 36 R 5 l g e I m es eN t VGG- aces20 a V 0.827 V N G G g e R G Pla s365 e e t -P ce 5 R esN 0.809 Al t15 G- G-H Ne Al es e V la s ex 2- Im y t ex N t5 G ce 20 0.782 N Pl ag br N et1 0- G s3 5 et 5 Im -H 6 Al et-I ace eN id 0.766 - 2 m e e y 5 s3 t Al x a V G Pla -Im age bri 0.754 N g 65 ex G o e e N V G t- N Al og V ces ag Ne d 0.732 et G -P H e G ex L G 36 eN t t Gunique la yb object N eN -I 5- e Number detectors 0.585 Al -Plof e t e ac -P ce rid Al t-P et-I ma GA 0.571 G Al xN es lac s36 e l m g P oo ex et 36 es 5 Al xN ace ag eN Al g N -P 5 2 0.519 ex et s2 eN et e L e l - 0 N -P 05 e 0.515 G xN eN t-P ace GA 5 e la t oo et et la s P Al Al t-P ce -BN 0.494 gL -P -P ce 20 ex ex lac s2 eN lac lac s3 5 0.493 N Ne es 05 et t- 3 et es2 es3 65 -Im H 6 -P 0 6 0.489 la 5- 5 a yb 5 ce B 0.483 cr geNrid cr s2 N os co e 0.476 os co 0 sc nt t 5 co sch nte 0.433 ha ex lo an xt nn t co 0.387 riz n lo au el at el riz d 0.380 io a n a tr ti io tr u 0.377 ob ack on ob ack dio 0.343 je p ing je p ing c u c u 0.322 eg tce zzl eg tce zz om ntr e om ntr le 0.319 ic ic A Al o 0.255 le fra m otio ex fra m tio xN m o n N m ov n 0.229 et eo vin et eo in -ra rd g -ra rd g 0.221 nd er nd er om om 0.190 0.148 Accuracy 1 0.8 0.827 0.797 0.792 0.788 0.785 0.768 0.756 0.750 0.674 0.672 0.664 0.615 0.607 0.580 0.574 0.510 0.430 0.424 0.402 0.392 0.362 0.339 0.335 0.285 0.259 0.206 0.178 0.934 0.926 0.919 0.918 0.889 0.862 0.861 0.854 0.798 0.785 0.750 0.743 0.737 0.728 0.713 0.704 0.678 0.669 0.650 0.649 0.622 0.576 0.546 0.517 0.511 0.466 0.343 caltech101 sun397 caltech256 0.8 1 0.8 0.6 0.6 0.4 80 0 60 AlexNet-Places365-GAP et 20 frameorder AlexNet-random 0.6 0.7 0.8 0.9 VGG-Places365 VGG-Hybrid AlexNet-Places365 AlexNet-Places205 0 objectcentric tracking puzzle moving audio crosschannel frameorder context 0 egomotion colorization AlexNet-random 0.1 ResNet152-Places365 0.2 0.3 0.4 0.5 0.6 60 40 20 VGG-Hybrid AlexNet-Places365-GAP AlexNet-Places365 AlexNet-Hybrid VGG-Places205 VGG-Places365 VGG-ImageNet GoogLeNet-Places365 GoogLeNet-Places205 GoogLeNet-ImageNet AlexNet-Places205 AlexNet-ImageNet audio tracking moving crosschannel colorization frameorder puzzle context 0 AlexNet-random egomotion 0 0.2 0.4 0.6 objectcentric AlexNet-Places205-BN Accuracy on indoor67 0.8 1 0.7 0 0.3 0.8 ResNet50-ImageNet 60 VGG-ImageNet GoogLeNet-Places365 GoogLeNet-Places205 GoogLeNet-ImageNet AlexNet-Places205 AlexNet-Places365-GAP AlexNet-Places365 40 AlexNet-Hybrid AlexNet-ImageNet objectcentric tracking puzzle moving audio crosschannel frameorder context 0 AlexNet-random egomotion colorization 20 0 0.1 0.2 0.3 0.4 Accuracy on sun397 AlexNet-Places205-BN 0.5 0.6 VGG-Hybrid VGG-ImageNet AlexNet-Places365-GAP GoogLeNet-ImageNet AlexNet-Places365 AlexNet-Places205 AlexNet-Hybrid AlexNet-Places205-BN objectcentric tracking audio puzzle crosschannel context egomotion colorization frameorder AlexNet-ImageNet moving 0.4 0.5 0.6 0.7 0.8 Accuracy on caltech101 100 ResNet152-ImageNet VGG-Places205 VGG-Hybrid VGG-Places365 80 ResNet50-ImageNet ResNet152-ImageNet GoogLeNet-Places365 GoogLeNet-Places205 20 ResNet152-Places365 100 Number of unique object detectors Number of unique object detectors 80 ResNet152-ImageNet ResNet50-ImageNet 40 AlexNet-random Fig. 24. The classification accuracy datasets. Accuracy on event8 of deep features on the six image Accuracy on action40 100 60 AlexNet-Places205-BN AlexNet-ImageNet 20 ResNet152-Places365 VGG-Places205 80 VGG-Places365 GoogLeNet-Places365 VGG-ImageNet GoogLeNet-Places205 GoogLeNet-ImageNet AlexNet-Hybrid AlexNet-Places365-GAP 40 1 ResNet152-ImageNet VGG-Places205 VGG-ImageNet GoogLeNet-ImageNet AlexNet-Places365 AlexNet-Places205 AlexNet-Hybrid AlexNet-Places205-BN AlexNet-ImageNet objectcentric tracking moving puzzle audio crosschannel colorization egomotion context 100 ResNet152-Places365 0.2ResNet50-ImageNet 60 GoogLeNet-Places365 GoogLeNet-Places205 40 0 0.5 0.4 100 ResNet50-ImageNet VGG-Places205 ResNet152-ImageNet 80 VGG-Hybrid VGG-Places365 es N Number of unique object detectors R 0.2 Number of unique object detectors ResNet152-Places365 100 VGG-Places205 80 VGG-Places365 40 20 0.7 1 ResNet152-Places365 ResNet50-ImageNet 60 0.9 VGG-ImageNet AlexNet-Places365-GAP GoogLeNet-Places205 AlexNet-Places365 AlexNet-Places205 AlexNet-Places205-BN ResNet152-ImageNet VGG-Hybrid GoogLeNet-Places365 GoogLeNet-ImageNet AlexNet-Hybrid objectcentric AlexNet-ImageNet tracking moving audio crosschannel frameorder context puzzle 0 egomotion colorization 0 AlexNet-random 0.2 0.4 0.6 0.8 Accuracy on caltech256 1 Fig. 25. The number of unique object detectors in the last convolutional layer compared to each representations classification accuracy on three datasets. Supervised (in red) and unsupervised (in green) representations clearly form two clusters. top predicted class. Then we simply upsample the activation map of the top ranked unit to segment the image. Image segmentations using individual unit activation are plotted in Fig. 26a. The unit segmentation explain the prediction explicitly. For example, the prediction for the first image is Gardening, and the explanatory units detect plant, grass, person, flower, and pot. The prediction for the second image is Riding a horse, the explanatory units detect horse, fence and dog. We also plot some incorrectly predicted samples in Figure 26b. The segmentation gives the intuition as to why the classifier made mistakes. For example, for the first image the classifier predicts cutting vegetables rather than the true label gardening, because the second unit incorrectly considers the ground as table. 4 C ONCLUSION Network Dissection translates qualitative visualizations of representation units into quantitative interpretations and measurements of interpretability. We have found that the units of a deep representation are significantly more interpretable than expected for a basis of the representation space. We have investigated the interpretability of deep visual representations resulting from different architectures, training supervisions, and training conditions. Furthermore, we have shown that interpretability of deep visual representations is 14 relevant to the power of the representation as a generalizable visual feature. We conclude that interpretability is an important property of deep neural networks that provides new insights into their hierarchical structure. Our work motivates future work towards building more interpretable and explainable AI systems. ACKNOWLEDGMENTS This work was partially funded by DARPA XAI program to A.T.; This work was also partly supported by the National Science Foundation under Grants No. 1524817 to A.T., and No. 1532591 to A.T. and A.O.; the Vannevar Bush Faculty Fellowship program sponsored by the Basic Research Office of the Assistant Secretary of Defense for Research and Engineering and funded by the Office of Naval Research through grant N00014-16-1-3116 to A.O.; the MIT Big Data Initiative at CSAIL, the Toyota Research Institute MIT CSAIL Joint Research Center, Google and Amazon Awards, and a hardware donation from NVIDIA Corporation. B.Z. is supported by a Facebook Fellowship. R EFERENCES B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, and A. Torralba, โ€œObject detectors emerge in deep scene cnns,โ€ International Conference on Learning Representations, 2015. [2] A. Gonzalez-Garcia, D. Modolo, and V. Ferrari, โ€œDo semantic parts emerge in convolutional neural networks?โ€ arXiv:1607.03738, 2016. [3] C. Vondrick, H. Pirsiavash, and A. Torralba, โ€œGenerating videos with scene dynamics,โ€ arXiv:1609.02612, 2016. [4] Y. Bengio, A. Courville, and P. Vincent, โ€œRepresentation learning: A review and new perspectives,โ€ IEEE transactions on pattern analysis and machine intelligence, vol. 35, no. 8, pp. 1798โ€“1828, 2013. [5] D. Bau, B. Zhou, A. Khosla, A. Oliva, and A. Torralba, โ€œNetwork dissection: Quantifying interpretability of deep visual representations,โ€ in Proc. CVPR, 2017. [6] N. Srivastava, G. E. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, โ€œDropout: a simple way to prevent neural networks from overfitting.โ€ Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929โ€“1958, 2014. [7] S. Ioffe and C. Szegedy, โ€œBatch normalization: Accelerating deep network training by reducing internal covariate shift,โ€ arXiv:1502.03167, 2015. [8] M. D. Zeiler and R. Fergus, โ€œVisualizing and understanding convolutional networks,โ€ Proc. ECCV, 2014. [9] R. Girshick, J. Donahue, T. Darrell, and J. Malik, โ€œRegion-based convolutional networks for accurate object detection and segmentation,โ€ IEEE transactions on pattern analysis and machine intelligence, 2016. [10] A. Mahendran and A. Vedaldi, โ€œUnderstanding deep image representations by inverting them,โ€ Proc. CVPR, 2015. [1] [11] K. Simonyan, A. Vedaldi, and A. Zisserman, โ€œDeep inside convolutional networks: Visualising image classification models and saliency maps,โ€ International Conference on Learning Representations Workshop, 2014. [12] A. Mahendran and A. Vedaldi, โ€œUnderstanding deep image representations by inverting them,โ€ in Proc. CVPR, 2015. [13] A. Dosovitskiy and T. Brox, โ€œGenerating images with perceptual similarity metrics based on deep networks,โ€ in Advances in Neural Information Processing Systems, 2016, pp. 658โ€“666. [14] A. Nguyen, A. Dosovitskiy, J. Yosinski, T. Brox, and J. Clune, โ€œSynthesizing the preferred inputs for neurons in neural networks via deep generator networks,โ€ In Advances in Neural Information Processing Systems, 2016. [15] K. He, X. Zhang, S. Ren, and J. Sun, โ€œDeep residual learning for image recognition,โ€ in Proc. CVPR, 2016. [16] A. S. Razavian, H. Azizpour, J. Sullivan, and S. Carlsson, โ€œCnn features off-the-shelf: an astounding baseline for recognition,โ€ arXiv:1403.6382, 2014. [17] P. Agrawal, R. Girshick, and J. Malik, โ€œAnalyzing the performance of multilayer neural networks for object recognition,โ€ Proc. ECCV, 2014. [18] J. Yosinski, J. Clune, Y. Bengio, and H. Lipson, โ€œHow transferable are features in deep neural networks?โ€ In Advances in Neural Information Processing Systems, 2014. [19] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, โ€œIntriguing properties of neural networks,โ€ arXiv:1312.6199, 2013. [20] A. Nguyen, J. Yosinski, and J. Clune, โ€œDeep neural networks are easily fooled: High confidence predictions for unrecognizable images,โ€ in Proc. CVPR, 2015. [21] Y. Li, J. Yosinski, J. Clune, H. Lipson, and J. Hopcroft, โ€œConvergent learning: Do different neural networks learn the same representations?โ€ arXiv:1511.07543, 2015. [22] C. Zhang, S. Bengio, M. Hardt, B. Recht, and O. Vinyals, โ€œUnderstanding deep learning requires rethinking generalization,โ€ International Conference on Learning Representations, 2017. [23] C. Doersch, A. Gupta, and A. A. Efros, โ€œUnsupervised visual representation learning by context prediction,โ€ in Proc. CVPR, 2015. [24] M. Noroozi and P. Favaro, โ€œUnsupervised learning of visual representations by solving jigsaw puzzles,โ€ in Proc. ECCV, 2016. [25] D. Jayaraman and K. Grauman, โ€œLearning image representations tied to ego-motion,โ€ in Proc. ICCV, 2015. [26] P. Agrawal, J. Carreira, and J. Malik, โ€œLearning to see by moving,โ€ in Proc. ICCV, 2015. [27] X. Wang and A. Gupta, โ€œUnsupervised learning of visual representations using videos,โ€ in Proc. CVPR, 2015. [28] R. Zhang, P. Isola, and A. A. Efros, โ€œColorful image colorization,โ€ in Proc. ECCV. Springer, 2016. [29] โ€”โ€”, โ€œSplit-brain autoencoders: Unsupervised learning by cross-channel prediction,โ€ in Proc. CVPR, 2017. [30] A. Owens, J. Wu, J. H. McDermott, W. T. Freeman, and A. Torralba, โ€œAmbient sound provides supervision for visual learning,โ€ in Proc. ECCV, 2016. [31] R. Q. Quiroga, L. Reddy, G. Kreiman, C. Koch, and I. Fried, โ€œInvariant visual representation by single neurons in the human brain,โ€ Nature, vol. 435, no. 7045, pp. 1102โ€“1107, 2005. a) b) Correct label: gardening Correct label: brushing Fig. 26. Segmenting images using top activated units weighted by the class label from ResNet152-Places365 deep feature. a) the correctly predicted samples. b) the incorrectly predicted samples. 15 Images from Walking the dog (action40) ResNet152-ImageNet ResNet152-Places365 Images from Picnic area (sun397) ResNet152-ImageNet ResNet152-Places365 Fig. 27. Class-specific units from ResNet152-ImageNet and ResNet152Places365 on one class from action40 and sun397. For each class, we show three sample images, followed by the top 3 units from ResNet152ImageNet and ResNet152-Places365 ranked by the class weight of linear SVM to predict that class. SVM weight, detected concept name and the IoU score are shown above each unit. [32] B. Zhou, H. Zhao, X. Puig, S. Fidler, A. Barriuso, and A. Torralba, โ€œScene parsing through ade20k dataset,โ€ Proc. CVPR, 2017. [33] S. Bell, K. Bala, and N. Snavely, โ€œIntrinsic images in the wild,โ€ ACM Trans. on Graphics (SIGGRAPH), 2014. [34] R. Mottaghi, X. Chen, X. Liu, N.-G. Cho, S.-W. Lee, S. Fidler, R. Urtasun, and A. Yuille, โ€œThe role of context for object detection and semantic segmentation in the wild,โ€ in Proc. CVPR, 2014. [35] X. Chen, R. Mottaghi, X. Liu, S. Fidler, R. Urtasun, and A. Yuille, โ€œDetect what you can: Detecting and representing objects using holistic models and body parts,โ€ in Proc. CVPR, 2014. [36] M. Cimpoi, S. Maji, I. Kokkinos, S. Mohamed, and A. Vedaldi, โ€œDescribing textures in the wild,โ€ in Proc. CVPR, 2014. [37] J. Van De Weijer, C. Schmid, J. Verbeek, and D. Larlus, โ€œLearning color names for real-world applications,โ€ IEEE Transactions on Image Processing, vol. 18, no. 7, pp. 1512โ€“1523, 2009. [38] A. Krizhevsky, I. Sutskever, and G. E. Hinton, โ€œImagenet classification with deep convolutional neural networks,โ€ in Advances in neural information processing systems, 2012, pp. 1097โ€“1105. [39] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, โ€œGoing deeper with convolutions,โ€ in Proc. CVPR, 2015. [40] K. Simonyan and A. Zisserman, โ€œVery deep convolutional networks for large-scale image recognition,โ€ arXiv:1409.1556, 2014. [41] G. Huang, Z. Liu, K. Q. Weinberger, and L. van der Maaten, โ€œDensely connected convolutional networks,โ€ Proc. CVPR, 2017. [42] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein et al., โ€œImagenet large scale visual recognition challenge,โ€ Intโ€™l Journal of Computer Vision, 2015. [43] B. Zhou, A. Lapedriza, J. Xiao, A. Torralba, and A. Oliva, โ€œLearning deep features for scene recognition using places database,โ€ In Advances in Neural Information Processing Systems, 2014. [44] B. Zhou, A. Lapedriza, A. Khosla, A. Oliva, and A. Torralba, โ€œPlaces: A 10 million image database for scene recognition,โ€ IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017. [45] I. Mikjjsra, C. L. Zitnick, and M. Hebert, โ€œShuffle and learn: unsupervised learning using temporal order verification,โ€ in Proc. ECCV, 2016. [46] R. Gao, D. Jayaraman, and K. Grauman, โ€œObject-centric representation learning from unlabeled videos,โ€ arXiv:1612.00500, 2016. [47] D. Pathak, P. Krahenbuhl, J. Donahue, T. Darrell, and A. A. Efros, โ€œContext encoders: Feature learning by inpainting,โ€ in Proc. CVPR, 2016. [48] X. Wang, K. He, and A. Gupta, โ€œTransitive invariance for self-supervised visual representation learning,โ€ arXiv preprint arXiv:1708.02901, 2017. [49] P. Diaconis, โ€œWhat is a random matrix?โ€ Notices of the AMS, vol. 52, no. 11, pp. 1348โ€“1349, 2005. [50] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollaฬr, and C. L. Zitnick, โ€œMicrosoft coco: Common objects in context,โ€ in European conference on computer vision. Springer, 2014, pp. 740โ€“755. [51] O. Vinyals, A. Toshev, S. Bengio, and D. Erhan, โ€œShow and tell: A neural image caption generator,โ€ in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 3156โ€“3164. [52] S. Zagoruyko and N. Komodakis, โ€œWide residual networks,โ€ arXiv:1605.07146, 2016. [53] L.-J. Li and L. Fei-Fei, โ€œWhat, where and who? classifying events by scene and object recognition,โ€ in Proc. ICCV, 2007. [54] B. Yao, X. Jiang, A. Khosla, A. L. Lin, L. Guibas, and L. Fei-Fei, โ€œHuman action recognition by learning bases of action attributes and parts,โ€ in Proc. ICCV, 2011. [55] A. Quattoni and A. Torralba, โ€œRecognizing indoor scenes,โ€ in Proc. CVPR, 2009. [56] J. Xiao, J. Hays, K. A. Ehinger, A. Oliva, and A. Torralba, โ€œSun database: Large-scale scene recognition from abbey to zoo,โ€ in Proc. CVPR, 2010. [57] L. Fei-Fei, R. Fergus, and P. Perona, โ€œLearning generative visual models from few training examples: An incremental bayesian approach tested on 101 object categories,โ€ Computer Vision and Image Understanding, 2007. [58] G. Griffin, A. Holub, and P. Perona, โ€œCaltech-256 object category dataset,โ€ 2007. [59] B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, and A. Torralba, โ€œLearning deep features for discriminative localization,โ€ in Proc. CVPR, 2016. Bolei Zhou is a Ph.D. Candidate in Computer Science and Artificial Intelligence Lab (CSAIL) at the Massachusetts Institute of Technology. He received M.Phil. degree in Information Engineering from the Chinese University of Hong Kong and B.Eng. degree in Biomedical Engineering from Shanghai Jiao Tong University in 2010. His research interests are computer vision and machine learning. He is an award recipient of Facebook Fellowship, Microsoft Research Asia Fellowship, and MIT Greater China Fellowship. David Bau is a PhD student at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). He received an A.B. in Mathematics from Harvard in 1992 and an M.S. in Computer Science from Cornell in 1994. He coauthored a textbook on numerical linear algebra. He was a software engineer at Microsoft and Google and developed ranking algorithms for Google Image Search. His research interest is interpretable machine learning. Aude Oliva is a Principal Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). After a French baccalaureate in Physics and Mathematics, she received two M.Sc. degrees and a Ph.D in Cognitive Science from the Institut National Polytechnique of Grenoble, France. She joined the MIT faculty in the Department of Brain and Cognitive Sciences in 2004 and CSAIL in 2012. Her research on vision and memory is cross-disciplinary, spanning human perception and cognition, computer vision, and human neuroscience. She received the 2006 National Science Foundation (NSF) Career award, the 2014 Guggenheim and the 2016 Vannevar Bush fellowships. Antonio Torralba received the degree in telecommunications engineering from Telecom BCN, Spain, in 1994 and the Ph.D. degree in signal, image, and speech processing from the Institut National Polytechnique de Grenoble, France, in 2000. From 2000 to 2005, he spent postdoctoral training at the Brain and Cognitive Science Department and the Computer Science and Artificial Intelligence Laboratory, MIT. He is now a Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (MIT). Prof. Torralba is an Associate Editor of the International Journal in Computer Vision, and has served as program chair for the Computer Vision and Pattern Recognition conference in 2015. He received the 2008 National Science Foundation (NSF) Career award, the best student paper award at the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) in 2009, and the 2010 J. K. Aggarwal Prize from the International Association for Pattern Recognition (IAPR).
1cs.CV
Semantic Photometric Bundle Adjustment on Natural Sequences Rui Zhu, Chaoyang Wang, Chen-Hsuan Lin, Ziyan Wang, Simon Lucey The Robotics Institute, Carnegie Mellon University arXiv:1712.00110v1 [cs.CV] 30 Nov 2017 {rz1, chaoyanw, chenhsul, ziyanw1}@andrew.cmu.edu, [email protected] Abstract The problem of obtaining dense reconstruction of an object in a natural sequence of images has been long studied in computer vision. Classically this problem has been solved through the application of bundle adjustment (BA). More recently, excellent results have been attained through the application of photometric bundle adjustment (PBA) methods โ€“ which directly minimize the photometric error across frames. A fundamental drawback to BA & PBA, however, is: (i) their reliance on having to view all points on the object, and (ii) for the object surface to be well textured. To circumvent these limitations we propose semantic PBA which incorporates a 3D object prior, obtained through deep learning, within the photometric bundle adjustment problem. We demonstrate state of the art performance in comparison to leading methods for object reconstruction across numerous natural sequences. Figure 1: Overview of the proposed method for semantic object-centric photometric bundle adjustment. Given a sequence of images with small motion (top row), we recover a full 3D dense shape of the object, as well as the camera poses w.r.t. the global coordinate system (middle row). Our method enables reprojection to the image plane with the estimated cameras (bottom row) to optimize for the photometric consistency as well as silhouette and depth constraints. 1. Introduction In this paper we are primarily concerned with the goal of obtaining dense 3D object reconstructions from short natural image sequences. One obvious strategy is to employ classical bundle adjustment (BA) [18] across the sequence where we can simultaneously recover camera pose and 3D points. Although reliable, this strategy is problematic as it: (i) can only recover 3D points if they are observed in the image sequence, and (ii) the density of the reconstruction is dependent on how textured the surface of the object is across the image sequence. Recently, photometric extensions to bundle adjustment have been proposed [1, 4] that directly minimize the photometric consistency between frames with respect to pose and 3D points. Borrowing upon the terminology of [1] we shall refer to these methods collectively herein as photometric bundle adjustment (PBA). PBA has recently proved advantageous over classical BA for problems where dense reconstructions are required due to their ability directly minimize for photometric consistency. Even with these recent innovations PBA is still, however, fundamentally limited in performance by (i) and (ii). There have been numerous efforts within the computer vision community to bring semantic prior into the task of object/scene 3D reconstruction. Convolutional Neural Networks (CNN) are proving remarkably useful for this task when one is provided with scene [17, 24] or object category [25, 7] specific labels & priors. A powerful characteristic of these semantic CNN methods is their ability to circumvent the fundamental limitations of (i) and (ii). For example, [25, 7, 21, 6] offer strategies for inferring a dense 3D reconstruction of an object from a single image even when a substantial portion of the projected 3D points are self-occluded. More recently, semantic CNN strategies have been proposed that attempt to incorporate multiple frames [3, 9]. Most of these previous efforts have been 1 trying to attack the problem of 3D reconstruction as a supervised learning problem โ€“ where geometry is largely treated as a label to be predicted. Although attractive in its simplicity this strategy has some inherent drawbacks. First, these geometric labels can be problematic to obtain โ€“ hand labeling can be error prone, and rendering can lack the necessary realism. Second, the predicted labels from these network models do not adhere to geometric constraints โ€“ such as photometric consistency โ€“ making the results unreliable. Recently, the application of geometric constraints within the offline CNN learning process has been entertained including reprojected silhouette matching [22, 25], depth matching [14], and even photometric consistency [19, 13, 12]. A fundamental problem with these emerging methods, however, is that the geometric constraints are not enforced at test time โ€“ dramatically reducing their effectiveness. Given these concerns, we argue that instead of incorporating geometric constraints into semantic CNN strategies offline, one should instead incorporate object semantics within the PBA pipeline. As we demonstrate in Fig. 1 and our results section this strategy gives the best of both worlds โ€“ semantic knowledge of the object with photometric consistency. In this paper, we propose an enhanced semantic PBA method which works on natural sequences as the classic PBA does, and give extensive evaluations on both synthetic and natural sequence domains. We summarize our contributions as follows: โ€ข We provide the first approach of its kind (to our knowledge) for semantic object-centric PBA on natural sequences โ€“ which gives the global 6DoF camera poses of each frame and the dense 3D shape, with PBA-like accuracy but denser depth maps. โ€ข We systematically evaluate the local optimality of our proposed optimization pipeline, as well as our enhanced objective which takes use of classic PBA results as off-the-shelf initialization or regularizer in our method. โ€ข We collect a new dataset for the task of object-centric shape reconstruction, consisting of rendered sequences of full ground truth in cameras, depth maps, and the shape in canonical pose, as well as natural sequences annotated with ShapeNet [2] models, making the dataset feasible for evaluating both PBA methods with camera estimations [11, 8], and methods which only recover aligned shapes or depth maps [20, 13, 9] by end-to-end learning on ShapeNet . 1.1. Related Work Photometric Bundle Adjustment: Photometric bundle adjustment (PBA) which is an optimization based method sitting entirely upon the visual cue of photometric consistency across all input frames [5, 15, 1, 11]. In PBA the shape is recovered by jointly optimizing for depth maps corresponding to the visible pixels in template frames [5, 15, 1], as well as camera motion. As a result the formulation of classic PBA is solely to recover the geometry of the scene, completely agnostic to semantics of the scene/object. Some works in PBA aims for small motion videos in particular [11, 10]. Shape Reconstructing with Deep Learning: As previously mentioned, early deep learning methods [7, 21, 6, 3, 9] solve the task of object-centric (object shape only) reconstruction with supervision from shape labels. Recently, an emerging school of thought seeks to bring in geometry back to the task, including reprojected silhouette matching [22, 25], depth matching [14], and even photometric consistency [19, 13, 12]. One issue of most of these methods is they assume known cameras, in global frame. This is in fact a too strong assumption to hold for natural sequences where global camera poses are not readily availabe. While some others do not account for camera motion at all [20, 3], which creates a gap from classic PBA where camera motions are instead the direct output. Semantic PBA: Recent work of Zhu et al. [26] also proposed to apply shape priors within PBA for 3D object reconstruction. In spite of the similarity in the formulation of the problem, Zhu et al.โ€™s approach was problematic in a number of ways. First, the performance of Zhu et al. relies heavily on the initialization point given by CNN pose/style predictors trained predominantly on rendered images, which is suspicious for its reliability on natural sequences. Instead, we utilize a more reliable source โ€“ relative camera pose from PBA for initialization. Second, due to the limitations of the method, such as weak perspective camera model assumption and unreliable initialization source, Zhu et al.โ€™s evaluation was restricted to rendered sequence. Thus they did not conduct quantitative comparisons between actual PBA methods [11, 8] w.r.t. camera pose error or depth error on real world sequences; while we give an extensive evaluation of our method on real sequences. Third, Zhu et al. did not give a proper analysis of the characteristics of their objective function, which results in using inadequate optimization techniques for their approach; In this paper, through inspecting the property of different cost functions, we propose a more robust and efficient optimization pipeline. Notation: Vectors are represented with lower-case bold font (e.g. a). Matrices are in upper-case bold (e.g. M) while scalars are lower-cased (e.g. a). Italicized upper-cased characters represent sets (e.g. S ). To denote the lth sample in a set (e.g. images, shapes), we use subscript (e.g. Ml ). Calligraphic symbols (e.g. ฯ€) denote functions. Images are defined as sampling function over the pixel coordinates, i.e. I(u) : R2 โ†’ R3 . Generator Offline PBA Pipeline & Initializers Camera Camera Pipeline of our approach Our camera model Figure 2: (Left) Pipeline of the optimization. Given an input sequence, we first run it through offline PBA pipeline to provide rough estimation for the depth maps as future depth map constraint, and camera motion as initialization to our camera motion parameters. Our style & pose initializer is also called to initialize the global pose of the template frame, as well as the style vector. Starting from the initialization, we optimize all variables until convergence through PBA-like pipeline with combined objective from photometric consistency Lph , silhouette matching error Lcd and inverse depth error Linvd . (Right) The perspective camera model. We adopt the camera model in BlenderTM by centering the object in the world frame, and positioning the camera with identity pose (in grey) along the Z axis, looking at the origin point. We show in this figure camera transformation from the identity camera can be parameterized with exponential twist โˆ†ฯ‰ (solid blue arrow) and translation โˆ†t (red arrows) w.r.t. the camera local axes. 2. Approach M 2.1. Preliminary Camera model We assume a perspective camera with known intrinsics K. The camera extrinsics are parameterized as concatenation of exponential coordinates (also known as twist) of rotation and translation vector: p = [ฯ‰; t] โˆˆ R6 . The camera projection function is written as ฯ€(x; p) = K(R(ฯ‰)x + t). (1) Given a short window of L frames as in PBA [11, 1], we define the first frame as the target frame (frame 0), and the subsequent L โˆ’ 1 frames as source frames. The relative camera pose between the target frame and source frame is denoted as โˆ†pl = [โˆ†ฯ‰l ; โˆ†tl ]. The global pose is thus computed as a composing of relative pose of the source frame and the global pose of the target frame: pl = [โˆ†ฯ‰l โ—ฆ ฯ‰0 ; โˆ†tl + t0 ]. (2) We define the pose composition rule as: R(โˆ†ฯ‰ โ—ฆ ฯ‰) = R(โˆ†ฯ‰)R(ฯ‰), โˆ†t โ—ฆ t = โˆ†t + t. (3) The reprojection of one point x onto frame l with the corresponding global pose is framed as sampling the image with reprojected pixel location Il (ฯ€(xj ; pl )). Reprojection with pseudo-raytracing Reprojection from a point set X given camera pose p can be viewed as first reasoning the visible part of the point set with a masking p function Xp := M(X; p) where Xp = {xj }j=1 . The mask function is implemented as pseudo-raytracing [14] by projecting the points to a enlarged inverse depth plane by a factor U , and then perform max pooling in a neighbourhood of U ร— U to figure out the visible point with biggest inverse depth. By doing so the mask function gives both the indices of the Mp visible points, and an inverse depth map. 2.2. Overview Our method takes in a RGB sequence taken by a calibrated camera moving around an object. The category(e.g. cars, airplanes, chairs) of the object is assumed to be known, and we have a rich repository of aligned CAD models (e.g. ShapeNet [2]) for this category. We define the world coordinate system as one attached to the objects as chosen by the CAD dataset, and the calibrated perspective camera model is parametrized by full 6DoF rotation and translation (see Fig.2). The goal of our method is to recover the full 3D shape of the object in the world frame, as well as the 6DoF parameters of the camera pose of each frame. We adopt the category-specific shape prior from Zhu et.al [26] to learn a shape space from the repository of ShapeNet [2] CAD models. We use dense point cloud as the shape parameterization in our work, considering learning shape space of point clouds has been made possible by several works [6, 16, 26]. The shape prior is a learned categoryspecific point cloud generator, written as a function of a style vector s โˆˆ RS which represents the sub-category object style. The output of the shape prior is the set of gener- ated points defined as X := {xi }N i=1 = G(s). For the 6DoF poses of the total L frames, we break the pose parameters into two sets: the global camera pose of the target frame p0 โˆˆ R6 , and the relative camera pose between each source Lโˆ’1 frame and the corresponding target frame {โˆ†pl โˆˆ R6 }l=1 . The overall pipeline of our method is illustrated in Fig. 2. We formulate the inference of the style vector and camera pose parameters as optimization steps with geometric objectives. The parameters are initialized with an off-theshelf initialization pipeline (see 2.4), and the optimization steps are taken to minimize this objective over the parameter space. In this paper, we propose to take advantage of the cheap and rough outputs from other methods to regularize our optimization procedure. For each frame, we get cheap segmentation masks (silhouettes) from recent state-of-theart instance segmentation method FCIS [23]. Considering traditional PBA methods gives as results semi-dense inverse depth and camera motion, we also borrow the readily available although error-prone outputs from PBA pipelines (e.g. openMVS [8]) to add another inverse depth loss with the estimated depth. We also take advantage of their camera motion estimation to initialize the relative camera pose of each source frame w.r.t. its target frame. 2.3. Optimization Objective Photometric Consistency The basic objective is formulated as the photometric consistency between the corresponding pixel pairs from the target frame and each source frame. Classic PBA methods usually track a set of sparse points through all the frames in a window, while with our formulation we are able to get dense correspondence automatically derived from reprojection. Considering that visible points may differ in each frame due to camera motion and occlusion, in this work we formulate the bi-directional photometric consistency as: Lph (p0 , {โˆ†pl }Lโˆ’1 (4) l=1 , s) = " Mp Lโˆ’1  X X0   Lฮด1 I0 ฯ€(xj ; p0 ) โˆ’ Il ฯ€(xj ; p0 โ—ฆ โˆ†pl ) l=1 Mpl + X k=1 j=1   Lฮด1 Il ฯ€(xk ; p0 โ—ฆ โˆ†pl ) โˆ’ I0 ฯ€(xk ; p0 )  # where Lฮด (ยท) is the Huber loss. Silhouette Error and Inverse Depth Error as Extra Constraints In Zhu et al. [26] the silhouette error is utilized as an extra constraint in the objective. We adopt the same objective but with the estimated silhouette with FCIS [23] that produce instance segmentation. We will show later that this constraint is still effective although the masks are errorprone. We write the silhouette distance for frame l as the 2D Chamfer distance between the set of pixel locations Ul1 in- side the rough silhouette, and the ones projected down from our camera model Ul2 . Lโˆ’1 Lcd (p0 , {โˆ†pl }l=1 , s) = Lโˆ’1 1 X X min ||uk โˆ’ uj ||22 uj โˆˆUl2 L uk โˆˆUl1 l=0  X min ||uj โˆ’ uk ||22 . + uj โˆˆUl2 (5) uk โˆˆUl1 Finally, apart from cheap camera motion, we are able to get semi-dense depth map for each frame from the off-theshelf PBA pipeline. In this case we further formulate the extra objective term of inverse depth error as: Lโˆ’1 Linvd (p0 , {โˆ†pl }l=1 , s) = Lโˆ’1 1 X Lฮด2 (dโ€ฒ l โˆ’ ฮฑdl ) L (6) l=0 where dl is given by our reprojection module. Note that ฮฑ here should be updated on the fly. Considering we will be getting confident camera poses for all frames in a few optimization steps, ฮฑ can be robustly solved by finding a scale that best aligns the estimated camera poses with the ones from the offline estimator. Specifically, we can solve for an ฮฑl for each source frame l: ๏ฃฑ   ๏ฃฒR0 (ฯ‰0 )x + t0 = ฮฑl Rโ€ฒ 0 x + tโ€ฒ 0   (7) ๏ฃณRl (ฯ‰l )x + tl = ฮฑl Rโ€ฒ l x + tโ€ฒ l . Lโˆ’1 The solution for ฮฑ is average over all {ฮฑl }l=1 : ฮฑ= Lโˆ’1 1 X arg min ||Rl (ฯ‰l )x + tl ฮฑ Lโˆ’1 (8) l=1 T โˆ’ Rโ€ฒ l RT0 (R0 (ฯ‰0 )x + t0 ) โˆ’ ฮฑ(tโ€ฒ l โˆ’ Rโ€ฒ l Rโ€ฒ 0 tโ€ฒ 0 )||22 . The combined objective is given by: L = Lph + ฮป1 Lcd + ฮป2 Linvd , (9) where ablative study about the weight factors ฮป1 and ฮป2 is included the Appendix. 2.4. Initialization Style and Pose Initialization We improve upon existing learning-based pipeline to provide initialization for style and template frame camera pose. For style, unlike [25, 26] where a single-image based regressor is adopted, we use a recurrent network architecture to leverage the sequential information in an effort to alleviate ambiguity in style from a single viewpoint. Details about the architecture of our regressor and the training process as well as dataset are included in the Appendix. To generate more accurate style available to give an accurate estimation of the scale factor ฮฑ. Instead we seek to bring the estimation of ฮฑ in the loop by aligning the estimated inverse map dโ€ฒ 0 to our reprojected inverse depth d0 : arg min ||dโ€ฒ 0 โˆ’ ฮฑd0 ||22 . ฮฑ (11) The camera motion is then initialized by solving: ๏ฃฑ   ๏ฃฒR0 (ฯ‰0 )x + t0 = ฮฑ Rโ€ฒ 0 x + tโ€ฒ 0   ๏ฃณโˆ†Rl (โˆ†ฯ‰l )R0 (ฯ‰0 )x + โˆ†tl + t0 = ฮฑ Rโ€ฒ l x + tโ€ฒ l (12) where the solution for โˆ†ฯ‰l and โˆ†tl is: Figure 3: Local cost surface of p0 and โˆ†pl . The yellow dot marks the optimum while the yellow line shows the search space for p0 if โˆ†pl is initialized with offline camera motion. vectors, we exploit cheap silhouette from Li et al. [23] to mask off the background. To find a coarse pose initialization, we first utilize BlenderTM to render templates under varying camera poses. After that we retrieve a coarse pose by finding one template which has the maximum IoU with the target silhouette. Camera Motion Initialization One observation of ours is, the photometric consistency error is problematic in our optimization of the objective. On the one hand Lph is locally bi-linear with Gauss-Newton solvers, where in traditional PBA the template term is fixed so that the residual is linear and the problem is locally convex. The problem is worsened in the way the variables are initialized as in Zhu et al. [26], Lโˆ’1 where {โˆ†pl }l=1 are initialized to all zeros when we have a poorly-initialized p0 . To illustrate this we show in Fig. 3 by plotting the cost surface over local perturbation of p0 and โˆ†pl . We show that the cost surface is highly non-convex between the initialization and the optimum if both variables are initialized far from the ground truth (red arrows). However we show with the camera motion parameters initialized correctly, the search space of p0 is constrained to the yellow line with better curvature for better convergence (green arrows). Inspired by this observation, at the beginning of our pipeline we run an off-the-shelf PBA pipeline (e.g. [8]) to Lโˆ’1 acquire camera poses {pโ€ฒl }l=0 for every frame, as well as a semi-dense point cloud X โ€ฒ . By formulation we have the following relation between our camera model (left) and the off-the-shelf estimator (right):   Rl (ฯ‰l )x + tl = ฮฑ Rโ€ฒl (ฯ‰lโ€ฒ )xโ€ฒ + tโ€ฒ l . (10) Unfortunately no correspondence between x and xโ€ฒ is ( T โˆ†Rl (โˆ†ฯ‰l ) = Rโ€ฒ l Rโ€ฒ 0   T T โˆ†tl = Rโ€ฒ l Rโ€ฒ 0 t0 + ฮฑ tโ€ฒ 1 โˆ’ Rโ€ฒ l Rโ€ฒ 0 tโ€ฒ 0 . (13) We use Equ. 13 for initializing the camera motion parameters before the optimization steps. 2.5. Optimization Pipeline Given reasonable initialization from the above steps, we solve our objective with gradient-descent based methods. Particularly we found off-the-shelf L-BFGS solver gives efficient solution to our problem. We summarize our optimization pipeline in Algorithm 1. Algorithm 1 Optimization of the objective 1: 2: 3: 4: 5: 6: 7: 8: 9: Lโˆ’1 procedure L(p0 , {โˆ†pl }l=1 , s) p0 , s โ† Initializer(I0 ) Lโˆ’1 Lโˆ’1 ฮฑ, {โˆ†pl }l=1 , {dโ€ฒ l }l=0 โ† openMVS [8], Equ. 13 while L > ฮดL or step < maximum iterations do p0 โ† L-BFGS update on p0 Lโˆ’1 Lโˆ’1 {โˆ†pl }l=1 โ† L-BFGS update on {โˆ†pl }l=1 s โ† L-BFGS update on s ฮฑ โ† Update on ฮฑ by Equ. 8 Lโˆ’1 return {p0 , {โˆ†pl }l=1 , s} 3. Evaluation 3.1. Data Preparation Rendered Data To enable evaluation of our methods against Zhu et al. [26] which is only feasible on rendered domain, we follow Zhu et al. by rendering small baseline sequences from ShapeNet [2] cars. Please refer to Appendix for the statistics which is inherently identical to Zhu et al. apart from our perspective camera versus weak-perspective by Zhu et al. GT point frame 16 cloud frame 1 frame 2 frame 1 pred seg init โ€ฆ โ€ฆ โ€ฆ Figure 4: (Left) Examples of our test sequences. We show on the left three examples of rendered sequence, natural sequence of model car and real car respectively. (Right) Visualization of style & pose initialization. We also show some quantitative results on style and pose initialization for some natural sequences. The three columns on the right correspond to the first frame of a sequence, foreground segmentation of that first frame, and style & pose initialization viewed in rendered image, respectively. Natural Data In view of the absence of object-centric and category-specific natural video dataset, we collect our own test set with a mixture of sequences from toy model cars and real cars. We carefully choose the models with ground truth CAD available in ShapeNet [2]. Each video is shot with iPhone 6s (30fps) with around 30 โ—ฆ of rotational motion and moderate translation, and the images are scaled down to 512 ร— 512. There are 15 videos collected from 4 toy car models and 12 videos from 6 real cars for evaluation. For each sequence, we annotate the template frame and last frame with ground truth CAD models and 6DoF pose. Samples of our test data can be found in Fig. 4. We also visualize some qualitative results of our initialization on natural sequences in Fig. 4. Although the style retrieved from regressor is not very precise in color or details, our style regressor is able to yield style prediction that are close in 3D shape. 3.2. Evaluation on Rendered Sequences In this section, we give both qualitative and quantitative results of our methods against 1) classic PBA methods of open-source openMVS [8], and Ham et al. [11] which is a PBA pipeline specifically optimized for small motion videos, 2) learning based methods [6, 3] which gives shapes in canonical poses. In our experiments, we set the weights in the optimization objective as ฮป1 = 0.1 with ฮด1 = 100 (we use unnormalized RGB values in range [0, 255]), and ฮป1 = 1000 with ฮด2 = 10. Ablative study on different settings of the hyper-parameters is included in the Appendix. Since we are evaluating on synthetic sequences from BlenderTM , we have access to full ground truth for both the camera pose of every frame (in world coordinate system), as well as the ground truth dense depth map and dense shape. However given our formulation is to output full 3D shape in an object-centric manner, while openMVS and Ham et al. give semi-dense point cloud of the entire scene by best effort, we are not able to align three outputs to the ground truth shape. Instead we choose to follow Ham et al. [11] to measure the depth error of the recovered points by reprojecting the shape onto the image plane with the estimated cameras. To compare with openMVS [8] and Ham et al. [11] which give only relative camera motion of every source frames w.r.t. to the first frame, we offer ground truth camera pose of the first frame to these two methods and find a rigid-body transformation to align their camera pose of the first frame to the ground truth. The scale ambiguity is solved by Equ.8. By doing this, the shape and camera poses of all methods are ideally aligned to the world coordinate system, and we are able to measure the camera error by calculating the camera position error as the distance of the estimated camera center to its ground truth, and the camera orientation error as the acute angle between the estimated camera orientation and its ground truth. We report the average error of depth maps and camera poses in Table 1 and the statistics in Fig. 6. The results show that our method achieves comparable camera error as openMVS [8], but slightly worse than Ham et al. [11] which is specifically optimized for small motion videos for better camera tracking. For the depth map error we achieve SLAM-like performance by outperforming both openMVS [8] and Ham et al. [11] in addition to much denser results thanks to the shape prior which produces full 3D shapes. Moreover, again thanks to the shape prior, we show in Fig. 7 that we only need a few observations of the object to give confident results, even at two frames, while classic methods [8, 11] start at considerable amount of motion to perform camera tracking. Finally we experiment on all the rendered sequences by perturbing upon their ground truth p0 and calculate the average p0 at convergence. We show in Fig. 8 that our method achieves better convergence in face of large initialization error in pose. 3.3. Evaluation on Natural Sequences We evaluate our methods against others on the objectcentric dataset we collected. The dataset includes sequences of a mixture of toy cars and real cars. The sequences are annotated with aligned CAD models retrieved from the ShapeNet dataset [2]. Considering it is not possible to get the 6DoF camera poses for all frames through human annotation, we evaluate on the depth error of the annotated first frame of each sequence, as well as the density of the reprojected points against the ground truth. The quantitative frame L-1 frame 0 frame L-1 frame 0 frame L-1 โ€“ โ€“ frame 0 frame L-1 โ€“ โ€“ [3, 6] Ham et al. [11] openMVS [8] Ours Input frame 0 Figure 5: Results of our methods on natural sequences, and comparison with openMVS [8], Ham et al. [11], and deep learning based methods [3, 6]. For openMVS [8] and Ham et al. [11] we align the cameras to the world coordinate frame (note that our method automatically produces camera poses in world frame), and we draw the aligned shape, estimated camera trajectory (blue) with orientation (red), annotated camera (black) of two frames (marked with black dot). We also project the shape with the estimated camera, and color the reprojected points with their inverse depths (brighter is closer). In the last row we show for each sample results from 3D-R2N2 [3] (left) and Fan et al. [6] (right). results are reported in Table 1. We also show qualitative results on 4 natural sequences (2 model cars plus 2 real cars) in Fig. 5. Each sequence consists of L = 91 frames with roughly 30 degree of camera rotation and moderate translation. We show that we achieve comparable camera poses and denser inverse depths against openMVS [8] and Ham et al. [11]. Additionally ours recovers semantic information including full 3D shape detached from the map, and again global cameras. For sequence 3 and 4 Ham et al. [11] gives degraded solution when it fails at camera tracking or deification due to little motion in frame 3 or significant lighting change in sequence 4. We attempt to give part of its results Zhu et al. Ham et al. openMVS Ours Depth Error 0.0732 0.0682 0.0731 0.0627 Density 0.8543 0.4732 0.5862 0.9342 Rendered Sequences Cam. Location Error 0.0134 0.0045 0.0098 0.0102 Cam. Orientation Error 2.0254โ—ฆ 0.9832โ—ฆ 1.3220โ—ฆ 1.2343โ—ฆ Natural Sequences Depth Error Density 0.0804 0.6558 0.0798 0.6987 0.0756 0.9076 Table 1: Quantitative comparison on both rendered and natural sequences. 10 5 12 8 1 6 0.8 8 4 0.6 % Pixel count 10 6 4 openMVS Ham et. al Zhu et. al Ours 2 0 0 0.1 0.2 0.4 2 0.2 0 Zhu et. al Ours 0 0 0.4 0.3 Depth error / Threshold of depth error Figure 6: Depth error on the rendered test set. On the left axis shows the histogram of depth error distribution, and on the right axis gives the percentage of pixels under the threshold. 1 openMVS Ham et. al Zhu et. al Ours 0.2 0.15 0.1 0.8 Density Average depth error 0.25 0.6 0 20 40 60 Number of views 80 100 4 6 8 10 Figure 8: Convergence analysis between ours and Zhu et al. [26]. Ours is more robust against initialization error in p0 . evaluate our approach on both rendered and natural settings against both classic PBA methods and deep learning based methods, and prove that it is capable to produce dense full 3D shape in world coordinates, as well as depth maps of PBA-like quality. 0.4 openMVS Ham et. al Zhu et. al Ours 0.2 0.05 2 0 0 20 40 60 80 Number of views Figure 7: Depth error on the rendered test set. On the left axis shows the histogram of depth error distribution, and on the right axis gives the percentage of pixels under the threshold. in the figure for readersโ€™ reference. We also notice that learning based methods [6, 3] which are mostly trained on rendered images suffer from the domain gap in our test natural sequences. 4. Conclusion In this paper we propose the method of semantic photometric bundle adjustment for object-centric shape reconstruction from natural sequence, which exerts geometric constraints over the camera pose as well as the full 3D shape generated by a learned semantic shape prior. We extensively References [1] H. Alismail, B. Browning, and S. Lucey. Photometric bundle adjustment for vision-based slam. In Asian Conference on Computer Vision, pages 324โ€“341. Springer, 2016. 1, 2, 3 [2] A. X. Chang, T. Funkhouser, L. Guibas, P. Hanrahan, Q. Huang, Z. Li, S. Savarese, M. Savva, S. Song, H. Su, J. Xiao, L. Yi, and F. Yu. ShapeNet: An Information-Rich 3D Model Repository. Technical Report arXiv:1512.03012 [cs.GR], Stanford University โ€” Princeton University โ€” Toyota Technological Institute at Chicago, 2015. 2, 3, 5, 6 [3] C. B. Choy, D. Xu, J. Gwak, K. Chen, and S. Savarese. 3dr2n2: A unified approach for single and multi-view 3d object reconstruction. arXiv preprint arXiv:1604.00449, 2016. 1, 2, 6, 7, 8 [4] J. Engel, V. Koltun, and D. Cremers. Direct sparse odometry. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017. 1 [5] J. Engel, T. Schoฬˆps, and D. Cremers. Lsd-slam: Large-scale direct monocular slam. In European Conference on Computer Vision, pages 834โ€“849. Springer, 2014. 2 [6] H. Fan, H. Su, and L. Guibas. A point set generation network for 3d object reconstruction from a single image. arXiv preprint arXiv:1612.00603, 2016. 1, 2, 3, 6, 7, 8 [7] R. Girdhar, D. F. Fouhey, M. Rodriguez, and A. Gupta. Learning a predictable and generative vector representation for objects. In European Conference on Computer Vision, pages 484โ€“499. Springer, 2016. 1, 2 [8] A. Goldberg, S. Hed, H. Kaplan, R. Tarjan, and R. Werneck. Maximum flows by incremental breadth-first search. Algorithmsโ€“ESA 2011, pages 457โ€“468, 2011. 2, 4, 5, 6, 7 [9] J. Gwak, C. B. Choy, M. Chandraker, A. Garg, and S. Savarese. Weakly supervised 3d reconstruction with adversarial constraint. 1, 2 [10] H. Ha, S. Im, J. Park, H.-G. Jeon, and I. So Kweon. Highquality depth from uncalibrated small motion clip. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 5413โ€“5421, 2016. 2 [11] C. Ham, M.-F. Chang, S. Lucey, and S. Singh. Monocular depth from small motion video accelerated. In 3D Vision (3DV), 2017 Fifth International Conference on 3D Vision. IEEE, 2017. 2, 3, 6, 7 [12] M. Ji, J. Gall, H. Zheng, Y. Liu, and L. Fang. Surfacenet: An end-to-end 3d neural network for multiview stereopsis. arXiv preprint arXiv:1708.01749, 2017. 2 [13] A. Kar, C. Haฬˆne, and J. Malik. Learning a multi-view stereo machine. arXiv preprint arXiv:1708.05375, 2017. 2 [14] C.-H. Lin, C. Kong, and S. Lucey. Learning efficient point cloud generation for dense 3d object reconstruction. arXiv preprint arXiv:1706.07036, 2017. 2, 3 [15] R. A. Newcombe, S. J. Lovegrove, and A. J. Davison. Dtam: Dense tracking and mapping in real-time. In Computer Vision (ICCV), 2011 IEEE International Conference on, pages 2320โ€“2327. IEEE, 2011. 2 [16] C. R. Qi, L. Yi, H. Su, and L. J. Guibas. Pointnet++: Deep hierarchical feature learning on point sets in a metric space. arXiv preprint arXiv:1706.02413, 2017. 3 [17] K. Tateno, F. Tombari, I. Laina, and N. Navab. Cnn-slam: Real-time dense monocular slam with learned depth prediction. arXiv preprint arXiv:1704.03489, 2017. 1 [18] B. Triggs, P. F. McLauchlan, R. I. Hartley, and A. W. Fitzgibbon. Bundle adjustmenta modern synthesis. In International workshop on vision algorithms, pages 298โ€“372. Springer, 1999. 1 [19] S. Tulsiani, T. Zhou, A. A. Efros, and J. Malik. Multi-view supervision for single-view reconstruction via differentiable ray consistency. arXiv preprint arXiv:1704.06254, 2017. 2 [20] J. Wu, Y. Wang, T. Xue, X. Sun, W. T. Freeman, and J. B. Tenenbaum. MarrNet: 3D Shape Reconstruction via 2.5D Sketches. In Advances In Neural Information Processing Systems, 2017. 2 [21] J. Wu, C. Zhang, T. Xue, B. Freeman, and J. Tenenbaum. Learning a probabilistic latent space of object shapes via 3d generative-adversarial modeling. In Advances in Neural Information Processing Systems, pages 82โ€“90, 2016. 1, 2 [22] X. Yan, J. Yang, E. Yumer, Y. Guo, and H. Lee. Perspective transformer nets: Learning single-view 3d object reconstruction without 3d supervision. In Advances in Neural Information Processing Systems, pages 1696โ€“1704, 2016. 2 [23] J. D. X. J. Yi Li, Haozhi Qi and Y. Wei. Fully convolutional instance-aware semantic segmentation. 2017. 4, 5 [24] T. Zhou, M. Brown, N. Snavely, and D. G. Lowe. Unsupervised learning of depth and ego-motion from video. arXiv preprint arXiv:1704.07813, 2017. 1 [25] R. Zhu, H. Kiani Galoogahi, C. Wang, and S. Lucey. Rethinking reprojection: Closing the loop for pose-aware shape reconstruction from a single image. In The IEEE International Conference on Computer Vision (ICCV), Oct 2017. 1, 2, 4 [26] R. Zhu, C. Wang, C.-H. Lin, Z. Wang, and S. Lucey. Objectcentric photometric bundle adjustment with deep shape prior. arXiv preprint arXiv:1711.01470, 2017. 2, 3, 4, 5, 8
1cs.CV
arXiv:1711.04969v2 [stat.ML] 22 Jan 2018 Straggler Mitigation in Distributed Optimization Through Data Encoding Can Karakus UCLA Los Angeles, CA [email protected] Yifan Sun Technicolor Research Los Altos, CA [email protected] Suhas Diggavi UCLA Los Angeles, CA [email protected] Wotao Yin UCLA Los Angeles, CA [email protected] Abstract Slow running or straggler tasks can significantly reduce computation speed in distributed computation. Recently, coding-theory-inspired approaches have been applied to mitigate the effect of straggling, through embedding redundancy in certain linear computational steps of the optimization algorithm, thus completing the computation without waiting for the stragglers. In this paper, we propose an alternate approach where we embed the redundancy directly in the data itself, and allow the computation to proceed completely oblivious to encoding. We propose several encoding schemes, and demonstrate that popular batch algorithms, such as gradient descent and L-BFGS, applied in a coding-oblivious manner, deterministically achieve sample path linear convergence to an approximate solution of the original problem, using an arbitrarily varying subset of the nodes at each iteration. Moreover, this approximation can be controlled by the amount of redundancy and the number of nodes used in each iteration. We provide experimental results demonstrating the advantage of the approach over uncoded and data replication strategies. 1 Introduction Solving large-scale optimization problems has become feasible through distributed implementations. However, the efficiency can be significantly hampered by slow processing nodes, network delays or node failures. In this paper we develop an optimization framework based on encoding the dataset, which mitigates the effect of straggler nodes in the distributed computing system. Our approach can be readily adapted to the existing distributed computing infrastructure and software frameworks, since the node computations are oblivious to the data encoding. In this paper, we focus on problems of the form min f (w) := wโˆˆRp 1 min kXw โˆ’ yk2 , 2n wโˆˆRp (1) where X โˆˆ Rnร—p , y โˆˆ Rnร—1 represent the data matrix and vector respectively. The function f (w) is mapped onto a distributed computing setup depicted in Figure 1, consisting of one central server and m worker nodes, which collectively store the row-partitioned matrix X and vector y. We focus on batch, synchronous optimization methods, where the delayed or failed nodes can significantly slow down the overall computation. Note that asynchronous methods are inherently robust to delays caused 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA. by stragglers, although their convergence rates can be worse than their synchronous counterparts. Our e = SX and ye = Sy, approach consists of adding redundancy by encoding the data X and y into X respectively, where S โˆˆ R(ฮฒn)ร—n is an encoding matrix with redundancy factor ฮฒ โ‰ฅ 1, and solving the effective problem 1 1 e min fe(w) := minp kS (Xw โˆ’ y) k2 = minp kXw โˆ’ yek2 wโˆˆR 2ฮฒn wโˆˆR 2ฮฒn wโˆˆRp (2) instead. In doing so, we proceed with the computation in each iteration without waiting for the stragglers, with the idea that the inserted redundancy will compensate for the lost data. The goal is to design the matrix S such that, when the nodes obliviously solve the problem (2) without waiting for the slowest (m โˆ’ k) nodes (where k is a design parameter) the achieved solution approximates the original solution wโˆ— = arg minw f (w) sufficiently closely. Since in large-scale machine learning and data analysis tasks one is typically not interested in the exact optimum, but rather a โ€œsufficiently" good solution that achieves a good generalization error, such an approximation could be acceptable in many scenarios. Note also that the use of such a technique does not preclude the use of other, non-coding straggler-mitigation strategies (e.g., [23, 21, 1] and references therein), which can still be implemented on top of the redundancy embedded in the system, to potentially further improve performance. Focusing on gradient descent and L-BFGS algorithms, we show that under a spectral condition on S, one can achieve an approximation of the solution of (1), by solving (2), without waiting for the stragglers. We show that with sufficient redundancy embedded, and with updates from a sufficiently large, yet strict subset of the nodes in each iteration, it is possible to deterministically achieve linear convergence to a neighborhood of the solution, as opposed to convergence in expectation (see Fig. 4). Further, one can adjust the approximation guarantee by increasing the redundancy and number of node updates waited for in each iteration. Another potential advantage of this strategy is privacy, since the nodes do not have access to raw data itself, but can still perform the optimization task over the jumbled data to achieve an approximate solution. Although in this paper we focus on quadratic objectives and two specific algorithms, in principle our approach can be generalized to more general, potentially non-smooth objectives and constrained optimization problems, as we discuss in Section 4 ( adding a regularization term is also a simple generalization). Our main contributions are as follows. (i) We demonstrate that gradient descent (with constant step size) and L-BFGS (with line search) applied in a coding-oblivious manner on the encoded problem, achieves (universal) sample path linear convergence to an approximate solution of the original problem, using only a fraction of the nodes at each iteration. (ii) We present three classes of coding matrices; namely, equiangular tight frames (ETF), fast transforms, and random matrices, and discuss their properties. (iii) We provide experimental results demonstrating the advantage of the approach over uncoded (S = I) and data replication strategies, for ridge regression using synthetic data on an AWS cluster, as well as matrix factorization for the Movielens 1-M recommendation task. Related work. Use of data replication to aid with the straggler problem has been proposed and studied in [21, 1], and references therein. Additionally, use of coding in distributed computing has been explored in [12, 7]. However, these works exclusively focused on using coding at the computation level, i.e., certain linear computational steps are performed in a coded manner, and explicit encoding/decoding operations are performed at each step. Specifically, [12] used MDS-coded distributed matrix multiplication and [7] focused on breaking up large dot products into shorter dot products, and perform redundant copies of the short dot products to provide resilience against stragglers. [20] considers a gradient descent method on an architecture where each data sample is replicated across nodes, and designs a code such that the exact gradient can be recovered as long as fewer than a certain number of nodes fail. However, in order to recover the exact gradient under any potential set of stragglers, the required redundancy factor is on the order of the number of straggling nodes, which could mean a large amount of overhead for a large-scale system. In contrast, we show that one can converge to an approximate solution with a redundancy factor independent of network size or problem dimensions (e.g., 2 as in Section 5). Our technique is also closely related to randomized linear algebra and sketching techniques [13, 6, 16], used for dimensionality reduction of large convex optimization problems. The main difference between this literature and the proposed coding technique is that the former focuses on reducing the 2 M N1 N2 2 kX1 w โˆ’ y1 k M Nm 2 kX2 w โˆ’ y2 k N1 2 N2 2 kXm w โˆ’ ym k Nm 2 kS1 (Xw โˆ’ y)k kS2 (Xw โˆ’ y)k kSm (Xw โˆ’ y)k2 Figure 1: Left: Uncoded distributed optimization with partitioning, where X and y are partitioned as     > > > > X = X1> X2> . . . Xm and y = y1> y2> . . . ym . Right: Encoded distributed optimization, where node i stores (Si X, Si y), instead of (Xi , yi ). The uncoded case corresponds to S = I. problem dimensions to lighten the computational load, whereas coding increases the dimensionality of the problem to provide robustness. As a result of the increased dimensions, coding can provide a much closer approximation to the original solution compared to sketching techniques. 2 Encoded Optimization Framework Figure 1 shows a typical data-distributed computational model in large-scale optimization (left), as well as our proposed network consists of m machines, where  encoded  model (right). Our computing  > >  > > e machine i stores Xi , yei = (Si X, Si y) and S = S1 S2 . . . Sm . The optimization process is oblivious to the encoding, i.e., once the data is stored at the nodes, the optimization algorithm proceeds exactly as if the nodes contained uncoded, raw data (X, y). In each iteration t, the central server broadcasts the current estimate wt , and each worker machine computes and sends to the server e > (X ei wt โˆ’ yei ). the gradient terms corresponding to its own partition gi (wt ) := X i Note that this framework of distributed optimization is typically communication-bound, where communication over a few slow links constitute a significant portion of the overall computation time. We consider a strategy where at each iteration t, the server only uses the gradient updates from the first k nodes to respond in that iteration, thereby preventing such slow links and straggler nodes from stalling the overall computation: 1 X 1 e> e X (XA wt โˆ’ yeA ), get = gi (wt ) = 2ฮฒฮทn ฮฒฮทn A iโˆˆAt k where At โІ [m], |At | = k are the indices of the first k nodes to respond at iteration t, ฮท := m e and XA = [Si X]iโˆˆAt . (Similarly, SA = [Si ]iโˆˆAt .) Given the gradient approximation, the central server then computes a descent direction dt through the history of gradients and parameter estimates. For the remaining nodes i 6โˆˆ At , the server can either send an interrupt signal, or simply drop their updates upon arrival, depending on the implementation. Next, the central server chooses a step size ฮฑt , which can be chosen as constant, decaying, or through e t that is needed to compute the step size. We exact line search 1 by having the workers compute Xd again assume the central server only hears from the fastest k nodes, denoted by Dt โІ [m], where Dt 6= At in general, to compute ฮฑt = โˆ’ฮฝ d> et t g , > > e X e D dt dt X (3) D eD = [Si X] where X iโˆˆDt , and 0 < ฮฝ < 1 is a back-off factor of choice. Our goal is to especially focus on the case k < m, and design an encoding matrix S such that, for any sequence of sets {At }, {Dt }, f (wt ) universally converges to a neighborhood of f (wโˆ— ). Note that in general, this scheme with k < m is not guaranteed to converge for traditionally batch methods like L-BFGS. Additionally, although the algorithm only works with the encoded function fe, our goal is to provide a convergence guarantee in terms of the original function f . 1 Note that exact line search is not more expensive than backtracking line search for a quadratic loss, since it only requires a single matrix-vector multiplication. 3 3 Algorithms and Convergence Analysis Let the smallest and largest eigenvalues of X > X be denoted by ยต > 0 and M > 0, respectively. Let ฮท with ฮฒ1 < ฮท โ‰ค 1 be given. In order to prove convergence,we will consider a family of matrices  (ฮฒ) S where ฮฒ is the aspect ratio (redundancy factor), such that for any  > 0, and any A โІ [m] with |A| = ฮทm, > (1 โˆ’ )I  SA SA  (1 + )I, (4) for sufficiently large ฮฒ โ‰ฅ 1, where SA = [Si ]iโˆˆA is the submatrix associated with subset A (we drop dependence on ฮฒ for brevity). Note that this is similar to the restricted isometry property (RIP) used in compressed sensing [4], except that (4) is only required for submatrices of the form SA . Although this condition is needed to prove worst-case convergence results, in practice the proposed encoding scheme can work well even when it is not exactly satisfied, as long as the bulk of the eigenvalues of > SA SA lie within a small interval [1 โˆ’ , 1 + ]. We will discuss several specific constructions and their relation to property (4) in Section 4. Gradient descent. We consider gradient descent with constant step size, i.e., wt+1 = wt + ฮฑdt = wt โˆ’ ฮฑe gt . The following theorem characterizes the convergence of the encoded problem under this algorithm. Theorem 1. Let ft = f (wt ), where wt is computed using gradient descent with updates from a set 2ฮถ of (fastest) workers At , with constant step size ฮฑt โ‰ก ฮฑ = M (1+) for some 0 < ฮถ โ‰ค 1, for all t. If S satisfies (4) with  > 0, then for all sequences of {At } with cardinality |At | = k, ฮบ2 (ฮบ โˆ’ ฮณ1 ) f (wโˆ— ) , t = 1, 2, . . . , 1 โˆ’ ฮบฮณ1   1+ , and ฮณ1 = 1 โˆ’ 4ยตฮถ(1โˆ’ฮถ) where ฮบ = 1โˆ’ M (1+) , and f0 = f (w0 ) is the initial objective value. t ft โ‰ค (ฮบฮณ1 ) f0 + The proof is provided in Appendix B, which relies on the fact that the solution to the effective โ€œinstantaneous" problem corresponding to the subset At lies in the set {w : f (w) โ‰ค ฮบ2 f (wโˆ— )}, and therefore each gradient descent step attracts the estimate towards a point in this set, which must eventually converge to this set. Note that in order to guarantee linear convergence, we need ฮบฮณ1 < 1, which can be ensured by property (4). Theorem 1 shows that gradient descent over the encoded problem, based on updates from only k < m nodes, results in deterministically linear convergence to a neighborhood of the true solution wโˆ— , for sufficiently large k, as opposed to convergence in expectation. Note that by property (4), by controlling the redundancy factor ฮฒ and the number of nodes k waited for in each iteration, one can control the approximation guarantee. For k = m and S designed properly (see Section 4), then ฮบ = 1 and the optimum value of the original function f (wโˆ— ) is reached. Limited-memory-BFGS. Although L-BFGS is originally a batch method, requiring updates from all nodes, its stochastic variants have also been proposed recently [14, 3]. The key modification to ensure convergence is that the Hessian estimate must be computed via gradient components that are common in two consecutive iterations, i.e., from the nodes in At โˆฉ Atโˆ’1 . We adapt this technique to our scenario. For t > 0, define ut := wt โˆ’ wtโˆ’1 , and X m rt := (gi (wt ) โˆ’ gi (wtโˆ’1 )) . 2ฮฒn |At โˆฉ Atโˆ’1 | iโˆˆAt โˆฉAtโˆ’1 Then once the gradient terms {gt }iโˆˆAt are collected, the descent direction is computed by dt = โˆ’Bt get , where Bt is the inverse Hessian estimate for iteration t, which is computed by (`+1) Bt (`) = Vj> Bt Vj` + ฯj` uj` u> j` , ` 4 ฯk = 1 rk> uk , Vk = I โˆ’ ฯk rk u> k (0) r> r (e ฯƒ) t t I, and Bt := Bt with ฯƒ with j` = t โˆ’ ฯƒ e + `, Bt = r> e := min {t, ฯƒ}, where ฯƒ is the L-BFGS t ut memory length. Once the descent direction dt is computed, the step size is determined through exact line search, using (3), with back-off factor ฮฝ = 1โˆ’ 1+ , where  is as in (4). For our convergence result for L-BFGS, we need another assumption on the matrix S, in addition to (4). Defining Sฬ†t = [Si ]iโˆˆAt โˆฉAtโˆ’1 for t > 0, we assume that for some ฮด > 0, ฮดI  Sฬ†t> Sฬ†t (5) for all t > 0. Note that this requires that one should wait for sufficiently many nodes to finish so that the overlap set At โˆฉ Atโˆ’1 has more than a fraction ฮฒ1 of all nodes, and thus the matrix Sฬ†t can 1 be full rank. This is satisfied if ฮท โ‰ฅ 21 + 2ฮฒ in the worst-case, and under the assumption that node delays are i.i.d., it is satisfied in expectation if ฮท โ‰ฅ โˆš1ฮฒ . However, this condition is only required for a worst-case analysis, and the algorithm may perform well in practice even when this condition is not satisfied. The following lemma shows the stability of the Hessian estimate. Lemma 1. If (5) is satisfied, then there exist constants c1 , c2 > 0 such that for all t, the inverse Hessian estimate Bt satisfies c1 I  Bt  c2 I. The proof, provided in Appendix A, is based on the well-known trace-determinant method. Using Lemma 1, we can show the following result. Theorem 2. Let ft = f (wt ), where wt is computed using L-BFGS as described above, with gradient updates from machines At , and line search updates from machines Dt . If S satisfies (4) and (5), for all sequences of {At }, {Dt } with |At | = |Dt | = k, t ft โ‰ค (ฮบฮณ2 ) f0 + where ฮบ = 1+ 1โˆ’ ,  and ฮณ2 = 1 โˆ’ 4ยตc1 c2 M (c1 +c2 )2  ฮบ2 (ฮบ โˆ’ ฮณ2 ) f (wโˆ— ) , 1 โˆ’ ฮบฮณ2 , and f0 = f (w0 ) is the initial objective value. The proof is provided in Appendix B. Similar to Theorem 1, the proof is based on the observation that the solution of the effective problem at time t lies in a bounded set around the true solution wโˆ— . As in gradient descent, coding enables linear convergence deterministically, unlike the stochastic and multi-batch variants of L-BFGS [14, 3]. Generalizations. Although we focus on quadratic cost functions and two specific algorithms, our 2 approach can potentially be generalized for objectives of the form kXw โˆ’ yk + h(w) for a simple 2 convex function h, e.g., LASSO; or constrained optimization minwโˆˆC kXw โˆ’ yk (see [11]); as well as other first-order algorithms used for such problems, e.g., FISTA [2]. In the next section we demonstrate that the codes we consider have desirable properties that readily extend to such scenarios. 4 Code Design We consider three classes of coding matrices: tight frames, fast transforms, and random matrices. nฮฒ Tight frames. A unit-norm frame for Rn is a set of vectors F = {ฯ†i }i=1 with kฯ†i k = 1, where ฮฒ โ‰ฅ 1, such that there exist constants ฮพ1 โ‰ฅ ฮพ2 > 0 such that, for any u โˆˆ Rn , 2 ฮพ1 kuk โ‰ค nฮฒ X 2 |hu, ฯ†i i| โ‰ค ฮพ2 kuk2 . i=1 The frame is tight if the above satisfied with ฮพ1 = ฮพ2 . In this case, it can be shown that the constants are equal to the redundancy factor of the frame, i.e., ฮพ1 = ฮพ2 = ฮฒ. If we form S โˆˆ R(ฮฒn)ร—n by rows that are a tight frame, then we have S > S = ฮฒI, which ensures kXw โˆ’ yk2 = ฮฒ1 kSXw โˆ’ Syk2 . Then for any solution w eโˆ— to the encoded problem (with k = m), โˆ‡fe(w eโˆ— ) = X > S > S(X w eโˆ— โˆ’ y) = ฮฒ(X w eโˆ— โˆ’ y)> X = ฮฒโˆ‡f (w eโˆ— ). 5 > Figure 3: Sample spectrum of SA SA for various constructions with low redundancy, and large k (normalized). > Figure 2: Sample spectrum of SA SA for various constructions with high redundancy, and relatively small k (normalized). Therefore, the solution to the encoded problem satisfies the optimality condition for the original problem as well: โˆ‡fe(w eโˆ— ) = 0, โ‡” โˆ‡f (w eโˆ— ) = 0, and if f is also strongly convex, then w eโˆ— = wโˆ— is the unique solution. Note that since the computation is coding-oblivious, this is not true in general for an arbitrary full rank matrix, and this is, in addition to property (4), a desired property of the encoding matrix. In fact, this equivalency extends beyond smooth unconstrained optimization, in that D E โˆ‡fe(w eโˆ— ), w โˆ’ w eโˆ— โ‰ฅ 0, โˆ€w โˆˆ C โ‡” hโˆ‡f (w eโˆ— ), w โˆ’ w eโˆ— i โ‰ฅ 0, โˆ€w โˆˆ C for any convex constraint set C, as well as โˆ’โˆ‡fe(w eโˆ— ) โˆˆ โˆ‚h(w eโˆ— ), โ‡” โˆ’โˆ‡f (w eโˆ— ) โˆˆ โˆ‚h(w eโˆ— ), for any non-smooth convex objective term h(x), where โˆ‚h is the subdifferential of h. This means that tight frames can be promising encoding matrix candidates for non-smooth and constrained optimization too. In [11], it was shown that when {At } is static, equiangular tight frames allow for a close approximation of the solution for constrained problems. A tight frame is equiangular if |hฯ†i , ฯ†j i| is constant across all pairs (i, j) with i 6= j. nฮฒ Proposition 1 (Welch bound [22]). Let F = {ฯ†i }i=1 be a tight frame. Then ฯ‰(F ) โ‰ฅ Moreover, equality is satisfied if and only if F is an equiangular tight frame. q ฮฒโˆ’1 2nฮฒโˆ’1 . Therefore, an ETF minimizes the correlation between its individual elements, making each submatrix > SA SA as close to orthogonal as possible, which is promising in light of property (4). We specifically evaluate Paley [15, 10] and Hadamard ETFs [19] (not to be confused with Hadamard matrix, which is discussed next) in our experiments. We also discuss Steiner ETFs [8] in Appendix D, which enable efficient implementation. Fast transforms. Another computationally efficient method for encoding is to use fast transforms: Fast Fourier Transform (FFT), if S is chosen as a subsampled DFT matrix, and the Fast WalshHadamard Transform (FWHT), if S is chosen as a subsampled real Hadamard matrix. In particular, one can insert rows of zeroes at random locations into the data pair (X, y), and then take the FFT or FWHT of each column of the augmented matrix. This is equivalent to a randomized Fourier or Hadamard ensemble, which is known to satisfy the RIP with high probability [5]. Random matrices. A natural choice of encoding is using i.i.d. random matrices. Although such random matrices do not have the computational advantages of fast transforms or the optimalitypreservation property of tight frames, their eigenvalue behavior can be characterized analytically. In particular, using the existing results on the eigenvalue scaling of large i.i.d. Gaussian matrices [9, 18] and union bound, it can be shown that r 2 !    1 > 1 P max ฮปmax SA SA > 1 + โ†’ 0, (6) ฮฒฮทn ฮฒฮท A:|A|=k r 2 !    1 > 1 P min ฮปmin S SA < 1 โˆ’ โ†’ 0, (7) ฮฒฮทn A ฮฒฮท A:|A|=k 6 Figure 4: Left: Sample evolution of uncoded, replication, and Hadamard (FWHT)-coded cases, for k = 12, m = 32. Right: Runtimes of the schemes for different values of ฮท, for the same number of iterations for each scheme. Note that this essentially captures the delay profile of the network, and does not reflect the relative convergence rates of different methods. as n โ†’ โˆž, where ฯƒi denotes the ith singular value. Hence, for sufficiently large redundancy and problem dimension, i.i.d. random matrices are good candidates for encoding as well. However, for finite ฮฒ, even if k = m, in general for this encoding scheme the optimum of the original problem is not recovered exactly. Property (4) and redundancy requirements. Using the analytical  (6)โ€“(7) on i.i.d. Gaus bounds 1 โˆš sian matrices, one can see that such matrices satisfy (4) with  = O , independent of problem ฮฒฮท dimensions or number of nodes m. Although we do not have tight eigenvalue bounds for subsampled ETFs, numerical evidence (Figure 2) suggests that they may satisfy (4) with smaller  than random matrices, and thus we believe that the required redundancy in practice is even smaller for ETFs. Note that our theoretical results focus on the extreme eigenvalues due to a worst-case analysis; in practice, most of the energy of the gradient will be on the eigen-space associated with the bulk of the eigenvalues, which the following proposition suggests can be mostly 1 (also see Figure 3), which means even if (4) is not satisfied, the gradient (and the solution) can be approximated closely for a modest redundancy, such as ฮฒ = 2. The following result is a consequence of the Cauchy interlacing theorem, and the definition of tight frames. Proposition 2. If the rows of S are chosen to form an ETF with redundancy ฮฒ, then for ฮท โ‰ฅ 1 โˆ’ ฮฒ1 , 1 > ฮฒ SA SA has n(1 โˆ’ ฮฒฮท) eigenvalues equal to 1. 5 Numerical Results Ridge regression with synthetic data on AWS EC2 cluster. We generate the elements of matrix X i.i.d. โˆผ N (0, 1), the elements of y i.i.d. โˆผ N (0, p), for dimensions (n, p) = (4096, 6000), and 2 e โˆ’ ye + ฮป kwk2 , for regularization parameter ฮป = 0.05. We solve the problem minw 1 Xw 2ฮฒn 2 evaluate column-subsampled Hadamard matrix with redundancy ฮฒ = 2 (encoded using FWHT for fast encoding), data replication with ฮฒ = 2, and uncoded schemes. We implement distributed L-BFGS as described in Section 3 on an Amazon EC2 cluster using the mpi4py Python package, over m = 32 m1.small worker node instances, and a single c3.8xlarge central server instance. We assume the central server encodes and sends the data variables to the worker nodes (see Appendix D for a discussion of how to implement this more efficiently). Figure 4 shows the result of our experiments, which are aggregated over 20 trials. As baselines, we consider the uncoded scheme, as well as a replication scheme, where each uncoded partition is replicated ฮฒ = 2 times across nodes, and the server uses the faster copy in each iteration. It can be seen from the right figure that one can speed up computation by reducing ฮท from 1 to, for instance, 0.375, resulting in more than 40% reduction in the runtime. Note that in this case, uncoded L-BFGS fails to converge, whereas the Hadamard-coded case stably converges. We also observe that the data replication scheme converges on average, but in the worst case, the convergence is much less smooth, since the performance may deteriorate if both copies of a partition are delayed. 7 Figure 5: Test RMSE for m = 8 (left) and m = 24 (right) nodes, where the server waits for k = m/8 (top) and k = m/2 (bottom) responses. โ€œPerfect" refers to the case where k = m. Figure 6: Total runtime with m = 8 and m = 24 nodes for different values of k, under fixed 100 iterations for each scheme. Matrix factorization on Movielens 1-M dataset. We next apply matrix factorization on the MovieLens-1M dataset [17] for the movie recommendation task. We are given R, a sparse matrix of movie ratings 1โ€“5, of dimension #users ร— #movies, where Rij is specified if user i has rated movie j. We withhold randomly 20% of these ratings to form an 80/20 train/test split. The goal is to recover user vectors xi โˆˆ Rp and movie vectors yi โˆˆ Rp (where p is the embedding dimension) such that Rij โ‰ˆ xTi yj + ui + vj + ยต, where ui , vj , and ยต are user, movie, and global biases, respectively. The optimization problem is given by ๏ฃซ ๏ฃถ X X X min (Rij โˆ’ ui โˆ’ vj โˆ’ xTi yj โˆ’ ยต)2 + ฮป ๏ฃญ kxi k22 + kuk22 + kyj k22 + kvk22 ๏ฃธ . xi ,yj ,ui ,vj i i,j: observed j (8) We choose ยต = 3, p = 15, and ฮป = 10, which achieves a test RMSE 0.861, close to the current best test RMSE on this dataset using matrix factorization2 . Problem (8) is often solved using alternating minimization, minimizing first over all (xi , ui ), and then all (yj , vj ), in repetition. Each such step further decomposes by row and column, made smaller by the sparsity of R. To solve for (xi , ui ), we first extract Ii = {j | rij is observed}, and solve the > resulting sequence of regularized least squares problems in the variables wi = [x> i , ui ] distributedly > > using coded L-BFGS; and repeat for w = [yj , vj ] , for all j. As in the first experiment, distributed coded L-BFGS is solved by having the master node encoding the data locally, and distributing the encoded data to the worker nodes (Appendix D discusses how to implement this step more efficiently). The overhead associated with this initial step is included in the overall runtime in Figure 6. The Movielens experiment is run on a single 32-core machine with 256 GB RAM. In order to simulate network latency, an artificial delay of โˆ† โˆผ exp(10 ms) is imposed each time the worker completes a task. Small problem instances (n < 500) are solved locally at the central server, using the built-in function numpy.linalg.solve. Additionally, parallelization is only done for the ridge regression instances, in order to isolate speedup gains in the L-BFGS distribution. To reduce overhead, we create a bank of encoding matrices {Sn } for Paley ETF and Hadamard ETF, for n = 100, 200, . . . , 3500, and then given a problem instance, subsample the columns of the appropriate matrix Sn to match the dimensions. Overall, we observe that encoding overhead is amortized by the speed-up of the distributed optimization. Figure 5 gives the final performance of our distributed L-BFGS for various encoding schemes, for each of the 5 epochs, which shows that coded schemes are most robust for small k. A full table of results is given in Appendix C. 2 http://www.mymedialite.net/examples/datasets.html 8 Acknowledgments This work was supported in part by NSF grants 1314937 and 1423271. References [1] G. Ananthanarayanan, A. Ghodsi, S. Shenker, and I. Stoica. Effective straggler mitigation: Attack of the clones. In NSDI, volume 13, pages 185โ€“198, 2013. [2] A. Beck and M. Teboulle. A fast iterative shrinkage-thresholding algorithm for linear inverse problems. SIAM Journal on Imaging Sciences, 2(1):183โ€“202, 2009. [3] A. S. Berahas, J. Nocedal, and M. Takรกc. A multi-batch l-bfgs method for machine learning. In Advances in Neural Information Processing Systems, pages 1055โ€“1063, 2016. [4] E. J. Candes and T. Tao. Decoding by linear programming. IEEE Transactions on Information Theory, 51 (12):4203โ€“4215, 2005. [5] E. J. Candes and T. Tao. Near-optimal signal recovery from random projections: Universal encoding strategies? IEEE Transactions on Information Theory, 52(12):5406โ€“5425, 2006. [6] P. Drineas, M. W. Mahoney, S. Muthukrishnan, and T. Sarlรณs. Faster least squares approximation. Numerische mathematik, 117(2):219โ€“249, 2011. [7] S. Dutta, V. Cadambe, and P. Grover. Short-dot: Computing large linear transforms distributedly using coded short dot products. In Advances In Neural Information Processing Systems, pages 2092โ€“2100, 2016. [8] M. Fickus, D. G. Mixon, and J. C. Tremain. Steiner equiangular tight frames. Linear Algebra and Its Applications, 436(5):1014โ€“1027, 2012. [9] S. Geman. A limit theorem for the norm of random matrices. The Annals of Probability, pages 252โ€“261, 1980. [10] J. Goethals and J. J. Seidel. Orthogonal matrices with zero diagonal. Canad. J. Math, 1967. [11] C. Karakus, Y. Sun, and S. Diggavi. Encoded distributed optimization. In 2017 IEEE International Symposium on Information Theory (ISIT), pages 2890โ€“2894. IEEE, 2017. [12] K. Lee, M. Lam, R. Pedarsani, D. Papailiopoulos, and K. Ramchandran. Speeding up distributed machine learning using codes. In Information Theory (ISIT), 2016 IEEE International Symposium on, pages 1143โ€“1147. IEEE, 2016. [13] M. W. Mahoney et al. Randomized algorithms for matrices and data. Foundations and Trends R in Machine Learning, 3(2):123โ€“224, 2011. [14] A. Mokhtari and A. Ribeiro. Global convergence of online limited memory BFGS. Journal of Machine Learning Research, 16:3151โ€“3181, 2015. [15] R. E. Paley. On orthogonal matrices. Studies in Applied Mathematics, 12(1-4):311โ€“320, 1933. [16] M. Pilanci and M. J. Wainwright. Randomized sketches of convex programs with sharp guarantees. IEEE Transactions on Information Theory, 61(9):5096โ€“5115, 2015. [17] J. Riedl and J. Konstan. Movielens dataset, 1998. [18] J. W. Silverstein. The smallest eigenvalue of a large dimensional wishart matrix. The Annals of Probability, pages 1364โ€“1368, 1985. [19] F. Szรถlloฬ‹si. Complex hadamard matrices and equiangular tight frames. Linear Algebra and its Applications, 438(4):1962โ€“1967, 2013. [20] R. Tandon, Q. Lei, A. G. Dimakis, and N. Karampatziakis. Gradient coding. ML Systems Workshop (MLSyS), NIPS, 2016. [21] D. Wang, G. Joshi, and G. Wornell. Using straggler replication to reduce latency in large-scale parallel computing. ACM SIGMETRICS Performance Evaluation Review, 43(3):7โ€“11, 2015. [22] L. Welch. Lower bounds on the maximum cross correlation of signals (corresp.). IEEE Transactions on Information theory, 20(3):397โ€“399, 1974. [23] N. J. Yadwadkar, B. Hariharan, J. Gonzalez, and R. H. Katz. Multi-task learning for straggler avoiding predictive job scheduling. Journal of Machine Learning Research, 17(4):1โ€“37, 2016. 9 A Lemmas In the proofs, we will ignore the normalization constants on the objective functions for brevity. Let ftA := eA w โˆ’ yeA k2 (we set A โ‰ก At ). Let w eA wt โˆ’ yeA k2 , and fA (w) := kX kX etโˆ— denote the solution to the effective โˆ— eA w โˆ’ yeA k2 . โ€œinstantaneous" problem at iteration t, i.e., w et = arg min kX w Stronger versions of the following lemma has been proved in [11, 16], but we include a weakened version of this result here for completeness. Lemma 2. For any t and {At }, f (w etโˆ— ) โ‰ค ฮบ2 f (wโˆ— ) Proof. Define e = w etโˆ— โˆ’ wโˆ— and note that kX w etโˆ— โˆ’ yk = kXwโˆ— โˆ’ y + Xek โ‰ค kXwโˆ— โˆ’ yk + kXek by triangle inequality, which implies  โˆ— โˆ— 2 f (w et ) = kX w et โˆ’ yk โ‰ค 1 + kXek kXwโˆ— โˆ’ yk 2  kXw โˆ’ yk = 1 + โˆ— 2 kXek kXwโˆ— โˆ’ yk 2 f (wโˆ— ). (9) Now, for any c > 0, consider > SA (Xwโˆ— โˆ’ y) e> X > SA kSA Xek2 (a) โ‰ค โˆ’2 ฮปmin ฮปmin  > > > e X SA SA โˆ’ cI (Xwโˆ— โˆ’ y) 2c > > = โˆ’2 โˆ’ e X (Xwโˆ— โˆ’ y) ฮปmin ฮปmin  > SA โˆ’ cI (Xwโˆ— โˆ’ y) e> X > SA (b) = โˆ’2 ฮปmin  > (c) SA e> X > cI โˆ’ SA kXwโˆ— โˆ’ yk โ‰ค2 ฮปmin > (d) SA cI โˆ’ SA โ‰ค 2 kXwโˆ— โˆ’ ykkXek, ฮปmin kXek2 โ‰ค eA w where (a) follows by expanding and re-arranging X etโˆ— โˆ’ yeA 2 eA wโˆ— โˆ’ yeA โ‰ค X 2 , which is since w etโˆ— is the minimizer of this function; (b) follows by the fact that โˆ‡f (wโˆ— ) = X > (Xwโˆ— โˆ’ y) = 0 by optimality of wโˆ— for f ; (c) follows by Cauchy-Schwarz inequality; and (d) follows by the definition of matrix norm. Since this is true for any c > 0, we choose c = ฮปmax +ฮปmin , 2 which gives kXek ฮปmax โˆ’ ฮปmin โ‰ค = ฮบ โˆ’ 1. kX w etโˆ— โˆ’ yk ฮปmin Plugging this back in (9), we get f (w eโˆ— ) โ‰ค ฮบ2 f (wโˆ— ), which completes the proof. Lemma 3. If   A fet+1 โˆ’ feA (wฬ„) โ‰ค ฮณ fetA โˆ’ feA (wฬ„) for all t > 0, for some wฬ„ โˆˆ Rp , and for some 0 < ฮณ < 1, then ft โ‰ค (ฮบฮณ)t f0 + ฮบโˆ’ฮณ f (wฬ„) . 1 โˆ’ ฮบฮณ Proof. Since for any w, >e ฮปmin f (w) = ฮปmin kXw โˆ’ yk2 โ‰ค (Xw โˆ’ y)> SA SA (Xw โˆ’ y) = feA (w), and similarly feA (w) โ‰ค ฮปmax f (w), we have ฮปmin ft+1 โˆ’ ฮปmax f (wฬ„) โ‰ค ฮณ (ฮปmax ft โˆ’ ฮปmin f (wฬ„)) , which can be re-arranged into the linear recursive inequality ft+1 โ‰ค ฮบฮณft + (ฮบ โˆ’ ฮณ)f (wฬ„) , 10 where ฮบ = we get ฮปmax . ฮปmin By considering such inequalities for 0 โ‰ค ฯ„ โ‰ค t, multiplying each by (ฮบฮณ)tโˆ’ฯ„ and summing, ft โ‰ค (ฮบฮณ)t f0 + (ฮบ โˆ’ ฮณ)f (wฬ„) tโˆ’1 X (ฮบฮณ)ฯ„ ฯ„ =0 ฮบโˆ’ฮณ f (wฬ„) . โ‰ค (ฮบฮณ) f0 + 1 โˆ’ ฮบฮณ t Lemma 4. feA (w) is ฮปmin ยต-strongly convex. > e eA Proof. It is sufficient to show that the minimum eigenvalue of X XA is bounded away from zero. This can easily be shown by the fact that > e > eA u> X XA u = u> X > SA SA Xu โ‰ฅ ฮปmin kXuk2 โ‰ฅ ฮปmin ยตkuk2 , for any unit vector u. Lemma 5. Let M โˆˆ Rpร—p be a positive definite matrix, with the condition number (ratio of maximum eigenvalue to the minimum eigenvalue) given by ฮบ. Then, for any unit vector u, โˆš u> M u 2 ฮบ โ‰ฅ . kM uk ฮบ+1 Proof. Let W be the subspace spanned by {u, M u}, and let W โˆˆ Rpร—2 be a matrix whose columns form an orthonormal basis for W. Then u and M u can be represented as u = W r1 M u = W r2 for some r1 , r2 โˆˆ R2 , which implies r2 = W > M W r1 = Q> DQr1 , where since W > M W is still a positive definite matrix it has the 2 ร— 2 eigen-decomposition Q> DQ. Defining qi = Qri for i = 1, 2, note that the quantity we are interested in can be equivalently represented as u> M u r > r2 q > q2 = 1 = 1 , kM uk kr2 k kq2 k where q2 = Dq1 . Further note that for any unit vector v, v > Dv = v > Q> DQv = v > W > M W v, and since kW vk = 1, the condition number of D (the ratio of the two non-zero elements of D) cannot be larger than that of M , which is ฮบ (since otherwise once could find unit vectors u1 = W v1 and u2 = W v2 such that u> 1 M u1 > ฮบ, which is a contradiction). Representing q1 = [cos ฯ† sin ฯ†]> for some angle ฯ†, kqq22 k can then be u> 2 M u2  > > q1 q2 written as q2 = โˆš d21 2 cos ฯ† โˆš d22 2 sin ฯ† . Note that minimizing the inner product kq is equivalent 2k d1 +d2 d1 +d2 to maximizing the function   d2     โˆ’ 1 tan ฯ† d1 d2 โˆ’1 tan tan tan ฯ† โˆ’ ฯ† = d1 1 + dd21 tan2 ฯ† 1 over ฯ†. By setting the derivative to zero, we find that the maximizing ฯ† is given by cosโˆ’1 dd22 โˆ’d . Therefore +d1 q โˆš 2 dd21 u> M u q1> q2 d1 d2 2 ฮบ 2 2 = = p cos ฯ† + p sin ฯ† โ‰ฅ โ‰ฅ , kM uk kq2 k 1+ฮบ 1 + dd2 d21 + d22 d21 + d22 1 which is the desired result. 11 Proof of Lemma 1. First note that >  rt> ut = X > Sฬ†t> Sฬ†t [(Xwt โˆ’ y) โˆ’ (Xwtโˆ’1 โˆ’ y)] (wt โˆ’ wtโˆ’1 ) = (wt โˆ’ wtโˆ’1 )> X > Sฬ†t> Sฬ†t X (w โˆ’ wtโˆ’1 ) โ‰ฅ ยตkut k2 , (10) by (5) Also consider 2  (wt โˆ’ wtโˆ’1 )> X > Sฬ†t> Sฬ†t X (wt โˆ’ wtโˆ’1 ) krt k2 , = rt> ut (wt โˆ’ wtโˆ’1 )> X > Sฬ†t> Sฬ†t X (wt โˆ’ wtโˆ’1 ) which implies ยต โ‰ค krt k2 โ‰ค (1 + )M, rt> ut again by (4). Now, setting j` = t โˆ’ ฯƒ e + `, consider the trace tr  (`+1) Bt  = tr  (`) Bt  (`) โˆ’ tr   (`) + tr โ‰ค tr Bt (`) Bt uj` u> j` Bt ! (`) u> j` Bt uj` ! rj` rj>` rj>` uj` + tr rj` rj>` rj>` uj` !  kr k2  j (`) + >` = tr Bt rj` uj`   (`) + (1 + )M, โ‰ค tr Bt which implies tr (Bt ) โ‰ค (1 + )M (e ฯƒ + d). It can also be shown (similar to [3]) that     (`) (`+1) ยท = det Bt det Bt rj>` uj` (`) u> j` Bt uj`  r > uj  kuj` k2 j (`) ยท ` `2 ยท = det Bt (`) kuj` k u> j` Bt uj`   ยต (`) โ‰ฅ det Bt , (1 + )M (e ฯƒ + d)   ฯƒe (0) ยต which implies det (Bt ) โ‰ฅ det Bt . Since Bt โ‰ฅ 0, its trace is bounded above, and its (1+)M (e ฯƒ +d) determinant is bounded away from zero, there must exist 0 < c1 โ‰ค c2 such that c1 I  Bt  c2 I. B Proofs of Theorem 1 and Theorem 2 Throughout the section, we will consider a particular iteration t, and denote n    o > > ฮปmin := min ฮปmin SA SA , ฮปmin SD SD n    o > > ฮปmax := max ฮปmax SA SA , ฮปmax SD SD , where ฮปmin (ยท) and ฮปmax (ยท) denote the minimum and maximum eigenvalues of a matrix. We will also denote with w etโˆ— the solution to the effective โ€œinstantaneous" problem at iteration t, i.e., w etโˆ— = 2 eA w โˆ’ yeA , where A โ‰ก At , and we ignore the normalization constants on the objective functions arg min X w eA w โˆ’ yeA k2 , and fetA := kX eA wt โˆ’ yeA k2 . for. Finally, we define feA (w) := kX 12 B.1 Proof of Theorem 1 Using convexity, and the choices that dt = โˆ’e gt and ฮฑt = ฮฑ, we have 1 > > feA (wt โˆ’ ฮฑt dt ) โˆ’ feA (wt ) โ‰ค ฮฑt get> dt + ฮฑt2 d> t X SA SA Xdt 2 (a) 1 ฮปmax 2 > > > = โˆ’ฮฑke gt k2 + ฮฑ2 get> X > SA SA Xe gt โ‰ค โˆ’ฮฑke gt k2 + ฮฑ get X Xe gt 2 2   (b) 2ฮถ (1 โˆ’ ฮถ) ฮปmax M โ‰ค โˆ’ฮฑ 1 โˆ’ ฮฑ ke g t k2 = โˆ’ ke gt k2 2 M ฮปmax  (c) 4ยตฮถ (1 โˆ’ ฮถ)  eA โ‰คโˆ’ f (wt ) โˆ’ feA (w etโˆ— ) , M ฮปmax > where (a) follows by the fact that SA SA  ฮปmax I; (b) follows since X > X  M I; and (c) follows by strong convexity. Re-arranging this inequality, and using the definition of ฮณ1 , we get   A fet+1 โˆ’ feA (w etโˆ— ) โ‰ค ฮณ1 fetA โˆ’ feA (w etโˆ— ) . Then, Lemma 3 with wฬ„ = w et implies ft โ‰ค (ฮบฮณ1 )t f0 + ฮบ โˆ’ ฮณ1 f (w etโˆ— ) . 1 โˆ’ ฮบฮณ1 Finally, Lemma 2 implies f (w etโˆ— ) โ‰ค ฮบ2 f (wโˆ— ), which concludes the proof. B.2 Proof of Theorem 2 Using convexity and the closed-form expression for the step size, we have 1 > > feA (wt + ฮฑt dt ) โˆ’ feA (wt ) โ‰ค ฮฑt get> dt + ฮฑt2 d> t X SA SA Xdt 2 2 2 > > ฮฝ 2 get> dt ฮฝ get> dt 1 d> t X SA SA Xdt + ยท =โˆ’ > > > > > > > 2 dt X > SD SD Xdt dt X > SD SD Xdt dt X SD SD Xdt !   ! > 2 > 2 > > > > >   2 (a) SD โˆ’ ฮฝ2 SA dt X ฮฝ SA SA โˆ’ 2ฮฝSD SD Xdt z > SD SA z dt get > = dt get = โˆ’ฮฝ 2 2 2 > > > > > kXd tk 2 dt X SD SD Xdt z SD SD z    > 2 (c)  > 2   (b) dt get dt get ฮปmin โˆ’ ฮฝ2 ฮปmax ฮปmin โˆ’ ฮฝ2 ฮปmax ฮฝ โ‰ค โˆ’ โ‰ค โˆ’ฮฝ 2 2 ฮปmin kXdt k2 M ฮปmin kdt k2 2   > ฮฝ get Bt get ฮปmin โˆ’ 2 ฮปmax (d) ฮฝ = โˆ’ M ฮป2min kBt get k2     ฮฝ ฮฝ   (e) (f) 4ฮฝ ฮปmin โˆ’ 2 ฮปmax c1 c2 c1 c2 8ยตฮฝ ฮปmin โˆ’ 2 ฮปmax 2 e e etโˆ— ) โ‰คโˆ’ ke g k โ‰ค โˆ’ t 2 2 f (wt ) โˆ’ f (w 2 2 M ฮปmin M ฮปmin (c1 + c2 ) (c1 + c2 )     (h) (g) 4ยตc1 c2 etโˆ— ) . = โˆ’ fe(wt ) โˆ’ fe(w etโˆ— ) = โˆ’ (1 โˆ’ ฮณ2 ) feA (wt ) โˆ’ feA (w M (c1 + c2 )2 Xdt ; (b) follows by the fact that the term in parenthesis is an increasing kXdt k > Sฬ†t Sฬ†t z and by Assumption 1; (c) follows by the assumption that X > X  M I; where (a) follows by defining z = > function of the quadratic form z e (d) follows by the definition of dt ; (e)follows by Lemmas  5 and 1; (f) follows by strong convexity of f (by min Lemma 4), which implies ke gt k2 โ‰ฅ 2ยต fe(ฮธt ) โˆ’ fe(w etโˆ— ) ; (g) follows by choosing ฮฝ = ฮปฮปmax ; and (h) follows using the definition of ฮณ2 . Re-arranging the inequality, we obtain   A fet+1 โˆ’ feA (w etโˆ— ) โ‰ค ฮณ2 fetA โˆ’ feA (w etโˆ— ) , and hence applying first Lemma 3 with wฬ„ = w et , and then Lemma 2, we get the desired result. C Full results of Movielens 1-M experiment Tables 1 and 2 give the test and train RMSE for the Movielens 1-M recommendation task, with a random 80/20 train/test split. 13 uncoded replication gaussian paley hadamard m = 8, k = 1 train RMSE 0.804 0.783 0.781 0.775 0.779 test RMSE 0.898 0.889 0.877 0.873 0.874 runtime 1.60 1.76 2.24 1.82 1.82 m = 8, k = 4 train RMSE 0.770 0.766 0.765 0.763 0.765 test RMSE 0.872 0.872 0.866 0.868 0.870 runtime 2.96 3.13 3.64 3.34 3.18 m = 8, k = 6 train RMSE 0.762 0.760 0.762 0.758 0.760 test RMSE 0.866 0.871 0.864 0.860 0.864 runtime 5.11 4.59 5.70 5.50 5.33 Table 1: Full results for Movielens 1-M, distributed over m = 8 nodes total. Runtime is in hours. An uncoded scheme running full batch L-BFGS has a train/test RMSE of 0.756 / 0.861, and a runtime of 9.58 hours. uncoded replication gaussian paley hadamard m = 24, k = 3 train RMSE 0.805 0.791 0.783 0.780 0.782 test RMSE 0.902 0.893 0.880 0.879 0.882 runtime 2.60 3.22 3.98 3.49 3.49 m = 24, k = 12 train RMSE 0.770 0.764 0.767 0.764 0.765 test RMSE 0.872 0.870 0.866 0.868 0.868 runtime 4.24 4.38 4.92 4.50 4.61 Table 2: Full results for Movielens 1-M, distributed over m = 24 nodes total. Runtime is in hours. An uncoded scheme running full batch L-BFGS has a train/test RMSE of 0.757 / 0.862, and a runtime of 14.11 hours. D Efficient encoding using Steiner ETF We first describe Steiner ETF, based on the construction proposed in [8]. Steiner equiangular tight frames. Let v be a power of 2, let H โˆˆ Rvร—v be a real Hadamard matrix, and let hi be the ith column of H, for i = 1, . . . , v. Consider the matrix V โˆˆ {0, 1}vร—v(vโˆ’1)/2 , where each column is the incidence vector of a distinct two-element subset of {1, . . . , v}. For instance, for v = 4, ๏ฃฎ ๏ฃน 1 1 1 0 0 0 ๏ฃฏ 1 0 0 1 1 0 ๏ฃบ V =๏ฃฐ . 0 1 0 1 0 1 ๏ฃป 0 0 1 0 1 1 Note that each of the v rows have exactly v โˆ’ 1 non-zero elements. We construct Steiner ETF S as a v 2 ร— v(vโˆ’1) 2 โˆš matrix by replacing each 1 in a row with a distinct column of H, and normalizing by v โˆ’ 1. For instance, for the above example, we have ๏ฃฎ ๏ฃน h2 h3 h4 0 0 0 1 ๏ฃฏ h2 0 0 h3 h4 0 ๏ฃบ S= โˆš ๏ฃฐ . 0 h2 0 h3 0 h4 ๏ฃป 3 0 0 h2 0 h3 h4 v In general, this procedure results in a matrix S with redundancy factor ฮฒ = 2 vโˆ’1 . In full generality, Steiner ETFs can be constructed for larger redundancy levels; we refer the reader to [8] for a full discussion of these constructions. Efficient distributed encoding. Steiner ETF allows for a distributed and efficient implementation for encoding a given matrix X. Note that the encoding matrix S consists of v blocks, each corresponding to a row of V . Consider the following partition for S:  > S = S1> S2> . . . Sv> , 14 where Si โˆˆ Rvร—v(vโˆ’1)/2 is a horizontal block. Note that multiplication with a block Si X can be computed by directly finding the non-zero column indices for the block Si , which is given by B1,i โˆช B2,i , where   1 B1,i = j(2v โˆ’ 1 โˆ’ j) + (i โˆ’ 1 โˆ’ j), for j = 0, . . . , i โˆ’ 2 2   1 B2,i = (i โˆ’ 1)(2v โˆ’ 1 โˆ’ i) + j, for j = 1, . . . , v โˆ’ i 2 Multiplication can then be implemented by simply taking a Hadamard transform of the corresponding rows of X, whose indices are given by B1,i โˆช B2,i . In the case of dimension mismatch, one can append zero rows to X, or remove some rows from S to make the multiplication well-defined. Therefore, one can partition the blocks {SiS } across worker nodes, and worker node k can read the corresponding rows of X from the pool of data, given by iinIk B1,i โˆช B2,i , where Ik is the blocks assigned to worker k, and then apply Fast Hadamard Transform for each block. Note that processing of blocks can be further parallelized within each node, using multiple cores. In practice, we have observed that the performance of Steiner ETF significantly improves if the rows of SX are shuffled after encoding. This can be implemented by having the nodes exchange rows of SX after encoding; however, this incurs a significant communication cost. A more practical approach could be one where each block is assigned to multiple nodes at random, i.e., each block is encoded by multiple nodes. The worker nodes can then drop a subset of their encoded rows such that each row is retained by exactly one node, based on some pre-defined row-allocation rule. Note that this has the same effect as having the nodes randomly exchange encoded rows with each other. Space complexity. One might raise the point that many large-scale datasets are sparse, and this sparsity is lost after encoding, significantly increasing the memory usage. To address this issue, first consider the case where each node has access to the entire dataset (X, y), for the sake of argument. Then a worker node would compute the gradient corresponding to block i using the order of operations represented by the following parenthesization:    gi (wt ) = X > Si> (Si (Xw โˆ’ y)) , since this would only require matrix-vector multiplications. Now, note that for a given block Si , there are only v โˆ’ 1 non-zero rows, out of v(v โˆ’ 1)/2. Therefore, in order to compute gi (wt ) in the above order of operations, one would only need to store the rows of X and y corresponding to these non-zero rows, and then apply the v transformation corresponding to Si whenever needed. If each node is assigned m blocks, this would require v(vโˆ’1) storing at most m sparse rows, which means that the memory usage would only increase by a constant factor (on the order of redundancy factor). 15
7cs.IT
An Effective AHP based Metaheuristic Approach to Solve Supplier Selection Problem Tamal Ghosh1, Tanmoy Chakraborty, Pranab K Dan Department of Industrial Engineering & Management, West Bengal University of Technology. BF 142, Sector 1, Salt Lake City, Kolkata 700064, India. Email: [email protected], [email protected], [email protected]. Abstract The supplier selection problem is based on electing the best supplier from a group of prespecified candidates, is identified as a Multi Criteria Decision Making (MCDM), is proportionately significant in terms of qualitative and quantitative attributes. It is a fundamental issue to achieve a trade-off between such quantifiable and unquantifiable attributes with an aim to accomplish the best solution to the abovementioned problem. This article portrays a metaheuristic based optimization model to solve this NP-Complete problem. Initially the Analytic Hierarchy Process (AHP) is implemented to generate an initial feasible solution of the problem. Thereafter a Simulated Annealing (SA) algorithm is exploited to improve the quality of the obtained solution. The Taguchi robust design method is exploited to solve the critical issues on the subject of the parameter selection of the SA technique. In order to verify the proposed methodology the numerical results are demonstrated based on tangible industry data. Keywords: supplier rating; vendor section; AHP; simulated annealing; metaheuristic; Taguchi method. 1. Introduction Over the decades the supplier selection problem has been dragging the attention of the researchers and practitioners in the vicinity of Supply Chain Management study. Therefore several techniques have been proposed by the academicians and professionals to solve this Multi Criteria Decision Making (MCDM) problem. As Dickson (1966) stated that contemporary firms have the alternatives to select a suitable technique to decipher the complicated job of selecting suppliers. These techniques varies from the adoption of uncomplicated methods such as the selection of the vendor offering lowermost tender to the effective complicated methods which exploit the unquantifiable attributes of the supplier selection problem. Although many empirical studies are already contributed in the proposed area of research, yet the researchers and practitioners are involved in improving the solution methodologies due to the involvement of growing complexities of technology innovation. In manufacturing industry the procurement cost of raw materials from the outside suppliers and the other unquantifiable attributes such as quality of the materials delivered and the time of delivery are substantially crucial and nearly 70% to 80% of the total cost involved in the whole product development phase (Weber, 1 Corresponding Author: Email: [email protected], Phone: +91-33-2334-1014, Fax: +91-33-2334-1031. 1 Current and Benton, 1991). Since the early 1990โ€™s a set of hard to estimate unquantifiable attributes have turned out to be the key components of the supplier selection problem which further helped in developing novel and complicated methodologies (Ellram, 1990). Selecting an optimal set of suppliers on this basis certainly increase the sustainability of the firms in present global competition (Thompson, 1990). Traditionally the supplier selection problem is based on the purchasing cost, quality and delivery functionality of the raw materials. Consideration of the above aspects enhances the complexities of the problem in polynomial time. The selection decision becomes extensively significant for any person-in-charge of the procurement department due to the several different levels of success of the rival suppliers under these stated circumstances (Aissaoui, Haouari and Hassini, 2007). The vendor with the lowermost tender might not be the best in delivering the material of proper quality. In case of the government bodies, the practice of decision-making optimization model in vendor selection processes would be extremely helpful than the private firms. In the government framework, there is a legal need to obey the formal rules and procedures that control vendor selection processes. Therefore such decision models could be immensely supportive in maintaining transparency and doing fair business (Schooner, 2003). It is evident from the past literature that the precise and sophisticated methodologies are urgently required to solve the supplier selection problems (Scott, 1995). For that matter Kanagaraj and Jawahar (2009) have implemented a Simulated Annealing Algorithm (SAA) tool for supplier selection problems to obtain the optimal or near-optimal solutions quickly. Saen (2009) introduced a technique based on Data Envelopment Analysis (DEA) to rank the suppliers in the presence of nondiscretionary factors. An integrated model of Fuzzy-AHP and decision support system was proposed by Gnanasekaran, Velappan and Manimaran (2010) for supplier selection to reduce the cost and enhance the product quality with the help of the ReliabilityBased Total Cost of Ownership (RBTCO) model. This integrates purchasing, maintenance and stoppage costs along with the realistic constraints based on product reliability and weight restraint. Nonlinear Integer Programming (NLIP) is used to develop the mathematical formulation of the RBTCO model. In present article a multiobjective supplier selection problem has been introduced which has incorporated faulty materials and delay in delivery cost as decisive factors. Thereafter a Simulated Annealing (SA) based optimization model is implemented to solve this problem. The initial solution to the SA procedure is generated using Analytic Hierarchy Process (AHP). In order to select the optimal set of parameters to the SA, Taguchiโ€™s Design of Experiments (DOE) technique is exploited. The rest of the article is structured in following manner, section 2 presents a brief literature survey of the proposed area of study, section 3 demonstrates the formulation of the proposed multiobjective problem model, section 4 elaborates the proposed solution methodology and numerical results are depicted in section 5 followed by the managerial implications and conclusion of this research. 2. Literature Survey Li, Fun and Hung (1997) reported that the supplier selection methodologies are practiced to facilitate the selection process which further have a substantial impact on the selection outcomes. Numerous supplier selection methods have been established and categorized over the decades. Petroni and Braglia (2000) proposed linear weighting method using supplier rating based on different attributes which is a faster and inexpensive method to instigate. Although various drawbacks and limitations are also indicated in their study. Cost proportion (Timmerman, 1986) and aggregate cost of proprietorship (Ellram, 1990) based on aggregate cost approaches assemble all the cost components of the supplier selection process in fiscal units which are very flexible methods. These are exact methods and due to the complexities and time involvement these methods are moderately expensive to implement. Mathematical programming approaches primarily exploit the quantifiable factors; these approaches 2 comprise the Principal Component Analysis (PCA) (Petroni and Braglia, 2000) and the Artificial Neural Network (ANN) (Choy, Lee and Low, 2002). Bello (2003) stated in his research that the PCA approach is advantageous in terms of its competency in managing various differing aspects. The ANN approaches are also useful in cost minimization and time reduction. Multiple Attribute Utility Theory method is practiced for global vendor selection problems, in which the surroundings are more complex and uncertain (Zhao and Bross, 2004). Chen, Lin and Huang (2006) demonstrated that the Fuzzy set theory technique controls such situations for supplier performance evaluation. The approach is helpful to the managers to purchase from the suppliers according to their own choice. a fuzzy weighted additive and mixed integer linear programming is developed. The model aggregates weighted membership functions of objectives to construct the relevant decision functions, in which objectives have different relative importance. Ng (2008) proposed a weighted linear program for the supplier selection problem. This paper demonstrates a transformation technique with the mathematical model which can solve the problem without an optimizer. Amid, Ghodsypour and Oโ€™Brien (2009) demonstrated fuzzy multiobjective and additive model to consider the imprecision of information along with the order quantities to each supplier using price breaks. The objective functions used are, minimizing the net cost, rejected items and late deliveries, while satisfying other constraints such as capacity and demand requirement. Authors further stated weighted maxโ€“min model in the similar problem environment (Amid, Ghodsypour and Oโ€™Brien, 2010) with the help of Analytic Hierarchy Process (AHP). The proposed model could be utilized to find out the appropriate order to each supplier. Saen and Zohrehbandian (2008) proposed DEA approach with quantity discount policy to select the best supplier. Wu (2009) stated a hybrid model using data envelopment analysis (DEA), decision trees (DT) and neural networks (NNs) to evaluate supplier performance. The model comprised of two parts. The first part utilized DEA and categorizes the suppliers into several clusters thereafter the second part used the performance-related data of the company to train decision trees and intelligent neuro model, the precised results are obtained. However Saen (2008) stated an approach based on super-efficiency analysis based on DEA to rank the suppliers in presence of volume discounts. Author further proposed another DEA based method to rank the suppliers in the presence of weight limitations and dual-role factors (Saen, 2010). The Analytical Hierarchical Process (AHP) is the most exploited method in supplier selection problems, which is a Multi Criteria Decision Making technique. It is implemented to rank the alternatives when several criteria are believed to be considered and it permits the managers to formulate complicated problems in the form of a hierarchical relationship (Saaty, 1980). The AHP is comparatively straightforward method to practice. This technique integrates tangible and intangible attribute of the problems. A detail survey (Tahriri et al., 2008) of the supplier selection methods portrays that the AHP is the most frequently employed method in supplier selection. The AHP hierarchy typically contains three distinct levels, which are objectives, factors, and alternatives. AHP suggests an way to rank the alternative choices based on the managerโ€™s decisions relating the significance of the criteria. Due to this fact AHP is preferably appropriate for the abovementioned problem. The problem hierarchy provides itself to an analysis based on the impact of a given level on the next higher level (Saaty, 1980). Managerial judgments are stated in terms of the pair-wise comparisons of entries on a specified level of the hierarchy based on their influences on the next higher level. Each of the pair-wise comparisons signifies an approximation of the proportion of the weights of the two criteria being compared. Since AHP exploits a proportionate scale for personal decisions, the relative weights reflect the relative importance of the norms in attaining the objective of the hierarchy (Tam and Tummala, 2001). Yahya and Kingsman (1990) used Saatyโ€™s AHP method to determine primacy in selecting suppliers. The authors employed vendor rating in determining how to allot business and where inadequate progress work is utilized. Akarte (2001); Handfield, Walton and 3 Sroufe (2002); Yu and Jing (2004); Liu and Hai (2005); Rajkumar, Kannan and Jayabalan (2009) also utilized AHP technique in their study as an integral part. Most of the supplier selection literature generally used traditional methods. Traditional techniques are not efficient when the solution state space is large and various constraints cause the vendor selection problem more complicated. Very few articles utilized state-of-the-art methods such as metaheuristics. Recently Arunkumar, Karunamoorthy and Makeshwaraa, (2007); Rezaei and Davoodi (2008); Kubat, and Yuce, (2006); Ding, Benyoucef and Xie (2003) have proposed Genetic Algorithm based metaheuristic approach to solve supplier selection problems in multiobjective environment. This present research introduces an efficient metaheuristic approach based on Simulated Annealing to solve the supplier selection problem. 3. Problem Formulation Supplier selection processes are primarily reliant on the specific objectives being solved with the problem and the relevant constraints related to the objectives. In this article a case of a Leading construction firm of India has been considered to derive the multiobjective optimization model. This firm constructs commercial buildings as well as residential units in large scale such as IT/ITeS SEZ, Shopping malls, hospitality and retail units, logistics and industrial squares etc. Due to the heavy construction approach, this company requires various raw materials such as steel beams, cement, light weight bricks, cast iron etc. The proposed model is articulated considering the constrictions which are managed rationally by this firm to select suppliers. Each raw material supplied by the supplier would have different constraints and characteristics such as percentage of faulty materials supplied, percentage delay in delivery and unit purchasing cost of the materials. Each supplier certainly has its own capacity to supply. The firm has specific requirements of material in certain period. If raw material j is being supplied by supplier k, then the initial procurement cost is defined as, ๐‘€ ๐‘ ๐‘ƒ๐‘ = โˆ‘ โˆ‘ ๐œ‘๐‘—๐‘˜ ๐‘ž๐‘—๐‘˜ (1) ๐‘—=1 ๐‘˜=1 where ฯ†jk is the unit cost of jth material supplied by kth supplier. qjk is the amount of material type j procured by ith supplier. The total substandard delivery is defined as, ๐‘€ ๐‘ ๐‘„๐‘‘ = โˆ‘ โˆ‘ ๐›ฟ๐‘—๐‘˜ ๐‘ž๐‘—๐‘˜ (2) ๐‘—=1 ๐‘˜=1 where ฮดjk is the percentage of faulty items of jth material supplied by kth supplier. qjk is the amount of material type j procured by ith supplier. The total delay in delivery is defined as, 4 ๐‘€ ๐‘ ๐ท๐‘‘ = โˆ‘ โˆ‘ ๐œƒ๐‘—๐‘˜ ๐‘ž๐‘—๐‘˜ (3) ๐‘—=1 ๐‘˜=1 where ฮธjk is the delay percentage in delivery of jth material supplied by kth supplier. qjk is the amount of material type j, procured by ith supplier. In this supplier selection problem three objectives are simultaneously considered, (i) to minimize the total procurement cost, (ii) to minimize the total number of faulty items supplied and (iii) to minimize the total number of delay days in delivery in procuring various raw materials from various suppliers. The quality function (2) demonstrates the number of faulty items supplied by the suppliers. The faulty items are generally detected by the receiving firm while relocating the raw materials to the inventory. The firmโ€™s strategy is to return back the substandard items to the suppliers and request them to replace those items within stipulated time which is substantially one week. Therefore in a project under fixed schedule, supply of substandard material could incur the total cost in terms of one week delay time. Thus the quality function of equation (2) and total delay in delivery of equation (3) could be transformed into a non-compliance cost component using, ๐‘„๐‘ = (7 + ๐ท๐‘‘ ) ร— ๐ถ๐‘‘ (4) Hence the proposed multiobjective model aims in minimizing the total cost function f(x), ๐‘€๐‘–๐‘›๐‘–๐‘š๐‘–๐‘ง๐‘’ ๐‘“(๐‘ฅ) = ๐‘ƒ๐‘ + ๐‘„๐‘ (5) subject to ๐‘ž๐‘—๐‘˜ โ‰ค ๐‘‹๐‘—๐‘˜ (6) โˆ‘ ๐‘ž๐‘—๐‘˜ โ‰ฅ ๐‘Œ๐‘— (7) ๐‘ ๐‘˜=1 where Xjk is the capacity of supplier k while supplying material j Yjk is the demand of material j to the firm in certain period Constraint (6) confirms that each supplier supplies according to its capacity. Constraint (7) confirms that total raw material procured should harmonize the firmโ€™s demand. This proposed multiobjective model is validated using simulated annealing (SA) approach by considering these abovementioned objectives and constraints which further gives the optimal selection results of suppliers. In order to define the SA approach, a quick solution generation method is believed to be identified and the generated feasible solution is assumed to be used as the initial solution to the SA algorithm. Therefore in this research Analytic Hierarchy Process (AHP) is utilized to serve the purpose. The next section would demonstrate the details of the solution methodologies involved in this approach. 5 4. Research Methodology To facilitate the present research work authors have visited an eminent construction firm operating in Kolkata, India. Currently the firm is involved in a big project based on development of an IT/ITeS Special Economic Zone (SEZ) in sector V, Rajarhat, Newtown in Salt Lake City Kolkata. Authors have prepared the questionnaires based on the information gathered from the professionals of the abovementioned firm. On the basis of the experts opinion the AHP analysis has been carried out in this study. The proposed optimization methodology is developed using Simulated Annealing (SA) algorithm to achieve the optimal solutions. The SA algorithm simulates the natural annealing process, where particles of a solid organize themselves into a thermal equilibrium. An introduction to SA can be obtained from the book by Aarts and Korst (1990). The general applications concerns combinatorial optimization problems of the following form where S is a predetermined set of feasible solutions. minxโˆˆS g(x) (8) The algorithm exploits a pre-defined neighbourhood structure on โ€˜Sโ€™. A control parameter called temperature in resemblance to the natural annealing process governs the search behaviour. In each iteration, a neighbour solution y to the current solution x is figured out. If y has an improved objective function value than x, the solution y is accepted, that is, the current solution x is swapped by y. Alternatively if y does not attain a better objective function value than x, the solution y is only recognized with a specific probability depending on (i) the difference of the objective function values in x and y, and (ii) the temperature parameter. The pseudocode below exhibits the general SA method. Pseudocode (SA) initialize; repeat generate a candidate solution; evaluate the candidate; determine the current solution; reduce the temperature; until termination condition is met; In this article, factors which affect the decision makersโ€™ strength are analysed. The process follows these steps, ๏ƒ˜ Using the AHP method, the weight of the factors are obtained from qualitative expressions and each supplierโ€™s weight is also achieved and final composite criteria weights are determined by AHP. This further rank the suppliers according to their composite scores. Therefore according to the ranks the suppliers could be selected. ๏ƒ˜ Simulated Annealing (SA) takes the ranks obtained from previous step and attempts to search for optimal set of suppliers based on the objectives defined in section 3. 4.1. Initial Solution Generation In this article AHP is exploited to select initial set of suppliers. This solution is an initial feasible solution to the SA method based optimization model. 6 4.2. Analytical Hierarchy Process (AHP) The AHP is a multi-criteria decision technique that exploits hierarchical relationships to represent a problem. Primacies for substitutes are acquired based on the opinion of the experts (Saaty, 1980). The method consists of several important steps: outlining the shapeless problem into shape, obtaining the AHP hierarchical relationships, forming pairwise comparison matrices, approximating the relative weights, examining the consistency and finally attaining the overall ranking (Lee, Chen and Chang, 2008). AHP can empower managers to represent the interface of several factors in complicated and shapeless circumstances. The technique is based on the pairwise comparison of decision variables with respect to the factors or substitutes. A pairwise comparison matrix is obtained of size nร—n, where n is the number of criteria to be compared. The AHP method is adopted in this article is stated as, Step 1: The hierarchical relationship of the problem is obtained and presented in Figure 1. The proposed AHP method decomposes the problem into three levels (Saaty, 1980): (i)The first level demonstrates the main objective: the selection of suppliers, the second level depicts the criteria and the last level reports the six suppliers to be compared. Figure 1. Hierarchical relationship of the supplier selection problem Step 2: Calculation of the pairwise comparison matrix for each level is required. For the pairwise comparison, a ranking scale is used for the criteria evaluation (Saaty, 1980). The scale is a crisp scale ranging from 1 to 9, as presented in Table 1. This scale values are assigned to the criteria based on the experts opinion of the AHP questionnaire sheet prepared by the authors. The pairwise comparison matrix for all the criteria is presented in Table 2. The last column of table 2 depicts the overall importance of the criteria over each other. The AHP procedure is presented as, Consider [Ax = ฮปmaxx] where A is the comparison matrix of size nร—n, for n criteria. x is the Eigenvector of size nร—1 ฮปmax is the Eigenvalue, ฮปmax ๏ƒŽ๏ƒ‚ > n. To find the ranking of priorities, namely the Eigen Vector X: 1. 1.1. 1.2. 1.3. Initialization: Take the squared power of matrix A, i.e., A2=Aร—A Find the row sums of A2 and normalize this array to find E0. Set A:=A2 7 2. 2.1. 2.2. 2.3. 2.4. 2.5. 2.6. Main: Take the squared power of matrix A, i.e., A2=Aร—A Find the row sums of A2 and normalize this array to find E1. Find D= E1 - E0. If the elements of D are close to zero, then X= E1 else set A:=A2 , set E0:=E1 and go to Step 2.1. STOP. Table 1. Saatyโ€™s 9 point scale Importance Value 1 3 5 7 9 2, 4, 6, 8 Definition Equal Strong Moderate Strong Fairly Strong Very Strong Absolute Strong Intermediate Values Description Two factors are equally Contributing to objective One factor is marginally superior over other One factor is strongly superior over other One factor is very stongly superior over other The highest level of superiority of one factor over other According to the negotiation required Table 2. Comparison matrix of main attributes Cost Quality Delivery Cost 1 5 9 Quality 1/5 1 3 Delivery 1/9 1/3 1 Relative Weight (PV) 0.062941 0.265433 0.671625 Table 3 to Table 5 present the pairwise comparison matrices of the suppliers with each of the criteria selected in this research. The last columns of pairwise matrices present the calculated relative weights of the suppliers over each other. Table 3. Pairwise comparison matrix of suppliers with respect to cost S1 S2 S3 S4 S5 S1 1 1/3 1/2 1/7 1/6 S2 3 1 2 1/5 1/4 S3 2 1/2 1 1/3 1/3 S4 7 5 4 1 2 S5 6 4 3 1/2 1 S6 5 3 2 1/4 1/3 Relative Weight 0.40201 0.18549 0.21024 0.03831 0.05611 S6 1/5 1/3 1/2 4 3 1 0.10786 Table 4. Pairwise comparison matrix of suppliers with respect to quality S1 S2 S3 S4 S5 S6 S1 1 1/3 1/5 3 1/7 1/8 S2 3 1 1/4 4 1/5 1/7 S3 5 4 1 5 1/3 1/4 S4 1/3 1/4 1/5 1 1/8 1/9 S5 7 5 3 8 1 1/3 S6 8 7 4 9 3 1 Relative Weight 0.26949 0.15914 0.07354 0.43202 0.04087 0.02493 8 Table 5. Pairwise comparison matrix of suppliers with respect to delivery S1 S2 S3 S4 S5 S6 S1 1 1/5 1/2 3 1/6 1/7 S2 5 1 1/2 4 1/3 1/4 S3 2 2 1 5 1/3 1/5 S4 1/3 1/4 1/5 1 1/7 1/9 S5 6 3 3 7 1 1/4 S6 7 4 5 9 4 1 Relative Weight O.26324 0.11631 0.10426 0.43627 0.05268 0.02723 The overall rating of each supplier is computed by adding the product of the relative weight of each criterion and the relative weights of the suppliers considering the corresponding criteria (Table 6). Table 6 demonstrates that supplier 4 (overall ranking is 1 and composite score is 0.4099) is the best supplier followed by supplier 1, 2, 3, 5 and 6. 4.3 Computation of consistency index and consistency ratio AHP procedure requires the computation of consistency ratio to ensure the precision of the obtained solution. The consistency index (CI) of pairwise comparison matrix is calculated using, ๐ถ๐ผ = ๐œ†๐‘š๐‘Ž๐‘ฅ โˆ’ ๐‘› ๐‘›โˆ’1 (9) and the random consistency index (RI) is computed as, ๐‘…๐ผ = 1.98 ๐‘›โˆ’2 ๐‘› (10) where ฮปmax is the maximum eigenvalue and n is the size of pairwise comparison matrix. Thus the consistency ratio (CR) is obtained using, ๐ถ๐ผ ๐ถ๐‘… = (11) ๐‘…๐ผ CI and CR are computed to understand the consistency of the solution obtained. In general CI and CR are believed to be < 0.1. Table 7 provides the computed values of the CI and CR for all the pairwise comparison matrices. All the computed values are < 0.1. Therefore the computed results are acceptable. Table 6. Composite score matrix from above four matrices S1 S2 S3 S4 S5 S6 Cost (PV=0.0629) 0.402014 0.18549 0.210246 0.0383076 0.0561086 0.107865 Quality (PV=0.2654) 0.26949 0.159145 0.0735405 0.432023 0.0408689 0.0249321 Delivery (PV=0.6716) 0.263243 0.11631 0.104265 0.436267 0.0526848 0.0272297 Composite Score (Rank) 0.2733 (2) 0.1319 (3) 0.1026 (4) 0.4099 (1) 0.0496 (5) 0.0315 (6) Table 7. CI, RI, CR values for all the pairwise comparison matrices CI RI CR Cost 0.055157 1.32 0.0417 Quality 0.0944284 1.32 0.07153 Delivery 0.095729 1.32 0.07252 Between criteria 0.0145319 0.66 0.022 9 4.4. Fitness function of SA procedure SA procedure examines the fitness score of each solution generated in the solution neighbourhood. Fitness calculation is one of the most significant steps of the metaheuristic method because it decides which solution is to be stored and which one is to be eliminated. The multiobjective function f(x) is required to compute the fitness score. In order to facilitate the computation, the f(x) is transformed into F(x) and expressed in equation (12). Two weights weight1 and weight2 are also assigned in the equation. It is considered that weight1+weight2=1. ๐น(๐‘ฅ) = ๐‘ก๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘๐‘œ๐‘ ๐‘ก ๐‘ก๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘๐‘œ๐‘ ๐‘ก + ๐‘ž๐‘ข๐‘Ž๐‘™๐‘–๐‘ก๐‘ฆ ๐‘๐‘œ๐‘ ๐‘ก ร— ๐‘ค๐‘’๐‘–๐‘”โ„Ž๐‘ก1 + ๐‘ก๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘๐‘œ๐‘ ๐‘ก ๐‘ก๐‘œ๐‘ก๐‘Ž๐‘™ ๐‘๐‘œ๐‘ ๐‘ก + ๐‘‘๐‘’๐‘™๐‘Ž๐‘ฆ ๐‘๐‘œ๐‘ ๐‘ก ร— ๐‘ค๐‘’๐‘–๐‘”โ„Ž๐‘ก2 (12) where total cost is computed by summing up total procurement cost and non-compliance cost. Since the firm gives more importance to the delivery issues rather than the quality or cost issues, thus Weight1 and weight2, are assigned with prefixed values of 0.3 and 0.7 respectively. The Proposed Simulated Annealing Algorithm This subsection describes the proposed SA algorithm in depth. The initial input is a solution string which is generated from AHP technique. Therefore the initial input string S0 which is obtained from Table 6 using the ranks of the suppliers, S0 = [2, 3, 4, 1, 5, 6] The size of the solution string is 6 which is the total number of suppliers to be evaluated. Each bit of the string represents the rank of the corresponding supplier (string index). Therefore S0 states supplier 1 to 6 retain the ranks 2, 3, 4, 1, 5 and 6 respectively. Thereafter this multiobjective SA procedure is set to maximize F(x) of equation (12). Some symbolizations used in the algorithm are introduced as, Scur ๏€ข current solution Si๏€ข neighbourhood solution Sbest๏€ข best solution found so far Tinit ๏€ข initial temperature Tfinal ๏€ข freezing temperature T ๏€ข current temperature ฮฑ ๏€ข temperature reducing factor M ๏€ข Markov chain length iter ๏€ข iteration number fi ๏€ข current fitness value fbest ๏€ข best fitness value The steps of the proposed algorithm can be summarized as follows. Step 1. Obtain an initial solution S0 by using Analytic Hierarchy Process method Step 2. Evaluate S0 and Calculate corresponding fitness value F0; F0 = F(S0) Step 3. Set Fbest= F0, Set Sbest = S0= Scur. Step 4. Initialize SA Heuristic and its parameters: Tinit, Tfinal, ฮฑ, M, iter = 0, count=0, count1=0. Step 5. If count < M, then repeat Steps 5.1 to 5.9. Step 5.1. Generate a new supplier rank configuration neighbourhood searching by performing exchange-move (randomly selecting two suppliers and interchanging their ranks). Step 5.2. Read suppliers rank configuration from above steps and generate corresponding neighbourhood solution Si. Step 5.3. If F(Si) > Fbest, then Sbest = Si, Scur = Si, count = count + 1, go to Step 5. 10 Step 5.4. If F(Si) = Fbest, then S = Si, count1= count1 + 1, count = count + 1, go to Step 5. Step 5.5. Compute ฮด = F(Si)- F(Scur). Obtain a random variable r in the range of U(0,1). Step 5.6. If eฮด/T > r, Step 5.7. set Scur = Si, Step 5.8. count1= 0; Step 5.9. else count1 = count1 + 1. Step 5.10. iter = iter + 1. Step 5.11. until freezing temperature (Tfinal) is reached; Step 5.12. reduce the temperature using Ti = ฮฑร—Ti-1 function; The SA procedure is repetitively employed until a solution is achieved which attains the highest fitness score. All the parameters and counters are initialized in step 4. A special move, namely exchange-move, is utilized in the proposed algorithm to guide the solution searching procedure. It is spotted that exchange-move ordinarily leads to the improved solutions effortlessly and competently which is practiced as a principle component for finding better neighbourhood solution in step 5.1. The algorithm also verifies the number of instances when neighbourhood solutions become static. If this number attains a pre-fixed constant value, the fitness value of current configuration is compared to the optimal solution obtained thus far to conclude whether to prolong the iterations or stop with the best solution achieved. 5. Experiments and Verifications In order to apply the proposed SA algorithm as a solution methodology the effects of changing the values of the various parameters are studied. Determining the optimal set of parameters are crucial in this respect. Therefore in this article Taguchiโ€™s robust design method (Taguchi, 1994) is employed to determine the optimal parameters set. 5.1 Taguchi Method for Parameters Selection The parameters are Initial temperature (Tinit), temperature reducing factor (ฮฑ) and Markov chain length (M) (final temperature (Tfinal) is taken as constant value = -โˆž) and termed as factors, and each factor has three discrete levels (Table 8). Hence an L9 orthogonal array is used, and this recommends that 9 sets of Taguchi experiments are prerequisite and the results are evaluated by using an analysis of variance (ANOVA) technique. The parameter settings for each experiment are shown in Table 9. Table 8. Levels of parameters tested levels Parameters M ฮฑ Tinit 20 0.75 10 1 30 0.85 20 2 40 0.95 30 3 Table 10 presents the results of the corresponding ANOVA analysis with Signal-to-Noise ratio (Larger-the-better). In Table 10, the variance ratios (F ratios) of the factors are determined. A test of significance at 95% confidence level is employed to spot the significance of these factors. The P values of the factors Tinit , ฮฑ, M are investigated and all the values of the parameters are seen to be less than the critical level with degrees of freedom at (2, 8). This suggests that all the parameters are significant factors in the proposed approach. The response table (Table 11) depicts the average of each response characteristic for each level of each of the factors. Table 11 include the ranks based on Delta (ฮด) statistic, which compares the relative magnitude of effects. Ranks are assigned based on ฮด values. Using the level averages in the response table optimal set of levels of the factors could be determined which yields the best result. 11 Table 9. The Experimental Settings of the Taguchi Experiments Experiments 1 2 3 4 5 6 7 8 9 Tinit 10 10 10 20 20 20 30 30 30 ฮฑ 0.75 0.85 0.95 0.75 0.85 0.95 0.75 0.85 0.95 M 20 30 40 30 40 20 40 20 30 responses 0.962364 0.923400 0.945652 0.956225 0.945652 0.932652 0.947348 0.962652 0.959657 Table 10. ANOVA table Factors Tinit ฮฑ M Residual Error Total Degrees of Freedom 2 2 2 2 8 Factor Sum of squares 0.000301 0.000222 0.000078 0.000875 0.001475 Mean Square (Variance) F Ratio 0.000150 0.34 0.000111 0.25 0.000039 0.09 0.000438 P Value 0.744 0.798 0.918 The ranks indicate that Initial temperature (Tinit) has the greatest influence followed by temperature reducing factor (ฮฑ) and Markov chain length (M). Each factor level should be fixed in such a way that the highest response could be achieved. Table 11 and the main effects plot of Figure 2 show that the optimal solution is obtained when Tinit, ฮฑ and M are set to 30, 0.75 and 20 respectively. Table 11. Response table Levels 1 2 3 ฮด Rank Tinit 0.9438 0.9448 0.9566 0.0127 1 ฮฑ 0.9553 0.9439 0.9460 0.0114 2 M 0.9526 0.9464 0.9462 0.0063 3 5.2 Convergence Analysis Convergence analysis of the SA procedure is quite simple for the supplier selection problem. The convergence curve during iterations of the proposed metaheuristic technique is presented in Figure 3. For the first iteration the fitness score attained a value of 0.9622. Since the SA procedure is designed to maximize the fitness function with the iteration counts therefore at 4th iteration it attained the value of 0.9633, an increase of 0.1% which is the final optimal solution. Based on the experimentation reported in this article, it is observed that the fitness score is increased with the iteration counts till it reaches the best fitness score at some iteration and thereafter the fitness score continues to remain constant even if the number of iterations is increased. Therefore the convergence property is established. For the test problem in hand the proposed approach is executed for 63 iterations and took 1.9281 CPU seconds to attain the best solution which proves its computational efficiency. 12 Figure 2. Main effects plot Figure 3. Convergence curve of SA algorithm 5.3 Computational Results Data for six vendors are collected from the construction firm for a periodic demand of 600 metric ton TMT steel bar and depicted in Table 12. The strategy of the procurement department is to distribute the order among the best three vendors to avoid the biasness. Each supplier has certain capacity to supply materials as given in table 12. Each supplier supply faulty materials according to the percentage of defective items calculated and each of them supply according to their own pace and the percentages of delays in delivery are also provided in the table 12 for each supplier. The firmโ€™s project schedule is moderately rigid and therefore delay in delivery incurs the overall cost of the project. Delay cost is calculated by the experts of the firm, which is closely 2.5 Lacs INR per day. The cost incurs due to substandard supply are generally converted into delay cost as stated by the firmโ€™s manager and calculated using the first component of equation (4). The AHP method depicts that supplier 4, 1, 2 are the best three suppliers. The total procurement cost is obtained for these three vendors are outlined in Table 13. Thereafter the SA procedure is executed and different result is obtained which states that supplier 3, 1, 4 are the best. The total procurement cost computed for SA method is found to be less than the AHP result and shown in Table 13. Although total faulty materials supplied and total delay days are almost identical for both the methods but the SA method attains closely 0.3% better solution than that of the AHP method. In monetary term SA recovers 1.25 Lacs INR for the firm. This observation indicates that the SA technique is efficient and less complex because of its simplicity in simulation. The solution is obtained with negligible 13 computational time (< 2 seconds). Thus the proposed SA method is shown to outperform the AHP technique. Table 12. Collected vendor details data from the firm Vendors v1 v2 v3 v4 v5 v6 max order quantity (metric ton) 150 300 250 200 750 450 unit cost (INR)/kg 58.75 62 61.5 65 64.5 63.5 Percent defective/metric ton 3.2 3.8 4.5 2 5.7 6.2 percent delay delivery 2.28 2.92 3.12 1.16 3.29 4.5 Table 13. Comparison of SA result with AHP result AHP result SA result vendor v4 v1 v2 order 200 150 250 600 defective 4 5 10 19 late delivery 3 4 8 15 quality cost delay cost Total procurement Cost cost (INR) 13000000 8812500 15500000 37312500 1750000 3750000 43812500 vendor v3 v1 v4 order 250 150 200 600 defective 11 5 4 20 late delivery 8 4 3 15 quality cost delay cost Total procurement Cost cost (INR) 15375000 8812500 13000000 37187500 1750000 3750000 43687500 6. Managerial Implications The study accomplished in this research has significant managerial implications. The soft computing approach proposed in this article can be exploited as a critical managerial decision making tool. This is beneficial in optimizing the vendor network, successful resource allocation for vendor improvement curriculums. In optimizing the vendor network, managers can employ the method to choose vendors without having any biasness for any particular vendor. This further reduces the chance of failure in supplier network. By doing this it would help every supplier to grow evenly. The management of the firm can deliver these suppliers with possible standards for enhancement and target time could be anticipated in complementing them. Another managerial insight of this study affirms that, an already recognized supplier selection methodology (AHP) may not be the best methodology and other state-of-the-art techniques (metaheuristics) can substantially attain better solution and maximize the profit of the firm which is the firmsโ€™ main objective. 14 7. Conclusions This article portrays a novel SA based metaheuristic algorithm to select the supplier for a particular Indian firm which is an NP-complete problem in nature. The problem is formulated using multiobjective mathematical model which reflects the essential optimization criteria of this research. The initial feasible solution to the proposed SA based technique is obtained using AHP technique in order to quicken the computation. This work further exploits Taguchiโ€™s robust design approach to select optimal set of parameters to SA algorithm which is crucial in influencing the performance of the technique. The uniqueness of this work lies in practicing two different decision making techniques in solving this MCDM problem model. In past literature such metaheuristic approach to evaluate and enhance the AHP ranking of vendors has never been carried out. To perform the said analysis authors have collected industrial data from a national construction firm. Computational results presented in Section 5 demonstrate that the SA method outperforms the AHP technique performing better than the AHP method for the supplier selection problem. The proposed SA procedure produces nearly 0.3% improved solution. This work is an experimental study which considered the main criteria of the problem such as cost, delivery and delay. However many other intricate sub-criteria could also be considered to make this work more realistic. Future work can be accomplished by utilizing this technique in more complex supplier selection problems incorporating more conflicting criteria and sub-criteria by considering risk factors or suppliers profiles and other related issues and that is the possible extension of this research. Acknowledgement The authors are grateful to the anonymous reviewers for their valuable comments and suggestions in improving the quality of the paper. References Aarts, E., and Korst, J. (1990) Simulated Annealing and the Boltzmann Machine, John Wiley & Sons, New York, USA. Aissaoui, N., Haouari, M., and Hassini, E. (2007) โ€˜Supplier selection and order lot sizing modeling: A reviewโ€™, Computers & Operations Research, Vol. 34, No. 12, pp. 3516-3540. Akarte, M.M. (2001) โ€˜Web based casting supplier evaluation using analytic hierarchy processโ€™, Journal of the Operational Research Society, Vol. 52, No. 5, pp. 511-522. Amid, A. Ghodsypour, S.H., and Oโ€™Brien, C. (2009) โ€˜A weighted additive fuzzy multiobjective model for the supplier selection problem under price breaks in a supply Chainโ€™, International Journal of Production Economics, Vol. 121, No. 2, pp. 323-332. Amid, A. Ghodsypour, S.H., and Oโ€™Brien, C. (2010) โ€˜A weighted maxโ€“min model for fuzzy multiobjective supplier selection in a supply chainโ€™, International Journal of Production Economics, doi:10.1016/j.ijpe.2010.04.044 (article in press). Arunkumar, N., Karunamoorthy, L., and Makeshwaraa, N.U. (2007) An optimization technique for vendor selection with quantity discounts using genetic algorithmโ€™, Journal of Industrial Engineering International, Vol. 3, No. 4, pp. 1-13. Bello, M.J.S. (2003) A case study approach to the supplier selection process, M.Sc. thesis, submitted to University of the Puerto Rico Mayaguez. Zhao, G., and Bross, M.E. (2004) Supplier selection process in emerging markets - The Case Study of Volvo Bus Corporation in China, M.Sc. thesis, submitted to Gรถteborg University, Sweden. Chen, C.T., Lin, C.T., and Huang, S.F. (2006) โ€˜A fuzzy approach for supplier evaluation and selection in supply chain managementโ€™, International Journal of Production Economics, Vol. 102, No. 2, pp. 289โ€“301. 15 Choy, K.L., Lee, W.B., and Lo, V. (2002) โ€˜An intelligent supplier management tool for benchmarking suppliers in outsource manufacturingโ€™, Expert Systems with Applications, Vol. 22, No, 3, pp. 213224. Dickson, G.W. (1966) โ€˜An Analysis of Vendor Selection: Systems and Decisionsโ€™, Journal of Purchasing, Vol. 1, No. 2, pp. 5-17. Ding, H., Benyoucef, L., and Xie, X. (2003) โ€˜A simulation-optimization approach using genetic search for supplier selectionโ€™, Proceedings of the 2003 Winter Simulation Conference, pp. 12601267. Ellram, L.M. (1990) โ€˜The Supplier Selection Decision in Strategic Partnershipsโ€™, Journal of Purchasing and Materials Management, Vol. 26, No. 4, pp. 8-14. Gnanasekaran, S., Velappan S., and Manimaran, P. (2010) โ€˜An integrated model for supplier selection using fuzzy analytical hierarchy process: a steel plant case studyโ€™, International Journal of Procurement Management, Vol. 3, No. 3, pp. 292-315. Handfield, R., Walton, S.V., and Sroufe, R. (2002) โ€˜Applying environmental criteria to supplier assessment: A study in the application of the Analytical Hierarchy Processโ€™, European Journal of Operational Research, Vol. 141, No. 1, pp. 70-87. Kanagaraj, G., and Jawahar, N. (2009) โ€˜A simulated annealing algorithm for optimal supplier selection using the reliability-based total cost of ownership modelโ€™, International Journal of Procurement Management, Vol. 2, No. 3, pp. 244-266. Kubat, C., and Yuce, B. (2006) โ€˜Supplier Selection with Genetic Algorithm and Fuzzy AHPโ€™, Proceedings of 5th International Symposium on Intelligent Manufacturing Systems, pp. 13821401. Lee, A.H.I, Chen, W.C., and Chang, C. J. (2008) โ€˜A fuzzy AHP and BSC approach for evaluating performance of IT department in the manufacturing industry in Taiwanโ€™, Expert Systems with Applications, Vol. 34, No. 1, pp. 96-107. Li, C.C., Fun, Y.P., and Hung, J.S. (1997) โ€˜A new measure for supplier performance evaluationโ€™, IIE Transactions, Vol. 29, No. 9, pp. 753-758. Liu, F.H.F., and Hai, H.L. (2005) โ€˜The voting analytic hierarchy process method for selecting supplierโ€™, International Journal of Production Economics, Vol. 97, No. 3, pp. 308-317. Ng, W.L. (2008) โ€˜An efficient and simple model for multiple criteria supplier selection problemโ€™, European Journal of Operational Research, Vol. 186, No. 3, pp. 1059โ€“1067. Petroni, A., and Braglia, M. (2000) โ€˜Vendor selection using principal component analysisโ€™, Journal of Supply Chain Management, Vol. 36, No. 2, pp. 63-69. Rajkumar, C.J., Kannan, S.M., Jayabalan, V. (2009) โ€˜Multicriteria-based customer-focused vendor selection through the analytic hierarchy processโ€™, International Journal of Procurement Management, Vol. 2, No. 2, pp. 143-162. Rezaei, J., and Davoodi, M. (2008) โ€˜A deterministic, multi-item inventory model with supplier selection and imperfect qualityโ€™, Applied Mathematical Modelling, Vol. 32, No. 10, pp. 2106โ€“ 2116. Saaty, T.L. (1980) The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation. New York: McGraw-Hill. Saen, R.F. (2008) โ€˜Using super-efficiency analysis for ranking suppliers in the presence of volume discount offersโ€™, International Journal of Physical Distribution & Logistics Management, Vol. 38, No. 8, pp. 637-651. Saen, R.F., and Zohrehbandian, M. (2008) โ€˜A data envelopment analysis approach to supplier selection in volume discount environmentsโ€™, International Journal of Procurement Management, Vol. 1, No. 4, pp. 472-488. Saen, R.F. (2009) โ€˜Using data envelopment analysis for ranking suppliers in the presence of nondiscretionary factorsโ€™, International Journal of Procurement Management, Vol. 2, No. 3, pp. 229-243. Saen, R.F. (2010) โ€˜Restricting weights in supplier selection decisions in the presence of dual-role factorsโ€™, Applied Mathematical Modelling, Vol. 34, No. 10, pp. 2820โ€“2830. Schooner, S. (2003) โ€˜Commercial Purchasing: The Chasm between the United State Governmentโ€™s Evolving Policy and Practiceโ€™, In: Arrowsmith, S., and Trybus, M. (Eds.), Public Procurement: The Continuing Revolution, (pp. 137-169), Kluwer Law International, The Hague. 16 Scott, S. (1995) โ€˜Best Value Contracts: Lessons Learned in Paving the Road to Qualityโ€™, National Contract Management Journal, Vol. 26, No. 2, pp. 1-11. Taguchi, G. (1994) โ€˜Taguchi on Robust Technology Development: Bringing Quality Engineering Upstreamโ€™, Journal of Electronic Packaging, Vol. 116, No. 2, pp. 161. Tahriri, F., Osman, M.R., Ali, A., and Yusuff, R.M. (2008) โ€˜A Review of Supplier Selection Methods in Manufacturing Industriesโ€™, Suranaree Journal of Science and Technology, Vol. 15, No. 3, pp. 201-208. Tam, M.C.Y, and Tummala, V.M.R. (2001) โ€˜An application of the AHP in vendor selection of a telecommunications systemโ€™, Omega, Vol. 29, No. 2, pp. 171-182. Thompson K.N. (1990) โ€˜Vendor Profile Analysisโ€™, Journal of Purchasing and Materials Management, Vol. 26, No. 1, pp. 11-18. Timmerman, M. (1986) โ€˜An approach to vendor performance evaluationโ€™, Engineering Management Review, IEEE, Vol. 15, No. 3, pp. 14-20. Weber C., Current, J.R., and Benton, W.C. (1991) โ€˜Vendor Selection Criteria and Methodsโ€™, European Journal of Operational Research, Vol. 50, No. 1, pp. 2-18. Wu, D. (2009) โ€˜Supplier selection: A hybrid model using DEA, decision tree and neural networkโ€™, Expert Systems with Applications, Vol. 36, No. 5, pp. 9105โ€“9112. Yahya, S., and Kingsman, B. (1999) โ€˜Vendor rating for an entrepreneur development programme: a case study using the analytic hierarchy process methodโ€™, Journal of the Operational Research Society, Vol. 50, No. 5, pp. 916-930. Yu, X., and Jing. S. (2004) โ€˜A Decision Model for Supplier Selection Considering Trustโ€™, Chinese Business Review, Vol. 3, No. 6, pp. 15-20. 17
9cs.NE
TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS arXiv:1412.7611v3 [math.NT] 23 Aug 2016 JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N A BSTRACT. We show that the absolute Galois group of any field has the vanishing triple Massey product property. Several corollaries for the structure of maximal pro-p-quotient of absolute Galois groups are deduced. Furthermore, the vanishing of some higher Massey products is proved. 1. I NTRODUCTION Let F be a field and Fs a separable closure of F. The Galois group GF := Gal( Fs /F) is called the absolute Galois group of F. Every such Galois group is a profinite group. One may ask what special properties absolute Galois groups have among all profinite groups. This is a difficult problem, and at this moment only few properties have been found. However those discovered properties are of great interest and considerable depth. In the classical papers [AS1, AS2] published in 1927, E. Artin and O. Schreier developed a theory of real fields, and they showed in particular that the only non-trivial finite subgroups of absolute Galois groups are groups of order 2. More recently, in some remarkable work M. Rost and V. Voevodsky proved the Bloch-Kato conjecture, thereby establishing a very special property of Galois cohomology of absolute Galois groups. Relatively recently, two new conjectures, the Vanishing n-Massey Conjecture and the Kernel n-Unipotent Conjecture were proposed ( see [MT1] and [MT2]). These conjectures are based on a number of previous considerations. One motivation is coming from topological considerations. (See [DGMS] and [HW].) Another motivation is a program to describe various n-central series of absolute Galois groups as kernels of simple Galois representations. (See [Ef, EM1, EM2, MSp, Vi].) In this paper we shall consider only the special case of the Vanishing n-Massey Conjecture when n = 3 with the exception of Section 5 when we consider n > 3 as well. In the papers [MT1, MT2], the Vanishing n-Massey Conjecture was formulated only in the case when the base field F contains a primitive p-th root of unity. In this paper we consider a stronger version of this conjecture when there is no condition on the field F. For the sake of simplicity we shall recall below the definition of n-Massey products only in the case n = 3, and we refer the reader to [MT1, Sections 2 and 3] for the more general case. See [MT1, Definition 3.3] for a definition of the vanishing n-fold Massey product JM is partially supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) grant R0370A01. NDT is partially supported by the National Foundation for Science and Technology Development (NAFOSTED) grant 101.04-2014.34. 1 2 JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N property. Also see Section 5 for reviews of some basic definitions and facts related to n-fold Massey products. Conjecture 1.1 (Vanishing n-Massey Conjecture). Let p be a prime number and n โ‰ฅ 3 an integer. Let F be a field. Then the absolute Galois group GF of F has the vanishing n-fold Massey product property with respect to F p . In this paper we show that the conjecture is true when n = 3. We will use the word โ€œtripleโ€ instead of โ€œ3-foldโ€. Theorem 1.2 (= Theorem 4.15). Let F be any field and p a prime number. Then the absolute Galois group GF of F has the vanishing triple Massey product property with respect to F p Below, we briefly recall the definition of triple Massey products and the corresponding vanishing property. Let G be a profinite group and p a prime number. We consider the finite field F p as a trivial discrete G-module. Let C โ€ข = (Cโ€ข (G, F p ), โˆ‚, โˆช) be the differential graded algebra of inhomogeneous continuous cochains of G with coefficients in F p (see [NSW, Ch. I, ยง2] and [MT1, Section 3]). We write H i (G, F p ) for the corresponding cohomology groups. We denote by Z1 (G, F p ) the subgroup of C1 (G, F p ) consisting of all 1-cocycles. Because we use trivial action on the coefficients F p , we have Z1 (G, F p ) = H 1 (G, F p ) = Hom(G, F p ). Let ฯ‡1 , ฯ‡2 , ฯ‡3 be elements in H 1 (G, F p ). Assume that ฯ‡1 โˆช ฯ‡2 = ฯ‡2 โˆช ฯ‡3 = 0 โˆˆ H 2 (G, F p ). In this case we say that the triple Massey product hฯ‡1 , ฯ‡2 , ฯ‡3 i is defined. Then there exist cochains D12 and D23 in C1 (G, F p ) such that โˆ‚D12 = ฯ‡1 โˆช ฯ‡2 and โˆ‚D23 = ฯ‡2 โˆช ฯ‡3 in C2 (G, F p ). Then we say that D := {ฯ‡1 , ฯ‡2 , ฯ‡3 , D12 , D23 } (or sometimes for simplicity { D12 , D23 }) is a defining system for the triple Massey product hฯ‡1 , ฯ‡2 , ฯ‡3 i. Observe that โˆ‚(ฯ‡1 โˆช D23 + D12 โˆช ฯ‡3 ) = 0, hence ฯ‡1 โˆช D23 + D12 โˆช ฯ‡3 is a 2-cocycle. We define the value hฯ‡1 , ฯ‡2 , ฯ‡3 iD of the triple Massey product hฯ‡1 , ฯ‡2 , ฯ‡3 i with respect to the defining system D to be the cohomology class of ฯ‡1 โˆช D23 + ฯ‡3 โˆช D12 in H 2 (G, F p ). The set of all values hฯ‡1 , ฯ‡2 , ฯ‡3 iD when D runs over the set of all defining systems, is called the triple Massey product hฯ‡1 , ฯ‡2 , ฯ‡3 i โІ H 2 (G, F p ). If 0 โˆˆ hฯ‡1 , ฯ‡2 , ฯ‡3 i, then we say that our triple Massey product vanishes. Definition 1.3. We say that G has the vanishing triple Massey product property (with respect to F p ) if every triple Massey product hฯ‡1 , ฯ‡2 , ฯ‡3 i, where ฯ‡1 , ฯ‡2 , ฯ‡3 โˆˆ H 1 (G, F p ), vanishes whenever it is defined. The Vanishing 3-Massey Conjecture then claims that for any field F and any prime p, the absolute Galois group GF has the vanishing triple Massey product property. It was proved by M. Hopkins and K. Wickelgren in [HW] that if F is a global field of characteristic not 2 and p = 2, then GF has the vanishing triple Massey product property. In TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 3 [MT1] it was proved that the result of [HW] is valid for any field F. In [MT3] it was proved that GF has the vanishing triple Massey product property with respect to F p for any global field F containing a primitive p-th root of unity. In [EMa1], I. Efrat and E. Matzri provided alternative proofs for the above mentioned results in [MT1] and [MT3]. In [Ma], E. Matzri proved that for any prime p and for any field F containing a primitive p-th root of unity, GF has the vanishing triple Massey product property. In this paper we shall provide a cohomological proof to the main result in [Ma] (see Theorem 4.10). We also remove the assumption that F contains a primitive p-th root of unity (see Theorem 4.15). Thus every absolute Galois group has the vanishing triple Massey product property. This is a fundamental new restriction on absolute Galois groups. See Subsection 4.3 for some significant consequences on the structure of quotients of absolute Galois groups. Indeed in Subsection 4.3 we are able to describe some strong restrictions on the shape of relations in Zassenhaus filtration S(2) modulo S(4) for any maximal pro-p-quotient of any absolute Galois group GF . This shape of relations excludes the possibility of certain triple commutators occurring in these relations. These are new significant restrictions on the shape of relations in canonical quotients of absolute Galois groups. This description of relations in S(2) modulo S(4) appears to be close to an optimal description. The structure of our paper is as follows. In Section 2 we recall basic material on the cohomology of bicyclic groups. In Section 3 we discuss Heisenberg extensions. In Section 4, by using the material developed in Sections 2 and 3, we provide an alternative cohomological proof of the main result of [Ma] on the vanishing of triple Massey products with respect to F p when F contains a primitive p-th root of unity. Before we received a very nice preprint [Ma] from E. Matzri, we planned to make such a proof but we completed this proof only after we received his preprint. We also want to notice that by referring directly to some results in [Ti] (see Remark 4.6 for a brief explanation), one can avoid using material in Section 2. However we think that Section 2 might be of independent interest. E.Matzri used in his work tools from the theory of central simple algebras. In our paper we use cohomological techniques instead. In Remark 4.11 we provide yet another short direct variant of the key part of the proof of Theorem 4.10. Considering the details of our proof makes it possible to prove the vanishing of triple Massey products in a more general setting. Consider a formation { G, { G (K )}, N }, where G is a profinite group, { G (K )} is a collection of open subgroups of G indexed by a set ฮฃ = {K }, and N is a discrete G-module. (See [Se1, Chapter XI, ยง1] or [We, Chapter VI, Section 6.1] for a definition of a formation.) We shall call such a formation { G, { G (K )}, N } a p-Kummer field formation if it satisfies two axioms: (1) For each open normal subgroup G (K ) of G, H 1 (G/G (K ), N G (K ) ) = {1}. (Here N G (K ) is the set of elements of N which are fixed under the action of every element ฯƒ in G (K ).) (2) There is a short exact sequence of G-module x 7โ†’ x p 1 โˆ’โ†’ Z/pZ โˆ’โ†’ N โˆ’โ†’ N โˆ’โ†’ 1, 4 JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N where G acts trivially on Z/pZ, and N is written in a multiplicative way. Recall that axiom (1) above guarantees that each p-Kummer field formation is also a field formation. (See [We, Chapter 6, Section 6.2].) Our main interest is when G = GF , the absolute Galois group of F, and ฮฃ is the set of all finite separable extensions of F, and N = Fsร— . But our approach is valid in this more general setting which may have applications in anabelian geometry. Also this approach clarifies the key properties of G which are sufficient for our proofs to go through. Nearly simultaneously with our arXiv posting of the first version of our paper, I. Efrat and E. Matzri posted [EMa2] on arXiv. The paper [EMa2] is a replacement of [Ma]. In [EMa2], I. Efrat and E. Matzri also provide a cohomological approach to Theorem 4.10. Their approach has a similar flavor to our proofs in this paper, but it is still different. We feel that both papers taken together provide a definite complementary insight to the new fundamental property of absolute Galois groups. As we mentioned above, in Remark 4.11 we provide the second alternative proof of the vanishing of triple Massey products. In this proof we are able to show a specific element of the triple Massey product which vanishes. Some results of this paper (e.g. the results on Heisenberg extensions in Subsection 3.2, Lemma 4.2) have already been used in the construction of important Galois groups. Namely in [MT4] we succeeded in extending the crucial ideas in this paper together with further ideas in Galois theory to find explicit constructions of Galois extensions L/F with Gal( L/F) โ‰ƒ U4 (F p ), for all fields F and all primes p. For example Theorem 4.12 and its proof play anโˆšimโˆš ร— ร— p p portant role in finding a crucial submodule of the E /(E ) where E := F( a, p c), which is needed in our construction of a required Galois extension L/F containing E/F and having Galois group isomorphic to U4 (F p ). In Section 5 we prove the vanishing of (k + 1)-fold Massey products of the form hฯ‡b , ฯ‡a , . . . , ฯ‡a i (k copies of ฯ‡a ) and the vanishing of (k + 2)-fold Massey products of the form hฯ‡ a , ฯ‡b , ฯ‡ a , . . . , ฯ‡ a i (k + 1 copies of ฯ‡ a ), where k < p. (See Theorem 5.9.) The first vanishing can be deduced also from the results in [Sha2], but the second vanishing appears to be new. (See also [Wic, Corollary 3.17] for another result on the vanishing of some n-fold Massey products.) Acknowledgements: We are grateful to Jochen Gรคrtner and Adam Topaz with whom we initially began correspondence on the vanishing triple Massey products pursuing a different strategy. We are also grateful to Eliyahu Matzri for sending us his beautiful preprint [Ma] shortly before his arXiv posting. Although we did not yet discuss details of our paper with Ido Efrat, Eliyahu Matzri, Danny Neftin and Kirsten Wickelgren, we thank them for their interest and great encouragement. We are grateful to an anonymous referee for his/her careful reading of our paper and for providing us with insightful comments and valuable suggestions which we used to improve our exposition. TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 2. C OHOMOLOGY 5 OF BICYCLIC GROUPS In this section we study the cohomology of cyclic and bicyclic groups. A number of basic results which we will need subsequently in this paper, are recalled here. Our main references are [CKM, pages 16-19] and [Me, pages 694-697]. 2.1. Cohomology of cylic groups. If G is abelian group and g โˆˆ G is an element of order n, we denote D g := g โˆ’ 1 and Ng := 1 + g + ยท ยท ยท + gnโˆ’1 โˆˆ Z [ G ]. Let G be a cyclic group of order n. We choose a generator s of G. Recall that วซ : Z [ G ] โ†’ Z is the augmentation homomorphism with วซ( g) = 1 for all g โˆˆ G. Then we have the following resolution of the trivial G-module Z: d d วซ 0 1 ยท ยท ยท โˆ’โ†’ Z[ G] โˆ’โ†’ Z [ G ] โˆ’โ†’ Z [ G ] โˆ’โ†’ Z โˆ’โ†’ 0, where di is multiplication by Ds (resp. Ns ) if i is even (resp. odd). For any G-module M, the above resolution determines a complex dโˆ— dโˆ— 0 1 Hom G (Z [ G ], M) โˆ’โ†’ HomG (Z [ G ], M) โˆ’โ†’ HomG (Z [ G ], M) โˆ’โ†’ ยท ยท ยท We make the natural identification HomG (Z [ G ], M) = M. Then the above complex becomes โˆ— โˆ— โˆ— d0 d d 1 2 M โˆ’โ†’ M โˆ’โ†’ M โˆ’โ†’ M โˆ’โ†’ ยท ยท ยท This implies in particular that H 2 (G, M) โ‰ƒ Hฬ‚ 0 (G, M) := ker Ds /imNs = Ms /Ms A. As explained in [Se1, Chapter VIII, ยง4], the above isomorphism does depend on the choice of generator s and can be described as below. The choice of s defines a homomorphism ฯ‡s : G โ†’ Q/Z such that ฯ‡s (s) = 1/n. The coboundary ฮด : H 1 (G, Q/Z ) โ†’ H 2 (G, Z ) associated to the short exact sequence of trivial G-modules 0 โ†’ Z โ†’ Q โ†’ Q/Z โ†’ 0, sends ฯ‡s to an element ฮธs = ฮดฯ‡s โˆˆ H 2 (G, Z ). Then the isomorphism Ms /Ns M โ‰ƒ H 2 (G, M), is the map which sends x โˆˆ M to x โˆช ฮดฯ‡s . 2.2. Cohomology of bicyclic groups. Let G be a bicyclic group. We choose two generators s, of order m, and t, of order n. JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N 6 We define a chain complex Lโ€ข = ( Li ) as follows: Li = Z [ G ]i +1 for all i โ‰ฅ 0, and di : Li +1 โ†’ Li are defined by the following conditions d2i e2j d2i e2j+1 d2i +1 e2j d2i +1 e2j+1 = Ns e2jโˆ’1 + Dt e2j , = Ds e2j โˆ’ Nt e2j+1, = Ns e2jโˆ’1 + Nt e2j , = Ds e2j โˆ’ Dt e2j+1, here, for convenience, we put eโˆ’1 = 0 and (e0 , . . . , ei ) is the canonical basis of Li = Z [ G ]i +1 . Then we obtain a free resolution of the trivial G-module Z: (1) d d d วซ 0 2 1 ยท ยท ยท โˆ’โ†’ Z[ G]4 โˆ’โ†’ Z [ G ]3 โˆ’โ†’ Z [ G ]2 โˆ’โ†’ Z [ G ] โˆ’โ†’ Z โˆ’โ†’ 0. We define I := ker วซ, the augmentation ideal of Z [ G ]; and J := ker d0 . Then we obtain the following exact sequence of Z [ G ]-modules f 0 โˆ’โ†’ J โˆ’โ†’ Z [ G ]2 โˆ’โ†’ I โˆ’โ†’ 0, (2) where f ( x, y) = d0 ( x, y) = Dt x + Ds y. We also consider the following exact sequence g h 0 โˆ’โ†’ Z [ G ]/ZNG โˆ’โ†’ J โˆ’โ†’ Z2 โˆ’โ†’ 0, (3) where NG = โˆ‘ฯƒโˆˆ G ฯƒ, g( x + ZNG ) = ( Dt x, โˆ’ Ds x ) and h( x, y) = (วซ( x )/n, วซ(y)/m). Now let M be any G-module. The resolution (1) yields the following complex d0โˆ— d2โˆ— d1โˆ— HomG (Z [ G ], M) โ†’ Hom G (Z [ G ]2 , M) โ†’ HomG (Z [ G ]3 , M) โ†’ HomG (Z [ G ]4 , M) โ†’ ยท ยท ยท We make the natural identifications Hom G (Z [ G ]i , M) = Mi . Then the above complex becomes โˆ— โˆ— โˆ— d0 d d 1 2 M โˆ’โ†’ M2 โˆ’โ†’ M3 โˆ’โ†’ M4 โˆ’โ†’ ยท ยท ยท The explicit descriptions of some maps diโˆ— in matrix form are given below: ๏ฃน ๏ฃฎ ๏ฃฎ ๏ฃน Dt 0 0   Nt 0 ๏ฃฏ Ds โˆ’ Nt 0 ๏ฃบ Dt ๏ฃบ. d0โˆ— = , d1โˆ— = ๏ฃฐ Ds โˆ’ Dt ๏ฃป , d2โˆ— = ๏ฃฏ ๏ฃฐ0 Ns Dt ๏ฃป Ds 0 Ns 0 0 Ds In particular we have Z2 (G, M) := ker d2โˆ— = {( x, y, z) โˆˆ M3 | Dt ( x ) = 0, Ds (z) = 0, Ds ( x ) = Nt (y), Dt (z) = โˆ’ Ns (z)}, B2 (G, M) :=imd1โˆ— = {( x, y, z) โˆˆ A3 | โˆƒ(c, d) โˆˆ A2 : x = Nt (c), y = Ds (c) โˆ’ Dt (d), z = Ns (d)}, H 2 (G, M) โ‰ƒ Z2 (G, M)/B2 (G, M). TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 7 The exact sequences (2) and (3) yield the following commutative diagram (*) HomG (Z2 , M) โ™โ™โ™ โ™โ™โ™ u โ™โ™โ™ โ™โ™โ™ โ™โ™)  / Ext1 ( I, M ) ( J, M) HomG (Z [ G ]2 , M) / Hom G โฏโฏโฏโฏ โฏโฏโฏโฏ v โฏโฏโฏโฏ โฏโฏโฏโฏ โฏ*  / G 0 = Ext1G (Z [ G ]2 , M) HomG (Z [ G ]/ZNG , M)  Ext1G (Z2 , M) This diagram implies that we have a natural injection ฮท : coker(u) ึ’โ†’ coker(v). Note that ฮท is an isomorphism if and only if H 1 (G, M) = 0 since Ext1G (Z2 , M) = H 1 (G, M)2 . Under the natural identifications HomG (Z2 , M) = ( M G )2 and HomG (Z [ G ]i , M) = Mi , we shall describe explicitly all objects and maps in the diagram. First we have HomG (Z [ G ]/ZNG , M) = { x โˆˆ M | NG x = 0} =: NG M. The map v becomes v : M2 โˆ’โ†’ NG M, which sends ( x, y) to Dt x โˆ’ Ds y. This follows from the observation that the map v is obtained by applying the functor HomG (ยท, M) to the composite Z [ G ]/ZNG โ†’ J โ†’ Z [ G ]2 , which maps x mod ZNG to ( Dt x, โˆ’ Ds x ). On the other hand, the surjection d1 : Z [ G ]3 ึ‰ J yields an injection Hom G ( J, M) ึ’โ†’ HomG (Z [ G ]3 , M) = M3 . If we identify Hom G ( J, M) with its image in M3 , then HomG ( J, M) = ker d2โˆ— =: Z2 (G, M), and Ext1G ( I, M) = ker d2โˆ— /imd1โˆ— = H 2 (G, M). The map u becomes u : ( M G )2 โˆ’โ†’ H 2 (G, M), which can be described explicitly as follows. We consider the composite d Then h 1 ฯ• : Z [ G ]3 โˆ’โ†’ J โˆ’โ†’ Z2 . ฯ•( x, y, z) = h( Nt x + Ds y, โˆ’ Dt y + Ns z) = (วซ( Nt x + Ds y)/n, วซ(โˆ’ Dt y + Ns z)/m) = (วซ( x ), วซ(z)). The Hom-dual of ฯ• is the map ฯ•โˆ— : ( M G )2 = HomG (Z2 , M) โˆ’โ†’ HomG ( J, M) ึ’โ†’ Hom G (Z [ G ]3 , M) = M3 , . JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N 8 which is given by ฯ•โˆ— ( x, z) = ( x, 0, z). The map u is then given by u( x, z) = [( x, 0, z)], where [( x, 0, z)] is the class of ( x, 0, z) in H 2 (G, M). Let ฯƒ โˆˆ G/hti denote the class of s modulo hti. Then G/hti = hฯƒi is of order m. We have the natural identification Hฬ‚ 0 (G/hti, Mt ) = M G /Nฯƒ ( Mt ) = H 2 (G/hti, M) by identifying a with the cup product a โˆช ฮธฯƒ . (See Subsection 2.1.) Let ฯ‡s : G โ†’ Q/Z be a homomorphism such that ฯ‡s (s) = 1/n, ฯ‡s (t) = 0, and set ฮธs := ฮดฯ‡s โˆˆ H 2 (G, Z ). Then we have [(0, 0, z)] = z โˆช ฮธs = z โˆช ฮดฯ‡s โˆˆ H 2 (G, M). This follows from an observation in [CKM, page 18] that the inflation map infG/hti : H 2 (G/hti, M) ึ’โ†’ H 2 (G, M), is given by ฯ‡s (Note also that = infG/hti Similarly, we have infG/hti (z) = [(0, 0, z)]. (ฯ‡ฯƒ ) and ฮธs = infG/hti ฮธฯƒ .) [( x, 0, 0)] = x โˆช ฮธt = x โˆช ฮดฯ‡t โˆˆ H 2 (G, M). Here ฯ‡t : G โ†’ Q/Z is a homomorphism such that ฯ‡t (t) = 1/n, ฯ‡t (s) = 0, and ฮธt := ฮดฯ‡t โˆˆ H 2 (G, Z ). Therefore u( x, z) = x โˆช ฮดฯ‡t + z โˆช ฮดฯ‡s . Observe that we have the following commutative diagram Z[G] x 7โ†’(0,x,0)  Z [ G ]3 / g Z [ G ]/Z [ G ] NG /  d1 J. This induces the following commutative diagram HomG (Z [ G ]3 , M) = M3 ( x,y,z)7โ†’y O ? HomG ( J, M) = Z2 (G, M) / / HomG (Z [ G ], M) = M O ? HomG (Z [ G ]/ZNG , M) = NG M TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 9 In summary, under the identifications HomG (Z [ G ]i , M) = Mi , HomG ( J, M) = Z2 (G, M), Ext1G ( I, M) = Z2 (G, M)/B2 (G, M) = H 2 (G, M), etc., the diagram (*) becomes ( M G )2 (**) M2 โ . โ—†โ—†โ—† โ—†โ—†โ—†u โ—†โ—†โ—† โ—†โ—†'  2 / Z ( G, M ) / H 2 ( G, M ) โโ โโ v โโ โโ โโ % / 0  NG M  H 1 (G, M)2 Here v( x, y) = Dt x โˆ’ Ds y. u( x, z) = x โˆช ฮดฯ‡t + z โˆช ฮดฯ‡s . The natural injection ฮท : coker(u) ึ’โ†’ coker(v) is given by ฮท ([( x, y, z)]) = [y]. 3. H EISENBERG EXTENSIONS 3.1. Norm residue symbols. Let F be a field containing a primitive p-th root of unity ฮพ. For any element a in Fร— , we shall write ฯ‡ a for the character corresponding to a via the Kummer map Fร— โ†’ H 1 (GF , Z/pZ )โˆš= Hom(GF , Z/pZ). From now on we assume is a Galois extension with Galois group that a is not in ( Fร— ) p . The extensionโˆšF( p a)/F โˆš p p hฯƒa i โ‰ƒ Z/pZ, where ฯƒa satisfies ฯƒa ( a) = ฮพ a. The character ฯ‡ a defines a homomorphism ฯ‡ a โˆˆ Hom(GF , 1p Z/Z ) โІ Hom(GF , Q/Z ) by the formula 1 ฯ‡a = ฯ‡a . p ร— Let b be any element in F . Then the norm residue symbol can be defined to be (a, b) := (ฯ‡a , b) := b โˆช ฮดฯ‡a . The cup product ฯ‡ a โˆช ฯ‡b โˆˆ H 2 (GF , Z/pZ ) can be interpreted as the norm residue symbol (a, b). More precisely, we consider the exact sequence x 7โ†’ x p 0 โˆ’โ†’ Z/pZ โˆ’โ†’ Fsร— โˆ’โ†’ Fsร— โˆ’โ†’ 1, where Z/pZ has been identified with the group of p-th roots of unity ยต p via the choice of ฮพ. As H 1 (GF , Fsร— ) = 0, we obtain i ร—p 0โˆ’โ†’ H 2 (GF , Z/pZ ) โˆ’โ†’ H 2 (GF , Fsร— ) โˆ’โ†’ H 2 (GF , Fsร— ). JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N 10 Then one has i (ฯ‡ a โˆช ฯ‡b ) = (a, b) โˆˆ H 2 (GF , Fsร— ). (See [Se1, Chapter XIV, Proposition 5].) The following fact ([Se1, Chapter XIV, Proposition 2]) will also be used frequently in the sequel. Proposition 3.1. We have   2 ร— res ker ฯ‡ a 2 ร— โˆš ker H (GF , Fs ) โˆ’โ†’ H (GF ( p a) , Fs ) = {(a, b) | b โˆˆ Fร— }. 3.2. Heisenberg extensions. In this subsection we provide a short alternative version of some material in [Ma, Section 5]. (See also [Sha1, Chapter 2, Section 2.4].) Assume that a, b are elements in Fร— , which are linearly independent modulo ( Fร— ) p . โˆš โˆš p K/F is a Galois extension whose Galois โˆš group isโˆš generated Let K = F( p a, b). Then โˆš โˆš โˆš โˆš โˆš โˆš p p p p p p p p by ฯƒa and ฯƒb . Here ฯƒa ( b) = b, ฯƒa ( a) = ฮพ a; ฯƒb ( a) = a, ฯƒb ( b) = ฮพ b. Let U3 (Z/pZ ) be the group of all upper-triangular unipotent 3 ร— 3-matrix ๏ฃฎ with๏ฃนen1 x z tries in Z/pZ. We consider a map U3 (Z/pZ ) โ†’ (Z/pZ )2 which sends ๏ฃฐ0 1 y ๏ฃป to 0 0 1 ( x, y). Then we have the following embedding problem GF ฯฬ„ 0 / Z/pZ /  U3 (Z/pZ ) / (Z/pZ)2 / 1, where ฯฬ„ is the map (ฯ‡ a , ฯ‡b ) : GF โ†’ Gal(K/F) โ‰ƒ (Z/pZ )2 . (The last isomorphism Gal(K/F) โ‰ƒ (Z/pZ )2 is the one which sends ฯƒa to (1, 0) and ฯƒb to (0, 1).) Assume that โˆš ฯ‡a โˆช ฯ‡b = 0. Then the norm residue symbol (a, b) is trivial. Hence there exists ฮฑ in F( p a) such that NF ( โˆš p a ) /F (ฮฑ ) = b (see [Se1, Chapter XIV, Proposition 4 (iii)]). We set pโˆ’2 โˆš pโˆ’2 pโˆ’1 pโˆ’2 A0 = ฮฑ ฯƒa (ฮฑ ) ยท ยท ยท ฯƒa (ฮฑ) = โˆ ฯƒai (ฮฑ pโˆ’i โˆ’1 ) โˆˆ F( p a). i =0 Lemma 3.2. Let f a be an element in Fร— . Let A = f a A0 . Then we have NF ( โˆš p a ) /F (ฮฑ ) b ฯƒa ( A) = = p. p A ฮฑ ฮฑ ฯƒa ( A) ฯƒa ( A0 ) Proof. Observe that = . The lemma then follows from the identity A A0 ( s โˆ’ 1) pโˆ’2 โˆ‘ ( p โˆ’ i โˆ’ 1) s i =0 i = pโˆ’1 โˆ‘ si โˆ’ ps0 .  i =0 For any representation ฯ : GF โ†’ U3 (Z/pZ ) and 1 โ‰ค i < j โ‰ค 3, let ฯij : GF โ†’ Z/pZ be the composition of ฯ with the projection from U3 (Z/pZ ) to its (i, j)-coordinate. TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 11 Proposition 3.3. Assume that ฯ‡ a โˆช ฯ‡b = 0. Let f a be an element in Fร— . Let A = f a A0 be defined as above. Then the homomorphism ฯฬ„ := (ฯ‡ a , ฯ‡b ) : GF โ†’ Z/pZ ร— Z/pZ lifts to a Heisenberg extension ฯ : GF โ†’ U3 (Z/pZ ) with resker ฯ‡ a (ฯ13 ) = ฯ‡ A . Proof. From ฯƒa ( A)/A = b/ฮฑ p โˆˆ (K ร— ) p , and ฯƒb ( A) = A, we see that ฯƒ( A)/A โˆˆ (K ร— ) p โˆš p for every ฯƒ โˆˆ Gal(K/F). This implies that the extension L := K ( A)/F is Galois. Let ฯƒฬƒa โˆˆ Gal( L/F ) (resp. ฯƒฬƒโˆš ฯƒa (resp. ฯƒb ). Since ฯƒb ( A) = A, b โˆˆ Gal( L/F )) be an extension of โˆš โˆš p โˆš p p p p j we have ฯƒฬƒb ( A ) = ฮพ A, for some j โˆˆ Z. Hence ฯƒฬƒb ( A ) = A. This implies that ฯƒฬƒb is of order p. On the other hand, we have โˆš b p ฯƒฬƒa ( A ) p = ฯƒa ( A) = A p . ฮฑ โˆš โˆš โˆš p p p Hence ฯƒฬƒa ( A) = ฮพ i A ฮฑb , for some i โˆˆ Z. Then โˆš โˆš b p p p p โˆš = ฯƒฬƒa ( A) = A A. โˆš NF ( p a)/F (ฮฑ) This implies that ฯƒฬƒa is also of order p. We have โˆš โˆš โˆš pb โˆš p j p i+ j p A ฯƒฬƒa ฯƒฬƒb ( A ) = ฯƒฬƒa (ฮพ A ) = ฮพ , ฮฑ โˆš โˆš โˆš ฮพpb โˆš pb โˆš p i+ j p i p )=ฮพ . A ฯƒฬƒb ฯƒฬƒa ( A ) = ฯƒฬƒb (ฮพ A ฮฑ ฮฑ We set ฯƒฬƒA := ฯƒฬƒa ฯƒฬƒb ฯƒฬƒaโˆ’1 ฯƒฬƒbโˆ’1 . Then โˆš โˆš p p ฯƒฬƒA ( A) = ฮพ A. This implies that ฯƒฬƒA is of order p and that Gal( L/F) is generated by ฯƒฬƒa and ฯƒฬƒb . We also have ฯƒฬƒa ฯƒฬƒA = ฯƒฬƒA ฯƒฬƒa , and ฯƒฬƒb ฯƒฬƒA = ฯƒฬƒA ฯƒฬƒb . We can define an isomorphism ฯ• : Gal( L/F) โ†’ U3 (Z/pZ ) by letting ๏ฃฎ ๏ฃน ๏ฃฎ ๏ฃน ๏ฃฎ ๏ฃน 1 1 0 1 0 0 1 0 1 ฯƒฬƒa 7โ†’ x := ๏ฃฐ0 1 0๏ฃป , ฯƒฬƒb 7โ†’ y := ๏ฃฐ0 1 1๏ฃป , ฯƒฬƒA 7โ†’ z := ๏ฃฐ0 1 0๏ฃป . 0 0 1 0 0 1 0 0 1 ฯ• Then the composition ฯ : GF โ†’ Gal( L/F) โ†’ U3 (Z/pZ ) is the desired lifting of ฯฬ„.  Corollary 3.4. Let the notation be as in Proposition 3.3. Let ฯ• ab be the map โˆ’ฯ13 : GF โ†’ Z/pZ. Then dฯ• ab = ฯ‡ a โˆช ฯ‡b and res ker ฯ‡ a ( ฯ• ab ) = โˆ’ฯ‡ A . Proof. Since ฯ : GF โ†’ U3 (Z/pZ ) is a homomorphism, we obtain dฯ• ab (ฯƒ, ฯ„ ) = ฯ13 (ฯƒฯ„ ) โˆ’ ฯ13 (ฯƒ) โˆ’ ฯ13 (ฯ„ ) = ฯ12 (ฯƒ)ฯ23 (ฯ„ ) = (ฯ‡ a โˆช ฯ‡b )(ฯƒ, ฯ„ ). Therefore dฯ• ab = ฯ‡ a โˆช ฯ‡b , as desired.  JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N 12 4. T RIPLE M ASSEY PRODUCTS 4.1. Triple Massey products over fields containing primitive p-th roots of unity. In this subsection we assume that F is a field containing a primitive p-th root of unity. Let a, b and c be elements in Fร— . Assume further that the triple Massey product hฯ‡ a , ฯ‡b , ฯ‡c i is defined, i.e., we have ฯ‡ a โˆช ฯ‡b = 0 = ฯ‡b โˆช ฯ‡c . Until Theorem 4.10, we always assume further that a and c are linearly independent modulo ( Fร— ) p , and that a and b are linearly independent modulo ( Fร— ) p . We also fix two elements f a and f c in Fร— . Let A0 be the element defined right before Lemma 3.2. Let A = f a A0 . By Corollary 3.4, there is a map ฯ• ab : GF โ†’ Z/pZ such that dฯ• ab = ฯ‡ a โˆช ฯ‡b โˆˆ C2 (GF , Z/pZ ) and res ker ฯ‡ a ( ฯ• ab ) = โˆ’ฯ‡ A . Since ฯ‡b โˆช ฯ‡c = 0 in H 2 (GF , Z/pZ ), there exists a map ฯ•bc : GF โ†’ Z/pZ such that Then dฯ•bc = ฯ‡b โˆช ฯ‡c โˆˆ C2 (GF , Z/pZ ). hฯ‡a , ฯ‡b , ฯ‡c i ฯ• := ฯ‡a โˆช ฯ•bc + ฯ• ab โˆช ฯ‡c is an element in the triple Massey product hฯ‡ a , ฯ‡b , ฯ‡c i. We consider the following commutative diagram H 2 (GF , Z/pZ )   i / H 2 (GF , Fsร— ) res ker ฯ‡ a   H 2 ( GF ( โˆš p a ) , Z/pZ ) res ker ฯ‡ a  i /  ร— H 2 ( GF ( โˆš p a ) , Fs ). Lemma 4.1. We have (1) resker ฯ‡ a (hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• ) = res ker ฯ‡ a (ฯ‡c ) โˆช ฯ‡ A โˆˆ H 2 (GF ( โˆš p a ) , Z/pZ ). 2 ร— โˆš (2) resker ฯ‡ a (i (hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• )) = (c, A) โˆˆ H (GF ( p a) , Fs ). Proof. (1) We have resker ฯ‡ a (hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• ) = res ker ฯ‡ a (ฯ‡ a โˆช ฯ•bc + ฯ• ab โˆช ฯ‡c ) = res ker ฯ‡a (ฯ‡a ) โˆช res ker ฯ‡a ( ฯ•bc ) + res ker ฯ‡a ( ฯ• ab ) โˆช res ker ฯ‡a (ฯ‡c ) = โˆ’ฯ‡ A โˆช res ker ฯ‡a (ฯ‡c ) = res ker ฯ‡a (ฯ‡c ) โˆช ฯ‡ A . (2) This follows from (1) and the commutativity of the above diagram.  โˆš โˆš p c). Since ฯ‡ a โˆช ฯ‡b = 0 = ฯ‡b โˆช ฯ‡c , we have (a, b) = (b, c) = 0. Thus Let E = F( p a, โˆš โˆš p p there are ฮฑ in F( a ) and ฮณ in F( c) such that โˆš NE/F ( โˆš p a ) (ฮฑ ) = b = NE/F ( p c) (ฮณ ). TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 13 Let G be the Galois group Gal(E/F).โˆšThen G = hฯƒa , ฯƒc i, where ฯƒa โˆˆ G โˆš (respectively p ฯƒc โˆˆ G) is an extension of ฯƒa โˆˆ Gal( F( a )/F) (respectively ฯƒc โˆˆ Gal( F( p c)/F)). We define pโˆ’2 โˆš C0 = โˆ ฯƒci (ฮณ pโˆ’i โˆ’1 ) โˆˆ F( p a), i =0 C := f c C0 , and define B := ฮณ/ฮฑ. Lemma 4.2. We have ฯƒa ( A) = Nฯƒc ( B). (1) A ฯƒc (C) = Nฯƒa ( B)โˆ’1 . (2) C Proof. (1) From Lemma 3.2, we have b Nฯƒc (ฮณ) ฯƒa ( A) = p = = Nฯƒc ( B). A ฮฑ Nฯƒc (ฮฑ) (2) From Lemma 3.2, we have ฯƒc (C) b Nฯƒa (ฮฑ) = p = = Nฯƒa ( B)โˆ’1 . C ฮณ Nฯƒa (ฮณ)  We consider Eร— as a G-module under the Galois action. The diagram (**) in Subsection 2.2 becomes ( F ร— )2 (***) ( E ร— )2 โ—†โ—†โ—† โ—†โ—†โ—†u โ—†โ—†โ—† โ—†โ—†'  / Z2 ( G, Eร— ) / H 2 ( G, Eร— ) โ–ฒโ–ฒโ–ฒ โ–ฒโ–ฒโ–ฒv โ–ฒโ–ฒโ–ฒ โ–ฒ%  NG E ร—  0 Here ฯƒc ( x ) y , x ฯƒa (y) u( x, z) = x โˆช ฮดฯ‡ฯƒc + z โˆช ฮดฯ‡ฯƒa . The natural isomorphism ฮท : coker(u) ึ’โ†’ coker(v) is given by v( x, y) = ฮท [( x, y, z)] = [y]. / . 0 14 JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N In the following results in this subsection (except in Theorem 4.10) we use the presentation of cohomology classes as in Section 2. Corollary 4.3. The triple ( A, B, C) is an element in Z2 (G, Eร— ). Proof. This follows immediately from the previous lemma.  Lemma 4.4. The element [( A, B, C)] is in the image of u. Proof. Since ฮท is an isomorphism, it suffices to show that ฮท [( A, B, C)] is in the image of v. We have Nฯƒa (ฮฑ) b Nฯƒa ฯƒc (ฮฑ) = = = 1. Nฯƒa ฯƒc ( B) = Nฯƒa ฯƒc (ฮณ) Nฯƒc (ฮณ) b ร— Hence by Hilbertโ€™s Theorem 90, there exists e โˆˆ E such that ฯƒa ฯƒc (e) ฯƒc (ฯƒa (e)) eโˆ’1 . = e ฯƒa (e) ฯƒa (eโˆ’1 ) Therefore B is in imv, as desired. B=  Corollary 4.5. There exists x, y โˆˆ Fร— such that inf([( A, B, C)]) = (a, x ) + (c, y) โˆˆ H 2 (GF , Fsร— ). Proof. Since [( A, B, C)] is in the image of u, there exist x and y in Fร— such that This implies that [( A, B, C)] = x โˆช ฮดฯ‡ฯƒa + y โˆช ฯ‡ฯƒc . inf([( A, B, C)]) = x โˆช ฮด(inf(ฯ‡ฯƒa )) + y โˆช ฮด(inf(ฯ‡ฯƒc )) = x โˆช ฮดฯ‡a + y โˆช ฮดฯ‡c = ( x, a) + (y, b), as desired.  Hฬ‚ โˆ’1 (G, Eร— ). Remark 4.6. Observe that coker(v) = We can identify naturally the group coker(v) with group Ub (G, Eร— ) (the notation being as in [Ti]). (See [Ti, Remark after Corollary 1.6].) Then the composition map ฮท H 2 (G, Eร— ) โ†’ coker(u) โ†’ coker(v) = Ub (G, Eร— ), is exactly the map which was denoted by วซ in [Ti, page 423], วซ : H 2 (G, Eร— ) โ†’ Ub (G, Eร— ). The proof of Lemma 4.4 shows that the element [( A, B, C)] is in the kernel of วซ. We have the following exact sequence inf res 0 โˆ’โ†’ H 2 (G, Eร— ) โˆ’โ†’ H 2 (GF , Fsร— ) โˆ’โ†’ H 2 (GE , Fsร— ). If we make the natural identification H 2 (GF , Fsร— ) = Br(F) and H 2 (GE , Fsร— ) = Br(E), then one can check the map โ‰ƒ inf : H 2 (G, Eร— ) โˆ’โ†’ Br(E/F) := ker(Br( F) โ†’ Br(E)), TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 15 is the natural isomorphism ฯ€ : H 2 (G, Eร— ) โˆ’โ†’ Br(E/F) mentioned in [Ti, page 427]. Then Corollary 4.5 follows from [Ti, Proposition 1.5].  We consider the following commutative diagram H 2 (G, Eร— )  res G/h ฯƒai inf  / H 2 (GF , Fsร— ) res / H 2 (GE , Fsร— ) res ker ฯ‡ a  H 2 (hฯƒc i, Eร— )   inf /  ร— H 2 ( GF ( โˆš p a ) , Fs ) res / H 2 (GE , Fsร— ). Lemma 4.7. We have (1) res G/hฯƒa i ([ A, B, C]) = A โˆช ฮดฯ‡ฯƒc โˆˆ H 2 (hฯƒc i, Eร— ). ร— (2) res ker ฯ‡ a (inf([ A, B, C])) = (c, A) in H 2 (GF ( โˆš p a ) , Fs ). Proof. (1) By [CKM, page 17] and under the identification (Eร— )ฯƒc /Nฯƒc (Eร— ) = H 2 (hฯƒc i, Eร— ) via identifying x with the cup product x โˆช ฮด(ฯ‡ฯƒc ), we have res G/hฯƒa i ([ A, B, C]) = [ A] = A โˆช ฮดฯ‡ฯƒc . (2) From the commutativity of the above diagram, we obtain res ker ฯ‡ a (inf([ A, B, C])) = inf(res G/hฯƒa i ([ A, B, C])) = inf( A โˆช ฮด(ฯ‡ฯƒc )) = A โˆช ฮด(inf(ฯ‡ฯƒc )) = A โˆช ฮดฯ‡c = (c, A), as desired.  Corollary 4.8. There exists x โˆˆ Fร— such that i (hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• ) = inf([ A, B, C]) + (a, x ) โˆˆ H 2 (GF , Fsร— ). Proof. From Lemma 4.1 and Lemma 4.7 we have ร— res ker ฯ‡ a (i (hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• )) = res ker ฯ‡ a (inf([ A, B, C])) โˆˆ H 2 (GF ( โˆš p a ), Fs )). The statement then follows from Proposition 3.1. Corollary 4.9. There exist x and y in Fร— such that hฯ‡a , ฯ‡b , ฯ‡c i ฯ• = ฯ‡a โˆช ฯ‡x + ฯ‡c โˆช ฯ‡y โˆˆ H 2 (GF , Z/pZ). In particular, the triple Massey product hฯ‡ a , ฯ‡b , ฯ‡c i contains 0. Proof. By Corollaries 4.5 and 4.8, there are x1 , x2 and y in Fร— such that i (hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• ) = inf([ A, B, C]) + (a, x2 ) = (a, x1 ) + (c, y) + (a, x2 ) โˆˆ H 2 (GF , Fsร— ).  16 JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N Let x := x1 x2 . Since i : H 2 (GF , Z/pZ ) โ†’ H 2 (GF , Fsร— ) is injective, we obtain hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• = ฯ‡ a โˆช ฯ‡ x + ฯ‡c โˆช ฯ‡y , as desired. For the last statement, we replace ฯ• ab by ฯ•โ€ฒab = ฯ• ab + ฯ‡y , and ฯ•bc by ฯ•โ€ฒbc = ฯ•bc โˆ’ ฯ‡ x . (Here we consider ฯ‡ x and ฯ‡y as elements in Z1 (GF , Z/pZ ).) Then ฯ•โ€ฒ = { ฯ•โ€ฒab , ฯ•โ€ฒbc } is also a defining system for the triple Massey product hฯ‡ a , ฯ‡b , ฯ‡c i. Hence hฯ‡ a , ฯ‡b , ฯ‡c i contains hฯ‡a , ฯ‡b , ฯ‡c i ฯ•โ€ฒ = hฯ‡a , ฯ‡b , ฯ‡c i ฯ• โˆ’ ฯ‡a โˆช ฯ‡x โˆ’ ฯ‡c โˆช ฯ‡y = 0.  Theorem 4.10. Let F be a field containing a primitive p-th root of unity. Let a, b and c be elements in Fร— . The triple Massey product hฯ‡ a , ฯ‡b , ฯ‡c i contains 0 whenever it is defined. Proof. Assume that hฯ‡ a , ฯ‡b , ฯ‡c i is defined. We can also assume that a, b and c are not in ( Fร— ) p . Case 1: Assume that a and c are linearly dependent modulo ( Fร— ) p . Let ฯ• = { ฯ• ab , ฯ•bc } be a defining system for hฯ‡ a , ฯ‡b , ฯ‡c i. We have resker ฯ‡ a (hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• ) = res ker ฯ‡ a (ฯ‡ a โˆช ฯ•bc + ฯ• ab โˆช ฯ‡c ) = res ker ฯ‡a (ฯ‡a ) โˆช res ker ฯ‡a ( ฯ•bc ) + res ker ฯ‡a ( ฯ• ab ) โˆช res ker ฯ‡a (ฯ‡c ) = 0 โˆช res ker ฯ‡a ( ฯ•bc ) + res ker ฯ‡a ( ฯ• ab ) โˆช 0 = 0. By Proposition 3.1, hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• = ฯ‡ a โˆช ฯ‡ x for some x โˆˆ Fร— . We replace ฯ•bc by ฯ•โ€ฒbc = ฯ•bc โˆ’ ฯ‡ x . (Here we consider ฯ‡ x as an element in Z1 (GF , Z/pZ ).) Then ฯ•โ€ฒ = { ฯ• ab , ฯ•โ€ฒbc } is also a defining system for the triple Massey product hฯ‡ a , ฯ‡b , ฯ‡c i. Hence hฯ‡ a , ฯ‡b , ฯ‡c i contains hฯ‡a , ฯ‡b , ฯ‡c i ฯ•โ€ฒ = hฯ‡a , ฯ‡b , ฯ‡c i ฯ• โˆ’ ฯ‡a โˆช ฯ‡x = 0. Case 2: Assume that a and b are linearly dependent modulo ( Fร— ) p . Then ฯ‡b = ฮปฯ‡ a , for some ฮป โˆˆ Z/pZ. By the linearity of Massey products, we have ฮปhฯ‡ a , ฯ‡ a , ฯ‡c i โІ hฯ‡ a , ฮปฯ‡ a , ฯ‡c i = hฯ‡ a , ฯ‡b , ฯ‡c i. (See [Fe, Lemma 6.2.4 (ii)].) So it is enough to show that hฯ‡ a , ฯ‡ a , ฯ‡c i contains 0. If p = 2 then hฯ‡ a , ฯ‡b , ฯ‡c i contains 0 by [MT1, Theorem 1.2]. So we may and shall assume that p > 2. Since then our coefficients are F p of characteristic not 2, we can divide by 2 and define ฯ‡2 ฯ• aa := โˆ’ a . 2 Then it is straightforward to check that dฯ• aa (ฯƒ, ฯ„ ) = ฯ• aa (ฯƒ) + ฯ• aa (ฯ„ ) โˆ’ ฯ• aa (ฯƒฯ„ ) = ฯ‡ a (ฯƒ)ฯ‡ a (ฯ„ ) = ฯ‡ a โˆช ฯ‡ a (ฯƒ, ฯ„ ). TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 17 We pick any map ฯ• ac : GF โ†’ Z/pZ such that dฯ• ac = ฯ‡ a โˆช ฯ‡c . Then { ฯ• aa , ฯ• ac } is a defining system for hฯ‡ a , ฯ‡ a , ฯ‡c i. We have resker ฯ‡ a (hฯ‡ a , ฯ‡ a , ฯ‡c i ฯ• ) = res ker ฯ‡ a (ฯ‡ a โˆช ฯ• ac + ฯ• aa โˆช ฯ‡c ) = res ker ฯ‡a (ฯ‡a ) โˆช res ker ฯ‡a ( ฯ• ac ) + res ker ฯ‡a ( ฯ• aa ) โˆช res ker ฯ‡a (ฯ‡c ) = 0 โˆช res ker ฯ‡a ( ฯ• ac ) + 0 โˆช res ker ฯ‡a (ฯ‡c ) = 0. By Proposition 3.1, hฯ‡ a , ฯ‡ a , ฯ‡c i ฯ• = ฯ‡ a โˆช ฯ‡ x for some x โˆˆ Fร— . Use the same argument as in Case 1, this implies that hฯ‡ a , ฯ‡ a , ฯ‡c i contains 0. (This also follows from a more general result [Sha2, Proposition 4.2]. See also Theorem 5.9.) Case 3: Assume that a and c are linearly independent and that a and b are linearly independent. Then Corollary 4.9 says that the triple Massey product hฯ‡ a , ฯ‡b , ฯ‡c i contains 0.  Remark 4.11. In Case 3 in the above proof, we can show that a specific element of the Massey triple product vanishes. This leads to another proof for this case and hence for Theorem 4.10, which avoids using Corollary 4.5. Theorem 4.12. There exists f a , f c in Fร— such that ( f a A0 , B, f c C0 ) is a coboundary. Proof. As in the proof of Lemma 4.4, there exists e โˆˆ Eร— such that B = By Lemma 4.2, we have ฯƒa ( A0 ) = Nฯƒc ( B) = Nฯƒc A0  ฯƒa ฯƒc (e) e  = ฯƒa ฯƒc (e) . e ฯƒa ( Nฯƒc (e)) . Nฯƒc (e) This implies that Hence Nฯƒc (e) = ฯƒa A0  Nฯƒc (e) A0  . โˆš โˆš Nฯƒc (e) โˆˆ F ( p c )ร— โˆฉ F ( p a )ร— = F ร— . A0 Therefore, there exists f a โˆˆ Fร— such that Nฯƒc (e) = A0 f a . Similarly, by Lemma 4.2, we have   ฯƒc (C0 ) ฯƒa ฯƒc (eโˆ’1 ) ฯƒc ( Nฯƒa (eโˆ’1 )) โˆ’1 = Nฯƒa ( B ) = Nฯƒa . = C0 e โˆ’1 Nฯƒa (eโˆ’1 ) This implies that   Nฯƒa (eโˆ’1 ) Nฯƒa (eโˆ’1 ) = ฯƒc . C0 C0 Hence โˆš โˆš Nฯƒa (eโˆ’1 ) โˆˆ F ( p a )ร— โˆฉ F ( p c )ร— = F ร— . C0 JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N 18 Therefore, there exists f c โˆˆ Fร— such that Nฯƒa (eโˆ’1 ) = C0 f c . Let C1 = ฯƒc (e) and C2 = eโˆ’1 . Then we have ฯƒa (ฯƒc (e)) eโˆ’1 ฯƒa (C1 ) C2 ฯƒa ฯƒc (e) = , = e ฯƒc (e) ฯƒc (eโˆ’1 ) C1 ฯƒc (C2 ) Nฯƒc (C1 ) = Nฯƒc (ฯƒc (e)) = Nฯƒc (e) = A0 f a , B= Nฯƒa (C2 ) = Nฯƒa (eโˆ’1 ) = C0 f c . This implies that ( A0 f a , B, C0 f c ) is in B2 (G, Eร— ).  As a consequence of Theorem 4.12, we obtain another proof for Case 3 in the proof of Theorem 4.10. Another proof for Case 3 in Proof of Theorem 4.10. Let A = f a A0 and C = f c C0 so that we use the same notation as before. We replace ฯ•bc by ฯ•โ€ฒbc = ฯ•bc โˆ’ ฯ‡ x . Then ฯ•โ€ฒ = { ฯ• ab , ฯ•โ€ฒbc } is also a defining system for the triple Massey product hฯ‡ a , ฯ‡b , ฯ‡c i. Corollary 4.8 implies that i (hฯ‡ a , ฯ‡b , ฯ‡c i) contains i (hฯ‡ a , ฯ‡b , ฯ‡c i ฯ•โ€ฒ ) = i (hฯ‡ a , ฯ‡b , ฯ‡c i ฯ• ) โˆ’ i (ฯ‡ a โˆช ฯ‡ x ) = inf([ A, B, C]) + (a, x ) โˆ’ (a, x ) = inf([ A, B, C]). Hence hฯ‡ a , ฯ‡b , ฯ‡c i contains i โˆ’1 (inf([ A, B, C])) = 0.  4.2. Embedding problems and triple Massey products over an arbitrary field. A weak embedding problem E for a profinite group ฮ  is a diagram E := ฮ  ฮฑ U f /  Uฬ„ which consists of profinite groups U and Uฬ„ and homomorphisms ฮฑ : ฮ  โ†’ Uฬ„, f : U โ†’ Uฬ„ with f being surjective. (All homomorphisms of profinite groups considered in this paper are assumed to be continuous.) If in addition ฮฑ is also surjective, we call E an embedding problem. A weak solution of E is a homomorphism ฮฒ : ฮ  โ†’ U such that f ฮฒ = ฮฑ. We call E a finite weak embedding problem if group U is finite. The kernel of E is defined to be N := ker( f ). Let U4 (F p ) be the group of all upper-triangular unipotent 4 ร— 4-matrices with entries in F p . Let Z be the subgroup of all such matrices with all off-diagonal entries being 0 except at position (1, 4). We may identify U4 (F p )/Z with the group Uฬ„4 (F p ) of all upper-triangular unipotent 4 ร— 4-matrices with entries over F p with the (1, 4)-entry omitted. For any representation ฯ : G โ†’ U4 (F p ) and 1 โ‰ค i < j โ‰ค 4, let ฯij : G โ†’ F p be the composition of ฯ with the projection from U4 (F p ) to its (i, j)-coordinate. We use similar notation for representations ฯฬ„ : G โ†’ Uฬ„4 (F p ). Note that for each i = 1, 2, 3, ฯi,i +1 (resp., ฯฬ„i,i +1) is a group homomorphism. TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 19 Recall that we have the following result ([MT2, Lemma 3.1]), which is a direct consequence of [Dwy, Theorem 2.4]. Lemma 4.13. Let G be a profinite group, and p a prime number. Then the following statements are equivalent: (1) G has the vanishing triple Massey product property with respect to F p . (2) For every homomorphism ฯฬ„ : G โ†’ Uฬ„4 (F p ), the finite weak embedding problem 0 M / t yt t (ฯฬ„12 ,ฯฬ„23 ,ฯฬ„34 )  U 4 (F p ) / tG tt (F p )3 / 1, / has a weak solution, i.e., (ฯฬ„12 , ฯฬ„23 , ฯฬ„34 ) can be lifted to a homomorphism ฯ : G โ†’ U4 (F p ). Proposition 4.14. Let G be a profinite group, and p a prime number. Let H be an open subgroup of G whose index is coprime to p. Assume that H has the vanishing triple Massey product property with respect to F p , then G also has the vanishing triple Massey product property with respect to F p . Proof. We shall prove the condition (2) in Lemma 4.13 for the group G. Let ฯฬ„ : G โ†’ Uฬ„4 (F p ) be any homomorphism. We consider the weak embedding problem (E ) G 0 / M /  U 4 (F p ) / (ฯฬ„12 ,ฯฬ„23 ,ฯฬ„34 )= :ฯ† (F p )3 / 1. Then by the assumption and by Lemma 4.13, the weak embedding problem (E | H ) (E | H ) 0 / M / yt t t t tt H  U 4 (F p ) / ฯ†| H (F p )3 / 1, which is induced from (E ), has a weak solution. Let วซ be the cohomology class in H 2 ((F p )3 , M) which corresponds to the extension ( a12 ,a23 ,a34 ) 1 โˆ’โ†’ M โˆ’โ†’ U4 (F p ) โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โ†’ (F p )3 โˆ’โ†’ 1. We have the following commutative diagram H 2 ((F p )3 , M) ฯ†โˆ— / H 2 (G, M) res H 2 ((F p )3 , M ) (ฯ†| H )โˆ— /  H 2 ( H, M). JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N 20 In particular, (ฯ† | H )โˆ— (วซ) = res(ฯ†โˆ— (วซ)). Since the weak embedding problem (E | H ) has a weak solution, we see that (ฯ† | H )โˆ— (วซ) = 0 by Hoechsmannโ€™s lemma ([NSW, Chapter 3, ยง5, Proposition 3.5.9]). (Note that the statement of Hoechsmannโ€™s lemma in [NSW] deals with embedding problems, but its proof goes well with weak embedding problems.) Since [ G : H ] is coprime to p and the order of M is a p-power, we see that the restriction map res : H 2 (G, M) โˆ’โ†’ H 2 ( H, M) is injective by [Se2, Chapter I, ยง2, Corollary to Proposition 9]. Hence ฯ†โˆ— (วซ) = 0. Hoechsmannโ€™s lemma implies that the weak embedding problem (E ) has a weak solution, and we are done.  Theorem 4.15. Let F be any field and p a prime number. Then the absolute Galois group GF of F has the vanishing triple Massey product property with respect to F p Proof. If charF = p, then the maximal pro-p-quotient GF ( p) of GF is a free pro-p-group. Therefore GF ( p) and GF has the vanishing triple Massey product property with respect to F p . Now we assume that charF 6= p. Let ฮพ be a primitive p-th root of unity, and let K = F(ฮพ ). Then K/F is a finite extension of degree d, and d divides p โˆ’ 1. This implies that [ GF : GK ] = d is coprime to p. Since GK has the vanishing triple Massey product property by Theorem 4.10, it follows that GF also has the vanishing triple Massey product property by Proposition 4.14.  4.3. Some consequences. In this subsection we assume that p is an odd prime number. The case when p = 2 is treated in [MT1, Theorem 1.3 and Theorem 1.4]. Recall that for a profinite group G and a prime number p, the Zassenhaus (p-)filtration (G(n) ) of G is defined inductively by G(1) = G, p G(n) = G(โŒˆn/pโŒ‰) โˆ [ G( i ) , G( j ) ] , i + j=n where โŒˆn/pโŒ‰ is the least integer which is greater than or equal to n/p. (Here for two closed subgroups H and K of G, [ H, K ] means the smallest closed subgroup of G containing the commutators [ x, y] = x โˆ’1 yโˆ’1 xy, x โˆˆ H, y โˆˆ K. Similarly, H p means the smallest closed subgroup of G containing the p-th powers x p , x โˆˆ H.) Let ( I, <) be a well-ordered set. Let S be a free pro-p-group on a set of generators xi , i โˆˆ I (see [NSW, Definition 3.5.14]). Let S(i ) , i = 1, 2, . . . be the p-Zassenhaus filtration of S. Then any element r in S(2) may be written uniquely as ๏ฃฑ 3ai bij ๏ฃด ๏ฃด โˆ [[ xi , x j ], xk ]]cijk ยท rโ€ฒ , if p = 3, ๏ฃฒ โˆ [ xi , x j ] โˆ xi iโˆˆ I i< j i < j,kโ‰ค j (1) r= b ij ๏ฃด โˆ [[ xi , x j ], xk ]]cijk ยท rโ€ฒ , if p 6= 3, ๏ฃด ๏ฃณ โˆ [ xi , x j ] i< j i < j,kโ‰ค j where ai , bij , cijk โˆˆ {0, 1, . . . , p โˆ’ 1} and r โ€ฒ โˆˆ S(4) . For convenience we call (1) the canonical decomposition modulo S(4) of r (with respect to the basis ( xi )) and we also set uij = bij if i < j, and uij = b ji if j < i. TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 21 We denote by GF ( p) the maximal pro-p-quotient of an absolute Galois group GF of a given field F. Theorem 4.16. Let R be a set of elements in S(2) . Assume that there exists an element r in R and distinct indices i, j, k with i < j, k < j such that: (i) In (1) the canonical decomposition modulo S(4) of r, uij = ukj = uki = ukl = u jl = 0 for all l 6= i, j, k, and cijk 6= 0; and (ii) for every s โˆˆ R which is different from r, the factors [ xk , xi ], [ xi , xk ] and [ xi , x j ] do not occur in the canonical decomposition modulo S(4) of s. Then G = S/hRi is not realizable as GF ( p) for any field F. Proof. This follows immediately from Theorem 4.15, [MT1, Theorem 7.8] and [MT1, Corollary 3.5].  Theorem 4.17. Let R be a set of elements in S(2) . Assume that there exists an element r in R and distinct indices i < j such that: (i) In (1) the canonical decomposition modulo S(4) of r, uij = uil = u jl = 0, for all l 6= i, j and ciji 6= 0 (respectively, cijj 6= 0); and (ii) for every s โˆˆ R which is different from r, the factor [ xi , x j ] does not occur in the canonical decomposition modulo S(4) of s. Then G = S/hRi is not realizable as GF ( p) for any field F. Proof. This follows immediately from Theorem 4.15, [MT1, Theorem 7.12] and [MT1, Corollary 3.5].  5. VANISHING OF SOME HIGHER M ASSEY PRODUCTS 5.1. Massey products. Let G be a profinite group and p a prime number. We consider the finite field F p as a trivial discrete G-module. Let C โ€ข = (Cโ€ข (G, F p ), โˆ‚, โˆช) be the differential graded algebra of inhomogeneous continuous cochains of G with coefficients in F p [NSW, Ch. I, ยง2]. We write H i (G, F p ) for the corresponding cohomology groups. We denote by Z1 (G, F p ) the subgroup of C1 (G, F p ) consisting of all 1-cocycles. Because we use trivial action on the coefficients F p , Z1 (G, F p ) = H 1 (G, F p ) = Hom(G, F p ). (See [MT1, MT2] and references therein for more general setups.) Let n โ‰ฅ 3 be an integer. Let a1 , . . . , an be elements in H 1 (G, F p ) = Z1 (G, F p ) โІ C1 (G, F p ). Definition 5.1. A collection M = { aij | 1 โ‰ค i < j โ‰ค n + 1, (i, j) 6= (1, n + 1)} of elements aij of C 1 (G, F p ) is called a defining system for the n-fold Massey product ha1 , . . . , an i if the following conditions are fulfilled: (1) ai,i +1 = ai for all i = 1, 2 . . . , n. j โˆ’1 (2) โˆ‚aij = โˆ‘l =i +1 ail โˆช al j for all i + 1 < j. 22 JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N Then โˆ‘nk=2 a1k โˆช ak,n+1 is a 2-cocycle. Its cohomology class in H 2 is called the value of the product relative to the defining system M, and is denoted by ha1 , . . . , an iM . The nfold Massey product ha1 , . . . , an i itself is the subset of H 2 (G, F p ) consisting of all elements which can be written in the form ha1 , . . . , an iM for some defining system M. When n = 3 we will speak about a triple Massey product. Note that in this case the triple Massey product ha1 , a2 , a3 i is defined if and only if a1 โˆช a2 = a2 โˆช a3 = 0 in H 2 (G, F p ). For some convenience, we introduce the following definition. Definition 5.2. Let n โ‰ฅ 1 be an integer. Let a1 , . . . , an be elements in H 1 (G, F p ). A collection M = { aij | 1 โ‰ค i < j โ‰ค n + 1} of elements aij of C 1 (G, F p ) is called a complete defining system for the n-tuple (a1 , . . . , an ) if the following conditions are fulfilled: (1) ai,i +1 = ai for all i = 1, 2 . . . , n. j โˆ’1 (2) โˆ‚aij = โˆ‘l =i +1 ail โˆช al j for all i + 1 < j. Note that for n = 1, M = { a12 := a1 } is a complete defining system for (a1 ). For n = 2, (a1 , a2 ) has a complete defining system if and only if a1 โˆช a2 = 0. For n โ‰ฅ 3, (a1 , . . . , an ) has a complete defining system if and only if the n-fold Massey product ha1 , . . . , an i is defined and contains 0. 5.2. Vanishing of some higher Massey products. Let A be a unital commutative ring. Let n be a positive integer. Assume that every integer 1 โ‰ค k โ‰ค n is invertible in A. We have the following binomial polynomials in the ring A[ X ] of polynomials in one variable X and with coefficients in A:     X ( X โˆ’ 1) ยท ยท ยท ( X โˆ’ k + 1) X X = = 1 and , 1 โ‰ค k โ‰ค n. k 0 k! We have the following elementary lemma. Lemma 5.3. Let the notation be as above. For 1 โ‰ค k โ‰ค n, one has    k   Y X X+Y โˆˆ A[ X, Y ]. =โˆ‘ kโˆ’l l k l =0 Here A[ X, Y ] is the ring of polynomials with coefficients A in two variables X and Y.  Remark 5.4. Let the notation be as above. Then for 1 โ‰ค k โ‰ค n, one also has k X l Y kโˆ’ l ( X + Y )k =โˆ‘ โˆˆ A[ X, Y ]. k! l! ( k โˆ’ l ) ! l =0 Xk And all results presented below can be stated and proved by using (with some obk!   X .  vious modifications) instead of using k TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 23 1 1 For any element ฯ‡ in  (G, F p ) = Z (G, F p ) = Hom(G, F p ) and for each k =  H ฯ‡ โˆˆ C1 (G, F p ) by 0, . . . , p โˆ’ 1, we define k     ฯ‡(ฯƒ ) ฯ‡ , โˆ€ฯƒ โˆˆ G. (ฯƒ ) = k k Corollary 5.5. Let ฯ‡ be an element in Hom(G, F p ). Let k be an integer with 1 โ‰ค k < p. Then     kโˆ’1   ฯ‡ ฯ‡ ฯ‡ โˆˆ C2 (G, F p ). โˆช =โˆ’โˆ‘ d k โˆ’ l l k l =1 Proof. By Lemma 5.3, we have         ฯ‡ ฯ‡ ฯ‡ ฯ‡ (ฯƒฯ„ ) (ฯ„ ) โˆ’ (ฯƒ ) + (ฯƒ, ฯ„ ) = d k k k k       ฯ‡(ฯƒฯ„ ) ฯ‡(ฯ„ ) ฯ‡(ฯƒ ) โˆ’ + = k k k       ฯ‡(ฯƒ ) + ฯ‡(ฯ„ ) ฯ‡(ฯ„ ) ฯ‡(ฯƒ ) โˆ’ + = k k k        k ฯ‡(ฯ„ ) ฯ‡(ฯƒ ) ฯ‡(ฯ„ ) ฯ‡(ฯƒ ) โˆ’โˆ‘ + = kโˆ’l l k k l =0   kโˆ’1   ฯ‡ ฯ‡ =โˆ’โˆ‘ (ฯƒ, ฯ„ ), โˆ€ฯƒ, ฯ„ โˆˆ G, โˆช kโˆ’l l l =1 as desired.  Corollary 5.6. Let ฯ‡ be an element in H 1 (G, F p ) = Hom(G, F p ). Let k < p be a positive integer. Then the system     ฯ‡ | 1 โ‰ค i < j โ‰ค k+1 M= โˆ’ jโˆ’i is a complete defining system for the n-tuple (โˆ’ฯ‡, โˆ’ฯ‡, . . . , โˆ’ฯ‡) (k copies of โˆ’ฯ‡). Proof. This follows immediately from Corollary 5.5.  Proposition 5.7. Let F be a field containing a primitive p-th root of unity. Let a and b be elements which are linearly independent modulo ( Fร— ) p . Let k < p be a positive integer. Assume that ฯ‡ a โˆช ฯ‡b = 0. Then the (k + 1)-fold Massey product hโˆ’ฯ‡b , โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a i (k copies of โˆ’ฯ‡a ) is defined and has a complete defining system of the form M = {aij โˆˆ C1 (G, F p ) | 1 โ‰ค i < j โ‰ค k + 2}, where   ฯ‡a , for all 2 โ‰ค i < j โ‰ค k + 2. aij = โˆ’ jโˆ’i JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N 24 Proof. By Corollary 5.6, the system { aij := โˆ’( jฯ‡โˆ’ai) | 2 โ‰ค i < j โ‰ค k + 2} is a complete defining system for the k-tuple (โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a ). We set a1,2 = โˆ’ฯ‡b . We shall prove by induction on j = 3, 4, . . . , k + 2 that there exist a13 , a14 , . . . , a1j โˆˆ C1 (GF , F p ) such that da1r = r โˆ’1 โˆ‘ a2l โˆช alr , โˆ€r = 3, 4, . . . , j. l =2 Then this will imply immediately that the system { aij | 1 โ‰ค i < j โ‰ค k + 2} is a complete defining sytem for the (k + 1)-tuple (โˆ’ฯ‡b , โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a ). If j = 3, then since ฯ‡ a โˆช ฯ‡b = 0, there exists ฯ•ba โˆˆ C1 (GF , F p ) such that dฯ•ba = ฯ‡b โˆช ฯ‡ a . We set a1,3 := ฯ•ba . Then da1,3 = ฯ‡b โˆช ฯ‡ a = a1,2 โˆช a2,3 . Now assume that j > 3. By induction hypothesis there exist b13 , b14 , . . . , b1j โˆˆ C1 (GF , F p ) such that db1r = Then the system r โˆ’1 โˆ‘ a1l โˆช alr , โˆ€r = 3, 4, . . . , j. l =2 N := {a12 , b13 , . . . , b1j , and aยตฮฝ with 2 โ‰ค ยต < ฮฝ โ‰ค j + 1} is a defining system for the j-fold Massey product hโˆ’ฯ‡b , โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a i. Then the value of this Massey product with respect to N is hฯ‡b , ฯ‡a , . . . , ฯ‡a iN = a12 โˆช a2,j+1 + b13 โˆช a3,j+1 + ยท ยท ยท + b1j โˆช a j,j+1       ฯ‡a ฯ‡a ฯ‡a . + ยท ยท ยท + b1j โˆช โˆ’ + b13 โˆช โˆ’ = โˆ’ฯ‡b โˆช โˆ’ 1 jโˆ’2 jโˆ’1 For the ease of notation, we denote res ker ฯ‡ a just by res a . Then we have res a (hโˆ’ฯ‡b , โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a iN )       ฯ‡a ฯ‡a ฯ‡a ) ) + ยท ยท ยท + res a (b1j ) โˆช res a (โˆ’ ) + res a (b13 ) โˆช res a (โˆ’ = res a (โˆ’ฯ‡b ) โˆช res a (โˆ’ 1 jโˆ’2 jโˆ’1 = res a (โˆ’ฯ‡b ) โˆช 0 + res a (b13 ) โˆช 0 + ยท ยท ยท + res a (b1j ) โˆช 0 = 0. Then by Proposition 3.1, there exists x โˆˆ Fร— such that         ฯ‡a ฯ‡a ฯ‡a ฯ‡a โˆˆ H 2 (G, F p ). = โˆ’ฯ‡x โˆช โˆ’ + ยท ยท ยท + b1j โˆช โˆ’ + b13 โˆช โˆ’ โˆ’ฯ‡b โˆช โˆ’ 1 1 jโˆ’2 jโˆ’1 Hence there exists a1,j+1 in C1 (G, F p ) such that         ฯ‡a ฯ‡a ฯ‡a ฯ‡a = da1,j+1 . + (b1j + ฯ‡x ) โˆช โˆ’ + ยท ยท ยท + b1,jโˆ’1 โˆช โˆ’ + b13 โˆช โˆ’ ฯ‡b โˆช โˆ’ 1 2 jโˆ’2 jโˆ’1 TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 25 We set a1r := b1r for r = 3, 4, . . . , j โˆ’ 1, and a1j := b1j + ฯ‡ x . Then we have da1r = db1r = r โˆ’1 โˆ‘ a1l โˆช alr , โˆ€r = 3, 4, . . . , j, l =2 and j da1,j+1 = โˆ‘ a1l โˆช al,j+1, l =2 as desired.  Proposition 5.8. Let F be a field containing a primitive p-th root of unity. Let a and b be elements which are linearly independent modulo ( Fร— ) p . Let k < p be a positive integer. Assume that ฯ‡ a โˆช ฯ‡b = 0. Then the (k + 2)-fold Massey product hโˆ’ฯ‡ a , โˆ’ฯ‡b , โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a i (k + 1 copies of โˆ’ฯ‡ a ) is defined and has a complete defining system of the form M = { aij โˆˆ C1 (G, F p ) | 1 โ‰ค i < j โ‰ค k + 3}, where   ฯ‡a , for all 3 โ‰ค i < j โ‰ค k + 3. aij = โˆ’ jโˆ’i Proof. By Proposition 5.7, there exists a system { aij โˆˆ C1 (G, F p ) | 2 โ‰ค i < j โ‰ค k + 3} such that it is a complete defining system for the k + 1-tuple (โˆ’ฯ‡b , โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a ) and that   ฯ‡a , for all 3 โ‰ค i < j โ‰ค k + 3. aij = โˆ’ jโˆ’i We set a1,2 = โˆ’ฯ‡ a . We shall prove by induction on j = 3, 4, . . . , k + 3 that there exist a13 , a14 , . . . , a1j โˆˆ C1 (GF , F p ) such that da1r = r โˆ’1 โˆ‘ a2l โˆช alr , โˆ€r = 3, 4, . . . , j. l =2 Then this will imply immediately that the system { aij | 1 โ‰ค i < j โ‰ค k + 3} is a complete defining system for the (k + 2)-tuple (โˆ’ฯ‡ a , โˆ’ฯ‡b , โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a ). If j = 3, then since ฯ‡ a โˆช ฯ‡b = 0, there exists ฯ• ab โˆˆ C1 (GF , F p ) such that dฯ• ab = ฯ‡ a โˆช ฯ‡b . We set a1,3 := ฯ• ab . Then da1,3 = ฯ‡ a โˆช ฯ‡b = a1,2 โˆช a2,3 . Now assume that j > 3. By induction hypothesis there exist b13 , b14 , . . . , b1j โˆˆ C1 (GF , F p ) such that db1r = Then the system r โˆ’1 โˆ‘ a1l โˆช alr , โˆ€r = 3, 4, . . . , j. l =2 N := {a12 , b13 , . . . , b1j , and aยตฮฝ with 2 โ‰ค ยต < ฮฝ โ‰ค j + 1} JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N 26 is a defining system for the j-fold Massey product hโˆ’ฯ‡b , โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a i. Then the value of this Massey product with respect to N is hโˆ’ฯ‡a , โˆ’ฯ‡b , โˆ’ฯ‡a , . . . , โˆ’ฯ‡a iN = a12 โˆช a2,j+1 + b13 โˆช a3,j+1 + ยท ยท ยท + b1j โˆช a j,j+1       ฯ‡a ฯ‡a ฯ‡a . + ยท ยท ยท + b1j โˆช โˆ’ + b13 โˆช โˆ’ = โˆ’ฯ‡a โˆช a2,j+1 + b13 โˆช โˆ’ 1 jโˆ’2 jโˆ’1 For the ease of notation, we denote res ker ฯ‡ a just by res a . Then we have res a (hโˆ’ฯ‡ a , โˆ’ฯ‡b , โˆ’ฯ‡ a , . . . , โˆ’ฯ‡ a iN )    ฯ‡a ฯ‡a ) ) + ยท ยท ยท + res a (b1j ) โˆช res a (โˆ’ = res a (โˆ’ฯ‡a ) โˆช res a (a2,j+1 ) + res a (b13 ) โˆช res a (โˆ’ 1 jโˆ’2 = 0 โˆช res a (a2,j+1 ) + res a (b13 ) โˆช 0 + ยท ยท ยท + res a (b1j ) โˆช 0 = 0.  By Proposition 3.1, there exists x โˆˆ Fร— such that       ฯ‡a ฯ‡a ฯ‡a โˆˆ H 2 (G, F p ). = โˆ’ฯ‡x โˆช โˆ’ + ยท ยท ยท + b1j โˆช โˆ’ โˆ’ฯ‡a โˆช a2,j+1 + b13 โˆช โˆ’ 1 1 jโˆ’2 Hence there exists a1,j+1 in C1 (G, F p ) such that       ฯ‡a ฯ‡a ฯ‡a = da1,j+1 . + (b1j + ฯ‡x ) โˆช โˆ’ + ยท ยท ยท + b1,jโˆ’1 โˆช โˆ’ โˆ’ฯ‡a โˆช a2,j+1 + b13 โˆช โˆ’ 1 2 jโˆ’2 We set a1r := b1r for r = 3, 4, . . . , j โˆ’ 1, and a1j := b1j + ฯ‡ x . Then we have da1r = db1r = r โˆ’1 โˆ‘ a1l โˆช alr , โˆ€r = 3, 4, . . . , j, l =2 and j da1,j+1 = as desired. โˆ‘ a1l โˆช al,j+1, l =2  Theorem 5.9. Let F be a field containing a primitive p-th root of unity. Let a and b be elements which are linearly independent modulo ( Fร— ) p . Let k < p be a positive integer. Assume that ฯ‡ a โˆช ฯ‡b = 0. Then we have (1) The (k + 1)-fold Massey products hฯ‡b , ฯ‡ a , . . . , ฯ‡ a i and hฯ‡ a , . . . , ฯ‡ a , ฯ‡b i (k copies of ฯ‡ a ) are defined and contain 0. (2) The (k + 2)-fold Massey products hฯ‡ a , ฯ‡b , ฯ‡ a , . . . , ฯ‡ a i and hฯ‡ a , . . . , ฯ‡ a , ฯ‡b , ฯ‡ a i (k + 1 copies of ฯ‡ a ) are defined and contain 0. Proof. We recall the following formal property of Massey products. If ha1 , a2 , . . . , an i is defined, then han , anโˆ’1 , . . . , a1 i is defined and ha1 , a2 , . . . , an i = ยฑhan , anโˆ’1 , . . . , a1 i. TRIPLE MASSEY PRODUCTS VANISH OVER ALL FIELDS 27 (See [Kra, Theorem 8].) Observe also that โˆ’ฯ‡ a = ฯ‡ aโˆ’1 for every a โˆˆ Fร— . The statement then follows from the two previous propositions.  R EFERENCES [AS1] [AS2] [CKM] [Dwy] [Ef] [EMa1] [EMa2] [EM1] [EM2] [Fe] [DGMS] [HW] [Kra] [Ma] [Me] [MSp] [MT1] [MT2] [MT3] [MT4] [NSW] [Se1] [Se2] E. Artin and O. Schreier, Algebraische Konstruktion reeller Kรถrper, Abh. Math. Sem. Univ. Hamburg 5 (1927) pp. 85-99. Reprinted in: Artinโ€™s Collected Papers (Eds. S. Lang and J. Tate), Springer-Verlag, New York, 1965, pp. 258-272. E. Artin and O. Schreier, Eine Kennzeichnung der reell abgeschlossenen Kรถrper, Abh. Math. Sem. Univ. Hamburg 5 (1927) pp. 225-231. Reprinted in: Artinโ€™s Collected Papers (Eds. S. Lang and J. Tate), Springer-Verlag, New York, 1965, pp. 289-295. J.-P. Colliot-Thรฉlรจne, D. Kanevsky, J.P. Sansuc, Arithmรฉtique des surfaces cubiques diagonales, Diophantine approximation and transcendence theory (Bonn, 1985), 1-108, Lecture Notes in Math., 1290, Springer, Berlin, 1987. W. G. Dwyer, Homology, Massey products and maps between groups, J. Pure Appl. Algebra 6 (1975), no. 2, 177-190. I. Efrat, The Zassenhaus filtration, Massey products, and representations of profinite groups, Adv. Math. 263 (2014), 389-411. I. Efrat and E. Matzri, Vanishing of Massey products and Brauer groups, Can. Math. Bull. 58 (2015), 730-740. I. Efrat and E. Matzri, Triple Massey products and absolute Galois groups, to appear in J. Eur. Math. Soc., arXiv:1412.7265. I. Efrat and J. MinรกcฬŒ, On the descending central sequence of absolute Galois groups, Amer. J. Math. 133 (2011), no. 6, 1503-1532. I. Efrat and J. MinรกcฬŒ, Galois groups and cohomological functors, to appear in Trans. Amer. Math. Soc., arXiv:1103.1508. R. Fenn, Techniques of Geometric Topology, London Math. Soc. Lect. Notes 57 Cambridge 1983. P. Deligne, P. Griffiths, J. Morgan and D. Sullivan, Real homotopy theory of Kรคhler manifolds, Invent. Math. 29 (1975), 245-274. M. Hopkins and K. Wickelgren, Splitting varieties for triple Massey products, J. Pure Appl. Algebra 219 (2015), 1304-1319. D. Kraines, Massey higher products, Trans. Amer. Math. Soc. 124 (1996), 431-449. E. Matzri, Triple Massey products in Galois cohomology, preprint (2014), arXiv:1411.4146. A. Merkurjev, Essential p-dimension of PGL( p2 ), J. Amer. Math. Soc. 23 (2010), no. 3, 693-712. J. MinรกcฬŒ and M. Spira, Witt rings and Galois groups, Ann. of Math. (2) 144 (1996), no. 1, 35-60. J. MinรกcฬŒ and N. D. Tรขn, Triple Massey products and Galois theory, to appear in J. Eur. Math. Soc., arXiv:1307.6624. J. MinรกcฬŒ and N. D. Tรขn, The Kernel Unipotent Conjecture and Massey products on an odd rigid field (with an appendix by I. Efrat, J. MinรกcฬŒ and N. D. Tรขn), Adv. Math. 273 (2015), 242-270. J. MinรกcฬŒ and N. D. Tรขn, Triple Massey products over global fields, Doc. Math 20 (2015) 1467-1480. J. MinรกcฬŒ and N. D. Tรขn, Construction of unipotent Galois extensions and Massey products, preprint (2015) arXiv:1501.01346. J. Neukirch, A. Schmidt and K. Wingberg, Cohomology of number fields, Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], 323, Springer-Verlag, Berlin, 2000. J.-P. Serre, Local fields, translated from the French by M. J. Greenberg, Graduate Texts in Mathematics, 67, Springer-Verlag, New York-Berlin, 1979. J.-P. Serre, Galois cohomology, translated from the French by P. Ion and revised by the author, corrected reprint of the 1997 English edition, Springer Monographs in Mathematics, Springer-Verlag, Berlin, 2002. JรN MINรCฬŒ AND NGUYแป„N DUY Tร‚N 28 [Sha1] [Sha2] [Ti] [Vi] [We] [Wic] R. Sharifi, Twisted Heisenberg representations and local conductors, Ph.D. thesis, The University of Chicago (1999). R. Sharifi, Massey products and ideal class groups, J. Reine Angew. Math. 603 (2007), 1-33. J.-P. Tignol, Produits croisรฉs abรฉliens, J. Algebra 70 (1981), no. 2, 420-436. F. R. Villegas, Relations between quadratic forms and certain Galois extensions, a manuscript, Ohio State University, 1988, http://www.math.utexas.edu/users/villegas/osu.pdf. E. Weiss, Cohomology of groups, Pure and Applied Mathematics, Vol. 34 Academic Press, New York-London, 1969. K. Wickelgren, n-nilpotent obstruction to ฯ€1 sections of P1Q โˆ’ {0, 1, โˆž} and Massey products, Galois Teichmรผller Theory and Arithmetic Geometry, proceedings for conferences in Kyoto (October 2010) (H. Nakamura, F. Pop, L. Schneps and A. Tamagawa, eds.), Advanced Studies in Pure Mathematics, vol. 63, Mathematical Society of Japan, 2012, 579-600. D EPARTMENT OF M ATHEMATICS , W ESTERN U NIVERSITY, L ONDON , O NTARIO , C ANADA N6A 5B7 E-mail address: [email protected] D EPARTMENT M ATHEMATICS , W ESTERN U NIVERSITY, L ONDON , O NTARIO , C ANADA N6A 5B7 M ATHEMATICS , V IETNAM A CADEMY OF S CIENCE AND T ECHNOLOGY, 18 H OANG Q UOC V IET, 10307, H ANOI - V IETNAM E-mail address: [email protected] OF AND I NSTITUTE OF
4math.GR
1 Energy Storage Arbitrage in Real-Time Markets via Reinforcement Learning Hao Wang, Baosen Zhang Department of Electrical Engineering, University of Washington, Seattle, WA 98195 arXiv:1711.03127v2 [cs.SY] 23 Feb 2018 Email: {hwang16,zhangbao}@uw.edu Abstract In this paper, we derive a temporal arbitrage policy for storage via reinforcement learning. Real-time price arbitrage is an important source of revenue for storage units, but designing good strategies have proven to be difficult because of the highly uncertain nature of the prices. Instead of current model predictive or dynamic programming approaches, we use reinforcement learning to design an optimal arbitrage policy. This policy is learned through repeated charge and discharge actions performed by the storage unit through updating a value matrix. We design a reward function that does not only reflect the instant profit of charge/discharge decisions but also incorporate the history information. Simulation results demonstrate that our designed reward function leads to significant performance improvement compared with existing algorithms. I. I NTRODUCTION Energy storage can provide various services (e.g., load shifting, energy management, frequency regulation, and grid stabilization) [1] to the power grid and its economic viability is receiving increasing attention. One of the most discussed revenue sources for energy storage is real-time temporal arbitrage (i.e., charging at low prices and discharging at higher prices), where storage units take advantage of the price spreads in real-time electricity market prices to make profits over time [2]. This application has received significant attention from the research community, especially since the growing penetration of intermittent renewable generations are resulting in more volatile real-time electricity market prices [3]. However, even with this increase in price spread, it remains nontrivial to design arbitrage policies that make significant (or even positive) profit [4]. The difficulties come from the fact that future prices are unknown, difficult to forecast and may even be non-stationary [5, 6]. In this paper, we aim to develop an arbitrage policy for energy storage in a data-driven framework by using reinforcement learning [7]. For example, arbitrage using energy storage has been studied in [2, 8โ€“11] (and see the references within). The authors in [8] studied using sodium-sulfur batteries and flywheels for arbitrage in NYISO found the batteries can be potentially profitable using data from 2001 to 2004. The authors in [2] analyzed a generic storage system in the PJM real-time market and discovered that the arbitrage value was nearly doubled from 2002 to 2007 due to higher price variations. The authors in [9] formulated a linear optimization problem to compare the arbitrage profits of 14 energy storage technologies in several major U.S. real-time electric markets. Similar studies have also been carried out in different markets, e.g., Australian national electricity market [10] and European electricity markets [11]. February 27, 2018 DRAFT 2 Crucially, all of these studies assumed perfect knowledge of electricity prices and therefore cannot be implemented as real-time arbitrage strategies. Some recent works [12โ€“15] have started to explicitly take the electricity price uncertainty into account when designing arbitrage strategies. The authors in [12] proposed a stochastic dynamic program to optimally operate an energy storage system using available forecast. The authors in [13] formulated a stochastic optimization problem for a storage owner to maximize the arbitrage profit under uncertainty of market prices. Both studies need to forecast electricity prices and their performances heavily rely on the quality of the forecast. However, real-time market prices are highly stochastic and notoriously difficult to forecast well [16]. To overcome the reliance on price predictions, the authors in [14] employed approximate dynamic programming to derive biding strategy for energy storage in NYISO real-time market without requiring prior knowledge of the price distribution. However, this strategy is often highly computationally expensive. The authors in [15] proposed an online modified greedy algorithm for arbitrage which is computationally straightforward to implement and does not require the full knowledge of price distributions. But it needs to estimate the bounds of prices and assume that storages are โ€œbig enoughโ€, which is not always true in practice. The aforementioned challenges motivate us to develop an easily implementable arbitrage policy using reinforcement learning (RL). This policy is both price-distribution-free and outperforms existing ones. Without explicitly assuming a distribution, our policy is able to operate under constantly changing prices that may be non-stationary. Over time, by repeatedly performing charge and discharge actions under different real-time prices, the proposed RL-based policy learns the best strategy that maximizes the cumulative reward. The key technical challenge turns out to be the design of a good reward function that will guide the storage to make the correct decisions. Specifically, we make the following two contributions in this paper: 1) We formulate the energy storage operation as a Markov decision process (MDP) and derive a Q-learning policy [17] to optimally control the charge/discharge of the energy storage for temporal arbitrage in the real-time market. 2) We design a reward function that does not only reflect the instant profit of charge/discharge decisions but also incorporate historical information. Simulation results demonstrate that the designed reward function leads to significant performance improvements compared to the natural instant reward function. In addition, using real historical data, we show the proposed algorithm also leads to much higher profits than existing algorithms. The remainder of the paper is ordered as follows. In Section II, we present the optimization problem for energy storage arbitrage. In Section III, we provide a reinforcement learning approach to obtain the arbitrage policy. Numerical simulations using real data are discussed in Section IV. Section V concludes this paper. II. A RBITRAGE M ODEL AND O PTIMIZATION P ROBLEM We consider an energy storage (e.g., a battery) operating in a real-time electricity market over a finite operational horizon T = {1, ..., T }. The objective of the energy storage is to maximize its arbitrage profit by charging at low prices and discharging when prices are high. We assume the energy storage is a price taker, and its operation will not affect the market prices. We denote dt as the discharged power from the storage at time t and ct as the charged February 27, 2018 DRAFT 3 power into the storage at time t. Let the real-time prices be denoted as pt . We formulate the Arbitrage Maximization Problem (AMP) as follows: max T X   1 pt ฮทd dt โˆ’ ct ฮทc t=1 subject to Et = Etโˆ’1 + ct โˆ’ dt , โˆ€t โˆˆ T (AMP) (1) Emin โ‰ค Et โ‰ค Emax , โˆ€t โˆˆ T (2) 0 โ‰ค ct โ‰ค Cmax , t โˆˆ T (3) 0 โ‰ค dt โ‰ค Dmax , t โˆˆ T (4) variables: ct , dt , โˆ€t โˆˆ T , where ฮทc โˆˆ (0, 1) and ฮทd โˆˆ (0, 1) denote the charge/discharge efficiencies. The constraint in (1) specifies the dynamics of energy level Et over time, (2) constraints the amount of energy in the storage to be between Emin and Emax , (3) and (4) bounds the maximum charge and discharge rates (denoted by Cmax and Dmax , respectively) of the storage. The optimization problem in AMP is a linear program, and we characterize its optimal solution in the next lemma. Lemma 1. The optimal charge and discharge profiles {c?t , d?t , โˆ€t โˆˆ T } satisfy 1) At least one of c?t or d?t is 0 at any time t; 2) c?t = {0, min{Cmax , Emax โˆ’ Etโˆ’1 }}, d?t = {0, min{Dmax , Etโˆ’1 โˆ’ Emin }}. Lemma 1 states that the energy storage will not charge and discharge at the same time. Also, the optimal charge and discharge power will hit the boundary per the operational constraints (1)-(4). Specifically, when the storage decides to charge, it will charge either at the maximum charge rate Cmax or reaching the maximum energy level Emax . Similarly, the discharge power will be either the maximum discharge rate Dmax or the amount to reach the minimum energy level Emin . This binary charging/discharging structure will be important when we design the reinforcement learning algorithm in the next section. If the future prices are known, the optimization problem in AMP can be easily solved to provide an offline optimal strategy for the charge/discharge decisions. However, the offline solution is only practical if a good price forecast is available. In reality, future prices are not known in advance and the energy storage needs to make decisions based on only the current and historical data. In other words, the charge/discharge decisions {cฬ‚t , dห†t } are functions of price information up to the current time slot t, denoted by {p1 , ..., pt }: {cฬ‚t , dห†t } = ฯ€(p1 , ..., pt ), (5) where ฯ€(ยท) is the arbitrage policy for maximizing the profit. Therefore, AMP is a constrained sequential decision problem and can be solved by dynamic programming [18]. But the potentially high dimensionality the state space February 27, 2018 DRAFT 4 makes dynamic programming computationally expensive, and potentially unsuitable for applications like real-time price arbitrage. Moreover, price forecast in real-time markets is extremely challenging, as the mismatch between power supply and demand can be attributed to many different causes. III. R EINFORCEMENT L EARNING A LGORITHM To solve the online version of AMP, we use reinforcement learning (RL). Reinforcement learning is a general framework to solve problems in which [7]: (i) actions taken depend on the system states; (ii) a cumulative reward is optimized; (iii) only the current state and past actions are known; (iv) the system might be non-stationary. The energy storage arbitrage problem has all of the four properties: (i) different electricity prices lead to different actions (e.g., charge/discharge), and the future energy storage level depends on past actions; (ii) the energy storage aims at maximizing the total arbitrage profit; (iii) the energy storage does not have a priori knowledge of the prices, while it knows the past history; (iv) the actual price profiles are non-stationary. In the following, we describe the RL setup for AMP in more detail. A. State Space We define the state space of the energy arbitrage problem as a finite number of states. To be specific, the systemโ€™s state can be fully described by the current price pt and previous energy level Etโˆ’1 . We discretize the price into M intervals, and energy level into N intervals. S = {1, ..., M } ร— {1, ..., N }, where {1, ..., M } represents M even price intervals from the lowest to the highest, and {1, ..., N } denotes N energy level intervals ranging from Emin to Emax . B. Action Space Per Lemma 1, the energy storage will not charge and discharge at the same time. Moreover, the optimal charge and discharge power always reach their maximum allowable rates. We denote the maximum allowable charge/discharge rates as Dฬƒmax = min{Dmax , Etโˆ’1 โˆ’ Emin } and Cฬƒmax = min{Cmax , Emax โˆ’ Etโˆ’1 }. Therefore, the action space of the energy storage consists of three actions: charge at full rate, hold on, and discharge at full rate: A = {โˆ’Dฬƒmax , 0, Cฬƒmax }, where action a = โˆ’Dฬƒmax denotes discharge either at maximum rate Dmax or unitl the storage hits the minimum level Emin . Action a = Cฬƒmax denotes charge at maximum rate Cmax or until the storage reaches the maximum level Emax . C. Reward At time t, after taking an action a โˆˆ A at state s โˆˆ S, the energy storage will receive a reward, such that the energy storage knows how good its action is. According to the objective function of AMP, the energy storage aims February 27, 2018 DRAFT 5 to maximize the arbitrage profit by charging at low prices and discharge at high prices. Therefore, we can define the reward as ๏ฃฑ ๏ฃด ๏ฃด โˆ’pt Cฬƒmax ๏ฃด ๏ฃด ๏ฃฒ rt1 = 0 ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃณp Dฬƒ t max if charge (Reward 1) if hold on if discharge which is the instant reward of charge or discharge. If the energy storage charges at the rate of Cฬƒmax at time t, it will pay at the spot price and reward is negative, i.e., โˆ’pt Cฬƒmax . In contrast, the energy storage discharges at the rate of Dฬƒmax and will earn a revenue of pt Dฬƒmax . Reward 1 is a straightforward and natural design, but is actually not very effective. The reason is that the negative reward for charge makes the energy storage perform conservatively in the learning process and thus the arbitrage opportunity is under explored. This motivates us to develop a more effective reward. To avoid conservative actions, we introduce an average price in the reward. The idea comes from the basic principle of arbitrage: to charge at low prices and discharge at high prices. The average price works as a simple indicator to determine whether the current price is low or high compared to the historical values. ๏ฃฑ ๏ฃด ๏ฃด (pt โˆ’ pt )Cฬƒmax ๏ฃด ๏ฃด ๏ฃฒ rt2 = 0 ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃณ(p โˆ’ p )Dฬƒ t max t Specifically, the new reward is defined as if charge if hold on (Reward 2) if discharge where the average price pt is calculated by pt = (1 โˆ’ ฮท)ptโˆ’1 + ฮทpt , (6) in which ฮท is the smoothing parameter. Note that pt is not a simple average that weighs all past prices equally. Instead, we use moving average in (6), such that we not only leverage the past price information but also adapt to the current price change. We see from Reward 2 that when the energy storage charges at a price lower than the average price (i.e., pt < pt ), it will get a positive reward (pt โˆ’ pt )Cฬƒmax > 0, otherwise it will receive a loss if the spot price is greater. Similarly, Reward 2 encourages the energy storage to discharge at high price by giving a positive reward, i.e., (pt โˆ’ pt )Dฬƒmax > 0. Reward 2 outperforms Reward 1 in exploring more arbitrage opportunities and achieving higher profits. It also mitigates the non-stationarity of prices, since it weights the current price much heavier than prices in the more distant past. We will show the numerical comparisons in Section IV. D. Q-Learning Algorithm With the state, action and reward defined, we obtain the real-time charge and discharge policy using Q-learning (a popular subclass of RL algorithms [7]). Here the energy storage maintains a state-action value matrix Q, where each entry Q(s, a) is defined for each pair of state s and action a. When the energy storage takes a charge/discharge action under a spot price, the value matrix is updated as follows: Q(s, a)t = (1 โˆ’ ฮฑ)Q(s, a)tโˆ’1 + ฮฑ[rt + ฮณ max Q(s0 , a0 )], 0 a February 27, 2018 (7) DRAFT 6 where the parameter ฮฑ โˆˆ (0, 1] is the learning rate weighting the past value and new reward. ฮณ โˆˆ [0, 1] is the discount rate determining the importance of future rewards. After taking an action a, the state transits from s to s0 , and the energy storage updates the value matrix incorporating the instant reward rt (e.g., Reward 1 or 2) and the future value maxa0 Q(s0 , a0 ) in state s0 . Over time, the energy storage can learn the value each action in all states. When Q(s, a) converges to the optimal state-action values, we obtain the optimal arbitrage policy. Specifically, the Q-learning algorithm can derive an arbitrage policy for (5) as a? = ฯ€(s) = arg max Q(s, a), a (8) which is the optimal arbitrage policy guranteed for finite MDP [17]. For any state s, the energy storage always chooses the best action a? which maximizes the value matrix Q(s, a). Algorithm 1 Q-learning for energy storage arbitrage 1: Initialization: In each time slot t โˆˆ {1, ..., T }, set the iteration count k = 1, ฮฑ = 0.5, ฮฑ = 0.9, and  = 0.9. Initialize the Q-matrix, i.e., Q = 0. 2: repeat 3: Step1: Observe state s based on price and energy level; 4: Step2: Decide the best action a (using -greedy method) based on Q(s, a); 5: Step3: Calculate the reward (using Reward 1 or 2); 6: Step4: Update Q(s, a) according to (7) and energy level in (1); 7: s โ† s0 and k โ† k + 1; 8: until end of operation, i.e., t = T . 9: end The step-by-step Q-learning algorithm for energy arbitrage is presented in Algorithm 1. To avoid the learning algorithm getting stuck at sub-optimal solutions, we employ -greedy [17]. The algorithm not only exploits the best action following (8) but also explores other actions, which could be potentially better. Specifically, using -greedy, the algorithm will randomly choose actions with probability  โˆˆ [0, 1], and choose the best action in (8) with probability 1 โˆ’ . IV. N UMERICAL R ESULTS In this section, we evaluate two reward functions and also compare our algorithm to a baseline in [15] under both synthetic prices and realistic prices. For synthetic prices, we generate i.i.d. (independent and identically distributed) prices, and for the realistic price, we use hourly prices from ISO New England real-time market [19] from January 1, 2016 to December 31, 2017. The realistic price is depicted in Figure 1. We see that the averaged price is flat but the instantaneous prices fluctuate significantly with periodic spikes. February 27, 2018 DRAFT 7 1200 Real-time price Average price Price ($/MW) 1000 800 600 400 200 0 -200 0 1000 2000 3000 4000 5000 6000 7000 8000 8784 Time (hour) Fig. 1: PJM Real-time price. A. Synthetic Price We first evaluate the two reward functions under synthetic price, which is uniformly distributed in [0, 1] over 1500 hours. We set Cmax = Dmax = 1, Emin = 0 and Emax = 1. The cumulative profits for both rewards are depicted in Figure 2. Both profits stay flat over the first 300 hours, as the algorithm is exploring the environment with different prices. Afterwards, the algorithm using Reward 2 starts to make profit and achieves 166% more than Reward 1 in the end. To further understand the how Reward 1 and Reward 2 affect the storage operation, we plot the evolution of energy level over a 48 hour horizon in Fig. 3. We see that algorithm using Reward 1 performs conservatively while Reward 2 makes the algorithm actively charge and discharge to take advantage of price spread. Therefore, Reward 2 leads to a more profitable arbitrage strategy. B. Real Historical Price We evaluate the two reward functions using realistic prices from ISO New England real-time market in 2016. We plot the cummulative profits of two rewards during training in Figure 4. We see that Reward 1 fails to make profit while using Reward 2 produces a high profit. This demonstrates the effectiveness of our designed reward: it is able to adapt to price changes and makes profit continuously. Cumulative profit ($) 150 100 50 Reward 1 Reward 2 0 0 500 1000 1500 Time (hour) Fig. 2: Cumulative profits under synthetic prices. February 27, 2018 DRAFT 8 Price ($/MW) 1 0.5 0 0 6 12 18 24 30 36 42 48 36 42 48 Time (hour) Energy level (MWh) (a) Synthetic price. 1 0.5 0 0 6 12 18 24 30 Time (hour) Energy level (MWh) (b) Energy level of algorithm using Reward 1. 1 0.5 0 0 6 12 18 24 30 36 42 48 Time (hour) (c) Energy level of algorithm using Reward 2. Fig. 3: Price and energy levels over a 48 hour period using reward 1 and reward 2 under synthetic prices. We also plot the evolution of energy levels over a 48-hours operational horizon in Figure 5. We see that algorithm using Reward 1 cannot capture the price differences but makes charge/discharge when the real-time price is flat. In contrast, our algorithm using Reward 2 is able to charge at low prices at hours 2 and 29, hold the energy when prices are low, and discharge at hours 12 and 44, respectively, when the price reaches a relatively high point. Cumulative profit ($) 8000 Reward 1 Reward 2 6000 4000 2000 0 -2000 0 1000 2000 3000 4000 5000 6000 7000 8000 8784 Time (hour) Fig. 4: Cumulative profits under real-time prices. February 27, 2018 DRAFT 9 Price ($/MW) 100 50 0 0 6 12 18 24 30 36 42 48 36 42 48 Time (hour) Energy level (MWh) (a) Real-time price. 1 0.5 0 0 6 12 18 24 30 Time (hour) Energy level (MWh) (b) Energy level of algorithm using Reward 1. 1 0.5 0 0 6 12 18 24 30 36 42 48 Time (hour) (c) Energy level of algorithm using Reward 2. Fig. 5: Price and energy levels over a 48 hour horizon for reward 1 and reward 2 under historical data. C. Comparison with baseline algorithm Above discussion demonstrates that Reward 2 performs much better than Reward 1, and thus we stick to Reward 2 and compare our algorithm with a baseline algorithm called online modified greedy algorithm in [15]. This algorithm uses a thresholding strategy to control charge and discharge in an online fashion. We configure the parameters for the baseline according to [15]. The arbitrage profits of two algorithms are simulated on an 8โˆ’MWh battery, with a charge/discharge rate of 1MW as depicted in Figure 6. The baseline algorithm can only get $5, 845, while our algorithm earns $28, 027 that is 4.8 times of the baseline profit. The profit of the baseline decreases when the charge/discharge rate increases to 2MW. But our algorithm achieves even a higher profit, i.e., $39, 690, which is 8.6 times of the baseline profit $4, 603. The reason is that the baseline algorithm relies on the off-line estimate of the price information and lacks adaptability to the real-time prices. Our algorithm updates the average price to adapt to the price changes and thus performs better. February 27, 2018 DRAFT 10 10 4 3 Baseline algorithm Our algorithm Cumulative profit ($) Cumulative profit ($) 2.5 2 1.5 1 0.5 0 -0.5 0 10 4 4 1000 2000 3000 4000 5000 6000 7000 8760 Baseline algorithm Our algorithm 3 2 1 0 -1 Time (hour) 0 1000 2000 3000 4000 5000 6000 7000 8760 Time (hour) (a) 8MWh-1MW battery. (b) 8MWh-2MW battery. Fig. 6: Cumulative profits of the baseline algorithm in [15] and our algorithm. V. C ONCLUSION In this paper, we derive an arbitrage policy for energy storage operation in real-time markets via reinforcement learning. Specifically, we model the energy storage arbitrage problem as an MDP and derive a Q-learning policy to control the charge/discharge of the energy storage. We design a reward function that does not only reflect the instant profit of charge/discharge decisions but also incorporate the history information. Simulation results demonstrate our designed reward function leads to significant performance improvement and our algorithm achieves much more profit compared with existing baseline method. We will consider self-discharge and degradation of battery in our future work. ACKNOWLEDGMENT This work was partially supported by the University of Washington Clean Energy Institute. R EFERENCES [1] J. Eyer and G. Corey, โ€œEnergy storage for the electricity grid: Benefits and market potential assessment guide,โ€ Sandia National Laboratories, vol. 20, no. 10, p. 5, 2010. [2] R. Sioshansi, P. Denholm, T. Jenkin, and J. Weiss, โ€œEstimating the value of electricity storage in pjm: Arbitrage and some welfare effects,โ€ Energy economics, vol. 31, no. 2, pp. 269โ€“277, 2009. [3] C.-K. Woo, I. Horowitz, J. Moore, and A. Pacheco, โ€œThe impact of wind generation on the electricity spot-market price level and variance: The texas experience,โ€ Energy Policy, vol. 39, no. 7, pp. 3939โ€“3944, 2011. [4] R. H. Byrne and C. A. Silva-Monroy, โ€œEstimating the maximum potential revenue for grid connected electricity storage: Arbitrage and regulation,โ€ Sandia National Laboratories, 2012. [5] T. T. Kim and H. V. Poor, โ€œScheduling power consumption with price uncertainty,โ€ IEEE Transactions on Smart Grid, vol. 2, no. 3, pp. 519โ€“527, 2011. [6] S. Borenstein, โ€œThe long-run efficiency of real-time electricity pricing,โ€ The Energy Journal, pp. 93โ€“116, 2005. [7] R. S. Sutton and A. G. Barto, โ€œReinforcement learning: An introduction,โ€ 2011. February 27, 2018 DRAFT 11 [8] R. Walawalkar, J. Apt, and R. Mancini, โ€œEconomics of electric energy storage for energy arbitrage and regulation in new york,โ€ Energy Policy, vol. 35, no. 4, pp. 2558โ€“2568, 2007. [9] K. Bradbury, L. Pratson, and D. Patinฬƒo-Echeverri, โ€œEconomic viability of energy storage systems based on price arbitrage potential in real-time us electricity markets,โ€ Applied Energy, vol. 114, pp. 512โ€“519, 2014. [10] D. McConnell, T. Forcey, and M. Sandiford, โ€œEstimating the value of electricity storage in an energy-only wholesale market,โ€ Applied Energy, vol. 159, pp. 422โ€“432, 2015. [11] D. Zafirakis, K. J. Chalvatzis, G. Baiocchi, and G. Daskalakis, โ€œThe value of arbitrage for energy storage: Evidence from european electricity markets,โ€ Applied Energy, vol. 184, pp. 971โ€“986, 2016. [12] K. Abdulla, J. De Hoog, V. Muenzel, F. Suits, K. Steer, A. Wirth, and S. Halgamuge, โ€œOptimal operation of energy storage systems considering forecasts and battery degradation,โ€ IEEE Transactions on Smart Grid, 2016. [13] D. Krishnamurthy, C. Uckun, Z. Zhou, P. Thimmapuram, and A. Botterud, โ€œEnergy storage arbitrage under day-ahead and real-time price uncertainty,โ€ IEEE Transactions on Power Systems, 2017. [14] D. R. Jiang and W. B. Powell, โ€œOptimal hour-ahead bidding in the real-time electricity market with battery storage using approximate dynamic programming,โ€ INFORMS Journal on Computing, vol. 27, no. 3, pp. 525โ€“543, 2015. [15] J. Qin, Y. Chow, J. Yang, and R. Rajagopal, โ€œOnline modified greedy algorithm for storage control under uncertainty,โ€ IEEE Transactions on Power Systems, vol. 31, no. 3, pp. 1729โ€“1743, 2016. [16] R. Weron, โ€œElectricity price forecasting: A review of the state-of-the-art with a look into the future,โ€ International Journal of Forecasting, vol. 30, no. 4, pp. 1030 โ€“ 1081, 2014. [17] C. J. Watkins and P. Dayan, โ€œQ-learning,โ€ Machine learning, vol. 8, no. 3-4, pp. 279โ€“292, 1992. [18] R. A. Howard, Dynamic programming and markov processes. Oxford, England: John Wiley, 1960. [19] โ€œHourly real-time lmp.โ€ [Online]. Available: https://www.iso-ne.com February 27, 2018 DRAFT
3cs.SY
Interdependent Security Games on Networks under Behavioral Probability Weightingโˆ— arXiv:1510.09106v3 [cs.GT] 12 Aug 2016 Ashish R. Hota and Shreyas Sundaramโ€  Abstract We consider a class of interdependent security games on networks where each node chooses a personal level of security investment. The attack probability experienced by a node is a function of her own investment and the investment by her neighbors in the network. Most of the existing work in these settings considers players who are risk-neutral. In contrast, studies in behavioral decision theory have shown that individuals often deviate from risk-neutral behavior while making decisions under uncertainty. In particular, the true probabilities associated with uncertain outcomes are often transformed into perceived probabilities in a highly nonlinear fashion by the users, which then influence their decisions. In this paper, we investigate the effects of such behavioral probability weightings by the nodes on their optimal investment strategies and the resulting security risk profiles that arise at the Nash equilibria of interdependent network security games. We characterize graph topologies that achieve the largest and smallest worst case average attack probabilities at Nash equilibria in Total Effort games, and equilibrium investments in Weakest Link and Best Shot games. 1 Introduction Interdependent security games are a class of strategic games where the security risk faced by a player (often manifested as the probability of a successful attack) depends on her personal investment in security and the investments by other interacting players [Laszka et al., 2014, Kunreuther and Heal, 2003]. This is a broad framework to capture security interdependencies between independent stakeholders in (networked) cyber-physical systems. There is a large literature on this class of problems [Laszka et al., 2014, Kunreuther and Heal, 2003, Varian, 2004, Manshaei et al., 2013] motivated by applications in cybersecurity, airline security and epidemic risks. Much of the work in interdependent security games considers players who are risk-neutral, or are risk averse in the sense of classical expected utility theory [Laszka et al., 2014]. On the other hand, there is a rich literature in decision theory and behavioral economics showing that human behavior consistently and significantly deviates from the predictions of classical expected utility theory [Camerer et al., 2011]. While there have been some studies highlighting the significance of biases and irrationalities in human decision-making in information security domains [Christin, 2011, Schneier, 2008, Garg and Camp, 2013], theoretical analyses of deviations from classical notions of rational behavior are scarce in the literature on interdependent security games. Empirical investigations are also limited [Christin et al., 2011]. The goal of this paper is to initiate a rigorous investigation of the impact of behavioral decisiontheoretic models in interdependent security games. In the context of security games, one of the โˆ— A preliminary version of this work appeared in the proceedings of GameSec 2015 [Hota and Sundaram, 2015]. The authors are with the School of Electrical and Computer Engineering, Purdue University. E-mail: {ahota,sundara2}@purdue.edu. This work is supported by a grant from the Purdue Research Foundation. โ€  1 most important behavioral deviations from the classical expected utility framework is the way individuals perceive the probability of an uncertain outcome (e.g., cyber attack).1 In particular, empirical studies show that individuals tend to overweight small probabilities and underweight large probabilities. Thus, the true probabilities are typically transformed in a highly nonlinear fashion into perceived probabilities, which are then used for decision-making [Tversky and Kahneman, 1992, Gonzalez and Wu, 1999]. These transformations are captured in the form of probability weighting functions. In this paper, we analyze the effects of behavioral probability weighting on playersโ€™ equilibrium strategies in interdependent security games on networks. We consider three canonical manifestations of the security risk in the forms of Total Effort, Weakest Link and Best Shot games. These game-theoretic models were first introduced in [Varian, 2004] and have been studied extensively in the literature to model several scenarios in the cybersecurity domain, as described below. In Total Effort games on networks, the probability of a successful attack on a node is an (affine) decreasing function of the average of the security investments by the node and her neighbors. The total effort externality has been studied as an abstraction of several cybersecurity problems [Grossklags et al., 2008, Grossklags and Johnson, 2009]. For instance, when an attacker tries to slow down file transfers in peer-to-peer networks, the success of the attack depends on the aggregate effort of all the participating agents [Grossklags et al., 2008]. Similar externalities arise when underinvestment in security by a user potentially causes increasing spam activity for others who communicate with her [Laszka et al., 2014]. In [Miura-Ko et al., 2008, Nguyen et al., 2009], the authors consider a similar formulation, where the security risk faced by a node is a weighted linear combination of her own investment and the investments by her neighbors. The authors discuss multiple settings where such externalities arise, such as in web authentication and spam verification. Amin et. al [Amin et al., 2013] study a related setting, where a set of independent control systems interact over a shared communication network, and the failure probability is a function of the number of controllers who have invested in security.2 In the Weakest Link game, a node is only as secure as the least secure node in her neighborhood, while in the Best Shot game, the player with the maximum investment in the neighborhood must be successfully attacked for the attack on a node to be successful. Weakest link externalities are prevalent in cybersecurity domains; successful breach of one subsystem often increases the vulnerability of connected subsystems by giving the attacker increased access to otherwise restricted parts. Best shot externalities arise in cyber-physical systems that have built-in redundancies. The attacker must breach the most secure subsystem for the attack to be successful. Best shot externalities also arise in censorship resilient communication, where information is available to a node as long as one of her neighbors possesses that information [Johnson et al., 2010]. We summarize our main findings on the effects of network structure and probability weighting on playersโ€™ strategies and equilibrium attack probabilities for all three games in Table 1. Security investments often exhibit characteristics of a public good [Varian, 2004], and the different risk externalities described above have indeed been studied in the context of public good games [Hirshleifer, 1983]. There is also a growing interest in networked public goods in recent years 1 There are also various behavioral characteristics that affect the perceived values of gains and losses [Tversky and Kahneman, 1992, Hota et al., 2016]. 2 Security externalities similar to the Total Effort formulation have also been studied in the broader interdependent security game literature in the context of inefficiency of equilibria [Jiang et al., 2011], incomplete information about the network topology [Pal and Hui, 2011] and cyber insurance [Schwartz et al., 2013]. In all these settings, the security risk faced by a node is determined by the actions of the node and her immediate neighbors. This is different from the line of work that models epidemic risks and cascading failures spreading over the network [Nowzari et al., 2016]. 2 Externality Weakest Link Impact of Network Structure The expected fraction of nodes that are successfully attacked at a PNE is highest in degree-regular graphs, among all graphs with a given average degree. In a connected graph, all nodes have identical investments at a PNE. Best Shot Nodes with nonzero investments at a PNE form a maximal independent set. Total Effort Impact of Weighting Function In degree-regular graphs, the interior PNE is more secure under probability weighting when the graph is sufficiently dense. The attack probabilities that arise at a PNE have values close to 1 and/or 0, depending on the game parameters. Under probability weighting, the PNE is never fully insecure, i.e., there always exist node(s) with nonzero investment(s). Table 1: Summary of main results of the pure Nash equilibrium (PNE) characteristics for different attack probability functions. [Galeotti et al., 2010, Bramoulleฬ et al., 2014]. Our analysis of behavioral probability weighting complements this line of research. 2 Probability Weighting As discussed in the previous section, our focus in this paper will be on understanding the effects of nonlinear weighting of true probabilities by individuals while making decisions under risk. Such weightings have been comprehensively studied in the behavioral economics and psychology literature [Camerer et al., 2011], and more recently in wireless communications [Li and Mandayam, 2014] and the smart grid [Saad et al., 2016]. Behavioral perception of probabilities by human decision makers have certain fundamental characteristics, including (i) possibility effect: overweighting of probabilities very close to 0, (ii) certainty effect: underweighting of probabilities very close to 1, and (iii) diminishing sensitivity from the end points 0 and 1. These characteristics are usually captured by an inverse S-shaped weighting function w : [0, 1] โ†’ [0, 1]; prominent parametric forms of such weighting functions were proposed by Kahneman and Tversky [Tversky and Kahneman, 1992], Gonzalez and Wu [Gonzalez and Wu, 1999], and Prelec [Prelec, 1998], and are illustrated in Figure 1. For our general analysis of the Nash equilibrium in Total Effort games in Section 4 and Weakest Link and Best Shot games in Section 7, we will assume that the derivative of the weighting function satisfies the following properties. Assumption 1. The probability weighting function w(x) has the following properties. 1. wโ€ฒ (x) has a unique minimum for x โˆˆ (0, 1) denoted as xmin,w := argminxโˆˆ[0,1] wโ€ฒ (x), and wโ€ฒโ€ฒ (xmin,w ) = 0. 2. w(x) is strictly concave for x โˆˆ [0, xmin,w ), and is strictly convex for x โˆˆ (xmin,w , 1]. 3. wโ€ฒ (วซ) โ†’ โˆž as วซ โ†’ 0, and wโ€ฒ (1 โˆ’ วซ) โ†’ โˆž as วซ โ†’ 0. We impose the following additional requirements on the weighting functions in order to obtain certain results on the effects of network structure on the equilibria in Section 5. 3 Perceived Probability (w(x)) 1 GW Pr KT 0.8 0.6 0.4 0.2 0 0 0.2 0.4 0.6 0.8 1 True Probability (x) Figure 1: Shape of the probability weighting function for different parametric forms proposed by Gonzalez and Wu (GW) [Gonzalez and Wu, 1999], Prelec (Pr) [Prelec, 1998] and Kahneman and Tversky (KT) [Tversky and Kahneman, 1992]. Assumption 2. The probability weighting function w(x) has the following properties. 1. w โ€ฒโ€ฒ (x) w โ€ฒ (x) < 1 1โˆ’x for x โˆˆ (xmin,w , 1). 2. wโ€ฒ (x) is strictly convex for x โˆˆ (xmin,w , 1). Remark 1. Assumption 1 and 2 hold true for the parametric forms of the weighting functions proposed by Kahneman and Tversky [Tversky and Kahneman, 1992], Gonzalez and Wu [Gonzalez and Wu, 1999], and Prelec [Prelec, 1998] for the ranges of parameter values under which these functions have an inverse-S shape (Figure 1). In particular, the assumptions hold for the ranges of parameter values estimated from empirical studies on human subjects; [Booij et al., 2010] contains a review of several such studies. For our results on the effect of the intensity of overweighting and underweighting of the weighting functions on the equilibrium attack probabilities in Section 6, we will need to consider a specific parametric form of the weighting function. For that purpose, we use the single-parameter Prelec weighting function from [Prelec, 1998] due to its analytical tractability. In particular, if the true probability of an outcome is x, the Prelec weighting function is given by w(x) = exp(โˆ’(โˆ’ ln(x))ฮฑ ), x โˆˆ [0, 1], (1) where exp(ยท) is the exponential function. The parameter ฮฑ โˆˆ (0, 1) controls the curvature of the weighting function. For ฮฑ = 1, we have w(x) = x, i.e., the weighting function is linear. For smaller ฮฑ, the function w(x) has a sharper overweighting of low probabilities and underweighting of high probabilities. A useful property of this function is that regardless of the value of ฮฑ, xmin,w = 1e , and w( 1e ) = 1e . In other words, wโ€ฒโ€ฒ (x) = 0 at x = 1e . The minimum value of wโ€ฒ (x) is wโ€ฒ ( 1e ) = ฮฑ. 3 Interdependent Security Games In this paper, we consider interdependent security games on networks. Let G = {V, E} denote an undirected network (or graph) with V being the set of nodes with |V| = n. Each node is an independent decision-maker (player of the game) representing, for instance, an entity in a cyber-physical system. The security investment by node i is denoted as si , with si โˆˆ [0, 1]. The security risk or attack probability experienced by a node is a function of her investment si , and the investment by her direct neighbors. We denote the set of neighbors of node i as N (i), and the investment 4 profile of all nodes in N (i) as the vector sN (i) . The true probability of a successful attack on node i is given by fi (si , sN (i) ) โˆˆ [0, 1], for some function fi . Node i incurs a cost-per-unit of security investment of ci โˆˆ Rโ‰ฅ0 , and if the attack is successful, she incurs a loss of Li โˆˆ R>0 . Her expected utility (under the true probability of successful attack) is then Eui (si , sN (i) ) = โˆ’Li fi (si , sN (i) ) โˆ’ ci si . (2) For ease of notation, we define the extended neighborhood of node i, denoted Nฬ„ (i), as the set of nodes including herself and her neighboring nodes, i.e., Nฬ„ (i) , N (i) โˆช {i}. We denote the size of the extended neighborhood of a node i as, di , 1 + |N (i)|. (3) In this work, we consider three canonical models of interdependent security games initially presented in [Grossklags et al., 2008]. The models differ in the attack probability function fi (si , sN (i) ) as described below. P โ€ข Total Effort: fi (si , sN (i) ) = 1 โˆ’ d1i ( jโˆˆNฬ„ (i) sj ). โ€ข Weakest Link: fi (si , sN (i) ) = 1 โˆ’ minjโˆˆNฬ„ (i) sj . โ€ข Best Shot: fi (si , sN (i) ) = 1 โˆ’ maxjโˆˆNฬ„ (i) sj . Note that in prior works (e.g. [Grossklags et al., 2008]), the games were defined over complete graphs, i.e., Nฬ„ (i) = V, while we consider more general graph topologies. Most of our analysis will focus on the Total Effort attack probability function, since the results also have potential implications for other classes of security games considered in the literature [Miura-Ko et al., 2008, Nguyen et al., 2009]. Since the focus of the present work is to understand the effects of behavioral probability weighting functions and node degrees on the Nash equilibrium security levels, we only focus on the case where the security risk of a node is influenced in an identical way by all of her neighborsโ€™ investments. We formally define the notion of an equilibrium and best response in interdependent security games as follows. Definition 1. A strategy profile {sโˆ—1 , sโˆ—2 , . . . , sโˆ—n } is a pure Nash equilibrium (PNE) if for every player i โˆˆ {1, 2, . . . , n}, Eui (sโ€ฒi , sโˆ—N (i) ) โ‰ค Eui (sโˆ—i , sโˆ—N (i) ), โˆ€sโ€ฒi โˆˆ [0, 1]. Definition 2. The best response of player i at a given investment profile sN (i) by her neighbors is the set bi (sN (i) ) , argmaxsi โˆˆ[0,1] Eui (si , sN (i) ). A strategy profile {sโˆ—1 , sโˆ—2 , . . . , sโˆ—n } is a pure Nash equilibrium if and only if sโˆ—i โˆˆ bi (sโˆ—N (i) ) for every player i โˆˆ {1, 2, . . . , n}. In other words, a PNE exists if the vector of best response mappings [b1 (ยท), b2 (ยท), . . . , bn (ยท)] possesses a fixed point [Osborne and Rubinstein, 1994]. 3.1 Equilibria without probability weighting To establish a baseline, we present the following proposition that describes the main results from [Grossklags et al., 2008] regarding the properties of the best response of a player with w(x) = x in a Total Effort game; while that paper only considered complete graphs, the result extends directly to general graphs. We refer to a player with w(x) = x as a true expectation maximizer as she maximizes her expected utility (2) without any behavioral probability weighing. 5 Proposition 1. Consider a player i with wi (x) = x in a Total Effort game with extended neighborhood size di . Then, her best response is sโˆ—i = 1 when dLi cii < 1, and sโˆ—i = 0 if dLi cii > 1. In the special case where dLi cii = 1, any investment si โˆˆ [0, 1] is an optimal strategy. Note that, except for the pathological case where dLi cii = 1, the best response of a player is to either fully protect herself or remain completely unprotected. As the size of her neighborhood increases, her best response jumps from investing 1 to investing 0. Such behavior arises since the marginal utility of a true expectation maximizer in (2) is independent of her strategy and the strategies of the players in her neighborhood. When the cost parameters ci and Li are homogeneous across players, only a set of nodes with small enough degrees make an investment of 1, while the high degree nodes invest zero in any Nash equilibrium of the Total Effort game. Furthermore, in degree regular graphs, the only equilibrium that arises has all players investing 0 or investing 1, i.e., all players are either fully secure or fully unprotected. In our analysis, we will show that under behavioral probability weighting, both the best responses and the equilibria have much richer structural properties and vary more smoothly with the weighting parameters and the network structure. 4 Pure Nash Equilibria in Total Effort Games with Behavioral Probability Weighting In this section, we consider Total Effort games on networks with player-specific probability weighting functions wi (ยท) (satisfying Assumption 1) and cost parameters ci and Li . We first prove the existence of a PNE in this class of games by establishing the existence of a fixed point of the best response mapping (see Definition 2). With probability weighting, the expected utility of player i with investment si โˆˆ [0, 1] is given by   si + sฬ„โˆ’i โˆ’ ci si , (4) Eui (si , sN (i) ) = โˆ’Li wi 1 โˆ’ di P where sฬ„โˆ’i = jโˆˆN (i) sj is the total investment in security by the neighbors of i. The quantity di is the size of the extended neighborhood of player i as defined in (3). The marginal utility is given by   Li โ€ฒ si + sฬ„โˆ’i โˆ‚Eui = wi 1 โˆ’ โˆ’ ci . (5) โˆ‚si di di The solutions of โˆ‚Eui โˆ‚si = 0 (if any) satisfy the first order necessary condition of optimality, and are   โˆ’i is the true attack therefore candidate solutions for player iโ€™s best response. Note that 1 โˆ’ si +sฬ„ di probability faced by player i (without probability weighting). We illustrate the nature of solutions of the first order condition (5) in Figure 2 for a Prelec weighting function with parameter ฮฑ = 0.4. One can see from the figure and (5) that if dLi cii โ‰ค i wiโ€ฒ (xmin,wi ) = minxโˆˆ[0,1] wiโ€ฒ (x), we have โˆ‚Eu โˆ‚si โ‰ฅ 0 for si โˆˆ [0, 1], and investing 1 is the only best response of a player irrespective of the strategies of her neighbors.3 Now suppose dLi cii > wiโ€ฒ (xmin,wi ). In this case, the first order condition wiโ€ฒ (x) = dLi cii has two distinct interior solutions corresponding to true attack probabilities Vi < xmin,w and Xi > xmin,w , as illustrated in Figure 2. Note that as the degree of the node increases, Xi โˆ’ Vi increases as well. Eui = 0 at x โˆ‚ Eui When dLi cii = wiโ€ฒ (xmin,wi ), there is a unique solution to โˆ‚โˆ‚s > 0 for all other si . The min,wi , and โˆ‚s i i player prefers to invest 1 in this case. The proof is similar to Case 4 in the proof of Lemma 1. 3 6 2 dw(x)/dx 1.5 1 0.5 V 0 0 X 0.2 0.4 0.6 0.8 1 x Figure 2: Interior solutions of wโ€ฒ (x) = dc are denoted by V and X. In this example, L is shown by the horizontal line. The Prelec weighting parameter is ฮฑ = 0.4. dc L = 0.8 and When sฬ„โˆ’i is the total investment by the neighbors of player i, player iโ€™s strategy can change her true attack probability in the interval   sฬ„โˆ’i 1 + sฬ„โˆ’i ,1 โˆ’ . (6) X (sฬ„โˆ’i ) , 1 โˆ’ di di In other words, when the extended neighborhood size is di , each player can directly change the probability of successful attack by at most d1i . We will make the following assumptions. Assumption 3. For any player i with dLi cii > wiโ€ฒ (xmin,wi ), let the size of the extended neighborhood (di ), and the cost parameters (ci and Li ) be such that, (1) Xi โˆ’ Vi > d1i , (2) Vi < d1i and (3) wi ( d1i ) < Lcii . The first condition implies that at a given sฬ„โˆ’i , player i does not contain both Vi and Xi in X (sฬ„โˆ’i ). This is required for maintaining continuity of the best response as sฬ„โˆ’i varies. We will discuss the implications of the last two assumptions later in the analysis. Unless otherwise stated, the results of this section hold under Assumption 1 for the probability weighting functions and Assumption 3 for the neighborhood sizes and the cost parameters. We start with the following characterization of the best response of a player. In particular, we show that under Assumptions 1 and 3, the best response of a player is unique, continuous, and monotonically decreasing in the aggregate investment by other nodes in her neighborhood. The proof is presented in Appendix A. Lemma 1. Suppose dLi cii > minxโˆˆ[0,1] wiโ€ฒ (x) for a player i. Then, for a given aggregate investment sฬ„โˆ’i by the neighboring nodes, the best response of player i is given by, ๏ฃฑ ๏ฃด when sฬ„โˆ’i โ‰ค di (1 โˆ’ Xi ) โˆ’ 1 ๏ฃฒ1 bi (sฬ„โˆ’i ) = 0 when sฬ„โˆ’i โ‰ฅ di (1 โˆ’ Xi ), ๏ฃด ๏ฃณ di (1 โˆ’ Xi ) โˆ’ sฬ„โˆ’i otherwise. where Xi is the solution to wiโ€ฒ (x) = di ci Li for x โˆˆ (xmin,wi , 1]. We use the properties of the best response proven in the above lemma to establish the existence of PNE in Total Effort games on networks under behavioral probability weighting. Theorem 1. Consider a Total Effort game on a graph where the weighting functions of the players satisfy Assumption 1 and the cost parameters and neighborhood sizes satisfy Assumption 3. Then this game admits a pure Nash equilibrium. 7 Proof. For a player i, if dLi cii โ‰ค wiโ€ฒ (xmin,wi ), her best response is to invest 1 regardless of the investments by her neighbors. Otherwise, the best response is unique and continuous in the strategies of her neighbors (from Lemma 1). In addition, the strategy space of each player is [0, 1], which is compact and convex. Thus, according to Brouwerโ€™s fixed point theorem [Ok, 2007], there exists a fixed point of the best response mapping, which corresponds to a PNE. As a consequence of Lemma 1, at a PNE, the investments in the extended neighborhood of any player i for whom dLi cii > wโ€ฒ (xmin,wi ) can be expressed as, sโˆ—i = min(max(di (1 โˆ’ Xi ) โˆ’ sฬ„โˆ—โˆ’i , 0), 1). (7) In particular, we have 1 + sฬ„โˆ—โˆ’i < di (1 โˆ’ Xi ) =โ‡’ sโˆ—i = 1 sโˆ—i + sฬ„โˆ—โˆ’i = di (1 โˆ’ Xi ) =โ‡’ sโˆ—i โˆˆ [0, 1] sฬ„โˆ—โˆ’i where wiโ€ฒ (Xi ) = sโˆ—i โˆˆ (0, 1). di ci Li > di (1 โˆ’ Xi ) =โ‡’ sโˆ—i (8) = 0, with Xi โˆˆ (xmin,w , 1). The converse of the second identity above holds when Remark 2 (Equilibrium computation). Recently, the authors in [Gharesifard et al., 2016] showed that when the best responses of the players are given by Lemma 1, continuous best response dynamics converge to a PNE strategy profile. Furthermore, a strategy profile that satisfies (8) can be computed by solving a Linear Complementarity Program; a similar result was obtained in [Miura-Ko et al., 2008]. We present an expanded discussion in Appendix B. In general, strategy profiles that satisfy equation (7) need not be unique, and therefore, we need not have a unique PNE. However, in the special case of complete graphs (the classical setting for Total Effort games [Grossklags et al., 2008]), we show that the strategy profiles at the Nash equilibria are unique up to the true equilibrium attack probability experienced by the players. Proposition 2. Consider a Total Effort game on a complete graph where each player i has a playerspecific weighting function wi (ยท) satisfying Assumption 1, and cost ratio Lcii satisfying Assumption 3. Then all Nash equilibria have the same (true) probability of successful attack at the nodes. The proof is presented in Appendix A. If the strategy profile at each neighborhood satisfies the second identity of (8), then we refer to such a PNE as an interior equilibrium. In other words, at an interior equilibrium, the strategy profile sโˆ— satisfies, (A + In )sโˆ— = d โ—ฆ (1 โˆ’ X), (9) where A is the adjacency matrix of the graph, d is the vector of neighborhood sizes, 1 is the allones vector, X is the vector of Xi โ€™s of the players, and โ€œโ—ฆโ€ denotes the Hadamard (element-wise) product. Thus, at every interior equilibrium, the true attack probability faced by each node i is Xi . The existence of an interior equilibrium is not always guaranteed, except in certain special cases, such as when players are homogeneous and all nodes in the graph have identical degrees (i.e., the graph is degree-regular). Proposition 3. Consider a degree-regular graph with degree d โˆ’ 1 and homogeneous players such โ€ฒ that dc L > w (xmin,w ). Then the symmetric strategy profile where each node invests 1โˆ’ X constitutes an interior PNE, where wโ€ฒ (X) = dc L , X โˆˆ (xmin,w , 1]. The proof is straightforward by substituting sโˆ— = 1 โˆ’ X for every player in equation (8). 8 4.1 Existence of secure equilibrium Assumption 3 ensures that the best response of a player remains continuous in the strategies of other players, which helps us establish the existence of PNE in Theorem 1. It is possible to also show the existence of a PNE where all players invest 1 at equilibrium, when the second and third conditions of Assumption 3 do not hold for all the players. Proposition 4. Suppose that for every player i in a Total Effort game, either Vi โ‰ฅ ci Li . Then there exists a PNE where all players invest 1. Proof. Consider a player i with Vi โ‰ฅ โˆ‚Eui โˆ‚si 1 di or wi ( d1i ) > 1 di , and assume that all of her neighboring nodes are investing h i of player i is nonnegative over the interval X = 0, d1i , and her 1. Then, the marginal utility best response is to invest 1. Similarly, when Vi < d1i , and wi ( d1i ) > Lcii for player i, then her optimal investment is 1 when sฬ„โˆ’i = di โˆ’ 1. This follows from Case 4 of in the proof of Lemma 1 as substituting sฬ„i = di โˆ’ 1 yields Eui (1, sN (i) ) โˆ’ Eui (0, sN (i) ) > 0 when wi ( d1i ) > Lcii . Both Vi โ‰ฅ d1i and wi ( d1i ) > Lcii occur when the weighting function sufficiently overweights very small attack probabilities. Overweighting of small attack probabilities discourages a player from reducing her investment, even when all other players are fully secure, as it would lead to a large perceived increase in attack probabilities from a relatively secure state. This results in a fully secure equilibrium. While such a fully secure PNE possibly coexists with other equilibria, identifying conditions under which such a PNE exists has potential implications for designing incentive mechanisms to encourage users to achieve a secure PNE. 5 Effects of Network Structure In this section, we focus on understanding the effect of network structure, vis-a-vis the degrees of the nodes, on the security investments and attack probabilities at the PNE of Total Effort games. We consider players with homogeneous weighting functions and cost parameters in order to isolate the effects of their degrees on their investments. We will use the characterization of the PNE strategy profile given in equation (8). For the analysis in this section, we assume that the weighting functions satisfy both Assumptions 1 and 2. When the weighting functions and the cost parameters are homogeneous across the players, then the quantity di (1 โˆ’ Xi ) is only a function of the size of the extended neighborhood di . Recall that wโ€ฒ (Xi ) = dLi c , and Xi > xmin,w . The properties of Xi as a function of di are the basis of the analytical results of this section. Remark 3. Note that Xi is an increasing function of di , as wโ€ฒ (x) is strictly increasing in x for x โˆˆ (xmin,w , 1], as illustrated in Figure 2. 5.1 Investments by nodes with overlapping neighborhoods Without probability weighting, Proposition 1 indicated that a lower degree node always invests at least as much as a higher degree node. This monotonicity does not hold in general under behavioral probability weighting. Nonetheless, we can prove certain monotonicity properties when d(1 โˆ’ X) is a monotonically decreasing function of d, which holds under Assumption 2 as shown below. 9 Lemma 2. Let c L > minxโˆˆ[0,1] wโ€ฒ (x) so that the quantity X is defined for d โ‰ฅ 1. If the probabil- ity weighting function satisfies decreasing in d. w โ€ฒโ€ฒ (x) w โ€ฒ (x) < 1 1โˆ’x for x โˆˆ (xmin,w , 1), then d(1 โˆ’ X) is monotonically The proof of Lemma 2 is presented in Appendix C. We now prove the following result using Lemma 2. Recall that Nฬ„ (i) denotes the extended neighborhood of node i. Proposition 5. Consider a Total Effort game on a network with homogeneous players whose weighting functions satisfy Assumptions 1 and 2. Let the cost parameters satisfy Assumption 3, and let Lc > minxโˆˆ[0,1] wโ€ฒ (x). If Nฬ„ (i) โŠ‚ Nฬ„ (j), then at any PNE, sโˆ—i โ‰ฅ sโˆ—j . Proof. Consider any equilibrium strategy profile where player j invests sโˆ—j > 0, for otherwise, the result holds trivially. Then from equation (8), and from the fact that Nฬ„ (i) โŠ‚ Nฬ„ (j), we obtain X X sโˆ—k โ‰ค sโˆ—k โ‰ค dj (1 โˆ’ Xj ) < di (1 โˆ’ Xi ), kโˆˆNฬ„ (i) kโˆˆNฬ„ (j) which follows from the monotonicity of d(1 โˆ’ X) shown in Lemma 2. As a result, from (8), we must have sโˆ—i = 1. From Lemma 2, we know that d(1 โˆ’ X) is a decreasing function of d. From the PNE characterization in (8), node i invests such that the aggregate investment in her extended neighborhood is di (1โˆ’Xi ) subject to her investment being within [0, 1]. For a node with a few neighbors, the desired investment d(1 โˆ’ X) is larger, and therefore, the node has to increase her personal investment. On the other hand, for a node with large degree, d(1 โˆ’ X) is smaller and she has a large number of neighbors to rely on to meet the target investment. 5.2 Upper bound on average probability of successful attack at equilibrium For a PNE strategy profile sโˆ— , we denote the average (true) probability of successful attack as ! P n โˆ— X s 1 j jโˆˆ Nฬ„ (j) 1โˆ’ . (10) ฮฆ(sโˆ— ) := n di i=1 Note that ฮฆ(sโˆ— ) is also equal to the expected fraction of nodes that are successfully attacked under the PNE strategy profile sโˆ— . We obtain an upper bound on ฮฆ(sโˆ— ) when 1 โˆ’ Xi < d1i for every player i, with the proof presented in Appendix C. Proposition 6. Consider a Total Effort game on a graph with homogeneous players who satisfy Assumptions 1, 2 and 3. In addition, suppose dLi c > minxโˆˆ[0,1] wโ€ฒ (x) and 1 โˆ’ Xi < d1i for every player i. Then at any PNE with strategy profile sโˆ— , 1. the attack probability at node i is at most Xi , and P 2. ฮฆ(sโˆ— ) โ‰ค n1 ni=1 Xi . Furthermore, if there exists an interior PNE with strategy profile sโˆ—I , then ฮฆ(sโˆ—I ) = 1 n Pn i=1 Xi . Remark 4. If there is a leaf node i with di = 2 that satisfies Assumption 3, then we must have 1โˆ’Xi < 21 ; otherwise Xi โˆ’Vi < 12 , which violates the first condition of Assumption 3. Since d(1โˆ’X) is decreasing in d (according to Lemma 2 under Assumption 2), this implies that 1 โˆ’ Xj < d1j holds for every node j in the graph. 10 We now state the main result of this section. We show that degree-regular graphs achieve the 1 Pn highest n i=1 Xi over all graph topologies with the same average degree. Theorem 2. Consider a Total Effort game on a graph under Assumptions 1, 2 and 3. Let dLi c > P wโ€ฒ (xmin,w ) for every player i, and let davg , n1 ni=1 di be the average of all extended neighborhood sizes. Then, n 1X ฮฆ(sโˆ— ) โ‰ค Xi โ‰ค Xavg , n i=1 where sโˆ— is a PNE strategy profile and Xavg โˆˆ (xmin,w , 1] is such that wโ€ฒ (Xavg ) = davg b L . Proof. Let the function h : R+ โ†’ [xmin,w , โˆž) be defined as the inverse of wโ€ฒ (ยท), i.e., h( dLi c ) , Xi . From Assumptions 1 and 2, we know that wโ€ฒ (x) is strictly increasing and is strictly convex for x โˆˆ (xmin,w , 1]. Therefore, the inverse function h(ยท) is strictly increasing  concave in di   and strictly davg c di c 1 Pn , which yields for di โˆˆ R. From the strict concavity of h(ยท), we have n i=1 h L โ‰ค h L 1 Pn i=1 Xi โ‰ค Xavg . Equality holds when di = davg for every node i. n The above result states that graphs with identical node degrees have a larger worst case ฮฆ(sโˆ— ). Furthermore, as a graph becomes more dense, the bound on ฮฆ(sโˆ— ) grows with the average degree of the nodes. 5.3 Graphs with smallest average attack probability bound In this subsection, we answer the complementary question regarding graph topologies that have the smallest upper bound on ฮฆ(sโˆ— ). In order to highlight the dependence of Xi on di , we will use a slightly modified notation in the proof of the following result. In particular, we denote Xi as Xdi for player i. Proposition 7. Consider Total Effort games with n homogeneous players that satisfy Assumpโ€ฒ ) for d = 2. Then, among all connected graphs with n nodes, tions 1, 2 and 3. Let dc L > w (xmin,wP the star graph achieves the smallest ni=1 Xdi . Proof. Recall from Remark 3 that Xdi is an increasing function of di . If the graph is not a tree, then we can remove a setP of edges until the resulting subgraph is a tree. This reduces the neighborhood sizes and decreases ni=1 Xdi . P It remains to show that among all trees, the star graph minimizes ni=1 Xdi . Consider a tree that is not a star graph. Then, maxni=1 di < n. Consider a node u with highest extended neighborhood size du < n. Since the graph is not a star, there must exist a leaf node l which is connected to a node other P than u. Let the neighbor of l be denoted as v, with neighborhood size dv โ‰ค du . We argue that ni=1 Xdi decreases if we remove the edge between l and v, and add an edge between l and u. Under this operation, Xdu increases to Xdu +1 for node u and Xdv decreases Pn to Xdv โˆ’1 for node v. For all other nodes, Xdi remains unchanged. We compute the change in i=1 Xdi as, Xdu +1 โˆ’ Xdu + Xdv โˆ’1 โˆ’ Xdv <(Xdu โˆ’ Xdu โˆ’1 ) โˆ’ (Xdv โˆ’ Xdv โˆ’1 ) โ‰ค(Xdv โˆ’ Xdv โˆ’1 ) โˆ’ (Xdv โˆ’ Xdv โˆ’1 ) = 0. (11) The first inequality follows from Theorem 2 with two players having extended neighborhood sizes du โˆ’ 1 and du + 1, i.e., Xdu +1 + Xdu โˆ’1 < 2Xdu for du โ‰ฅ 3. The second inequality holds for dv โ‰ค du 2. Therefore, for following the strict concavity of h(ยท) (where h( dc L ) = Xd ) as shown in Theorem P any tree which is not a star graph, we can construct another tree which reduces ni=1 Xdi . 11 2 ฮฑ=0.8 ฮฑ=0.4 dw(x)/dx 1.5 1 0.5 0 Xฬ„ 0 0.2 0.4 0.6 0.8 1 x Figure 3: wiโ€ฒ (x) for Prelec weighting functions with parameters ฮฑ1 = 0.4 and ฮฑ2 = 0.8. At x = Xฬ„, w1โ€ฒ (x) = w2โ€ฒ (x). The proof of Proposition 7 relies on the properties of the quantities Xi which arise due to the nature of the behavioral weighting functions. In addition, the result that star graphs achieve the smallest security risk upper bound is an artifact of the Total Effort risk externalities, which assume that the attack on each node only depends on the average security investment in her neighborhood. In other words, the attacks are not targeted (in the sense of trying to disconnect the network). An interesting avenue for future work is to characterize network topologies that maximize more complex network value functions (such as those considered in [Gueye et al., 2010, Schwartz et al., 2011, Cerdeiro et al., 2015]) under behavioral probability weighting and targeted attacks. 6 Comparative Statics in Weighting Functions In this section, we compare the effect of the intensity of probability weighting on ฮฆ(sโˆ— ) (the average equilibrium probability of successful attack) in degree-regular graphs. Analyzing degree-regular graphs not only isolates the effects of heterogeneity in degrees from the effects of the weighting function, but as we showed in the previous section, such graphs possess an interior equilibrium that upper bounds the ฮฆ(sโˆ— ) that arise in a broader class of graphs. In order to compare two different weighting functions, we use the parametric form (1) proposed by Prelec with parameter ฮฑ โˆˆ (0, 1]. When ฮฑ = 1, the weighting function is linear; as ฮฑ decreases from 1, the magnitudes of overweighting and underweighting increase. We consider two Total Effort games on a (d โˆ’ 1)โˆ’regular graph, i.e., the size of the extended neighborhood of the nodes is d. Let the cost parameters c and L be the same among the players across the two games. The first game has homogeneous players with weighting parameter ฮฑ1 , and the second game has homogeneous players with weighting parameter ฮฑ2 , with ฮฑ1 < ฮฑ2 < dc L . In other words, the players in the first game have a more significant overweighting and underweighting of the true probabilities compared to the players in the second game. Let X1 and X2 be the solutions to the equations wiโ€ฒ (x) = dc L , i โˆˆ {1, 2}, such that Xi > xmin,w . Here wi (x) is the Prelec weighting function (1) with weighting parameter ฮฑi . From Proposition 3, the attack probability at each node is equal to Xi at the respective interior PNEs and ฮฆi (sโˆ— ) = Xi . As we illustrate in Figure 3 for ฮฑ1 = 0.4 and ฮฑ2 = 0.8, w1โ€ฒ (x) is initially smaller than w2โ€ฒ (x) as x starts to increase from 1e , until the quantity x = Xฬ„ (which depends on the values of ฮฑ1 and ฮฑ2 ) at which w1โ€ฒ (x) = w2โ€ฒ (x). For x > Xฬ„, w1โ€ฒ (x) > w2โ€ฒ (x). We state this formally in the following lemma. The proof is presented in Appendix D. Lemma 3. Consider two Prelec weighting functions w1 (ยท) and w2 (ยท) with parameters ฮฑ1 and ฮฑ2 , respectively and let ฮฑ1 < ฮฑ2 . Then there exists a unique Xฬ„ > 1e such that (1) w1โ€ฒ (Xฬ„) = w2โ€ฒ (Xฬ„), (2) for x โˆˆ ( 1e , Xฬ„), w1โ€ฒ (x) < w2โ€ฒ (x), and (3) for x โˆˆ (Xฬ„, 1), w1โ€ฒ (x) > w2โ€ฒ (x). 12 Now we present the main result of this section, which follows from the above lemma. Theorem 3. Let Xi , i โˆˆ {1, 2} be the true probability of successful attack at a node at the interior PNE of a (d โˆ’ 1)-regular graph where the nodes have a Prelec weighting function with parameter ฮฑi , i โˆˆ {1, 2}, with ฮฑ1 < ฮฑ2 . Let Xฬ„ be the intersection point defined in Lemma 3 for ฮฑ1 and ฮฑ2 . Then, 1. if dc L > wโ€ฒ (Xฬ„), we have Xฬ„ < X1 < X2 , 2. otherwise, if ฮฑ2 < 3. if dc L dc L < wโ€ฒ (Xฬ„), we have Xฬ„ > X1 > X2 , and = wโ€ฒ (Xฬ„), we have Xฬ„ = X1 = X2 . The above result shows that when dc L is such that the attack probability at a node at PNE is high enough (greater than Xฬ„), the players with substantial underweighting of probabilities (i.e., with smaller ฮฑ) view increased security investments to be highly beneficial in terms of reducing the perceived attack probabilities. As a result, the attack probability at a node at the PNE is smaller in the game with weighting parameter ฮฑ1 . On the other hand, when the attack probability is less than Xฬ„, the players with smaller ฮฑ do not find the perceived reduction in attack probabilities to be sufficient to make a high investment. However players with weighting functions closer to linear observe greater perceived reduction in probability due to increased investment, and as a result, these players have smaller average attack probability at the interior equilibria. When we keep Lc fixed and increase the neighborhood size d, then we eventually end up in the regime where the equilibrium attack probability is greater than Xฬ„. Thus, the expected fraction of nodes that are successfully attacked at equilibrium (ฮฆi (sโˆ— )) is smaller under behavioral probability weighting when the graph is sufficiently dense (i.e., has a large number of edges for a given number of nodes), and vice versa. 7 Weakest Link and Best Shot Games The Nash equilibrium strategies in Weakest Link and Best Shot games have very special properties, as the security level at each neighborhood is determined by the investment of a single player (the one with the smallest and largest investment, respectively). Therefore, we first state the following results that characterize the security investment by an isolated player (i.e., d = 1). The proofs of the following results are in Appendix E. Lemma 4. Consider a weighting function that satisfies Assumption 1. Let z > xmin,w be such that w(x) โ€ฒ wโ€ฒ (z) = w(z) z . Then i) z exists and is unique, and ii) for x > z, w (x) > x . Proposition 8. Let z be as defined in Lemma 4. If Lc < wโ€ฒ (z), the optimal investment of a single player is sโˆ— = 1. Otherwise, the optimal investment is sโˆ— = 1 โˆ’ X, where wโ€ฒ (X) = Lc , X โˆˆ (xmin,w , 1]. We now analyze the PNE in Weakest Link games. Proposition 9. Consider a Weakest Link game on a connected graph with homogeneous players. Then at any PNE, all nodes make identical investments. If Lc โ‰ฅ wโ€ฒ (z), where z is as defined in Lemma 4, then there is a continuum of pure Nash equilibria where the successful attack probabilities at the nodes are greater than or equal to X. When wโ€ฒ (xmin,w ) < Lc < wโ€ฒ (z), then there are additional equilibria (including the ones in the previous case) with attack probabilities close to 0. 13 Proof. Consider a node v1 with security investment s1 , and let sฬ‚ < s1 be the smallest investment in her neighborhood. Then the attack probability on node v1 is fi (si , sN (i) ) = 1 โˆ’ sฬ‚ > 1 โˆ’ s1 . If node v1 reduces her investment to sฬ‚, then her cost of investment decreases, while the attack probability remains unchanged. Therefore, at a PNE, the investment by any node must be equal to the minimum investment in her extended neighborhood. As a result, in connected graphs, all nodes must make identical security investments at a PNE. When Lc โ‰ฅ wโ€ฒ (z), Proposition 8 states that a single node investing in isolation would prefer to invest sโˆ— = 1 โˆ’ X. Now suppose all nodes have identical security investment s โ‰ค sโˆ— , i.e., the true attack probability at any node is 1 โˆ’ s โ‰ฅ X. Since for each player wโ€ฒ (x) > Lc for x > X (i.e., the marginal utility is positive), no player would unilaterally deviate to make a smaller investment. Therefore, any investment s โ‰ค 1 โˆ’ X by all the nodes would result in a PNE. When wโ€ฒ (xmin,w ) < Lc < wโ€ฒ (z), the optimal investment of a single player is to invest 1. Therefore, a strategy profile where each node invests s = 1 โˆ’ วซ for sufficiently small วซ > 0 such that Eu(s) > Eu(1 โˆ’ X), is a PNE, with attack probability วซ at every node. For this strategy profile, all players have positive marginal utility, and prefer to invest 1 โˆ’ วซ over 1 โˆ’ X due to the continuity of the utility functions. These equilibria exist in addition to the set of equilibria with attack probabilities at least X. Note that any investment s โˆˆ (V, X) by the nodes is not a PNE since โˆ‚Eu โˆ‚s < 0 for s โˆˆ (V, X). Note that as long as the graph remains connected, its structure plays no role on the equilibrium investments and attack probabilities. The first part of the above result (i.e., identical investments by all players) holds for true expectation maximizers (players with w(x) = x) as well. The main differences with weighting functions are twofold. First, for large enough Lc , the only possible equilibrium with true expectation maximizers is when all players invest 0 (Proposition 1 with d = 1), while with probability weighting, there is a range of possible equilibrium investments, with resulting attack probabilities greater than X. Second, for wโ€ฒ (xmin,w ) < Lc < 1, any investment by the players can give rise to a PNE for true expectation maximizers, while with probability weighting, there exist attack probabilities that can be supported at a PNE are either close to 0 or at least X. Finally, when Lc โ‰ค wโ€ฒ (xmin,w ), X is not defined, though the optimal investment by a single player is still 1. In this case, any investment by the players can give rise to a PNE. We finally discuss the PNEs that arise in Best Shot games. Proposition 10. Consider a Best Shot network security game with homogeneous players. Then a strategy profile is a PNE if and only if there is a set of nodes who form a maximal independent set and invest according to Proposition 8, and all other nodes invest 0. Proof. In a Best Shot game, the attack probability on a node is a function of the highest investment in her extended neighborhood. Suppose at a neighborhood there is a player making an investment in accordance with Proposition 8. Since this is the optimal investment a single node can make, her neighbors do not find investing more than this level (and thereby reducing their attack probabilities) profitable. Therefore, their optimal strategy is to invest 0, as it eliminates their security investment cost csi , while the attack probability is unchanged. Therefore, any two nodes who make a nonzero investment must not be adjacent to each other. Furthermore, every node that is making a zero investment must have a neighbor who invests a nonzero amount. Therefore, the set of nodes making a nonzero investment must belong to a maximal independent set. The converse is also true; any maximal independent set with investments determined by Proposition 8, and all other nodes investing 0 constitute a PNE. The independent set characterization holds for true expectation maximizers as well; nonlinear weighting functions change the level of investment. With true expectation maximizers, the nonzero 14 1 4 2 3 9 5 7 6 8 10 Figure 4: Graph topology analyzed in Example 1 investment level is at one of the boundary points, either 0 or 1 (Proposition 1 with d = 1). With probability weighting, there are no equilibria that are entirely unprotected, and the nonzero equilibrium investment is at one of the interior solutions when Lc > wโ€ฒ (z). 8 Numerical Examples We illustrate our theoretical characterizations of the impacts of network structure and probability weighting on the equilibrium investments in two numerical examples presented below. Example 1. Consider the graph shown in Figure 4 with n = 10 nodes. Each node is a decision maker with a Prelec weighting function with parameter ฮฑ = 0.6 and Lc = 0.45. The extended neighborhood sizes range from 2 to 5. These parameters satisfy Assumptions 1, 2 and 3. Under the Total Effort externalities, sequential best response dynamics converged to a PNE strategy profile in this example. In this PNE, the leaf nodes, 1, 2, 3, 9, 10 have an investment 0.4095, node 7 invests 0.1442 and nodes 4, 5, 6, 8 invest 0. These investments satisfy (8). Note that node 7 has a larger neighborhood size compared to node 8, yet it invests more than node 8 at the PNE. This is in contrast with the equilibria that arise without probability weighting (Proposition 1), where the equilibrium investments were either 0 or 1 and the investment of a node was at most that of a node with a smaller degree. Furthermore, the investments of the leaf nodes are larger than their neighbors, as shown in Proposition 5. Under the Best Shot externality, a set of nodes which form a maximal independent set have a nonzero investment (Proposition 9). In the graph shown in Figure 4, nodes 1, 2, 3, 7, 9, 10 form a maximal independent set. Another such set consists of nodes 4, 2, 3, 8. For the Prelec weighting function with ฮฑ = 0.6, wโ€ฒ (z) = 0.8304 for the value of z defined in Lemma 4. Accordingly, if c L โ‰ค 0.8304, an equilibrium investment profile is when the nodes in a maximal independent set invest 1, while other nodes invest 0. On the other hand, if Lc > 0.8304, the equilibrium investment by the nodes is 1 โˆ’ X, where wโ€ฒ (X) = Lc , X โˆˆ ( 1e , 1]. In the above example, we discussed the effects of network structure on PNE investments in Total Effort and Best Shot games. The impact of the intensity of overweighting and underweighting of probabilities in degree-regular graphs is illustrated in the following example and corroborates our theoretical findings in Section 6. Example 2. We consider two degree-regular graphs on n = 6 nodes as shown in Figure 5. The nodes in the graph in Figure 5a (respectively, Figure 5b) have extended neighborhood sizes d = 3 (respectively, d = 5). We consider two types of players with Prelec weighting functions with parameters ฮฑ1 = 0.4 and ฮฑ2 = 0.8, respectively. The derivative of the weighting functions for such players was shown in Figure 3. Let Lc = 0.3 for all players. First we consider the 2-regular graph shown in Figure 5a. When all the players have weighting functions with parameter ฮฑ1 = 0.4, then the attack probability at every node at the interior 15 1 2 6 1 3 5 2 6 4 3 5 (a) 2-regular graph on 6 nodes 4 (b) 4-regular graph on 6 nodes Figure 5: Graph topologies analyzed in Example 2 equilibrium is equal to 0.8588, while for players with parameter ฮฑ2 = 0.8, the corresponding attack probability is 0.6912. In this case, the equilibrium is more secure for the players whose weighting functions are closer to linear. In contrast, in the 4-regular graph shown in Figure 5b, the attack probabilities at every node at the interior PNEs are equal to 0.9325 and 0.9643 for players with weighting function parameters ฮฑ1 and ฮฑ2 , respectively. As we noted in Theorem 3 and the succeeding discussion, the above example illustrates that the equilibrium is more secure for players with a substantial degree of overweighting and underweighting (captured by a smaller parameter value ฮฑ) when the graph is sufficiently dense. 9 Discussion and Conclusion We studied a class of interdependent security games on networks where the players exhibit certain behavioral attributes vis-a-vis their perception of attack probabilities, while making security investment decisions. We analyzed three canonical interdependent security game models, (i) Total Effort, (ii) Weakest Link, and (iii) Best Shot games. The Nash equilibria in Total Effort games have much richer structural properties under behavioral probability weighting than the corresponding equilibria with players that are true expectation maximizers. A sharper overweighting of small probabilities may disincentivize a node from reducing her investment when her neighbors make high investments. Underweighting of large probabilities leads to equilibria where the nodes are not completely unprotected, as opposed to equilibria without probability weighting. The effect of behavioral probability weighting is most beneficial (in terms of reducing the security risk) when the probability of successful attack is sufficiently high at the PNE. On the other hand, if the attack probability is only moderately high, players with weighting functions that are closer to linear have a more secure equilibrium. We obtained an upper bound on the expected fraction of nodes that are successfully attacked at any PNE, in terms of the average degree of the nodes. Furthermore, among the class of graphs with a given average degree davg , the davg -regular graph has a PNE which achieves this upper bound. Conversely, star graphs achieve the smallest average security risk upper bound among all connected graphs. When the graph is connected, all nodes make identical investments in a Weakest Link game, and there is a continuum of attack probabilities, independent of the graph structure, that can arise at a PNE. On the other hand, a strategy profile is a PNE in a Best Shot game if and only if the nodes making nonzero security investments form a maximal independent set. In both cases, equilibria are never completely unprotected under behavioral probability weighting. References Saurabh Amin, Galina A Schwartz, and S Shankar Sastry. Security of interdependent and identical networked control systems. Automatica, 49(1):186โ€“192, 2013. 16 Adam S Booij, Bernard MS Van Praag, and Gijs Van De Kuilen. A parametric analysis of prospect theoryโ€™s functionals for the general population. Theory and Decision, 68(1-2):115โ€“148, 2010. Yann Bramoulleฬ, Rachel Kranton, and Martin Dโ€™amours. Strategic interaction and networks. The American Economic Review, 104(3):898โ€“930, 2014. Colin F Camerer, George Loewenstein, and Matthew Rabin. Advances in behavioral economics. Princeton University Press, 2011. Diego Cerdeiro, Marcin Dziubinski, and Sanjeev Goyal. Contagion risk and network design. Working paper, 2015. Nicolas Christin. Network security games: combining game theory, behavioral economics, and network measurements. In Decision and Game Theory for Security, pages 4โ€“6. Springer, 2011. Nicolas Christin, Serge Egelman, Timothy Vidas, and Jens Grossklags. Its all about the Benjamins: An empirical study on incentivizing users to ignore security advice. In Financial Cryptography and Data Security, pages 16โ€“30. Springer, 2011. Richard W Cottle, Jong-Shi Pang, and Richard E Stone. The linear complementarity problem, volume 60. SIAM, 1992. Andrea Galeotti, Sanjeev Goyal, Matthew O Jackson, Fernando Vega-Redondo, and Leeat Yariv. Network games. The Review of Economic Studies, 77(1):218โ€“244, 2010. Vaibhav Garg and Joseph Camp. Heuristics and biases: Implications for security design. IEEE Technology and Society Magazine, 32(1):73โ€“79, 2013. Bahman Gharesifard, Behrouz Touri, Tamer Basฬงar, and Jeff Shamma. On the convergence of piecewise linear strategic interaction dynamics on networks. IEEE Transactions on Automatic Control, 61(6):1682โ€“1687, 2016. Richard Gonzalez and George Wu. On the shape of the probability weighting function. Cognitive Psychology, 38(1): 129โ€“166, 1999. Jens Grossklags and Benjamin Johnson. Uncertainty in the weakest-link security game. In Game Theory for Networks, pages 673โ€“682, 2009. Jens Grossklags, Nicolas Christin, and John Chuang. Security and insurance management in networks with heterogeneous agents. In 9th ACM Conference on Electronic Commerce, pages 160โ€“169, 2008. Assane Gueye, Jean C Walrand, and Venkat Anantharam. Design of network topology in an adversarial environment. In Decision and Game Theory for Security, pages 1โ€“20. Springer, 2010. Jack Hirshleifer. From weakest-link to best-shot: The voluntary provision of public goods. Public Choice, 41(3): 371โ€“386, 1983. Ashish R Hota and Shreyas Sundaram. Interdependent security games under behavioral probability weighting. In Decision and Game Theory for Security, pages 150โ€“169. Springer, 2015. Ashish R Hota, Siddharth Garg, and Shreyas Sundaram. Fragility of the commons under prospect-theoretic risk attitudes. Games and Economic Behavior, 98:135โ€“164, 2016. Libin Jiang, Venkat Anantharam, and Jean Walrand. How bad are selfish investments in network security? IEEE/ACM Transactions on Networking, 19(2):549โ€“560, 2011. Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang. Are security experts useful? Bayesian Nash equilibria for network security games with limited information. In ESORICS, pages 588โ€“606. Springer, 2010. Howard Kunreuther and Geoffrey Heal. Interdependent security. Journal of Risk and Uncertainty, 26(2-3):231โ€“249, 2003. Aron Laszka, Mark Felegyhazi, and Levente Buttyan. A survey of interdependent information security games. ACM Computing Surveys (CSUR), 47(2):23, 2014. 17 Tianming Li and Narayan B Mandayam. When users interfere with protocols: Prospect theory in wireless networks using random access and data pricing as an example. IEEE Transactions on Wireless Communications, 13(4): 1888โ€“1907, 2014. Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Basฬงar, and Jean-Pierre Hubaux. Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3):25, 2013. R Miura-Ko, Benjamin Yolken, John Mitchell, and Nicholas Bambos. Security decision-making among interdependent organizations. In 21st Computer Security Foundations Symposium, pages 66โ€“80. IEEE, 2008. Kien C Nguyen, Tansu Alpcan, and Tamer Basฬงar. Stochastic games for security in networks with interdependent nodes. In International Conference on Game Theory for Networks, pages 697โ€“703. IEEE, 2009. Cameron Nowzari, Victor M Preciado, and George J Pappas. Analysis and control of epidemics: A survey of spreading processes on complex networks. IEEE Control Systems Magazine, 36(1):26โ€“46, 2016. Efe A Ok. Real analysis with economic applications, volume 10. Princeton University Press, 2007. Martin J Osborne and Ariel Rubinstein. A course in game theory. MIT press, 1994. Ranjan Pal and Pan Hui. Modeling internet security investments: Tackling topological information uncertainty. In Decision and Game Theory for Security, pages 239โ€“257. Springer, 2011. Drazen Prelec. The probability weighting function. Econometrica, pages 497โ€“527, 1998. Walid Saad, Arnold L Glass, Narayan B Mandayam, and H Vincent Poor. Toward a consumer-centric grid: A behavioral perspective. Proceedings of the IEEE, 104(4):865โ€“882, 2016. Bruce Schneier. The psychology of security. In Progress in Cryptologyโ€“AFRICACRYPT 2008, pages 50โ€“79. Springer, 2008. Galina Schwartz, Saurabh Amin, Assane Gueye, and Jean Walrand. Network design game with both reliability and security failures. In Allerton Conference on Communication, Control, and Computing, pages 675โ€“681, 2011. Galina Schwartz, Nikhil Shetty, and Jean Walrand. Why cyber-insurance contracts fail to reflect cyber-risks. In Allerton Conference on Communication, Control, and Computing, pages 781โ€“787. IEEE, 2013. Amos Tversky and Daniel Kahneman. Advances in prospect theory: Cumulative representation of uncertainty. Journal of Risk and Uncertainty, 5(4):297โ€“323, 1992. Hal Varian. System reliability and free riding. In Economics of Information Security, pages 1โ€“15. Springer, 2004. A Proofs Pertaining to Equilibrium Characterization Proof of Lemma 1: Proof. For ease of notation, we will drop the subscript i since the proof holds for every player. Let sฬ„ โˆˆ [0, d โˆ’ 1] be the total security investment by the neighbors and d be the size of the extended neighborhood of the player. Under Assumption 3, the interval X (sฬ„) in (6) falls into one of four different cases. Case 1: X < 1 โˆ’ 1+sฬ„ d (i.e., sฬ„ < d(1 โˆ’ X) โˆ’ 1) In this case, the interval X (sฬ„) lies to the right of X. Therefore, at any attack probability x โˆˆ X (sฬ„), Ld wโ€ฒ (x) > c (from Figure 2). Thus, โˆ‚Eu โˆ‚s |s=x > 0 and consequently, b(sฬ„) = 1. sฬ„ 1+sฬ„ Case 2: 1 โˆ’ d โ‰ค X โ‰ค 1 โˆ’ d In this case, X โˆˆ X (sฬ„), and therefore, the player has a feasible investment strategy sโˆ— = d(1 โˆ’ X) โˆ’ sฬ„ at which the first order condition is satisfied with equality. For any investment y < sโˆ— , โˆ‚Eu L โ€ฒ we have the resulting attack probability 1 โˆ’ y+sฬ„ d > X and โˆ‚s = d w (X) โˆ’ c > 0. As a result, no 18 value of y < sโˆ— would satisfy the first order necessary condition of optimality. On the other hand, 1 for any y > sโˆ— , we have 1 โˆ’ y+sฬ„ d < X. However, from our assumption that X > d + V , we would y+sฬ„ โˆ‚Eu โˆ— โˆ— have 1 โˆ’ d > V . Therefore, โˆ‚s < 0 for any y > s . As a result, x = s is the only candidate for optimal investment, and it also satisfies the second order sufficient condition since wโ€ฒโ€ฒ (X) > 0 โˆ— as X > xmin,w . Since the optimal solution sโˆ— must have the property that 1 โˆ’ s d+sฬ„ = X, it is continuous and linearly decreasing in sฬ„, with boundary values at 1 and 0 for sฬ„ = d(1 โˆ’ X) โˆ’ 1 and sฬ„ = d(1 โˆ’ X), respectively. In the remaining two cases, we have sฬ„ > d(1 โˆ’ X). sฬ„ Case 3: V < 1 โˆ’ 1+sฬ„ d and X > 1 โˆ’ d In this case, the interval X (sฬ„) lies in the region between V and X. Therefore, for any true attack probability x โˆˆ X (sฬ„), โˆ‚Eu โˆ‚s < 0. As a result, b(sฬ„) = 0. 1+sฬ„ Case 4: 1 โˆ’ d โ‰ค V โ‰ค 1 โˆ’ dsฬ„ In this case, there are three candidate solutions for utility maximization, s = 1, s = d(1 โˆ’ V ) โˆ’ sฬ„ and s = 0. We have 1 โˆ’ s+sฬ„ d as the true attack probability resulting from the strategies of the players. First we show that the player would always prefer to invest 1 over investing sโˆ— = d(1 โˆ’ V ) โˆ’ sฬ„. We denote the resulting attack probability while investing 1 as Y1 = 1 โˆ’ 1+sฬ„ d . Note that V โˆ’ Y1 = 1 โˆ— ). Now using (4) we compute (1 โˆ’ s d Eu(1, sN ) โˆ’ Eu(sโˆ— , sN ) =L(w(V ) โˆ’ w(Y1 )) โˆ’ c(1 โˆ’ sโˆ— ) =L(w(V ) โˆ’ w(Y1 )) โˆ’ cd(V โˆ’ Y1 )   w(V ) โˆ’ w(Y1 ) dc =L(V โˆ’ Y1 ) โˆ’ (V โˆ’ Y1 ) L   dc >L(V โˆ’ Y1 ) wโ€ฒ (V ) โˆ’ = 0, L where the inequality is due to the fact that w(x) is strictly concave for x โˆˆ [0, xmin,w ), and Y1 < V < xmin,w . Therefore, the player will always prefer the boundary solution s = 1 to the potential interior solution sโˆ— . This leads to the possibility that the best response might have a discontinuous jump from 0 to 1 at some value of sฬ„ in this region. However, we show that under the second and third conditions of Assumption 3, the player would always prefer to invest 0 over investing 1. We compute Eu(1, sN ) โˆ’ Eu(0, sN )     1 + sฬ„ sฬ„  โˆ’w 1โˆ’ โˆ’c =L w 1 โˆ’ d d         1 1 =L w ฮป + โˆ’ w(ฮป) โˆ’ c โ‰ค L w โˆ’ w(0) โˆ’ c, d d 1 where ฮป = 1 โˆ’ 1+sฬ„ d . The last inequality follows because the function l1 (ฮป) , w(ฮป + d ) โˆ’ w(ฮป) is a strictly decreasing function of ฮป for ฮป โˆˆ [0, V ]. Indeed, l1โ€ฒ (ฮป) = wโ€ฒ (ฮป + d1 ) โˆ’ wโ€ฒ (ฮป) < 0, as 1 dc 1 1 c โ€ฒ wโ€ฒ (ฮป) โ‰ฅ wโ€ฒ (V ) = dc L , and w (ฮป + d ) < L , as V โ‰ค ฮป + d < X. Therefore, if w( d ) < L , the player would always prefer to invest 0 over investing 1, regardless of the value of sฬ„ (including when sฬ„ = d โˆ’ 1). Proof of Proposition 2: 19 Proof. Without loss of generality, let players be ordered such that X1 โ‰ค X2 โ‰ค X3 โ‰ค . . . โ‰ค Xn , nci โ€ฒ i where Xi is the largest solution to wiโ€ฒ (x) = nc Li . When there is no solution to wi (x) = Li , i.e., i minxโˆˆ[0,1] wโ€ฒ (x) > nc Li for a player, then we define Xi = 0 for that player. When Xn = 0, then all players investing 1 is the only PNE. The true attack probability at the PNE must be at least 0. When X1 > 0, no objective attack probability 0 โ‰ค X < X1 would be a PNE, since there would always exist a player with positive investment who would prefer to invest 0. Now suppose there are two PNEs with different probabilities of successful attack X โˆ— and Y โˆ— , with X โˆ— < Y โˆ— . Consider the strategy profile with the smaller attack probability X โˆ— . Note that we have ruled out the possibility of X โˆ— < X1 above. There are two exhaustive cases: either Xl < X โˆ— < Xl+1 for some player l, or Xl = X โˆ— for some player l. Let Xl < X โˆ— < Xl+1 for some player l. By the definition of the quantities Xi , we have โ€ฒ โˆ— i wi (X โˆ— ) < nc Li for i โˆˆ {l + 1, . . . , n}, and therefore, si = 0 for i โˆˆ {l + 1, . . . , n}. Similarly, l โˆ— โˆ— i wiโ€ฒ (X โˆ— ) > nc Li and si = 1 for i โˆˆ {1, . . . , l}. In this case, X = 1 โˆ’ n . Now at the second PNE โˆ— โˆ— with true attack probability Y > X , the players in {1, . . . , l} would continue to invest 1, with the possibility of more players investing nonzero amounts if Y โˆ— โ‰ฅ Xl+1 . But then the true attack probability would decrease from X โˆ— , contradicting the assumption that Y โˆ— > X โˆ— . The proof of the case where X โˆ— = Xl for some player l follows identical arguments. B Linear Complementarity Problem Formulation We can exploit the structure of the best response as presented in (8) to represent the Nash equilibrium strategy profile as a solution to a Linear Complementarity Problem (LCP).4 Proposition 11. Consider a total effort game on a graph with n vertices with adjacency matrix A, and let dLi cii > wiโ€ฒ (xmin,wi ) for every player i. Then, under Assumptions 1 and 3, a strategy profile is a Nash equilibrium of this game if and only if it is a solution of the LCP (q, M), where q โˆˆ R2n and M โˆˆ R2nร—2n are given by     โˆ’d(1 โˆ’ X2 ) A + In In q= , and M = โˆ’In 0nร—n 1nร—1 where the jth entry of q is dj (1 โˆ’ X2j ) for j โˆˆ {1, 2, . . . , n}.   s Proof. The solution to the LCP (q, M) is a vector z โˆˆ which we can write as z = , where ยต s is the vector of investments by the players (strategy profile) and ยต is a set of variables which assume nonzero values when a corresponding investment si = 1. From the definition of a LCP, the solution z โ‰ฅ 0, i.e., s โ‰ฅ 0 and ยต โ‰ฅ 0. Secondly, from q + Mz โ‰ฅ 0, for each player i, we have X si + sj + ยตi โ‰ฅ di (1 โˆ’ X2i ), and R2n jโˆˆN (i) โˆ’ si + 1 โ‰ฅ 0. The second inequality ensures that si โ‰ค 1. Therefore, the investment by any player at any solution of the LCP is feasible, i.e., si โˆˆ [0, 1]. 4 Formally, given a vector q โˆˆ R n , and a matrix M โˆˆ R nร—n , the LCP (q, M ) is the problem of finding a solution vector z โˆˆ R n such that i) z โ‰ฅ 0, ii) q + M z โ‰ฅ 0, and iii) z T (q + M z) = 0. 20 Finally, zT (q + Mz) = 0 gives us X si (si + sj + ยตi โˆ’ di (1 โˆ’ X2i )) = 0, and jโˆˆN (i) ยตi (โˆ’si + 1) = 0, for every node i. As a result, when si โˆˆ (0, 1), we have ยตi = 0, and therefore, the investments satisfy the second part of equation (8). When si = 0, we also have ยตi = 0, and the resulting investments satisfy the third part of equation (8). Finally, when si = 1, we have ยตi > 0 such that the first part of equation (8) holds. This concludes the proof. A comprehensive discussion on LCPs and different solutions algorithms can be found in [Cottle et al., 1992]. The structure of the LCP often determines the performance of different algorithms. We show that the LCP defined in Proposition 11 satisfies certain properties, as proven in Proposition 12, that guarantee the convergence of the Lemkeโ€™s pivotal method to converge to a solution (i.e., a PNE strategy profile), if the problem is non degenerate. The convergence result is due to [Cottle et al., 1992]. Proposition 12. For the LCP (q, M) defined in Proposition 11, 1. the matrix M is copositive and 2. q โˆˆ SOL(0, M)โˆ— . Proof. For the proof of the first statement, consider any vector xT = [x1 i = 1, 2. Then we have,   T T Ax1 + x1 + x2 x Mx = [x1 x2 ] โˆ’x1 x2 ]T where xi โ‰ฅ 0, for T = xT 1 Ax1 + x1 x1 โ‰ฅ 0.   y1 For the second part, consider any solution y = of the LCP (0, M). Then, we must have y2   (A + In )y1 + y2 y โ‰ฅ 0, and My = โ‰ฅ 0. As a result, we must have y1 = 0. โˆ’y1   For any vector yT = y1T y2T , with y1 = 0 and y2 โ‰ฅ 0, we have qT y = 1T nร—1 y โ‰ฅ 0. Thus, q โˆˆ SOL(0, M)โˆ— . C Proofs Pertaining to the Effects of Network Structure Proof of Lemma 2: Proof. We denote the inverse of wโ€ฒ (ยท) as the function h(ยท), i.e., h : R+ โ†’ [xmin,w , โˆž) such that 21 h( dc L ) = X. Now, consider the function    dc ฯ†(d) , d(1 โˆ’ X) = d 1 โˆ’ h L   โ€ฒ   dc dc โˆ’d h =โ‡’ ฯ†โ€ฒ (d) = 1 โˆ’ h L L   dc 1 dc  = 1โˆ’h โˆ’ โ€ฒโ€ฒ L L w (h dc L ) dc 1 = 1โˆ’X โˆ’ . L wโ€ฒโ€ฒ (X) The second inequality follows from differentiating the inverse of the wโ€ฒ function. Now for x โˆˆ (xmin,w , 1), the weighting function w satisfies 1 wโ€ฒโ€ฒ (x) < wโ€ฒ (x) 1โˆ’x dc 1 wโ€ฒ (X) = =โ‡’ ฯ†โ€ฒ (d) < 0. =โ‡’ (1 โˆ’ X) < โ€ฒโ€ฒ w (X) L wโ€ฒโ€ฒ (X) Since ฯ†(d) is strictly decreasing in d, we have d(1 โˆ’ X) strictly decreasing when d is interpreted as the size of the extended neighborhood of a node. Proof of Proposition 6: Proof. We first show that when di (1 โˆ’ Xi ) < 1, the attack probability at node i is at most Xi at a PNE. Recall from Lemma 1 that the best response of player i is bi (sฬ„โˆ’i ) = 1 when the aggregate investment by her neighbors sฬ„โˆ’i โ‰ค di (1 โˆ’ Xi ) โˆ’ 1. When di (1 โˆ’ Xi ) < 1, the above condition is not satisfied since sฬ„โˆ’i โ‰ฅ 0. As a result, the investment of player i at any PNE lies in [0, 1). When sฬ„โˆ’i โ‰ฅ di (1 โˆ’ Xi ), the investment by node i is 0, and the resulting attack probability is at most Xi . Otherwise, the sum of the investments by node i and her neighbors satisfy the first order condition (5) with equality, in which case the resulting attack probability is exactly Xi . The upper bound on average attack probability follows by averaging Xi โ€™s over all nodes. At an interior PNE, each player experiences an attack probability exactly equal to Xi and therefore the bound holds with equality. D Proofs Pertaining to the Impact of Weighting Function We first state and prove the following lemma whose result will be useful in the proof of Lemma 3. Lemma 5. The function g(x) , (โˆ’ ln(x))ฮฑ2 โˆ’ฮฑ1 exp((โˆ’ ln(x))ฮฑ1 โˆ’ (โˆ’ ln(x))ฮฑ2 ), with ฮฑ1 < ฮฑ2 < 1 is strictly decreasing for x โˆˆ [ 1e , 1]. 22 Proof. We compute gโ€ฒ (x) = exp((โˆ’ ln(x))ฮฑ1 โˆ’ (โˆ’ ln(x))ฮฑ2 )ร—  โˆ’1 (ฮฑ1 (โˆ’ ln(x))ฮฑ1 โˆ’1 โˆ’ ฮฑ2 (โˆ’ ln(x))ฮฑ2 โˆ’1 ) ร— x ฮฑ2 โˆ’ฮฑ1 (โˆ’ ln(x)) ฮฑ2 โˆ’ฮฑ1 โˆ’1 1 โˆ’ (ฮฑ2 โˆ’ ฮฑ1 )(โˆ’ ln(x))  x 1 = exp((โˆ’ ln(x))ฮฑ1 โˆ’ (โˆ’ ln(x))ฮฑ2 )(โˆ’ ln(x))ฮฑ2 โˆ’ฮฑ1 โˆ’1 x ร— [โˆ’(ฮฑ1 (โˆ’ ln(x))ฮฑ1 + ฮฑ1 + ฮฑ2 (โˆ’ ln(x))ฮฑ2 โˆ’ ฮฑ2 ] . When x > 1e , (โˆ’ ln(x)) < 1 and thus 1 > (โˆ’ ln(x))ฮฑ1 > (โˆ’ ln(x))ฮฑ2 . As a result, 1 โˆ’ (โˆ’ ln(x))ฮฑ1 < 1 โˆ’ (โˆ’ ln(x))ฮฑ2 . Since ฮฑ1 < ฮฑ2 , this implies ฮฑ1 (โˆ’ ln(x))ฮฑ1 โˆ’ ฮฑ1 > ฮฑ2 (โˆ’ ln(x))ฮฑ2 โˆ’ ฮฑ2 . Therefore, gโ€ฒ (x) < 0 for x โˆˆ [ 1e , 1]. Proof of Lemma 3: Proof. The first derivative of the Prelec weighting function is given by wโ€ฒ (x) = w(x) ฮฑx (โˆ’ ln(x))ฮฑโˆ’1 . Therefore, if at a given x, w1โ€ฒ (x) = w2โ€ฒ (x), we have w1 (x)ฮฑ1 (โˆ’ ln(x))ฮฑ1 = w2 (x)ฮฑ2 (โˆ’ ln(x))ฮฑ2 w2 (x)(โˆ’ ln(x))ฮฑ2 ฮฑ1 = =โ‡’ ฮฑ2 w1 (x)(โˆ’ ln(x))ฮฑ1 ฮฑ1 = (โˆ’ ln(x))ฮฑ2 โˆ’ฮฑ1 exp((โˆ’ ln(x))ฮฑ1 โˆ’ (โˆ’ ln(x))ฮฑ2 ) =โ‡’ ฮฑ2 ฮฑ1 = g(x). =โ‡’ ฮฑ2 From the definition of g(x), g( 1e ) = 1 > ฮฑฮฑ12 . Furthermore, as x โ†’ 1, g โ€ฒ (x) โ†’ โˆ’โˆž. As a result, g(x) becomes smaller than ฮฑฮฑ12 for some x < 1. Thus there exists Xฬ„ at which w1โ€ฒ (x) = w2โ€ฒ (x). The uniqueness of Xฬ„ follows from the strict monotonicity of g(x) as proved in Lemma 5. In order to prove the second and third parts of the lemma, it suffices to show that w1โ€ฒโ€ฒ (Xฬ„) > w2โ€ฒโ€ฒ (Xฬ„). Therefore, we compute wโ€ฒโ€ฒ (x) = wโ€ฒ (x) [1 + ln(x) + ฮฑ((โˆ’ ln(x))ฮฑ โˆ’ 1)]. โˆ’x ln(x) From the previous discussion in Lemma 5, ฮฑ1 (โˆ’ ln(x))ฮฑ1 โˆ’ ฮฑ1 > ฮฑ2 (โˆ’ ln(x))ฮฑ2 โˆ’ ฮฑ2 , and wโ€ฒโ€ฒ (x) > 0 for x > 1e . Therefore at Xฬ„, w1โ€ฒโ€ฒ (Xฬ„) > w2โ€ฒโ€ฒ (Xฬ„). This concludes the proof. E Proofs Pertaining to Weakest Link and Best Shot Games Proof of Lemma 4: Proof. Consider the function l2 (x) , wโ€ฒ (x) โˆ’ w(xmin,w ) โˆ’ xmin,w w(x) x for x โˆˆ [xmin,w , 1). At x = xmin,w , l2 (x) = < 0. Furthermore, l2 (1 โˆ’ วซ) โ†’ โˆž as วซ โ†’ 0. Therefore, l2 (x) must have a root for x โˆˆ [xmin,w , 1). 23 Suppose there exist z1 , z2 with z1 < z2 such that wโ€ฒ (zi ) = convex for x โˆˆ (xmin,w , 1], we have w(zi ) zi , i โˆˆ {1, 2}. Since w(x) is strictly w(z1 ) > w(z2 ) + wโ€ฒ (z2 )(z1 โˆ’ z2 ) = z1 wโ€ฒ (z2 ) w(z1 ) > wโ€ฒ (z2 ) > wโ€ฒ (z1 ), =โ‡’ z1 which is a contradiction. Thus, z is unique. For the second part, suppose that there exists an x > z at which wโ€ฒ (x) โ‰ค convexity of w, we have w(x) x . Again from the w(z) > w(x) + wโ€ฒ (x)(z โˆ’ x) โ‰ฅ zwโ€ฒ (x) w(z) > wโ€ฒ (x) > wโ€ฒ (z), =โ‡’ z which contradicts the definition of z. Proof of Proposition 8: Proof. When there is a single player investing in isolation, we have three candidate solutions for utility maximization, s1 = 1 โˆ’ V , s2 = 1 โˆ’ X or s3 = 1. Here X and V are solutions to wโ€ฒ (x) = Lc , as defined in Section 4. Note that since Lc is finite, we have โˆ‚Eu โˆ‚s > 0 at s = 0, so investing 0 in security is not a utility maximizer. From the analysis in Case 4 of Lemma 1 with sฬ„ = 0 and d = 1, we have Eu(1) > Eu(1 โˆ’ V ). Therefore, between the potential interior solution s1 = 1 โˆ’ V that satisfies the first order condition, and the boundary solution s3 = 1, the player always prefers the boundary solution. Now, to compare the utilities at the solutions s2 and 1, we compute Eu(1) โˆ’ Eu(s2 ) = Lw(1 โˆ’ s2 ) โˆ’ c(1 โˆ’ s2 )   w(1 โˆ’ s2 ) โ€ฒ โˆ’ w (1 โˆ’ s2 ) , = L(1 โˆ’ s2 ) 1 โˆ’ s2 where Lc = wโ€ฒ (1 โˆ’ s2 ). Thus, from Lemma 4, when wโ€ฒ (1 โˆ’ s2 ) = Lc > wโ€ฒ (z), then, 1 โˆ’ s2 > z and the player prefers to invest s2 . Otherwise, the optimal investment is 1. 24
3cs.SY
1 Link Selection in Hybrid RF/VLC Systems under Statistical Queueing Constraints Marwan Hammouda, Sami Akฤฑnโ€  , Anna Maria Vegni, Harald Haas, and Juฬˆrgen arXiv:1711.08175v1 [cs.IT] 22 Nov 2017 Peissig Abstract The co-deployment of radio frequency (RF) and visible light communications (VLC) technologies has been investigated in indoor environments to enhance network performances and to address specific quality-of-service (QoS) constraints. In this paper, we explore the benefits of employing both technologies when the QoS requirements are imposed as limits on the buffer overflow and delay violation probabilities, which are important metrics in designing low latency wireless networks. Particularly, we consider a multi-mechanism scenario that utilizes RF and VLC links for data transmission in an indoor environment, and then propose a link selection process through which the transmitter sends data over the link that sustains the desired QoS guarantees the most. Considering an ON-OFF data source, we employ the maximum average data arrival rate at the transmitter buffer and the non-asymptotic bounds on data buffering delay as the main performance measures. We formulate the performance measures under the assumption that both links are subject to average and peak power constraints. Furthermore, we investigate the performance levels when either one of the two links is used for data transmission, or when both are used simultaneously. Finally, we show the impacts of different physical layer parameters on the system performance through numerical analysis. Index Terms Visible light communications, quality-of-service constraints, buffering delay bound, link selection, multi-mechanisms. M. Hammouda, S. Akฤฑn, and J. Peissig are with the Institute of Communications Technology, Leibniz Universitaฬˆt Hannover, 30167 Hanover, Germany. E-mails: {marwan.hammouda, sami.akin, and peissig}@ikt.uni-hannover.de. A. M. Vegni is with COMLAB laboratory, Department of Engineering, Roma TRE University, 00146 Roma, Italy. E-mail: [email protected]. H. Haas is with the Institute for Digital Communications, Li-Fi Research and Development Centre, the University of Edinburgh, Edinburgh, UK, EH9 3JL. E-mail: [email protected]. โ€  This work was supported by the European Research Council under Starting Grantโ€“306644. 2 I. I NTRODUCTION The ever-growing demand for mobile communications triggered a quest for technical solutions that will support stringent quality-of-service (QoS) constraints. Thanks to the significant advances in white light emitting diodes (LEDs) research, and the availability of an extensive unregulated spectrum, visible light communication (VLC) has emerged as a promising technology. We can utilize LEDs simultaneously for data transmission and illumination, since they have many unique aspects compared to the other communication technologies [1]. Moreover, we can improve data security because light does not penetrate the surrounding walls. We can also sustain an all-important green agenda and minimize the installation costs because we do not require an extensive infrastructure. Nevertheless, attention must be paid to certain limitations and challenges in VLC systems, e.g., smaller coverage, strong dependence on line-of-sight components and achievable rates that vary with spatial fluctuations [2]. In order to overcome these constraints, researchers proposed hybrid RF/VLC systems [1], [3]โ€“[13], where end users can benefit from the wide coverage area that RF systems support and the stable rates that VLC systems provide. Such networks are practically feasible as RF and VLC systems can coexist without causing interference on each other and operate in the same environment, such as offices and rooms. Comparing hybrid RF/VLC systems with systems that employ either RF or VLC only, the authors in [1], [3], [4], [7], [14] demonstrated a remarkable increase in data transmission throughput, energy efficiency and delay performance in hybrid RF/VLC systems. Moreover, the authors in [5], [6] projected a hybrid system in which they use VLC links for down-link communication and RF links for up-link communication. In such a system, the authors in [8]โ€“ [10] and the ones in [12], [13], [15] investigated handover and load balancing mechanisms, respectively. Alternatively, considering an outdoor environment, the authors in [16] studied a point-to-point transmission scenario in which the system can switch between RF links and VLC links after comparing the signal-to-noise ratio levels in each link. Regarding the same system setting, the authors in [17] assumed that both RF and VLC links have the same transmission rates, and then proposed a diversity-based transmission scheme such that the transmitter sends data by employing both links simultaneously. The aforementioned studies analyzed the hybrid RF/VLC systems mostly from the physical layer perspective, i.e., they did not concentrate on the data link layer metrics, such as limits on the buffer overflow and buffering delay probabilities, as much as needed. Noting the dramatic 3 increase in the demand for reliable delay-sensitive services in recent years (mobile video traffic making up 55% of the total global data traffic at the end of 2014 [18]), in addition to the physical layer performance metrics, we need QoS metrics that can be a cross-layer analysis tool between the physical layer features and the performance levels in data-link layer. In this context, the authors in [19]โ€“[25] performed cross-layer analysis between physical and data-link layers in many different RF scenarios. Regarding a Markovian data arrival process at a transmitter buffer and a statistically varying data service process in a wireless channel, the authors in [25] characterized the maximum average data arrival rate at the transmitter buffer with the presence of statistical constraints on the buffer overflow probability. On the other hand, to the best of our knowledge, there are only a few studies that investigated cross-layer performance levels in VLC systems. For example, the authors employed effective capacity as a performance measure in resource allocation schemes in VLC systems [26] and heterogeneous networks composed of VLC and RF links [27]. Here, we note that the authors in [27] concentrated on the case of constant data arrival rates at the transmitter buffer, which is not realistic in certain practical settings. For more details in effective capacity, we refer to [20]. In this paper, assuming an ON-OFF modeled data arrival process at the transmitter buffer and that the transmitter can use both RF and VLC channels for data transmission, we investigate the performance gains achieved by a hybrid RF/VLC system. This operates under statistical QoS constraints, which are inflicted as limits on the buffer overflow and delay violation probabilities. We perform a cross-layer analysis of these hybrid systems in physical and data-link layers. We employ first the maximum average data arrival rate at the transmitter buffer considering the asymptotic buffer overflow probability approximation, and then non-asymptotic buffering delay violation probability as the main performance measures. We propose a mathematical toolbox to system designers for performance analysis in hybrid RF/VLC systems that work under low latency conditions. To summarize, the main contributions of this paper are as follows: 1) Assuming that both RF and VLC links are subject to average and peak power constraints, we express the maximum average data arrival rate at the transmitter that the data service process from the transmitter to the receiver can support under QoS constraints when either the RF or VLC link is used, or both links are simultaneously used for data transmission. 2) We propose three different link usage strategies. We base two of the proposed strategies on the assumption that the receiver does not have a multihoming capability, thus data transmission is possible over only one link, either the RF or VLC link. In the third strategy, 4 we assume that link aggregation is possible and data can be transmitted over both links simultaneously following a power sharing policy. 3) We obtain the non-asymptotic data backlog and buffering delay violation probability bounds considering the proposed link usage strategies. Particularly, we provide a rudimentary model for multi-mechanisms in communication systems that operate under QoS constraints. We employ RF and VLC links as two different mechanisms. Our model can be easily invoked in settings with more than two different mechanisms as well. The reason behind multi-mechanisms in communications is to boost performance levels through the increased degree of freedom. Therefore, in order to introduce our model smoothly and make it easier for readers to understand our objective, we also benefit from the existing literature in RF and VLC studies. However, to the best of our knowledge, the analytical framework provided in this paper, in which we investigate the QoS performance, is not addressed in other studies. One aspect of this hybrid system is that VLC links provide time-invariant transmission rates, while RF links provide rates that vary over time. A communication setting that depends solely on an RF link may suffer low transmission rates, and have longer data backlogs in the transmitter buffer. However, a communication setting that can utilize both RF and VLC links, for instance, can take advantage of the constant transmission rate in the VLC link when the transmission rate in the RF link falls below a certain level. The rest of the paper is organized as follows. We introduce the hybrid RF/VLC system in Section II. We provide detailed descriptions of both RF and VLC channels. In Section III, we provide the performance analysis and the link selection process. In Section IV, we substantiate our results with numerical demonstrations. We conclude the paper in Section V and relegate the proofs to the Appendix. II. S YSTEM M ODEL We consider a network access controller that provides a connection to a user1 , through either an RF access point or a VLC access point, which are positioned at different locations in an indoor environment as seen in Figure 1. Herein, we assume a down-link scenario, i.e., the network access controller acts as a transmitter and the user acts as a receiver. In the sequel, we use transmitter and receiver instead of network access controller and user, respectively. Initially, 1 The analytical framework provided in this paper can easily be extended to a multi-user scenario. For more details, we refer to Remark 4 in Section III. 5 Fig. 1. Hybrid RF/VLC system. the transmitter receives data from a source (or sources) and stores it as packets in its buffer. Subsequently, it sends the data packets in frames of T seconds to the receiver following a given transmission strategy. The receiver is considered to be equipped with an RF front-end and a photo-diode. We also note that the VLC coverage area is generally smaller than the RF coverage area, and that they overlap2 . Finally, we consider a power-limited system and assume that the network controller is constrained by a fixed average power budget, denoted as Pavg , for data transmission. In the sequel, we initially introduce the RF and VLC channels, and then describe the data source model. A. RF Channel Model During the data transmission in the flat-fading RF channel, the input-output relation at time instant t is expressed as yr (t) = xr (t)h(t) + wr (t), (1) where xr (t) and yr (t) are the complex channel input and output at the RF access point of the transmitter and the RF front-end of the receiver, respectively. The complex channel input is subject to an average power constraint, Pavg,r , i.e., E{|xr (t)|2 } โ‰ค Pavg,r , and a peak power constraint, Ppeak,r , i.e., |xr (t)|2 โ‰ค Ppeak,r . Above, h(t) is the complex channel fading gain with an arbitrary distribution having a finite average power, i.e., E{|h(t)|2 } < โˆž. Furthermore, we consider a block-fading channel and assume that the fading gain stays constant during one transmission frame (T seconds), i.e., h(lT ) = h(lT + B1r ) = ยท ยท ยท = h((l + 1)T โˆ’ B1r ) = hl , where the available bandwidth is Br Hz in the channel and hl is the channel fading gain in the lth time frame. Note that there are T Br symbols transmitted in one time frame. Moreover, the fading gain changes independently from one frame to another. Meanwhile, wr (t) is the additive noise at 2 This model is also considered in [9]. 6 the RF front-end of the receiver, which is a zero-mean, circularly symmetric complex Gaussian random variable with variance ฯƒr2 , i.e., E{|wr (t)|2 } = ฯƒr2 < โˆž. The noise samples {wr (t)} are assumed to be independent and identically distributed. We assume that a reliable data transmission exists as long as the transmission rate in the channel is lower than or equal to the instantaneous mutual information between the channel input and output3 . In particular, when the transmission rate in the lth time frame (i.e., Rl bits per frame) is lower than or equal to the instantaneous mutual information (i.e., Cr,l bits per frame) between the channel input [xr (lT ), xr (lT + B1r ), ยท ยท ยท , xr ((l + 1)T โˆ’ B1r )] and the channel output [yr (lT ), yr (lT + 1 ), ยท ยท ยท Br , yr ((l + 1)T โˆ’ 1 )], Br a reliable data transmission occurs and Rl bits are decoded correctly by the receiver. Here, we assume that T Br is large enough so that the decoding error probability is negligible when Rl โ‰ค Cr,l . In [30], a lower bound on the maximum mutual information (or channel capacity) is provided, where the input has a two-dimensional circularly truncated Gaussian distribution. Therefore, we set the instantaneous data transmission rate to the lower bound and assume that the input has a two-dimensional circularly truncated Gaussian distribution. Specifically, we have a reliable transmission in the lth time frame when    bPavg,r 2|hl |2 exp โˆ’1 โ‰ค Cr,l bits per frame, (2) Rl = T Br log2 1 + aฯƒr2 2 where a and b are the solutions of the following equations:    bPpeak,r a 1 โˆ’ exp โˆ’ = 1, b 2 (2a) and     bPpeak,r bPpeak,r Pavg,r a โˆ’1 2 (bPpeak,r ) 1 โˆ’ exp โˆ’ 1+ = . b 2 2 Ppeak,r (2b) Above, Cr,l is time-dependent and changes from one time frame to another because the maximum instantaneous mutual information in each frame is a function of the channel fading gain. B. VLC Channel Model We assume that the transmitter employs intensity modulation/direct detection. Principally, the VLC access point of the transmitter is equipped with an LED and the data is modulated on the intensity of the emitted light. The receiver that collects light using a photo-diode generates an 3 This assumption is based on the known result in the literature that transmitting data at rates less than or equal to the instantaneous mutual information has a high reliability, thus the decoding error is negligible [28, Eq. (10)] [29]. 7 electrical current or voltage proportional to the intensity of the received light. Besides, we know that VLC channels are typically composed of line-of-sight as well as multi-path components. However, the majority of the collected energy at photo-diodes (more than 95%) comes from the line-of-sight components in typical indoor scenarios [31]. Therefore, we can assume that the VLC channel is flat with a dominant line-of-sight component [32]โ€“[34], and the channel gain does not vary during the data transmission as long as the receiver is stationary4 . Accordingly, the input-output relation in the VLC channel between the VLC access point of the transmitter and the photo-diode of the receiver at time instant t is given as follows: yv (t) = โ„ฆxv (t)g + wv (t), (3) where xv (t) and yv (t) are the real-valued channel input and output, respectively. Above, โ„ฆ is the optical-to-electrical conversion efficiency (or detector responsivity) of the photo-diode in amperes per watt and wv (t) is the additive noise at the photo-diode of the receiver, which is a zero-mean, real Gaussian random variable with variance ฯƒv2 , i.e., E{wv2 } = ฯƒv2 . The noise samples {wv } are independent and identically distributed. Moreover, g is the time-invariant optical channel gain. Recall that the data transmitted over the VLC link is modulated on the light that illuminates the environment. Hence, assuming that the operation range of the radiated optical power is limited between Pmin and Pmax when the light is on, we modulate the data between the power levels Pmin and Pmax , i.e., Pmin โ‰ค xv (t) โ‰ค Pmax . As a result, the data bearing symbol, xฬƒv = xv (t) โˆ’ Pmin is limited as follows: xฬƒv โ‰ค Pmax โˆ’ Pmin = Ppeak,v . Hence, we can re-express the input-output relation in (3) as yฬƒv (t) = yv (t) โˆ’ โ„ฆPmin g = โ„ฆxฬƒv (t)g + wv (t). (4) Now, assuming that the expected value of xฬƒv (t) is bounded by Pavg,v , i.e., E{xฬƒv (t)} โ‰ค Pavg,v , and that the available bandwidth in the optical channel is Bv Hz, we set the transmission rate in the channel in bits per frame to the lower bound on the channel capacity, which is defined as follows [36]: V = 4 T Bv log2 2 (   ) โˆ’ยต? 2 Pavg,v ? โ„ฆg 1โˆ’e 2 exp 2 โ‰ค Cv , 1 + Ppeak,v ยต โˆ’1 2 2ฯ€ฯƒv Ppeak,v ยต? 2 2 (5) Small-scale variations in VLC channels (i.e., fading) is mitigated since the area of a photo-diode is much larger than the light wavelength [35, Sec. 2.5]. Thus, VLC channels are known as time-invariant. This fact is almost true regardless of the frame duration or the user being stationary or mobile in indoor environments, because the users are either stationary or move very slowly. 8 Fig. 2. State transition model of the data arrival process. when 0 โ‰ค Pavg,v Ppeak,v < 21 , and   T Bv ฯ‰ 2 g 2 โˆ’1 2 V = โ‰ค Cv , log2 1 + Ppeak,v e 2 2ฯ€ฯƒv2 when 1 2 โ‰ค Pavg,v Ppeak,v (6) โ‰ค 1, where ยต? is the unique solution to Pavg,v 1 eโˆ’ยต = โˆ’ . Ppeak,v ยต 1 โˆ’ eโˆ’ยต (7) Above, Cv and V are constant values, because the mutual information in the VLC link does not change by time, i.e., due to the strong line-of-sight channel component, the channel gain, g, does not change. As for the input distribution, we refer to [36, Eq. 42]. C. Source Model Regarding the data arrival process at the transmitter buffer, we consider a two-state discretetime Markov process5 with ON and OFF states in each time frame. When the source is in the ON state in one time frame, the data from a source (or sources) arrives at the transmitter buffer. In the ON state, we consider a constant data arrival rate, i.e., ฮป bits per frame. The number of bits arriving at the transmitter buffer is zero in the OFF state. As shown in Fig. 2, the transition probability from the ON state to the OFF state is denoted by ฮฑ and the transition from the OFF state to the ON state is denoted by ฮฒ. The probability of staying in the ON state is 1 โˆ’ ฮฑ and the probability of staying in the OFF state is 1 โˆ’ ฮฒ. Hence, the state transition matrix becomes ๏ฃฎ ๏ฃน 1โˆ’ฮฑ ฮฑ ๏ฃป. J =๏ฃฐ (8) ฮฒ 1โˆ’ฮฒ Now, let pON and pOFF be the steady-state probabilities of the data arrival process being in the ON and OFF states, respectively, where pON + pOFF = 1. Then, we have the following equality: 5 We can project certain data arrival models on ON-OFF Markov processes. For instance, voice sources are generally modeled with ON and OFF states [37]. 9 [pON pOFF ] = [pON pOFF ]J. Subsequently, we have pON = average data arrival rate at the transmitter buffer is ฮฒฮป ฮฑ+ฮฒ ฮฒ ฮฑ+ฮฒ and pOFF = ฮฑ , ฮฑ+ฮฒ and hence, the bits per frame. We finally note that the following analysis can easily be extended to other source models. III. P ERFORMANCE A NALYSIS In this section, we investigate the performance levels that the aforementioned system achieves by opportunistically exploiting the RF and VLC channels for data transmission. Herein, because the data is initially stored in the transmitter buffer before transmission, we assume that certain constraints are applied on the amount of the data in the buffer and the buffering delays. Therefore, we examine the system under QoS constraints that are associated with buffer overflow (data backlog) and buffering delay, and express the decay rate of the tail distribution of the queue length as [19, Eq. (63)] loge Pr{Q โ‰ฅ q} , qโ†’โˆž q ฮธ = โˆ’ lim (9) where Q is the stationary queue length, Q(t) (see Fig. 1), and q is the buffer overflow threshold. Above, ฮธ > 0 denotes the decay rate of the tail distribution of the data backlog, Q. Accordingly, we can approximate the buffer overflow probability for a large threshold, qmax , as Pr{Q โ‰ฅ qmax } โ‰ˆ eโˆ’ฮธqmax . Notice that the buffer overflow probability decays exponentially with a rate controlled by ฮธ, which is also defined as the QoS exponent. Basically, larger ฮธ implies stricter QoS constraints, whereas smaller ฮธ corresponds to looser constraints. Recall that the outgoing service from the transmitter queue is Rl , given in (2), when the data is sent through the RF channel and it is V , given in (5) and (6), when the data is sent through the VLC channel, while the data arrival is ON-OFF Markov process with ฮป bits per frame in the ON state and zero bits in the OFF state. Hence, assuming that the buffer size is infinite and considering independent data arrival and work-conserving data service processes, there exist unique ฮธr? > 0 and ฮธv? > 0 such that ฮ›a (ฮธr? ) = โˆ’ฮ›r (โˆ’ฮธr? ) and ฮ›a (ฮธv? ) = โˆ’ฮ›v (โˆ’ฮธv? ), respectively, where ฮ›a (ฮธ), ฮ›r (ฮธ) and ฮ›v (ฮธ) are the asymptotic log-moment generating functions of the total amount of bits arriving at the transmitter buffer, the total service from the transmitter in the RF channel and the total service from the transmitter in the VLC channel, respectively [38, Theorem 10 2.1]. In particular, the asymptotic log-moment generating functions for any ฮธ are q ๏ฃฑ ๏ฃผ ๏ฃฒ 1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)eฮธฮป + [1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)eฮธฮป ]2 โˆ’ 4(1 โˆ’ ฮฑ โˆ’ ฮฒ)eฮธฮป ๏ฃฝ ฮ›a (ฮธ) = loge , ๏ฃณ ๏ฃพ 2   ฮ›r (ฮธ) = loge Eh eฮธRl and ฮ›v (ฮธ) = ฮธV. (10) (11) We refer to [39, Example 7.2.7] for obtaining the log-moment generating functions. Using ฮ›a (ฮธr? ) = โˆ’ฮ›r (โˆ’ฮธr? ), we can express the maximum average data arrival rate at the transmitter buffer that the service process in the RF channel can sustain for any ฮธ > 0 as  โˆ’2ฮ›r (โˆ’ฮธ)  e โˆ’ (1 โˆ’ ฮฒ)eโˆ’ฮ›r (โˆ’ฮธ) ฮฒ ฯr (ฮธ) = loge (ฮฑ + ฮฒ)ฮธ (1 โˆ’ ฮฑ)eโˆ’ฮ›r (โˆ’ฮธ) โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ) ( )  1 โˆ’ (1 โˆ’ ฮฒ)Eh eโˆ’ฮธRl ฮฒ = loge , (ฮฑ + ฮฒ)ฮธ (1 โˆ’ ฮฑ)Eh {eโˆ’ฮธRl } โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ)E2h {eโˆ’ฮธRl } (12) where Rl is given in (2). For the derivation of ฯr (ฮธ), we refer to Appendix A. Likewise, using ฮ›a (ฮธv? ) = โˆ’ฮ›v (โˆ’ฮธv? ) and following the steps in Appendix A, we can also express the maximum average data arrival rate at the transmitter buffer that the service process in the VLC channel can sustain for any ฮธ > 0 as eโˆ’2ฮ›v (โˆ’ฮธ) โˆ’ (1 โˆ’ ฮฒ)eโˆ’ฮ›v (โˆ’ฮธ) (1 โˆ’ ฮฑ)eโˆ’ฮ›v (โˆ’ฮธ) โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ)   ฮฒ e2ฮธV โˆ’ (1 โˆ’ ฮฒ)eฮธV = loge , (ฮฑ + ฮฒ)ฮธ (1 โˆ’ ฮฑ)eฮธV โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ) ฮฒ ฯv (ฮธ) = loge (ฮฑ + ฮฒ)ฮธ   (13) where V is given in (5) and (6) accordingly with the relation between Pavg and Ppeak . Moreover, in the special case where ฮฑ = 0 and ฮฒ = 1, the expressions in (12) and (13) provide the effective capacity, which is the maximum sustainable constant data arrival rate by the channel process given the QoS constraints [20]. In another special case where ฮฑ +ฮฒ = 1, i.e., the state-transitions are independent of the past and current states, we have ) (   2ฮธVl  1 โˆ’ ฮฑEh eโˆ’ฮธRl ฮฒ e โˆ’ ฮฑeฮธVl ฮฒ and ฯv (ฮธ) = loge . ฯr (ฮธ) = loge ฮธ ฮฒEh {eโˆ’ฮธRl } ฮธ ฮฒeฮธVl (14) A. Link Selection Policy In this section, we focus on the channel selection process that the transmitter employs. We set the maximum average data arrival rate under QoS constraints as the objective in the channel selection process. In particular, the transmitter chooses the channel in which the service process maximizes the average data arrival rate at the transmitter buffer. Notice that the transmission 11 rate in the VLC channel is constant, whereas the transmission rate in the RF channel varies due to the changes in the channel fading gain. Now, due to the fact that the channel fading gains are known by the receiver as well as the transmitter, we provide the following proposition. Proposition 1: In the aforementioned RF/VLC system, the transmitter sends data to the receiver over the VLC link when the following condition for a given QoS exponent, ฮธ, holds: q ๏ฃฑ ๏ฃผ 2 ๏ฃฒ ๏ฃฝ [1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)ฮพ] โˆ’ 4(1 โˆ’ ฮฑ โˆ’ ฮฒ)ฮพ 1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)ฮพ + 1 V โ‰ฅ loge , ๏ฃณ ๏ฃพ ฮธ 2 where  1 โˆ’ (1 โˆ’ ฮฒ)Eh eโˆ’ฮธRl . ฮพ= (1 โˆ’ ฮฑ)Eh {eโˆ’ฮธRl } โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ)E2h {eโˆ’ฮธRl } (15) (16)  Proof: See Appendix B. Proposition 1 states that if the maximum attainable transmission rate in the VLC channel is greater than the right-hand side of (15), the transmitter should perform transmission over the VLC link because the statistical variations in the RF channel deteriorates the buffer stability. Meanwhile, in the special case when ฮฑ + ฮฒ = 1, we re-express (15) as   1 V โ‰ฅ โˆ’ loge Eh eโˆ’ฮธRl ฮธ . (17) Specifically, the constant rate in the VLC channel should be greater than the effective capacity of the RF channel such that the VLC channel is chosen for data transmission. In the following, we present two transmission strategies, such that (i) the data is transmitted over the link with the highest instantaneous transmission rate in one time frame, and (ii) the data is transmitted over both links simultaneously. Hybrid-Type I Transmission Strategy: In the above analysis, we obtain the performance levels when the transmitter chooses either of these two channels for data transmission following a link selection process based on the maximum average data arrival rates that the service processes in the channel can support. On the other hand, if there exists a fast and stable handover mechanism between the transmitter and the receiver, the transmitter will forward the data to the receiver over the link that provides the maximum lower bound on the instantaneous mutual information in the corresponding channel. For instance, when the lower bound on the instantaneous mutual information in the RF channel in the lth time frame, Rl , is greater than the lower bound on the instantaneous mutual information in the VLC channel, V , i.e., Rl > V , the transmitter sends the data over the RF link in the corresponding time frame only. Otherwise, it prefers sending the 12 data over the VLC link. Respectively, we can establish the channel selection criterion as follows: The transmitter sends the data over the RF link when    bPavg,r aฯƒr2  TVB 2 |hl | > 2 r โˆ’ 1 exp 1 โˆ’ = ฮบ. 2 2 (18) Otherwise, it sends the data over the VLC link. The aforementioned selection test can also be considered as the outage condition in the RF channel, i.e., the RF link is in outage when |hl |2 โ‰ค ฮบ. Noting that the channel fading gain changes independently from one time frame to another in the RF channel, the log-moment generating function of the service process becomes   ฮ›rv (ฮธ) = loge E|h|2 >ฮบ eฮธRl + Pr{|hl |2 โ‰ค ฮบ}eฮธV , (19) where E|h|2 >ฮบ {eฮธRl } is the conditional expectation given that |h|2 > ฮบ, i.e., E|h|2 >ฮบ {eฮธRl } = R โˆž ฮธR 1 e l f|h|2 (|h|2 )d|h|2 , where f|h|2 (|h|2 ) is the probability density function of |h|2 . Pr{|hl |2 >ฮบ} ฮบ Hence, the maximum average data arrival rate at the transmitter buffer that the hybrid service process can sustain under the QoS constraints specified by ฮธ > 0 becomes   ฮฒ 1 โˆ’ (1 โˆ’ ฮฒ)D loge ฯrv (ฮธ) = , (ฮฑ + ฮฒ)ฮธ (1 โˆ’ ฮฑ)D โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ)D2  where D = E|h|2 >ฮบ eโˆ’ฮธRl + Pr{|hl |2 โ‰ค ฮบ}eโˆ’ฮธV . (20) Hybrid-Type II Transmission Strategy: Different than the aforementioned protocols, we consider a transmitter that sends data over both links simultaneously in each frame. We assume that the receiver has a multihoming capability. We further assume a multiplexing-based transmission scheme such that the data streams transmitted over the RF and VLC links are different and independent from each other. Indeed, this scenario is feasible since the light and RF waves do not cause interference on each other. We further assume a power allocation policy between the two links, i.e., the average power constraint in the RF link is set to Pavg,r = ฮณl Pavg , and the one in the VLC link is set to Pavg,v = (1 โˆ’ ฮณl )Pavg , where Pavg is the total average power constraint, and 0 < ฮณl < 1. Then, the instantaneous transmission rate in the RF channel in the lth time frame becomes    bฮณl Pavg 2|hl |2 exp โˆ’1 Rl = T Br log2 1 + aฯƒr2 2 bits per frame, (21) where a and b are the solutions of (2a) and (2b). Similarly following (5)โ€“(6), the transmission rate in the VLC channel becomes (   ) 2 2 โˆ’ยต? 2 (1 โˆ’ ฮณ )P โ„ฆ g 1 โˆ’ e T Bv l avg ? 2 V = log2 1 + Ppeak,v exp 2 ยต โˆ’1 , 2 2ฯ€ฯƒv2 Ppeak,v ยต? (22) 13 when 0 โ‰ค (1โˆ’ฮณl )Pavg Ppeak,v < 12 , and   T Bv โ„ฆ2 g 2 โˆ’1 2 V = log2 1 + Ppeak,v , e 2 2ฯ€ฯƒv2 when 1 2 โ‰ค (1โˆ’ฮณl )Pavg Ppeak,v (23) โ‰ค 1, where ยต? is the unique solution of (7). It follows that the total transmission rate in each frame is the sum of the transmission rates in both links, i.e., Rl + V . Then, the log-moment generating function can be readily expressed as ฮ›srv (ฮธ) = loge E{eฮธ(Rl +V ) } = ฮธV + loge E{eฮธRl }, and the maximum average data arrival rate is equal to   1 โˆ’ (1 โˆ’ ฮฒ)D ฮฒ loge , ฯsrv (ฮธ) = (ฮฑ + ฮฒ)ฮธ (1 โˆ’ ฮฑ)D โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ)D2 (24) (25) where D = eโˆ’ฮธV Eh {eโˆ’ฮธRl }. We finally remark that the optimal value of ฮณl that maximizes the sum transmission rate, i.e., maxฮณl {Rl + V }, can be obtained numerically. Remark 1: Employing the aforementioned strategies requires the perfect knowledge of both RF and VLC channels at the transmitter side in each frame. We assume that the channel estimation is performed at the receiver, and forwarded to the transmitter in a delay-free and error-free feedback channel. This increases the signaling overhead. Moreover, applying Hybrid-Type II Transmission Strategy increases the implementation complexity because power sharing should be performed in each transmission frame. From the implementation perspective, exploiting Hybrid-Type II Transmission Strategy is limited because the receiver should have a multihoming capability that enables it to perform link aggregation and receive data from different transmission technologies simultaneously. On the other hand, the maximum average data arrival rate is a steady-state performance measure. Thus, the selection process explained in Proposition 1 is considered as a large-timescale operation, which can be performed over periods of multiple transmission frames, and therefore, the implementation complexity decreases. Such a large-timescale operation is also proposed in [40]. Remark 2: The selection process can also be employed in cases the access point controller has to choose between more than two transmission links. For example, let there be N transmission links, and let {ฯ1 (ฮธ), . . . , ฯN (ฮธ)} be the maximum average data arrival rates at the transmitter buffer sustained by these links. Then, Proposition 1 in the paper will be updated with the solution of the following maximization problem: Transmission Link = max {i : ฯi (ฮธ)} . (26) 14 Similarly, let {R1 (l), ยท ยท ยท , RN (l)} be the instantaneous transmission rates provided by each link in the lth time frame. Then, the link selection criterion in Hybrid-Type I Transmission Strategy will be updated with the solution of the following maximization problem: Transmission Link = max {i : Ri } . (27) Subsequently, the log-moment generating function of the service process will be  ฮ›1,...,N (ฮธ) = loge Pri EeฮธRi (l) , (28) where Pri is the probability that the transmitter chooses link i for data transmission. Finally, if the receiver has a multihoming capability, Hybrid-Type II Transmission Strategy can be applied with power sharing to maximize the total transmission rate in each frame. B. Impacts of Handover Delay Handover delay occurs when the transmitter moves from one link to the other, which is the case in Hybrid-Type I Transmission Strategy. In this strategy, data transmission in one time frame is performed over the link that provides the maximum instantaneous transmission rate in that frame. Particularly, the transmitter switches from one link to the other or stay in the same link at the end of any time frame after comparing the instantaneous transmission rates in both links. Now, given that TH denotes the duration of one single handover phase, let us initially assume that the frame duration is larger than the handover phase, i.e., T > TH . For the sake of simplicity, we divide the frame duration into n sub-frames that are equal to TH , i.e., T = n ร— TH , where n โˆˆ N and n > 1. Particularly, a series of n sub-frames of data transmission phase is followed by one sub-frame of handover process if the transmitter changes the transmission link, or by another series of n sub-frames of data transmission phase if the transmitter stays in the same transmission link. For an analytical representation, we model the buffer activity at the end of each sub-frame as a discrete-time Markov process. As shown in Fig. 3, we have 2n + 2 states. The first n states, i.e., {State 1,ยท ยท ยท ,State n}, represent the data transmission sub-frames in the VLC link, and State (n + 1) represents the handover process from the VLC link to the RF link. Similarly, the subsequent n states, i.e., {State (n + 2),ยท ยท ยท ,State (2n + 1)}, represent the data transmission sub-frames in the RF link, and State (2n + 2) represents the handover process from the RF link to the VLC link. Notice that the state transition probability from State i to State 15 i + 1 is 1 for i โˆˆ {1, ยท ยท ยท , n โˆ’ 1} and for i โˆˆ {n + 2, ยท ยท ยท , 2n} because the data transmission in each link is completed in n sub-frames and the link change may occur at the end of the nth and (2n + 1)th sub-frames. On the other hand, in State n, either the transmitter changes the link and the system enters State n + 1 with probability 1 โˆ’ ฮดฮฝ , or the transmitter stays in the same link and the system enters State 1 with probability ฮดฮฝ . Similarly, in State (2n + 1), either the transmitter changes the link and the system enters State (2n + 2) with probability 1 โˆ’ ฮดr , or the transmitter stays in the same link and the system enters State (n + 2) with probability ฮดr . Finally, the system moves from State (n + 1) to State (n + 2) and from State (2n + 2) to State 1 with probability 1 because at the end of one handover phase, the transmitter starts data transmission. As seen in (18), if |hl |2 > ฮบ, the transmitter sends the data over the RF link. Otherwise, it sends the data over the VLC link. Therefore, for this specific case, we have ฮดr = Pr{|hl |2 > ฮบ} = ฮด and ฮดv = 1 โˆ’ ฮด. Then, we can express ๏ฃฑ ๏ฃด ๏ฃด 1, ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด 1, ๏ฃด ๏ฃด ๏ฃฒ ฮ“ = [pji ], where pji = ฮด, ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด 1 โˆ’ ฮด, ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃณ0, the (2n + 2) ร— (2n + 2) transition matrix as for j = i + 1 and 1 โ‰ค i โ‰ค n โˆ’ 1 or n + 2 โ‰ค i โ‰ค 2n, for (i, j) = (n + 1, n + 2) or (i, j) = (2n + 2, 1), for (i, j) = (n, n + 1) or (i, j) = (2n + 1, n + 2), for (i, j) = (n, 1) or (i, j) = (2n + 1, 2n + 2), otherwise, (29) where pji is the state transition probability from State i to State j. Then, we can re-characterize the log-moment generating function of the hybrid system for any ฮธ > 0, which is provided in (19), as follows [41, Chap. 7, Example 7.2.7]: ฮ›rv (ฮธ) = loge sp(ฮฆ(ฮธ)ฮ“), (30) where sp(ฮฆ(ฮธ)ฮ“) is the spectral radius of the matrix ฮฆ(ฮธ)ฮ“, and ฮฆ(ฮธ) is a diagonal matrix whose components are the moment generating functions of the processes in 2n+2 states. Notice that the transmitted bits are removed from the transmitter buffer only at the ends of the nth and (2n + 1)th frames. Therefore, the moment generating functions are eฮธV and E|h|2 >ฮบ {eฮธRl } in the nth and (2n + 1)th frames, respectively. However, there are no bits removed in the other states, i.e., the service rates in the other states are effectively zero. Hence, the moment generating functions are 1 16 Fig. 3. State transition model of the hybrid scenario with handover. in other states. Moreover, the unique QoS exponent, ฮธ? , is obtained when ฮ›a (ฮธ? ) = โˆ’nฮ›rv (โˆ’ฮธ? ). C. Non-asymptotic Bounds The aforementioned results provide the performance analysis in the steady-state. Particularly, the analysis is obtained when the number of time frames is very large. On the other hand, nonasymptotic bounds regarding the statistical queueing and delay characterizations at the transmitter buffer are of interest for system designers as well. Therefore, we address the framework of Network Calculus [39], [42], [43], and consider [44, Theorem 2], which states that a minimal bound on the queue length can be found for a given buffer overflow probability. Particularly, given the RF-based data service process in Section II-A and the two-state Markov modeled data arrival process in Section II-C, the buffer threshold, q, is expressed as q = inf {qr + qa }, (31) c>0 for a given buffer overflow probability, Pr{Q โ‰ฅ q} = ฮต, where     1 ฮ›r (โˆ’ฮธ) loge {โˆ’ฮตr [ฮ›r (โˆ’ฮธ) + ฮธc]} for max 0, โˆ’ โˆ’ < ฮธ, qr = โˆ’ sup ฮธ cฮตr c ฮธ (32) and  qa = โˆ’ sup ฮธ loge {ฮตa [ฮธc โˆ’ supt>0 {ฮ›a (ฮธ, t)}]} ฮธ  for 0 < ฮธ < 1 supt>0 {ฮ›a (ฮธ, t)} + , (33) cฮตa c with ๏ฃฑ ๏ฃซ๏ฃฎ ๏ฃน๏ฃฎ ๏ฃน๏ฃถ(tโˆ’1) ๏ฃฎ ๏ฃน ๏ฃฎ ๏ฃน๏ฃผ ๏ฃด ๏ฃด ๏ฃฒ eฮธฮป 0 1 โˆ’ ฮฑ ฮฑ eฮธฮป 0 1 ๏ฃฝ 1 ๏ฃญ ๏ฃฐ ๏ฃป ๏ฃฐ ๏ฃป ๏ฃธ ๏ฃฐ ๏ฃป ๏ฃฐ ๏ฃป . ฮ›a (ฮธ, t) = loge [pON pOFF ] ๏ฃด t ๏ฃณ ๏ฃพ 0 1 ฮฒ 1โˆ’ฮฒ 0 1 1 ๏ฃด (34) Above, the buffer violation probability is ฮต = ฮตr + ฮตa , and ฮธ and c are free parameters. Notice also that the log-moment generating function in (32), i.e., ฮ›r (โˆ’ฮธ), is time-invariant because the service process is memory-less, whereas the log-moment generating function in (33), i.e., 17 ฮ›a (ฮธ, t), is time-variant because the arrival process depends on its current state. Moreover, we remark that when t goes to infinity, we have limtโ†’โˆž ฮ›a (ฮธ, t) = ฮ›a (ฮธ), where ฮ›a (ฮธ) is expressed in (10). Herein, we refer to [44] for further calculation details in (32) and (33). Likewise, when the VLC-based data service process in Section II-B is employed, we have q = inf {qv + qa }, (35) c>0 and qv = โˆ’ sup ฮธ loge {โˆ’ฮตr [ฮ›v (โˆ’ฮธ) + ฮธc]} loge {โˆ’ฮตr [โˆ’ฮธV + ฮธc]} = โˆ’ sup . ฮธ ฮธ ฮธ (36) Notice that q in (35) is minimized when c = V . Moreover, because qv cannot be smaller than zero, we have q = qa and c = V . Therefore, when the VLC-based service channel is chosen as the service process, we have  q = qa = โˆ’ sup ฮธ loge {ฮตa [ฮธV โˆ’ supt>0 {ฮ›a (ฮธ, t)}]} ฮธ  and ฮต = ฮตa . (37) Now, assuming a fast and stable handover mechanism between the transmitter and the receiver, and a service channel selection process as described in Hybrid-Type I Transmission Strategy, we can characterize the delay bound as follows: q = inf c>0 {qa + qrv } where     loge {โˆ’ฮตr [ฮ›rv (โˆ’ฮธ) + ฮธc]} 1 ฮ›rv (โˆ’ฮธ) qrv = โˆ’ sup for max 0, โˆ’ โˆ’ < ฮธ, ฮธ cฮตr c ฮธ (38) and ฮ›rv (ฮธ) is given in (19). Remark 3: Let us assume a first-come first-served protocol exists at the transmitter buffer. Then, the minimal bound on the buffering delay is expressed as follows [44, Theorem 1]:       qr + qa qv + qa qrv + qa , or d = inf , or d = inf , (39) d = inf c>0 c>0 c>0 c c c when the RF-based service process, or the VLC-based service process, or Hybrid-Type I Transmission Strategy is employed. Remark 4: We consider a user-related performance measure, i.e., the maximum average data arrival rate at the data buffer, and formulate the link selection by employing the transmission rates provided by the RF and VLC links. Our analytical framework can easily be extended to a more general multi-user scenario by regarding the rate allocations for each user in the transmission links and the receiver-oriented data arrival processes at the transmitter buffer. In this regard, we refer to Fig. 7 in Section IV, where we employ frequency-division multiple access (FDMA) and time-division multiple access (TDMA) protocols for numerical illustrations. Moreover, our 18 Fig. 4. The VLC channel model. paper is different than [13], [27], [40], [45]. The system sum throughput is maximized in [13], [27], and the system average power consumption is minimized in [40], [45]. In these studies, a framework in which a joint resource allocation and link assignment process is employed is not provided, and the optimization problems are in principle mixed integer and non-linear programming problems, which are mathematically intractable. Therefore, the main optimization problems are decomposed into solvable sub-problems, and iterative algorithms are provided. Remark 5: The link selection process can easily be adopted into scenarios where the receiver is mobile. All that one needs is to consider the log-moment generating function in the VLC link  for changing transmission rates, i.e., ฮ›v (ฮธ) = loge Ev {eฮธVl } , and base the channel selection process on the link that increases the maximum average data arrival rate at the transmitter buffer. In Hybrid-Type I Transmission Strategy and Hybrid-Type II Transmission Strategy, because the channel fading gains in the RF and VLC links are instantaneously known at the transmitter in each time frame, the aforementioned analysis will not be different than what we currently have in the paper even if the transmission rates vary due to mobility. We also note that the user mobility is normally low in indoor scenarios. In this regard, we refer to [46]. IV. N UMERICAL R ESULTS In this section, we present numerical results that substantiate our theoretical findings. Unless otherwise specified, we set the transmission time frame to 0.1 milliseconds, i.e., T = 10โˆ’4 . We assume that the LED at the VLC access point of the transmitter has a Lambertian radiation pattern, and that the transmitter and receiver planes are parallel to each other. We further assume that the transmitter is directed downwards, while the receiver is directed upwards, as depicted in Fig. 4. However, our theoretical results can easily be adopted into different positional settings. 19 TABLE I S IMULATION PARAMETERS VLC System โ—ฆ LED half intensity viewing angle, ฯ†1/2 {30 , 45โ—ฆ , 60โ—ฆ } PD field of view (FOV), ฯˆC 90โ—ฆ PD physical area, A 1 cm2 Channel bandwidth, Bv 10 MHz PD opt.-to-elect. conversion efficiency, โ„ฆ 0.53 A/W PD optical concentrator gain, u(ฯˆ) 2.5 m Vertical distance, dv Noise power spectral density, Nv 1 โˆ’21 10 A2 / Hz RF System Channel bandwidth, Br 10 MHz Path loss exponent, q 1.8 Rician factor, K 10 dB Log-normal standard deviation, ฯƒ 3.6 dB Ambient Temperature, Tt โ—ฆ 280 K Herein, the line-of-sight channel gain, i.e., g, is given as follows [47]: (s + 1)Au(ฯˆ)ds+1 v g= rect(ฯˆ/ฯˆC ), s+3 2ฯ€d1 (40) where A is the surface area of the photo-diode, d1 is the distance between the LED at the transmitter and the photo-diode at the receiver, and dv is the normal distance between the transmitting and receiving planes. Moreover, u(ฯˆ) is the optical concentrator gain at the photodiode, ฯˆ is the angle of incidence, and ฯˆC is the field of view, i.e., the maximum angle at which the light emitted by the LED is detected by the photo-diode. In addition, s = โˆ’1 log2 (cos(ฯ†1/2 )) is the Lambertian index, where ฯ†1/2 is the LED half intensity viewing angle, and rect(x) = 1 if |x| โ‰ค 1 and rect(x) = 0 otherwise. Finally, the thermal noise power at the photo-diode is ฯƒv2 = Nv Bv , where Nv is the noise power spectral density. Regarding the RF channel, we consider a Rician fading distribution with the Rician factor, K, where the channel realizations, {hl }, are independent and identically distributed, circularly q โˆ’L(d0 )/10 K symmetric complex Gaussian random variables with mean ยต = e K+1 and variance ฯƒh2 = eโˆ’L(d0 )/10 . K+1 Setting K to a reasonable value, we can reflect the channel characteristics in millimeter wave range communications as well [2]. Here, L(d0 ) is the large-scale path loss in decibels as a function of the distance between the RF access point at the transmitter and the RF front-end at the receiver, d0 , and it is given by [48]  L(d0 ) = L(dref ) + 10q loge d0 dref  + Xฯƒ , (41) where L(dref ) = 40 dB is the path loss at a reference distance, dref = 1 m, and an operating frequency of 2.4 GHz. In addition, q is the path loss exponent and Xฯƒ represents the shadowing 20 (a) ฮธ = 0.01 (b) ฮธ = 0.1 Fig. 5. Maximum average arrival rates of VLC and RF links as a function of the average power limit, Pavg , for different values of the average-to-peak power ratio ฮฝ and the QoS exponent, ฮธ. Here, d0 = 15 m, d1 = 3 m, ฯ†1/2 = 60โ—ฆ , ฮฑ = 0.3, and ฮฒ = 0.7. {bpf : bits per frame}. effect, which is assumed to be a zero-mean Gaussian random variable with a standard deviation ฯƒ expressed in decibels6 . Finally, the thermal noise power at the RF front-end of the receiver is ฯƒr2 = ฮบB Tt Br , where ฮบB is the Boltzmann constant and Tt is the ambient temperature [14]. Table I summarizes the simulation parameters, unless otherwise stated. Finally, setting the average transmission power constraint to Pavg in all the transmission strategies, we define ฮฝ as the average-to-peak power ratio in the RF and VLC links, i.e., ฮฝ = Pavg Ppeak,r = Pavg . Ppeak,v A. Transmission Strategies We consider the scenario in which a transmitter has a VLC access point and an RF access point, as shown in Fig. 1. The receiver is located at a distance d1 = 3 m from the VLC access point, i.e., the user is located at a horizontal distance dh โ‰ˆ 1.6 m from the cell center, where ฯ†1/2 = 60โ—ฆ and dv = 2.5 m, and at a distance d0 = 15 m from the RF access point. In Fig. 5, we plot the maximum average data arrival rates at the transmitter buffer, ฯv (ฮธ) and ฯr (ฮธ), as functions of the average power constraint, Pavg , with different average-to-peak power ratios, i.e, ฮฝ โˆˆ {0.1, 0.3, 0.7, 1}, when the VLC and RF links are employed, respectively. We have the results for ฮธ = 0.01 in Fig. 5(a) and for ฮธ = 0.1 in Fig. 5(b). We observe that the maximum average data arrival rates increase faster with the increasing average power constraint in the VLC 6 Empirical values of K, q, and ฯƒ 2 in different indoor scenarios were provided in [48]โ€“[50]. For instance, the value of q ranges from 1.2 to 1.7, while ฯƒ varies between 3.6 dB and 4.0 dB inside buildings [48]. 21 (a) Pavg = 24 dBm (b) Pavg = 30 dBm Fig. 6. Maximum average arrival rates of VLC and RF links as a function of the QoS exponent, ฮธ, for different values of the average power limit Pavg and the source statistics, ฮฑ and ฮฒ. Here, d0 = 15 m, d1 = 3 m, ฮฑ = 0.3, ฯ†1/2 = 60โ—ฆ , and ฮฝ = 0.7. {bpf : bits per frame}. link than they do in the RF link. For instance, when ฮฝ = 0.3 and ฮธ = 0.01, the maximum average data arrival rate increases more than 145 bits per frame with Pavg increasing from 27 dBm to 28 dBm in the VLC link, whereas it increases 2 bits per frame in the RF link. We observe the same behavior when the peak power constraint increases. We can explain this result with the stochastic nature of the transmission rates in the RF channel. Particularly, when the instantaneous transmission rate in the RF channel becomes very low, more data packets are accumulated in the transmitter buffer. Therefore, in order to sustain the QoS constraints, the transmitter buffer should accept data at lower arrival rates. On the other hand, because the transmission rate in the VLC channel is constant, the maximum average data arrival rate increases almost linearly with the increasing transmission rate in the VLC channel. Moreover, the performance in the RF link is better than the VLC link when the average power constraint is lower, and the performance in the VLC link is better than the RF link when the average power constraint is higher. In Fig. 6, we plot ฯr (ฮธ) and ฯv (ฮธ) as functions of the QoS exponent, ฮธ, for different values of ฮฑ and ฮฒ when ฮฝ = 0.7. We have Pavg = 24 dBm in Fig. 6(a) and Pavg = 30 dBm in Fig. 6(b). The performance in the RF link is better than the VLC link when ฮธ is low, whereas the performance in the RF link decreases faster with increasing ฮธ and becomes less than the performance in the VLC link. In other words, the stochastic nature of the RF channel prevents the RF link from supporting data arrival rates at the transmitter buffer when the QoS constraints are stringent. Indeed, the maximum average data arrival rate that the RF link supports approaches zero exponentially with increasing ฮธ regardless of the average power constraint and the source statistics, i.e., ฮฑ and ฮฒ. However, the RF link can support higher data arrival rates if the QoS 22 (a) FDMA (i.e., power and bandwidth) (b) TDMA (i.e., time) Fig. 7. Per-user maximum average arrival rates of VLC and RF links as a function of the number of served receivers (or equivalently the receiver allocated resources) and for different values of the LED viewing angle, ฯ†1/2 . Here, ฮฑ = 0.3, ฮฒ = 0.7, ฮฝ = 1, and Pavg = 24 dBm. {bpf : bits per frame}. constraints are looser. We further observe that increasing ฮฒ (or decreasing ฮฑ), results in better performance values in the VLC and RF links because the steady-state probability of the ON state, i.e., PON = ฮฒ , ฮฑ+ฮฒ and the average arrival rate at the transmitter buffer increase. However, the effect of the source statistics on the performance values is much less than that of the QoS constraints, especially in the RF link. In other words, the randomness in the service process has a higher impact on the system performance than the randomness in the arrival process has. In typical indoor scenarios, VLC and RF access points serve multiple receivers. This is applied by sharing available resources (i.e., power, time, and bandwidth) among the served receivers. Herein, we assume that the transmitter employs the commonly known FDMA and TDMA schemes in both links. In Fig. 7, we plot the maximum average data arrival rate per user given that all the users are uniformly positioned within the coverage area of the VLC access point. We observe that the performance per user in the RF link is generally much higher than the performance per user in the VLC link when the number of receivers is above 4. Basically, the system can serve more users in the RF link than the VLC link when the QoS constraints are of interest. In addition, the results in Fig. 7 agree with the results in Fig. 5, where the performance of the VLC link is highly affected by the decreasing average power constraint. We finally see that with the decreasing LED viewing angle, the performance in the VLC link becomes better because the transmission power is concentrated in smaller areas. Notice also that the VLC channel gain is affected by ฯ†1/2 through the Lambertian index. Herein, we show the performance sensitivity of the RF and VLC links to the allocated transmission resources such as power, time, and bandwidth, given that the available resources are equally shared among the 23 users. We also show that our framework can easily be invoked in a multi-user scenario. We further explore the system performance with respect to the receiver location. We set (xv , yv , zv ) = (0, 0, 0) as the Cartesian coordinates of the VLC access point, (xr , yr , zr ) = (10, 0, 0) as the coordinates of the RF access point, and (xu , yu , zu ) as the coordinates of the receiver, where zu = โˆ’dv . Particularly, we consider the following strategies: 1) RF-only Strategy: The transmitter sends data over the RF link only, and the maximum average arrival rate, ฯr (ฮธ), is expressed in (12). 2) VLC-only Strategy: The transmitter sends data over the VLC link only, and the maximum average arrival rate, ฯv (ฮธ), is expressed in (13). 3) Hybrid-type I Transmission Strategy: The transmitter sends data over the link that provides the highest transmission rate, and the maximum average arrival rate, ฯrv (ฮธ), is expressed in (20). 4) Hybrid-type II Transmission Strategy: The transmitter sends data over both links simultaneously following a power allocation policy to maximize the transmission rate, and the maximum rate, ฯsrv (ฮธ), is expressed in (25). In Fig. 8, we plot the maximum average arrival rate as a function of the xu and yu coordinates of the receiver location for different QoS constraints, where xu โˆˆ [โˆ’5, 5] and yu โˆˆ [โˆ’5, 5]. As seen in Fig. 8(a) and Fig. 8(e), the position of the receiver does not impact the performance levels in the RF link necessarily, i.e., the performance level stays almost constant when the receiver stays in the defined range. However, the performance levels in the other strategies are affected by the position of the receiver, and the maximum average data arrival rate increases as the receiver gets closer to the point (xv , yv , zv ) = (0, 0, โˆ’dv ) because the constant transmission rate from the VLC access point to the receiver increases and the stochastic nature of the RF link is mitigated more with the increasing rate in the VLC link. As seen in Fig. 8(b) and Fig. 8(f), the maximum average data arrival rate goes to zero in VLC-only Strategy as the receiver goes out of the coverage area of the VLC access point. Similarly, as seen in Fig. 8(c), Fig. 8(d), Fig. 8(g) and Fig. 8(h), the maximum average data arrival rate becomes equal to the one in RF-only Strategy as the receiver goes out of the the coverage area of the VLC access point. Furthermore, Hybrid-type I Transmission Strategy provides higher performance levels than RF-only Strategy and VLConly Strategy do because the transmitter, employing Hybrid-type I Transmission Strategy, sends the data over the RF link when the instantaneous transmission rate in the RF link is higher than the rate in the VLC link, and mitigates the lower transmission rates in the RF link by 24 (a) RF-only,, ฮธ = 0.01 (b) VLC-only, ฮธ = 0.01 (c) Hybrid-type I, ฮธ = 0.01 (d) Hybrid-type II, ฮธ = 0.01 (e) RF-only,, ฮธ = 0.1 (f) VLC-only, ฮธ = 0.1 (g) Hybrid-type I, ฮธ = 0.1 (h) Hybrid-type II, ฮธ = 0.1 Fig. 8. Maximum average arrival rates for different selection strategies as a function of the receiver position in terms of xu and yu and for different values of ฮธ. Here, Pavg = 24 dBm, ฮฝ = 0.7, ฮฑ = 0.3, ฮฒ = 0.7 and ฯ†1/2 = 60โ—ฆ . {bpf : bits per frame}. 25 (a) (xu , yu , zu ) = (0, 0, โˆ’dv ) i.e., cell center (b) (xu , yu , zu ) = (dc , 0, โˆ’dv ) i.e., cell edge Fig. 9. Maximum average arrival rate as a function of n and for different values of the QoS exponent ฮธ and user position in terms of xu . Here, ฯ†1/2 = 60โ—ฆ , ฮฑ = 0.3, ฮฒ = 0.7, Pavg = 24 dBm, and ฮฝ = 1. sending the data in the VLC link. Finally, Hybrid-type II Transmission Strategy outperforms all the other strategies. However, the performance gap between Hybrid-type I Transmission Strategy and Hybrid-type II Transmission Strategy is not necessarily large. Hence, it is more advantageous to employ Hybrid-type I Transmission Strategy in order to avoid the hardware complexity that follows the addition of multihoming capability in Hybrid-type II Transmission Strategy. In Fig. 9, assuming that the handover process causes a transmission delay, where the handover process takes TH = n1 T seconds for n โˆˆ N and n > 1, we plot the maximum average data arrival rate in Hybrid-type I Transmission Strategy, ฯrv (ฮธ), as a function of n considering different user locations. Noting that smaller n means a longer handover period, we observe that the transmission performance is highly affected by the handover process. With increasing n, the performance levels approach the values that are obtained when there is no handover delay. Moreover, the maximum average data arrival rates are higher in Fig. 9(a) than in Fig. 9(b), because the constant transmission rate in the VLC link is higher when the user is at the center. Subsequently in Fig. 10, we plot the maximum average data arrival rates as functions of the vertical distance between the VLC access point and the receiver. We set the position of the receiver to (xu , yu , zu ) = (0.8, 0, โˆ’dv ), i.e., the horizontal distance to the VLC cell center is dh = 0.8 m. When dv โ‰ค 0.6 m, the performance level in the VLC link is zero because the cell area is very small and does not cover the point where the user stands, i.e., dc = dv tan(ฮธ1/2 ) < dh = 0.8 m, and dc is the cell radius. The performance levels in all strategies except RF-only Strategy increase up to a value, and then decrease with increasing dv . This is because the increase in the LED viewing angle is relatively less than the increase in dv at the beginning. Therefore, 26 (a) Pavg = 24 dBm (b) Pavg = 30 dBm Fig. 10. Maximum average arrival rate of different transmission strategies as a function of the vertical distance and for different average power limit Pavg . Here, ฯ†1/2 = 60โ—ฆ , (xu , yu , zu ) = (0.8, 0, โˆ’dv ), ฮฑ = 0.3, ฮฒ = 0.7, ฮธ = 0.1, and ฮฝ = 1. {bpf : bits per frame}. the user is effectively getting closer to the cell center and having more rate in the VLC link. In other words, the gain achieved by getting closer to the cell center is higher than the expected degradation due to the increasing cell radius. However, with dv increasing beyond a certain value, the user gets far away from the VLC access point, and hence, the radiated power spreads over more area, which eventually leads to decreased transmission rates in the VLC link. Therefore, the gain in the VLC link vanishes as the distance to the VLC access point becomes larger. B. Non-asymptotic Delay Bounds In the aforementioned results, we analyze the system performance in the steady-state. In the following, we provide results regarding the non-asymptotic bounds, i.e., the bounds on the buffering delay experienced by the data in the transmitter buffer. Particularly, we plot the delay bound as a function of the state transition probability from the OFF state to the ON state in the data arrival process, ฮฒ, for different ฮฑ values, where ฮฑ is the state transition probability from the ON state to the OFF state in the data arrival process. We set the average data arrival rate, ฮปpON , to a value very close to the average data service (transmission) rate in the transmission channel. We note that the average data service rate in the transmission channel depends on the chosen transmission strategy. The delay bound is the highest in RF-only Strategy as seen in Fig. 11(a), whereas it is the lowest in VLC-only Strategy as seen in Fig. 11(b). However, the arrival rate that RF-only Strategy supports is higher than the rate that VLC-only Strategy supports. More interestingly, the hybrid strategies can support higher arrival rates with less delay bounds, and Hybrid-type II Transmission Strategy outperforms all the others. Herein, the system takes 27 (a) RF-only Transmission, ฮป = 21 kbpf (b) VLC-only Transmission, ฮป = 7 kbpf (c) Hybrid-Type I Transmission, ฮป = 24 kbpf (d) Hybrid-Type II Transmission, ฮป = 26 kbpf Fig. 11. Delay Bounds for different transmission strategies as a function of the transition probability ฮฒ and for different values of ฮฑ. Here, d0 = 10 m, d1 = 3 m, Pavg = 30 dBm, ฮฝ = 0.7, and ฯ†1/2 = 60โ—ฆ . {bpf : bits per frame} advantage of the occasional higher rates in the RF links, and mitigates the lower rates in the RF link by the constant transmission rate in the VLC link. Moreover, increasing ฮฒ and decreasing ฮฑ cause the delay bound to increase. Finally, we explore the effects of the data arrival rate, ฮป, on the delay bound performance in Fig. 12. We set ฮฑ = 0.3 and ฮฒ = 0.7, and consider different average power constraints, i.e., Pavg = 24, 30, and 35 dBm. The delay bounds increase asymptotically as the average arrival rate approaches the average data service rates in the channels, because when the average data arrival rate is greater than the average data service rate in one channel, the system becomes unstable, and long buffering periods are expected. Moreover, as seen in Fig. 12(b), the delay bounds are the minimum in VLC-only Strategy but the ranges of the average data arrival rates are smaller than the other strategies, and as seen in Fig. 12(a), the delay bounds are the maximum in RF-only Strategy. However, the hybrid strategies again outperform the others i.e., the hybrid strategies take advantage of the VLC link when the rate in the RF link goes down drastically, and utilize the RF link when the channel conditions are better again. While the VLC link provides stability 28 (a) RF-only Transmission (b) VLC-only Transmission (c) Hybrid-Type I transmission (d) Hybrid-Type II transmission Fig. 12. Delay Bounds for different transmission strategies as a function of the arrival rate ฮป and for different values of Pavg . Here, ฮฑ = 0.3, ฮฒ = 0.7, d0 = 10 m, d1 = 3 m, ฮฝ = 0.7, and ฯ†1/2 = 60โ—ฆ . and decreases the delay bounds, the RF link increases the range of average data arrival rate that can be supported. Finally, in Fig. 12 we see that increasing the average power can potentially improve the system performance in terms of the buffering delay. V. C ONCLUSIONS In this paper, we have analyzed the performance of a hybrid RF/VLC system when statistical QoS constraints are inflicted as limits on the buffer overflow and delay violation probabilities. We have provided a cross-layer analysis regarding physical and data-link layers by employing the maximum average arrival rate at the transmitter buffer and the non-asymptotic delay bounds as the main performance measures. We have proposed and analyzed three strategies in which RF and VLC links are utilized for data transmission. We have further formulated the performance levels achieved by each of the proposed strategies. Through numerical results, we have shown that RF technology can be beneficial when there are lower average power constraints and/or looser QoS requirements. Moreover, we have shown that utilizing the VLC technology for data 29 transmission, either alone or in a hybrid transmission strategy, can potentially enhance the system performance in terms of delay performance. It lowers the buffering delay bounds, when compared to the RF technology. Particularly, when data arrival rates at the transmitter buffer is low, VLC links provide lower queueing delays than RF links do, but RF links support higher data arrival rates at the transmitter buffer. A PPENDIX A. Derivation of ฯr (ฮธ) in (12) Recall that ฮป is the data arrival rate at the buffer when the data source is in the ON state, and that pON = ฮฒ ฮฑ+ฮฒ is the steady-state probability of the ON state. Thus, the average data arrival ฮฒ ฮป. Moreover, we have ฮ›a (ฮธr? ) = โˆ’ฮ›r (โˆ’ฮธr? ) in steady-state, i.e., rate is ฮปpON = ฮฑ+ฮฒ q ๏ฃฑ ๏ฃผ ๏ฃฒ 1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)eฮธr? ฮป + [1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)eฮธr? ฮป ]2 โˆ’ 4(1 โˆ’ ฮฑ โˆ’ ฮฒ)eฮธr? ฮป ๏ฃฝ  ? loge = โˆ’ loge Eh eโˆ’ฮธr Rl . ๏ฃณ ๏ฃพ 2 (42) Solving the aforementioned equation for ฮป with any given ฮธ > 0, we obtain ( )  1 โˆ’ (1 โˆ’ ฮฒ)Eh eโˆ’ฮธRl 1 . ฮป = loge ฮธ (1 โˆ’ ฮฑ)Eh {eโˆ’ฮธRl } โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ)E2h {eโˆ’ฮธRl } As a result, we formulate the maximum average data arrival rate as ฯr (ฮธ) = ฮฒ ฮป ฮฑ+ฮฒ (43) for any ฮธ > 0. As for ฯv (ฮธ), we set ฮ›a (ฮธv? ) = โˆ’ฮ›v (โˆ’ฮธv? ) and follow the same steps. B. Proof of Proposition 1 Based on the link selection process, the VLC link is selected only when ฯv (ฮธ) > ฯr (ฮธ), where ฯv (ฮธ) is the maximum average arrival rate supported by the VLC link given in (13) and ฯr (ฮธ) is the maximum average arrival rate supported by the RF link given in (12). Since logarithm is a monotonic increasing function, this condition is satisfied when we have  1 โˆ’ (1 โˆ’ ฮฒ)Eh eโˆ’ฮธRl e2ฮธV โˆ’ (1 โˆ’ ฮฒ)eฮธV > , (1 โˆ’ ฮฑ)eฮธV โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ) (1 โˆ’ ฮฑ)Eh {eโˆ’ฮธRl } โˆ’ (1 โˆ’ ฮฑ โˆ’ ฮฒ)E2h {eโˆ’ฮธRl } (44) Now, let ฯ‡ = Eh {eโˆ’ฮธRl } and O = eฮธV . Then, (44) can be expressed by the following quadratic inequality: O2 โˆ’ (1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)ฮพ)O + ฮพ(1 โˆ’ ฮฑ โˆ’ ฮฒ) > 0. (45) 30 where ฮพ = 1โˆ’(1โˆ’ฮฒ)ฯ‡ . (1โˆ’ฮฑ)ฯ‡โˆ’(1โˆ’ฮฑโˆ’ฮฒ)ฯ‡2 O1 = and O2 = Solving the above equation results in two solutions: q 1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)ฮพ โˆ’ [1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)ฮพ]2 โˆ’ 4(1 โˆ’ ฮฑ โˆ’ ฮฒ)ฮพ (46) 2 q 1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)ฮพ + [1 โˆ’ ฮฒ + (1 โˆ’ ฮฑ)ฮพ]2 โˆ’ 4(1 โˆ’ ฮฑ โˆ’ ฮฒ)ฮพ (47) 2 where O2 > O1 . V has two ranges 0 < V < loge {O1 } and V โ‰ฅ loge {O2 }. Setting O = 1 in (45), we have ฮฒ(1 โˆ’ ฮพ) > 0. Note that ฮพ > 1 because ฯr (ฮธ) = ฮฒ (ฮฑ+ฮฒ)ฮธ loge {ฮพ} > 0. Hence, we have ฮฒ(1 โˆ’ ฮพ) < 0, which implies that O1 < 1 and loge {O1 } < 0. Therefore, we have only V โ‰ฅ loge {O2 } as the solution region, which completes the proof. R EFERENCES [1] M. B. Rahaim, A. M. Vegni, and T. D. Little, โ€œA hybrid radio frequency and broadcast visible light communication system,โ€ in Proc. IEEE Global Telecommun. (GLOBECOM) Workshops, 2011, pp. 792โ€“796. [2] D. A. Basnayaka and H. Haas, โ€œDesign and analysis of a hybrid radio frequency and visible light communication system,โ€ IEEE Trans. Commun., 2017. [3] H. Chowdhury and M. Katz, โ€œCooperative data download on the move in indoor hybrid (radio-optical) WLAN-VLC hotspot coverage,โ€ Trans. on Emerging Telecommun. Technol., vol. 25, no. 6, pp. 666โ€“677, 2014. [4] D. A. Basnayaka and H. Haas, โ€œHybrid RF and VLC systems: Improving user data rate performance of VLC systems,โ€ in Proc. IEEE Veh. Technol. Conf. Spring (VTC-Spring), 2015, pp. 1โ€“5. [5] X. Bao, X. Zhu, T. Song, and Y. Ou, โ€œProtocol design and capacity analysis in hybrid network of visible light communication and OFDMA systems,โ€ IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1770โ€“1778, 2014. [6] S. Shao, A. Khreishah, M. B. Rahaim, H. Elgala, M. Ayyash, T. D. Little, and J. Wu, โ€œAn indoor hybrid WiFi-VLC internet access system,โ€ in Proc. IEEE Int. Conf. on Mobile Ad Hoc and Sensor Sys., 2014, pp. 569โ€“574. [7] M. Kashef, M. Ismail, M. Abdallah, K. A. Qaraqe, and E. Serpedin, โ€œEnergy efficient resource allocation for mixed RF/VLC heterogeneous wireless networks,โ€ IEEE J. Sel. Areas Commun, vol. 34, no. 4, pp. 883โ€“893, 2016. [8] A. M. Vegni and T. D. Little, โ€œHandover in VLC systems with cooperating mobile devices,โ€ in Proc. Int. Conf. Computing, Netw. Commun. (ICNC), 2012, pp. 126โ€“130. [9] F. Wang, Z. Wang, C. Qian, L. Dai, and Z. Yang, โ€œEfficient vertical handover scheme for heterogeneous VLC-RF systems,โ€ J. Opt. Commun. and Netw., vol. 7, no. 12, pp. 1172โ€“1180, 2015. [10] S. Liang, H. Tian, B. Fan, and R. Bai, โ€œA novel vertical handover algorithm in a hybrid visible light communication and LTE system,โ€ in Proc. IEEE Veh. Technol. Conf. Fall (VTC-FALL), 2015, pp. 1โ€“5. [11] S. Shao and A. Khreishah, โ€œDelay analysis of unsaturated heterogeneous omnidirectional-directional small cell wireless networks: The case of RF-VLC coexistence,โ€ IEEE Trans. on Wireless Commun., vol. 15, no. 12, pp. 8406โ€“8421, 2016. [12] X. Li, R. Zhang, and L. Hanzo, โ€œCooperative load balancing in hybrid visible light communications and WiFi,โ€ IEEE Trans. Commun., vol. 63, no. 4, pp. 1319โ€“1329, 2015. [13] Y. Wang and H. Haas, โ€œDynamic load balancing with handover in hybrid Li-Fi and Wi-Fi networks,โ€ IEEE J. of Lightwave Tech., vol. 33, no. 22, pp. 4671โ€“4682, 2015. 31 [14] I. Stefan, H. Burchardt, and H. Haas, โ€œArea spectral efficiency performance comparison between VLC and RF femtocell networks,โ€ in Proc. IEEE Int. Conf. Commun. (ICC), 2013, pp. 3825โ€“3829. [15] Y. Wang, D. A. Basnayaka, X. Wu, and H. Haas, โ€œOptimization of load balancing in hybrid LiFi/RF networks,โ€ IEEE Trans. Commun., vol. 65, no. 4, pp. 1708โ€“1720, 2017. [16] H. Kazemi, M. Uysal, and F. Touati, โ€œOutage analysis of hybrid FSO/RF systems based on finite-state markov chain modeling,โ€ in Proc. IEEE Int. Workshop Opt. Wireless Commun. (IWOW), 2014, pp. 11โ€“15. [17] N. D. Chatzidiamantis, G. K. Karagiannidis, E. E. Kriezis, and M. Matthaiou, โ€œDiversity combining in hybrid RF/FSO systems with PSK modulation,โ€ in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1โ€“6. [18] โ€œCisco visual networking index: Global mobile data traffic forecast update 20142019 white paper,โ€ http://www.cisco.com/ c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white paper c11-520862.html. [19] C.-S. Chang, โ€œStability, queue length, and delay of deterministic and stochastic queueing networks,โ€ IEEE Trans. Autom. Control, vol. 39, no. 5, pp. 913โ€“931, 1994. [20] D. Wu and R. Negi, โ€œEffective capacity: a wireless link model for support of quality of service,โ€ IEEE Trans. Wireless Commun., vol. 2, no. 4, pp. 630โ€“643, 2003. [21] G. L. Choudhury, D. M. Lucantoni, and W. Whitt, โ€œSqueezing the most out of ATM,โ€ IEEE Trans. Commun., vol. 44, no. 2, pp. 203โ€“217, 1996. [22] F. Kelly, โ€œNotes on e ective bandwidths,โ€ Stochastic networks: theory and applications, pp. 141โ€“168, 1996. [23] S. Akin and M. C. Gursoy, โ€œEffective capacity analysis of cognitive radio channels for quality of service provisioning,โ€ IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3354โ€“3364, 2010. [24] M. Hammouda, S. Akin, and J. Peissig, โ€œEffective capacity in cognitive radio broadcast channels,โ€ in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), 2014, pp. 1071โ€“1077. [25] M. Ozmen and M. C. Gursoy, โ€œWireless throughput and energy efficiency with random arrivals and statistical queuing constraints,โ€ IEEE Trans. Inf. Theory, vol. 62, no. 3, pp. 1375โ€“1395, 2016. [26] F. Jin, X. Li, R. Zhang, C. Dong, and L. Hanzo, โ€œResource allocation under delay-guarantee constraints for visible-light communication,โ€ IEEE Access, vol. 4, pp. 7301โ€“7312, 2016. [27] F. Jin, R. Zhang, and L. Hanzo, โ€œResource allocation under delay-guarantee constraints for heterogeneous visible-light and rf femtocell,โ€ IEEE Transactions on Wireless Communications, vol. 14, no. 2, pp. 1020โ€“1034, 2015. [28] N. Letzepis and A. G. I. Fabregas, โ€œOutage probability of the Gaussian MIMO free-space optical channel with PPM,โ€ IEEE Trans. on Commun., vol. 57, no. 12, 2009. [29] L. H. Ozarow, S. Shamai, and A. D. Wyner, โ€œInformation theoretic considerations for cellular mobile radio,โ€ IEEE trans. Veh. Technol., vol. 43, no. 2, pp. 359โ€“378, 1994. [30] S. Shamai and I. Bar-David, โ€œThe capacity of average and peak-power-limited quadrature Gaussian channels,โ€ IEEE Trans. Inf. Theory, vol. 41, no. 4, pp. 1060โ€“1071, 1995. [31] T. Komine and M. Nakagawa, โ€œFundamental analysis for visible-light communication system using LED lights,โ€ IEEE Trans. on Consumer Electronics, vol. 50, no. 1, pp. 100โ€“107, 2004. [32] J. M. Kahn and J. R. Barry, โ€œWireless infrared communications,โ€ Proceedings of the IEEE, vol. 85, no. 2, pp. 265โ€“298, 1997. [33] V. Pohl, V. Jungnickel, and C. Von Helmolt, โ€œA channel model for wireless infrared communication.โ€ in PIMRC, 2000, pp. 297โ€“303. [34] V. Jungnickel et al., โ€œA European view on the next generation optical wireless communication standard,โ€ in Proc. IEEE Conf. Standards for Commun. and Networking (CSCN), Oct 2015, pp. 106โ€“111. 32 [35] S. Dimitrov and H. Haas, Principles of LED Light Communications: Towards Networked Li-Fi. Cambridge University Press, 2015. [36] A. Lapidoth, S. M. Moser, and M. A. Wigger, โ€œOn the capacity of free-space optical intensity channels,โ€ IEEE Trans. Inf. Theory, vol. 55, no. 10, pp. 4449โ€“4461, 2009. [37] H. Heffes and D. Lucantoni, โ€œA Markov modulated characterization of packetized voice and data traffic and related statistical multiplexer performance,โ€ IEEE J. Sel. Areas Commun., vol. 4, no. 6, pp. 856โ€“868, 1986. [38] C.-S. Chang and T. Zajic, โ€œEffective bandwidths of departure processes from queues with time varying capacities,โ€ in Proc. IEEE INFOCOM, vol. 3, 1995, pp. 1001โ€“1009. [39] C.-S. Chang, Performance Guarantees in Communication Networks. Springer Science & Business Media, 2000. [40] H. Yu, M. H. Cheung, L. Huang, and J. Huang, โ€œPower-delay tradeoff with predictive scheduling in integrated cellular and Wi-Fi networks,โ€ IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 735โ€“742, 2016. [41] C.-S. Chang, Performance guarantees in communication networks. Springer Science & Business Media, 2012. [42] M. Fidler and A. Rizk, โ€œA guide to the stochastic network calculus,โ€ IEEE Commun. Surveys & Tutorials, vol. 17, no. 1, pp. 92โ€“105, 2015. [43] F. Ciucu, A. Burchard, and J. Liebeherr, โ€œScaling properties of statistical end-to-end bounds in the network calculus,โ€ IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2300โ€“2312, 2006. [44] M. Fidler, R. Luฬˆbben, and N. Becker, โ€œCapacityโ€“delayโ€“error boundaries: A composable model of sources and systems,โ€ IEEE Trans. Wireless Commun., vol. 14, no. 3, pp. 1280โ€“1294, 2015. [45] W. Wu, F. Zhou, and Q. Yang, โ€œDynamic network resource optimization in hybrid VLC and radio frequency networks,โ€ in Selected Topics in Mobile and Wireless Networking (MoWNeT), 2017 International Conference on, 2017, pp. 1โ€“7. [46] M. Dehghani Soltani, X. Wu, M. Safari, and H. Haas, โ€œOn limited feedback resource allocation for visible light communication networks,โ€ in Proceedings of the 2nd International Workshop on Visible Light Communications Systems. ACM, 2015, pp. 27โ€“32. [47] J. R. Barry, J. M. Kahn, W. J. Krause, E. Lee, D. G. Messerschmitt et al., โ€œSimulation of multipath impulse response for indoor wireless optical channels,โ€ IEEE J. Sel. Areas Commun., vol. 11, no. 3, pp. 367โ€“379, 1993. [48] R. G. Akl, D. Tummala, and X. Li, Indoor propagation modeling at 2.4 GHz for IEEE 802.11 networks. International Association of Science and Technology for Development, 2006. [49] T. S. Rappaport and C. D. McGillem, โ€œUHF fading in factories,โ€ IEEE J. Sel. Areas Commun., vol. 7, no. 1, pp. 40โ€“48, 1989. [50] A. Neskovic, N. Neskovic, and G. Paunovic, โ€œModern approaches in modeling of mobile radio systems propagation environment.โ€ IEEE Communications Surveys and Tutorials, vol. 3, no. 3, pp. 2โ€“12, 2000.
7cs.IT
Developing Bug-Free Machine Learning Systems With Formal Mathematics Daniel Selsam 1 Percy Liang 1 David L. Dill 1 arXiv:1706.08605v1 [cs.SE] 26 Jun 2017 Abstract Noisy data, non-convex objectives, model misspecification, and numerical instability can all cause undesired behaviors in machine learning systems. As a result, detecting actual implementation errors can be extremely difficult. We demonstrate a methodology in which developers use an interactive proof assistant to both implement their system and to state a formal theorem defining what it means for their system to be correct. The process of proving this theorem interactively in the proof assistant exposes all implementation errors since any error in the program would cause the proof to fail. As a case study, we implement a new system, Certigrad, for optimizing over stochastic computation graphs, and we generate a formal (i.e. machine-checkable) proof that the gradients sampled by the system are unbiased estimates of the true mathematical gradients. We train a variational autoencoder using Certigrad and find the performance comparable to training the same model in TensorFlow. 1. Introduction Machine learning systems are difficult to engineer for many fundamental reasons. First and foremost, implementation errors can be extremely difficult to detectโ€”let alone to localize and addressโ€”since there are many other potential causes of undesired behavior in a machine learning system. For example, an implementation error may lead to incorrect gradients and so cause a learning algorithm to stall, but such a symptom may also be caused by noise in the training data, a poor choice of model, an unfavorable optimization landscape, an inadequate search strategy, or numerical instability. These other issues are so common that it is often assumed that any undesired behavior is caused by one of them. As a result, actual implementation errors can persist 1 Stanford University, Stanford, CA. Correspondence to: Daniel Selsam <[email protected]>. Proceedings of the 34 th International Conference on Machine Learning, Sydney, Australia, PMLR 70, 2017. Copyright 2017 by the author(s). Standard methodology: test it empirically Debug Program Test Our methodology: verify it mathematically Debug Specify Program Prove Figure 1. A high-level comparison of our methodology with the standard methodology for developing machine learning systems. Instead of relying on empirical testing to expose implementation errors, we first formally specify what our system is required to do in terms of the underlying mathematics, and then try to formally prove that our system satisfies its specification. The process of proving exposes implementation errors systematically and the (program โ†’ prove โ†’ debug) loop eventually terminates with a bug-free system and a machine-checkable proof of correctness. indefinitely without detection.1 Errors are even more difficult to detect in stochastic programs, since some errors may only distort the distributions of random variables and may require writing custom statistical tests to detect. Machine learning systems are also difficult to engineer because it can require substantial expertise in mathematics (e.g. linear algebra, statistics, multivariate analysis, measure theory, differential geometry, topology) to even understand what a machine learning algorithm is supposed to do and why it is thought to do it correctly. Even simple algorithms such as gradient descent can have intricate justifications, and there can be a large gap between the mechanics of an implementationโ€”especially a highly-optimized oneโ€”and its intended mathematical semantics. 1 Theano (Bergstra et al., 2010) has been under development for almost a decade and yet there is a recent GitHub issue (https://github.com/Theano/Theano/issues/4770) reporting a model for which the loss continually diverges in the middle of training. Only after various experiments and comparing the behavior to other systems did the team agree that it is most likely an implementation error. As of this writing, neither the cause of this error nor the set of models it affects have been determined. Developing Bug-Free Machine Learning Systems With Formal Mathematics In this paper, we demonstrate a practical methodology for building machine learning systems that addresses these challenges by enabling developers to find and eliminate implementation errors systematically without recourse to empirical testing. Our approach makes use of a tool called an interactive proof assistant (Gordon, 1979; Gordon & Melham, 1993; Harrison, 1996; Nipkow et al., 2002; Owre et al., 1992; Coq Development Team, 2015-2016; de Moura et al., 2015), which consists of (a) a programming language, (b) a language to state mathematical theorems, and (c) a set of tools for constructing formal proofs of such theorems. Note: we use the term formal proof to mean a proof that is in a formal system and so can be checked by a machine. In our approach, developers use the theorem language (b) to state a formal mathematical theorem that defines what it means for their implementation to be error-free in terms of the underlying mathematics (e.g. multivariate analysis). Upon implementing the system using the programming language (a), developers use the proof tools (c) to construct a formal proof of the theorem stating that their implementation is correct. The first draft of any implementation will often have errors, and the process of interactive proving will expose these errors systematically by yielding impossible proof obligations. Once all implementation errors have been fixed, the developers will be able to complete the formal proof and be certain that the implementation has no errors with respect to its specification. Moreover, the proof assistant can check the formal proof automatically so no human needs to understand why the proof is correct in order to trust that it is. Figure 1 illustrates this process. Proving correctness of machine learning systems requires building on the tools and insights from two distinct fields: program verification (Leroy, 2009; Klein et al., 2009; Chlipala, 2013; Chen et al., 2015), which has aimed to prove properties of computer programs, and formal mathematics (Rudnicki, 1992; Gonthier, 2008; Gonthier et al., 2013; Hales et al., 2015), which has aimed to formally represent and generate machine-checkable proofs of mathematical theorems. Both of these fields make use of interactive proof assistants, but the tools, libraries and design patterns developed by the two fields focus on different problems and have remained largely incompatible. While the methodology we have outlined will be familiar to the program verification community, and while reasoning formally about the mathematics that underlies machine learning will be familiar to the formal mathematics community, proving such sophisticated mathematical properties of large (stochastic) software systems is a new goal and poses many new challenges. To explore these challenges and to demonstrate the prac- W1 โˆ— x W2 softplus N (ยท, I) โˆ— sigmoid cost L(W1 , W2 ) = EzโˆผN (softplus(W1 x),I) [cost(x, ฯƒ(W2 z))] Figure 2. An example stochastic computation graph representing a simple variational autoencoder. Stochastic nodes are indicated by rounded rectangles. The loss function for the graph is the expected value of the cost node over the stochastic choices, which in this case is a single sample from a Gaussian distribution. ticality of our approach, we implemented a new machine learning system, Certigrad, for optimizing over stochastic computation graphs (Schulman et al., 2015). Stochastic computation graphs extend the computation graphs that underly systems like TensorFlow (Abadi et al., 2015) and Theano (Bergstra et al., 2010) by allowing nodes to represent random variables and by defining the loss function for a graph to be the expected value of the sum of the leaf nodes over the stochastic choices. See Figure 2 for an example of a stochastic computation graph. We implement our system in the Lean Theorem Prover (de Moura et al., 2015), a new interactive proof assistant still under active development for which the integration of programming and mathematical reasoning is an ongoing design goal. We formally state and prove functional correctness for the stochastic backpropagation algorithm: that the sampled gradients are indeed unbiased estimates of the gradients of the loss function with respect to the parameters. We note that provable correctness need not come at the expense of computational efficiency: proofs need only be checked once during development and they introduce no runtime overhead. Although the algorithms we verify in this work lack many optimizations, most of the running time when training machine learning systems is spent multiplying matrices, and we are able to achieve competitive performance simply by linking with an optimized library for matrix operations (we used Eigen (Guennebaud et al., 2010)).2 To demonstrate practical feasibility empirically, we trained an Auto-Encoding Variational Bayes (AEVB) model (Kingma & Welling, 2014) on MNIST using ADAM (Kingma & Ba, 2014) and found the performance comparable to training the same model in TensorFlow. 2 Note that the validity of our theorem becomes contingent on Eigenโ€™s matrix operations being functionally equivalent to the versions we formally proved correct. Developing Bug-Free Machine Learning Systems With Formal Mathematics Informal R R f (x, y) dx f (x, y) โˆ‡ฮธ f (g(ฮธ))|ฮธ0 โˆ‡f (g(ฮธ)) We summarize our contributions: 1. We present the first application of formal (i.e. machine-checkable) proof techniques to developing machine learning systems. 2. We describe a methodology that can detect implementation errors systematically in machine learning systems. 3. We demonstrate that our approach is practical by developing a performant implementation of a sophisticated machine learning system along with a machinecheckable proof of correctness. 2. Motivation When developing machine learning systems, many program optimizations involve extensive algebraic derivations to put mathematical expressions in closed-form . For example, suppose you want to compute the following quantity efficiently: Z 2 N (x; ยต, Diag(ฯƒ )) log N (x; 0, Inร—n ). (1) x You expand the density functions, grind through the algebra by hand and eventually derive the following closed form expression: " n #  1 X 2 2 ฯƒ โˆ’ ยตi + n log 2ฯ€ โˆ’ 2 i=1 i Formal R (ฮป x, f x y) ? โˆ‡ (ฮป ฮธ, f (g ฮธ)) ฮธ0 ? Figure 3. Translating informal usages of the integral and gradient to our formal representation. Note that whereas some of the informal examples are too ambiguous to interpret without additional information, the Lean representation is always unambiguous. language. All three capabilities are provided by the new interactive proof assistant Lean (de Moura et al., 2015). Lean is an implementation of a logical system known as the Calculus of Inductive Constructions (Coquand & Huet, 1988), and its design is inspired by the better-known Coq Proof Assistant (Coq Development Team, 2015-2016). Our development makes use of certain features that are unique to Lean, but most of what we present is equally applicable to Coq, and to a lesser extent, other interactive theorem provers such as Isabelle/HOL (Nipkow et al., 2002). To explain and motivate the relevant features of Lean, we will walk through applying our methodology to a toy problem: writing a program to compute the gradient of the softplus function. We can write standard functional programs in Lean, such as softplus: def splus (x : R) : R := log (1 + exp x) We can also represent more abstract operations such as integrals and gradients: (2) You implement a procedure to compute this quantity and include it as part of a larger program, but when you run your first experiment, your plots are not as encouraging as you hoped. After ruling out many other possible explanations, you eventually decide to scrutinize this procedure more closely. You implement a naฤฑฬˆve Monte Carlo estimator for the quantity above, compare it against your procedure on a few random inputs and find that its estimates are systematically biased. What do you do now? If you re-check your algebra carefully, you might notice that the sign of ยต2i is wrong, but wouldnโ€™t it be easier if the compiler checked your algebra for you and found the erroneous step? Or better yet, if it did the algebra for you in the first place and could guarantee the result was error-free? 3. Background: The Lean Theorem Prover To develop software systems with no implementation errors, we need a way to write computer programs, mathematical theorems, and mathematical proofs all in the same R (f : R โ†’ R) : R โˆ‡ (f : R โ†’ R) (ฮธ : R) : R R Here the intended meaning of f is the integral of the function f over all of R, while the intended meaning of โˆ‡ f ฮธ is the gradient (i.e. the derivative) of the function f at the point ฮธ. Figure 3 shows how to represent common idioms of informal mathematics in our formal representation; note that whereas some of the informal examples are too ambiguous to interpret without additional information, the Lean representation is always unambiguous. We can represent mathematical theorems in Lean as well. For example, we can use the following predicate to state that a particular function f is differentiable at a point ฮธ: is_diff (f : R โ†’ R) (ฮธ : R) : Prop The fact that the return type of is_diff is Prop indicates that it is not a computer program to be executed but rather that it represents a mathematical theorem. We can also state and assume basic properties about the gradient, such as linearity: โˆ€ (f g : R โ†’ R) (ฮธ : R), is_diff f ฮธ โˆง is_diff g ฮธ โ†’ โˆ‡ (f + g) ฮธ = โˆ‡ f ฮธ + โˆ‡ g ฮธ Developing Bug-Free Machine Learning Systems With Formal Mathematics Returning to our running example, we can state the theorem that a particular function f computes the gradient of the softplus function: def gsplus_spec (f : R โ†’ R) : Prop := โˆ€ x, f x = โˆ‡ splus x Suppose we try to write a program to compute the gradient of the softplus function as follows: why a proof is correct in order to trust that it is.3 Although we cannot execute functions such as gsplus directly in the core logic of Lean (since a real number is an infinite object that cannot be stored in a computer), we can execute the floating-point approximation inside Leanโ€™s virtual machine: vm_eval gsplus ฯ€ โˆ’โˆ’ answer: 0.958576 def gsplus (x : R) : R := 1 / (1 + exp x) The application gsplus_spec gsplus represents the proposition that our implementation gsplus is correct, i.e. that it indeed computes the gradient of the softplus function for all inputs. We can try to formally prove theorems in Lean interactively: theorem gsplus_correct : gsplus_spec gsplus := lean: ` gsplus_spec gsplus user: expand_def gsplus_spec, lean: ` โˆ€ x, gsplus x = โˆ‡ splus x user: introduce x, lean: x : R ` gsplus x = โˆ‡ splus x user: expand_defs [gsplus, splus], lean: x : R ` 1 / (1 + exp x) = โˆ‡ (ฮป x, log (1 + exp x)) x user: simplify_grad, lean: x : R ` 1 / (1 + exp x) = exp x / (1 + exp x) The lines beginning with lean show the current state of the proof as displayed by Lean, which at any time consists of a collection of goals of the form assumptions ` conclusion. Every line beginning with user invokes a tactic, which is a command that modifies the proof state in some way such that Lean can automatically construct proofs of the original goals given proofs of the new ones. Here the simplify_grad tactic rewrites exhaustively with known gradient rulesโ€”in this case it uses the rules for log, exp, addition, constants, and the identity function. The final goal is clearly not provable, which means we have found an implementation error in gsplus. Luckily the goal tells us exactly what gsplus x needs to return: gsplus x = exp x / (1 + exp x). Once we fix the implementation of gsplus, the proof script that failed before now succeeds and generates a machine-checkable proof that the revised gsplus is bug-free. Note that we need not have even attempted to implement gsplus before starting the proof, since the process itself revealed what the program needs to compute. We will revisit this phenomenon in ยง4.5. In the process of proving the theorem, Lean constructs a formal proof certificate that can be automatically verified by a small stand-alone executable, whose soundness is based on a well-established meta-theoretic argument embedding the core logic of Lean into set theory, and whose implementation has been heavily scrutinized by many developers. Thus no human needs to be able to understand 4. Case Study: Certified Stochastic Computation Graphs Stochastic computation graphs are directed acyclic graphs in which each node represents a specific computational operation that may be deterministic or stochastic (Schulman et al., 2015). The loss function for a graph is defined to be the expected value of the sum of the leaf nodes over the stochastic choices. Figure 2 shows the stochastic computation graph for a simple variational autoencoder. Using our methodology, we developed a system, Certigrad, which allows users to construct arbitrary stochastic computation graphs out of the primitives that we provide. The main purpose of the system is to take a program describing a stochastic computation graph and to run a randomized algorithm (stochastic backpropagation) that, in expectation, provably generates unbiased samples of the gradients of the loss function with respect to the parameters. 4.1. Overview of Certigrad We now briefly describe the components of Certigrad, some of which have no analogues in traditional software systems.4 Mathematics libraries. There is a type that represents tensors of a particular shape, along with basic functions (e.g. exp, log) and operations (e.g. the gradient, the integral). There are assumptions about tensors (e.g. gradient rules for exp and log), and facts that are proved in terms of those assumptions (e.g. the gradient rule for softplus). There is also a type that represents probability distributions over vectors of tensors, that can be reasoned about mathematically and that can also be executed procedurally using a pseudo-random number generator. Implementation. There is a data structure that represents stochastic computation graphs, as well as an implementation of stochastic backpropagation. There are also functions that optimize stochastic computation graphs in various ways (e.g. by integrating out parts of the objective 3 This appealing property can be lost when an axiom is assumed that is not true. We discuss this issue further in ยง4.3. 4 The complete development can be found at www.github.com/ dselsam/certigrad. Developing Bug-Free Machine Learning Systems With Formal Mathematics function), as well as basic utilities for training models (e.g. stochastic gradient descent). Specification. There is a collection of theorem statements that collectively define what it means for the implementation to be correct. For Certigrad, there is one main theorem that states that the stochastic backpropagation procedure yields unbiased estimates of the true mathematical gradients. There are also other theorems that state that individual graph optimizations are sound. Proof. There are many helper lemmas to decompose the proofs into more manageable chunks, and there are tactic scripts to generate machine-checkable proofs for each of the lemmas and theorems appearing in the system. There are also tactic programs to automate certain types of reasoning, such as computing gradients or proving that functions are continuous. Optimized libraries. While the stochastic backpropagation function is written in Lean and proved correct, we execute the primitive tensor operations with the Eigen library for linear algebra. There is a small amount of C++ code to wrap Eigen operations for use inside Leanโ€™s virtual machine. The rest of this section describes the steps we took to develop Certigrad, which include sketching the high-level architecture, designing the mathematics libraries, stating the main correctness theorem and constructing the formal proof. Though many details are specific to Certigrad, this case study is designed to illustrate our methodology and we expect other projects will follow a similar process. Note: Certigrad supports arbitrarily-shaped tensors, but doing so introduces more notational complexity than conceptual difficulty and so we simplify the presentation that follows by assuming that all values are scalars. 4.2. Informal specification The first step of applying our methodology is to write down informally what the system is required to do. Suppose g is a stochastic computation graph with n nodes and (to simplify the notation) that it only takes a single parameter ฮธ. Then g, ฮธ together define a distribution over the values at the n nodes (X1 , . . . , Xn ). Let cost(g, X1:n ) be the function that sums the values of the leaf nodes. Our primary goal is to write a (stochastic) backpropagation algorithm bprop such that for any graph g, Eg,ฮธ [bprop(g, ฮธ, X1:n )] = โˆ‡ฮธ (Eg,ฮธ [cost(g, X1:n )]) (3) While this equation may seem sufficient to communicate the specification to a human with a mathematical background, more precision is needed to communicate it to a computer. The next step is to formalize the background mathematics, such as real numbers (tensors) and probability distributions, so that we can state a formal analogue of Equation 3 that the computer can understand. Although we believe it will be possible to develop standard libraries of mathematics that future developers can use off-the-shelf, we needed to develop the mathematics libraries for Certigrad from scratch. 4.3. Designing the mathematics libraries Whereas in traditional formal mathematics the goal is to construct mathematics from first principles (Gonthier et al., 2013; Hales et al., 2015), we need not concern ourselves with foundational issues and can simply assume that standard mathematical properties hold. For example, we can assume that there is a type R of real numbers without needing to construct them (e.g. from Cauchy sequences), and likewise can assume there is an integration operator on the R reals (f : R โ†’ R) : R that satisfies the well-known properties without needing to construct it either (e.g. from Riemann sums). Note that axioms must be chosen with great care since even a single false axiom (perhaps caused by a single missing precondition) can in principle allow proving any false theorem and so would invalidate the property that all formal proofs can be trusted without inspection.5 However, there are many preconditions that appear in mathematical theorems, such as integrability, that are almost always satisfied in machine learning contexts and which most developers ignore. Using axioms that omit such preconditions will necessarily lead to proving theorems that are themselves missing the corresponding preconditions, but in practice a non-adversarial developer is extremely unlikely to accidentally construct vacuous proofs by exploiting these axioms. For the first draft of our system, we purposely omitted integrability preconditions in our axioms to simplify the development. Only later did we make our axioms sound and propagate the additional preconditions throughout the system so that we could fully trust our formal proofs. Despite the convenience of axiomatizing the mathematics, designing the libraries was still challenging for two reasons. First, there were many different ways to formally represent the mathematical objects in question, and we needed to experiment to understand the tradeoffs between the different representations. Second, we needed to extend several traditional mathematical concepts to support reasoning about executable computer programs. The rest of this sub5 For example, the seemingly harmless axiom โˆ€x, x/x = 1 without the precondition x 6= 0 can be used to prove the absurdity (0 = 0 โˆ— 1 = 0 โˆ— (0/0) = (0 โˆ— 0)/0 = 0/0 = 1). If a system assumes this axiom, then a formal proof of correctness could not be trusted without inspection since the proof may exploit this contradiction. Developing Bug-Free Machine Learning Systems With Formal Mathematics section illustrates these challenges by considering the problem we faced of designing a representation of probability distributions for Certigrad. Representing probability distributions. Our challenge is to devise a sufficiently abstract representation of probability distributions that satisfies the following desiderata: we can reason about the probability density functions of continuous random variables, we have a way to reason about arbitrary deterministic functions applied to random variables, we can execute a distribution procedurally using a pseudorandom number generator (RNG), the mathematical and procedural representations of a distribution are guaranteed to correspond, and the mathematics will be recognizable to somebody familiar with the informal math behind stochastic computation graphs. We first define types to represent the mathematical and procedural notions of probability distribution. For mathematics, we define a Func n to be a functional that takes a realvalued function on Rn to a scalar: def Func (n : N) : Type := โˆ€ (f : Rn โ†’ R), R The intended semantics is that if p : Func n represents a distribution on Rn , then p f is the expected value of f over p, i.e. Exโˆผp [f (x)]. For sampling, we define an Prog n to be a procedure that takes an RNG and returns a vector in Rn along with an updated RNG: def Prog (n : N) : Type := RNG โ†’ Rn ร— RNG We also assume that there are primitive (continuous) distributions (PrimDist := Func 1 ร— Prog 1) that consist of a probability density function and a corresponding sampling procedure. In principle, we could construct all distributions from uniform variates, but for expediency, we treat other well-understood distributions as primitive, such as the Gaussian (gauss ยต ฯƒ : PrimDist). Finally, we define a type of distributions (Dist n) that abstractly represents programs that may mix sampling from primitive distributions with arbitrary deterministic computations. A Dist n can be denoted to a Func n (with the function E) to reason about mathematically, and to an Prog n (with the function run) to execute with an RNG. For readers familiar with functional programming, our construction is similar to a monad. We allow three ways of constructing a Dist n, corresponding to sampling from a primitive distribution (sample), returning a value deterministically (det), and composing two distributions (compose): sample ((pdf, prog) : PrimDist) : Dist 1 det (xs : Rn ) : Dist n compose (d1 : Dist m) (d2 : Rm โ†’ Dist n) : Dist n Dist n : Type E {n : N} (d : Dist n) (f : Rn โ†’ R) : R SCG n : Type SCG.to_dist {n : N} (g : SCG n) (ฮธ : R) : Dist n cost {n : N} (g : SCG n) (xs : Rn ) : R Figure 4. The basic types and functions we will need to formally state the specification. Dist n represents a distribution over Rn , E is the expected value function, SCG n represents a computation graph on n nodes, SCG.to dist is the function that samples from an SCG n and yields a distribution over the values at the nodes, and cost sums the values at the leaf nodes of a graph. Curly braces around an argument indicates that it can be inferred from context and need not be passed explicitly. The mathematical semantics of all three constructors are straightforward: R E (sample (pdf, prog)) f = (ฮป x, pdf x * f x) E (det xs) f = f xs E (compose d1 d2 ) f = E d1 (ฮป x, (E (d2 x) f)) as are the procedural semantics: run (sample (pdf, prog)) rng = prog rng run (det xs) rng = (xs, rng) run (compose d1 d2 ) rng = let (x, rngโ€™) := run d1 rng in run (d2 x) rngโ€™ We have defined E and run to correspond; we consider a stochastic program correct if we can prove the relevant theorems about its Func denotation, and we sample from it by passing an RNG to its Prog denotation. 4.4. Formal specification With the background mathematics in place, the next step is to write down the formal specification itself. First, we design types for every other object and function appearing in the informal description. To start, we need a type SCG n to represent stochastic computation graphs on n nodes, and a function SCG.to_dist that takes an SCG n and a scalar parameter ฮธ to a distribution over n real numbers (Dist n). We also need a function cost that takes a graph and the values at each of its nodes and sums the values at the leaf nodes. Figure 4 provides the full types of all objects that will appear in the specification. Now we can write down a type-correct analogue of the informal specification presented in Equation 3: def bprop_spec (bprop : โˆ€ {n}, SCG n โ†’ R โ†’ Rn โ†’ R) : Prop := โˆ€ (n : N) (g : SCG n) (ฮธ : R), E (SCG.to_dist g ฮธ) (ฮป xs, bprop g ฮธ xs) = โˆ‡ (ฮป ฮธ, E (SCG.to_dist g ฮธ) (ฮป xs, cost g xs)) ฮธ Given the mathematics libraries, implementing the other Developing Bug-Free Machine Learning Systems With Formal Mathematics objects and functions appearing in the specification such as SCG n and SCG.to_dist is straightforward functional programming. 4.5. Interactive proof While conventional wisdom is that one would write their program before trying to prove it correct, the interactive proof process provides so much helpful information about what the system needs to do that we began working on the proof immediately after drafting the specification. We split the proof into two steps. First, we implemented the simplest possible function that satisfied the specification (that only computed the gradient for a single parameter at a time and did not memoize at all) and proved that correct. Second, we implemented a more performant version (that computed the gradient for multiple parameters simultaneously using memoization) and proved it equivalent to the first one. For the first step, we started with a placeholder implementation that immediately returned zero and let the interactive proof process guide the implementation. Whenever the proof seemed to require induction on a particular data structure, we extended the program to recurse on that data structure; whenever the proof showed that a branch of the program needed to return a value with a given expectation, we worked backwards from that to determine what value to return. Proving the first step also exposed errors in our specification in the form of missing preconditions. For the specification to hold, we needed to make additional assumptions about the graph, e.g. that the identifier for each node in the graph is unique, and that each leaf node is a scalar (WellFormed g). We also needed to assume a generalization of the differentiability requirement mentioned in Schulman et al. (2015), that a subset of the nodes determined by the structure of the graph must be differentiable no matter the result of any stochastic choices (GradsExist g ฮธ). For the second step, we wrote the memoizing implementation before starting the proof and used the process of proving to test and debug it. Although the code for memoizing was simple and short, we still managed to make two implementation errors, one conceptual and one syntactic. Luckily the process of proving necessarily exposes all implementation errors, and in this case made it clear how to fix both of them. We completed the main proof of correctness before proving most of the lemmas that the proof depends on, but the lemmas turned out to be true (except for a few missing preconditions) and so proving them did not expose any additional implementation errors. We also completed the main proof while our axioms were still unsound (see ยง4.3). When we made our axioms sound and propagated the changes we def bprop_spec (bprop : โˆ€ {n}, SCG n โ†’ R โ†’ Rn โ†’ R) : Prop := โˆ€ (n : N) (g : SCG n) (ฮธ : R), WellFormed g โˆง GradsExist g ฮธ โˆง IntegralsExist g ฮธ โˆง CanDiffUnderInts g ฮธ โ†’ E (SCG.to_dist g ฮธ) (ฮป xs, bprop g ฮธ xs) = โˆ‡ (ฮป ฮธ, E (SCG.to_dist g ฮธ) (ฮป xs, cost g xs)) ฮธ Figure 5. The final specification for the simplified problem with only scalars (as opposed to tensors) and only a single parameter ฮธ. Our actual system supports arbitrarily-shaped tensors and differentiating with respect to multiple parameters at once. found that our specification required two additional preconditions: that all functions that are integrated over in the theorem statement are indeed integrable (IntegralsExist g ฮธ), and that the many preconditions needed for pushing the gradient over each integral in the expected loss are satisfied (CanDiffUnderInts g ฮธ). However, tracking these additional preconditions did not lead to any changes in our actual implementation. Figure 5 shows the final specification. 4.6. Optimizations We can also use our methodology to verify optimizations that involve mathematical reasoning. When developing machine learning models, one often starts with an easyto-understand model that induces a gradient estimator with unacceptably high variance, and does informal mathematics by hand to derive a new model that has the same objective function but that induces a better gradient estimator. In our approach, the user can write both models and use the process of interactive proving to confirm that they induce the same objective function. Common transformations can be written once and proved correct so that users need only write the first model and the second can be derived and proved equivalent automatically. As part of Certigrad, we wrote a program optimization that integrates out the KL-divergence of the multivariate isotropic Gaussian distribution and we proved once and for all that the optimization is sound. We also verified an optimization that reparameterizes a model so that random variables do not depend on parameters (and so need not be backpropagated through). Specifically, the optimization replaces a node that samples from N (ยต, Diag(ฯƒ 2 )) with a graph of three nodes that first samples from N (0, Inร—n ) and then scales and shifts the result according to ฯƒ and ยต respectively. We applied these two transformations in sequence to a naฤฑฬˆve variational-autoencoder to yield the Auto-Encoding Variational Bayes (AEVB) estimator (Kingma & Welling, 2014). Developing Bug-Free Machine Learning Systems With Formal Mathematics at each epoch against the same model and optimization procedure in TensorFlow, both running on 2 CPU cores. We found that the expected losses decrease at the same rate, and that Certigrad takes only 7% longer per epoch (Figure 6). (a) Expected loss vs epoch (b) Running time vs epoch Figure 6. Results of running our certified procedure on an AEVB model, compared to TensorFlow. Our system trains just as well and takes only 7% longer per epoch. 4.7. Verifying backpropagation for specific models Even though we proved that bprop satisfies its formal specification (bprop_spec), we cannot be sure that it will compute the correct gradients for a particular model unless we prove that the model satisfies the preconditions of the specification. Although some of the preconditions are technically undecidable, in practice most machine learning models will satisfy them all for simple reasons. We wrote a (heuristic) tactic program to prove that specific models satisfy all the preconditions and used it to verify that bprop computes the correct gradients for the AEVB model derived in ยง4.6. 4.8. Running the system We have proved that our system is correct in an idealized mathematical context with infinite-precision real numbers. To actually execute the system we need to replace all real numbers in the program with floating-point numbers. Although doing so technically invalidates the specification and can introduce numerical instability in some cases, this class of errors is well understood (Higham, 2002), could be ruled out as well in principle (Harrison, 2006; Boldo et al., 2015; Ramananandro et al., 2016) and is conceptually distinct from the algorithmic and mathematical errors that our methodology is designed to eliminate. To improve performance, we also replace all tensors with an optimized tensor library (Eigen). This approximation could introduce errors into our system if for whatever reason the Eigen methods we use are not functionally equivalent to ones we formally reason about; of course developers could achieve even higher assurance by verifying their optimized tensor code as well. 4.9. Experiments Certigrad is efficient. As an experiment, we trained an AEVB model with a 2-layer encoding network and a 2layer decoding network on MNIST using the optimization procedure ADAM (Kingma & Ba, 2014), and compared both the expected loss and the running time of our system 5. Discussion Our primary motivation is to develop bug-free machine learning systems, but our approach may provide significant benefits even when building systems that need not be perfect. Perhaps the greatest burden software developers must bear is needing to fully understand how and why their system works, and we found that by formally specifying the system requirements we were able to relegate much of this burden to the computer. Not only were we able to synthesize some fragments of the system (ยง4.5), we were able to achieve extremely high confidence that our system was bug-free without needing to think about how all the pieces of the system fit together. In our approach, the computerโ€” not the humanโ€”is responsible for ensuring that all the local properties that the developer establishes imply that the overall system is correct. Although using our methodology to develop Certigrad imposed many new requirements and increased the overall workload substantially, we found that on the whole it made the development process less cognitively demanding. There are many ways that our methodology can be adopted incrementally. For example, specifications need not cover functional correctness, not all theorems need to be proved, unsound axioms can be used that omit certain preconditions, and more traditional code can be wrapped and axiomatized (as we did with Eigen). When developing Certigrad we pursued the ideal of a complete, machinecheckable proof of functional correctness, and achieved an extremely high level of confidence that the system was correct. However, we realized many of the benefits of our methodologyโ€”including partial synthesis and reduced cognitive demandโ€”early in the process before proving most of the lemmas. Although we could not be certain that we had found all of the bugs before we made our axioms sound and filled in the gaps in the formal proofs, in hindsight we had eliminated all bugs early in the process as well. While a pure version of our methodology may already be cost-effective for high-assurance applications, we expect that pragmatic use of our methodology could yield many of the benefits for relatively little cost and could be useful for developing a wide range of machine learning systems to varying standards of correctness. Developing Bug-Free Machine Learning Systems With Formal Mathematics Acknowledgments We thank Jacob Steinhardt, Alexander Ratner, Cristina White, William Hamilton, Nathaniel Thomas, and Vatsal Sharan for providing valuable feedback on early drafts. We also thank Leonardo de Moura, Tatsu Hashimoto, and Joseph Helfer for helpful discussions. This work was supported by Future of Life Institute grant 2016-158712. References Abadi, Martฤฑฬn, Agarwal, Ashish, Barham, Paul, Brevdo, Eugene, Chen, Zhifeng, Citro, Craig, Corrado, Greg S., Davis, Andy, Dean, Jeffrey, Devin, Matthieu, Ghemawat, Sanjay, Goodfellow, Ian, Harp, Andrew, Irving, Geoffrey, Isard, Michael, Jia, Yangqing, Jozefowicz, Rafal, Kaiser, Lukasz, Kudlur, Manjunath, Levenberg, Josh, Maneฬ, Dan, Monga, Rajat, Moore, Sherry, Murray, Derek, Olah, Chris, Schuster, Mike, Shlens, Jonathon, Steiner, Benoit, Sutskever, Ilya, Talwar, Kunal, Tucker, Paul, Vanhoucke, Vincent, Vasudevan, Vijay, Vieฬgas, Fernanda, Vinyals, Oriol, Warden, Pete, Wattenberg, Martin, Wicke, Martin, Yu, Yuan, and Zheng, Xiaoqiang. TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. URL http://tensorflow. org/. Software available from tensorflow.org. Bergstra, J., Breuleux, O., Bastien, F., Lamblin, P., Pascanu, R., Desjardins, G., Turian, J., Warde-Farley, D., and Bengio, Y. Theano: a CPU and GPU math expression compiler. In Python for Scientific Computing Conference, 2010. de Moura, Leonardo, Kong, Soonho, Avigad, Jeremy, Van Doorn, Floris, and von Raumer, Jakob. The Lean theorem prover (system description). In Automated Deduction-CADE-25, pp. 378โ€“388. Springer, 2015. Gonthier, Georges. Formal proofโ€“the four-color theorem. Notices of the AMS, 55(11):1382โ€“1393, 2008. Gonthier, Georges, Asperti, Andrea, Avigad, Jeremy, Bertot, Yves, Cohen, Cyril, Garillot, Francฬงois, Le Roux, Steฬphane, Mahboubi, Assia, Oโ€™Connor, Russell, Biha, Sidi Ould, et al. A machine-checked proof of the odd order theorem. In Interactive Theorem Proving, pp. 163โ€“ 179. Springer, 2013. Gordon, Michael JC. Edinburgh lcf: a mechanised logic of computation. 1979. Gordon, Michael JC and Melham, Tom F. Introduction to hol a theorem proving environment for higher order logic. 1993. Guennebaud, Gaeฬˆl, Jacob, Benoฤฑฬ‚t, et al. http://eigen.tuxfamily.org, 2010. Eigen v3. Hales, Thomas, Adams, Mark, Bauer, Gertrud, Dang, Dat Tat, Harrison, John, Hoang, Truong Le, Kaliszyk, Cezary, Magron, Victor, McLaughlin, Sean, Nguyen, Thang Tat, et al. A formal proof of the kepler conjecture. arXiv preprint arXiv:1501.02155, 2015. Harrison, John. Hol light: A tutorial introduction. In International Conference on Formal Methods in ComputerAided Design, pp. 265โ€“269. Springer, 1996. Boldo, Sylvie, Jourdan, Jacques-Henri, Leroy, Xavier, and Melquiond, Guillaume. Verified compilation of floatingpoint computations. Journal of Automated Reasoning, 54(2):135โ€“163, 2015. Harrison, John. Floating-point verification using theorem proving. In International School on Formal Methods for the Design of Computer, Communication and Software Systems, pp. 211โ€“242. Springer, 2006. Chen, Haogang, Ziegler, Daniel, Chajed, Tej, Chlipala, Adam, Kaashoek, M Frans, and Zeldovich, Nickolai. Using crash hoare logic for certifying the fscq file system. In Proceedings of the 25th Symposium on Operating Systems Principles, pp. 18โ€“37. ACM, 2015. Higham, Nicholas J. Accuracy and stability of numerical algorithms. SIAM, 2002. Chlipala, Adam. The bedrock structured programming system: Combining generative metaprogramming and hoare logic in an extensible program verifier. In ACM SIGPLAN Notices, volume 48, pp. 391โ€“402. ACM, 2013. Coq Development Team. The Coq proof assistant reference manual: Version 8.5. INRIA, 2015-2016. Coquand, Thierry and Huet, Geฬrard. The calculus of constructions. Information and computation, 76(2-3):95โ€“ 120, 1988. Kingma, D. P. and Welling, M. Auto-encoding variational Bayes. arXiv, 2014. Kingma, Diederik and Ba, Jimmy. method for stochastic optimization. arXiv:1412.6980, 2014. Adam: A arXiv preprint Klein, Gerwin, Elphinstone, Kevin, Heiser, Gernot, Andronick, June, Cock, David, Derrin, Philip, Elkaduwe, Dhammika, Engelhardt, Kai, Kolanski, Rafal, Norrish, Michael, et al. sel4: Formal verification of an os kernel. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, pp. 207โ€“220. ACM, 2009. Leroy, Xavier. Formal verification of a realistic compiler. Communications of the ACM, 52(7):107โ€“115, 2009. Developing Bug-Free Machine Learning Systems With Formal Mathematics Nipkow, Tobias, Paulson, Lawrence C, and Wenzel, Markus. Isabelle/HOL: a proof assistant for higherorder logic, volume 2283. Springer, 2002. Owre, Sam, Rushby, John M, and Shankar, Natarajan. Pvs: A prototype verification system. In Automated Deductionโ€”CADE-11, pp. 748โ€“752. Springer, 1992. Ramananandro, Tahina, Mountcastle, Paul, Meister, Benoฤฑฬ‚t, and Lethin, Richard. A unified coq framework for verifying c programs with floating-point computations. In Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, pp. 15โ€“26. ACM, 2016. Rudnicki, Piotr. An overview of the mizar project. In Proceedings of the 1992 Workshop on Types for Proofs and Programs, pp. 311โ€“330, 1992. Schulman, John, Heess, Nicolas, Weber, Theophane, and Abbeel, Pieter. Gradient estimation using stochastic computation graphs. In Advances in Neural Information Processing Systems, pp. 3528โ€“3536, 2015.
2cs.AI
arXiv:1512.05999v1 [math.AC] 18 Dec 2015 ON DING INJECTIVE, DING PROJECTIVE, AND DING FLAT MODULES AND COMPLEXES JAMES GILLESPIE Abstract. We characterize Ding modules and complexes over Ding-Chen rings. We show that over a Ding-Chen ring R, the Ding projective (resp. Ding injective, resp. Ding flat) R-modules coincide with the Gorenstein projective (resp. Gorenstein injective, resp. Gorenstein flat) modules, which in turn are nothing more than modules appearing as a cycle of an exact complex of projective (resp. injective, resp. flat) modules. We prove a similar characterization for chain complexes of R-modules: A complex X is Ding projective (resp. Ding injective, resp. Ding flat) if and only if each component Xn is Ding projective (resp. Ding injective, resp. Ding flat). Along the way, we generalize some results of Stovicek and Bravo-Gillespie-Hovey to obtain other interesting corollaries. For example, we show that over any Noetherian ring, any exact chain complex with Gorenstein injective components must have all cotorsion cycle modules. That is, Ext1R (F, Zn I) = 0 for any such complex I and flat module F . On the other hand, over any coherent ring, the cycles of any exact complex P with projective components must satisfy Ext1R (Zn P, A) = 0 for any absolutely pure module A. 1. introduction Let R be a Gorenstein ring in the sense of [Iwa79, Iwa80]. This is a left and right Noetherian ring R having finite injective dimension as both a left and right module over itself. Over such rings, exact chain complexes of projective, injective, and flat R-modules each have very nice homological properties. In particular, for an exact complex P of projectives, the complex HomR (P, Q) is also exact for any projective module Q. In general, such complexes are called totally acyclic complexes of projectives and the modules appearing as a cycle Zn P of such a complex are called Gorenstein projective. So over Gorenstein rings, any exact complex of projectives is totally acyclic and their cycles are all Gorenstein projective. Similar statements hold for exact complexes of injectives and flats, and the corresponding Gorenstein injective and Gorenstein flat modules. Gorenstein homological algebra is the study of these modules and complexes and the theory is particularly satisfying over Gorenstein rings. In this case, most results from traditional homological algebra have an analog in Gorenstein homological algebra. The book [EJ00] is a standard reference, but many authors have studied the subject. Stovicek recently proved the coherent analog of the above result concerning totally acyclic complexes of injectives [Sto14, Prop. 7.9]. It raises the same question for the projective and flat analogs, which is answered in this paper. Before explaining further, first recall that a (left) coherent ring is one in which all finitely Date: December 21, 2015. 1 2 JAMES GILLESPIE generated (left) ideals are finitely presented. A ring that is both left and right coherent is called coherent and these include all Noetherian and Von Neumann regular rings. A lesson learned from [Ste70] is that many results in homological algebra extend from Noetherian to coherent rings by replacing finitely generated modules with finitely presented modules. In the process, injective modules are replaced with FP-injective (i.e. absolutely pure) modules. In this way, a Ding-Chen ring is a coherent ring R which has finite absolutely pure (i.e. FP-injective) dimension as both a left and right module over itself. They were introduced in [DC93, DC96]. Since a coherent ring is Noetherian if and only if the FP-injective modules coincide with the injective modules, the Ding-Chen rings are nothing more than Gorenstein rings whenever R is Noetherian. In [Gil10], the author noted that the work of Ding, Mao and Li, see especially [DM05, DM07, DM08, DLM09], provides a natural way to extend notions from Gorenstein homological algebra from Noetherian to coherent rings. In the process, the Gorenstein modules are replaced by Dingโ€™s modules. For example, we say a module is Ding projective if it is a cycle module of some exact complex P of projectives such that HomR (P, F ) remains exact for all flat modules F . See Definitions 4.1, 6.1, and 7.1. It admittedly seems strange to require that HomR (P, F ) remain exact for all flat modules F rather than just all projectives. After all, it feels like we are requiring too much. However, it was shown in [BGH13] that the Ding projectives are the cofibrant objects of an especially nice Quillen model structure on R-Mod, the category of (left) R-modules, whenever R is coherent. It implies that every module M can be approximated by a Ding projective and that the full subcategory of all Ding projective modules naturally form a Frobenius category. We think of the associated stable category as the (projective) stable module category of R. The analog of this for the usual Gorenstein projectives over Noetherian rings simply doesnโ€™t seem to be true, in general. The first result of this paper is an extension, to Ding-Chen rings, of the well known result concerning Gorenstein rings described in the first paragraph. Part (2) is the result of Stovicek which motivated the analogous question for Ding projectives and Ding flats. Theorem 1.1. Let R be a Ding-Chen ring. That is, a left and right coherent ring R such that R R and RR each have finite absolutely pure dimension. Let X be an exact chain complex. Then (1) If each component Xn is projective, then each cycle Zn X is Ding projective. Indeed HomR (X, F ) remains exact for all flat modules F . (2) If each component Xn is injective, then each cycle Zn X is Ding injective. Indeed HomR (A, X) remains exact for all absolutely pure A. (3) If each component Xn is flat, then each cycle Zn X is Ding flat. Indeed A โŠ—R X remains exact for all absolutely pure A. Consequently, the Gorenstein modules coincide with the Ding modules whenever R is a Ding-Chen ring. Before discussing the proof methods we note that Gorenstein chain complexes have also been studied quite a bit. For example, it has been known for some time that over Gorenstein rings, a chain complex X is Gorenstein injective (resp. Gorenstein projective) if and only if each component is Gorenstein injective (resp. Gorenstein projective). See [GR99, EE05, YL11]. In [YLL11, YLL13], Yang, Liu, DING MODULES AND COMPLEXES 3 and Liang characterize the Ding complexes over a Ding-Chen ring. The next result is a surprising refinement of their characterization. Theorem 1.2. Let R be a Ding-Chen ring and X a chain complex of R-modules. (1) X is Ding projective in Ch(R) if and only if each component Xn is a Ding projective R-module. (2) X is Ding injective in Ch(R) if and only if each component Xn is a Ding injective R-module. (3) X is Ding flat in Ch(R) if and only if each component Xn is a Ding flat R-module. Consequently, the Gorenstein complexes coincide with the Ding complexes whenever R is a Ding-Chen ring. We now briefly describe our methods used and highlight other results in the paper. First, the injective cases are proved in a completely different fashion than their projective analogs, (while the flat analogs are relatively easy). For the injective case, we generalize the approach of Stovicek to record a useful result concerning cotorsion pairs and direct limits. If (W, F ) is a cotorsion pair, then W is closed under direct limits whenever W satisfies the two out of three property on short exact sequences; see Proposition 3.1. The injective cases of Theorems 1.1 and 1.2 follow as corollaries, but the approach leads to a string of other interesting corollaries appearing in Sections 3 and 4. Perhaps the most interesting is Corollary 3.5. It implies that over any Noetherian ring, any exact chain complex with Gorenstein injective components must have all cotorsion cycle modules. That is, Ext1R (F, Zn I) = 0 for any such complex I and flat module F . The projective case requires a completely different approach than the injective one. Our proof of the projective part of Theorem 1.1 relies on a result proved in [BGH13, Theorem A.6]. To obtain the projective statement in Theorem 1.2 we in fact need to generalize this result to the category of chain complexes. Section 5 is devoted to this, with Theorem 5.9 being the main result. Finally, the following interesting result is proved in Theorem 3.6. Theorem 1.3. Let R be a coherent ring and P any exact complex of projectives. Then Ext1R (Zn P, A) = 0 for any absolutely pure module A. Regarding the structure of the paper, after some preliminaries in Section 2, we first address the injective cases in Sections 3 and 4. Sections 5 and 6 are devoted to the projective case, and Section 7 to the flat case. 2. preliminaries Throughout the paper R denotes a general ring with identity. An R-module will mean a left R-module, unless stated otherwise. The category of R-modules will be denoted R-Mod. It is an abelian category. 2.1. Chain complexes on abelian categories. Let A be an abelian category. We denote the corresponding category of chain complexes by Ch(A). In the case A = R-Mod, we denote it by Ch(R). Our convention is that the differentials of dn+1 d n Xnโˆ’1 โˆ’ โ†’ ยท ยท ยท is a our chain complexes lower degree, so ยท ยท ยท โˆ’ โ†’ Xn+1 โˆ’โˆ’โˆ’โ†’ Xn โˆ’โ†’ chain complex. We also have the chain homotopy category of A, denoted K(A). Its objects are also chain complexes but its morphisms are chain homotopy classes 4 JAMES GILLESPIE of chain maps. Given a chain complex X, the nth suspension of X, denoted ฮฃn X, is the complex given by (ฮฃn X)k = Xkโˆ’n and (dฮฃn X )k = (โˆ’1)n dkโˆ’n . For a given object A โˆˆ A, we denote the n-disk on A by Dn (A). This is the complex consisting 1A A concentrated in degrees n and n โˆ’ 1, and 0 elsewhere. We denote only of A โˆ’โˆ’โ†’ the n-sphere on A by S n (A), and this is the complex consisting only of A in degree n and 0 elsewhere. Given two chain complexes X, Y โˆˆ Ch(A) we define Hom(X, Y ) to be the comQ ฮดn Q โ†’ plex of abelian groups ยท ยท ยท โˆ’ โ†’ kโˆˆZ Hom(Xk , Yk+n ) โˆ’โ†’ kโˆˆZ Hom(Xk , Yk+nโˆ’1 ) โˆ’ ยท ยท ยท , where (ฮดn f )k = dk+n fk โˆ’(โˆ’1)n fkโˆ’1 dk . We get a functor Hom(X, โˆ’) : Ch(A) โˆ’ โ†’ Ch(Z). Note that this functor takes exact sequences to left exact sequences, and it is exact if each Xn is projective. Similarly the contravariant functor Hom(โˆ’, Y ) sends exact sequences to left exact sequences and is exact if each Yn is injective. It is an exercise to check that the homology satisfies Hn [Hom(X, Y )] = K(A)(X, ฮฃโˆ’n Y ). Being an abelian category, Ch(A) comes with Yoneda Ext groups. In particular, Ext1Ch(A) (X, Y ) will denote the group of (equivalences classes) of short exact sequences 0 โˆ’ โ†’ Y โˆ’ โ†’ Z โˆ’ โ†’ X โˆ’ โ†’ 0 under the Baer sum operation. There is a subgroup Ext1dw (X, Y ) โІ Ext1Ch(A) (X, Y ) consisting of the โ€œdegreewise splitโ€ short exact sequences. That is, those for which each 0 โˆ’ โ†’ Yn โˆ’ โ†’ Zn โˆ’ โ†’ Xn โˆ’ โ†’ 0 is split exact. The following lemma gives a well-known connection between Ext1dw and the above hom-complex Hom. Lemma 2.1. For chain complexes X and Y , we have isomorphisms: Ext1 (X, ฮฃ(โˆ’nโˆ’1) Y ) โˆผ = Hn Hom(X, Y ) = K(A)(X, ฮฃโˆ’n Y ) dw In particular, for chain complexes X and Y , Hom(X, Y ) is exact iff for any n โˆˆ Z, any chain map f : ฮฃn X โˆ’ โ†’ Y is homotopic to 0 (or iff any chain map f : X โˆ’ โ†’ ฮฃn Y is homotopic to 0). In the case of A = R-Mod, we recall the usual tensor product of chain complexes. Given that X (resp. Y ) is a complex of right (resp. left) R-modules, the tensor product X โŠ—Y is defined by (X โŠ—Y )n = โŠ•i+j=n (Xi โŠ—Yj ) in degree n. The boundary map ฮดn is defined on the generators by ฮดn (x โŠ— y) = dx โŠ— y + (โˆ’1)|x| x โŠ— dy, where |x| is the degree of the element x. 2.2. The modified Hom and Tensor complexes. Here again, Ch(R) denotes the category of chain complexes of R-modules. The above Hom is often referred to as the internal hom, for in the case that R is commutative, Hom(X, Y ) is again an object of Ch(R). Note that the cycles in degree 0 of the internal hom coincide with the external hom functor: Z0 [Hom(X, Y )] โˆผ = HomCh(R) (X, Y ). This idea in fact is useful to define an alternate internal hom as follows. Given X, Y โˆˆ Ch(R), we define Hom(X, Y ) to be the complex Hom(X, Y )n = Zn Hom(X, Y ) with differential ฮปn : Hom(X, Y )n โˆ’ โ†’ Hom(X, Y )nโˆ’1 defined by (ฮปf )k = (โˆ’1)n dk+n fk . Notice that the degree n component of Hom(X, Y ) is exactly HomCh(R) (X, ฮฃโˆ’n Y ). In this way we get an internal hom Hom which is useful for categorical considerations in Ch(R). For example, Hom(X, โˆ’) is a left exact functor, and is exact if and only if X is projective in the category Ch(R). On DING MODULES AND COMPLEXES 5 the other hand, Hom(โˆ’, Y ) is exact if and only if Y is injective in Ch(R). There i are corresponding derived functors which we denote by Ext . They satisfy that i Ext (X, Y ) is a complex whose degree n is ExtiCh(R) (X, ฮฃโˆ’n Y ). Similarly, the usual tensor product of chain complexes does not characterize categorical flatness. For this we need the modified tensor product and its left derived torsion functor from [EGR97] and [GR99]. We will denote it by โŠ—, and it is defined in terms of the usual tensor product โŠ— as follows. Given a complex X of right R-modules and a complex Y of left R-modules, we define XโŠ—Y to be the complex whose nth entry is (X โŠ— Y )n /Bn (X โŠ— Y ) with boundary map (X โŠ— Y )n /Bn (X โŠ— Y ) โ†’ (X โŠ— Y )nโˆ’1 /Bnโˆ’1 (X โŠ— Y ) given by x โŠ— y 7โ†’ dx โŠ— y. This defines a complex and we get a bifunctor โˆ’โŠ—โˆ’ which is right exact in each variable. We denote the corresponding left derived functors by Tori . We refer the reader to [GR99] for more details. 2.3. Finitely generated projective complexes. A standard characterization of projective objects in Ch(R) is the following: A complex P is projective if and only if it is an exact complex with each cycle Zn P a projective R-module. We also recall that, by definition, a chain complex X is finitely generated if whenever X = ฮฃiโˆˆI Si , for some collection {Si }iโˆˆI of subcomplexes of X, then there exists a finite subset J โІ I for which X = ฮฃiโˆˆJ Si . It is a standard fact that X is finitely generated if and only if it is bounded (above and below) and each Xn is finitely generated. We say that a chain complex X is of type F Pโˆž if it has a projective resolution by finitely generated projective complexes. Certainly any such X is finitely presented and hence finitely generated. 2.4. Absolutely clean and level complexes; character duality. The so-called level and absolutely clean modules were introduced in [BGH13] as generalizations of flat modules over coherent rings and injective modules over Noetherian rings. The same notions in the category Ch(R) were also studied in [BG15]. Here we recall some definitions and results from [BG15]. Definition 2.2. We call a chain complex A absolutely clean if Ext1Ch(R) (X, A) = 1 0 for all chain complexes X of type F Pโˆž . Equivalently, if Ext (X, A) = 0 for all complexes X of right R-modules of type F Pโˆž . On the other hand, we call a chain complex L level if Tor1 (X, L) = 0 for all chain complexes X of right R-modules of type F Pโˆž . We refer to [BG15, Prop. 2.6/4.6] for proof of the following. Proposition 2.3. A chain complex A is absolutely clean if and only if A is exact and each Zn A is an absolutely clean R-module. A chain complex L is level if and only if L is exact and each Zn L is a level R-module. Recall that the character module of M is defined as M + = HomZ (M, Q/Z), and that M + is a right (resp. left) R-module whenever M is a left (resp. right) Rmodule. The construction extends to chain complexes: Given a chain complex X, we have X + = HomZ (X, Q/Z). Since Q/Z is an injective cogenerator for the category of abelian groups, the functor HomZ (โˆ’, Q/Z) preserves and reflects exactness. 6 JAMES GILLESPIE So Proposition 2.3 immediately gives us the following corollary due to the perfect character module duality between absolutely clean and level modules [BGH13, Theorem 2.10]. Corollary 2.4. A chain complex L of left (resp. right) modules is level if and only if L+ = HomZ (L, Q/Z) is an absolutely clean complex of right (resp. left) modules. And, a chain complex A of left (resp. right) modules is absolutely clean if and only if A+ = HomZ (A, Q/Z) is a level complex of right (resp. left) modules. 2.5. Cotorsion pairs. Let A be an abelian category. By definition, a pair of classes (X , Y) in A is called a cotorsion pair if Y = X โŠฅ and X = โŠฅ Y. Here, given a class of objects C in A, the right orthogonal C โŠฅ is defined to be the class of all objects X such that Ext1A (C, X) = 0 for all C โˆˆ C. Similarly, we define the left orthogonal โŠฅ C. We call the cotorsion pair hereditary if ExtiA (X, Y ) = 0 for all X โˆˆ X , Y โˆˆ Y, and i โ‰ฅ 1. The cotorsion pair is complete if it has enough injectives and enough projectives. This means that for each A โˆˆ A there exist short exact sequences 0 โˆ’ โ†’Aโˆ’ โ†’Y โˆ’ โ†’X โˆ’ โ†’ 0 and 0 โˆ’ โ†’ Yโ€ฒ โˆ’ โ†’ Xโ€ฒ โˆ’ โ†’Aโˆ’ โ†’ 0 with X, X โ€ฒ โˆˆ X โ€ฒ and Y, Y โˆˆ Y. Standard references include [EJ00] and [GT06] and connections to abelian model categories can be found in [Hov02] and [Gil15]. Recall that a Grothendieck category is a cocomplete abelian category with a set of generators and such that direct limits are exact. By an injective cotorsion pair (W, F ) in a Grothendieck category G we mean a complete cotorsion pair for which W is thick and W โˆฉF is the class of injective objects. Since Grothendieck categories have enough injectives it turns out that such a cotorsion pair is equivalent to an injective model structure on G. By this we mean the model structure is abelian in the sense of [Hov02] and all objects are cofibrant. The fibrant objects in this case are exactly F and the trivial objects are exactly W. See [Gil12] for more on injective cotorsion pairs. We also have the dual notion of projective cotorsion pairs (C, W) which give us projective model structures on abelian categories with enough projectives. 3. Injective cotorsion pairs and direct limits Let (W, F ) be a cotorsion pair in R-Mod, or Ch(R), or some other Grothendieck category. Assume that W is thick; that is, assume W satisfies the two out of three property on short exact sequences. In this section we show that W must be closed under direct limits. This leads to several interesting corollaries. The proof of the proposition below is adapted from Stovicekโ€™s [Sto14, Prop. 5.3]. After studying the proof, the author simply realized that it can be reinterpreted to yield the following convenient result. Proposition 3.1. Let (W, F ) be a cotorsion pair in R-Mod with W thick. Then W is closed under direct limits. Proof. As a first step we show that W is closed under direct unions. It is in fact enough to prove this for well-ordered continuous direct unions. So assume that we have a ฮป-sequence of module monomorphisms X0 ึ’โ†’ X1 ึ’โ†’ X2 ึ’โ†’ ยท ยท ยท ึ’โ†’ Xi ึ’โ†’ Xi+1 ึ’โ†’ ยท ยท ยท with Xi โˆˆ W for each i < ฮป. Then each Xi+1 /Xi โˆˆ W by the thickness hypothesis. Since the diagram of modules is assumed continuous we see that its colimit is the same thing as the transfinite extension of the X0 , Xi+1 /Xi . Thus its colimit is DING MODULES AND COMPLEXES 7 in W by Eklofโ€™s lemma (assuming ฮป is a limit ordinal; if it is a successor ordinal ฮป = ฮฑ + 1, then the colimit coincides with Xฮฑ โˆˆ W). Step two: We show that W is closed under direct limits. Again, it is enough to prove this for well-ordered continuous direct limits. (See [AR94, Section 1.6], especially Corollary 1.7 and the Remark that follows it where well-ordered direct limits are referred to as chains and continuous well-ordered direct limits as smooth chains.) So we consider a ฮป-diagram f0,1 f1,2 f2,3 fi,i+1 โ†’ ยทยทยท X0 โˆ’โˆ’โ†’ X1 โˆ’โˆ’โ†’ X2 โˆ’โˆ’โ†’ ยท ยท ยท Xi โˆ’โˆ’โˆ’โˆ’โ†’ Xi+1 โˆ’ with each Xi โˆˆ W and Xฮณ = limi<ฮณ {Xi , fi,i+1 } for each limit ordinal ฮณ < ฮป. Our โˆ’โ†’ job is to show that limi<ฮป Xi โˆˆ W. We will assume ฮป is a limit ordinal, for otherwise โˆ’โ†’ the direct limit just equals Xฮปโˆ’1 โˆˆ W. Following a standard way for defining direct limits (for example, see [Sten75, Prop IV.8.4, p.100]), limi<ฮป Xi is the cokernel of โˆ’โ†’ L L โ†’ i<ฮป Xi where the first direct sum is the following homomorphism: i<j Xij โˆ’ taken over all pairs i < j < ฮป, and Xij = Xi is just a copy of the domain of the map fij Xi โˆ’โˆ’โ†’ Xj , and the map is defined on the ith coordinate by xi 7โ†’ ei xi โˆ’ ej fij xi where the ei denotes L the canonical injection into the coproduct. In other words, the direct limit is ( i<ฮป Xi )/K where K is the image of this map: K = < ei xi โˆ’ ej fij xi | xi โˆˆ Xi and i < j < ฮป > Note that since the maps ei and fij are linear we have that K is the set of all finite sums of the form ei xi โˆ’ ej fij xi where the xi range through Xi and i < j ranges through all i < j < ฮป. There is a short exact sequence โІ M 0โˆ’ โ†’Kโˆ’ โ†’ โ†’ 0, Xi โˆ’ โ†’ lim Xi โˆ’ โˆ’โ†’ i<ฮป i<ฮป and since W is closed under direct sums and is thick, it is enough to show that K โˆˆ W. We now show that K is a direct union (not well ordered, but still a direct union) of modules in W. So the proof will follow from the above Step 1. Thinking of ฮป as the set of all its smaller ordinals we define, for each finite subset J โІ ฮป with |J| > 1, the mapping M M Xi โˆ’ โ†’ Xi ฯ†J : iโˆˆJ\{j} i<ฮป where j denotes the maximum element of the finite subset J, and the map is defined on the ith coordinate via xi 7โ†’ ei xi โˆ’ej fij xi . One now verifies each of the following: (1) S = {J โІ ฮป | 1 < |J| < ฯ‰} is a directedLposet and there is a functor D:Sโˆ’ โ†’ R-Mod defined on objects by J 7โ†’ iโˆˆJ\{j} Xi , and on arrows by taking an inclusion J โІ J โ€ฒ to the map DJJ โ€ฒ defined on the ith coordinate as follows: xi 7โ†’ ei xi if j = j โ€ฒ (that is, just a natural inclusion if J and J โ€ฒ have the same maximal element), but via xi 7โ†’ ei xi โˆ’ ej fij xi if j < j โ€ฒ . (2) Each DJJ โ€ฒ is a monomorphism. In fact it is a split monomorphism with retraction map the canonical projection. (3) Each ฯ†J is also L a split monomorphism with similar retraction. The image of ฯ†J identifies iโˆˆJ\{j} Xi with the submodule KJ = < ei xi โˆ’ ej fij xi | xi โˆˆ Xi and i โˆˆ J\{j} > . 8 JAMES GILLESPIE That is KJ is the set of all finite sums of elements of the form ei xi โˆ’ ej fij xi as i ranges through J\{j} and xi ranges through Xi . (4) The direct system of monomorphisms D : S โˆ’ โ†’ R-Mod is isomorphic via the natural transformation {ฯ†J } to the direct system of submodules KJ . The direct limit limi<ฮป D identifies with the direct union of submodules L โˆ’โ†’ S KJ โІ i<ฮป Xi . JโˆˆSS (5) K = JโˆˆS KJ . L Now since each iโˆˆJ\{j} Xi โˆˆ W, we conclude from (3), (4), (5) and Step 1 that K โˆˆ W. This completes the proof.  Of course generalizations of Proposition 3.1 to categories beyond R-Mod are possible and will be important for applications. The reader will note that the above proof holds in any Grothendieck category, giving the following generalization. Proposition 3.2. Let (W, F ) be a cotorsion pair in a Grothendieck category G with W thick. Then W is closed under direct limits. In particular, the class W of trivial objects is closed under direct limits whenever (W, F ) be an injective cotorsion pair. Proposition 3.2 has some interesting consequences that apply to each of the injective cotorsion pairs recently appearing in [BGH13, Gil12]. For example, it is shown in [BGH13] that for any ring R we have an injective cotorsion pair (W, GI) in R-Mod where GI is the class of Gorenstein AC-injective modules. The next corollary says that all modules of finite flat dimension are sent to zero in the corresponding stable homotopy category. Consequently, any Gorenstein AC-injective module is cotorsion and must be injective if it has finite flat dimension. Corollary 3.3. Let (W, F ) be an injective cotorsion pair in R-Mod or Ch(R). Then W contains all objects of finite flat dimension. Consequently, any fibrant object is cotorsion and must be injective whenever it is of finite flat dimension. Proof. Certainly W contains all projectives and hence all flat objects since these are precisely direct limits of projectives. Since W is thick and contains the flat objects it also contains all objects of finite flat dimension. The final statement follows since W โˆฉ F coincides with the class of injective objects.  Recall that a chain complex is flat if it is exact and each cycle module is a flat R-module. These complexes are categorically flat in Ch(R); they are direct limits of finitely generated projective complexes [GR99, Theorem 4.1.3]. A complex X is called DG-flat if each Xn is flat and E โŠ— X is exact whenever E is an exact chain complex of (right) R-modules. E โŠ— X is the usual tensor product of chain complexes recalled in Section 2.1. Again, the book [GR99] is a standard reference for DG-flat complexes. Corollary 3.4. Let (W, F ) be an injective cotorsion pair in Ch(R). Then each of the following hold: (1) Any exact complex Y โˆˆ F has all cotorsion cycle modules. That is, each Zn Y , and hence each Yn , is a cotorsion module. (2) If every complex in F is exact, then each DG-flat complex is in W. Here we will use the notation from [Gil04] where dg Ce denotes the class of all complexes C with each Cn cotorsion and with the property that all chain maps F โˆ’ โ†’ C are null homotopic whenever F is a flat chain complex. It turns out that DING MODULES AND COMPLEXES 9 dg Ce is precisely the right Ext orthogonal to the class of flat complexes. That is, dg Ce is really the class of cotorsion objects in the category of complexes. e Proof. For (1), we have that Y is cotorsion by Corollary 3.3. That is, Y โˆˆ dg C. The result now follows from [Gil04, Theorem 3.12] which tells us that the exact complexes in dg Ce are precisely the ones with cotorsion cycle modules. For (2), in the case that every complex Y โˆˆ F is exact we have Ext1Ch(R) (S n (P ), Y ) โˆผ = Ext1R (P, Zn Y ) = 0 for each projective module P . So S n (P ) โˆˆ W for each projective P , and hence S n (F ) โˆˆ W for each flat module F . But it follows from [Gil07, Prop. 3.8] that each DG-flat complex is a retract of a transfinite extension of complexes of the form S n (F ) with F flat. Applying the well known Eklofโ€™s lemma, we conclude that all DG-flat complexes are in W, proving (2).  Going back to the Gorenstein AC-injective modules appearing before Corollary 3.3, we get the following corollary. Corollary 3.5. Any chain complex X of Gorenstein AC-injective modules is in e Consequently, any exact complex of Gorenstein AC-injectives must have codg C. torsion cycle modules. Proof. We refer to [Gil12, Proposition 7.2]. It shows that there is an injective cotorsion pair in Ch(R) whose right side consists of the class of all complexes of Gorenstein AC-injective modules. The rest follows from what we already observed above.  Note that Corollary 3.5 implies Stovicekโ€™s original result that any exact complex of injectives must have cotorsion cycle modules. However, the reader familiar with [Sto14] will realize that our methods are just a generalization of those employed by Stovicek. These methods however donโ€™t dualize. So the following result is quite interesting. It is the dual of Stovicekโ€™s result, assuming R is a coherent ring. Theorem 3.6. Let R be a coherent ring and P an exact complex of projectives. Then Ext1R (Zn P, A) = 0 for any absolutely pure module A. Consequently, any cycle Zn P must be a retract of a transfinite extension of finitely presented modules. Proof. Since P is exact, we have Ext1R (Zn P, A) = Ext1Ch(R) (P, S 0 (A)), and so we can instead show that Ext1Ch(R) (P, S 0 (A)) = 0 for all absolutely pure A. But it is enough to show Hom(P, S 0 (A)) = HomR (P, A) is exact whenever P is an exact complex of projectives and A is absolutely pure. Let D denote the class of all absolutely pure R-modules, and C denote the class of all flat (right) R-modules. Since R is coherent we have that (C, D) forms a perfect duality pair with respect to the character modules of Section 2.4. Therefore, by [BGH13, Theorem A.6], HomR (P, A) is exact for all absolutely pure A if and only if F โŠ—R P is exact for all flat F . But certainly this is true. The last statement holds since the โ€œsetโ€ S, of all finitely presented modules, cogenerates the complete cotorsion pair (โŠฅ (S โŠฅ ), S โŠฅ ) and S โŠฅ is precisely the class of all absolutely pure modules.  10 JAMES GILLESPIE Remark. Suppose R is any ring in which all level modules have finite flat dimension. Then the above argument will extend to show Ext1R (Zn P, A) = 0 for all absolutely clean modules A and exact complexes of projectives P . 4. Applications to Ding injective modules and complexes This section is devoted to studying Ding injective modules and chain complexes over Ding-Chen rings. As in [Gil10], a Ding-Chen ring is a (left and right) coherent ring with R R and RR each of finite FP-injective (absolutely pure) dimension. We refer to [Gil10] for more on Ding-Chen rings and Ding injective modules although the definitions below should suffice for our purposes. Definition 4.1. We call an R-module M Ding injective if there exists an exact complex of injectives ยท ยท ยท โ†’ I1 โ†’ I0 โ†’ I 0 โ†’ I 1 โ†’ ยท ยท ยท with M = ker (I 0 โ†’ I 1 ) and which remains exact after applying HomR (A, โˆ’) for any absolutely pure module A. In the same way, we call a chain complex X Ding injective if there exists an exact complex of injective complexes ยท ยท ยท โ†’ I1 โ†’ I0 โ†’ I 0 โ†’ I 1 โ†’ ยท ยท ยท with X = ker (I 0 โ†’ I 1 ) and which remains exact after applying HomCh(R) (A, โˆ’) for any absolutely pure chain complex A. Recall that a chain complex I is injective (resp. absolutely pure) in Ch(R) if and only if it is exact and each cycle Zn I is an injective (resp. absolutely pure) module. The content of Corollaries 4.3 and 4.4 is that the Hom condition in the above definitions come automatically when R is a Ding-Chen ring. In fact, for the module case, we have the following stronger statement. Theorem 4.2. Let R be a Ding-Chen ring. Then M is Ding injective if and only if M = Z0 I for some exact complex I of Ding injective R-modules. That is, any exact complex of Ding injectives automatically has Ding injective cycles. Proof. Since R is Ding-Chen, the modules of finite flat dimension coincide with the modules of finite absolutely pure dimension [DC93]. Denote this class by W. We have that (W, DI) is an injective cotorsion pair, where DI is the class of all Ding injective modules; see [DM07, Theorem 3.4] and [Gil10, Corollary 4.5]. f exDI) f By [Gil12, Prop. 7.2] it lifts to another injective cotorsion pair (โŠฅ exDI, f is the class of all exact complexes of Ding injectives. By on Ch(R), where exDI f for each flat module F and hence Corollary 3.4 (2) we have that S n (F ) โˆˆ โŠฅ exDI f we have for each F of finite flat dimension. Thus for all W โˆˆ W and I โˆˆ exDI 1 1 n 0 = Ext (S (W ), I) = ExtR (W, Zn I). Hence each Zn I must be Ding injective.  Since injective modules are Ding injective we deduce the following corollary. Corollary 4.3. [Sto14, Prop. 7.9] Let R be a Ding-Chen ring. Then M is Ding injective if and only if M = Z0 I for some exact complex I of injective R-modules. Therefore, for any absolutely pure A, any exact complex I of injectives will remain exact after applying HomR (A, โˆ’). DING MODULES AND COMPLEXES 11 It was shown by Yang, Liu, and Liang in [YLL13] that the Ding injective complexes are precisely the complexes X for which each Xn is Ding injective and all chain maps A โˆ’ โ†’ X are null homotopic whenever A is an absolutely pure (FPinjective) chain complex. We now show that the null homotopy condition is automatic when R is a Ding-Chen ring. Corollary 4.4. Let R be a Ding-Chen ring. Then a complex X is Ding injective if and only if each Xn is a Ding injective R-module. Proof. The โ€œonly ifโ€ part is easy from the definition of Ding injective. For the converse, we use that for any coherent ring R, the Ding injective cotorsion pair f dwDI) f on Ch(R), (W, DI) on R-Mod lifts to an injective model structure (โŠฅ dwDI, f by [Gil12, Proposition 7.2]. Here, dwDI is the class of all complexes of Ding injective modules. From Corollary 3.3 we have that each complex of finite flat f But in the case that R is Ding-Chen, it is easy to see that dimension is in โŠฅ dwDI. any absolutely pure complex A has finite flat dimension. Indeed such an A is an exact complex with each cycle module Zn A absolutely pure. Thus each Zn A has finite flat dimension. Now taking a flat resolution of A, the upper bound on the f flat dimensions implies that A itself has finite flat dimension. Hence A โˆˆ โŠฅ dwDI for each absolutely pure A. It follows that Hom(A, X) is exact for any absolutely f whenever R is Ding-Chen. pure A and any complex X โˆˆ dwDI,  Remark. It was shown by Yang, Liu, and Liang in [YLL13] that the class of Ding f whenever R is Ding-Chen. So we now have injective complexes is precisely dg DI f f f = DI, f whenever R is a Ding-Chen ring. shown that both dg DI = dwDI and exDI (Again, we are using the notation from [Gil04].) 5. Complexes of projective complexes Our main purpose here is to prove Theorem 5.9, which will be our tool in Section 6 for characterizing Ding projective complexes. We get this by generalizing results in [BGH13, Appendix A], from modules to chain complexes. Since Ch(R) is itself an abelian category we can of course consider Ch(Ch(R)), the category of chain complexes of chain complexes. Using [Wei94, Sign Trick 1.2.5], the category Ch(Ch(R)) can be identified with the category of bicomplexes. However, for our purpose here it is somewhat easier to stick with the category Ch(Ch(R)). 5.1. Free chain complexes. A free R-module is one that is isomorphic to a direct sum of copies of R. Analogously, we say a chain complex F โˆˆ Ch(R) is free if it is isomorphic to a direct sum โŠ•iโˆˆI Dni (R) where each ni is some integer. Clearly this is equivalent to saying F is isomorphic to โŠ•nโˆˆZ Dn (Fn ) where each Fn is some free R-module. It is also equivalent to define F to be an exact complex with each Zn F a free R-module. However, it will be sufficient and most convenient for us to use the representations โŠ•iโˆˆI Dni (R). Evidently free complexes are closed under arbitrary direct sums. It is also easy to check that free complexes are projective objects in Ch(R), and that each projective complex P is a retract of a free complex. Lemma 5.1 (Eilenbergโ€™s swindle). Given any projective chain complex P , there exists a free chain complex F such that P โŠ• F โˆผ = F. 12 JAMES GILLESPIE Proof. We follow [Lam99, Corollary 2.7]. Since P is projective, as noted above we can find another (projective) complex Q such that P โŠ• Q is a free complex. Setting F = (P โŠ• Q) โŠ• (P โŠ• Q) โŠ• (P โŠ• Q) โŠ• ยท ยท ยท will produce a free complex as desired. Indeed โˆผ P โŠ• (Q โŠ• P ) โŠ• (Q โŠ• P ) โŠ• (Q โŠ• P ) ยท ยท ยท โˆผ F = = P โŠ• F.  We now need to study chain complexes of projective chain complexes. That is, objects of Ch(Ch(R)) with each component a projective complex. Lemma 5.2. Let R be any ring, and P โˆˆ Ch(Ch(R)) a complex of projective chain complexes. Then P is a direct summand of a complex F of free chain complexes. Furthermore, if P is exact then F can be taken to be exact. Proof. By Lemma 5.1 we may, for each Pn , find a free chain complex F n such that Pn โŠ• F n โˆผ = F n . We form F = P โŠ• (โŠ•nโˆˆZ Dn (F n )). This is a complex of complexes which in degree n is the chain complex Pn โŠ• F n โŠ• F n+1 โˆผ = F n โŠ• F n+1 , and so a free chain complex. We are done since P is a direct summand of P โŠ• (โŠ•nโˆˆZ Dn (F n )). Moreover, P โŠ• (โŠ•nโˆˆZ Dn (F n )) is exact whenever P is exact.  Theorem 5.3. Let R be any ring, and let S be the set of all bounded above complexes of finitely generated free complexes. The cotorsion pair (โŠฅ (S โŠฅ ), S โŠฅ ) in Ch(Ch(R)), cogenerated by S, is functorially complete. Moreover, C = โŠฅ (S โŠฅ ) is the class of all complexes of projective complexes. Proof. Since Ch(Ch(R)) is a Grothendieck category with enough projectives it follows from [Hov02, Corollary 6.8] that S cogenerates a functorially complete cotorsion pair (โŠฅ (S โŠฅ ), S โŠฅ ) in Ch(Ch(R)). Setting C = โŠฅ (S โŠฅ ), our aim is to show that this is precisely the class of all complexes of projective complexes. We note that S contains a set of projective generators for Ch(Ch(R)); for example, the set {Dn (Dm (R))}n,mโˆˆZ . So it follows from [Hov02, Corollary 6.9/Proof of 6.5] that โŠฅ (S โŠฅ ) is precisely the class of all direct summands of transfinite extensions of objects in S. By Lemma 5.2 we only need to show that a complex of free complexes is a transfinite extension of bounded above complexes of finitely generated free complexes. So let F be a complex of free complexes and write each Fn = โŠ•iโˆˆIn Dni (Ri ) for some indexing set In with each Ri = R. We assume that F is not (isomorphic to) a complex in S, so we can certainly find a nonzero Fn , and we then take just one summand Dnj (Rj ) for some j โˆˆ In . We start to build a bounded above subcomplex X โІ F by setting Xn = Dnj (Rj ) and setting Xi = 0 for all i > n. Now note d(Dnj (Rj )) โІ โŠ•iโˆˆInโˆ’1 Dni (Ri ) and that we can find a finite subset Lnโˆ’1 โІ Inโˆ’1 such that d(Dnj (Rj )) โІ โŠ•iโˆˆLnโˆ’1 Dni (Ri ). We set Xnโˆ’1 = โŠ•iโˆˆLnโˆ’1 Dni (Ri ). We can continue down in the same way finding Lnโˆ’2 โІ Inโˆ’2 with |Lnโˆ’2 | finite and with d(โŠ•iโˆˆLnโˆ’1 Dni (Ri )) โІ โŠ•iโˆˆLnโˆ’2 Dni (Ri ). In this way we can construct the subcomplex โ†’ ยทยทยท โ†’ โŠ•iโˆˆLnโˆ’2 Dni (Ri ) โˆ’ โ†’ โŠ•iโˆˆLnโˆ’1 Dni (Ri ) โˆ’ X = ยทยทยท โˆ’ โ†’0โˆ’ โ†’ Dnj (Rj ) โˆ’ Note that X is a nonzero bounded above complex of finitely generated free complexes. That is, X โˆˆ S. We set X0 = X. To finish the proof we will argue that we can write F as the union of a continuous chain 0 6= X0 ( X1 ( ยท ยท ยท ( Xฮฑ ( Xฮฑ+1 ( ยท ยท ยท with each Xฮฑ+1 /Xฮฑ โˆˆ DING MODULES AND COMPLEXES 13 S. So we consider F/X0 , and in the same way as above we find a bounded above subcomplex X1 /X0 โІ F/X0 consisting of finitely generated free complexes in each degree. However, we are careful to construct X1 as follows: Let L0n denote the indexing sets of the previously constructed complex X0n = โŠ•iโˆˆL0n Dni (Ri ). Note that we can identify the quotient F/X0 with a complex whose degree n entry is โŠ•iโˆˆIn โˆ’L0n Dni (Ri ). And so we may take X1 so that X1n = โŠ•iโˆˆL1n Dni (Ri ) with each L1n finite and L0n โІ L1n โІ In for each n. Continuing this process, we continue to construct an increasing union 0 6= X0 ( X1 ( X2 ( ยท ยท ยท corresponding to a nested union of subsets L0n โІ L1n โІ L2n โІ ยท ยท ยท for each n. Assuming this process doesnโ€™t terminate we set Xฯ‰ = โˆชฮฑ<ฯ‰ Xฮฑ and note that Xฯ‰ Dni (Ri ) where n = โŠ•iโˆˆLฯ‰ n ฯ‰ ฮฑ ฯ‰ ฯ‰ Ln = โˆชฮฑ<ฯ‰ Ln . Of course X and F/X are complexes of free complexes and continuing this process we can obtain an ordinal ฮป and a continuous chain 0 6= X0 ( X1 ( ยท ยท ยท ( Xฮฑ ( Xฮฑ+1 ( ยท ยท ยท with F = โˆชฮฑ<ฮป Xฮฑ and X0 , Xฮฑ+1 /Xฮฑ โˆˆ S.  5.2. Pure exact complexes of complexes. Let E : 0 โˆ’ โ†’X โˆ’ โ†’Y โˆ’ โ†’Zโˆ’ โ†’ 0 be a short exact sequence in Ch(R). We say that E is pure if for each finitely presented complex F , the sequence of abelian groups HomCh(R) (F, E), that is 0โˆ’ โ†’ HomCh(R) (F, X) โˆ’ โ†’ HomCh(R) (F, Y ) โˆ’ โ†’ HomCh(R) (F, Z) โˆ’ โ†’ 0, is also exact. Pure exact sequences of complexes can be characterized in terms of the functors Hom and โŠ— from Section 2.2. In particular, E is pure exact if and only if Hom(F, E) is a short exact sequence of complexes for each finitely presented complex F if and only if F โŠ—E is a short exact sequence of complexes for each finitely presented complex F (or just any complex F ). See [GR99, Theorem 5.1.3]. This leads us to the following notion of a pure exact complex of complexes. Definition 5.4. Let X โˆˆ Ch(Ch(R)). We say that X is a pure exact complex of complexes if the following equivalent conditions are satisfied: (1) HomCh(R) (F, X) = Hom(S 0 (F ), X) is an exact complex of abelian groups for each finitely presented chain complex F . (2) Hom(F, X) is an exact complex (of complexes of abelian groups) for each finitely presented chain complex F . (3) F โŠ—X is an exact complex (of complexes of abelian groups) for each finitely presented chain complex F . (4) F โŠ—X is an exact complex (of complexes of abelian groups) for each chain complex F . Lemma 5.5. Suppose X is a bounded complex of finitely presented complexes and Y is a pure exact complex of complexes. Then every chain map f : X โˆ’ โ†’ Y is chain homotopic to 0. Proof. Note that it is equivalent to show Hom(X, Y) is exact, where Hom is the usual hom-complex of Section 2.1 (but applied to the case of A = Ch(R) instead of the more typical application of A = R-Mod). Let m be the largest degree i for which Xi is nonzero, and let A be the subcomplex of X with Ai = Xi for i < m and Am = 0. We have a degreewise split short exact sequence 0โˆ’ โ†’Aโˆ’ โ†’Xโˆ’ โ†’ S m (Xm ) โˆ’ โ†’0 which for the given Y induces the short exact sequence 0โˆ’ โ†’ Hom(S m (Xm ), Y) โˆ’ โ†’ Hom(X, Y) โˆ’ โ†’ Hom(A, Y) โˆ’ โ†’ 0. 14 JAMES GILLESPIE Now Hom(S m (Xm ), Y) is exact by condition (1) of Definition 5.4. The long exact sequence in homology now gives us the result by induction on m.  Let (C, W) denote the cotorsion pair of Theorem 5.3. The result below tells us that pure exact complexes of complexes are in W. Theorem 5.6. Let R be any ring and let C be a complex of projective complexes. If Y is a pure exact complex of complexes, then Hom(C, Y) is exact, or, equivalently Y โˆˆ W = C โŠฅ. Proof. In view of Theorem 5.3, it suffices to assume that C is a bounded above complex of finitely generated free complexes and to show that any chain map f : C โˆ’ โ†’Y is chain homotopic to 0. We construct a chain homotopy Dn : Cn โˆ’ โ†’ Yn+1 with dDn + Dnโˆ’1 d = fn by downwards induction on n. Since C is bounded above, we can take Dn = 0 for large n to begin the induction. So we suppose that Di has been defined for i โ‰ฅ n and that dDn+1 + Dn d = fn+1 . e n still having dDn+1 + D e n d = fn+1 , The idea is to replace Dn with a new map D e and to also find a map Dnโˆ’1 such that dDn + Dnโˆ’1 d = fn . First note that (fn โˆ’ dDn )d = d(fn+1 โˆ’ Dn d) = d2 Dn+1 = 0, ฯ€ โ†’ so there is an induced map gn : Cn /Bn C โˆ’ โ†’ Yn , such that the composite Cn โˆ’ gn Cn /Bn C โˆ’โ†’ Yn equals fn โˆ’ dDn . Now consider the bounded complex X of finitely presented complexes with Xn = Cn /Bn C, Xnโˆ’1 = Cnโˆ’1 , Xnโˆ’2 = Cnโˆ’1 /Bnโˆ’1 C, and Xi = 0 for all other i. There is a chain map g : X โˆ’ โ†’ Y that is gn in degree n, fnโˆ’1 in degree n โˆ’ 1, and fnโˆ’2 dยฏ in degree n โˆ’ 2. By Lemma 5.5, this chain โ†’ Yn+1 map must be chain homotopic to 0. This gives us maps Dnโ€ฒ : Cn /Bn C โˆ’ and Dnโˆ’1 : Cnโˆ’1 โˆ’ โ†’ Yn such that dDnโ€ฒ + Dnโˆ’1 dยฏ = gn . Upon composing with ฯ€ en = Cn โˆ’ โ†’ Cn /Bn C this becomes dDnโ€ฒ ฯ€ + Dnโˆ’1 d = fn โˆ’ dDn . Now setting D โ€ฒ e Dn +Dn ฯ€, we still have the required relation dDn+1 + Dn d = fn+1 because dDn+1 + (Dn + Dnโ€ฒ ฯ€)d = dDn+1 + Dn d + 0 = fn+1 . Moreover, we have the other promised e n + Dnโˆ’1 d = fn . Indeed dD e n + Dnโˆ’1 d = d(Dn + Dโ€ฒ ฯ€) + Dnโˆ’1 d = relation: dD n โ€ฒ dDn + (dDn ฯ€ + Dnโˆ’1 d) = dDn + (fn โˆ’ dDn ) = fn .  Recall that for a complex X we have its character dual X + = HomZ (X, Q/Z). See Section 2.4. Lemma 5.7. Let C be a complex of complexes, and X a complex of right R-modules. Then XโŠ—C is exact if and only if Hom(C, X + ) is exact. Proof. XโŠ—C is exact if and only if (XโŠ—C)+ is exact. But also using parts (1) and (6) b) of [GR99, Proposition 4.2.1] we get (XโŠ—C)+ = HomZ (XโŠ—C, Q/Z) = Hom(XโŠ—C, D1 (Q/Z)) โˆผ = Hom(C, X + ). = Hom(C, Hom(X, D1 (Q/Z))) โˆผ  We need just one more lemma before proving the main theorem. Lemma 5.8. Let Y โˆˆ Ch(R) be a complex, and C โˆˆ Ch(Ch(R)) be a complex of complexes . Then Hom(C, Y ) is exact if and only if Hom(C, S n (Y )) is exact for each n. DING MODULES AND COMPLEXES 15 Proof. Pondering definitions, we see Hom(C, Y ) is the cochain complex, of complexes of abelian groups, whose degree zero entry is the complex of abelian groups ยทยทยท โ† โˆ’ HomCh(R) (ฮฃnโˆ’1 C0 , Y ) โ† โˆ’ HomCh(R) (ฮฃn C0 , Y ) โ† โˆ’ ยทยทยท (where HomCh(R) (ฮฃn C0 , Y ) is the degree n component of this complex). So to say that the overall complex is exact means that the cochain complex of abelian groups, HomCh(R) (ฮฃn C, Y ), is exact for each n. On the other hand, by again following definitions, Hom(C, S n (Y )) is isomorphic to the cochain complex, HomCh(R) (ฮฃโˆ’n C, Y ), of abelian groups. So exactness of Hom(C, S n (Y )) for all n is equivalent to exactness of Hom(C, Y ).  Now if C is a collection of chain complexes of right R-modules, and D is a collection of chain complexes of left R-modules, we say that (C, D) is a duality pair if X โˆˆ C if and only if X + โˆˆ D, and Y โˆˆ D if and only if Y + โˆˆ C. It is immediate from Corollary 2.4 that the absolutely clean and level complexes give rise to two duality pairs. One where C is the class of all absolutely clean complexes of right R-modules, and another where C is the class of all level complexes of right R-modules. Theorem 5.9. Suppose (C, D) is a duality pair in Ch(R) such that D is closed under pure quotients. Let C be a complex of projective complexes. Then XโŠ—C is exact for all X โˆˆ C if and only if Hom(C, Y ) is exact for all Y โˆˆ D. In particular, (1) AโŠ—C is exact for all absolutely clean complexes A if and only if Hom(C, L) is exact for all level complexes L. (2) LโŠ—C is exact for all level complexes L if and only if Hom(C, A) is exact for all absolutely clean complexes A. Proof. In view of Lemma 5.7, if Hom(C, Y ) is exact for all Y โˆˆ D, then XโŠ—C is exact for all X โˆˆ C. Conversely, suppose XโŠ—C is exact for all X โˆˆ C. Then if Y โˆˆ D, Y + โŠ—C is exact, and so Lemma 5.7 tells us that Hom(C, Y ++ ) is exact. We conclude that Hom(C, D) is exact for all D โˆˆ D++ , and we note that D++ โІ D since (C, D) is a duality pair. Now, for any complex Y , the natural map Y โˆ’ โ†’ Y ++ is a pure monomorphism of complexes [GR99, Proposition 5.1.4.(4)]. So if Y โˆˆ D, the quotient Y ++ /Y is also in D since D is closed under pure quotients. We can therefore create a resolution of Y โˆˆ D by elements of D++ . That is, we can find a pure exact resolution of Y by complexes of complexes in D++ . This gives us a short exact sequence 0โˆ’ โ†’ S n (Y ) โˆ’ โ†’Dโˆ’ โ†’Pโˆ’ โ†’0 in which P is pure exact and D is a bounded above complex with entries in D++ . Theorem 5.6 tells us that Hom(C, P) is exact. Hence Hom(C, D) โˆผ = Hom(C, S n (Y )). So by Lemma 5.8, it only remains to show that Hom(C, D) is exact whenever D is bounded above with components in D++ . But showing Hom(C, X) is exact for all complexes of projective complexes C, is equivalent to showing Ext1 (C, X) = 0 for all such C. By Lemma 5.8 and the first paragraph we conclude Ext1 (C, S n (D)) = 0 whenever D โˆˆ D++ . Now any bounded above complex D with entries in D++ can be seen to be an inverse transfinite extension of spheres S n (D) for some D โˆˆ D++ . By the dual of the Eklof Lemma, 16 JAMES GILLESPIE we know that Ext1 (C, โˆ’) is closed under inverse transfinite extensions [EIJ07, Theorem 1.6]. So Ext1 (C, D) = 0, whence Hom(C, D) is exact for all complexes of projective complexes C. This completes the proof. As noted above, the absolutely clean complexes and level complexes give rise to two duality pairs. Moreover, each class is closed under pure quotients by [BG15, Propositions 2.7/4.7].  6. Applications to Ding projective modules and complexes We now wish to prove the duals to Corollaries 4.3 and 4.4. They are Theorem 6.2 and Corollary 6.3 below. Definition 6.1. We call an R-module M Ding projective if there exists an exact complex of projectives ยท ยท ยท โ†’ P1 โ†’ P0 โ†’ P 0 โ†’ P 1 โ†’ ยท ยท ยท with M = ker (P 0 โ†’ P 1 ) and which remains exact after applying HomR (โˆ’, F ) for any flat module F . In the same way, we call a chain complex X Ding projective if there exists an exact complex of projective complexes ยท ยท ยท โ†’ P1 โ†’ P0 โ†’ P 0 โ†’ P 1 โ†’ ยท ยท ยท with X = ker (P 0 โ†’ P 1 ) and which remains exact after applying HomCh(R) (โˆ’, F ) for any flat chain complex F . Recall that a chain complex P is projective (resp. flat) in Ch(R) if and only if it is exact and each cycle Zn P is a projective (resp. flat) module. Theorem 6.2. Let R be a Ding-Chen ring. Then a module M is Ding projective if and only if M = Z0 P for some exact complex P of projective R-modules. In the same way, a chain complex X is Ding projective if and only if X = Z0 P for some exact complex P of projective complexes. Proof. First, we look at the R-module case. Let P be any exact complex of projectives. We need to show that HomR (P, F ) remains exact for any flat (left) module F . But by [BGH13, Theorem 6.7], and since R is coherent, it is enough to show A โŠ—R P is exact for all absolutely pure (right) modules A. Note that clearly F โŠ—R P is exact for any flat (right) module F . It follows that M โŠ—R P is exact for all M of finite flat dimension. But since R is a Ding-Chen ring, any absolutely pure module A does have finite flat dimension. So we are done. We note that a similar but alternate proof could be given, using Theorem 3.6 instead. Next, we see that the proof holds for chain complexes due to the work of Section 5. So now let P be any exact complex of projective complexes. We need to show that HomCh(R) (P, F ) remains exact for any flat (left) chain complex F . However, looking at the definition of Hom it is clear that this is equivalent to the statement that Hom(P, F ) remains exact for any flat complex F . Now by Theorem 5.9, and since R is coherent, this is equivalent to the statement that AโŠ—P is exact for all absolutely pure (right) complexes A. We note that F โŠ—P is exact for any flat (right) complex F by [GR99, Proposition 5.1.2]. It follows that XโŠ—P is exact for all complexes X of finite flat dimension. But since R is a Ding-Chen ring, any absolutely pure complex A is an exact complex with an upper bound on the flat dimensions of the Zn A. It follows that A itself is a complex of finite flat dimension. So we are done.  DING MODULES AND COMPLEXES 17 Corollary 6.3. Let R be a Ding-Chen ring. Then a complex X is Ding projective if and only if each Xn is a Ding projective R-module. Proof. The โ€œonly ifโ€ part is easy to show. For the converse, Theorem 6.2 assures us that we only need to show X equals the zero cycles of some exact complex d2 d3 P2 โˆ’โ†’ of projective complexes. Certainly we can find an exact complex ยท ยท ยท โˆ’โ†’ d1 วซ โ†’X โˆ’ โ†’ 0 with each Pi a projective complex. So it is left to extend this P1 โˆ’โ†’ P0 โˆ’ complex to the right. First note that there is an obvious (degreewise split) short exact sequence (1,d) M n+1 โˆ’d+1 0 โ†’ X โˆ’โˆ’โˆ’โ†’ D (Xn ) โˆ’โˆ’โˆ’โˆ’โ†’ ฮฃX โ†’ 0. nโˆˆZ Now each Xn is Ding projective. So we certainly can find a short exact sequence ฮฒn ฮฑn Qn โˆ’โˆ’โ†’ Yn โ†’ 0 where Qn is projective and Yn is also Ding projective. 0 โ†’ Xn โˆ’โˆ’โ†’ This gives us another short exact sequence L L n+1 n+1 M (ฮฑn ) M n+1 (ฮฒn ) M n+1 nโˆˆZ D nโˆˆZ D Dn+1 (Xn ) โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โ†’ D (Qn ) โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โ†’ D (Yn ). nโˆˆZ L nโˆˆZ nโˆˆZ (Qn ) is a projective complex and we will denote it by P 0 . Notice that nโˆˆZ D Furthermore, let ฮท : X โ†’ P 0 be the composite L n+1 (ฮฑn ) M n+1 (1,d) M n+1 nโˆˆZ D X โˆ’โˆ’โˆ’โ†’ D (Xn ) โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โˆ’โ†’ D (Qn ). n+1 nโˆˆZ nโˆˆZ Then ฮท is an monomorphism since it is the composite of two monomorphisms. Moreover, setting C 0 = cok ฮท, it follows from snake lemma that C 0 sits in the L the n+1 0 (Yn ) โ†’ 0. In particular, C 0 short exact sequence 0 โ†’ ฮฃX โˆ’ โ†’C โˆ’ โ†’ nโˆˆZ D L n+1 0 is an extension of nโˆˆZ D L(Yn ) and ฮฃX, and so C must be Ding projective n+1 in each degree since both of nโˆˆZ D (Yn ) and ฮฃX are such. Since C 0 has the same properties as X, we may continue inductively to obtain the desired resolution ฮท d0 d1 d2 0โˆ’ โ†’Xโˆ’ โ†’ P 0 โˆ’โ†’ P 1 โˆ’โ†’ P 2 โˆ’โ†’ ยท ยท ยท d d วซ 1 2 โ†’ X โ†’ 0 by P0 โˆ’ P1 โˆ’โ†’ Finally, we paste the resolution together with ยท ยท ยท โˆ’ โ†’ P2 โˆ’โ†’ setting d0 = ฮทวซ and we are done.  7. Ding flat modules and complexes As pointed out in [Gil10], there is also a natural notion of a Ding flat module, but it turns out to be equivalent to the notion of a Gorenstein flat module. We recall the definition. Definition 7.1. We call an R-module M Ding flat if there exists an exact complex of flat modules ยท ยท ยท โ†’ F1 โ†’ F0 โ†’ F 0 โ†’ F 1 โ†’ ยท ยท ยท with M = ker (F 0 โ†’ F 1 ) and which remains exact after applying A โŠ—R โˆ’ for any absolutely pure (right) R-module A. In the same way, we call a chain complex X Ding flat if there exists an exact complex of flat complexes ยท ยท ยท โ†’ F1 โ†’ F0 โ†’ F 0 โ†’ F 1 โ†’ ยท ยท ยท 18 JAMES GILLESPIE with X = ker (F 0 โ†’ F 1 ) and which remains exact after applying AโŠ—โˆ’ for any absolutely pure complex A. Proposition 7.2. Let R be any ring. A Ding flat module is nothing more than a Gorenstein flat module. Similarly, a chain complex X is Ding flat if and only if it is Gorenstein flat. A proof of the above proposition, for modules, goes back to [DM08, Lemma 2.8]. We provide a new proof which is very quick and easy. Proof. We give the proof for complexes but the same proof works for modules. Note that Ding flat complexes are clearly Gorenstein flat since injective complexes are absolutely pure. Conversely, suppose that X is a Gorenstein flat complex. By definition, this means there exists an exact complex F = ยท ยท ยท โ†’ F1 โ†’ F0 โ†’ F 0 โ†’ F 1 โ†’ ยท ยท ยท of flat complexes with X = ker (F 0 โ†’ F 1 ) which remains exact after applying I โŠ—โˆ’ for any injective complex I. We will show that this complex does in fact remain exact after applying AโŠ—โˆ’ for any absolutely pure (right) chain complex A. So let such an A be given and note that it is equivalent to show that the map of complexes AโŠ—Zn F โˆ’ โ†’ AโŠ—Fn is a monomorphism for each n. Now let A ึ’โ†’ I be an embedding into an injective complex I and note that this must be a pure monomorphism since A is an absolutely pure complex. For each n we have the commutative diagram: AโŠ—Zn F โˆ’โˆ’โˆ’โˆ’โ†’ IโŠ—Zn F ๏ฃฆ ๏ฃฆ ๏ฃฆ ๏ฃฆ y y AโŠ—Fn โˆ’โˆ’โˆ’โˆ’โ†’ IโŠ—Fn The two horizontal arrows are monomorphisms since A ึ’โ†’ I is pure. The right vertical arrow is also a monomorphism since IโŠ—F is exact. It follows that the left vertical arrow must also be a monomorphism.  Proposition 7.3. Let R be a Ding-Chen ring. Then a module M is Ding flat if and only if M = Z0 F for some exact complex F of flat R-modules. In the same way, a chain complex X is Ding flat if and only if X = Zn F for some exact complex F of flat complexes. Proof. The proof is easy and very similar to the last few sentences of the proof of Theorem 6.2. Briefly, say F is an exact complex of flat complexes; we wish to show that AโŠ— F is exact for any absolutely pure complex A. Certainly F โŠ— F is exact for any flat complex F , and, since R is a Ding-Chen ring, any absolutely pure complex A has finite flat dimension. We argue that AโŠ—F is exact for any such A.  Corollary 7.4. Let R be a Ding-Chen ring. Then a complex X is Ding flat if and only if each Xn is a Ding flat R-module. Proof. Using the above proposition, the proof of Corollary 6.3 carries over. Just replace the word projective with the word flat throughout the proof.  DING MODULES AND COMPLEXES 19 References [AR94] J. Adaฬmek and J. Rosickyฬ, Locally presentable and accessible categories, Number 189 in London Mathematical Society Lecture Note Series, Cambridge University Press, 1994. [BG15] Daniel Bravo and James Gillespie, Absolutely clean, level, and Gorenstein AC-injective complexes, preprint; arXiv:1408.7089 [BGH13] Daniel Bravo, James Gillespie and Mark Hovey, The stable module category of a general ring, submitted. [DC93] N. Ding and J. Chen, The flat dimensions of injective modules, Manuscripta Math. vol. 78, no. 2, 1993, pp. 165-177. [DC96] N. Ding and J. Chen, Coherent rings with finite self-FP-injective dimension, Comm. Algebra, vol. 24, no. 9, 1996, pp. 2963-2980. [DM05] N. Ding and L. Mao, Reletive FP-projective modules, Comm. Algebra, vol. 33, no. 5, 2005, pp. 1587-1602. [DM07] N. Ding and L. Mao, Envelopes and covers by modules of finite FP-injective and flat dimensions, Comm. Algebra, vol. 35, no. 3, 2007, pp. 833โ€“849. [DM08] N. Ding and L. Mao, Gorenstein FP-injective and Gorenstein flat modules, J. Algebra Appl. 7 (2008), no. 4, 491โ€“506. [DLM09] N. Ding and Y. Li and L. Mao, Strongly Gorenstein flat modules, J. Aust. Math. Soc. vol. 86, no. 3, 2009, pp. 323-338. [EGR97] E. Enochs and J.R. Garcฤฑฬa-Rozas, Tensor products of chain complexes, Math J. Okayama Univ. 39, 1997, pp. 19โ€“42. [EE05] E. Enochs, S. Estrada, and A. Iacob, Gorenstein projective and flat complexes over noetherian rings, Mathematische Nachrichten vol. 285, no. 7, 2012, pp. 834โ€“851. [EJ00] Edgar E. Enochs and Overtoun M. G. Jenda, Relative homological algebra, de Gruyter Expositions in Mathematics, vol. 30, Walter de Gruyter & Co., Berlin, 2000. MR 2001h:16013 [EIJ07] E. Enochs, A. Iacob, and O.M.G. Jenda, Closure under Transfinite Extensions, Illinois Journal of Mathematics vol. 51, no. 2, 2007, pp.561โ€“569. [GR99] J. R. Garcฤฑฬa-Rozas, Covers and envelopes in the category of complexes of modules, Research Notes in Mathematics no. 407, Chapman & Hall/CRC, Boca Raton, FL, 1999. [Gil04] James Gillespie, The flat model structure on Ch(R), Trans. Amer. Math. Soc. vol. 356, no. 8, 2004, pp. 3369โ€“3390. [Gil07] James Gillespie, Kaplansky classes and derived categories, Math. Zeit. vol. 257, no. 4, 2007, pp.811โ€“843. [Gil10] James Gillespie, Model structures on modules over Ding-Chen rings, Homology, Homotopy Appl. 12 (2010), no. 1, 61โ€“73. MR 2607410 (2011e:18027) [Gil12] James Gillespie, Gorenstein complexes and recollements from cotorsion pairs, preprint; arXiv 1210.0196, 2012. [Gil15] James Gillespie, How to construct a Hovey triple from two cotorsion pairs, Fundamenta Mathematicae, Vol. 230, no.3, 2015, pp. 281โ€“289. [GT06] Ruฬˆdiger Goฬˆbel and Jan Trlifaj, Approximations and Endomorphism Algebras of Modules, de Gruyter Expositions in Mathematics, vol. 41, Walter de Gruyter & Co., Berlin, 2006. [Hov02] Mark Hovey, Cotorsion pairs, model category structures, and representation theory, Mathematische Zeitschrift, vol. 241, 2002, pp.553โ€“592. [Iwa79] Y. Iwanaga, On rings with finite self-injective dimension, Comm. Algebra, vol. 7, no. 4, 1979, pp. 393-414. [Iwa80] Y. Iwanaga, On rings with finite self-injective dimension II, Tsukuba J. Math. vol. 4, no. 1, 1980, pp. 107-113. [Lam99] T. Y. Lam, Lectures on modules and rings, Graduate Texts in Mathematics, vol. 189, Springer-Verlag, New York, 1999. MR MR1653294 (99i:16001) [Sto14] Jan SฬŒtฬŒovฤฑฬcฬŒek,, On purity and applications to coderived and singularity categories, arXiv:1412.1615. [Ste70] Bo Stenstroฬˆm, Coherent rings and F P -injective modules, J. London Math. Soc. (2) 2 (1970), 323โ€“329. MR MR0258888 (41 #3533) [Sten75] Bo Stenstroฬˆm, Rings of Quotients, Die Grundlehren der mathematischen Wissenschaften in Einzeldarstellungen Band 217, Springer-Verlag, New York 1975. 20 JAMES GILLESPIE [Wei94] Charles A. Weibel, An Introduction to Homological Algebra, Cambridge Studies in Advanced Mathematics vol. 38, Cambridge University Press, 1994. [YLL11] Gang Yang, Zhongkui Liu, Li Liang, Ding Projective and Ding Injective Modules, Algebra Colloquium 20 (2013), no. 04, 601โ€“612. [YLL13] Gang Yang, Zhongkui Liu, and Li Liang, Model structures on categories of complexes over Ding-Chen rings, Communications in Algebra, vol. 41, 2013, pp. 50โ€“69. [YL11] Gang Yang and Zhongkui Liu, Cotorsion pairs and model structures on Ch(R), Proc. Edinb. Math. Soc. (2) vol. 54, no. 3, 2011, pp. 783โ€“797. Ramapo College of New Jersey, School of Theoretical and Applied Science, 505 Ramapo Valley Road, Mahwah, NJ 07430 E-mail address, Jim Gillespie: [email protected] URL: http://pages.ramapo.edu/~jgillesp/
0math.AC
Beyond Highway Dimension: Small Distance Labels Using Tree Skeletonsโˆ— Adrian Kosowski and Laurent Viennot arXiv:1609.00512v2 [cs.DS] 12 Dec 2016 Inria Paris and IRIF, Universiteฬ Paris Diderot, France Abstract The goal of a hub-based distance labeling scheme for a network G = (V, E) is to assign a small subset S(u) โІ V to each node u โˆˆ V , in such a way that for any pair of nodes u, v, the intersection of hub sets S(u) โˆฉ S(v) contains a node on the shortest uv-path. The existence of small hub sets, and consequently efficient shortest path processing algorithms, for road networks is an empirical observation. A theoretical explanation for this phenomenon was proposed by Abraham et al. (SODA 2010) through a network parameter they called highway dimension, which captures the size of a hitting set for a collection of shortest paths of length at least r intersecting a given ball of radius 2r. In this work, we revisit this explanation, introducing a more tractable (and directly comparable) parameter based solely on the structure of shortest-path spanning trees, which we call skeleton dimension. We show that skeleton dimension admits an intuitive definition for both directed and undirected graphs, provides a way of computing labels more efficiently than by using highway dimension, and leads to comparable or stronger theoretical bounds on hub set size. Key Words: Distance Labeling, Highway Dimension, Shortest Path Tree, Skeleton Dimension 1 Introduction The task of efficiently processing shortest path queries to a graph has been studied in a plethora of settings. One interesting observation is that for many real-world graphs of small degree in a geometric or geographical setting, such as road networks, it is possible to design compact data structures and schemes for efficiently answering shortest path queries. The general principle of operation of this approach consists in detecting and storing subsets of so-called transit nodes, which appear on shortest paths between many node pairs. In an attempt to explain the efficiency of variants of the transit node routing (TNR) algorithm [13,14], Abraham et al. [7] introduced the concept of highway dimension h. This parameter captures the intuition that when a map is partitioned into regions, all significantly long shortest paths out of each region can be hit by a small number of transit node vertices. The value of h is presumed to be a small constant e.g. for road networks. However, the definition of highway dimension relies on the notion of a hitting set of shortest path sets within network neighborhoods, and hence, e.g., exact computation of the parameter is known to be NP-hard even for unweighted networks [20]. This motivates us to look at other measures, which are both more locally defined and computationally tractable, while capturing essentially the same (or more) characteristics of the networkโ€™s amenability to shortest path queries. โˆ— Supported by Inria project GANG, ANR project DESCARTES, and NCN grant 2015/17/B/ST6/01897. 1 Looking more precisely at the TNR algorithm, one observes that it is built around the idea that for every source node, the set of transit nodes which are the first to be encountered when going a long way from the source, is small. This is a weaker assumption than the existence of a small hitting set for the set of shortest paths in a given network neighborhood, since different source nodes could use different transit nodes resulting in an overall large number of transit nodes around a given region. This source-centered approach leads us to the definition of skeleton dimension k , to which we devote the remainder of this paper. Informally, the skeleton dimension is the maximum, taken over all nodes u of the graph and all radii r > 0, of the number of distinct nodes at distance r from u in the set of all shortest paths originating at u and having length at least 3r/2.1 In transit node parlance, it states that the paths from u that extend by r/2 at least outside the disk of radius r pass through at most k transit nodes at the disk border. This property ensures that each shortest-path spanning tree is built around a core skeleton with at most k branches at a given distance range while the rest of the branches are relatively short. Bounding tree skeletons turns out to encompass a larger class of constant-degree graphs than the shortest path cover approach used in the definition of highway dimension, while still ensuring the existence of efficient labeling schemes. Motivated by applications in distributed algorithms and distributed data representation, we will display the link between small skeleton dimension of a graph and efficient processing of shortest path queries using the framework of distance labeling. Distance labeling schemes, popularized by Gavoille et al. [21], are among the most fundamental distributed data structures for graph data. Within distance labeling, we work with the most basic framework of transit-node based schemes, namely so-called hub labelings, cf. [5] (this framework was first described in [18] under the name of 2-hop covers, and is also referred to as landmark labelings [8]). In this setting, each node u โˆˆ U stores the set of its distances to some subset S(u) โІ V of other nodes of the graph. Then, the computed distance value d0 (u, v) for a queried pair of nodes u, v โˆˆ V is returned as: d0 (u, v) := min d(u, w) + d(w, v), wโˆˆS(u)โˆฉS(v) (1) where d denotes the shortest path distance function between a pair of nodes. The computed distance between all pairs of nodes u and v is exact if set S(u) โˆฉ S(v) contains at least one node on some shortest u โˆ’ v path. This property of the family of sets (S(u) : u โˆˆ V ) is known as shortest path cover. The hub-based method of distance computation is in practice effective for two reasons. First of all, for transportation-type networks it is possible to show bounds on the sizes of sets S, which follow from the network structure. Notably, considering networks of bounded highway dimension h, Abraham et al. [7] show that an appropriate cover of all shortest paths in the graph can be achieved using sets S of size e e O(h), where the O-notation conceals logarithmic factors in the studied graph parameters. Moreover, the order in which elements of sets S(u) and S(v) is browsed when performing the minimum operation is relevant, and in some schemes, the operation can be interrupted once it is certain that the minimum has been found, before probing all elements of the set. This is the principle of numerous heuristics for the exact shortest-path problem, such as contraction hierarchies and algorithms with arc flags [15, 25]. 1.1 Results and Organization of the Paper In Section 2, we formally define skeleton dimension k , and show that in the so-called continuous representation of the graph, the skeleton dimension is at most highway dimension, i.e. it satisfies the bound k โ‰ค h. In all cases, k = O(h) for graphs of bounded maximum degree. On the other hand, we show that 1 One may also define skeleton dimension with a different choice of constants, considering the set of shortest paths having length at least ฮฑr, where ฮฑ โˆˆ (1, 2) is an absolute constant. The choice of ฮฑ = 3/2 is subsequently necessary only for establishing relations with highway dimension. 2 skeleton dimension provides a better explanation for small hub set size in Manhattan-type networks than highway dimension. In particular, we provide a natural example of a weighted grid with k = O(log n) โˆš and h = โ„ฆ( n). In Section 3, we show how to construct efficient hub labelings for networks of small skeleton dimension. The hub set sizes we obtain for a graph of weighted diameter D are bounded by O(k log D) on average and O(k log log k log D) in the worst case (cf. Corollaries 1 and 3, respectively), as compared to previous best bounds of O(h log h log D) for labels computable in polynomial time based on highway dimension. Our labeling technique, based on picking hubs through a random selection process on a subtree of the shortest-path tree, allows each node to compute its hub set independently in almost-linear time, and appears to be of independent interest. In particular, as an extension of our technique, we provide in Section 4 improved bounds on label size (in general unweighted graphs) for the so-called ฮด-preserving distance labeling problem, in which the considered distance queries are restricted to nodes at distance at least ฮด from each other. The hub sets constructed using the hub-based method have average size O(n/ฮด). e โˆšn), and bounded by Their worst-case size is also bounded by O(n/ฮด) up to some threshold ฮด = O( O(log ฮด + (n/ฮด) log log ฮด) in general (Theorem 2). This improves upon previous ฮด-preserving schemes, including the previously best result from [10], where hub sets of worst-case size O((n/ฮด) log ฮด) are constructed by a more direct application of the probabilistic method to sets of randomly sampled vertices. Finally, in Sections 5, 6, and 7 we provide some concluding remarks on the computability of the proposed parameter of skeleton dimension, as well as its possible generalizations and applications. 1.2 Other Related Work Distance Labelings. The distance labeling problem in undirected graphs was first investigated by Graham and Pollak [23], who provided the first labeling scheme with labels of size O(n). The decoding time for labels of size O(n) was subsequently improved to O(log log n) by Gavoille et al. [21] and to O(logโˆ— n) by Weimann and Peleg [29]. Finally, Alstrup et al. [11] present a scheme for general graphs with decoding in O(1) time using labels of size log2 3 n + o(n) bits. This matches up to low order terms the space of the currently best know distance oracle with O(1) time and log2 3 n2 + o(n2 ) total space in a centralized memory model, due to Nitto and Venturini [27]. For specific classes of graphs, Gavoille et โˆš al. [21] described a O( n log n) distance labeling for planar graphs, together with โ„ฆ(n1/3 ) lower bound โˆš for the same class of graphs. Additionally, O(log2 n) upper bound for trees and โ„ฆ( n) lower bound for sparse graphs were given. Distance Labeling with Hub Sets. For a given graph G, the computational task of minimizing the sizes of hub sets (S(u) : u โˆˆ V ) for exact distance decoding is relatively well understood. A O(log n)approximation algorithm for minimizing the average size of a hub set having the sought shortest path cover property was presented in Cohen et al. [18], whereas a O(log n)-approximation for minimizing the largest hub set at a node was given more recently in Babenko et al. [12]. Rather surprisingly, the structural question of obtaining bounds on the size of such hub sets for specific graph classes, such as graphs of bounded degree or unweighted planar graphs, is wide open. ฮด-preserving Labeling. The notion of ฮด-preserving distance labeling, first introduced by Bollobaฬs et al. [16], describes a labeling scheme correctly encoding every distance that is at least ฮด. [16] presents such a ฮด-preserving scheme of size O( nฮด log2 n). This was recently improved by Alstrup et al. [10] to a ฮด-preserving scheme of size O( nฮด log2 ฮด). Together with an observation that all distances smaller than n ฮด can be stored directly, this results in a labeling scheme of size O( nx log2 x), where x = loglogm+n . For n sparse graphs, this is o(n). 3 Road networks. Highway dimension h guarantees the existence of distance labels of size O(h log D) where D is the weighted diameter of the graph [7]. However, when restricting to polynomial time algorithms, such labels can only be approximated within a log n factor using shortest path cover algorithms [7] or a log h factor with a more involved procedure based on VC-dimension [3]. In any case, this requires an all-pair shortest path computation. For large networks, labels can be practically computed when classical heuristics such as contraction hierarchies (CH) can be performed [4, 6, 7]. Low highway dimension guarantees that there exists an elimination ordering for CH such that the graph produced has bounded size [7]. However, it does not ensure running time faster than all pair shortest path computation. Besides highway dimension, skeleton dimension is also related to the notion of reach introduced in [24] and also used in the RE algorithm [22]. The reach of a node v on a path P is the minimum distance to an extremity of P , and the reach of v is its maximum reach over all shortest paths P containing v. Efficient algorithms are obtained by pruning nodes with small reach during Dijkstra search. Similarly, we obtain the skeleton of a tree by pruning nodes whose reach (in the tree) is less than half of their distance to the root. 1.3 Notation and Parameters We consider a connected undirected graph G and a non-negative length function ` : E(G) โ†’ R+ . Let n denote the number of nodes in V (G). We let `(P ) denote the length of a path P under the given length function. Given two nodes u and v, we assume that there is a unique shortest path Puv between them. This common assumption can be made without loss of generality, as one can perturb the input to ensure uniqueness. Given two nodes u and v, their distance is dG (u, v) = `(Puv ). Let D = maxu,v dG (u, v) denote the diameter of G. For u โˆˆ V (G) and r > 0, the ball BG (u, r) of radius r centered at u is the set of nodes v with dG (u, v) โ‰ค r. In this paper, we assume that ` is non-negative and integral. The notions presented here easily extend to non-negative real lengths, but we use integer lengths for a cleaner exposition of algorithms and theorems. We also recall two structural parameters, which have application to networks in a geometric setting or low-dimensional topological embedding: highway dimension and doubling dimension. For r > 0, let PG (r) denote the collection of all shortest paths P with 2r < `(P ) โ‰ค r in G. For u โˆˆ V (G), we consider the collection PG (u, r) = {P โˆˆ Pr (G) | P โˆฉ BG (u, r) 6= โˆ…} of shortest paths around u. A hitting set for PG (u, r) is a set H of nodes such that any path in PG (u, r) contains a node in H. In [3], the highway dimension of G is defined as the smallest h such that PG (u, r) has a hitting set of size at most h for all u, r. (This definition is slightly less restrictive than that of [7] while allowing to prove similar results with improved bounds.) The notion of highway dimension is related to that of doubling dimension. Recall that a graph is h-doubling if any ball can be covered by at most h balls of half the radius. That is, for all u, r, there exists H with |H| โ‰ค h such that BG (u, r) โІ โˆชvโˆˆH BG (v, 2r ). It is shown in [7] that if the geometric realization of a graph G has highway dimension h, then G is h-doubling. Informally, the geometric e can be seen as the โ€œcontinuousโ€ graph where each edge is seen as infinitely many vertices realization G of degree two with infinitely small edges, such that for any uv โˆˆ E(G) and t โˆˆ [0, 1], there is a node in e at distance t`(u, v) from u on edge uv. (The proof in [7] consists in proving that any node in BG (u, r) G e and holds also for the highway dimension is at distance at most 2r from any hitting set of PGe (u, r) in G definition of [3].) 2 A Presentation of Skeleton Dimension We start by providing a standalone definition of skeleton dimension based on size of cuts in shortest path trees, and then show its relation to the previously considered parameters of highway and doubling dimension. 4 2.1 Definition of the Parameter Tree skeleton. Given a tree T rooted at node u with length function ` : E(T ) โ†’ R+ , we treat it as directed from root to leaves and consider the geometric realization Te of this directed graph. We define the reach of v โˆˆ V (Te) as Reach Te (v) := maxxโˆˆV (Te) dTe (v, x). We then define the skeleton T โˆ— of T as the subtree of Te induced by nodes with reach at least half their distance from the root. More precisely, T โˆ— is the subtree of Te induced by {v โˆˆ V (Te) | Reach Te (v) โ‰ฅ 12 dTe (u, v)}. Width of a tree. The width of a tree T with root u is defined as the maximum number of nodes (points) in Te at a given distance from its root. More precisely, the width of T is Width(T ) = maxr>0 | Cut r (Te)| where Cut r (Te) is the set of nodes v โˆˆ V (Te) with dTe (u, v) = r. Skeleton dimension. The skeleton dimension k of a graph G is defined as the maximum width of the skeleton of a shortest path tree, that is k = maxuโˆˆV (G) Width(Tuโˆ— ), where Tu denotes the shortest path tree of u obtained as the union of shortest paths from u to all v โˆˆ V (G). We remark that, under the assumption of scale-invariance of the graph, different cuts of the tree skeleton have similar width, and the definition of the skeleton dimension is a meaningful measure of the structure of the tree. A smoothed (integrated) variant of skeleton dimension is also discussed further on, cf. Eq. (2). 2.2 Skeleton Dimension is at most (Geometric) Highway Dimension e of a graph G has highway dimension hฬƒ, then G has skeleton Claim 1. If the geometric realization G dimension k โ‰ค hฬƒ. Proof. Consider a node u and the skeleton Tuโˆ— of its shortest path tree Tu . For r > 0, consider the cut Cut r (Tuโˆ— ). For ฮต > 0 sufficiently small, Cut r (Tuโˆ— ) and Cut rโˆ’ฮต (Tuโˆ— ) have same size. Now, for v โˆˆ Cut rโˆ’ฮต (Tuโˆ— ), consider a node x in Tu such that dTu (v, x) = Reach Tu (v). The shortest path Pvx intersects BG (u, r) and has length `(Pvx ) = Reach Tu (v) โ‰ฅ r/2+ฮต > r/2. Pvw is thus in PGe (u, r). For each node in Cut rโˆ’ฮต (Tuโˆ— ), we get a similar path in PGe (u, r). All these paths are pairwise node-disjoint as they belong to disjoint sub-branches of Tu . Their number is thus upper-bounded by the size of any hitting set of PGe (u, r). We then get |Cut r (Tuโˆ— )| โ‰ค hฬƒ for all u, r and the skeleton dimension of G is at most hฬƒ. Note that a (discrete) graph G has highway dimension h โ‰ค hฬƒ, where hฬƒ is the highway dimension of e In road networks it is expected that the continuous and the discrete versions its geometric realization G. of highway dimension coincide almost exactly, in particular due to the constant maximum degree and bounded length of edges in these graphs. In a more general setting, one can easily show hฬƒ โ‰ค (โˆ† + 1)h where โˆ† is the maximum degree of G, with a star being a worst-case example. (Indeed, a hitting set H of PG (u, r) may miss some shortest path P โˆˆ PGe (u, r). Making P longer to have extremities in V (G) transforms it into a path of PG (u, r) that is hit by H. It is thus possible to hit all PGe (u, r) by adding at most one node per edge adjacent to a node in H.) We remark that the extended tech-report version [2] of [7] introduces a modified notion of highway dimension, in a way more closely related to its geometric variant, which we can denote here as hโˆ— . For this modified parameter, we have: k โ‰ค hโˆ— โ‰ค hฬƒ โ‰ค 2hโˆ— , where the first inequality follows from an analysis similar to the proof of Claim 1, while the latter two are shown in [2][Section 11]. 5 2.3 Low Skeleton Dimension Implies Low Doubling Dimension It is known [7] that a graph having a geometric realization with highway dimension hฬƒ is at most hฬƒdoubling. However, the relation k โ‰ค hฬƒ need not be tight, and it turns out that the link between skeleton dimension and doubling dimension holds in a slightly weaker form. Proposition 1. If a graph G has skeleton dimension k , then G is (2 k +1)-doubling. Proof. We show the stronger requirement that each ball of radius 19r/9 can be covered by 2 k +1 balls of radius r. For u โˆˆ V (G), consider the shortest path tree Tu of u. For r0 > 0, consider the set Cr0 of the edges containing a node in Cut r0 (Tuโˆ— ) and let Ir0 = {w | vw โˆˆ Cr0 and dG (u, w) โ‰ฅ r0 } be the (at most k ) far extremities of edges cutting distance r0 in the skeleton of Tu . Each node v at distance greater than 23 r0 from u is descendant in Tu of a node x โˆˆ Ir0 by skeleton definition and is thus in BG (x, r) if dG (u, v) โ‰ค r0 + r. Considering r0 = 2r/3, we obtain that any node v with r < dG (u, v) โ‰ค 35 r is at distance at most r from a node in I2r/3 . Similarly any node v with 53 r < dG (u, v) โ‰ค 19 9 r is at distance at most r from a node in I10r/9 . The ball BG (u, 19r/9) is thus covered by balls of radius r centered at the at most 2 k +1 nodes in {u} โˆช I2r/3 โˆช I10r/9 . 2.4 Separating Skeleton Dimension and Highway Dimension We now provide a family of graphs which exhibit an exponential gap between skeleton and highway dimensions, in a setting directly inspired by Manhattan-type road networks. The idea is to consider the usual square grid and define edge lengths, which give priority to certain transit โ€œarteriesโ€. In our example, paths using edges whose coordinates are multiples of high powers of 2 have slightly lower transit times. For L > 0, let GL denote the 2L ร— 2L grid with length function ` defined as follows. We identify a node with its coordinates (x, y) with 1 โ‰ค x โ‰ค 2L and 1 โ‰ค y โ‰ค 2L . We consider small length perturbations pxy for every horizontal edge {(x, y), (x + 1, y)} and qxy for every vertical edge {(x, y), (x, y + 1)}, and define Q = 1 + maxx,y max{pxy , qxy }. These non-negative integers will be chosen to ensure uniqueness of shortest paths. For x = 2i x0 with 0 โ‰ค i โ‰ค L and x0 odd, we define `((x, y), (x + 1, y)) = Q((D + 2)L โˆ’ i) โˆ’ qxy for all y where D = 2L+3 . For y = 2j y 0 with 0 โ‰ค j โ‰ค L and y 0 odd, we define `((x, y), (x, y + 1)) = Q((D + 2)L โˆ’ j) โˆ’ pxy for all x. A possible choice for perturbations ensuring uniqueness of shortest paths is pxy = 0 and qxy = x for all x, y as will be clear later on. โˆš Proposition 2. For any L > 0, grid GL has highway dimension โ„ฆ( n) and skeleton dimension O(log n), where n = 22L is the number of nodes in GL . Proof. We first prove that the shortest paths of GL are also shortest path of the 2L ร— 2L grid UL with unit edge lengths, that is those paths that use a minimum number of edges. Any path P with p edges has length at most pQ(D + 2)L and at least pQ((D + 2)L โˆ’ L โˆ’ 1) โ‰ฅ pQDL. Given two nodes u and v, let p denote the minimum number of edges of a path from u to v and let q denote the number of edges of the shortest path Puv from u to v in GL . We then have p โ‰ค q โ‰ค p(D+2)L โ‰ค p + 12 since p โ‰ค 2L+1 = D/4. DL This implies q = p. Puv is thus a shortest path of the grid UL . Note that balls must then also be almost identical: for all u, p, we have BGL (u, pQ(D + 2)L) = BUL (u, p). โˆš โˆš This implies that the highway dimension of GL is โ„ฆ( n) since the ball of radius r = Q(D +2)L n โˆš โˆš centered at (1, 1) intersects at least n horizontal shortest paths of length QDL n > r/2 at least. We define the 2i ร— 2j rectangle R at (x, y) with odd x and y as the set of nodes with coordinates (x0 , y 0 ) such that 2i x โ‰ค x0 โ‰ค 2i (x+1) and 2j y โ‰ค y 0 โ‰ค 2j (y +1). Its border is the set of nodes for which one inequality at least is indeed an equality. Other nodes are said to be interior. The main argument for bounding skeleton dimension is that a shortest path from u = (x0 , y 0 ) with x0 < 2i x and y 0 < 2j y cannot 6 traverse the interior of R: a shortest path passing through an inner node of R necessarily ends inside R. The reason is that such a path necessarily passes through the lower left corner at (2i x, 2j y). It is then shorter to reach a border node by following the border rather than using edges inside the rectangle. Note that two possible choices of shortest paths could be possible when going from a corner of a 2i ร— 2i rectangle to the corner diagonally opposed. However the choice of perturbing lengths by decreasing the length of any vertical edge in position (x, y) by qxy = x ensures that the path through the rightmost side is preferred. j k r Now consider a node u = (x, y) and a radius r with 2i QDL โ‰ค r < 2i+1 QDL. Set p = QDL . According to the first part of the proof, the ball BGL (u, r) is in sandwich between the balls of radius p and p + 1 in UL : BUL (u, p) โІ BGL (u, r) โІ BUL (u, p + 1). We first consider the upper right quadrant of BUL (u, p) and the border set SU R of nodes v = (x + a, y + b) with a, b โ‰ฅ 0 and a + b = p. We now bound the number of nodes v โˆˆ SU R such that Reach Tu (v) > 2r where Tu denote the shortest path tree of u in GL . As 2r โ‰ฅ 2iโˆ’1 QDL, such a node v cannot be interior to a 2iโˆ’2 ร— 2iโˆ’2 rectangle as shortest paths interior to the rectangle have length at most (2iโˆ’1 โˆ’ 4)Q(D + 2)L. The number of nodes in SU R whose x coordinate is a multiple of 2iโˆ’2 is bounded by 8 as p < 2i+1 . Similarly, the number of nodes whose y coordinate is a multiple of 2iโˆ’2 is also bounded by 8. Apart from these 16 nodes, we have to consider nodes v = (x0 , y 0 ) where x0 (resp. y 0 ) is less than the smallest multiple of 2iโˆ’2 greater than x (resp. y). Such a node cannot be interior to a 2j ร— 2iโˆ’2 (resp. 2iโˆ’2 ร— 2j ) rectangle for j โ‰ค i โˆ’ 3. For j = i โˆ’ 3, we obtain at most two nodes whose x coordinate is a multiple of 2j . By repeating the argument for j = i โˆ’ 4..1, we can finally bound the number of nodes v โˆˆ SU R with reach greater than fu r/2 by 4(i โˆ’ 3) + 16 = 4(i + 1). Nodes in the upper right quadrant that are at distance r from u in T โˆ— must be on edges outgoing from nodes in SU R and Cut r (Tu ) has thus size at most 8(i + 1) = O(log n). By symmetry, the bound holds for other quadrants and the skeleton dimension of GL is O(log n). We remark that there exist different lengths functions on the grid for which the skeleton dimension โˆš is also as large as ฮ˜( n). This is the case, for example, for a grid with unit lengths of all edges except for edges intersecting its major diagonal, which is configured to be a fast transit artery (it suffices to set `((x, y), (x + 1, y)) = 0.5 for all x = y). We complement this result with experimental observation in real grid like networks such as encountered in Brooklyn. We computed the skeleton dimension of the New York travel-time graph proposed in the 9th DIMACS challenge [1] which turns out to be k = 73. (Average skeleton tree width is 30, but a maximum width of 73 is encountered for a skeleton tree rooted in Manhattan.) In order to estimate the highway dimension of this graph, we have implemented a heuristic for finding a large packing of paths near a given ball, that is a set of disjoint paths intersecting the ball and having length greater than half radius. We could find a packing of 172 paths in Brooklyn. This proves that the highway dimension of this graph is 172 at least (h โ‰ฅ 172). In comparison the skeleton tree of the center of the corresponding ball has width 48, and 42 branches are cut at radius distance (see Figure 1). 3 Hub Labeling using Tree Skeletons In this section, we assign shortest-path-intersecting hub sets to a set of (terminal) nodes V of the considered network. We will assume that the length function ` on edges is integer weighted. To emulate the geometric realization of the graph, we subdivide edges into sufficiently short fragments by inserting a set of additional nodes V + into the network. For convenience of subsequent analysis, we assume that an edge vw, for v, w โˆˆ V , of integer length `(vw) is subdivided into 12`(vw) edges of length 1/12 each. After this, all edges have the same length, and we subsequently treat the graph as unweighted. All the parameter definitions carry over directly from the geometric setting; for the sake of precision, we formally state the assumptions on the studied setting below. 7 Figure 1: An OpenStreetMap view of Brooklyn, with a packing of 172 paths (in black) intersecting a ball of radius 720 seconds (with white border) on the left, and the skeleton tree (in black) of the center of the ball on the right. We consider an unweighted graph G = (V โˆช V + , E), with a distinguished set of terminal nodes V and where all nodes from V + have degree 2. We denote n := |V |. We assume that every node u โˆˆ V is associated with a fixed (unweighted) tree Tu โІ G. Throughout the section, we will denote by Pu (v, w) the unique path between the pair of nodes v and w in tree Tu , and more concisely Pu (v) := Pu (u, v). Where this does not lead to confusion, we will identify a path with its edge set, and we will also use the symbol |P | to denote the length of path P , i.e., the number of edges belonging to P . We write du (v) := |Pu (v)|. We require that the collection of trees {Tu }uโˆˆV satisfies the following property: For any pair of nodes u, v โˆˆ V , we have Pu (v) = Pv (u). We will also assume that for all u, v, w โˆˆ V , we have that |Pu (v, w)| is an integer multiple of 12. We remark that if the graph G was obtained by a distance-preserving subdivision of nodes of an edge-weighted graph on node set V under some distance metric `, then each tree Tu โˆˆ G corresponds to the shortest path tree of node u under the original distance metric, and the assumption Pu (v) = Pv (u) corresponds to the assumption of uniqueness of shortest paths under the original metric `. An edge hub labeling is an assignment of a set of edges S(u) โІ E to each node u โˆˆ V , such that the following property is fulfilled: for every pair of nodes u, v โˆˆ V , there exists an edge ฮท โˆˆ S(u) โˆฉ S(v) such that ฮท โˆˆ Pu (v). The set S(u) is known as the edge hub set of u. We remark that this edge-based notion of hub sets is slightly stronger than an analogous vertex-based notion: indeed, knowing that an edge ฮท โˆˆ Pu (v), we also conclude that both of the endpoints of edge ฮท belong to Pu (v). We choose to work with edge hub sets rather than node hub sets in this Section for compactness of arguments. We restate in the setting of the family of trees {Tu }uโˆˆV the notion of the skeleton Tuโˆ— = Tu [Vuโˆ— ] โІ Tu as the subtree of Tu induced by node set Vuโˆ— = {v โˆˆ V (Tu ) : Reach Tu (v) โ‰ฅ 21 du (v)}. For u โˆˆ V , the โˆ—(r) width Width(Tuโˆ— ) of the skeleton Tuโˆ— may be written as Width(Tuโˆ— ) = maxrโˆˆN | Cut u |, where: Cut โˆ—(r) := {v โˆˆ Vuโˆ— : du (v) = r}. u Finally, we note that the skeleton dimension of graph G may be written as k = maxuโˆˆV Width(Tuโˆ— ). 8 3.1 Construction of the Hub Sets The edge hub sets S(u), u โˆˆ V , are obtained by the following randomized construction. Assign to each edge e โˆˆ E a real value ฯ(e) โˆˆ [0, 1], uniformly and independently at random. We condition all subsequent considerations on the event that all values ฯ are distinct, |ฯ(E)| = |E|, which holds with probability 1. For all u, v โˆˆ V , we define the central subpath Pu0 (v) โІ Pu (v) as the subpath of Pu (v) consisting of its middle du6(v) edges; formally, Pu0 (v) := Pu (u0 , v 0 ), where u0 , v 0 โˆˆ Pu (v) are nodes given by: 5 7 du (u0 ) = 12 du (v) and du (v 0 ) = 12 du (v). Next, for all u, v โˆˆ V , v 6= u, we define the hub edge ฮทu (v) โˆˆ Pu (v) as the edge with minimum value of ฯ on the central subpath between u and v: ฮทu (v) = arg min ฯ(e). eโˆˆPu0 (v) Finally, for each node u โˆˆ V , we adopt the natural definition of edge hub set S(u) as the set of all edge hubs of node u on paths to all other nodes: S(u) := {ฮทu (v) : v โˆˆ V, v 6= u} . Proof of Correctness. Taking into account that for all u, v โˆˆ V , Pu (v) = Pv (u), we observe that by symmetry of the central subpath with respect to its two endpoints, we also have Pu0 (v) = Pv0 (u). It follows directly that ฮทu (v) = ฮทv (u). Hence, we have ฮทu (v) โˆˆ S(u) โˆฉ S(v), and also ฮทu (v) โˆˆ Pu (v), which completes the proof of correctness of the edge hub labeling. We devote the rest of this Section to bounding the size of hub sets S(u). 3.2 Bounding Average Hub Set Size In subsequent considerations we will fix a node u โˆˆ V , and restrict considerations to the tree Tu . We will assume that tree Tu is oriented from its root u towards its leaves, and we will call a path P โІ Tu a descending path in Tu if one of its endpoints is a descendant of the other in Tu . In particular, every path Pu (v) is a descending path. For an edge e โˆˆ Tu , we will denote by e+ and eโˆ’ the two endpoints of e, with eโˆ’ being the one further away from the root (du (eโˆ’ ) = du (e+ ) + 1). Likewise, for a descending path P , we denote by P + and P โˆ’ its two extremal vertices, closest and furthest from the root u, respectively. We also denote by du (e) := du (eโˆ’ ) the distance of edge e from the root. In order to bound the expected size of the hub set S(u), we will observe that elements of S(u) necessarily belong to the skeleton Tuโˆ— and satisfy certain minimality constraints with respect to descending paths of sufficiently large length, contained entirely within the skeleton Tuโˆ— . Lemma 1. Let ฮท โˆˆ S(u), for some u โˆˆ V . Then, the following claims hold: (1) ฮท โˆˆ E(Tuโˆ— ). (2) Reach Tuโˆ— (ฮท โˆ’ ) โ‰ฅ 71 du (ฮท). (3) There exists a descending path P โІ Tuโˆ— , such that ฮท = arg mineโˆˆP ฯ(e) and |P | โ‰ฅ 72 du (ฮท). Furthermore, the following claims hold for any edge ฮท โˆˆ E satisfying Claims (1) and (3): (4) There exists a descending path P โІ Tuโˆ— , such that ฮท = argmineโˆˆPฯ(e), ฮท is one of the two extremal edges of P (i.e., P + = ฮท + or P โˆ’ = ฮท โˆ’ ), and |P | = 71 du (ฮท) . โˆ— โˆ— (5) There exists 7  a descending path Pu (x, y), for some y โˆˆ Vu and x โˆˆ Vu satisfying du (x) = 8 du (y) , such that ฮท = arg mineโˆˆPu (x,y) ฯ(e) and ฮท is one of the two extremal edges of Pu (x, y). 9 Proof. Select ฮท โˆˆ S(u) arbitrarily. Let v โˆˆ V be any node such that ฮท = ฮทu (v). We recall that for the 5 descending path Pu (u0 , v 0 ) โІ Pu (v), we have ฮท = arg mineโˆˆPu (u0 ,v0 ) ฯ(e), where du (u0 ) = 12 du (v) 7 2 0 00 00 and du (v ) = 12 du (v). Let v โˆˆ Pu (v) be a node such that du (v ) = 3 du (v) (we recall that 12|du (v) by assumption). By the definition of skeleton Tuโˆ— , we have v 00 โˆˆ Vuโˆ— , and clearly Pu (v 00 ) โІ Tuโˆ— . We note that ฮท โˆˆ Pu (v 00 ) and moreover: 2 7 1 1 1 Reach Tuโˆ— (ฮท โˆ’ ) โ‰ฅ |Pu (ฮท โˆ’ , v 00 )| โ‰ฅ |Pu (v 0 , v 00 )| = du (v) โˆ’ du (v) = du (v) = du (v 0 ) โ‰ฅ du (ฮท), 3 12 12 7 7 hence Claims (1) and (2) follow. To show Claim (3), we put P = Pu (u0 , v 0 ) and observe that ฮท = arg mineโˆˆP ฯ(e) by definition, and: |P | = |Pu (u0 , v 0 )| = 5 1 2 2 7 du (v) โˆ’ du (v) = du (v) = du (v 0 ) โ‰ฅ du (ฮท). 12 12 6 7 7 Next, to show Claim (4), we observe that by Claim (3), ฮท = arg mineโˆˆPu (u0 ,ฮทโˆ’ ) ฯ(e) and ฮท = arg mineโˆˆPu (ฮท+ ,v0 ) ฯ(e).   + , v 0 )| โ‰ฅ 1+ 2 d (ฮท) โ‰ฅ 2 1 d (ฮท) , Moreover, since |Pu (u0, v 0 )| โ‰ฅ 27 du (ฮท), we have |Pu(u0 , ฮท โˆ’ )|+|P (ฮท u u u 7 7  and so |Pu (u0 , ฮท โˆ’ )| โ‰ฅ 71 du (ฮท) or |Pu (ฮท + , v 0 )| โ‰ฅ 17 du (ฮท) . Claim (4) thus follows for anappropriate  choice of descending path P โІ |Pu (u0 , ฮท โˆ’ )| or P โІ |Pu (ฮท + , v 0 )|, respectively, with |P | = 17 du (ฮท) . Finally, to show Claim (5), we consider separately the two cases from the proof of Claim (4). If P โІ Pu (u0 , ฮท โˆ’ ), then we set y = ฮท โˆ’ , and choose x โˆˆ Pu (ฮท โˆ’ ) so that du (x) = b 87 du (ฮท โˆ’ )c. We have du (x, y) = d 81 du (ฮท โˆ’ )e โ‰ค d 71 du (ฮท โˆ’ )e = |P |, hence Pu (x, y) โІ P , ฮท = arg mineโˆˆPu (x,y) ฯ(e), and the claim follows. If P โІ Pu (ฮท + , v 0 ), then we set x = ฮท + , and choose y โІ Pu (x, v 0 ) so that du (x) = b 78 du (y)c. Such a choice of y is always possible since, when moving with y along the path P , the value of b 78 du (y)c increases by at most 1 in every step; moreover, for the lower end node v โˆ— of path P we have du (v โˆ— ) > du (x) + 17 du (x), and so du (x) โ‰ค b 78 du (v โˆ— )c. We again obtain ฮท = arg mineโˆˆPu (x,y) ฯ(e), and the claim follows. We remark that the remainder of our analysis is valid for any construction of hub sets S which satisfies Claims (1), (2), and (3) of Lemma 1.2 To bound the average hub set size precisely, we introduce for each node u a parameter called integrated skeleton dimension kฬ‚ (u), defined through a sum of inverse distances to u over nodes of its tree skeleton: X 1 X | Cut uโˆ—(r) | kฬ‚ (u) := = , (2) du (v) r โˆ— vโˆˆVu rโˆˆN โˆ—(r) where the equivalence of the two definitions follows directly from the definition of cuts, Cut u = {v โˆˆ V โˆ— (u) : du (v) = r}. โˆ—(r) Taking into account that | Cut u | โ‰ค Width(Tuโˆ— ), we have kฬ‚ (u) = O(Width(Tuโˆ— ) log D(Tuโˆ— )), and even more roughly, we have for all u โˆˆ V : kฬ‚ (u) = O(k log D), (3) where we recall that D = maxuโˆˆV D(Tu ). One may, in particular consider an alternative construction of a hub set S + (u), defined as the set of all edges ฮท โˆˆ E(Tu ) which satisfy Claims (1), (2), and (3) of the Lemma. All of our bounds on hub set size also hold in the case of {S + (u)}uโˆˆV . The definition results in larger labels in practice: we always have S(u) โІ S + (u) (correctness results from this observation). On the other hand, hub sets S + (u) may sometimes be constructed more efficiently than S(u): the definition of S(u) requires a scan of the entire tree T (u), whereas hub set S + (u) may be constructed based only on the smaller skeleton T โˆ— (u). 2 10 Lemma 2. The expected hub set size of a node u โˆˆ V satisfies the bound: E|S(u)| โ‰ค 16 kฬ‚ (u). Proof. Fixu โˆˆ V arbitrarily. For y โˆˆ Vuโˆ— , we define xy as the unique node on the path Pu (y) such that  7 du (xy ) = 8 du (y) . We define random variable Qu (y) โˆˆ {0, 1} as the number of extreme edges e of the path Pu (xy , y) (i.e., e+ = xy or eโˆ’ = y), which satisfy e = arg min ฯ(Pu (xy , y)). We have: Pr[Qu (y) = 1] = 2 2 16 . = โ‰ค 7 |Pu (xy , y)| du (y) du (y) โˆ’ 8 du (y) By Claim (5) of Lemma 1, it follows that by summing random variables Qu (y) exhaustively over all vertices y we count each element ฮท โˆˆ S(u) at least once, hence: X |S(u)| โ‰ค Qu (y). yโˆˆVuโˆ— By linearity of expectation, it follows that: E|S(u)| โ‰ค X yโˆˆVuโˆ— EQu (y) = X Pr[Qu (y) = 1] โ‰ค yโˆˆVuโˆ— X yโˆˆVuโˆ— 16 . du (y) A direct application of Markovโ€™s inequality to the bound from Lemma 2, combined with Eq. (3), gives the following Corollary. P P Corollary 1. The average hub set size satisfies n1 uโˆˆV |S(u)| = O( n1 uโˆˆV kฬ‚ (u)) โ‰ค O(k log D), with probability at least 1/2 w.r.t. choice of random values ฯ. Obtaining concentration bounds on the maximal size of a hub set, maxuโˆˆV |S(u)|, requires some more care, and we proceed with the analysis in the following subsection. 3.3 Concentration Bounds on Hub Set Size For fixed u โˆˆ V , we consider the size of the hub set of u given by the random variable: X |S(u)| = X(ฮท), (4) ฮทโˆˆE(Tuโˆ— ) where X(ฮท) โˆˆ {0, 1} is the indicator variable for the event โ€œฮท โˆˆ S(u)โ€. The random variables {X(ฮท)}ฮทโˆˆE(Tuโˆ— ) need not, in general, be independent or negatively correlated. In the subsequent analysis, for fixed ฮท, we make use of Claim (4) of Lemma 1 to bound random variable X(ฮท). By the Claim of the Lemma, we can decompose X(ฮท) into the contributions from descending paths located towards the root and away from the root with respect to ฮท: X(ฮท) โ‰ค X + (ฮท) + X โˆ’ (ฮท), where we define: โ€ข X + (ฮท) โˆˆ {0, 1} is the indicator variable for the event: โ€œfor the unique descending subpath P โІ Pu (ฮท โˆ’ ) of length |P | = 71 du (ฮท) ending in edge ฮท (i.e., P โˆ’ = ฮท โˆ’ ), it holds that ฮท = arg min ฯ(P )โ€, โ€ข X โˆ’ (ฮท) โˆˆ {0, 1} is theindicator variable for the event: โ€œthere exists a descending path P โІ Tuโˆ— of length |P | = 71 du (ฮท) starting in edge ฮท (i.e., P + = ฮท + ), such that ฮท = arg min ฯ(P )โ€. 11 Moreover, by Claim (2) of Lemma 1, we may have X(ฮท) 6= 0 only for those edges ฮท for which Reach Tuโˆ— (ฮท โˆ’ ) โ‰ฅ 71 du (ฮท). We denote Vuโˆ—โˆ— = {v โˆˆ Vuโˆ— : Reach Tuโˆ— (v) โ‰ฅ 17 du (v)} and Tuโˆ—โˆ— = Tu [Vuโˆ—โˆ— ]. We can now rewrite Eq. (4) as: X X X โˆ’ (ฮท), (5) X + (ฮท) + |S(u)| โ‰ค ฮทโˆˆE(Tuโˆ—โˆ— ) ฮทโˆˆE(Tuโˆ—โˆ— ) and proceed to bound both of these sums separately. In order to be able to manipulate the sums more conveniently, we first introduce a partition of the tree according to geometrically increasing scales of distance. Partition of Tuโˆ— into lLayers. mWe consider a sequence of increasing integer radii (r[i] )iโˆˆN , given as  16 i r[0] = 0 and r[i] = 15 15 , for i โ‰ฅ 1. The last non-empty layer corresponds to index imax < log16/15 D < 16 ln D. Cutting the edge set of tree Tuโˆ— at vertices located at distances {r[i] }iโˆˆN from the root u yields the following partition into layers: [ E(Tuโˆ— ) = Lโˆ—[i] , where: Lโˆ—[i] := {e โˆˆ E(Tuโˆ— ) : r[i] < du (e) โ‰ค r[i+1] }. iโˆˆN We further denote the subset of each layer restricted to edges from Tuโˆ—โˆ— as Lโˆ—โˆ—[i] := Lโˆ—[i] โˆฉ E(Tuโˆ—โˆ— ), i โˆˆ N. Si P [i,j] , such that Lemma 3. For all i โ‰ฅ 1, edge set Lโˆ—โˆ—[i] admits a partition into paths, Lโˆ—โˆ—[i] = lj=1 โˆ—(r) li < 2 minrโˆˆ[r[i+1] ,r[i+2] ] | Cut u | โ‰ค 2 k , each P [i,j] is a descending path, and all internal nodes of all paths P [i,j] have degree exactly 2 in Tuโˆ—โˆ— . Si P [i,j] of the edge set of the considered layer so that each path Proof. Define partition Lโˆ—โˆ—[i] = lj=1 P [i,j] , 1 โ‰ค j โ‰ค li , is a maximal descending path whose internal nodes all have degree exactly 2 in Tuโˆ—โˆ— . Let F = Tu (Lโˆ—โˆ—[i] ) be the oriented sub-forest of Tu induced by the edges of Lโˆ—โˆ—[i] . Let l be the number of leaves of F and c be the number of its connected components. An elementary relation between the number of leaves and the number of nodes of degree more than 2 in a forest gives li โ‰ค 2l โˆ’ c < 2l. Moreover, by the definition of Tuโˆ—โˆ— , we have that for each ฮท โˆˆ Lโˆ—โˆ—[i] , we have Reach Tuโˆ— (ฮท โˆ’ ) โ‰ฅ 1 โˆ’ [i,j] , such that P [i,j]โˆ’ is a leaf of F , can be extended along 7 du (ฮท ). It follows that each of the l paths P a descending path in Tuโˆ— by a distance of 17 du (P [i,j]โˆ’ ) โ‰ฅ 17 r[i] โ‰ฅ r[i+2] โˆ’ r[i] โˆ’ 1. It follows that each of the l leaves of F can be extended along a (independent) descending path until radius r[i+2] inclusive. โˆ—(r) Thus, l < minrโˆˆ[r[i+1] ,r[i+2] ] | Cut u | โ‰ค k , which completes the proof. Bounding the Sum of X + (ฮท). Denote by P [i] the set of descending paths P in Tu which stretch precisely between the endpoints of the i-th layer: du (P + ) = r[i] , du (P โˆ’ ) = r[i+1] . For a fixed path P [i,j] โІ Lโˆ—โˆ—[i] , i โ‰ฅ 1, we denote by Q[i,j] the unique path in P [iโˆ’1] which extends to P [i,j] , i.e., Q[i,j] โˆˆ P [iโˆ’1] and Q[i,j] โІ Pu (P [i,j]+ ). Consider now an arbitrary edge ฮท which does not belong to layers 0 or 1 of the tree partition, ฮท โˆˆ E(Tuโˆ—โˆ— ) \ (Lโˆ—โˆ—[0] โˆช Lโˆ—โˆ—[1] ). Taking into account the above decomposition of set Tuโˆ—โˆ— into layers, and of layers into paths, there exists a unique path P [i,j] , such that ฮท โˆˆ P [i,j] . Then, we observe that for the event X + (ฮท) = 1 to hold, it is necessary that two conditions are jointly fulfilled: ฮท must satisfy the prefix minimum condition on the path P [i,j] : ฮท = arg min eโˆˆP [i,j] โˆฉPu (ฮท โˆ’ ) 12 ฯ(e), (6) and moreover, we must have ฯ(ฮท) < min ฯ(Q[i,j] ). Indeed, considering the definition of X + (ฮท), the   unique descending subpath P โІ Pu (ฮท โˆ’ ) of length |P | = 17 du (ฮท) which ends with edge ฮท has its other endpoint in Lโˆ—[iโˆ’2] . We have ฮท = arg min ฯ(P ), and path P includes as subpaths both the entire prefix P [i,j] โˆฉ Pu (ฮท + ), and the path Q[i,j] . We denote by M +[i,j] โІ P [i,j] the set of all edges ฮท โˆˆ P [i,j] satisfying ฯ(ฮท) < min ฯ(Q[i,j] ). We further denote by ฮท +[i,j,k] the k-th edge in M +[i,j] , when ordering edges of M +[i,j] by increasing distance from the root u, 1 โ‰ค k โ‰ค |M +[i,j] |. Finally, we denote by Z +[i,j,k] โˆˆ {0, 1} the indicator random variable for the event that โ€œedge ฮท +[i,j,k] satisfies the prefix minimum condition (6) on path P [i,j] โ€. It follows that: |M +[i,j] | X X X + (ฮท) โ‰ค ฮทโˆˆE(Tuโˆ—โˆ— ) X X i=2,3,4,... 1โ‰คjโ‰คli k=1 X + (ฮท) + ฮทโˆˆLโˆ—โˆ—[0] โˆชLโˆ—โˆ—[1] Z +[i,j,k] , where we note that the ranges of sum indices i, j do not depend on the random choice of ฯ in our setting. We further rewrite the above expression, roughly bounding the first sum by cardinality, and splitting the second double sum according to even and odd values of i: X + X (ฮท) โ‰ค ฮทโˆˆE(Tuโˆ—โˆ— ) 19 X |M +[i,j] | | Cut โˆ—(r) | u r=0 X X i=2,4,6,... 1โ‰คjโ‰คli k=1 + |M +[i,j] | Z +[i,j,k] {z | } :=A+ even X X i=3,5,7,... 1โ‰คjโ‰คli k=1 + | Z +[i,j,k] . {z :=A+ odd (7) } We subsequently consider only bounds on the summed expression A+ even for 2|i (bounds on the expression A+ follow by identical arguments). odd We observe that for fixed i, i = 2a for some a โˆˆ N + , the random variables |M +[i,j] | depend only on the choice of random values ฯ(e) for e โˆˆ Lโˆ—[iโˆ’1] . Now, conditioning on a choice ฯodd of random values ฯ(e) for e โˆˆ Lโˆ—[2aโˆ’1] , for all a โˆˆ N+ , we observe that {Z +[i,j,k] }2|i,j,1โ‰คkโ‰ค|M +[i,j] | is a set of independent random variables, with: Pr[Z +[i,j,k] = 1|ฯodd ] = 1/k. The above probability and independence follows directly from a well-known characterization of the probability that the k-th element of a uniformly random permutation (ordering) is its prefix minimum. We have: |M +[i,j] | E[A+ even |ฯodd ] = X X i=2,4,6,... 1โ‰คjโ‰คli k=1 1 < k X (1 + lnโ—ฆ |M +[i,j] |) + =: Neven , (8) i=2,4,6,... 1โ‰คjโ‰คli where lnโ—ฆ x = ln x for x > 0 and lnโ—ฆ 0 = 0. By an application of a simple Chernoff bound for the sum of variables {Z +[i,j,k] }i,j,k , we have: + โˆ’c Pr[A+ even < Neven + 3c ln n] > 1 โˆ’ n , for c > 1. (9) + It now remains to provide bounds on the concentration of random variable Neven in its upper tail. If our only goal is to bound the hub set size as O(k log D log log n + log n), then obtaining such bounds becomes a relatively straightforward exercise in Chernoff bounds over individual paths P [i,j] . In this work, we go for a more pedestrian approach through a type of balls-into-bins process, optimizing bounds over larger path sets, which will eventually give us slightly tighter bounds, including a bound of O(k log D log log k ).P i Denote Mi+ := lj=1 |M +[i,j] |, for i โ‰ฅ 2. Then, we have the following bound. 13 L*[i+1] L*[i] L*[i-1] P[i, 2] P[i, 1] Q[i, j={1,2,3,4,5}] P[i, 4] P[i, 3] P[i, 5] Q[i, 6] u P[i, 6] Q[i, 7] r [i-1] P[i, 7] r [i] r [i+1] r [i+2] Figure 2: Illustration of paths P [i,j] and Q[i,j] . Edges from Tuโˆ—โˆ— are marked with solid lines, remaining edges from Tuโˆ— are marked with dashed lines. Lemma 4. Fix i โ‰ฅ 2. Then, for any c โ‰ฅ 1:   Pr Mi+ > 12cli < 2โˆ’c . Si Si Q[i,j] (forming a subforest of Tuโˆ— , P [i,j] โˆช lj=1 Proof. For fixed i, we consider the edge set F := lj=1 contained entirely within layers Lโˆ—[iโˆ’1] and Lโˆ—[i] ). See Figure 3.3 for an illustration. Choose arbitrarily the set I of (necessarily distinct) values of ฯ which appear within F , I = ฯ(F ). Let I = {i1 , i2 , . . . , i|F | }, with i1 โ‰ค i2 โ‰ค . . . โ‰ค i|F | . We couple the sampling of values ฯ on F with the following two-stage process. First, we fix set I. Then, given a choice of I, we select a uniformly random permutation to perform the assignment of values from I to edges in F (|I| = |F |). The latter permutation is defined iteratively, by assigning to successive values it , 1 โ‰ค t โ‰ค |F |, an as yet unoccupied edge (site) from F . The value of |M +[i,j] | is given as the number of elements of I which are placed in sites from P [i,j] before the smallest index tj โˆˆ N, such that itj โˆˆ ฯ(Q[i,j] ). We will refer to the index t as representing moments of time, and we will then say that path P [i,j] was cut off at time tj . For successive moments of time t โˆˆ N , we denote by Jt the set of surviving path indices at time t, 0 i.e., Jt = {j it0 โˆˆ /S ฯ(Q[i,j] )}. We then obtain subforest Ft โІ F by restricting F to its surviving S : โˆ€t โ‰คt[i,j] part, Ft = jโˆˆJt P โˆช jโˆˆJt Q[i,j] . To prove the claim, we will consider how the random variable Mi+ increases over time, until Ft = โˆ…. We again couple our sampling process by first deciding in each time step whether to place it in forest F \ Ftโˆ’1 or in forest Ftโˆ’1 , and only afterwards fixing for it a specific free site with uniform probability within the chosen subforest. Observe that if it is placed F \Ftโˆ’1 , then in the given step of the considered process, the value of Mi+ remains unchanged at time t. We will thus eliminate from the process all time steps t such that it โˆˆ F \ Ftโˆ’1 , and by a slight abuse of notation, we will relabel time indices as if these steps never occurred. Thus, in each time step t, we assume that a free site is picked for it from Ftโˆ’1 uniformly at random. Consider now the random variable ฯ†t = |Jtโˆ’1 | โˆ’ |Jt |, representing the number of paths cut off in time step t. The expectation of ฯ†t can be lower-bounded, regardless of the history of the process. Claim (*). E[ฯ†t |Ftโˆ’1 ] > 1/3, for any Ftโˆ’1 6= โˆ…. S Proof (of Claim). Fix forest Ftโˆ’1 . We assign to each edge e โˆˆ jโˆˆJtโˆ’1 Q[i,j] a weight w(e) โˆˆ N+ , given as the j โˆˆ Jtโˆ’1 such that P [i,j] can be reached from e by a descending path. For all S number of [i,j] edges e โˆˆ jโˆˆJtโˆ’1 P , we put w(e) = 0. Now, if e is chosen as the t-th edge in the process, we have 14 ฯ†t = |Jtโˆ’1 | โˆ’ |Jt | = w(e). It follows that: P P 1 |Jtโˆ’1 |(r[i] โˆ’ r[iโˆ’1] ) eโˆˆFtโˆ’1 w(e) eโˆˆFtโˆ’1 w(e) > E[ฯ†t |Ftโˆ’1 ] = โ‰ฅ โ‰ฅ , |Ftโˆ’1 \ {e โˆˆ F : ฯ(e) < it }| |Ftโˆ’1 | 3 |Jtโˆ’1 |(r[i+1] โˆ’ r[iโˆ’1] ) which completes the proof of the claim. P Moreover, taking into that ฯ†t has bounded range ฯ†t โˆˆ [0, li ], and that tโˆˆN ฯ†t = li , we obtain a concentration result on the number of steps until the stopping of the process (Ft = โˆ…); for completeness, we provide a standalone proof. Claim (**). For T = 12cli , we have: Pr[FT 6= โˆ…] < 2โˆ’c . PT 0 Proof (of Claim). We define the non-negative submartingale ฮฆ0T = t=1 ฯ†t as follows. When 0 0 0 Ftโˆ’1 6= โˆ…, we choose ฯ†t โˆˆ [0, li ] to be dominated by ฯ†t , so that ฯ†t โ‰ค ฯ†t and E[ฯ†t |Ftโˆ’1 ] = 1/3. (The latter condition can always be satisfied by Claim (*)). When Ftโˆ’1 = โˆ…, we put ฯ†0t = 1/3. Observe that when ฮฆ0T > li for some T , we necessarily have ฯ†0t > ฯ†t for some t โ‰ค T , hence FT = โˆ…. To lower-bound the probability of the event ฮฆ0T > li , we remark that the bounds ฯ†0t โˆˆ [0, li ] and E[ฯ†0t |Ftโˆ’1 ] = 1/3 imply the following bound on variance of the process: ฯƒ 2 [ฯ†0t |Ftโˆ’1 ] โ‰ค li /3. Now, using a standard martingale bound (cf. e.g. [17][Thm. 18] applied to the process Xt = ฮฆ0t โˆ’ t/3), we obtain for any ฮป > 0:   โˆ’ฮป2 /2 0 . Pr[ฮฆT โ‰ค T /3 โˆ’ ฮป] โ‰ค exp T li /3 + ฮปli /3 Substituting T = 12cli and ฮป = 3cli , we obtain: Pr[ฮฆ0T โ‰ค cli ] โ‰ค eโˆ’0.9c < 2โˆ’c . Taking into account that c โ‰ฅ 1 by assumption, the claim follows directly. Recalling that in each time step t with Ft 6= โˆ…, the value of random variable Mi+ increases by at most 1, we obtain directly from Claim (**) that Pr[Mi+ > 12cli ] < 2โˆ’c , which completes the proof. Next, for 2|i, let Ci โˆˆ N+ be a random variable defined as the smallest integer such that Mi+ โ‰ค 12Ci li . Since Ci depends only on random values ฯ chosen with Lโˆ—[iโˆ’1] โˆช Lโˆ—[i] , the random variables {Ci }2|i are independent. Moreover, by Lemma 4, each Ci may be stochastically dominated by a (independent) geometrically distributed random variable ฮ“i with parameter p = 1/2. It follows that: X X Ci โ‰ค ฮ“i โˆผ NB(bimax /2c, 1/2), 2|i, iโ‰คimax 2|i, iโ‰คimax where the parameters of the negative binomial distribution NB(r, p) represent the number of trials with success probability p until r successes are reached. An application of a rough tail bound for NB(bimax /2c, 1/2) gives: ๏ฃฎ ๏ฃน X Pr ๏ฃฐ Ci < 2imax + 4c ln n๏ฃป > 1 โˆ’ nโˆ’c , for any c > 1. (10) 2|i Recalling that Mi+ = Pli j=1 |M +[i,j] | โ‰ค 12Ci li , we may write by concavity of the logarithm function: ๏ฃซ ๏ฃถ li li X X 1 (1 + lnโ—ฆ |M +[i,j] |) โ‰ค li + li lnโ—ฆ ๏ฃญ |M +[i,j] |๏ฃธ โ‰ค li + li ln(12Ci ) < li ln(33Ci ). li j=1 j=1 15 + , taking into account its definition (8): We can therefore bound variable Neven X X + li ln(33Ci ). Neven = (1 + ln |M +[i,j] |) โ‰ค 2|i 1โ‰คjโ‰คli (11) 2|i We now apply a union bound over the two events given by (9) and (10), which hold w.h.p., From Eq. (9), (10), and (11), we have that for any c > 1, the following event holds w.p. at least 1 โˆ’ 2nโˆ’c : X + Neven โ‰ค 3c ln n + max li ln(33ci ), (12) (ci ) 2|i iโ‰คimax P where (ci )iโ‰คimax ,2|i are positive integers satisfying the condition: 2|i ci < 2imax + 4c ln n. + Returning to Eq. (7), with respect to Nodd an analogous technique gives us that w.p. at least 1โˆ’2nโˆ’c : X + Nodd โ‰ค 3c ln n + max (ci ) li ln(33ci ), (13) 26=i iโ‰คimax P where (ci )iโ‰คimax ,26| i are likewise positive integers satisfying the condition: 26| i ci < 2imax + 4c ln n. Combining Eq. (7) with Eq. (12) and (13) through a union bound (and substituting ฮณi := 33ci ), we eventually obtain that w.p. at least 1 โˆ’ 4nโˆ’c : X X + (ฮท) โ‰ค ฮทโˆˆE(Tuโˆ—โˆ— ) 19 X | Cut โˆ—(r) | + 6c ln n + max u (ฮณi ) r=0 X li ln ฮณi , (14) iโ‰คimax where (ฮณi )iโ‰คimax satisfy the condition: โˆ€i ฮณi โˆˆ N+ and X ฮณi < 132imax + 264c ln n. (15) Bounding the Sum of X โˆ’ (ฮท). For the random variables X โˆ’ (ฮท), the main arguments required to establish the bound are similar to those in the case of X + (ฮท); we confine ourselves to an exposition of the differences. The main difference is that for a path P [i,j] , instead of a unique predecessor path Q[i,j] in layer Lโˆ—[iโˆ’1] , we now have to deal with multiple possible descendant paths in layer Lโˆ—[i+1] ; on the other hand, the outward-branching structure of the tree means that we can show tighter concentration bounds in this case. We recall that P [i] is the set of descending paths P in Tu which stretch precisely between the endpoints of the i-th layer, and for 1 โ‰ค j โ‰ค li , we denote by R[i,j] the set of all paths in P [i+1] which are extensions of P [i,j] , i.e., R[i,j] โІ P [i+1] and for all R โˆˆ R[i,j] , we have P [i,j] โІ Pu (R+ ). For the event X โˆ’ (ฮท) = 1 to hold, it is now necessary that two conditions are jointly fulfilled: ฮท must satisfy the suffix minimum condition on the path P [i,j] : ฮท = arg min eโˆˆP [i,j] \Pu (ฮท + ) ฯ(e), (16) and moreover, ฯ(ฮท) < maxRโˆˆR[i,j] min ฯ(R). We next denote by M โˆ’[i,j] โІ P [i,j] the set of all edges ฮท โˆˆ P [i,j] satisfying ฯ(ฮท) < maxRโˆˆR[i,j] min ฯ(R). We further denote by ฮท โˆ’[i,j,k] the k-th edge in M โˆ’[i,j] , when ordering edges of M โˆ’[i,j] by decreasing distance to the root u, 1 โ‰ค k โ‰ค |M โˆ’[i,j] |. Finally, we denote by Z โˆ’[i,j,k] โˆˆ {0, 1} the indicator random variable for the event that โ€œedge ฮท โˆ’[i,j,k] satisfies the suffix minimum condition (16) on path P [i,j] โ€. The subsequent analysis proceeds as before, and we obtain direct analogues of Eq. (7), (8), and (9), replacing superscripts โ€œ+โ€ ofPall random variables by โ€œโˆ’โ€. i We next denote Miโˆ’ := lj=1 |M โˆ’[i,j] |, for i โ‰ฅ 2, and obtain the following analogue of Lemma 4. 16 Lemma 5. Fix i โ‰ฅ 2. Then, for any c โ‰ฅ 1:   Pr Miโˆ’ > 12cli < eโˆ’4cli < 2โˆ’c . Proof. The proof follows along lines as that of Lemma 4. Sli similar Si [i] [i,j] For fixed i, let R := j=1 R . We consider the edge set F := lj=1 P [i,j] โˆช R[i] (forming a subforest of Tuโˆ— , contained entirely within layers Lโˆ—[i] and Lโˆ—[i+1] ). Choose arbitrarily the set I of (necessarily distinct) values of ฯ which appear within F , I = ฯ(F ). Let I = {i1 , i2 , . . . , i|F | }, with i1 โ‰ค i2 โ‰ค . . . โ‰ค i|F | . As in the proof of Lemma 4, we couple the sampling of values ฯ on F with the following two-stage process. First, we fix set I. Then, given a choice of I, we select a uniformly random permutation to perform the assignment of values from I to edges in F (|I| = |F |). The latter permutation is defined iteratively, by assigning to successive values it , 1 โ‰ค t โ‰ค |F |, an as yet unoccupied edge (site) from F . The value of |M โˆ’[i,j] | is given as the number of elements of I which are placed in sites from P [i,j] before the smallest index t โˆˆ N, such that for all paths R โˆˆ R[i,j] , there exists t0 < t such that it0 โˆˆ ฯ(R). We will refer to the index t as representing moments of time. Let R[i] = {R1 , . . . , R|R[i] | . We say that a path Rk โˆˆ R[i] was cut off at time t if t is the smallest time such that it โˆˆ ฯ(Rk ). For successive moments of time t โˆˆ N , we denote by Kt the set of surviving indices k of paths Rk which have not been cut off at time t. We obtain subforest Ft โІ F by restricting F to its surviving part, where we treat a path P [i,j] if it extends to at least one surviving path Rk : [ [ Ft = Rk โˆช P [i,j] . kโˆˆKt j: โˆƒkโˆˆKt P [i,j] โІPu (Rk+ ) Exactly as in the proof of Lemma 4, we will consider how the random variable Miโˆ’ increases over time, until Ft = โˆ…. We again couple our sampling process by first deciding in each time step whether to place it in forest F \ Ftโˆ’1 or in forest Ftโˆ’1 , and only afterwards fixing for it a specific free site with uniform probability within the chosen subforest. Observe that if it is placed F \ Ftโˆ’1 , then in the given step of the considered process, the value of Miโˆ’ remains unchanged at time t. We will thus eliminate from the process all time steps t such that it โˆˆ F \ Ftโˆ’1 , and by a slight abuse of notation, we will relabel time indices as if these steps never occurred. Thus, in each time step t, we assume that a free site is picked for it from Ftโˆ’1 uniformly at random. Consider now the random variable ฯ†t = |Ktโˆ’1 | โˆ’ |Kt |, representing the number of paths R cut off in time step t. The expectation of ฯ†t can be lower-bounded, regardless of the history of the process. Claim (*). E[ฯ†t |Ftโˆ’1 ] โ‰ฅ 1/2, for any Ftโˆ’1 6= โˆ…. Proof (of Claim). Fix forest Ftโˆ’1 . When inserting it , the number of free sites in layer Lโˆ—[i+1] is at least: X |Rk | โ‰ฅ |Ktโˆ’1 |(r[i+1] โˆ’ r[i] ). kโˆˆKtโˆ’1 On the other hand, since each surviving path P [i,j] extends to some surviving path Rk , the total number of free sites for insertion of it is upper-bounded by |Ktโˆ’1 |(r[i+1] โˆ’ r[iโˆ’1] . Since insertion of it into layer Lโˆ—[i] means that |Kt | = |Ktโˆ’1 |, and insertion of it into layer Lโˆ—[i+1] means that |Kt | = |Ktโˆ’1 | โˆ’ 1, we obtain: |Ktโˆ’1 |(r[i+1] โˆ’ r[i] ) 1 E[ฯ†t |Ftโˆ’1 ] โ‰ฅ โ‰ฅ , [i+1] [iโˆ’1] 2 |Ktโˆ’1 |(r โˆ’r ) which completes the proof of the claim. P Moreover, taking into that ฯ†t has bounded range ฯ†t โˆˆ {0, 1}, and that tโˆˆN ฯ†t โ‰ค li , we obtain a concentration result on the number of steps until the stopping of the process (Ft = โˆ…) directly from the 17 Azuma-McDiarmid martingale inequality (cf. e.g. [17][Thm. 16], [26]). For parameter T = 12cli , we obtain after some transformations: Pr[F12cli 6= โˆ…] < eโˆ’4cli . Recalling that in each time step t with Ft 6= โˆ…, the value of random variable Miโˆ’ increases by at most 1, we obtain directly that Pr[Miโˆ’ > 12cli ] < eโˆ’4cli , which completes the proof. The rest of the argument proceeds as for the case of X + , applying Lemma (5) in place of Lemma (4). We eventually obtain the following analogue of Eq. (7): for any c > 1, w.p. at least 1 โˆ’ 4nโˆ’c : X X โˆ’ (ฮท) โ‰ค ฮทโˆˆE(Tuโˆ—โˆ— ) 19 X X | Cut โˆ—(r) | + 6c ln n + max u (ฮณi ) r=0 li ln ฮณi , (17) iโ‰คimax where (ฮณi )iโ‰คimax satisfy condition (15). Combining Bounds. Introducing the bounds of Eq. (14) and (17) into Eq. (5) through a union bound we obtain the following statement: For any c > 1, w.p. at least 1 โˆ’ 8nโˆ’c : |S(u)| โ‰ค 2 19 X | Cut uโˆ—(r) | + 12c ln n + 2 max (ฮณi ) r=0 X li ln ฮณi , (18) iโ‰คimax where (ฮณi )iโ‰คimax satisfy condition (15). Now, recalling the bounds on li from Lemma 3, the bound imax < 16 ln D, setting c = 2, and applying a union bound over all vertices u, we obtain the main technical result of the Section. We present it first in its strongest form, and then provide two more useful corollaries. Theorem 1. With probability at least 1 โˆ’ 8/n, all nodes u โˆˆ V satisfy the following bound on hub set size: 19 X X S(u) โ‰ค 2 | Cut โˆ—(r) | + 24 ln n + 2 max li ln ฮณi , (19) u (ฮณi ) r=0 i=1,2,...,b16 ln Dc l i m โˆ—(r) where li โ‰ค 2 minrโˆˆ[r[i+1] ,r[i+2] ] | Cut u | with r[i] = 15 16 , and the maximum is taken over posi15 P tive integers (ฮณi ) satisfying the condition: ฮณi < 2112 ln D +528 ln n. We provide two more convenient corollaries of Theorem 1. For the case when the considered trees โˆ—(r) Tu are close to scale-free, we simply bound the size of all cuts Cut u through skeleton dimension: โˆ—(r) | Cut u | โ‰ค k . Bound (19) then takes the asymptotic form, for imax = b16 ln Dc: X S(u) โ‰ค O(k ) + O(log n) + O(k ) max ln ฮณi , (20) (ฮณi ) iโ‰คimax where the latter sum can be bounded using the concavity of the logarithm function as: ๏ฃซ ๏ฃถ    X X 1 log n ๏ฃธ ๏ฃญ ฮณi โ‰ค imax O max 1, log โ‰ค max ln ฮณi โ‰ค imax max ln imax log D (ฮณi ) (ฮณi ) iโ‰คimax iโ‰คimax    log n โ‰ค O log D max 1, log . log D 18 We also observe the following link between the parameters k , D, and n. Since by Proposition 1 graph G has doubling dimension bounded by 2 k +1, it follows that a radius-D ball in G may only contain at most (2 k +1)dlog2 De nodes from V . Hence, (2 k +1)dlog2 De โ‰ฅ n, and we obtain: log n = O(log k ยท log D). (21) Thus, the O(log n) additive factor in the bound (20) on S(u) is dominated in notation by the last factor of the sum, which is stated as at least O(k log D). Combining the above, we obtain the following corollary. Corollary 2. With probability at least 1 โˆ’ O(1/n), the hub set size of every node is bounded by:    log n . O k log D max 1, log log D In particular, when the graph has sufficiently large diameter, D = nโ„ฆ(1) , we have that the hub set size of all nodes is bounded by O(k log D). For the general case, by introducing Eq. (21) into Corollary 2, we obtain the following statement. Corollary 3. With probability at least 1 โˆ’ O(1/n), the hub set size of every node is bounded by: O (k log log k log D) . When considering the case of trees in which the width of tree Tuโˆ— is far from uniform over different scales of distance, tighter bounds are obtained by relating the size of S(u) toP the integrated skeleton dimension kฬ‚ (u). To do this, we apply in Eq. (19) the rough bound: ln ฮณi < ln i ฮณi = O(log log n + log log D). This leaves us with an expression of the form: X S(u) โ‰ค O(kฬ‚ (u))+O(log n)+O(log log n+log log D) li โ‰ค O(log n+kฬ‚ (u)(log log n+log log D)), iโ‰คimax where we used the bound rameter kฬ‚ . P iโ‰คimax li โ‰ค O(kฬ‚ (u)), which follows easily from the definition of the pa- Corollary 4. With probability at least 1 โˆ’ O(1/n), the hub set size of every node u โˆˆ V is bounded by O(log n + kฬ‚ (u)(log log n + log log D)). 4 An Application to ฮด-preserving Distance Labeling As a slight extension of our results, we note that our technique based on analyzing tree skeletons for shortest path trees has direct application the ฮด-preserving distance labeling problem in unweighted graphs, for some parameter ฮด > 0. We recall that a scheme is called ฮด-preserving if for any queried pair of nodes (u, v) with ฮด(u, v) > ฮด, the value returned by the decoder is equal to ฮด(u, v). By analogy to the integrated skeleton dimension given by (2), we introduce a variant for this parameter which only considers cuts at distance more than ฮด/6. kฬ‚ ฮด (u) := X vโˆˆVuโˆ— :d(u,v)>ฮด/6 1 = du (v) โˆ—(r) X rโˆˆN,r>ฮด/6 | Cut u r | . (22) The claims of Lemma 2 and Corollary 4, which give bounds on average hub size of O(kฬ‚ (u)) and O(log n + kฬ‚ (u)(log log n)) in the unweighted setting, naturally translate to ฮด-preserving labeling. For our techniques to be directly applicable, it suffices to subdivide each edge of the graph into a path of 12 19 vertices so that all distances between u โˆ’ v pairs are divisible by 12, and to choose shortest path trees so that for any pair of nodes u, v, the intersection Tu โˆฉ Tv contains a shortest u โˆ’ v path (this may be achieved, for example, by enforcing a unique choice of shortest paths between any node pair, e.g., by choosing i.a.r. the length of each edge in the range [1 โˆ’ 1/n, 1]). Then, the entire analysis holds, and we can eventually replace kฬ‚ (u) by kฬ‚ ฮด (u) in the statement of the claims. โˆ—(r) We remark that it is an elementary property of the tree skeleton that | Cut u | = O(n/r), since any node at distance r from u continues in Tu along an independent path of length at least r/2. By performing the latter sum in (22), we obtain kฬ‚ ฮด (u) = O(n/ฮด). Thus, we obtain the following Proposition. Proposition 3. There exists a hub labeling scheme for the ฮด-preserving distance labeling problem with hubs of average size O(n/ฮด) and worst case size O(log n+(n/ฮด) log log n). The size of the bit representations of the corresponding labels is O((n/ฮด) log n) and O(log2 n+(n/ฮด) log n log log n), respectively. The size of the obtained ฮด-preserving hub-based labeling scheme is (almost) optimal, since there holds a lower bound of โ„ฆ(n/ฮด) on both the average and worst-case size of hub sets [10]. In fact, our scheme can be modified slightly to obtain hub sets of worst-case size O(n/ฮด) up to a certain threshold e โˆšn). We present the details of this modified scheme in the following Subsection. value ฮด = O( 4.1 A Modified ฮด-preserving Labeling Scheme In this section we present an independent family of distance labeling schemes, which have the ฮดpreserving property. Whereas the scheme and the presented analysis are valid for any value of parameter ฮด > 0, we obtain an improvement on the previously discussed scheme only up to some threshold value e โˆšn). ฮด = O( Construction of the Labeling. Fix the value of parameter ฮด > 0, with 12|ฮด. The basic building block of our labeling is a construction of hub sets Sฮด (u) for each node u โˆˆ V , which allow us to handle distance queries for pairs of nodes whose distance is in the range [ฮด, 5ฮด/4]. Before providing the details of the constructions of sets Sฮด (u), we first introduce some auxiliary notation. As before, for a pair of nodes u, v โˆˆ V , we denote by P (u, v) a fixed shortest path between u and v. In the definition of P (u, v), ties between different shortest paths should be broken in a consistent manner S over the whole graph, so that P (u, v) = P (v, u), and the set of shortest paths rooted at a node u, vโˆˆV P (u, v), is a spanning tree of G. For a node u โˆˆ V , we denote by Tu the shortest path subtree of G, rooted at u, leading from u to nodes at distance in the range [ฮด, 5ฮด/4]: [ Tu = P (u, v). vโˆˆV : d(u,v)โˆˆ[ฮด,5ฮด/4] We denote by Tuโˆ— the subtree (skeleton) of tree Tu , also rooted at u and truncated to its first 3ฮด/4 levels from the root: Tuโˆ— = Tu [{v โˆˆ V (Tu ) : d(u, v) โ‰ค 3ฮด/4}]. We remark that all descending paths in Tuโˆ— have reach of at least ฮด/4 in Tu . The set Sฮด (u) will be constructed similarly as before, to include vertices from the central part of any u โˆ’ v path in the tree, for vertices v with d(u, v) โˆˆ [ฮด, 5ฮด/4]. However, we wish to control the number of possible bad events in which a descending path in the tree Tuโˆ— branches out at some level into too many subpaths, from each of which some representative node will need be chosen into Sฮด (u). To do this, we will partition the vertex set of tree Tuโˆ— into two subsets, Hu โˆช Lu , known as heavy and light vertices, respectively. A vertex w of Tuโˆ— belongs to Hu if the subtree of Tuโˆ— rooted at w has at least ฮด leaves (all in the last level 3ฮด/4), and belongs to Lu otherwise. We remark that Tuโˆ— [Hu ] is a (possibly empty) subtree of Tuโˆ— , whereas Tuโˆ— [Lu ] is a sub-forest of Tuโˆ— , in which each connected component is a tree with less than 20 Hu u 3 4ฮด ฮด 5 4ฮด Figure 3: Hub set selection for distance range [ฮด, 5ฮด/4]. The corresponding shortest path tree Tu for some vertex u is shown in the figure. The set of heavy vertices Hu is shaded around vertex u; all remaining vertices up to distance 34 ฮด belong to Lu . Vertices of L0u โІ Lu are also marked, with corresponding descending paths Pd shaded. ฮด leaves. In all the considered trees, we maintain the same ancestry relation. In particular, we speak of a descending subpath in a tree if one of its endpoints is an ancestor of the other with respect to the tree Tuโˆ— rooted at u. We are now ready to define the hub sets Sฮด (u), u โˆˆ V by the following randomized construction. Assign to each node v โˆˆ V a real value ฯ(v) โˆˆ [0, 1], uniformly and independently at random. We now put for all u โˆˆ V : Sฮด (u) := Hu โˆช L0u , (23) where L0u โІ Lu is defined as the set of all vertices v โˆˆ Lu , such that there exists a descending subpath Pd in Tuโˆ— [Lu ], such that v โˆˆ Pd , |Pd | = ฮด/12, and v has the minimal value of ฯ along path Pd , v = arg minwโˆˆPd ฯ(w) โ‰ก arg min ฯ(Pd ). See Fig. 3 for an illustration. Correctness. We start by showing that sets Sฮด have the desired hub property, regardless of the choice of random values ฯ (which may only affect the size of these sets). Lemma 6. For any pair of nodes u, v โˆˆ V such that d(u, v) โˆˆ [ฮด, 5ฮด/4], we have: d(u, v) = (d(u, w) + d(w, v)) . min wโˆˆSฮด (u)โˆฉSฮด (v) Proof. Consider the path P = P (u, v) = P (v, u). We have P โІ Tu and P โІ Tv . Moreover, |P | โ‰ค 5ฮด/4 and |P โˆฉ Tuโˆ— | = |P โˆฉ Tvโˆ— | = 3ฮด/4. Denoting by P โˆ— the subpath of P which belongs to both trees Tuโˆ— and Tvโˆ— , P โˆ— = P โˆฉ Tuโˆ— โˆฉ Tvโˆ— , it follows that |P โˆ— | โ‰ฅ ฮด/4. We now prove the claim of the lemma by showing that at least one vertex from P โˆ— has to belong to Sฮด (u) โˆฉ Sฮด (v). We achieve this by a case analysis, depending on the portions of path P โˆ— which belong to the sets Lu , Hu , Lv , and Hv . โ€ข If |P โˆ— โˆฉHu โˆฉHv | > 0, then there exists at least one vertex w โˆˆ P โˆ— โˆฉHu โˆฉHv โІ P โˆ— โˆฉSฮด (u)โˆฉSฮด (v), which completes the proof. โ€ข If |P โˆ— โˆฉ Lu โˆฉ Hv | โ‰ฅ ฮด/12, then there exists at least one descending subpath Pd of length ฮด/12 in Tuโˆ— [Lu ] which is completely contained in P โˆ— โˆฉ Hv . Setting w = arg min ฯ(Pd ), we have w โˆˆ L0u , and so it follows that w โˆˆ P โˆ— โˆฉ L0u โˆฉ Hv โІ P โˆ— โˆฉ Sฮด (u) โˆฉ Sฮด (v). โ€ข If |P โˆ— โˆฉ Hu โˆฉ Lv | โ‰ฅ ฮด/12, we obtain the result by applying analogous considerations as in the previous case. 21 โ€ข Finally, in all other cases we must have |P โˆ— โˆฉ Lu โˆฉ Lv | โ‰ฅ ฮด/12. It follows that there exists at least one subpath Pd โІ P โˆ— of length ฮด/12, which is a descending subpath in both Tuโˆ— [Lu ] and Tvโˆ— [Lv ]. Setting w = arg min ฯ(Pd ), we obtain w โˆˆ L0u and w โˆˆ L0v , hence w โˆˆ P โˆ— โˆฉ L0u โˆฉ L0v โІ P โˆ— โˆฉ Sฮด (u) โˆฉ Sฮด (v). Analysis. We now consider the size of sets Sฮด (u). The size of set Hu is independent of the choice of random variables ฯ; it can easily be bounded, taking into account that tree Tuโˆ— has O(n/ฮด) leaves. Lemma 7. For all u โˆˆ V , |Hu | โ‰ค 3n/ฮด. Proof. Let l โˆˆ Hu be a leaf node of Tuโˆ— [Hu ]. By definition of Hu , we have that the subtree of Tuโˆ— rooted at l has at least ฮด leaves. As every leaf of Tuโˆ— is at depth 3ฮด/4, and all leaves in tree Tu are at depth at least ฮด, it follows that the subtree of l in Tu contains at least ฮด disjoint descending paths of length ฮด/4 each, and so it has at least ฮด 2 /4 nodes. Since the size of tree Tu is at most n, we obtain that tree Tuโˆ— [Hu ] has at most 4n/ฮด 2 leaves. Moreover, the distance of each node of Tuโˆ— [Hu ] from its root u is at most 3ฮด/4. Hence, |Tuโˆ— [Hu ]| โ‰ค (3ฮด/4)(4n/ฮด 2 ) = 3n/ฮด. The size of set L0u depends on the choice of random variables ฯ. We start by bounding the expected number of elements of L0u , belonging to specific connected components of Tuโˆ— [Lu ]. Suppose Tuโˆ— [Lu ] be (1) (k ) a forest consisting of ku trees, and let Lu = Lu โˆช . . . โˆช Lu u be the partition of its vertex set such that (i) (i) (i) Tuโˆ— [Lu ] represents its i-th connected component. Let lu denote the number of leaves of tree Tuโˆ— [Lu ]. 0(i) (i) 0(1) 0(k ) Finally, let Lu = L0u โˆฉ Lu . Clearly, Lu โˆช . . . โˆช Lu u is a partition of L0u . In the following, we P 0(i) u |Lu |, showing that it has an expectation of O(n/ฮด), and consider the random variable |L0u | = ki=1 obtaining concentration results around this expectation. First, we remark that each descending path of tree Tuโˆ— contributes O(1) elements in expectation to set 0(i) Tuโˆ— . Consequently, the expected size of set |Lu | can be related to the number of leaves in the considered connected component. 0(i) (i) Lemma 8. For all u โˆˆ V and all 1 โ‰ค i โ‰ค ku , E|Lu | โ‰ค 36lu . (i) (i) Proof. Let Pu be the set of (inclusion-wise) maximal descending paths in the tree Tuโˆ— [Lu ]. We remark (i) (i) that |Pu | โ‰ค lu . (i) For a path P โˆˆ Pu , let MP (v) be the event that there exists a subpath Pd โІ P , with |Pd | = ฮด/12, such that v = arg min ฯ(Pd ). We have Pr[MP (v)] = 0 for v โˆˆ / P . If v โˆˆ P , then we use the following folklore probability estimation: for MP (v) to hold, one of the two (at most) descending subpaths P 0 of P of length ฮด/24, having v as one of their endpoints, must satisfy v = arg min ฯ(P 0 ). It follows that for 0(i) v โˆˆ P , we have Pr[MP (v)] โ‰ค 48/ฮด. By linearity of expectation we now obtain a bound on E|Lu |: E|L0(i) u |= X vโˆˆV Pr[v โˆˆ L0(i) u ]โ‰ค X X Pr[MP (v)] โ‰ค |Pu(i) | ยท max |P | ยท (i) P โˆˆPu (i) P โˆˆPu vโˆˆP 48 3ฮด 48 โ‰ค lu(i) ยท ยท = 36lu(i) . ฮด 4 ฮด By linearity of expectation, we can apply the claim of Lemma 8 over all connected components, obtaining the following result. Lemma 9. For all u โˆˆ V , E|L0u | โ‰ค 144n/ฮด. 22 Proof. By Lemma 8 we have: E|L0u | =E ku X |L0(i) u | โ‰ค 36 i=1 ku X lu(i) . i=1 P u (i) lu โ‰ค 4n/ฮด. Indeed, this sum represents the total number The claim follows when we observe that ki=1 โˆ— of leaves in Tu [Lu ]. Each such leaf (located at distance 3ฮด/4 from u) is the upper endpoint of a distinct descending path of length at least ฮด/4 in the tree Tu , and |Tu | โ‰ค n, hence we obtain the bound. In order to apply Chernoff bounds to the sum of random variables |L0u |, we start by bounding the range of these variables. 0(i) (i) Lemma 10. For all u โˆˆ V and all 1 โ‰ค i โ‰ค ku , |Lu | โ‰ค |Lu | < ฮด 2 . 0(i) (i) (i) Proof. We have Lu โІ Lu . By the definition of set Lu , tree Tuโˆ— [Lu ] has less than ฮด leaves and all its (i) nodes are at distance at most 3ฮด/4 from its root. It follows that |Lu | < ฮด ยท 3ฮด/4 < ฮด 2 . 0(i) The above upper bound provides an estimate on the maximum value of each random variable |Lu |. However, in order to be able to perform a concentration analysis in a range of fairly large ฮด (roughly, 0(i) for n1/3 < ฮด < n0.5 ), we also need to bound more tightly the concentration of each |Lu | around its expected value. Let V0 = {v โˆˆ V : ฯ(v) < 50 lnฮดn }. We start by showing that with high probability, all elements of the sets |L0u | belong to V0 . Lemma 11. Denote by X the โ€œbadโ€ event that there exists a node u โˆˆ V , such that L0u 6โІ V0 . We have: Pr[X] < 1/n. Proof. Consider first the probability pv that a fixed node v โˆˆ V \ V0 satisfies v = arg min ฯ(P ), where P is any fixed path of ฮด/12 nodes in G which contains v. We have (with the last inequality holding when ฮด โ‰ฅ 300): Y pv = (1 โˆ’ ฯ(v)) = (1 โˆ’ ฯ(v))ฮด/12โˆ’1 < (1 โˆ’ 50 ln n/ฮด)ฮด/12โˆ’1 < nโˆ’4 . wโˆˆP \{v} The probability of event X occurring can be upper-bounded by performing a union bound over all nodes u, all descending paths P in Tuโˆ— [Lu ], and all nodes v โˆˆ P of the event [v = arg min ฯ(P )โˆฉv โˆˆ / V0 ] occurring. For each node u, there are at most n such paths to consider, and less than ฮด possible nodes v in each path. Overall, we obtain: Pr[X] โ‰ค n ยท n ยท ฮด ยท pv < n3 ยท nโˆ’4 = 1/n. (i) Next, we show that with high probability, each connected component Lu contains at most O(ฮด log n) nodes from V0 . Lemma 12. Denote by Y the โ€œbadโ€ event that there exists a node u โˆˆ V and 1 โ‰ค i โ‰ค ku , such that (i) |Lu โˆฉ V0 | > 100ฮด ln n. We have: Pr[Y ] < 1/n. 23 Proof. Let Z(v) denote the indicator variable for node v and set V0 , i.e., Z(v) = 1 if v โˆˆ V0 and Z(v) = 0 otherwise. Clearly, Pr[Z(v) = 1] = 50 ln n/ฮด, and all random variables Z(v), v โˆˆ V are (i) independent. For any fixed |Lu |, we have: X E Z(v) โ‰ค |L(i) u | ยท 50 ln n/ฮด โ‰ค 50ฮด ln n, (i) vโˆˆLu (i) where we used 10 to bound |Lu |. Next, we proceed by apply a simple multiplicative Chernoff bound for the considered random variable: X Pr[|L(i) Z(v) > 100ฮด ln n] โ‰ค eโˆ’50ฮด ln n/3 < nโˆ’16 . u โˆฉ V0 | > 100ฮด ln n] = Pr[ (i) vโˆˆLu (i) Applying a union bound over Lu , for all u โˆˆ V and 1 โ‰ค i โ‰ค ku , gives the claim. We are now ready to apply a Chernoff-bound type analysis to the random variable |L0u |. โˆš Lemma 13. Let ฮด โ‰ค n/ ln n. Then: Pr[โˆ€uโˆˆV |L0u | < 800n/ฮด] = 1 โˆ’ O(1/n). 0(i) 0(i) 0(i) (i) (i) Proof. Define the random variable ฮปu as |Lu | when Lu โІ Lu โˆฉ V0 and |Lu โˆฉ V0 | โ‰ค 100ฮด ln n, 0(i) and fix ฮปu = 0 otherwise. Pku 0(i) 0(i) Define ฮป0u = i=1 ฮปu . All ฮปu are independent random variables, since they are functions of (i) 0(i) disjoint sets of random variables (ฯ(v) : v โˆˆ Lu ). Moreover, we have 0 โ‰ค ฮปu โ‰ค 100ฮด ln n. An application of a simple multiplicative Chernoff bound gives for any A > 0: Pr[ฮป0u       144en/ฮด A/(100ฮด ln n) 400n/ฮด A/(100ฮด ln n) Eฮป0u A/(100ฮด ln n) โ‰ค < , โ‰ฅ A] < e A A A where we used the bound Eฮป0u โ‰ค E|L0u | โ‰ค 144n/ฮด following from Lemma 9. Putting A = 800n/ฮด and โˆš taking into account that ฮด โ‰ค n/ ln n, we get for sufficiently large n: Pr[ฮป0u โ‰ฅ 800n/ฮด] < 2โˆ’8n/(ฮด 2 ln n) < 1 . n2 By applying a union bound over all nodes, we obtain that Pr[โˆ€uโˆˆV ฮป0u < 800n/ฮด] > 1 โˆ’ 1/n. Taking into account Lemmas 11 and 12, we also have: Pr[โˆ€uโˆˆV ฮป0u = |L0u |] > 1 โˆ’ 2/n. Overall, we obtain: Pr[โˆ€uโˆˆV |L0u | < 800n/ฮด] > 1 โˆ’ 3/n. In view of the definition of the proposed hub set labeling (Eq. (23)), Lemmas 7 and 13 complete โˆš the analysis of the case of ฮด โ‰ค n/ ln n, showing that our randomized construction yields with high probability hub sets of size O(n/ฮด) for all nodes of the graph. โˆš Proposition 4. For any 0 < ฮด โ‰ค n/ ln n, 12|ฮด, there exists a hub labeling scheme which correctly decodes the distance between any pair of nodes lying at a distance in the range [ฮด, 5ฮด/4], using hubs of size at most O(n/ฮด). 24 4.2 Improved ฮด-preserving Distance Labeling for Arbitrary Distance For an arbitrary instance of the ฮด-preserving distance labeling problem, we can now construct a hub set S + (u) by combining the results of Propositions 4 and 3, for large and small scales of distance, respectively. Formally, we put: [ Sฮดi (u), S + (u) := Sฮดmax (u) โˆช (24) i=0,1,2,... ฮดi <ฮดmax where in the first part of the expression, the value โˆš ฮดmax = max{ฮด, b n/ ln nc} is a suitably chosen threshold parameter, and the hub set Sฮดmax (u) is constructed following Proposition 4, thus providing a ฮดmax -preserving distance labeling. In the second part of the expression, we take care of smaller distances from the range [ฮด, ฮดmax ), by applying Proposition 3 over a specifically chosen distance sequence {ฮดi }i , to obtain hub sets Sฮดi (u), such that each set Sฮดi (u) intersects with a shortest u โˆ’ v path, for all nodes v such that d(u, v) โˆˆ [ฮดi , 5ฮดi /4]. To obtain a coverage of the entire distance range [ฮด, ฮดmax ), we put ฮด0 = 12bฮด/12c < ฮด, and choose ฮดi+1 as the largest integer such that 12|ฮดi+1 and ฮดi+1 < 5ฮดi /4. Since the sequence {ฮดi }i is geometrically increasing, in view of Proposition 3, we obtain the following bound: |S + (u)| = O(n/ฮด + |Sฮดmax (u)|). (25) Now, taking into account the definition of ฮดmax and bounding |Sฮดmax (u)| by Proposition 4, we directly obtain the main result of this Section. Theorem 2. There exists a ฮด-preserving distance labeling scheme based on hub sets, such that: โˆš (i) When ฮด โ‰ค n/(ln n ln ln n), the hub sets of all nodes are of size O(n/ฮด), which corresponds to distance labels of size O(n log ฮด/ฮด) per node. (ii) For any ฮด > 0, the hub sets of all nodes are of size O(log  ฮด + n log log ฮด/ฮด), which corresponds 2 to distance labels of size O log ฮด + n log ฮด log log ฮด/ฮด per node. (iii) For any ฮด > 0, the average size of a hub set, taken over all nodes, is O(n/ฮด), which corresponds to distance labels of average size O(n log ฮด/ฮด) per node. Furthermore, the corresponding labels can be constructed in expected polynomial time. 5 Computing Skeleton Dimension and Distance Labels Discrete skeleton representation. Given a tree T rooted at node u with length function `, a discrete representation of its skeleton T โˆ— can be obtained as the sub-tree with edges vw โˆˆ E(T ) such that Reach T (v) โ‰ฅ 21 dT (u, v) equipped with length function `0 defined by `0 (vw) = `(vw) if Reach T (w) โ‰ฅ 1 2 0 2 dT (u, w) and ` (vw) = r โˆ’ dT (u, v) with r = 3 (dT (u, w) + Reach T (w)) otherwise. The idea is that โˆ— node w is a leaf of T that corresponds to the point w0 of edge vw in Te that satisfies Reach Te (w0 ) = 1 0 2 dTe (u, w ). To see this, let x be a descendant of w such dT (w, x) = Reach T (w). We then have 2 r = 3 dT (u, x). We thus get Reach Te (w0 ) = dT (v, x) โˆ’ `0 (vw) = dT (u, x) โˆ’ r = 31 dT (u, x) = 2r whereas dTe (u, w0 ) = dT (u, v) + `0 (vw) = r. 25 Skeleton dimension computation. Given a tree T , the reach of each node can be computed by a scan of vertices in reverse topological order. Obtaining the discrete skeleton representation is then straightforward. Its width k can be computed by scanning vertices by non-decreasing distance from the root using a priority queue for storing edges containing nodes in Cut r (T ). This can be done in O(n log log k ) time using a dedicated integer priority queue [28]. The skeleton of a graph can thus be simply obtained from an all pair shortest path computation. With integer lengths and dedicated priority queues [28], this can be done in O(nm + n2 log log n) time. We remark that faster computation of tree skeletons could be obtained in practice by using classical heuristics for bounding reach of nodes [22, 24]. The algorithm proposed in [24] alternates partial shortest-path tree computation with introduction of shortcuts to obtain efficiently reach bounds on the graph plus the added shortcuts. The computation of partial trees up to a given radius 2r allows to prune nodes with reach less than r. Shortcuts allow to reduce reach of nodes with degree 2: if a node v has two neighbors u, w, a shortcut uw with length `(uv) + `(vw) is added to by-pass v. The algorithm results in reach bounds on the graph with shortcuts. Reach bounds on the original graph can then be obtained by removing shortcuts in reverse order and updating the reach bound R(v) of a node v by-passed by shortcut uw as R(v) := max(R(v), min(R(u) + `(uv), `(vw) + R(w))) where R(u) and R(w) denote the reach bounds obtained for u and w respectively. A subtree containing the tree skeleton of a node u can then be obtained through a partial Dijkstra from u where we prune nodes whose reach is known to be less than half of the current distance from u. In practice, we believe that this would allow to compute each skeleton tree in time comparable to an RE query. Our labeling algorithm can then be adapted to take the resulting family of trees as input. Distance label computation. Computing the hub set of a tree T is more intricate as we have to emulate the subdivision of each edge of length a into 12a unweighted edges to conform to the analysis of Section 3. For the sake of notation, we number these unweighted edges of the subdivision from 1 to 12a, and let ฯi , 1 โ‰ค i โ‰ค 12a, denote the associated random number which is generated for each of the edges of the subdivision. Given a sample {ฯi | 1 โ‰ค i โ‰ค 12a}, let M denote the set of indices of edges which are prefix minima or suffix minima in the sequence (ฯ1 , . . . , ฯ12a ). For the purpose of our selection algorithm, we only need to generate set M and the ฯi -values associated with i โˆˆ M . We start by generating those elements of M which are prefix minima. By a slight abuse of notation, to initialise the process, we set i0 = 1 and generate ฯ1 uniformly at random in [0, 1], ฯ1 := rand(0, 1). For successive j = 0, 1, 2, . . ., we then generate the index ij+1 of the first edge of M after the edge with index ij (which is also the first index of M having value less than ฯij ). As ij+1 โˆ’ ij follows a geometric distribution j k rand(0,1) with parameter p = ฯij , this can be done in constant time by setting ij+1 := ij + loglog(1โˆ’p) (see e.g. [19]). We then generate ฯij+1 uniformly in [0, ฯij ]. We generate in this way indices i1 , . . . , ix , until for some x โˆˆ N we reach the 12a bound (i.e. ix+1 > 12a). We then proceed similarly in reverse order for edges with index greater than ix , to generate those edges with suffix minimal value (note that this time we have to sample values greater than ฯix , rather than greater than 0, and adapt all ranges accordingly, for consistency with the choice of prefix minima). In this way, we perform O(log a) constant-time sampling operations per edge of length a, obtaining O(log a) values (together with their positions) per edge, in expectation (and also w.h.p. with respect to a). Since random choices made for all edges of the original graph are independent, by a quick Chernoff bound, the total amortized sampling time over the whole graph is O(m log C), w.h.p., where C denotes the maximum length of an edge. We remark that when constructing a hub set for a subset of nodes, each node only relies on the random choices made in its shortest-path tree, which can be evaluated in time O(n log C), w.h.p. Our selection algorithm of the edge with minimal value in the middle window for a pair u, v will necessarily select an edge that we have generated when the window contains a (real) edge extremity. Each time a virtual unweighted edge is selected as a hub, we indeed select the real edge it belongs to. 26 We also have to manage the special case where the middle window entirely falls inside a long edge. In that case, the long edge is selected as hub. The computation of the hub set is then a matter of scanning the tree by non-decreasing distance r of generated vertices while maintaining a sliding middle window for each branch reaching distance r. Using a balanced binary search tree per window for storing the virtual edges it contains, we obtain the hub set in O(n log C log(n log C)) time. Distance labels can thus be computed in expected O(nm + n2 log C(log n + log log C)) time. Note that each of the n labels can be computed independently (e.g. in parallel) in O(m + n log C(log n + log log C)) time per label, as long as randomness is shared (e.g. using random generators with same seeds). 6 Generalizing the Definition of a Skeleton The definition of a skeleton, and the corresponding notion of skeleton dimension can be generalized in two ways, by using a different distinct distance metric to compute reach of a point in a tree, as well as by modifying the threshold value of reach required to retain a point in the skeleton. Using two metrics. Suppose the graph G is associated with two non-negative length functions, ` and `0 , of its edges. For example, in road networks, one can typically consider travel time `t and geographic distance `d , resulting in time and distance metrics, respectively. Another metric which may be of interest is hop count, corresponding to the constant function `h = 1 (i.e. `h (uv) = 1 for each edge uv). Once a shortest path tree Tu for node u and its geometric realization Teu has been computed according to length function `, distance and reach within Teu can be computed according to `0 . Formally, extending 0 the definition from Section 2.1, the skeleton Tuโˆ—` of Tu is then defined as the subtree of Teu induced 0 0 0 0 by {v โˆˆ V (Teu ) | Reach `Te (v) โ‰ฅ 21 d`e (u, v)}, where d`e and Reach `Te denote distance and reach with Tu u respect to `0 . 0 The skeleton dimension of G is then k ` Tu u 0 = maxuโˆˆV (G) Width(Tuโˆ—` ). The advantage of this approach is that it sometimes results in smaller skeleton dimension (depending on the choice of metric `0 ), without affecting the correctness of any of the hub labeling schemes designed in this paper. As an example, the respective skeleton dimensions of the 9-th DIMACS New York graph [1] for different choices of metrics turn out to be: k `t = 73, k `d = 66, and k `h = 56, where `t , `d , and `h denote traveltime, geographic-distance, and hop-count length functions, respectively (considering shortest path trees for the metric `t in all three cases). We remark that a similar phenomenon, also taking advantage of two metrics, was observed and used in the reach-pruning approach [24]. Modifying reach threshold. The choice of a reach threshold of 21 in the definition of skeleton is arbitrary. Indeed, for any fixed ฮฑ > 0, we can define the skeleton Tuฮฑโˆ— as the subtree of Teu induced by {v โˆˆ V (Teu ) | Reach Teu (v) โ‰ฅ ฮฑ dTeu (u, v)}, and the skeleton dimension kฮฑ of G is given as kฮฑ = maxuโˆˆV (G) Width(Tuฮฑโˆ— ). The values of skeleton dimension for different values ฮฑ and ฮฒ of the reach threshold are related to each other by the following Proposition. Proposition 5. For two constants ฮฑ < ฮฒ, the following bounds hold: kฮฒ โ‰ค kฮฑ โ‰ค kฮฒ k ฮฒ+1 ฮฒ/ฮฑโˆ’1 . Proof. The first relation is immediate since Tuฮฒโˆ— is a subtree of Tuฮฑโˆ— for ฮฒ โ‰ฅ ฮฑ. The second relation S 0 0 is obtained by observing that Cut r (Tuฮฑโˆ— ) โІ vโˆˆCut 0 (T ฮฒโˆ— ) Cut rโˆ’r0 (Tvฮฒ โˆ— ), with r0 = 1+ฮฑ 1+ฮฒ and ฮฒ = u r ฮฒ+1 . Indeed, for w โˆˆ Cut r (T ฮฑโˆ— ), we can consider in Teu the point v at distance r0 from u on the ฮฒ/ฮฑโˆ’1 u branch leading to w. The reach of w in Teu is then at least r โˆ’ r0 + Reach Teu (v) โ‰ฅ r โˆ’ r0 + ฮฑr โ‰ฅ ฮฒr0 for 27 0 (1 + ฮฑ)r โ‰ฅ (1 + ฮฒ)r0 and v thus belongs to Tuฮฒโˆ— for r0 = 1+ฮฑ 1+ฮฒ . Moreover, w is at distance r โˆ’ r from v 0 in Tev and has reach at least ฮฑr, implying w โˆˆ V (Tvฮฒ โˆ— ) for ฮฒ 0 โ‰ค ฮฑr 0 , which is the case for ฮฒ 0 = ฮฒ+1 rโˆ’r when r0 = ฮฒ/ฮฑโˆ’1 1+ฮฑ 1+ฮฒ . For ฮฒ = 1 and ฮฑ < 1, the second relation of the above Proposition gives kฮฑ โ‰ค k1 k 2ฮฑ 1โˆ’ฮฑ , which also implies that k1 โ‰ค kฮฑ โ‰ค k12 for ฮฑ โ‰ฅ 1/3. More generally, we can derive the following bounds by repeatedly applying Proposition 5 for ฮฒ = 1: dlog(1+1/ฮฑ)e k1 โ‰ค kฮฑ โ‰ค k1 for ฮฑ < 1. This shows that for a given graph, skeleton dimension kฮฑ grows at most polynomially with ฮฑ1 . Naturally, one can also apply both of the above-described generalizations together, obtaining a new 0 skeleton dimension parameter kฮฑ` with reach metric `0 and reach threshold ฮฑ. All the results of the paper about hub labelings and their computation in graphs with low skeleton dimension can be easily 0 0 generalized to use kฮฑ` instead of k, as long as ฮฑ < 1 (ensuring that any two skeleton trees Tu` โˆ—ฮฑ and 0 ` Tv` โˆ—ฮฑ share a constant fraction of the u โˆ’ v shortest path). The particular choice of k = k1/2 was made ` with the objective of clarity, and also on account of the simple relationship between k1/2 and highway dimension. 7 Conclusion In this paper, we have proposed skeleton dimension as a measure of the networkโ€™s amenability to shortest path schemes based on hub/transit nodes. We intend it as a parameter which is easy to describe and can be computed efficiently. Computations of hub sets based on skeleton dimension allow each node to individually and efficiently define its own hub set, subject only to a universal choice of random id-s. Such a construction is always correct, and gives small hub sets w.h.p. We remark that in a weighted network each node can compute its own appropriate labeling in O(m + n log C(log n + log log C)) time, where C is the length of the longest integer weight in the network. The definition of hub sets, and the obtained bounds on their size, hold both for undirected and directed graphs. For directed graphs, skeleton dimension appears to be a parameter which is more directly usable than highway dimension. Possible extensions of skeleton dimension, discussed in Section 6, include variants of skeleton dimension with other values of reach threshold, as well as skeleton dimension defined using two separate distance metrics in the graph: one corresponding to the needs of the shortest path queries (used to construct shortest path trees), and another, potentially independent metric used internally in the computation of hub labelings, chosen so as to empirically minimize the width of the skeleton. When studying average-case parameters of a network, the integrated skeleton dimension given by (2) (as well as its natural generalizations to weighted graphs) appear to be a natural parameter, which may be related to that of average highway dimension [3]. We could also use the integrated skeleton dimension averaged over all nodes to get an even more accurate bound on average label size. Finally, we remark on the interplay between skeleton and highway dimension. Skeleton dimension is always not greater than geometric highway dimension. We have also shown a clear case of separation in a weighted Manhattan-type network, where skeleton dimension is asymptotically much smaller than (geometric) highway dimension. We remark that skeleton dimension appears particularly worthy of further theoretical study in the context of scale-free models of random graphs (cf. e.g. [9] for a discussion in the context of highway dimension and reach). For geometric percolation graphs, skeleton dimension displays a close link with the coalescence exponent for geodesics. Consequently, it may be easier to show rigorous theoretical bounds for skeleton dimension than for highway dimension. 28 Acknowledgment The authors thank Przemek Uznanฬski and Olivier Marty for inspiring discussions on closely related problems. We also thank PU and Zuzanna Kosowska-Stamirowska for their help with the figures. References [1] 9th DIMACS Implementation Challenge: The Shortest Path Problem, 2006. [2] Ittai Abraham, Daniel Delling, Amos Fiat, Andrew Goldberg, and Renato Werneck. Highway dimension and provably efficient shortest path algorithms. Technical report, September 2013. [3] Ittai Abraham, Daniel Delling, Amos Fiat, Andrew V. Goldberg, and Renato F. Werneck. VCdimension and shortest path algorithms. In ICALP, volume 6755 of Lecture Notes in Computer Science, pages 690โ€“699. Springer, 2011. [4] Ittai Abraham, Daniel Delling, Andrew V. Goldberg, and Renato F. Werneck. A hub-based labeling algorithm for shortest paths in road networks. In SEA, volume 6630 of Lecture Notes in Computer Science, pages 230โ€“241. Springer, 2011. [5] Ittai Abraham, Daniel Delling, Andrew V. Goldberg, and Renato F. Werneck. Hierarchical hub labelings for shortest paths. In Proceedings of the 20th Annual European Conference on Algorithms, ESAโ€™12, pages 24โ€“35, Berlin, Heidelberg, 2012. Springer-Verlag. [6] Ittai Abraham, Daniel Delling, Andrew V. Goldberg, and Renato F. Werneck. Hierarchical hub labelings for shortest paths. In ESA, volume 7501 of Lecture Notes in Computer Science, pages 24โ€“35. Springer, 2012. [7] Ittai Abraham, Amos Fiat, Andrew V. Goldberg, and Renato F. Werneck. Highway dimension, shortest paths, and provably efficient algorithms. In Moses Charikar, editor, Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, Austin, Texas, USA, January 17-19, 2010, pages 782โ€“793. SIAM, 2010. [8] Ittai Abraham and Cyril Gavoille. On approximate distance labels and routing schemes with affine stretch. In In International Symposium on Distributed Computing (DISC), pages 404โ€“415, 2011. [9] David Aldous and Karthik Ganesan. True scale-invariant random spatial networks. Proceedings of the National Academy of Sciences, 110(22):8782โ€“8785, 2013. [10] Stephen Alstrup, Sรธren Dahlgaard, Mathias Bรฆk Tejs Knudsen, and Ely Porat. Sublinear distance labeling. In Piotr Sankowski and Christos D. Zaroliagis, editors, 24th Annual European Symposium on Algorithms, ESA 2016, August 22-24, 2016, Aarhus, Denmark, volume 57 of LIPIcs, pages 5:1โ€“ 5:15. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2016. [11] Stephen Alstrup, Cyril Gavoille, Esben Bistrup Halvorsen, and Holger Petersen. Simpler, faster and shorter labels for distances in graphs. In Robert Krauthgamer, editor, Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10-12, 2016, pages 338โ€“350. SIAM, 2016. [12] Maxim A. Babenko, Andrew V. Goldberg, Anupam Gupta, and Viswanath Nagarajan. Algorithms for hub label optimization. In Fedor V. Fomin, Rusins Freivalds, Marta Z. Kwiatkowska, and David Peleg, editors, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part I, volume 7965 of Lecture Notes in Computer Science, pages 69โ€“80. Springer, 2013. 29 [13] H. Bast, Stefan Funke, Domagoj Matijevic, Peter Sanders, and Dominik Schultes. In transit to constant time shortest-path queries in road networks. In ALENEX. SIAM, 2007. [14] Holger Bast, Stefan Funke, Peter Sanders, and Dominik Schultes. Fast routing in road networks with transit nodes. Science, 316(5824):566โ€“566, 2007. [15] Reinhard Bauer and Daniel Delling. SHARC: Fast and robust unidirectional routing. J. Exp. Algorithmics, 14:4:2.4โ€“4:2.29, January 2010. [16] Beฬla Bollobaฬs, Don Coppersmith, and Michael Elkin. Sparse distance preservers and additive spanners. SIAM Journal on Discrete Mathematics, 19(4):1029โ€“1055, 2005. [17] Fan R. K. Chung and Lincoln Lu. Survey: Concentration inequalities and martingale inequalities: A survey. Internet Mathematics, 3(1):79โ€“127, 2006. [18] Edith Cohen, Eran Halperin, Haim Kaplan, and Uri Zwick. Reachability and distance queries via 2-hop labels. SIAM J. Comput., 32(5):1338โ€“1355, May 2003. [19] Luc Devroye. Non-Uniform Random Variate Generation. Springer-Verlag, 1986. [20] Andreas Emil Feldmann, Wai Shing Fung, Jochen Koฬˆnemann, and Ian Post. A 1 + -embedding of low highway dimension graphs into bounded treewidth graphs. In ICALP 2015, volume 9134 of Lecture Notes in Computer Science, pages 469โ€“480. Springer, 2015. [21] Cyril Gavoille, David Peleg, Steฬphane Peฬrennes, and Ran Raz. Distance labeling in graphs. J. Algorithms, 53(1):85โ€“112, October 2004. [22] Andrew V. Goldberg, Haim Kaplan, and Renato F. Werneck. Reach for A*: Efficient point-to-point shortest path algorithms. In ALENEX, pages 129โ€“143. SIAM, 2006. [23] R.L. Graham and H.O. Pollak. On embedding graphs in squashed cubes. In Y. Alavi, D.R. Lick, and A.T. White, editors, Graph Theory and Applications, volume 303 of Lecture Notes in Mathematics, pages 99โ€“110. Springer Berlin Heidelberg, 1972. [24] Ronald J. Gutman. Reach-based routing: A new approach to shortest path algorithms optimized for road networks. In ALENEX/ANALCO, pages 100โ€“111. SIAM, 2004. [25] Ekkehard Koฬˆhler, Rolf H. Moฬˆhring, and Heiko Schilling. Fast point-to-point shortest path computations with arc-flags. In 9th DIMACS Implementation Challenge, 2006. [26] Colin McDiarmid. Concentration. In Michel Habib, Colin McDiarmid, Jorge Ramirez-Alfonsin, and Bruce Reed, editors, Probabilistic Methods for Algorithmic Discrete Mathematics, pages 195โ€“ 248. Springer Berlin Heidelberg, 1998. [27] Igor Nitto and Rossano Venturini. On compact representations of all-pairs-shortest-path-distance matrices. In Paolo Ferragina and Gad M. Landau, editors, Combinatorial Pattern Matching, 19th Annual Symposium, CPM 2008, Pisa, Italy, June 18-20, 2008, Proceedings, volume 5029 of Lecture Notes in Computer Science, pages 166โ€“177. Springer, 2008. [28] Mikkel Thorup. Integer priority queues with decrease key in constant time and the single source shortest paths problem. Journal of Computer and System Sciences, 69(3):330 โ€“ 353, 2004. [29] Oren Weimann and David Peleg. 111(14):671โ€“673, 2011. A note on exact distance labeling. 30 Inf. Process. Lett.,
8cs.DS
Proceedings of Machine Learning Research vol 75:1โ€“22, 2018 Minimax Distribution Estimation in Wasserstein Distance Shashank Singh SSS 1@ CS . CMU . EDU Barnabaฬs Poฬczos BAPOCZOS @ CS . CMU . EDU arXiv:1802.08855v1 [math.ST] 24 Feb 2018 Machine Learning Department, Carnegie Mellon University, Pittsburgh, PA 15213, USA Abstract The Wasserstein metric is an important measure of distance between probability distributions, with several applications in machine learning, statistics, probability theory, and data analysis. In this paper, we upper and lower bound minimax rates for the problem of estimating a probability distribution under Wasserstein loss, in terms of metric properties, such as covering and packing numbers, of the underlying sample space. Keywords: Wasserstein Distance; Density Estimation; Minimax Theory; Covering Number; Packing Number 1. Introduction The Wasserstein metric is an important measure of distance between probability distributions, based on the cost of transforming either distribution into the other through mass transport, under a metric on the sample space. Originating in the optimal transport literature,1 the Wasserstein metric has, owing to its intuitive and general nature, been utilized in such diverse areas as probability theory and statistics, economics, image processing, text mining, robust optimization, and physics (Villani, 2008; Fournier and Guillin, 2015; Esfahani and Kuhn, 2015; Gao and Kleywegt, 2016). In the analysis of image data, the Wasserstein metric has been used for various tasks such as texture classification and face recognition (Sandler and Lindenbaum, 2011), reflectance interpolation, color transfer, and geometry processing (Solomon et al., 2015), image retrieval (Rubner et al., 2000), and image segmentation (Ni et al., 2009), and, in the analysis of text data, for tasks such as document classification (Kusner et al., 2015) and machine translation (Zhang et al., 2016). In contrast to a number of other popular notions of distance2 between probability distributions, such as Lp distances or Kullback-Leibler and other f -divergences (Morimoto, 1963; Csiszaฬr, 1964; Ali and Silvey, 1966), which require distributions to be absolutely continuous with respect to each other or to a base measure, Wasserstein distance is well-defined between any pair of probability distributions over a sample space equipped with a metric.3 As a particularly important consequence, Wasserstein distances between discrete (e.g., empirical) distributions and continuous distributions are well-defined and informative (i.e., often finite). Partly for this reason, Wasserstein distances have been widely used in probability theory to prove central limit and related approximation theorems (Ruฬˆschendorf, 1985; Johnson et al., 2005; 1. The Wasserstein metric has been variously attributed to Monge, Kantorovich, Rubinstein, Gini, Mallows, and others; see Chapter 3 of Villani (2008) for detailed history. 2. We use the term distance to refer both to proper metrics as well as to similar notions, such as information divergences, that fail to satisfy symmetry or the triangle inequality. 3. For this reason, we use โ€œdistribution estimationโ€ in this paper, rather than the more popular โ€œdensity estimationโ€. c 2018 S. Singh & B. Poฬczos. D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Chatterjee et al., 2008; Rio et al., 2009, 2011; Chen et al., 2010; Reitzner et al., 2013). Within machine learning and statistics, this same property has inspired a class of so-called minimum Wasserstein distance estimates (del Barrio et al., 1999, 2003; Bassetti et al., 2006; Bernton et al., 2017) of distributions, ranging from exponential distributions (Baฤฑฬllo et al., 2016) to more exotic models such as restricted Boltzmann machines (RBMs) (Montavon et al., 2016) and generative adversarial networks (GANs) (Arjovsky et al., 2017). k-means clustering (and, similarly, k-medians clustering) also fall in this class of estimators, where the hypothesis class is taken to be discrete distributions supported on at most k points; more flexible multi-level clustering algorithms can also be expressed in this way, using a more elaborate hypothesis class (Ho et al., 2017). PCA can also be expressed and generalized to manifolds using Wasserstein distance minimization (Boissard et al., 2015). In principle, these estimators are equivalent to empirical risk minimization, taking advantage of the fact that Wasserstein distances between the empirical distribution and distributions in the relevant hypothesis class are well-defined and finite. Moreover, these estimates often perform well in practice because they are free of both tuning parameters and strong distributional assumptions. In this paper, we study, in a minimax sense, the problem of estimating a distribution using Wasserstein distance as a loss function. We make minimal assumptions, and some examples of the varied metric spaces to which our results apply are given in Section 7. Specifically, we assume that the sample space is a totally bounded metric space, but make no assumptions at all on the distribution. We then prove bounds on the minimax convergence rates of distribution estimation, utilizing covering numbers of the sample space for upper bounds and packing numbers for lower bounds. It may at first be surprising that positive results can be obtained under such mild assumptions; this highlights that the Wasserstein metric is quite a weak metric (see our Lemma 8 and the subsequent remark for some detailed discussion of this). Moreover, our results imply that, without further assumptions on the population distribution, the empirical distribution is often minimax rate-optimal. O RGANIZATION The remainder of this paper is organized as follows. Section 2 provides notation required to formally state both the problem of interest and our results, while Section 3 reviews previous work studying convergence of distributions in Wasserstein distance. Section 4 provides several lemmas on which the proofs of our main results rely; all lemmas are proven in Appendix A. Sections 5 and 6 respectively contain our main upper and lower bound results, along with their proofs. Finally, in Section 7, we apply our upper and lower bounds to identify minimax convergence rates in a number of concrete examples. Section 8 concludes with a summary of our contributions and suggested avenues for future work. 2. Notation and Problem Setting For any integer n โˆˆ N, [n] = {1, 2, ..., n} denotes the set of the first n positive integers. For sequences {an }nโˆˆN and {bn }nโˆˆN of non-negative real numbers, an . bn and, equivalently bn & an , are used to indicate the existence of a constant C > 0 such that lim supnโ†’โˆž abnn โ‰ค C. an โ‰ bn indicates an . bn and an & bn simultaneously. 2 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE 2.1. Problem Setting For the remainder of this paper, fix a metric space (โ„ฆ, ฯ), over which ฮฃ denotes the Borel ฯƒ-algebra, and let P denote the family of all Borel probability distributions on โ„ฆ. The main object of study in this paper is the Wasserstein distance on P, defined as follows: Definition 1 (r-Wasserstein Distance) Given two Borel probability distributions P and Q over โ„ฆ and r โˆˆ [1, โˆž), the r-Wasserstein distance Wr (P, Q) โˆˆ [0, โˆž] between P and Q is defined by !1/r Wr (P, Q) := inf E ยตโˆˆฮ (P,Q) (X,Y )โˆผยต [ฯr (X, Y )] , where ฮ (P, Q) denotes all couplings between X โˆผ P and Y โˆผ Q; that is,  ฮ (P, Q) := ยต : ฮฃ2 โ†’ [0, 1] for all A โˆˆ ฮฃ, ยต(A ร— โ„ฆ) = P (A) and ยต(โ„ฆ ร— A) = Q(A) , is the set of joint probability measures over โ„ฆ ร— โ„ฆ with marginals P and Q. Wr is a proper metric over P; namely, it is symmetric in its arguments and satisfies the triangle inequality. Intuitively, Wr (P, Q) quantifies the r-weighted total cost of transforming mass distributed according to P to be distributed according to Q, where the cost of moving a unit mass from x โˆˆ โ„ฆ to y โˆˆ โ„ฆ is ฯ(x, y). Note that Wr (P, Q) is sometimes defined in terms of equivalent (e.g., dual) formulations (especially for r = 1); however, they will not be necessary in this paper. We now give a formal statement of the problem studied in this paper: Formal Problem Statement: Suppose (โ„ฆ, ฯ) is a metric space. Suppose P is an unknown IID Borel probability distribution on โ„ฆ, from which we observe n IID samples X1 , ..., Xn โˆผ P . We are interested in studying the minimax rates at which P can be estimated from X1 , ..., Xn , in terms of the (r th power of the) r-Wasserstein loss. Specifically, we are interested in upper and lower bounding the quantity  i h Wrr P, Pb , inf sup E Pb P โˆˆP X ,...,XnIID โˆผ P 1 where the infimum is taken over all estimators Pb of P (i.e., all functions Pb : โ„ฆn โ†’ P of the data). 2.2. Definitions for Stating our Results Here, we give notation and definitions needed to state our theoretical results in Sections 5 and 6 and intermediate lemmas in Section 4. โ„ฆ Let 2โ„ฆ denote the power set of โ„ฆ. Let S โІ 22 denote the family of all Borel partitions of โ„ฆ: ( ) [ S := S โІ ฮฃ : โ„ฆ โІ S and โˆ€S, T โˆˆ S, S โˆฉ T = โˆ… . SโˆˆS We first define some metric notions that will later be useful for bounding Wasserstein distances: Definition 2 (Diameter and Separation of a Set, Resolution of a Partition) For any set S โІ โ„ฆ, the diameter Diam(S) of S is defined by Diam(S) := supx,yโˆˆS ฯ(x, y), and the separation Sep(S) of S is defined by Sep(S) := inf x6=yโˆˆS ฯ(x, y). If S โˆˆ S is a partition of โ„ฆ, then the resolution Res(S) of S is defined by Res(S) := supSโˆˆS Diam(S). 3 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Definition 3 (Refinement of a Partition, Nested Partitions) Suppose S, T โˆˆ S are partitions of โ„ฆ. T is said to be a refinement of S if, for every T โˆˆ T , there exists S โˆˆ S with T โІ S. A sequence {Sk }kโˆˆ[K] of partitions is called nested if, for each k โˆˆ [K]\{K}, Sk+1 is a refinement of Sk , We now define the covering and packing number of a metric space, which are classic and widely used measures of the size or complexity of a metric space (Dudley, 1967; Haussler, 1995; Zhou, 2002; Zhang, 2002). Our main convergence results will be stated in terms of these quantities, as well as the packing radius, which acts, approximately, as the inverse of the packing number. Definition 4 (Covering Number, Packing Number, and Packing Radius of a Metric Space) The covering number N : (0, โˆž) โ†’ N of (โ„ฆ, ฯ) is defined for all ฮต by N (ฮต) := min {|S| : S โˆˆ S and Res(S) โ‰ค ฮต} . The packing number M : (0, โˆž) โ†’ N of (โ„ฆ, ฯ) is defined for all ฮต by M (ฮต) := max {|S| : S โІ โ„ฆ and Sep(S) โ‰ฅ ฮต} . Finally, the packing radius R : N โ†’ [0, โˆž] is defined for all n โˆˆ N by R(n) := sup{Sep(S) : S โІ โ„ฆ and |S| โ‰ฅ n}. Sometimes, we use the covering or packing number of a metric space, say (ฮ˜, ฯ„ ), other than (โ„ฆ, ฯ); in such cases, we write N (ฮ˜; ฯ„ ; ฮต) or M (ฮ˜; ฯ„ ; ฮต) rather than N (ฮต) or M (ฮต), respectively. For specific ฮต > 0, we will also refer to N (ฮ˜; ฯ„ ; ฮต) as the ฮต-covering number of (ฮ˜, ฯ„ ). Remark 5 The covering and packing numbers of a metric space are closely related. In particular, for any ฮต > 0, we always have M (ฮต) โ‰ค N (ฮต) โ‰ค M (ฮต/2). (1) The packing number and packing radius also have a close approximate inverse relationship. In particular, for any ฮต > 0, we always have R(M (ฮต)) โ‰ฅ ฮต. (2) However, we may have R(M (ฮต)) > ฮต, and it need not, in general, be the case that, for all n โˆˆ N, M (R(n)) โ‰ฅ n or, for all n โˆˆ N, M (R(n)) โ‰ค n. Remark 6 We defined the covering number slightly differently from usual (using partitions rather than covers). However, the given definition is equivalentSto the usual definition, since (a) any partition is itself a cover (i.e., a set C โІ 2โ„ฆ such that โ„ฆ โІ CโˆˆC C), and (b), for any countable cover C := {C1 , C2 , ...} โІ 2โ„ฆ ,Sthere exists a partition S โˆˆ S with |S| โ‰ค |C| and each Si โІ Ci , defined recursively by Si := Ci \ iโˆ’1 j=1 Si . S is often called the disjointification of C. 4 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE 3. Related Work A long line of work (Dudley, 1969; Ajtai et al., 1984; Dereich et al., 2013; Boissard et al., 2014; Fournier and Guillin, 2015; Weed and Bach, 2017) has studied distribution estimation in Wasserstein distance, with all the above papers focusing on analyzing convergence of the empirical distribution to the population distribution in Wasserstein distance. In terms of upper bounds, the most general and tight upper bounds are those of Weed and Bach (2017), who provide results in general metric spaces, in terms of the covering numbers of those spaces. Their main results are expressed in terms of a particular notion of dimension, which they call the Wasserstein dimension s because it allows them to derive convergence rates of order nโˆ’1/s (matching the nโˆ’1/D rate achieved on the unit cube [0, 1]D ). Our general upper bounds as a function of covering number are somewhat easier to apply than those of Weed and Bach (2017), and we use these in Section 7 to derive convergence rates even in high-dimensional cases (where D โ†’ โˆž as n โ†’ โˆž) or infinite dimensional cases. To the best of our knowledge, there has been no work on deriving minimax lower bounds for distribution estimation under Wasserstein loss. As noted above, most previous works have focused on studying convergence rate of the empirical distribution to the true distribution in Wasserstein distance. For this rate, several lower bounds have been established, matching known upper bounds in many quite general cases. However, many distribution estimators besides the empirical distribution can be considered. For example, it is tempting (especially given the infinite dimensionality of the distribution to be estimated) to try to reduce variance by techniques such as smoothing or importance sampling (Bucklew, 2013). However, our lower bound results, given in Section 6, imply that the empirical distribution is already minimax optimal, up to constant factors, in many cases. 4. Preliminary Lemmas We begin by providing a few basic lemmas; these lemmas are not fundamentally novel, but they will be used in the subsequent proofs of our main upper and lower bounds, and also help provide intuition for the behavior of the Wasserstein metric and its connections to other metrics between probability distributions. Our first lemma relates Wasserstein distance to the notion of resolution of a partition. Lemma 7 Suppose S โˆˆ S is a countable Borel partition of โ„ฆ. Let P and Q be Borel probability measures such that, for every S โˆˆ S, P (S) = Q(S). Then, for any r โ‰ฅ 1, Wr (P, Q) โ‰ค Res(S). Our next lemma gives simple lower and upper bounds on the Wasserstein distance between distributions supported on a countable subset X โІ โ„ฆ, in terms of Diam(X ) and Sep(X ). Since our main results will utilize coverings and packings to approximate โ„ฆ by finite sets, this lemma will provide a first step towards approximating (in Wasserstein distance) distributions on โ„ฆ by distributions on these finite sets. Indeed, the lower bound in Inequality (3) will suffice to prove our lower bounds, although a tighter upper bound, based on the upper bound in (3), will be necessary to obtain tight upper bounds. Lemma 8 Suppose (โ„ฆ, ฯ) is a metric space, and suppose P and Q are Borel probability distributions on โ„ฆ with countable support; i.e., there exists a countable set X โІ โ„ฆ with P (X ) = Q(X ) = 1. Then, for any r โ‰ฅ 1, X X |P ({x}) โˆ’ Q({x})| . (3) |P ({x}) โˆ’ Q({x})| โ‰ค Wrr (P, Q) โ‰ค (Diam(X ))r (Sep(X ))r xโˆˆX xโˆˆX 5 D ISTRIBUTION E STIMATION Remark 9 Recall that the term P IN WASSERSTEIN D ISTANCE |P ({x}) โˆ’ Q({x})| in Inequality (3) is the L1 distance X kp โˆ’ qk1 := |p(x) โˆ’ q(x)| xโˆˆX xโˆˆX between the densities p and q of P and Q with respect to the counting measure on X , and that this same quantity is twice the total variation distance T V (P, Q) := sup |P (A) โˆ’ Q(A)| . AโІโ„ฆ Hence, Lemma 8 can be equivalently written as Sep(โ„ฆ) (kp โˆ’ qk1 )1/r โ‰ค Wr (P, Q) โ‰ค Diam(โ„ฆ) (kp โˆ’ qk1 )1/r and as Sep(โ„ฆ) (2T V (P, Q))1/r โ‰ค Wr (P, Q) โ‰ค Diam(โ„ฆ) (2T V (P, Q))1/r , bounding the r-Wasserstein distance in terms of the L1 and total variation distance. As noted in Example 1, equality holds in (3) precisely when ฯ is the unit discrete metric given by ฯ(x, y) = 1{x6=y} for all x, y โˆˆ โ„ฆ. On metric spaces that are discrete (i.e., when Sep(โ„ฆ) > 0), the Wasserstein metric is (topologically) at least as strong as the total variation metric (and the L1 metric, when it is well-defined), in that convergence in Wasserstein metric implies convergence in total variation (and L1 , respectively). On the other hand, on bounded metric spaces, the converse is true. In either of these cases, rates of convergence may differ between metrics, although, in metric spaces that are both discrete and bounded (e.g., any finite space), we have Wr โ‰ T V 1/r . While Lemma 8 gave a simple upper bound on the Wasserstein distance, the factor of Diam(โ„ฆ) turns out to be too large to obtain tight rates for a number of cases of interest (such as the Ddimensional unit cube โ„ฆ = [0, 1]D , discussed in Example 2). The following lemma gives a tighter upper bound, based on a hierarchy of nested partitions of โ„ฆ; this allows us to obtain tighter bounds (than Diam(โ„ฆ)) on the distance that mass must be transported between P and Q. Note that, when K = 1, Lemma 10 reduces to a trivial combination of Lemmas 7 and 8; indeed, these lemmas are the starting point for proving Lemma 10 by induction on K. Note that the idea of such a โ€œmulti-resolutionโ€ upper bound has been utilized extensively before, and numerous versions have been proven before (see, e.g., Fact 6 of Do Ba et al. (2011), Lemma 6 of Fournier and Guillin (2015), or Proposition 1 of Weed and Bach (2017)). However, most of these versions have been specific to Euclidean space; to the best of our knowledge, only Proposition 1 of Weed and Bach (2017) applies to general metric spaces. Lemma 10 Let K be a positive integer. Suppose {Sk }kโˆˆ[K] is a nested sequence of countable Borel partitions of (โ„ฆ, ฯ), with S0 = โ„ฆ. Then, for any r โ‰ฅ 1 and Borel probability measures P and Q on โ„ฆ, ๏ฃซ ๏ฃถ K X X Wrr (P, Q) โ‰ค (Res(SK ))r + |P (S) โˆ’ Q(S)|๏ฃธ . (Res(Skโˆ’1 ))r ๏ฃญ (4) SโˆˆSk k=1 6 D ISTRIBUTION E STIMATION WASSERSTEIN D ISTANCE IN Lemma 10 requires a sequence of partitions of โ„ฆ that is not only multi-resolution but also nested. While the ฮต-covering number implies the existence of small partitions with small resolution, these partitions need not be nested as ฮต becomes small. For this reason, we now give a technical lemma that, given any sequence of partitions, constructs a nested sequence of partitions of the same cardinality, with only a small increase in resolution. Lemma 11 Suppose S and T are partitions of (โ„ฆ, ฯ), and suppose S is countable. Then, there exists a partition S โ€ฒ of (โ„ฆ, ฯ) such that: a) |S โ€ฒ | โ‰ค |S|. b) Res(S โ€ฒ ) โ‰ค Res(S) + 2 Res(T ). c) T is a refinement of S โ€ฒ 5. Upper Bounds In this section, we utilize the covering number bounds from the previous section to develop error bounds for density estimation using the empirical distribution under Wasserstein loss. 5.1. Expectation Bounds Here, we use Lemmas 10 and 11 to prove bounds on the expected Wasserstein distance between the empirical and true distributions. We begin with a simple technical lemma bounding the expected L1 deviation of a multinomial random variable from its mean. Lemma 12 Suppose (X1 , ..., XK ) โˆผ Multinomial(n, p1 , ..., pK ). Let Z := kX โˆ’ pk1 = Then, E [Z/n] โ‰ค p K X k=1 |Xk โˆ’ pk | . 21K/n. Theorem 13 Let (โ„ฆ, ฯ) be a metric space on which P is a Borel probability measure. Let Pb denote IID the empirical distribution of n IID samples X1 , ..., Xn โˆผ P , give by n 1X Pb(S) := 1{Xi โˆˆS} , n i=1 โˆ€S โˆˆ ฮฃ. Then, for any sequence {ฮตk }kโˆˆ[K] โˆˆ (0, โˆž)K with ฮต0 = Diam(โ„ฆ), ๏ฃซ ๏ฃถr r K K i X X p 21 r r ๏ฃญ 2jโˆ’k ฮตj ๏ฃธ N (ฮตk ). E Wr (P, Pb) โ‰ค ฮตK + n h k=1 7 j=kโˆ’1 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Proof By recursively applying Lemma 11, there exists a sequence {Sk }kโˆˆ[K] of partitions of (โ„ฆ, ฯ) satisfying the following conditions: 1. for each k โˆˆ [K], |Sk | = N (ฮตk ). 2. for each k โˆˆ [K], Res(Sk ) โ‰ค K X 2jโˆ’k ฮตj . j=k 3. {Sk }kโˆˆ[K] is nested. Note that, for any k โˆˆ [K], the vector nPb(S) (indexed by S โˆˆ Sk ) follows an n-multinomial distribution over |Sk | categories, with means given by P (S); i.e., (nPb(S1 ), ..., nPb(Sk )) โˆผ Multinomial(n, P (S1 ), ..., P (Sk )). Thus, by Lemma 12, for each k โˆˆ [K], ๏ฃฎ ๏ฃน r r X 21|S | 21N (ฮตk ) k P (S) โˆ’ Pb(S) ๏ฃป โ‰ค = . E๏ฃฐ n n SโˆˆSk Thus, by Lemma 10, ๏ฃฎ r r E [Wr (P, Q)] โ‰ค E ๏ฃฐฮตK + โ‰ค ฮตrK + K X k=1 K X k=1 ๏ฃซ ๏ฃญ K X j=k ๏ฃถr ๏ฃซ 2jโˆ’k ฮตj ๏ฃธ ๏ฃญ X SโˆˆSk ๏ฃถ๏ฃน |P (S) โˆ’ Q(S)|๏ฃธ๏ฃป ๏ฃซ ๏ฃถr ๏ฃฎ ๏ฃน K X X ๏ฃญ 2jโˆ’k ฮตj ๏ฃธ E ๏ฃฐ |P (S) โˆ’ Q(S)|๏ฃป SโˆˆSk j=k ๏ฃซ ๏ฃถr r K K X X p 21 ๏ฃญ N (ฮตk ) 2jโˆ’k ฮตj ๏ฃธ โ‰ค ฮตrK + n k=1 j=k 6. Lower Bounds In this section, we prove minimax lower bounds (over the family P of all densities on the metric space (โ„ฆ, ฯ)) for density estimation in Wasserstein distance (that is, the quantity  i h (5) Wrr P, Pb , inf sup E Pb P โˆˆP X1 ,...,Xn IID โˆผ P where the infimum is over all estimators Pb of P (i.e., all functions Pb : โ„ฆn โ†’ P)). Our bounds are in terms of the packing radius R of (โ„ฆ, ฯ). 8 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Theorem 14 Suppose P โˆˆ P is an unknown Borel probability measure on (โ„ฆ, ฯ), and suppose we IID observe n IID samples X1 , ..., Xn โˆผ P . Then, there exists a universal constant CHJW > 0 such that r h i kโˆ’1 r r Wr (P, Pb) โ‰ฅ CHJW sup R (k) inf sup . E n Pb P โˆˆP X ,...,X IID kโˆˆ[n] โˆผ P 1 n Proof Our proof is based on a reduction to a minimax lower bound for estimating the mean parameter vector of a multinomial distribution in L1 norm. Specifically, we will use Corollary 4 of Han et al. (2015), which implies the existence of a universal constant CHJW > 0 (independent of n) such that, for any k โ‰ค n, r kโˆ’1 , p(X1 , ..., Xn ) โˆ’ pk1 ] โ‰ฅ CHJW inf sup E [kb n pb pโˆˆโˆ†k X1 ,...,Xn where โˆ†k := ๏ฃฑ ๏ฃฒ ๏ฃณ p โˆˆ [0, 1]k : k X j=1 ๏ฃผ ๏ฃฝ pj = 1 ๏ฃพ denotes the standard (k โˆ’ 1)-dimensional probability simplex, X1 , ..., Xn โˆˆ [k] are distributed IID according to a multinomial distribution with parameter vector p โˆˆ โˆ†k , and the infimum is taken over all estimators pb of p (i.e., all functions pb : [k]n โ†’ โˆ†k ). For some k โ‰ค n, let PD denote the class of discrete distributions over an R(k)-packing D of (โ„ฆ, ฯ) with |D| = k. Then, Corollary 4 of Han et al. (2015) implies that r i h |D| โˆ’ 1 kPb (X1 , ..., Xn ) โˆ’ P k1 โ‰ฅ CHJW , inf sup E n Pb pโˆˆPD X1 ,...,Xn where the infimum is taken over all estimators Pb of P (i.e., all functions Pb : โ„ฆn โ†’ P). Recalling Lemma 8 (which implies (Sep(D))r kPb โˆ’ P k1 โ‰ค Wrr (P, Pb)), we have i h h i inf sup E Wrr (Pb, P ) โ‰ฅ (Sep(D))r inf sup E kPb โˆ’ P k1 Pb P โˆˆP Pb P โˆˆP i h โ‰ฅ (Sep(D))r inf sup E kPb โˆ’ P k1 Pb P โˆˆPD r |D| โˆ’ 1 r โ‰ฅ CHJW (Sep(D)) n r kโˆ’1 โ‰ฅ CHJW Rr (k) . n The theorem follows by taking the supremum over k โ‰ค n on both sides. 9 (6) D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE 7. Example Applications We conclude by exploring applications of our results for several metric spaces (โ„ฆ, ฯ). In each of the following examples, P is an unknown Borel probability measure over the specified โ„ฆ, from which we observe n IID samples. For upper bounds, Pb denotes the empirical distribution of these samples. Example 1 (Finite Space) Consider the case where โ„ฆ is a finite set, over which ฯ is the discrete metric given, for some ฮด > 0, by ฯ(x, y) = ฮด1{x=y} , x, y โˆˆ โ„ฆ. for all Then, for any ฮต โˆˆ (0, ฮด), the covering number is N (ฮต) = |โ„ฆ|. Thus, setting K = 1 and sending ฮต1 โ†’ 0 in Theorem 13 gives r h i 21|โ„ฆ| r r b . E Wr (P, P ) โ‰ค ฮด n On the other hand, for any k โ‰ค |โ„ฆ|, R(k) = ฮด, while, for k > |โ„ฆ|, R(k) = 0. Thus, setting k = |โ„ฆ| in Theorem 14 gives r h i |โ„ฆ| โˆ’ 1 r r b . Wr (P, P ) โ‰ฅ CHJW ฮด inf sup E n Pb P โˆˆP X ,...,X IID โˆผ P 1 n Example 2 (Unit Cube, Euclidean Metric) Consider the case where โ„ฆ = [0, 1]D is the unit cube and ฯ is the Euclidean metric. Suppose P is a Borel probability measure on (โ„ฆ, ฯ), and let Pb denote the empirical distribution of n IID samples from P . Setting ฮตk := 2โˆ’2k and recalling that N (ฮต) โ‰ค (2D)D ฮตโˆ’D , one can show that Theorem 13 gives r K h i 21(2D)D X k(Dโˆ’2r) r โˆ’2Kr r+1 b 2 W (P, P ) โ‰ค 2 + 2 E r n k=1 If D = 2r, then this gives E and setting K โ‰ 1 4r h i Wrr (P, Pb ) โˆ’2Kr โ‰ค2 r+1 +2 r 21(2D)D K, n h i log n gives the rate E Wrr (P, Pb) . nโˆ’1/2 log n. Otherwise, if D 6= 2r, then h i r 21(2D)D 2K(Dโˆ’2r) โˆ’ 1 n 2Dโˆ’2r โˆ’ 1 i h For 2r > D, sending K โ†’ โˆž gives a rate of E Wrr (P, Pb) . nโˆ’1/2 . For 2r < D, setting i h r 1 K โ‰ 2D log n gives a rate of E Wrr (P, Pb) . nโˆ’ D . To summarize E Wrr (P, Pb) โˆ’2Kr โ‰ค2 D+1 +2 ๏ฃฑ โˆ’1/2 i ๏ฃฒ n r nโˆ’1/2 log n E Wr (P, Pb) . ๏ฃณ โˆ’r/D n h 10 if 2r > D if 2r = D if 2r < D D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE (reproducing results of Fournier and Guillin (2015)). On the โˆš other hand, it is easy to check that the packing radius R satisfies R(n) โ‰ฅ nโˆ’1/D and R(2) โ‰ฅ D. Thus, applying Theorem 14 with k = n and k = 2, we have o h i n inf sup E Wrr (Pb, P ) โ‰ฅ CHJW max (n + 1)โˆ’r/D , D r/2 nโˆ’1/2 . Pb P โˆˆP Combining these upper and lower bounds gives that the minimax rate for density estimation over P in the loss Wrr is h i  nโˆ’1/2 if 2r > D r b inf sup E Wr (P , P ) โ‰ nโˆ’r/D if 2r < D Pb P โˆˆP (except for the case 2r = D, when our upper and lower bounds are separated by a factor of log n). Moreover, this rate is achieved by using the empirical distribution to estimate P . We now consider a high dimensional problem, where the size of โ„ฆ can grow with n. Example 3 (Binary Hypercube, Hamming Metric) Suppose โ„ฆ = {0, 1}D is the P D-dimensional binary hypercube, and suppose ฯ is the Hamming metric given by ฯฮด (x, y) = ฮด D j=1 1{xi 6=yi } . Then, the covering number can easily be upper bounded for ฮต โˆˆ [D] by N (ฮต) โ‰ค 2Dโˆ’ฮต . Thus, setting K = 1 and sending ฮต1 โ†’ 0 in Theorem 13 gives r h i 21 r r D . E Wr (P, Pb ) โ‰ค D 2 n The famous Varshamov-Gilbert bound (see, e.g., Lemma  25.12 of Rigollet (2015)) can be interpreted as the statement that, for any ฮณ โˆˆ (0, 1/2), R โŒŠeฮณ D โŒ‹ โ‰ฅ 21 โˆ’ ฮณ Dฮด. Thus, setting p 2 k = โŒŠeฮณ D โŒ‹ (so that k โ‰ค n as long as ฮณ โ‰ค (1/D) log n) in Theorem 14 and applying the Varshamov-Gilbert bound gives s   r h i 1 โŒŠeฮณ 2 D โŒ‹ โˆ’ 1 โˆ’ ฮณ Dฮด . Wrr (P, Pb) โ‰ฅ CHJW sup inf sup E   q 2 n Pb P โˆˆP X ,...,X IID log n 1 โˆผ P 1 n ฮณโˆˆ 0,min 2 , D To summarize, in the high-dimensional case where D, n โ†’ โˆž, consistent estimation is possible if D log D โˆˆ o(log n) and only if D โˆˆ o(log n). Finally, we consider distributions over an infinite dimensional space of smooth functions. Example 4 (Hoฬˆlder Ball, Lโˆž Metric) Suppose that, for some ฮฑ โˆˆ (0, 1],  โ„ฆ := f [0, 1]D โ†’ [โˆ’1, 1] โˆ€x, y โˆˆ [0, 1]D , |f (x) โˆ’ f (y)| โ‰ค kx โˆ’ ykฮฑ2 is the class of unit ฮฑ-Hoฬˆlder functions on the unit cube and ฯ is the Lโˆž -metric given by ฯ(f, g) = sup |f (x) โˆ’ g(x)|, xโˆˆ[0,1]D 11 for all f, g โˆˆ โ„ฆ. D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE  The covering and packing numbers of (โ„ฆ, ฯ) are well-known to be of order exp ฮตโˆ’D/ฮฑ (DeVore and Lorentz, 1993); specifically, there exist positive constants 0 < c1 < c2 such that, for all ฮต โˆˆ (0, 1),     c1 exp ฮตโˆ’D/ฮฑ โ‰ค N (ฮต) โ‰ค M (ฮต) โ‰ค c2 exp ฮตโˆ’D/ฮฑ . It also follows from Inequality (2) that, for all k โˆˆ N, R(k) โ‰ฅ  1 log(k/c1 ) ฮฑ D . Since Diam(โ„ฆ) = 2, setting K = 1 and ฮต1 = in Theorem 13 gives E  h D 2D log n โˆ’ ฮฑr log log n i Wrr (P, Pb ) .  1 log n  ฮฑr  ฮฑr D D . On the other hand, setting k = n in Theorem 14 gives inf sup Pb P โˆˆP X 1  ฮฑr h i 1 D 1 r Wr (P, Pb ) โ‰ฅ , E 2 log(n/c1 ) IID ,...,X โˆผ P n โˆ’ฮฑr showing that distribution estimation over (P, Wrr ) has the extremely slow minimax rate (log n) D . Although we considered only ฮฑ โˆˆ (0, 1] (due to the notational complexity of defining higher-order Hoฬˆlder spaces), analogous rates hold for all ฮฑ > 0. Also, since our rates depend only on covering and packing numbers of โ„ฆ, identical rates can be derived for related Sobolev and Besov classes. One might wonder why we are interested studying Wasserstein convergence of distributions over spaces of smooth functions, as in Example 4. Our main motivation comes from the fact that, historically, smooth function spaces have been widely used for modeling images and other complex naturalistic signals (Mallat, 1999; Peyreฬ, 2011). Far more recently, empirical breakthroughs have been made in generative modeling, particularly of images, based on the principle of minimizing Wasserstein distance between the empirical distribution and a large class of models encoded by a deep neural network (Montavon et al., 2016; Arjovsky et al., 2017; Gulrajani et al., 2017). However, little is known about the theoretical properties of these methods; while there has been some work studying the optimization landscape of such models (Nagarajan and Kolter, 2017), we know of no work exploring their statistical properties. Given the extremely slow minimax convergence rate we derived above, it must be the case that the class of distributions encoded by such models is far smaller or sparser than P. An important avenue for further work is thus to explicitly identify stronger assumptions that can be made on distributions over interesting classes of signals, such as images, to bridge the gap between empirical performance and our theoretical understanding. 12 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE 8. Conclusion In this paper, we derived upper and lower bounds for distribution estimation under Wasserstein loss. Our upper bounds generalize prior results and are tighter in certain cases, while our lower bounds are, to the best of our knowledge, the first minimax lower bounds for this problem. We also provided several simple examples for which our upper and lower bounds agree. 8.1. Future Work We studied only minimax rates over the entire class P of all distributions on the metric space (โ„ฆ, ฯ). It would be useful to understand how minimax rates improve when additional assumptions, such as smoothness or finite-moment assumptions are made (see Fournier and Guillin (2015) for somewhat improved upper bounds under finite-moment assumptions when (โ„ฆ, ฯ) is Euclidean space). Given the rather slow convergence rates we found over P in many cases, studying minimax rates under assumptions may help to explain the relatively favorable empirical performance of popular distribution estimators based on empirical risk minimization in Wasserstein loss. Moreover, while rates over all of P are of interest only for very weak metrics such as the Wasserstein distance (as stronger metrics may be infinite or undefined), studying minimax rates under additional assumptions will allow for a better understanding of the Wasserstein metric in relation to other commonly used metrics. Acknowledgments This work was partly supported by a NSF Graduate Research Fellowship DGE-1252522 to S.S. and by NSF IIS-1563887, Darpa D3M program, and AFRL grants to B.P.. References Mikloฬs Ajtai, Jaฬnos Komloฬs, and Gaฬbor Tusnaฬdy. On optimal matchings. Combinatorica, 4(4): 259โ€“264, 1984. Syed Mumtaz Ali and Samuel D Silvey. A general class of coefficients of divergence of one distribution from another. Journal of the Royal Statistical Society. Series B (Methodological), pages 131โ€“142, 1966. Martin Arjovsky, Soumith Chintala, and Leฬon Bottou. arXiv:1701.07875, 2017. Wasserstein GAN. arXiv preprint Amparo Baฤฑฬllo, Javier Caฬrcamo, and Konstantin V Getman. The estimation of Wasserstein and Zolotarev distances to the class of exponential variables. arXiv preprint arXiv:1603.06806, 2016. Federico Bassetti, Antonella Bodini, and Eugenio Regazzini. On minimum Kantorovich distance estimators. Statistics & probability letters, 76(12):1298โ€“1302, 2006. Espen Bernton, Pierre E Jacob, Mathieu Gerber, and Christian P Robert. Inference in generative models using the Wasserstein distance. arXiv preprint arXiv:1701.05146, 2017. Emmanuel Boissard, Thibaut Le Gouic, et al. On the mean speed of convergence of empirical and occupation measures in Wasserstein distance. In Annales de lโ€™Institut Henri Poincareฬ, Probabiliteฬs et Statistiques, volume 50, pages 539โ€“563. Institut Henri Poincareฬ, 2014. 13 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Emmanuel Boissard, Thibaut Le Gouic, Jean-Michel Loubes, et al. Distributions template estimate with wasserstein metrics. Bernoulli, 21(2):740โ€“759, 2015. James Bucklew. Introduction to rare event simulation. Springer Science & Business Media, 2013. Sourav Chatterjee et al. A new method of normal approximation. The Annals of Probability, 36(4): 1584โ€“1610, 2008. Louis HY Chen, Larry Goldstein, and Qi-Man Shao. Normal approximation by Steins method. Springer Science & Business Media, 2010. Imre Csiszaฬr. Eine informationstheoretische ungleichung und ihre anwendung auf beweis der ergodizitaet von markoffschen ketten. Magyer Tud. Akad. Mat. Kutato Int. Koezl., 8:85โ€“108, 1964. Eustasio del Barrio, Evarist Gineฬ, and Carlos Matraฬn. Central limit theorems for the Wasserstein distance between the empirical and the true distributions. Annals of Probability, pages 1009โ€“ 1071, 1999. Eustasio del Barrio, Evarist Gineฬ, Carlos Matraฬn, et al. Correction: Central limit theorems for the Wasserstein distance between the empirical and the true distributions. The Annals of Probability, 31(2):1142โ€“1143, 2003. Steffen Dereich, Michael Scheutzow, Reik Schottstedt, et al. Constructive quantization: Approximation by empirical measures. In Annales de lโ€™Institut Henri Poincareฬ, Probabiliteฬs et Statistiques, volume 49, pages 1183โ€“1203. Institut Henri Poincareฬ, 2013. Ronald A DeVore and George G Lorentz. Constructive approximation, volume 303. Springer Science & Business Media, 1993. Luc Devroye. The equivalence of weak, strong and complete convergence in L1 for kernel density estimates. The Annals of Statistics, pages 896โ€“904, 1983. Khanh Do Ba, Huy L Nguyen, Huy N Nguyen, and Ronitt Rubinfeld. Sublinear time algorithms for earth movers distance. Theory of Computing Systems, 48(2):428โ€“442, 2011. Joseph L Doob. Measure theory, volume 143. Springer Science & Business Media, 2012. Richard M Dudley. The sizes of compact subsets of hilbert space and continuity of gaussian processes. Journal of Functional Analysis, 1(3):290โ€“330, 1967. RM Dudley. The speed of mean Glivenko-Cantelli convergence. The Annals of Mathematical Statistics, 40(1):40โ€“50, 1969. Peyman Mohajerin Esfahani and Daniel Kuhn. Data-driven distributionally robust optimization using the wasserstein metric: Performance guarantees and tractable reformulations. arXiv preprint arXiv:1505.05116, 2015. Nicolas Fournier and Arnaud Guillin. On the rate of convergence in Wasserstein distance of the empirical measure. Probability Theory and Related Fields, 162(3-4):707โ€“738, 2015. 14 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Rui Gao and Anton J Kleywegt. Distributionally robust stochastic optimization with wasserstein distance. arXiv preprint arXiv:1604.02199, 2016. Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C Courville. Improved training of wasserstein gans. In Advances in Neural Information Processing Systems, pages 5769โ€“5779, 2017. Yanjun Han, Jiantao Jiao, and Tsachy Weissman. Minimax estimation of discrete distributions under โ„“1 loss. IEEE Transactions on Information Theory, 61(11):6343โ€“6354, 2015. David Haussler. Sphere packing numbers for subsets of the boolean n-cube with bounded vapnikchervonenkis dimension. Journal of Combinatorial Theory, Series A, 69(2):217โ€“232, 1995. Nhat Ho, XuanLong Nguyen, Mikhail Yurochkin, Hung Hai Bui, Viet Huynh, and Dinh Phung. Multilevel clustering via wasserstein means. arXiv preprint arXiv:1706.03883, 2017. Oliver Johnson, Richard Samworth, et al. Central limit theorem and convergence to stable laws in mallows distance. Bernoulli, 11(5):829โ€“845, 2005. Matt Kusner, Yu Sun, Nicholas Kolkin, and Kilian Weinberger. From word embeddings to document distances. In International Conference on Machine Learning, pages 957โ€“966, 2015. Steฬphane Mallat. A wavelet tour of signal processing. Academic press, 1999. Greฬgoire Montavon, Klaus-Robert Muฬˆller, and Marco Cuturi. Wasserstein training of restricted Boltzmann machines. In Advances in Neural Information Processing Systems, pages 3718โ€“3726, 2016. Tetsuzo Morimoto. Markov processes and the H-theorem. Journal of the Physical Society of Japan, 18(3):328โ€“331, 1963. Vaishnavh Nagarajan and J Zico Kolter. Gradient descent GAN optimization is locally stable. arXiv preprint arXiv:1706.04156, 2017. Kangyu Ni, Xavier Bresson, Tony Chan, and Selim Esedoglu. Local histogram based segmentation using the wasserstein distance. International journal of computer vision, 84(1):97โ€“111, 2009. Gabriel Peyreฬ. The numerical tours of signal processing. Computing in Science & Engineering, 13 (4):94โ€“97, 2011. Matthias Reitzner, Matthias Schulte, et al. Central limit theorems for u-statistics of poisson point processes. The Annals of Probability, 41(6):3879โ€“3909, 2013. Phillippe Rigollet. High-dimensional statistics. Lecture notes for course 18S997, 2015. Emmanuel Rio et al. Upper bounds for minimal distances in the central limit theorem. In Annales de lโ€™Institut Henri Poincareฬ, Probabiliteฬs et Statistiques, volume 45, pages 802โ€“817. Institut Henri Poincareฬ, 2009. Emmanuel Rio et al. Asymptotic constants for minimal distance in the central limit theorem. Electronic Communications in Probability, 16:96โ€“103, 2011. 15 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Yossi Rubner, Carlo Tomasi, and Leonidas J Guibas. The earth moverโ€™s distance as a metric for image retrieval. International journal of computer vision, 40(2):99โ€“121, 2000. Ludger Ruฬˆschendorf. The wasserstein distance and approximation theorems. Probability Theory and Related Fields, 70(1):117โ€“129, 1985. Roman Sandler and Michael Lindenbaum. Nonnegative matrix factorization with earth moverโ€™s distance metric for image analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(8):1590โ€“1602, 2011. Justin Solomon, Fernando De Goes, Gabriel Peyreฬ, Marco Cuturi, Adrian Butscher, Andy Nguyen, Tao Du, and Leonidas Guibas. Convolutional wasserstein distances: Efficient optimal transportation on geometric domains. ACM Transactions on Graphics (TOG), 34(4):66, 2015. Ceฬdric Villani. Optimal transport: old and new, volume 338. Springer Science & Business Media, 2008. Jonathan Weed and Francis Bach. Sharp asymptotic and finite-sample rates of convergence of empirical measures in Wasserstein distance. arXiv preprint arXiv:1707.00087, 2017. Meng Zhang, Yang Liu, Huan-Bo Luan, Maosong Sun, Tatsuya Izuha, and Jie Hao. Building earth moverโ€™s distance on bilingual word embeddings for machine translation. In AAAI, pages 2870โ€“ 2876, 2016. Tong Zhang. Covering number bounds of certain regularized linear function classes. Journal of Machine Learning Research, 2(Mar):527โ€“550, 2002. Ding-Xuan Zhou. The covering number in learning theory. Journal of Complexity, 18(3):739โ€“767, 2002. 16 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Appendix A. Proofs of Lemmas Lemma 7 Suppose S โˆˆ S is a countable Borel partition of โ„ฆ. Let P and Q be Borel probability measures such that, for every S โˆˆ S, P (S) = Q(S). Then, for any r โ‰ฅ 1, Wr (P, Q) โ‰ค Res(S). Proof This fact is intuitively obvious; clearly, there exists a transportation map ยต from P to Q that moves mass only within each S โˆˆ S and therefore without moving any mass further than ฮด. For completeness, we give a formal construction. Let ยต : ฮฃ2 โ†’ [0, 1] denote the coupling that is conditionally independent given any set S โˆˆ S with P (S) = Q(S) > 0 (that is, for any A, B โˆˆ ฮฃ, ยต(Aร—B โˆฉS ร—S)P (S) = P (AโˆฉS)Q(B โˆฉS)).4 It S is easy to verify that ยต โˆˆ C(P, Q). Since S is a countable partition and ยต is only supported on SโˆˆS S ร— S, Wr (P, Q) โ‰ค Z โ„ฆร—โ„ฆ XZ = SโˆˆS XZ โ‰ค SโˆˆS =ฮด 1/r ฯ (x, y) dยต(x, y) r X SโˆˆS !1/r r ฯ (x, y) dยต(x, y) Sร—S !1/r r ฮด dยต(x, y) Sร—S !1/r ยต(S ร— S) =ฮด X P (S)Q(S) P (S) SโˆˆS !1/r =ฮด X !1/r Q(S) SโˆˆS = ฮด. Lemma 8 Suppose (โ„ฆ, ฯ) is a metric space, and suppose P and Q are Borel probability distributions on โ„ฆ with countable support; i.e., there exists a countable set X โІ โ„ฆ with P (X ) = Q(X ) = 1. Then, for any r โ‰ฅ 1, X X |P ({x}) โˆ’ Q({x})| . |P ({x}) โˆ’ Q({x})| โ‰ค Wrr (P, Q) โ‰ค (Diam(X ))r (Sep(X ))r xโˆˆX xโˆˆX P Proof The term xโˆˆX |P ({x}) โˆ’ Q({x})| = T V (P, Q) is precisely the (unweighted) amount of mass that must be transported to transform between P and Q. Hence, the result is intuitively fairly obvious; all mass moved has a cost of at least Sep(โ„ฆ) and at most Diam(โ„ฆ). However, for completeness, we give a more formal proof below. To prove the lower bound, suppose ยต โˆˆ ฮ (P, Q) is any coupling between P and Q. For x โˆˆ X , ยต({x} ร— {x}) + ยต({x} ร— (โ„ฆ\{x})) = ยต({x} ร— โ„ฆ) = P ({x}) and, similarly, ยต({x} ร— {x}) + ยต((โ„ฆ\{x}) ร— {x}) = ยต(โ„ฆ ร— {x}) = Q({x}). 4. The existence of such a measure can be verified by the Hahn-Kolmogorov theorem, similarly to that of the usual product measure (see, e.g., Section IV.4 of Doob (2012)). 17 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Since P ({x}), Q({x}) โˆˆ [0, 1], it follows that ยต({x} ร— (โ„ฆ\{x})) + ยต(ยต((โ„ฆ\{x}) ร— {x})) โ‰ฅ |P ({x} โˆ’ Q({x})| . Therefore, since ฯ(x, y) = 0 whenever x = y and ฯ(x, y) โ‰ฅ Sep(โ„ฆ) whenever x 6= y, Z Z ฯr (x, y) dยต(x, y) ฯr (x, y) dยต(x, y) = X ร—X โ„ฆร—โ„ฆ Z XZ r ฯr (x, y) dยต(x, y) ฯ (x, y) dยต(x, y) + = xโˆˆX {x}ร—(โ„ฆ\{x}) โ‰ฅ (Sep(โ„ฆ))r r โ‰ฅ (Sep(โ„ฆ)) X xโˆˆX X xโˆˆX (โ„ฆ\{x})ร—{x} ยต({x} ร— (โ„ฆ\{x})) + ยต((โ„ฆ\{x}) ร— {x}) |P ({x}) โˆ’ Q({x})| . Taking the infimum over ยต on both sides gives X |P ({x}) โˆ’ Q({x})| โ‰ค Wrr (P, Q). (Sep(โ„ฆ))r xโˆˆX To prove the upper bound, since ฯ is upper bounded by Diam(โ„ฆ), it suffices to construct a coupling ยต that only moves mass into or out of each given point, but not both; that is, for each x โˆˆ X , min{ยต({x} ร— (โ„ฆ\{x})), ยต((โ„ฆ\{x}) ร— {x})} = 0. One way of doing this is as follows. Fix an ordering x1 , x2 , ... of the elements of X . For each i โˆˆ N, define i i X X Xi := (P (xโ„“ ) โˆ’ Q(xโ„“ ))+ and Yi := (Q(xโ„“ ) โˆ’ P (xโ„“ ))+ , โ„“=1 โ„“=1 and further define ji := min{j โˆˆ N : Xi โ‰ค Yj } and ki := min{k โˆˆ N : Xj โ‰ฅ Yi }. Then, for each i โˆˆ N, move Xi mass from {x1 , ..., xi } to {y1 , ..., yji } and move Yi mass from {y1 , ..., yi } to {x1 , ..., xki }. As i โ†’ โˆž, by construction of Xi and Yi , the total mass moved in this way is X |P (x) โˆ’ Q(x)| . ยต((X ร— X )\{(x, x) : x โˆˆ X }) = lim Xi + Yi = iโ†’โˆž xโˆˆX Lemma 10 Let K be a positive integer. Suppose {Sk }kโˆˆ[K] is a sequence of nested countable Borel partitions of (โ„ฆ, ฯ), with S0 = โ„ฆ. Then, for any r โ‰ฅ 1 and any Borel probability distributions P and Q on โ„ฆ, ๏ฃถ ๏ฃซ K X X (Res(Skโˆ’1 ))r ๏ฃญ Wrr (P, Q) โ‰ค (Res(SK ))r + |P (S) โˆ’ Q(S)|๏ฃธ . SโˆˆSk k=1 18 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Proof Our proof follows the same ideas as and slightly generalizes of the proof of Proposition 1 in Weed and Bach (2017). Intuitively, to prove Lemma 10 it suffices to find a transportation map such that For each k โˆˆ [K], recursively define Pk := P โˆ’ kโˆ’1 X ยตk and j=0 Qk := Q โˆ’ kโˆ’1 X ฮฝk , j=0 where, for each k โˆˆ [K], ยตk and ฮฝk are Borel measures on โ„ฆ defined for any E โˆˆ ฮฃ by ยตk (E) := X (Pk (S) โˆ’ Qk (S))+ Pk (E โˆฉ S) Pk (S) X (Qk (S) โˆ’ Pk (S))+ Qk (E โˆฉ S) . Qk (S) SโˆˆSk :Pk (S)>0 and ฮฝk (E) := SโˆˆSk :Qk (S)>0 P By construction of ยตk and ฮฝk , each ยตk and ฮฝk is a non-negative measure and K k=1 ยตk โ‰ค P and PK k=1 ฮฝk โ‰ค Q. Furthermore, for each k โˆˆ [K โˆ’ 1], for each S โˆˆ Sk , ยตk+1 (S) = ฮฝk+1 (S), and X |P (S) โˆ’ Q(S)| . ยตk (โ„ฆ) = ฮฝk (โ„ฆ) โ‰ค SโˆˆSk Consequently, although ยต and ฮฝ are not probability measures, we can slightly generalize the definition of Wasserstein distance by writing Wrr (ยตk , ฮฝk ) := ยต(โ„ฆ) ฯ„ โˆˆฮ   inf ฮฝ ยตk , k ยตk (โ„ฆ) ฮฝk (โ„ฆ)  [ฯr (X, Y )] E (X,Y )โˆผยต (or Wrr (ยตk , ฮฝk ) = 0 if ยตk = ฮฝk = 0). In particular, this is convenient because we one can easily show that, by construction of the sequences {Pk }kโˆˆ[K] and {Qk }kโˆˆ[K] , Wrr (P, Q) โ‰ค Wrr (PK , QK ) + For each k โˆˆ [K], Lemma 8 implies that X Wrr (ยตk , ฮฝk ) โ‰ค (Diam(S))r SโˆˆSkโˆ’1 โ‰ค (Res(Skโˆ’1 )) r = (Res(Skโˆ’1 )) r X K X Wrr (ยตk , ฮฝk ) . k=1 X T โˆˆSk :T โІS |P (T ) โˆ’ Q(T )| X SโˆˆSkโˆ’1 T โˆˆSk :T โІS X T โˆˆSk |P (T ) โˆ’ Q(T )| . Furthermore, for each S โˆˆ SK , PK = QK , Lemma 7 gives that Wrr (PK , QK ) โ‰ค (Res(SK ))r 19 |P (T ) โˆ’ Q(T )| (7) D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Plugging these last two inequalities into Inequality (7) gives the desired result: Wrr (P, Q) r โ‰ค (Res(SK )) + K X (Res(Skโˆ’1 ))r X SโˆˆSk k=1 |P (S) โˆ’ Q(S)| . Lemma 11 Suppose S and T are partitions of (โ„ฆ, ฯ), and suppose S is countable. Then, there exists a partition S โ€ฒ of (โ„ฆ, ฯ) such that: a) |S โ€ฒ | โ‰ค |S|. b) Res(S โ€ฒ ) โ‰ค Res(S) + 2 Res(T ). c) T is a refinement of S โ€ฒ . Proof Enumerate the elements of S as S1 , S2 , .... Define S0โ€ฒ := โˆ…, and then, for each i โˆˆ {1, 2, ...}, recursively define ๏ฃถ-๏ฃซ ๏ฃซ ๏ฃถ iโˆ’1 [ [ T๏ฃธ ๏ฃญ Sjโ€ฒ ๏ฃธ , Siโ€ฒ := ๏ฃญ j=1 T โˆˆT :T โˆฉSi 6=โˆ… and set S โ€ฒ = {S1โ€ฒ , S2โ€ฒ , ...}. Clearly, |S โ€ฒ | โ‰ค |S| (equality need not hold, as we may have some Siโ€ฒ = โˆ…). By the triangle inequality, each ๏ฃซ ๏ฃถ [ Diam(Siโ€ฒ ) โ‰ค Diam ๏ฃญ T ๏ฃธ โ‰ค ฮดS + 2ฮดT . T โˆˆT :T โˆฉSi 6=โˆ… Finally, since T is a partition and we can write ๏ฃถ-๏ฃซ ๏ฃซ iโˆ’1 [ [ T๏ฃธ ๏ฃญ Siโ€ฒ = ๏ฃญ j=1 T โˆˆT T โˆˆT :T โˆฉSi 6=โˆ… T is a refinement of S โ€ฒ . [ :T โˆฉSjโ€ฒ 6=โˆ… ๏ฃถ T๏ฃธ , Before proving Lemma 12, we recall a simple concentration inequality bounding the L1 deviation of a multinomial random variable from its mean: Lemma 15 (Lemma 3 P of Devroye (1983)) Suppose (X1 p , ..., XK ) โˆผ Multinomial(n, p1 , ..., pK ). 20K/n, for all ฮต โˆˆ [ฮต0 , 1), Let Z := kX โˆ’ pk1 = K |X โˆ’ p |. Then, for ฮต := 0 k k k=1  P [Z > nฮต] โ‰ค 3 exp โˆ’nฮต2 /25 . Lemma 12 now follows as an easy corollary. 20 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Lemma 12 Consider the setting of Lemma 15. Then,   p Z โ‰ค 21K/n. E n Proof Since, almost surely, Z < n, by Lemma 15, Z โˆž P [Z > nฮต] dฮต [Z/n] = E 0 Z 1  โ‰ค ฮต0 + 3 exp โˆ’nฮต2 /25 dฮต Z ฮต0 1โˆ’ฮต0   exp โˆ’n (ฮต + ฮต0 )2 /25 dฮต 0 Z  1   p 3 2 โ‰ค ฮต0 + 3 exp โˆ’nฮต0 exp โˆ’nฮต2 /25 dฮต โ‰ค ฮต0 + exp โˆ’nฮต20 โ‰ค 21K/n. 2 0 = ฮต0 + 3 21 D ISTRIBUTION E STIMATION IN 22 WASSERSTEIN D ISTANCE
10math.ST
Intelligent Device Discovery in the Internet of Things โ€“ Enabling the Robot Society James Sunthonlap, Phuoc Nguyen, Zilong Ye arXiv:1712.08296v2 [cs.AI] 8 Jan 2018 California State University Los Angeles 5151 State University Drive, Los Angeles, CA 90032, USA Email: [email protected] Abstractโ€”The Internet of Things (IoT) is continuously growing to connect billions of smart devices anywhere and anytime in an Internet-like structure, which enables a variety of applications, services and interactions between human and objects. In the future, the smart devices are supposed to be able to autonomously discover a target device with desired features and thus yield the computing service, network service and data fusion that leads to the generation of a set of entirely new services and applications that are not supervised or even imagined by human beings. The pervasiveness of smart devices, as well as the heterogeneity of their design and functionalities, raise a major concern: How can a smart device efficiently discover a desired target device? In this paper, we propose a Social-Aware and Distributed (SAND) scheme that achieves a fast, scalable and efficient device discovery in the IoT. The proposed SAND scheme adopts a novel device ranking criteria that measures the deviceโ€™s degree, social relationship diversity, clustering coefficient and betweenness. Based on the device ranking criteria, the discovery request can be guided to travel through critical devices that stand at the major intersections of the network, and thus quickly reach the desired target device by contacting only a limited number of intermediate devices. We conduct comprehensive simulations on both random networks and scale-free networks to evaluate the performance of SAND in terms of the discovery success rate, the number of devices contacted and the number of communication hops. The simulation results demonstrate the effectiveness of SAND. With the help of such an intelligent device discovery as SAND, the IoT devices, as well as other computing facilities, software and data on the Internet, can autonomously establish new social connections with each other as human being do. They can formulate self-organized computing groups to perform required computing tasks, facilitate a fusion of a variety of computing service, network service and data to generate novel applications and services, evolve from the individual aritificial intelligence to the collaborative intelligence, and eventually enable the birth of a robot society. Index Termsโ€”Internet of Things, social-aware, distributed, device discovery, computing, network and data fusion, robot society. I. I NTRODUCTION The Internet of Things (IoT) is continuously growing to connect billions of smart devices anywhere and anytime through an Internet-like structure. A recent forecast by International Data Corporation (IDC) shows that the IoT will involve more than 212 billion of objects by 2020, and the IoT and the associated ecosystem are predicted to have a $1.7 trillion market [1]. The IoT devices are capable of sensing, analyzing and evaluating the surrounding objects and people. They can collaborate and work together to provide a set of new applications and services, such as smart home, e-healthcare and intelligent transportation system. The IoT is envisioned to dramatically change and enhance the interactions between human and objects, bringing transformative benefits to the lives of human beings. As the IoT evolves, it is promising that the future smart devices may have the capability to discover a target device with desired features, and autonomously collaborate with each other to accomplish certain missions or tasks. An intelligent device discovery strategy may allow the IoT devices to efficiently establish new connections with other devices based on their need. The connections can be set up to gather a certain number of computing powers, network functions, program source codes, raw datasets, and etc to enable new services and applications. A variety of computing service, network service and data can be fused [2]-[4] by following the guidance of an intelligent device discovery strategy. For example, a glucose level monitor can send a request to find a glucose analyzer, and collaborate on evaluating a given patientโ€™s glucose level. The glucose analyzer may also need to search for a national wide database to compare the given patientโ€™s results with that of other patients, and then given the advisement or alert to the given patient. Here, an intelligent device discovery strategy could guide the request to the appropriate destinations for obtaining the required computing facilities, functions and data to provide the evaluation service, natually leading to a computing service, network service and data fusion. In addition, the IoT devices can also form social connections as human beings do, and they can collaborate to generate entirely new kinds of applications and services with the help of collaborative intelligence of smart devices and data, rather than the supervision of human beings. In the above future scenarios, one of the key challenges is how to achieve a fast, scalable and efficient device discovery when there are millions or billions of devices in the IoT. An intelligent device discovery should have a forwarding strategy that guide the discovery request to quickly arrive at the desired target device with minimum detours. In addition, since most of the IoT devices are power constrained, the device discovery should avoid involving too many intermediate devices in the process of data exchange. There are a few existing works on the topic of IoT device discovery. The work in [5] identified the differences between user search and machine-to-machine search, and presented the challenges and requirements for IoT device search. The authors in [6] studied device discovery on different network topologies, including a star-like centralized network, a regular mesh-like decentralized network and a hierarchical network. They focused on analyzing the effect of the network topology on the discovery success rate, rather than designing new device discovery strategies. The study in [7] proposed a centralized IoT search engine that can accurately interpret the context of the discovery request and thus make a proper management of search and usage in the IoT middleware environment. However, this centralized approach may not be scalable when the network size is large, and can be vulnerable to a single point of failure. More recent work [8] investigated a distributed device discovery strategy based on Information-Centric Networking (ICN). However, this approach may not be applicable to the IoT system since it relies on the built-in features of ICN such as cache and broadcast capabilities, which could introduce an extra cost to the resource-constrained IoT devices. In this work, we focus on investigating autonomous and intelligent device discovery in the IoT. We do not treat smart devices as independent objects or limit our study on the artificial intelligence of a single device, but we explore humanlike social behaviors and collaborative intelligence of smart devices. It is envisioned for the next episode of research in the IoT and robotics. In particular, we propose a novel IoT device discovery scheme, called Social-Aware and Distributed (SAND), which can discover a desired target device in a fast, efficient and scalable manner. In SAND, IoT devices are fair and equal as peers, and they can interact with each other in an autonomous and distributed manner as human do, as each of them only maintains the information of their local neighboring peers. Each IoT device is ranked by measuring the deviceโ€™s degree, social relationship diversity, clustering coefficient and betweenness. Based on this, SAND opts to forward the discovery request to the neighboring device with the highest rank, which is likely to stand at the major intersection of the network that can fast and efficiently lead the request to the desired target device. We conduct comprehensive simulations to evaluate the proposed SAND scheme on both a random network and a scale-free network. The simulation results show that SAND can achieve a high discovery success rate and a short discovery path, while contacting a small number of intermediate devices. The rest of the paper is organized as follows. We first introduce the traditional centralized and distributed device discovery schemes in Section 2. Then, we describe the design details of the proposed SAND scheme in Section 3. In Section 4, we present the performance evaluation. In Section 5, we discuss the research challenges and opportunities related to the IoT device discovery. Finally, we conclude the paper and propose our future work in Section 6. II. T RADITIONAL I OT D EVICE D ISCOVERY S CHEMES There are two traditional solutions for addressing the device discovery in the IoT, which are the centralized scheme and the distributed scheme. The former leverages a centralized controller to resolve the discovery request, and the latter uses a simple broadcast mechanism to discover the required target device in a breadth-first search manner. The detailed description and the comparison of these two approaches are presented in the following subsections. A. Centralized IoT Device Discovery Scheme To achieve a fast and efficient IoT device discovery, a simple yet effective approach is to introduce a centralized controller which keeps track of the general information (e.g., the deviceโ€™s functionality) of all the devices and maintains the shortest paths between all the device pairs. If there exists a source device which requests to discover a target device that provides a desired function, the discovery request can be sent to the centralized controller to resolve. The centralized controller can find the location of the desired target device and reply to the source device with the shortest path information to the target device. Such a centralized scheme is fast and accurate due to that the centralized controller has a global view of all the devices in the network. It is also efficient since the centralized controller can provide the shortest path between the source and target devices, which involves the minimum number of intermediate devices in transmitting the discovery request. The centralized scheme can be designed with robustness against dynamic changes in the network. When a new device joins the network, it needs to register the general information at the controller. A device that leaves the network also needs to unsubscribe at the centralized controller. In addition, the centralized controller can periodically send out heartbeat messages to all the registered devices and maintain an up-to-date list of the alive devices in the network. If a device fails to reply to the heartbeat after three attempts, it is considered as in the mode of lost and will be removed from the list of alive at the centralized controller. We can see that the centralized scheme highly relies on the centralized controller which manages the whole system and the communication between the IoT devices. B. Distributed IoT Device Discovery Scheme The centralized scheme is fast and efficient; however, it may not be scalable when the number of devices is large. In contrast, the distributed scheme offers a scalable device discovery in the IoT. In the distributed scheme, each device maintains a local neighbor list that consists of the neighborsโ€™ general information. When a new device joins a network, it only exchanges the general information with nearby devices that are within the transmission range. When a device leaves the network, it needs to inform its neighbors for them to update their local neighbor list. Heartbeats can be exchanged between the devices to maintain the fresh live or lost status of the devicesโ€™ neighbors. The distributed discovery scheme works in a breadth-first search manner. When a source device makes a request to discover a target device with desired features, the distributed scheme simply broadcasts the discovery request to all the neighboring devices. This process iterates until the desired target device is found. Compared to the centralized scheme, the distributed scheme is more resilient against possible failures since there is no centralized control that is at the risk of single point of failure. It is also more robust when the network is dynamically changing since each device only needs to maintain their local neighborโ€™s information. We can also infer that the distributed scheme can find a cost-efficient communication path between the source and target devices since the breadth-first search is used. The only limitation is that a large number of intermediate devices may be involved in transmitting the discovery request when broadcast is used, which is energy consuming. This is harmful to the IoT system where most of the devices are power constrained. III. S OCIAL -AWARE AND D ISTRIBUTED I OT D EVICE D ISCOVERY โ€“ SAND In the famous small-world experiment [9], Travers and Milgram found that people are tied by a short chain of connections and any two persons can be connected in six hops by simply exploring their social networks. A more recent Facebook research [10] confirmed this observation in which they concluded that, among their 1.59 billion active users, in average a person is separated by 3.57 hops away from another person. As the IoT evolves, devices could also exhibit human-like social relationships. For example, devices can be considered as family if they are from the same manufacturer, or can be considered as colleagues if they work together to provide a service. Such social aspects can therefore be used to intelligently navigate device discovery requests through the device social network and connect two devices in a few hops as the small-world exhibited by the human social network. Based on this motivation, we propose the Social-Aware and Distributed (SAND) scheme, which can achieve a scalable, fast and efficient device discovery in the IoT. In SAND, IoT devices can autonomously establish meaningful relationships with other devices, and form an overlay device social network in addition to their communication network. It may be faster and more efficient for the devices to find their desired target device by searching among their โ€œfriendsโ€ through the overlay device social network, as oppose to simply broadcasting through the communication network as the distributed scheme works. In the following subsections, we will present the details of the SAND architecture, the device ranking criteria and the forwarding strategy, respectively. A. The SAND Architecture In SAND, the IoT devices form two layers of networks, which consists of the communication network and the overlay device social network. The communication network is at the bottom layer, which abstracts the data communication links between the IoT devices. As long as two IoT devices are within their transmission range, a communication link exists between them. Actually, the distributed scheme introduced in the previous section only considers this communication network and performs simple broadcasting for device discovery. In SAND, in addition to the communication network, an overlay device social network is constructed to help achieve an effective IoT device discovery. When two IoT devices can communicate with each other, they can exchange their device general information, such as the manufacturer, the functionality, the ownership and the location information. In the overlay device social network, there exists a link between two IoT devices if they have a valid social relation. Similar as human relationships, device social relationships typically include family, friends, neighbors, colleagues, and etc. Devices from the same manufacturer can be considered as family, e.g., an iPhone and an Apple TV. Device friendship can be described as objects that interact frequently with one another and tend to share a common theme. For example, Bobโ€™s smartphone and his body sensors are considered as friends since they interact frequently and they both serve as key components in providing e-healthcare services. IoT devices that locate in the same room or floor can be considered as neighbors. IoT devices are considered as colleagues if they work together to provide a specific service. For example, the temperature sensors, the humidity sensors and the air conditioner are colleagues that work together to offer a comfortable living environment in a smart home. It is worth noting that, in our simulation (to be introduced in Section IV), we abstract the device general information into a number of device features, and there exists a social link between two IoT devices if they have a common feature. An illustrative example of SAND in a smart home is shown in Fig. 1. Here, we only show the overlay device social network. We assume that all the devices are connected through WiFi, so the communication network is a complete mesh network, which is not shown. In the overlay social network, the refrigerator (E), the TV (A) and the washing machine (C) are connected since they are from the same manufacturer, e.g., Samsung. The neighbor relationship exists between the vacuum (B) and the washing machine (C), both of which locate in the storage room. Friendship exists between (1) the telephone (D) and the TV (A), and (2) the refrigerator (E) and the PC (F ), which are involved in frequent interactions to serve the home owner. The refrigerator (E), the microwave (G) and the boiler (H) are considered as colleagues that work together to prepare meals. In SAND, when an IoT device joins the network, it will exchange the general information with nearby devices that are within the transmission range. Consequently, social links can be established if valid social relationships exist. Here, we assume each IoT device is social-aware and intelligent in the sense that they can establish social relationships autonomously like human. The social aspects of IoT devices give them the ability to form an overlay device social network automatically. It is worth noting that the overlay device social network is not static but dynamically changing because of the device movements or the device relationship changes (e.g., the colleague relationship may change frequently). Hence, each IoT device needs to periodically update their social connections in SAND. In SAND, IoT devices are supposed to act as human beings. The social aspects of the devices allow them to dynamically create new social connections and form new colleagueship to work together to generate new services. With the social aspects B A C F E D H G Fig. 1: SAND in a Smart Home in SAND, devices become more visible and aware to each other, thus leading to a fast and effective device discovery. In the process of device discovery, rather than simply broadcasting the discovery message to all the neighbors as the distribute schemes does, SAND will send the discovery message to each of the neighbors in a preferred order based on the the rank of the neighboring device. The higher rank the device is, the more likely and faster it is able to forward the discovery message to the target device requested by the source device. With the social aspects in SAND, devices become more visible to other devices, thus making SAND more scalable and efficient than the baseline distributed scheme. B. The Device Ranking Criteria in SAND In SAND, the device discovery adopts the depth-first search strategy, where the discovery request is forwarded to the neighboring devices in a preferred order based on their ranks. Here, the rank of a device is determined by four factors which are the device degree, the diversity, the (local) clustering coefficient and the (local) betweenness of the IoT device. The first three factors help SAND to select a device that may reach a broad community, while the betweenness leads the discovery request to a device that stands at the major intersection of multiple shortest paths in the network. Thus, the device ranking criteria makes SAND an intelligent, accurate and fast device discovery strategy. We will present the calculation details of these four factors as follows. Device Degree: In the overlay social network, the degree of device i is denoted by ki , which is defined as the number of social links it has. For example, in Fig. 1, device E has a degree of 5 since there are five social connections associated with it. The higher the device degree is, the more likely it is associated with a routing path to the desired target device since there are more outlets from this device. Diversity: In SAND, the diversity of device i is denoted by di , which is defined as the number of types of social links a device is associated with. For example, in Fig. 1, device E has a diversity of 3 since it has three different types of social links which are family (i.e., links with A and C), colleagueship (i.e., links with G and H) and friendship (i.e., link with F ). An IoT device could have a high device degree ki , but if all the connections are within the same type of social relationship, the device is still assigned with a relatively low rank since it is not diverse enough to reach distinct communities of devices. In contrast, an IoT device that has a high diversity d is involved in many different types of social relations, and may have a broad reachability, thus having a higher chance to connect with the desired target device. Clustering coefficient: The clustering coefficient shows how likely a device and its neighbors form a clique [11]. The local clustering coefficient of a device is defined as the number of the social links in its neighborhood (including the device itself and its one-hop neighbors) divided by the total number of possible links in the neighborhood. For a given device i, the local clustering coefficient ci can be calculated as:  2| est : s, t โˆˆ Ni , est โˆˆ E | (1) ci = ki (ki โˆ’ 1) where est is a social link between device s and device t, Ni is the set of devices in the neighborhood of device i, E is the set of social links in the neighborhood of device i, and ki is the degree of device i. The higher the local clustering coefficient is, the more likely the device and its neighbors are forming a clique (e.g., fully mesh), thus the diameter of the device neighborhood is smaller, which can lead to a faster and wider dissemination for the discovery request. Betweenness: The betweenness reflects the probability that a given device stands at the critical intersection of multiple shortest paths in the network [12]. It is defined as the number of shortest paths that traverse the given device divided by the total number of possible shortest paths. In SAND, the local betweenness measures such a probability in the neighborhood that includes the given device and its one-hop neighbors. The local betweenness of device i is calculated as: P s,tโˆˆNi ฮดst (i) bi = (2) ki (ki โˆ’ 1) where Ni is the set of devices in the neighborhood of device i, s and t are a pair of devices in Ni , and ki is the degree of device i. Here, ฮดst (i) is 1 if the shortest path between s and t traverses through device i; otherwise, it is 0. The higher the local betweenness is, the higher chance the given device is located at the intersection that connects major shortest paths in the neighborhood. Discovery requests that arrive at such intersection can be disseminated to anyplace in the network easily and quickly over those shortest paths. In SAND, the rank of a device Ri is defined as the multiplication of the above mentioned four factors (e.g., Eq. (3)). The higher the rank is, the more likely the device can forward the discovery request to the desired target device in a fast and efficient manner. Ri = ki โˆ— di โˆ— ci โˆ— bi (3) C. The SAND Forwarding Strategy Based on the architecture and the device ranking criteria as described above, we propose the SAND device discovery scheme in this subsection. Rather than the simple broadcast used in the distributed scheme, SAND forwards the discovery request to a neighbor device that ranks the highest. For example, in Fig. 1, the discovery request from D to C will be forwarded to E, which has the highest rank (with a degree of 5, diversity of 3, local clustering coefficient of 0.53 and local betweenness of 0.53). The device with the highest rank is supposed to be the most effective one that leads to the desired target device. In the discovery process, SAND performs a depth-first search with limited search depth, where the search will not exhaust to the deepest level but a depth level of n (which is a tunable parameter). If the desired target device cannot be found after searching for n levels, SAND will step back to examine the other unchecked neighbors in depth nโˆ’1. The pseudocode of SAND discovery algorithm is shown in Algorithm 1. Algorithm 1 The SAND Device Discovery Algorithm Input: A discovery request rst from source s to target t Output: The communication path pst between s and t 1: pst .push(s); 2: while pst is not empty do 3: i โ† pst .pop(); 4: if i is the desired target device then 5: return the reverse path of pst ; else if i has been checked before then 6: 7: continue; 8: else if pst .length() = depth n then 9: continue; 10: else 11: rank and sort the neighbor devices Ni ; 12: pst .push(Ni highest rank ); 13: end if 14: end while Similar as the distributed scheme, SAND is scalable since each IoT device only maintains information of its local connections. SAND is also resilient and robust since there is no centralized controller and each IoT device is fair and equal as a peer. Compared to the distributed scheme, SAND is more efficient because the former applies simple broadcast and thus a significant large number of devices are involved in the discovery process, while in the latter, SAND performs depthfirst search with limited search depth and the guidance of an intelligent device ranking criteria, so the number of devices involved is relatively small. Such an advantage of SAND may lead to a low energy consumption in the process of transmitting the discovery request, which is critically beneficiary to the IoT system where devices are power constrained. Hence, we can see that SAND inherits the advantages of the distributed scheme, and further improves the communication efficiency. IV. P ERFORMANCE E VALUATION In this section, we focus on evaluating the performance of the proposed SAND scheme, compared to the distributed scheme that uses simple broadcast. We conduct simulations on both a random network and a scale-free network. The random network is an irregular mesh network with social links randomly generated between IoT devices, while the scale-free network is generated by considering the power law [13] in which the fraction of devices with k connections follows a distribution P (K) โˆผ k โˆ’ฮณ (ฮณ is usually between 2 and 3). It is meaningful and reasonable to test SAND on a scale-free network, since most of the social networks are scale-free and SAND works by considering an overlay device social network. In our simulation, we generate a network that consists of 20000 IoT devices. Each IoT device is associated with a number of connections to its neighboring devices (the number of connections follows uniform distribution and power law in the random network and the scale-free network, respectively), which forms the communication network. Each physical link in the communication network has a transmission latency uniformly distributed within [10ms, 40ms]. The distributed scheme only runs on this communication network. In SAND, for each IoT device, we randomly generate three features. Any two IoT devices that are physically connected and share the same features will be equipped with a social link, which forms the overlay device social network. The total number of features in the network is set to vary from 2000 to 10000. For all the simulation results shown below, we generate 15000 discovery requests from randomly selected source devices with randomly chosen desired features, and obtain the average results. Each discovery request has a time to live of 60s. With regards to the evaluation, we focus on three performance metrics, which are the success rate, the average number of devices contacted on success and the average number of hops of the discovery path on success. We will present the simulation results and findings in the following parts. A. Success Rate In the simulation, if the target device with the desired feature can be found before the time to live expires, it is considered as a successful discovery; otherwise, it is considered as a failure and the discovery request will be dropped. The success rate is defined as the number of successful discovery divided by the total number of discovery requests. We show the success rate as a function of the number of features in Fig. 2(a) and Fig. 2(b). Given a fixed number of IoT devices (i.e., 15000 by default) in the system, as the number of features increases, the system become more diverse with a variety of types of devices. From Fig. 2(a), we can see that in the random network the success rate of both the distributed scheme and SAND decreases as the network becomes more diverse. The distributed scheme performs better than SAND since the distributed scheme uses simple broadcast while SAND uses the depth-first search which may yield to a long discovery period that exceeds the required time to live. 100.00% 100.00% Distributed Broadcast SAND 90.00% Success Rate Success Rate 90.00% 80.00% 70.00% 80.00% 70.00% 60.00% 60.00% 50.00% 50.00% Broadcast Distributed SAND 2000 4000 6000 8000 10000 No. of Features (a) Success Rate in Random Networks 2000 4000 6000 8000 10000 No. of Features (b) Success Rate in Scale-free Networks Fig. 2: Simulation Results in the Random Network and the Scale-free Network However, in the scale-free network as shown in Fig. 2(b), we can see that SAND achieves a similar success rate as that of the distributed scheme, which is as high as more than 98%. Compared to the results in the random network, the success rate experiences a significant increase. This is primarily because in the scale-free network there are some superhub devices that have a large number of connections, which could help the discovery request reach the target device in a short time. While in the random network, each device has a similar node degree and the discovery request may take a long time to reach the target, and in some bad cases the time to live requirement is violated and thus failures occur. Another reason is that the device ranking criteria in SAND is effective and can successfully navigate the discovery request to the desired target device. Given that most of the real-world social networks are scale-free, we can infer that SAND is a practically solid solution since its success rate is above 98%. B. Average Number of Devices Contacted One of our main interests in this research is to measure, during a device discovery process, how many devices are being contacted before the desired target device is found. It is more energy efficient if less number of devices are involved in transmitting the discovery message, which is critically important for IoT system where devices are power constrained. Fig. 3(b) and Fig. 3(b) show the number of devices contacted with different number of features in the random network and the scale-free network, respectively. Here, we only count the measures on successful discovery. From the simulation results, we can observe that in both random and scale-free networks, as the number of features increases, SAND outperforms the distributed scheme, with an average performance improvement of 14.6% and 13.9%, respectively. It can also be seen that as the number of features increases, the performance improvement of SAND over the distributed scheme becomes more significant in both networks. This indicates that SAND is more efficient when the IoT system is more diverse and heterogeneous. Thanks to the adoption of depth-first search and the intelligent device ranking criteria, SAND can efficiently discover the desired target device without involving too many unnecessary intermediate devices. Thus, SAND can potentially achieve a low energy consumption in the process of transmitting the discovery request, which is critically beneficiary to the IoT where the devices are power constrained. C. Communication Hops Another interest in this research is to find out how many communication hops are there to separate a source device from a desired target device. After the discovery process is done, the source and target devices will communicate with each other over the discovery path and cooperate to perform computing tasks. The post-discovery communication can be cost-efficient if the number of hops of the discovery path is small. In Table I and II, we show the average number of hops of the discovery path in the random network and the scale-free network, respectively. It can be seen that SAND can achieve as small communication hops as that of the distributed scheme, the latter of which is supposed to be the optimal one because of using the breadth-first search. This finding further validates the effectiveness of the device ranking criteria of SAND, which can intelligently navigate the discovery to the desired target device with minimum detours. We can also see that as the number of features increases, the number of hops increases in both network scenarios. This is reasonable because it becomes more difficult and needs more hops of query to find the desired target device when the network becomes more diverse. Comparing the results in the two tables, we can also observe that from the random network to the scale-free network, the average number of hops exhibits an average increase of two hops. The reason behind is that the random network is a regular mesh network where all the devices are relatively fair and have similar number of connections, while the scale-free network has some superhub devices that have huge number of connections. In the scale-free network, a given discovery request is usually forwarded to those superhub devices first and then finds a path to the desired target device, thus resulting in a larger number of hops than that of the random network. Furthermore, we evaluate the distribution of devices over the number of hops of the discovery path in the scale-free network. As shown in Fig. 4, we plot the device distributions for SAND 4,000.00 3,000.00 2,000.00 1,000.00 Distributed Broadcast SAND Avg. No. of Devices Contacted Avg. No. of Devices Contacted 4,000.00 3,000.00 2,000.00 1,000.00 Broadcast Distributed SAND 0.00 0.00 2000 4000 6000 8000 10000 No. of Features (a) Avg. No. of Devices Contacted in Random Networks 2000 4000 6000 8000 10000 No. of Features (b) Avg. No. of Devices Contacted in Scale-free Networks Fig. 3: Simulation Results in the Random Network and the Scale-free Network TABLE I: No. of Hops in Random Networks 5000 2000 2000 4000 6000 8000 10000 Broadcast 3.67 4.16 4.43 4.53 4.82 SAND 3.66 4.14 4.28 4.40 4.69 TABLE II: No. of Hops in Scale-free Networks No. of Features 2000 4000 6000 8000 10000 Broadcast 5.41 6.15 6.37 6.47 6.70 SAND 5.41 6.14 6.36 6.41 6.69 6000 4000 No. of Devices No. of Features 10000 3000 2000 1000 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 No. of Hops using 2000, 6000 and 10000 features. The result confirms the past research on social networks [9][10], and shows that in most of the cases any two IoT devices are separated by 5โˆผ7 hops. We can also observe that the average number of hops is small when the network is less diverse (see the center of the peak of distribution with 2000 features), and the average number of hops increases when the network becomes more diverse (e.g., 6000 and 10000 features). We can also infer that if a device cannot be discovered in a few hops, the probability that the discovery is unsuccessful increases dramatically. The reason behind is that the unsuccessful discovery involves devices that are relatively isolated from all other devices. It is quite common that the discovery to those isolated devices will violate the time to live requirement and get dropped. In contrast, the successful discovery usually involves devices that are in a cluster or connected to the superhubs. V. R ESEARCH C HALLENGES AND O PPORTUNITIES An efficient IoT device discovery may lead to the generation of a new set of applications and services, as well as research opportunities, such as self-organized computing, service and data fusion, malware source traceback and the formation of a robot society, etc. Meanwhile, there are many open challenges with regards to these applications. In the following parts, we propose a few research opportunities and challenges related to the topic of intelligent device discovery in the IoT, and beyond. Fig. 4: Device Distribution v.s. No. of Hops in SAND with 20K nodes A. Self-Organized Computing The intelligent device discovery can enable a new format of computing services that can be self-organized by a number of smart devices. A client can initiate a computing task from any device (e.g., a smart watch), with a set of specified requirements such as computing power demand (e.g., CPU and memory), function or platform demand, and data demand (e.g., source code or raw dataset). The source IoT device is responsible for deliverying these requirements to the appropriate computing facilities in the Internet and gathering the results back. In this case, an intelligent device discovery strategy can be used to establish connections between IoT devices and the computing facilities in the Internet. For example, a user wants to issue a request to check his/her glucose level from the smart watch. The smart watch can use the intelligent device discovery to search for the nearest server that has enough computing and memory power to perform the computing tasks. Then, the server may use the intelligent device discovery to find the source code of glucose level analyzer, and then download and install the analyzer to perform the analysis. The intelligent device discovery grants IoT devices and computing facilities the capability to fetch the data and functions as they need for performing a given computing tasks. Thus, the IoT devices and computing facilities can perform the computing tasks in a self-organized manner. In this process, one of the open challenges is how to standardize the experssion of the computing requirements so that the devices and machines can initiate standard requests that can be understood by other machines. Another challenge is how to optimize the request and reply flow routes so that the network resource consumption can be minimized and the request-response latency can be minimized. B. Computing, Network and Data Fusion In the above self-organized computing scenario, a variety of computing facilities, network functions/services and data (e.g., programming source code, patientโ€™s raw data) can be interconnected and fused by running an intelligent device discovery strategy. For a given service request, the intelligent device discovery can help with gathering the computing, switching and storage hardware from a specific site, while fetching a pool of patientsโ€™ data from a different site and obtaining the source codes of particular computing functions or network functions from another site. Here, the computing, switching and storage hardware are served as placeholders, while the source codes of the computing and network functions and the raw dataset can be discovered and fetched by the intelligent device discovery strategy and served as the input to those hardware placeholders. Data, software and hardware can be distributed in different sites, while they are coupled by the intelligent device discovery approach. Hence, an intelligent device discovery strategy is promising to enable the computing, network and data fusion, and achieve an efficient communication between the fused devices. After the computing, network and data fusion becomes true, devices and machines can easily launch new services by specifying their needs to the Internet. The Internet can resolve the needs in a standard format (e.g., service function chains) and efficiently connect those required devices and funcitons (e.g., through intelligent device discovery strategy) to provide the required new services specified by the devices and machines. With the computing, network and data fusion, it is promising to generate novel machine-initiative services that are not supervised by human beings. Fusion can be considered as an intermediate phase that prepares and enables the formation of a robot society. To achieve this, an open challenge is how to develop a platform that can address the IoT interoperability issue and facilitate a computing, network service and data fusion platform. Another challenge is how to efficiently discover and deliver the required data and source codes to the selected hardware sites in a timely manner such that a seamless service can be provided for the users. C. Traceback Cyber Attack Source Another application of intelligent device discovery is in the area of network security. The sources of malicious attacks are usually spoofed to avoid being detected [14]. The intelligent device discovery can be used to traceback the actual source of malware attacks based on the characteristics and features of the malicious attacks. The security protection system can issue a traceback request for the malware source generator, with certain key features of the malicious traffic. The overlay social network on top of the communication network can be constructed based on the model in Section 3.1. Then, an enhanced model that can accurately predict the hidden links/relationships between machines can be constructed using the method in [15]. Machine learning or deep learning [16] techniques can also be applied here to improve the accruacy of the prediction. After that, the proposed intelligent device discovery strategy can run on this enhanced overlay social network (with hidden links based on prediction) to traceback the malicious source attacker. Even if the malicious source are spoofed and hidden behind some links or relationships, the intelligent device discovery can still guide the traceback route based on the pattern and features of malicious attacks. D. Robot Society The intelligent device discovery can be used to initiate the connection between a given device and its desired device for the first time. After the first contact, the two devices can be considered to know each other and maintain a certain type of social relationship as human does. As the communications between different devices continue to grow, a variety of computing service, network service and data can be fused, and a robot society could be formed which consists of IoT devices, servers, robots and all the machines in the Internet. The device relationship in the robot society can be the same as the human relationship in the human society, such as friend, colleague and family relationships (which are considered in this paper). There is also a high chance that some unique machine type of relationships may exist in the robot society. One of the challenging and meaningful work is to analyze a large dataset of network traffic data to categorize the relationships between machines/devices in the Internet. This can be useful to give us an insight of the relationships and communication purpose between machines. It is also helpful for us to formulate the foundamental rules of how to establish the social relationship between machines/devices. Another open challenge is how to ensure the security of the connection before the two machines/devices establish their social relationship. It is necessary to avoid establishing relationships with potential malicious devices. To achieve this, we may need to develop machine learning based solutions (e.g., decision tree classification, convolutional neural networks or recurrent neural networks) to train the machines/devices to identify their own roles and their contactโ€™s roles in the robot society, to reduce the chance of establishing connections with malicious devices. In general, a promising research area is to investigate the social behavior and the collaborative intelligence in the robot society, in addition to the artificial intelligence in a single device/machine. VI. C ONCLUSION AND F UTURE W ORK The Internet of Things (IoT) grows continuously and connects billions of smart devices with heterogeneous functionalities, purposes and platforms. As the IoT evolves, it is promising that human-like social relationships could be autonomously established by the smart devices. With the help of an intelligent device discovery strategy, IoT devices can easily discover the resources (e.g., source codes) and devices (e.g., computing facilities) that meet their needs. Each device/machine is associated with one or more resources or capabilities of either computing power, network function, source code or data. The intelligent device discovery can be used to glue and couple the resources from distributed sites to achieve the computing, network service and data fusion. Each device/machine acts like a robot and can establish social connections with each other autonomously to collaborate and create new applications and services, which could eventually lead to the formation of a robot society. The goal of this research is to address the impending scalability issue in the process of device discovery in IoT. In this paper, we have proposed a novel approach that leverages such social aspects of IoT devices to achieve a scalable and efficient IoT device discovery. The proposed Social-Aware and Distributed (SAND) scheme applies the depth-first search and forwards the discovery request to neighboring devices in a preferred order defined by a novel social network-aware device ranking criteria. More specifically, the ranking criteria takes into consideration the deviceโ€™s degree, diversity and clustering coefficient, which could potentially navigate the discovery request to reach a broad community. Furthermore, the local betweenness is considered in the ranking criteria, which prioritizes the devices that stands at the critical intersections of multiple shortest paths of the network. With the guidance of such an intelligent device ranking criteria, the discovery request can find the desired target device in a fast and efficient manner. We have conducted comprehensive simulations to validate the effectiveness of SAND on both a random network and a scale-free network. Simulation results have shown that SAND can achieve the near-optimal success rate and communication hops as that of the distributed scheme which uses broadcast. In addition, we have found that the SAND scheme contacts a much smaller number of intermediate devices than that of the distributed scheme during the discovery process, thus potentially leading to a much less energy consumption. As for future work, we plan to extend our study in the following aspects. First, we plan to extend SAND with multicast feature, which allows one discovery request to fetch multiple replies. This could be useful in wireless sensor network applications, such as in the temperature monitor system. In addition, rather than specifying only one feature of the desired target device, we can enhance the SAND scheme by allowing it to claim for multiple features to achieve a more accurate discovery. We also plan to implement SAND on a physical testbed and conduct experimental studies. Secondly, we plan to analyze various network traffic datasets to understand the meanings and purposes behind those communications, and we can use machine learning techniques to categorize the social relationships in the IoT. This can be used to further improve the discovery speed and the discovery accuracy of SAND, and can also provide the basic insights for exploring the formation of the robot society. Thirdly, we plan to investigate the interoperability issues in the IoT and explore a standard platform that enables a variety of computing, network service and data fusion. R EFERENCES [1] A. Zaslavsky and P. P. Jayaraman, โ€œDiscovery in the internet of things,โ€ in ACM Ubiquity Magazine, October 2015, Article No. 2. [2] G. Sun, V. Chang, G. Yang and D. Liao, โ€œThe cost-efficient deployment of replica servers in virtual content distribution networks for data fusion,โ€ in Information Sciences (2017), http://dx.doi.org/10.1016/j.ins.2017.08.021 [3] G. Sun, D. Liao, D. Zhao, Z. Sun, V. Chang, โ€œTowards provisioning hybrid virtual networks in federated cloud data centers,โ€ in Future Generation Computer Systems, 2017, https://doi.org/10.1016/j.future.2017.09.065 [4] C. Li, F. Darema and V. Chang, โ€œDistributed behavior model orchestration in cognitive internet of things solution,โ€ in Journal of Enterprise Information Systems, 2017, pp. 1-21. [5] P. Barnaghi and A. Sheth, โ€œOn searching the internet of things: requirements and challenges,โ€ in IEEE Intelligent Systems, vol. 31, no. 6, 2016, pp. 71-75. [6] P. C. Ccori, L. C. De Biase, M. K. Zuffo and F. S. Da Silva, โ€œDevice discovery strategies for the IoT,โ€ in Proc. of IEEE International Symposium on Consumer Electronics, 2016, pp. 97-98. [7] W. T. Lunardi, E. De Matos, R. Tiburski, et. al., โ€œContext-based search engine for industrial IoT: discovery, search, selection and usage of devices,โ€ in Proc. of IEEE Conference on Emerging Technologies and Factory Automation, 2015, pp. 8-11. [8] L. Dong, R. Ravindran and G. Wang, โ€œICN based distributed IoT resource discovery and routing,โ€ in Proc. of IEEE International Conference on Telecommunications, 2016, pp. 1-7. [9] J. Travers and S. Milgram, โ€œAn experimental study of the small world problem,โ€ in Sociometry, vol. 32, no. 4, 1969, pp. 425-443. [10] S. Edunov, C. Diuk, I. O. Filiz and S. B. Burke, โ€œThree and a half degrees of separation,โ€ 2016. [Online]. Available: https://research.fb.com/threeand-a-half-degrees-of-separation. [11] D. J. Watts and Steven Strogatz, โ€œCollective dynamics of small-world networks,โ€ in Nature, vol. 393, June 1998, pp. 440-442. [12] M. E. J. Newman, โ€œNetworks: an introduction,โ€ Oxford University Press, 2010, ISBN 978-0199206650. [13] A. Barabsi and R. Albert, โ€œEmergence of scaling in random networks,โ€ in Science, vol. 286, 1999, pp. 509-512. [14] Zhen Ling ; Junzhou Luo ; Kui Wu ; Wei Yu ; Xinwen Fu, โ€œTorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor,โ€ in IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2515-2530, 2015. [15] Berlusconi G, Calderoni F, Parolini N, Verani M, Piccardi C, โ€œLink Prediction in Criminal Networks: A Tool for Criminal Intelligence Analysis,โ€ in PLoS ONE 11(4): e0154244. https://doi.org/10.1371/journal.pone.0154244 [16] R. Chauhan, H. Kaur and V. Chang, โ€œAdvancement and applicability of classifiers for variant exponential model to optimize the accuracy for deep learning,โ€ in Journal of Ambient Intelligence and Humanized Computing, 2017, pp. 1-10.
2cs.AI
SOFIC ENTROPY OF GAUSSIAN ACTIONS arXiv:1509.07835v2 [math.DS] 31 Dec 2015 BEN HAYES Abstract. Associated to any orthogonal representation of a countable discrete group is a probability measure-preserving action called the Gaussian action. Using the Polish model formalism we developed before, we compute the entropy (in the sense of Bowen, Kerr-Li) of Gaussian actions when the group is sofic. Computations of entropy for Gaussian actions has only been done when the acting group is abelian and thus our results are new even in the amenable case. Fundamental to our approach are methods of noncommutative harmonic analysis and C โˆ— -algebras which replace the Fourier analysis used in the abelian case. Contents 1. Introduction 2. Preliminaries on Sofic Entropy 3. Generating Sets and Tightness 4. Entropy of Gaussian Actions 4.1. Definition of Gaussian Actions 4.2. Preliminaries on the Group von Neumann Algebra and Embedding Sequences 4.3. Preliminaries on Real Subspaces of the Left Regular Representation 4.4. Sofic Entropy of Gaussian Actions References 1 3 4 7 7 10 12 16 27 1. Introduction This paper is concerned with giving new computations for sofic entropy, specifically in computing entropy of Gaussian actions. Entropy for actions of Z is classical and goes back to work of Kolmogorov and SinaฤฑฬŒ. Entropy roughly measures how chaotic the action of Z is. Kieffer in [20] showed that one can generalize entropy to actions of amenable groups. An amenable group is a group which has a sequence of nonempty finite sets which are almost invariant under translation by elements of the group. Abelian groups, nilpotent groups and solvable groups are amenable, but the free group on r letters is not if r โ‰ฅ 2. Entropy for amenable groups has been studied by many people and is a useful invariant in ergodic theory: it can be computed in many cases and positivity of entropy implies interesting structural properties. Fundamental examples in [24] led many to believe that there cannot be a good entropy theory beyond the realm of amenable groups. In groundbreaking and seminal work Bowen in [1] defined a notion of entropy for actions of sofic groups. The class of sofic groups is considerably larger than that of amenable groups: it contains all amenable groups, all residually finite groups, all linear groups and is closed under free products with amalgamation over amenable subgroups (see [11],[10],[12],[25],[28]). Since the subject is fairly young, not as much is known about sofic entropy as entropy for actions of amenable groups but some structure is beginning to emerge. It can be calculated for some interesting examples such as Bernoulli shifts (see [1],[19]) as well as algebraic actions (see [2],[5],[15],[19]). Additionally, recent work in [22],[16] shows that one can deduce structural properties of an action from assumptions of positive sofic entropy. Our goal in this paper is to add to the list of computations of sofic entropy by computing the entropy of Gaussian actions. The Gaussian action construction is a way to associate, in a functorial way, to any orthogonal representation ฯ : ฮ“ โ†’ O(H) a probability measure-preserving action called the Gaussian action. Date: April 11, 2018. 2010 Mathematics Subject Classification. 37A35,28D15, 37A55, 22D25,43A65. Key words and phrases. Sofic entropy, Gaussian actions, noncommutative harmonic analysis. 1 2 BEN HAYES We refer the reader to Section 4.1 for the precise definition. For intuition we mention that if H is finitedimensional, then this action is just the induced action of ฮ“ on H with the Gaussian measure. The Gaussian action is a natural generalization of this construction to the case of infinite-dimensional representations. Recall that the left regular representation ฮปR : ฮ“ โ†’ โ„“2 (ฮ“, R) is given by (ฮปR (g)ฮพ)(h) = ฮพ(g โˆ’1 h), for ฮพ โˆˆ โ„“2 (ฮ“, R), g, h โˆˆ ฮ“. It is known that the Gaussian action associated to the left-regular representation ฮ“ y โ„“2 (ฮ“, R) is the Bernoulli action with base (R, ฮฝ) where ฮฝ is the Gaussian measure. Thus Gaussian actions are a class of actions which are similar to the class of Bernoulli shifts. To the best of our knowledge, entropy for Gaussian actions has only been computed when the acting group is abelian (see [21] and [9]). To state our result, we need to introduce the following decomposition of representations. We define singularity of orthogonal representations exactly as in the unitary case. Given orthogonal representations ฯ1 , ฯ2 of ฮ“, we say that ฯ1 is singular with respect to ฯ2 and write ฯ1 โŠฅ ฯ2 if no nonzero subrepresentation of ฯ1 embeds into ฯ2 . We say that ฯ1 is absolutely continuous with respect to ฯ2 , and write ฯ1 โ‰ช ฯ2 , if ฯ1 embeds into ฯโŠ•โˆž . For general pairs of orthogonal representations ฯ1 , ฯ2 we can 2 always write ฯ1 = ฯ1,a โŠ• ฯ1,s where ฯ1,s , ฯ1 are singular and ฯ1,a โ‰ช ฯ2 . If ฮ“ is abelian, this reduces to the Lebesgue decomposition in measure theory. We thus regard this as a noncommutative analogue of the Lebesgue decomposition. Theorem 1.1. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ. Let ฯ : ฮ“ โ†’ O(H) be an orthogonal representation with H separable. Let ฮ“ y (Xฯ , ยตฯ ) be the induced Gaussian action; write ฯ = ฯa โŠ• ฯs where ฯs and ฮปฮ“,R are singular and ฯa โ‰ช ฮปฮ“,R . Then ๏ฃฑ ๏ฃด ๏ฃฒโˆ’โˆž, if hฮฃ,ยตฯs (Xฯs , ฮ“) = โˆ’โˆž hฮฃ,ยตฯ (Xฯ , ฮ“) = 0, if ฯa = 0 and hฮฃ,ยตฯs (Xฯs , ฮ“) 6= โˆ’โˆž ๏ฃด ๏ฃณ โˆž, if ฯa 6= 0 and hฮฃ,ยตฯs (Xฯs , ฮ“) 6= โˆ’โˆž. Since it appears to be new, we specifically mention the amenable case. Corollary 1.2. Let ฮ“ be a countable discrete amenable group. Let ฯ : ฮ“ โ†’ O(H) be an orthogonal representation and ฮ“ y (Xฯ , ยตฯ ) the induced Gaussian action. Write ฯ = ฯ1 โŠ• ฯ2 where ฯ2 is embeddable into ฮ“ y โ„“2 (ฮ“, R)โŠ•โˆž , and Homฮ“ (ฯ1 , ฮปฮ“,R ) = {0}. Then hยตฯ (Xฯ , ฮ“) = โˆž if and only if ฯ2 6= 0, and if ฯ2 = 0, then hยตฯ (Xฯ , ฮ“) = 0. In [15] we gave a formula for entropy of a probability measure-preserving action ฮ“ y (X, ยต) when X is a Polish space, ยต is a Borel probability measure, and ฮ“ y X by homeomorphisms. Given an arbitrary probability measure-preserving action ฮ“ y (Y, ฮฝ), a probability measure-preserving action ฮ“ y (X, ยต) where X is Polish, ยต is a Borel measure on X and ฮ“ y X by homeomorphisms is called a Polish model for ฮ“ y (Y, ฮฝ) if ฮ“ y (X, ยต) โˆผ = ฮ“ y (Y, ฮฝ) as probability measure-preserving actions. Our definition of entropy in terms of a Polish model took into account the topology of X in a nontrivial way like the definition for entropy in the presence of a compact model developed by Kerr-Li in [19]. Our computation for the entropy of Gaussian actions goes through Polish models. This model is associated to a family of generators for the representation, and the measure is canonically defined in terms of the representation. Although one can write down a compact model, it is unnatural and the measure is not expressed nicely in terms of the representation. We mention that entropy in the sofic case is roughly a measure of โ€œhow manyโ€ finitary simulations a probability measure-preserving action has. The typical way to prove existence of these simulations is through a probabilistic argument. For the Gaussian action, our probabilistic argument uses Gaussian measures on finite-dimensional spaces. A consequence of our methods is that, associated to any sofic approximation of a group, we have a natural way of describing the Gaussian measure for a subrepresentation of the left regular representation as a limit of finite-dimensional Gaussian measures. Let us sketch how we are able to handle the case ฯ is singular with respect to ฮปR when ฮ“ is nonabelian. In the case ฮ“ = Z, the problem of showing that ฮ“ y (Xฯ , ยตฯ ) has zero entropy reduces to the fact that if ยต, ฮฝ are two singular measures on T = R/Z, then there is a f โˆˆ C(T) with 0 โ‰ค f โ‰ค 1 so that f is โ€œcloseโ€ to 1 in L2 (ยต) and close to zero in L2 (ฮฝ). As the representation theory of a group is captured by its universal C โˆ— -algebra it is natural to replace C(T) with C โˆ— (ฮ“) in the nonabelian case. This statement about singularity SOFIC ENTROPY OF GAUSSIAN ACTIONS 3 of representations then becomes a statement about singularity of measures and we can prove an analogous characterization of singularity of representations in terms of elements of C โˆ— (ฮ“). In short, we abstract the harmonic analysis present in the abelian case to noncommutative harmonic analysis using the framework of C โˆ— -algebras. We mention that if ฮ“ is amenable and is an infinite conjugacy class group (i.e. every nontrivial conjugacy class is infinite) then there is a easy proof that if ฯ : ฮ“ โ†’ O(H) embeds into ฮปโŠ•โˆž ฮ“,R , then hยตฯ (Xฯ , ฮ“) = โˆž. Namely, one can show in this case that there is an n so that ฯโŠ•n contains ฮปฮ“,R (this is a consequence of the theory of II1 factors). In this case (Xฯ , ยตฯ ) will factor onto (Xฮป , ยตฮป ) which is isomorphic to ฮ“ y (R, ฮท)ฮ“ where ฮท is the Gaussian measure. Since entropy for amenable groups decreases under factor maps, we are done. This proof fails disastrously in the non-amenable case. It is very far from true that sofic entropy decreases under factor maps for non-amenable groups. In fact, it can be shown that for every nonamenable group there is a ฮฑ > 0 so that if (X, ยต) is a measure space with H(X, ยต) โ‰ฅ ฮฑ then ฮ“ y (X, ยต)ฮ“ factors onto every nontrivial Bernoulli shift (see [4] Corollary 1.6), even a Bernoulli shift with infinite entropy. Moreover, if ฮ“ contains a free group then ฮฑ can be taken to be any positive number [3]. In fact, even more is true: a recent result of Seward (see [29], Theorem 1.1) implies that for every nonamenable sofic group ฮ“, there is an ฮฑ > 0 so that any probability measure-preserving action of ฮ“ is a factor of an action having sofic entropy less than ฮฑ. Thus, there is no simple proof in the nonamenable case based on factors, and we must use a direct proof. Even in the amenable case this argument relies on the group being an infinite conjugacy class group and one needs general methods to handle the general case. 2. Preliminaries on Sofic Entropy We use Sn for the symmetric group on n letters. If A is a set, we will use Sym(A) for the set of bijections of A. Definition 2.1. Let ฮ“ be a countable discrete group. A sofic approximation of ฮ“ is a sequence ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ) of functions (not assumed to be homomorphisms) so that lim udi ({1 โ‰ค k โ‰ค di : ฯƒi (g)ฯƒi (h)(k) = ฯƒi (gh)(k)}) = 1, for all g, h โˆˆ ฮ“ iโ†’โˆž lim udi ({1 โ‰ค k โ‰ค di : ฯƒi (g)(k) 6= ฯƒi (h)(k)}) = 1, for all g 6= h in ฮ“. iโ†’โˆž We will call ฮ“ sofic if it has a sofic approximation. All amenable groups and residually finite groups are sofic. Also, it is known that soficity is closed under free products with amalgamation over amenable subgroups (see [12],[25],[11],[10], [28]). Additionally, residually sofic groups and locally sofic groups are sofic. Thus by Malcevโ€™s Theorem we know all linear groups are sofic. It is known that graph products of sofic groups are sofic by [7]. If ฮ› is a subgroup of ฮ“, and ฮ› is sofic and ฮ“ y ฮ“/ฮ› is amenable (in the sense of having a ฮ“-invariant mean) then ฮ“ is sofic. One can argue this by the same methods of Theorem 1 of [12] (for example consider the observations after Definition 12.2.12 of [6]). We recall the definition of entropy in the presence of a Polish model given in [16]. Let X be a Polish space and let ฮ“ be a countable, discrete group with ฮ“ y X by homeomorphisms. We say that a continuous pseudometric โˆ† on X is dynamically generating if for every x โˆˆ X and every neighborhood U of x in X there exists a finite F โІ ฮ“ and a ฮด > 0 so that if y โˆˆ X and max โˆ†(gx, gy) < ฮด gโˆˆF then y โˆˆ U. Notice that our definition includes the hypothesis that โˆ† is continuous. We use Cb (X) for the Banach space of bounded, continuous functions on X with norm kf k = sup |f (x)|. xโˆˆX Given a pseudometric space (X, โˆ†), A, B โІ X and ฮต > 0, we say that A is ฮต-contained in B and write A โІฮต B if for any a โˆˆ A, there is a b โˆˆ B so that โˆ†(a, b) โ‰ค ฮต. We say that A โІ X is ฮต-dense if X โІฮต A. We use Sฮต (X, โˆ†) for the minimal cardinality of an ฮต-dense subset of X. We say that A โІ X is ฮต-separated if for any a1 6= a2 in A we have โˆ†(a1 , a2 ) > ฮต. We use Nฮต (A, โˆ†) for the maximal cardinality of an ฮต-separated subset of X. We leave it as an exercise to show that (1) N2ฮต (A, โˆ†) โ‰ค Sฮต (A, โˆ†) โ‰ค Nฮต (A, โˆ†), 4 BEN HAYES and that if ฮด > 0 and A โІฮด B then S2(ฮต+ฮด) (A, โˆ†) โ‰ค Sฮต (B, โˆ†). We use โˆ†2 for the metric on X n defined by n 1X โˆ†(ฯ†(j), ฯˆ(j))2 . โˆ†2 (ฯ†, ฯˆ)2 = n j=1 If X is a Polish space we use Prob(X) for the space of all Borel probability measures on X. If ฮ“ is a countable, discrete group with ฮ“ y X by homeomorphisms we use Probฮ“ (X) for the space of all ฮ“-invariant elements of Prob(X). We are now ready to state our definition of sofic entropy from [16]. It is defined by counting the exponential growth of maps from {1, . . . , di } โ†’ X which approximately preserve the measure-theoretic structure of X and are approximately equivariant. We call these maps microstates (this is a heuristic term and will not be defined rigorously). Definition 2.2. Let ฮ“ be a countable, discrete, sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). Let X be Polish space with ฮ“ y X by homeomorphisms. Fix a bounded, continuous pseudometric on X. For a finite F โІ ฮ“ and ฮด > 0 we let Map(โˆ†, F, ฮด, ฯƒi ) be all ฯ† โˆˆ X di so that max โˆ†2 (gฯ†, ฯ† โ—ฆ ฯƒi (g)) < ฮด. gโˆˆF Notice that Map(โˆ†, F, ฮด, ฯƒi ) only accounts for the group action and not the measure-theoretic structure of X. Recall that Cb (X) denotes the space of bounded continuous functions on X. For ยต โˆˆ Prob(X), a finite L โІ Cb (X), and a ฮด > 0 we let  Z Z \ UL,ฮด (ยต) = ฮฝ โˆˆ Prob(X) : f dยต โˆ’ f dฮฝ < ฮด . f โˆˆL The sets UL,ฮด (ยต) form a basis of open sets for a topology called the weak topology. We use this topology to account for the measure-theoretic structure in our microstates. Definition 2.3. Let ฮ“ be a countable, discrete, sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). Let X be Polish space with ฮ“ y X by homeomorphisms and fix ยต โˆˆ Probฮ“ (X). For finite F โІ ฮ“, L โІ Cb (X) and ฮด > 0 we set Mapยต (โˆ†, F, ฮด, L, ฯƒi ) to be the set of all ฯ† โˆˆ Map(โˆ†, F, ฮด, L, ฯƒi ) so that ฯ†โˆ— (udi ) โˆˆ UL,ฮด (ยต). Definition 2.4. Let ฮ“ be a countable, discrete, sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). Let X be Polish space with ฮ“ y X by homeomorphisms and let ยต โˆˆ Probฮ“ (X). Fix a bounded, dynamically generating pseudometric on X. For finite F โІ ฮ“, L โІ Cb (X) and ฮด, ฮต > 0 we set 1 hฮฃ,ยต (โˆ†, F, ฮด, L, ฮต) = lim sup log Nฮต (Mapยต (โˆ†, F, ฮด, L, ฯƒi ), โˆ†2 ), d iโ†’โˆž i hฮฃ,ยต (โˆ†, ฮต) = inf F โІฮ“ finite, LโІCb (X) finite,ฮด>0 hฮฃ,ยต (โˆ†, F, ฮด, L, ฮต), hฮฃ,ยต (X, ฮ“) = sup hฮฃ,ยต (โˆ†, ฮต). ฮต>0 We call hฮฃ,ยต (X, ฮ“) the entropy of ฮ“ y (X, ยต) with respect to ฮฃ. It is shown in [16] that this agrees with entropy as defined by [1],[19]. 3. Generating Sets and Tightness Since Cb (X) is not separable, we would like to reduce checking the approximate measure-preserving property of our microstates from all functions in Cb (X) to a smaller class of functions. For example Cb (X) is separable in the topology of uniform convergence on compact sets, so if we require that we have a family of functions dense in this topology then this will give us a sufficiently small family of functions to deal with. However, for this to work we need to modify our microstates so that they have some uniform tightness. We proceed with the definitions. Definition 3.1. Let X be a Polish space. A family L โІ Cb (X) is said to be generating if there is a A > 0 so that for every g โˆˆ Cb (X), for every compact K โІ X and for every ฮต > 0 there is a f โˆˆ Span(L) so that kf K โˆ’ g K k < ฮต and kf k โ‰ค Akgk. SOFIC ENTROPY OF GAUSSIAN ACTIONS 5 We now proceed with our modified version of sofic entropy in the case of a generating set of functions. Definition 3.2. Let ฮ“ be a countable discrete group and ฯƒ : ฮ“ โ†’ Sd a function for some d โˆˆ N. Let X be a Polish space with ฮ“ y X by homeomorphisms preserving a Borel probability measure ยต. Let โˆ† be a dynamically generating pseudometric on X. For an open subset U of X, for ฮท, ฮด > 0 and finite L โІ Cb (X), F โІ ฮ“ we let MapU,ฮท ยต (โˆ†, F, ฮด, L, ฯƒ) be the set of ฯ† โˆˆ Mapยต (โˆ†, F, ฮด, L, ฯƒ) so that ฯ†โˆ— (ud )(U ) > 1 โˆ’ ฮท. Suppose now that ฮ“ is sofic. For a dynamically generating pseudometric โˆ†, L โІ Cb (X) and a sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ) set: 1 hU,ฮท log Nฮต (MapU,ฮท ยต (โˆ†, F, ฮด, L, ฯƒi )), ฮฃ,ยต (โˆ†, ฮต, F, ฮด, L) = lim sup iโ†’โˆž di hK,ฮท ฮฃ,ยต (โˆ†, ฮต, F, ฮด, L) = hฮทฮฃ,ยต (โˆ†, ฮต, F, ฮด, L) = hฮฃ,ยต (โˆ†, ฮต, L) = inf open U โЇ K hU,ฮท ฮฃ,ยต (โˆ†, ฮต, F, ฮด, L), sup hK,ฮท ฮฃ (โˆ†, ฮต, F, ฮด, L) KโІX compact inf hฮทฮฃ,ยต (โˆ†, ฮต, F, ฮด, L) ฮท,ฮด>0, F โІฮ“ finite, LโІL finite hฮฃ,ยต (โˆ†, L) = sup hฮฃ,ยต (โˆ†, ฮต, L). ฮต>0 In the above definition, the necessary trick is to add more quantifiers to the definition of sofic entropy. The reader may be concerned already by the number of quantifiers involved in the original definition of sofic entropy. When we compute sofic entropy of Gaussian actions in Section 4.1 it will be clear that this is the correct tradeoff. The difficulty involved in the computation will not be in dealing with quantifiers but instead that we can only show the approximate measure-preserving property on a class of functions which is not norm dense. However, one can easily see that this class of functions is generating and so we will use the above definition. Theorem 3.3. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ. Let X be a Polish space with ฮ“ y X by homeomorphisms preserving a Borel probability measure ยต. For any dynamically generating pseudometric โˆ† on X, L โІ Cb (X) generating, and ฮต > 0 In particular, hฮฃ,ยต (โˆ†, ฮต) = hฮฃ,ยต (โˆ†, ฮต, L). hฮฃ,ยต (X, ฮ“) = hฮฃ,ยต (โˆ†, L). Proof. The โ€œin particularโ€ part follows from Theorem 3.12 of [16]. We first show that hฮฃ,ยต (โˆ†, ฮต) โ‰ค hฮฃ,ยต (โˆ†, ฮต, L). Let ฮท > 0. Since X is Polish, we may find a compact K โІ X with ยต(X \ K) < ฮท. Fix an open subset U of X containing K. By Urysohnโ€™s Lemma we may find a f โˆˆ Cb (X) with Note that if ฮฝ โˆˆ Prob(X) and ฮด > 0 with ฯ‡K โ‰ค f โ‰ค ฯ‡U . Z X we have f dยต โˆ’ Z f dฮฝ < ฮด, X ฮฝ(U ) > 1 โˆ’ ฮท โˆ’ ฮด. We now see that for all finite L โІ L, F โІ ฮ“, 0 < ฮด < ฮท we have MapU,ฮท+ฮด (โˆ†, F, ฮด, L, ฯƒi ) โЇ Map(โˆ†, F, ฮด, L โˆช {f }, ฯƒi ). Thus for all ฮด < ฮท, and all finite F โ€ฒ โЇ F, Lโ€ฒ โЇ L โˆช {f } < and ฮด โ€ฒ < ฮด, hฮฃ,ยต (โˆ†, ฮต, F โ€ฒ , ฮด โ€ฒ , Lโ€ฒ ) โ‰ค hU,2ฮท ฮฃ,ยต (โˆ†, ฮต, F, ฮด, L). 6 BEN HAYES Taking the infimum over F โ€ฒ , ฮด โ€ฒ , Lโ€ฒ we find hฮฃ,ยต (โˆ†, ฮต) โ‰ค hU,2ฮท ฮฃ,ยต (โˆ†, ฮต, F, ฮด, L). Taking the infimum over all U โЇ K we find that K,2ฮท hฮฃ,ยต (โˆ†, ฮต) โ‰ค hฮฃ,ยต (โˆ†, ฮต, F, ฮด, L). Now take the supremum over all K and then the infimum over all ฮท, ฮด, F, L โІ L to find that hฮฃ,ยต (โˆ†, ฮต) โ‰ค hฮฃ,ยต (โˆ†, ฮต, L). We now show that hฮฃ,ยต (โˆ†, ฮต, L) โ‰ค hฮฃ,ยต (โˆ†, ฮต). Let A > 0 be as in the definition of generating. Let F โІ ฮ“ and L โІ Cb (X) be given finite sets and ฮด > 0. Let ฮบ > 0 be sufficiently small depending upon F, L, ฮด in a manner to be determined later. Since X is Polish, we may find a compact K0 โІ X so that ยต(K0 ) โ‰ฅ 1 โˆ’ ฮบ. Let K โІ X compact be given with K โЇ K0 . Let L = {f1 , . . . , fl }. For 1 โ‰ค j โ‰ค l we can find a gj โˆˆ Span(L) so that kgj K โˆ’ fj K k < ฮด and kgj k โ‰ค Akfj k. We may find an open neighborhood U0 of K so that kgj U0 โˆ’ fj k U0 Cb (U0 ) < ฮด, for j = 1, . . . , l. Let ฮด โ€ฒ > 0 and F โ€ฒ โІ ฮ“ and Lโ€ฒ โІ Cb (X) be finite sets which will depend upon F, ฮด, L in a manner to be โ€ฒ โ€ฒ โ€ฒ determined shortly. Let U be an open neighborhood of K contained in U0 . For ฯ† โˆˆ MapU,ฮท ยต (โˆ†, F , ฮด , L , ฯƒi ) we have Z Z Z Z Z Z fj dยต โˆ’ fj dฯ†โˆ— (udi ) โ‰ค gj dฯ†โˆ— (udi ) + fj dฯ†โˆ— (udi ) โˆ’ gj dยต โˆ’ gj dฯ†โˆ— (udi ) X X X X X X Z Z + fj dยต gj dยต โˆ’ X X Z Z โ‰ค ฮท(1 + A)kfj k + ฮบ(1 + A)kfj k + gj dฯ†โˆ— (udi ) fj dฯ†โˆ— (udi ) โˆ’ U U Z Z Z Z + gj dฯ†โˆ— (udi ) + gj dยต โˆ’ fj dยต gj dยต โˆ’ X X U U Z Z โ‰ค ฮท(1 + A)kfj k + ฮบ(1 + A)kfj k + 2ฮด + gj dยต โˆ’ gj dฯ†โˆ— (udi ) X If we choose ฮด โ€ฒ > 0 sufficiently small, and F โ€ฒ , Lโ€ฒ sufficiently large we may force Z Z gj dฯ†โˆ— (udi ) < ฮด. gj dยต โˆ’ X X If we choose max 2ฮท(1 + A)kfj k < ฮด j max ฮบ(1 + A)kfj k < ฮด j then we have Thus MapU,ฮท (โˆ†, F โ€ฒ , ฮด โ€ฒ , Lโ€ฒ , ฯƒi ) โІ Map(โˆ†, F, 7ฮด, L, ฯƒi ). U,ฮท โ€ฒ โ€ฒ โ€ฒ โ€ฒ โ€ฒ โ€ฒ hK,ฮท ฮฃ,ยต (โˆ†, ฮต, F , ฮด , L ) โ‰ค hฮฃ,ยต (โˆ†, ฮต, F , ฮด , L ) โ‰ค hฮฃ,ยต (โˆ†, ฮต, F, 7ฮด, L). Since K โЇ K0 was arbitrary, we may take the supremum over all K to see that hฮฃ,ยต (โˆ†, ฮต, L) โ‰ค hฮทฮฃ,ยต (โˆ†, ฮต, F โ€ฒ , ฮด โ€ฒ , Lโ€ฒ ) โ‰ค hฮฃ,ยต (โˆ†, ฮต, F, 7ฮด, L). X SOFIC ENTROPY OF GAUSSIAN ACTIONS 7 Now taking the infimum over all F โ€ฒ , ฮด โ€ฒ , Lโ€ฒ proves that hฮฃ,ยต (โˆ†, ฮต, L) โ‰ค hฮฃ,ยต (โˆ†, ฮต).  4. Entropy of Gaussian Actions Gaussian actions are a natural class of actions induced by orthogonal representations of a group. When the representation is the left regular representation, the Gaussian action is simply the Bernoulli action on (R, ฮฝ)ฮ“ where ฮฝ is the Gaussian measure. In [16], we prove some results which give structural results of the Koopman representation ฮ“ y L2 (X, ยต) of a probability measure-preserving action ฮ“ y (X, ยต) of a sofic group ฮ“, under the assumption that this action has positive entropy. For example, we could show that if ฮ“ y (X, ยต) has positive entropy then ฮ“ y L2 (X, ยต) must contain a โ€œpieceโ€ of the left regular representation (for more precise statements see [16] Theorem 1.1 and Corollary 1.2). We will exploit the connections to representation theory to apply our spectral consequences of positive entropy in [16] to Gaussian actions. We will also exploit the similarity to Bernoulli shifts to compute the entropy of Gaussian actions. Let ฮ“ be a countable discrete group. Recall that an orthogonal representation of ฮ“ on a real Hilbert space H is a homomorphism ฯ : ฮ“ โ†’ O(H) where O(H) is the group of orthogonal transformations of H (i.e. the set of O โˆˆ B(H) so that hOฮพ, Oฮทi = hฮพ, ฮทi for ฮพ, ฮท โˆˆ H.) We let HC = H โŠ—R C = H + iH be the complexification of H equipped with the unique sesquilinear inner product extending the one on H. We let ฯC : ฮ“ โ†’ U(H + iH) be the complexification of ฯ, i.e. ฯC (g) for g โˆˆ ฮ“ is the unique unitary transformation so that ฯC (g)(ฮพ) = ฯ(g)ฮพ for ฮพ โˆˆ H. 4.1. Definition of Gaussian Actions. The most natural way to define Gaussian actions is by von Neumann algebras. Definition 4.1. Let H be a complex Hilbert space. A von Neumann algebra on H is a โˆ—-subalgebra of B(H) containing the identity and closed in the weak operator topology. We say that a vector ฮพ โˆˆ H is cyclic for M if M ฮพ = H. by Suppose that (X, ยต) is a standard probability space. For f โˆˆ Lโˆž (X, ยต), let Mf โˆˆ B(L2 (X, ยต)) be given (Mf ฮพ)(x) = f (x)ฮพ(x). The map f 7โ†’ Mf allows us to view Lโˆž (X, ยต) as a von Neumann algebra. It turns out (see [8] Theorem 14.5) that if M โІ B(H) is a commutative von Neumann algebra with cyclic vector ฮพ with kฮพk2 = 1 and H is separable, then there is a standard probability space (X, ยต) and a unitary U : H โ†’ L2 (X, ยต) so that U (ฮพ) = 1 U M U โˆ— = {Mf : f โˆˆ Lโˆž (X, ยต)}. Additionally, if ฯ† : M โ†’ C is a linear functional so that ฯ† {T โˆˆM:kT kโ‰ค1} is weak operator topology continuous, then there is a complex measure ฮฝ โ‰ช ยต so that if U T U โˆ— = Mf then Z ฯ†(T ) = f dฮฝ. X โˆ— We leave it to reader the verify that if U T U = Mf then Z f dยต. hT ฮพ, ฮพi = X 8 BEN HAYES Definition 4.2. Let H be a real Hilbert space. The Gaussian algebra associated to H, denoted A(H) is a commutative von Neumann algebra with cyclic vector โ„ฆ with kโ„ฆk = 1, which is generated by unitaries {u(ฮพ) : ฮพ โˆˆ H} satisfying u(ฮพ1 + ฮพ2 ) = u(ฮพ1 )u(ฮพ2 ) for ฮพ โˆˆ H hu(ฮพ)โ„ฆ, โ„ฆi = exp(โˆ’ฯ€kฮพk2 ). For a โˆˆ A(H), we let ฯ†(a) = haโ„ฆ, โ„ฆi. Suppose that ฮ“ is a countable discrete group and ฯ : ฮ“ โ†’ O(H) is a representation. Then there is a ฯ†preserving action ฮฑ on A(H) determined uniquely by ฮฑ(g)(u(ฮพ)) = u(ฯ(g)ฮพ), for ฮพ โˆˆ H. This action is called the Gaussian action. By [27] the Gaussian algebra exists and is unique up to ฯ†-preserving isomorphism. See also [27] for the existence and uniqueness of the Gaussian action. Let us sketch an alternate construction of the Gaussian algebra. First consider the case that H is finiteโˆ’ฯ€kxk2โ„“2 (n) dimensional. Say H = Rn . In this case we can simply take A(H) = Lโˆž (Rn , ฮฝ) where dฮฝ = e dx, and Z ฯ†(a) = a(x) dฮฝ(x), Rn u(ฮพ)(x) = exp(2ฯ€ihฮพ, xi). e In general, consider the universal โˆ—-algebra A(H) generated by unitaries u e(ฮพ), ฮพ โˆˆ H satisfying the relation u e(ฮพ1 + ฮพ2 ) = u e(ฮพ1 )e u(ฮพ2 ) for ฮพ1 , ฮพ2 โˆˆ H. Here one can make sense of a unitary in a โˆ—-algebra by saying that it is an element u so that uโˆ— u = uuโˆ— = 1. One then has to check that there is a well-defined linear function e ฯ†e : A(H) โ†’ C defined by e u(ฮพ)) = exp(โˆ’ฯ€kฮพk2 ). ฯ†(e Checking that ฯ†e is well-defined reduces to showing that if we take ฮพ1 , . . . , ฮพn ,ฮถ1 , . . . , ฮถm โˆˆ H and ฮป1 , . . . , ฮปn , c1 , . . . , cm โˆˆ C with m n X X cj u e(ฮถj ), ฮปj u e(ฮพj ) = j=1 then n X j=1 ฮปj exp(โˆ’ฯ€kฮพj k2 ) = i=1 m X j=1 cj exp(โˆ’ฯ€kฮถj k2 ). Replacing H with the span of {ฮพ1 , ยท ยท ยท , ฮพn , ฮถ1 , ยท ยท ยท , ฮถm } reduces the verification that ฯ†e is well-defined to the case that H is finite-dimensional, where we have already shown that ฯ†e is well-defined (by explicitly exhibiting it as integration with respect to the Gaussian measure as explained above). By similar reasoning, one checks e โˆ— a) โ‰ฅ 0 for a โˆˆ A(H). e that ฯ†(a One now runs the GNS construction. That is, we let K be the completion of e A(H) under the inner product e โˆ— a). ha, bi = ฯ†(b e We then have an induced homomorphism ฯ : A(H) โ†’ B(K) given by SOT e (ฯ(a))(b) = ab for b โˆˆ A(H). e We then let A(H) = ฯ(A(H)) , and โ„ฆ = u e(0), u(ฮพ) = ฯ(e u(ฮพ)). It is then straightforward to verify that A(H), โ„ฆ have the desired properties. By our remarks before this definition if ฯ, ฮ“ are as in the definition then there is a standard probability space (Xฯ , ยตฯ ) and a measure-preserving action ฮ“ y (Xฯ , ยตฯ ) so that โˆผ ฮ“ y (A(H), ฯ†). ฮ“ y Lโˆž (Xฯ , ยตฯ ) = Furthermore, this action is uniquely determined up to isomorphism. Note that for two orthogonal representations ฯj : ฮ“ โ†’ O(Hj ), j = 1, 2 SOFIC ENTROPY OF GAUSSIAN ACTIONS 9 we have ฮ“ y (Xฯ1 โŠ•ฯ2 , ยตฯ1 โŠ•ฯ2 ) โˆผ = (Xฯ1 ร— Xฯ2 , ยตฯ1 โŠ— ยตฯ2 ). The definition via von Neumann algebras may be abstract, so let us mention a simple version of the definition in the case of a cyclic representation. Recall that if t โˆˆ cc (ฮ“, R) and x โˆˆ Rฮ“ we use X tยทx = t(g)x(g). gโˆˆฮ“ Proposition 4.3. Let ฮ“ be a countable discrete group and ฯ : ฮ“ โ†’ O(H) an orthogonal representation. Suppose that there is a vector ฮพ โˆˆ H so that H = Span{ฯ(g)ฮพ : g โˆˆ ฮ“}. Then the Gaussian action is isomorphic to the shift action on Rฮ“ with measure determined by ๏ฃถ ๏ฃซ 2 Z X ๏ฃท ๏ฃฌ exp(2ฯ€it ยท x) dยตฮพ (x) = exp ๏ฃญโˆ’ฯ€ t(g)ฯ(g)ฮพ ๏ฃธ for all t โˆˆ cc (ฮ“, R). Rฮ“ gโˆˆฮ“ Proof. Choose a realization ฮ“ y (A(H), ฯ†) โˆผ = ฮ“ y Lโˆž (Xฯ , ยตฯ ). By [30] Proposition 5.3, a sequence an โˆˆ A(H) converges in the strong operator topology to a โˆˆ A(H) if and only if ฯ†((a โˆ’ an )โˆ— (a โˆ’ an )) โ†’ 0. Thus, t โ†’ 7 u(tฮพ) is a strongly continuous one-parameter group in A(H). Fix ฮถ โˆˆ H. By Stoneโ€™s Theorem there is a closed, densely-defined self-adjoint operator ฯ‰(ฮถ) on L2 (Xฯ , ยตฯ ) so that for all s โˆˆ R exp(2ฯ€isฯ‰(ฮถ)) = u(sฮถ), in the sense of functional calculus. Recall that Lโˆž (Xฯ , ยตฯ ) can be viewed as a von Neumann algebra (by multiplication operators). It is not hard to see that the elements u โˆˆ Lโˆž (Xฯ , ยตฯ ) whose multiplication operators are unitaries are almost everywhere equal to measurable functions u : X โ†’ {z โˆˆ C : |z| = 1}. Thus we can identify u(sฮถ) as a measurable function Xฯ โ†’ {z โˆˆ C : |z| = 1}. For similar reasons, we can identify ฯ‰(ฮถ) with a measurable function Xฯ โ†’ R. Thus for every s โˆˆ R, it is true that for almost every x โˆˆ Xฯ we have exp(2ฯ€isฯ‰(ฮถ)(x)) = u(sฮถ)(x). Define ฮฆ : X ฯ โ†’ Rฮ“ by ฮฆ(x)(g) = ฯ‰(ฮพ)(g โˆ’1 x). Then it is not hard to see that for every s โˆˆ R and for all g โˆˆ ฮ“ we have exp(2ฯ€isฮฆ(x)(g)) = u(sฯ(g)ฮพ)(x) for almost every x โˆˆ Xฯ . Define ยตฮพ = ฮฆโˆ— ยตฯ . Since the unitaries of the form u(sฯ(g)ฮพ), s โˆˆ R, g โˆˆ ฮ“ generate all of A(H) we see that ฮฆ gives an ฮ“-equivariant isomorphism (Rฮ“ , ยตฮพ ) โˆผ = (Xฯ , ยตฯ ). 10 BEN HAYES Additionally for all t โˆˆ cc (ฮ“, R) Z Rฮ“ exp(2ฯ€it ยท x) dยตฮพ (x) = Z X ๏ฃซ exp ๏ฃญ2ฯ€i ๏ฃซ ๏ฃซ = ฯ† ๏ฃญฯ‰ ๏ฃญ ๏ฃซ X gโˆˆฮ“ ๏ฃฌ = exp ๏ฃญโˆ’ฯ€ X gโˆˆฮ“ ๏ฃถ t(g)ฮฆ(x)(g)๏ฃธ dยตฯ (g) ๏ฃถ๏ฃถ t(g)ฯ(g)ฮพ ๏ฃธ๏ฃธ X 2 t(g)ฯ(g) gโˆˆฮ“ ๏ฃถ ๏ฃท ๏ฃธ.  4.2. Preliminaries on the Group von Neumann Algebra and Embedding Sequences. For our purposes we will need to โ€œlinearizeโ€ a sofic approximation to approximations of algebras associated to ฮ“. Let C(ฮ“) be the ring of finite formal linear combinations of elements of ฮ“ with addition defined naturally and multiplication defined by ๏ฃซ ๏ฃถ ! ! X X X X ๏ฃญ ag g ๏ฃธ bh h = ah bhโˆ’1 g g. gโˆˆฮ“ hโˆˆฮ“ gโˆˆฮ“ hโˆˆฮ“ We will also define a conjugate-linear involution on C(ฮ“) by ๏ฃซ ๏ฃถโˆ— X X ๏ฃญ agโˆ’1 g. ag g ๏ฃธ = gโˆˆฮ“ gโˆˆฮ“ P Given a sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ) and ฮฑ = gโˆˆฮ“ ฮฑg g โˆˆ C(ฮ“) we define ฯƒi (ฮฑ) โˆˆ Mdi (C) by X ฯƒi (ฮฑ) = ฮฑg ฯƒi (g). gโˆˆฮ“ In order to talk about the asymptotic properties of this extended sofic approximation, we will need a more analytic object associated to ฮ“. Let ฮป : ฮ“ โ†’ U(โ„“2 (ฮ“)) be the left regular representation defined by (ฮป(g)ฮพ)(h) = ฮพ(g โˆ’1 h). We will continue to use ฮป for the linear extension to C(ฮ“) โ†’ B(โ„“2 (ฮ“)). The group von Neumann algebra of ฮ“ is defined by ฮป(C(ฮ“)) W OT where WOT denotes the weak operator topology. We will use L(ฮ“) to denote the group von Neumann algebra. Define ฯ„ : L(ฮ“) โ†’ C by ฯ„ (x) = hxฮดe , ฮดe i. We leave it as an exercise to the reader to verify that ฯ„ has the following properties. 1: ฯ„ (1) = 1, 2: ฯ„ (xโˆ— x) โ‰ฅ 0, with equality if and only if x = 0, 3: ฯ„ (xy) = ฯ„ (yx), for all x, y โˆˆ M, 4: ฯ„ is weak operator topology continuous. We call the third property the tracial property. We will typically view C(ฮ“) as a subset of L(ฮ“). In particular, we will use ฯ„ as well for the functional on C(ฮ“) which is just the restriction of ฯ„ on L(ฮ“). In order to state our linearization of a sofic approximation properly, we give a general definition. By definition, โˆ—-algebra is a complex algebra equipped with an involution โˆ— which is conjugate linear and antimultiplicative. Definition 4.4. A tracial โˆ—-algebra is a pair (A, ฯ„ ) where A is a โˆ—-algebra equipped with a linear functional ฯ„ : A โ†’ C so that SOFIC ENTROPY OF GAUSSIAN ACTIONS 11 1: ฯ„ (1) = 1, 2: ฯ„ (xโˆ— x) โ‰ฅ 0, with equality if and only if x = 0, 3: ฯ„ (xy) = ฯ„ (yx), for all x, y โˆˆ M, 4: For all a โˆˆ A, there is a Ca > 0 so that for all x โˆˆ A, |ฯ„ (xโˆ— aโˆ— ax)| โ‰ค Ca ฯ„ (xโˆ— x). For a, b โˆˆ A we let ha, bi = ฯ„ (bโˆ— a) and we let kak2 = ฯ„ (aโˆ— a)1/2 . Define L2 (A, ฯ„ ) to be the Hilbert space completion of A in this inner product. By condition 4 of the definition, we have a representation ฮป : A โ†’ B(L2 (A, ฯ„ )) defined densely by ฮป(a)x = ax for x โˆˆ A. We let kakโˆž = kฮป(a)k. We make Mn (C) into a tracial โˆ—-algebra using tr = n1 Tr where Tr is the usual trace. In particular, we use kAk2 = tr(Aโˆ— A)1/2 and kAkโˆž will denote the operator norm. We let C[X1 , . . . , Xn ] be the free โˆ—-algebra on n-generators X1 , . . . , Xn . We will call elements of C[X1 , . . . , Xn ] โˆ—-polynomials in n indeterminates. For a โˆ—-algebra A, for elements a1 , . . . , an โˆˆ A, there is a unique โˆ—homomorphism C[X1 , . . . , Xn ] โ†’ A sending Xj to aj . If P โˆˆ C[X1 , . . . , Xn ] we use P (a1 , . . . , an ) for the image of P under this โˆ—-homomorphism. Definition 4.5. Let (A, ฯ„ ) be a tracial โˆ—-algebra. An embedding sequence is a sequence ฮฃ = (ฯƒi : A โ†’ Mdi (C)) such that sup kฯƒi (a)kโˆž < โˆž, for all a โˆˆ A i kP (ฯƒi (a1 ), . . . , ฯƒi (an )) โˆ’ ฯƒi (P (a1 , . . . , an ))k2 โ†’ 0, for all a1 , . . . , an โˆˆ A and all P โˆˆ C[X1 , . . . , Xn ] tr(ฯƒi (a)) โ†’ ฯ„ (a) for all a โˆˆ A. We will frequently use the following fact: if x1 , . . . , xn โˆˆ A and P โˆˆ C[X1 , . . . , Xn ] then (2) kP (ฯƒi (x1 ), . . . , ฯƒi (xn ))k2 โ†’ kP (x1 , . . . , xn )k2 . To see this, we notice that since kP (ฯƒi (x1 ), . . . , ฯƒi (xn )) โˆ’ ฯƒi (P (x1 , . . . , xn ))k2 โ†’ 0, it suffices to handle the case n = 1 and P (X) = X. Then, kฯƒi (x)k22 = tr(ฯƒi (x)โˆ— ฯƒi (x)) and since kฯƒi (x)โˆ— ฯƒi (x) โˆ’ ฯƒi (xโˆ— x)k2 โ†’ 0 we have | tr(ฯƒi (x)โˆ— ฯƒi (x)) โˆ’ tr(ฯƒi (xโˆ— x))| โ†’ 0. As tr(ฯƒi (xโˆ— x)) โ†’ kxk22 , we have proved (2). The proof of the next two propositions will be left to the reader. Proposition 4.6. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). Extend ฮฃ to maps ฯƒi : C(ฮ“) โ†’ Mdi (C) linearly. Then ฮฃ is an embedding sequence of (C(ฮ“), ฯ„ ). Proposition 4.7. Let (A, ฯ„ ) be a tracial โˆ—-algebra and ฮฃ = (ฯƒi : A โ†’ Mdi (C)) be an embedding sequence. If ฮฃโ€ฒ = (ฯƒiโ€ฒ : A โ†’ Mdi (C)) is another sequence of functions so that sup kฯƒiโ€ฒ (a)kโˆž < โˆž, for all a โˆˆ A, i then ฮฃโ€ฒ is an embedding sequence. kฯƒi (a) โˆ’ ฯƒiโ€ฒ (a)k2 โ†’ 0, for all a โˆˆ A, We will in fact need to extend our sofic approximation to the group von Neumann algebra. For this, we use the following. Lemma 4.8 (Lemma 5.5 in [17]). Let ฮ“ be a countable discrete group. Then any embedding sequence for C(ฮ“) extends to one for L(ฮ“). We will use the preceding lemma when ฮ“ is sofic, in combination with Proposition 4.6. 12 BEN HAYES 4.3. Preliminaries on Real Subspaces of the Left Regular Representation. We define the Fourier algebra of ฮ“ as all functions ฯ† : ฮ“ โ†’ C so that there is a linear functional ฮฆ : L(ฮ“) โ†’ C with ฮฆ {xโˆˆL(ฮ“):kxkโˆž โ‰ค1} being weak operator topology continuous so that ฮฆ(ฮป(g)) = ฯ†(g). We will call ฮฆ the continuous extension of ฯ† (note that by continuity and Kaplanskyโ€™s density theorem, ฮฆ as above must be unique). We let A(ฮ“)+ consist of all such ฯ† where the continuous extension of ฯ† is a positive linear functional. We let kฯ†kA(ฮ“) = kฮฆk. By [30] Theorem II.2.6 k ยท kA(ฮ“) is a norm on A(ฮ“) which makes A(ฮ“) a Banach space. By [30] Theorem V.3.15 we have that A(ฮ“) consists of all functions of the form g 7โ†’ hฮป(g)ฮพ, ฮทi where ฮพ, ฮท โˆˆ โ„“2 (ฮ“). Moreover kฯ†k = inf kฮพkkฮทk where infimum is over all ฮพ, ฮท so that ฯ†(g) = hฮป(g)ฮพ, ฮทi. For intuition, we leave it to the reader to verify that when ฮ“ is abelian, then A(ฮ“) consists of all fb b and that A(ฮ“)+ consists of all fb where f โˆˆ L1 (ฮ“) b and f โ‰ฅ 0. We state a few basic (and where f โˆˆ L1 (ฮ“), well-known) properties of A(ฮ“) in the following proposition. Lastly, if we are given x โˆˆ L(ฮ“) we set x b = xฮดe โˆˆ โ„“2 (ฮ“). Proposition 4.9. Let ฮ“ be a countable discrete group. (1) If ฯ : ฮ“ โ†’ U(H) is a unitary representation with ฯ โ‰ช ฮปฮ“ , and ฮพ โˆˆ H, then ฯ†(g) = hฯ(g)ฮพ, ฮพi is in A(ฮ“)+ . In particular there is a ฮถ โˆˆ โ„“2 (ฮ“) with hฯ(g)ฮพ, ฮพi = hฮป(g)ฮถ, ฮถi. (2) If ฯ† โˆˆ A(ฮ“), then ฯ† โˆˆ A(ฮ“) and kฯ†k = kฯ†k. If ฯ† โˆˆ A(ฮ“)+ , then so is ฯ†. (3) For x โˆˆ L(ฮ“) we define ฯ†x : ฮ“ โ†’ C by ฯ†x (g) = ฯ„ (xฮป(g)), then ฯ†x โˆˆ A(ฮ“), and ฯ†x โˆˆ A(ฮ“)+ if and only if x โˆˆ L(ฮ“)+ . Additionally kฯ†x k = ฯ„ (|x|), and {ฯ†x : x โˆˆ L(ฮ“)+ } is dense in A(ฮ“)+ . (4) If x, y โˆˆ L(ฮ“) and ฯ†(g) = hฮป(g)b x, x bi, ฯˆ(g) = hฮป(g)b y , ybi then kb x โˆ’ ybk22 โ‰ค kฯ† โˆ’ ฯˆkA(ฮ“) . Proof. (1): The assumption ฯ โ‰ช ฮปฮ“ implies that we may extend ฯ to a โˆ—-homomorphism ฯ : L(ฮ“) โ†’ B(H) so that ฯ {xโˆˆL(ฮ“):kxkโˆž โ‰ค1} is weak operator topology continuous. Thus the continuous extension ฮฆ of ฯ† is given by ฮฆ(x) = hฯ(x)ฮพ, ฮพi. The โ€œin particularโ€ part follows from the discussion preceding the proposition. (2): Write ฯ†(x) = hฮป(x)ฮพ, ฮทi, 2 with ฮพ, ฮท โˆˆ โ„“ (ฮ“). Then ฯ†(x) = hฮป(x)ฮพ, ฮทi the conclusion follows easily from this equality. (3): If x โˆˆ L(ฮ“)+ , then the continuous extension ฮฆ of ฯ†x is given by ฮฆ(y) = ฯ„ (xy). For y โ‰ฅ 0, ฮฆ(y) = ฯ„ (xy) = ฯ„ (y 1/2 xy 1/2 ) โ‰ฅ 0 as x โ‰ฅ 0. Conversely, if ฯ†x โˆˆ A(ฮ“)+ let ฮฆ be the continuous extension of ฯ†x to L(ฮ“). Then for all y โˆˆ L(ฮ“) hxyฮดe , yฮดe i = ฯ„ (y โˆ— xy) = ฯ„ (xyy โˆ— ) = ฮฆ(yy โˆ— ) โ‰ฅ 0. Since L(ฮ“)ฮดe = โ„“2 (ฮ“), we see that x โˆˆ L(ฮ“)+ . The norm equality and density statement are contained in [31] Lemma IX.2.12. SOFIC ENTROPY OF GAUSSIAN ACTIONS 13 (4): This is the Powers-Stรธrmer inequality (see [6] Proposition 6.2.4 for a proof which generalizes to our situation).  In order to compute the entropy of Gaussian actions, we will need to discuss real subspaces of โ„“2 (ฮ“), and for this we need a real version of L(ฮ“). We let LR (ฮ“) be all x โˆˆ L(ฮ“) so that x b โˆˆ โ„“2 (ฮ“, R). Recall that the ฮ“ convolution between f โˆˆ cc (ฮ“), g โˆˆ C is defined by X f โˆ— g(x) = f (h)g(hโˆ’1 x). hโˆˆฮ“ ฮ“ We similarly define f โˆ— g if f โˆˆ C and g โˆˆ cc (ฮ“). If f โˆˆ cc (ฮ“), we use X fห‡ = f (g)g โˆˆ C(ฮ“). gโˆˆฮ“ Note that for all f โˆˆ cc (ฮ“), x โˆˆ L(ฮ“) we have xf = x b โˆ— f. Thus kxkโˆž = sup f โˆˆcc (ฮ“),kf k2 =1 kb x โˆ— f k2 . cโˆ— . Thus for all f โˆˆ cc (ฮ“), b=x Define J : โ„“2 (ฮ“) โ†’ โ„“2 (ฮ“) by (Jf )(x) = f (xโˆ’1 ), and observe that J x cโˆ— โˆ— f k2 โ‰ค kxโˆ— kโˆž kf k2 = kxkโˆž kf k2 . kf โˆ— x bk2 = kJ x b โˆ— Jf k2 = kx Replacing x with xโˆ— we see that kxkโˆž = sup f โˆˆcc (ฮ“),kf k2 =1 kf โˆ— x bk2 . Thus there is a unique bounded operator on โ„“2 (ฮ“) extending f 7โ†’ f โˆ— x b of norm equal to that of x. We write the image of ฮพ โˆˆ โ„“2 (ฮ“) under this operator as ฮพx. We use โ„“2 (ฮ“)x = {ฮพx : ฮพ โˆˆ โ„“2 (ฮ“)}. By Theorem 43.11 and Proposition 43.10 of [8], we have ( {b x : x โˆˆ L(ฮ“)} = 2 ฮพ โˆˆ โ„“ (ฮ“) : sup f โˆˆcc (ฮ“),kf kโ‰ค1 ) kฮพ โˆ— f k2 < โˆž . For ฮพ โˆˆ โ„“2 (ฮ“), f โˆˆ cc (ฮ“) we have kฮพ โˆ— f k2 = kฮพ โˆ— f k2 where bar denotes complex conjugation. It follows that there is a weak operator topology continuous, norm-one operator C : L(ฮ“) โ†’ L(ฮ“) so that c =x Cx b. Lemma 4.10. Let ฮ“ be a countable discrete group and ฯ : ฮ“ โ†’ O(H) an orthogonal representation on a real separable Hilbert space H with ฯC โ‰ช ฮปฮ“ . Suppose that ฯ has a cyclic vector. Then there is an orthogonal projection p โˆˆ LR (ฮ“) so that ฮ“yHโˆผ = ฮ“ y โ„“2 (ฮ“, R)p. Proof. Let ฮพ be a cyclic vector for H, and define ฯ† : ฮ“ โ†’ R by ฯ†(g) = hฯ(g)ฮพ, ฮพi, then ฯ†(g) โˆˆ A(ฮ“)+ . By (3) of the preceding Proposition, we may find xn โˆˆ L(ฮ“)+ so that Letting yn = xn +Cxn 2 kฯ† โˆ’ ฯ†xn k โ†’ 0. and using that ฯ† = ฯ† we find that kฯ† โˆ’ ฯ†yn k โ†’ 0. d 1/2 Let ฮถn = yn . Approximating the square root function by polynomials, we see that ฮถn โˆˆ โ„“2 (ฮ“, R). Note that ฯ†yn (g) = ฯ„ (ฮป(g)yn1/2 yn1/2 ) = ฯ„ (yn1/2 ฮป(g)yn1/2 ) = hฮป(g)ฮถn , ฮถn i. 14 BEN HAYES By the Powers-Stรธrmer inequality (i.e. (4) of the preceding Proposition), kฮถn โˆ’ ฮถm k โ‰ค kฯ†yn โˆ’ ฯ†ym k1/2 so that ฮถn is a Cauchy sequence. Hence ฮถn converges to a ฮถ โˆˆ โ„“2 (ฮ“, R). Also, ฯ†(g) = lim ฯ†yn (g) = lim hฮป(g)ฮถn , ฮถn i = lim hฮป(g)ฮถ, ฮถi. nโ†’โˆž Thus 2 nโ†’โˆž nโ†’โˆž ฮ“yHโˆผ = ฮ“ y Span{ฮป(g)ฮถ : g โˆˆ ฮ“}. Let P be the projection from โ„“ (ฮ“, R) onto Span{ฮป(g)ฮถ : g โˆˆ ฮ“} and let PC denote its complexification as an operator on โ„“2 (ฮ“). As PC commutes with ฮป(g), Theorem 43.11 of [8] shows that there is a unique orthogonal projection p โˆˆ L(ฮ“) so that for all ฮพ โˆˆ โ„“2 (ฮ“) we have PC ฮพ = ฮพp. Moreover, so p โˆˆ LR (ฮ“). Thus ๏ฃฑ ๏ฃฒX ๏ฃณ gโˆˆฮ“ pb(g) = hb p, ฮดg i = hP (ฮดe ), ฮดg i โˆˆ R ๏ฃผ ๏ฃฝ f (g)ฮป(g)ฮถ : f โˆˆ cc (ฮ“, R) = P (โ„“2 (ฮ“, R)) = โ„“2 (ฮ“, R)p. ๏ฃพ  We will need to extend a sofic approximation to an embedding sequence of L(ฮ“) as in Lemma 5.5 in [17], however we will also want ฯƒi (LR (ฮ“)) โІ Mdi (R). Proposition 4.11. Let ฮ“ be a countable discrete group and ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ) a sofic approximation. (i): There exists an embedding sequence ฮฃ = (ฯƒi : L(ฮ“) โ†’ Mdi (C)) such that X ฯƒi (ฮฑ) = ฮฑ b(g)ฯƒi (g) gโˆˆฮ“ and ฯƒi (LR (ฮ“)) โІ Mdi (R). (ii) If ฮฃ = (ฯƒi : L(ฮ“) โ†’ Mdi (C)) is as in (i), and p โˆˆ LR (ฮ“) is an orthogonal projection, then there are orthogonal projections pi โˆˆ Mdi (R) so that kฯƒi (p) โˆ’ pi k2 โ†’ 0. Proof. (i): By Lemma 4.8 we may extend to some embedding sequence ฮฃ = (ฯƒi : L(ฮ“) โ†’ Mdi (C)) so that X ฯƒi (ฮฑ) = ฮฑ b(g)ฯƒi (g). gโˆˆฮ“ By Proposition 4.7, it suffices to show that for all x โˆˆ LR (ฮ“) \ R(ฮ“), there are xi โˆˆ Mdi (R) so that sup kxi kโˆž < โˆž i and kxi โˆ’ ฯƒi (x)k2 โ†’ 0. For A โˆˆ Mn (C) define A โˆˆ Mn (C) by Aij = Aij , then kAkโˆž = kAkโˆž It suffices to show that kAk2 = kAk2 . kฯƒi (Cx) โˆ’ ฯƒi (x)k2 โ†’ 0 for all x โˆˆ L(ฮ“). Indeed, assuming we have the above convergence we may then redefine ฯƒi (x) for x โˆˆ LR (ฮ“) by 21 (ฯƒi (x) + ฯƒi (x)). So let x โˆˆ L(ฮ“), let ฮต > 0, and let ฮฑ โˆˆ C(ฮ“) be such that kxฮดe โˆ’ ฮป(ฮฑ)ฮดe k2 < ฮต. Since ฯƒi (Cฮป(ฮฑ)) = ฯƒi (ฮฑ), kฯƒi (Cx) โˆ’ ฯƒi (x)k2 โ‰ค kฯƒi (Cx) โˆ’ ฯƒi (Cฮป(ฮฑ))k2 + kฯƒi (x) โˆ’ ฯƒi (ฮป(ฮฑ))k2 = kฯƒi (Cx) โˆ’ ฯƒi (Cฮป(ฮฑ))k2 + kฯƒi (x) โˆ’ ฯƒi (ฮป(ฮฑ))k2 . SOFIC ENTROPY OF GAUSSIAN ACTIONS 15 Letting i โ†’ โˆž and using that ฯƒi is a sofic approximation we find that lim sup kฯƒi (Cx) โˆ’ ฯƒi (x)k2 โ‰ค kCxฮดe โˆ’ Cฮป(ฮฑ)ฮดe k + kxฮดe โˆ’ ฮป(ฮฑ)ฮดe k2 < 2ฮต. iโ†’โˆž Letting ฮต โ†’ 0 proves (i). (ii): Since ฯƒi is an embedding sequence we have k|ฯƒi (p)|2 โˆ’ ฯƒi (p)k2 โ†’ 0, k|ฯƒi (p)|2 โˆ’ |ฯƒi (p)|4 k2 โ†’ 0. By functional calculus, kฯ‡[1/2,3/2] (|ฯƒi (p)|2 ) โˆ’ |ฯƒi (p)|2 )k22 = kฯ‡{t:|tโˆ’1|>1/2} (|ฯƒi (p)|2 )k22 = tr(ฯ‡{t:|tโˆ’1|>1/2} (|ฯƒi (p)|2 )) โ‰ค 16 tr(||ฯƒi (p)|2 โˆ’ |ฯƒi (p)|4 |2 ) = 16k|ฯƒi (p)|2 โˆ’ |ฯƒi (p)|4 k22 โ†’ 0. Thus setting pi = ฯ‡[1/2,3/2] (|ฯƒi (p)|2 ) completes the proof.  Lastly, we will need an analogous definition of singularity, as in the unitary case. If ฯj : ฮ“ โ†’ O(Hj ), j = 1, 2 are two orthogonal representations, we use Homฮ“ (ฯ1 , ฯ2 ) for the space of real, linear, bounded, ฮ“-equivariant maps from H1 โ†’ H2 . We say that ฯ1 , ฯ2 are mutually singular, written ฯ1 โŠฅ ฯ2 , if whenever ฯโ€ฒj is a nonzero subrepresentation of ฯj for j = 1, 2 we have that ฯโ€ฒ1 , ฯโ€ฒ2 are not isomorphic. Similarly, we say that ฯ1 โ‰ช ฯ2 if ฯ1 is embeddable into ฯโŠ•โˆž . 2 Lemma 4.12. Let ฮ“ be a countable discrete group, and ฯj : ฮ“ โ†’ O(Hj ) two orthogonal representations. The following are equivalent. (i): ฯ1 โŠฅ ฯ2 (ii): Homฮ“ (ฯ1 , ฯ2 ) = {0}, (iii): Homฮ“ (ฯ2 , ฯ1 ) = {0}. Proof. The proof of (ii) equivalent to (iii) and (ii) implies (i) is the same as in Proposition 4.2 of [16]. We can copy the proof of (i) implies (ii) in Proposition 4.2 of [16] provided we prove an analogue of the Polar decomposition. So let T : H1 โ†’ H2 be a bounded operator. Let TC : H1,C โ†’ H2,C be the complexification of T. Using T t for the real Banach space transpose of T, TCโˆ— Thus H2 = T t. TCโˆ— TC (H1 ) โІ H1 , approximating the square root function by polynomials, we see that |TC |(H1 ) โІ H1 . Let be the polar decomposition. As TC = U |TC | U = SOT โˆ’ lim TC (|TC | + ฮต)โˆ’1 , ฮตโ†’0 we find that U (H1 ) โІ H2 . The rest is as in Proposition 4.2 of [16].  We now show that in the case of the left regular representation, that the concepts of singularity and absolute continuity in the real case are related to the complex case. 16 BEN HAYES Lemma 4.13. Let ฮ“ be a countable discrete group. Let ฯ : ฮ“ โ†’ O(H) be an orthogonal representation. Then ฯC โ‰ช ฮปฮ“ (in the unitary sense) if and only if ฯ โ‰ช ฮปฮ“,R . Similarly ฯC โŠฅ ฮปฮ“ if and only if ฯ โŠฅ ฮปฮ“,R . Proof. Suppose ฯC โ‰ช ฮปฮ“ . Applying Zornโ€™s Lemma to write ฯ as a direct sum of cyclic representations and applying Lemma 4.10 we see that ฯ โ‰ช ฮปฮ“,R . The converse is even easier. Suppose ฯC โŠฅ ฮปฮ“ . If K โІ H is a closed, linear, ฮ“-invariant subspace so that ฯ K embeds into ฮปฮ“,R , then by complexification we have that ฯC K embeds into ฮปฮ“ . Conversely, suppose T โˆˆ Homฮ“ (ฯC , ฮปฮ“ ). Then T H C is a ฮ“-equivariant, bounded, real-linear map H โ†’ โ„“2 (ฮ“). As โ„“2 (ฮ“) โˆผ = โ„“2 (ฮ“, R)โŠ•2 as a real representation we see that T HC (as a complex vector space) we see that T = 0. H = 0, by the previous Lemma. Since H spans  The following is proved in the same way as Proposition 4.3 of [16]. Proposition 4.14. Let ฮ“ be a countable discrete group and ฯj : ฮ“ โ†’ O(Hj ), j = 1, 2 be two orthogonal representations. Then ฯ1 = ฯ1,s โŠ• ฯ1,c where ฯ1,s โŠฅ ฯ2 , and ฯ1,c โ‰ช ฯ2 . 4.4. Sofic Entropy of Gaussian Actions. In this section we compute the entropy of Gaussian actions. Let us first start with a very simple corollary of Theorem 4.4 of [16]. Corollary 4.15. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ. Let ฯ : ฮ“ โ†’ O(H) be an orthogonal representation on a separable Hilbert space H. Suppose that ฯ โŠฅ ฮปฮ“,R . Then if ฮ“ y (Xฯ , ยตฯ ) is the corresponding Gaussian action we have hฮฃ,ยตฯ (Xฯ , ฮ“) โ‰ค 0. Proof. As in proposition 4.3, for any ฮพ โˆˆ H we can find a unique ฯ‰(ฮพ) : Xฯ โ†’ R so that for all t โˆˆ R we have exp(2ฯ€itฯ‰(ฮพ)(x)) = u(tฮพ)(x) for almost every x โˆˆ Xฯ . By uniqueness, we have that ฯ‰(ฮพ + ฮท) = ฯ‰(ฮพ) + ฯ‰(ฮท) almost everywhere. By [27] we have that ฯ‰(ฮพ) โˆˆ L2 (Xฯ , ยตฯ ) for all ฮพ โˆˆ H and that in fact ฮ“ y Span{ฯ‰(ฮพ) : ฮพ โˆˆ H} โˆผ = ฮ“ y H โŠฅ ฮปฮ“ . We have that Lโˆž (Xฯ , ยตฯ ) is generated as a von Neumann algebra by u(tฯ(g)ฮพ) = exp(2ฯ€itฯ‰(ฯ(g)ฮพ)) for t โˆˆ R, ฮพ โˆˆ H, g โˆˆ ฮ“. From this, it is not hard to argue that the sigma-algebra generated by {ฯ‰(ฮพ)โˆ’1 (E) : E โІ C is Borel, ฮพ โˆˆ H} is all measurable sets (up to measure zero). Thus by Theorem 4.4 of [16] and Lemma 4.13 we know that hฮฃ,ยตฯ (Xฯ , ฮ“) โ‰ค 0.  We turn to the computation of sofic entropy of Gaussian actions in the case that ฯC โ‰ช ฮปฮ“ . We will need the following general Lemmas. SOFIC ENTROPY OF GAUSSIAN ACTIONS 17 Lemma 4.16. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). Let X be a Polish space with a bounded, compatible (not necessarily complete) metric โˆ†โ€ฒ , and fix x0 โˆˆ X. Let ฮ“ y X ฮ“ be the Bernoulli action, and give X ฮ“ the dynamically generating pseudometric โˆ†(x, y) = โˆ†โ€ฒ (x(e), y(e)). (E) For a finite E โІ ฮ“ and x โˆˆ X di define ฯ†x : {1, . . . , di } โ†’ X ฮ“ by ( x(ฯƒi (g)โˆ’1 (j)), if g โˆˆ E (E) ฯ†x (j)(g) = x0 , if g โˆˆ / E. For any finite F โІ ฮ“, there is a finite E0 โІ ฮ“ so that if E โІ ฮ“ is a finite set containing E0 , then for all ฮด > 0 and for all large i we have ฯ†x(E) โˆˆ Map(โˆ†, F, ฮด, ฯƒi ). Proof. For h โˆˆ F, we have โˆ†2 (hฯ†x(E) , ฯ†x(E) โ—ฆ ฯƒi (h))2 = If E โЇ F โˆช F โˆ’1 โˆช {e}, then we have โˆ†2 (hฯ†x(E) , ฯ†x(E) โ—ฆ ฯƒi (h))2 = 1 di di 1 X โˆ†โ€ฒ (ฯ†x(E) (j)(hโˆ’1 ), ฯ†x(E) (ฯƒi (h)(j))(e))2 . di j=1 X โˆ†โ€ฒ (x(ฯƒi (hโˆ’1 )โˆ’1 (j)), x(ฯƒi (h)(j)))2 . j:ฯƒi (hโˆ’1 )โˆ’1 (j)6=ฯƒi (h)(j) Let M be the diameter of (X, โˆ†โ€ฒ ) then we have โˆ†2 (hฯ†x(E) โ—ฆ ฯƒi (h), hฯ†x(E) )2 โ‰ค M udi ({1 โ‰ค j โ‰ค di : ฯƒi (hโˆ’1 )โˆ’1 (j) 6= ฯƒi (h)(j)}) โ†’ 0 by soficity. Setting E0 = F โˆช F โˆ’1 โˆช {e} completes the proof.  Lemma 4.17. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). By Lemma 4.8 extend ฮฃ to an approximation sequence ฮฃ = (ฯƒi : L(ฮ“) โ†’ Mdi (C)) so that for ฮฑ โˆˆ C(ฮ“) X ฯƒi (ฮฑ) = ฮฑ b(g)ฯƒi (g). gโˆˆฮ“ Fix a finite F โІ ฮ“ and a x โˆˆ L(ฮ“), and let xi โˆˆ Mdi (C) be such that sup kxi kโˆž < โˆž, i kฯƒi (x) โˆ’ xi k2 โ†’ 0. Then the following statements hold. (i): There is a sequence Ci โІ {1, . . . , di } so that udi (Ci ) โ†’ 1 with lim iโ†’โˆž sup tโˆˆRF ,sโˆˆRF , jโˆˆCi kฯƒi (tฬŒ)xi ฯƒi (sฬŒ)ej k2โ„“2 (di ) โˆ’ kฮป(tฬŒ)xฮป(sฬŒ)ฮดe k22 ktk2โ„“2 (F ) ksk2โ„“2 (F ) = 0. (ii): There is a sequence Ai โІ {1, . . . , di }2 so that udi โŠ— udi (Ai ) โ†’ 1, and lim iโ†’โˆž sup tโˆˆRF ,sโˆˆRF , (j,k)โˆˆAi kฯƒi (tฬŒ)โˆ— xi ej โˆ’ ฯƒi (sฬŒ)โˆ— xi ek k2โ„“2 (di ) โˆ’ kฮป(tฬŒ)โˆ— xฮดe k22 โˆ’ kฮป(sฬŒ)xฮดe k22 (ktkโ„“2 (F ) + kskโ„“2 (F ) )2 = 0. 18 BEN HAYES Proof. (i): We first handle the case that x โˆˆ C(ฮ“) and xi = ฯƒi (x). We may choose a Ci so that udi (Ci ) โ†’ 1, ฯƒi (tฬŒxsฬŒ)ej = ฯƒi (tฬŒ)ฯƒi (x)ฯƒi (sฬŒ)ej , for j โˆˆ Ci . By soficity, we may also force that ฯƒi (g)ej 6= ฯƒi (h)ej for g 6= h in supp(tฬŒxsฬŒ), and j โˆˆ Ci , while still having udi (Ci ) โ†’ 1. In this case it is easy to see that kฯƒi (tฬŒ)ฯƒi (x)ฯƒi (sฬŒ)ej k2โ„“2 (di ) = kฯƒi (tฬŒxsฬŒ)ej k2โ„“2 (di ) = kฮป(tฬŒ)xฮป(sฬŒ)ฮดe k2โ„“2 (di ) for all j โˆˆ Ci . Now we handle the general case. Let ฮต > 0, and choose ฮฑ โˆˆ C(ฮ“) so that k(ฮป(ฮฑ) โˆ’ x)ฮดe k2 < ฮต. Since ฯƒi is an approximation sequence by (2) we have for all g, h โˆˆ ฮ“ that lim kฯƒi (g)ฯƒi (ฮฑ)ฯƒi (h) โˆ’ ฯƒi (g)xi ฯƒi (h)k2 = kฮป(g)(ฮป(ฮฑ) โˆ’ x)ฮป(h)ฮดe k2 < ฮต. iโ†’โˆž Thus for all large i we have di X 1 X X kฯƒi (g)ฯƒi (ฮฑ)ฯƒi (h)ej โˆ’ ฯƒi (g)xi ฯƒi (h)ej k2โ„“2 (di ) = kฯƒi (g)ฯƒi (ฮฑ)ฯƒi (h) โˆ’ ฯƒi (g)ฯƒi (ฮฑ)ฯƒi (h)k2L2 (Md (C),tr) i di j=1 g,hโˆˆF g,hโˆˆF < ฮต|F |2 . For such i, we may find a Ci โІ {1, . . . , di } with so that udi (Ci ) โ‰ฅ (1 โˆ’ โˆš ฮต|F |2 ) kฯƒi (g)ฯƒi (ฮฑ)ฯƒi (h)ej โˆ’ ฯƒi (g)xi ฯƒi (h)ej k2โ„“2 (di ) < โˆš ฮต for all g, h โˆˆ F and all large i, and j โˆˆ Ci . Thus for all j โˆˆ Ci , and all s, t โˆˆ RF X kฯƒi (tฬŒ)xi ฯƒi (sฬŒ)ej โˆ’ ฯƒi (tฬŒ)ฯƒi (ฮฑ)ฯƒi (sฬŒ)ej kโ„“2 (di ) โ‰ค |t(g)s(h)|kฯƒi (g)xi ฯƒi (h)ej โˆ’ ฯƒi (g)ฯƒi (ฮฑ)ฯƒi (h)ej kโ„“2 (di ) g,hโˆˆฮ“ โ‰ค ฮต1/4 |F |2 ktkโ„“2 (F ) kskโ„“2 (F ) . Therefore for j โˆˆ Ci and all large i, and all t, s โˆˆ RF |kฯƒi (tฬŒ)xi ฯƒi (sฬŒ)ej kโ„“2 (di ) โˆ’ kฯƒi (tฬŒ)ฯƒi (ฮฑ)ฯƒi (sฬŒ)ej k2 | โ‰ค ฮต1/4 |F |2 ktkโ„“2 (F ) kskโ„“2 (F ) . By the first part, we can find a Ciโ€ฒ โІ {1, . . . , di } with and udi (Ciโ€ฒ ) โ†’ 1, kฯƒi (tฬŒ)ฯƒi (ฮฑ)ฯƒi (sฬŒ)ej k2โ„“2 (di ) = kฮป(tฬŒ)ฮป(ฮฑ)ฮป(sฬŒ)ฮดe k22 , for all j โˆˆ Ciโ€ฒ , and t, s โˆˆ RF . Thus for all large i and all t, s โˆˆ RF , j โˆˆ Ci โˆฉ Ciโ€ฒ , |kฯƒi (tฬŒ)xi ฯƒi (sฬŒ)ej kโ„“2 (di ) โˆ’ kฮป(tฬŒ)xฮป(sฬŒ)ฮดe kโ„“2 (ฮ“) | โ‰ค ฮต1/4 |F |2 ktkโ„“2 (F ) kskโ„“2 (F ) + ฮตkฮป(tฬŒ)kโˆž kฮป(sฬŒ)kโˆž โ‰ค ฮต1/4 |F |2 ktkโ„“2 (F ) kskโ„“2 (F ) + ฮตktkโ„“1 (F ) kskโ„“1 (F ) Since โ‰ค ฮต1/4 |F |ktkโ„“2 (F ) kskโ„“2 (F ) + |F |ฮตktkโ„“2 (F ) kskโ„“2 (F ) โˆš udi (Ci โˆฉ Ciโ€ฒ ) โ‰ฅ (1 โˆ’ 2 ฮต)|F | for all large i, we can use a diagonal argument to complete the proof of (i). (ii): Let Ci be as (i). Note that kฯƒi (tฬŒ)โˆ— xi ej โˆ’ ฯƒi (sฬŒ)โˆ— xi ek k2โ„“2 (di ) = kฯƒi (tฬŒ)โˆ— xi ej k2โ„“2 (di ) + kฯƒi (sฬŒ)โˆ— xi ek k2โ„“2 (di ) โˆ’ 2 Re(hxโˆ—i ฯƒi (sฬŒ)ฯƒi (tฬŒ)โˆ— xi ej , ek iโ„“2 (di ) ). SOFIC ENTROPY OF GAUSSIAN ACTIONS 19 We look for Ai with Ai โІ Ci ร— Ci . By (i) it is enough to find an Ai โІ Ci ร— Ci with lim sup iโ†’โˆž s,tโˆˆRF ,(j,k)โˆˆA i |hxโˆ—i ฯƒi (sฬŒ)ฯƒi (tฬŒ)โˆ— xi ej , ek iโ„“2 (di ) | = 0, (ktkโ„“2 (F ) + kskโ„“2 (F ) )2 udi โŠ— udi (Ai ) โ†’ 1. We prove that 1 2 iโ†’โˆž d2 2 (ktk โ„“ (F ) + kskโ„“2 (F ) ) i (3) lim X 1โ‰คj,kโ‰คdi |hxโˆ—i ฯƒi (sฬŒ)ฯƒi (tฬŒ)โˆ— xi ej , ek iโ„“2 (di ) | = 0, which will clearly prove the existence of such an Ai . Again, as in (i) we first do this for xi = ฯƒi (ฮฑ) for ฮฑ โˆˆ C(ฮ“). Let Di be the set of all j so that ฯƒi (ฮฑ)โˆ— ฯƒi (sฬŒ)ฯƒi (tฬŒ)โˆ— ฯƒi (ฮฑ)ej = ฯƒi (ฮฑโˆ— stโˆ— ฮฑ)ej . We use o(1) for any expression which tends to 0 as i โ†’ โˆž. Then lim udi (Di ) = 1, iโ†’โˆž and 1 X d2i 1โ‰คj,kโ‰คdi |hฯƒi (ฮฑ)โˆ— ฯƒi (sฬŒ)ฯƒi (tฬŒ)โˆ— ฯƒi (ฮฑ)ej , ek iโ„“2 (di ) |2 โ‰ค o(1) + 1 d2i X X (ฮฑโˆ— sฬŒtฬŒโˆ— ฮฑ)(g)(ฮฑโˆ— sฬŒtฬŒโˆ— ฮฑ)(h)hฯƒi (g)ej , ek iโ„“2 (di ) hek , ฯƒi (h)ej iโ„“2 (di ) 1โ‰คj,kโ‰คdi ,jโˆˆDi g,hโˆˆฮ“ = o(1) + 1 XX โˆ— โˆ— |(ฮฑ sฬŒtฬŒ ฮฑ)(g)|2 d2i jโˆˆDi gโˆˆฮ“ 1 = o(1) + udi (Di )kฮฑโˆ— sฬŒtฬŒโˆ— ฮฑk22 di 1 โ‰ค o(1) + udi (Di )kฮฑkโˆž ksk2โ„“1 (F ) ktk2โ„“1 (F ) kฮฑkโˆž di 1 โ‰ค o(1) + |F |2 ktk2โ„“2 (F ) ksk2โ„“2 (F ) kฮฑk2โˆž (1 + o(1)) di โ†’ 0. This proves (3) by the Cauchy-Schwartz inequality. The general case follows by approximation as in (i).  For notation, if E โІ ฮ“ is finite, and f : RE โ†’ C is measurable, we let f โŠ— 1Rฮ“\E : Rฮ“ โ†’ C be defined by f โŠ— 1Rฮ“\E (x) = f (x E ). We say that f โˆˆ S(Rฮ“ ) if there is a finite E โІ ฮ“ and a Schwartz function f0 : RE โ†’ C so that f = f0 โŠ— 1Rฮ“\E . By standard Fourier analysis, there is a ฮธ โˆˆ S(RE ) so that Z exp(2ฯ€it ยท x) ฮธ(t) dt. f (x) = RE We prove that if we choose x โˆˆ Rdi with respect to the Gaussian measure on pi Rdi then with high prob(E) ability, the microstate ฯ†x will approximately preserve the measure ยตpฮดe when integrated against Schwartz functions. We need the following notation: if ฯ† โˆˆ X di , ฯˆ โˆˆ Y di we define ฯ† โŠ— ฯˆ โˆˆ (X ร— Y )di by (ฯ† โŠ— ฯˆ)(j) = (ฯ†(j), ฯˆ(j)). 20 BEN HAYES Lemma 4.18. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). Let p โˆˆ LR (ฮ“) be an orthogonal projection. Fix a sequence of orthogonal projections pi โˆˆ Mdi (R) such that kpi โˆ’ ฯƒi (p)k2 โ†’ 0. Define the Gaussian measure ฮฝi on pi โ„“2R (di ) by d ฮฝi (x) = e โˆ’ฯ€kxk2โ„“2 (d i) dx. (E) Here dx is the Lebesgue measure on pi โ„“2R (di ). Let ฯ†x be defined as in Lemma 4.16 for X = R, x0 = 0. Let ยตpฮดe be defined as in Proposition 4.3. Let F โІ E be finite subsets of ฮ“ and ฮด > 0. Then for any compact Hausdorff space Y, sequence ฯˆi โˆˆ Y di , and f โˆˆ S(RF ) , g โˆˆ C(Y ),   Z Z Z x โˆˆ p i Rd i : ฮฝi f โŠ— 1Rฮ“\F โŠ— g d(ฯ†x(E) โŠ— ฯˆi )โˆ— (udi ) โˆ’ f โŠ— 1Rฮ“\F dยตpฮดe g d(ฯˆi )โˆ— (udi ) > ฮด โ†’ 0. Rฮ“ Proof. Define G : pi Rdi โ†’ R by G(x) = Z f โŠ— 1Rฮ“\E โŠ— g d(ฯ†x(E) โŠ— ฯˆi )โˆ— (udi ). We will show that (4) Z Z G dฮฝi โˆ’ Z |G|2 dฮฝi โˆ’ pi Rdi X f โŠ— 1Rฮ“\E dยตpฮดe  Z Y  g d(ฯˆi )โˆ— (udi ) โ†’ 0 and (5) pi Rdi As Gโˆ’ Z Z X 2 f โŠ— 1Rฮ“\E dยตpฮดe 2 = G dฮฝi Z pi Rdi L2 (dฮฝi ) Z Y 2 2 g d(ฯˆi )โˆ— (udi ) |G| dฮฝi โˆ’ Z โ†’ 0. 2 pi Rdi G dฮฝi , the Lemma will then follow from Chebyshevโ€™s inequality. Write Z exp(2ฯ€it ยท x)ฮธ(t) dt f (x) = RF F with ฮธ โˆˆ S(R ). Note that by Proposition 4.3 and by the fact that ฮธ โˆˆ L1 (RF ), Z Z Z Z f โŠ— 1Rฮ“\E dยตpฮดe = ฮธ(t) exp(โˆ’ฯ€kฮป(tฬŒ)pk22 ) dt. (6) exp(2ฯ€it ยท x)ฮธ(t) dยตpฮดe dt = Rฮ“ RF Rฮ“ RF We have Z pi Rdi G(x) dฮฝi (x) = = Z di Z 1 X ฮธ(t) exp(2ฯ€it ยท ฯ†x(E) (j))g(ฯˆi (j)) dt dฮฝi (x) di j=1 pi Rdi RF Z di Z 1 X ฮธ(t) exp(2ฯ€it ยท ฯ†x(E) (j))g(ฯˆi (j)) dฮฝi (x) dt di j=1 RF pi Rdi the interchanges of integrals being valid as g is bounded and ฮธ โˆˆ L1 (RF ). If E โЇ F, then t ยท ฯ†x(E) (j) = hฯƒi (tฬŒ)x, ej iโ„“2 (di ) . SOFIC ENTROPY OF GAUSSIAN ACTIONS 21 Thus Z pi Rdi G(x) dฮฝi (x) = Z di Z 1 X ฮธ(t) exp(2ฯ€ihฯƒi (tฬŒ)x, ej iโ„“2 (di ,R) )g(ฯˆi (j)) dฮฝi (x) dt di j=1 RF pi Rdi Z di Z 1 X = ฮธ(t) exp(2ฯ€ihx, pi ฯƒi (tฬŒ)โˆ— ej iโ„“2 (di ,R) )g(ฯˆi (j)) dฮฝi (x) dt di j=1 RF pi Rdi di Z 1 X ฮธ(t) exp(โˆ’ฯ€kpi ฯƒi (tฬŒ)โˆ— ej k2โ„“2 (di ) )g(ฯˆ(j)) dt. = di j=1 RF Here we are using that Z pi Rdi exp(2ฯ€ihx, pi ฯƒi (t)โˆ— ej iโ„“2 (di ,R) ) dฮฝi (x) = exp(โˆ’ฯ€kpi ฯƒi (tฬŒ)โˆ— ej k2โ„“2 (di ) ), (this is an obvious generalization of Proposition 8.24 in [13]). By the preceding Lemma, there is a Ci โІ {1, . . . , di } with |Ci | โ†’1 di (7) and kpi ฯƒi (tฬŒ)โˆ— ej k2โ„“2 (di ) โˆ’ kฮป(tฬŒ)pk22 lim sup sup iโ†’โˆž jโˆˆCi ,tโˆˆRF ktk22 As we have (8) Z sup jโˆˆCi RF = 0. kฮป(tฬŒ)pฮดe k22 = ฯ„ (pฮป(tฬŒ)โˆ— ฮป(tฬŒ)p) = ฯ„ (ฮป(tฬŒ)pฮป(tฬŒ)โˆ— ) = kpฮป(tฬŒ)โˆ— ฮดe k22 , ฮธ(t) exp(โˆ’ฯ€kpi ฯƒi (tฬŒ)โˆ— ej k2โ„“2 (di ) ) dt โˆ’ Z RF ฮธ(t) exp(โˆ’ฯ€kฮป(tฬŒ)pฮดe k2 ) dt โ‰ค o(1) Z RF |ฮธ(t)|ktk2โ„“2 (F ) dt, where we use o(1) for any expression that goes to zero as i โ†’ โˆž. Additionally, Z (9) sup ฮธ(t) exp(โˆ’ฯ€kpi ฯƒi (tฬŒ)โˆ— ej k2โ„“2 (di ) ) โ‰ค kฮธk1 . jโˆˆ{1,...,di }\Ci Since RF Z RF ฮธ(t)ktk2โ„“2 (F ) dt < โˆž equations (8), (9), (7) and the fact that g is bounded imply that Z Z Z ฮธ(t) exp(โˆ’ฯ€kฮป(tฬŒ)pk22 ) dt g dฯˆโˆ— (udi ) โ†’ 0. G(x) dฮฝi (x) โˆ’ pi Rdi RF By (6) we have proved (4). We now turn to the proof of (5). By the same computations as above, Z Z Z Z 1 X |G|2 dฮฝi = 2 ฮธ(t)ฮธ(s)e2ฯ€i(hฯƒi (tฬŒ)x,ej iโ„“2 (di ) โˆ’hฯƒi (sฬŒ)x,ek iโ„“2 (di ) ) g(ฯˆi (j))g(ฯˆi (k)) dt ds dฮฝi (x) d d d F F i i R pi R R i 1โ‰คj,kโ‰คdi pi R Z Z X 1 โˆ’ฯ€(kpi ฯƒi (tฬŒ)โˆ— ej โˆ’pi ฯƒi (sฬŒ)โˆ— ek k2โ„“2 (d ) ) i g(ฯˆ (j))g(ฯˆ (k)) dt ds. ฮธ(t)ฮธ(s)e = 2 i i di RF RF 1โ‰คj,kโ‰คdi Again the interchanges of integrals are valid as ฮธ โˆˆ L1 (RF ). By the preceding Lemma, there are Ai โІ {1, . . . , di }2 so that (10) udi โŠ— udi (Ai ) โ†’ 1 22 BEN HAYES and lim kpi ฯƒi (tฬŒ)โˆ— ej โˆ’ pi ฯƒi (sฬŒ)โˆ— ej k22 โˆ’ kฮป(tฬŒ)pฮดe k22 โˆ’ kฮป(sฬŒ)pฮดe k22 dt = 0. (ktkโ„“2 (F ) + kskโ„“2 (F ) )2 sup iโ†’โˆž (j,k)โˆˆA , i t,sโˆˆRF Thus (11) sup (j,k)โˆˆAi as Z RF Z ฮธ(t)ฮธ(s)e โˆ’ฯ€(kpi ฯƒi (tฬŒ)โˆ— ej โˆ’pi ฯƒi (sฬŒ)โˆ— ek k2โ„“2 (d ) ) i RF Z Z Z Z RF Additionally, (12) sup (j,k)โˆˆ{1,...,di }2 \(Ai โˆฉCi ร—Ci ) RF RF Z dt ds โˆ’ ฮธ(t)e (โˆ’ฯ€kpi ฯƒi (tฬŒ)โˆ— ej k2โ„“2 (d ) ) i 2 dt RF โ†’ 0, |ฮธ(t)||ฮธ(s)|(ktkโ„“2 (F ) + kskโ„“2 (F ) )2 dt ds < โˆž. ฮธ(t)ฮธ(s)e   โˆ’ฯ€ kpi ฯƒi (t)โˆ— ej k2โ„“2 (d ) โˆ’2hฯƒi (s)pi ฯƒi (t)โˆ— ej ,ek iโ„“2 (d ) +kpi ฯƒi (t)ek k2โ„“2 (d ) i i i RF โ‰ค kฮธk21 . Equations (8), (12), (10), (7) and the fact that g is bounded imply that Z Z 2 1 X g(ฯˆi (j))g(ฯˆi (k)) โ†’ 0. |G|2 dฮฝi โˆ’ ฮธ(t) exp(โˆ’ฯ€kฮป(tฬŒ)pฮดe k22 ) dt ยท 2 di pi Rdi RF 1โ‰คj,kโ‰คdi Since 1 d2i we have proved (5). X g(ฯˆi (j))g(ฯˆi (k) = 1โ‰คj,kโ‰คdi Z 2 g dฯˆโˆ— (udi )  A A Lemma 4.19. Let A be an infinite set. Then the space S(R ) generates Cb (R ) in the sense of Definition 3.1. Proof. Let ฮต > 0, f โˆˆ Cb (RA ) and K โІ RA compact. We say that a function ฯˆ : K โ†’ C depends upon finitely many coordinates if there is a finite E โІ A so that if x, y โˆˆ K and x(a) = y(a) for all a โˆˆ E then f (x) = f (y). By the Stone-Weierstrass Theorem there is a function ฯˆ : K โ†’ C depending upon finitely many coordinates so that kฯˆkC(K) โ‰ค kf K kC(K) โ‰ค kf kCb(X) and kฯˆ โˆ’ f K kC(K) < ฮต. Let E โІ A be such that if x, y โˆˆ K and then ฯˆ(x) = ฯˆ(y). Let x(a) = y(a) for all a โˆˆ E KE = {x โˆˆ RE : there is a y โˆˆ K with x(a) = y(a) for all a โˆˆ E}. Then KE is a compact, being the continuous image of K under the projection map RA โ†’ RE . There is a well-defined function ฯˆe : KE โ†’ C such that e ฯˆ(x) = ฯˆ(xโ€ฒ ) whenever xโ€ฒ โˆˆ Rฮ“ has xโ€ฒ (g) = x(g) for all g โˆˆ E. It is well known that there is a ฯ†e โˆˆ Ccโˆž (RE ) so that kฯ†e K โˆ’ ฯˆe E C(KE ) <ฮต SOFIC ENTROPY OF GAUSSIAN ACTIONS 23 e C (RE ) โ‰ค kf kC (RA ) . kฯ†k b b Let ฯ† = ฯ†e โŠ— 1RA\E . Since ฯ†e is a Schwartz function, we have that ฯ† โˆˆ S(RA ). Finally, kฯ† This completes the proof. K โˆ’f k K C(K) โ‰ค kฯ† K โˆ’ ฯˆkC(K) + kฯˆ โˆ’ f k K C(K) < 2ฮต.  Theorem 4.20. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). Let ฯ : ฮ“ โ†’ O(H) be an orthogonal representation on a real, separable Hilbert space H with ฯ โ‰ช ฮปฮ“,R . Let ฮ“ y (Xฯ , ยตฯ ) be the corresponding Gaussian action. Let (Y, ฮฝ) be a standard probability space and ฮ“ y (Y, ฮฝ) a measure-preserving action with hฮฃ,ฮฝ (Y, ฮ“) โ‰ฅ 0. Then hฮฃ,ยตฯ โŠ—ฮฝ (Xฯ ร— Y, ยตฯ โŠ— ฮฝ) = โˆž. Proof. We shall first reduce to the case that ฯ is cyclic, i.e there is a vector ฮพ โˆˆ H so that H = Span{ฯ(g)ฮพ : g โˆˆ ฮ“}, so suppose we can prove the Theorem in the cyclic case. Let ฯ = ฯ1 โŠ• ฯ2 , where ฯ1 is cyclic and ฯ2 โ‰ช ฮปฮ“,R . Since we are assuming the theorem in the cyclic case and ฮ“ y (Xฯ ร— Y, ยตฯ โŠ— ฮฝ) โˆผ = ฮ“ y (Xฯ1 ร— Xฯ2 ร— Y, ยตฯ1 โŠ— ยตฯ2 โŠ— ฮฝ) it suffices to show that hฮฃ,ยตฯ2 โŠ—ฮฝ (Xฯ2 ร— Y, ฮ“) โ‰ฅ 0, (13) as ฯ1 is cyclic. Since H is separable, we may write ฯ2 = โˆž M ฯ2,n n=1 where ฯ2,n is cyclic. For n โˆˆ N, let ฯ2,โ‰คN = N M ฯ2,n . n=1 By the cyclic case and induction, we have hฮฃ,ยตฯ2,โ‰คN โŠ—ฮฝ (Xฯ2,โ‰คN ร— Y, ฮ“) = โˆž for any N โˆˆ N. Using that ฮ“ y (Xฯ2,โ‰คN ร— Y, ยตฯ2,โ‰คN โŠ— ฮฝ), ฮ“ y (Xฯ2 ร— Y, ยตฯ2 โŠ— ฮฝ) โˆผ = lim โ†โˆ’ it is not hard to show (13). We use the preceding Lemma and Theorem 3.3. By Proposition 4.3 we may regard ฮ“ y (Xฯ , ยตฯ ) as Rฮ“ with the measure ยตpฮดe defined by Z exp(2ฯ€it ยท x) dยตpฮดe (x) = exp(โˆ’ฯ€kฮป(t)pฮดe k22 ) Rฮ“ for t โˆˆ cc (ฮ“, R) and some orthogonal projection p โˆˆ LR (ฮ“). Extend ฮฃ to an approximation sequence of L(ฮ“) still denoted ฯƒi : L(ฮ“) โ†’ Mdi (C). By Proposition 4.11, there exists a sequence pi of orthogonal projections in Mdi (R) so that kpi โˆ’ ฯƒi (p)k2 โ†’ 0. di Let ฮฝi be the Gaussian measure on pi R defined by dฮฝi (x) = e โˆ’ฯ€kxk2โ„“2 (d i) dx. Choosing a compact model, we may assume that Y is a compact metrizable space and that ฮ“ y Y by homeomorphisms. Let โˆ†Y be a compatible metric on Y. Let โˆ†Rฮ“ be the dynamically pseudometric on Rฮ“ defined by โˆ†Rฮ“ (x, y) = min(|x(e) โˆ’ y(e)|, 1). 24 BEN HAYES We shall use the generating set L = {f โŠ— g : f โˆˆ S(Rฮ“ ), g โˆˆ C(Y )}. We use the dynamically generating pseudometric on Rฮ“ ร— Y defined by โˆ†((x1 , y1 ), (x2 , y2 )) = โˆ†Rฮ“ (x1 , x2 ) + โˆ†Y (y1 , y2 ). Let ฮต, ฮด, ฮท > 0 and finite F โІ ฮ“,L โІ L be given. Let e = g1 ,g2 , . . . be an enumeration of the elements of ฮ“. Inductively find positive real numbers M1 , M2 , . . . so that l X  ฮ“ 2โˆ’j ฮท. ยตpฮดe {x โˆˆ R : |x(gj )| โ‰ค Mj , j = 1, . . . , l} โ‰ฅ 1 โˆ’ j=1 Define M : ฮ“ โ†’ (0, โˆž) by M (gj ) = Mj . Set KM = {x โˆˆ Rฮ“ : |x(g)| โ‰ค M (g) for all g โˆˆ ฮ“} and note that KM is compact. Let U be an open neighborhood of KM in Rฮ“ . Let L1 โІ S(Rฮ“ ), L2 โІ C(Y ) be finite sets so that L โІ {f โŠ— g : f โˆˆ L1 , g โˆˆ L2 }. Since hฮฃ,ฮฝ (Y, ฮ“) โ‰ฅ 0, for infinitely many i, there is a ฯˆi โˆˆ Mapฮฝ (โˆ†Y , F, ฮด, L2 , ฯƒi ). For these i, by Lemma 4.18, there is a finite set E of ฮ“ containing the identity and an Bi โІ pi Rdi so that ฮฝi (Bi ) โ†’ 1 ฯ†x(E) โŠ— ฯˆi โˆˆ MapยตโŠ—ฮฝ (โˆ†, F, ฮด, L, ฯƒi ) for all x โˆˆ Bi . We will also assume that U โЇ ฯ€E (KM ) ร— Rฮ“\E . This may be done by enlarging E, as KM is compact. Choose f โˆˆ S(RE ) so that Z f d(ฯ€E )โˆ— ยตฯ โ‰ฅ โˆ’ฮท + (ฯ€E )โˆ— ยต(ฯ€E (KM )) RE and 0 โ‰ค f โ‰ค ฯ‡ฯ€E (KM ) . We may assume that ฯ†x(E) โŠ— ฯˆi โˆˆ MapยตโŠ—ฮฝ (โˆ†, F, ฮด, L โˆช {f โŠ— 1Rฮ“\E โŠ—1 }, ฯƒi ), for all x โˆˆ Bi . Note that in this case (ฯ†x(E) โŠ— ฯˆi )โˆ— (udi )(U ร— Y ) โ‰ฅ (ฯ†x(E) โŠ— ฯˆi )โˆ— (udi )(ฯ€E (KM ) ร— Rฮ“\E ร— Y ) Z โ‰ฅ โˆ’ฮด + f โŠ— 1Rฮ“\E dยตp Rฮ“ โ‰ฅ โˆ’ฮด โˆ’ ฮท + (ฯ€E )โˆ— ยต(ฯ€E (KM )) โ‰ฅ โˆ’ฮด โˆ’ 2ฮท + 1. So if ฮด < ฮท we have Thus Uร—Y,3ฮท ฯ†x(E) โŠ— ฯˆi โˆˆ MapยตโŠ—ฮฝ (โˆ†, F, ฮด, L โˆช {f โŠ— 1Rฮ“\E โŠ— 1}, ฯƒi ). 1 log Sฮต (Bi , โˆ†2 ). iโ†’โˆž di Suppose that S โІ Bi is ฮต-dense. Then for every y โˆˆ Bi , there exists x โˆˆ S and a C โІ {1, . . . , di } so that โˆš |x(j) โˆ’ y(j)| < ฮต, for j โˆˆ C, โˆš |C| โ‰ฅ (1 โˆ’ ฮต)di . Uร—Y,ฮท hฮฃ,ยต (โˆ†, ฮต, F, ฮด, L โˆช {f โŠ— 1Rฮ“\E โŠ— 1}) โ‰ฅ lim sup p โŠ—ฮฝ SOFIC ENTROPY OF GAUSSIAN ACTIONS Using m for Lebesgue measure, ฮฝi (B) โ‰ค โ‰ค X xโˆˆS, AโІ{1,...,d โˆš i }, |A|โ‰ฅ(1โˆ’ ฮต)di X ฮฝi ((xA + 25 โˆš c ฮต Ball(โ„“2R (A, uA ))) ร— RA ) โˆš m( ฮต Ball(โ„“2R (A, uA ))) xโˆˆS, AโІ{1,...,d โˆš i }, |A|โ‰ฅ(1โˆ’ ฮต)di X = ฮต|A|/2 m(Ball(โ„“2R (A, uA ))) xโˆˆS, AโІ{1,...,d โˆš i }, |A|โ‰ฅ(1โˆ’ ฮต)di By [13] Corollary 2.55 and Stirlingโ€™s Formula, there is a R > 0 so that  |A|/2 di m(Ball(โ„“2R (A, uA ))) โ‰ค R|A|/2 . |A| Set H(t) = ( Then for some D > 0 we have ฮฝi (B) โ‰ค 0, โˆ’t log(t) โˆ’ (1 โˆ’ t) log(1 โˆ’ t), X di ฮต 2 R|A|/2 xโˆˆS, AโІ{1,...,d โˆš i }, |A|โ‰ฅ(1โˆ’ ฮต)di  di |A| |A|/2 โˆš โˆš โ‰ค |S|D ฮตdi Rdi /2 exp(H( ฮต)di ) the last line following by Stirlingโ€™s Formula. Thus 1 1 lim sup log |S| โ‰ฅ log 2 iโ†’โˆž di So Uร—Y,3ฮท hฮฃ,ยต (โˆ†, ฮต, F, ฮด, L) p โŠ—ฮฝ โ‰ฅ Uร—Y,3ฮท hฮฃ,ยต (โˆ†, ฮต, F, ฮด, L p โŠ—ฮฝ  if t = 0, 1 for 0 < t < 1.  ฮต โˆš (1 โˆ’ ฮต)  d2i , โˆš  โˆš 1 1โˆ’ ฮต โˆ’ log R โˆ’ H( ฮต). ฮต 2 โˆช {f โŠ— R ฮ“\E 1 โŠ— 1}) โ‰ฅ log 2  โˆš  โˆš 1 1โˆ’ ฮต โˆ’ log R โˆ’ H( ฮต), ฮต 2 taking the infimum over all U โЇ KM , then the supremum over all KM , then the infimum over all F, ฮด, ฮท and L โІ L we find that  โˆš  โˆš 1 1โˆ’ ฮต 1 โˆ’ log R โˆ’ H( ฮต). hฮฃ,ยตpฮดe โŠ—ฮฝ (โˆ†, ฮต, L) โ‰ฅ log 2 ฮต 2 If we now let ฮต โ†’ 0 we see that hฮฃ,ยตpฮดe โŠ—ฮฝ (X ร— Y, ฮ“) = โˆž.  We now prove a general formula for the entropy of Gaussian actions. Corollary 4.21. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). Let ฯ : ฮ“ โ†’ O(H) be an orthogonal representation. By Proposition 4.14 write ฯ = ฯ1 โŠ• ฯ2 where ฯ1 โ‰ช ฮปฮ“,R and ฯ2 โŠฅ ฮปฮ“,R . Let ฮ“ y (Xฯ , ยตฯ ), ฮ“ y (Xฯj , ยตฯj ), j = 1, 2 be the corresponding Gaussian actions. Then: (i): hฮฃ,ยตฯ2 (Xฯ2 , ยตฯ2 ) โˆˆ {0, โˆ’โˆž}, (ii): ๏ฃฑ ๏ฃด ๏ฃฒโˆ’โˆž, if hฮฃ,ยตฯ2 (Xฯ2 , ยตฯ1 ) = โˆ’โˆž, hฮฃ,ยตฯ (Xฯ1 , ยตฯ1 ) = 0, if ฯ1 = 0 and hฮฃ,ยตฯ2 (Xฯ2 , ยตฯ2 ) = 0, ๏ฃด ๏ฃณ โˆž, if ฯ1 6= 0 and hฮฃ,ยตฯ2 (Xฯ2 , ยตฯ2 ) = 0. 26 BEN HAYES Proof. Statement (i) is just a direct corollary of Corollary 4.15 and the fact that sofic entropy is always nonnegative or โˆ’โˆž. The first case of statement (i) follows from the general fact that if ฮ“ y (X, ยต), ฮ“ y (Y, ฮฝ) are two measure-preserving actions on standard probability spaces, then hฮฃ,ยต (X, ฮ“) = โˆ’โˆž implies that hฮฃ,ยตโŠ—ฮฝ (X ร— Y, ฮ“) = โˆ’โˆž. The second case of statement (ii) is also just a special case of statement (i). The last case of statement (ii) follows from Theorem 4.20.  We give some examples to show that hฮฃ,Xฯ (Xฯ , ยตฯ ) can be โˆ’โˆž. Let ฮ“ be a countable discrete sofic group with sofic approximation ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). We say that ฮฃ is ergodic if whenever Ai โІ {1, . . . , di } are such that lim udi (Ai โˆ†ฯƒi (g)Ai ) = 0 for all g โˆˆ ฮ“ iโ†’โˆž then lim udi (Ai )(1 โˆ’ udi (Ai )) = 0. iโ†’โˆž The following is a folklore result and we include a proof for completeness. Proposition 4.22. Let ฮ“ be a countable discrete sofic group with an ergodic sofic approximation ฮฃ. Then, if ฮ“ y (X, ยต) is a nonergodic probability measure-preserving action on a standard probability space, we have hฮฃ,ยต (X, ฮ“) = โˆ’โˆž. Proof. Let ฮฃ = (ฯƒi : ฮ“ โ†’ Sdi ). Let E โІ X be a ฮ“-invariant set with 0 < ยต(E) < 1. Let ฮฑ : X โ†’ {0, 1} be the finite observable given by ฮฑ(x) = ฯ‡E (x). Let ฮต > 0, by a diagonalization argument it is easy to see that there is a ฮด > 0 and a finite F โІ ฮ“ containing e so that if Bi โІ {1, . . . , di } has lim sup max udi (Bi โˆ†ฯƒi (g)Bi ) < ฮด, (14) iโ†’โˆž gโˆˆF then lim sup udi (Bi )(1 โˆ’ udi (Bi )) < ฮต. (15) iโ†’โˆž e = {a โˆˆ {0, 1} : a(e) = 1}. If ฮด is sufficiently small, and ฯ† โˆˆ AP(ฮฑ, F, ฮด โ€ฒ , ฯƒi ) then since ยต(gEโˆ†E) = 0, Set E we have e e <ฮด E)) max udi (ฯƒi (g)ฯ†โˆ’1 (E)โˆ†ฯ†( F gโˆˆF and we always have If ฮด โ€ฒ , ฮต are sufficiently small, then e โ‰ฅ ยต(E) โˆ’ ฮด โ€ฒ . ยต(E) + ฮด โ€ฒ โ‰ฅ udi (ฯ†โˆ’1 (E)) e > ฮต. e โˆ’ udi (ฯ†โˆ’1 (E))) udi (ฯ†โˆ’1 (E))(1 Thus we see from (14), (15) that AP(ฮฑ, F, ฮด โ€ฒ , ฯƒi ) = โˆ…. Thus hฮฃ,ยต (X, ฮ“) = โˆ’โˆž, using Kerrโ€™s definition of entropy via partitions.  Combining with Theorem 2.8 of [27] we have the following. Corollary 4.23. Let ฮ“ be a countable discrete sofic group with an ergodic sofic approximation ฮฃ. Let ฯ : ฮ“ โ†’ O(H) be an orthogonal representation which is not weakly mixing (e.g. ฯ could be compact). Then if ฮ“ y (X, ยต) is the associated Gaussian action, hฮฃ,ยต (X, ฮ“) = โˆ’โˆž. SOFIC ENTROPY OF GAUSSIAN ACTIONS 27 We mention an example of an ergodic sofic approximation when ฮ“ = F2 is the free group on two generators a, b. Here we can choose a sofic approximation randomly. Namely let ฯ† = (ฯ†1 , ฯ†2 ) โˆˆ Sn2 be chosen uniformly at random, and let ฯƒฯ† : F2 โ†’ Sn be the unique homomorphism so that ฯƒฯ† (a) = ฯ†1 , ฯƒฯ† (b) = ฯ†2 . It is known that with high probability ฯƒฯ† is a sofic approximation (see [23], as well as [18] Lemma 3.1). It is also known from the theory of expanders that with high probability ฯƒฯ† is a ergodic sofic approximation (see [14], and the remarks in Section 5 of [26]). If we take an orthogonal representation ฯ : F2 โ†’ O(H) which is not weakly mixing (e.g. take H to be finite-dimensional) then we have hฮฃ,ยตฯ (Xฯ , ฮ“) = โˆ’โˆž. References [1] L. Bowen. Measure conjugacy invariants for actions of countable sofic groups. J. Amer. Math. Soc, 23:217โ€“245, 2010. [2] L. Bowen. Entropy for expansive algebraic actions of residually finite groups. Ergodic Theory Dynam. Systems, 31(3):703โ€“ 718, 2011. [3] L. Bowen. Weak isomorphisms between Bernoulli shifts. Israel J. Of Math, 183, 2011. [4] L. Bowen. Every countably infinite group is almost Ornstein. In Dynamical systems and group actions, volume 567 of Contemp. Math, pages 67โ€“78. Amer. Math. Soc, Providence, RI, 2012. [5] L.Bowen and H.Li. Harmonic models and spanning forests of residually finite groups. J. Funct. Anal., 263(7):1769โ€“1808, 2012. [6] N. Brown and N. Ozawa. C โˆ— -Algebras and Finite-Dimensional Approximations. Cambridge University Press, 1994. [7] L. Ciobanu, D. Holt, and S. Rees. Sofic groups: graph products and graphs of groups. Pacific J. of Math, 271(1):53โ€“64, November 2014. [8] J. Conway. A Course in Operator Theory. Graduate Studies in Mathematics. American Mathematical Society, Providence, RI, 1991. [9] A. Dooley and V. Golodets. The spectrum of completely positive entropy actions of countable amenable groups. J. Funct. Anal., 196(1):1โ€“18, 2002. [10] K. Dykema, D. Kerr, and M. Pichot. Orbit equivalence and sofic approximation. arXiv:1102.2556. [11] K. Dykema, D. Kerr, and M. Pichot. Sofic dimension for discrete measurable groupoids. Trans. Amer. Math. Soc, 366(2):707โ€“748, 2013. [12] G. Elek and E. Szabo. On sofic groups. J. Group Theory, 9(2):161โ€“171, 2006. [13] G. Folland. Real Analysis: Modern Techinques and Their Applications. John Wiley & Sons, Hoboken, NJ, second edition, 1999. [14] J. Friedman. A proof of Alonโ€™s second eigenvalue conjecture and related problems. Memoirs of AMS, 195:1โ€“100, 2008. [15] B. Hayes. Fuglede-Kadison determinants and sofic entropy. arXiv:1402.1135. [16] B. Hayes. Polish models and sofic entropy. J. Inst. Math. Jussieu. To appear. [17] B. Hayes. An lp -version of von Neumann dimension for Banach space representations of sofic groups. J. Funct. Anal., 266(2):989โ€“1040, 2014. [18] D. Kerr. Bernoulli actions of sofic groups have completely positive entropy. Israel J. Math. To appear. [19] D. Kerr and H. Li. Topological entropy and the variational principle for actions of sofic groups. Invent. Math, 186:501โ€“558, 2011. [20] J. Kieffer. A generalized Shannon-McMillan theorem for the action of an amenable group on a probability space. Ann. Prob, 3(6):1031โ€“1037, 1975. [21] M. Lemanฬczyk. Entropy of Gaussian actions for countable abelian groups. Fund. Math., 157:277โ€“286, 1998. [22] T. Meyerovitch. Positive sofic entropy implies finite stabilizer. arXiv:1504.08137. [23] A. Nica. Asymptotically free families of random unitaries in symmetric groups. Pacific J. Math, 157:295โ€“310, 1993. [24] D. Ornstein and B. Weiss. Entropy and isomorphism theorems for actions of amenable groups. J. Anal. Math., 48:1โ€“141, 1987. [25] L. Paunescu. On sofic actions and equivalence relations. J. Funct. Anal., 261(9):2461โ€“2485, November 2011. [26] L. Paunescu. Convex structures revisited. Ergodic Theory Dynam. Systems. To appear. [27] J. Peterson and T. Sinclair. On cocycle superrigidity for Gaussian actions. Ergodic Theory Dynam. Systems, 32(1):249โ€“272, 2012. [28] S. Popa. Independence properties in sublagebras of ultraproduct II1 factors. J. Funct. Anal., 266(9):5818โ€“5846, 2014. [29] B. Seward. Every action of a non-amenable group is the factor of a small action. J. Mod. Dyn., 8(2):251โ€“270, 2014. [30] M. Takesaki. The Theory of Operator Algebras I. Springer-Verlag, Berline-Heidelberg-New York, 2002. [31] M. Takesaki. Theory of Operator Algebras II, volume 125 of Encyclopaedia of Mathematical Sciences. Springer, New York, NY, 2003. Stevenson Center, Nashville, TN 37240 E-mail address: [email protected]
4math.GR
arXiv:1708.05761v1 [math.AC] 18 Aug 2017 EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS RAYMOND C HEITMANN AND LINQUAN MA Abstract. The (full) extended plus closure was developed as a replacement for tight closure in mixed characteristic rings. Here it is shown by adapting Andreฬโ€™s perfectoid algebra techniques that, for complete local rings, this closure has the colon-capturing property. In fact, more generally, if R is a (possibly ramified) complete regular local ring of mixed characteristic, I and J are ideals of R, and the local domain S is a finite R-module, then (IS : J) โІ (I : J)S epf . A consequence is that all ideals in regular local rings are closed, a fact which implies the validity of the direct summand conjecture and the Briancฬงon-Skoda theorem in mixed characteristic. 1. Introduction In [7], the first author introduced several closure operations for mixed characteristic rings, most notably the full extended plus closure. These closures were proposed as possibilities to play the same role in mixed characteristic as the tight closure does in characteristic p. It was hoped that they might allow us to prove some of the homological conjectures that remained unresolved in mixed characteristic and indeed, the full extended plus closure did figure in the proof of the direct summand conjecture in dimension 3 [8]. Of course, the direct summand conjecture has been resolved [2] without the use of this closure operation. However, it still remains of interest to note to what extent the full extended plus closure fills the void left open by the absence of tight closure in mixed characteristic. In this paper, we note a number of properties that were shown in [7] and add several others. In particular, we deal with two fundamental questions that were left open in [7]. We shall see that the full extended plus closure has the colon-capturing property in complete local rings and that ideals in all regular local rings are closed. The latter fact is sufficient to imply the direct summand conjecture. This is not truly an alternate proof as our work makes use of Andreฬโ€™s notation and techniques. For the most part, this article is about the full extended plus closure in complete local rings. Since we do not know whether or not completing, closing, and contracting occasionally gives a larger closure, only Theorem 3.16 gives new information about rings which are not complete. The primary result in this article is that, in a sense, the full extended plus closure captures obstructions to flatness. Our principal theorems are: Theorem 1.1 (Corollary 3.11). Let S be a complete local domain of mixed characteristic and let y1 , . . . , yn be parameters in S. Then ((y1 , . . . , ynโˆ’1 )S : yn ) โІ (y1 , . . . , ynโˆ’1 )S epf . Date: August 22, 2017. 1 2 RAYMOND C HEITMANN AND LINQUAN MA Theorem 1.2 (Theorem 3.12). Let R be a complete regular local ring of mixed characteristic and let the integral domain S be a finite extension of R. If I is an ideal of R and J โІ R, then (IS : J) โІ (I : J)S epf . An equivalent formulation of Theorem 1.2, divorced from the language of extended plus closure, is Theorem 1.3 (Theorem 3.14). Let R be a complete regular local ring of mixed characteristic p and let the integral domain S be finite over R. Let M be an RN module. Then there exist c โˆˆ R such that the natural map cวซ TorR โˆ’โ†’ i (S, M )/p R + N Tori (S , M )/p is zero for all i โ‰ฅ 1 and for every N, วซ > 0. Consequently, for + N วซ every ฮฑ โˆˆ TorR i (R , M )/p , there exist c โˆˆ R such that c ฮฑ = 0 for every วซ. This paper is organized as follows. In Section 2, we will give a brief introduction to extended plus closure. The results discussed here are generally known although Proposition 2.10 is actually new. We will also give a short introduction to our terminology and conventions. Section 3 will be devoted to our new results. 2. basics Notation 2.1. If I is an ideal of R and J โІ R, (I : J) = {r โˆˆ R | rJ โІ I}. The ring involved will always be clear from the ideal and there will be no need for the more cumbersome notation (I :R J). In [7], the first author introduced four closure operations for mixed characteristic rings. Subsequently, only one of these, the full extended plus closure, has received any attention. That will also be the case in this article. In fact, while we shall preserve the notation I epf , the f for full, we shall mostly refer to the closure as the extended plus closure. It should be noted that the original definition and early results allow R to be either mixed characteristic or characteristic p. However, the characteristic p case is less interesting as the full extended plus closure trivially contains the tight closure. Definition 2.2. Let R be an integral domain with p โˆˆ J(R) and I an ideal of R. Then an element x โˆˆ R is said to be in the (full) extended plus closure of I (designated x โˆˆ I epf ) provided there exists c โˆˆ R such that for every วซ > 0 and every positive integer N , cวซ x โˆˆ (I, pN )R+ . Remark 2.3. The extended plus closure is actually defined for all Noetherian rings with p โˆˆ J(R). Just as with tight closure, one may compute the extended plus closure by computing it modulo each minimal prime ideal and then taking the intersection of the liftings back to the original ring. The more general setting does not hold great interest and in this article, we will focus on the case of integral domains. We first shall highlight some of the basic results from [7]. First we see that it behaves as a reasonable closure operation. Proposition 2.4. [7, Proposition 2.1] Let I, J be ideals in a Noetherian ring R. (1) I epf is an ideal. (2) I โІ I epf . (3) If I โІ J, I epf โІ J epf . (4) (I epf )epf = I epf . EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS 3 (5) (I epf J epf )epf = (IJ)epf . (6) (I : J)epf โІ (I epf : J). In particular, if I is closed, then (I : J) is closed. Remark 2.5. It is known that if R is local and S = Rh , the henselization of R, then IS epf โˆฉ R = I epf [7, Theorem 3.4]. However, this result is unfortunately not known b of R, even when R is an excellent domain. For if we replace S by the completion R this reason our main theorems on extended plus closure do not obviously generalize to non-complete rings. Finally, we have the two most interesting theorems from the earlier work - two theorems which match consequential theorems from tight closure theory. First full extended plus closure gives a Briancฬงon-Skoda type theorem. Theorem 2.6. [7, Theorem 4.2] Let R be a ring, let I be an ideal of R generated by n elements, and suppose y is in the integral closure of I n+d for some integer d โ‰ฅ 0. Then y โˆˆ (I d+1 )epf . We note that this Briancฬงon-Skoda type theorem is a simple consequence of [6, Theorem 2.13]. We include that result next as it serves as a lemma we will need in our proof of Lemma 3.3 and Theorem 3.17. Proposition 2.7. p Let R be an integral domain and I = (x1 , . . . , xn )R an ideal of R. Suppose p โˆˆ (x1 , x2 )R and z โˆˆ I n+k with k โ‰ฅ 0. Then there exists an integral extension S of R with z โˆˆ I k+1 S. Recall that the classical Briancฬงon-Skoda theorem says that in a regular ring, if an ideal I is generated by n elements, then the integral closure of I n+d is contained in I d+1 for every integer d [14]. We can recover this result by proving that in a regular local ring, every ideal is closed under the extended plus closure; see Theorem 3.16. We give two proofs of this theorem: it can be obtained from our earlier work on the vanishing conjecture for maps of Tor [9], and it also follows from our main result in this article and the following result in [7]: Theorem 2.8. [7, Theorem 4.4] Let R be a regular local ring with p in the maximal ideal. If the full extended plus closure has the colon-capturing property for finite extensions of complete regular local rings, then I epf = I for every ideal I of R. Remark 2.9. The actual statement of this result in [7] presumes that the coloncapturing property holds for finite extensions of all regular local rings. However, the statement of [7, Lemma 4.3] makes it clear that one may restrict to complete regular local rings. Then, by faithful flatness, the fact that I epf = I holds in complete regular local rings implies it holds in all regular local rings. One may observe that these results are all well known for tight closure. In fact, an alternate definition of tight closure closely resembles that of extended plus closure. Instead of requiring cวซ x โˆˆ IR+ , the tight closure requires cวซ x โˆˆ IRF where RF is the integral closure of R in the largest purely inseparable extension of its quotient field. Superficially, this means the tight closure could be smaller. However, Hochster and Huneke [12] introduced the dagger closure (which must contain the extended plus closure) and showed [12, Theorem 3.1] that, for characteristic p complete local rings, the tight closure and dagger closure were equal. Thus Proposition 2.10. If R is a complete local ring of equal characteristic p, the extended plus closure coincides with tight closure for ideals of R. 4 RAYMOND C HEITMANN AND LINQUAN MA 2.1. Perfectoid algebras. We will freely use the language of perfectoid spaces [16] and almost mathematics [5]. In this paper we will always work in the following situation: for a perfect field k of characteristic p > 0, we let W (k) be the ring of โˆž Witt vectors with coefficients in k. Let K โ—ฆ be the p-adic completion of W (k)[p1/p ] and K = K โ—ฆ [1/p]. Then K is a perfectoid field in the sense of [16] with K โ—ฆ โІ K its ring of integers. A perfectoid K-algebra is a Banach K-algebra R such that the set of powerbounded elements Rโ—ฆ โІ R is bounded and the Frobenius is surjective on Rโ—ฆ /p. A K โ—ฆ -algebra S is called integral perfectoid if it is p-adically complete, p-torsion free, satisfies S = Sโˆ— 1 and the Frobenius induces an isomorphism S/p1/p โˆ’โ†’ S/p. These two categories are equivalent to each other [16, Theorem 5.2] via the functors R โˆ’โ†’ Rโ—ฆ and S โˆ’โ†’ S[1/p]. Almost mathematics in this article will be measured with respect to a flat ideal โˆž (c1/p ). There are two cases that we will use: c = p or c = pg for some nonzero element g. This will be stated explicitly throughout. 3. Main Results For R a Noetherian integral domain of mixed characteristic p, we let R+ denote the absolute integral closure of R and let R++ denote the p-adic completion of R+ . For a nonzero element c โˆˆ R, we will use Rc to denote the integral closure of R++ in R++ [cโˆ’1 ]. Lemma 3.1. Let R be an integral domain of mixed characteristic p and I an ideal of R. For x โˆˆ R, if there exists c โˆˆ R such that for every วซ > 0 and every positive integer N , cวซ x โˆˆ (I, pN )R++ , then x โˆˆ I epf . N ++ Proof. We need only show that if cวซ x โˆˆ (I, cวซ x โˆˆ (I, pN )R+ . HowPps )R , then N วซ N ++ วซ ever, if c x โˆˆ (I, p )R , we have c x = i=1 yi ui + p u0 where each Psyi โˆˆ I and each ui is the limit of a Cauchy sequence {uij }. It follows that {cวซ x โˆ’ i=1 yi uij โˆ’ pN u0j } is a Cauchy sequence which converges to zero. Thus, P P for sufficiently large j, we have cวซ x โˆ’ si=1 yi uij โˆ’ pN u0j โˆˆ pN R+ . Then cวซ x = si=1 yi uij + pN (u0j + v) โˆˆ (I, pN )R+ .  Lemma 3.2. Let R be a universally catenarian Noetherian integral domain of mixed characteristic p and suppose (p, g)R is a height two ideal. Then we have โˆฉn (g, pn )R++ = gR++ . Proof. Pick z โˆˆ โˆฉn (g, pn )R++ ; we can write z = a1 g + b1 p with a1 โˆˆ R+ and b1 โˆˆ R++ . Now b1 p โˆˆ โˆฉn (g, pn )R++ and so we can write b1 p = a2 g + b2 p2 with a2 โˆˆ R+ and b2 โˆˆ R++ . But then b2 p2 โˆˆ โˆฉn (g, pn )R++ , so we can repeat the above process to write b2 p2 = a3 g + b3 p3 and keep going: z = a1 g + b 1 p = a1 g + a2 g + b 2 p 2 = a1 g + a2 g + a3 g + b 3 p 3 = ยท ยท ยท . Note that we have ai g โˆˆ piโˆ’1 R++ for all i, thus ai g = 0 as an element in R+ /piโˆ’1 = R++ /piโˆ’1 . Since R is universally catenary, (p, g) is a height two ideal in any integral k 1S = {x โˆˆ S[1/p]|S 1/p ยท x โˆˆ S for all k}. Hence S is almost isomorphic to S with respect โˆ— โˆ— โˆž to (p1/p ), thus in practice we will often ignore this distinction since one can always pass to Sโˆ— without affecting the issue. EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS 5 extension of R. Since R+ is a direct limit of normal integral extensions of R, g is a nonzerodivisor on R+ /piโˆ’1 and so ai โˆˆ piโˆ’1 R+ . Therefore, in R++ we have z = a1 g + a2 g + a3 g + ยท ยท ยท = g(a1 + a2 + a3 + ยท ยท ยท ) โˆˆ gR++ . This finishes the proof.  Lemma 3.3. Let R be a universally catenarian Noetherian integral domain of mixed characteristic p of dimension at least two and I an ideal of R. For x โˆˆ R, if there exists a nonzero c โˆˆ R such that for every วซ > 0 and every positive integer N , cวซ x โˆˆ (I, pN )Rc , then x โˆˆ I epf . โˆš Proof. We can find an element g โˆˆ R such that pg โˆˆ cR and (p, g)R is a height two ideal and likewise so is (p, g)Rโ€ฒ for every integral extension Rโ€ฒ of R (since R is universally catenary). The hypothesis of the lemma clearly holds with pg in place of c (note that Rpg is larger than Rc ) and so we may assume c = pg. Now this lemma will follow immediately from Lemma 3.1 if we can show that the injection โˆž R++ โˆ’โ†’ Rc is an almost isomorphism with respect to (c1/p ). Suppose u โˆˆ Rc . Then u = (pg)โˆ’d v for v โˆˆ R++ and some integer d. As R++ is just the p-adic completion of R+ , we may write v = w1 + pd w2 with w1 โˆˆ R+ and 1 1 is integral over R++ . This forces w to be integral w2 โˆˆ R++ . It follows that w pd pd + over the integrally closed R . So without loss of generality, we may assume w1 = 0 and so reduce to the case u = g โˆ’d v. Fix t > 0 and let วซ = 1/pt . To complete the proof, it suffices to show v โˆˆ dโˆ’วซ n (g , p )R++ for all positive integers n by Lemma 3.2. Now we fix an n > 0. We may write v = v1 + pnN v2 with v1 โˆˆ R+ , v2 โˆˆ R++ , and N = dpt = d/วซ. As v is integral over g d R++ , v1 is integral over (g d , pnN )R++ . This means there exists some integer k such that (v1 , g d , pnN )k+1 R++ = (v1 , g d , pnN )k (g d , pnN )R++ . Since both ideals contain a power of p, it is easy to see that (v1 , g d , pnN )k+1 R+ = (v1 , g d , pnN )k (g d , pnN )R+ and thus v1 is integral over (g d , pnN )R+ . It follows that v1 โˆˆ (g วซ , pn )N R+ . As R+ is absolutely integrally closed, Proposition 2.7 gives v1 โˆˆ (g วซ , pn )N โˆ’1 R+ โІ (g dโˆ’วซ , pn )R+ . Therefore v = v1 + pnN v2 โˆˆ (g dโˆ’วซ , pn )R++ as desired.  Now suppose R is a complete and unramified regular local ring of mixed characteristic, and R โˆ’โ†’ S is a module-finite local extension (so S is a complete local domain). By Cohenโ€™s structure theorem R โˆผ = W (k)[[x1 , . . . , xdโˆ’1 ]] where W (k) is a coefficient ring of R, which is a complete and unramified DVR with residue field k. Let kฬ„ denote an algebraic closure of k, let A0 = R โŠ—W (k) W (kฬ„), and let A be the p-adic completion of A0 . Then A is p-adically complete and formally smooth over W (kฬ„) mod p. We next point out that A is actually Noetherian (though we donโ€™t need this). Lemma 3.4. With the notation as above, A is a Noetherian ring. Proof. First of all, in general, if T is p-adically complete, then T is Noetherian if and only if T /pT is Noetherian: suppose Q is an infinitely generated prime ideal of T , then since T /pT is Noetherian, Q does not contain p. Now Q + pT is finitely generated, say by f1 + ptP 1 , . . . , fn + pt P Pn . Suppose f โˆˆPQ โІ Q + pT ; we can write fP= a1j (fj + ptj ) = a1j fj P + p a1j tP a1j tj P โˆˆ Q but p P โˆˆ / Q, so j . Now p a1j tj โˆˆ Q โІ Q + pT and thus a t = a (f + pt ) = a f + p a2j tj . 1j j 2j j j 2j j P P This gives f = (a1j + pa2j )fj + p2 a2j tj . We can repeat this process to find 6 RAYMOND C HEITMANN AND LINQUAN MA PP aij and since T is p-adically complete, we have f = ( i piโˆ’1 aij )fj . Therefore Q = (f1 , . . . , fn ) is finitely generated. Now to see A is Noetherian, it is enough to show A/pA = kฬ„ โŠ— k[[x1 , . . . , xdโˆ’1 ]] is Noetherian by the previous paragraph. We prove this by induction on d. The case d = 1 is clear. We now prove that every prime ideal Q in kฬ„ โŠ— k[[x1 , . . . , xdโˆ’1 ]] is finitely generated. Since k[[x1 , . . . , xdโˆ’1 ]] โˆ’โ†’ kฬ„ โŠ— k[[x1 , . . . , xdโˆ’1 ]] is integral, we have P = Q โˆฉ k[[x1 , . . . , xdโˆ’1 ]] with ht P = ht Q. If ht Q = 0 then Q = 0 since kฬ„ โŠ— k[[x1 , . . . , xdโˆ’1 ]] is a domain. If ht Q = ht P > 0, then Qฬ„ is a minimal prime of kฬ„ โŠ— (k[[x1 , . . . , xdโˆ’1 ]]/P ). But we have k[[y1 , . . . , ydโ€ฒ โˆ’1 ]] โˆ’โ†’ k[[x1 , . . . , xdโˆ’1 ]]/P for some dโ€ฒ < d by Cohenโ€™s structure theorem; hence kฬ„ โŠ— (k[[x1 , . . . , xdโˆ’1 ]]/P ), being a finite extension of kฬ„ โŠ— k[[y1 , . . . , ydโ€ฒ โˆ’1 ]], is Noetherian by our induction hypothesis. Therefore Qฬ„ is finitely generated and thus Q is finitely generated.  Returning to the development of our set-up, we next set B = S โŠ—R A. Since R โˆ’โ†’ S is module-finite and generically eฬtale, there exists a nonzero g โˆˆ R with ht(p, g)R = 2 such that R[(pg)โˆ’1 ] โˆ’โ†’ S[(pg)โˆ’1 ] is finite eฬtale. Thus A[(pg)โˆ’1 ] โˆ’โ†’ โˆž B[(pg)โˆ’1 ] is finite eฬtale. Let K โ—ฆ be the p-adic completion of W (kฬ„)[p1/p ] and โˆž โˆž 1/p 1/pโˆž K = K โ—ฆ [1/p]. Let Aโˆž,0 be the p-adic completion of A[p1/p , x1 , . . . , xdโˆ’1 ], which is an integral perfectoid K โ—ฆ -algebra. Furthermore, for g โˆˆ R โІ A as above, we let Aโˆž,0 โˆ’โ†’ Aโˆž be Andreฬโ€™s construction of integral perfectoid K โ—ฆ -algebras (for example see [3, Theorem 1.4]): it is the integral perfectoid K โ—ฆ -algebra of functions โˆž โˆž on the Zariski closed subset of Spa(Aโˆž,0 hT 1/p i[1/p], Aโˆž,0 hT 1/p i) defined by the ideal T โˆ’ g. More explicitly, Aโˆž can be described as the p-adic completion of the โˆž โˆž integral closure of Aโˆž,0 hT 1/p i/(T โˆ’ g) inside (Aโˆž,0 hT 1/p i/(T โˆ’ g))[1/p]. Andreฬ m proved that Aโˆž is almost faithfully flat over Aโˆž,0 mod p for every m (for example, see [3, Theorem 2.3]). More importantly, Andreฬ proved the following remarkable result: Theorem 3.5. [1, Theorem 0.3.1] Let A be a perfectoid algebra over a perfectoid field K of residue characteristic p. Suppose g โˆˆ Aโ—ฆ is a nonzerodivisor and A contains a compatible system of p-power roots of g. Let B โ€ฒ be a finite eฬtale A[ g1 ]algebra. Then (1) There exists a larger perfectoid algebra B between A and B โ€ฒ such that the inclusion A โˆ’โ†’ B is continuous. We have B[ g1 ] = B โ€ฒ and B โ—ฆ is contained โˆž โˆž in the integral closure of g โˆ’1/p Aโ—ฆ in B โ€ฒ and it is a (pg)1/p -almost isomorphism. โˆž (2) For every m, B โ—ฆ /pm is (pg)1/p -almost finite eฬtale over Aโ—ฆ /pm . โˆž Remark 3.6. It is easy to see that B โ—ฆ is (pg)1/p -almost isomorphic to the integral โˆž closure of Aโ—ฆ in B โ€ฒ : clearly this integral closure is (pg)1/p -almost contained in B โ—ฆ . Now suppose we have an equation y n + a1 y nโˆ’1 + ยท ยท ยท + an = 0 โˆž where n = pe and a1 , . . . , an belongs to g โˆ’1/p Aโ—ฆ . Then after multiplication by t t+e โˆž g 1/p , the above equation tells us that g 1/p y is integral over Aโ—ฆ and thus g 1/p B โ—ฆ โˆž is (pg)1/p -almost contained in the integral closure of Aโ—ฆ in B โ€ฒ . Notation 3.7. We will frequently use the following notation throughout the rest of the article. R will be a complete and unramified regular local ring and S a modulefinite domain extension of R. Fix a nonzero element g โˆˆ R with ht(p, g)R = 2 such EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS 7 that R[(pg)โˆ’1 ] โˆ’โ†’ S[(pg)โˆ’1 ] is finite eฬtale. We construct A as in the paragraph after Lemma 3.3, and construct B, Aโˆž,0 , Aโˆž as in the paragraph before Theorem 3.5. A will be the perfectoid algebra Aโˆž [pโˆ’1 ] and B โ€ฒ will be B โŠ—A Aโˆž [(pg)โˆ’1 ]. By Theorem 3.5 we have B and B โ—ฆ . The next lemma is well-known to some experts. We record it here for completeness. โˆž Lemma 3.8. Using the terminology of Notation 3.7, B โ—ฆ is (pg)1/p -almost flat over R. โˆž Proof. By Theorem 3.5 we know B โ—ฆ /pm is (pg)1/p -almost flat over Aโˆž /pm , and โˆž hence (pg)1/p -almost flat over A/pm by construction. Since A is flat over R,2 โˆž B โ—ฆ /pm is (pg)1/p -almost flat over R/pm for all m. But we also know that B โ—ฆ is p-torsion-free and p-adically complete since it is integral perfectoid. Now the same argument as in [15, Lemma 2.2] (simply replace A by R and Aโˆž by B โ—ฆ ) shows that โˆž B โ—ฆ is (pg)1/p -almost flat over R.  โˆž Lemma 3.9. Using the terminology of Notation 3.7, there exists a (pg)1/p -almost map from B โ—ฆ to S pg = Rpg . Proof. As W (kฬ„) is, up to p-adic completion, integral over W (k), we get an embedding W (kฬ„) โˆ’โ†’ R++ and hence a map A โˆ’โ†’ R++ (recall that A is the p-adic comโˆž 1/pโˆž 1/pโˆž pletion of RโŠ—W (k) W (kฬ„)). We next fix an embedding A[p1/p , x1 , . . . , xdโˆ’1 ] โˆ’โ†’ R++ . This in turn induces an embedding of the p-adic completions of the rings, i.e., an embedding ฮฑ : Aโˆž,0 โˆ’โ†’ R++ = S ++ . We next extend this to a homomorโˆž k k phism ฮฒ : Aโˆž,0 hT 1/p i โˆ’โ†’ S ++ which sends T 1/p to g 1/p . In particular, since โˆž ฮฒ(T โˆ’ g) = 0, we get an induced homomorphism Aโˆž,0 hT 1/p i/(T โˆ’ g) โˆ’โ†’ S ++ . โˆž Finally, since S ++ is integral perfectoid, it is (at least (p1/p )-almost) isomorphic to the integral closure of S ++ in S ++ [1/p]. Hence by the description of Aโˆž , we get โˆž a (p1/p )-almost map ฮณ : Aโˆž โˆ’โ†’ S ++ . This induces 1 โŠ— ฮณ : S โŠ—R Aโˆž โˆ’โ†’ S ++ . But S โŠ—R Aโˆž = S โŠ—R (A โŠ—A Aโˆž ) = B โŠ—A Aโˆž . So this map extends to an almost map ฮด from the integral closure of B โŠ—A Aโˆž in B โŠ—A Aโˆž [(pg)โˆ’1 ] to S pg . As B โ—ฆ โˆž is (pg)1/p -almost isomorphic to the integral closure of Aโˆž in B โŠ—A Aโˆž [(pg)โˆ’1 ] โˆž by Remark 3.6, we get a (pg)1/p -almost map from B โ—ฆ to S pg . The proof is complete.  We are ready to prove our main theorem in the unramified case. Theorem 3.10. Using the terminology of Notation 3.7, if I is an ideal of R and โˆž J โІ R, then (pg)1/p (IS : J) โІ (I : J)B โ—ฆ and consequently (IS : J) โІ (I : J)S epf . Proof. Because there exist a chain of maps: S โˆ’โ†’ B โˆ’โ†’ B โŠ— Aโˆž โˆ’โ†’ B โ—ฆ , โˆž we have (IS : J) โІ (IB โ—ฆ : J) and the later one is (pg)1/p -almost isomorphic โˆž to (I : J)B โ—ฆ because B โ—ฆ is (pg)1/p -almost flat over R by Lemma 3.8. Thus โˆž โˆž (pg)1/p (IS : J) โІ (I : J)B โ—ฆ . Next, by Lemma 3.9 there is a (pg)1/p -almost map โˆž from B โ—ฆ to S pg = Rpg . This implies that (pg)1/p (IS : J) โІ (I : J)S pg . 2In general, if A โˆ’โ†’ B is a map of p-adically complete and p-torsion-free rings with A Noetherian and A/p โˆ’โ†’ B/p flat, then A โˆ’โ†’ B is flat, see Remark 4.31 of [4]. 8 RAYMOND C HEITMANN AND LINQUAN MA So for every z โˆˆ (IS : J) and every วซ = z โˆˆ (I : J)S epf by Lemma 3.3. 1 pt , (pg)วซ z โˆˆ (I : J)S pg , and thus  Now we can prove the usual form of colon-capturing: Corollary 3.11. Using the terminology of Notation 3.7, suppose y1 , . . . , yn are โˆž parameters in S. Then (pg)1/p ((y1 , . . . , ynโˆ’1 )B โ—ฆ : yn ) โІ (y1 , . . . , ynโˆ’1 )B โ—ฆ . As a consequence, we have ((y1 , . . . , ynโˆ’1 )S : yn ) โІ (y1 , . . . , ynโˆ’1 )S epf . โˆž Proof. We first prove (pg)1/p ((y1 , . . . , ynโˆ’1 )B โ—ฆ : yn ) โІ (y1 , . . . , ynโˆ’1 )B โ—ฆ . Assume k of the elements yi actually belong to R. If k = n, the claim is true because โˆž B โ—ฆ is (pg)1/p -almost flat over R by Lemma 3.8. We now prove by induction on n โˆ’ k; the case n โˆ’ k = 0 is done. Suppose we have a counterexample with n โˆ’ k minimal. First suppose yn โˆˆ / R. Clearly (y1 , . . . , yn )S โˆฉ R is not contained in any minimal prime of (y1 , . . . , ynโˆ’1 )S; so there exists wn โˆˆ R such that ((y1 , . . . , ynโˆ’1 )B โ—ฆ : wn ) โЇ ((y1 , . . . , ynโˆ’1 )B โ—ฆ : yn ) and y1 , . . . , ynโˆ’1 , wn are paramโˆž eters in S. By the minimality assumption, we have (pg)1/p ((y1 , . . . , ynโˆ’1 )B โ—ฆ : โˆž yn ) โІ (pg)1/p ((y1 , . . . , ynโˆ’1 )B โ—ฆ : wn ) โІ (y1 , . . . , ynโˆ’1 )B โ—ฆ and so we did not have a counterexample. Thus we know yn โˆˆ R. Without loss of generality, we may now assume y1 โˆˆ / R. If an โˆˆ ((y1 , . . . , ynโˆ’1 )B โ—ฆ : yn ), we have an equation a1 y1 + ยท ยท ยท + an yn = 0 with each ai โˆˆ B โ—ฆ . Then a1 โˆˆ ((y2 , . . . , yn )B โ—ฆ : y1 ). The โˆž โ—ฆ argument we used above nowP shows (pg)1/p aP 1 โˆˆ (y2 , . . . , yn )B . Consider any n n t วซ วซ วซ = 1/p . We have (pg) a1 = i=2 bi yi . Then i=2 (bi y1 + (pg) ai )yi = 0 and so bn y1 + (pg)วซ an โˆˆ ((y2 , . . . , ynโˆ’1 )B โ—ฆ : yn ). Since we have decreased n but not k, n โˆ’ k has been decreased and so (pg)วซ (bn y1 + (pg)วซ an ) โˆˆ (y2 , . . . , ynโˆ’1 )B โ—ฆ . Thus โˆž (pg)2วซ an โˆˆ (y1 , . . . , ynโˆ’1 )B โ—ฆ . Hence (pg)1/p an โˆˆ (y1 , . . . , ynโˆ’1 )B โ—ฆ . This finishes the proof of the first conclusion. Finally, for every z โˆˆ ((y1 , . . . , ynโˆ’1 )S : yn ) and every วซ = p1t , z โˆˆ ((y1 , . . . , ynโˆ’1 )B โ—ฆ : yn ) and so we have (pg)วซ z โˆˆ (y1 , . . . , ynโˆ’1 )B โ—ฆ . Now by Lemma 3.9, (pg)วซ z โˆˆ (y1 , . . . , ynโˆ’1 )S pg and thus z โˆˆ (y1 , . . . , ynโˆ’1 )S epf by Lemma 3.3.  Our next objective is to extend Theorem 3.10 to the ramified case. Theorem 3.12. Let Rโ€ฒ be a (possibly ramified) complete regular local ring of mixed characteristic p and let the integral domain S be a finite extension of Rโ€ฒ . If I is an ideal of Rโ€ฒ and J โІ Rโ€ฒ , then (IS : J) โІ (I : J)S epf . Proof. Rโ€ฒ is a finite extension of an unramified complete local ring R. We choose g so that R[(pg)โˆ’1 ] โˆ’โ†’ S[(pg)โˆ’1 ] is finite eฬtale, and (p, g)R is a height two ideal. We now use the standard framework of Notation 3.7. We first note that, just as in the proof of Theorem 3.10, our Lemma 3.9 and Lemma 3.3 will give us the โˆž desired result provided we can prove (pg)1/p (IB โ—ฆ : J) โІ (I : J)B โ—ฆ . Thus we will โˆž be done if we can show B โ—ฆ is (pg)1/p -almost flat over Rโ€ฒ . This follows formally from the fact that Rโ€ฒ is regular and every system of parameters of Rโ€ฒ (in fact S) โˆž is a (pg)1/p -almost regular sequence on B โ—ฆ by Corollary 3.11. We give a detailed argument below. โˆž Claim. B โ—ฆ is (pg)1/p -almost flat over Rโ€ฒ . โ€ฒ โ—ฆ 1/pโˆž Proof of Claim. It is enough to show TorR -almost zero for all i (N, B ) is (pg) finitely generated Rโ€ฒ -modules N and every i > 0. We use descending induction. โ€ฒ โ—ฆ This is clearly true when i > dim Rโ€ฒ since Rโ€ฒ is regular. Now suppose TorR k+1 (N, B ) โ€ฒ โˆž โ—ฆ is (pg)1/p -almost zero for all finitely generated N . We want to show TorR k (N, B ) EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS 9 โˆž is (pg)1/p -almost zero for all finitely generated N . By considering a prime cyclic filtration of N , it is enough to prove this for N = Rโ€ฒ /P . Let h = ht P . We can pick a regular sequence x1 , . . . , xh โˆˆ P . Now P is an associated prime of (x1 , . . . , xh ) and so we have 0 โˆ’โ†’ Rโ€ฒ /P โˆ’โ†’ Rโ€ฒ /(x1 , . . . , xh ) โˆ’โ†’ C โˆ’โ†’ 0. The long exact sequence for Tor gives: โ€ฒ โ€ฒ โ€ฒ R R โ—ฆ โ€ฒ โ—ฆ โ€ฒ โ—ฆ TorR k+1 (C, B ) โˆ’โ†’ Tork (R /P, B ) โˆ’โ†’ Tork (R /(x1 , . . . , xh ), B ). โ€ฒ โ€ฒ โ—ฆ โ—ฆ 1/p Now TorR -almost zero bek (R /(x1 , . . . , xh ),โˆžB ) = Hk (x1 , . . . , xh , B ) is (pg) 1/p โ—ฆ cause x1 , . . . , xh is a (pg) -almost regular sequence on B by Corollary 3.11, and โ€ฒ โ€ฒ โ—ฆ 1/pโˆž โ€ฒ โ—ฆ TorR -almost zero by induction. It follows that TorR k+1 (C, B ) is (pg) k (R /P, B ) โˆž 1/p is (pg) -almost zero.  โˆž Remark 3.13. The analog of Theorem 3.10 and Theorem 3.12 in equal characteristic p > 0 is true if we replace extended plus closure by tight closure (in fact, even by the plus closure): suppose R โˆ’โ†’ S is a module-finite extension of excellent local domains of characteristic p > 0 with R regular, let I, J be ideals of R, then we have (IS : JS) โІ (I : J)S โˆ— . To see this, let z โˆˆ (IS : JS), then since we have R โˆ’โ†’ S โˆ’โ†’ R+ , we know that z โˆˆ (IR+ : JR+ ). Since R is regular and R+ is a balanced big Cohen-Macaulay algebra in characteristic p > 0, R+ is faithfully flat over R and thus (IR+ : JR+ ) = (I : J)R+ . Hence z โˆˆ (I : J)R+ โˆฉ S = (I : J)S + โІ (I : J)S โˆ— . Theorem 3.14. Let Rโ€ฒ be a (possibly ramified) complete regular local ring of mixed characteristic p and let the integral domain S be finite over Rโ€ฒ . Let M be an Rโ€ฒ โ€ฒ N module. Then there exists c โˆˆ Rโ€ฒ such that the natural map cวซ TorR i (S, M )/p โˆ’โ†’ โ€ฒ R + N Tori (S , M )/p is zero for all i โ‰ฅ 1 and every N, วซ > 0. Consequently, for every โ€ฒ N โ€ฒ วซ โ€ฒ+ ฮฑ โˆˆ TorR i (R , M )/p , there exists c โˆˆ R such that c ฮฑ = 0 for every วซ. Proof. As before, Rโ€ฒ is a finite extension of an unramified complete regular local ring R. We choose g so that R[(pg)โˆ’1 ] โˆ’โ†’ S[(pg)โˆ’1 ] is finite eฬtale, and (p, g)R is a height two ideal. We now use the standard framework of Notation 3.7. By โˆž the Claim in the proof of Theorem 3.12, B โ—ฆ is (pg)1/p -almost flat over Rโ€ฒ . Thus โ€ฒ โ€ฒ โˆž โˆž R (pg)1/p Tori (B โ—ฆ , M ) = 0 for all i > 0. It follows that (pg)1/p TorR i (S, M ) โˆ’โ†’ โ€ฒ โ€ฒ pg โ—ฆ TorR through TorR i (S , M ) is zero since it factors i (B , M ) by Lemma 3.9. At this pg 1/pโˆž point, we note that S is (pg) -almost isomorphic to S ++ by Lemma 3.3; thus โ€ฒ โ€ฒ โˆž R ++ the map (pg)1/p Tori (S, M ) โˆ’โ†’ TorR , M ) is also zero. Finally, tensoring i (S the commutative diagram / S+ 0 ยทpN / S+ / S + /pN   / S ++ / S ++ /pN /0 =  / S ++ 0 N ยทp with M induces a commutative diagram:  โ€ฒ + N TorR i (S , M )/p /0 โ€ฒ + N / TorR i (S /p , M ) =   โ€ฒ ++ TorR , M )/pN  i (S  / TorRโ€ฒ (S ++ /pN , M ) i 10 RAYMOND C HEITMANN AND LINQUAN MA By the injectivity of the map on the first line of the above diagram, in order to show โ€ฒ โˆž Rโ€ฒ + N the image of (pg)1/p TorR i (S, M ) is zero in Tori (S , M )/p , it suffices to prove โ€ฒ + N its image is zero in TorR i (S /p , M ), which is clear because it factors through โ€ฒ Rโ€ฒ ++ N ++ Tori (S , M )/p and we already know the image is zero in TorR , M ).  i (S โ€ฒ+ N Remark 3.15. We cannot assert that TorR is almost zero or that i (R , M )/p + โ€ฒ N R /p is almost flat because each S requires its own c. โ€ฒ The next theorem is a simple consequence of our results, following directly from Corollary 3.11 and Theorem 2.8. However, as our proof relies heavily on Andreฬโ€™s very deep perfectoid Abhyankar lemma, we would like to offer a more direct proof based on our earlier work on the vanishing conjecture for maps of Tor. Theorem 3.16. Let R be a regular local ring of mixed characteristic and let I be an ideal of R. Then I epf = I. Proof. We first claim that for every c 6= 0 in R, there exists e such that the natural e map R โˆ’โ†’ R+ sending 1 to c1/p is pure. We prove this by contradiction. Suppose e there exists c 6= 0 such that for every e, the map R โˆ’โ†’ R+ sending 1 โˆ’โ†’ c1/p is ยทc1/p e not pure. Let x1 , . . . , xd be a regular system of parameters of R. Since R โˆ’โˆ’โˆ’โˆ’โ†’ R+ ยทc1/p e d d d (R) โˆ’โˆ’โˆ’โˆ’โ†’ Hm is not pure, the map Hm (R) to (R+ ) sends the socle element of Hm 0, i.e., there exists t (depending on e) such that (1) e t+1 t+1 + c1/p (x1 x2 ยท ยท ยท xd )t โˆˆ (xt+1 1 , x2 , . . . , xd )R . Next we claim that for every t > 0, (2) t+1 t+1 + t + ((xt+1 1 , x2 , . . . , xd )R : (x1 x2 ยท ยท ยท xd ) ) โІ (x1 , . . . , xd )R . t+1 t+1 + To see this, suppose u(x1 x2 ยท ยท ยท xd )t โˆˆ (xt+1 but u is not in 1 , x2 , . . . , xd )R (x1 , . . . , xd )R+ . Then there exists a domain S module-finite over R such that t+1 t+1 u(x1 x2 ยท ยท ยท xd )t โˆˆ (xt+1 1 , x2 , . . . , xd )S. Say u(x1 x2 ยท ยท ยท xd )t = r1 xt+1 + ยท ยท ยท + rd xt+1 1 d . Then (r1 , . . . , rd , โˆ’u) represents a class in TorR 1( R t+1 (xt+1 1 , . . . , xd , (x1 x2 ยท ยท ยท xd )t ) , S). Since u โˆˆ / (x1 , . . . , xd )R+ , u โˆˆ / (x1 , . . . , xd )S. By the valuation criterion for integral closure, we know that there exists a mixed characteristic DVR V such that u โˆˆ / (x1 , . . . , xd )V . This means (r1 , . . . , rd , โˆ’u) represents a nonzero class in t+1 t+1 t TorR 1 (R/(x1 , . . . , xd , (x1 x2 ยท ยท ยท xd ) ), V ). But this contradicts the vanishing conjecture for maps of Tor in mixed characteristic e [9, Theorem 1.3] applied to R โˆ’โ†’ S โˆ’โ†’ V . Now (1) and (2) shows that c1/p โˆˆ (x1 , . . . , xd )R+ for all e > 0. But this is clearly impossible by computing valuations. Finally, suppose x โˆˆ I epf , then for some c 6= 0, cวซ x โˆˆ (I, pN )R+ for every N, วซ. e Since the map R โˆ’โ†’ R+ sending 1 โˆ’โ†’ c1/p is pure for some e, we know that x โˆˆ (I, pN )R for every N . This implies x โˆˆ I and hence I epf = I.  We also have completed a closure-based proof of the Briancฬงon-Skoda Theorem. EXTENDED PLUS CLOSURE IN COMPLETE LOCAL RINGS 11 Theorem 3.17. [14] Let R be a regular ring and let I be an ideal of R generated by n elements. Then the integral closure of I d+n is contained in I d+1 . Proof. It suffices to prove the result locally and so we can assume that we have either an equicharacteristic regular local ring or a mixed characteristic regular local ring. Hochster and Huneke have proved the result in the equal characteristic case. See [10, Theorem 5.4] for equal characteristic p case and [11] for equal characteristic 0 case (or [13, section 9.6] for generalizations in the equal characteristic 0 case using multiplier ideals). We can now handle the mixed characteristic case. By Theorem 2.7, we know that the integral closure of I d+n is contained in (I d+1 )epf . Theorem 3.16 completes the proof.  References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] Y. Andreฬ, Le lemme dโ€™Abhyankar perfectoide, arXiv:1609.00320. Y. Andreฬ, La conjecture du facteur direct, arXiv:1609.00345. B. Bhatt, On the direct summand conjecture and its derived variant, arXiv:1608.08882. B. Bhatt, M. Morrow and P. Scholze, Integral p-adic Hodge theory, arXiv:1602.03148. O. Gabber and L. Romero, Almost ring theory, Lecture Notes in Mathematics, vol. 1800, Springer-Verlag, Berlin, 2003. R. Heitmann, The plus closure in mixed characteristic, J. of Algebra 193 (1997), 688โ€“708. R. Heitmann, Extensions of plus closure, J. of Algebra 238 (2001), 801โ€“826. R. Heitmann, The direct summand conjecture in dimension three, Ann. of Math. 156 (2002), 695โ€“712. R. Heitmann and L. Ma, Big Cohen-Macaulay algebras and the vanishing conjecture for maps of Tor in mixed characteristic, arXiv:1703.08281. M. Hochster and C. Huneke, Tight closure, invariant theory, and the Briancฬงon-Skoda theorem, J. Amer. Math. Soc. 3 (1990), 31โ€“116. M. Hochster and C. Huneke, Tight closure in equal characteristic zero, preprint. M. Hochster and C. Huneke, Tight closure and elements of small order in integral extensions, J. of Pure & Appl. Algebra 71 (1991), 233โ€“247. R. Lazarsfeld, Positivity in algebraic geometry. II, Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics], vol. 49, Springer-Verlag, Berlin, 2004. J. Lipman and A. Sathaye, Jacobian ideals and a theorem of Briancฬงon-Skoda, Michigan Math. J. 28 (1981), 199โ€“222. L. Ma and K. Schwede, Perfectoid multiplier/test ideals in regular rings and bounds on symbolic powers, arXiv:1705.02300. P. Scholze, Perfectoid spaces, Publ. Math. Inst. Hautes Eฬtudes Sci. 116 (2012), 245โ€“313.
0math.AC
arXiv:1711.08410v1 [math.GR] 22 Nov 2017 LATTICE ENVELOPES URI BADER, ALEX FURMAN, AND ROMAN SAUER Abstract. We introduce a class of countable groups by some abstract grouptheoretic conditions. It includes linear groups with finite amenable radical and finitely generated residually finite groups with some non-vanishing โ„“2 Betti numbers that are not virtually a product of two infinite groups. Further, it includes acylindrically hyperbolic groups. For any group ฮ“ in this class we determine the general structure of the possible lattice embeddings of ฮ“, i.e. of all compactly generated, locally compact groups that contain ฮ“ as a lattice. This leads to a precise description of possible non-uniform lattice embeddings of groups in this class. Further applications include the determination of possible lattice embeddings of fundamental groups of closed manifolds with pinched negative curvature. 1. Introduction 1.1. Motivation and background. Let G be a locally compact second countable group, hereafter denoted lcsc1. Such a group carries a left-invariant Radon measure unique up to scalar multiple, known as the Haar measure. A subgroup ฮ“ < G is a lattice if it is discrete, and G/ฮ“ carries a finite G-invariant measure; equivalently, if the ฮ“-action on G admits a Borel fundamental domain of finite Haar measure. If G/ฮ“ is compact, one says that ฮ“ is a uniform lattice, otherwise ฮ“ is a nonuniform lattice. The inclusion ฮ“ ึ’โ†’ G is called a lattice embedding. We shall also say that G is a lattice envelope of ฮ“. The classical examples of lattices come from geometry and arithmetic. Starting from a locally symmetric manifold M of finite volume, we obtain a lattice embedding ฯ€1 (M ) ึ’โ†’ Isom(Mฬƒ ) of its fundamental group into the isometry group of its universal covering via the action by deck transformations. The real Lie group Isom(Mฬƒ ) is semi-simple if Mฬƒ has no Euclidean direct factors, and the lattice ฮ“ < Isom(Mฬƒ ) is uniform if and only if M is compact. The fact that semi-simple real Lie groups are algebraic and can be expressed as zero sets of polynomials allows to construct arithmetic lattices, such as SLd (Z) < SLd (R). 2000 Mathematics Subject Classification. Primary 20565; Secondary 22D05. Key words and phrases. Locally compact groups, lattices, geometric group theory. In part, U.B. and A.F. were supported by BSF grant 2008267 and A.F. by NSF grant DMS 1611765. All three authors thank MSRI for its support during the Geometric Group Theory Program. 1If G is, in addition, totally disconnected we call G a tdlc group. 1 2 URI BADER, ALEX FURMAN, AND ROMAN SAUER Analogous constructions exist for products of real and p-adic algebraic semi-simple groups, such as SLd (Z[ 1 1 , . . . , ]) < SLd (R) ร— SLd (Qp1 ) ร— ยท ยท ยท ร— SLd (Qpk ). p1 pk Our notations and conventions for arithmetic lattices are defined in ยง4.1 below. A central theme in the study of lattices are the connections between the lattices and the ambient group. Mostowโ€™s Strong Rigidity ([52] for the uniform case, [45,57] for the non-uniform case) asserts that an irreducible lattice in a semi-simple real Lie group G 6โ‰ƒ SL2 (R) determines the ambient Lie group among all Lie groups and determines its embedding in the ambient Lie group uniquely up to an automorphism of G. It is natural to ask to what extent lattices determine their lattice envelopes among all lcsc groups, and which countable groups have only trivial lattice envelopes. To make the question precise we introduce the notion of virtual isomorphism between lattice embeddings in Definition 3.1, which generalizes the notion of weak commensurability or virtual isomorphism of abstract groups (see Definition 2.2). A lattice embedding is called trivial if it is virtually isomorphic to the identity homomorphism of a countable discrete group, which can be regarded as a lattice embedding. Virtual isomorphism is an equivalence relation. We refer to ยง3.1 for more information. Problem 1.1. Given a countable group ฮ“, describe all its possible lattice envelopes up to virtual isomorphism. In the study of lattices, the non-uniform lattices are often harder to work with when compared to uniform ones. For example, the condition of integrability of lattices (e.g. required for different purposes in [4, 37, 46, 50, 64]) and the spectral gap condition (also known as weak cocompactness, which is e.g. required in [41]) are automatically satisfied by uniform lattices and can be proven for some examples of non-uniform lattices, often using elaborate arguments. This motivates the following. Problem 1.2. How prevalent are non-uniform lattice embeddings? 1.2. Main result. To state our main result, Theorem A, towards Problem 1.1 we need to put some conditions on the group ฮ“. Definition 1.3. We say that a countable group ฮ“ has property โ€ข (BT) if there is an upper bound on the order of finite subgroups of ฮ“. โ€ข (Irr) if ฮ“ is not virtually isomorphic to a product of two infinite groups. โ€ข (CAF) if every amenable commensurated subgroup of ฮ“ is finite. โ€ข (NbC) if for every normal subgroup N โŠณ ฮ“ and every commensurated subgroup M < ฮ“ such that N โˆฉ M = {1} there is a finite index subgroup of M that commutes with N . The abbreviations stand for Bound on Torsion, Irreduciblity, Commensurated Amenable is Finite, and Normal by Commensurated. For the definition of commensurated subgroup see ยง2.1. In ยง2 we prove the following result that shows that large classes of groups satisfy the above conditions, and we also describe these classes in more detail. LATTICE ENVELOPES 3 Theorem 1.4. The following countable groups have property (CAF): (1) Groups with a non-vanishing โ„“2 -Betti number in some degree. (2) Linear groups with finite amenable radical. (3) Groups in the class Dreg introduced in [68]. This class contains all acylindrically hyperbolic groups and thus non-elementary convergence groups. Further, the following countable groups have property (NbC): (1โ€™) Groups with non-vanishing first โ„“2 -Betti number. (2โ€™) Linear groups. (3โ€™) Finitely generated residually finite groups. (4โ€™) Groups in the class Dreg . The groups in (1โ€™) and (4โ€™) also have the property (Irr). The statement about (NbC) for the groups of case (3โ€™) is due to CapraceKropholler-Reid-Wesolek [20, Corollary 18]. Of course, linear groups fall into this case provided they are finitely generated. The next theorem was announced in [5] with a slightly stronger formulation of the (NbC) and (CAF) condition. It gives a partial answer to Problem 1.1 that concerns possible lattice envelopes of a given group ฮ“. We impose no restriction on the lattice envelope, except for it being compactly generated. This condition can also be removed if ฮ“ is assumed to be finitely generated (see Lemma 3.6). Theorem A (Structure of possible lattice envelopes). Let ฮ“ be a countable group with properties (Irr), (CAF), and (NbC), and let ฮ“ < G be a non-trivial lattice embedding into a compactly generated lcsc group G. Then the lattice embedding ฮ“ ึ’โ†’ G is virtually isomorphic to one of the following: (1) an irreducible lattice in a connected, center-free, semi-simple real Lie group without compact factors, or (2) the inclusion of a subgroup commensurable with H(O[S]) into a (possibly trivial) tree extension of HK,S , where S, being a finite set of places compatible with H, and H, K are as in ยง4.1. (3) a lattice in a non-discrete totally disconnected locally compact group without normal amenable subgroups. If in addition ฮ“ has (BT), then the lattice in (3) is uniform. For the notion of tree extension see Definition 4.3. The three cases are distinct (see Remark 4.2). We show in Example 2.14 the necessity of the condition (NbC) for the theorem above. The classical case of lattices in semi-simple real Lie groups includes both arithmetic and non-arithmetic examples (non-arithmetic lattices can appear only in SO(n, 1) and SU(n, 1)). The case of S-arithmetic lattices in the above statement refers to irreducible lattices in a product of finitely many real semi-simple Lie groups and p-adic ones, where factors of both types are present. Case (3) contains a large class of examples that includes lattices in p-adic groups, and fundamental groups ฮ“ of some finite cubical complexes whose universal cover has a non-discrete group of automorphisms. This last case remains quite mysterious although a structure theory of non-discrete, simple, totally disconnected groups emerged in the last decade (in this regard, Capraceโ€™s survey [19] is recommended). However assuming property (BT) the last case does not allow non-uniform lattices. Hence we obtain the following partial solution to Problem 1.2. 4 URI BADER, ALEX FURMAN, AND ROMAN SAUER Corollary 1.5 (Classification of non-uniform lattices). Let ฮ“ be a countable group with properties (BT), (Irr), (CAF), and (NbC). Then every non-uniform lattice embedding ฮ“ ึ’โ†’ G of ฮ“ is virtually isomorphic to either (1) an irreducible lattice in a connected, center free, semi-simple real Lie group without compact factors, or (2) a (possibly trivial) tree extension of an S-arithmetic lattice with both real and p-adic factors present. In particular, every lattice embedding of ฮ“ is weakly compact, and, with the exception of lattice embeddings into Lie groups isogenous to SL2 (R) or SL2 (C), every lattice embedding of ฮ“ is square integrable. This is a direct corollary except for the last statement which is a consequence of results about weak compactness and square integrability of classical lattices: Weak compactness of lattices in connected semi-simple Lie groups is stated in [47, III.1.12 on p. 113] and proved in [8, Lemma 3]. Weak compactness of lattices in S-arithmetic groups as in Setup 4.1 follows from the stronger property (T) [47, III.5]. The statement about square integrability is taken from Shalomโ€™s work (see [64, ยง2] for the S-arithmetic and higher rank case and [65, Theorem 3.7] for the rank 1 case). 1.3. Applications. As applications of our main result, we now present more precise classification results of lattice envelopes for specific groups. Their proofs can be found in ยง6. Theorem B (Mostow rigidity with locally compact targets). Let ฮ“ < H be either an irreducible lattice in a center-free, real semi-simple Lie group H without compact factors and H 6โ‰ƒ SL2 (R), or an S-arithmetic lattice H(O[S]) < HK,S as in Setup 4.1. Then any other lattice embedding of ฮ“ < G into an lcsc group G is virtually isomorphic to ฮ“ < H. This theorem may be viewed as a generalization of Mostowโ€™s Strong Rigidity, corresponding to the special case of Theorem B, where H is a real semi-simple Lie group and G is also known to be a semi-simple real Lie group (in most accounts one even assumes G = H and the focus is on aligning two given lattice embeddings of ฮ“ in G by an automorphism of G). In fact, Mostow considered the case of uniform lattice embeddings [52]; the non-uniform were later obtained by Prasad [57] and Margulis [45]. In [33] the second author proved Theorem B for the case of a simple real Lie group H with rkR (H) โ‰ฅ 2 and a general lattice envelope ฮ“ < G, and for the case of rank-one real Lie group H and a uniform lattice envelope ฮ“ < G. The case of H = PSL2 (R) is excluded from Theorem B for two reasons. First, strong rigidity does not hold in this setting โ€“ the moduli space of embeddings of a surface group in the same group G = H = PSL2 (R) is multidimensional. Secondly, non-uniform lattices in PSL2 (R), that are virtually free groups of finite rank 2 โ‰ค n < โˆž, can be embedded as a lattice in completely different lcsc groups, such as PGL2 (Qp ), or the automorphism group Aut(T ) of a locally finite tree T . Our next results show that all examples are related to the ones mentioned above. Theorem C (Lattice embeddings of free groups). Let ฮ“ be a finite extension of a finitely generated non-abelian free group Fn and let ฮ“ < G be a non-trivial lattice embedding. LATTICE ENVELOPES 5 (1) If ฮ“ < G is non-uniform, then it is virtually isomorphic to a non-uniform lattice in PSL2 (R). (2) If ฮ“ < G is uniform, then it is virtually isomorphic to a lattice in a closed cocompact subgroup of the automorphism group of a tree. Note that the second possibility in the Theorem includes such examples as PGL2 (Qp ) or other rank-one non-Archimedean groups. For uniform lattices in PSL2 (R), such as surface groups, the possibilities for lattice embeddings are even more restricted. Theorem D (Lattice embeddings of surface groups). Let ฮ“ be a uniform lattice in PSL2 (R). Any other non-trivial lattice embedding of ฮ“ is virtually isomorphic to a uniform lattice embedding into PSL2 (R). Let M be a manifold that admits a Riemannian metric with strictly negative sectional curvature, but is not homeomorphic to a locally symmetric one. We conjecture that fundamental groups of such manifolds ฮ“ = ฯ€1 (M ) have no nontrivial lattice envelopes. Under an additional pinching assumption, we are able to prove this. Theorem E (Lack of lattice embeddings in pinched negative curvature). The fundamental group of a closed Riemannian manifold M of dimension n โ‰ฅ 5 whose sectional curvatures range in   1 2 ) , โˆ’1 โˆ’(1 + nโˆ’1 does not admit a non-trivial lattice embedding unless M is homeomorphic to a closed hyperbolic manifold. Some remarks about this result are in order. Gromov and Thurston [38] construct infinitely many examples of negatively curved manifolds with the above pinching in dimensions n โ‰ฅ 4 that are not homeomorphic to hyperbolic manifolds. By taking connected sums of a hyperbolic manifold with an exotic sphere Farrell and Jones construct closed smooth manifolds that are homeomorphic to a hyperbolic manifold but whose smooth structure does not support a hyperbolic Riemannian metric [30]. We recommend the survey [31] by Farrell, Jones and Ontaneda on these issues. Finally, we obtain the following surprising characterization of free groups. (2) Theorem F (Non-uniform lattice embeddings of groups with ฮฒ1 > 0). Let ฮ“ be a group with non-vanishing first โ„“2 -Betti number that has an upper bound on the order of its finite subgroups. If ฮ“ possesses a non-uniform compactly generated lattice envelope, then ฮ“ has a non-abelian free subgroup of finite index. 1.4. Structure of the paper. We devote most of ยง2 to the proof of Theorem 1.4. We discuss an example by Burger and Mozes in ยง2.4 that shows the necessity of the condition (NbC); if one drops (NbC) while still keeping (CAF) then there are exotic lattice embeddings that are not covered by the three cases of Theorem A. The definition of virtually isomorphism of lattice embeddings and the tools of the trade for the proof of Theorem A are provided in ยง3. The most difficult proof in ยง3 is the result about outer automorphisms of S-arithmetic lattices (Theorem 3.13). While this result is known or expected to hold by the experts there was no proof so far in the required generality. We hope its proof provides a useful reference. 6 URI BADER, ALEX FURMAN, AND ROMAN SAUER The bulk of the paper is devoted to the proof of Theorem A in ยง5. The paper [5] in which we announced the results of this paper and provided proofs in special cases might be helpful for the reader. In the first step of the proof we rely on property (CAF) and the positive solution of Hilbertโ€™s 5th problem to show that the given lattice embedding ฮ“ < G is virtually isomorphic to one into a product of a semi-simple Lie group L and a totally disconnected group D. So we may assume that G = L ร— D. Let U < D be a compact-open subgroup. In the second step of the proof we split L further as L = L0 ร— L1 in a way so that the projection of ฮ“ to L1 is dense. Depending on the finiteness of ฮ“ โˆฉ (L ร— U ) and ฮ“ โˆฉ ({1} ร— L1 ร— U ), we distinguish three cases in the third step which correspond to the cases (1), (2) or (3) of the statement of Theorem A. The second case is the most sophisticated. Here we have to identify the lattice ฮ“ โˆฉ ({1} ร— L1 ร— Dโ€ฒ ) < L1 ร— Dโ€ฒ , where Dโ€ฒ < D is a certain closed cocompact subgroup, as an S-arithmetic lattice, and Dโ€ฒ with the corresponding non-Archimedean factor. This identification is an arithmeticity theorem which is proved in our companion paper [6] and heavily relies on Margulisโ€™ commensurator rigidity. We actually prove in that paper a result of greater generality which does not assume compact generation of the ambient group. The version needed here is only slightly more general than the arithmeticity theorem by Caprace and Monod in [23, Theorem 5.20]. Our basic setup for S-arithmetic groups and a detailed explanation of the arithmeticity theorem is provided in ยง4. Further, we use Margulisโ€™ normal subgroup theorem and the aforementioned result on outer automorphism groups to conclude that L = L1 and L0 = {1} in the second case. The condition on (NbC) appears just once in the whole proof, namely in the third step of the proof, in Lemma 5.9. The final step of the proof identifies the difference between L ร— Dโ€ฒ and L ร— D as a tree extension in the sense of Setup 4.1. Important ingredients here are the fact that D and Dโ€ฒ are quasi-isometric, the quasi-isometry rigidity theorem of KleinerLeeb [42] and the work of Mosher-Sageev-White [51]. In the proof of the applications, that is Theorems Bโ€“F, a major step is always to identify the most mysterious case, namely (3), in Theorem A. To this end, we appeal to ideas of geometric group theory as in the final step of the proof of Theorem A. This is based on the fact that a lattice with property (BT) is quasi-isometric to any of its totally disconnected lattice envelopes. 2. The properties (BT), (Irr), (CAF), and (NbC) We describe the classes in Theorem 1.4 in more detail. In ยง2.3 we prove Theorem 1.4. In ยง2.4 we describe an exotic lattice embedding of a group that does not have property (NbC). 2.1. Commensurated and commensurable groups. We recall the following well known definitions. Definition 2.1. A subgroup A of ฮ“ is commensurated by a subset S โŠ‚ ฮ“ if sโˆ’1 Asโˆฉ A has finite index in sโˆ’1 As and A for every s โˆˆ S. If A < ฮ“ is commensurated by all of ฮ“ we just say that A < ฮ“ is commensurated. Definition 2.2. Two groups ฮ“ and ฮ› are commensurable if there are subgroups ฮ“โ€ฒ < ฮ“ and ฮ›โ€ฒ < ฮ› of finite index such that ฮ“โ€ฒ โˆผ = ฮ›โ€ฒ . In this case we write ฮ“ โ‰ƒ ฮ›. Further, ฮ“ and ฮ› are weakly commensurable or virtually isomorphic if there are LATTICE ENVELOPES 7 subgroups ฮ“โ€ฒ < ฮ“ and ฮ›โ€ฒ < ฮ› of finite index and finite normal subgroups N โŠณ ฮ“โ€ฒ and M โŠณ ฮ›โ€ฒ such that ฮ“โ€ฒ /N โˆผ = ฮ›โ€ฒ /M . The notion of virtual isomorphism is generalized to lattice embeddings in Definition 3.1. The proof of the following easy lemma is left to the reader. Lemma 2.3. Being commensurated is preserved in the following situations: (1) Preimages of commensurated subgroups under homomorphisms are commensurated. (2) Intersections of commensurated subgroups are commensurated. (3) A finite index subgroup of a commensurated subgroup is itself commensurated. Both (CAF) and (NbC) are not necessarily preserved if one passes to a weakly commensurable group. They are, however, preserved by passing to quotients by finite kernels. Lemma 2.4. Let K โŠณ ฮ“ be a finite normal subgroup. If ฮ“ has property (CAF), then ฮ“/K has (CAF). Proof. Let p : ฮ“ โ†’ ฮ“/K be the projection. Let A < ฮ“/K be an amenable, commensurated subgroup. Then pโˆ’1 (A) < ฮ“ is commensurated by Lemma 2.3. Since pโˆ’1 (A) is a finite extension of A, it is amenable too. By the property (CAF) the group pโˆ’1 (A) is finite, thus A is finite.  Lemma 2.5. Let K โŠณ ฮ“ be a finite normal subgroup. If ฮ“ has property (NbC), then ฮ“/K has (NbC). Proof. Let M, N be subgroups of ฮ“/K such that M โˆฉ N = {1}, M โŠณ ฮ“/K, and M < ฮ“/K is commensurated. Then pโˆ’1 (M ) < ฮ“ and pโˆ’1 (N ) < ฮ“ satisfy the same properties (see Lemma 2.3). Hence there is a finite index subgroup of pโˆ’1 (M ) that commutes with pโˆ’1 (N ). Its projection is a finite index subgroup of M that commutes with N .  2.2. Groups in the class Dreg and acylindrically hyperbolic groups. The class Dreg was introduced by Thom [68]. It is closely related to the class Creg of Monod-Shalom. Both Dreg and Creg are an attempt to define negative curvature for groups in a cohomological way. The definition of Dreg is analytical. Let ฯ€ : ฮ“ โ†’ U (H) be a unitary representation. A map c : ฮ“ โ†’ H is a quasi-1cocycle for ฯ€ if ฮ“ ร— ฮ“ โˆ‹ (g, h) 7โ†’ ฯ€(g)c(h) โˆ’ c(gh) + c(g) โˆˆ H is uniformly bounded on ฮ“ ร— ฮ“. The vector space of quasi-1-cocycles modulo the bounded ones forms a group QH 1 (ฮ“, H). The class Dreg is the class of groups for which QH 1 (ฮ“, โ„“2 (ฮ“)) has non-zero L(ฮ“)-dimension in the sense of Luฬˆck [44, Section 6.1]. More concrete is the description of non-amenable groups in Dreg : Proposition 2.6 ([68, Corollary 2.5]). A non-amenable group ฮ“ is in Dreg if and only if there is an unbounded quasi-1-cocycle ฮ“ โ†’ โ„“2 (ฮ“). The following theorem was proved by Bestvina-Fujiwara [9] and Hamenstaฬˆdt [39] for classes of groups that were later identified as acylindrically hyperbolic groups by Osin [54]. 8 URI BADER, ALEX FURMAN, AND ROMAN SAUER Theorem 2.7 ([54, Theorem 8.3]). The class Dreg strictly contains the class of acylindrically hyperbolic groups. We also mention the following result of Sun [67]. Theorem 2.8. Non-elementary convergence groups are acylindrically hyperbolic. Remark 2.9. In the sequel, we show properties (NbC) and (CAF) for groups in Dreg . Using the difficult Theorem 2.7 this implies (NbC) and (CAF) for acylindrically hyperbolic groups. We emphasize, however, that one can deduce (CAF) and (NbC) directly and quite easily for acylindrically hyperbolic groups. For example, (CAF) follows directly from [54, Corollary 1.5] and the non-amenability of acylindrically hyperbolic groups. We show that groups in Dreg satisfy the (NbC) property for the trivial reason that the situation in which to apply (NbC) cannot happen. That means, we show the following stronger property for groups in Dreg . Definition 2.10. A group ฮ“ has property (NbC)1 if it satisfies the following: If N โŠณ ฮ“ is a normal subgroup and M < ฮ“ is a commensurated subgroup and N โˆฉ M = {1}, then N is finite or M is finite. It is obvious that (NbC)1 implies (NbC). Lemma 2.11. Let ฮ› be a group with a normal subgroup N โŠณฮ› and a commensurated subgroup M < ฮ› such that ฮ› = N ยท M and N โˆฉ M = {1}. To every finite subset F โŠ‚ ฮ› we can assign subgroups NF < N and MF < M in such a way that the following holds: (1) NF is normalized by M ; (2) MF โŠณ M is normal and has finite index; (3) F โŠ‚ ฮ›F := NF M and NF MF < ฮ›F has finite index; (4) MF commutes with NF , thus NF MF โˆผ = NF ร— M F ; (5) F โŠ‚ F โ€ฒ implies NF โŠ‚ NF โ€ฒ and MF โŠƒ MF โ€ฒ . In particular, if N is finitely generated, then M has a finite index subgroup that commutes with N . Proof. For every F โŠ‚ ฮ› let MF be the normal core of the subgroup \ ฮปM ฮปโˆ’1 โŠ‚ M. MFโ€ฒ := ฮปโˆˆF โˆช{1} MFโ€ฒ Since M is commensurated, < M , hence MF < M , are of finite index. In other words, MF is the largest normal subgroup of M with the property ฮปMF ฮปโˆ’1 โŠ‚ M for all ฮป โˆˆ F . Let q : ฮ› โ†’ N be the map q(nm) = n; it is well defined because of N โˆฉ M = {1}. โ€ฒ Clearly, MFโ€ฒ = Mq(F ) , thus MF = Mq(F ) . Since N โŠณ ฮ› is normal, the commutator โˆ’1 โˆ’1 [n, m] = n(mn m ) lies in N . For m โˆˆ MF = Mq(F ) and n โˆˆ q(F ) we also have [n, m] = (nmnโˆ’1 )mโˆ’1 โˆˆ M , hence [n, m] โˆˆ M โˆฉ N = {1}. So MF commutes with the subset q(F ). Let [ S := mq(F )mโˆ’1 โŠ‚ N. mโˆˆM Because of normality MF โŠณ M the group MF commutes with the subset S as well. The subgroups NF := hSi < N and MF satisfy all the required properties.  LATTICE ENVELOPES 9 Theorem 2.12. Every group in Dreg is (Irr), (CAF) and (NbC)1 . Proof. The properties (Irr) and (CAF) are shown in [68, Theorem 3.4]. Let ฮ“ โˆˆ Dreg , and let N โŠณ ฮ“ and M < ฮ“ normal and commensurated subgroups, respectively, with trivial intersection. Assume by contradiction that both subgroups are infinite. According to loc. cit. N is non-amenable. Let N = {n1 , n2 , . . .} be an enumeration of N . We refer to the notation of Lemma 2.11 applied to our situation. The group N is the increasing union of subgroups NFi < N for Fi = {n1 , . . . , ni }. Hence there is some k โˆˆ N such that N โ€ฒ := NFk is non-amenable, thus infinite. The group N โ€ฒ commutes with the finite index subgroup M โ€ฒ := MFk of M . Since M < ฮ“ is commensurated, also M โ€ฒ < ฮ“ is commensurated. By [68, Lemma 3.3] the restriction maps QH 1 (ฮ“, โ„“2 (ฮ“)) โ†’ QH 1 (M โ€ฒ , โ„“2 (ฮ“)) and QH 1 (N โ€ฒ M โ€ฒ , โ„“2 (ฮ“)) โ†’ QH 1 (M โ€ฒ , โ„“2 (ฮ“)) to commensurated subgroups are injective. Hence the restriction map QH 1 (ฮ“, โ„“2 (ฮ“)) โ†’ QH 1 (N โ€ฒ M โ€ฒ , โ„“2 (ฮ“)) is injective. We reach a contradiction as the latter module vanishes by [68, Theorem 3.4] and the fact that N โ€ฒ M โ€ฒ is a product of two infinite groups.  2.3. Conclusion of proof of Theorem 1.4. Proof of property (CAF). We refer to the cases in the statement of Theorem 1.4. (1) Since all โ„“2 -Betti numbers of an infinite amenable group vanish by a result of Cheeger-Gromov [24], every group with some non-vanishing โ„“2 -Betti number is (CAF) according to [7, Corollary 1.4]. (2) This is exactly [14, Theorem 6.8]. (3) See Theorem 2.12. For the classes included in Dreg see Theorems 2.7 and 2.8.  Proof of property (NbC). We refer to the cases in the statement of Theorem 1.4. (1โ€™) Let ฮ“ be a group with positive first โ„“2 -Betti number. Assume by contradiction that ฮ“ does not have (NbC)1 . Let M, N < ฮ“ be subgroups with M โˆฉN = {1} such that N โŠณ ฮ“ is normal and M is commensurated by ฮ“. Asssume that neither M nor N are finite. (2) We have to show that ฮฒ1 (ฮ“) = 0. Since ฮ› := N M is commensurated by (2) ฮ“, the vanishing of ฮฒ1 (ฮ›) would imply this according to [7, Corollary 1.4]. By Lemma 2.11 the group ฮ› is an ascending union of groups ฮ›n such that ฮ›n is virtually a product of infinite groups. A product of infinite groups has vanishing first โ„“2 -Betti number because of the Kuฬˆnneth formula for โ„“2 -Betti numbers and the fact that the zeroth โ„“2 -Betti number of an infinite group (2) vanishes. The same is true for a virtual product, so ฮฒ1 (ฮ›n ) = 0 for large n. This follows from the fact that the vanishing of โ„“2 -Betti numbers is an invariant of virtual isomorphism which can be easily deduced from their basic properties [44]. Or one may cite the much more general result that the vanishing of โ„“2 -Betti numbers of lcsc groups is a coarse invariant [61]. (2) (2) Finally, ฮฒ1 (ฮ›n ) = 0 for all n implies ฮฒ1 (ฮ›) = 0 by [44, Theorem 7.2 (2)]. (2โ€™) Let ฮ“ < GLn (k) be a linear group, and let N, M < ฮ“ subgroups with trivial intersection such that N โŠณ ฮ“ is normal and M < ฮ“ is commensurated by ฮ“. Let F 7โ†’ NF , MF be an assignment of finite subsets to subgroups as in Lemma 2.11. By the Noetherian property of the algebraic group GLn (k) 10 URI BADER, ALEX FURMAN, AND ROMAN SAUER there exists some finite set F1 โŠ‚ N such that the Zariski closure Mฬ„1 of MF1 is minimal among all finite subsets of N . Thus, for every n โˆˆ N , MF0 โˆช{n} is Zariski dense in Mฬ„1 . Since [n, MF0 โˆช{n} ] = 1 we get that [n, Mฬ„1 ] = 1. In particular, the finite index subgroup MF1 of M commutes with N . This implies (NbC) for linear groups. (3โ€™) As mentioned before, this is exactly [20, Corollary 18]. (4โ€™) See Theorem 2.12.  Proof of property (Irr). By the Kuฬˆnneth formula for โ„“2 -Betti numbers and the fact from the previous proof that their vanishing is unaffected by passing to virtually isomorphic groups it follows that groups with positive first โ„“2 -Betti numbers have property (Irr). That groups in Dreg have (Irr) is contained in Theorem 2.12.  2.4. Examples of groups without property (NbC). Among the conditions required for our main result, the (NbC) property is the most opaque. We present two examples of groups that do not have property (NbC). The first example is a wreath product. The second one comes with a lattice envelope that shows the necessity of the (NbC) condition in Theorem A. Example 2.13. For an infinite residuallyQfinite group M and a countable group H we consider the product group H M = M H endowed with the natural (shift) action of M . Let N be the subgroup in H M consisting of periodic elements, that is, elements having an M -stabilizer of finite index in M . N is clearly a countable subgroup on which M acts. Let ฮ“ = M โ‹‰ N . Observe that ฮ“ = N M , N โŠณ ฮ“, M is commensurated by ฮ“ and N โˆฉ M = {e}. The subgroup N does not commute with any finite index subgroup of M , yet any finitely generated subgroup of N does so (cf. Lemma 2.11). Example 2.14. Let ฮ› be an irreducible lattice in SLn (Qp )ร— SLn (R). Let X be the symmetric space of SLn (R), and let B be the 1-skeleton of the Bruhat-Tits building associated with SLn (Qp ). Then the action of ฮ› on B ร— X can be extended to an action of an extension, denoted by ฮ“, of ฮ› by the fundamental group ฯ€1 (B), which is an infinitely generated free group, on the universal covering Bฬƒ ร— X. Note that T := Bฬƒ is a tree. Moreover, ฮ“ is an irreducible lattice in Aut(T ) ร— SLn (R). This type of example originates from the work of Burger-Mozes [18, 1.8]. More general constructions in this direction are discussed in Caprace-Monod [22, 6.C]. The group ฮ“ has the properties (BT), (Irr), and (CAF), but it lacks property (NbC). Let us show property (CAF) first. Let A < ฮ“ be a commensurated subgroup. The image p(A) under the projection p : ฮ“ โ†’ ฮ› is an amenable commensurated subgroup of ฮ“. It follows from Theorem 1.4 that ฮ› has (CAF). Thus p(A) is finite. Since ฯ€1 (B) satisfies (CAF) by loc. cit., the intersection A โˆฉ ฯ€1 (B) is finite as well, which implies that A is finite. Let U โŠ‚ Aut(T ) be the stabilizer of a vertex; it is a compact open subgroup. Then it is easy to verify that the normal subgroup N = ฯ€1 (B) โŠณ ฮ“ and the subgroup M = ฮ“ โˆฉ (U ร— SLn (R)), which is commensurated by Lemma 3.5, violate property (NbC): No finite index subgroup of M commutes with N . LATTICE ENVELOPES 11 3. General facts about locally compact groups and their lattices In ยง3.1 we introduce the analog of weak commensurability or virtual isomorphism of groups for lattice embeddings. In ยง3.2 and ยง3.3 we have a look at broader classes of subgroups in lcsc groups than lattices, discrete subgroups and closed subgroups of finite covolume. In ยง3.4 we recall the definition of the amenable radical and study its behaviour under passage to closed subgroups of finite covolume. Finally, in ยง3.5 and ยง3.6 we study automorphisms of lcsc groups and their lattices in different categories: outer automorphism groups and quasi-isometry groups. 3.1. Virtual isomorphism of lattice embeddings. Definition 3.1. Two lattice embeddings ฮ“ ึ’โ†’ G and ฮ“โ€ฒ ึ’โ†’ Gโ€ฒ are virtually isomorphic if there are open finite index subgroups H < G and H โ€ฒ < Gโ€ฒ and compact normal subgroups K โŠณH and K โ€ฒ โŠณH โ€ฒ and a topological isomorphism H/K โ†’ H โ€ฒ /K โ€ฒ that restricts to an isomorphism of lattices (ฮ“ โˆฉ H)/(ฮ“ โˆฉ K) โ†’ (ฮ“โ€ฒ โˆฉ H โ€ฒ )/(ฮ“โ€ฒ โˆฉ K โ€ฒ ), that is, there is a commutative square: (ฮ“ โˆฉ H)/(ฮ“ โˆฉ K) H/K โˆผ = (ฮ“โ€ฒ โˆฉ H โ€ฒ )/(ฮ“โ€ฒ โˆฉ K โ€ฒ ) โˆผ = H โ€ฒ /K โ€ฒ A lattice embedding is trivial if it is virtually isomorphic to the identity homomorphism of a countable discrete group. In particular, if ฮ“ ึ’โ†’ G and ฮ“โ€ฒ ึ’โ†’ Gโ€ฒ are virtually isomorphic then ฮ“ and ฮ“โ€ฒ are virtually isomorphic in the sense of Definition 2.2. To justify the above definition one needs that the horizontal maps in the above diagram are lattice embeddings. This follows from Lemma 3.3 and Lemma 3.4. Proposition 3.2. Virtual isomorphism is an equivalence relation on the class of lattice embeddings. Proof. The only non-obvious claim is transitivity. Its proof is similar to the proof that weak commensurability among groups is transitive. Let jl : ฮ“l ึ’โ†’ Gl for l โˆˆ {1, 2, 3} be lattice embeddings such that j1 , j2 and j2 , j3 are virtually isomorphic. So for l โˆˆ {1, 2, 3} there are finite index subgroups Hl < Gl and H2โ€ฒ < G2 and compact normal subgroups Kl โŠณ Hl and K2โ€ฒ โŠณ H2โ€ฒ and isomorphisms โˆผ = โˆผ = H1 /K1 โˆ’ โ†’ H2 /K2 and H2โ€ฒ /K2โ€ฒ โˆ’ โ†’ H3 /K3 that restrict to isomorphisms (ฮ“1 โˆฉ H1 )/(ฮ“1 โˆฉ K1 ) โˆผ = (ฮ“2 โˆฉ H2 )/(ฮ“2 โˆฉ K2 ) and โ€ฒ โˆผ โ€ฒ (ฮ“2 โˆฉ H )/(ฮ“2 โˆฉ K ) = (ฮ“3 โˆฉ H3 )/(ฮ“3 โˆฉ K3 ), 2 2 respectively. The subgroup H2โ€ฒโ€ฒ := H2 โˆฉ H2โ€ฒ < G2 has finite index in G2 . Let pr : H2โ€ฒโ€ฒ โ†’ Q2 := H2โ€ฒโ€ฒ /(K2 โˆฉ H2โ€ฒ ) be the projection. Let K2โ€ฒโ€ฒ be the kernel of the composition of quotient maps H2โ€ฒโ€ฒ โ†’ Q2 โ†’ Q2 / pr(K2โ€ฒ โˆฉ H2 ). 12 URI BADER, ALEX FURMAN, AND ROMAN SAUER Note that K2โ€ฒโ€ฒ contains K2 โˆฉ H2โ€ฒ = K2 โˆฉ H2โ€ฒโ€ฒ and K2โ€ฒ โˆฉ H2 = K2โ€ฒ โˆฉ H2โ€ฒโ€ฒ . Since K2 and pr(K2โ€ฒ โˆฉ H2 ) are compact, K2โ€ฒโ€ฒ โŠณ H2โ€ฒโ€ฒ is a compact normal subgroup of H2โ€ฒโ€ฒ . Consider the compositions of quotient maps and isomorphisms as above โˆผ = โˆผ = f1 : H1 โ†’ H1 /K1 โˆ’ โ†’ H2 /K2 and g3 : H2โ€ฒ โ†’ H2โ€ฒ /K2โ€ฒ โˆ’ โ†’ H3 /K3 . Similarly, using the inverses of the above isomorphisms we obtain homomorphisms โˆผ = โˆผ = g1 : H2 โ†’ H2 /K2 โˆ’ โ†’ H1 /K1 and f3 : H3 โ†’ H3 /K3 โˆ’ โ†’ H2โ€ฒ /K2โ€ฒ . We set Ci := gi (H2โ€ฒโ€ฒ ) and Ei := gi (K2โ€ฒโ€ฒ ) โŠณ Ci for i โˆˆ {1, 3}; further, let Cฬƒi < Hi and Eฬƒi < Hi be the preimages of Ci and Ei under the quotient maps. Then Cฬƒi has finite index in Hi , thus also in Gi , and Eฬƒi is a compact normal subgroup of Cฬƒi for i โˆˆ {1, 3}. The homomorphism Cฬƒi /Eฬƒi โ†’ H2โ€ฒโ€ฒ /K2โ€ฒโ€ฒ , [x] 7โ†’ [fi (x)] is an isomorphism for i โˆˆ {1, 3} with inverse map [y] 7โ†’ [gi (y)]. Since fi and gi preserve the lattices, this isomorphism restricts to an isomorphism (ฮ“i โˆฉ Cฬƒi )/(ฮ“i โˆฉ Eฬƒi ) โˆผ = (ฮ“2 โˆฉ H2โ€ฒโ€ฒ )/(ฮ“2 โˆฉ K2โ€ฒโ€ฒ ) for i โˆˆ {1, 3}. This finishes the proof of transitivity.  3.2. Discrete subgroups of locally compact groups. We collect some important, albeit easy facts used in the proof of the main result. Lemma 3.3 (cf. [21, 2.C]). Let ฮ“ < G be a lattice in an lcsc group. Let U < G be an open subgroup. Then ฮ“ โˆฉ U is a lattice in U . Lemma 3.4 ([59, Theorem 1.13 on p. 23]). Let G be an lcsc group and N โŠณ G a normal closed subgroup. The projection of a lattice ฮ“ < G to G/N is discrete if and only if ฮ“ โˆฉ N is a lattice in N . If so, then the projection of ฮ“ to G/N is also a lattice. The following statement is our main source of commensurated subgroups. Lemma 3.5. Let G be an lcsc group and U < G be a compact open subgroup. Then U is commensurated by G. For any subgroup ฮ› < G the intersection ฮ› โˆฉ U is commensurated in ฮ›. Proof. For any g โˆˆ G, U โˆฉ gU g โˆ’1 is an open subgroup of the compact group U (resp. in gU g โˆ’1 ), hence it has finite index in U (resp. in gU g โˆ’1 ). The second statement follows by taking g โˆˆ ฮ› and taking intersections with ฮ›.  Lemma 3.6. Any lattice envelope of a finitely generated group is compactly generated. Proof. Let ฮ“ < G be a lattice in an lcsc group, and let ฮ“ be generated by a finite set F โŠ‚ ฮ“. Let V โŠ‚ G be an open neighborhood of the identity with compact closure. We claim that the compact set K = V โˆช F generates a subgroup Gโ€ฒ of finite index in G. Indeed, Gโ€ฒ contains the group generated by V , hence Gโ€ฒ is open. Thus G/Gโ€ฒ is a countable discrete space. But ฮ“ โŠ‚ Gโ€ฒ , hence G/Gโ€ฒ is finite. Hence by adding a finite set to K one obtains a compact generating set for G.  LATTICE ENVELOPES 13 3.3. Closed subgroups of finite covolume. The notion of a lattice, that is a discrete subgroup of finite covolume, can be generalized to closed, but not necessarily discrete, subgroups as follows. A closed subgroup H < G of an lcsc group G is said to have finite covolume in G if G/H carries a finite G-invariant Borel measure. If H has finite covolume in G, then G is unimodular if and only if H is unimodular [59, Lemma 1.4 on p. 18]. Lemma 3.7 ([59, Lemma 1.6 on p. 20]). Let G be an lcsc group, and H < L < G closed subgroups. Then H < G has finite covolume if and only if both L < G and H < L have finite covolumes. It is well known that a torsion-free lattice in a tdlc group is uniform. A mild generalization is given by the following. Lemma 3.8 ([2, Corollary 4.11]). Let G be a unimodular tdlc group. Let H < G be a closed subgroup of finite covolume. Let mH be the Haar measure of H. If there is an upper bound on the Haar measures of compact open subgroups in H, i.e.  sup mH (U ) | U is a compact open subgroup in H < โˆž, then G/H is compact. Lemma 3.9. Let G be a connected, semi-simple, center-free, real Lie group without compact factors. Every closed subgroup H < G of finite covolume has the form H = โˆ† ร— G2 , where G2 is a direct factor of G, G = G1 ร— G2 , and โˆ† < G1 is a lattice. Proof. The Lie algebra h of the connected component H 0 is Ad(H)-invariant. Since H is Zariski dense in G by Borelโ€™s density theorem [10], it follows that h is an ideal in the semisimple Lie algebra g of G. Let g = g1 โŠ• ยท ยท ยท โŠ• gn be the decomposition into simple Lie algebras. Let I1 = {i โˆˆ {1, . . . , n} | gi โˆฉ h = {0}}, and let I2 = {1, . . . , n}\I1 . Then G = G1 ร— G2 with Gk being the Lie subgroup with Lie algebra M gi . iโˆˆIk Since gi is simple we either have gi โˆฉ h = {0} or gi โˆฉ h = gi . This implies H = (G1 ร— {1} โˆฉ H) ร— G2 where โˆ† := G1 ร— {1} โˆฉ H is discrete. Since H has finite covolume, โˆ† is a lattice.  3.4. The amenable radical. Definition 3.10. The amenable radical of an lcsc group G is the maximal closed normal amenable subgroup. We denote it by Radam (G) โŠณ G. Lemma 3.11. Let G be an lcsc group, and let H < G be a closed subgroup of finite covolume. Then Radam (H) = Radam (G) โˆฉ H. This lemma can be deduced from the following result. 14 URI BADER, ALEX FURMAN, AND ROMAN SAUER Lemma 3.12 (Furstenberg [35]). Let G be an lcsc group and G y M a continuous action that is minimal and strongly proximal. Let H < G be a closed subgroup of finite covolume. Then the restriction of the G-action to H is also minimal and strongly proximal. In [35] Furstenberg was interested in the restriction to lattices, but the proof applies to general closed subgroups of finite covolume. Proof of Lemma 3.11 from Lemma 3.12. The very definition of Radam (G) yields the inclusion Radam (G) โˆฉ H < Radam (H). For the converse inclusion, we use an equivalent characterization of the amenable radical as the common kernel of all minimal, strongly proximal actions on compact metrizable spaces [34, Proposition 7]. Thus for the converse inclusion it suffices to show that given an arbitrary minimal and strongly proximal G-action G โ†’ Homeo(M ), its restriction to H is also minimal and strongly proximal, because it would show that Radam (H) acts trivially in every minimal strongly proximal G-action, which is the content of Lemma 3.12.  3.5. (Outer) automorphism groups. We describe various results about groups of automorphisms and groups of outer automorphisms of certain groups. We are confident that the main result of this section, Theorem 3.13, is known to experts, but it does not seem to be in the literature in the appropriate generality. Theorem 3.13. Let K1 , . . . , Kn be number fields, and let Hi be connected, noncommutative, adjoint, absolutely simple Ki -groups. Let Si โŠ‚ Vi be finite compatible sets of places of Ki as in ยง4.1. Then any group that is (abstractly) commensurable with n Y Hi (Oi [Si ]) i=1 has a finite outer automorphism group. The proof of Theorem 3.13 will be given by the end of this subsection. This theorem will be used in ยง5 together with Lemma 3.14 to split certain extensions of groups. For a subgroup B < A of a group A, let Aut(A), AutB (A), and Out(A) denote the automorphism group of A, the subgroup of Aut(A) preserving B set-wise, and the outer automorphism group of A. For a ฯƒ-compact lcsc group G we denote the group of continuous automorphisms by Autc (G) and the group of continuous outer automorphisms by Outc (G) = Autc (G)/G. Note that a continuous automorphism of G is a homeomorphism by the open mapping theorem [12, IX. ยง5.3]. We begin by quoting two auxiliary results which are elementary. Lemma 3.14 ([16, Corollary (6.8) and Exercise 1 on p. 106]). Let B โŠณ A be a normal subgroup in a group A. Assume that B has trivial center. Then the right hand square in the commutative diagram B A A/B ฯ B Aut(B) Out(B) LATTICE ENVELOPES 15 whose rows are exact and whose vertical homomorphisms are induced by conjugation is a pullback diagram of groups. Thus, if ฯ is trivial, then the group extension B ึ’โ†’ A ึ‰ A/B splits as a direct product. Lemma 3.15 ([72]). Let B โŠณ A be a normal subgroup in a group A. Let C be the center of B. Then the sequence of groups (3.1) j ฯ€ 1 โ†’ Z 1 (A/B; C) โˆ’ โ†’ AutB (A) โˆ’ โ†’ Aut(B) ร— Aut(A/B) is exact. Here the left group is the abelian group of 1-cocycles of A/B in C, j maps a cocycle c to a 7โ†’ c([a])a, and ฯ€(f ) = (f |B , [f ]). The following three results are immediate consequences of Lemma 3.15. Lemma 3.16. Every topological automorphism of a product G = G0 ร— Gtd of a center-free connected group G0 and a tdlc group Gtd is a product of a topological automorphism of G0 and a topological automorphism of Gtd . Proof. We apply Lemma 3.15 to A = G and B = G0 . In this situation the map ฯ€ in (3.1) has an obvious right inverse s. Both ฯ€ and s preserve continuity of automorphisms. Let ฮฑ : G โ†’ G be a continuous automorphism. Then ฮฑ(G0 ) = G0 . Since G0 has trivial center, ฯ€ is injective. So ฮฑ = s(ฯ€(ฮฑ)).  Lemma 3.17. Let A be a group, and let B โŠณ A be a characteristic subgroup of finite index. If B has a finite center, then the restriction map Aut(A) โ†’ Aut(B) has a finite kernel. Proof. Denote by K the kernel of Aut(A) = AutB (A) โ†’ Aut(B) and by C the center of B. Since Aut(A/B) is finite, it is enough to show that the kernel K โ€ฒ of K โ†’ Aut(A/B) is finite. By Lemma 3.15, K โ€ฒ is isomorphic to Z 1 (A/B; C) which is finite since A/B and C are finite.  Corollary 3.18. If a group A has a characteristic subgroup of finite index that has a finite center and a finite outer automorphism group, then also A has a finite outer automorphism group. Proof. Let B โŠณ A be characteristic with finite center and finite outer automorphism group. Since the group Aut(A)/B surjects onto Aut(A)/A = Out(A), it is enough to show that the former is finite. This follows by the exactness of  1 โ†’ ker Aut(A) โ†’ Aut(B) โ†’ Aut(A)/B โ†’ Out(B), as Out(B) is finite by assumption, and the kernel is finite by Lemma 3.17.  For the purposes of this subsection, we introduce the following definition. Definition 3.19. A group A is said to be strongly irreducible if for every homomorphism ฯ€ : B1 ร— B2 โ†’ A with finite cokernel, either B1 < ker ฯ€ or B2 < ker ฯ€. A group is said to be strongly outer finite if the outer automorphism group of any of its finite index subgroups is finite. Lemma 3.20. A Zariski dense subgroup of the K-points of a connected, noncommutative, adjoint, K-simple K-algebraic group is strongly irreducible. Proof. Let H be a connected, non-commutative, adjoint, K-simple K-group, and let ฮ“ < H(K) be a Zariski dense subgroup. 16 URI BADER, ALEX FURMAN, AND ROMAN SAUER Let ฯ€ : B1 ร— B2 โ†’ ฮ“ be a homomorphism with finite cokernel. Since ฮ“ < H(K) is Zariski dense, the Zariski closure of im(ฯ€) has to be H as a finite index subgroup of the connected group H. The Zariski closure of ฯ€(Bi ) define K-subgroups Hi , i โˆˆ {1, 2} that commute in H and together generate H. By the simplicity of H we conclude that for some i โˆˆ {1, 2}, Hi is trivial. It follows that Bi < ker ฯ€.  Theorem 3.21. Let B be a group that is (abstractly) commensurable to a product of a finite family of finitely generated, strongly irreducible, strongly outer finite groups. Then B has a finite outer automorphism group. The proof of Theorem 3.21 will be preceded by some preparation. First we make the following ad-hoc definition, which is not standard. Q Definition Q 3.22. A standard subgroup of a product iโˆˆI Ai of groups is a subgroup of the form iโˆˆI Bi with each Bi < Ai being a finite index subgroup. Lemma 3.23. Let (Ai )iโˆˆI be a finite family of strongly irreducible groups, and let (Bj )jโˆˆJ be a finite family of non-trivial groups with |J| โ‰ฅ |I|. If Y ฯ† Y โ†’ Bj โˆ’ Ai jโˆˆJ iโˆˆI is a monomorphism with finite cokernel, then there are a bijection f : J โ†’ I and, for each j โˆˆ J, a monomorphism ฯ†j : Bj โ†’ Af (j) with finite cokernel such that ฯ† is the product of the maps ฯ†j . In particular, the image im(ฯ†) is a standard subgroup. Proof. Let A and B be the product of (Ai )iโˆˆI and (Bj )jโˆˆJ , respectively. The proof is by induction on |I|. If |I| = 1, there is nothing to prove. Let |I| > 1. Then |J| > 1, and Qwe can decompose it non-trivially as J = J1 โˆช J2 . For k โˆˆ {1, 2} we set B (k) = jโˆˆJk Bj . We let Y Ik = {i โˆˆ I | B2โˆ’k < ker ฯ€i } and A(k) = Ai , iโˆˆIk where ฯ€i : A โ†’ Ai is the i-th projection. By the strong irreducibility of the Ai โ€™s, I = I1 โˆช I2 is a partition. Hence the composition of ฯ† : B โ†’ A with the projection A โ†’ A(k) factors through B (k) โˆผ = B/B (2โˆ’k) , thus giving a homomorphism ฯ†k : B (k) โ†’ (k) A . We observe that these ฯ†k are injective homomorphisms with finite cokernels. Without loss of generality, |I1 | โ‰ค |J1 |. By induction hypothesis, |I1 | = |J1 | and therefore |I2 | โ‰ค |J2 |. Applying the induction hypothesis to both ฯ†k , the statement follows.  Applying Lemma 3.23 to automorphisms ฯ†, we obtain the following. Corollary 3.24. Let (Ci )iโˆˆI be a finite family of strongly irreducible groups. Then the obvious embedding Y Y  Aut(Ci ) โ†’ Aut Ci iโˆˆI iโˆˆI has a finite cokernel. Lemma 3.25. Let (Ai )iโˆˆI be a finite family of strongly irreducible Q groups, and let A be its product. Let B < A be a subgroup of finite index. Then iโˆˆI (B โˆฉ Ai ) is a characteristic subgroup of B of finite index. LATTICE ENVELOPES 17 Proof. Let us call a subgroup of B that is simultaneously a standard subgroup of A a substandard subgroup. By Lemma 3.23, every ฯ† โˆˆ Aut(B) preserves substandard Q subgroups. Hence iโˆˆI (B โˆฉ Ai ) is characteristic in B as it is the unique maximal element in the collection of substandard subgroups.  Proof of Theorem 3.21. By assumption, B has a finite index subgroup C โ€ฒ < B that is isomorphic to a finite index subgroup of the product A of a finite family (Ai )iโˆˆI of finitely generated, strongly irreducible, strongly outer finite groups. From now on we will identify C โ€ฒ and its various subgroups with their images in A under this isomorphism. As each Ai is finitely generated, A, C โ€ฒ , and thus B are finitely generated too. Thus C โ€ฒ has a finite index subgroup C โ€ฒโ€ฒ that is characteristic in B (e.g. the intersection of all subgroups of B with index [B : C โ€ฒ ]). By Lemma 3.25 C โ€ฒโ€ฒ has Q a characteristic subgroup C of finite index which is standard in A. That is, C = iโˆˆI Ci , where Ci < Ai are of finite index. Strongly irreducibility passes to finite index subgroups. So each Ci is strongly irreducible. Being characteristic is transitive, so C is characteristic in B. Q By Corollary 3.24, the obvious embedding iโˆˆI Aut(Ci ) โ†’ Aut(C) has a finite cokernel. By the strong outer finite assumption, Out(Ci ) is finite for each i โˆˆ I. Hence Out(C) is finite. By the strong irreducibility assumption C has a finite center. Thus, Corollary 3.18 implies that Out(B) is finite.  The following proposition is well known. Proposition 3.26. Let K be a number field, and let H be non-commutative, connected, adjoint, absolutely simple Q K-group. Let S โŠ‚ V be a finite compatible set of places of K as in ยง4.1. Then ฮฝโˆˆS H(Kฮฝ ) has a finite group of continuous outer automorphisms. Proof. By Lemma 3.20 each group H(Kฮฝ ) is strongly irreducible. By Corollary 3.24, the natural embedding Y Y j Aut(H(Kฮฝ )) โˆ’ โ†’ Aut( H(Kฮฝ )) ฮฝโˆˆS ฮฝโˆˆS has a finite cokernel. Further, if f โˆˆ im(j) is a continuous automorphism then f is a product of continuous automorphisms. This implies that the restriction of j Y Y Autc (H(Kฮฝ )) โ†’ Autc ( H(Kฮฝ )) ฮฝโˆˆS ฮฝโˆˆS has a finite cokernel, too. It is thus enough to show that Outc (H(Kฮฝ )) is finite for every ฮฝ โˆˆ S. Since every continuous field automorphism of Kฮฝ is trivial on the closure of Q over which Kฮฝ is finite, the field Kฮฝ has a finite group of continuous field automorphisms. Moreover, the group H has a finite group of algebraic outer automorphisms, given by Dynkin diagram automorphisms. Thus, Outc (H(Kฮฝ )) is indeed finite by [47, Chapter I, 1.8.2(IV)].  Proposition 3.27. Let K be a number field, and let H be a non-commutative, connected, adjoint, absolutely simple K-group. Let S โŠ‚ V be a finite compatible set of places of K as in ยง4.1. Then H(O[S]) is finitely generated, strongly irreducible and strongly outer finite. 18 URI BADER, ALEX FURMAN, AND ROMAN SAUER Proof. By [47, Chapter IX, Theorem 3.2] H(O[S]) is finitely generated, and by Lemma 3.20 H(O[S]) is strongly irreducible. We are left to prove that H(O[S]) is strongly outer finite. To this end, consider a subgroup ฮ“ < H(O[S]) of finite index. Q The group ฮ“ is an irreducible lattice in H = ฮฝโˆˆS H(Kฮฝ ). Let A = Autc (H). The conjugation homomorphism H โ†’ A is injective as H is center-free and has a finite cokernel by Proposition 3.26. Then ฮ“ ึ’โ†’ A embeds as a lattice. We claim: (1) The normalizer N = NA (ฮ“) of ฮ“ in A is discrete in A. (2) The conjugation action N โ†’ Aut(ฮ“) is an isomorphism. Let us first conclude the finiteness of Out(ฮ“) from (1) and (2). Since N contains the lattice ฮ“ and N is discrete in A, N < A is also a lattice. Hence [N : ฮ“] < โˆž. By (2), Out(ฮ“) is isomorphic to N/ฮ“, hence finite. Regarding (1), discreteness will follow once we show that N is countable because N < A is closed. Since ฮ“ is finitely generated, Aut(ฮ“) is countable. Hence N/ZA (ฮ“) is countable, where ZA (ฮ“) denotes the centralizer of ฮ“ in A. Each factor of H is center-free, so ZH (ฮ“) is trivial by the density of the projection of ฮ“ in each factor. Since H < A is of finite index, ZA (ฮ“) is finite, and the countability of N follows. To verify (2), it is enough to show that every automorphism of ฮ“ induces a continuous automorphism of H. This is a consequence of the Mostow-Prasad strong rigidity theorem for H [47, Theorem VII 7.1].  Proof of Theorem 3.13. By Proposition 3.27 the groups Hi (Oi [Si ]) are finitely generated, strongly irreducible and strongly outer finite. Thus the proof follows at once from Theorem 3.21.  Finally, we need a classical result from the work of Tits and Borel-Tits. Theorem 3.28. Let K be a number field, and let ฮฝ a finite place of K. Let H be a non-commutative, connected, adjoint, absolutely simple K-group of Kฮฝ -rank โ‰ฅ 2. Then the automorphism group of the Bruhat-Tits building associated to H and ฮฝ contains H(Kฮฝ )+ as a subgroup of finite index. Proof. In higher rank the automorphism group of the associated Bruhat-Tits building X is isomorphic to Aut(H)(Kฮฝ ) which is isomorphic to an extension of the group Aut(H(Kฮฝ )) of algebraic automorphisms over Kฮฝ by a subgroup of field automorphisms of Kฮฝ . This follows from the results in [69]. See [3, Proposition C.1] for an elaboration. The group Aut(H(Kฮฝ )) contains H(Kฮฝ )+ as a subgroup of finite index, and Kฮฝ has only finitely many field automorphisms since every field automorphism is continuous [66] and trivial on the closure of the rationals over which Kฮฝ is finite. This implies the statement.  3.6. Quasi-isometries of locally compact groups. Recall that a map between metric spaces f : (X, dX ) โ†’ (Y, dY ) is an (L, C)-quasi-isometry if 1 ยท dX (x, xโ€ฒ ) โˆ’ C < dY (f (x), f (xโ€ฒ )) < L ยท dX (x, xโ€ฒ ) + C L for all x, xโ€ฒ โˆˆ X and for every y โˆˆ Y there is x โˆˆ X so that dY (y, f (x)) < C. Two maps f, g : (X, dX ) โ†’ (Y, dY ) have bounded distance if sup dY (f (x), g(x)) < โˆž. xโˆˆX The quasi-isometry group QI(X, dX ) of (X, dX ) is the group (under composition) of equivalence classes of quasi-isometries (X, dX ) โ†’ (X, dX ) under bounded distance. LATTICE ENVELOPES 19 Lemma 3.29. Let G be an lcsc group containing a closed subgroup H < G such that G/H is compact, the projection G โ†’ H\G has locally a continuous cross-section, and H is compactly generated. Let H โ†’ Isom(X, d) be a properly discontinuous cocompact action on some proper geodesic metric space (X, d). Then the natural homomorphism ฯ† : H โ†’ Isom(X, d) โ†’ QI(X, d) extends to a homomorphism ฯ†ฬ„ : G โ†’ QI(X, d) with the following property. There exist constants L, C > 0 so that each ฯ†ฬ„(g), g โˆˆ G, is represented by a (L, C)quasi-isometry fg : X โ†’ X such that for every bounded set B โŠ‚ X there is a neighbourhood of the identity V โŠ‚ G with โˆ€gโˆˆV โˆ€xโˆˆB d(fg (x), x) โ‰ค C. (3.2) Remark 3.30. The projection G โ†’ H\G of an lcsc group G to the coset space of a closed subgroup H < G has locally a continuous cross-section if G is finitedimensional with respect to covering dimension [40, Theorem 2]. Tdlc groups, which are the ones we will apply Lemma 3.29 to, are zero-dimensional. Proof of Lemma 3.29. Since H is compactly generated, and H\G is compact, G is also compactly generated. Thus G and H possess left-invariant word metrics that are unique up to quasi-isometry. The inclusion j : H โ†’ G is a quasi-isometry. We construct a quasi-inverse j โ€ฒ : G โ†’ H of j, which is unique up to bounded distance, in the following way. Let pr : G โ†’ H\G be the projection. Let s : U0 โ†’ G be a local continuous crosssection of pr defined on some compact neighbourhood U0 โŠ‚ H\G of H1 such that s(H1) = 1. We can extend s to a global cross-section s : H\G โ†’ G with relatively compact image s(H\G), which is not necessarily continuous. Then j โ€ฒ : G โ†’ H, g 7โ†’ g ยท s(pr(g))โˆ’1 is a quasi-inverse of j. The assignment f 7โ†’ j โ—ฆ f โ—ฆ j โ€ฒ yields an isomorphism jโˆ— : QI(H) โ†’ QI(G). Let x0 โˆˆ X. By the SฬŒvarc-Milnor theorem the map h โ†’ hx0 is a quasi-isometry f : H โ†’ X. We pick a quasi-inverse f โ€ฒ : X โ†’ H of f . Similarly, we obtain an isomorphism fโˆ— : QI(H) โ†’ QI(X). Let H โ†’ QI(H) be the homomorphism that sends a group element to its left translation. Similarly, G โ†’ QI(G). It is easy to see that the map ฯ† coincides with the composition fโˆ— H โ†’ QI(H) โˆ’โ†’ QI(X). We define ฯ†ฬ„ to be the composition j โˆ’1 fโˆ— โˆ— G โ†’ QI(G) โˆ’โˆ’ โ†’ QI(H) โˆ’โ†’ QI(X). Clearly, ฯ†ฬ„ extends ฯ†. Let lgG : G โ†’ G denote left translation by g โˆˆ G in G. Similarly, let lhH : H โ†’ H be left translation by h โˆˆ H. Then ฯ†ฬ„(g) is represented by the quasi-isometry fg := f โ—ฆ j โ€ฒ โ—ฆ lgG โ—ฆ j โ—ฆ f โ€ฒ . Clearly, there are constants C, L > 0 only depending on j, j โ€ฒ , f , and f โ€ฒ such that fg is a (L, C)-quasi-isometry. Let B โŠ‚ X be a bounded subset. Let   D := sup d x, f (f โ€ฒ (x)) = sup d x, f โ€ฒ (x)x0 < โˆž. xโˆˆX xโˆˆX 20 URI BADER, ALEX FURMAN, AND ROMAN SAUER The set  f โ€ฒ (x) | x โˆˆ B โŠ‚ H is bounded, thus relatively compact. Let K โŠ‚ H be its closure. The continuous map H ร— G โ†’ H\G, (h, g) 7โ†’ pr(gh) sends H ร— {1} to H1. By continuity and compactness of K there is an identity neighbourhood V0 โŠ‚ G such that K ร— V0 is mapped to U0 โŠ‚ H\G. Then the function  ฯˆ : K ร— V0 โ†’ R, (h, g) 7โ†’ d ghs(pr(gh))โˆ’1 x0 , hx0 is continuous and maps K ร— {1} to 0. By continuity and compactness of K there is an identity neighborhood V โŠ‚ V0 such that ฯˆ(K ร— V ) โŠ‚ [0, 1]. Now let x โˆˆ B and g โˆˆ V . Let h = f โ€ฒ (x) โˆˆ K. Then  d fg (x), x = d f (j โ€ฒ (gj(f โ€ฒ (x)))), x) = d j โ€ฒ (gf โ€ฒ (x))x0 , x) โ‰ค d j โ€ฒ (gh)x0 , hx0 ) + D = d ghs(pr(gh))โˆ’1 x0 , hx0 ) + D โ‰ค D + 1. Upon replacing the constant C by max{C, D + 1}, the statement follows.  4. Arithmetic lattices, tree extensions, and the arithmetic core In ยง4.1 we introduce the notion of tree extensions of S-arithmetic lattices, which appears in our main result, Theorem A. In ยง5 we discuss an arithmeticity result for lattices in a product of a semisimple Lie group and a tdlc group, which identifies the second case in Theorem A. 4.1. Arithmetic lattices and tree extensions. Setup 4.1. Let K be a number field, O its ring of integers, and let H be a connected, noncommutative, absolutely simple adjoint K-group. Let V be the set of inequivalent valuations (places) of K, let V โˆž denote the archimedean ones, and V fin = V โˆ’ V โˆž the non-archimedean ones (finite places). For ฮฝ โˆˆ V we denote by Kฮฝ the completion of K with respect to ฮฝ; it is a local field. Let S โŠ‚ V be a finite subset of places that is compatible with H in the sense of [6]. Explicitly, this means the following: (1) For every ฮฝ โˆˆ S, H is Kฮฝ -isotropic. (2) S contains all ฮฝ โˆˆ V โˆž for which H is Kฮฝ -isotropic. (3) S contains at least one finite and one infinite place. Let S โˆž = S โˆฉ V โˆž and S fin = S โˆฉ V fin . Let O[S] โŠ‚ K be the ring of S-integers. For ฮฝ โˆˆ V let H(Kฮฝ )+ < H(Kฮฝ ) be the normal subgroup as defined in [11, Section 6]. If Kฮฝ is perfect, which is the case in our situation, then H(Kฮฝ )+ is the subgroup generated by all unipotent elements and it has finite index in H(Kฮฝ ). If ฮฝ โˆˆ V โˆž , then H(Kฮฝ )+ is just the connected component of the identity in the real Lie group H(Kฮฝ ). Define Y Y HK,S := H(Kฮฝ ) H+ H(Kฮฝ )+ . K,S := ฮฝโˆˆS The quotient HK,S /H+ K,S is finite. ฮฝโˆˆS LATTICE ENVELOPES 21 By reduction theory after Borel and Harish-Chandra the diagonal embedding realizes H(O[S]) is a lattice in HK,S . Note that HK,S = HK,S โˆž ร— HK,S fin is the splitting into a semi-simple real Lie group and a totally disconnected locally compact group. We thus make the following remark. Remark 4.2. If S is finite set of places compatible with H, then H(O[S]) is a lattice in a product of at least two lcsc group, one of them being a Lie group and one of them being a tdlc group. We now exhibit a generalization of the previous type of lattices. Definition 4.3. Let S be finite. Let S1fin denote the finite places ฮฝ โˆˆ S fin such that the Kฮฝ -rank of H is 1; denote by Tฮฝ the associated Bruhat-Tits tree and by Aut(Tฮฝ ) the tdlc group of automorphisms of this simplicial tree. Any closed intermediate group Y Y Y H+ Aut(Tฮฝ ) H(Kยต ) ร— H(Kฮฝ )+ < H โˆ— < K,S = ฮฝโˆˆS ยตโˆˆSโˆ’S1fin ฮฝโˆˆS1fin is called a tree extension of HK,S . Q + โˆ— Since H+ K,S = ฮฝโˆˆS H(Kฮฝ ) < H is cocompact, the inclusion of a subgroup commensurable to H(O[S]) into a tree extension of HK,S is a lattice embedding by Lemma 3.7. Remark 4.4. Denote by Xฮฝ the Bruhat-Tits buildings or the symmetric space of + H(Kฮฝ ). For ฮฝ โˆˆ S โˆ’ S1fin the group Isom(X Q ฮฝ ) contains H(Kฮฝ ) as a subgroup of finite index Q by Theorem 3.28. Further, ฮฝโˆˆS Isom(Xฮฝ ) is a finite index subgroup of Isom( ฮฝโˆˆS Xฮฝ ). This follows from [15, Proposition I.5.3(4) on p. 56]. Thus any closed intermediate subgroup Y โˆ— H+ Xฮฝ ). K,S < H < Isom( ฮฝโˆˆS is, up to passing to a finite index subgroup, a tree extension of HK,S . 4.2. Arithmetic core theorem. Next we state an arithmeticity result for lattices in products that provides a key step in the proof of Theorem A. Theorem 4.5 (Arithmetic Core Theorem). Let H be a connected, center-free, semi-simple, real Lie group without compact factors, D be a tdlc group and ฮ“ < H ร— D be a lattice. Assume that (1) the projection ฮ“ โ†’ D has a dense image, (2) the projection ฮ“ โ†’ H has a dense image, (3) the projection ฮ“ โ†’ H is injective, (4) D is compactly generated. Then there exist number fields K1 , . . . , Kn , connected, non-commutative, adjoint, absolutely simple Ki -groups Hi , finite sets Si โŠ‚ Vi of places of Ki compatible with Hi as in ยง4.1 with the following properties: There is a topological isomorphism Hโˆผ = n Y (Hi )0Ki ,Siโˆž i=1 22 URI BADER, ALEX FURMAN, AND ROMAN SAUER and a continuous epimorphism D ึ‰ Q with compact kernel such that Q is a closed intermediate subgroup n n Y Y (Hi )Ki ,Sifin (Hi )+ < Q < fin K ,S i i=1 i i=1 and the image of ฮ“ in H ร— Q is commensurable with the image of n n n Y Y Y (Hi )Ki ,Sifin . (Hi )Ki ,Siโˆž ร— Hi (Oi [Si ]) โˆ’โ†’ i=1 i=1 i=1 This result is quite close to Theorem 5.20 in the paper [23] of Caprace and Monod. In fact, if H is assumed to be simple instead of semi-simple, Theorem 4.5 is essentially their theorem. In our companion paper [6] we prove Theorem 4.5 deducing it from a more general statement, in which D is not assumed to be compactly generated. In this more general case the sets Si of places of Ki might be infinite, and the gap between H+ K,S and HK,S becomes large. In the current paper we use the above arithmetic core theorem 4.5 in ยง5, Step 3, case (iii). At this point in the proof we do not know yet that ฮ“ (called ฮ“3 there) is finitely generated, but do know compact generation of D (called Gtd 3 there) inherited from the compact generation assumption on G. For readerโ€™s convenience we sketch the idea of the proof of Theorem 4.5 as it appears in [6]. Apart from step (1) below our approach differs from that taken by Caprace and Monod in [23]. In the following sketch we ignore some important details for the sake of transparency. (1) Choose a compact open subgroup U < D, and observe that the projection โˆ† of ฮ“U := ฮ“ โˆฉ (H ร— U ) to H is a lattice in H, commensurated by the projection of all of ฮ“ to H. If โˆ† is irreducible, Margulisโ€™ commensurator super-rigidity and arithmeticity theorems provide a number field K and a simple K-algebraic group H, so that the semi-simple real Lie group H is isogenous to HK,S โˆž and โˆ† is commensurable to the arithmetic lattice H(O); here S โˆž is the set of infinite places ฮฝ โˆˆ V โˆž for which H(Kฮฝ ) is non-compact. If โˆ† is reducible, it is commensurable to a product โˆ†1 ร— ยท ยท ยท ร— โˆ†n < H1 ร— ยท ยท ยท ร— Hn where โˆ†i < Hi are irreducible lattice, leading to fields Ki and Ki -simple groups Hi , i = 1, . . . , n. For clarity we continue with n = 1 case. (2) We now view ฮ“ as a subgroup of the commensurator CommenH (H(O)) of the arithmetic lattice H(O) โ‰ƒ โˆ†. If one glosses over the difference between the simply-connected and adjoint forms of H (such as SLd and PGLd ) then the above commensurator is the subgroup of rational points H(K), and therefore ฮ“ < H(K). Define S fin to be the set of those non-archimedean places ฮฝ โˆˆ V fin for which the image of ฮ“ in H(Kฮฝ ) is unbounded. (For example, for SLd (Z) < ฮ“ < PSL(Q) the set S fin would consist of primes p that appear with arbitrarily high powers in denominators of entries of ฮณ โˆˆ ฮ“). Then ฮ“ is commensurable to a subgroup of H(O[S]). (3) For ฮฝ โˆˆ S fin the image of ฮ“ in the tdlc group H(Kฮฝ ) is not precompact. It can be showed using Howe-Mooreโ€™s theorem (alternatively, use [58]) that this implies that the image of ฮ“ is dense in (an open subgroup of finite LATTICE ENVELOPES 23 index in) H(Kฮฝ ). One can even show that the image of ฮ“ is dense in (an open subgroup of finite index in) HK,S fin . (4) One now considers the closure L of the diagonal imbedding of ฮ“ in D ร— HK,S fin . Using the fact that the projections to both factors are dense and that the closure of โˆ† โ‰ƒ H(O) in both projections is open compact, one shows that L is a graph of a continuous epimorphism D โ†’ HK,S fin with compact kernel. (5) Finally, the fact that ฮ“ < Hร—D is a lattice, implies that its image, contained in the S-arithmetic lattice H(O[S]), is a lattice in H ร— HK,S fin โ‰ƒ HK,S . Thus ฮ“ โ‰ƒ H(O[S]). If D is compactly generated, then so is HK,S fin , which implies that S fin (hence also all of S) is finite. It also follows that ฮ“ is finitely generated. 5. Proof of Theorem A The starting point of the proof of Theorem A is a consequence of Hilbertโ€™s 5th problem which was observed by Burger-Monod [17, Theorem 3.3.3]. Theorem 5.1. Every locally compact group H contains an open, normal, finite index subgroup H โ€ฒ containing Radam (H) such that the quotient H โ€ฒ / Radam (H) is isomorphic to a direct product of a connected, center-free, semi-simple, real Lie group without compact factors and a tdlc group with trivial amenable radical. Step 1. Reduction to a lattice in a product. It is only the very first step of the proof where we shall take advantage of property (CAF). Theorem 5.2. The amenable radical of a lattice envelope of a group with property (CAF) is compact. Proof. Let Gโ€ฒ < G be an open, normal, finite index subgroup so that G1 := Gโ€ฒ / Radam (G) โˆผ = Gss ร— Gtd 1 1 Gss 1 as in Theorem 5.1, namely is a connected, center-free, semi-simple, real Lie td group without compact factors, and Gtd 1 is a tdlc group with Radam (G1 ) = {1}. td Pick a compact open subgroup U < G1 . We consider the following commutative diagram: =:A }| { z ฮ“ โˆฉ pโˆ’1 (j({1} ร— U )) G pโˆ’1 G (j({1} ร— U )) ฮ“ G ฮ“ โˆฉ Gโ€ฒ Gโ€ฒ pG pGโ€ฒ j({1} ร— U ) G/ Radam (G) Gโ€ฒ / Radam (G) j โˆผ = td Gss 1 ร— G1 The arrows are the obvious inclusions and projections. Moreover, j is defined by requiring commutativity. First we show that A is commensurated by ฮ“ which is equivalent to j({1}ร—U ) being commensurated by G/ Radam (G) by Lemma 2.3. Let g โˆˆ G/ Radam (G). Since Gโ€ฒ is normal in G and thus Gโ€ฒ / Radam (G) is normal G/ Radam (G), conjugation by 24 URI BADER, ALEX FURMAN, AND ROMAN SAUER td โˆผ ss td g is a continuous automorphism of j(Gss 1 ร— G1 ) = G1 ร— G1 . By Lemma 3.16 ss ss this automorphism is the product of continuous automorphisms css g : G1 โ†’ G1 and td td td td cg : G1 โ†’ G1 . Hence conjugation by g maps j({1} ร— U ) to j({1} ร— cg (U )). Since td td the subgroup ctd g (U ) < G1 is open and compact, the intersection cg (U ) โˆฉ U has finite index in U . This implies that j({1} ร— U ) is commensurated by G/ Radam (G) from which we conclude that A is commensurated by ฮ“. Let Gโ€ฒU < Gโ€ฒ be the preimage of Gss 1 ร— U under pGโ€ฒ , and let  pGโ€ฒ ss K := ker Gโ€ฒU โˆ’โˆ’ โ†’ Gss 1 ร— U โ†’ G1 . The group K is an extension of the amenable group Radam (G) by the compact group U . Hence K is amenable. The group ฮ“ โˆฉ Gโ€ฒU is a lattice in Gโ€ฒU by Lemma 3.3. We now invoke a deep result of Breuillard and Gelander [13, ยง9]. It follows from [13, Theorem 9.5] and K being a closed amenable subgroup that the projection of the lattice ฮ“ โˆฉ Gโ€ฒU in Gโ€ฒU /K is discrete. The result of Breuillard and Gelander is a generalization of Auslanderโ€™s theorem where K is a solvable Lie group. By Lemma 3.4, the group โ€ฒ A = ฮ“ โˆฉ pโˆ’1 Gโ€ฒ (j({1} ร— U )) = K โˆฉ (ฮ“ โˆฉ GU ) โˆ’1 is a lattice in K, thus is amenable. Note that we used pโˆ’1 G (j({1}ร—U )) = pGโ€ฒ (j({1}ร— U )) here which follows from the diagram. On the other hand A is commensurated by ฮ“ and hence finite. This implies that K and its closed subgroup Radam (G) are compact.  Let us summarize the situation after the first step: Proposition 5.3. Let ฮ“ have property (CAF), and let ฮ“ < G be a lattice embedding. Then the amenable radical K := Radam (G) of G is compact. By passing to an open normal finite index subgroup Gโ€ฒ < G containing K and to the finite index subgroup ฮ“โ€ฒ := ฮ“ โˆฉ Gโ€ฒ < ฮ“ and taking quotients by compact or finite normal subgroups G1 = Gโ€ฒ /K and ฮ“1 := ฮ“โ€ฒ /(ฮ“โ€ฒ โˆฉ K) one obtains a lattice embedding td ฮ“1 < G1 = Gss 1 ร— G1 , virtually isomorphic to ฮ“ < G, into a product of a connected, center free, semisimple real Lie group without compact factors Gss 1 and a tdlc group with trivial td amenable radical Gtd 1 . Furthermore, G is compactly generated if and only if G1 is compactly generated. Step 2: Projection to the semi-simple factor is irreducible. td Let ฮ“1 < G1 = Gss 1 ร— G1 be a lattice in a product as in Proposition 5.3. Since compact generation of G is assumed in Theorem A, the group G1 is compactly generated. The center-free, semi-simple, real Lie group Gss 1 splits as a direct product of the simple factors: Gss 1 = S1 ร— ยท ยท ยท ร— Sn . For a subset J = {j1 , . . . , jk } โŠ‚ {1, . . . , n} we denote by SJ = Sj1 ร— ยท ยท ยท ร— Sjk the sub-product, which can be viewed both as a subgroup and as a factor of the semi-simple group Gss 1 . Set Sโˆ… = {1}. Given a subset J โŠ‚ {1, . . . , n} consider the image of ฮ“1 under the projection prJ : G1 โˆ’โ†’ Gss 1 โˆ’โ†’ SJ . LATTICE ENVELOPES 25 Note that it is possible that pr{i} (ฮ“1 ) is dense in Si for each i โˆˆ {1, . . . , n}, but prJ (ฮ“1 ) is discrete for some non-empty proper subset J โŠ‚ {1, . . . , n}. Lemma 5.4. There is a unique maximal subset J โŠ‚ {1, . . . , n} for which the projection prJ (ฮ“1 ) is discrete in SJ . Proof. It suffices to show that the collection of all subsets J โŠ‚ {1, . . . , n} with discrete projection to SJ , is closed under union. Let J, K โŠ‚ {1, . . . , n} be subsets such that prJ (ฮ“1 ) is discrete in SJ and prK (ฮ“1 ) is discrete in SK . Let V โŠ‚ SJ , W โŠ‚ SK be open neighborhoods of the identity with prJ (ฮ“1 ) โˆฉ V = {1}, prK (ฮ“1 ) โˆฉ W = {1}. View SJโˆชK as a subgroup in SJ ร— SK . Then U = SJโˆชK โˆฉ (V ร— W ) is an open neighborhood of the identity with prJโˆชK (ฮ“1 ) โˆฉ U = {1}. Therefore prJโˆชK (ฮ“1 ) is discrete in SJโˆชK . This proves the claim.  Let J โŠ‚ {1, . . . , n} be the maximal subset as in the claim. Denote Y Y Si . L = SJ = Sj , H = SJ c = jโˆˆJ We have Gss 1 iโˆˆJ / = L ร— H, and consider the projection prL : G1 = L ร— H ร— Gtd 1 โ†’ L, ฮ“0 = prL (ฮ“1 ). Define ฮ“2 to be the kernel of this projection ฮ“2 = Ker(prL : ฮ“1 โˆ’โ†’ ฮ“0 ). Then ฮ“0 < L and ฮ“2 < H ร— Gtd 1 are lattices (Lemma 3.4). Consider the projections p : H ร— Gtd 1 โˆ’โ†’ H, td q : H ร— Gtd 1 โˆ’โ†’ G1 . Lemma 5.5. The projection p(ฮ“2 ) of ฮ“2 to H is dense. Proof. Let H โ€ฒ = p(ฮ“2 ) be the closure of the projection of ฮ“2 to H. Then H โ€ฒ ร— Gtd 1 โ€ฒ td is a closed subgroup of H ร— Gtd 1 containing the lattice ฮ“2 . By Lemma 3.7, H ร— G1 td โ€ฒ is a closed subgroup of finite covolume in H ร— G1 . It follows that H has finite covolume in H. By Lemma 3.9 H โ€ฒ has the form H โ€ฒ = โˆ† ร— H2 , where H2 is a direct factor of H, H = H1 ร— H2 , and โˆ† < H1 is a lattice. In our setting such a splitting has to be trivial: H โ€ฒ = H2 = H, H1 = โˆ† = {1}. ss Indeed, otherwise the semi-simple group G1 splits as Gss 1 = (L ร— H1 ) ร— H2 , where the projection of ฮ“1 to the L ร— H1 -factor lies in ฮ“0 ร— โˆ† which is discrete. This contradicts the maximality of L as such a factor. This completes the proof of the lemma.  td We now define an lcsc group G2 to be G2 = Gss 2 ร— G2 , where Gss 2 = H, td Gtd 2 = q(ฮ“2 ) < G1 . td Being a closed subgroup of a tdlc group Gtd 1 , the group G2 itself is tdlc. The group ss G2 = H is a connected, center-free, semi-simple, real Lie group. td The group G2 is a closed subgroup of H ร— Gtd 1 containing a lattice ฮ“2 < H ร— G1 . td By Lemma 3.7, ฮ“2 forms a lattice in G2 , and G2 = H ร— G2 is a finite covolume td td subgroup of H ร— Gtd 1 . Thus G2 is a subgroup of finite covolume in G1 . Since 26 URI BADER, ALEX FURMAN, AND ROMAN SAUER td Radam (Gtd 1 ) = {1} we deduce that Radam (G2 ) = {1} using Lemma 3.11. We summarize: td Proposition 5.6. Let ฮ“1 < G1 = Gss 1 ร— G1 be as in Proposition 5.3. Then there ss td is a splitting G1 = L ร— H and a closed subgroup Gtd 2 < G1 such that by setting ss ss td G2 = H and G2 = G2 ร— G2 we have: (1) (2) (3) (4) (5) (6) (7) The projection ฮ“0 = prL (ฮ“1 ) of ฮ“1 is a lattice in L. prL td The kernel ฮ“2 = Ker(ฮ“1 โˆ’โ†’ ฮ“0 ) is a lattice in G2 = Gss 2 ร— G2 . ss ss The projection pr2 (ฮ“2 ) is dense in G2 = H. td The projection prtd 2 (ฮ“2 ) is dense in G2 . td td G2 < G1 is a closed subgroup of finite covolume. Gtd 2 has trivial amenable radical. Gtd 2 is compactly generated. Most of the conditions needed for an application of Theorem 4.5 are satisfied with the exception of injectivity of the projection ss prss 2 : ฮ“2 โˆ’โ†’ G2 = H. This is our next topic of concern. Step 3. Identifying the lattice embedding. We still denote the projections of G1 and G2 to their Lie and tdlc factors by ss prss i : Gi โ†’ Gi td and prtd for i โˆˆ {1, 2}. i : Gi โ†’ Gi td The images of a subgroup in Gi under prss i and pri will be indicated by superscripts ss and td, respectively. For a subgroup H < G let ZG (H) := {g โˆˆ G | โˆ€hโˆˆH gh = hg} denote the centralizer of H in G. td Let U < Gtd 1 be a compact open subgroup in the tdlc group G1 such that ฮ“1 โˆฉ ({1} ร— U ) = {1}. We define the following groups: Ni := ฮ“i โˆฉ ({1} ร— Gtd i ) for i โˆˆ {1, 2}, M1 := ฮ“1 โˆฉ (Gss 1 ร— U ), (5.1) M2 := ฮ“2 โˆฉ M1 , ฮ“3 := ฮ“2 /N2 , M3 := p(M2 ) where p : ฮ“2 ึ‰ ฮ“3 is the projection, ss Gss 3 := G2 , td td Gtd 3 := G2 /N2 , td G3 := Gss 3 ร— G3 . Remark 5.7. Since N2td is normalized by the dense image of ฮ“2 in Gtd 2 and the normalizer of a closed subgroup is closed, the subgroup N2td is normal in Gtd 2 . This justifies the last definition. Moreover, since Gss 1 commutes with N2 it follows that N2 is normal in G2 . Note that since compact generation passes to quotients, Gtd 3 is compactly generated. Remark 5.8. At this point, we do not claim triviality of the amenable radical of Gtd 3 , even though it will follow from later analysis. Lemma 5.9. The group N1 commutes with some finite index subgroup of M1 . LATTICE ENVELOPES 27 Proof. At this point we want to apply property (NbC) of the original group ฮ“. Note that property (NbC) does not pass to finite index subgroups in general, so we have to argue more specifically. We refer to the notation of Proposition 5.3. Note that ฮ“1 = (ฮ“ โˆฉ Gโ€ฒ )/(ฮ“ โˆฉ K) is a subgroup of ฮ“/(ฮ“ โˆฉ K). We show that N1 is normal in ฮ“/(ฮ“ โˆฉ K) and M1 is commensurated by ฮ“/(ฮ“ โˆฉ K). From this the claim follows since ฮ“/(ฮ“ โˆฉ K) has (NbC) by Lemma 2.5. ss The group {1} ร— Gtd 1 is a topologically characteristic subgroup of G1 = G1 ร— td โ€ฒ โ€ฒ td G1 = G /K by Lemma 3.16. Since G /K < G/K is normal, {1} ร— G1 is normal in G/K. Since ฮ“1 = (ฮ“ โˆฉ Gโ€ฒ )/(ฮ“ โˆฉ K) is a normal subgroup of ฮ“/(ฮ“ โˆฉ K), the group โ€ฒ N1 is normal in ฮ“/(ฮ“ โˆฉ K). The subgroup Gss 1 ร— U < G1 = G /K is commensurated โ€ฒ by G/K since G /K โŠณ G/K is normal and every (topological) automorphism of G1 ss is a product of an automorphism of Gtd 1 and one of G1 by Lemma 3.16. Since ฮ“1 โŠณ ฮ“/(ฮ“ โˆฉ K) is normal, M1 is commensurated by ฮ“/(ฮ“ โˆฉ K).  By the previous lemma and upon making U smaller we may and will assume that M1 itself centralizes N1 and M1 โˆฉ N1 = {1}. It follows that M2 centralizes N2 . We record that (5.2) Mi โˆฉ Ni = {1} and [Mi , Ni ] = {1} for i โˆˆ {1, 2}. In particular, the subgroup Mi Ni < ฮ“i is isomorphic to Mi ร— Ni . Lemma 5.10. The inclusions Miss ึ’โ†’ Gss i for i โˆˆ {1, 2, 3} and ฮ“3 ึ’โ†’ G3 are lattice embeddings. td Proof. By Lemma 3.3, M1 is a lattice in Gss 1 ร—U since U < G1 is an open subgroup. ss ss Since U is also compact, the image M1 of M1 in G1 is a lattice of Gss 1 as well. ss ss ss ss Similarly, M2 < Gss 2 ร— U and M2 < G2 are lattices. Since G2 = G3 by definition ss ss one easily sees that the images of M2 and M3 in Gss 2 coincide, so M3 = M2 . In ss ss particular, M3 < G3 is a lattice. Since N2 โŠณ ฮ“2 is also normal in G2 (see the remark below (5.1)), the quotient ฮ“3 td td โˆผ  is a lattice in G3 = Gss 2 ร— G2 /N2 = G2 /N2 by Lemma 3.4. We are finally in a position to identify the lattice embedding ฮ“1 < G1 , which is virtually isomorphic to the original lattice embedding ฮ“ < G. We distinguish three cases depending on the finiteness of the groups M1 and M2 . Case (i): M1 is finite (ฮ“1 is a lattice in a tdlc group). In this case, the connected real Lie group Gss 1 without compact factors has a finite td group M1ss as a lattice, thus Gss 1 must be trivial. Thus G1 = G1 is a tdlc group with trivial amenable radical that contains ฮ“1 as a lattice. If ฮ“ is assumed to have property (BT), the same applies to ฮ“1 , and by Lemma 3.8, ฮ“1 < G1 is a uniform lattice. Either G1 is discrete which means that the original lattice embedding ฮ“ ึ’โ†’ G was trivial or we are in case (3) of the main theorem. Case (ii): M1 is infinite, but M2 is finite (ฮ“1 is a lattice in a semi-simple Lie group). ss In this case M2ss is finite and a lattice in Gss 2 . As above we conclude that G2 = H is trivial. Therefore ฮ“2 = N2 , and td td td Gtd 2 = ฮ“2 = N 2 = N 2 . The last equality follows from the discreteness of N2td . 28 URI BADER, ALEX FURMAN, AND ROMAN SAUER ss Since M1ss = prss 1 (M1 ) is a lattice in G1 = L ร— H = L and a subgroup of the ss lattice ฮ“0 (see Proposition 5.6), M1 < ฮ“0 must have finite index. We have a short exact sequence prL ฮ“0 โˆ’โ†’ 1. 1 โˆ’โ†’ ฮ“2 โˆ’โ†’ ฮ“1 โˆ’โ†’ ss The prL -preimage of M1 which equals ฮ“2 ยท M1 = N2 M1 โˆผ = N2 ร— M1 is a finite index subgroup of ฮ“1 . Since M1 is infinite, the (Irr) condition forces ฮ“2 = N2 to be td td finite. So Gtd 2 is finite. As G2 has finite covolume in G1 , the latter is compact. In td fact, G1 has to be trivial, because it has a trivial amenable radical. We conclude that ฮ“1 is a classical lattice in a connected, center-free, semi-simple, real Lie group L = Gss 1 = G1 . This lattice is irreducible due to assumption (Irr). This corresponds to case (1) in the main theorem. Case (iii): M2 is infinite (ฮ“1 is an S-arithmetic lattice). ss Recall that the projection M2ss of M2 to Gss 2 = G3 = H is a lattice there. The ss assumption that M2 is infinite, means that G3 is non-trivial. The inclusion td ฮ“3 < G3 = Gss 3 ร— G3 is a lattice embedding by Lemma 5.10. At this point we may and will apply the Arithmetic Core Theorem 4.5 to ฮ“3 < G3 to deduce that, up to dividing Gtd 3 by a compact normal subgroup C, one has a product of S-arithmetic lattices with nontrivial semi-simple and totally disconnected factors. (It will become clear below that C is trivial and that there is only one irreducible S-arithmetic lattice). More precisely, there are number fields K1 , . . . , Kn , absolutely simple Ki -algebraic groups Hi , and finite sets Si โŠ‚ Vi of places of Ki compatible with Hi such that, denoting โ—ฆ the connected real Lie groups by Hi = (Hi )+ Ki ,S โˆž = (Hi )Ki ,S โˆž , we have i i td Gss 3 ร— G3 /C = n Y Hi ร— i=1 n Y Qi i=1 for certain closed intermediate groups (Hi )+ K fin i ,Si < Qi < (Hi )Ki ,Sifin . Moreover, ฮ“3 is commensurable to the product of the Si -arithmetic lattices: There are finite index subgroups ฮ“3,i < Hi (Oi [Si ]) such that (5.3) ฮ“3,1 ร— ยท ยท ยท ร— ฮ“3,n < ฮ“3 , [ฮ“3 : ฮ“3,1 ร— ยท ยท ยท ร— ฮ“3,n ] < โˆž has finite index. Upon passing to smaller finite index subgroup, we may assume that (5.3) is the inclusion of a normal subgroup. By Lemma 5.10, M3ss < Gss 3 = H1 ร— ยท ยท ยท ร— Hn is a lattice. It contains a product of irreducible lattices โˆ†i < Hi as a finite index subgroup: โˆ†1 ร— ยท ยท ยท ร— โˆ†n < M3ss , [M3ss , โˆ†1 ร— ยท ยท ยท ร— โˆ†n ] < โˆž. Relying on the (NbC) condition we showed (see (5.2)) that M2 < ฮ“2 commutes with N2 , so (5.4) M2 < Zฮ“2 (N2 ). The abelian subgroup Zฮ“2 (N2 ) โˆฉ N2 = Z(N2 ) is, being a characteristic subgroup td td of N2td โŠณ Gtd 2 , normal in G2 . Since G2 has a trivial amenable radical, (5.5) Zฮ“2 (N2 ) โˆฉ N2 = {1}. LATTICE ENVELOPES 29 Hence the restriction p|Zฮ“2 (N2 ) of the quotient map p : ฮ“2 โ†’ ฮ“3 = ฮ“2 /N2 is injective. The image p(Zฮ“2 (N2 )) of the normal subgroup Zฮ“2 (N2 ) is normal in ฮ“3 and contains M3 . The subgroup n Y ฮ“3,i T3 := p(Zฮ“2 (N2 )) โˆฉ i=1 has finite index in p(Zฮ“2 (N2 )) and is normal in ฮ“3,1 ร— ยท ยท ยท ร— ฮ“3,n . The commutative diagram below summarizes the various relations between the groups. Since โˆ†i and M3 โˆฉ T3 โˆฉ ฮ“3,i are commensurable, the normal subgroup T3 โˆฉ ฮ“3,i โŠณ ฮ“3,i is infinite. Since each ฮ“3,i is an irreducible Si -arithmetic lattice, Margulisโ€™ normal subgroup theorem implies that each T3 โˆฉ ฮ“3,i < ฮ“3,i is of finite index, thus p(Zฮ“2 (N2 )) < ฮ“3 is of finite index. By the injectivity of p|Zฮ“2 (N2 ) , the group Zฮ“2 (N2 ) is thus (abstractly) commensurable with a product of S-arithmetic lattices. By Theorem 3.13, Zฮ“2 (N2 ) has a finite outer automorphism group. Further, the center of Zฮ“2 (N2 ) โŠณ ฮ“2 is trivial since it lies in the amenable radical of ฮ“2 which is trivial by Proposition 5.6 and Lemma 3.11. Qn M2 โˆผ = Zฮ“2 (N2 ) p โˆผ = i=1 Hi f.i. p(Zฮ“2 (N2 )) M3 Gss 3 ร— {1} ฮ“3 td Gss 3 ร— G3 โŠณ โŠณ ฮ“2 Qn โˆ†i i=1 p ฮ“2 /N2 โŠณ f.i. T3 Qn โŠณ i=1 Qn ฮ“3,i i=1 Hi ร— Q i f.i. Qn i=1 Hi (Oi [Si ]) Qn i=1 (Hi )Ki ,Si โˆž ร— (Hi )Ki ,Sifin Since N2 is the intersection of ฮ“2 โŠณ ฮ“1 and N1 โŠณ ฮ“1 the subgroup N2 is normal in ฮ“1 which implies that Zฮ“2 (N2 ) is normal in ฮ“1 .  By Lemma 3.14 the finite index subgroup ฮ“โ€ฒ1 = ker ฮ“1 โ†’ Out(Zฮ“2 (N2 )) < ฮ“1 splits as a direct product: ฮ“โ€ฒ1 โˆผ = Zฮ“2 (N2 ) ร— (ฮ“โ€ฒ1 /Zฮ“2 (N2 )). Assumption (Irr) implies that one of the factors is finite; and by M2 being infinite and (5.4), we obtain that Zฮ“2 (N2 ) is of finite index in ฮ“1 , hence ฮ“2 < ฮ“1 is of finite index. So ฮ“0 is finite. Because of [ฮ“1 : Zฮ“2 (N2 )] < โˆž and (5.5) we obtain that N1 and N2 are finite. The group L, being a lattice envelope of ฮ“0 , is compact, thus L and ฮ“0 are trivial. ss ss So Gss 1 = H = G2 = G3 . Using condition (Irr) we can now also deduce that there was only one irreducible factor, hence n = 1 in (5.3). Furthermore, the group N2 โˆผ = N2td , that is now known to be finite, has to be td td trivial, because N2 is normal in Gtd 2 , while Radam (G2 ) = {1}. It follows that td G3 = G2 and Radam (G3 ) = {1}. In particular, the compact normal subgroup C โŠณ Gtd 3 is actually trivial. 30 URI BADER, ALEX FURMAN, AND ROMAN SAUER We deduce that there is a number field K, a connected, non-commutative, adjoint, absolutely simple K-groups H, and a finite set S = S โˆž โˆช S fin of places as in ยง4.1 so that ฮ“1 = ฮ“2 = ฮ“3 โ‰ƒ H(O[S])+ is an irreducible S-arithmetic lattice in the lcsc group + + td G2 = Gss 2 ร— G2 = HK,S โˆž ร— HK,S fin . It remains to identify the lcsc group G1 . We have established the triviality of ฮ“0 and of L, hence + ss ss Gss 1 = H ร— L = H = G2 = G3 = HK,S โˆž . It remains to identify the totally disconnected component Gtd 1 that contains Y + + td H(Kฮฝ ) G2 = HK,S fin = ฮฝโˆˆS fin as a closed subgroup of finite covolume. + td Step 4: Lattice envelope Gtd 1 of G2 = HK,S fin . Let us enumerate the elements in S fin = {ฮฝ1 , . . . , ฮฝn } in such a way that H has Kฮฝi -rank at least two for 1 โ‰ค i โ‰ค k and has Kฮฝi -rank 1 for k < i โ‰ค n. The extreme cases k = n or k = 0 are, of course, possible. Let Xi be the Bruhat-Tits building associated to H(Kฮฝi ), and let Hi := H(Kฮฝi )+ . We write H = H1 ร— ยท ยท ยท ร— Hn and X = X1 ร— ยท ยท ยท ร— Xn . With that notation, H = Gtd 2 . The spaces Xi are irreducible Euclidean buildings with cocompact affine Weyl group and Moufang Tits boundary. Each group Hi acts by automorphisms on the simplicial complex Xi , such that the action on vertex set has finitely many orbits and the vertex stabilizers are maximal compact subgroups of Hi . For i โˆˆ {k + 1, . . . , n} the building Xi is a tree. Theorem 5.11. Let G be a tdlc group that has trivial amenable radical and contains H = Gtd 2 as a closed subgroup of finite covolume. Then G/H is compact, and there is an open subgroup Gโ€ฒ < G of finite index that contains H such that the natural embedding H โ†’ Isom(X) extends to an injective continuous homomorphism Gโ€ฒ โ†’ Isom(X) with closed image. We apply this result to G = Gtd 1 whose amenable radical is trivial. According to Remark 4.4 und upon passing to a closed subgroup of Gโ€ฒ of finite index the group Gโ€ฒ is a tree extension of H in the sense of Definition 4.3. This finishes the proof of Theorem A based on Theorem 5.11. The proof of Theorem 5.11 proceeds in several steps. We heavily use techniques from geometric group theory, inspired by the approach taken in [33, Section 3]. Compactness of G/H. By the Bruhat-Tits fixed-point theorem (see [15, Corollary 2.8 on p. 179] for a more general result on CAT(0)-spaces) every compact subgroup of H fixes a vertex of X. But since there are only finitely many H-orbits of vertices there are only finitely many vertex stabilizer groups up to conjugation. In particular, H endowed with Haar measure m has an upper bound on the Haar measure of its open compact subgroups:  sup m(U ) | U is an open compact subgroup of H < +โˆž. LATTICE ENVELOPES 31 Thus Lemma 3.8 applies to H < G and implies compactness of G/H. Definition of the subgroup Gโ€ฒ < G. Applying Lemma 3.29 in combination with Remark 3.30 to H acting on X, one obtains a homomorphism of G to the quasiisometry group of X ฯ† : G โ†’ QI(X). Further, there are constants C, L > 0 such that for every g โˆˆ G there is a (L, C)quasi-isometry fg : X โ†’ X that represents the class ฯ†(g) โˆˆ QI(X) and has the following property: For every bounded set B โŠ‚ X there is a neighborhood of the identity V โŠ‚ G so that (5.6) โˆ€gโˆˆV โˆ€xโˆˆB dX (fg (x), x) < C. We now apply the following splitting theorem by Kleiner and Leeb. Theorem 5.12 ([42, Theorem 1.1.2]). For every C, L > 0 there are Lโ€ฒ , C โ€ฒ , D > 0 such that every (L, C)-quasi-isometry X โ†’ X is within distance D from a product of (Lโ€ฒ , C โ€ฒ )-quasi-isometries Xi โ†’ Xฯ€(i) between the factors for some permutation ฯ€ โˆˆ Symn . At the expense of increasing the constants C and L, we may hence assume (i) that each fg is a product of (L, C)-quasi-isometries fg : Xi โ†’ Xฯ€g (i) for some permutation ฯ€g โˆˆ Symn . Another consequence of Theorem 5.12 is that the product QI(X1 ) ร— ยท ยท ยท ร— QI(Xn ) embeds into QI(X) as a subgroup of index at most n! = |Symn |. We define the finite index subgroup Gโ€ฒ < G as the ฯ†-preimage of QI(X1 ) ร— ยท ยท ยท ร— QI(Xn ). Note that Gโ€ฒ contains H. So there are homomorphisms ฯ†i : Gโ€ฒ โˆ’โ†’ QI(Xi ) for i โˆˆ {1, . . . , n} such that ฯ†|Gโ€ฒ = ฯ†1 ร— ยท ยท ยท ร— ฯ†n . Further, there are (L, C)(i) (i) quasi-isometries fg : Xi โ†’ Xi for every i โˆˆ {1, . . . , n} and g โˆˆ Gโ€ฒ such that fg represents ฯ†i (g). The restriction of ฯ†i to H agrees with the homomorphism pr i H โˆ’โˆ’โ†’ Hi โ†’ Isom(Xi ) โ†’ QI(Xi ), where pri is the projection to the i-th factor. In view of (5.6) and the quantitative statement in Theorem 5.12 and at the expense of increasing C, L > 0 once more, the following holds true: For every i โˆˆ {1, . . . , n} and for every bounded set B โŠ‚ Xi there is a neighborhood of the identity V โŠ‚ G so that (5.7) โˆ€gโˆˆV โˆ€xโˆˆB dX (fg(i) (x), x) < C. Openness of Gโ€ฒ < G. The group Gโ€ฒ is defined as the kernel of a homomorphism of G to a finite group. But we do not know at this point that the homomorphism is continuous, which would imply that Gโ€ฒ < G is open, thus an lcsc group itself. Next we provide a direct argument that shows openness of Gโ€ฒ < G. Let dX and dXk denote the metric on X and Xk , respectively. Let Bi โŠ‚ Xi be a bounded subset whose diameter exceeds 3C, and let B = B1 ร— ยท ยท ยท ร— Bn . Let V โŠ‚ G be a neighborhood of the identity that satisfies (5.6). Next we show that V is contained in Gโ€ฒ and so Gโ€ฒ < G is an open subgroup. Suppose it is not. Then there is g โˆˆ V such that ฯ€g is non-trivial. Let i โˆˆ {1, . . . , n} be such that j := ฯ€g (i) 6= i. Let xj , xโ€ฒj โˆˆ Bj be points whose distance is at least 3D. Pick (i) points xl โˆˆ Bl for l โˆˆ {1, . . . , j โˆ’ 1, j + 1, . . . , n}. Then either dXj (fg (xi ), xj ) > C 32 URI BADER, ALEX FURMAN, AND ROMAN SAUER (i) or dXj (fg (xi ), xโ€ฒj ) > C. Without loss of generality assume the first case. Let x = (x1 , . . . , xn ) โˆˆ B. Then dX (fg (x), x) โ‰ฅ dXj (fg(i) (xi ), xj ) > C, contradicting (5.6). Therefore V โŠ‚ Gโ€ฒ . Mapping Gโ€ฒ to Isom(Xi ) for the higher rank factors Xi . The rigidity theorem for higher rank irreducible buildings (such as X1 , . . . , Xk ) by Kleiner and Leeb [42] is the next important ingredient. Theorem 5.13 ([42, Theorem 1.1.3]). Let i โˆˆ {1, . . . , k}. For every C > 0 and L > 0 there is a constant D > 0 such that every (L, C)-quasi-isometry Xi โ†’ Xi is within distance D from a unique isometry Xi โ†’ Xi . Moreover, no two distinct isometries Xi โ†’ Xi for i โˆˆ {1, . . . , k} are within bounded distance from each other. Hence the natural homomorphism Isom(Xi ) โ†’ QI(Xi ) is an isomorphism for i โˆˆ {1, . . . , k} and composing its inverse with ฯ†i we obtain homomorphisms ฯˆi : Gโ€ฒ โˆ’โ†’ Isom(Xi ) pr i for which the restriction to H < G is the homomorphism H โˆ’โˆ’โ†’ Hi โ†’ Isom(Xi ). (i) The statement (5.7) and Theorem 5.13 applied to fg show that there is a constant E > 0 such that for every bounded subset B โŠ‚ Xi there is a neighbourhood of the identity V โŠ‚ G such that (5.8) โˆ€gโˆˆV โˆ€xโˆˆB dXi (ฯˆi (g)(x), x) < E. Lemma 5.14. The map ฯˆi is continuous for i โˆˆ {1, . . . , k}. Proof. Let U โŠ‚ Isom(Xi ) be an open neighborhood of the identity. We have to show that there is open neighborhood of the identity of G that is contained in ฯˆiโˆ’1 (U ). We rely on the following geometric fact about buildings that follows, for example, from [60]: For every constant D > 0 and any open neighborhood W of the identity in Isom(Xi ), there is a bounded set B โŠ‚ Xi , depending on D and W so that  (5.9) ฮธ โˆˆ Isom(Xi ) | sup dXi (ฮธ(x), x) < D โŠ‚ W. xโˆˆB We apply this general fact to the constant E from (5.8) and the identity neighborhood U . Let us fix a bounded subset B = B(E, U ) โŠ‚ Xi such that  (5.10) ฮธ โˆˆ Isom(Xi ) | sup dXi (ฮธ(x), x) < E โŠ‚ U. xโˆˆB Applying the statement (5.8) to this specific subset B provides us with a neighborhood V = V (E, B) โŠ‚ G of the identity such that (5.11) โˆ€gโˆˆV โˆ€xโˆˆB dXi (ฯˆi (g)(x), x) < E. Since (5.10) and (5.11) mean that ฯˆiโˆ’1 (U ) โŠ‚ V , continuity of ฯˆi follows.  LATTICE ENVELOPES 33 Mapping G to Homeo(โˆ‚Xj ) for the rank 1 factors Xj . Next we turn to the tree factors Xj with j โˆˆ {k + 1, . . . , n}. For every tree of bounded degree T , such as Xj with k < j โ‰ค n, the space of ends โˆ‚T is compact, and one has an embedding of groups QI(T ) ึ’โ†’ Homeo(โˆ‚T ). For j โˆˆ {k + 1, . . . , n} let ฯˆj be the composition ฯ†j ฯˆj : Gโ€ฒ โˆ’โ†’ QI(Xj ) ึ’โ†’ Homeo(โˆ‚Xj ). Lemma 5.15. The map ฯˆj is continuous and has a closed image for every j โˆˆ {k + 1, . . . , n}. Proof. The continuity statement is proved in [33, Theorem 3.5]. The argument is analogous to the one for Lemma 5.15. However, instead of the geometric fact (5.9) one uses the following fact which is a consequence of the Mostow-Morse lemma: For a tree T of bounded degree and constants L, C, D > 0 and for any identity neighbourhood U โŠ‚ Homeo(โˆ‚T ) there is a compact subset B โŠ‚ T so that the image in Homeo(โˆ‚T ) of any (L, C)-quasi-isometry f : T โ†’ T with sup{dT (f (x), x) | x โˆˆ B} < D belongs to U . Since H is cocompact in Gโ€ฒ and the image of H in Homeo(โˆ‚Xj ), which equals the image of Hj in Homeo(โˆ‚Xj ), is closed, also the image of Gโ€ฒ is closed.  Identifying the image of ฯˆj . Since ฯˆi is continuous for i โˆˆ {1, . . . , n}, Ker(ฯˆi ) is a closed subgroup of G. We set Gi := Gโ€ฒ / Ker(ฯˆi ). Regarding Hi as a subgroup of H and thus of Gโ€ฒ , the inclusion Hi ึ’โ†’ G induces a monomorphism Hi ึ’โ†’ Gi since Gโ€ฒ restricts to an injective map Hi โ†’ Isom(Xi ) or Hi โ†’ Homeo(โˆ‚Xi ), respectively. By Theorem 3.28 Isom(Xi ) contains Hi as a closed subgroup of finite index for i โˆˆ {1, . . . , k}. Thus the ฯˆi -image of Gโ€ฒ for i โˆˆ {1, . . . , k} contains Hi as a subgroup of finite index. Let us consider the ฯˆj -image for the tree factors. Fix an index j โˆˆ {k +1, . . . , n}. The map ฯ†j describes a quasi-action of Gโ€ฒ , thus a faithful quasi-action of Gj , (j) on the tree Xj since every g โˆˆ G acts by a (L, C)-quasi-isometry fg such that (j) (j) (j) fg1 โ—ฆ fg2 is within uniformly bounded distance from fg1 g2 . Next we resort to the work of Mosher, Sageev and Whyte on quasi-actions on trees. Their main result says: Theorem 5.16 ([51, Theorem 1]). A cobounded quasi-action of a group on a bushy tree of bounded degree is quasi-conjugated to an isometric action of the same group on a โ€“ possibly different โ€“ tree. Since Xj has degree at least 3 and Hj acts cocompactly on Xj the assumptions are fulfilled for the quasi-action of Gj on Xj . Hence there is a tree Tj on which Gj acts by isometries and a quasi-conjugacy from Xj to Tj , that is, a quasi-isometry ฮท : Xj โ†’ Tj such that    dTj ฮท ฯ†j (g)(x) , gฮท(x) < โˆž. sup gโˆˆGj ,xโˆˆXj 34 URI BADER, ALEX FURMAN, AND ROMAN SAUER Some preliminary remarks for the proof of Lemma 5.18 below are in order. We rely on the group-theoretic description of Bruhat-Tits buildings (see e.g. [1, Corollary 11.35 on p. 563 and Theorem 11.38 on p. 564]) which we only need in dimension 1: The Bruhat-Tits tree Xj as a 1-dimensional Hj -equivariant CW-complex consists of two Hj -orbits of vertices Hj /K1 and Hj /K2 , where K1 and K2 are nonconjugated maximal compact-open subgroups of Hj , and one Hj -orbit Hj /(K1 โˆฉK2 ) of edges. Further, K1 and K2 generate Hj . In this description we are using that Hj = H(Kฮฝj )+ is the image of the Kฮฝj -points of the simply connected form of H; the whole group H(Kฮฝj ) might have only one orbit of vertices. An action of a group on a tree is called minimal if there are no proper subtrees invariant under the group action. If an action on a locally finite tree is minimal then the induced action on the boundary of the tree is minimal in the sense of dynamical systems: there are no proper closed invariant subsets. This is a consequence of the limit set being the minimal closed invariant subset of the boundary (see [26, Theฬoreฬ€me 5.1] for a more general result, which is attributed to Gromov, in the context of Gromov-hyperbolic spaces). Conversely, if a group G is acting by automorphisms on a locally finite tree T , and L โŠ‚ โˆ‚T is a minimal G-invariant set consisting of more than two points, then the union of all geodesics in T with end points in L, called the convex hull TL of L, is a minimal G-invariant sub-tree of T . Any G-invariant sub-tree T โ€ฒ has โˆ‚T โ€ฒ = L, and therefore contains TL . Moreover there exists a retraction r : T โ€ฒ โ†’ TL given by nearest point projection to TL . This retraction is equivariant with respect to Aut(T ). Returning to our situation recall that the action of Hj on the tree Xj is minimal, hence the Hj -action on โˆ‚Xj is minimal. Since โˆ‚ฮท is an equivariant homeomorphism, the action of Hj on โˆ‚Tj is also minimal. In particular, the Gj -action on the convex hull of โˆ‚Tj gives a minimal Gj -invariant tree. Without loss of generality we may assume Tj itself is the convex hull of its boundary โˆ‚Tj , i.e. that Tj does not have vertices of degree one. The action of Gj on โˆ‚Tj defines a proper action on the space โˆ‚ (3) Tj of triples of distinct points of โˆ‚Tj . Thus the Gj -action on โˆ‚Tj is minimal and strongly proximal. The subgroup Hj < Gj has finite covolume. Thus the action of Hj on โˆ‚Tj is also minimal and strongly proximal by Lemma 3.12. Minimality of the Hj -action on โˆ‚Tj implies that Tj , which is the convex hull of its boundary, is minimal also as an Hj -invariant tree. Lemma 5.17. The action homomorphism Gj โ†’ Isom(Tj ) is injective, continuous and has a closed image. Proof. The map ฮท induces a Gj -equivariant homeomorphism โˆ‚ฮท : โˆ‚Xj โ†’ โˆ‚Tj . Since both the isometry group and the quasi-isometry group of either Xj or Tj inject into the homeomorphism group of โˆ‚Xj or โˆ‚Tj , respectively, and ฯ†j is injective, the map Gj โ†’ Isom(Tj ) is injective. Since Isom(Tj ) embeds as a closed subgroup into Homeo(โˆ‚Tj ) continuity and closedness follow from the continuity and closedness of the composition Gj โ†’ Isom(Tj ) โ†’ Homeo(โˆ‚Tj ). But the latter is conjugated via โˆ‚ฮท to the map Gj โ†’ Homeo(โˆ‚Xj ) whose continuity and closedness is implied by Lemma 5.15.  LATTICE ENVELOPES 35 Lemma 5.18. There is c โˆˆ N and an Hj -equivariant cellular homeomorphism f : Xj โ†’ Tj such that f is a homothety with stretch factor c. Proof. Upon subdividing we may assume that Hj acts on Tj without inversion. By the continuity part of Lemma 5.17 the orbits of the compact subgroups K1 and K2 in Tj are bounded. By the Bruhat-Tits fixed point theorem [15, Corollary 2.8 on p. 179], there is a vertex in Tj that is fixed under K1 or K2 , respectively. Choose a pair (v1 , v2 ) of vertices with Ki vi = vi that has minimal distance. The Hj -orbit of the geodesic segment c between v1 and v2 is connected, thus a Hj -invariant subtree of Tj , because Hj is generated by K1 and K2 . By Hj minimality of Tj the Hj -orbit of c is Tj . Moreover, c is fixed by K1 โˆฉ K2 . The map that sends the vertex 1 ยท Kl to vl for l โˆˆ {1, 2} and the edge e = 1 ยท (K1 โˆฉ K2 ) onto c by an affine homeomorphism can be extended to an Hj -equivariant cellular map f : Xj โ†’ Hj . Clearly, f is surjective. Next we show that f is locally injective. It is enough to show local injectivity at the vertices 1K1 and 1K2 of Xj . By symmetry let us consider 1K1 only. Consider its neighbours 1K2 and hK2 for some h โˆˆ Hj . Since K1 and K2 are not conjugated the f -images v1 , v2 , v2โ€ฒ of 1K1 , 1K2 and hK2 are pairwise distinct. Let w be the center of the tripod given by v1 , v2 , v2โ€ฒ . We want to show that w = v1 which implies local injectivity of f at 1K1 . Both K1 โˆฉ K2 and K1 โˆฉ hK2 hโˆ’1 are contained in the stabilizer S of w. Since K1 โˆฉ K2 is maximal in K1 and K1 โˆฉ hK2 hโˆ’1 6= K1 โˆฉ K2 by the group theoretic description of the Bruhat-Tits tree [1, Theorem 11.38 on p. 564] it follows that S = K1 . So w = v1 since we chose (v1 , v2 ) to have minimal distance among the vertices fixed by K1 or K2 , respectively. As a surjective, locally injective map between trees f is a homeomorphism. Let c be the distance between v1 and v2 . Obviously, f is locally a homothety with stretch factor c. Thus it is globally so.  Conjugating with a homothety as in Lemma 5.18 we obtain a topological isomorphism Isom(Tj ) โˆผ = Isom(Xj ) compatible with the two embeddings of Hj . Hence, Gj can be embedded as a closed intermediate subgroup Hj < Gj < Isom(Xj ), and the homomorphism ฯˆj can be regarded as Gโ€ฒ โ†’ Gj ึ’โ†’ Isom(Xj ) composed with the natural embedding โ€ฒ Isom(Xj ) โ†’ Homeo(โˆ‚X Qn j ). โ€ฒThus we also denote the map G โ†’ Gj โ†’ Isom(Xj ) โ€ฒ by ฯˆj . Let โˆ† : G โ†’ i=1 G be the diagonal embedding. We obtain a continuous homomorphism with closed image n Q ฯˆi โ—ฆโˆ† Y Isom(Xi ) < Isom(X) ฯˆ : Gโ€ฒ โˆ’โˆ’โˆ’โˆ’โˆ’โ†’ i=1 whose restriction to H is the natural embedding H ึ’โ†’ Isom(X). Since G/H is compact, ker(ฯˆ) is compact. Since the amenable radical of G, thus of Gโ€ฒ by Lemma 3.11, is trivial, the map ฯˆ is injective. This completes the proof of Theorem 5.11, and therefore also the proof of the main classification result โ€“ Theorem A. 6. Proofs of Theorems Bโ€“F Proof of Theorem B. Let ฮ“ < H be a lattice embedding, where we assume that 36 URI BADER, ALEX FURMAN, AND ROMAN SAUER (i) either H is a connected, center-free, real Lie group without compact factors, H 6โ‰ƒ SL2 (R) and ฮ“ < H is an irreducible lattice, (ii) or H = HK,S as in Setup 4.1 and ฮ“ is commensurable to the S-arithmetic lattice H(O[S]). Such ฮ“ satisfies all the assumptions of Theorem A. Indeed, being a lattice ฮ“ is Zariski dense in the semi-simple algebraic group H (Borelโ€™s Density Theorem, cf. [47, Theorem II.(4.4)]). Thus Theorem 1.4.(2) ensures that ฮ“ satisfies conditions (CAF) and (NbC). Being an irreducible lattice, ฮ“ satisfies (Irr). Lattices in semisimple groups are known to be finitely generated (cf. [47, ยงIX.(3.2)]). By Selbergโ€™s lemma ฮ“ contains a torsion-free subgroup of finite index, in particular condition (BT) applies. Let G be some lcsc group and ฮ“ < G be a lattice embedding. Theorem A states that there is an open subgroup of finite index Gโ€ฒ < G and a compact normal subgroup K โŠณ Gโ€ฒ so that, upon replacing G by Gโ€ฒ /K and ฮ“ by ฮ“ โˆฉ Gโ€ฒ (we assume ฮ“ to be torsion-free), one has the following three possibilities: (1) G is a connected, center-free, semi-simple, real Lie group without compact factors and ฮ“ < G is an irreducible lattice. (2) There is a number field K โ€ฒ , a finite set S โ€ฒ of places, including infinite and finite ones, a K โ€ฒ -group G so that ฮ“ is a commensurable to an S โ€ฒ -arithmetic lattice G(O[S โ€ฒ ]) in G = GK โ€ฒ ,S โ€ฒ as in Setup 4.1. (3) G is a tdlc group with trivial amenable radical and ฮ“ < G is a uniform lattice. Cases (1) and (2) are covered by the following Theorem 6.1 (Strong Rigidity Theorem, Mostow, Prasad, Margulis). Let i : ฮ“ โ†’ G and j : ฮ“ โ†’ H be embeddings of ฮ“ as irreducible lattices into centerfree semi-simple Lie groups, or arithmetic lattices as in (1), (2) and (i), (ii) above. Then there exists a continuous group isomorphism ฯ€ : G โ†’ H such that j = ฯ€ โ—ฆ i. Strong Rigidity Theorem was proved by Mostow [52] for all the cases where G and H are semi-simple real Lie Lie groups and i(ฮ“) < G and j(ฮ“) < H are uniform irreducible lattices. Prasad [57] extended this result to some non-uniform lattices, including all non-uniform lattices in rank one real Lie groups G and H. Higher rank cases, including the S-arithmetic situations, for both uniform and non-uniform lattice embeddings, follow from Margulis super-rigidity theorem, see [47, Theorem VII.(7.1)]. Therefore it remains to prove that if ฮ“ < H is as in (i) or (ii), and ฮ“ < G is as in case (3), then G is a discrete group containing ฮ“ as a as subgroup of finite index. To this end we will use use the homomorphism ฯ : G โˆ’โ†’ QI(ฮ“) provided by Lemma 3.29. We shall prove below that Claim 6.2. The kernel U := ker ฯ is an open subgroup in G. Let us first show that the claim suffices to complete the proof of the theorem. Let mG denote a Haar measure of G. Since U is open, we have mG (U ) > 0. Therefore the restriction of mG to U is a Haar measure mU on U . For a lattice ฮ“ < H in a center-free semi-simple group, the homomorphism ฮ“ โ†’ QI(ฮ“) is injective. Thus U โˆฉ ฮ“ = {1} and one may include U in a Borel fundamental domain of ฮ“ in G. It LATTICE ENVELOPES 37 follows that mG (U ) = mU (U ) is finite, and therefore U is a compact group. As G is assumed to have trivial amenable radical, we deduce that U = {1}. But since U is open in G, it follows that G is discrete and that its lattice ฮ“ is just a subgroup of finite index. We are left with proving Claim 6.2, that will be deduced from quasi-isometric rigidity results about lattices in semi-simple Lie groups; we refer to Farbโ€™s survey [28] for background and references. First assume that ฮ“ is a non-uniform irreducible lattice in H. In this case QI(ฮ“) is known to coincide with the commensurator of ฮ“ in H, which is a countable group: ฯ : G โˆ’โ†’ QI(ฮ“) = CommenH (ฮ“). This was first proved by Schwartz [62] for rank-one real Lie groups, and then by Schwartz [63], Farb-Schwarz [29], and Eskin [27] for higher rank real Lie groups, and by Wortman [73] for S-arithmetic cases. Hence the homomorphism ฯ has countable image. The kernel U = ker ฯ is clearly a Borel subgroup, and since countably many of its cosets cover G, one has mG (U ) > 0. A Borel subgroup U of positive Haar measure is open because of U = U โˆ’1 ยท U and U โˆ’1 ยท U contains an identity neighborhood. This proves Claim 6.2 in case ฮ“ < H is non-uniform. Next assume ฮ“ is a uniform lattice in H. Let H = H1 ร— ยท ยท ยท ร— Hn be the decomposition of H into simple factors and Xi = Hi /Ki be the associated symmetric spaces and/or Bruhat-Tits buildings. At least one of the factors Hi is a simple real Lie group, and we shall assume H1 is such. We have ฯ : G โˆ’โ†’ QI(ฮ“) = QI(X1 ร— ยท ยท ยท ร— Xn ). Arguing as in Step 4 in Section 5 (in particular Theorem 5.12), we observe that, upon replacing G by an open subgroup of finite index (and replacing ฮ“ by a finite index subgroup), we may assume that ฯ(G) takes value in QI(X1 ) ร— ยท ยท ยท ร— QI(Xn ) < QI(X1 ร— ยท ยท ยท ร— Xn ). Consider the homomorphism pr1 โ—ฆฯ : G โˆ’โ†’ QI(X1 ). We shall show that it factors through a continuous homomorphism G โˆ’โ†’ Isom(X1 ) by considering the following cases. โ€ข X1 is a symmetric space of higher rank, corresponding to rkR (H1 ) โ‰ฅ 2. In this case the natural homomorphism Isom(X1 ) โ†’ QI(X1 ) is a bijection (Kleiner-Leeb [42]), and the group homomorphism ฯ G โˆ’โ†’ QI(X1 ) = Isom(X1 ) is continuous by Lemma 5.14. m 2 โ€ข X1 is a quaternionic hyperbolic space HH or the Cayley plane HO , corresponding to H1 โ‰ƒ Sp(m, 1) or F4 . Also in this case the natural homomorphism Isom(X1 ) โ†’ QI(X1 ) is a bijection (Pansu [56]), and the homomorphism ฯ G โˆ’โ†’ QI(X1 ) = Isom(X1 ) is continuous by Lemma 5.15. 38 URI BADER, ALEX FURMAN, AND ROMAN SAUER โ€ข X1 is real hyperbolic space Hm with m โ‰ฅ 3, corresponding to H1 = PO(m, 1)0 . The boundary at infinity โˆ‚X1 is a sphere S mโˆ’1 with a natural conformal structure that is preserved by Isom(X1 ). In fact, the well known isomorphism Isom(Hm ) = Conf(S mโˆ’1 ) extends to an isomorphism โˆผ QConf(S mโˆ’1 ) QI(Hm ) = between the group of quasi-isoemtries and the group of quasi-conformal homeomorphisms of the sphere. By a result of Tukia [70], a subgroup of QConf(S mโˆ’1 ) that is uniformly quasi-conformal and acts cocompactly on triples of points of S mโˆ’1 is conjugate into Conf(S mโˆ’1 ). This can be applied to ฯ(G). Indeed, by Lemma 3.29 there exist constants C, L so that all all ฯ(g) are represented by (L, C)-quasi-isometries, and therefore, by Mostow-Morse lemma, induce a uniformly quasi-conformal group of mappings of S mโˆ’1 . This group contains ฮ“, that acts cocompactly on X1 , and therefore also cocompactly on triples of points in S mโˆ’1 . Therefore we get a homomorphism G โˆ’โ†’ Isom(Hm ) = Conf(S mโˆ’1 ) < QConf(S mโˆ’1 ) = QI(Hm ). m The topology on Isom(HR ) coincides with that of Conf(S mโˆ’1 ) inherited from the Polish topology Homeo(S mโˆ’1 ). Hence the continuity of the homomorphism G โˆ’โ†’ Isom(Hm ) follows from Lemma 5.15. m โ€ข X1 is a complex hyperbolic space HC , corresponding to PU(m, 1)0 . In m this case the boundary sphere โˆ‚HC has a natural conformal class of a subRiemannian Carnot-Caratheodory structure. Carnot-Caratheodory analogues of the theory of quasi-conformal mappings and a result analogous to Tukiaโ€™s theorem allow to prove (see [25]) that ฯ(G) is quasi-conformally conjugate into m m Conf(โˆ‚HC ) = Isom(HC ). m The continuity of the resulting homomorphism G โˆ’โ†’ Isom(HC ) follows from Lemma 5.15. This shows that the homomorphism ฯ : ฮ“ โ†’ QI(ฮ“) factors through a continuous homomorphism into a simple real Lie group ฯ1 : G โˆ’โ†’ Isom(X1 ) โ‰ƒ H1 . Let V be an open compact subgroup of a tdlc group G. Its image ฯ1 (V ) is a profinite group subgroup in Isom(X1 ), which is a real Lie group. Therefore ฯ1 (V ) must be finite, and V0 := V โˆฉ ker(ฯ1 ) be an open subgroup. Since U = ker ฯ contains an open subgroup V0 , U is also an open subgroup of G. This completes the proof of Claim 6.2, and thereby the proof of Theorem B.  Proof of Theorem C. Let ฮ“ be a finite extension of a finitely generated non-abelian free group, and let ฮ“ < G be a lattice envelope. Since ฮ“ satisfies all the assumptions of Theorem A by Theorem 1.4, we only need to discuss three possibilities. (1) ฮ“ < G is virtually isomorphic to an irreducible lattice in a center-free semisimple real Lie group H. The first โ„“2 -Betti number of ฮ“ is positive. By Olbrichโ€™s work [53] (see also Chapter 5 about computations of โ„“2 -invariants LATTICE ENVELOPES 39 of locally symmetric spaces in Luฬˆckโ€™s book [44]) the only such lattices with positive first โ„“2 -Betti numbers are the ones in PSL2 (R). In this case, ฮ“ is a non-uniform lattice, since, for example, ฮ“ has virtual cohomological dimension one. (2) ฮ“ < G is virtually isomorphic to an S-arithmetic lattices as in Setup 4.1. In particular, it is virtually isomorphic to a lattice embedding into a product of two non-compact lcsc groups. This can be ruled by the non-vanishing of the first โ„“2 -Betti number of ฮ“ (see the argument in the proof of Theorem F). Alternatively, this situation can ruled out by the fact that S-arithmetic lattices as in ยง4 are not Gromov hyperbolic. (3) ฮ“ < G is virtually isomorphic to a uniform lattice ฮ› < H in a tdlc group H with trivial amenable radical. In particular, ฮ› is virtually isomorphic to a free non-abelian group, and by passing to a finite index subgroup we may assume that F := ฮ› is a non-abelian free group. Let TF be the Cayleygraph of F which is a regular tree of degree at least 3. The natural action homomorphism F โ†’ Isom(TF ) โ†’ QI(TF ) of F extends by Lemma 3.29 to a homomorphism H โ†’ QI(TF ) which describes a cobounded quasi-action of H on TF (see the remark preceding Theorem 5.16). Next we appeal to the work of Mosher, Sageev and Whyte [51] as in Step 4 in the proof of Theorem A. By Theorem 5.16, which is taken from their work, the quasi-action of H on TF is quasi-conjugated to an isometric (automatically also cobounded, i.e. cocompact) action ฯ† : H โ†’ Isom(T ) on a possibly different tree T . Using the arguments for Lemma 5.15 and Lemma 5.17 verbatim, one concludes that ฯ† is injective, continuous and has closed image. By the open mapping theorem [12, IX. ยง5.3], H is topologically isomorphic to im(ฯ†), and the latter is a cocompact subgroup of Isom(T ) by the cocompactness of the action.  Proof of Theorem D. Let ฮ“ be a uniform lattice in PSL2 (R), and let ฮ“ < G be another lattice embedding. As a Gromov hyperbolic group, ฮ“ satisfies all the assumptions of Theorem A according to Theorem 1.4. So we only need to discuss three possibilities. (1) ฮ“ < G is virtually isomorphic to an irreducible lattice is a semisimple real Lie group H. As in the proof above, by positivity of the first โ„“2 -Betti number of ฮ“ one is reduced to the case of H โ‰ƒ PSL2 (R). In this case, ฮ“ has to be cocompact, but the two embeddings of ฮ“ โ†’ PSL2 (R) need not be conjugate. (2) ฮ“ < G is virtually isomorphic to an S-arithmetic lattices as in Setup 4.1. This case is ruled out for the same reason as case (2) in the proof of Theorem C. (3) ฮ“ < G is virtually isomorphic to a uniform lattice in a tdlc group. This is covered by [33, Theorem C]: the only possibility is a trivial lattice embedding.  Proof of Theorem E. Let M be a closed Riemannian manifold of dimension at least 5 with sectional 40 URI BADER, ALEX FURMAN, AND ROMAN SAUER curvatures ranging in  1 2 , โˆ’1 . nโˆ’1 Let ฮ“ = ฯ€1 (M ) be the fundamental group, and let ฮ“ < G be a lattice envelope of ฮ“. Since ฮ“ is finitely generated, G is compactly generated by Lemma 3.6. The group ฮ“ is Gromov hyperbolic, so it has the properties (CAF), (NbC), and (Irr) according to Theorem 1.4. As a fundamental group of a closed aspherical manifold, ฮ“ is torsionfree. In particular, ฮ“ also has property (BT). By Theorem A there are the following three possibilities for the lattice embedding ฮ“ < G up to virtual isomorphism. Since ฮ“ is torsionfree, we may assume upon replacing ฮ“ by a finite index subgroup, G by a finite index subgroup and a quotient by a compact normal subgroup, and M by a finite cover that we still have ฮ“ = ฯ€1 (M ) and ฮ“ < G is isomorphic (not just virtually) to one of the following cases. (1) ฮ“ < G is an (irreducible) lattice embedding into a semisimple real Lie group G. (2) ฮ“ < G is an S-arithmetic lattice in the sense of Setup 4.1. (3) ฮ“ < G is a uniform lattice and G is a tdlc group with trivial amenable radical. We need to show that the only possibility is case (3) with G being discrete unless M is homeomorphic to a hyperbolic manifold. Since ฮ“ is Gromov hyperbolic we can rule out case (2). By the same reason, case (1) is only possible if G has real rank 1 and ฮ“ < G is uniform; note here that non-uniform lattices contain a free abelian subgroup of rank 2. Let us analyze the situation where ฮ“ < G is a uniform lattice in a simple Lie group of real rank 1. Let X = G/K be the associated symmetric space which is thus real, complex, quaternionic or Cayley hyperbolic. As aspherical spaces with the same fundamental group, the locally symmetric space ฮ“\X and M are homotopy equivalent. If X is real hyperbolic, then M is homeomorphic to the closed hyperbolic manifold ฮ“\X by the following striking result of Farrell and Jones [32] in their work on the Borel conjecture. So this possibility is ruled out by assumption.  โˆ’ 1+ Theorem 6.3 (Topological rigidity [32]). Let Y be a closed non-positively curved manifold of dimension 6= 3, 4. If a closed manifold Z is homotopy equivalent to Y , then Y and Z are homeomorphic. The possibilities that X is complex, quaternionic or Cayley hyperbolic are ruled out by applying the following result by Mok, Siu, and Yeung [49] to Y = ฮ“\X and Z = M and the pinching assumption for M . Theorem 6.4 (Geometric rigidity [49, Theorem 1]). Let Y and Z be homotopy equivalent closed Riemannian manifolds. Assume that Z is negatively curved and Y is complex, quaternionic or Cayley hyperbolic. Then Y and Z are isometric up to scaling. In particular, the sectional curvatures of Z cannot range in [โˆ’a, โˆ’1] for a < 4. Summing up, case (2) never occurs, and case (1) can only occur if M is homeomorphic to hyperbolic manifold. Finally, let us consider case (3) in which we have to show that the tdlc group G is discrete upon dividing out a compact normal subgroup. Consider the natural homomorphism ฯ† : ฮ“ โ†’ Isom(Mฬƒ ) โ†’ QI(Mฬƒ ) โ†’ Homeo(โˆ‚ Mฬƒ ) = Homeo(S nโˆ’1 ). LATTICE ENVELOPES 41 Of course, ฯ† coincides with the natural action ฮ“ โ†’ Homeo(โˆ‚ฮ“) of ฮ“ on its Gromov boundary. We can refer to Lemma 3.29 or, in this situation, to [33, Theorem 3.5] to conclude that the map ฯ† extends to a homomorphism ฯ†ฬ„ : G โ†’ Homeo(S nโˆ’1 ). In the latter reference it is also shown that ฯ†ฬ„ is continuous, the kernel K := ker(ฯ†ฬ„) is compact, and the image of ฯ†ฬ„ is locally compact in the subspace topology. By the open mapping theorem [12, IX. ยง5.3] G is topologically isomorphic to im(ฯ†ฬ„). Since G has trivial amenable radical, K is trivial. Since the tdlc group G acts continuously and faithfully on the sphere S nโˆ’1 , a positive solution of the Hilbert-Smith conjecture would imply that G is discrete and thus finish the proof. The general Hilbert-Smith conjecture remains open but in our situation we can appeal to the work of Mj [48] that contains the following result. Theorem 6.5 (Hilbert-Smith conjecture for boundary actions [48, Corollary 2.2.5]). Let ฮ› be a Gromov hyperbolic Poincareฬ duality group. Let Q < Homeo(โˆ‚ฮ›) be a subgroup that is finite dimensional and locally compact in the subspace topology and lies in the image of the natural homomorphism QI(ฮ›) โ†’ Homeo(โˆ‚ฮ›). Let h be the Hausdorff dimension of โˆ‚ฮ› with respect to the visual metric, and let t be the topological dimension of โˆ‚ฮ›. We assume that h < t + 2. Then Q is a Lie group. We apply this theorem to Q = im(ฯ†ฬ„) โˆผ = G and ฮ› = ฮ“. The topological dimension of โˆ‚ฮ“ = S nโˆ’1 is t = n โˆ’ 1. It remains to verify that we have h < t + 2 = n + 1. The Hausdorff dimension h equals the volume entropy hvol of Mฬƒ (see [74, Theorem C]), that is,  1 h = hvol := lim sup log vol BMฬƒ (x, R) . Rโ†’โˆž R As a direct consequence of the Bishop-Gunther comparison theorem [36, Theorem 3.101 on p. 169] we obtain that if the n-dimensional manifold Mฬƒ has sectional curvature in [โˆ’b2 , โˆ’a2 ], then (n โˆ’ 1)a โ‰ค hvol โ‰ค (n โˆ’ 1)b. In the present situation, b = 1 + 1/(n โˆ’ 1), so we obtain that 1 h = hvol โ‰ค (n โˆ’ 1)(1 + ) = n < n + 1 = t + 2. nโˆ’1 So the assumptions in Theorem 6.5 are satisfied and we conclude that G is at the same time a Lie group and a tdlc group, thus discrete.  Proof of Theorem F. (2) Let ฮ“ be group with positive first โ„“2 -Betti number ฮฒ1 (ฮ“) > 0 and property (BT). Assume that ฮ“ admits a non-uniform compactly generated lattice envelope G. Since, by Theorem 1.4, ฮ“ satisfies all the conditions of Theorem A and (BT), ฮ“ < G is virtually isomorphic to some lattice embedding ฮ“โ€ฒ < Gโ€ฒ that is one of the first two types in Theorem A; the totally disconnected case is ruled out by (BT). Non-vanishing of the first โ„“2 -Betti number is preserved under virtual isomorphism (this easily deduced from their basic properties), even under quasi(2) isometry [61, Theorem 1]. So ฮฒ1 (ฮ“โ€ฒ ) > 0. Hence ฮ“โ€ฒ cannot be a lattice in a 42 URI BADER, ALEX FURMAN, AND ROMAN SAUER (2) product of two non-compact lcsc groups. That is because ฮฒ1 (ฮ“โ€ฒ ) > 0 implies that the first โ„“2 -Betti number of any lattice envelope of ฮ“โ€ฒ is positive [43, Theorem B], and the first โ„“2 -Betti number of a product of two non-compact unimodular lcsc groups is zero [55, Theorem 6.5 on p. 61]. This excludes that ฮ“โ€ฒ < Gโ€ฒ is an Sarithmetic lattice as in Setup 4.1, so type (2) is ruled out. Hence ฮ“โ€ฒ < Gโ€ฒ is a lattice in a connected center-free semisimple Lie group without compact factors. By Olbrichโ€™s work [53] (see also Chapter 5 about computations of โ„“2 -invariants of locally symmetric spaces in Luฬˆckโ€™s book [44]) the only such lattices with positive first โ„“2 -Betti numbers are the ones in PSL2 (R). Since ฮ“โ€ฒ < Gโ€ฒ is also non-uniform, the group ฮ“โ€ฒ , hence ฮ“, is virtually isomorphic to a free group.  References [1] P. Abramenko and K. S. Brown, Buildings, Graduate Texts in Mathematics, vol. 248, Springer, New York, 2008. Theory and applications. [2] U. Bader, P.-E. Caprace, T. Gelander, and S. Mozes, Lattices in amenable groups. ArXiv preprint: 1612.06220. [3] U. Bader, P.-E. Caprace, and J. Lecureux, On the linearity of lattices in affine buildings and ergodicity of the singular Cartan flow. ArXiv preprint: 1608.06265. [4] U. Bader, A. Furman, T. Gelander, and N. Monod, Property (T) and rigidity for actions on Banach spaces, Acta Math. 198 (2007), no. 1, 57โ€“105. [5] U. Bader, A. Furman, and R. Sauer, On the structure and arithmeticity of lattice envelopes, C. R. Math. Acad. Sci. Paris 353 (2015), no. 5, 409โ€“413. , An adelic arithmeticity theorem for lattices in products. ArXiv preprint: 1705.08158. [6] , Weak Notions of Normality and Vanishing up to Rank in โ„“2 -Cohomology, Int. Math. [7] Res. Not. IMRN 12 (2014), 31773189. [8] M. B. Bekka, On uniqueness of invariant means, Proc. Amer. Math. Soc. 126 (1998), no. 2, 507โ€“514. [9] M. Bestvina and K. Fujiwara, Bounded cohomology of subgroups of mapping class groups, Geom. Topol. 6 (2002), 69โ€“89. [10] A. Borel, Density and maximality of arithmetic subgroups, J. Reine Angew. Math. 224 (1966), 78โ€“89. [11] A. Borel and J. Tits, Homomorphismes โ€œabstraitsโ€ de groupes algeฬbriques simples, Ann. of Math. (2) 97 (1973), 499โ€“571 (French). [12] N. Bourbaki, General topology. Chapters 5โ€“10, Elements of Mathematics (Berlin), SpringerVerlag, Berlin, 1998. Translated from the French; Reprint of the 1989 English translation. [13] E. Breuillard and T. Gelander, A topological Tits alternative, Ann. of Math. (2) 166 (2007), no. 2, 427โ€“474. [14] E. Breuillard, M. Kalantar, M. Kennedy, and N. Ozawa, C โˆ— -simplicity and the unique trace property for discrete groups (2016). ArXiv preprint: 1410.2518. [15] M. R. Bridson and A. Haefliger, Metric spaces of non-positive curvature, Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], vol. 319, Springer-Verlag, Berlin, 1999. [16] K. S. Brown, Cohomology of groups, Graduate Texts in Mathematics, vol. 87, Springer-Verlag, New York, 1994. Corrected reprint of the 1982 original. [17] M. Burger and N. Monod, Continuous bounded cohomology and applications to rigidity theory, Geom. Funct. Anal. 12 (2002), no. 2, 219โ€“280. [18] M. Burger and S. Mozes, Groups acting on trees: from local to global structure, Inst. Hautes Eฬtudes Sci. Publ. Math. 92 (2000), 113โ€“150 (2001). [19] P.-E. Caprace, Non-discrete, simple locally compact groups (2016). to appear in the Proceedings of the 7th European Congress of Mathematics. [20] P.-E. Caprace, P. Kropholler, C. D. Reid, and P. Wesolek, On the residual and profinite closures of commensurated subgroups (2017). ArXiv preprint: 1706.06853. [21] P.-E. Caprace and N. Monod, A lattice in more than two Kac-Moody groups is arithmetic, Israel J. Math. 190 (2012), 413โ€“444. LATTICE ENVELOPES [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] 43 , Isometry groups of non-positively curved spaces: structure theory, J. Topol. 2 (2009), no. 4, 661โ€“700. , Isometry groups of non-positively curved spaces: discrete subgroups, J. Topol. 2 (2009), no. 4, 701โ€“746. J. Cheeger and M. Gromov, L2 -cohomology and group cohomology, Topology 25 (1986), no. 2, 189โ€“215. R. Chow, Groups quasi-isometric to complex hyperbolic space, Trans. Amer. Math. Soc. 348 (1996), no. 5, 1757โ€“1769. M. Coornaert, Mesures de Patterson-Sullivan sur le bord dโ€™un espace hyperbolique au sens de Gromov, Pacific J. Math. 159 (1993), no. 2, 241โ€“270 (French, with French summary). A. Eskin, Quasi-isometric rigidity of nonuniform lattices in higher rank symmetric spaces, J. Amer. Math. Soc. 11 (1998), no. 2, 321โ€“361. B. Farb, The quasi-isometry classification of lattices in semisimple Lie groups, Math. Res. Lett. 4 (1997), no. 5, 705โ€“717. B. Farb and R. Schwartz, The large-scale geometry of Hilbert modular groups, J. Differential Geom. 44 (1996), no. 3, 435โ€“478. F. T. Farrell and L. E. Jones, Negatively curved manifolds with exotic smooth structures, J. Amer. Math. Soc. 2 (1989), no. 4, 899โ€“908. F. T. Farrell, L. E. Jones, and P. Ontaneda, Negative curvature and exotic topology, Surveys in differential geometry. Vol. XI, Surv. Differ. Geom., vol. 11, Int. Press, Somerville, MA, 2007, pp. 329โ€“347. F. T. Farrell and L. E. Jones, Topological rigidity for compact non-positively curved manifolds, Differential geometry: Riemannian geometry (Los Angeles, CA, 1990), Proc. Sympos. Pure Math., vol. 54, Amer. Math. Soc., Providence, RI, 1993, pp. 229โ€“274. A. Furman, Mostow-Margulis rigidity with locally compact targets, Geom. Funct. Anal. 11 (2001), no. 1, 30โ€“59. , On minimal strongly proximal actions of locally compact groups, Israel J. Math. 136 (2003), 173 โ€“ 187. H. Furstenberg, Rigidity and cocycles for ergodic actions of semisimple Lie groups (after G. A. Margulis and R. Zimmer), Bourbaki Seminar, Vol. 1979/80, Lecture Notes in Math., vol. 842, Springer, Berlin, 1981, pp. 273โ€“292. S. Gallot, D. Hulin, and J. Lafontaine, Riemannian geometry, 3rd ed., Universitext, SpringerVerlag, Berlin, 2004. T. Gelander, A. Karlsson, and G. A. Margulis, Superrigidity, generalized harmonic maps and uniformly convex spaces, Geom. Funct. Anal. 17 (2008), no. 5, 1524โ€“1550. M. Gromov and W. Thurston, Pinching constants for hyperbolic manifolds, Invent. Math. 89 (1987), no. 1, 1โ€“12. U. Hamenstaฬˆdt, Bounded cohomology and isometry groups of hyperbolic spaces, J. Eur. Math. Soc. (JEMS) 10 (2008), no. 2, 315โ€“349. T. Karube, On the local cross-sections in locally compact groups, J. Math. Soc. Japan 10 (1958), 343โ€“347. D. Y. Kleinbock and G. A. Margulis, Bounded orbits of nonquasiunipotent flows on homogeneous spaces, Sinaฤฑฬ†โ€™s Moscow Seminar on Dynamical Systems, Amer. Math. Soc. Transl. Ser. 2, vol. 171, Amer. Math. Soc., Providence, RI, 1996, pp. 141โ€“172. B. Kleiner and B. Leeb, Rigidity of quasi-isometries for symmetric spaces and Euclidean buildings, Inst. Hautes Eฬtudes Sci. Publ. Math. 86 (1997), 115โ€“197 (1998). D. Kyed, H. D. Petersen, and S. Vaes, L2 -Betti numbers of locally compact groups and their cross section equivalence relations, Trans. Amer. Math. Soc. 367 (2015), no. 7, 4917โ€“4956. W. Luฬˆck, L2 -invariants: theory and applications to geometry and K-theory, Ergebnisse der Mathematik und ihrer Grenzgebiete. 3. Folge. A Series of Modern Surveys in Mathematics [Results in Mathematics and Related Areas. 3rd Series. A Series of Modern Surveys in Mathematics], vol. 44, Springer-Verlag, Berlin, 2002. G. A. Margulis, Non-uniform lattices in semisimple algebraic groups, Lie groups and their representations (Proc. Summer School on Group Representations of the Bolyai Jaฬnos Math. Soc., Budapest, 1971), Halsted, New York, 1975, pp. 371โ€“553. , Finiteness of quotient groups of discrete subgroups, Funktsional. Anal. i Prilozhen. 13 (1979), no. 3, 28โ€“39 (Russian). 44 [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] [72] [73] [74] URI BADER, ALEX FURMAN, AND ROMAN SAUER , Discrete subgroups of semisimple Lie groups, Ergebnisse der Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics and Related Areas (3)], vol. 17, Springer-Verlag, Berlin, 1991. M. Mj, Pattern rigidity and the Hilbert-Smith conjecture, Geom. Topol. 16 (2012), no. 2, 1205โ€“1246. N. Mok, Y. T. Siu, and S.-K. Yeung, Geometric superrigidity, Invent. Math. 113 (1993), no. 1, 57โ€“83. N. Monod, Superrigidity for irreducible lattices and geometric splitting, J. Amer. Math. Soc. 19 (2006), no. 4, 781โ€“814. L. Mosher, M. Sageev, and K. Whyte, Quasi-actions on trees. I. Bounded valence, Ann. of Math. (2) 158 (2003), no. 1, 115โ€“164. G. D. Mostow, Strong rigidity of locally symmetric spaces, Princeton University Press, Princeton, N.J., 1973. Annals of Mathematics Studies, No. 78. M. Olbrich, L2 -invariants of locally symmetric spaces, Doc. Math. 7 (2002), 219โ€“237. D. Osin, Acylindrically hyperbolic groups, Trans. Amer. Math. Soc. 368 (2016), no. 2, 851โ€“ 888. H. D. Petersen, L2 -Betti numbers of locally compact groups, Ph.D. thesis, Department of Mathematical Sciences, Faculty of Science, University of Copenhagen, 2012. 139 p. P. Pansu, Meฬtriques de Carnot-Caratheฬodory et quasiisomeฬtries des espaces symeฬtriques de rang un, Ann. of Math. (2) 129 (1989), no. 1, 1โ€“60 (French, with English summary). G. Prasad, Strong rigidity of Q-rank 1 lattices, Invent. Math. 21 (1973), 255โ€“286. , Elementary proof of a theorem of Bruhat-Tits-Rousseau and of a theorem of Tits, Bull. Soc. Math. France 110 (1982), no. 2, 197โ€“202 (English, with French summary). M. S. Raghunathan, Discrete subgroups of Lie groups, Springer-Verlag, New York-Heidelberg, 1972. Ergebnisse der Mathematik und ihrer Grenzgebiete, Band 68. C. Ramos-Cuevas, On the displacement function of isometries of Euclidean buildings, Indag. Math. (N.S.) 26 (2015), no. 2, 355โ€“362. R. Sauer and M. Schroฬˆdl, Vanishing of โ„“2 -Betti numbers of locally compact groups as an invariant of coarse equivalence (2017). ArXiv preprint:1702.01685. R. E. Schwartz, The quasi-isometry classification of rank one lattices, Inst. Hautes Eฬtudes Sci. Publ. Math. 82 (1995), 133โ€“168 (1996). , Quasi-isometric rigidity and Diophantine approximation, Acta Math. 177 (1996), no. 1, 75โ€“112. Y. Shalom, Rigidity of commensurators and irreducible lattices, Invent. Math. 141 (2000), no. 1, 1โ€“54. , Rigidity, unitary representations of semisimple groups, and fundamental groups of manifolds with rank one transformation group, Ann. of Math. (2) 152 (2000), no. 1, 113โ€“182. F. K. Schmidt, Mehrfach perfekte Koฬˆrper, Math. Ann. 108 (1933), no. 1, 1โ€“25 (German). B. Sun, Non-elementary convergence groups are acylindrically hyperbolic (2016). ArXiv preprint: 1612.00134. A. Thom, Low degree bounded cohomology and L2 -invariants for negatively curved groups, Groups Geom. Dyn. 3 (2009), no. 2, 343โ€“358. J. Tits, Buildings of spherical type and finite BN-pairs, Lecture Notes in Mathematics, Vol. 386, Springer-Verlag, Berlin-New York, 1974. P. Tukia, On quasiconformal groups, J. Analyse Math. 46 (1986), 318โ€“346. J. Tits, Sur le groupe des automorphismes dโ€™un arbre, Essays on topology and related topics (Meฬmoires deฬdieฬs aฬ€ Georges de Rham), Springer, 1970. C. Wells, Automorphisms of group extensions, Trans. Amer. Math. Soc. 155 (1971), 189โ€“194. K. Wortman, Quasi-isometric rigidity of higher rank S-arithmetic lattices, Geom. Topol. 11 (2007), 995โ€“1048. C. Yue, The ergodic theory of discrete isometry groups on manifolds of variable negative curvature, Trans. Amer. Math. Soc. 348 (1996), no. 12, 4965โ€“5005. LATTICE ENVELOPES Weizmann Institute, Rehovot E-mail address: [email protected] University of Illinois at Chicago, Chicago E-mail address: [email protected] Karlsruhe Institute of Technology E-mail address: [email protected] 45
4math.GR
NEURAL NETWORK APPROACH TO RAILWAY STAND LATERAL SKEW CONTROL Peter Mark Beneลก1, Matouลก Cejnek1, Jan Kalivoda2 and Ivo Bukovsky1 1 Department of Instrumentation and Control Engineering, Czech Technical University, Prague, Czech Republic {PeterMark.Benes;Matous.Cejnek;Ivo.Bukovsky}@fs.cvut.cz 2 Department of Automobiles, Internal Combustion Engines and Railway Vehicles, Czech Technical University, Prague, Czech Republic [email protected] ABSTRACT The paper presents a study of an adaptive approach to lateral skew control for an experimental railway stand. The preliminary experiments with the real experimental railway stand and simulations with its 3-D mechanical model, indicates difficulties of model-based control of the device. Thus, use of neural networks for identification and control of lateral skew shall be investigated. This paper focuses on realdata based modelling of the railway stand by various neural network models, i.e; linear neural unit and quadratic neural unit architectures. Furthermore, training methods of these neural architectures as such, real-time-recurrent-learning and a variation of back-propagation-through-time are examined, accompanied by a discussion of the produced experimental results. KEYWORDS Roller Rig, Linear Neural Unit, Quadratic Neural Unit, Real-Time-Recurrent-Learning (RTRL), Back-Propagation-Through-Time (BPTT) 1. INTRODUCTION An ongoing problem, which is currently under research in the railway industry, is that of lateral skew control of railway carriage wheel sets with Independently Rotating Wheels (IRW). In particular, the control of position of the leading wheel set of a railway carriage bogie, such to achieve central positioning of the wheel set, with respect to the span of the rail track. Or furthermore, to control the lateral deviation of the wheel set to follow a given desired set point. The primary necessity for such control arises from the need to improve behaviour of IRW wheel sets, as currently under study at CTU, on an experimental railway stand (roller rig). Particularly, for minimisation of wheel flange and rail head wearing as well as lateral forces and, furthermore, optimal stability at higher speeds of the wheel set. To date, various methods for control of the wheel set lateral position of IRW wheel sets have been under investigation, with both mechanical and electrical means of control [2], each featuring their own, individual drawbacks. At CTU, the latest study features active control of the roller rig through manipulation of the yaw torque of the rig wheel set [1], via a state feedback and cascade PID control for a linearization of the model of the CTU roller rig. However, the results from this initial experimentation shows, that such method is not suitable for real time control. Thus, this paper aims to investigate the possible use of a neural network approach for lateral control of such railway wheel sets. The suitability of application to this problem is motivated by promising theoretical studies of higherorder neural units (HONUs), especially the quadratic neural unit for engineering problems for [3]-[7]. These studies are focused on the use of supervised learning based approaches for polynomial structured neural units, also known as a class of HONUs, for adaptive identification and control of real engineering systems. Further motivation arises from the successful implementation of a quadratic neural unit controller (Neuro-controller), for control of a bathyscaphe system located in the automatic control laboratories of CTU [12]. Where, here, such controller adhered more closely to the desired behaviour of the system than the conventionally used PID controller. An extension on this result can be recalled in the work [11]. Where, further study was made via introduction of a new software for adaptive identification and control, along with further testing on both a theoretical system and the previously mentioned bathyscaphe system. Given this, in this paper we aim to investigate use of neural network (NN) approaches in the following manner. We will begin by explaining in more depth the problem behind the recently employed state feedback and cascade PID control of the linearization of the CTU roller rig. The proceeding section will then describe the principles and control schemes behind the various experimented methods, for adaptive identification and control. Following this, an experimental analysis of the various approaches of NN, focusing firstly on adaptive identification of the CTU roller rig system and then to test the various NN methods for control. The final component of this paper will then be, to analyse and compare the produced experimental results, with a conclusion to be drawn at the end. 2. PROBLEM DESCRIPTION This section aims to describe in more depth, the functionality behind the previously introduced experimental railway stand (CTU roller rig). More importantly, for the scope of this paper, we will elaborate on the necessity for control of such roller rig and the issues of conventional linear PID control or state feedback control, for controlling the lateral skew. 2.1 Experimental Setup of the Roller Rig at CTU The below figure (Figure 1) depicts the experimental setup of the CTU roller rig, along with the 3-D model for design and simulation purposes. This rig features 5 motor drives, two pairs of 0.5m diameter rollers are independently driven, via the largest of the set of drives (FM1 & 2). To simulate both straight and curved tracks, similar to those present on real railway networks. A central servo motor (FM4) was introduced, to yaw the lower roller pair for replicating curved track motion. This setup however, assumes simulation of a rail pair without effects of rail buckling. For manipulation of the wheel set yaw, a separate servo motor, central to the wheel set (FM3) is installed. For the scope of this paper, this is the most crucial component, as it is the action of this servo motor that is used for control actuation for the lateral skew of the wheel sets. Where, the discussed control setups in this paper will analyse control via manipulation of this servo motor torque. Finally, a fifth drive FM5 is located between the front roller set, as a control differential. Figure 1: CTU Roller Rig (real left, PTC Pro/Engineer 3-D model on the right) 2.2 Problem of the State Feedback and Cascade PID Control In the work [1], the method of lateral skew control via state feedback with cascade PID setup is introduced. In this presented setup, a linearization of the roller rig is used, via translation to a state space representation, achieved via a 12x12 matrix of dynamics. However, according to theory, this linearization of the roller rig system appeared to be uncontrollable and unobservable via analysis by common linear algebra and control approaches. Figure 2: Control loop on linearization of the roller rig with State feedback + Cascade PID control The above figure (Figure 2), depicts the control scheme for this setup. After numerous testing, it was found that a simulation step of approximately < 1E-6 was necessary, in order to achieve stability of the continuous control loop, which cannot be used for practical application. Hence, it is for this reason that an alternative approach is necessary for the lateral skew control of such railway wheel set. Thus, this paper aims on investigating the possibility of adaptive identification and control of the stand, based on measured data. For the purposes of this paper the data will be generated via a 3-D simulation model via software SIMPACK, linked via SIMAT toolbox with MATLAB Simulink, to provide real time simulation of the roller rig as a plant system for the investigated control approaches. Then, this data will be used as the training data for neural network models, to simplify otherwise complex simulation models and to allow a constant sampling for real time usability, furthermore, investigation into the potentials for real-time neural-network based control. 3. APPLIED METHODS In this section, the various NN approaches, aimed for adaptive identification and control of the previously introduced lateral skew problem, will be described. These approaches are based on the well know Gradient Descent (GD) method used as a tool for defining the learning rule of the applied neural units. These applied neural units (adaptive models) are trained via two methods, which will be focused on in this paper. These methods are namely, the method of incremental training or Real Time Recurrent Learning (RTRL) [8] applicable for dynamic adaptive models or a batch form of training, which is a variation of the back propagation through time or (BPTT) training [10], as an extension of RTRL training in combination with the famous LevenbergMarquardt equation. 3.1 Preliminaries This subsection aims to review the important theories from works [11]-[13], behind the GD method and structures of the neural units used within this paper. Firstly, we will begin by introducing the famous GD algorithm for the linear and quadratic neural units. To understand this, we must begin with the polynomial models of the linear and quadratic (LNU and QNU) neural units respectively, as follows n y = โˆ‘ xi wi = w0 .x0 +w1.x1 + ... + wn .xn = w.x (1) y = โˆ‘โˆ‘ xi x j wi , j = w0,0 x0 x0 +w0,1 x0 x1 + ... + wn,n xn 2 = rowx.colW (2) i =0 n n i =0 j =0 Where, y represents the output of the LNU (1) and QNU (2) respectively. In regards to the LNU, w stands for an updatable vector of neural weights and x, represents the input values of the engineering system in the case of a purely static model and in the sense of a dynamic model, a combination of inputs of the real system and neural model outputs. Looking at equation (2), rowx is a long-vector representation of the utilised input vector. Where, colW represents a weight matrix of the quadratic neural unit in general. From this, we may then understand the GD algorithm as applied to such neural units. wi +1 = wi + ยต .e(k ). โˆ‚y (k ) โˆ‚wi colW(k +1) = colW(k ) + ยต.e(k ). โˆ‚y (k + 1) โˆ‚colW (3) (4) Here, equation (3) & (4) depicts the GD algorithm for both the LNU and QNU respectively. Here the output of the GD algorithm is to incrementally over sample-by-sample, update the neural weights such to adaptively teach the LNU or QNU model, to learn the engineering system. Here, ยต represents the learning rate of the GD algorithm. This is analogical to humans where, setting ยต relatively high, corresponds to faster learning of the human and consequently, means the less detail the human can remember and digest from their learning. Furthermore, setting this parameter to a smaller value, corresponds to a slowing rate of learning i.e. the human may remember the information learned, quite well, but less information overall about the subject. The next parameter is e(k) (k representing the number of the sample), this represents the current error between the real and calculated output of the model. The final term โˆ‚y (k ) , โˆ‚wi corresponds to the partial derivatives of the neural unit output, with respect to the individual neural weights. Regarding the QNU in equation (4), we see that the GD algorithm is analogical, with exception of updating the matrix of neural weights as opposed to a vector in the sense of the LNU. Till now, the structures of GD for LNU and QNU were reviewed in the format of RTRL or sample-by-sample method of learning. Where, the neural weights are updated over each new sample of the engineering system data. However for certain engineering processes, it is more advantageous to use the BPTT batch method of training these neural weights, over runs of the algorithm rather than over each sample. This is because the RTRL method focuses on the contemporary governing law of the system as opposed the BPTT which focuses more so on the main governing law of the input and outputs of the engineering system. The BPTT method is achieved via an extension of the RTRL method with combination of the famous LevenbergMarquardt equation. It is also important to note that this method is more preferable in cases where the data may be affected by noise. The following equation denotes the weight update rule for the BPTT method; ฮ”w = (JT .J + 1 ยต .I)โˆ’1.JT .e (5) Here, the neural weights are updated over each run of the algorithm (or batch trained) in the following way w=w+ฮ”w. Here equation (5) describes the change, necessary for the update of the batch trained weights. Where, J represents the Jacobian matrix of derivatives for the neural unit. This may be the complete partial derivatives of the neural model with respect to each neural weights, or in practical applications it seems useful to simply introduce this Jacobian matrix as the input vector or matrix itself, being x and colx for LNU and QNU respectively. Furthermore, it is important to note that colx = rowxT . Often in such adaptive neural units, it is apparent that a modification of the normalised learning rate may be used to solve issues associated with instability of learning. In practise, it is possible to employ the simplified normalised learning rate as presented in the work [11], as follows; ฮท= ยต x(k)x(k)T + 1 (6) Where, equation (6) represents the normalised learning rate in the sense of LNU. This is analogically represented in the QNU, by replacement of x(k) (i.e. each k th sample of the input vector x) with colx(k). It should be noted that the above representation holds for RTRL training for dynamic adaptive models, where the algorithms used in this paper for BPTT method of training, take the learning rate ยต itself. 3.2 Adaptive Identification and control The previous section focused on usage of neural units in the sense of adaptive identification of a real engineering system. In this subsection, we extend on these neural units as a method of control, with brief review from works [11]-[13], and extension as applied to the lateral skew problem, which is indeed our focus within this paper. Figure 3: Adaptive Identification with supervised learning of neural networks (where, w.x=LNU, rowX.colW=QNU) The above figure (Figure 3), depicts the identification scheme for the previously reviewed neural network architectures. Where, for the scope of this paper a simulation of the real roller rig will be used for data generation of the investigated neural network approaches for control. u, represents the input data of the roller rig, in our case this is the yaw torque of the servo motor system for manipulating the lateral skew of the wheel set. The output yreal, is the simulated output from the real time 3-D SIMPACK model and y, being the output of the neural unit, and the difference being the error, e. Figure 4: Adaptive control loop for experimental study of a neural network controller (where, w.x=LNU, rowX.colW=QNU) The above (Figure 4), shows an extension of the discussed neural architectures for application to lateral skew control of the roller rig system. Here, once the neural unit as a model is identified, it may be utilised as the foundation for a neural network based control setup. For the scope of this paper, we will propose an offline tuned control scheme, as the goal here, is to investigate the potentials of applying a neural network based control, for this application. However, the extension to online control is indeed the ultimate aim of our research to this problem, beyond this paper. Figure 4, depicts use of a second neural unit as a controller. Similarly to the previously mentioned architectures, as a controller here too the neural unit may take shape to that of the LNU or QNU adaptive models. However, in this case the adaptive neural weights are tuned differently to that of those used for the neural unit as a model and hence, depicted as v. Analogically, should a QNU structure be applied, these neural weights would be represented in a matrix form. Further to this, the above figure (Figure 4) introduced a new vector ฮพ. This vector comprises of a combination of outputs from the neural unit as a model and the difference between the desired behaviour (in our case desired yaw torque or lateral skew of the roller rig) and the output of the neural model. v. ฮพ or collectively, the variable q, thus serves as a manipulator for the newly feed samples of the neural unit as an identified model. Here the GD algorithms are employed in the following manner to achieve sample-by-sample adaptation of the neural weights for the controller, as follows; vi +1 = vi + ยต.ereg (k ). โˆ‚y (k ) โˆ‚vi (7) Where vi , are adaptable neural weights of the neural unit as a controller and ereg(k) is the error between the desired value of the real system (in our case the roller rig, where the desired value will be denoted as d) and the real system output value at sample k. โˆ‚y (k ) , is the partial โˆ‚vi derivative of the output of the neural unit as a model, with respect to the individual adaptive neural weights of the neural unit as a controller. An extension of this weight update scheme for BPTT training would result in the following form v=v+ฮ”v, where the change of neural weights for each batch would be analogical to equation (5). 4. EXPERIMENTAL ANALYSIS This section aims to analyse the previously reviewed methods of adaptive identification and control, via the introduced neural network architectures. Particularly, we aim to investigate the applicability of the discussed neural architectures for this problem of the lateral skew control of railway wheel sets. In this section, we will simulate our results using simulation data of the previously described 3-D SIMPACK model (at mid-range speed) linked with MATLAB Simulink in real time simulation. The data was produced with 0.001 sampling over a 10 second interval. First, we will analyse the results for identification of the roller rig as a system, via the different methods of the neural network models, followed by an extension of control, where the various combinations of neural network architectures will be tested. DLNU with RTRL Almost exact identification of Roller Rig data (lines are superimposed) Deviation of the model with the Roller Rig data, over each sample Figure 5: Testing of the adaptive identification, where the plant (roller rig) is represented by blue colour and green being the neural model. Trained by DLNU with RTRL Training; ยต=1, epochs =10, For ny=3 (previous samples of model output) and nu=5 (previous samples of real system input) The above figure (Figure 5) and following figure (Figure 6), illustrates the adaptive identification process of the roller rig system data. We can note, that both methods of the dynamic LNU or (DLNU) and dynamic QNU or (DQNU), for RTRL learning methods, achieved almost exact identification. Where, the DQNU performed slightly faster in terms of convergence to minima of sum of square errors, as opposed to the DLNU. DQNU with RTRL. Excellent identification with slightly faster learning than the DLNU of same parameters Error of model is still within an excellent range Sum of square errors decreases more quickly with the DQNU for same parameters. Figure 6 : Testing of the adaptive identification, where the plant (roller rig) is represented by blue colour and green being the neural model. Trained by DQNU with RTRL Training; ยต=1, epochs =10, For ny=3 (previous samples of model output) and nu=5 (previous samples of real system input) Desired (black dashed) Roller Rig system data (blue) Neural controller (magenta) applied to identified Roller Rig data Error plot illustrates deviation of the Neural Controller and desired behaviour. Sum of Square Errors reaches close to 10-4 after 50 epochs Figure 7: Testing of the adaptively tuned control loop, where the roller rig is represented by trained DLNU with constant and previously trained parameters (Figure 5) and the adaptive feedback controller is trained via LNU, after 10 epochs Adaptive Identification (of DLNU with RTRL) + Neural Unit Controller for lateral skew control of roller rig system - Using LNU with Incremental training ยต=0.1, Data re-sampling = each 5th sample, epochs =200, for nqy=0 (previous samples of neural model output) and nqe=2 (previous samples of difference of the neural model output and desired behaviour of the system. Closer to desired behaviour of the system with QNU + BPTT The difference of the Neural Controller and desired behaviour is within +0.2 to -0.2 mm. Sum of Square Errors reaches close to 10-4 after only few epochs, with QNU and BPTT training. Figure 8: Testing of the adaptively tuned control loop, where the roller rig is represented by trained DQNU with constant and previously trained parameters (Figure 6) and the adaptive feedback controller is trained via QNU, after 10 epochs Adaptive Identification (of DQNU with RTRL) + Neural Unit Controller for lateral skew control of roller rig system - Using QNU with BPTT Training ยต=0.00818, epochs=5, for nqy=0 and nqe=3 Here, Figure 7 & Figure 8 show the application of the various neural units for control of the lateral skew. The black dotted line, illustrates the chosen desired behaviour of the roller rig lateral skew. It was found that the BPTT training method used in combination with the QNU had the best performance. Providing closer control to the desired behaviour, as compared with the incremental training methods of both LNU and QNU architectures. Desired lateral skew (black dashed line) set to ideal position of zero Model provides almost exact response to the desired after the first few samples. Figure 9: Testing of the adaptively tuned control loop, where the roller rig is represented by trained DQNU with constant and previously trained parameters (Figure 6) and the adaptive feedback controller is trained via QNU, after 10 epochs Adaptive Identification (of DQNU with RTRL) + Neural Unit Controller for lateral skew control of roller rig system - Using QNU with BPTT Training ยต=0.001, epochs=5, for nqy=3, nqe=3 Figure 9 depicts a theoretical test of the roller rig system under an idealised case of zero lateral skew. This is included in our results to investigate the capability of the used neural controller. From this figure, we see that after several small samples at the beginning of the controllerโ€™s application the controller provides almost exactly zero lateral skew. This result however, must be reasoned with what is really possible in terms of actuation of the real system and real conditions of the rig, such to achieve this ideal of a result. 5. DISCUSSION OF EXPERIMENTAL RESULTS In the previous section, the experimental results of the various neural network architectures for adaptive identification and control were presented. From the first set of figures, regarding the adaptive identification for the roller rig system, it was found that the most suitable learning method for both the DLNU and DQNU was the RTRL training method. Here, relatively few epochs were adequate for both architectures to identify the system data, with almost exact identification. The DQNU model was slightly faster in learning the behaviour of the system, thus, was used as the identified neural unit as a model, in the control section. The extension of these various architectures for control showed more distinguishable results. The application of both LNU and QNU with incremental learning for the neural controller was only possible when a higher number of epochs were run, or higher learning of the model with a small learning rate. Few runs of the algorithm were unable to match the desired behaviour even moderately. However, after the first few samples of application as in Figure 7, reasonable behaviour of the controller was achieved. The combination of identification via the DQNU followed by extension of a QNU trained by BPTT on the neural controller, showed to follow more closely to the desired behaviour of the roller rig system than the other tested combinations. Where, the setup of the QNU with BPTT neural controller featured input vector ฮพ, being comprised only of several errors or differences of the desired behaviour, with the output of the neural unit as a model. Further to this, the training was substantially quicker than the incremental training method, showing that only several epochs were sufficient for the model to achieve its optimal behaviour with respect to the desired of the system. In the above results, two forms of the desired behaviour were used. The first was under proposal that the lateral derivation of the wheel set would be within a small tolerance range, which is most realistic in real application of such control. The presented desired data is relative to the small range of lateral skew in the simulation data. Where, within this exampled range, we could be sure the wheel flanges would not contact the rails of the real roller rig. The desired behaviour is however relative to the setup of the wheel sets and rails, thus the desired deviation and lateral skew outputs may indeed vary for real railway applications. The second was an idealised situation where no lateral skew at all would occur. This is principally unrealistic for the neural controller to achieve zero lateral skew, due to a combination of natural factors on real railway wheel sets, however for demonstrational purposes, we may note the capability of the neural controller, providing almost exact behaviour of the idealised lateral skew, as applied on the identified roller rig system. 6. CONCLUSION Referring back to the original control loop depicted in Figure 1 (as presented in work [1]), of the Simulink model of the linearization of the roller rig system and state feedback with cascade PID controller. We can recall that a minimum sampling of <1E-6 seconds for numerical stability was necessary, which is not possible for practical application. After investigation of the presented neural network approaches, we may conclude that it has promising potential for real application on controlling the lateral skew of IRW railway wheel sets. Now, we note that the achieved sampling can be within order of 0.005 (5E-3) seconds, for adequate functionality of the neural network based, adaptive identification and control system as applied to the roller rig. The tested models in this paper were DLNU and DQNU for adaptive identification models and LNU or QNU architectures as a controller. The experimental results of these architectures showed that both DLNU and DQNU, precisely approximated the complex SIMPACK model of the roller rig system. This result however could vary when using more or, real training data measured from the rig itself. In terms of control of the lateral skew, the QNU architecture showed better results to keep the lateral skew within close limits to the desired behaviour of the system, which is also in general consensus with our previous findings on using QNU for control. We also can note the significantly faster tuning of the control loop via QNU as compared to the LNU, more particularly, the BPTT training method as applied to the controller compared to the incremental method. Where, more desirable control was shown, in much fewer epochs or runs of the controller algorithm. Thus, this case study shows that with proper tuning of the investigated neural units, application to the real system is theoretically possible, to achieve adequate control for this investigated problem. Thus, real application of such adaptive control loop of neural network based architecture, is indeed the very next step of our research. ACKNOWLEDGEMENTS The authors would like to acknowledge the following grant for support during this work: SGS12/177/OHK2/3T/12SGS12/177/OHK2/3T/12, Non-conventional and Cognitive Signal Processing Methods of Dynamic Systems. And also the Technology Agency of Czech Republic. Project No: TE01020038 โ€œCompetence Center of Railway Vehiclesโ€. REFERENCES [1] J. Kalivoda, P. Bauer (2013) โ€œCurving Behaviour of 2-Axle Bogie with Independently Rotating Wheels โ€“ Simulations and Scaled Roller Rig Testsโ€- 23rd International Symposium on Dynamics of Vehicles on Roads and Tracks, Qingdao, China, August 19th-23rd. [2] S. Bruni, R. M. Godall, T.X. Mei, H. Tsunashima (2007) โ€œControl and monitoring for railway vehicle dynamicsโ€, Vehicle System Dynamics, vol. 45 issue 7-8, pp. 743-779 [3] Gupta, M., M., Bukovsky, I., Homma, N., Solo M. G. A., Hou Z.-G. (2012): โ€œFundamentals of Higher Order Neural Networks for Modeling and Simulationโ€œ, in Artificial Higher Order Neural Networks for Modeling and Simulation, ed. M. Zhang, IGI Global,. [4] Bukovsky, I., Bila, J., Gupta, M., M, Hou, Z-G., Homma, N. (2010): โ€œFoundation and Classification of Nonconventional Neural Units and Paradigm of Nonsynaptic Neural Interactionโ€ in Discoveries and Breakthroughs in Cognitive Informatics and Natural Intelligence within the series of the Advances in Cognitive Informatics and Natural Intelligence (ACINI), ed. Y. Wang, IGI Publishing, Hershey PA, USA, ISBN: 978-1-60566-902-1, pp.508-523. [5] Bukovsky, I., Homma, N., Smetana, L., Rodriguez, R., Mironovova M., Vrana S. (2010): โ€œQuadratic Neural Unit is a Good Compromise between Linear Models and Neural Networks for Industrial Applicationsโ€, ICCI 2010 The 9th IEEE International Conference on Cognitive Informatics, Tsinghua University, Beijing, China, July 7-9. [6] Bukovsky I., S. Redlapalli and M. M. Gupta (2003): Quadratic and Cubic Neural Units for Identification and Fast State Feedback Control of Unknown Non-Linear Dynamic Systems, Fourth International Symposium on Uncertainty Modeling and Analysis ISUMA 2003, IEEE Computer Society, , Maryland USA, ISBN 0-7695-1997-0, p.p.330-334 [7] Rodriguez , R., Bukovsky, I., Homma, N.: โ€œPotentials of Quadratic Neural Unit for Applicationsโ€, in International Journal of Software Science and Computational Intelligence (IJSSCI) ,vol 3, issue 3, IGI Global, Publishing, Hershey PA, USA ISSN. [8] Bukovsky, I., Lepold, M., Bila J. (2010): โ€œQuadratic Neural Unit and its Network in Validation of Process Data of Steam Turbine Loop and Energetic Boilerโ€,WCCI 2010, IEEE Int. Joint. Conf. on Neural Networks IJCNN, Barcelona,Spain. [9] R. J. Williams and D. Zipser (1989) โ€œA learning algorithm for continually running fully recurrent neural networks,โ€ Neural Computation, vol. 1, pp. 270โ€“280. [10] P. J.Werbos (Oct. 1990) โ€œBackpropagation through time: What it is and how to do itโ€ Proc. IEEE, vol. 78, no. 10, pp. 1550โ€“1560. [11] Peter M. Benes (2013): Software Application for Adaptive Identification and Controller Tuning Student's Conference STC, Faculty of Mechanical Engineering, CTU in Prague. [12] Ladislav Smetana (2008): โ€œNonlinear Neuro-Controller for Automatic Control Laboratory Systemโ€, Masterโ€™s Thesis, Czech Tech. Univ. in Prague, [13] Laboratory System Batyscaphe, Automatic Control Laboratory, Dpt. of Instr. and Cont. Eng., FME, Czech Technical University in Prague, online http://vlab.fsid.cvut.cz/en/ulohy/batyskaf.php, 2010. Short Biography of the Authors Peter Mark Beneลก received his Bachelorโ€™s degree with honours at Czech Technical University (CTU) in Prague in 2012. Currently he is a Masterโ€™s student, with expected PhD studies to follow in 2014. His research focuses on non-conventional neural networks for adaptive identification and control of industrial systems including hoist mechanisms and skew control of rail-based mechanisms as such cranes and railway vehicles. Peterโ€™s work has been awarded in local and international student competitions also with an industrial BOSCH award in 2013. Matouลก Cejnek received his Bachelorโ€™s degree at Czech Technical University (CTU) in Prague in 2012. Currently he is a Masterโ€™s student at Czech Technical University in Prague. His research focuses on non-conventional neural networks for adaptive systems and novelty detection in time series and biomedical applications. Matousโ€™s work has been awarded in local and international student competitions 2013. Jan Kalivoda graduated from Czech Technical University (CTU) in Prague where he received his Masterโ€™s degree with honours in 1996 and Ph.D. in the field of Machines and Equipment for Transportation in 2006. Currently he is a teacher and active researcher in the Department of Automotive, Combustion Engine and Railway Engineering at CTU. His research interests include MBS models of railway vehicles, Mechatronics for railway vehicles, Active control of railway vehicle suspensions and wheel sets. Ivo Bukovsky graduated from Czech Technical University in Prague (CTU) where he received his Ph.D. in the field of Control and System Engineering in 2007 and became associate professor since 2013. His research interests include higher-order neural networks, adaptive evaluation of time series and systems, multiscale-analysis approaches, control and biomedical applications. He was a visiting researcher at the University of Saskatchewan (2003), at the University of Manitoba in Canada (2010), and he was a visiting professor at Tohoku University (2011)
9cs.NE
Sequential Coding of Gaussโ€“Markov Sources arXiv:1702.01779v3 [cs.IT] 3 Jun 2017 Anatoly Khina, Ashish Khisti, Victoria Kostina, and Babak Hassibi Abstractโ€”We consider the problem of sequential transmission of Gaussโ€“Markov sources. We show that in the limit of large spatial block lengths, greedy compression with respect to the squared error distortion is optimal; that is, there is no tension between optimizing the distortion of the source in the current time instant and that of future times. We then extend this result to the case where at time t a random compression rate Rt is allocated independently of the rate at other time instants. This, in turn, allows us to derive the optimal performance of sequential coding over packet-erasure channels with instantaneous feedback. For the case of packet erasures with delayed feedback, we connect the problem to that of compression with side information that is known at the encoder and may be known at the decoder โ€” where the most recent packets serve as side information that may have been erased. We conclude the paper by demonstrating that the loss due to a delay by one time unit is rather small. Index Termsโ€”Sequential coding of correlated sources, successive refinement, source streaming, packet erasures, source coding with side information. I. I NTRODUCTION Sequential coding of sources is increasingly finding applications, such as real-time video streaming, and cyberphysical and networked control. Such systems use compressed packetbased transmission and strive to achieve minimum distortion for the given compression rates. This setting was introduced and treated for the two-source case by Viswanathan and Berger [1] and for more users in [2]โ€“ [5]. For the special case of Gaussโ€“Markov sources, an explicit expression for the achievable sum-rate for given distortions was derived in [2], [3] and extended for the (general) jointly Gaussian three-source case in [6]. In practice, however, packet-based protocols are prone to erasures and possible delays. The case of sequential coding in the presence of packet erasures was treated for various erasure models. The case when only the first packet is prone to an erasure was considered in [7]. A more general approach which trades between the performance given all previously sent packets and the performance given only the last packet was proposed in [8]. For random independent identically distributed (i.i.d.) packet erasures, a hybridation between pulse-code modulation (PCM) and differential PCM (DPCM), termed leaky DPCM, was proposed in [9] and analyzed for the case of very low erasure probability in [10]. The scenario in which the erasures occur in bursts was considered in [11], [12]. There, a sequence of source vectors sampled from a A. Khina, V. Kostina and B. Hassibi are with the Department of Electrical Engineering, California Institute of Technology, Pasadena, CA 91125, USA. E-mails: {khina, vkostina, hassibi}@caltech.edu A. Khisti is with the Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4, Canada. E-mail: [email protected] Gaussโ€“Markov process in the temporal dimension must be encoded sequentially and reconstructed with zero delay at the decoder. The channel introduces a burst of erasures of a certain maximum length and the decoder is not required to reconstruct the sequences that fall in the erasure period and a recovery window following it. All of these works assume no feedback is available at the encoder, namely that the encoder does not know whether a transmitted packet successfully arrives to the decoder or is erased in the process. In this paper, we first consider the problem of sequential coding of Gaussโ€“Markov sources and determine the rateโ€“ distortion region for large frames. Specifically, we show that greedy quantization that optimizes the distortion for each time is also optimal for minimizing the distortion of future time instants. This insight allows us to extend the result to the case where the compression rate rt available for the transmission of the packet at time t is determined just prior to its transmission. The packet-erasure channel with instantaneous output feedback (ACK/NACK) can be viewed as a special case of the above noiseless channel with random rate allocation, with rt = 0 corresponding to a packet-erasure event [13]. The optimal rateโ€“distortion region of sequential coding of Gaussโ€“Markov sources in the presence of packet erasures and instantaneous output feedback thereby follows as a simple particularization of our more general result. We further tackle the more challenging delayed feedback setting, in which the encoder does not know whether the most recently transmitted packets arrived or not. Viewing these recent packets as side information (SI) that is available at the encoder and possibly at the decoder, and leveraging the results of Kaspi [14] along with their specialization for the Gaussian case by Perron et al. [15],1 we adapt our transmission scheme to the case of delayed feedback. We provide a detailed description of the proposed scheme for the case where the feedback is delayed by one time unit and demonstrate that the loss compared to the case of instantaneous feedback is small. II. P ROBLEM S TATEMENT We now present the model of the source, channel, and the admissible encoder and decoder both of which are required to be causal in this work; see Fig. 1. Throughout the paper, kยทk denotes the Euclidean norm. Random variables are denoted by lower-case letters with 1 The scenario considered in [14], [15] can be also viewed as special case of the results of Heegard and Berger [16], where the SI is not available at the encoder, by adjusting the distortion measure and โ€œaugmentingโ€ the source [17]. Interestingly, knowing the SI at the encoder allows one to improve the optimal performance of this scenario in the Gaussian case; see Rem. 9. wt st = ฮฑt stโˆ’1 + wt st Encoder N Rt bits Decoder sฬ‚t We further define the steady-state distortion (assuming the limit exists): Dโˆž , lim Dt . Fig. 1: Sequential coding of a Gaussโ€“Markov source setup. temporal subscripts (at ), and random vectors (โ€œframesโ€) of length N by boldface possibly accented lower-case letters with ห† t ). We denote temporal sequences by temporal subscripts (at , aฬƒ at , (a1 , . . . , at ). N is the set of natural numbers. All other notations represent deterministic scalars. We assume that the communication spans the time interval [1, T ], where T โˆˆ N. Source: Consider a Gaussโ€“Markov source {st }, whose outcomes are vectors (โ€œframesโ€) of length N with i.i.d. samples along the spatial dimension, that satisfy the temporal Markov relation: st = ฮฑt stโˆ’1 + wt , t = 1, . . . , T , (1) where {ฮฑt } are known process coefficients that satisfy |ฮฑt | < 1, and the outcomes of {wt } are i.i.d. along the spatial dimension, Gaussian and mutually independent across time of zero mean and variances {Wt }. We assume s0 = 0 for convenience.   Denote by St , N1 E kst k2 the average power of the entries of vector st . Then, we obtain the following recursive relation: St = ฮฑt2 Stโˆ’1 + Wt , t = 1, . . . , T , (2a) S0 = 0. (2b)  Channel: At time t, a packet ft โˆˆ 1, 2, . . . , 2N Rt is sent over a noiseless channel of finite rate Rt . Causal encoder: Sees st at time t and applies a causal function Ft to the entire source sequence st to  observed N Rt generate a packet ft โˆˆ 1, 2, . . . , 2 :  t ft = Ft s . (3) Causal decoder: Applies a causal function Gt to the sequence of received packets f t to construct an estimate sฬ‚t of st , at time t:  sฬ‚t = Gt f t . (4) Distortion: The mean-square error distortion at time t is defined as i 1 h 2 Dt , E kst โˆ’ sฬ‚t k . (5) N If we specialize the source process into that of fixed parameters, namely, ฮฑt โ‰ก ฮฑ, t = 1, . . . , T , Wt โ‰ก W, then its power converges to Sโˆž = W . 1 โˆ’ ฮฑ2 (6) T โ†’โˆž Definition (Distortion-rate region). The distortionโ€“rate region is the closure of all achievable distortion tuples DT , (D1 , . . . , DT ) for a rate tuple RT , (R1 , . . . , RT ), for any N , however large; its inverse is the rateโ€“distortion region. III. D ISTORTION โ€“R ATE R EGION OF S EQUENTIAL C ODING OF G AUSS โ€“M ARKOV S OURCES The optimal achievable distortions for given rates for the model of Sec. II are provided in the following theorem. Theorem 1 (Distortionโ€“rate region). The distortionโ€“rate region of sequential coding for a rate tuple RT is given by all distortion tuples DT that satisfy Dt โ‰ฅ Dtโˆ— with  โˆ— Dtโˆ— = ฮฑt2 Dtโˆ’1 + Wt 2โˆ’2Rt , t = 1, . . . , T , (7a) D0โˆ— = 0. (7b) Remark 1. Th. 1 establishes the optimal rateโ€“distortion region for the โ€œcausal encoderโ€“causal decoderโ€ setting of Ma and Ishwar [2] for the case of Gaussโ€“Markov sources. We note that Ma and Ishwar [2] provide an explicit result only for the sumrate for the Gaussโ€“Markov case [3]. Torbatian and Yang [6] extend the sum-rate result to the case of three jointly Gaussian sources (which do not necessarily constitute a Markov chain). Our work, on the other hand, fully characterizes the rateโ€“ distortion region for the case of Gaussโ€“Markov sources. Remark 2. The results and proof (provided in the sequel) of Th. 1 imply that optimal greedy quantization at every step โ€” which is achieved via Gaussian backward [18, Ch. 10.3] or forward [18, pp. 338โ€“339] channels โ€” becomes optimal when N is large. Moreover, it achieves the optimum for all t โˆˆ [1, T ] simultaneously, meaning that there is no tension between minimizing the current distortion and future distortions. To prove this theorem we first construct the optimal greedy scheme and determine its performance in Sec. III-A. We then show that it is in fact (globally) optimal when N goes to infinity, by constructing an outer bound for this scenario, in Sec. III-B. A. Achievable We construct an inner bound using the optimal greedy scheme. In this scheme all the quantizers are assumed to be minimum mean square error (MMSE) quantizers. We note that the quantized values of such quantizers are uncorrelated with the resulting quantization errors. Scheme. Encoder. At time t: โ€ข Generates the prediction error sฬƒt , st โˆ’ ฮฑt sฬ‚tโˆ’1 , (8) where sฬ‚tโˆ’1 , defined in (4), is the previous source reconstruction at the decoder, and sฬ‚0 = 0. A linear recursive relation for sฬ‚t is provided in the sequel in (9) .2 โ€ข Generates ห† sฬƒt , the quantized reconstruction of the prediction error sฬƒt , by quantizing sฬƒt using the optimal MMSE quantizer of rate Rt and frame length N . โ€ข Sends ft = ห† sฬƒt over the channel. Decoder. At time t: โ€ข Receives ft . โ€ข Recovers a reconstruction ห† sฬƒt of the prediction error sฬƒt . โ€ข Generates an estimate sฬ‚t of st : sฬ‚t = ฮฑt sฬ‚tโˆ’1 + ห†sฬƒt . (9) The optimal achievable distortions {Dt } of this scheme for long frame lengths N , are as follows. Assertion 1 (Inner bound). Let  > 0, however small. Then, the expected distortion of the scheme at time t โˆˆ [1, T ] satisfies the recursion  Dt โ‰ค ฮฑt2 Dtโˆ’1 + Wt 2โˆ’2Rt + , t = 1, . . . , T , (10a) D0 = 0, (10b) for a large enough N . Proof: First note that the error between st and sฬ‚t , denoted by et , is equal to et , st โˆ’ sฬ‚t = (sฬƒt + ฮฑt sฬ‚tโˆ’1 ) โˆ’ ฮฑt sฬ‚tโˆ’1 + ห†sฬƒt = sฬƒt โˆ’ ห†sฬƒt  Assertion 2 (Outer bound). Consider the setting of Sec. II. Then, the average achievable distortion Dt at time t โˆˆ [1, T ] is bounded from below by Dt โ‰ฅ Dtโˆ— , where Dtโˆ— satisfies (7) with equality. Proof: Let N โˆˆ N. We shall prove   Dt โ‰ฅ 2โˆ’2Rt Efห‡tโˆ’1 N st |f tโˆ’1 = fห‡tโˆ’1 โ‰ฅ (11c) sฬƒt , st โˆ’ ฮฑt sฬ‚tโˆ’1 = ฮฑt (stโˆ’1 โˆ’ sฬ‚tโˆ’1 ) + wt = ฮฑt etโˆ’1 + wt . Since wt is independent of etโˆ’1 , the average power of the entries of sฬƒt is equal to Sฬƒt = ฮฑt2 Dtโˆ’1 + Wt . Using the property that the rateโ€“distortion function under mean square error distortion of an i.i.d. source with given variance is upper bounded by that of a white Gaussian source with the same variance (see, e.g., [18, pp. 338โ€“339]), we obtain the following recursion:  Dt โ‰ค ฮฑt2 Dtโˆ’1 + Wt 2โˆ’2Rt , and hence (7) is achievable within an arbitrarily small  > 0, for a sufficiently large N .     = E stโˆ’1 f tโˆ’1 and ฮฑt sฬ‚tโˆ’1 = E st f tโˆ’1 are the MMSE estimators of stโˆ’1 and st , respectively, given all the past channel outputs. Dtโˆ— , t = 1, . . . , T , (12a) (12b) by induction, where the sequence {Dtโˆ— } is defined in (7), 1 2 2 N h(st ) , N (st ) , 2ฯ€ e    2 h s f k =fห‡k 1 N t N st f k = fห‡k , 2 2ฯ€ e denote the entropy-power and conditional entropy-power of st given f k = fห‡k , the expectation Efห‡tโˆ’1 [ยท] is with respect to fห‡tโˆ’1 , and the random vector fห‡t is distributed the same as f t . Basic step (t = 1). First note that, since s0 = 0 and vector w1 consists of i.i.d. Gaussian entries of variance W1 , (12b) is satisfied with equality. To prove (12a), we use the fact that the optimal achievable distortion D1 for a Gaussian source (s1 = w1 ) with i.i.d. entries of power W1 and rate R1 is dictated by its rateโ€“distortion function (RDF) [18, Ch. 10.3.2]: D1 โ‰ฅ W1 2โˆ’2R1 . (11b) where (11b) follows from (8) and (9). Thus, the distortion (5) is also the distortion in reconstructing sฬƒt . Using (1), (8) and (11), we express sฬƒt as tโˆ’1 We shall now construct an outer bound that coincides with the inner bound of Assert. 1 for large frame lengths N . (11a)  2 sฬ‚ B. Impossible (Converse) Inductive step. Let k โ‰ฅ 2 and suppose (12) is true for t = k โˆ’ 1. We shall now prove that it holds also for t = k. i 1 h 2 Dk = E ksk โˆ’ sฬ‚k k N ii 1 h h 2 = E E ksk โˆ’ sฬ‚k k f kโˆ’1 (13a) N h h ii 1 2 (13b) = Efห‡kโˆ’1 E ksk โˆ’ sฬ‚k k f kโˆ’1 = fห‡kโˆ’1 N    (13c) โ‰ฅ Efห‡kโˆ’1 N sk f kโˆ’1 = fห‡kโˆ’1 2โˆ’2Rk   โˆ’2R kโˆ’1 kโˆ’1 k ห‡ = Efห‡kโˆ’1 N ฮฑk skโˆ’1 + wk |f =f 2 (13d) n h   i โ‰ฅ Efห‡kโˆ’2 Efห‡kโˆ’1 N ฮฑk skโˆ’1 |f kโˆ’1 = fห‡kโˆ’1 fห‡kโˆ’2 o + N (wk ) 2โˆ’2Rk (13e) n   โ‰ฅ ฮฑk2 Efห‡kโˆ’2 N skโˆ’1 f kโˆ’2 = fห‡kโˆ’2 , fkโˆ’1 o + Wk 2โˆ’2Rk (13f) n   โ‰ฅ ฮฑk2 Efห‡kโˆ’2 N skโˆ’1 |f kโˆ’2 = fห‡kโˆ’2 2โˆ’2Rkโˆ’1 o + Wk 2โˆ’2Rk (13g)  โˆ’2Rk 2 โˆ— โ‰ฅ2 ฮฑk Dkโˆ’1 + Wk (13h) = Dkโˆ— , (13i) where (13a) follows from the law of total expectation, (13b) holds since f kโˆ’1 and fห‡kโˆ’1 have the same distribution, (13c) follows by bounding from below the inner expectation (conditional distortion) by the rateโ€“distortion function and the Shannon lower bound [18, Ch. 10] โ€” this also proves (12a), (13d) is due to (1), (13e) follows from the entropy-power inequality [18, Ch. 17], (13f) holds since wk is Gaussian, the scaling property of differential entropies and Jensenโ€™s inequality: Efห‡   2 h s kโˆ’1 2N f kโˆ’1 =fห‡kโˆ’1 kโˆ’1 2 โ‰ฅ 2N 2 โ‰ก 2N Efห‡ kโˆ’1 h   fห‡kโˆ’2 f kโˆ’2 =fห‡kโˆ’2 , fkโˆ’1 IV. R ANDOM -R ATE B UDGETS , Assertion 3 (Outer bound for non-Gaussian noise). Consider the setting of Sec. II with independent non-Gaussian noise entries {wt }. Then, the average achievable distortion Dt at time t โˆˆ [1, T ] is bounded from below by Dt โ‰ฅ Dtโˆ— , with Dtโˆ— given by the recursion  โˆ— Dtโˆ— = ฮฑ2 Dtโˆ’1 + N (wt ) 2โˆ’2Rt , D0โˆ— = 0, is the entropy-power of wt . Proof: The proof is identical to that of Assert. 2 with Wt replaced by N (wt ).3 C. Steady State of Asymptotically Stationary Sources For the asymptotically stationary source in (6), the steadystate average distortion is as follows. Corollary 1 (Steady state). Let  > 0, however small. Then, the minimum steady-state distortion is equal to โˆ— Dโˆž = 0 โ‰ถ Dt โˆ’ Dโˆž โ‰ถ Dtโˆ’1 โˆ’ Dโˆž  (13h) is by the induction hypothesis, and (13i) holds by the definition of {Dtโˆ— } as the sequence that satisfies (7) โ€” which also proves (12b). This concludes the proof of (12b) as desired. 1 h(wt ) 2ฯ€e 2 Hence, if 0 โ‰ถ Dtโˆ’1 โˆ’ Dโˆž , then Remark 3. As is evident from the proof, the result of Corol. 1 remains true for any initial value D0 . (13g) follows from the following standard set of inequalities:  N Rkโˆ’1 โ‰ฅ H fkโˆ’1 f kโˆ’2 = fห‡kโˆ’2  โ‰ฅ I skโˆ’1 ; fkโˆ’1 f kโˆ’2 = fห‡kโˆ’2  = h skโˆ’1 f kโˆ’2 = fห‡kโˆ’2  โˆ’ h skโˆ’1 f kโˆ’2 = fห‡kโˆ’2 , fkโˆ’1 , where N (wt ) = Dt โˆ’ Dโˆž = ฮฑ2 2โˆ’2R < 1. Dtโˆ’1 โˆ’ Dโˆž and converges (exponentially fast) to Dโˆž .  i h  h skโˆ’1 f kโˆ’1 =fห‡kโˆ’1 skโˆ’1 or equivalently W 2โˆ’2R + , 1 โˆ’ ฮฑ2 2โˆ’2R for a large enough N . (15) In this section we generalize the results of Sec. III to random rates {rt } that are independent of each other and of {wt }. Rate rt is revealed to the encoder just before the transmission at time t. Theorem 2 (Distortionโ€“rate region). The distortionโ€“rate region of sequential coding with independent rates rT is given by all distortion tuples DT that satisfy Dt โ‰ฅ Dtโˆ— withD0โˆ— = 0 and    โˆ— Dtโˆ— = ฮฑt2 Dtโˆ’1 + Wt E 2โˆ’2rt , t = 1, . . . , T . (16) Remark 4. An immediate consequence of this theorem and Jensenโ€™s inequality is that using packets of a fixed rate that is equal to E [rt ] performs better than using random rates. Proof: Achievable. Since the achievability scheme in Th. 1 does not use the knowledge of future transmission rates to encode and decode the packet at time t, we have i 1 h 2 (17a) dt , E kst โˆ’ sฬ‚t k rT N h i 1 2 = E kst โˆ’ sฬ‚t k rt (17b) N 2 โˆ’2rt โ‰ค (ฮฑt dtโˆ’1 + Wt )2 + , (17c) Taking an expectation of (17c) with respect to rt and using the independence of rtโˆ’1 and rt , we achieve (16). Impossible. Revealing the rates to the encoder and the decoder prior to the start of transmission can only improve the distortion. Thus, the distortions {dt } conditioned on {rt } (17a) are bounded from below as in Th. 1; by taking the expectation with respect to {rt }, we attain the desired result. For the special case of an asymptotically stationary source (6), the steady-state distortion is given as follows. Corollary 2 (Steady state). Assume that the rates {rt } are Proof: Note that (15) is a fixed point of (7a) (up to ). i.i.d. Let  > 0, however small. Then, the minimum steadyโˆ’2R Now since ฮฑ < 1 and 2 < 1, Dt converges to Dโˆž . state distortion is equal to This can be easily proved as follows. Assume Dtโˆ’1 6= Dโˆž BW (otherwise we are already at the fixed point). Then, Dโˆž = + (18)  2  โˆ’2R   2  โˆ’2R  1 โˆ’ ฮฑ2 B Dt โˆ’ Dโˆž = ฮฑ Dtโˆ’1 + W 2 โˆ’ ฮฑ Dโˆž + W 2 for a large enough N , where   2 โˆ’2R =ฮฑ 2 (Dtโˆ’1 โˆ’ Dโˆž ) , B , E 2โˆ’2rt . 3 Recall that in the Gaussian setting N (wt ) = Var (wt ) โ‰ก Wt . Proof: Note that (18) is a fixed point of (16). Since ฮฑ < 1 and B < 1, E [Dt ] converges to Dโˆž . This can be easily proved as follows. Assume Dtโˆ’1 6= Dโˆž (otherwise we are already at the fixed point). Then,       Dt โˆ’ Dโˆž = ฮฑ2 Dtโˆ’1 + W B โˆ’ ฮฑ2 Dโˆž + W B = ฮฑ2 B (Dtโˆ’1 โˆ’ Dโˆž ) , B. Multiple Packets Per Frame or equivalently Dt โˆ’ Dโˆž = ฮฑ2 B < 1. Dtโˆ’1 โˆ’ Dโˆž Hence, if 0 โ‰ถ Dtโˆ’1 โˆ’ Dโˆž , then 0 โ‰ถ Dt โˆ’ Dโˆž โ‰ถ Dtโˆ’1 โˆ’ Dโˆž and converges exponentially fast to Dโˆž . V. PACKET E RASURES WITH I NSTANTANEOUS F EEDBACK A. One Packet Per Frame An important special case of the random-rate budget model of Sec. IV is that of packet erasures [13]. Since a packet erasure at time t can be viewed as rt = 0, and assuming that the encoder sends packets of fixed rate R and is cognizant of any packet erasures instantaneously, the packet erasure channel can be cast as the random rate channel of Sec. IV with rt = bt R ( R, bt = 1 = 0, bt = 0 (19a) (19b) where {bt } are the packet-erasure events, such that bt = 1 corresponds to a successful arrival of the packet ft at time t, and bt = 0 means it was erased. We further denote by gt , bt ft (20) the received output where gt = 0 corresponds to an erasure, and otherwise gt = ft . We assume that {bt } are i.i.d. according to a Ber(ฮฒ) distribution for ฮฒ โˆˆ [0, 1]. Remark 5. We shall concentrate on the case of packets of fixed rate R to simplify the subsequent discussion. This way the only randomness in rate comes from the packet-erasure effect. Nevertheless, all the results that follow can be easily extended to random/varying rate allocations to which the effect of packet erasures {bt } is added in the same manner as in (19). Corollary 3 (Distortionโ€“rate region). The distortionโ€“rate region of sequential coding with packet erasures and instantaneous feedback is given as in Th. 2 with    E 2โˆ’2rt = 1 โˆ’ ฮฒ 1 โˆ’ 2โˆ’2R . Proof: Computing the expectation, we obtain     E 2โˆ’2rt = E 2โˆ’2bt R = ฮฒ2โˆ’2R + (1 โˆ’ ฮฒ), as desired. Corollary 4 (Steady state). The steady-state distortion is given as in Corol. 2 with   B , E 2โˆ’2rt  = 1 โˆ’ ฮฒ 1 โˆ’ 2โˆ’2R . In Sec. V-A we assumed one packet (ft ) was sent per each source frame (st ). Instead, one may choose to transmit multiple packets of lower rate per one source frame. Naฤฑฬˆve repetition of the same packet trades off diversity for multiplexing in this case [19] and can potentially improve the overall performance. An improvement over this naฤฑฬˆve repetition-based scheme was proposed in [20], where the repetitive transmission of a single compressed description was replaced by multiple descriptions compression [21]โ€“[24]. If we assume the availability of a perfect instantaneous feedback after each packet, a further improvement can be achieved by noting that this scenario falls again in the randomrate budget framework of Sec. IV. Specifically, if we assume the use of K packets of equal rate R/K (and hence a total rate of R), the rate probability distribution amounts to bt rt = R K with bt denoting the number of successful packet arrivals at time t, corresponding to source frame st . Assuming that the erasure events of all packets are i.i.d. with probability 1 โˆ’ ฮฒ implies that {bt } are i.i.d. according to a Binomial distribution B (K, ฮฒ). Interestingly, the optimal number of packets depends on the (total) rate R and packet successful arrival probability ฮฒ, and is determined by the number that minimizes E [2โˆ’rt ]. This is demonstrated in Fig. 2. Remark 6. We only considered uniform rate allocations for all the packets. Clearly, one can generalize the same approach to non-uniform packet rates. Remark 7. In practice one might expect longer packets to be prone to higher erasure probability. This can be taken into   account when deciding on the K that minimizes E 2โˆ’2rt . VI. PACKET E RASURES WITH D ELAYED F EEDBACK In this section we consider the case of i.i.d. packet erasures with a delayed-by-one output feedback, i.e., the case where at time t, the encoder does know whether the last packet arrived or not (does not know btโˆ’1 ), but knows the erasure pattern of all preceding packets (knows btโˆ’2 ). The encoder (3) and decoder (4) mappings can be written as [recall the definition of gt , bt ft in (20)]:  ft = Ft st , g tโˆ’2 ,  sฬ‚t = Gt g t . To that end, we recall the following result by Perron et al. [15, Th. 2], which is a specialization to the jointly Gaussian rate required to achieve these distortions is given by RKaspi (S, Z, Dโˆ’ , D+ ) ๏ฃฑ ๏ฃด 0, Dโˆ’ โ‰ฅ S and D+ โ‰ฅ Z ๏ฃด ๏ฃด1  ๏ฃด S ๏ฃด Dโˆ’ < S and D+ kS โ‰ฅ Dโˆ’ kZ ๏ฃด ๏ฃฒ 2 log Dโˆ’  , Z 1 D+ < Z and Dโˆ’ โ‰ฅ D+ + S โˆ’ Z = 2 log D+ , ( ๏ฃด ๏ฃด   ๏ฃด Dโˆ’ < S and D+ kS < Dโˆ’ kZ ๏ฃด 1 S ๏ฃด ๏ฃด log , โˆ’ 2 ๏ฃณ2 D โˆ’โˆ† and Dโˆ’ < D+ + S โˆ’ Z ab denotes the harmonic mean of a and b, and where akb , a+b p p (S โˆ’ Z)(S โˆ’ Dโˆ’ )D+ โˆ’ (Z โˆ’ D+ )(Dโˆ’ โˆ’ D+ )S โˆš โˆ†, . Z (S โˆ’ D+ ) (a) R = 1 (b) R = 5.5 Fig. 2: Evaluation of 2โˆ’rt for K = 1, 2 and 3 packets, all possible values of ฮฒ โˆˆ [0, 1], and two (total) rates R = 1 and 5.5. case of the result by Kaspi [14, Th. 1], who established the rateโ€“distortion region of lossy compression with two-sided SI where the SI may or may not be available at the decoder.4 Remark 8. Kaspiโ€™s result [14, Th. 1] can also be viewed as a special case of [16] with some adjustments; see [17]. Theorem 3 ( [15]). Let s be an i.i.d. zero-mean Gaussian source of power S, which is jointly Gaussian with SI y, which is available at the encoder and satisfies s = y + z where z is an i.i.d. Gaussian noise of power Z that is independent of y. Denote by sฬ‚+ and sฬ‚โˆ’ the reconstructions of s with and without the SI y, and by D+ and Dโˆ’ their mean squared error distortion requirements, respectively. Then, the smallest 4 We use a backward channel to represent the SI s = y + z, as opposed to the forward channel y = s + z used in [15], [16]. Remark 9. Surprisingly, as observed by Perron et al. [15], if the side-information signal y is not available at the encoder โ€” corresponding to the case considered in [16] and [14, Th. 2] โ€” the required rate can be strictly higher than that in Th. 3. This is in stark contrast to the case where the side-information is never available at the encoder and the case where the sideinformation is always available at the decoder studied by Wyner and Ziv [25], [26]. Knowing the SI at the encoder allows to (anti-)correlate the noise z with the quantization error โ€” some thing that is not possible when the SI is not available at the encoder, as the two noises must be independent in that case. This allows for some improvement, though a modest one, as implied by the results for the dual channel problem [27, Prop. 1], [28]. In our case, at time t, the previous packet ftโˆ’1 will serve as the SI. Note that it is always available to the encoder; the decoder may or may not have access to it, depending whether the previous packet arrived or not. Since the feedback is delayed, during the transmission of the current packet ft the encoder does not know whether the previous packet was lost. The tradeoff between D+ and Dโˆ’ for a given rate R will be determined by the probability of a successful packet arrival ฮฒ. Scheme (Kaspi-based). Encoder. At time t: โ€ข Generates the prediction error sฬƒt , st โˆ’ ฮฑt2 sฬ‚tโˆ’2 . โ€ข Generates ft by quantizing the prediction error sฬƒt as in Th. 3, where ftโˆ’1 is available as SI at the encoder and possibly at the decoder (depending on btโˆ’1 ) using the optimal quantizer of rate R and frame length N that minimizes the averaged over btโˆ’1 distortion: DtWeighted = ฮฒDt+ + (1 โˆ’ ฮฒ)Dtโˆ’ ; (21) more precisely, since the encoder does not know (btโˆ’1 , bt ) at time t: โ€“ Denote the reconstruction of sฬƒt at the decoder from ft and g tโˆ’1 โ€” namely given that bt = 1 โ€” by Qt (sฬƒt ), and the corresponding distortion by DtWeighted . โ€ข โ€“ Denote the reconstruction from ft and g tโˆ’2 โ€” namely given that bt = 1 and btโˆ’1 = 0 โ€” by โˆ’ Qโˆ’ t (sฬƒt ), and the corresponding distortion by Dt . โ€“ Denote the reconstruction from (ftโˆ’1 , ft ) and g tโˆ’2 โ€” namely given that bt = 1 and btโˆ’1 = 1 โ€” + by Q+ t (sฬƒt ), and the corresponding distortion by Dt . Then, the encoder sees ฮฑt Q+ tโˆ’1 (sฬƒtโˆ’1 ) as possible SI available at the decoder to minimize DtWeighted as in (21). Sends ft over the channel. Decoder. At time t: โ€ข Receives gt . โ€ข Generates a reconstruction ห† sฬƒt of the prediction error sฬƒt : ๏ฃฑ + ๏ฃด ๏ฃฒQt (sฬƒt ), bt = 1, btโˆ’1 = 1 ห†sฬƒt = Qโˆ’ (sฬƒt ), bt = 1, btโˆ’1 = 0 (22) t ๏ฃด ๏ฃณ 0, bt = 0 โ€ข Generates an estimate sฬ‚t of st : sฬ‚t = ฮฑt sฬ‚tโˆ’1 + ห†sฬƒt . This scheme is the optimal greedy scheme whose performance is stated next, in the limit of large N . Theorem 4. Let  > 0, however small. Then, for a large enough N , the expected distortion of the scheme at time t โˆˆ [2, T ] given (b1 , . . . , bt ) satisfies the recursion ๏ฃฑ + ๏ฃด bt = 1, btโˆ’1 = 1 ๏ฃฒDt + , โˆ’ Dt = Dt + , bt = 1, btโˆ’1 = 0 ๏ฃด ๏ฃณ 2 ฮฑt Dtโˆ’1 + W + , bt = 0 D1 = D1+ = D1โˆ’ โˆ’b1 2R = Wt 2 + , Fig. 3: Distortions Dt as a function of the time t of the various schemes presented in this section, along with that of the instantaneous-feedback scheme of Sec. V, for ฮฑ = 0.7, W = 1, ฮฒ = 0.5 and R = 2. (we derive their performance for the special case of an asymptotically stationary source): โ€ข No prediction: A scheme that does not use prediction at all, as if the source samples were independent. This scheme achieves a distortion of Dt = ฮฒSt 2โˆ’2R + (1 โˆ’ ฮฒ)St , โ€ข where Dt+ and Dtโˆ’ are the distortions that minimize DtWeighted = ฮฒDt+ + (1 โˆ’ ฮฒ)Dtโˆ’ , โˆ’ + RKaspi (ฮฑt Dtโˆ’1 + W, ฮฑt Dtโˆ’1 + W, Dtโˆ’ , Dt+ ) = R. The proof is again the same as that of Ths. 1 and 2, with ห†sฬƒt generated as in (22). Remark 10. Here, in contrast to the case of instantaneous feedback, evaluating the average distortions {Dt } in explicit form (recall Corol. 3) is much more challenging. We do it numerically, instead. Somewhat surprisingly, the loss in performance of the Kaspi-based scheme due to the feedback delay is rather small compared to the scenario in Sec. V where the feedback is available instantaneously, for all values of ฮฒ.5 This is demonstrated in Fig. 3, where the perfomances of these schemes are compared along with the performances of the following three simple schemes for ฮฑt โ‰ก 0.7, W โ‰ก 1, ฮฒ = 0.5, R = 2 5 For ฮฒ values close to 0 or 1, the loss becomes even smaller as in these cases using the scheme of Sec. V that assumes that the previous packet arrived or was erased, respectively, becomes optimal. where St is the power of the entries of st as given in (2). Assumes worst case (WC): Since at time t the encoder does not know btโˆ’1 , a โ€œsafeโ€ way would be to work as if btโˆ’1 = 0. This achieves a distortion of    Dt = ฮฑ4 Dtโˆ’2 + (1 + ฮฑ2 )W ฮฒ2โˆ’2R + (1 โˆ’ ฮฒ)2 + ฮฒ(1 โˆ’ ฮฒ)(ฮฑ2 Dtโˆ’1 + W ), such that the rate of Th. 3 satisfies D0 = 0, โ€ข t = 1, . . . , T , D1 = W 2 โˆ’2R t = 2, . . . , T , . Assumes best case (BC): The optimistic counterpart of the previous scheme is that which always works as if btโˆ’1 = 1. This scheme achieves a distortion of    Dt = ฮฒ ฮฑ2 Dtโˆ’1|tโˆ’2 2โˆ’2R + W ฮฒ2โˆ’2R + (1 โˆ’ ฮฒ)   + (1 โˆ’ ฮฒ) ฮฑ2 Dtโˆ’1|tโˆ’2 + W , t = 2, . . . , T , Dtโˆ’1|tโˆ’2 , ฮฑ2 Dtโˆ’2 + W, D0 = 0, t = 2, . . . , T , D1 = W 2โˆ’2R . VII. D ISCUSSION : F EEDBACK WITH L ARGER D ELAYS To extend the scheme of Sec. VI for larger delays, a generalization of Th. 3 is needed. Unfortunately, the optimal rateโ€“distortion region for more than two decoders remains an open problem and is only known for the case when the source and the possible SIs form a Markov chain (โ€œdegradedโ€). Nonetheless, achievable regions for multiple decoders have been proposed in [16], which can be used for the construction of schemes that accommodate larger delays. ACKNOWLEDGMENT The authors thank Yu Su from Caltech for valuable discussions. R EFERENCES [1] H. Viswanathan and T. Berger, โ€œSquential coding of correlated sources,โ€ IEEE Trans. Inf. Theory, vol. 46, no. 1, pp. 236โ€“246, Jan. 2000. [2] N. Ma and P. Ishwar, โ€œOn delayed sequential coding of correlated sources,โ€ IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3763โ€“3782, 2011. [3] โ€”โ€”, โ€œErratum to โ€œon delayed sequential coding of correlated sourcesโ€,โ€ IEEE Trans. Inf. Theory, vol. 58, no. 6, p. 4074, June 2012. [4] E.-H. Yang, L. Zheng, and D.-K. He, โ€œRate distortion theory for causal video coding: Characterization, computation algorithm, and comparison,โ€ IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 5258โ€“5280, 2011. [5] โ€”โ€”, โ€œOn the information theoretic performance comparison of causal video coding and predictive video coding,โ€ IEEE Trans. Inf. Theory, vol. 60, no. 3, pp. 1428โ€“1446, Mar. 2014. [6] M. Torbatian and E.-H. Yang, โ€œCausal coding of multiple jointly Gaussian sources,โ€ in Proc. Annual Allerton Conf. on Comm., Control, and Comput., Monticello, IL, USA, Oct. 2012, pp. 2060โ€“2067. [7] M. Eslamifar, โ€œOn causal video coding with possible loss of the first encoded frame,โ€ Masterโ€™s thesis, University of Waterloo, Waterloo, Ontario, Canada, 2013. [8] L. Song, J. Chen, J. Wang, and T. Liu, โ€œGaussian robust sequential and predictive coding,โ€ IEEE Trans. Inf. Theory, vol. 59, no. 6, pp. 3635โ€“ 3652, June 2013. [9] H. C. Huang, W. H. Peng, and T. Chiang, โ€œAdvances in the scalable amendment of H.264/AVC,โ€ IEEE Comm. Magazine, vol. 45, no. 1, pp. 68โ€“76, Jan. 2007. [10] Y.-Z. Huang, Y. Kochman, and G. W. Wornell, โ€œCausal transmission of colored source frames over packet erasure channel,โ€ in Proc. Data Comp. Conf. (DCC), Snowbird, UT, USA, Mar. 2010, pp. 129โ€“138. [11] F. Etezadi, A. Khisti, and M. Trott, โ€œZero-delay sequential transmission of Markov sources over burst erasure channels,โ€ IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4584โ€“4613, Aug. 2014. [12] F. Etezadi, A. Khisti, and J. Chen, โ€œA truncated prediction framework for streaming over erasure channels,โ€ IEEE Trans. Inf. Theory, Submitted Jul. 2014, Revised Oct. 2016. [13] P. Minero, M. Franceschetti, S. Dey, and G. N. Nair, โ€œData rate theorem for stabilization over time-varying feedback channels,โ€ IEEE Trans. Auto. Control, vol. 54, no. 2, pp. 243โ€“255, Feb. 2009. [14] A. H. Kaspi, โ€œRateโ€“distortion when side-information may be present at the decoder,โ€ IEEE Trans. Inf. Theory, vol. 40, no. 6, pp. 2031โ€“2034, Nov. 1994. [15] E. Perron, S. Diggavi, and I. E. Telatar, โ€œOn the role of encoder sideinformation in source coding for multiple decoders,โ€ in Proc. IEEE Int. Symp. on Inf. Theory (ISIT), Seattle, WA, USA, July 2006, pp. 331โ€“335. [16] C. Heegard and T. Berger, โ€œRateโ€“distortion when side information may be absent,โ€ IEEE Trans. Inf. Theory, vol. 31, pp. 727โ€“734, Nov. 1985. [17] A. Khina and U. Erez, โ€œSource coding with composite side information at the decoder,โ€ in Proc. IEEE Conv. Electrical and Electron. Engineers in Israel (IEEEI), Eilat, Israel, Nov. 2012. [18] T. M. Cover and J. A. Thomas, Elements of Information Theory, Second Edition. New York: Wiley, 2006. [19] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. U.K: Cambridge Univ. Press, 2005. [20] J. Ostergaard and D. Quevedo, โ€œMultiple descriptions for packetized predictive control,โ€ EURASIP J. Advances in Sig. Proc., vol. 2016, no. 45, Apr. 2016. [21] H. Witsenhausen, โ€œOn source networks with minimal breakdown degradation,โ€ Bell Sys. Tech. Jour., vol. 59, pp. 1083โ€“1087, July-Aug. 1980. [22] J. K. Wolf, A. D. Wyner, and J. Ziv, โ€œSource coding for multiple descriptions,โ€ Bell Sys. Tech. Jour., vol. 59, pp. 1417โ€“1426, Oct. 1980. [23] L. H. Ozarow, โ€œOn the source coding problem with two channels and three receivers,โ€ Bell Sys. Tech. Jour., vol. 59, pp. 1909โ€“1922, 1980. [24] A. El Gamal and T. M. Cover, โ€œAchievable rates for multiple descriptions,โ€ IEEE Trans. Inf. Theory, vol. 28, no. 6, pp. 851โ€“857, Nov. 1982. [25] A. D. Wyner and J. Ziv, โ€œThe rateโ€“distortion function for source coding with side information at the decoder,โ€ IEEE Trans. Inf. Theory, vol. 22, pp. 1โ€“10, Jan. 1976. [26] A. D. Wyner, โ€œThe rateโ€“distortion function for source coding with side information at the decoder โ€” II: General sources,โ€ Information and Control, vol. 38, pp. 60โ€“80, 1978. [27] R. Zamir and U. Erez, โ€œA Gaussian input is not too bad,โ€ IEEE Trans. Inf. Theory, vol. 50, no. 6, pp. 1362โ€“1367, Jun. 2004. [28] T. Philosof and R. Zamir, โ€œThe cost of uncorrelation and noncooperation in MIMO channels,โ€ IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 3904โ€“ 3920, Nov. 2007.
7cs.IT
Reuse of Neural Modules for General Video Game Playing Alexander Braylan Mark Hollenbeck Elliot Meyerson Risto Miikkulainen arXiv:1512.01537v1 [cs.NE] 4 Dec 2015 Department of Computer Science, The University of Texas at Austin {braylan,mhollen,ekm,risto}@cs.utexas.edu Abstract A general approach to knowledge transfer is introduced in which an agent controlled by a neural network adapts how it reuses existing networks as it learns in a new domain. Networks trained for a new domain can improve their performance by routing activation selectively through previously learned neural structure, regardless of how or for what it was learned. A neuroevolution implementation of this approach is presented with application to high-dimensional sequential decision-making domains. This approach is more general than previous approaches to neural transfer for reinforcement learning. It is domain-agnostic and requires no prior assumptions about the nature of task relatedness or mappings. The method is analyzed in a stochastic version of the Arcade Learning Environment, demonstrating that it improves performance in some of the more complex Atari 2600 games, and that the success of transfer can be predicted based on a high-level characterization of game dynamics. Introduction The ability to apply available previously learned knowledge to new tasks is a hallmark of general intelligence. Transfer learning is the process of reusing knowledge from previously learned source tasks to bootstrap learning of target tasks. In long-range sequential control domains, such as robotics and video game-playing, transfer is particularly important, because previous experience can help agents explore new environments efficiently (Taylor and Stone 2009; Konidaris, Scheidwasser, and Barto 2012). Knowledge acquired during previous tasks also contains information about an agentโ€™s domain-independent decision making and learning dynamics, and thus can be useful even if the domains seem unrelated. Existing approaches to transfer learning in such domains have demonstrated successful transfer of varying kinds of knowledge, but they make two fundamental assumptions that restrict their generality: (1) some sort of a priori humandefined understanding of how tasks are related, and (2) separability of knowledge extraction and target learning. The first assumption limits how well the approach can be applied by restricting its use only to cases where the agent Copyright c 2016, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. has been provided with this additional relational knowledge, or, if it can be learned (Talvitie and Singh 2007; Taylor, Kuhlmann, and Stone 2008; Ammar et al. 2015b), cases where task mappings are useful. The second assumption implies that it is known what knowledge will be useful and how it should be incorporated before learning on the target task begins, preventing the agent from adapting the way it uses source knowledge as it gains information about the target domain. General ReUse of Static Modules (GRUSM) is proposed in this paper as a general neural network approach to transfer learning that avoids both of these assumptions. GRUSM augments the learning process to allow learning networks to route through existing neural modules (source networks) selectively as they simultaneously develop new structure for the target task. Unlike previous work, which has dealt with mapping task variables between source and target, GRUSM is domain-independent, in that no knowledge about the structure of the source domain or even knowledge about where the network came from is required for it to be reused. Instead of using mappings between task-spaces to facilitate transfer, it searches directly for mappings in the solution space, that is, connections between existing source networks and the target network. This approach is motivated by studies that have shown in both naturally occurring complex networks (Milo et al. 2002) and in artificial neural networks (Swarup and Ray 2006) that certain network structures repeat and can be useful across domains, without any context for how exactly this structure should be used. This work is further motivated by the idea that neural resources in the human brain are reused for countless purposes in varying complex ways (Anderson 2010). In this paper, an implementation of GRUSM based on the Enforced Subpopulations (ESP) neuroevolution framework (Gomez and Miikkulainen 1997; 1999) is presented. The approach is validated on the stochastic Atari 2600 general game playing platform, finding that GRUSM-ESP improves learning for more complex target games, and that these improvements may be predicted based on domain complexity features. This result demonstrates that even without traditional transfer learning assumptions, successful knowledge transfer via general reuse of existing neural modules is possible and useful for long-range sequential control tasks. In principle, this approach scales naturally to transfer from an arbitrary number of source tasks, which suggests that in the future it may be possible to build GRUSM agents that accumulate and reuse knowledge throughout their lifetimes across a variety of diverse domains. Background Transfer learning encompasses machine learning techniques that involve reusing existing source knowledge in a different target task or domain. A domain is an environment in which learning takes place, characterized by the input and output space; a task is a particular function from input to output to be learned (Pan and Yang 2010). In sequentialdecision domains, a task is characterized by the values of sensory-action sequences corresponding to the pursuit of a given goal. A taxonomy of types of knowledge that may be transferred was also enumerated by Pan and Yang. Because the GRUSM approach reuses the structure of existing neural networks, it falls under feature representation transfer. Transfer Learning for RL Transfer learning for sequential decision-making domains has been studied extensively within the reinforcement learning (RL) paradigm (Taylor and Stone 2009). Reinforcement learning domains are often formulated as Markov decision processes (MDPs) in which the state space comprises all possible observations, and the probability of an observation depends only on the previous observation and action taken by a learning agent. However, many real world RL domains are non-Markovian, including many Atari 2600 games, for example, the velocity of a moving object cannot be determined by looking at a single frame. The Atari 2600 platform also supports a wide variety of games. Existing RL approaches to transfer differ on the types of differences allowed between source and target task. Some approaches that are general with respect to the kind of knowledge that can be transferred are restricted in that they require a consistent agent-space (Konidaris, Scheidwasser, and Barto 2012), or an a priori specification of inter-task mappings defining relationships between source and target state and action variables (Brys et al. 2015). Existing approaches to transfer learning that encode policies as neural networks require such a specification (Taylor, Whiteson, and Stone 2007; Verbancsics and Stanley 2010). On the other hand, existing modular neuroevolution approaches that are more general with respect to connectivity (Reisinger, Stanley, and Miikkulainen 2004; Khare et al. 2005) have not been applied to cross-domain transfer. Some of the most general existing approaches to transfer for RL automatically learn task mappings, so they need not be provided beforehand. These approaches are general enough to apply to any reinforcement learning domains, but initial approaches (Taylor, Kuhlmann, and Stone 2008; Talvitie and Singh 2007) were intractable for high dimensional state and action spaces due to combinatorial blowup in the number of possible mappings. However, recent approaches in policy gradient RL (Ammar et al. 2015b; 2015a) can both tractably learn mappings and be applied across diverse domains. These approaches have been successful in continuous control domains, but it is unclear how they would scale to domains with many discretely-valued features such as Atari. Also, the above approaches assume MDP environments, whereas GRUSM can use recurrent neural networks to extend to POMDPs. General Neural Structure Transfer There are existing algorithms similar to GRUSM in that they make it possible to reuse existing neural structure. They can apply to a wide range of domains and tasks in that they automatically select source knowledge and avoid inter-task mappings. For example, Shultz and Rivest (2001) developed a technique to build increasingly complex networks by inserting source networks chosen by how much they reduce error. This technique is only applicable to supervised learning, because the source selection depends heavily on an immediate error calculation. Also, connectivity between source and target networks is limited to the input and output layer of the source. As another example, Swarup and Ray (2006) introduced an approach that creates sparse networks out of primitives, or commonly used sub-networks, mined from a library of source networks. This subgraph mining approach depends on a computationally expensive graph mining algorithm, and tends to favor exploitation over innovation and small primitives rather than larger networks as sources. The GRUSM approach is more general in that it can be applied to unsupervised and reinforcement learning tasks, makes few a priori assumptions about what kind of sources and mappings should work best, and is able to develop memory via recurrent connections. Although an evolutionary approach is developed in this paper, GRUSM should be extensible to any neural network-based learning algorithm. Approach This section introduces the general idea behind GRUSM, provides an overview of the ESP neuroevolution framework, and describe the particular implementation: GRUSM-ESP. General ReUse of Static Modules (GRUSM) The underlying idea is that an agent learning a neural network for a target task can reuse knowledge selectively from existing neural modules (source networks) while simultaneously developing new structure unique to a target task. This approach attempts to balance reuse and innovation in an integrated architecture. Both source networks and new hidden nodes are termed recruits. Recruits are added to the target network during the learning process. Recruits are incorporated adaptively into the target network as it learns connection parameters from the target to the recruit and from the recruit to the target. All internal structure of source networks is frozen to allow learning of connection parameters to remain consistent across recruits. This mechanism forces the target network to transfer learned knowledge, rather than simply overwrite it. Connections to and from source networks can, in the most general case, connect to any nodes in the source and target, minimizing assumptions about what knowledge will be useful. A GRUSM network is a 3-tuple G = (M, S, T ) where M is a traditional neural network (feedforward or recurrent) containing the new nodes and connections unique to the target task, with input and output nodes corresponding to inputs and outputs defined by the target domain; S is a (possibly empty) set of pointers to recruited source networks S1 , ..., Sk ; and T is a set of weighted transfer connections between nodes in M and nodes in source networks, that is, for any connection ((u, v), w) โˆˆ T , (u โˆˆ M โˆงv โˆˆ Si )โˆจ(u โˆˆ Si โˆง v โˆˆ M ) for some 0 โ‰ค i โ‰ค k. This construction strictly extends traditional neural networks so that each Si can be a traditional neural network or a GRUSM network of its own. When G is evaluated, only the network induced by directed paths from inputs of M to outputs of M , including those which pass through some Si via connections in T is evaluated. During each evaluation of G, all recruited source network inputs are fixed at 0, since the agent is concerned only with performing the current target task. The parameters to be learned are the usual parameters of M , along with the contents of S and T . The internal parameters of each Si are frozen in that they cannot be rewritten through G. The motivation for this architecture is that if the solution to a source task contains any information relevant to solving a target task, then the neural network constructed for the source task will contain some structure (subnetwork or module) that will be useful for a target network. This has been previously observed in naturally occurring complex networks (Milo et al. 2002), as well as cross-domain artificial neural networks (Swarup and Ray 2006). Unlike the subgraph-mining approach to neural structure transfer (Swarup and Ray 2006), this general formalism makes no assumptions as to what subnetworks actually will be useful. One interpretation is that a lifelong learning agent maintains a system of interconnected neural modules that it can potentially reuse at any time for a new task. Even if existing modules are unlabeled, they may still be useful, due to the fact that they contain knowledge of how the agent can successfully learn. Furthermore, advances in reservoir computing (LukoลกevicฬŒius and Jaeger 2009) have demonstrated the power of using large amounts of frozen neural structure to facilitate learning of complex and chaotic tasks. The above formalism is general enough to allow for an arbitrary number of source networks and arbitrary connectivity between source and target. In this paper, to validate the approach and simplify analysis, at most one source network is used at a time and only connections from target input to source hidden layer and source output layer to target output are permitted. By not allowing target input to connect to source input, this restriction avoids high-dimensional transformations between domain-specific sensor substrates, and more intuitively captures the domain-agnostic goals of the approach, differentiating the approach from previous methods that have used direct mappings between sensor spaces. This restriction is sufficient to show that the implementation can reuse hidden source features successfully, and it is possible to analyze the cases in which transfer is most useful. Future refinements are discussed in the Discussion and Future Work section. The current implementation, described below, is a neuroevolution approach based on ESP. Enforced Subpopulations (ESP) Enforced Sub-Populations (ESP; Gomez and Miikkulainen 1997; 1999) is a neuroevolution technique in which different components of a neural network are evolved in separate subpopulations rather than evolving the whole network in a single population. ESP has been shown to perform well in a variety of reinforcement learning domains, and has shown promise in extending to POMDP environments, in which use of recurrent connections for memory is critical (Gomez and Miikkulainen 1999; Gomez and Schmidhuber 2005; Schmidhuber et al. 2007). In traditional ESP, there is a single hidden layer, each neuron of which is evolved in its own subpopulation. Recombination occurs only between members of the same subpopulation, and mutants in a subpopulation derive only from members of that subpopulation. The genome of each individual in a subpopulation is a vector of weights corresponding to the weights of connections to and from that neuron, including node bias. In each generation, networks to be evaluated are randomly constructed by inserting one neuron from each subpopulation. Each individual that participated in the network receives the fitness achieved by that network. When fitness converges, i.e., does not improve over several consecutive generations, ESP makes use of burst phases. In initial burst phases each subpopulation is repopulated by mutations of the single best neuron ever occuring in that subpopulation, so that it reverts to searching a ฮด-neighborhood around the best solution found so far. If a second consecutive burst phase is reached, i.e., no improvements were made since the previous burst phase, a new neuron with a new subpopulation may be added (Gomez 2003). GRUSM-ESP The idea of enforced sub-populations is extended to transfer learning via GRUSM networks. For each reused source network Si , the transfer connections in T between Si and M evolve in a distinct subpopulation. At the same time new hidden nodes can be added to M ; they evolve within their own subpopulations in the manner of standard ESP. In this way, the integrated evolutionary process simultaneously searches the space for how to reuse each potential source network and how to innovate with each new node. The GRUSMESP architecture (Figure 1) is composed of the following elements: (1) A pool of potential source networks. In the experiments in this paper, each target network reuses at most one source at a time; (2) Transfer genomes encoding the weights of cross-network connections between source and target. Each potential source network in the pool has its own subpopulation for evolving transfer genomes between it and the target network. Each connection in T is contained in some transfer genome. In our experiments, the transfer connections included are those such that the targetโ€™s inputs are fully connected to the sourceโ€™s hidden layer, and the sourceโ€™s outputs are fully connected into the targetโ€™s outputs; (3) A burst mechanism that determines when innovation is necessary based on a recent history of performance improvement. New hidden recruits (source networks when available, and single nodes otherwise) added during the burst phase evolve within their own subpopulations as in standard ESP. Figure 1: The GRUSM-ESP architecture, showing the balance between reused and new structure. In this example, the target network has three recruits: one source network, and two single nodes. Each bold edge between target network nodes and source network recruit indicate connections to multiple source nodes. The genome in each subpopulation encodes weight information for the connections from and to the corresponding recruit. All hidden and output neurons use a hyperbolic tangent activation function. Networks include a single hidden layer, and include recurrent self loops on hidden nodes; they are otherwise feedforward. The details of the genetic algorithm in our implementation used to evolve each subpopulation mirror those described by Gomez (2003). This algorithm has been shown to work well within the ESP framework, though any suitable evolutionary algorithm could potentially be substituted in its place. (Preliminary experiments using this approach were discussed in Braylan et al. (2015b).) Experiments GRUSM-ESP was evaluated in a stochastic version of the Atari 2600 general video game-playing platform using the Arcade Learning Environment simulator (ALE; Bellemare et al. 2013). Atari 2600 is currently a very popular platform, because it challenges modern approaches, contains non-markovian games, and entertained a generation of human video game players, who would regularly reuse knowledge gained from previous games when playing new games. To make the simulator more closely resemble the human game-playing experience, the -repeat action approach as suggested by Hausknecht and Stone (2015) is used in this paper to make the environment stochastic; in this manner, like human players, the algorithm cannot as easily find loopholes in the deterministic nature of the simulator. The recommended  = 0.251 is used. Note that the vast majority of previously published Atari 2600 results are in the deterministic setting; we are unaware of any existing scores that have been published in the -repeat setting. Agents were trained to play eight games: Pong, Breakout, Asterix, Bowling, Freeway, Boxing, Space Invaders, 1 https://github.com/mgbellemare/Arcade-Learning-Environment/tree/dev and Seaquest. Neuroevolution techniques are competitive in the Atari 2600 platform (Hausknecht et al. 2013), and ESP in particular has yielded state-of-the-art performance for several games (Braylan et al. 2015a). Three GRUSM-ESP conditions are evaluated: scratch, transfer, and random. In the scratch condition, networks are trained from scratch on a game using standard ESP (GRUSM-ESP with S = โˆ…). In the transfer condition, each scratch network is reused as a source network in training new GRUSM networks for different target games. In the random control condition, random networks are initialized and reused as source networks. Such networks contain on average the same number of parameters as fully-trained scratch networks. Each run lasted 200 generations with 100 evaluations per generation. Since the environment is stochastic, each evaluation consists of five independent trials of individual i playing game g, and the resulting score s(i, g) is the average of the scores across these trials. The score of an evolutionary run at a given generation is the highest s(i, g) achieved by an individual by that generation. A total of 333 runs were run split across all possible setups. Evolutionary parameters were selected based on their success with standard ESP. To interface with ALE, the output layer of each network consists of a 3x3 substrate representing the nine directional movements of the Atari joystick in addition to a single node representing the Fire button. The input layer consisted of a series of object representations manually generated as previously described by Hausknecht et al. (2013). The location of each object on the screen was represented in an 8 ร— 10 input substrate corresponding to the objectโ€™s class. The numbers of object classes varied between one and four. Although object representations were used in these experiments, pixel-level vision could also be learned from scratch below the neuroevolution process, e.g., via convolutional networks as was done by Koutnรญk, Schmidhuber, and Gomez (2014). Domain Characterization Understanding when transfer will be useful is important for any transfer learning approach. In many cases, attempting transfer can impede learning, leading to negative transfer, when an approach is not able to successfully adapt knowledge from the source to the target domain. Negative transfer is a serious concern for many practitioners (Taylor and Stone 2009; Pan and Yang 2010). To help understand when GRUSM-ESP should be applied, it is useful to consider the diverse array of games within a unified descriptive framework. Biological neural reuse is generally thought to be most useful in transferring knowledge from simple behaviors to more complex, and the vast majority of previous computational approaches do exactly that. Thus, the characterization of games in this paper is grounded by a sense of relative complexity. Each game can be characterized by generic binary features that determine what successful game play requires: (1) horizontal movement (joystick left/right), (2) vertical movement (joystick up/down), (3) shooting (fire button); (4) delayed rewards; and (5) long-term planning. Intuitively, more complex games will include more of these features. A partial ordering of games by complexity defined by these v h s d p none pong breakout asterix bowling freeway boxing s. invaders seaquest v = vertical movement h = horizontal movement s = shooting d = delayed rewards p = long-term planning v h pong d breakout s h v bowling freeway asterix h h,s,p s,p s boxing space invaders v,d d seaquest Figure 2: (left) Feature representation for each game, and (right) games partially-ordered by feature inclusion: every path from none to g contains along its edges each complexity feature of g exactly once, showing how games are related across the feature space. The existence of such a hierarchy motivates the use of atari for transfer. features is shown in Figure 2. The assignment of features (1), (2) and (3) is completely defined based on game interface (Bellemare et al. 2013). Freeway and Seaquest are said to have delayed rewards because a high score can only be achieved by long sequences of rewardless behavior. Only Space Invaders and Seaquest were deemed to require long-term planning (Mnih et al. 2015), since the long-range dynamics of these games penalize reflexive strategies, and as such, agents in these games can perform well with a low frequency decision-making (Braylan et al. 2015a). In addition to being intuitive, these features are validated below based on how well they characterize games by complexity and how well they predict successful transfer. Analysis Methods There are many possible metrics for evaluating success of transfer, depending on what kind of transfer is desired or expected. Learning curves are irregular across different games, as illustrated in Figure 3, which makes it difficult to choose a single metric that makes sense across all source-target pairs. Thus, the analysis is focused on a broad notion of transfer effectiveness (TE), which aggregates metrics such as jumpstart and max overall score, with a weighted approximation of area under the curve (Taylor and Stone 2009). Success of a setup is defined as the sum of the average score of that setup at a series of nonuniformly-spaced generations: [1, 10, 50, 100, 200]. This series favors early performance over later performance, as in general, in the long run, training from transfer and scratch should converge, as scratch eventually relearns everything that was effectively transferred. Then, the TE of a setup is its success minus the success of the control on the target game, the difference normalized by the size of the range of max scores achieved across all runs for that game, in order to draw comparison across games. The first hypothesis is that transfer would outperform scratch in some setups, and that those setups could be predicted (i.e., they are not coincidental). However, any outperformance of transfer over scratch could be due to a Figure 3: Raw mean score learning curves by generation for each target game aggregated over transfer (solid), random (dashed), and scratch (dotted) setups. The diversity of these learning curves shows the difficulty in comparing performance across games. larger number of network parameters. Therefore, as a second hypothesis, random setups were used as a control for the number of parameters, to test how transfer could predictably outperform random. We postulated and tested several useful indicators for predicting the outperformance of transfer, i.e., TE: (1) feature similarity: count of features that are 1 for both source and target); (2) source feature complexity: feature count of source game; (3) target feature complexity: feature count of target game; (4) source training complexity: source game average time to threshold; (5) target training complexity: target game average time to threshold, where the threshold for each game is the minimum max score achieved across all scratch runs for that game, and time to threshold is the average number of generations to reach this threshold. To predict TE, a linear regression model was trained in a leave-one-out cross-validation analysis. For each possible source-target pair (s, t), the model was trained on all pairs (s0 , t0 6= t) with TE as the dependent variable and the five indicators as the independent variables. Subsequently, the trained model was used to predict the TE of (s, t). Correlation between the actual and predicted TE across all test pairs was used to gauge the predictability of TE. This experiment was conducted identically for both transfer versus scratch and transfer versus random conditions. Results For both hypotheses, the indicator-based model proved to be a statistically significant predictor of transfer effectiveness in the test data: correlation R = 0.40 and pvalue < 0.0025 for transfer versus scratch; correlation R = 0.53 and p-value < 10โˆ’7 for transfer versus random (Figure 4). The strongest indicators for transfer versus scratch were target feature complexity and target training complexity, and for transfer versus random the strongest indicator was target feature complexity. The fact that more complex games are more successful targets should not be surprising. As noted before, in most transfer learning scenarios, only simple-to-complex transfer is considered. The ability to predict when GRUSM-ESP will work is an important tool when applying this method to boxing breakout bowling asterix space invaders pong Figure 4: Predicted vs. actual transfer effectiveness with respect to scratch (left) and random (right). Both predictors have a significant correlation between predicated and actual transfer effectiveness. game pong breakout asterix bowling freeway boxing s. invad. seaquest scratch 0.0 31.0 2800 249.3 31.4 93.9 1438.0 466.0 random 21.0 35.0 3216.7 265.0 31.5 92.7 1407.5 460.0 transfer 10.0ast 30.3box 3355bow 265.0f r 32.2brk 95.0sea 1655.0po 975.0sp human 9.3 31.8 8503 154.8 29.6 4.3 1652 20182 DQN 18.9 401.2 6012 42.4 30.3 71.8 1976 5286 Table 1: For each game, average scores for scratch, random, and transfer from best source (subscripted). Interestingly, the best source for each target is unique. We also show human and DQN scores (Mnih et al. 2015). Note: DQN uses deterministic ALE, so the most apt external comparison here may be to humans, who cannot deterministically optimize trajectories at the frame level. larger problems, and it is encouraging that the predictive indicator coincides with the โ€˜common senseโ€™ expectations of transfer effectiveness in the current experiments. TE for all source-target pairs is visualized in Figure 5. Also, although it is difficult to compare to the deterministic Atari 2600 domain, Table 1 provides a comparison of GRUSM-ESP to recent results in that domain for context (Mnih et al. 2015). Discussion and Future Work The results show that GRUSM-ESP (an evolutionary algorithm for general transfer of neural network structure) can improve learning in Atari game playing by reusing previously developed knowledge. They also make it possible to characterize the conditions under which transfer may be useful. More specifically, the improvement in learning performance in the target domain depends heavily on the complexity of the target domain. The effectiveness of transfer in complex games aligns with the common-sense notion of hierarchical knowledge representation, as argued previously in transfer learning (Konidaris, Scheidwasser, and Barto 2012) as well as in biology (Anderson 2010; Milo et al. 2002). It will be interesting to investigate whether the same principles extend to other general video game playing platforms, such as VGDL (Perez et al. 2015; Schaul 2013). Such work should help understand how subsymbolic knowledge can be recycled indefinitely across diverse domains. freeway seaquest bowling asterix breakout boxing pong space invaders seaquest freeway Figure 5: Transferability graphs over all pairs of tasks with respect to scratch (top) and random (bottom) illustrating the target-centric clustering of successful source-target pairs. Each graph includes a directed edge from g1 to g2 โ‡โ‡’ the TE (see Analysis) for g2 reusing g1 is positive. Transfer is likely inefficient in simpler games due to the effort involved in finding the necessary connections for reusing knowledge from a given source network effectively, in which case it is more efficient to relearn from scratch. For particular low-complexity games, it can also be seen that random consistently outperforms both scratch and transfer (e.g., pong). The initial flexibility of untrained parameters in the random condition may explain this result. Unfreezing reused networks, and allowing them to change with a low learning rate may help close this gap. Some transfer pairs do not consistently outperform training from scratch or random, indicating negative transfer. This highlights the importance of source and target selection in transfer learning. These results have taken a step towards answering the target-selection problem: What kinds of games make good targets for transfer? More data across many more games is required to answer the source-selection problem: For a given game, what sources should be used? A next step will involve pooling multiple candidate sources and testing GRUSM-ESPโ€™s ability to exploit the most useful structure available. Despite negative transfer in some of the setups, the technique of training a classifier to predict transfer success is shown to be a useful approach for helping decide when to transfer: given some space of complex disparate domains, try transfer with a subset of source-target pairs, and use the results to build a classifier to inform when to attempt transfer in the future. In this paper, domain-characterization features were provided, but domain-agnostic features could be learned from analysis of the networks and/or learning process; this is an interesting avenue for future work. Another area of future work involves increasing the flexibility in the combined architecture by (1) relaxing the requirement for all transfer connections to be input-to-hidden and output-to-output, (2) allowing deeper architectures for the source and target networks, and (3) including multiple source networks with adaptive connectivity to each. These extensions will promote reuse of subnetworks of varying depth, along with flexible positioning and combination of modules. However, for GRUSM-ESP, as networks become large and plentiful, maintaining full connectivity between layers will become intractable, and it will be necessary to enforcing sparsity. GRUSM-ESP can also be extended to include LSTM units, e.g., as by Schmidhuber et al. (2007), when deep memory is a primary concern. Conclusion This paper introduced an approach for general transfer learning using neural networks. The approach minimizes a priori assumptions of task relatedness and enables a flexible approach to adaptive learning across many domains. In a stochastic version of the Atari 2600 general video gameplaying platform, a specific implementation developed in this paper as GRUSM-ESP can boost learning by reusing neural structure across disparate domains. The success of transfer is shown to correlate with intuitive notions of domain complexity. These results indicate the potential for general neural reuse to predictably assist agents in increasingly complex environments. Acknowledgments We would like to thank Ruohan Zhang for useful feedback. This research was supported in part by NSF grant DBI-0939454, NIH grant R01-GM105042, and an NPSC fellowship sponsored by NSA. References Ammar, H. B.; Eaton, E.; Luna, J. M.; and Ruvolo, P. 2015a. Autonomous cross-domain knowledge transfer in lifelong policy gradient reinforcement learning. Proc. of IJCAI. Ammar, H. B.; Eaton, E.; Ruvolo, P.; and Taylor, M. E. 2015b. Unsupervised cross-domain transfer in policy gradient reinforcement learning via manifold alignment. Proc. of AAAI. Anderson, M. L. 2010. Neural reuse: A fundamental organizational principle of the brain. Behavioral and Brain Sciences 33:245โ€“266. Bellemare, M. G.; Naddaf, Y.; Veness, J.; and Bowling, M. 2013. The arcade learning environment: An evaluation platform for general agents. JAIR 47:253โ€“279. Braylan, A.; Hollenbeck, M.; Meyerson, E.; and Miikkulainen, R. 2015a. Frame skip is a powerful parameter for learning to play atari. Workshops at AAAI-15. Braylan, A.; Hollenbeck, M.; Meyerson, E.; and Miikkulainen, R. 2015b. On the cross-domain reusability of neural modules for general video game playing. IJCAI-15 GIGA Workshop. Brys, T.; Harutyunyan, A.; Taylor, M. E.; and Nowรฉ, A. 2015. Policy transfer using reward shaping. Proc. of AAMAS 181โ€“188. Gomez, F. J., and Miikkulainen, R. 1997. Incremental evolution of complex general behavior. Adaptive Behavior 5(3-4):317โ€“342. Gomez, F. J., and Miikkulainen, R. 1999. Solving non-markovian control tasks with neuroevolution. Proc. of IJCAI 1356โ€“1361. Gomez, F. J., and Schmidhuber, J. 2005. Co-evolving recurrent neurons learn deep memory pomdps. Proc. of GECCO 491โ€“498. Gomez, F. J. 2003. Robust non-linear control through neuroevolution. Technical report, UT Austin. Hausknecht, M., and Stone, P. 2015. The impact of determinism on learning atari 2600 games. Workshops at AAAI-15. Hausknecht, M.; Lehman, J.; Miikkulainen, R.; and Stone, P. 2013. A neuroevolution approach to general atari game playing. IEEE Trans. on Comp. Intelligence in AI in Games 6(4):355โ€“366. Khare, V. R.; Yao, X.; Sendhoff, B.; Jin, Y.; and Wersing, H. 2005. Co-evolutionary modular neural networks for automatic problem decomposition. Proc. of CEC 2691โ€“2698. Konidaris, G.; Scheidwasser, I.; and Barto, A. G. 2012. Transfer in reinforcement learning via shared features. JMLR 13(1):1333โ€“ 1371. Koutnรญk, J.; Schmidhuber, J.; and Gomez, F. J. 2014. Evolving deep unsupervised convolutional networks for vision-based reinforcement learning. Proc. of GECCO 541โ€“548. LukoลกevicฬŒius, M., and Jaeger, H. 2009. Reservoir computing approaches to recurrent neural network training. Computer Science Review 3(3):127โ€“149. Milo, R.; Shen-Orr, S.; Itzkovitz, S.; Kashtan, N.; Chklovskii, D.; and Alon, U. 2002. Network motifs: Simple building blocks of complex networks. Science 298(5594):824โ€“827. Mnih, V.; Kavukcuoglu, K.; Silver, D.; Rusu, A. A.; Veness, J.; Bellemare, M. G.; et al. 2015. Human-level control through deep reinforcement learning. Nature 518(7540):529โ€“533. Pan, S. J., and Yang, Q. 2010. A survey on transfer learning. IEEE Trans. on Knowledge and Data Engineering 22(10):1345โ€“1359. Perez, D.; Samothrakis, S.; Togelius, J.; Schaul, T.; et al. 2015. The 2014 general video game playing competition. IEEE Trans. on Comp. Intel. and AI in Games (99). Reisinger, J.; Stanley, K. O.; and Miikkulainen, R. 2004. Evolving reusable neural modules. Proc. of GECCO 69โ€“81. Schaul, T. 2013. A video game description language for modelbased or interactive learning. Proc. of CIG 1โ€“8. Schmidhuber, J.; Wierstra, D.; Gagliolo, M.; and Gomez, F. J. 2007. Training recurrent networks by evolino. Neural Computation 19(3):757โ€“779. Shultz, T. R., and Rivest, F. 2001. Knowledge-based cascadecorrelation: Using knowledge to speed learning. Connection Science 13(1):43โ€“72. Swarup, S., and Ray, S. R. 2006. Cross-domain knowledge transfer using structured representations. Proc. of AAAI 506โ€“511. Talvitie, E., and Singh, S. 2007. An experts algorithm for transfer learning. Proc. of IJCAI 1065โ€“1070. Taylor, M. E., and Stone, P. 2009. Transfer learning for reinforcement learning domains: A survey. JMLR 1633โ€“1685. Taylor, M. E.; Kuhlmann, G.; and Stone, P. 2008. Autonomous transfer for reinforcement learning. Proc. of AAMAS 283โ€“290. Taylor, M. E.; Whiteson, S.; and Stone, P. 2007. Transfer via intertask mappings in policy search reinforcement learning. Proc. of AAMAS 156โ€“163. Verbancsics, P., and Stanley, K. O. 2010. Evolving static representations for task transfer. JMLR 11:1737โ€“1769.
9cs.NE
arXiv:1705.04910v2 [math.GR] 23 Aug 2017 Discretization of SU(2) and the orthogonal group using icosahedral symmetries and the golden numbers Robert V. Moody & Jun Morita August 25, 2017 Department of Mathematics and Statistics, University of Victoria, Victoria, BC., V8W 3R4 Canada Department of Mathematics, University of Tsukuba, Tsukuba, Ibaraki, 305-8571, Japan. E-mail: [email protected], [email protected] Abstract The vertices of the four-dimensional 600-cell form a non-crystallographic root system whose corresponding symmetry group is the Coxeter group H4 . There are two special coordinate representations of this root system in which they and their corresponding Coxeter groups involve only rational numbers and the golden ratio ฯ„ . The two are related by the conjugation ฯ„ 7โ†’ ฯ„ 0 = โˆ’1/ฯ„ . This paper investigates what happens when the two root systems are combined and the group generated by both versions of H4 is allowed to operate on them. The result is a new, but infinite, โ€˜root systemโ€™ ฮฃ which itself turns out to have a natural structure of the unitary group SU (2, R) over the ring R = Z[ 21 , ฯ„ ] (called here golden numbers). Acting upon it is the naturally associated infinite reflection group H โˆž , which we prove is of index 2 in the orthogonal group O(4, R). The paper makes extensive use of the quaternions over R and leads to a highly structured discretized filtration of SU (2). We use this to offer a simple and effective way to approximate any element of SU (2) to any degree of accuracy required using the repeated actions of just five fixed reflections, a process that may find application in computational methods in quantum mechanics. Keywords: icosahedral symmetry, non-crystallographic root systems, infinite reflection groups, discretization of SU (2), golden numbers, quaternions 1 Introduction The symmetry group of the icosahedron (and the dodecahedron) is the icosahedral group, denoted H3 here, with 120 elements. It is a finite Coxeter group, that is to say, it is a finite group generated by reflections and Coxeter relations, and it is simply transitive on the simplicial cells into which the icosahedron is partitioned by the mirrors of the reflections in H3 . Apart from numerous dihedral groups, there are only two finite indecomposable non-crystallographic Coxeter groups: H3 and its big sister H4 , which is the symmetry group of the four-dimensional regular polytope called the 600-cell (and its dual, the 120-cell). This paper involves both these groups, but notably the latter. The 600-cell has 120 vertices and 600 three-dimensional faces, see Fig. 1. The 120 vertices form a root system, of type H4 . With this interpretation of the vertices as roots, the set of 60 reflections in these roots (opposite roots give the same reflection) is the entire set of reflections in the group 1 Figure 1: A two-dimensional projection of the 600-cell, whose vertices form a root system of type H4 . The dots make up the 120 vertices that constitute a root system of type H4 . H4 , and they generate it. The order of the group is |H4 | = 1202 = 14400. Notice that we use the symbol H4 both as an adjective signifying the type of root system involved and as a noun signifying the reflection group generated by the roots of that system.โˆšWe will do the same thing with H3 . 0 Both โˆš H3 and H4 involve the golden ratio ฯ„ = (1 + 5)/2 and its algebraic conjugate ฯ„ = (1 โˆ’ 5)/2 in all sorts of significant ways. For instance, there is the well-known model of the vertices of the 600-cell [5] ยง20 and ยง27, or equivalently the roots of the root system of type H4 , as the set of points ๏ฃฑ ๏ฃด ๏ฃฒ R[0,0] (ยฑ1, 0, 0, 0) and all its permutations: 8 roots in all; โˆ† = R[1,0] 12 (ยฑ1, ยฑ1, ยฑ1, ยฑ1): 16 roots in all; (1) ๏ฃด ๏ฃณ 1 0 R[1,1] 2 (0, ยฑ1, ยฑฯ„ , ยฑฯ„ ) and all its even permutations: 96 roots in all. Here the first component of the label refers to the power of 2 appearing in the denominators of the components and the second component is used to distinguish the rational versus irrational nature of (some of) the components. One cannot help noticing the interesting fact that only even permutations are allowed in the third type of root. Half of the potential permutations are missing. The other half can be obtained by conjugating these roots by interchanging ฯ„ and ฯ„ 0 throughout. Of course doing so produces another model โˆ†0 of the root system of type H4 , and the reflections in these generate a second model H40 of the Coxeter group H4 . We shall also use the notation H4 = W (โˆ†) and H40 = W (โˆ†0 ), that suggests the origin of these groups as reflection groups. 2 It is tempting to look at the group generated by the reflections of โˆ† โˆช โˆ†0 , but one quickly realizes that this group, letโ€™s call it H โˆž (or H โˆž [4]) is infinite.1 Since all the points of the set ฮฃ = ฮฃ[4] := H โˆž (โˆ† โˆช โˆ†0 ) (2) lie on the sphere of radius 1 in R4 , which is compact, ฮฃ is certainly not a discrete set. Up to now no one seems to have paid much attention to it. The objective of this paper is to get some idea of what ฮฃ and H โˆž look like. In fact they have some very attractive features, as we shall see. Not surprisingly ฮฃ is a dense set of points on the unit 3-sphere S in R4 , see Prop. 3.7. It is also a group under quaternion multiplication, and we shall show that it is an amalgamation of โˆ† and โˆ†0 , each of which is itself a group. Similarly H โˆž is an amalgamation of the two groups H4 and H40 . What is especially interesting is that using ฮฃ and H โˆž allows us to explicitly approximate elements of the two groups SU (2) and SO(3), the unitary and special orthogonal groups of C2 and R3 respectively, by elements with matrix coefficients of the form 1 2n Z[ฯ„ ] (we call them dyadic integers from the field Q[ฯ„ ]). In fact the matrices used all arise from the 96 reflections of โˆ† โˆช โˆ†0 which are the ones involving ฯ„ and ฯ„ 0 , and even from just 5 reflections if one gets down to the level of root system bases. The approximation can be made as fine as one wishes (with increasing powers of two in the denominators) and there is a simple and efficient algorithm for doing it. The key to all of this is to interpret R4 as the standard division ring of quaternions, and use the fact that its unit sphere can be identified with SU (2) and that it can be made to act as SO(3) on the three-dimensional subspace of pure imaginary quaternions (those which change their sign under quaternionic conjugation). The paper is primarily concerned with the H4 picture, but we also require information from the corresponding, and essentially parallel situation based on the three-dimensional icosahedral root system H3 and its corresponding conjugate system H30 . The arguments are not identical but sufficiently parallel that we provide only sketches of the arguments for the three-dimensional case. The paper is organized around understanding the structure of the root system ฮฃ and the group โˆž H that the reflections in its roots generate. The approximation results appear in the final section, though they can be read directly after ยง3. Icosahedral symmetry and the Coxeter groups H2 , H3 , H4 have continued to intrigue people from ancient times until the present day, where they are now familiar in such diverse places as carbon molecules, buckyballs, the capsids (outer shells) of viruses, Penrose tilings, and the aperiodic order of quasicrystals. There remains continuing interest in the mathematical world too, for instance, [6] which investigates the subgroup structure of H4 in a quaternionic context, and [3] which explores some of the ways of making affine extensions of the H4 root systems, following the success of affinization of the root systems of the simple Lie algebras. Affinization is accomplished by extending the Coxeter diagram, and might be thought of as based on using translations to extend root systems. In the present paper, although the root systems involved are defined intrinsically from the H3 and H4 root systems and the Galois conjugation ฯ„ 7โ†’ ฯ„ 0 , effectively the result is to extend by using contractions. Indeed this contractive aspect is something seems worthy of fuller study. We might note here that there have been considerable advances in the understanding of Coxeter groups along with their associated geometrical meanings by using the Clifford algebras, see [4] and its associated references. Although we have not used these ideas here, and indeed we require only a 1 Throughout the paper we will see parallel structures pertaining to the three-dimensional setting around H3 and the four-dimensional setting around H4 . Generally we use the same symbol for the corresponding objects, but if the context does not make it clear then we shall make the distinction as in H โˆž [3], H โˆž [4], ฮฃ[3], ฮฃ[4], S[3], S[4], etc. 3 very limited number of tools, the Clifford algebra approach may offer new insights into the setting we are introducing. 2 H4 The set โˆ† of roots of the root system of type H4 can be presented in the standard form of (1) as the union of three types of vectors in R4 . We let K = K0 โˆช K1 denote the set of roots of types R[0,0] ห™ for the set of roots of and R[1,0], which form a crystallographic root system of type D4 , and โˆ† type R[1,1]. Of course these distinctions are not intrinsic to the root system itself, but only to our coordinatization of it. However this distinction plays a fundamental role in what is to follow. Along with โˆ† we have its conjugate โˆ†0 which is the set of conjugates of โˆ†, and the corresponding ห™ 0 (it being irrelevant whether or not the dot operators are applied before or after sets K and โˆ† conjugation). K = โˆ† โˆฉ โˆ†0 . The reflections in the roots โˆ† generate the group we call H4 . It is a Coxeter group of type H4 . Similarly we have H40 generated by the reflections in the roots of โˆ†0 , also of type H4 . We are primarily interested in the group H โˆž which is generated by H4 and H40 together. The reflections given by K, the roots in common to both systems, generate a subgroup D of type D4 For example (1, 0, 0, 0), 1 (โˆ’1, โˆ’1, โˆ’1, ยฑ1), (0, 1, 0, 0), (0, 0, 1, 0), 2 (3) is a base (with either choice of the sign). We let S = S[4] denote the unit sphere in 4-space. Both โˆ† and โˆ†0 are in S, and so too is the set ฮฃ = ฮฃ[4] := H โˆž (โˆ† โˆช โˆ†0 ). It is the smallest subset containing โˆ† โˆช โˆ†0 and closed under its own reflections (i.e. if a โˆˆ ฮฃ and ra is the reflection in a then ra (ฮฃ) = ฮฃ). We note the important fact that 1 Z[ฯ„ ]4 โˆฉ S = โˆ† โˆช โˆ†0 . 2 (4) At the start we use only the algebraic consequences of reflections applied in the context of Z[ฯ„ ]4 and R4 , but later we will interpret everything in the real quaternions, where the elements that we are discussing can be interpreted as elements of SU(2). It is useful to keep in mind the basic facts about ฯ„ : ฯ„ + ฯ„ 0 = 1, ฯ„ ฯ„ 0 = โˆ’1, ฯ„ 2 = ฯ„ + 1, ฯ„ 02 = ฯ„ 0 + 1 . (5) The quotient ring F4 := Z[ฯ„ ]/2Z[ฯ„ ] is the Galois field of 4 elements. Let a 7โ†’ a denote the natural homomorphism of Z[ฯ„ ] โˆ’โ†’ F4 . The elements of F4 are 0, 1, ฯ„ , ฯ„ 0 . We extend the meaning of the map ยท to its component-wise version Z[ฯ„ ]4 โˆ’โ†’ F44 . Inside the F4 -vector space F44 , define A to be the subspace spanned by the elements of 2โˆ† taken modulo 2Z[ฯ„ ]4 , i.e., 2โˆ†. This is a 2-dimensional space with basis (1, 1, 1, 1) and (0, 1, ฯ„ 0 , ฯ„ ). We define ห™ Note the cardinalities: card (A) = 16, card (AฬŠ) = 15, and card (Aฬ‡) = 12. AฬŠ := A\{0} and Aฬ‡ := 2โˆ†. ห™ 0 . As we have already Similarly we have A0 using 2โˆ†0 and the corresponding subset Aฬ‡0 = 2โˆ† mentioned, and this sentence suggests, and will be true throughout, everything we say will come in two versions, which are interchanged by conjugation. Henceforth we will usually only state and give proofs for one of the versions, understanding that the other will be equally true. 4 5 1 5 Figure 2: This is the Coxeter diagram for the pairwise relationships between the reflection generators of H โˆž [4]. The bonds between any two nodes indicate the orders of the product of the reflections corresponding to them, with the convention that unmarked bonds indicate order 3 and bonds between commuting reflections are omitted completely. The proof establishing the bond marked with โˆž is found in Cor. 3.6. We shall see that in fact H โˆž [4] is a proper factor of the Coxeter group of this diagram. The corresponding Coxeter diagram for the relationships between the generators of H โˆž [3] is obtained by deleting the first node and its attached bond. With the obvious dot product on F4 we find that A is totally isotropic. This is just another way ห™ 2ฮฑ.2ฮฒ โˆˆ 2Z[ฯ„ ]. In addition, if ฮฑ and ฮฒ are linearly dependent, of saying that for all ฮฑ, ฮฒ โˆˆ K1 โˆช โˆ†, then 2ฮฑ.2ฮฒ โˆˆ 4Z[ฯ„ ]. This simply follows from (0, 1, ฯ„ 0 , ฯ„ ).(0, 1, ฯ„ 0 , ฯ„ ) = 4 = (1, 1, 1, 1).(1, 1, 1, 1). We have parallel statements for A0 and Aฬ‡0 . However, for any a โˆˆ Aฬ‡ and b โˆˆ Aฬ‡0 we always have a.b 6= 0. Proposition 2.1. (i) A.A = 0. In particular, for all x, y โˆˆ โˆ†, 2x.y โˆˆ Z[ฯ„ ]; ห™ and y โˆˆ โˆ† ห™ 0 then 2x.y โˆˆ (ii) for all a โˆˆ Aฬ‡ and b โˆˆ Aฬ‡0 , a.b 6= 0. In particular if x โˆˆ โˆ† / Z[ฯ„ ]. 3 H โˆž as a reflection group The set of vectors 1 1 1 {a1 , a2 , a3 , a4 , a5 } = {(1, 0, 0, 0), โˆ’ (1, 1, 1, 1), (0, 0, 1, 0), (0, โˆ’1, ฯ„ 0 , ฯ„ ), (0, 1, โˆ’ฯ„, โˆ’ฯ„ 0 )} (6) 2 2 2 define reflections that correspond to the Coxeter diagram of Fig. 2 and these reflections generate H โˆž = H โˆž [4]. Indeed they contain a set of generators for both of the Coxeter groups H4 and H40 . The associated Gram matrix with entries ai .aj is positive semidefinite with null vector (3 โˆ’ ฯ„, 6 โˆ’ 2ฯ„, 9 โˆ’ 3ฯ„, โˆ’6 + 4ฯ„, 2ฯ„ ). Certainly H โˆž is a factor of the corresponding Coxeter group, and later on we shall see that it is a proper factor, see Prop. 8.1. Proposition 3.1. If x = (x1 , x2 , x3 , x4 ) โˆˆ Z[ฯ„ ]4 satisfies x21 + x22 + x23 + x24 โ‰ก 0 mod 4Z[ฯ„ ] then one of the three following cases prevails: ๏ฃฑ ๏ฃด ๏ฃฒall the xi are congruent to 0 modulo 2Z[ฯ„ ], all the xi are congruent modulo 2Z[ฯ„ ] to each other, but not to 0, ๏ฃด ๏ฃณ (x1 , x2 , x3 , x4 ) is congruent modulo 2Z[ฯ„ ]4 to a permutation of the components of (0, 1, ฯ„ 0 , ฯ„ ). (7) 5 In the language and notation introduced above, these three cases correspond to ๏ฃฑ ๏ฃด ๏ฃฒx = (0, 0, 0, 0) x โˆˆ AฬŠ\(Aฬ‡ โˆช Aฬ‡0 ) = AฬŠ0 \(Aฬ‡ โˆช Aฬ‡0 ) ๏ฃด ๏ฃณ x โˆˆ Aฬ‡ or x โˆˆ Aฬ‡0 . (8) Proof: Modulo 2Z[ฯ„ ] each xi โ‰ก 0, 1, ฯ„ 0 , ฯ„ . Their squares are {0, 1, 1 + ฯ„ 0 , 1 + ฯ„ } modulo 4Z[ฯ„ ]. A quick check shows that the sum of four such elements can be zero modulo 4Z[ฯ„ ] if and only if one of the three conditions of the thesis is true. Examples of all three types occur when we double each of the roots, i.e. when we look at 2(โˆ† โˆช โˆ†0 ). Corollary 3.2. The three-dimensional version of Prop. 3.1 reads: if x = (x1 , x2 , x3 ) โˆˆ Z[ฯ„ ]3 satisfies x21 + x22 + x23 โ‰ก 0 mod 4Z[ฯ„ ] then one of the two following cases prevails: ( all the xi are congruent to 0 modulo 2Z[ฯ„ ], (x1 , x2 , x3 ) is congruent modulo 2Z[ฯ„ ]3 to a permutation of the components of (1, ฯ„ 0 , ฯ„ ). (9) For n = 1, 2, 3 . . . define the spherical sets   1 Sn := x โˆˆ n Z[ฯ„ ]4 : x โˆˆ S, and 2n x โˆˆ AฬŠ , 2 and  Sฬ‡n :=  1 4 n x โˆˆ n Z[ฯ„ ] : x โˆˆ S, and 2 x โˆˆ Aฬ‡ ; 2 and similarly the conjugated versions using A0 . We call n here the level of the spherical set. We define Kn = Kn0 := Sn โˆฉ Sn0 , so Sn = Sฬ‡n โˆช Kn , and similarly Sn0 = Sฬ‡n0 โˆช Kn . To these we add S0 = S00 := K0 , the set of roots of type R[0,0]. Here are two consequences of Prop. 3.1: ห™ and Sฬ‡1 = โˆ†. ห™ Proposition 3.3. S1 = K1 โˆช โˆ†, Proof: Let y โˆˆ S1 . Then 2y โˆˆ AฬŠ and 2y = (y1 , y2 , y3 , y4 ) โˆˆ Z[ฯ„ ]4 satisfies y12 + y22 + y32 + y42 = 4. Using Prop. 3.1, one can hunt through all solutions to see that only elements of โˆ† โˆช โˆ†0 can satisfy ห™ this, and then restrict to Aฬ‡ filter them out to โˆ†. 6 Proposition 3.4. For n โ‰ฅ 1, [ 1 0 4 (Sm โˆช Sm ). Z[ฯ„ ] โˆฉ S = 2n mโ‰คn Furthermore, x โˆˆ 1 4 2n Z[ฯ„ ] โˆฉ S is in Sn โˆช Sn0 if and only if 2n x 6= {0, 0, 0, 0}. Proof: Let x โˆˆ 21n Z[ฯ„ ]4 โˆฉ S, and let m โ‰ค n be minimal so that 2m x โˆˆ Z[ฯ„ ]4 . If m = 0 then x โˆˆ K0 . 0 . If m โ‰ฅ 1 then 2m x.2m x = 4m and by Prop. 3.1, 2m x โˆˆ AฬŠ โˆช AฬŠ0 , see (8), from which x โˆˆ Sm โˆช Sm The reverse inclusion comes from the definitions, and the last line is clear. ห™ 0 , rฮฑ0 Sฬ‡n โŠ‚ Sฬ‡ 0 . Proposition 3.5. For all ฮฑ0 โˆˆ โˆ† n+1 Proof: Let x โˆˆ Sฬ‡n , so by definition 2n x โˆˆ Z[ฯ„ ]4 and 2n x โˆˆ Aฬ‡. We have 2n rฮฑ0 x = 2n x โˆ’ (2n x.2ฮฑ0 )ฮฑ0 . The elements 2n x and 2ฮฑ0 are in Aฬ‡ and Aฬ‡0 respectively, so in all cases (2n x.2ฮฑ0 ) 6= 0. Since ฮฑ0 is not in Z[ฯ„ ]4 , but only in (1/2)Z[ฯ„ ]4 , 2n rฮฑ0 x = 2n x โˆ’ (2n x.2ฮฑ0 )ฮฑ0 โˆˆ / Z[ฯ„ ]4 . However 2n+1 rฮฑ0 x = n+1 n 0 0 4 0 2 x โˆ’ (2 x.2ฮฑ )2ฮฑ โˆˆ Z[ฯ„ ] and furthermore 2n+1 rฮฑ0 x = (2n x.2ฮฑ0 )2ฮฑ0 โˆˆ Aฬ‡0 . Thus rฮฑ0 (x) โˆˆ Sฬ‡n+1 , which is what we wished to prove. ห™ and for all ฮฒ 0 โˆˆ โˆ† ห™ 0 , rฮฑ rฮฒ 0 has infinite order. Corollary 3.6. For all ฮฑ โˆˆ โˆ† Proof: Let x โˆˆ Sฬ‡1 . Then rฮฒ 0 x โˆˆ Sฬ‡20 , rฮฑ rฮฒ 0 x โˆˆ Sฬ‡3 , rฮฒ 0 rฮฑ rฮฒ 0 x โˆˆ Sฬ‡4 and so on. โˆž [4] denote the commutator subgroup of H โˆž [4]. Let H+ Proposition 3.7. โˆž [4] is dense in SO(4); (i) H+ (ii) H โˆž [4] is dense in O(4); (iii) ฮฃ[4] is dense in S[4]. ห™ and ฮฒ 0 := a5 = (1/2)(0, 1, โˆ’ฯ„, โˆ’ฯ„ 0 ) โˆˆ โˆ† ห™ 0 , rฮฑ rฮฒ 0 is a Proof: With ฮฑ := a4 = (1/2)(0, โˆ’1, ฯ„ 0 , ฯ„ ) โˆˆ โˆ† 1 rotation in the plane P orthogonal to the two roots (1, 0, 0, 0) and 2 (1, 1, 1, 1), and by Cor. 3.6 it โˆž [4] be the infinite cyclic group generated by (r r 0 )2 = r r 0 r r 0 โˆˆ has infinite order. Let G1 โŠ‚ H+ ฮฑ ฮฒ ฮฑ ฮฒ ฮฑ ฮฒ โˆž H+ [4]. The orbit of ฮฑ under G1 generated is infinite and hence is dense on the circle on the sphere S โˆฉ P . In particular G1 has rotations through angles as small as we please. ห™ 0 , so rฮฑ rฮณ 0 is a rotation of infinite order in a Now also ฮณ 0 := ra3 (a5 ) = (1/2)(0, 1, ฯ„, โˆ’ฯ„ 0 ) โˆˆ โˆ† โˆž [4] with arbitrarily small different plane orthogonal to (1, 0, 0, 0) and we get a second group G2 โŠ‚ H+ โˆž [4] that is a dense subgroup of the group of rotations. These two groups generate a subgroup of H+ โˆž SO(3)1 of rotations of (0, R, R, R). Since H+ [4] can certainly map (0, R, R, R) to (R, R, R, 0), we see that it also contains a subgroup that is a dense subgroup of the SO(3)4 of rotations of this space. โˆž [4] contains a Since SO(3)1 and SO(3)4 generate the entire rotation group SO(4), we see that H+ dense subgroup of this space. Now (i),(ii),(iii) are all clear. Proposition 3.8. Let n โ‰ฅ 2. Then ห™ rฮฑ (Sn ) โŠ‚ Sn โˆช Sฬ‡ 0 ; (i) for all ฮฑ โˆˆ โˆ†, nโˆ’1 7 ห™ and for each x โˆˆ Sn \Sฬ‡n there exists ฮฑ โˆˆ โˆ† ห™ for which rฮฑ (x) โˆˆ Sฬ‡n ; (ii) rฮฑ (Sn \Sฬ‡n ) โŠ‚ Sn for all ฮฑ โˆˆ โˆ†, ห™ for which rฮฑ x โˆˆ Sฬ‡ 0 . (iii) for each x โˆˆ Sฬ‡n there are three reflections of the form rฮฑ where ฮฑ โˆˆ โˆ†, nโˆ’1 ห™ Proof: (i). We start with the slightly weaker assumption that n โ‰ฅ 1. Let x โˆˆ Sn and ฮฑ โˆˆ โˆ†. 2n rฮฑ x = 2n x โˆ’ (2n x.2ฮฑ)ฮฑ . (10) Let 2n x = b โˆˆ AฬŠ. Since 2n x and 2ฮฑ are elements of A, (2n x.2ฮฑ) โˆˆ 2Z[ฯ„ ]4 . Let (2n x.2ฮฑ)ฮฑ = a โˆˆ A. As long as a 6= b, 2n rฮฑ x = b โˆ’ a โˆˆ AฬŠ, so rฮฑ x โˆˆ Sn . If a = b then 2n rฮฑ x โˆˆ 2Z[ฯ„ ]4 , so 2nโˆ’1 rฮฑ x โˆˆ Z[ฯ„ ]4 . 0 for some m < n. By Prop. 3.4, rฮฑ x is either in Sm or Sm Now whatever the case is, if n โ‰ฅ 1 then we have shown that rฮฑ (x) is either in Sn or in some Sm 0 for m < n. Now assume that n โ‰ฅ 2. Then if m < n it is not possible that r (x) โˆˆ S , for or Sm ฮฑ m either m โ‰ฅ 1 in which case by the same reasoning, x = rฮฑ rฮฑ (x) is on some sphere of level at most 0 , m, contrary to x โˆˆ Sn , or m = 0 in which case rฮฑ rฮฑ (x) has level 1. In the case that rฮฑ (x) โˆˆ Sm 0 0 0 then noting Prop. 3.5 we see that actually rฮฑ (x) โˆˆ Snโˆ’1 . But in fact rฮฑ (x) cannot be in Snโˆ’1 \Sฬ‡nโˆ’1 , since these elements do not change level under the application of rฮฑ and so x = rฮฑ rฮฑ (x) would be 0 impossible. Thus rฮฑ (x) โˆˆ Sฬ‡nโˆ’1 This proves part (i). This last case, where the level drops under reflection, is particularly interesting and we wish to look more carefully how it can happen in (iii) below. ห™ In the notation of part (i) above, if x โˆˆ Sn \Sฬ‡n then b := 2n x โˆˆ Fร— (1, 1, 1, 1). (ii). Let ฮฑ โˆˆ โˆ†. 4 Now if a := (2n x.2ฮฑ)ฮฑ 6= 0 then a โˆˆ Aฬ‡, and then also bโˆ’a โˆˆ Aฬ‡ and the resulting rฮฑ x โˆˆ Sฬ‡n . However, ห™ if a = 0 then b โˆ’ a = b and rฮฑ (x) remains in โˆˆ Sn \Sฬ‡n . We need to show that we can choose ฮฑ โˆˆ โˆ† for which the corresponding a 6= 0. For definiteness (the other cases work the same way) we assume that b = (1, 1, 1, 1) and write n 2 x = b + 2v, where v = (v1 , v2 , v3 , v4 ) โˆˆ Z[ฯ„ ]. We begin with ฮฑ = 21 (0, 1, ฯ„ 0 , ฯ„ ), though ultimately we will cycle its last three components around. Then the question is what does it mean for a = (2n x.2ฮฑ)ฮฑ = 0 (11) to hold, or quivalently, what does it mean for 2n x.2ฮฑ = 2 + 2v.2ฮฑ โ‰ก 0 mod 4Z[ฯ„ ]? The latter is equivalent to 1 + v.2ฮฑ โ‰ก 0 mod 2Z[ฯ„ ], or finally v2 + ฯ„ 0 v3 + ฯ„ v4 = 1 . This may happen, but if we cycle the last three terms of ฮฑ around then we get the same equation but with the coefficients v2 , v3 , v4 likewise cycled around. Adding all three of the equations together and using the fact that 1 + ฯ„ 0 + ฯ„ = 0 we get the contradiction 0 = 1. Thus, for at least one of these three possibilities for ฮฑ, equation (11) fails, and this version of ฮฑ produces rฮฑ (x) โˆˆ Sฬ‡n . (iii). Suppose that x โˆˆ Sฬ‡n and let ฮฑ โˆˆ Aฬ‡. What is required to have 2n rฮฑ x = 0 ? To see what happens here, it is easiest to fix one particular form that 2n x can take, and we choose (0, 1, ฯ„ 0 , ฯ„ ). All other forms are even permutations of this, and as will be seen, there is no loss in generality in ห™ 2ฮฑ is some even permutation of (0, 1, ฯ„ 0 , ฯ„ ). Referring to assuming this form. Now for any ฮฑ โˆˆ โˆ†, (10), the question becomes, how can (2n x.2ฮฑ)ฮฑ = a = (0, 1, ฯ„ 0 , ฯ„ ) ? Looking at the 0 in the first coordinate of 2n x, it is clear that ฮฑ must be one of the elements, (0, ยฑ1, ยฑฯ„ 0 , ยฑฯ„ ), (0, ยฑฯ„ 0 , ยฑฯ„, ยฑ1), or (0, ยฑฯ„, ยฑ1, ยฑฯ„ 0 ). Since an overall sign change in ฮฑ makes no difference to the reflection defined by ฮฑ nor to the equation we are trying to solve, we can replace the ยฑฯ„ 0 in each of these by simply ฯ„ 0 . Doing this we find there is exactly one solution in each of the three sets. 8 For instance, taking the second type we have (2n x.2ฮฑ)ฮฑ = ๏ฃฑ mod 2 ๏ฃด ๏ฃด 0(0, ฯ„ 0 , ฯ„, 1) โˆ’โ†’ (0, 0, 0, 0) ๏ฃด ๏ฃด ๏ฃด mod 2 ๏ฃฒ1(0, ฯ„ 0 , โˆ’ฯ„, 1) โˆ’โ†’ (0, ฯ„ 0 , ฯ„ , 1)  1 (0, 1, ฯ„ 0 , ฯ„ ).(0, ฯ„ 0 , uฯ„, v1) (0, ฯ„ 0 , uฯ„, v1) = mod 2 ๏ฃด 2 โˆ’ฯ„ (0, ฯ„ 0 , ฯ„, โˆ’1) โˆ’โ†’ (0, 1, ฯ„ 0 , ฯ„ ) ๏ฃด ๏ฃด ๏ฃด ๏ฃด mod 2 ๏ฃณฯ„ 0 (0, ฯ„ 0 , โˆ’ฯ„, โˆ’1) โˆ’โ†’ (0, ฯ„ , 1, ฯ„ 0 ) (12) as u, v go through the various possibilities of sign, so u = 1, v = โˆ’1 gives the value we are looking for. In fact the other two solutions are just obtained by cyclically permuting the last three coordinates, so the solutions in this case are (0, ฯ„ 0 , ฯ„, โˆ’1), (0, ฯ„, โˆ’1, ฯ„ 0 ), (0, โˆ’1, ฯ„ 0 , ฯ„ ) . (13) The three solutions, and only these three, produce the desired effect that 2n rฮฑ (x) โˆˆ 2Z[ฯ„ ]4 , and 0 as a consequence, as we saw above, rฮฑ (x) โˆˆ Sฬ‡nโˆ’1 . This concludes the proof of part (iii). It is worthwhile noting that the three vectors we have found in (13) are all in the plane orthogonal to the roots (1, 0, 0, 0) and 21 (1, 1, 1, 1) and they lie at angles of 2ฯ€/3 to each other. Let   โˆž [ 1 a + bฯ„ 1 R := Z[ฯ„ ] = : a, b โˆˆ Z, n โˆˆ Zโ‰ฅ0 = Z[ , ฯ„ ] . n n 2 2 2 (14) n=0 This is a ring which we shall call the ring of dyadic golden numbers. Proposition 3.9. ฮฃ[4] = H โˆž (โˆ† โˆž [ (Sn โˆช Sn0 ) = S[4] โˆฉ R4 . n=0 โˆช โˆ†0 ). Proof: By definition (2), ฮฃ = Let ฮฃn := Sn โˆช Sn0 for all n = 0, 1, 2, . . . . We have 0 ฮฃ0 โˆช ฮฃ1 = โˆ† โˆช โˆ† โŠ‚ ฮฃ. Now proceed by induction and assume that we have shown that ฮฃn โŠ‚ ฮฃ. 0 Then from Prop. 3.5 and Prop. 3.8(iii), Sฬ‡n+1 โˆช Sฬ‡n+1 โŠ‚ ฮฃ. By Prop. 3.8(ii) we see that all of ฮฃn+1 โŠ‚ ฮฃ. Thus โˆž [ (Sn โˆช Sn0 ) โŠ‚ ฮฃ . n=0 However Prop. 3.5 and Prop. 3.8 show that the left-hand side here is closed under the action of ห™ โˆชโˆ† ห™ 0 , and these reflections generate all of H โˆž . This gives the reverse the reflections in the roots โˆ† inclusion. For the final equality see Prop. 3.4. Proposition 3.10. For all n โ‰ฅ 1, card (Sฬ‡n ) = card (Sฬ‡n0 ) = 3.(2)4n+1 . ห™ and similarly for Sฬ‡ 0 . Now proceed by induction. We Proof: Sฬ‡1 consists of the 96 roots of โˆ†, 1 ห™ 0 that will simply have to note that for each element of Sฬ‡n there are 48 reflections arising from โˆ† map it into 48 images in Sฬ‡n+1 , see Prop. 3.5. However, according to Prop. 3.8(c) each of these ห™ 0 . Thus elements will be produced exactly three times as we use all the reflections available from โˆ† 0 card Sฬ‡n+1 = 16 card Sฬ‡n , and likewise for card Sฬ‡n+1 . This completes the induction step. The consequence of Prop. 3.8 and Prop. 3.5 is that to go deeper into the structure of ฮฃ we ห™ and โˆ† ห™ 0 . It is this path that leads to finer and finer need to apply reflections alternately from โˆ† discretization of the unitary group. The situation that we have just described is pictorially represented in Fig. 3. 9 Sฬ‡n+1 Kn+1 ห™0 1 0 Sฬ‡n0 ห™ ห™0 Sฬ‡n 0 ห™ Kn Sฬ‡n 0 Sฬ‡n+1 Kn 1 Sฬ‡n0 1 0 Figure 3: The action of reflections from different types of roots is indicated diagramatically. The intersection Sn โˆฉ Sn0 =: Kn is the common โ€˜crystallographicโ€™ part of the two spherical sets. The lateral actions of โˆ† apply to Sn but not to Sn0 , and similarly with โˆ†0 . 4 H3 The four-dimensional theory that we have outlined so far has a parallel version in three dimensions around the Coxeter group H3 . Most of the features that we have described in the four-dimensional case appear again here, but now notationally distinguished with the additional suffix โ€˜[3]โ€™. When we are dealing with both settings together, we shall also use the suffix โ€˜[4]โ€™ for the four-dimensional situation in order to avoid confusion. The unit sphere in (1/2)Z[ฯ„ ]3 consists of 54 points, namely the 6 vectors (ยฑ1, 0, 0) and all permutations of its coordinates, and the 48 points (1/2)(ยฑ1, ยฑฯ„ 0 , ยฑฯ„ ) and all permutations of these coordinates. If in the second set of points we restrict them by allowing only even (= cyclic) permutations then they provide 24 points which together with the original 6, produce a set of 30 points which may be viewed as the non-crystallographic root system โˆ†[3] of type H3 . They are the vertices of the icosadodecahedron. The reflection group generated by the 15 distinct reflections in these points, now called roots, that is the reflections in the mirrors (planes) through the origin orthogonal to these roots, is the icosahedral group H3 of order 120. As a base for the root system of type H3 we can use the vectors (1/2)(1, ฯ„ 0 , ฯ„ ), (1/2)(1, โˆ’ฯ„ 0 , โˆ’ฯ„ ), (1/2)(ฯ„ 0 , ฯ„, 1). Instead of the even permutations of (1/2)(ยฑ1, ยฑฯ„ 0 , ยฑฯ„ ) we can conjugate them, thus taking only all the even permutations of (1/2)(ยฑ1, ยฑฯ„, ยฑฯ„ 0 ) (or equivalently we take all the odd permutations) and do the same thing. We then end up with โˆ†[3]0 , the set of conjugates of the elements of โˆ†[3]. Again we have a root system of type H3 and again the reflections in these roots generates a copy of the icosahedral group. ห™ ห™ 0. We write โˆ†[3] for the non-rational roots of โˆ†[3], and similarly for โˆ†[3] Let H โˆž [3] denote the group generated by the reflections in โˆ†[3] โˆช โˆ†[3]0 and let ฮฃ[3] be the orbit 10 of โˆ†[3] โˆช โˆ†[3]0 under H โˆž [3]. We shall see that ฮฃ[3] is a dense set of points on the unit 2-sphere S[3]. We put this into the 4-dimensional setting in which we have discussed H4 by considering the 3-dimensional space here as the subspace V := (0, R, R, R). Then it is clear that โˆ†[3] = โˆ†[4] โˆฉ V and โˆ†[3]0 = โˆ†[4]0 โˆฉ V , and indeed all of ฮฃ[3], lies in V โˆฉ ฮฃ[4]. In fact we shall see that ฮฃ[3] = V โˆฉ ฮฃ[4]. Later on we shall put everything into the setting of the algebra of quaternions H, at which point V will be come the subspace of pure quaternions. As before, let F4 := Z[ฯ„ ]/2Z[ฯ„ ] and let x 7โ†’ x denote the natural homomorphism of Z[ฯ„ ] โˆ’โ†’ F4 . In place of F44 we will now wish to use F34 . It is often convenient to identify this with the subspace (0, F4 , F4 , F4 ) of F44 , and we will do this when it is useful to do so. Using this we define the analogues of A[4] and A[4]0 , namely A[3] := A[4] โˆฉ V , A[3]0 := A[4]0 โˆฉ V (15) which will play the same role as A and A0 in the four-dimensional case. Written as elements of F34 A[3] = {(0, 0, 0), (1, ฯ„ 0 , ฯ„ ), (ฯ„ 0 , ฯ„ , 1), (ฯ„ , 1, ฯ„ 0 )} , and similarly for A[3]0 . Define Aฬ‡[3] := Aฬ‡[4] โˆฉ V = AฬŠ[4] โˆฉ V , and similarly Aฬ‡[3]0 . The dot product on F34 is defined by u.v = u.v for all u, v โˆˆ Z[ฯ„ ]3 , which matches the dot product it has as a subspace of F44 . From Prop. 2.1 we have: Proposition 4.1. (i) A[3].A[3] = 0. In particular, for all ฮฑ, ฮฒ โˆˆ โˆ†[3], 2ฮฑ.ฮฒ โˆˆ Z[ฯ„ ]; ห™ ห™ 0 then 2ฮฑ.ฮฒ โˆˆ (ii) for all a โˆˆ Aฬ‡[3] and b โˆˆ Aฬ‡0 [3], a.b 6= 0. In particular if ฮฑ โˆˆ โˆ†[3] and ฮฒ โˆˆ โˆ†[3] / Z[ฯ„ ]. We now obtain very similar results to those of ยง3. We mainly just list these, the proofs being basically the same. However, there is one significant difference that appears immediatelyโ€”there are no longer two spherical sets to deal with. For n โ‰ฅ 1, we define   1 Sn [3] := x โˆˆ n Z[ฯ„ ]3 : x โˆˆ S[3], and 2n x โˆˆ Aฬ‡[3] , 2 and similarly Sn [3]0 using A0 . We call n here the level of the spherical set. The sets Kn and Kn0 have no relevant counterparts if n > 0 since Sn [3] โˆฉ Sn [3]0 = โˆ… . To these we add K0 [3] := S0 [3] = S0 [3]0 = {ยฑ1, 0, 0), (0, ยฑ1, 0), (0, 0, ยฑ1)} . It is clear that S[3] = S[4] โˆฉ V and Sn [3] = Sn [4] โˆฉ V , and parallel statements for S 0 . As a consequence of Cor. 3.2: Proposition 4.2. 11 ห™ (i) S1 [3] = โˆ†[3]; (ii) for all n โ‰ฅ 0, [ 1 0 3 (Sm [3] โˆช Sm [3]) . Z[ฯ„ ] โˆฉ S[3] = 2n mโ‰คn Furthermore, x โˆˆ 1 3 2n Z[ฯ„ ] โˆฉ S[3] is in Sn [3] โˆช Sn0 [3] if and only if 2n x 6= {0, 0, 0}. For each ฮฑ โˆˆ โˆ†[3], we also have ฮฑ โˆˆ โˆ†[4] and the reflection in ฮฑ taken in V is just the restriction of the reflection rฮฑ taken in R4 restricted to V . We use the same symbol rฮฑ for both, with context distinguishing them if necessary. Corresponding primed notation will be used for โˆ†[3]0 . H3 , H30 denote the groups generated by the reflections of โˆ†[3] and โˆ†[3]0 respectively. We may think of these groups as subgroups of H4 and H40 . From Prop. 3.5 we have ห™ 0 , rฮฑ0 Sn [3] โŠ‚ S 0 [3]. Proposition 4.3. For all ฮฑ0 โˆˆ โˆ†[3] n+1 ห™ ห™ 0 , rฮฑ rฮฒ 0 has infinite order. Corollary 4.4. For all ฮฑ โˆˆ โˆ†[3] and for all ฮฒ 0 โˆˆ โˆ†[3] Following the arguments of Prop. 3.7 we have Proposition 4.5. โˆž [3] is dense in SO(3); (i) H+ (ii) H โˆž [3] is dense in O(3); (iii) ฮฃ[3] is dense in S[3]. Define VR := V โˆฉ R4 . It is now rather easy to use the four-dimensional results of ยง3 to deduce corresponding results about the three-dimensional situation. We state these without further comment. Proposition 4.6. ฮฃ[3] = โˆž [ (Sn [3] โˆช Sn0 [3]) = S[3] โˆฉ VR = S[4] โˆฉ VR = ฮฃ[4] โˆฉ VR = ฮฃ[4] โˆฉ V . n=0 Proposition 4.7. For all n โ‰ฅ 1, card (Sn [3]) = card (Sn0 [3]) = 3.(2)2n+1 . Proof: S1 [3] consists of the 24 roots of โˆ†[3], and similarly for S10 [3]. Now proceed by induction. We simply have to note that for each element of Sn [3] there are 12 reflections arising from โˆ†[3]0 that will map it into 12 images in Sn+1 [3], see Prop. 3.5. However, according to Prop. 3.8(iii) (which is actually set up so as to make the corresponding three dimensional case rather apparent) each of these elements will be produced exactly three times as we use all the reflections available from 0 โˆ†[3]0 . Thus card Sn+1 [3] = 4 card Sn [3], and likewise for card Sn+1 [3]. This completes the induction step. 12 5 How ฮฃ[4] acts on ฮฃ[3] Proposition 5.1. (i) H โˆž [4] acts transitively on ฮฃ[4] ; (ii) H โˆž [3] acts transitively on ฮฃ[3] ; (iii) For each ฮฑ โˆˆ ฮฃ[4] the set of roots (elements of ฮฃ[4]) orthogonal to ฮฑ is a translate of ฮฃ[3] by an element of H โˆž [4] ; (iv) For each ฮฑ โˆˆ ฮฃ[4] the stabilizer of ฮฑ in H โˆž [4] contains a subgroup conjugate to H โˆž [3]. Proof: (i) It suffices to show that H โˆž [4](1, 0, 0, 0) contains the basic roots of (6). This happens because in the Coxeter diagram of Fig. 2, (1, 0, 0, 0) is connected to the four others by chains of bonds that are all odd (namely labelled with 3 or 5). The argument is easily explained by doing it for the case of a bond labelled 3 between two roots ฮฑ, ฮฒ. Then rฮฑ rฮฒ rฮฑ rฮฒ rฮฑ = rฮฒ . But the left side is also rrฮฑ rฮฒ (ฮฑ) , showing that rฮฑ rฮฒ (ฮฑ) = ยฑฮฒ. If the sign is wrong we can use one more reflection rฮฒ . The proof of (ii) is similar. (iii) The stabilizing reflections ra of (1, 0, 0, 0), where a โˆˆ ฮฃ[4], consists of all elements of ฮฃ[4] โˆฉ V = ฮฃ[3], see Prop. 4.6. Parts (iii) and (iv) follow directly from this. Instead of thinking of โˆ†[4] and โˆ†[4]0 simply as subsets of R4 , we can view them as subsets of the quaternion algebra H = R1 + Ri + Rj + Rk. We will identify the subspace V of R4 that we have been using with the subspace of pure quaternions: V = Ri + Rj + Rk. Then โˆ†[3] = โˆ†[4] โˆฉ V โŠ‚ H and similarly for โˆ†[3]0 . Generally we use this interpretation henceforth. We equip H with the usual conjugation u 7โ†’ u e which changes the signs of the last three compo2 nents of each vector. The usual dot product of R4 is the standard one for H, and can be expressed in terms of the quaternionic multiplication by 1 x.y = (xe y + ye x) . 2 As is well known, the unit sphere S of H, that is the set of vectors a โˆˆ H satisfying e aa = 1, can be identified with SU (2). Explicitly S can be interpreted as the group SU (2) by the usual matrix representation of H using       โˆš โˆš  1 0 โˆ’1 0 0 1 โˆ’1 0 โˆš 1โ‡” , iโ‡” , jโ‡” , kโ‡” โˆš . (16) 0 โˆ’ โˆ’1 โˆ’1 0 โˆ’1 0 0 1 Returning to the ring (14), we define SU (2, R) to be the set of all unitary matrices with coefficients in R + iR. Using (16), SU (2, R) identifies with the set of all quaternions with coefficients in R with norm 1, i.e. with R4 โˆฉ S[4]. SU (2, R) is a subgroup of SU (2), and it is S[4] โˆฉ R4 = ฮฃ[4] by Prop. 3.9. This tells us that ฮฃ[4] has the natural structure of a group, namely SU (2, R). Furthermore, since ฮฃ[4] is dense in S[4], SU (2, R) is dense in SU (2). We recall that for any a โˆˆ S and any x โˆˆ H we have ra (x) = x โˆ’ (2x.a)a = x โˆ’ (xaฬƒ + axฬƒ)a = โˆ’axฬƒa . 2 Usually the conjugation is designated by the , but that would cause confusion with our earlier notation. 13 (17) In particular this shows that reflection can be effected by multiplication. Since ฮฃ[4] is by definition the smallest set containing โˆ†โˆชโˆ†0 and closed under its own reflections, it follows that ฮฃ[4] is generated as a group by โˆ† โˆช โˆ†0 . Now we are viewing V as ordinary three-dimensional space, and since V = Ri + Rj + Rk, so x โˆˆ V if and only if x e = โˆ’x. Then for all a โˆˆ S and all x โˆˆ V , ^ ga = a(โˆ’x)e โˆ’1 = axe axa a = โˆ’axaโˆ’1 , showing that axaโˆ’1 โˆˆ V . This is the familiar way in which elements of SU (2) turn into elements of SO(3), so that a โˆˆ SU (2) maps to the conjugation ฮณa : x 7โ†’ axaโˆ’1 on V . This is a rotation, and in this way we obtain the well-known double cover mapping SU (2) โˆ’โ†’ SO(3) . (18) However, there is more. If a โˆˆ ฮฃ[4] then for all x โˆˆ ฮฃ[3], then axaฬƒ โˆˆ ฮฃ[3], since if a โˆˆ 21n Z[ฯ„ ]4 and 1 x โˆˆ 21m Z[ฯ„ ]3 then axaฬƒ โˆˆ 2m+2n Z[ฯ„ ]3 โˆฉ S[3] โŠ‚ ฮฃ[3]. Thus the group of rotations on the sphere in 3-space induced by ฮฃ[4] actually acts as a group of symmetries of ฮฃ[3]. In particular they all lie in SO(3, R). Proposition 5.2. (i) ฮฃ[4] = R4 โˆฉ S[4] is a group under quaternion multiplication and is generated by โˆ† โˆช โˆ†0 ; (ii) ฮฃ[4] = SU (2, R) and SU (2, R) is dense in SU (2); (iii) ฮฃ[4] acts naturally as a group of isometries on ฮฃ[3] via the mapping ฮณa : x 7โ†’ axaฬƒ for all a โˆˆ ฮฃ[4] = SU (2, R); (iv) Under the mapping ฮณ in (iii), SU (2, R) maps onto a subgroup of index 2 in SO(3, R). Proof: There remains only to prove (iv). Let ฯ := ( โˆš12 , โˆš12 , 0, 0). We begin by making the observation that ฮณi ((x1 , x2 , x3 , x4 )) = (x1 , x2 , โˆ’x3 , โˆ’x4 ) ฮณj (x1 , x2 , x3 , x4 )) = (x1 , โˆ’x2 , x3 , โˆ’x4 ) (19) ฮณk ((x1 , x2 , x3 , x4 )) = (x1 , โˆ’x2 , โˆ’x3 , x4 ) ฮณฯ ((x1 , x2 , x3 , x4 )) = (x1 , x2 , โˆ’x4 , x3 ) . Since the mapping SU (2) โˆ’โ†’ SO(3) is 2 : 1 and its kernel is ยฑ1 โˆˆ SU (2), it is clear that the last of these rotations, ฮณฯ , while is is in SO(3, R), is not something that can arise from SU (2, R). We shall see that this is the only obstruction that we have to deal with. Since ฮฃ[3] = S โˆฉ VR , SO(3, R) maps ฮฃ[3] into itself. Let G := ฮณSU (2,R) denote the image of SU (2, R) in SO(3, R) under the mapping SU (2) โˆ’โ†’ SO(3, R). Note that if a โˆˆ ฮฃ[3] and x โˆˆ V then xฬƒ = โˆ’x and (17) reads ra (x) = โˆ’axฬƒa = axa = โˆ’axaโˆ’1 . (20) Now suppose that R โˆˆ SO(3, R). We wish to make R as simple as possible by multiplying R on the left by elements in G. Consider R(0, 1, 0, 0) โˆˆ S โˆฉ VR = ฮฃ[3]. Since H โˆž [3] is transitive on ฮฃ[3], 14 there exists w โˆˆ H โˆž [3] with wR = (0, 1, 0, 0). Writing w = rak . . . ra1 , (20) shows that (โˆ’1)k w โˆˆ G. This being the case we can assume at the outset that R(0, 1, 0, 0) = (0, ยฑ1, 0, 0). However we see from (19) that we can alter this sign, so we can actually assume that R(0, 1, 0, 0) = (0, 1, 0, 0). Now, the only elements of ฮฃ[3] that have the form (0, 0, โˆ—, โˆ—) are (0, 0, ยฑ1, 0) and (0, 0, 0, ยฑ1), and since R is an orthogonal transformation fixing (1, 0, 0, 0) and (0, 1, 0, 0), it can only permute these two pairs roots around. Of the four possible rotations that are possible here, two of them require interchanging the two coordinate positions and changing one sign, and that requires ฮณฯ . Thus, by composing R with elements of G we can reduce to one of the pair {1, ฮณฯ }; and indeed, ฮณฯ โˆˆ / G. This proves that [SU (2) : G] = 2. We note that SO(2, R) is not dense in SO(2), since the only R-points on the unit circle are (ยฑ1, 0) and (0, ยฑ1). Likewise U (2, R) (the subgroup of all the elements of U (2) whose coefficients are in R+iR) is not dense in U (2)โ€”and for basically the very same reason: det on U (2) is surjective onto the unit circle. Proposition 5.3. The stabilizer of (1, 0, 0, 0) in hH โˆž [4], ฮนi is hH โˆž [3], ฮนi where ฮน is the permutation operator on the last two coordinates. Here H โˆž [3] is in its obvious form of working on the last three coordinates, that is on the space V = Ri + Rj + Rk in the quaternions, and hH โˆž [3], ฮนi is the group generated by H โˆž [3] and ฮน. Proof: The first observation is that in H3 the rotation of the last three coordinates exists (as a rotation of order 3) and also the changes of signs of the individual coordinates exist (as the reflections in these coordinates). The same goes for H30 , of course. Now let w โˆˆ H โˆž [4] be in the stabilizer of z := (1, 0, 0, 0). Let y := (0, 1, 0, 0) and let x := w(y). Then x โˆˆ V since w is an isometry. Since H โˆž [3] is transitive on ฮฃ[3], there is a v โˆˆ H โˆž [3] with v(x) = y = (0, 1, 0, 0). Now the element vw fixes both x and y. We can ask what vw does to ฮฃ[4]. It must map the remaining two elements (0, 0, 1, 0) and (0, 0, 0, 1) into roots of the form (0, 0, โˆ—, โˆ—). However the general form of roots shows that the only possibilities are (0, 0, ยฑ1, 0) and (0, 0, 0, ยฑ1). The signs can be adjusted as we please by using an element from the Weyl group of K, but vw may still interchange the two points, in other words may be the involution ฮน. We shall show in Prop. 9.1 that H โˆž [4] does not contain ฮน. 6 โˆ† and โˆ†0 as groups The two basic root systems we began with are โˆ† and โˆ†0 . The rational parts of these sets is their intersection K = โˆ† โˆฉ โˆ†0 . Proposition 6.1. K, โˆ†, and โˆ†0 are groups (under quaternion multiplication) of orders 24, 120, 120 respectively. This is a well-known fact, see for instance [5] ยง20. But for the convenience of the reader we prove it here. Proof: For the rational root system K it is clear that the product of any two elements of K is a unit vector in the rational space (1/2)Z4 , and so is still in K. Inversion is just quaternion conjugation, and it preserves K. Thus K is a group with order 24. We shall prove that โˆ† is a group; the proof for โˆ†0 then follows immediately. The roots of โˆ† are given in (1). The first set of these consists, in quaternion notation, of the elements ยฑ1, ยฑi, ยฑj, ยฑk. Multiplication of a quaternion (x1 , x2 , x3 , x4 ) on the left by i turns it into (โˆ’x2 , x1 , โˆ’x4 , x3 ). There are sign changes, but the important thing to observe is that it performs an even permutation of 15 the coordinates, interchanging the first two coordinates and the last two coordinates. Likewise multiplication by j or k performs an even permutation of the coordinates (and makes two sign changes). Similar things happen if the multiplication by i, j, k is on the right. In particular, left and right multiplications by ยฑ1, ยฑi, ยฑj, ยฑk map โˆ† into itself. Now apart from the elements ยฑ1, ยฑi, ยฑj, ยฑk in โˆ†, every other x โˆˆ โˆ† has the property that 2x โˆˆ Z[ฯ„ ]4 and 2x 6= (0, 0, 0, 0) in F44 . In fact 2x is either (1, 1, 1, 1) or an even permutation of (0, 1, ฯ„ 0 , ฯ„ ). This property actually characterizes elements of norm 1 that are in โˆ†\{ยฑ1, ยฑi, ยฑj, ยฑk}. Similar remarks hold for โˆ†0 where the roles of ฯ„ and ฯ„ 0 are interchanged. Now let x, y โˆˆ โˆ†. We want to prove that xy โˆˆ โˆ†. By what we said above, we can assume neither is in the set {ยฑ1, ยฑi, ยฑj, ยฑk}. We begin by showing that 2xy โˆˆ Z[ฯ„ ]4 . By assumption 2x and 2y are in Z[ฯ„ ]4 . We know that even permutations and arbitrary sign changes on y will leave it in โˆ†. In particular yฬƒ โˆˆ โˆ†, and so we know that 2x.yฬƒ โˆˆ Z[ฯ„ ], by Prop. 2.1. Now x.yฬƒ is the first coordinate in the quaternion xy, so we know that that the first coordinate in 2xy is 2x.y โˆˆ Z[ฯ„ ]. If we look at the second coefficient of xy we can see that it is (x1 , x2 , x3 , x4 ).(y2 , y1 , y4 , โˆ’y3 ), so this shows that the second coefficient of 2xy is in Z[ฯ„ ]. Continuing this idea with the third and fourth coefficients we end up with 2xy โˆˆ Z[ฯ„ ]. At this point, since |xy| = |x| |y| = 1 we know that xy is an element of โˆ† or โˆ†0 . However, it is ห™ 0 (that is to say in โˆ†0 \โˆ†). We can see this in the following way. The first not possible for xy โˆˆ โˆ† ห™ and v โˆˆ โˆ† ห™ 0 then neither uv nor vu is in โˆ†โˆชโˆ†0 . The reason is that 2u.v โˆˆ thing to note if u โˆˆ โˆ† / Z[ฯ„ ], 0 โˆ’1 โˆ’1 ห™ see Prop. 2.1. So if we assume that xy โˆˆ โˆ† then from y = x (xy) we have that x cannot be in ห™ But x and xโˆ’1 are in โˆ†, so this shows that xโˆ’1 , and hence also x, is in K. Similarly x = (xy)y โˆ’1 โˆ†. shows that y is in K. But then xy โˆˆ K since K is a group. This is contradicts the assumption that ห™ 0 , so xy โˆˆ โˆ†. This finishes the proof. xy โˆˆ โˆ† We note in passing that ห™ โŠ‚ โˆ†; ห™ Kโˆ† ห™0โŠ‚โˆ† ห™ 0. Kโˆ† (21) since โˆ† (resp. โˆ†0 ) is a group and the products cannot be in K, for it is a subgroup. We now determine basic the structure of ฮฃ as seen from its generation by the two groups โˆ† and โˆ†0 . The following set C of elements is a set of representatives for the four non-trivial right cosets of K in โˆ† :   1 1 1 1 0 0 0 0 (0, 1, ฯ„ , ฯ„ ), (0, โˆ’1, ฯ„ , ฯ„ ), (0, 1, โˆ’ฯ„ , ฯ„ ), (0, 1, ฯ„ , โˆ’ฯ„ ) . (22) 2 2 2 2 Similarly for C 0 and the right cosets of K in โˆ†0 . Now, any non-trivial element of ฮฃ can be written as an alternating product of elements of โˆ† and 0 โˆ† . Using the coset representatives we can always write such a product in the form wam amโˆ’1 . . . a2 a1 (23) where the ai are alternately in C and C 0 and w โˆˆ K, since K is a subgroup of both โˆ† and โˆ†0 . We are going to prove that this writing is unique: each element of ฮฃ can be written uniquely in this form. The key to this is to introduce the set E โŠ‚ Z[ฯ„ ]4 /4Z[ฯ„ ]4 , defined as the set of all {(x1 + y1 ฯ„, x2 + y2 ฯ„, x3 + y3 ฯ„, x4 + y4 ฯ„ ) where the xi and yi are integers and 16 mod 4Z[ฯ„ ]4 } (24) โ€ข all the xi are congruent to 1 or 3 modulo 4; โ€ข all the yi are congruent to 0 or 2 modulo 4; โ€ข the number of xi congruent to 1 is even ; โ€ข the number of yi congruent to 2 is odd. It is straightforward to see that this set has 64 elements. Using conjugation, we have the second set E 0 which is easily seen to have the same four properties except that the number of xi congruent to 1 is odd (we are retaining the x + yฯ„ form). These two sets have remarkable properties: Lemma 6.2. (i) (1/2)EE = E and (1/2)E 0 E 0 = E 0 ; (ii) E โˆฉ E 0 = โˆ…; (iii) 4CC 0 โŠ‚ E and 4C 0 C โŠ‚ E 0 . Part (ii) is clear from the definitions. It is only necessary to verify the first parts of (i) and (iii). At the present time we have depended on brute force computation to prove this. For example, in looking at 4CC 0 in (iii), we have the following of these 16 products: โˆš โˆš โˆš โˆš โˆš โˆš (1, โˆ’ โˆš5, 5, 5) (3,โˆšโˆ’ 5,โˆšโˆ’1, 1)โˆš (โˆ’1, 3, 5, (โˆ’1, โˆ’3, โˆšโˆ’1) โˆš1, 5) (3, โˆ’ 5, โˆš 1, โˆ’1) (1, โˆ’ 5, โˆ’ 5,โˆšโˆ’ 5) (1, (1, โˆ’3,โˆš 5, โˆ’1) โˆš 3,โˆš1, 5)โˆš (1, โˆ’3, โˆ’1, 5) (1, 5,โˆš 5, โˆ’ 5) (โˆ’3, 5, 1,โˆš1) (โˆ’1, โˆ’3, 5, โˆš1) โˆš โˆšโˆ’ โˆš (โˆ’1, 3, โˆ’1, 5) (1, 3, 5, 1) (โˆ’3, โˆ’ 5, โˆ’1, โˆ’1) (1, 5, โˆ’ 5, 5) from which one can convert into x + yฯ„ form to show 4CC 0 โŠ‚ E. Conjugating we see that 4C 0 C โŠ‚ E0. Using Lemma 6.2, let us show that is not possible for zam amโˆ’1 . . . a2 a1 of (23) to be equal to 1, except trivially. The ai alternate between C and C 0 , and, for definiteness assume that a1 โˆˆ C 0 . This analysis of this case uses E, while the case with a1 โˆˆ C uses E 0 . Now suppose that wam amโˆ’1 . . . a2 a1 = 1. Then am amโˆ’1 . . . a2 a1 = wโˆ’1 . For this to happen โˆ’1 m โ‰ฅ 2. If m is odd we can take the am to the other side to get amโˆ’1 . . . a2 a1 = aโˆ’1 m w . In either case the right hand side is of level at most 1, and now we can assume that m = 2n is even and n โ‰ฅ 1. We will show that the level of the left-hand side is n + 1, leading to a contradiction of levels. Starting with 4a2 a1 โˆˆ 4CC 0 โŠ‚ E, which shows that a2 a1 has level 2. Next we have 8a4 a3 a2 a1 = (1/2)(4a4 a3 )(4a2 a1 ) โŠ‚ (1/2)EE = E , showing that a4 a3 a2 a1 has level 3. If n > 2 we can continue in this way to show that a6 a5 a4 a3 a2 a1 has level 4, and so on. This shows that indeed the level of the left-hand side is n + 1. Of course the argument when a1 โˆˆ C can be obtained by conjugating the equation. Now to show the uniqueness of the standard form, suppose that wam amโˆ’1 . . . a2 a1 = zbp bpโˆ’1 . . . b2 b1 are two expressions in the form (23). 17 O(4) SU (2) dense dense SU (2, R) O(4, R) โŒƒ H1 = 2 amalgamation of and 0 over K 0 H40 H4 K N (K) {1} {1} root systems amalgamation of H4 and H40 over N (K) groups Figure 4: How ฮฃ and H โˆž appear as amalgamations. Supposing that the two expressions are different, we can assume that p + m is minimal for such ห™ an equality. We can push w to the other side, and so assume from the outset that w = 1. If a1 โˆˆ โˆ† 0 ห™ and b1 โˆˆ โˆ† , or vice-versa, then we can invert all the elements of the left hand side and get a new reduced expression that equals 1, and we know that this cannot happen. ห™ say, then b1 aโˆ’1 โˆˆ โˆ† and we can rewrite the If on the other hand a1 and b1 are both in โˆ†, 1 right-hand side, to bring it into standard form again, while not increasing the number of terms on the right-hand side, and in so doing reduce the combined length p + m, contrary to our minimality assumption. So this case does not happen either. This proves the uniqueness of expression in (23) Putting this together we have shown: Proposition 6.3. Every element of ฮฃ is uniquely expressible in the form (23). The group ฮฃ is the amalgamation of the two groups โˆ† and โˆ†0 over K, i.e. it is the free product of โˆ† and โˆ†0 factored by the normal subgroup generated identifying the elements of a โˆˆ K appearing in โˆ† and โˆ†0 . 7 W (K) and its normalizer We know that H โˆž [4] is generated by two copies of the Coxeter group of type H4 , namely H4 and H40 . In this section we shall call them W (โˆ†) and W (โˆ†0 ). Both of them contain the subgroup W (K) generated by the reflections defined by K, and this is a Coxeter group (of type D4 ). Using the root bases described above we see that together they create the Coxeter diagram (2). As we will see below, it appears that there is an additional relation beyond the Coxeter relations, see (26). We shall show the origin of this relation and how together with the obvious Coxeter relations, we obtain a presentation of H โˆž [4]. 18 We begin with looking at the group N (K) := {w โˆˆ W (โˆ†) : w(K) = K} . (25) Similarly we have N (K)0 for the stabilizer of K in W (โˆ†0 ). Since K is a root system of type D4 , its complete group of automorphisms is the semi-direct product of W (K) and the symmetric group S3 (which acts as diagram automorphisms). Lemma 7.1. (i) N (K) is the semi-direct product of W (K) and a cyclic group of order 3. (ii) N (K) is the normalizer of W (K) in W (โˆ†) . (iii) The parallel results hold for W (โˆ†0 ) and its normalizer N (K)0 . (iv) N (K) = N (K)0 = W (โˆ†) โˆฉ W (โˆ†0 ) = H4 โˆฉ H40 . Proof: The set K is a root system of type D4 and W (K) is its Weyl group. Thus N (K)/W (K) is a subgroup S3 of diagram automorphisms of D4 . Comparing the orders 26 .32 .52 of W (โˆ†) and 26 .3 of W (K) ([1]), we see that the index [N (K) : W (K)] is either 1 or 3. We shall now see that it is 3. The Sylow 3-groups of W (โˆ†) are of order 9. They are in fact the direct product of two cyclic groups of order 3. We can see this from the fact that there are subgroups of type A2 ร— A2 inside H4 . E.g. we have the root pairs {(1, 0, 0, 0), (1/2)(โˆ’1, 1, 1, 1)} and {u := (1/2)(0, โˆ’1, ฯ„ 0 , ฯ„ ), v := (1/2)(0, ฯ„ 0 , ฯ„, โˆ’1)}, both of which are A2 bases. Let ฮ“ be the associated A2 ร— A2 root system. Multiplying, we find that uv = (1/2, โˆ’1/2, โˆ’1/2, โˆ’1/2) โˆˆ K and ru rv (x1 , x2 , x3 , x4 ) = uv(x1 , x2 , x3 , x4 )vu = (x1 , x3 , x4 , x2 ) . This three cycle performs a diagram automorphism of the D4 root system K and together with W (K) it generates N (K). Although u, v โˆˆ โˆ†\K, their product is in K. Thus we have u0 , v 0 โˆˆ โˆ†0 \K and their product is the same element of K. They serve to produce the very same three cycle, and hence lie in the normalizer N (K)0 of W (K) in W (โˆ†0 ). Thus N (K) = N (K)0 . Any element of w โˆˆ W (โˆ†0 ) โˆฉ W (โˆ†) maps K = โˆ† โˆฉ โˆ†0 into itself and so stabilizes K. Thus it is in N (K) = N (K)0 . Let s := ru rv = ru0 rv0 . (26) Using (26) we can write down a presentation for the group H โˆž [4]. The presentation uses abstract generators Rฮฑ , Rฮฑ0 and relations that involve the reflections rฮฑ , rฮฑ0 . This is discussed in the next section. Comment: All of the Sylow 3-subgroups of W (โˆ†) are conjugate by elements of W (โˆ†). The ones that are in N (K) are Sylow 3-subgroups of it and so are conjugate by elements of N (K) to each other, and in particular to the one that we used above. These conjugations must conjugate ฮ“ into other A2 ร— A2 root systems in โˆ†. Each of these root systems generates another relation, just like (26). Of course these are just ones that follow from the conjugation of (26). 19 8 A presentation of H โˆž The purpose of this section is to prove Proposition 8.1. H โˆž = H โˆž [4] is generated by the following generators and relations: (i) generators Rฮฑ , ฮฑ โˆˆ โˆ†, and Rฮฑ0 , ฮฑ0 โˆˆ โˆ†0 ; (ii) Rฮฑ2 = 1 = Rฮฑ2 0 for all ฮฑ โˆˆ โˆ† and for all ฮฑ0 โˆˆ โˆ†0 ; (iii) relations Rฮฑ = Rฮฑ0 for all ฮฑ โˆˆ K; (iv) relations Rฮฑ Rฮฒ Rฮฑโˆ’1 = Rrฮฑ (ฮฒ) for all ฮฑ, ฮฒ โˆˆ โˆ†; and similar relations for โˆ†0 ; (v) with u, v โˆˆ โˆ†\K and u0 , v 0 โˆˆ โˆ†0 \K as given above, Ru Rv = Ru0 Rv0 . Notice that Rฮฑ = Rฮฑ Rฮฑ Rฮฑโˆ’1 = Rโˆ’ฮฑ for all ฮฑ โˆˆ โˆ† and similarly for โˆ†0 . The proof depends on working explicitly with the group H โˆž and the reflections rฮฑ , rฮฑ0 as they appear in terms of the algebra of the quaternions, and showing that we can untangle any relation written in terms of these generators by only using the relations corresponding to those itemized in the statement of the Proposition. We begin by recalling that for a โˆˆ S, the quaternionic form of the reflection ra in a (17). The effect of a product of reflections rak ยท ยท ยท ra2 ra1 acting on x is ( โˆ’ak ag e a1 ae2 . . . ag kโˆ’1 . . . ae2 a1 x kโˆ’1 ak if k is odd x 7โ†’ (27) aek akโˆ’1 . . . a2 e a1 x e a1 a2 . . . akโˆ’1 aek if k is even . When we write out products of reflections as two-sided products, as in (27), this involves alternately conjugating elements (this is quaternion conjugation, which we are designating by tilde), with the explicit form depending on whether there are an even or an odd number of reflections involved, and a possible overall sign change. This is rather messy to write down but quite trivial to do in practice. In order to avoid lots of notation we simply signify the whole conjugation process by putting a hat on each symbol, e.g. aฬ‚, which is capable of being conjugated. Thus the symbol beneath the hat may or may not be conjugated according to the overall length being even or odd. Thus we write rak . . . ra1 (x) = (โˆ’1)k abk . . . ab1 x b ab1 . . . abk . (28) ห™ and โˆ† ห™ 0. Notice that conjugation stabilizes each of K, โˆ†, Proof:(Prop. 8.1) Let rak . . . ra2 ra1 = 1 (29) be a non-trivial relation in H โˆž , written in terms of root reflections raj where the aj โˆˆ โˆ† โˆช โˆ†0 . Our objective is to show that such a relation is a consequence of the relations (i)โ€“(v). Equivalently we wish to show that the word on the left-hand side of (29) can be reduced to the empty word by using only these relations. We can rewrite the left-hand side in the form (28). To begin with consider any product rbp . . . rb1 with all bj โˆˆ โˆ† and its action on H: rbp . . . rb1 (x) = (โˆ’1)p bbp . . . bb1 x b bb1 . . . bbp , 20 for all x โˆˆ H. Let bbp . . . bb1 =: BL and bb1 . . . bbp =: BR . Then BL , BR โˆˆ โˆ† since โˆ† is a group, and the mapping assumes the form x 7โ†’ (โˆ’1)p BL x b BR . There seems to be no simple relationship between BL and BR , and it seems quite possible that one would belong to K while the other would not. However, if both BL , BR โˆˆ K then we can see that rbp . . . rb1 โˆˆ N (K). In fact, using the fact that the central inversion โˆ’1 โˆˆ W (K) we see that for all x โˆˆ K, rbp . . . rb1 (x) = (โˆ’1)p BL x b BR โˆˆ K, see (25). Notice that the fact that rbp . . . rb1 โˆˆ N (K) is a fact that takes place entirely inside the group W (โˆ†), that is to say, it is determined entirely by the structure of W (โˆ†) as a Coxeter group. In view of the structure of N (K), we can rewrite the product rbp . . . rb1 so as to assume that all the bj โˆˆ K with the possible exception of bp , bpโˆ’1 which may be u, v or v, u, see (26). This is all deducible from the Coxeter relations of W (โˆ†). We now begin to parse the word on the left-hand side of (29), utilizing the form of (28), from right to left. For definiteness we will assume that a1 โˆˆ โˆ†. We now move to the left until we reach the first ap+1 โˆˆ / โˆ†. If all the roots involved are in โˆ†, so p = n, there is nothing to prove since the whole word is in W (โˆ†) and the relation (29) is a consequence of the Coxeter relations of W (โˆ†). Assuming (1) (1) that p 6= n, we rewrite rap . . . ra1 using the two blocks BL = abp . . . ab1 and BR = ab1 . . . abp which are both in โˆ†. In the case that rap . . . ra1 โˆˆ N (K) we rewrite with the word (using the Coxeter relations of W (โˆ†)) so that all the aj involved are in K with the possible exception that ap , apโˆ’1 are the pair u, v in some order. In that case we use (26) to replace this pair with u0 , v 0 in the corresponding order, thus shifting these last two letters into โˆ†0 and passing them on to the next block and using (1) (1) only ad pโˆ’2 . . . ab1 to make our blocks BL and BR . These two blocks are then elements of K. So (1) (1) in the case rap . . . ra1 โˆˆ N (K)\K, we do this little trick to make BL , BR โˆˆ K and pass along the non-K terms to subsequent blocks. We write q = p or q = p โˆ’ 2 accordingly. We may assume that this rewriting and the passing along of pairs ru rv or rv ru , has been done ห™ in advance. That means that each block multiplies out to be either in K or in โˆ†. We now continue the parsing process from where we left off, this time producing a new set (2) (2) aq , . . . , ap+1 which are of elements in โˆ†0 whose left and right product produce blocks BL and BR , which are both in โˆ†0 . Again, if these two blocks are both in K then ras . . . raq+1 โˆˆ N (K)0 = N (K), and this is derivable from the Coxeter relations of W (โˆ†0 ). (2) (2) There is a little bit of extra attention needed here. The elements aj appearing BL and BR have their conjugations determined by the parity of their positions in the sequence of reflections appearing (2) (2) in (29). But as an element of W (โˆ†0 ), the action of ras . . . raq+1 might be either u 7โ†’ ยฑBL uฬ‚ BR , or the conjugations may be interchanged so its action would be g (2) e g (2) u 7โ†’ ยฑBR u b BL . (2) (2) In either case, if both BL and BR are in K, the ras . . . raq+1 maps K into K and so lies in N (K). We continue this process until we finally achieve a rewriting of left-hand side of (29) in the form (h) (1) (1) (h) (โˆ’1)n BL . . . BL (b x)BR . . . BR = x , (30) where n is the original length of the word we began with. This equation is valid for all x โˆˆ H4 . Of ห™ or โˆ† ห™ 0. these, all blocks multiply to be in K or โˆ† 21 Now if all the blocks here lie in K then, as we saw above, the entire effect on x is that of an element of N (K), and the entire relation can be determined, block by block, only using the Coxeter ห™ or โˆ† ห™ 0 . Choose relations of W (โˆ†) and W (โˆ†0 ). So let us suppose that at least one block is either in โˆ† a first such block to appear either to the left or right of x; call it B. The blocks, if any, that lie between x and B are in K. ห™ and suppose it is on the right. Choose x โˆˆ โˆ† ห™ 0 . Then on For definiteness suppose B is of type โˆ† the left-hand side we have a partial product in the set ห™ 0 [ possible blocks in K] โˆ† ห™ ... ...โˆ† From this we see that every element in the left-hand side has level at least 2, see Prop. 6.3 and the discussion preceding it. The level can only increase if there are any other alternations of blocks ห™ and โˆ† ห™ 0 in (30). The right hand side of (30) has level 1. This is a contradiction. This of types โˆ† argument works in the same way if B is on the left. This contradiction shows that all the blocks must lie in K, and so the relations (i)-(v) Prop. 8.1 suffice to reduce the left-hand side of (29) to the empty word. This proves that these relations are a presentation of H โˆž . There is a more succinct way of saying this that is useful. Let C be a set of coset representatives for all the non-trivial right cosets of H4 mod N (K), and let D be a set of coset representatives for all the non-trivial right cosets of H40 mod N (K). That is [ H4 = N (K) โˆช N (K) y (disjoint union) yโˆˆC and D does the same for H40 . A natural choice would be to relate C and D by using the conjugation ( )0 . However it is better to keep the freedom for other choices, as we shall see below. Proposition 8.2. (i) Let C (resp. D) be a set of coset representatives for all the non-trivial right cosets of H4 mod N (K) (resp. H40 mod N (K)). Then very element of H โˆž [4] is uniquely expressible in the form z yk . . . y1 (31) where z โˆˆ N (K), and where the yj alternate between C and D. (ii) H โˆž is the amalgamation of H4 = W (โˆ†) and H40 = W (โˆ†0 ) over their intersection N (K). Proposition 8.3. Let us choose C and D of Prop. 8.2 so that the representatives are actually in H3 (resp. H30 ) when the coset contains elements of these subgroups. Then (i) every element of H โˆž [3] โŠ‚ H โˆž [4] is uniquely expressible in the form z yk . . . y1 where z โˆˆ H3 โˆฉ H30 , and where the yj alternate between C and D ; (ii) H โˆž [3] is the amalgamation of H3 = W (โˆ†[3]) and H30 = W (โˆ†[3]0 ) over their intersection. 22 Proof: Notice that K โˆฉ V = {(0, ยฑ1, 0, 0), (0, 0, ยฑ1, 0), (0, 0, 0, ยฑ1)} = โˆ†[3] โˆฉ โˆ†[3]0 , which is a root system of type A1 ร— A1 ร— A1 inside โˆ†[3]. The stabilizer of K โˆฉ V in H3 is the semi-direct product of the Weyl group of A1 ร— A1 ร— A1 and the cyclic group of order three arising by cycling the last three components of K โˆฉ V (or equivalently cycling the three A1 s). All of these elements are in N (K) and from this we see that the stabilizer of K โˆฉ V in H3 is N (K) โˆฉ H3 . In the same way the stabilizer of K โˆฉ V in H30 is N (K) โˆฉ H30 , and from this we see N (K) โˆฉ H3 = N (K) โˆฉ H30 = H3 โˆฉ H30 . Now H โˆž [3] is the subgroup of H โˆž [4] generated by H3 and H30 . According to Prop. 8.2 every element of H โˆž [4] is uniquely in the form (31). Amongst all the expressions (31), consider all those in which all the elements occurring are actually in H3 or H30 , and z โˆˆ H3 โˆฉ H30 โŠ‚ N (K). All of these expressions are obviously elements of H โˆž [3]. Whatโ€™s more, every element of H โˆž [3] can evidently be written in this form. So H โˆž [3] is composed precisely of all of these products. Since the expression in this form is unique, we see that in fact it says that this is the amalgamation of H3 and H30 over their intersection. 9 The orthogonal group Define O(ฮฃ) = O(ฮฃ[4]) to be the group of all orthogonal transformations of R4 that stabilize the root system ฮฃ. We already know a lot of transformations in O(ฮฃ), namely all the elements of H โˆž . Along with O(ฮฃ) we shall consider the orthogonal group O(4, R) of all orthogonal matrices with coefficients in R. Since ฮฃ โŠ‚ R4 and it contains a standard orthogonal basis of R4 , we have O(ฮฃ) โŠ‚ O(4, R). Notice that there is an orthogonal transformation of ฮฃ that interchanges โˆ† and โˆ†0 , namely the automorphism of ฮฃ that interchanges the last two coordinates (x1 , x2 , x3 , x4 ) 7โ†’ (x1 , x2 , x4 , x3 ). Call this transformation ฮน. (Of course it has numerous conjugates.) Evidently O(ฮฃ) contains the subgroup hH โˆž [4], ฮนi generated by H โˆž and ฮน. Now we prove the reverse inclusion. Proposition 9.1. (i) O(ฮฃ[4]) = O(4, R) ; (ii) O(ฮฃ[4]) = hH โˆž [4], ฮนi = hฮนi n H โˆž [4] = hH4 , ฮนi ; (ii) [O(4, R)) : H โˆž [4]] = 2 . Proof: (i) Let g โˆˆ O(4, R). Then g stabilizes S โˆฉ R4 = ฮฃ, and so g โˆˆ O(ฮฃ). (ii) We know that K is a root system of type D4 , for which (3) is a root base. Let B be any D4 root base in ฮฃ. We will try to use elements of H โˆž to bring B back to the basis (3). We will see that we can almost do this. To finish the job we may need to reverse the last two coordinates, hence use the transformation ฮน. Let V := (0, R, R, R), as before, and recall that V โˆฉ ฮฃ[4] = ฮฃ[3], see (4.6). This base has the traditional D4 Coxeter diagram with one central node and three nodes attached to it. Using H โˆž and simple transitivity, we can assume that one of the non-central nodes of the base elements of B is (1, 0, 0, 0). Then the other two non-central nodes are in V โˆฉ ฮฃ[4] and so in ฮฃ[3]. We take one of these and again using transitivityโ€” this time of H โˆž [3]โ€” to bring this node to (0, 1, 0, 0). The remaining non-central node is now of the form (0, 0, โˆ—, โˆ—). The only elements of ฮฃ[3] 23 of this form are (0, 0, ยฑ1, 0) and (0, 0, 0, ยฑ1). We can use ฮน to assume that it is (0, 0, ยฑ1, 0). Since the sign changes are in H โˆž [3], we can assume this element is (0, 0, 1, 0). There remains only the central node. Its scalar product with the three other nodes (that is, with (1, 0, 0, 0), (0, 1, 0, 0), (0, 0, 1, 0) is โˆ’1/2 and so it has the form (1/2)(โˆ’1, โˆ’1, โˆ’1, โˆ—). Given that it is a vector of length 1, the last term must be ยฑ1. We again have the choice of sign. The upshot of this is that we have brought the base B to the standard basis of (3) using H โˆž and ฮน. Since any orthogonal transformation of R4 is determined entirely by its action on any base, we have proved that O(ฮฃ) โŠ‚ hH โˆž , ฮนi. The rest of (ii) follows once we know that (iii) is true. (iii) We know that ฮน2 = 1 and ฮน stabilizes ฮฃ and hence normalizes H โˆž (which is generated by ห™ and โˆ† ห™ 0 (since it is an odd permutation the reflections in the elements of ฮฃ). Also ฮน interchanges โˆ† of the coordinates) while stabilizing K. It follows that conjugation by ฮน interchanges W (โˆ†) = H4 and W (โˆ†0 ) = H40 while stabilizing their intersection, which is N (K). This means that in choosing the coset representatives used in Prop. 8.2 we can choose D = ฮน(C)ฮนโˆ’1 . We will assume this. Now we prove that ฮน โˆˆ / H โˆž . If, on the contrary, it were in H โˆž then using Prop. 8.2 we could write ฮน uniquely in the form ฮน = zyk . . . y1 where z โˆˆ N (K) and the other elements are alternately in C and D. Then ฮน = ฮนฮนฮนโˆ’1 = ฮนzyk . . . y1 ฮนโˆ’1 = ฮนzฮนโˆ’1 ฮนyk ฮนโˆ’1 . . . ฮนy1 ฮนโˆ’1 . This gives us a second way of writing ฮน as an element of H โˆž , in the form described in Prop. 8.2 and accordingly they are identical. This obviously is not true if any of the coset terms are present, since C and D are reversed by the conjugation and y1 6= ฮนy1 ฮนโˆ’1 , etc. Thus we end up with ฮน = ฮนzฮนโˆ’1 and so ฮน = z โˆˆ N (K). Now certainly ฮน โˆˆ / W (K), for it effects a diagram automorphism of D4 , and we have already noted that [N (K) : W (K)] = 3. Thus ฮน โˆˆ / N (K), and this contradiction shows that ฮน โˆˆ / H โˆž. There is a corresponding result for the three-dimensional case involving ฮฃ[3] and O(3, R). Here we take O(3, R) to be the subgroup of O(4, R) which fixes the vector (1, 0, 0, 0) in H, and define O(ฮฃ[3]) to be the subgroup of O(3, R) stabilizing ฮฃ[3]. Proposition 9.2. (i) O(ฮฃ[3]) = O(3, R) ; (ii) O(ฮฃ[3]) = hH โˆž [3], ฮนi = hฮนi n H โˆž [3] = hH3 , ฮนi ; (ii) [O(3, R)) : H โˆž [3]] = 2 . Proof: The argument is essentially a repeat of what we saw in Prop. 9.1. Since ฮฃ[3] = S[3] โˆฉ R3 , it is clear that O(3, R) stabilizes ฮฃ[3], and this proves (i). We need only prove that O(3, R) โŠ‚ hH โˆž [3], ฮนi. Working in H, ฮฃ[3] contains the standard basis vectors v1 := (0, 1, 0, 0), v2 := (0, 0, 1, 0), v3 := (0, 0, 0, 1). Let g โˆˆ O(3, R) and let g(v1 ) = x โˆˆ ฮฃ[3]. Since H โˆž [3] is transitive on ฮฃ[3], there is an element h โˆˆ H โˆž [3] so that hg(v1 ) = v1 . Then hg stabilizes the span of v2 and v3 as well as mapping them into elements of ฮฃ[3]. However, the only elements of R3 of this form are (0, 0, ยฑ1, ยฑ1). Since the sign changes on individual coordinates are elements of H โˆž [3], we can assume that we have the positive signs here. Thus hg fixes both v2 and v3 , in which case hg = 1, or hg interchanges v2 and v3 , in which case hg = ฮน[3]. 24 10 Approximation in SU (2) The unitary group SU (2) plays a significant role in the theory of quantum computation as the group of admissible transformations of a quantum qbit. In this section we offer an algorithm by which any element of SU (2) can be approximated to any degree of accuracy by the repeated use of just a few very simple fixed elements in SU (2, R). In fact, this number can be reduced to five, these five being related to a root base of ฮฃ[4]. Passing to SO(3) via (18) we can similarly approximate any rotation to any degree of accuracy by elements of SO(3, R). The idea is this. Inside the quaternion algebra H the unit sphere S is a group under quaternion multiplication and this group is SU (2) from the point of view of the matrix representation of H of (16). The full set of roots ฮฃ[4] that we have generated out of โˆ†[4] and โˆ†0 [4] is in fact the subgroup of S generated by them and it is the orbit of โˆ†[4] โˆช โˆ†0 [4] under H โˆž [4]. Furthermore it is dense on the sphere S, Prop. 3.7. Hence appropriate sets of mirrors (reflecting hyperplanes) associated with the reflections in these elements partition S into convex regions of arbitrarily small diameter. We call such regions chambers. S A natural choice is a set Un := kโ‰คn Sฬ‡k โˆช Sฬ‡k0 and we can use the associated hyperplanes of these points to define the set of chambers that we use. So we note that the chambers here are not absolute things, but rather the outcome of some selection of a finite number of root hyperplanes. Assuming that the chambers are selected and that one point p has been chosen in one of these chambers, say p โˆˆ C, then the idea is that any element x โˆˆ S can be reflected into C using only reflections in these mirrors, whereby it is a close approximation of p. Then reversing the operations we can take p to some point equally close to x. So we take some set Un and use its points to define a set of chambers. We should note that the situation with these chambers is not the same as in the customary case of root systems. The chambers are not all isometric copies of each other, nor are they necessarily simplices. The cellular decomposition comes about through the sets of reflecting hyperplanes that we use, but we never use all of them, only a finite number of them, and these finite sets are not invariants of H โˆž .3 For a โˆˆ S, the reflection ra in a has the quaternionic form ra x = x โˆ’ 2(x.a)a = x โˆ’ (xe a + ae x)a = โˆ’ae xa see (17). Suppose we wish to approximate x โˆˆ S using the reflections determined by the elements of Un . The idea is to reflect x a number of times so that it ends up as close as possible to 1 โˆˆ H. Choose a chamber C0 containing 1 (actually 1 will be at the vertex of such a chamber) and choose a point z close to 1 in the interior of C0 . For each element pair ยฑa โˆˆ Un we choose the one which satisfies a.z < 0 and let Unโˆ’ denote this subset chosen in this way. So C0 = {u โˆˆ S : u.a โ‰ค 0 for all a โˆˆ Unโˆ’ }. Now if there is a reflection hyperplane for which x and z lie on opposite sides, then a.x > 0 and we see that (ra x โˆ’ z).(ra x โˆ’ z) = (x โˆ’ z).(x โˆ’ z) + 4(a.x)(a.z) < (x โˆ’ z).(x โˆ’ z) , thus moving the point x closer to z. We can always do this so that we choose a for which a.x is as large as possible. 3 If the process is carried out to the end, allowing n โ†’ โˆž, then every point y not on one of the reflecting hyperplanes is uniquely specified by the signs that it makes with each of the roots: y.a is either positive or negative. In this way it looks similar to a Dedekind cut where each real number is specified by the rationals that are less than it or greater than or equal to it. 25 Almost surely, this process has to stop in a finite number of steps with the point ending up in C0 . Here is why. Suppose that x = x0 , x1 , x2 , . . . were an infinite sequence of successive steps applied to the starting point x. It has to have limit points, and we choose one, say y, that is closest to z. Now a.z โ‰ค 0 for all a โˆˆ Unโˆ’ , and it follows that y โˆˆ C0 . In fact every iteration brings us closer to z and if yโˆˆ / C0 there is an a โˆˆ Unโˆ’ with a.y > 0 and ra (y) is closer to z, a contradiction. Almost surely (in the sense of Lebesgue measure) x is not on the boundary of a mirror so neither is y. Thus y is in the interior of C0 . This means that almost surely there is a k for which xk is in the interior of C0 , and the iteration will stop as soon as it reaches such a k. From the point of view of approximation theory, we can always assume that x is not on a boundary. At the end of the process we will have achieved a relation of the form rak ยท ยท ยท ra2 ra1 (x) = p โˆˆ C0 . If d is the diameter of C0 , then since each reflection is an isometry of H relative to its usual norm, |x โˆ’ ra1 ra2 ยท ยท ยท rak 1| = |rak ยท ยท ยท ra2 ra1 (x) โˆ’ 1| โ‰ค d . This then gives us the desired approximation ( โˆ’a1 ae2 ยท ยท ยท ag kโˆ’1 ak ak ag kโˆ’1 ยท ยท ยท ae2 a1 if k is odd x' ae1 a2 ยท ยท ยท akโˆ’1 e ak e ak akโˆ’1 ยท ยท ยท a2 ae1 if k is even . (32) Treated as elements of SU (2), the matrix entries all come from the ring of dyadic golden numbers R. ห™ ห™ 0 we need to write each To write this fully in terms of the basic reflections in the roots of โˆ†โˆชK โˆชโˆ† of the roots appearing in Unโˆ’ in terms of these elements. Thus if a โˆˆ Unโˆ’ is a = rbm rbmโˆ’1 ยท ยท ยท rb1 b0 ห™ โˆชK โˆชโˆ† ห™ 0 , then with all the bj โˆˆ โˆ† ( e f bf m bmโˆ’1 ยท ยท ยท b1 b0 b1 b2 ยท ยท ยท bmโˆ’1 bm if m is odd a= e e ] โˆ’bm b] mโˆ’1 ยท ยท ยท b1 b0 b1 ยท ยท ยท bmโˆ’1 bm if m is even . Example: Here we give some sample results from a computer implementation of the approximation process. The set U3 of roots formed from the sets Sฬ‡k , Sฬ‡k0 is evaluated for k = 1, 2, 3, resulting in a total of 52416 = 2.3.(25 + 29 + 213 ) elements. A random element of SU (2) is computed, e.g.   โˆ’0.244828 โˆ’ 0.155561i 0.731977 โˆ’ 0.616498i u= โˆ’0.731977 โˆ’ 0.616498i โˆ’0.244828 + 0.155561i and the process then determines (in this case six) reflections from roots of R3 that bring this point on S[4] as close to the identity element 1 โˆˆ H as possible (using reflections from R3 ). These reflections ห™ โˆชโˆ† ห™ 0 , giving rise to a total of fifteen. are rewritten as products of reflections from the original set โˆ† The matrix   1 1 + ฯ„ i (1 โˆ’ ฯ„ )i 2 (1 โˆ’ ฯ„ )i 1 โˆ’ ฯ„ i is a typical looking example. 26 After computing the resulting matrix product according to (32), we obtain the approximation   โˆ’0.245712 โˆ’ 0.15869i 0.730844 โˆ’ 0.616694i , โˆ’0.730844 โˆ’ 0.616694i โˆ’0.245712 + 0.15869i the difference being   0.000883332 + 0.00312853i 0.00113294 + 0.000195296i . โˆ’0.00113294 + 0.000195296i 0.000883332 โˆ’ 0.00312853i This example is entirely typical both in the number of reflections required and in the degree of ห™ and โˆ† ห™ 0 in terms of approximation. If we wished we could rewrite the reflections in the roots of โˆ† the five generators of (6). Computing out more roots, e.g. U4 will result in more accuracy. We do not have any decent estimates on the diameters of the chambers arising from Un . Acknowledgements We thank the referee for his/her careful parsing of the manuscript and helpful historical suggestions. RVM was supported by Discovery Grant 461292003, Natural Sciences and Engineering Research Council of Canada. JM was supported by Grants-in-Aid for Scientific Research 26400005, 17K05158 (Monkasho Kakenhi, Japan). References [1] N. Bourbaki, Groupes et algeฬ€bres de Lie, Ch. IV-VI, Hermann, Paris, 1968. [2] L. Chen, R. V. Moody, J. Patera, Non-crystallographic root systems in Quasicrystals and Discrete Geometry, ed. J. Patera, Fields Institute Monographs, American Mathematical Society, 1997. [3] P-P. Dechant, C. Boฬˆhm, R. Twarock, Novel Kac-Moody-type affine extensions of noncrystallographic Coxeter groups, J. Phys. A: Math. Theor. 45(28)(2012), 285202. [4] P-P. Dechant,A Clifford Algebraic Framework for Coxeter group theoretical computations, Adv. Appl. Clifford Algebras, 24(2014), 89-104. [5] P. Du Val, Homographies, Quaternions, and Rotations, Oxford, 1964. [6] M. Koca, R. Kocฬง, M. Al-Barwani, S. Al-Farsi, Maximal subgroups of the Coxeter group W (H4) and quaternions, Linear algebra and its applications, 412 (2006), pp.441-452. [7] R.V. Moody and J. Patera, Quasicrystals and Icosians, J. Phys. A: Math. Gen. 26 (1993), 28292853. 27
4math.GR
PREPRINT VERSION Improving files availability for BitTorrent using a diffusion model C. Napoli, G. Pappalardo, and E. Tramontana arXiv:1409.4565v1 [cs.NI] 16 Sep 2014 PUBLISHED ON: 2014 IEEE 23rd International WETICE Conference BIBITEX: @incollection{Napoli2014Improving year={2014}, isbn={978-1-4799-4249-7/14}, doi={10.1109/WETICE.2014.65}, booktitle={23rd International WETICE Conference}, title={Improving files availability for BitTorrent using a diffusion model}, publisher={IEEE}, author={Napoli, Christian and Pappalardo, Giuseppe and Tramontana Emiliano}, pages={191-196} } Published version copyright c 2014 IEEE UPLOADED UNDER SELF-ARCHIVING POLICIES NO COPYRIGHT INFRINGEMENT INTENDED Improving files availability for BitTorrent using a diffusion model Christian Napoli, Giuseppe Pappalardo, and Emiliano Tramontana Dipartimento di Matematica e Informatica, University of Catania Viale A. Doria 6, 95125 Catania, Italy Email: {napoli, pappalardo, tramontana}@dmi.unict.it Abstractโ€”The BitTorrent mechanism effectively spreads file fragments by copying the rarest fragments first. We propose to apply a mathematical model for the diffusion of fragments on a P2P in order to take into account both the effects of peer distances and the changing availability of peers while time goes on. Moreover, we manage to provide a forecast on the availability of a torrent thanks to a neural network that models the behaviour of peers on the P2P system. The combination of the mathematical model and the neural network provides a solution for choosing file fragments that need to be copied first, in order to ensure their continuous availability, counteracting possible disconnections by some peers. Keywords-Dependability, distributed caching, P2P, neural networks, wavelet analysis. I. I NTRODUCTION In peer to peer (P2P) systems using BitTorrent, a shared content (named torrent) becomes split into fragments and the rarest fragments are automatically chosen to be sent first to users requesting the file. Fragments availability is given by the number of peers storing a fragment at a given moment, and periodically computed by a server storing peer ids, fragments held and requested [7]. For computing the priority of fragments to spread, at best availability has been freshly updated, however peers often leave the system hence file fragments availability quickly changes, possibly before the least available fragments have been spread [13]. This occurs so frequently that such a fundamental BitTorrent mechanism may become ineffective, and as a result some fragments can quickly become unavailable. Moreover, when choosing fragments to spread, communication latencies [8], [18] among peers are not considered, therefore fragments spreading will surely occur sooner on peers nearby the one holding the fragment to spread. As a result, the furthest peers could disconnect before receiving the whole fragment. This paper proposes a model for spreading file fragments that considers both a time-dependent priority for a fragment to spread and latencies among nodes. I.e. the priority of fragments to spread gradually changes according to the passing time and fragments availability. The priority variation is regulated in such a way that the availability of fragments is maximised while time goes. Fragments to spread are selected according to the results of our proposed diffusion model, developed by analogy to a diffusion model on a porous medium. Moreover, we propose to characterise the typical availability of a torrent observed on the P2P system, by using an appropriate neural network. Then, the selection of fragments to spread aims at counteracting their decreasing availability estimated for a later time. Therefore, the proposed work aims at supporting Quality of Service and dependability of P2P systems by attributing a priority on both the fragment to spread and the destination peer. This in turn increases availability and performances [9], [10], [11], as well as consistency [1]. The rest of the paper is organised as follow. Next section provides the mathematical representation for the proposed model. Section III develops the model for the diffusion of contents on a P2P system. Section IV introduces the neural network that predicts the user behavious. Section V describes some experiments based on our proposed model and neural network predictions, as well as the preliminary results. Section VI compares with related work, and finally conclusions are drawn in Section VII. II. M ATHEMATICAL R EPRESENTATION In order to put forward our analogy between BitTorrent and a physical system, some conventions must be chosen and some extrapolations are needed. We first describe a continuum system using a continuum metric, however later on we will single out a few interesting discrete points of the continuum. Due to the analogy to BitTorrent, we use a distance metric (named ฮด), which will be assimilated to the network latency among nodes, i.e. the hosts on a network holding seeds, peers or leeches. For the nodes we use notations ni or niฮฑ : the first indicates a generic i-esime node on the BitTorrent network, the second indicates the ฮฑ-esime node as seen from the i-esime node. Of course, niฮฑ and njฮฑ could be different nodes if i 6= j. Double indexing is needed since when we use something like ฮด ij , it will be representing the distance of the j-esime node as measured by the i-esime node. Moreover, let us express Pkij as the probability of diffusion of the k-esime file fragment from the i-esime node to the j-esime node. Finally, we distinguish between time and time steps: the first will be used for a continuum measure of temporal intervals and we will use for it the latin letter t, the second will indicate computational time steps (e.g. the steps of an iterative cycle) and we will use for it the greek letter ฯ„ . Therefore, while ฮด ij (t) will represent the continuous evolution during time t of the network latency ฮด, which is measured by the i-esime node for the distance with the j-esime node, the notation ฮด ij (ฯ„ ) will represent the latency measured at the ฯ„ -esime step, i.e. the time taken by a ping from the i-esime node to the j-esime node, only for a specific time step ฯ„ . Finally, we will suppose that each node has the fragment zk of a file z and is interested in sharing or obtaining other portions of the same file, hence we will compute the probabilitylike function that expresses how easily the k-esime shared fragment is being copied from the i-esime node to the jesime node at a certain step ฯ„ and we will call it Pkij (ฯ„ ). Eventually, we are interested in an analytical computation for the urgency to share a fragment zk from ni to nj during a time set ฯ„ , and we will call it ฯ‡i,j k (ฯ„ ). In the following sections we will distinguish between an actually measured value and a value predicted by a neural network using a tilde for predicted values as in xฬƒ. III. F RAGMENTS DIFFUSION ON A P2P NETWORK In our work we compare the file fragments of a shared file to the diffusion of mass through a porous means. To embrace this view, it is mandatory to develop some mathematical tools, which we will explain in the following. A. Spaces and metrics Users in a P2P BitTorrent network can be represented as elements of a space where a metric could be given by the corresponding network communication latency. Therefore, for each node ni โˆˆ N , set of the nodes, it is possible to define a function ฮด : N ร— N โ†’ R / ฮด(ni , nj ) = ฮด ij โˆ€ ni , nj โˆˆ N (1) where ฮด ij is the amount of time taken to bring a minimum amount of data (e.g. as for a ping) from ni to nj . By using the given definition of distance, for each node ni , it is also possible to obtain an ordered list โ„ฆi so that n o|N | โ„ฆi = niฮฑ โˆˆ N : ฮด(ni , niฮฑ ) โ‰ค ฮด(ni , niฮฑ+1 ) (2) ฮฑ=0 In such a way, the first item of the list will be ni0 = ni and the following items will be ordered according to their network latency as measured by ni . Using this complete ordering of peers, it is possible to introduce the concept of content permeability and diffusion. Let us consider the files shared by one user of a P2P system: each file consists of fragments that can be diffused. Then, the diffusion of a file fragment can be analysed in terms of Fickโ€™s law. B. Fickโ€™s law and its use for P2P Fickโ€™s second law is commonly used in physics and chemistry to describe the change of concentration per time unit of some element diffusing into another [21]. This work proposes an analogy between a P2P system and a physical system. The key idea is to model the sharing file fragments as the diffusion of a substance into a porous means along one dimension. Different places of the porous means would represent different P2P nodes, whereas distances along such a one-dimension would be proportional to the network latencies. Then, P2P entities would be accommodated into the formalism of equations (1) and (2). Using both the First and Second Fickโ€™s laws, the diffusion of a substance into a means is given as the solution of the following vectorial differential equation โˆ‚ฮฆ = โˆ‡ ยท (Dโˆ‡ฮฆ) (3) โˆ‚t where ฮฆ is the concentration, t the time and D the permeability of the means to the diffusing matter. Since this is a separable equation and we use a 1โ€“dimensional metric based on the distance ฮด, and assuming D as constant among the nodes, equation (3) can be written as a scalar differential equation โˆ‚2ฮฆ โˆ‚ฮฆ =D 2 (4) โˆ‚t โˆ‚ฮด This partial differential equation, once imposed the initial and boundaries conditions, admits at least Greenโ€™s Function as a particular solution [2]. Greenโ€™s Function lets us study the diffusion dynamics of a single substance and can be rewritten as solution of the equation (4) in the form:  ฮด  1 ฮฆ(ฮด, t) = ฮฆ0 ฮ“ โˆš (5) , ฮฆ0 = โˆš 4Dt 4ฯ€Dt where ฮ“ is the complementary gaussian error function. ฮ“ function should then be computed by means of a Taylor expansion. However, to avoid such a computationally difficult task, we use an approximation proposed in [6], where a pure exponential approximation for ฮ“(x) has been obtained, having an error on the order of 10โˆ’9 . Then, it is possible to have the following equation h i ๏ฃฑ 2 2 4 1 1 ๏ฃด ๏ฃฒ ฮฆ(ฮด, t) โ‰ˆ ฮฆ0 6 e(ฮฆ0 ฮด) + 2 eโˆ’ 3 (ฮฆ0 ฮด) (6) ๏ฃด ๏ฃณ โˆ’ 12 ฮฆ0 = (4ฯ€Dt) for every node at a certain distance ฮด โˆˆ R+ at a time t โˆˆ R+ . C. From concentration to probability In equation (6) the scaling factor ฮฆ0 is a function of the time t. On the other hand, the used formalism was developed mainly to focus on the distance ฮด and managing t merely as a parameter. The above mathematical formalism is valid as long as the distances ฮด(ni , nj ) remain time-invariant. The common practice considers the distance between nodes ฮด as time-invariant, however the actual network latencies vary (almost) continuously, with time, and a stationary โ„ฆi ordered set is a very unlikely approximation for the network. In our solution, we make time-dependent the latency embedded into our model. In turn, this makes it possible to choose different fragments to be shared as time goes. For the P2P system, the equation (6) states that a certain file fragment zki in a node ni at a time t0 has a probability Pkij (t0 , t) to be given (or diffused) to node nj , at a distance ฮด ij (t0 ) from ni , within a time t, which is proportional to the ฮฆ(ฮด, t) so that   ij 2 ij 2 1 โˆ’ 43 (pij 1 (pij k ฮด ) + k ฮด ) Pkij (t0 , t) = pij e e (7) k 6 2 ij where the function pij k = pk (t0 , t) carries both the diffusion factors and the temporal dynamics. And since we are interested in a simple proportion, not a direct equation, we can also neglect the factor 4ฯ€ and then write pij k in the normalised form 1 1 1 (8) ยทp ยทโˆš pij k (t, t0 ) = โˆš t 4ฯ€ Dk (t0 ) It is now important to have a proper redefinition of the coefficient D. Let us say that Tk is the number of users using file fragment zk (whether asking or offering it), Sk is the number of seeders for the file fragment and ฯk is the mean share ratio of the file fragment among peers (and leeches), then it is possible to consider the โ€™urgeโ€™ to share the resource as an osmotic pressure which, during time, varies the coefficient of permeability of the network D. In order to take into account the mutable state in a P2P system, D should vary according to the amounts of available nodes and file fragments. We have chosen to define D as Dk (t0 ) , Tk (t0 ) Sk (t0 ) + [Tk (t0 ) โˆ’ Sk (t0 )] ฯk (t0 ) (9) by a formal substitution of D with Dk in ฮฆ0 , we obtain the analytical form of the term pij k. D. Discrete time evolution on each node Indeed, the physical nature of the adopted law works in the entire variable space, however for the problem at hand discrete-time simplifications are needed. Let us suppose that for a given discrete time step ฯ„ = 0 node ni effectively measures the network latencies of a set of nodes {nj }, then an ordered set โ„ฆi as in equation (2) is computed. Now, every node ni computes probability Pkij for each of its own file fragment zk and for every node nj . This probability corresponds to a statistical prevision of the possible file fragments spreading onto other nodes. Suppose that for a while no more measures for ฮด have been taken, and at a later discrete time step ฯ„ file fragment zki be copied to the first node to be served, which is chosen according to the minimum probability of diffusion, latencies and time since last measures were taken (see following subsection and equation (12)). Moreover, such a file fragment is reaching other nodes if the latency for such nodes is less than time ti , computed as tik (ฯ„ ) = ฯ„ X ฮฑk =0 ฮด(n i , niฮฑ ) (10) Index k is used in equation (10) to refer to file fragment zki . Indeed, since nodes need and offer their own file fragments, the ordered set of nodes referred by a given node depend on resource zk , i.e. โ„ฆik = {niฮฑk }. It is now possible to have a complete mapping of the probability of diffusion by reducing the time dependence from (t0 , t) to a single variable dependence from the discrete time-step ฯ„ . For each resource zk as Pkij (ฯ„ ) stated that it is possible to reduce Dk (t0 , t) to a one-variable function Dk (ฯ„ ) by assuming that at t0 we have ฯ„ = 0 and considering only the values of Dk (t0 , t) when t is the execution moment of a computational step ฯ„ . E. Assigning priorities and corrections Once all the Pkij (ฯ„ ) have been computed, and values stored to a proper data structure, it is actually simple to determine the most urgent file fragment to share, which is the resource that has the least probability to be spread, i.e. the k for which Pkij (ฯ„ ) is minimum. Furthermore, we consider that while time goes on an old measured ฮด differs from the actual value, hence the measure becomes less reliable. To take into account the staleness of ฮด values, we gradually consider less bound to ฮด the choice of a fragment, and this behaviour is provided by the negative exponential in equation (11). Given enough time, the choice will be based only on the number of available fragments. However, we consider that by that time a new value for ฮด would have been measured and incorporated again into the model choosing the fragment. Generally, for nodes having the highest latencies with respect to a given node ni , more time will be needed to receive a fragment from the node ni . We aim at compensating such a delay by incorporating into our model the inescapable latencies of a P2P network. Therefore, the node that will receive a fragment first will be chosen according to its distance. In order to model the fact that distant nodes, having the highest values for ฮด, will take more time to send or receive file fragments, we have chosen a decay law. Now it is possible to obtain a complete time-variant analytical form of the spreading of file fragments ฯ‡ij k (ฯ„ ) = eโˆ’cฯ„ ฮด ij Pkij (ฯ„ ) (11) where the decay constant c can be chosen heuristically, without harming the said law, and tuned according to other parameters. If k indicates a file fragment and k โˆ— the index of the most urgent file fragment to share, this latter is trivially found as the solution of a maximum problem so that n o ij k โˆ— : ฯ‡ij (12) kโˆ— (ฯ„ ) = max ฯ‡k (ฯ„ ) k Of course, all the priorities depend on the value of the bidimensional matrix of values of Pkij (we mark that the index An innovative neuro-wavelet method for reconstruction of photometric data 7 1.728 step of the series, a set of coefficients di and residuals ai , and so that x 10 Original signal Forward reconstruction Backward reconstruction Midpoint reconstruction 1.727 Wฬ‚i [aiโˆ’1 (ฯ„ )] = [di (ฯ„ ), ai (ฯ„ )] 1.726 Topology of the WRNN Corrected Flux [ADU] 1.725 Figure 1. 7 โˆ€ i โˆˆ [1, M ] โˆฉ N (13) where we intend a0 (ฯ„ ) = x(ฯ„ ). The input set can then be represented as an N ร— (M + 1) matrix of N time steps of a M level wavelet decomposition, where the ฯ„ -esime row represents the ฯ„ -esime time step as the decomposition 1.724 Mid Point Forward NNET 1.723 1.722 Backward NNET 1.721 u(ฯ„ ) = [d1 (ฯ„ ), d2 (ฯ„ ), . . . , dM (ฯ„ ), aM (ฯ„ )] (14) i does not variate within the same node n ). Among these Each row of this dataset is given as input value to the values, there is no need to compute elements where j = i M input neurons of the proposed WRNN (Figure 1). The j and for those elements where the node n is not in the queue ij properties of this network make it possible, starting from for resource zk . In both these cases it is assumed Pk = 1. an input at a time step ฯ„n , (right) to predict the effective number Fig. 4. Neural networks structures (left), Forward and Backward reconstruction i Moreover, after n having completed to transfer zk to the of requests (or offers) at a time step ฯ„n+r . In this way the j node n , the element of indexes (j, k) is set to 1. In a similar WRNN acts like a functional fashion, each peer is able to identify a possible resource to ask for in order to maximize the diffusion of rare ones Nฬ‚ [u(ฯ„ (15) n )] = xฬƒ(ฯ„ becauseones. wavelets do not verify some basic properties such as the absence of n+r ) instead this of common local minima, and does not provide by itself a su๏ฌƒciently response where r is graded the number of time[17]. steps of forecast in the future the existent rangeAND of possible transfer functions some particular andonly xฬƒ the predicted serie. classes IV.InWRNN PREDICTORS U SERS BEHAVIOR i 1.72 1.719 0 0.05 0.1 0.15 0.2 0.25 Time [Julian Days] 0.3 0.35 0.4 0.45 approximate the functional form of a wavelet. In this work the radial basis func- In order make thewere P2P chosen system able to properly reB. Predicted behaviour tionsto(radbas) as transfer functions, indeed this user particular kind of act to peaks of requests, as well as very fast changes by even equation (15), it is then possible to functions well describes in first approximation halfAsof described a wavelet, if these of fragments availability and/or share ratio, we propose obtain future prediction the number of requests for functions do not verify the properties shown by (1) and a(2). Anyway, afterofscalan innovative solution based on Wavelet Recurrent Neural a specific torrent, as well as its ing, shift and chosen activation it is possible to obtainavailability in the future. Networks (WRNN) to repetition characteriseofthethe user behaviour and function, + fact, by considering both the predicted xฬƒk (ฯ„n+r ) and In several mother forecast. wavelet For filters. Let ftorrent, : [โˆ’1;the 1] โ†’ R to be the choosen transfer producing a short-term a given the modeled ฯ‡k (ฯ„n+r ), it is possible, at a time step ฯ„n , function, then wavelet analysis provides compression and denoising on to take counteracting actions and improve the probability the observed time series of the amount of!users prividing diffusion + f (2x + 1) x of โˆˆ [โˆ’ 1 , 0 ]for a rare torrent. This is achieved, in practice, or requesting fragments; fหœ(x) a=proper fหœ(x +recurrent 2k) = neural network โˆ€k values โˆˆ Z for Dk(4) by using (ฯ„n+r ), which account for โˆ’ f (2x โˆ’ 1) x โˆˆ [ 0 , 1altered ] (RNN), trained with the said observed time series, provides the forecast of future time steps. Such modified values are well-timed estimations of future data. The ensamble of the computed by ourfor WRNN, e.g. in a computing node of a verifies all the properties of a wavelet function. it is possible the selected said wavelet analysis and RNN is called WRNN [5], [15], Socloud. Therefore, predicted values neural networks to for simulate a wavelet by that using the radbas function defined in for Tk (ฯ„n+r ), Sk (ฯ„n+r ) [16] and provides forecasts the number of users and ฯk (ฯ„n+r ) are sent to each node acting as a peer. thea[โˆ’1; 1] realSeveral domain. It isnetworks indeed possible that will share fragment. neural have beento verify Each time a new torrent becomes shared on the P2P employed to find polaritons propagation " 2k+1 and metal thicknetwork, then a new WRNN is created and trained on ness correspondence [3]; to predict the behaviour a cloud system, to provide fหœ(x) dx of = users 0 โˆ€ h <a kserver, โˆˆ Z e.g. requested from (5) requesting resources [17], to perform wavelet transform in 2h+1 predictions related to the availability and peers of the novel a recursive lifting procedure [4], [20]. set of shared fragments for that torrent. The predictions will It was shown that, in order to simulate a wavelet function, the chosen transfer be sent to the peers periodically, and allow peers to update functions wavelet. Thisupdate is thefrequency can be tuned in A. WRNN setup must be symmetrically periodical to emulate the valuesa of Dk (ฯ„ ). The reason for choosing a pair number of neurons in the aim to have the same number order to correctly match the dynamic of hosts. For this work, the initial datasets consists of a time series of positive weights in theorreconstruction layer. Theoretically, representing requestsand for negative a torrent,layer coming from peers, V. E XPERIMENTS if this happens, then the neuron of the exactly given declaration of availability for the torrentpairs coming fromsecond layer are emulating a reconstruction filter. Althoug this was a theoretical schema, there are both peers and seeds. Independently of the specificities of As shown in Figure 2, strong for the initial condition of the reasons for this theseries weights, thisฯ„ experimental to havesome a non-zero sum, for a torrent happen to such data, let us call x(ฯ„ ), in where is the discrete setup, P2P system file fragments because neuralwith network beyond perform the inverse wavelet transform time step of data,the sampled intervals of onetohour. A be heterogeneously spread among peers (e.g. no one shares biorthogonal of the time series has fragment n. 2, and very few nodes have fragment n. 5). We must wavelet performdecomposition also the signal prediction. been computed to obtain the correct input set for the WRNN as required by the devised architecture shown in Figure 1. This decomposition can be achieved by applying the wavelet transform as a recursive couple of conjugate filters in such a way that the i-esime recursion Wฬ‚i produces, for any time report a simulation comprising 11 peers and 5 file fragments, and an evolution in only 5 time steps. In the order, step after step, peer n0 selects file fragment z4 and sends this to peer n10 . Both the fragment to spread and the destination peer have been chosen according to equation (12). i In order: the initial condition (white cells represent the fragments), the normalised ฯ‡ij k (ฯ„ ) for a certain node n at different time steps ฯ„ VI. R ELATED W ORK Several studies have analysed the behaviour of BitTorrent systems from the point of view of fairness, i.e. how to have users contribute with contents that can be uploaded by other users, levelling the amount of downloads with that of upload. Fewer works have studied the problem of unavailability of contents in P2P BitTorrent networks. In [19], authors proposed to order peers according to their 1 0.8 1 ( 3 ) 2 ( 3 ) 3 ( 3 ) 0.6 ( ) Later on, as soon as possible, peer n0 selects another fragment, i.e. z3 to spread. Such a fragment could be send just after the transfer of the previous fragment has been completed, or concurrently to the first transmission. The shown evolution does not consider that the file fragment could have been passed, e.g., to node n10 , and so that for the next time step the value of ฯ‡ for n10 would drop to zero. Note that the highest values of ฯ‡ are an indication of the urgency of receiving a fragment. The described model and formula allow subsequent sharing activities, after the initial time steps, to be determined, in terms of which fragments should be sent. Figure 2 shows that after the first time steps it becomes more and more urgent for node n0 to obtain the missing fragments z2 and z5 . It is possible to see that the highest priority is for fragment z2 since its share ratio and the relative availability are very low with respect to fragment z5 . This was the expected behaviour of the developed model. For the simulation shown in Figure 2, all fragments, except z2 since it is actually unavailable, would be spread to peers in a very low number of time steps. Figure 3 shows the decay of several computed ฯ‡ for different peers requiring fragment number 3. On the long run, this law will benefit nearby nodes, while on the short term, distant nodes are given the highest priority. j 3 Figure 2. 0.4 0.2 0 1 Figure 3. 2 3 4 5 6 7 8 9 10 Time decay of normalised ฯ‡jk (ฯ„ ) for increasing time steps ฯ„ uploading bandwidth, hence when providing contents the selection of peers is performed accordingly. One of the mechanism proposed to increase files availability has been to use multi-torrent, i.e. for ensuring fairness, instead of forcing users stay longer, they provide their contribution to uploaders for fragments belonging to different files [12]. Similarly, in [13] authors show that by using multi-torrent availability can be easily increased, and confirm that fast replication of rare fragments is essential. Furthermore, bundling, i.e. the dissemination of a number of related files together, has been proposed to increase availability [14]. The above proposed mechanisms differ from our proposal, since we take into account several novel factors: the dynamic of data exchange between distant peers, a decay for the availability of peers, and the forecast of contents availability. Such factors have been related into a proposed model that manages to select the rarest content to be spread taking into account the future availability, and the peers that should provide and take such a content. VII. C ONCLUSIONS This paper proposed to improve availability of fragments on a P2P system by adopting a mathematical model and a neural network. The former describes the fragments diffusion and the urgency to share fragments, whereas the latter provides an estimation of the availability of peers, and hence fragments, at later time. By using the estimate of future availability into the diffusion model, we can select the fragments that need to be spread to counteract their disappearance due to users disconnections. ACKNOWLEDGMENT This work has been supported by project PRISMA PON04a2 A/F funded by the Italian Ministry of University and Research within PON 2007-2013 framework. R EFERENCES [1] F. Bannoฬ€, D. Marletta, G. Pappalardo, and E. Tramontana. Tackling consistency issues for runtime updating distributed systems. In Proceedings of International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), pages 1โ€“8. IEEE, 2010. DOI: 10.1109/IPDPSW.2010.5470863. [2] B. S. Bokshtein, M. I. Mendelev, and D. J. Srolovitz. Thermodynamics and kinetics in materials science: a short course. Oxford University Press Oxford, 2005. [3] F. Bonanno, G. Capizzi, G. Lo Sciuto, C. Napoli, G. Pappalardo, and E. Tramontana. A cascade neural network architecture investigating surface plasmon polaritons propagation for thin metals in openmp. In Proceedings of Artificial Intelligence and Soft Computing, volume 8467, pages 22โ€“33. Springer, 2014. [4] G. Capizzi, C. Napoli, and F. Bonanno. Innovative secondgeneration wavelets construction with recurrent neural networks for solar radiation forecasting. IEEE Transactions on Neural Networks and Learning Systems, 23(11):1805โ€“1815, 2012. [5] G. Capizzi, C. Napoli, and L. Paternoฬ€. An innovative hybrid neuro-wavelet method for reconstruction of missing data in astronomical photometric surveys. In Artificial Intelligence and Soft Computing, pages 21โ€“29. Springer, 2012. [6] M. Chiani, D. Dardari, and M. K. Simon. New exponential bounds and approximations for the computation of error probability in fading channels. IEEE Transactions on Wireless Communications, 2(4):840โ€“845, July 2003. [9] R. Giunta, F. Messina, G. Pappalardo, and E. Tramontana. Augmenting a web server with QoS by means of an aspectoriented architecture. In Proceedings of WETICE, pages 179โ€“ 184. IEEE, 2012. DOI: 10.1109/WETICE.2012.105. [10] R. Giunta, F. Messina, G. Pappalardo, and E. Tramontana. Providing qos strategies and cloud-integration to web servers by means of aspects. Concurrency and Computation: Practice and Experience, 2013. DOI:10.1002/cpe.3031. [11] R. Giunta, F. Messina, G. Pappalardo, and E. Tramontana. Kaqudai: a dependable web infrastructure made out of existing components. In Proceedings of WETICE, pages 146โ€“151. IEEE, 2013. DOI:10.1109/WETICE.2013.47. [12] L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, and X. Zhang. Measurements, analysis, and modeling of bittorrent-like systems. In Proceedings of ACM SIGCOMM conference on Internet Measurement. USENIX Association, 2005. [13] S. Kaune, R. C. Rumin, G. Tyson, A. Mauthe, C. Guerrero, and R. Steinmetz. Unraveling bittorrentโ€™s file unavailability: Measurements and analysis. In Proceedings of P2P, pages 1โ€“9. IEEE, 2010. [14] D. S. Menasche, A. A. Rocha, B. Li, D. Towsley, and A. Venkataramani. Content availability and bundling in swarming systems. In Proceedings of Co-NEXT, pages 121โ€“ 132. ACM, 2009. [15] C. Napoli, F. Bonanno, and G. Capizzi. Exploiting solar wind time series correlation with magnetospheric response by using an hybrid neuro-wavelet approach. In Advances in Plasma Astrophysics, number S274 in Proceedings of the International Astronomical Union, pages 250โ€“252. Cambridge University Press, 2010. [16] C. Napoli, F. Bonanno, and G. Capizzi. An hybrid neurowavelet approach for long-term prediction of solar wind. In Advances in Plasma Astrophysics, number S274 in Proceedings of the International Astronomical Union, pages 247โ€“249. Cambridge University Press, 2010. [17] C. Napoli, G. Pappalardo, and E. Tramontana. A hybrid neuroโ€“wavelet predictor for qos control and stability. In AI*IA 2013: Advances in Artificial Intelligence, volume 8249, pages 527โ€“538. Springer, 2013. [18] G. Novelli, G. Pappalardo, C. Santoro, and E. Tramontana. A grid-based infrastructure to support multimedia content distribution. In Proceedings of UPGRADE-CN, pages 57โ€“64. ACM, 2007. DOI: 10.1145/1272980.1272983. [19] D. Qiu and R. Srikant. Modeling and performance analysis of bittorrent-like peer-to-peer networks. SIGCOMM Computer Communication Review, 34(4):367โ€“378, 2004. [7] B. Cohen. Incentives build robustness in bittorrent. In Workshop on Economics of Peer-to-Peer systems, volume 6, pages 68โ€“72, 2003. [20] W. Sweldens. The lifting scheme: A construction of second generation wavelets. Journal on Mathematical Analysis, 29(2):511โ€“546, 1998. [8] R. Giunta, F. Messina, G. Pappalardo, L. Toscano, and E. Tramontana. Testing Replica Selection Policies in a PanEuropean Grid VO. In Proceedings of WETICE, pages 210โ€“ 215. IEEE, June 2008. DOI: 10.1109/WETICE.2008.48. [21] J. L. Vaฬzquez. The Porous Medium Equation: Mathematical Theory: Mathematical Theory. Oxford University Press, 2006.
9cs.NE
IEEE TRANSACTIONS ON INFORMATION THEORY 1 Sum-networks from incidence structures: construction and capacity analysis arXiv:1611.01887v2 [cs.IT] 29 Jan 2018 Ardhendu Tripathy, Student Member, IEEE, and Aditya Ramamoorthy, Member, IEEE Abstractโ€”A sum-network is an instance of a function computation problem over a directed acyclic network in which each terminal node wants to compute the sum over a finite field of the information observed at all the source nodes. Many characteristics of the well-studied multiple unicast network communication problem also hold for sum-networks due to a known reduction between the two problems. In this work, we describe an algorithm to construct families of sum-network instances using incidence structures. The computation capacity of several of these sumnetwork families is evaluated. Unlike the coding capacity of a multiple unicast problem, the computation capacity of sumnetworks depends on the characteristic of the finite field over which the sum is computed. This dependence is very strong; we show examples of sum-networks that have a rate-1 solution over one characteristic but a rate close to zero over a different characteristic. Additionally, a sum-network can have arbitrarily different computation capacities for different alphabets. Index Termsโ€”network coding, function computation, sumnetworks, characteristic, incidence structures I. I NTRODUCTION Applications as diverse as parallel processing, distributed data analytics and sensor networks often deal with variants of the problem of distributed computation. This has motivated the study of various problems in the fields of computer science, automatic control and information theory. Broadly speaking, one can model this question in the following manner. Consider a directed acyclic network with its edges denoting communication links. A subset of the nodes observe certain information, these nodes are called sources. A different subset of nodes, called terminals, wish to compute functions of the observed information with a certain fidelity. The computation is carried out by the terminals with the aid of the information received over their incoming edges. The demand functions and the network topology are a part of the problem instance and can be arbitrary. This framework is very general and encompasses several problems that have received significant research attention. Prior work [1], [2], [3] concerning information theoretic issues in function computation worked under the setting of correlated information observed at the sources and simple network structures, which were simple in the sense that there were edges connecting the sources to the terminal without any intermediate nodes or relays. For instance, [2] characterizes This work was supported in part by the National Science Foundation (NSF) under grants CCF-1149860, CCF-1320416 and CCF-1718470. The material in this work has appeared in part at the 52nd Allerton Conference on Communication, Control and Computing, 2014 and the 2015 IEEE International Symposium on Information Theory. The authors are with the Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, 50011 USA. e-mail: {[email protected], [email protected]} the amount of information that a source must transmit so that a terminal with some correlated side-information can reliably compute a function of the message observed at the source and the side-information. Reference [3] considered distributed functional compression, in which two messages are separately encoded and given to a decoder that computes a function of the two messages with an arbitrarily small probability of error. With the advent of network coding [4], [5], the scope of the questions considered included the setting in which the information observed at the sources is independent and the network topology is more complex. Under this setting, information is sent from a source to a terminal over a path of edges in the directed acyclic network with one or more intermediate nodes in it, these relay nodes have no limit on their memory or computational power. The communication edges are abstracted into error-free, delay-free links with a certain capacity for information transfer and are sometimes referred to as bit-pipes. The messages are required to be recovered with zero distortion. The multicast scenario, in which the message observed at the only source in the network is demanded by all terminals in the network, is solved in [4], [5], [6]. A sufficient condition for solvability in the multicast scenario is that each terminal has a max-flow from the source that is at least the entropy rate of the message random process [4]. Reference [6] established that linear network codes over a sufficiently large alphabet can solve this problem and [5] provided necessary and sufficient conditions for solving a multicast problem instance in an algebraic framework. The work in [5] also gave a simple algorithm to construct a network code that satisfies it. Unlike the multicast problem, the multiple unicast problem does not admit such a clean solution. This scenario has multiple source-terminal pairs over a directed acyclic network of bit-pipes and each terminal wants to recover the message sent by its corresponding source with the help of the information transmitted on the network. To begin with, there are problem instances where more than one use of the network is required to solve it. To model this, each network edge is viewed as carrying a vector of n alphabet symbols, while each message is a vector of m alphabet symbols. A network code specifies the relationship between the vector transmitted on each edge of the network and the message vectors, and it solves a network coding problem instance if m = n. It is shown that linear network codes are in general not sufficient to solve this problem [7]. One can define the notion of coding capacity of a network as the supremum of the ratio m/n over all network codes that allow each terminal to recover its desired message; this ratio m/n for a particular network code is called IEEE TRANSACTIONS ON INFORMATION THEORY its rate. The coding capacity of a network is independent of the alphabet used [8]. While a network code with any rational rate less than the coding capacity exists by definition and zero-padding, a network code with rate equal to coding capacity does not exist for certain networks, even if the coding capacity is rational [9]. The multi-commodity flow solution to the multiple unicast problem is called a routing solution, as the different messages can be interpreted as distinct commodities routed through the intermediate nodes. It is well-known that in the case of multicast, network coding can provide a gain in rate over traditional routing of messages that scales with the size of the network [10]. However, evaluating the coding capacity for an arbitrary instance of the network coding problem is known to be hard in general [11], [12], [13], [14]. Expanding the scope of the demands of the terminals, [15] considered function computation over directed acyclic networks with only one terminal; the value to be recovered at the terminal was allowed to be a function of the messages as opposed to being a subset of the set of all messages. This computation is performed using information transmitted over the edges by a network code. Analogous to the coding capacity, a notion of computation capacity can be defined in this case. A rate-m/n network code that allows the terminal to compute its demand function has the interpretation that the function can be computed by the terminal m times in n uses of the network. Cut-set based upper bounds for the computation capacity of a directed acyclic network with one terminal were given in [15], [16]. A matching lower bound for function computation in tree-networks was given in [15] and the computation capacity of linear and non-linear network codes for different classes of demand functions was explored in [17]. A different flavor of the function computation problem, often called the sum-network problem, considers directed acyclic networks with multiple terminals, each of which demands the finite-field sum of all the messages observed at the sources [18], [19]. Reference [20] characterized the requirements that sum-networks with two or three sources or terminals must satisfy so that each terminal can recover the sum at unit rate. Similar to the network coding scenario, a sum-network whose terminals are satisfied by a rate-1 network code are called solvable sum-networks. Reference [19] established that deciding whether an arbitrary instance of a sum-network problem instance is solvable is at least as hard as deciding whether a suitably defined multiple unicast instance is solvable. As a result of this reduction the various characteristics of the solvability problem for network coding instances are also true for the solvability problem for sum-networks; this establishes the broadness of the class of sum-networks within all communication problems on directed acyclic networks. While solvable sum-networks and solvable network coding instances are intimately related, the results in this paper indicate that these classes of problems diverge when we focus on coding/computation capacity, which can be strictly less than one. In [8, Section VI], the coding capacity of networks is shown to be independent of the finite field chosen as the alphabet for the messages and the information transmitted over the edges. We show that an analogous statement is not true 2 for sum-networks by demonstrating infinite families of sumnetwork problem instances whose computation capacity vary depending on the finite field alphabet. Moreover, the gap in computation capacity on two different finite fields is shown to scale with the network size for certain classes of sumnetworks. For two alphabets F1 , F2 of different cardinality and a network N , the authors in [8, Theorem VI.5] described a procedure to simulate a rate-m2 /n2 network code on F2 for N using a rate-m1 /n1 network code on F1 for the same network, such that m2 /n2 โ‰ฅ (m1 /n1 ) โˆ’  for any  > 0. That procedure does not apply for sum-networks. Along the lines of the counterexample given in [20] regarding minimum maxflow connectivity required for solvability of sum-networks with three sources and terminals, we provide an infinite family of counterexamples that mandate certain value of max-flow connectivity to allow solvability (over some finite field) of a general sum-network with more than three sources and terminals. These sum-network problem instances are arrived at using a systematic construction procedure on combinatorial objects called incidence structures. Incidence structures are structured set systems and include, e.g., graphs and combinatorial designs [21]. We note here that combinatorial designs have recently been used to address issues such as the construction of distributed storage systems [22], [23] and coded caching systems [24]โ€“[26]. This paper is organized as follows. Section II describes previous work related to the problem considered and summarizes the contributions. Section III describes the problem model formally and Section IV describes the construction procedure we use to obtain the sum-network problem instances considered in this work. Section V gives an upper bound on the computation capacity of these sum-networks and Section VI describes a method to obtain linear network codes that achieve the upper bound on rate for several families of the sum-networks constructed. Section VII interprets the results in this paper and outlines the key conclusions drawn in this paper. Section VIII concludes the paper and discusses avenues for future work. II. BACKGROUND , R ELATED W ORK AND S UMMARY OF C ONTRIBUTIONS The problem setting in which we will work is such that the information observed at the sources are independent and uniformly distributed over a finite field alphabet F. The network links are error-free and assumed to have unit-capacity. Each of the possibly many terminals wants to recover the finite field sum of all the messages with zero error. This problem was introduced in the work of [18]. Intuitively, it is reasonable to assume the network resources, i.e., the capacity of the network links and the network structure have an effect on whether the sum can be computed successfully by all the terminals in the network. Reference [20] characterized this notion for the class of sum-networks that have either two sources and/or two terminals. For this class of sum-networks it was shown that if the source messages had unit-entropy, a max-flow of one between each source-terminal pair was enough to solve the problem. It was shown by means of IEEE TRANSACTIONS ON INFORMATION THEORY a counterexample that a max-flow of one was not enough to solve a sum-network with three sources and terminals. However, it was also shown that a max-flow of two between each source-terminal pair was sufficient to solve any sumnetwork with three sources and three terminals. Reference [27] considered the computation capacity of the class of sumnetworks that have three sources and three or more terminals or vice versa. It was shown that for any integer k โ‰ฅ 2, there exist three-source, n-terminal sum-networks (where n โ‰ฅ 3) whose k . The work most closely related computation capacity is k+1 to this paper is [28], which gives a construction procedure that for any positive rational number p/q returns a sumnetwork whose computation capacity is p/q. Assuming that p and q are relatively prime, the procedure described in [28]  constructs a sum-network that has 2q โˆ’ 1 + 2qโˆ’1 sources and 2 2qโˆ’1 2q+ 2 terminals, which can be very large when q is large. The authors asked the question if there exist smaller sumnetworks (i.e., with fewer sources and terminals) that have the computation capacity as p/q. Our work in [29] answered it in the affirmative and proposed a general construction procedure that returned sum-networks with a prescribed computation capacity. The sum-networks in [28] could be obtained as special cases of this construction procedure. Some smaller instances of sum-networks for specific values were presented in [30]. Small sum-network instances can be useful in determining sufficiency conditions for larger networks. The scope of the construction procedure proposed in [29] was widened in [31], as a result of which, it was shown that there exist sum-network instances whose computation capacity depends rather strongly on the finite field alphabet. This work builds on the contributions in [29], [31]. In particular, we present a systematic algebraic technique that encompasses the prior results. We also include proofs of all results and discuss the implications of our results in depth. A. Summary of contributions In this work, we define several classes of sum-networks for which we can explicitly determine the computation capacity. These networks are constructed by using appropriately defined incidence structures. The main contributions of our work are as follows. โ€ข We demonstrate novel techniques for determining upper and lower bounds on the computation capacity of the constructed sum-networks. In most cases, these bounds match, thus resulting in a determination of the capacity of these sum-networks. โ€ข We demonstrate a strong dependence of the computation capacity on the characteristic of the finite field over which the computation is taking place. In particular, for the same network, the computation capacity changes based on the characteristic of the underlying field. This is unlike the coding capacity for the multiple unicast problem which is known to be independent of the network coding alphabet. โ€ข Consider the class of networks where every sourceterminal pair has a minimum cut of value at least ฮฑ, where ฮฑ is an arbitrary positive integer. We demonstrate that there exists a sum-network within this class (with a large 3 number of sources and terminals) whose computation capacity can be made arbitrarily small. This implies that the capacity of sum-networks cannot be characterized just by individual source-terminal minimum cuts. III. P ROBLEM FORMULATION AND P RELIMINARIES We consider communication over a directed acyclic graph (DAG) G = (V, E) where V is the set of nodes and E โІ V ร— V ร— Z+ are the edges denoting the delay-free communication links between them. The edges are given an additional index as the model allows for multiple edges between two distinct nodes. For instance, if there are two edges between nodes u and v, these will be represented as (u, v, 1) and (u, v, 2). Subset S โŠ‚ V denotes the source nodes and T โŠ‚ V denotes the terminal nodes. The source nodes have no incoming edges and the terminal nodes have no outgoing edges. Each source node si โˆˆ S observes an independent random process Xi , such that the sequence of random variables Xi1 , Xi2 , . . . indexed by time (denoted by a positive integer) are i.i.d. and each Xij takes values that are uniformly distributed over a finite alphabet F. The alphabet F is assumed to be a finite field with |F| = q and its characteristic denoted as ch(F). Each edge represents a communication channel of unit capacity, i.e., it can transmit one symbol from F per time slot. When referring to a communication link (or edge) without its third index, we will assume that it is the set of all edges between its two nodes. For such a set denoted by (u, v), we define its capacity cap(u, v) as the number of edges between u and v. We use the notation In(v) and In(e) to represent the set of incoming edges at node v โˆˆ V and edge e โˆˆ E. For the edge e = (u, v) let head(e) = v and tail(e) = u. Each terminal node t โˆˆ T demands thePsum (over F) of the individual source messages. Let Zj = {i:si โˆˆS} Xij for all j โˆˆ N (the set of natural numbers); then each t โˆˆ T wants to recover the sequence Z := (Z1 , Z2 , . . . ) from the information it receives on its incoming edges, i.e., the set In(t). A network code is an assignment of local encoding functions to each edge e โˆˆ E (denoted as ฯ†ฬƒe (ยท)) and a decoding function to each terminal t โˆˆ T (denoted as ฯˆt (ยท)) such that all the terminals can compute Z. The local encoding function for an edge connected to a set of sources only has the messages observed at those particular source nodes as its input arguments. Likewise, the input arguments for the local encoding function of an edge that is not connected to any source are the values received on its incoming edges and the inputs for the decoding function of a terminal are the values received on its incoming edges. As we consider directed acyclic networks, it can be seen that there is a global encoding function that expresses the value transmitted on an edge in terms of the source messages in the set X := {Xi : si โˆˆ S}. The global encoding function for an edge e is denoted as ฯ†e (X). The following notation describes the domain and range of the local encoding and decoding functions using two natural numbers m and n for a general vector network code. m is the number of i.i.d. source values that are encoded simultaneously by the local encoding function of an edge that emanates from IEEE TRANSACTIONS ON INFORMATION THEORY 4 1 a source node. n is the number of symbols from F that are transmitted across an edge in the network. Thus for such an edge e whose tail(e) = s โˆˆ S, the local encoding function is ฯ†ฬƒe (Xs1 , Xs2 , . . . , Xsm ) โˆˆ F n . We will be using both row and column vectors in this paper and they will be explicitly mentioned while defining them. If u is a vector, the uT represents its transpose. โ€ข Local encoding function for edge e โˆˆ E. 2 7 6 ฯ†ฬƒe : F m โ†’ F n if tail(e) โˆˆ S, ฯ†ฬƒe : F n| In(tail(e))| โ†’ F n if tail(e) โˆˆ / S. โ€ข 3 Decoding function for the terminal t โˆˆ T . ฯˆt : F n| In(t)| โ†’ F m . A network code is linear over the finite field F if all the local encoding and decoding functions are linear transformations over F. In this case the local encoding functions can be represented via matrix products where the matrix elements are from F. For example, for an edge e such that tail(e) โˆˆ / S, let c โˆˆ N be such that c = | In(tail(e))| and In(tail(e)) = {e1 , e2 , . . . , ec }. Also, let each ฯ†ei (X) โˆˆ F n be denoted as a column vector of size n whose elements are from F. Then the value transmitted on e can be evaluated as ฯ†e (X) = ฯ†ฬƒe (ฯ†e1 (X), ฯ†e2 (X), . . . , ฯ†ec (X)),  T = Me ฯ†e1 (X)T ฯ†e2 (X)T . . . ฯ†ec (X)T , where Me โˆˆ F nร—nc is a matrix indicating the local encoding function for edge e. For the sum-networks that we consider, a valid (m, n) fractional network code solution over F has the interpretation that the component-wise sum over F of m i.i.d. source symbols can be communicated to all the terminals in n time slots. Definition 1: The rate of a (m, n) network code is defined to be the ratio m/n. A sum-network is solvable if it has a (m, m) network coding solution for some m โˆˆ N. Definition 2: The computation capacity of a sum-network is defined as   m there is a valid (m, n) network code : sup for the given sum-network. n We use different types of incidence structures for constructing sum-networks throughout this paper. We now formally define and present some examples of incidence structures. Definition 3: Incidence Structure. Let P be a set of elements called points, and B be a set of elements called blocks, where each block is a subset of P. The incidence structure I is defined as the pair (P, B). If p โˆˆ P, B โˆˆ B such that p โˆˆ B, then we say that point p is incident to block B. In general B can be a multiset, i.e., it can contain repeated elements, but we will not be considering them in our work. Thus for any two distinct blocks B1 , B2 there is at least one point which is incident to one of B1 and B2 and not the other. We denote the cardinalities of the sets P and B by the constants v and b respectively. Thus the set of points and blocks can be indexed by a subscript, and we have that P = {p1 , p2 , . . . , pv }, and B = {B1 , B2 , . . . , Bb }. 4 5 Fig. 1. A pictorial depiction of the Fano plane. The point set P = {1, . . . , 7}. The blocks are indicated by a straight line joining their constituent points. The points 2, 4 and 6 lying on the circle also depict a block. Definition 4: Incidence matrix. The incidence matrix associated with the incidence structure I is a (0, 1)-matrix of dimension v ร— b defined as follows.  AI (i, j) := 1 0 if pi โˆˆ Bj , otherwise. Thus, incidence matrices can be viewed as general set systems. For example, a simple undirected graph can be viewed as an incidence structure where the vertices are the points and edges are the blocks (each block is of size two). Combinatorial designs [21] form another large and well-investigated class of incidence structures. In this work we will use the properties of t-designs which are defined next. Definition 5: t-design. An incidence structure I = (P, B) is a t-(v, k, ฮป) design, if โ€ข โ€ข โ€ข it has v points, i.e., |P| = v, each block B โˆˆ B is a k-subset of the point set P, and P and B satisfy the t-design property, i.e., any t-subset of P is present in exactly ฮป blocks. A t-(v, k, ฮป) design is called simple if there are no repeated blocks. These designs have been the subject of much investigation when t = 2; in this case they are also called balanced incomplete block designs (BIBDs). Example 1: A famous example of a 2-design with ฮป = 1 is the Fano plane I = (P, B) shown in Figure 1. Letting numerals denote points and alphabets denote blocks for this design, we can write: P = {1, 2, 3, 4, 5, 6, 7}, B = {A, B, C, D, E, F, G}, where A = {1, 2, 3}, B = {3, 4, 5}, C = {1, 5, 6}, D = {1, 4, 7}, E = {2, 5, 7}, F = {3, 6, 7}, G = {2, 4, 6}. The corresponding incidence matrix AI , with rows and columns arranged in numerical and alphabetical order, is IEEE TRANSACTIONS ON INFORMATION THEORY 5 shown below. ๏ฃฎ 1 ๏ฃฏ1 ๏ฃฏ ๏ฃฏ1 ๏ฃฏ AI = ๏ฃฏ ๏ฃฏ0 ๏ฃฏ0 ๏ฃฏ ๏ฃฐ0 0 0 0 1 1 1 0 0 1 0 0 0 1 1 0 1 0 0 1 0 0 1 0 1 0 0 1 0 1 0 0 1 0 0 1 1 ๏ฃน 0 1๏ฃบ ๏ฃบ 0๏ฃบ ๏ฃบ 1๏ฃบ ๏ฃบ. 0๏ฃบ ๏ฃบ 1๏ฃป 0 (1) It can be verified that every pair of points in P appears in exactly one block in B. There are some well-known conditions that the parameters of a t-(v, k, ฮป) design satisfy (see [21]). โ€ข For integer i โ‰ค t the number of blocks incident to any i-subset of P is the same. We let bi denote that constant. Then,     vโˆ’i kโˆ’i bi = ฮป / , โˆ€i โˆˆ {0, 1, 2, . . . , t}. (2) tโˆ’i tโˆ’i โ€ข We note that b0 is simply the total number of blocks denoted by b. Likewise, b1 represents the number of blocks that each point is incident to; we use the symbol ฯ to represent it. Furthermore, bt = ฮป. It follows that a necessary condition for the existence of   vโˆ’i a t-(v, k, ฮป) design is that kโˆ’i divides ฮป for all tโˆ’i tโˆ’i i = 1, 2, . . . , t. Counting the number of ones in the point-block incidence matrix for a particular design in two different ways, we arrive at the equation bk = vฯ. IV. C ONSTRUCTION OF A FAMILY OF SUM - NETWORKS Let [t] := {1, 2, . . . , t} for any t โˆˆ N. Our construction takes as input a (0, 1)-matrix A of dimension r ร— c. Definition 6: Notation for row and column of A. Let pi denote the i-th row vector of A for i โˆˆ [r] and Bj denote the j-th column vector of A for j โˆˆ [c] 1 . It turns out that the constructed sum-networks have interesting properties when the matrix A is the incidence matrix of appropriately chosen incidence structures. The construction algorithm is presented in Algorithm 1. The various steps in the algorithm that construct components of the sum-network G = (V, E) are described below. 1) Source node set S and terminal node set T : S and T both contain r+c nodes, one for each row and column of A. The source nodes are denoted at line 4 as spi , sBj if they correspond to the i-th row, j-th column respectively. The terminal nodes are also denoted in a similar manner at line 5. They are added to the vertex set V of the sumnetwork at line 6. 2) Bottleneck edges: We add r unit-capacity edges indexed as ei for i โˆˆ [r] in line 2 to the edge set E. Each edge ei corresponds to a row of the matrix A. We also add the required tail and head vertices of these edges to V . 1 A justification for this notation is that later when we use the incidence matrix (AI ) of an incidence structure I to construct a sum-network, the rows and columns of the incidence matrix will correspond to the points and blocks of I respectively. 3) Edges between S โˆช T and the bottleneck edges: For every i โˆˆ [r], we connect tail(ei ) to the source node corresponding to the row pi and to the source nodes that correspond to all columns of A with a 1 in the i-th row. This is described in line 8 of the algorithm. Line 9 describes a similar operation used to connect each head(ei ) to certain terminal nodes. 4) Direct edges between S and T : For each terminal in T , these edges directly connect it to source nodes that do not have a path to that particular terminal through the bottleneck edges. Using the notation for rows and columns of the matrix A, they can be characterized as in lines 12 and 15. Algorithm 1 SUM-NET-CONS Input: A. Output: G = (V, E). 1: Initialize V, E, S, T โ† ฯ†. 2: E โ† {ei : i โˆˆ [r]}. 3: V โ† {head(ei ), tail(ei ) : i โˆˆ [r]}. 4: S โ† {spi : i โˆˆ [r]} โˆช {sBj : j โˆˆ [c]}. 5: T โ† {tpi : i โˆˆ [r]} โˆช {tBj : j โˆˆ [c]}. 6: V โ† V โˆช S โˆช T . 7: for all i โˆˆ [r] do 8: E โ† E โˆช {(sBj , tail(ei )) : A(i, j) = 1; j โˆˆ [c]} โˆช {(spi , tail(ei ))}. 9: E โ† E โˆช {(head(ei ), tBj ) : A(i, j) = 1; j โˆˆ [c]} โˆช {(head(ei ), tpi )}. 10: end for 11: for all i โˆˆ [r] do 12: E โ† E โˆช {(spj , tpi ) : i 6= j; j โˆˆ [r]} โˆช {(sBj , tpi ) : A(i, j) = 0; j โˆˆ [c]}. 13: end for 14: for all j โˆˆ [c] do 15: E โ† E โˆช {(spi , tBj ) : A(i, j) = 0; i โˆˆ [r]} โˆช {(sBj0 , tBj ) : BjT Bj 0 = 0; j 0 โˆˆ [c]}. 16: end for 17: return G โ† (V, E). For an incidence structure I, let AI represent its incidence matrix. The sum-networks constructed in the paper are such that the matrix A used in the SUM-NET-CONS algorithm is either equal to AI or ATI for some incidence structure I. When A = AI , we call the sum-network constructed as the normal sum-network for I. Otherwise when A = ATI , we call the sum-network constructed as the transpose sum-network for I. The following definitions are useful for analysis. For every p โˆˆ P, we denote the set of blocks that contain the point p as hpi := {B โˆˆ B : p โˆˆ B}, (3) and for every B โˆˆ B, the collection of blocks that have a non-empty intersection with B is denoted by the set hBi := {B 0 โˆˆ B : B 0 โˆฉ B 6= ฯ†} 0 T 0 = {B โˆˆ B : B B 6= 0}, (4) (5) where boldface B indicates the column of AI corresponding to block B โˆˆ B. IEEE TRANSACTIONS ON INFORMATION THEORY s1 6 sB s2 s{1,2} sA e1 s1 e2 sC s2 s3 e2 t1 t{1,2} t2 s{1,2} s2 e1 e3 (a) s1 t1 e{1,2} t2 t3 tA tC tB t1 t{1,2} t2 (b) Fig. 2. Two sum-networks obtained from the line graph on two vertices described in Example 2. The source set S and the terminal set T contain three nodes each. All edges are unit-capacity and point downward. The edges with the arrowheads are the bottleneck edges constructed in step 2 of the construction procedure. (a) Normal sum-network, and (b) transposed sumnetwork. The inner product above is computed over the reals. In the sequel, we will occasionally need to perform operations similar to the inner product over a finite field. This shall be explicitly pointed out. We now present some examples of sum-networks constructed using the above technique. Example 2: Let I be the unique simple line graph on two vertices, with points corresponding to the vertices and blocks corresponding to the edges of the graph. Denoting the points as natural numbers, we get that P = {1, 2} and B = {{1, 2}}. Then the associated incidence matrices are as follows. AI =    1 , and ATI = 1 1  1 . Following the SUM-NET-CONS algorithm the two sumnetworks obtained are as shown in the Figure 2. Example 3: In this example we construct a sum-network using a simple t-design. Let I denote the 2-(3, 2, 1) design with its points denoted by the numbers {1, 2, 3} and its blocks denoted by the letters {A, B, C}. For this design we have that A = {1, 2}, B = {1, 3}, C = {2, 3} and its associated incidence matrix under row and column permutations can be Fig. 3. The normal sum-network obtained for the incidence structure I described in Example 3. All edges are unit-capacity and directed downward. The edges with the arrowheads are the bottleneck edges, and the edges denoted by dashed lines correspond to the direct edges introduced in step 4 of the construction procedure. For this case, the normal and the transposed sumnetwork are identical. written as follows. ๏ฃฎ 1 AI = ๏ฃฐ1 0 1 0 1 ๏ฃน 0 1๏ฃป 1 Note that AI = ATI . Hence the normal sum-network and the transposed sum-network are identical in this case. Following the SUM-NET-CONS algorithm, we obtain the sum-network shown in Figure 3. Remark 1: Note that each edge added in the SUM-NETCONS algorithm has unit capacity. Proposition 6 in Section VII modifies the SUM-NET-CONS algorithm so that each edge e in the sum-network has cap(e) = ฮฑ > 1, ฮฑ โˆˆ N. V. U PPER BOUND ON THE COMPUTATION CAPACITY In this section, we describe an upper bound on the computation capacity of a sum-network obtained from a (0, 1)-matrix A of dimension r ร— c. We assume that there exists a (m, n) fractional network code assignment, i.e., ฯ†ฬƒe for e โˆˆ E (and corresponding global encoding functions ฯ†e (X)) and decoding functions ฯˆt for t โˆˆ T so that all the terminals in T can recover the sum of all the independent sources. For convenience of presentation, we will change notation slightly and let the messages observed at the source nodes corresponding to the rows of A as Xpi for i โˆˆ [r] and those corresponding to the columns of A as XBj for j โˆˆ [c]. Each of the messages is a column vector of length m over F. The set of all source messages is represented by X. We let ฯ†e (X) denote the n-length column vector of symbols from F that are IEEE TRANSACTIONS ON INFORMATION THEORY 7 transmitted by the edge e โˆˆ E, as it is the value returned by the global encoding function ฯ†e for edge e on the set of source messages denoted by X. As is apparent, non-trivial encoding functions can only be employed on the bottleneck edges, i.e., ei for i โˆˆ [r] as these are the only edges that have more than one input. For brevity, we denote ฯ†i (X) = ฯ†ei (X). We define the following set of global encoding functions. ฯ†In(v) (X) := {ฯ†e (X) : e โˆˆ In(v)}, โˆ€v โˆˆ V. Let H(Y ) be the entropy function for a random variable Y . We let {Yi }l1 denote the set {Y1 , Y2 , . . . , Yl } for any l > 1. The following lemma demonstrates that certain partial sums can be computed by observing subsets of the bottleneck edges. Lemma 1: If a network code allows each terminal 0 to compute P the demanded sum, then the value Xpi := Xpi + j:A(i,j)=1 XBj can be computed from ฯ†i (X), i.e.,  H Xp0 i |ฯ†i (X) = P 0 for all i โˆˆ [r]. Similarly for any j โˆˆ [c] P 0 := the value XB X + 0 p i i:A(i,j)=1 j :Bj 0 โˆˆhBj i XBj 0 can j be computed from the set of values {ฯ†i (X) : for i โˆˆ [r], A(i, j) = 1}. Proof: We let for any i โˆˆ [r] X X X Z1 = Xpi0 , Z2 = XBj and Z3 = XBj , i0 6=i j:A(i,j)=1 Pr Xp0 i = x0pi , {Xpi0 = xpi0 : i0 6= i},  {XBj = xBj : A(i, j) = 0}|ฯ†i (X) = ฯ†i (x) (a) = Pr(Xp0 i = x0pi , ฯ†i (X) = ฯ†i (x))/ Pr(ฯ†i (X) = ฯ†i (x)) ยท Pr({Xpi0 = xpi0 : i0 6= i}, {XBj = xBj : A(i, j) = 0})  (b) = Pr Xp0 i = x0pi |ฯ†i (X) = ฯ†i (x) ยท Pr {Xpi0 = xpi0 : i0 6= i}, {XBj = xBj : A(i, j) = 0}  |ฯ†i (X) = ฯ†i (x) , where equalities (a) and (b) are due to the fact that the source messages are independent and ฯ†i (x) is only a function of xpi and the set {xBj : A(i, j) = 1}.   Since terminal tpi can compute Z, H Z|ฯ†In(tp ) (X) = 0 i and we get from eq. (6) that H(Xpi + Z2 |ฯ†i (X)) = 0. For the second part of the lemma, we argue similarly as follows. We let for any j โˆˆ [c] X X Z1 = Xpi , Z2 = Xpi , i:A(i,j)=1 Z3 = j:A(i,j)=0 such that the sum Z = Xpi +Z1 +Z2 +Z3 and Xp0 i = Xpi +Z2 . By our assumption that each terminal can recover the demanded sum, we know that Z can be evaluated from  ฯ†In(tp ) (X) for all i โˆˆ [r], i.e., H Z|ฯ†In(tpi ) (X) = 0 for i all i โˆˆ [r]. Since {Xpi0 : i0 6= i} and {XBj : A(i, j) = 0} determine the value of Z1 and Z3 respectively and also determine the values transmitted on each of the direct edges that connect a source node to tpi , we get that   H Z|ฯ†In(tp ) (X) i  = H Z|ฯ†i (X), {ฯ†(sp 0 ,tpi ) (X) : i0 6= i}, i  {ฯ†(sBj ,tpi ) : A(i, j) = 0} (a) bold lowercase symbols represent specific realizations of the random variables. 0 โ‰ฅ H Xpi + Z1 + Z2 + Z3 |ฯ†i (X), {Xpi0 : i 6= i},  {XBj : A(i, j) = 0}  = H Xp0 i |ฯ†i (X), {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}  = H Xp0 i , {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}|ฯ†i (X)  โˆ’ H {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}|ฯ†i (X)  = H Xp0 i |ฯ†i (X)  + H {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}|Xp0 i , ฯ†i (X)  โˆ’ H {Xpi0 : i0 6= i}, {XBj : A(i, j) = 0}|ฯ†i (X)  (b) (6) = H Xp0 i |ฯ†i (X) , where inequality (a) follows from the fact that ฯ†(sp 0 ,tpi ) (X) i is a function of Xpi0 for i0 6= i and ฯ†(sBj ,tpi ) (X) is a function of {XBj : A(i, j) = 0} and equality (b) is due to the fact that Xp0 i is conditionally independent of both {Xpi0 : i0 6= i} and {XBj : A(i, j) = 0} given ฯ†i (X). This conditional independence can be checked as follows. Let X BโˆˆhBj i i:A(i,j)=0 XB , Z4 = X XB B โˆˆhB / ji 0 = Z1 +Z3 . By our such that Z = Z1 +Z2 +Z3 +Z4 and XB j   assumption, for all j โˆˆ [c], H Z|ฯ†In(tB ) (X) = 0. The sets j {Xp : p โˆˆ / Bj } and {XB : B โˆˆ / hBj i} determine the value of Z2 and Z4 respectively and also the values transmitted on each of the direct edges that connect a source node to the terminal tBj . Let ฮฆ denote the set {ฯ†i (X) : A(i, j) = 1}. Then,   H Z|ฯ†In(tB ) (X) j  = H Z1 + Z2 + Z3 + Z4 |ฮฆ, {ฯ†(spi ,tBj ) (X) : A(i, j) = 0},  {ฯ†(sB ,tBj ) : B โˆˆ / hBj i} (a) โ‰ฅ H (Z1 + Z2 + Z3 + Z4 |ฮฆ, {Xpi : A(i, j) = 0}, {XB : B โˆˆ / hBj i})  0 = H XB |ฮฆ, {Xpi : A(i, j) = 0}, {XB : B โˆˆ / hBj i} j   0 = H XB , {X : A(i, j) = 0}, {X : B โˆˆ / hB i}|ฮฆ p B j i j  = (b) โˆ’ H ({Xpi : A(i, j) = 0}, {XB : B โˆˆ / hBj i}|ฮฆ) 0 H(XB |ฮฆ) j โˆ’H({Xpi : A(i, j) = 0}, {XB : B โˆˆ / hBj i}|ฮฆ) 0 + H({Xpi : A(i, j) = 0}, {XB : B โˆˆ / hBj i}|XB , ฮฆ) j 0 = H(XB |ฮฆ). j Inequality (a) is due to the fact that ฯ†(spi ,tBj ) (X) is a function of Xpi and similarly for ฯ†(sB ,tBj ) (X). Equality (b) follows from the fact that Z1 +Z3 is conditionally independent of both {Xpi : A(i, j) = 0} and {XBj0 : B โˆˆ / hBj i} given the set of random variables {ฯ†i (X) : A(i, j) = 1}. This can be verified in a manner similar to as was done previously. This gives us 0 the result that H(XB |{ฯ†i (X) : A(i, j) = 1}) = 0. j IEEE TRANSACTIONS ON INFORMATION THEORY Next, we show the fact that the messages observed at the source nodes are independent and uniformly distributed over F m imply that the random variables Xp0 i for all i โˆˆ [r] are also uniform i.i.d. over F m . To do that, we introduce some notation. For a matrix N โˆˆ F rร—c , for any two index sets R โІ [r], C โІ [c], we define the submatrix of N containing the rows indexed by R and the columns indexed by C as N [R, C]. Consider two (0, 1)-matrices N1 , N2 of dimensions r1 ร— t and tร—c2 respectively. Here 1 and 0 indicate the multiplicative and additive identities of the finite field F respectively. The i-th row of N1 is denoted by the row submatrix N1 [i, [t]] โˆˆ {0, 1}t and the j-th column of N2 be denoted by the column submatrix N2 [[t], j] โˆˆ {0, 1}t . Then we define a matrix function on N1 N2 that returns a r1 ร— c2 matrix (N1 N2 )# as follows. ๏ฃฑ ๏ฃฒ1, if the product N1 [i, [t]] N2 [[t], j] over Z is positive, (N1 N2 )# (i, j) = ๏ฃณ0, otherwise. For an incidence structure I = (P, B) with r ร— c incidence matrix A, let Xp , โˆ€p โˆˆ P and XB , โˆ€B โˆˆ B be m-length vectors with each component i.i.d. uniformly distributed over F. We collect all the independent source random variables in a column vector X having m(r + c) elements from F as follows   T T T T ยท ยท ยท XB XB . X := XpT1 XpT2 ยท ยท ยท XpTr XB c 2 1 Recall that pi denotes the i-th row and Bj denotes the j-th column of the matrix A. For all i โˆˆ [r] let ei โˆˆ F r denote the column vector with 1 in its i-th component and zero elsewhere. 0 as defined in lemma 1, one can check that Then for Xp0 i , XB j (โŠ— indicates the Kronecker product of two matrices)    0 Xpi = eTi pi โŠ— Im X, for all i โˆˆ [r] and (7)  T   0 T T XBj = Bj (Bj B1 )# . . . (Bj Bc )# โŠ— Im X, (8) for all j โˆˆ [c] where Im is the identity matrix of size m. By stacking these values in the correct order, we can get the following matrix equation.  0T 0 0 0 T Xp1 ยท ยท ยท XpTr XBT1 ยท ยท ยท XBTc = (MA โŠ— Im )X (9) where the matrix MA โˆˆ F (r+c)ร—(r+c) is defined as   Ir A MA := . (10) AT (AT A)# Note that the first r rows of MA are linearly independent. There is a natural correspondence between the rows of MA and the points and blocks of I of which A is the incidence matrix. If 1 โ‰ค i โ‰ค r, then the i-th row MA [i, [r + c]] corresponds to the point pi โˆˆ P and if r + 1 โ‰ค j โ‰ค r + c, then the j-th row MA [j, [r + c]] corresponds to the block Bj โˆˆ B. 0 Lemma 2: For a (0, 1)-matrix A of size rร—c, let Xp0 i , XB โˆˆ j m F be as defined in Eqs. (7), (8) and matrix MA be as defined in eq. (10). Let r + t := rankF MA for some non-negative integer t and index set S 0 โІ {r + 1, r + 2, . . . , r + c} be such that rankF MA [[r] โˆช S 0 , [r + c]] = r + t. Let BS 0 := {BS10 , BS20 , . . . , BSt0 } โІ B be the set of blocks that correspond 8 to the rows of MA indexed by S 0 in increasing order. Then we have   0 0 0 0 Pr Xp0 1 = x01 , . . . , Xp0 r = x0r , XB = y , . . . , X = y 1 BS 0 t S0 t 1 = q โˆ’m(r+t) , and (11) Pr Xp0 i = x0i   = Pr 0 XB S0 j = yj0  = q โˆ’m , โˆ€i โˆˆ [r], j โˆˆ [t]. Proof: The quantities in the statement of the lemma satisfy the following system of equations   T T T ยท ยท ยท XB (M [[r] โˆช S 0, [r + c]] โŠ— Im ) XpT1 ยท ยท ยท XpTr XB 1 c h 0 iT 0 0 0 T T T T = Xp1 ยท ยท ยท Xpr XBS 0 ยท ยท ยท XBS 0 . 1 t   T T T ยท ยท ยท XB The vector XpT1 ยท ยท ยท XpTr XB is uniform 1 c over F m(r+c) . Since the matrix M [[r] โˆช S 0 , [r + c]] โŠ— Im has full row rank equal to m(r + t), the R.H.S. of the above equation is uniformly distributed over F m(r+t) , giving the first statement. The second statement is true by marginalization. Theorem 1: The computation capacity of any sum-network constructed by the SUM-NET-CONS algorithm is at most 1. Proof: By the construction procedure, there is a terminal tpi which is connected to the sources spi and {sBj : A(i, j) = 1} through the edge ei . By lemmas 1 and 2 we have that H(ฯ†i (X)) โ‰ฅ m log2 q bits. From the definition of n the maximum amount of information transmitted on ei is n log2 q bits and that implies that m โ‰ค n. Next, we show that the upper bound on the computation capacity exhibits a strong dependence on the characteristic of the field (denoted ch(F)) over which the computation takes place. Theorem 2: Let A be a (0, 1)-matrix of dimension r ร— c and suppose that we construct a sum-network corresponding to A using the SUM-NET-CONS algorithm. The matrix MA is as defined in eq. (10). If rankF MA = r + t, the upper bound on computation capacity of the sum-network is r/(r + t). Proof: Let BS 0 โІ B be as defined in lemma 2. Then from  0 |ฯ† (X) = 0, โˆ€i โˆˆ [r] and lemmas 1 and 2, we have H X i p i  0 H XB |{ฯ†i (X) : A(i, j) = 1} S0 j H({ฯ†i (X)}r1 ) = 0, โˆ€j โˆˆ [t]. Hence we have that โ‰ฅ m(r + t) log q. From the definition of n, we get nr log q โ‰ฅ H({ฯ†i (X)}r1 ) โ‰ฅ m(r + t) log q =โ‡’ m/n โ‰ค r/(r + t). Proposition 1: We have that  rankF MA = r + t if and only if rankF (AT A)# โˆ’ AT A = t. Furthermore, rankF MA = r + c if and only if ch(F) - detZ MA , where detZ indicates the determinant of the matrix with its elements interpreted as 0 or 1 in Z. Proof: From eq. (10), we have that   I A MA = rT A (AT A)#     I 0 Ir 0 Ir A = rT , (12) A Ic 0 (AT A)# โˆ’ AT A 0 Ic which gives us the rank condition. Since MA is a (0, 1)matrix, if it has full rank, then its determinant is some non-zero element of F, where F is the base subfield of F having prime order. We could also interpret the elements of MA as integers IEEE TRANSACTIONS ON INFORMATION THEORY 9 and evaluate its determinant detZ MA . Then if MA has full rank, we have that ch(F) - detZ MA . Example 4: Consider the normal sum-network obtained from using the Fano plane for which the incidence matrix AI is as defined in eq. (1), so that r = c = 7. It can be verified that rankGF (2) MAI = 7. Hence theorem 2 gives an upper bound of 1 for the computation capacity. In fact, there is a rate-1 network code that satisfies all terminals in the normal sum-network obtained using the Fano plane as described later in proposition 4. We can obtain a different upper bound on the computation capacity by considering submatrices of MA that do not necessarily contain all the initial r rows. To do this we define a 00 new index set S based on an index set S โІ [r] as follows. 00 S โІ {r + 1, r + 2, . . . , r + c} such that 00 โˆ€i โˆˆ S , AT [i โˆ’ r, [r]] โˆˆ Span{Ir [j, [r]] : j โˆˆ S}. (13) Here Span indicates the subspace spanned by the vectors in a set. The submatrix of MA that contains all the rows indexed 00 00 by numbers in S โˆช S is M [S โˆช S , [r + c]]. Theorem 3: Let A be a (0, 1)-matrix of dimension r ร— c and suppose that we construct a sum-network corresponding to A using the SUM-NET-CONS algorithm. For any (m, n)network code that enables all the terminals to compute the sum, we must have that   |S| m โ‰ค min , n xS SโІ[r] 00 00 where xS := rankF MA [S โˆช S , [r + c]] and S is as defined in eq. (13). Proof: Note that for the choice S = [r], the index set 00 S is the same as the index set S 0 defined in lemma 2 and xS = rankF MA , thus recovering the r/ rankF MA upper bound on the computation capacity from theorem 2. For S = 00 {S1 , . . . , S|S| } โŠ‚ [r], we have an index set T โІ S such that 00 xS = rankF MA [S โˆช S , [r + c]], = rankF MA [S โˆช T , [r + c]] = |S| + |T |. We collect the blocks indexed in increasing order by T in the set BT = {BT1 , . . . , BTy } โІ B, where y := |T |. Then one can recover the L.H.S. of the following equation from the set of messages {ฯ†i (X) : i โˆˆ S} h 0 XpTS1 0 0 0 ยท ยท ยท XpTS XBTT ยท ยท ยท XBTTy 1 |S|    MA [S, [r + c]] = โŠ— Im X. MA [T , [r + c]] iT Hence we have that q n|S| โ‰ฅ q m(|S|+y) =โ‡’ m/n โ‰ค |S|/xS . The same reasoning is valid for any choice of S โІ [r] and that gives us the result. Example 5: Consider the transposed sum-network corresponding to the undirected graph G shown in Figure 4. One can check that the matrix MATG when the rows and 3 2 B A 1 C 5 D 6 4 Fig. 4. A simple undirected graph G with two connected components. It has 6 vertices and 4 edges. columns of the incidence matrix ATG are arranged in increasing alphabetical and numeric order is as follows. ๏ฃน ๏ฃฎ 1 0 0 0 1 1 0 0 0 0 ๏ฃฏ 0 1 0 0 1 0 1 0 0 0 ๏ฃบ ๏ฃบ ๏ฃฏ ๏ฃฏ 0 0 1 0 1 0 0 1 0 0 ๏ฃบ ๏ฃบ ๏ฃฏ ๏ฃฏ 0 0 0 1 0 0 0 0 1 1 ๏ฃบ ๏ฃบ ๏ฃฏ ๏ฃฏ 1 1 1 0 1 1 1 1 0 0 ๏ฃบ ๏ฃบ ๏ฃฏ MATG = ๏ฃฏ ๏ฃบ ๏ฃฏ 1 0 0 0 1 1 0 0 0 0 ๏ฃบ ๏ฃฏ 0 1 0 0 1 0 1 0 0 0 ๏ฃบ ๏ฃบ ๏ฃฏ ๏ฃฏ 0 0 1 0 1 0 0 1 0 0 ๏ฃบ ๏ฃบ ๏ฃฏ ๏ฃฐ 0 0 0 1 0 0 0 0 1 1 ๏ฃป 0 0 0 1 0 0 0 0 1 1 We choose our finite field alphabet to be GF (3) in this example. Then rankGF (3) MATG = 5 and theorem 2 gives that the computation capacity is at most 4/5. However, theorem 3 gives a tighter upper bound in this case. Specifically, if S = {1, 2, 3} 00 00 then S = {5, 6, 7, 8} and rankGF (3) MATG [S โˆช S , [10]] = 4. Hence theorem 3 states that the computation capacity of the transposed sum-network for the graph G is at most 3/4. We apply the above theorems to obtain characteristic dependent upper bounds on the computation capacity of some infinite families of sum-networks constructed using the given procedure. Corollary 1: Let I = (P, B) be an incidence structure obtained from a simple undirected graph where P denotes the set of vertices and B consists of the 2-subsets of P corresponding to the edges. Let deg(p) โˆˆ Z represent the degree of vertex p โˆˆ P. The incidence matrix AI has dimension |P| ร— |B|. The computation capacity of the normal |P| sum-network constructed using AI is at most |P|+|B| for any finite field F. Let F be the finite field alphabet of operation and define P 0 โІ P as P 0 := {p : ch(F) - (deg(p) โˆ’ 1), p โˆˆ P}. Consider the set of edges B 0 := โˆชpโˆˆP 0 hpi. The computation capacity of 0 | the transposed sum-network is at most |B0|B |+|P 0 | . Proof: Recall that BiT is the i-th row of ATI for all i โˆˆ [|B|]. Then the inner product over F between two rows is ๏ฃฑ ๏ฃด 2 (mod ch(F)), if i = j, ๏ฃด ๏ฃฒ if edges indexed by i and T Bi Bj = 1, j have a common vertex, ๏ฃด ๏ฃด ๏ฃณ 0, otherwise. IEEE TRANSACTIONS ON INFORMATION THEORY 10 It can be observed that the matrix of interest, i.e., (ATI AI )# โˆ’ ATI AI = โˆ’I|B| has full rank over every finite field. The transposed sum-network for I is obtained by applying the SUM-NET-CONS algorithm on the |B|ร—|P| matrix ATI , so that the parameters r = |B|, c = |P|. We apply theorem 3 by choosing the index set S โІ [|B|] such that S = {j : Bj โˆˆ B 0 }. 00 Defined this way, |S| = |B 0 | and S is obtained from S using eq. (13). We collect all the points corresponding to the rows in 00 the submatrix MATI [S , [r + c]] in a set PS 00 โІ P. Note that PS 00 depends on the set of edges B 0 . By definitions of B 0 and 00 S , we have that P 0 โІ PS 00 . This is true because B 0 consists of all the edges that are incident to at least one point in P 0 00 while indices in the set S correspond to all points that are not incident to any edge outside B 0 . For instance, in Example 5 above, as F = GF (3), P 0 = {1}. Then B 0 = {A, B, C} and PS 00 = {1, 2, 3, 4}. 00 We now show that rankF MA [S โˆช S ] = |B 0 | + |P 0 | and that gives us the result using theorem 3. Recall that pi denotes the i-th row of AI , which corresponds to the vertex pi for all i โˆˆ [|P|]. It follows that the inner product between pi , pj over F is ๏ฃฑ ๏ฃด ๏ฃฒdeg(pi ) (mod ch(F)), if i = j, T pi pj = 1, if {i, j} โˆˆ B, ๏ฃด ๏ฃณ 0, otherwise. together in exactly one block. Thus, we have the inner product over F as ( vโˆ’1 (mod ch(F)), if j = i, T pi pj = kโˆ’1 1, otherwise. h i vโˆ’1 This implies that AI ATI โˆ’ (AI ATI )# = โˆ’ 1 Iv = kโˆ’1 i h vโˆ’k kโˆ’1 Iv and setting its determinant non-zero gives the result. For the normal sum-network, we argue as follows. Note that BiT Bi = k (mod ch(F)) for any i. Since any two points determine a unique block, two blocks can either have one point or none in common. Hence, for i 6= j, the inner product over F is ( 1, if Bi โˆฉ Bj 6= โˆ…, T Bi Bj = 0, otherwise. Because of the above equation, all the off-diagonal terms in the matrix (AI ATI )# โˆ’ AI ATI are equal to zero. We focus 00 on the submatrix M [S โˆช S , [r + c]] obtained from eq. (12), 00 00 letting S|B| = {j โˆ’ |B| : j โˆˆ S } we get that ch(F) - [ฯ โˆ’ b2 + v(b2 โˆ’ 1)](ฯ โˆ’ b2 )vโˆ’1 . # 0 h i 00 00 00 M [S โˆช S , [r + c]] = AI [S|B| , S] I|P| S|B| , S|B|   I ATI ยท ฮ› ยท |B| , 0 I|P| " 00 I|B| [S, S] Proof: By definition, we have that the inner product over F between two rows is ( ฯ (mod ch(F)), if j = i, T pi pj = b2 (mod ch(F)), otherwise. It follows that AI ATI โˆ’ (AI ATI )# has the value (ฯ โˆ’ 1) on the diagonal and (b2 โˆ’ 1) elsewhere. That is, AI ATI โˆ’ (AI ATI )# where ฮ› := Then ATI AI โˆ’ (ATI AI )# = [(k โˆ’ 1)] Ib and setting its determinant as non-zero gives the result. Corollary 3: Let I = (P, B) be a t-(v, k, ฮป) design,for t โ‰ฅ kโˆ’1 2. From eq. (2), each point is present in ฯ := ฮป vโˆ’1 tโˆ’1 / tโˆ’1 blocks and the number of  blocks  incident to any pair of points kโˆ’2 is given by b2 := ฮป vโˆ’2 / tโˆ’2 tโˆ’2 . Consider the transposed sumnetwork constructed using the incidence matrix ATI which has dimension |B| ร— |P|. The computation capacity of the |B| transposed sum-network is at most |B|+|P| if " I|B| [S, [|B|]] 0 # 0 (AI ATI )# โˆ’ AI ATI h i 00 . S|B| , [|P|] By definition of P 0 the points in the set PS 00 \ P 0 are such that deg(pi ) โˆ’ 1 โ‰ก 0 (mod ch(F)), i.e., the diagonal entry corresponding to those points in (AI ATI )# โˆ’ AI ATI in the matrix ฮ› is zero. Thus, ฮ› has exactly |B 0 | + |P 0 | rows which are not equal to the all-zero row vector. The first and third matrices are invertible, and hence we get that rankF MA [S โˆช 00 S , [r + c]] = |B 0 | + |P 0 |. Corollary 2: Let I = (P, B) be a 2-(v, k, 1) design. For the normal sum-network constructed using the |P| ร— |B| incidence |P| matrix AI , the computation capacity is at most |P|+|B| if ch(F) - (k โˆ’ 1). For the transposed sum-network constructed |B| using ATI , the computation capacity is at most |P|+|B| if vโˆ’k ch(F) - kโˆ’1 . Proof: We first describe the case of the transposed sumnetwork. From eq. (2) each point in a 2-(v, k, 1) design is vโˆ’1 incident to ฯ = kโˆ’1 blocks. Moreover any two points occur = [(ฯโˆ’b2 ) (mod ch(F))] Iv + [(b2 โˆ’1) (mod ch(F))] Jv , where Jv denotes the square all ones matrix of dimension v. Then by elementary row and columns operations,  det AI ATI โˆ’ (AI ATI )# can be evaluated to be equal to [ฯ โˆ’ b2 + v(b2 โˆ’ 1)](ฯ โˆ’ b2 )vโˆ’1 (mod ch(F)). Corollary 4: Let D = (P, B) be a t-(v, t + 1, ฮป) design with ฮป 6= 1 and incidence matrix AD . We define a higher incidence matrix AD0 of dimension |P| t ร— |B| such that each row corresponds to a distinct t-subset of P and each column corresponds to  ablock in B. AD0 is a (0, 1)-matrix such that for any i โˆˆ vt , j โˆˆ [|B|], its entry AD0 (i, j) = 1 if each of the points in the t-subset corresponding to the i-th row is incident to the block Bj โˆˆ B and zero otherwise. The computation capacity of the normal sum-network constructed using (vt) t+1 = ฮป+t+1 if ch(F) - t. The computation AD0 is at most v +|B| (t) capacity of the transposed sum-network constructed using ATD0 |B| ฮป is at most |B|+ = ฮป+t+1 if ch(F) - (ฮป โˆ’ 1). (vt) Proof: The  incidence  matrix AD0 is a (0, 1) matrix of ฮป v dimension vt ร— t+1 t . Let pi , Bu denote the i-th row and IEEE TRANSACTIONS ON INFORMATION THEORY 11 h   i ฮป v u-th column respectively of AD0 for i โˆˆ vt , u โˆˆ t+1 t . Each row of AD0 corresponds to a distinct t-subset of P. By tdesign criterion, any set of t points belongs to exactly ฮป blocks. Since the columns have a one-to-one correspondence with the blocks in B, each row of AD0 has exactly ฮป 1โ€™s. Two rows will have a 1 in the same column if the block corresponding to the column is incident to both the t-subsets corresponding to the two rows. Since each block has t + 1 points, there cannot be more than one block incident to two different t-subsets. T Hence, for the inner product over F, we  vhave  that pi pi = ฮป (mod ch(F)) and for all i 6= j; i, j, โˆˆ t , ๏ฃฑ ๏ฃฒ1, if the union of the t-subsets corresponding to the i-th and j-th rows is a block in B, pi pTj = ๏ฃณ0, otherwise. most 2/3. We describe a network code with m = 2, n = 3. The global encoding functions for the two bottleneck edges are shown in Table I. Using the values transmitted, all three Then AD0 ATD0 โˆ’ (AD0 ATD0 )# = [(ฮป โˆ’ 1) (mod ch(F))] I(v) t and that gives the result for the transposed sum-network. For the normal sum-network, we look at the columns of AD0 in a similar manner. Each column of AD0 corresponds to a block in B. Since  the size of each block is t+1, each column has exactly t+1 = t + 1 elements as 1. Also, two different t blocks can have at most t points in common, and only when that happens, will the two columns have a 1 in the same row. Hence, for the inner product over F, we have that BuT Bu =  v (t + 1) (mod ch(F)) and for all u 6= v; u, v โˆˆ t , ๏ฃฑ ๏ฃฒ1, if the u-th and v-th blocks have t points in common, BuT Bv = ๏ฃณ0, otherwise. terminals can recover the sum in the following manner. t1 receives the value of X2 from the direct edge (s2 , t1 ) while t2 receives the value of X1 from the direct edge (s1 , t2 ). Then t1 recovers the sum using the first two components of ฯ†1 (X) while t2 recovers the sum using the first two components of ฯ†2 (X). Additionally, t{1,2} receives both ฯ†1 (X), ฯ†2 (X) and can carry out the operation (X1 + X{1,2} ) + (X2 + X{1,2} ) โˆ’ X{1,2} . Thus, each terminal is satisfied. Then ATD0 AD0 โˆ’ (ATD0 AD0 )# = t (mod ch(F))I ฮป (v) and t+1 t theorem 2 gives the result. VI. L INEAR NETWORK CODES FOR CONSTRUCTED SUM - NETWORKS In this section, we propose linear network codes for the sum-networks constructed using the SUM-NET-CONS algorithm. Recall that the algorithm takes a (0, 1)-matrix A that has r rows and c columns as its input. In Section V, we demonstrated that the incidence matrix of certain incidence structures result in sum-networks whose capacity can be upper bounded (cf. Corollaries 1, 2, 4). We now demonstrate that under certain conditions, we can obtain network codes whose rate matches the corresponding upper bound. Thus, we are able to characterize the capacity of a large family of sum-networks. We emphasize that random linear network codes that have been used widely in the literature for multicast code constructions are not applicable in our context. In particular, it is not too hard to argue that a random linear network code would result in each terminal obtaining a different linear function or subspace. Thus, constructing codes for these sum-networks requires newer ideas. We outline the key ideas by means of the following example. Example 6: Consider the sum-network shown in Figure 2(a). The matrix AI used in its construction is of dimension r ร— c where r = 2, c = 1 and is described  in Example 2. It can be observed that ATI AI โˆ’ ATI AI # = 1. Then theorem 2 states that the computation capacity of this sum-network is at TABLE I T HE FUNCTION VALUES TRANSMITTED ACROSS e1 , e2 IN F IGURE 2( A ) FOR A NETWORK CODE WITH RATE = 2/3. E ACH MESSAGE X1 , X2 , X{1,2} IS A VECTOR WITH 2 COMPONENTS , AND ฯ†1 (X), ฯ†2 (X) ARE VECTORS WITH 3 COMPONENTS EACH . A NUMBER WITHIN SQUARE BRACKETS ADJOINING A VECTOR INDICATES A PARTICULAR COMPONENT OF THE VECTOR . Component 1 2 3 ฯ†1 (X) X1 [1] + X{1,2} [1] X1 [2] + X{1,2} [2] X{1,2} [1] ฯ†2 (X) X2 [1] + X{1,2} [1] X2 [2] + X{1,2} [2] X{1,2} [2] The network code in the example has the following structure. For each bottleneck edge, the first r components of the global encoding vector are the sum of all messages that are incident to that bottleneck. The remaining c components of the encoding vectors transmit certain components of messages observed at source nodes that correspond to columns in the matrix AI . In the example, t{1,2} received the first component of X{1,2} from ฯ†1 (X) and the second component from ฯ†2 (X). Thus it was able to recover the value of X{1,2} , which it used in computing the demanded sum. Our construction of network codes for sum-networks will have this structure, i.e., the first r components on a bottleneck edge will be used to transmit a partial sum of the messages observed at the sources that are connected to that bottleneck edge and the remaining c components will transmit portions of certain sources in an uncoded manner. For a given incidence matrix A, our first step is to identify (if possible) a corresponding non-negative integral matrix D of the same dimensions with the following properties. โ€ข D(i, j) = 0 if A(i, j) = 0. โ€ข Each row in D sums to r. โ€ข Each column in D sums to c. Under certain conditions on the incidence matrix A, we will show that D can be used to construct suitable network codes for the sum-networks under consideration. The existence of our proposed network codes are thus intimately related to the existence of non-negative integral matrices that satisfy certain constraints. The following theorem [32, Corollary 1.4.2] is a special case of a more general theorem in [33] that gives the necessary and sufficient conditions for the existence of non-negative integral matrices with constraints on their row and column sums. We give the proof here since we use some ideas from it in the eventual network code assignment. IEEE TRANSACTIONS ON INFORMATION THEORY Theorem 4: Let R = (r1 , r2 , . . . , rm ) and S = (s1 , s2 , . . . , sn ) be non-negative integral vectors satisfying r1 +. . .+rm = s1 +. . .+sn . There exists an mร—n nonnegative integral matrix D such that 0 โ‰ค D(i, j) โ‰ค cij , โˆ€i โˆˆ [m], โˆ€j โˆˆ [n], n X D(i, j) = ri , โˆ€i โˆˆ [m], and 12 Theorem 5: Let I = (P, B) be an incidence structure and let AI denote the corresponding incidence matrix of dimension v ร— b. Suppose that the following conditions are satisfied. T T โ€ข AI AI โˆ’ (AI AI )# = diag(ยต1 , . . . , ยตb ) (mod ch(F)), where ยตi is a non-zero element of F โˆ€i โˆˆ {1, 2, . . . , b}. โ€ข There exists a matrix DI with integer elements of the same dimension as AI whose entries satisfy j=1 m X i=1 v X D(i, j) = sj , โˆ€j โˆˆ [n] if and only if for all I โІ [m] and J โІ [n], we have that XX X X cij โ‰ฅ sj โˆ’ ri . (14) iโˆˆI jโˆˆJ jโˆˆJ iโˆˆI / Proof: Consider a capacity-limited flow-network modelled using a bipartite graph on m + n nodes. The left part has m nodes denoted as xi , โˆ€i โˆˆ [m] and the right part has n nodes denoted as yj , โˆ€j โˆˆ [n]. For all i, j there is a directed edge (xi , yj ) with capacity cij . There are two additional nodes in the flow-network, the source node S โˆ— and terminal node T โˆ— . There are directed edges (S โˆ— , xi ) with capacity ri for all i โˆˆ [m] and directed edges (yj , T โˆ— ) with capacity sj for all j โˆˆ [n]. Let xI be the set of all nodes in the left part whose indices are in I and let yJยฏ be the set of all nodes in the right part whose indices are not in J. Consider a cut separating nodes in {S โˆ— } โˆช xI โˆช yJยฏ from its complement. Let f โˆ— be the value of the maximum S โˆ— -T โˆ— flow in this network. Then we must have that for all possible choice of subsets I โІ [m], J โІ [n], X X X ri + cij + sj โ‰ฅ f โˆ— . (15) iโˆˆI / (i,j):iโˆˆI,jโˆˆJ โˆ— j โˆˆJ / jโˆˆJ (17) DI (i, j) = v, and (18) DI (i, j) = b. (19) j=1 Then the computation capacity of the sum-network constructed v . This rate using AI via the SUM-NET-CONS algorithm is v+b can be achieved by a linear network code. Proof: Note that ATI AI โˆ’ (ATI AI )# has full rank by assumption, theorem 2 states that the computation capacity of the sum-network is at most v/(v + b). We construct a (m, n) linear network code with m = v, n = v + b using the matrix DI . Since m = v, each message vector has v components. For a vector t โˆˆ F v , the notation t[l1 : l2 ] for two positive integers l1 , l2 โˆˆ [v] denotes a (l2 โˆ’l1 +1) length vector that contains the components of t with indices in the set {l1 , l1 + 1, . . . , l2 } in order. We need to specify the global encoding vectors ฯ†i (X) only for the bottleneck edges ei , i โˆˆ [v] as all the other edges in the network act as repeaters. The linear network code is such that the first v components of the vector transmitted along ei โˆ€i โˆˆ [v] is X ฯ†i (X)[1 : v] = Xpi + XBj . j:AI (i,j)=1 P In particular, suppose that f = jโˆˆ[n] sj in the flownetwork. Substituting this in eq. (15), we get the condition that for all possible subsets I โІ [m], J โІ [n], XX X X cij โ‰ฅ sj โˆ’ ri . (16) iโˆˆI jโˆˆJ i=1 b X DI (i, j) = 0, if AI (i, j) = 0, iโˆˆI / Note that by choosing all possible subsets I, J, we are considering every possible S โˆ— -T โˆ— cut in the network. Then by the maxflow-mincut theorem, the set of conditions of the form of eq. (16) for all I, J are not only necessaryPbut also sufficient for the existence of a flow of value f โˆ— = jโˆˆ[n] sj in the network. A feasible flow with this value can be used to arrive at the matrix D as follows. We set the value of element D(i, j) in the matrix to be equal to the value of the feasible flow on the edge (xi , yj ) for all i โˆˆ [m], j โˆˆ [n]. It is easy to verify that the matrix D satisfies the required conditions. Using the existence theorem for nonnegative integral matrices, we can obtain network codes for sum-networks constructed from certain incidence structures. The following theorem describes a set of sufficient conditions that, if satisfied by an incidence structure, allow us to construct a linear network code that has the same rate as the computation capacity of that sumnetwork. The proof of the theorem is constructive and results in an explicit network code. By construction, each tpi โˆ€i โˆˆ [v] is connected to the source nodes in {spi0 : i0 6= i}โˆช{sBj : AI (i, j) = 0} by direct edges. tpi can then compute the following value from the information received on the direct edges. X X Xpi + XBj . i0 6=i j:AI (i,j)=0 Adding the above value to ฯ†i (X)[1 : v] enables tpi to compute the required sum. In what follows, we focus on terminals of the form tBj โˆ€j โˆˆ [b]. Since n = v+b, each vector ฯ†i (X) โˆˆ F n has b components that havenโ€™t been specified yet. We describe a particular assignment for the b components on every ฯ†i (X), i โˆˆ [v] using the matrix DI that enables each tBj โˆ€j โˆˆ [b] to compute the sum. Recall the bipartite flow network constructed in the proof of theorem 4. The nodes in the left part are denoted as pi โˆ€i โˆˆ [v] and the nodes in the right part are denoted as Bj โˆ€j โˆˆ [b]. There is an edge (pi , Bj ) if and only if AI (i, j) = 1. The flow on the edge (pi , Bj ) is denoted as f (pi , Bj ) and its value is determined by DI (i, j), i.e., f (pi , Bj ) := DI (i, j). By constraints on the row and column sums of DI , we conclude that the value of the flow through any pi โˆ€i โˆˆ [v] is b and the value of the flow through any Bj โˆ€j โˆˆ [b] is v. Without IEEE TRANSACTIONS ON INFORMATION THEORY 13 loss of generality, assume that Bj = {p1 , p2 , ยท ยท ยท , p|Bj | }. We can partition the v components of message vector XBj into |Bj | parts such that the i-th partition contains f (pi , Bj ) distinct components of XBj . Such a partitioning can be done for all message vectors XBj , j โˆˆ [b]. Then the flow f (pi , Bj ) indicates that the vector ฯ†i (X)[v+1 : v+b] includes f (pi , Bj ) uncoded components of XBj . Assigning such an interpretation to every edge in the flow-network is possible as the total number of components available in each ฯ†i (X) is b and that is also equal to the flow through the point pi . By construction, terminal tBj is connected to all bottleneck edges in the set {ei : AI (i, j) = 1}. From the assignment based on the flow, tBj receives f (pi , Bj ) distinct components of XBj from ฯ†i (X) for all {i : AI (i, j) = 1}. Since P v i=1 f (pi , Bj ) = v, it can recover all v components of XBj in a piecewise fashion. By adding the first v components transmitted on all the bottleneck edges that are connected to tBj , it can recover X ฯ†i (X)[1 : v] 1 2 = Xpi + i:AI (i,j)=1 X = X Xpi + sE sB sA e1 sD e2 e3 tB tE BjT Bl XBl . Bl โˆˆhBj i Bl โˆˆhBj i\Bj By the flow-based assignment, each tBj obtains the value of XBj in a piecewise manner. It can then carry out the following X ฯ†i (X)[1 : v] โˆ’ ยตj XBj Xpi + (ยตj + 1)XBj + = pโˆˆBj Xp + X XBl โˆ’ ยตj XBj , Bl โˆˆhBj i\Bj i:AI (i,j)=1 X tC tD (b) A XA [1 : 2] XA [3 : 4] 1 XBl . Bl โˆˆhBj i The messages not present in this partial sum, i.e., {Xp : p โˆˆ / Bj } โˆช {XB : B โˆˆ / hBj i} are available at tBj through direct edges by construction. Hence, terminals that correspond to a column of AI are also able to compute the required sum. We illustrate the linear network code proposed above by means of the following example. Example 7: Consider the normal sum-network obtained from the undirected simple graph G shown in Figure 5(a). A part of the sum-network is shown in Figure 5(b). The 4 ร— 5 incidence matrix AG satisfies the condition of theorem 4 and therefore has an associated matrix DG with row-sum as 5 and column-sum 4 as shown below. The rows and columns of AG are arranged in increasing numeric and alphabetical order. ๏ฃฎ ๏ฃน ๏ฃฎ ๏ฃน 1 0 0 1 1 2 0 0 2 1 ๏ฃฏ1 1 0 0 0๏ฃบ ๏ฃฏ2 3 0 0 0๏ฃบ ๏ฃบ ๏ฃฏ ๏ฃบ AG = ๏ฃฏ ๏ฃฐ0 1 1 0 1๏ฃป , DG = ๏ฃฐ0 1 1 0 3๏ฃป . 0 0 1 1 0 0 0 3 2 0 B 2 XD [1 : 2] C 3 XE [1] D 4 E i:AI (i,j)=1 X e4 XBl , Because of the condition that ATI AI โˆ’ (ATI AI )# = diag(ยต1 , ยต2 , . . . , ยตb ), one can verify that X X BjT Bl XBl = (ยตj + 1)XBj + XBl . = sC Bl โˆˆhBj i i:AI (i,j)=1 X 3 (a) i:AI (i,j)=1 l:AI (i,l)=1 X C B tA X 4 E A i:AI (i,j)=1 X D (c) Fig. 5. (a) Undirected graph considered in Example 7. (b) Part of the corresponding normal sum-network constructed for the undirected graph in (a). The full normal sum-network has nine nodes each in the source set S and the terminal set T . However, for clarity, only the five sources and terminals that correspond to the columns of the incidence matrix of the graph are shown. Also, the direct edges constructed in Step 4 of the construction procedure are not shown. All edges are unit-capacity and point downward. The edges with the arrowheads are the bottleneck edges constructed in step 2 of the construction procedure. (c) Bipartite flow network as constructed in the proof of theorem 4 for this sum-network. The message values corresponding to the flow on the solid lines are also shown. Using the matrix DG , one can construct a structured linear network code with rate = v/(v + b) = 4/9 as shown in Table II. One can check that it enables all the terminals to compute the required sum. The flow-network corresponding to DG is shown in Figure 5(c), and the messages corresponding to the flow on the solid edges are shown alongside the respective edge. We can also consider the transposed sum-network for the same graph G. Corollary 1 gives an upper bound on the computation capacity that depends on F. If F = GF (2), IEEE TRANSACTIONS ON INFORMATION THEORY 14 then the subset of points P 0 = {2, 4} and the upper bound is 4/6. Note that theorem 5 is not applicable here as the matrix ATG AG โˆ’ (ATG AG )# does not have all its diagonal elements as non-zero over GF (2). Proposition 3 gives a condition for the existence of a network code for transposed sum-networks obtained using irregular graphs. We apply that condition to the transposed sum-network of the graph G considered here in Example 8. In the following proposition we show that certain infinite families of incidence structures satisfy the requirements stated in theorem 5. In particular, the incidence structures considered in Corollaries 1, 2 and 4 satisfy the conditions and hence the computation capacity of the associated sum-networks can be calculated. Proposition 2: The following incidence structures and their transposes satisfy condition (ii) in theorem 5, i.e., if their incidence matrix of dimension v ร— b is denoted by AI , there exists a corresponding non-negative integral matrix DI that satisfies the conditions in equations (17) โ€“ (19). 1) Incidence structures derived from a regular graph or a biregular bipartite graph. 2) t-(v, k, ฮป) designs with ฮป = 1. 3) The higher incidence structure of a t-(n, t + 1, ฮป) design with ฮป 6= 1 obtained using the procedure described in corollary 4. Proof: The existence of DI with row-sums as v and column-sums b is the same as the existence of DIT with rowsums as b and column-sums v. Thus, it suffices to argue for DI . To check the validity of the condition we first choose the bounds on the elements of the matrix DI . We set ri = b and sj = v for all i โˆˆ [v], j โˆˆ [b] and  0, if AI (i, j) = 0, cij = โˆž, if AI (i, j) = 1. By this choice the condition in inequality (14) is trivially satisfied whenever I, J are chosen such that there is a point in I which is incident to some block in J, i.e., there exist i โˆˆ I, j โˆˆ J such that AI (i, j) = 1. Hence we restrict our attention to choices of I and J such that none of the points in I are incident to any block in J. Under this restriction, the L.H.S. of inequality (14) is 0 and the condition is equivalent to (v โˆ’ |I|)b โ‰ฅ |J|v. We will assume that โˆƒI โІ [v], J โІ [b] such that (20) AI (i, j) = 0 โˆ€i โˆˆ I, j โˆˆ J, and (v โˆ’ |I|)b < |J|v, and show that it leads to a contradiction for each of the three incidence structures considered. If I corresponds to a d-regular simple graph, then b = dv/2. Consider the point-block incidence matrix AI , which is a (0, 1)-matrix of size v ร— b. For the chosen I in eq. (20), we look at the submatrix AI [I, [b]] of size |I| ร— b that consists of the rows of AI indexed by the points in I and all the columns. Let l1 be the number of columns with a single 1 in AI [I, [b]] and l2 be the number of columns with two 1s in AI [I, [b]]. By counting the total number of 1s in AI [I, [b]] in two ways, we get that d|I| . d|I| = l1 + 2l2 โ‰ค 2(l1 + l2 ) =โ‡’ l1 + l2 โ‰ฅ 2 Since the number of edges incident to at least one point in I is l1 + l2 , any subset J of the edges that has no incidence with any point in I satisfies |J| โ‰ค b โˆ’ d|I|/2. Using these in eq. (20) we get that   dv d|I| dv < โˆ’ v, (v โˆ’ |I|)b < |J|v =โ‡’ (v โˆ’ |I|) 2 2 2 which is a contradiction. Now suppose that I corresponds to a biregular bipartite graph, with L vertices having degree dL in the left part and R vertices having degree dR in the right part. Then b = LdL = RdR . Consider a subset IL โˆช IR of its vertices. Let EL (resp. ER ) be the set of edges which are incident to some vertex in IL (resp. IR ) but not incident to any vertex in IR (resp. IL ). The number of edges that are not incident to any vertex in IL โˆช IR is equal to (Lโˆ’|IL |)dL โˆ’|ER | = (Rโˆ’|IR |)dR โˆ’|EL |. Suppose there is a choice of I in eq. (20) is such that I = IL โˆช IR for some IL , IR . Then we have that (v โˆ’ |I|)b < |J|v, LdL + RdR 2 (L โˆ’ |IL |)dL โˆ’ ER + (R โˆ’ |IR |)dR โˆ’ |EL | (L + R), < 2 |Il |dL + |IR |dR + |EL | + |ER | |IL | + |IR | =โ‡’ , < LdL + RdR L+R =โ‡’ (L+R)(|EL |+|ER |) < (Lโˆ’R)|IL |dL +(Rโˆ’L)|IR |dR , =โ‡’ (L + R โˆ’ (|IL | + |IR |)) =โ‡’ (L + R)(|EL | + |ER |) < (L โˆ’ R)(|EL | โˆ’ |ER |). If L > R or |EL | > |ER |, then we have a contradiction. That leaves the case when L < R and |EL | < |ER |, which implies (L + R)(|EL | + |ER |) < (R โˆ’ L)(|ER | โˆ’ |EL |) and that is also a contradiction. Next, consider a t-(v, k, 1) design with b blocks such that repetition degree of each point is ฯ and we have that bk = vฯ. With the I of eq. (20), we employ a similar procedure as for the case of the d-regular graph. We choose the submatrix AI [I, [b]] of size |I| ร— b that corresponds to the rows indexed by the points in I and let li , โˆ€i โˆˆ [k] denote the number of columns with exactly i 1s in AI [I, [b]]. We count the total number of 1s in AI [I, [b]] in two ways, yielding ฯ|I| = l1 + 2l2 + ยท ยท ยท + (k โˆ’ 1)lkโˆ’1 + klk โ‰ค k =โ‡’ k X i=1 li โ‰ฅ k X li , i=1 ฯ|I| b|I| = . k v The number of that are incident to at least one point in Pblocks k I is equal to i=1 li . Hence any subset J of blocks that has no incidence with any point in I satisfies |J| โ‰ค b โˆ’ |I|b/v. Using this in eq. (20) we get that   |I|b (v โˆ’ |I|)b < |J|v =โ‡’ (v โˆ’ |I|)b < b โˆ’ v, v which is a contradiction. If I = (P, B) is the higher incidence structure obtained from a t-(n, t + 1, ฮป) design as describedin corollary 4, then  ฮป n we have that |P| = nt and |B| = t+1 t . By definition of t IEEE TRANSACTIONS ON INFORMATION THEORY 15 TABLE II T HE FUNCTION VALUES TRANSMITTED ACROSS e1 , e2 , e3 , e4 IN F IGURE 5( B ) FOR A NETWORK CODE WITH RATE = 4/9. E ACH MESSAGE XA , XB , XC , XD , XE IS A VECTOR WITH 4 COMPONENTS , AND ฯ†1 (X), ฯ†2 (X), ฯ†3 (X), ฯ†4 (X) ARE VECTORS WITH 9 COMPONENTS EACH . T HE NUMBER INSIDE SQUARE BRACKETS ADJOINING A VECTOR INDICATES A PARTICULAR COMPONENT OF THE VECTOR . Component 1 to 4 5 6 7 8 9 ฯ†1 (X) X1 + XA + XD + XE XA [1] XA [2] XD [1] XD [2] XE [1] ฯ†2 (X) X2 + XA + XB XA [3] XA [4] XB [1] XB [2] XB [3] for the original design, we have that each of the points in P are incident  to exactly ฮป blocks. Also, each block in B consists of t+1 = t + 1 points. For the submatrix AI [I, [b]] whose t rows correspond to the points in I from Condition 20, we let li , โˆ€i โˆˆ [t+1] denote the number of columns that have exactly i 1s in them. By counting the total number of 1s in AI [I, [b]] in two ways we get that t+1 X t+1 X t+1 X ฮป|I| . ฮป|I| = ili โ‰ค (t + 1) li =โ‡’ li โ‰ฅ t+1 i=1 i=1 i=1 The number of blocks incident to at least one point in I Ptotal t+1 is i=1 li . Then the number of blocks |J| that are not incident to any point in I satisfy |J| โ‰ค |B| โˆ’ |I|ฮป/(t + 1). Using these we get that (v โˆ’ |I|)b < |J|v,          n ฮป n n n ฮป < โˆ’ |I| , =โ‡’ โˆ’ |I| t+1 t t+1 t t t which is a contradiction. Thus in all the three kinds of incidence structures considered, we have shown that they admit the existence of the associated matrix DI under the stated qualifying conditions. This enables us to apply theorem 5 and obtain a lower bound on the computation capacity of these sum-networks. For an undirected graph I = (P, B) that is not regular, proposition 2 is not applicable. Theorem 5 describes a sufficient condition for the existence of a linear network code that achieves the upper bound on the computation capacity of normal sum-networks constructed from undirected graphs that are not necessarily regular. The upper bound on the capacity of the transposed sum-network constructed using the incidence |B| matrix ATI however can be different from |B|+|P| depending on the finite field F (cf. corollary 1) and theorem 5 needs to be modified to be applicable in that case. The following example illustrates this. Example 8: Consider the transposed sum-network for the irregular graph G described in Example 7. Corollary 1 gives an upper bound of 4/6 on the computation capacity when F = GF (2), as for that case P 0 = {2, 4} and B 0 = {A, B, C, D}. We show the submatrix ATG [B 0 , P 0 ] in the equation below and also an associated matrix DG whose support is the same as that of ATG [B 0 , P 0 ] and whose row-sum = 6 โˆ’ 4 = 2 and column- ฯ†3 (X) X3 + XB + XC + XE XB [4] XC [1] XE [2] XE [3] XE [4] ฯ†4 (X) X4 + XC + XD XC [2] XC [3] XC [4] XD [3] XD [4] sum = 4. The rows and columns are arranged in increasing alphabetical and numeric order. ๏ฃฎ ๏ฃน ๏ฃฎ ๏ฃน 2 0 1 0 ๏ฃฏ2 0๏ฃบ ๏ฃฏ1 0๏ฃบ ๏ฃฏ ๏ฃบ ๏ฃบ ATG [B 0 , P 0 ] = ๏ฃฏ ๏ฃฐ0 1๏ฃป , DG = ๏ฃฐ0 2๏ฃป . 0 2 0 1 Using DG we can construct a rate-4/6 linear network code, shown in Table III, that achieves the computation capacity for F = GF (2) of the transposed sum-network constructed using the irregular graph G shown in Figure 5(a). In particular, terminals t1 , t3 donโ€™t need any information other than the partial sums obtained over their respective bottleneck edges to compute the sum. Terminals t2 , t4 need the value X2 , X4 respectively, and that is transmitted in a piecewise fashion according to the matrix DG over the bottleneck edges. For an undirected graph I = (P, B) that is not regular, let P 0 , B 0 be the set of points and edges as chosen in the statement of corollary 1. We describe a condition on the submatrix ATI [B 0 , P 0 ] which consists of the rows and columns of ATI corresponding to the blocks and points in the sets B 0 , P 0 respectively. This condition allows us to construct a capacityachieving linear network code for the transposed sum-network. Proposition 3: For an undirected graph I = (P, B), let |P 0 | = v 0 , |B 0 | = b0 , where P 0 , B 0 are subsets of points and blocks as defined in corollary 1 and let ATI [B 0 , P 0 ](i, j) indicate an element of the submatrix for indices i โˆˆ [b0 ], j โˆˆ [v 0 ]. Suppose there is a matrix DI of dimension b0 ร— v 0 such that 0 b X i=1 DI (i, j) = 0, if ATI [B 0 , P 0 ](i, j) = 0, DI (i, j) = b0 , for all j โˆˆ [v 0 ], and 0 v X j=1 DI (i, j) = v 0 , for all i โˆˆ [b0 ]. 0 b Then there is linear network code of rate b0 +v 0 that allows each terminal in the transposed sum-network constructed using I to compute the required sum. Proof: We describe a rate-b0 /(b0 + v 0 ) network code that enables each terminal to compute the sum. Then by corollary 1 we know that this is a capacity-achieving code. Since this is a transposed sum-network, the bottleneck edges in the sumnetwork correspond to the blocks in the undirected graph I. IEEE TRANSACTIONS ON INFORMATION THEORY 16 TABLE III T HE FUNCTION VALUES TRANSMITTED ACROSS THE BOTTLENECK EDGES OF THE TRANSPOSED SUM - NETWORK CORRESPONDING TO THE GRAPH SHOWN IN F IGURE 5( A ) FOR A RATE -4/6 NETWORK OVER GF (2). E ACH MESSAGE X2 , X4 IS A VECTOR WITH 4 COMPONENTS , AND ฯ†A (X), ฯ†B (X), ฯ†C (X), ฯ†D (X), ฯ†E (X) ARE VECTORS WITH 6 COMPONENTS EACH . T HE NUMBER INSIDE SQUARE BRACKETS ADJOINING A VECTOR INDICATES A PARTICULAR COMPONENT OF THE VECTOR . A DASH INDICATES THAT THE VALUE TRANSMITTED ON THAT COMPONENT IS NOT USED IN DECODING BY ANY TERMINAL . Component 1 to 4 5 6 ฯ†A (X) X1 + X2 + XA X2 [1] X2 [2] ฯ†B (X) X2 + X3 + XB X2 [3] X2 [4] The first b0 components transmitted over each bottleneck is obtained by the following equation. X ฯ†i (X)[1 : b0 ] = XBi + Xpj , for all Bi โˆˆ B. j:pj โˆˆBi We show that this partial sum satisfies all the terminals in the set {tBi : Bi โˆˆ B} โˆช {tpj : pj โˆˆ / P 0 }. Terminals in {tBi : Bi โˆˆ B} can recover the sum as all messages not present in the partial sum are available to tBi through direct edges. For terminals in the set {tp : p โˆˆ / P 0 }, they carry out the following operation as a part of their decoding procedure. ๏ฃซ ๏ฃถ X X X ๏ฃญXBi + ฯ†i (X)[1 : b0 ] = Xpj ๏ฃธ (21) i:Bi โˆˆhpi = X i:Bi โˆˆhpi i:Bi โˆˆhpi XBi + X ppTj Xpj j:pj โˆˆBi + deg(p)Xp . (22) j:{p,pj }โˆˆB For pj 6= p, we have that ppTj = 1 if {p, pj } โˆˆ B. Also by condition on the points that are not in P 0 , we have that deg(p) โ‰ก 1 (mod ch(F)), and hence all the coefficients in the above partial sum are 1. The messages in the set {XB : B โˆˆ / hpi} โˆช {Xpj : {pj , p} โˆˆ / B} are available to tp through direct edges and hence it can recover the sum. The remaining v 0 components available on the bottleneck edges {ei : Bi โˆˆ B0 } are used to transmit information that enable the terminals in the set {tp : p โˆˆ P 0 } to compute the sum. Specifically, we construct a flow on a bipartite graph whose one part corresponds to the points in P 0 and the other part corresponds to the blocks in B 0 , with incidence being determined by the submatrix ATI [B 0 , P 0 ]. Since there exists a matrix DI with specified row and column sums, we can use it to construct a flow on the bipartite graph such that the messages in the set {Xpi : pi โˆˆ P 0 } are transmitted in a piecewise fashion over the bottleneck edges {ej : Bj โˆˆ B 0 } in a manner similar to the proof of theorem 5. Arguing in the same way, one can show that the network code based on the flow solution allows each tp โˆ€p โˆˆ P 0 to obtain the value of Xp from the information transmitted over the bottleneck edges in the set {ei : Bi โˆˆ hpi}. Terminal tp computes the sum in eq. (21) as a part of its decoding procedure. Since deg(p) 6โ‰ก 1 (mod ch(F)), every term in the RHS of eq. (22) except Xp has its coefficient as 1. But since tp knows the value of Xp it can subtract a multiple of it and recover the relevant partial sum. The messages not present in this partial sum are available to tp through direct edges and hence it can also compute the value of the sum. ฯ†C (X) X3 + X4 + XC X4 [1] X4 [2] ฯ†D (X) X1 + X4 + XD X4 [3] X4 [4] ฯ†E (X) X1 + X3 + XE โ€“ โ€“ Proposition 2 describes families of incidence structures for which the sum-networks constructed admit capacity-achieving linear network codes. The upper bound on the computation capacity of these sum-networks is obtained from Corollaries 1, 2 and 4. We now describe a rate-1 linear network code for the sum-networks when their corresponding incidence structures do not satisfy the qualifying conditions for the upper bounds. By theorem 1, the computation capacity of any sum-network obtained using the SUM-NET-CONS algorithm is at most 1. Proposition 4: For an incidence structure I = (P, B) and a finite field F, there exists a rate-1 linear network code that satisfies the following listed sum-networks. If โ€ข I is a 2-(v, k, 1) design: โ€“ the normal sum-network with ch(F) | k โˆ’ 1, โ€“ the transpose sum-network with ch(F) | vโˆ’k kโˆ’1 , โ€ข I is a t-(v, t + 1, ฮป) design: โ€“ the normal sum-network obtained using the higher incidence matrix with ch(F) | t, โ€“ the transpose sum-network obtained using the higher incidence matrix with ch(F) | ฮป โˆ’ 1. Proof: Suppose we construct a sum-network using the SUM-NET-CONS algorithm on a (0, 1)-matrix A of dimension r ร— c. If AT A = (AT A)# , the following rate-1 linear network code X ฯ†i (X) = Xpi + XBj , โˆ€ i โˆˆ [r], j:Bj โˆˆhpi i satisfies every terminal in the sum-network in the following manner. A terminal tpi , โˆ€i โˆˆ [r] receives all the messages not present in the partial sum transmitted along ei through direct edges, and hence it can compute the sum. A terminal tB , โˆ€B โˆˆ B can carry out the following operation. X X X X ฯ†i (X)= Xpi + XBj i:pi โˆˆBj pi โˆˆB = X pi โˆˆB pi โˆˆB Bj โˆˆhpi i Xpi + X BlT Bj XBl . l:Bl โˆˆhBj i Since AT A P = (AT A)# , all the coefficients in the above sum are 1 and i:pi โˆˆBj ฯ†i (X) is equal to the sum of all the messages in the set {Xpi : pi โˆˆ Bj } โˆช {XB : B โˆˆ hBj i}. All the messages that are not present in this set are available to tBj through direct edges. Such a rate-1 linear network code gives us our proposition in vโˆ’1 the following manner. Let AI be the v ร— kโˆ’1 incidence matrix 0 for a 2-(v, k, 1) design and let AI be the higher incidence IEEE TRANSACTIONS ON INFORMATION THEORY 17 matrix as defined in corollary 2 for a t-(v, t + 1, ฮป) design with ฮป 6= 1. Then, we have (from proofs of Corollaries 2, 4) S6 S14 S10 ATI AI โˆ’ (ATI AI )# = (k โˆ’ 1)I, vโˆ’k AI ATI โˆ’ (AI ATI )# = I, kโˆ’1 0 0 AIT A0I โˆ’ (AIT A0I )# = tI, a b c 0 0 A0I AIT โˆ’ (A0I AIT )# = (ฮป โˆ’ 1)I. Thus, whenever any of the above matrices is a zero matrix, we have a scalar linear network code that achieves the computation capacity of the associated sum-network. VII. D ISCUSSION AND COMPARISON WITH PRIOR WORK The discussion in Sections V and VI establishes the computation capacity for sum-networks derived from several classes of incidence structures. We now discuss the broader implications of these results by appealing to existence results for these incidence structures. BIBDs have been the subject of much investigation in the literature on combinatorial designs. In particular, the following two theorems are well-known. Theorem 6: [21, Theorem 6.17] There exists a (v, 3, 1)BIBD (also known as a Steiner triple system) if and only if v โ‰ก 1, 3 (mod 6); v โ‰ฅ 7. Theorem 7: [21, Theorem 7.31] There exists a (v, 4, 1)BIBD if and only if v โ‰ก 1, 4 (mod 12); v โ‰ฅ 13. In particular, these results show that there are an infinite family of Steiner triple systems and BIBDs with block size 4 and ฮป = 1. Since k = 3 for any Steiner triple system, we can demonstrate the existence of sum-networks whose computation capacity is greatly affected by the choice of the finite field F used for communication. Proposition 5: Consider the normal sum-network constructed using a 2-(v, 3, 1) design. If ch(F) = 2, then the computation capacity of the sum-network is 1. For odd ch(F), 6 the computation capacity is 5+v . For the normal sum-network constructed using a (v, 4, 1)-BIBD, the computation capacity 12 is 1 if ch(F) = 3 and 11+v otherwise. Proof: The number of blocks in a 2-(v, 3, 1) design is equal to v(vโˆ’1)/6. From corollary 2, if ch(F) is odd, then the computation capacity of the sum-network constructed using a 6 v Steiner triple system is at most v+v(vโˆ’1)/6 = 5+v . Moreover by proposition 2, we can construct a linear network code with rate equal to the upper bound. On the other hand, if ch(F) = 2, then the computation capacity of the same sum-network is 1 by proposition 4. The number of blocks in a 2-(v, 4, 1) design is v(v โˆ’ 1)/12. We can recover the result for the computation capacity of a normal sum-network constructed using it in a manner similar to the previous case. Thus, this result shows that for the same network, computing the sum over even characteristic has capacity 1, while the capacity goes to zero as O(1/v) for odd characteristic. Moreover, this dichotomy is not unique to the prime number 2. Similar results hold for sum-networks derived from higher incidence structures (cf. corollary 4). Fig. 6. The schematic shown represents an undirected graph with three components: S6 , S14 and S10 . St denotes the star graph on t + 1 vertices, with only one vertex having degree t while the rest have degree 1. The vertices with the maximum degree in the three star graphs are a, b, c respectively. In addition, a is connected to b and b is connected to c, such that deg(a) = 7, deg(b) = 16, deg(c) = 11. Theorem 8: [34] For two integers t, v such that v โ‰ฅ t+1 > 0 and v โ‰ก t (mod (t + 1)!2t+1 ), a t-(v, t + 1, (t + 1)!2t+1 ) design with no repeated blocks exists. The number of blocks in a t-(v, t + 1, (t + 1)!2t+1 ) design  2t+1 . We consider the normal can be evaluated to be vt (t+1)! t+1 sum-network obtained using the higher incidence matrix of this t-design. If ch(F) - t, then by corollary 4 and proposition 2, we have that the computation capacity of this sum-network is  v 1 t = .   2 v v (t+1)!2t+1 1 + t! (t + 1)!2tโˆ’1 + t t t+1 On the other hand, if ch(F) is a divisor of t, then by theorem 1 and proposition 4 we have that the computation capacity of the normal sum-network constructed using the higher incidence matrix is 1. Thus for the same sum-network, computing the sum over a field whose characteristic divides the parameter t can be done at rate = 1. However, if the field characteristic does not divide t, zero-error computation ofthe sumcan only โˆ’t2 be done at a rate which goes to zero as O et . Theorem 6 describes an infinite family of BIBDs with k = 3 and ฮป = 1. There are further existence results for BIBDs with ฮป = 1 and k 6= 3. In particular, for ฮป = 1, k โ‰ค 9 there exist BIBDs with value of v as given in Table 3.3 in [35, Section II.3.1]. As an example, if k = 5, then there exists a 2(v, 5, 1) design whenever v โ‰ก 1, 5 (mod 2)0. For any choice of a BIBD from this infinite family, we can construct a corresponding normal sum-network, whose computation capacity for a particular finite field can be found using corollary 2 and proposition 2. Even though theorem 8 states the existence of t-designs for v, t that satisfy the qualifying conditions, explicit constructions of such t-designs with t โ‰ฅ 6 are very rare. For a transposed sum-network obtained from an undirected graph that is not regular, the computation capacity can show a more involved dependence on the finite field alphabet as the following example demonstrates. Example 9: Consider the transposed sum-network obtained by applying the SUM-NET-CONS algorithm on the undirected graph I shown in Figure 6. Corollary 1 gives us an upper bound on the computation capacity of the transposed sumnetwork based on the finite field alphabet F. The upper bound for three different choices of F is as follows. IEEE TRANSACTIONS ON INFORMATION THEORY F = GF (2): Then P 0 = {b}, so the upper bound is 16/(16 + 1) = 16/17. 0 โ€ข F = GF (3): Then P = {c}, so the upper bound is 11/(11 + 1) = 11/12. 0 โ€ข F = GF (5): Then P = {a}, so the upper bound is 7/(7 + 1) = 7/8. We use proposition 3 to check if we can construct a linear network code in each case that has the same rate as the respective upper bound. To do that, we focus on the appropriate submatrix of AI for each case and see if it satisfies the required condition on row and column sums. The rows of AI corresponding to the vertices a, b, c (in order) are shown below. ๏ฃฎ ๏ฃน 16 1 0 ยทยทยท 0 ๏ฃฐ06 1 114 1 010 ๏ฃป , 0 ยทยทยท 0 1 110 โ€ข where 1, 0 indicate all-one and all-zero row vectors of size specified by their subscripts. Using this, one can verify that the appropriate submatrix for each of the three choices of F satisfies the conditions of proposition 3 and hence we can construct a capacity-achieving linear network code in each case. Thus, as the previous example demonstrates, the computation capacity of a particular sum-network need not take just one of two possible values, and can have a range of different values based on the finite field chosen. We can generalize the example to obtain sum-networks that have arbitrary different possible values for their computation capacity. Our constructed sum-networks have a unit maximum flow between any source and any terminal. We can modify our construction so that each edge in the network has a capacity of ฮฑ > 1. Specifically, the following result can be shown. Proposition 6: Let N denote the sum-network obtained by applying the SUM-NET-CONS algorithm on a matrix A of dimension r ร— c. For an integer ฮฑ > 1, let Nฮฑ denote the sum-network obtained by modifying the SUM-NET-CONS algorithm such that Nฮฑ has the same structure as N but each edge eฮฑ in Nฮฑ has cap(eฮฑ ) = ฮฑ > 1. Then, if A satisfies the qualifying conditions in Theorems 2 and 5, the computation ฮฑr . capacity of Nฮฑ is r+c Proof: Since A satisfies the conditions in theorem 5, there exists a (m, n) vector linear network code with m = r, n = r + c. For every unit-capacity edge in N , we have ฮฑ unitcapacity edges between the same tail and head in Nฮฑ . At the tail of every edge in Nฮฑ , we can apply the same network code except now we have ฮฑ distinct edges on which we can transmit the encoded value. Thus we need transmit only r+c ฮฑ symbols on each of those edges. If r+c ฮฑ is not an integer, one can appropriately multiply both m, n with a constant. This ฮฑr . Since A also satisfies modified network code has rate = r+c the conditions in theorem 2, we have that an upper bound on the computation capacity of N is r/(r + c). Applying the same argument on Nฮฑ , we get that an upper bound on the ฮฑr computation capacity of Nฮฑ is r+c . This matches the rate of the modified vector linear network code described above. This result can be interpreted as follows. Consider the class of sum-networks where the maximum flow between any 18 source-terminal pair is at least ฮฑ. Our results indicate, that for any ฮฑ, we can always demonstrate the existence of a sumnetwork, where the computation capacity is strictly smaller than 1. Once again, this indicates the crucial role of the network topology in function computation. A. Comparison with prior work The work of Rai and Das [28] is closest in spirit to our work. In [28], the authors gave a construction procedure to obtain a sum-network with computation capacity equal to p/q, where p, q are any two co-prime natural numbers. The procedure involved first constructing a sum-network whose capacity was 1/q. Each edge in this sum-network had unitcapacity. By inflating the capacity of each edge in the sumnetwork to p > 1, the modified sum-network was shown to have computation capacity as p/q. Our work is a significant generalization of their work. In particular, their sum-network with capacity 1/q can be obtained by applying the SUM-NET-CONS algorithm to the incidence matrix of a complete graph on 2q โˆ’ 1 vertices [29]. We provide a systematic procedure for constructing these sumnetworks for much larger classes of incidence structures. In [28], the authors also posed the question if smaller sumnetworks (with lesser sources and terminals) with capacity as p/q existed. Using the procedure described in this paper, we can answer that question in the affirmative. Example 10: The normal sum-network for the undirected graph in Figure 5(a) has computation capacity = 4/9 and has nine sources and terminals. To obtain a sum-network with the same computation capacity using the method described in [28] would involve constructing the normal sum-network for a complete graph on 17 vertices, and such a sum-network would have 153 source nodes and terminal nodes each. In [20], it was shown by a counter-example that for the class of sum-networks with |S| = |T | = 3, a maximum flow of 1 between each source-terminal pair was not enough to guarantee solvability (i.e., no network code of rate 1 exists for the counterexample). It can be observed that their counter-example is the sum-network shown in Figure 2(a). Our characterization of computation capacity for a family of sum-networks provides significantly more general impossibility results in a similar vein. In particular, note that for the ฮฑ-capacity edge version of a sum-network, the maximum flow between any sourceterminal pair is at least ฮฑ. Then suppose we consider the class of sum-networks with |S| = |T | = x = ฮฒ(ฮฒ + 1)/2 for some ฮฒ โˆˆ N. Consider a complete graph Kฮฒ = (V, E) on ฮฒ vertices; then |V | + |E| = x. Consider the sum-network obtained by applying the procedure on Kฮฒ , with each edge added having capacity as ฮฑ. Then the computation capacity of this sumnetwork is ฮฑฮฒ/x, which is less than 1 if ฮฑ < (ฮฒ + 1)/2. This implies that a max-flow of (ฮฒ + 1)/2 between each sourceterminal pair is a necessary condition for ensuring all sumnetworks with |S| = |T | = x are solvable. When x cannot be written as ฮฒ(ฮฒ + 1)/2 for some ฮฒ, a similar argument can be made by finding an undirected graph G = (V, E) (whose incidence matrix AG satisfies the condition in theorem 5) such that |V | is minimal and |V | + |E| = x. IEEE TRANSACTIONS ON INFORMATION THEORY VIII. C ONCLUSIONS AND F UTURE W ORK Sum-networks are a large class of function computation problems over directed acyclic networks. The notion of computation capacity is central in function computation problems, and various counterexamples and problem instances have been used by different authors to obtain a better understanding of solvability and computation capacity of general networks. We provide an algorithm to systematically construct sumnetwork instances using combinatorial objects called incidence structures. We propose novel upper bounds on their computation capacity, and in most cases, give matching achievable schemes that leverage results on the existence of non-negative integer matrices with prescribed row and column sums. We demonstrate that the dependence of computation capacity on the underlying field characteristic can be rather strong. There are several opportunities for future work. Our proposed linear network codes for the constructed sum-networks require the corresponding incidence structures to have a specific property. In particular, our techniques only work in the case when AT A โˆ’ (AT A)# is a diagonal matrix. It would be interesting to find capacity achieving network codes in cases when AT A โˆ’ (AT A)# is not diagonal. More generally, it would be interesting to obtain achievability schemes and upper bounds for sum-networks with more general topologies. R EFERENCES [1] J. Korner and K. Marton, โ€œHow to encode the modulo-2 sum of binary sources,โ€ IEEE Trans. on Info. Th., vol. 25, no. 2, pp. 219โ€“221, 1979. [2] A. Orlitsky and J. Roche, โ€œCoding for computing,โ€ IEEE Trans. on Info. Th., vol. 47, no. 3, pp. 903โ€“917, Mar 2001. [3] V. Doshi, D. Shah, M. Medard, and M. Effros, โ€œFunctional compression through graph coloring,โ€ IEEE Trans. on Info. Th., vol. 56, no. 8, pp. 3901โ€“3917, Aug 2010. [4] R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, โ€œNetwork Information Flow,โ€ IEEE Trans. on Info. Th., vol. 46, no. 4, pp. 1204โ€“1216, 2000. [5] R. Koetter and M. Medard, โ€œAn algebraic approach to network coding,โ€ IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782โ€“795, Oct 2003. [6] S. Y. R. Li, R. W. Yeung, and N. Cai, โ€œLinear network coding,โ€ IEEE Trans. on Info. Th., vol. 49, no. 2, pp. 371โ€“381, Feb 2003. [7] R. Dougherty, C. Freiling, and K. Zeger, โ€œInsufficiency of linear coding in network information flow,โ€ IEEE Trans. on Info. Th., vol. 51, no. 8, pp. 2745โ€“2759, Aug. 2005. [8] J. Cannons, R. Dougherty, C. Freiling, and K. Zeger, โ€œNetwork routing capacity,โ€ IEEE Trans. on Info. Th., vol. 52, no. 3, pp. 777โ€“788, Mar. 2006. [9] R. Dougherty, C. Freiling, and K. Zeger, โ€œUnachievability of network coding capacity,โ€ IEEE Trans. on Info. Th., vol. 52, no. 6, pp. 2365โ€“ 2372, June 2006. [10] S. Jaggi, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jain, and L. M. G. M. Tolhuizen, โ€œPolynomial time algorithms for multicast network code construction,โ€ IEEE Trans. on Info. Th., vol. 51, no. 6, pp. 1973โ€“ 1982, June 2005. [11] S. Huang and A. Ramamoorthy, โ€œAn achievable region for the double unicast problem based on a minimum cut analysis,โ€ IEEE Trans. on Comm., vol. 61, no. 7, pp. 2890โ€“2899, 2013. [12] โ€”โ€”, โ€œOn the multiple unicast capacity of 3-source, 3-terminal directed acyclic networks,โ€ IEEE/ACM Trans. on Networking, vol. 22, no.1, pp. 285โ€“299, 2014. [13] A. R. Lehman and E. Lehman, โ€œComplexity classification of network information flow problems,โ€ in Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, Jan 2004, pp. 142โ€“150. [14] S. Kamath, D. N. C. Tse, and C. C. Wang, โ€œTwo-unicast is hard,โ€ in IEEE Intl. Symposium on Info. Th., June 2014, pp. 2147โ€“2151. [15] R. Appuswamy, M. Franceschetti, N. Karamchandani, and K. Zeger, โ€œNetwork coding for computing: Cut-set bounds,โ€ IEEE Trans. on Info. Th., vol. 57, no. 2, pp. 1015โ€“1030, Feb 2011. 19 [16] C. Huang, Z. Tan, and S. Yang, โ€œUpper bound on function computation in directed acyclic networks,โ€ in IEEE Info. Th. Workshop, April 2015, pp. 1โ€“5. [17] R. Appuswamy, M. Franceschetti, N. Karamchandani, and K. Zeger, โ€œLinear codes, target function classes, and network computing capacity,โ€ IEEE Trans. on Info. Th., vol. 59, no. 9, pp. 5741โ€“5753, Sept 2013. [18] A. Ramamoorthy, โ€œCommunicating the sum of sources over a network,โ€ in IEEE Intl. Symposium on Info. Th., July 2008, pp. 1646โ€“1650. [19] B. K. Rai and B. K. Dey, โ€œOn network coding for sum-networks,โ€ IEEE Trans. on Info. Th., vol. 58, no. 1, pp. 50 โ€“63, 2012. [20] A. Ramamoorthy and M. Langberg, โ€œCommunicating the sum of sources over a network,โ€ IEEE J. Select. Areas Comm., vol. 31, no. 4, pp. 655โ€“ 665, 2013. [21] D. R. Stinson, Combinatorial Designs: Construction and Analysis. Springer, 2003. [22] O. Olmez and A. Ramamoorthy, โ€œFractional repetition codes with flexible repair from combinatorial designs,โ€ IEEE Trans. on Info. Th., vol. 62, no. 4, pp. 1565 โ€“1591, 2016. [23] S. E. Rouayheb and K. Ramchandran, โ€œFractional repetition codes for repair in distributed storage systems,โ€ in 48th Annual Allerton Conference on Comm., Control & Computing, Sept 2010, pp. 1510 โ€“ 1517. [24] L. Tang and A. Ramamoorthy, โ€œCoded caching with low subpacketization levels,โ€ in Intl. Symp. on Network Coding (NetCod), Dec 2016, pp. 1โ€“6. [25] โ€”โ€”, โ€œCoded caching for networks with the resolvability property,โ€ in IEEE Intl. Symposium on Info. Th., 2016. [26] โ€”โ€”, โ€œLow Subpacketization Schemes for Coded Caching,โ€ 2017 [Online] Available: https://arxiv.org/abs/1706.00101. [27] B. K. Rai and N. Das, โ€œOn the capacity of ms/3t and 3s/nt sumnetworks,โ€ in IEEE Info. Th. Workshop, Sep. 2013, pp. 1โ€“5. [28] B. Rai and N. Das, โ€œOn the capacity of sum-networks,โ€ in 51st Annual Allerton Conference on Comm., Control & Computing, Oct 2013, pp. 1545โ€“1552. [29] A. Tripathy and A. Ramamoorthy, โ€œSum-networks from undirected graphs: Construction and capacity analysis,โ€ in 52nd Annual Allerton Conference on Comm., Control & Computing, Sept 2014, pp. 651โ€“658. [30] N. Das and B. K. Rai, โ€œOn the number of sources and terminals of sum-networks with capacity p/q,โ€ in 21st National Conference on Communications (NCC), Feb 2015, pp. 1โ€“6. [31] A. Tripathy and A. Ramamoorthy, โ€œCapacity of sum-networks for different message alphabets,โ€ in IEEE Intl. Symposium on Info. Th., June 2015, pp. 606โ€“610. [32] R. A. Brualdi, Combinatorial matrix classes. Cambridge University Press, 2006, vol. 13. [33] L. Mirsky, โ€œCombinatorial theorems and integral matrices,โ€ Journal of Combinatorial Theory, vol. 5, no. 1, pp. 30โ€“44, 1968. [34] L. Teirlinck, โ€œNon-trivial t-designs without repeated blocks exist for all t,โ€ Discrete Mathematics, vol. 65, no. 3, pp. 301โ€“311, 1987. [35] C. J. Colbourn and J. H. Dinitz, Handbook of combinatorial designs. CRC press, 2006. Ardhendu Tripathy (Sโ€™15) is a Ph.D. student in the Department of Electrical and Computer Engineering at Iowa State University. He obtained his B.Tech. degree in Electrical Engineering from the Indian Institute of Technology, Kanpur in 2012. His research interests are in the areas of information theory, machine learning and signal processing. Aditya Ramamoorthy (Mโ€™05) received the B.Tech. degree in electrical engineering from the Indian Institute of Technology, Delhi, in 1999, and the M.S. and Ph.D. degrees from the University of California, Los Angeles (UCLA), in 2002 and 2005, respectively. He was a systems engineer with Biomorphic VLSI Inc. until 2001. From 2005 to 2006, he was with the Data Storage Signal Processing Group of Marvell Semiconductor Inc. Since fall 2006, he has been with the Electrical and Computer Engineering Department at Iowa State University, Ames, IA 50011, USA. His research interests are in the areas of network information theory, channel coding and signal processing for bioinformatics and nanotechnology. Dr. Ramamoorthy served as an editor for the IEEE Transactions on Communications from 2011 โ€“ 2015. He is currently serving as an associate editor for the IEEE Transactions on Information Theory. He is the recipient of the 2012 Early Career Engineering Faculty Research Award from Iowa State University, the 2012 NSF CAREER award, and the Harpole-Pentair professorship in 2009 and 2010.
7cs.IT
FROM ISOLATED SUBGROUPS TO GENERIC PERMUTATION REPRESENTATIONS arXiv:1601.07538v1 [math.GR] 27 Jan 2016 YAIR GLASNER, DANIEL KITROSER, AND JULIEN MELLERAY Abstract. Let G be a countable group, Sub(G) the (compact, metric) space of all subgroups of G with the Chabauty topology and Is(G) โІ Sub(G) the collection of isolated points. We denote by X! the (Polish) group of all permutations of a countable set X. Then the following properties are equivalent: (i) Is(G) is dense in Sub(G), (ii) G admits a โ€œgeneric permutation representationโ€. Namely there exists some ฯ„ โˆ— โˆˆ Hom(G, X!) such that the collection of permutation representations {ฯ• โˆˆ Hom(G, X!) | ฯ• is permutation isomorphic to ฯ„ โˆ— } is co-meager in Hom(G, X!). We call groups satisfying these properties solitary. Examples of solitary groups include finitely generated LERF groups and groups with countably many subgroups. 1. Introduction Let G be a countable group and Sub(G), the space of all subgroups of G endowed with the Chabauty topology, which makes it into a compact metrizable totally disconnected space. The easiest way to define this topology is to embed Sub(G) โІ {0, 1}G as a closed subset and induce the Tychonoff topology on {0, 1}G . The group G acts on Sub(G) continuously by conjugation g ยท โˆ† = gโˆ†g โˆ’1 . One is naturally led to the question of how the structure of the topological space Sub(G), or more generally the topological dynamical system (G, Sub(G)), is reflected in the algebraic structure of G. The Cantor-Bendixon structure theory of compact spaces leads us to consider the decomposition Sub(G) = Is(G) โŠ” Sub(G)โ€ฒ . Here Is(G) is the collection of isolated points, or isolated subgroups as we shall refer to them, and Sub(G)โ€ฒ is its complement. Isolated subgroups are special from the algebraic point of view! Clearly there are only countably many of them. One can think of isolated subgroups in algorithmic terms as subgroups that are detectable or recognizable via a finite algorithmic procedure. A subgroup โˆ† โˆˆ Sub(G) is isolated if and only if it can be identified by making a finite number of membership and non-membership tests for specific elements. It is sometimes convenient to think of this in terms of Schreier graphs. Let S be a symmetric generating set for G. A subgroup โˆ† โˆˆ Sub(G) is isolated if one can find a finite algorithm that would recognize the Schreier graph Sch(G, โˆ†, S) out of all Schreier graphs of the group G. Note that S might very well be infinite, and consequently the Schreier graphs in question may fail to be locally finite. Still the algorithm is allowed to look only at finitely many edges. From these characterizations it is easy to see that isolated groups are always finitely generated. In the special case where G itself is finitely generated every finite index subgroup is isolated and we obtain inclusions Subfi (G) โІ Is(G) โІ Subfg (G) where Subfi (G), Subfg (G) stand for finite index and finitely generated subgroups respectively. 2010 Mathematics Subject Classification. Primary 20E26; Secondary 0B07, 03E15. Key words and phrases. Isolated subgroups, Solitary groups, LERF groups, amenable groups, ample generics, amenable actions. 1 It is clear that Is(G) is always a discrete countable open subset of Sub(G). Our main new definition is the following: Definition 1.1. A group G is called solitary if the isolated points Is(G) are dense in Sub(G). Let X be a countable set and X! the group of all permutations of X. The topology of pointwise convergence makes X! into a Polish group: separable, metrizable and complete. The space Hom(G, X!) is the space of all permutation representations of G and is clearly also a Polish space. There is a natural action X! ร— Hom(G, X!) โ†’ Hom(G, X!) (1) (ฮฑ, ฯ•) 7โ†’ ฮฑ ยท ฯ• : g 7โ†’ ฮฑฯ•(g)ฮฑโˆ’1 Two permutation representations that are in the same orbit are said to be isomorphic as permutation representations. We will be interested in Baire generic properties of permutation representations and in particular in the existence of a generic permutation representation in the sense of the following: Definition 1.2. The group G is said to have a generic permutation representation if there is a permutation representation ฯ„ โˆ— โˆˆ Hom(G, X!) whose orbit X!(ฯ„ โˆ— ) = {ฮฑ ยท ฯ„ โˆ— | ฮฑ โˆˆ X!} = {ฯ• โˆˆ Hom(G, X!) | ฯ• is a permutation isomorphic to ฯ„ โˆ— } is co-meager in Hom(G, X!). It turns out that the existence of a generic permutation representation is captured by the structure of the topological space Sub(G). Theorem 1.3. (Main theorem) A countable group G admits a generic permutation representation if and only if it is solitary. Definition 1.4. A group G is called subgroup separable or locally extended residually finite (LERF for short), if every finitely generated subgroup of G is the intersection of finite index subgroups. Or equivalently if any finitely generated subgroup is closed in the profinite topology on G. Examples of LERF groups include finitely generated abelian groups, free groups [Hal49], surface groups [Sco85] and more generally, limit groups [Wil08], the Grigorchuk group [GW03], many lamplighter groups [GK14]. Recently the LERF property attracted a lot of attention as Agolโ€™s proof of the LERF property for the fundamental group of a closed hyperbolic 3-manifold [Ago13] was a central ingredient in his solution to Thrustonโ€™s virtual Haken conjecture. The following theorem is analogous to our main theorem above. It shows in particular that finitely generated LERF groups are solitary. Theorem 1.5. Let G be a finitely generated group, then the following conditions are equivalent: (1) G is LERF. (2) The collection Subfi (G) of finite index subgroups is dense in Sub(G). (3) G has a generic permutation representation, all of whose orbits are finite. 2 Remark 1.6. The fact that the first and third condition above are equivalent also follows from earlier work of Rosendal: Proposition 8(B) in [Ros11a] proves that G is LERF if and only if a generic permutation representation has only finite orbits, while Theorem 11 of [Ros11b] shows that a finitely generated LERF group admits a generic permutation representation. Note that Theorem 11 of [Ros11b] is only formulated for groups acting by isometries on the rational Urysohn space, but see the remark in the last paragraph of [Ros11b], where it is pointed out that the proofs adapt to other metric spaces, notably the Urysohn space with distances {0, 1}, that is, an infinite countable set. In the paper we state and prove a more detailed version of this theorem that holds also for countable groups. Once we leave the realm of finitely generated groups isolated subgroups and solitary groups no longer generalize finite index subgroups and LERF groups respectively. Each of these theories goes in its own way. Our impression is that in some settings the choice of isolated subgroups and solitary groups is the more natural one. The following theorem summarizes some examples and structural results we have about solitary groups. Theorem 1.7. Some properties of solitary groups. (1) Finitely generated LERF groups are solitary. (2) If Sub(G) is countable then G is solitary. (3) Let 1 โ†’ N โ†’ H โ†’ G โ†’ 1 be a short exact sequence of countable groups such that N is finitely generated, as an abstract group. If H is solitary then so is G. (4) The free product of two countable groups G โˆ— H is solitary if and only if one of the following two options hold: โ€ข both G and H are LERF and finitely generated. โ€ข G is solitary and H is trivial, or vice-versa. The situation considered in condition (3) above is identical to the one appearing in the famous Rips construction. This naturally leads to the following: Question 1.8. Is it true that every finitely generated solitary group G can be placed in a short exact sequence 1 โ†’ N โ†’ H โ†’ G โ†’ 1 where H is solitary and hyperbolic and N is finitely generated as an abstract group. Theorem 1.3 is tightly connected to the notion of ample generics in Polish groups. We adopt the notation of [MT13] ; [Ros11b] was the first paper to express this property in term of generic orbits on โ€œpresentation varietiesโ€. Definition 1.9. We say that a Polish group P has ample generics, if Hom(Fn , P ) admits a generic P orbit for every n โˆˆ N. The notion of ample generics was first introduced in [HHLS93] in order to study the small index property in Polish groups. Namely that every subgroup of index < 2โ„ต0 is open. Indeed this and additional consequences such as automatic continuity of abstract homomorphisms into any separable group were subsequently established for all groups with ample generics in [KR07]. We refer the readers to all of the above mentioned papers (see also the survey [GW08]) and the references therein. With this terminology in place Theorem 1.5 shows that the following two well known facts: โ€ข X! has ample generics, โ€ข finitely generated free groups Fn are LERF, 3 are in fact two different realizations of the same phenomenon. In both cases one seeks a generic P -orbit in Hom(G, P ). But in the study of groups with ample generics, one fixes G (or more precisely lets G range over all finitely generated free groups) and lets the Polish group P vary; whereas in the study of solitary groups we fix the Polish group P = X! and consider the class of all the countable groups G that give rise to a generic orbit. In view of the very natural characterization that arises from Theorem 1.5 the following question seems natural: Question 1.10. Given a Polish group P , describe the class of all finitely generated groups G for which Hom(G, P ) has a generic P -orbit. In particular, the answer should contain all finitely generated free groups whenever P has ample generics. The group X! is probably the simplest example of a Polish group with ample generics, but there are many others. We now turn to generalizing Theorem 1.5, and the notion of LERF groups, in a different direction. A subgroup H โ‰ค G is called co-amenable if there is a G-invariant mean on G/H (see also Definitions 6.1, 6.2). Co-amenable subgroups generalize finite index subgroups in much the same way that amenable groups generalize finite groups. In view of that and of Theorems 1.5 and 1.3 we can generalize the notion of LERF groups as follows: Definition 1.11. A group G is amenably separable, or A-separable for short, if the set of co-amenable subgroups of G is dense in Sub(G). In view of the Theorem 1.5, every LERF group is A-separable. Another obvious source for examples is the class of all amenable groups. These are A-separable since all of their subgroups are co-amenable. In chapter 6 of this work, we initiate the study of A-separable groups. Our hope is that the notion of A-separability will prove to be a useful generalization of the, a-priori very different, properties of LERF and amenability. This situation is perhaps reminiscent of the way in which sofic groups simultaneously generalize the notions of residual finiteness and amenability. In these terms the analogue of Theorem 1.3 is the following Theorem 1.12. A countable group G is A-separable if and only if for a generic action of G on a countable set, the action on every orbit is amenable. Here are some properties of A-separable groups. Theorem 1.13. The following properties hold for the class of A-separable groups: โ€ข LERF groups and amenable groups are A-separable. โ€ข The class of A-separable groups is closed under free products. โ€ข There exist A-separable groups which are neither LERF nor amenable. โ€ข A group with property (T) is A-separable if and only if it is LERF. โ€ข Higher rank lattices in non-compact simple Lie groups which satisfy the congruence subgroup property are never A-separable. The paper is arranged as follows. Section 2 is dedicated to a systematic investigation of the topological spaces Sub(G), Hom(G, X!) and the standard stabilizer map Hom(G, X!) โ†’ Sub(G) between them. In Section 3 we prove Theorem 1.5. Chapter 4 is dedicated to solitary groups and there we prove Theorems 1.3 and 1.7. Finally, in chapter 6 we prove Theorems 1.12 and 1.13 and give examples of non amenable, non LERF groups that are A-separable. The results in this work also to appear as part of the Ph.D. dissertation of the second author [Kit15]. 4 2. Dense and generic properties of actions and subgroups 2.1. The space of permutation representations Hom(G, X!). Let X be a countable set and X! the full symmetric group of all bijections of X onto itself. We endow X! with the topology of pointwise convergence which makes it into a Polish topological group. In other words a topological group that is separable, and admits a complete metric. The latter fact is important for us because it shows that X! is a Baire space; though we will never consider any specific metric. An explicit basis for the topology can be given by the sets  U(ฮฑ, A) := ฮฒ โˆˆ X! | ฮฒ A = ฮฑ A (ฮฑ โˆˆ X!, A โІ X finite). On X!n we will always put the product topology, which is still Polish for every n โˆˆ N โˆช {โˆž}. Let G be a countable group with a given presentation G = hS | Ri where S = {s1 , s2 , . . . }. Then, we can identify Hom(G, X!) with a closed subset of X!S via the following embedding: Hom(G, X!) โ†’ {ฮฑ โˆˆ X!S | โˆ€w โˆˆ R : w(ฮฑ) = 1X } โІ X!S ฯ 7โ†’ {ฯ(si )}siโˆˆS Thus Hom(G, X!) is a closed subspace of X!S and the induced topology makes it into a Polish space (note that this topology does not depend on the choice of presentation). A basis for the topology on Hom(G, X!) is given by: O(ฯ, T, A) := {ฯƒ โˆˆ Hom(G, X!) | โˆ€t โˆˆ T : ฯƒ(t) A = ฯ(t) A } (ฯ โˆˆ Hom(G, X!), T โІ G and A โІ X both finite). If S itself happens to be finite, then the sets O(ฯ, S, A) form a basis for Hom(G, X!). As mentioned in the introduction (see Equation 1) the group X! acts, from the left, on Hom(G, X!) and the orbits of this action are exactly the standard isomorphism classes of permutation representations. It is well known that two permutation representations are isomorphic if and only if they contain the same transitive components, appearing with the same multiplicity. The transitive components, in turn, are isomorphic to quasiregular actions of the form G y G/H for some H โˆˆ Sub(G). If {Hi } โІ Sub(G) is a countable or finite collection of subgroups and if di โˆˆ N โˆช {โˆž} we will denote the (isomorphism class of) the permutation representation that has exactly di transitive components isomorphic to ฮทi G y G/Hi by G G di ยท (G/Hi ) = di ยท ฮทi . i i Some care is due with this notation. It is not always possible to identify such an action with an element of Hom(G, X!) because if the sum is finite and Hi are all of finite index then the underlying set is finite. When this is not the case we can identify such an action with an element of Hom(G, X!) via an arbitrary bijection between โŠ”i G/Hi โˆผ = X. Different choices of this bijection will yield all the different points in the corresponding X! orbit. We will make frequent use of the following: Definition 2.1. Let G y X, x โˆˆ X, g1 , . . . , gn โˆˆ G and let w = wk wkโˆ’1 ยท ยท ยท w1 be a word over {g1ยฑ1, . . . , gnยฑ1}. The trace of x under w is the set: tracew (x) = {x, w1 x, . . . , wkโˆ’1 ยท ยท ยท w1 x, wx}. 5 2.2. The space of subgroups. Let G be a countable group and consider the space {0, 1}G of subsets of G, equipped with the product topology. This is a compact, metrizable space. Let Sub(G) denote the set of all subgroups of G. It is easy to verify that Sub(G) is closed in {0, 1}G and so it is a compact, metrizable space. The induced topology on Sub(G) is called the Chabauty topology and a basis for this topology can be given by the sets W(H, โ„ฆ) = {K โˆˆ Sub(G) | K โˆฉ โ„ฆ = H โˆฉ โ„ฆ} (H โˆˆ Sub(G), โ„ฆ โІ G finite). If H โˆˆ Sub(G) we denote by Env(H) = {K โˆˆ Sub(G) | K โ‰ฅ H} the envelope of H. Both subsets Sub(H) and Env(H) are closed in Sub(G). If H is finitely generated then Env(H) is also open. Denoting by Subfg (G) โІ Sub(G) the collection of finitely generated subgroups, it is easy to check that the collection [ {Env(H) | H โˆˆ Subfg (G)} {Sub(G) r Env(H) | H โˆˆ Subfg (G)} forms another basis for the topology of Sub(G). 2.3. Isolated subgroups. Let Is(G) and Occ(G) denote the isolated points of Sub(G) and the subgroups of G with open conjugacy classes respectively. Note that a subgroup H is in Occ(G) if and only if there is an open neighborhood of H, consisting of only conjugates of H. Both subsets are open and conjugation invariant. Proposition 2.2. Here are some basic properties of these subgroups: (1) Is(G) = Occ(G). (2) Every H โˆˆ Is(G) is finitely generated. (3) if H โˆˆ Subfg (G) then Env(H) is an open neighborhood of H. (4) When G itself is finitely generated then every finite index subgroup is isolated. (5) If H โˆˆ Subfg (G) and |Env(H)| < โˆž then H is isolated. In particular every finitely generated maximal subgroup is isolated. Proof. It is clear that Is(G) โІ Occ(G) and that both sets are open. The opposite inclusion follows from Baireโ€™s theorem: Let K โˆˆ Occ(G) and let [K] = {gKg โˆ’1 | g โˆˆ G} be its conjugacy class, which is open by definition. Since G is countable, [K] is a countable (or finite) union of closed points so by Baireโ€™s theorem one of them has to be open. Since G is transitive on [K] all of these points are open and in particular K โˆˆ Is(G). This proves (1). If H is not finitely generated then we can find a sequence of finitely generated subgroups H1 < H2 < H3 < . . . with โˆชi Hi = H. Clearly Hi โ†’ H in the topology of Sub(G) but none of these subgroups is equal to H because H is not finitely generated. (3) is clear and (5) follows directly from (3). Finally if G itself is finitely generated then so is every finite index subgroup and (4) follows directly from (5).  Thus, for a finitely generated group G isolated subgroups form a class of subgroups that sits between the finitely generated subgroups and the subgroups of finite index, namely: Subfg (G) โІ Is(G) โІ Subfg (G). We find it very useful to think of isolated subgroups as generalizations of finite index subgroups. 6 2.4. Generic properties. A subset A โІ Y in a Polish space is called generic (or alternatively residual or co-meager) if it contains a countable intersection of dense open sets. By Baireโ€™s category theorem generic sets are always dense. We say that the property (P) is generic in Y or that a generic element of Y has the property (P) if the set {y โˆˆ Y | y has the property (P)} is generic in Y . In this paper we will be interested in generic properties of permutation representations Hom(G, X!). The simplest example is Hom(Z, X!) โˆผ = X!. The following, well known proposition, summarizes the generic properties of this space. Its proof is an exercise in Baireโ€™s category theorem which we leave to the readers. We chose to mention it here because our main theorem, and its proof, are basically far reaching generalizations of this fact. Proposition 2.3. X! has a residual conjugacy class. This conjugacy class can be described explicitly: G ฯ„โˆ— = โˆž ยท (Z/nZ) nโˆˆN In terms of the definition below, the above proposition just says that G = Z admits a generic permutation representation. Definition 2.4. We say that G admits a generic permutation representation if there exists a permutation representation ฯ„ โˆ— โˆˆ Hom(G, X!) whose orbit under the action X! y Hom(G, X!) is residual in Hom(G, X!). 2.5. Properties of the stabilizer map. Given a permutation representation ฯƒ โˆˆ Hom(G, X!) and a point x โˆˆ X, we denote by Gx (ฯƒ) = {g โˆˆ G | ฯƒ(g)x = x} the stabilizer of this point. Fixing x this gives rise to a stabilizer map Gx : Hom(G, X!) โ†’ Sub(G) ฯƒ 7โ†’ Gx (ฯƒ) (2) Lemma 2.5. (Main lemma) For every x โˆˆ X, the stabilizer map Gx : Hom(G, X!) โ†’ Sub(G) is continuous, surjective and open. Proof. It is clear that this map is surjective. Let ฯ• โˆˆ Hom(G, X!) and let โ„ฆ โІ G be finite. If ฯƒ โˆˆ O(ฯ•, โ„ฆ, {x}) then โˆ€g โˆˆ โ„ฆ : g โˆˆ Gx (ฯƒ) โ‡” x = ฯƒ(g)x = ฯ•(g)x โ‡” g โˆˆ Gx (ฯ•) i.e Gx (ฯƒ) โˆˆ W(Gx (ฯ•), โ„ฆ). This proves that the map Gx is continuous. To prove that this map is open let ฯ„ โˆˆ O = O(ฯ•, S, A) โІ Hom(G, X!) be a basic open neighborhood in Hom(G, X!) and a point therein. By extending S we may assume that this set contains the identity and is symmetric, i.e. that S = S โˆ’1 . We have to exhibit an open neighborhood W โІ Sub(G) such that Gx (ฯ„ ) โˆˆ W โІ Gx (O(ฯ•, S, A)). Let Y = ฯ„ (G)x โІ X be the orbit of x under ฯ„ and L = Gx (ฯ„ ) be the stabilizer. We can identify Y = G/L under the orbit map gL 7โ†’ ฯ„ (g)x. Set AY := A โˆฉ Y . Let โ„ฆ โІ G be a finite symmetric set such that [ ฯ„ (s)AY โІ ฯ„ (โ„ฆ)x = {ฯ„ (ฯ‰)x | ฯ‰ โˆˆ โ„ฆ}. sโˆˆS 7 We claim that the basic open set W = W(L, โ„ฆSโ„ฆ) satisfies all our requirements. Where โ„ฆSโ„ฆ = {ฯ‰1 sฯ‰2 | ฯ‰i โˆˆ โ„ฆ, s โˆˆ S} is the set product. Fixing a group K โˆˆ W, we will complete our proof by finding ฮท โˆˆ O such that K = Gx (ฮท). Consider the finite subset โ„ฆK = {ฯ‰K โˆˆ G/K | ฯ‰ โˆˆ โ„ฆ} and define a partial map: f : โ„ฆK โ†’ Y ฯ‰K 7โ†’ ฯ„ (ฯ‰)x, โˆ€ฯ‰ โˆˆ โ„ฆ. This map is well-defined and injective on its domain, since by the definition of the open set W we have ฯ‰1 K = ฯ‰2 K โ‡โ‡’ ฯ‰1 L1 = ฯ‰2 L1 โ‡โ‡’ ฯ‰1 L = ฯ‰2 L โ‡โ‡’ ฯ„ (ฯ‰1 )x = ฯ„ (ฯ‰2 )x for every ฯ‰1 , ฯ‰2 โˆˆ โ„ฆ. For a similar reason this map partially respects the G action on both sides in the sense that sf (ฯ‰K) = f (sฯ‰K) โˆ€ฯ‰ โˆˆ โ„ฆ, s โˆˆ S. Define a bijection fหœ : G/K โŠ” X โ†’ X satisfying the following conditions: โ€ข fหœ extends f , namely fหœ(ฯ‰K) = f (ฯ‰K), โˆ€ฯ‰ โˆˆ โ„ฆ. โ€ข fหœ is the identity on โˆชsโˆˆS ฯ„ (s)(A) \ Y . Now let us define an action ฯƒ1 of G on G/K โŠ” X where G acts on G/K by the quasi-regular action on on X by ฯ„ and let ฯƒ =โˆˆ Hom(G, X!) be defined by ฯƒ(g)x = fหœฯƒ1 (g)fหœโˆ’1 (x). It is easy to verify that K = Gx (ฯƒ). Also for every s โˆˆ S and y โˆˆ A we have ฯƒ(s)y = ฯ„ (s)y. Indeed if y โˆˆ AY then by our choice of โ„ฆ, we have y = ฯ„ ฯ‰x for some ฯ‰ โˆˆ โ„ฆ and hence: ( feฯƒ1 (s)feโˆ’1 y = f sf โˆ’1 ฯ„ (ฯ‰)x = f sฯ‰K = ฯ„ (sฯ‰)x = ฯ„ (s)y, y โˆˆ AY ฯƒ(s)y = feฯƒ1 (s)feโˆ’1 y = feฯ„ (s)feโˆ’1 y = ฯ„ (s)y y 6โˆˆ AY This concludes the proof that Gx is open.  Corollary 2.6. For a subset D โІ Sub(G) denote e := {ฯ• โˆˆ Hom(G, X!) | Gx (ฯ•) โˆˆ D โˆ€x} = D \ (Gx )โˆ’1 (D). xโˆˆX Then e is dense in Hom(G, X!). (1) If D is conjugation-invariant and dense in Sub(G) then D e is Gฮด in Hom(G, X!). (2) If D is Gฮด in Sub(G) then D e is generic whenever D is. In particular, D Proof. Suppose D is conjugation-invariant and dense in Sub(G), let ฯ โˆˆ Hom(G, X!) and let S โІ G, A โІ X be finite. Let x โˆˆ A. By Lemma 2.5, the set Gโˆ’1 x (D) is dense in Hom(G, X!) and so there exists ฯ•1 โˆˆ Hom(G, X!) such that ฯ•1 โˆˆ O(ฯ, S, A) and Gx (ฯ•1 ) โˆˆ D. Denote Y1 = ฯ•1 (G)x and note that since D is conjugation-invariant we have Gy (ฯ•1 ) โˆˆ D for all y โˆˆ Y1 . Now, if z โˆˆ A r Y1 , we can apply the same argument and get a permutation representation ฯ•2 of G on X r Y1 such that ฯ•2 (s) agrees with ฯ•1 (s) on A โˆฉ (X r Y1 ) for all s โˆˆ S and such that all the stabilizers of points belonging to Y2 = ฯ•2 (G)z are in D. We get that the action ฯ• โˆˆ Hom(G, X!) defined by ( ฯ•1 (g)x, x โˆˆ Y1 โˆ€g โˆˆ G, x โˆˆ X : ฯ•(g)x = ฯ•2 (g)x, x โˆˆ X r Y1 8 belongs to O(ฯ, S, A) and every stabilizer of a point belonging to the ฯ•-invariant set Y1 โˆช Y2 is in D. By repeating the process described above, we get after finitely many steps an action ฯˆ โˆˆ O(ฯ, S, A) and a ฯˆ-invariant set Y โІ X such that A โІ Y and such that Gy (ฯˆ) โˆˆ D for ฯˆ every y โˆˆ Y . Finally, extend the action G y Y to an action ฯˆe โˆˆ Hom(G, X!) in such a way e and since A โІ Y we have that all stabilizers of points in X r Y belong to D. Thus, ฯˆe โˆˆ D e ฯˆ(s) = ฯˆ(s) A = ฯ(s) A for all s โˆˆ S, i.e. ฯˆe โˆˆ T O(ฯ, S, A). This proves part 1. A Now, assume D is Gฮด so we can write D =T n Dn , where Dn is open for every n โˆˆ N. โˆ’1 Then, for every x โˆˆ X we have Gโˆ’1 x (D) = n Gx (Dn ). Since Dn is open we get from โˆ’1 Lemma 2.5 that Gx (Dn ) is open for every x โˆˆ X and n โˆˆ N and so Gโˆ’1 x (D) is Gฮด . Since X T โˆ’1 e is countable this means that D = xโˆˆX (Gx ) (D) is also Gฮด and part 2 is proven.  Lemma 2.7. Let U โІ Sub(G) be open and non-empty. Then for a generic permutation representation ฯ• โˆˆ Hom(G, X!) we have |{x โˆˆ X | Gx (ฯ•) โˆˆ U}| = โˆž. Proof. Let ฮ›m = {ฯ• โˆˆ Hom(G, X!) | |{x โˆˆ X | Gx (ฯ•) โˆˆ U}| > m} . \ ฮ›= ฮ›m . mโˆˆN We claim that ฮ› is generic, and by Baireโ€™s theorem it would be enough to show that ฮ›m is open and dense for each m โˆˆ N. The fact that ฮ›m is open follows directly from the continuity of the map Gx . To prove density we just add m new orbits with a stabilizer from U far away. This is made explicit in the following way. Given a basic open set O(ฯ•, S, A) โІ Hom(G, X!) we want to find an element ฮท โˆˆ O(ฯ•, S, A) โˆฉ ฮ›m . Fix any subgroup H โˆˆ U and consider the set Y = X โŠ” (G/H)m endowed with the diagonal G action ฮท โ€ฒ โˆˆ Hom(G, Y !) given by ฮท โ€ฒ (g)(x, g1H, . . . , gm H) = (ฯ•(g)x, gg1H, . . . , ggm H). Now, let ฮน : X โ†’ Y be the identity map from X toSthe copy of X contained in Y , ฮน|A : A โ†’ Y be its restriction to the finite set A=Aโˆช sโˆˆSโˆชS โˆ’1 ฯ•(s)A and let I : X โ†’ Y be an extension of ฮน|A to a bijection between X and Y . One easily checks that ฮท = I โˆ’1 โ—ฆ ฮท โ€ฒ โ—ฆ I โˆˆ O(ฯ•, S, A) โˆฉ ฮ›m is as required.  Lemma 2.8. To any given ฯ โˆˆ Hom(G, X!) there is an arbitrarily close action, with infinitely many fixed points. Proof. Given finite sets S โІ G, A โІ X we seek an action ฯโ€ฒ โˆˆ O(ฯ, S, A) with infinitely many (ฯ,1) fixed points. Consider the action G y X โŠ” N, obtained from ฯ by adding countably many fixed points. The desired action ฯโ€ฒ = ฯ•โˆ’1 (ฯ, 1)ฯ• is obtained by intertwining this action via any bijection ฯ• :X โ†’ X โŠ” N with the property that ฯ• is the identity when restricted to S Aโˆช ฯ(s)A .  sโˆˆS 3. The LERF property In this section we prove Theorem 1.5. In fact, as promised in the introduction, we will prove the following slightly more general version of the theorem that for arbitrary countable groups (not necessarily finitely generated). 9 Theorem 3.1. Let G be a finitely generated group, then the following conditions are equivalent: (1) G is LERF. (2) The collection of finite index subgroups of G is dense in Sub(G). (3) The collection of permutation representations all of whose orbits are finite is dense in Hom(G, X!). (4) The collection of permutation representations all of whose orbits are finite is generic in Hom(G, X!). (5) G has a generic permutation representation, all of whose orbits are finite. When G is countable, but not necessarily finitely generated, then only the first three conditions are equivalent. It is easy to verify that this theorem implies Theorem 1.5 when G is finitely generated. The apparent complications when G fails to be finitely generated, and lack thereof in the proof of Theorem 1.3, emphasize one of our main points: Isolated subgroups are more natural than finite index subgroups in this setting. We mention again that the equivalence of the first, third and fourth conditions is already present in Rosendalโ€™s works [Ros11a] and [Ros11b] (see the discussion in the introduction). Proof of Theorem 3.1. In a countable group G every subgroup is an ascending union of finitely generated subgroups. Hence Subfg is dense in Sub(G). The LERF property implies that Subfg โІ Subfi as every finitely generated subgroup is a descending intersection of finite index subgroups. This shows (1) =โ‡’ (2). Now (2) =โ‡’ (3) follows directly from Corollary (2.6). To prove (3) =โ‡’ (1), assume we are given a finitely generated infinite index subgroup L = hSi and g โˆˆ G r L. Let ฯ• โˆˆ Hom(G, X!) be any permutation representation which is isomorphic to the quasiregular action G y (G/L) in such a way that x โˆˆ X is identified with the trivial coset eL. If ฯˆ โˆˆ O(ฯ•, S โˆช {g}, {x}) is an action with finite orbits then [L : Gx (ฯˆ)] < โˆž, L < Gx (ฯˆ) but g 6โˆˆ Gx (ฯˆ) proving the LERF property. Assume now that G is finitely generated. The implications (5) =โ‡’ (4) =โ‡’ (3) are obvious, so it is enough to prove the implication (2) =โ‡’ (5). We start by describing the generic permutation representation ฯ„ โˆ— โˆˆ Hom(G, X!). Let Subfg (G) = {H1 , H2 , . . . } be an enumeration of the finite index subgroups of G, let ฯ•n be the quasi-regular representation of G on G/Hn and define: G ฯ„โˆ— = โˆž ยท ฯ•n . Namely, take countably many copies of each representation in the list, and let G act naturally on the disjoint union of the corresponding sets. It follows from Corollary 2.6, applied to the open dense set D = Subfi (G) โІ Sub(G), that the collection of permutation representations all of whose orbits are finite is generic. It follows from Lemma 2.7 applied to the open set {Hi } โІ Sub(G) that the collection of permutation representations in which ฯi appears countably many times as a transitive component is also generic. By Baireโ€™s category theorem a generic permutation representation has only finite orbits and each ฯi appears in it countably many times. But such a permutation representation must be permutation isomorphic to ฯ„ โˆ—.  Remark 3.2. As the examples below demonstrate if G is an infinitely generated LERF group it is no longer true that a generic permutation representation has only finite orbits. It 10 is still true, however, that the restriction of such a generic action to every finitely generated subgroup H < G has only finite orbits. It is even true that the restriction of a generic permutation to H admits a well defined isomorphism type (up to isomorphism of permutation representations of H). The details of the proof are quite similar to our proof above and we leave them to the reader. In order to demonstrate the use of Theorem 1.5 above and give some basic examples we analyze the situation in free groups. Providing a short proof to Hallโ€™s theorem that free groups are LERF. Proposition 3.3. Let Fn , 1 โ‰ค n โ‰ค โˆž be a free group. (1) Fn is LERF. (2) A generic permutation representation ฯ• โˆˆ Hom(Fโˆž , X!) is transitive. (3) If ฮ“ is a countable LERF group that is not finitely generated then Sub(ฮ“) is perfect. Proof. First notice that Hom(Fn , X!) = X!n . Let X!(f ) < X! be subgroup of  the dense n (f ) n (f ) finitely supported permutations. Clearly Hom(Fn , X! ) = X! โІ X! = Hom(Fn , X!) is a dense set of permutation representations all of whose orbits are finite. This proves (1) by establishing Theorem 1.5(3). To prove (2) it is enough, by Baireโ€™s theorem, to show that the set ฮ˜(x, y) = {ฯ• โˆˆ Hom(Fโˆž , X!) | y โˆˆ ฯ•(Fโˆž )x} is open and dense. Openness is obvious. For the density, fix a free generating set Fโˆž = hx1 , x2 , . . .i. Given a basic open set O(ฯ•, S, A) โІ Hom(Fโˆž , X!) the finite set S โІ Fโˆž contains words that involve only finitely many of the generators, say S โІ hx1 , x2 , . . . , xr i. We can find ฯƒ โˆˆ O(ฯ•, S, A) โˆฉ ฮ˜(x, y) by setting ฯƒ(xi ) = ฯ•(xi ) for every 1 โ‰ค i โ‰ค r and then defining ฯƒ(xr+1 ) in such a way that ฯƒ(xr+1 )x = y. Finally if ฮ“ fails to be finitely generated then so do her finite index subgroups. So by Proposition 2.2(2) none of these are isolated. If ฮ“ is also LERF then the finite index subgroups are dense and in particular there can be no isolated subgroups at all. This proves (3).  4. Solitary groups This section is dedicated to the proof of Theorem 1.3. Proof. Assume that Is(G) is dense in Sub(G). Let Is(G) = {โˆ†1 , โˆ†2 , โˆ†3 , . . . , ฮฃ1 , ฮฃ2 , . . .} be representatives for the conjugacy classes of these isolated subgroups of G. Where we made a distinction between the groups โˆ†i that are of finite index in their normalizer and the groups ฮดi ฯƒi ฮฃi that are not. We denote by G y G/โˆ†i , G y G/ฮฃi the corresponding quasiregular actions. It is important to note that in G/โˆ†i there are finitely many points whose stabilizer is โˆ†i under the ฮดi action. In G/ฮฃi there are infinitely many similar points. With this terminology in place we can describe the generic permutation representation. It will have countably many orbits isomorphic to each ฮดi and one orbit isomorphic to each ฯƒi : ! ! G G โˆ— ฯ„ = โ„ต0 ฮดi โŠ” ฯƒj . i j Applying Corollary 2.6 to the open dense subset Is(G) โІ Sub(G) we conclude that a generic permutation representation has all of its stabilizers in Is(G). In other words a generic (โŠ”i di ฮดi ) โŠ” (โŠ”i si ฯƒi ) for some di , si โˆˆ N โˆช {โˆž}. By Lemma 2.7, applied to the open set {โˆ†i } 11 we know that a generic representation has infinitely many points whose stabilizer is โˆ†i , which immediately implies that di = โˆž, โˆ€i. Note that an identical argument tells us that a generic representation has countably many points whose stabilizer is ฮฃi , but even one orbit isomorphic to ฯƒi is enough to ensure that so this does not add any information about the coefficients si . All that is left to prove is that a generic representation has only one orbit isomorphic to ฯƒi for every i. In order to simplify the notation we will hence fix the index i and denote ฯƒ = ฯƒi , ฮฃ = ฮฃi . Let us denote by [ฮฃ] = {gฮฃg โˆ’1 | g โˆˆ G} โІ Sub(G) the conjugacy class of ฮฃ. The bad event is the existence of two different orbits with stabilizers in [ฮฃ]: [ ฮ˜ = ฮ˜x,y x,yโˆˆX ฮ˜x,y = {ฯ• โˆˆ Hom(G, X!) | Gx (ฯ•) = Gy (ฯ•) = ฮฃ; but ฯ•(G)x 6= ฯ•(G)y} By continuity of the stabilizer map (Lemma 2.5) the sets Gxโˆ’1 ({ฮฃ}), Gโˆ’1 y ({ฮฃ}) and hence also ฮ˜x,y are closed. So by Baireโ€™s theorem it suffices to prove that ฮ˜x,y is nowhere dense. Assume to the contrary that O = O(ฯ•, S, A) โІ ฮ˜x,y for some basic open set. Replacing โˆ’1 if necessary O by a smaller basic open set, we may assume S that S = S and that O โІ โˆ’1 โˆ’1 Gx ({ฮฃ}) โˆฉ Gy ({ฮฃ}). Let Ax = ฯ•(G)x โˆฉ A and โ„ฆx = sโˆˆS ฯ•(s)Ax . We define Ay , โ„ฆy similarly. Consider the quasiregular action ฯƒ : G y G/ฮฃ, if g โˆˆ NG (ฮฃ) then there is a unique G invariant isomorphism ฮทgฮฃ : ฯ•(G)x โ†’ G/ฮฃ ฯ•(h)x 7โ†’ hgฮฃ. Since [NG (ฮฃ) : ฮฃ] = โˆž by assumption there are infinitely many possible choices of points gฮฃ that would work for x and similarly for y. Let gx ฮฃ, gy ฮฃ be two such choices satisfying the additional property ฮทgx (โ„ฆx ) โˆฉ ฮทgy (โ„ฆy ) = โˆ…. Let ฮฑ : ฯ•(G)x โŠ” ฯ•(G)y โ†’ G/ฮฃ be any bijection such that ฮฑ(z) = ฮทgx (z), โˆ€z โˆˆ โ„ฆx and ฮฑ(z) = ฮทgy (z), โˆ€z โˆˆ โ„ฆy . We define a new action ฯˆ โˆˆ O by the following formula:  โˆ’1 ฮฑ (gฮฑ(x)) if x โˆˆ ฯ•(G)x โŠ” ฯ•(G)y ฯˆ(g)(x) = ฯ•(g)x otherwise It is easy to verify that ฯˆ โˆˆ O, that Gx (ฯˆ), Gy (ฯˆ) = ฮฃ and that x, y are in the same ฯˆ(G)-orbit. Which completes the proof of the first implication. Assume now that there exists a generic permutation representation ฯ„ โˆ— โˆˆ Hom(G, X!), by assumption its isomorphism class ฮฆ = {aฯ„ โˆ— aโˆ’1 | a โˆˆ X!} is co-meager in Hom(G, X!). The collection of subgroups appearing as point stabilizers of ฯ„ โˆ— are given by O = {Gx (ฯ„ โˆ— ) | x โˆˆ X} = Gx0 (ฮฆ) โІ Sub(G), where x0 is an arbitrary basepoint. Since, by Lemma 2.5, the map Gx0 is surjective and continuous O is dense in Sub(G). In particular O โŠƒ Is(G). We will show that O โІ Is(G) thus showing that the latter is dense and completing the proof. Let ฮฃ โˆˆ O and [ฮฃ] = {gฮฃg โˆ’1 | g โˆˆ G} its conjugacy class. By Proposition 2.2(1) it is enough to show that [ฮฃ] is open. If [ฮฃ] fails to be open it must have an empty interior, 12 because G acts transitively on [ฮฃ]. Since [ฮฃ] is countable it follows from Baireโ€™s theorem that Sub(G) \ [ฮฃ] is a dense Gฮด set. By Corollary 2.6 ^\ [ฮฃ] = {ฯƒ โˆˆ Hom(G, X!) | Gx (ฯƒ) 6โˆˆ [ฮฃ], โˆ€x โˆˆ X} Sub(G) is also a dense Gฮด set. But this contradicts the fact that ฮฆ is dense Gฮด as the intersection of these two sets is empty.  We conclude this section by proving Theorem 1.7. Proof. (of Theorem 1.7) In view of the fact that in a finitely generated group G finite index subgroups are isolated (1) follows directly from the comparison of Theorems 1.3 and 1.5. Density of isolated points (statement 2) is a general fact about countable Baire spaces. Indeed the set Sub(G) \ Is(G) is nowhere dense since it is a countable union of closed, nowhere dense points. Consider a short exact sequence as in statement (3). Since N is finitely generated Env(N) is clopen. It is easy to verify that the correspondence principle, between subgroups of G and subgroups of H containing N, gives rise to a homeomorphism Env(N) โ†’ Sub(G) ฮ˜ 7โ†’ ฯ•(ฮ˜) Claim (3) follows immediately. It is well known that the free product of two LERF groups is LERF [Rom69, Bur71]. If one of the groups, say H is trivial then G โˆ— hei โˆผ = G and the situation is clear. Thus to establish (4) we have to show that if neither group is trivial and G fails to be LERF then G โˆ— H cannot be solitary. Let ฮฃ โˆˆ Subfg (G) \ Subfi be some finitely generated subgroup that cannot be approximated by finite index subgroups. Let ฮท : G โˆ— H โ†’ G be the map that is the identity on G and trivial on H. We will show that ฮž := ฮท โˆ’1 (ฮฃ) = ฮฃ ker(ฮท) โˆˆ Sub(G โˆ— H) is a subgroup that cannot be approximated by isolated subgroups. Indeed let โ„ฆ โІ G be some finite set such that the neighborhood WSub(G) (ฮฃ, โ„ฆ) does not contain any finite index subgroup. We can use the same โ„ฆ to define an open neighborhood in G โˆ— H and it is clear that [G : โˆ† โˆฉ G] = โˆž for every โˆ† โˆˆ SubSub(Gโˆ—H) (ฮž, โ„ฆ). Thus our theorem is proved in view of the following lemma, which seems very useful in its own right.  Lemma 4.1. Let G, H be two countable groups with G infinite and H non-trivial. If โˆ† โˆˆ Is(G โˆ— H) then [G : G โˆฉ โˆ†] < โˆž. Proof. It will be more convenient to argue at the level of actions and Schreier graphs. Note that Hom(G โˆ— H, X!) โˆผ = Hom(G, X!) ร— Hom(H, X!). We will denote this isomorphism by ฯ• โˆ— ฯˆ 7โ†’ (ฯ•, ฯˆ), namely ฯ• โˆ— ฯˆ is the unique action of G โˆ— H whose restriction to G is ฯ• and to H is ฯˆ. Let โˆ† โˆˆ Sub(G โˆ— H) and assume that [G : G โˆฉ โˆ†] = โˆž. Let ฯ• โˆ— ฯˆ โˆˆ Hom(G โˆ— H, X!) be any action which is isomorphic to the quasiregular action G โˆ— H y (G โˆ— H)/โˆ† with x โˆˆ X identified with the trivial coset eโˆ†. Note that, while the action of G โˆ— H is transitive, ฯ•, ฯˆ themselves need not be transitive. Still, by our assumption we know that the orbit Y := ฯ•(G)x โІ X is infinite. The argument now is simple enough : we obtain approximating n actions of the form ฯ• โˆ— ฯˆn โ†’ ฯ• โˆ— ฯˆ by carrying out small perturbations on the action of H. Since the orbit Y is infinite we can do arbitrarily small such perturbations on the action while still affecting the stabilizer of the point x. We elaborate below but this is basically a complete proof. 13 Let x โˆˆ A0 โІ A1 โІ A2 . . . be finite sets ascending to the whole of X, Tn โІ H finite sets ascending to a generating set of H. We can assume that 1 โˆˆ Tn = Tnโˆ’1 . Of course if H is finitely generated we can just take Tn = T, โˆ€n โˆˆ N to be some fixed symmetric set of generators. Set Bn = โˆชtโˆˆTn ฯˆ(t)(An ) and ฮพn โˆˆ Y \ Bn . Since X is infinite we can find bijections fn : X โ†’ X ร— {0, 1}, with the additional properties that fn (x) = (x, 0), โˆ€x โˆˆ An and fn (ฮพn ) = (ฮพn , 1). Let ฮท โˆˆ hom(H, X!) be any fixed action of H on X. Using all this data we construct a sequence of actions ฯˆ ฮท โˆˆ Hom(H, (X ร— {0, 1})!) as follows:  (ฯˆ(h)x, 0), i = 0 ฮท ฯˆ (h)(x, i) = (ฮท(h)x, 1), i = 1 and let ฯˆnฮท (h) = (fn )โˆ’1 โ—ฆ ฯˆ ฮท โ—ฆ fn . It is clear from the definitions that ฯˆnฮท โˆˆ O(ฯˆ, Tn , An ) and in particular ฯˆnฮท โ†’ ฯˆ as n โ†’ โˆž. Consequently of course ฯ• โˆ— ฮจฮทn โ†’ ฯ• โˆ— ฯˆ in Hom(G โˆ— H, X!). Let 1, ฮป โˆˆ Hom(H, X!) be the trivial and the regular left action of H on X. The latter is defined via an arbitrarily chosen identification of X with H which will not play a role in the discussion. If H is finite we replace the regular left action by countably many copies of the same action, just to make sure ฮป is an action on an infinite set. We use these to obtain two convergent sequences of actions and hence two convergent sequences of subgroups ฯ• โˆ— ฯˆn1 โ†’ ฯ• โˆ— ฯˆ ฯ• โˆ— ฯˆnฮป โ†’ ฯ• โˆ— ฯˆ (G โˆ— H)x (ฯ• โˆ— ฯˆn1 ) โ†’ โˆ† (G โˆ— H)x (ฯ• โˆ— ฯˆnฮป ) โ†’ โˆ† These sequences are different because if gn โˆˆ Gn is any element such that ฯ•(gn )x = ฮพn then for any 1 6= h โˆˆ H we have gnโˆ’1hgn โˆˆ (G โˆ— H)x (ฯ• โˆ— ฯˆn1 ) \ (G โˆ— H)x (ฯ• โˆ— ฯˆnฮป ). Thus at least one of these sequences is not eventually constant, proving that the limit point โˆ† is not isolated.  5. Sketch of another proof of Theorem 1.3 We briefly sketch another proof of Theorem 1.3, which is more along the lines of the arguments in [KR07]. First, we note that for any countable group G, the action of X! on Hom(G, X!) is topologically transitive, that is, given any two nonempty open subsets U, V of Hom(G, X!), there always exists ฮฑ โˆˆ X! such that ฮฑ ยท U โˆฉ V 6= โˆ… (equivalently, there exists elements in Hom(G, X!) which have a dense conjugacy class). This is true simply because any two actions ฯ€1 , ฯ€2 of G on an infinite countable set embed in a third one ฯ€3 (for instance, obtained by considering a disjoint union of two infinite countable sets, with G acting as ฯ€1 on the first copy, and ฯ€2 on the second copy). Then the closure of the conjugacy class of ฯ€3 contains both ฯ€1 and ฯ€2 , proving the desired result. This brings us to the setting of the following lemma; the equivalence between (1) and (3) below is the criterion we will be using, and is due to C. Rosendal. The equivalence of these conditions with (2) appears to be new, and seems potentially useful so we are including it here even though it will not be needed. Lemma 5.1. Assume that P is a Polish group acting continuously and topologically transitively on a Polish space Z. Then the following conditions are equivalent: (1) There exists a comeager orbit. 14 (2) For any open identity neighborhood 1 โˆˆ V โІ P the collection of points {z โˆˆ Z | V (z) is somewhere dense} = {z โˆˆ Z | Int(V (z)) 6= โˆ…} is dense in Z. (3) For any open identity neighborhood 1 โˆˆ V โІ P and any nonempty open subset U of Z, there exists a nonempty open U โ€ฒ โІ U such that, for any nonempty open W1 , W2 โІ U โ€ฒ , one has V W1 โˆฉ W2 6= โˆ…. Proof. Fix an open identity neighborhood V and a sequence of group elements such that โˆชn ฮฑn V = P . If there exists a comeager orbit then by Baireโ€™s category theorem for every z in this orbit there exists an n such that ฮฑn V (z) is somewhere dense. Translating by ฮฑn we deduce that V (z) itself is somewhere dense. This proves that (1) implies (2). Assume that (2) holds; fix an open identity neighborhood 1 โˆˆ V โІ P and a nonempty open subset U of Z. Using our assumption, and continuity of the action, we may find a symmetric open identity neighborhood V โ€ฒ such that V โ€ฒ V โ€ฒ โІ V , an open U โ€ฒ โІ U and x โˆˆ U such that the closure of V โ€ฒ (x) contains U โ€ฒ . Then, for any W1 , W2 nonempty open and contained in U โ€ฒ , we have some v1 , v2 โˆˆ V โ€ฒ such that v1 x โˆˆ W1 , v2 x โˆˆ W2 . Thus v2 v1โˆ’1 W1 โˆฉ W2 6= โˆ… and (3) holds. Finally, assume that (1) is false; since there exist dense orbits, any orbit must be meager or comeager, by the 0โ€“1 topological law [RR74]. So in this case all orbits are meager. Given z S โˆˆ Z, we then have an family of closed subsets Fn with empty interior such that P (z) โІ Fn ; some {g โˆˆ P : gz โˆˆ Fn } must have nonempty interior, proving that there exists some open neighborhood V of 1 such that V (z) is nowhere dense. Thus Z is the union of sets of the form {z โˆˆ Z : V (z) is nowhere dense}, where V ranges over a countable basis of neighborhoods of 1; one of these sets must be nonmeagre, hence (since these sets are Borel) comeagre in some nonempty open U. Assume that (3) holds, and pick U โ€ฒ โІ U witnessing it. The assumption of (3) amounts to saying that {z โˆˆ U โ€ฒ : V (z) โˆฉ W 6= โˆ…} is dense open in U โ€ฒ for any nonempty open W โІ U โ€ฒ ; this implies that {z โˆˆ U โ€ฒ : V (z) is dense in U โ€ฒ } is comeagre in U โ€ฒ . This is a contradiction with the fact that V (z) must be nowhere dense for a generic element of U, hence also of U โ€ฒ .  Now, we need to understand when the above criterion is satisfied, for G a countable group, P = X! and Z = Hom(G, X!). Given an open set U = O(ฯ, S, A), let i(ฯ) denote the number of distinct G-orbits of elements of A; we may pick ฯ such that i(ฯ) number is minimal among elements of U. Then, enlarging S and shrinking A as needed, we can reduce to the situation where โˆ€ฯ€ โˆˆ U โˆ€a 6= aโ€ฒ โˆˆ A โˆ€g โˆˆ G ฯ€(g)(a) 6= aโ€ฒ . We are now in a situation where orbits of elements of A cannot interfere with each other; this enables us to reduce to the case where A = {a} is a singleton and we are working inside the Polish space Z โ€ฒ of transitive G-actions. Consider an open set U = O(ฯ, S, a) โˆฉ Z โ€ฒ ; let Ga denote the stabilizer of a for this action, and let V be the group of permutations fixing a finite set F . Enlarging S if needed, we assume that F โІ Sa. Then, it is readily checked that two elements ฯ1 , ฯ2 of U belong to the same V -orbit iff the stabilizers of a for ฯ1 and ฯ2 are the same. Let S1 = {g2 g1โˆ’1 : g1 , g2 โˆˆ S and g1 (a) = g2 (a)} , S2 = {g โˆˆ S : g(a) 6= a} . 15 The discussion above shows that the criterion (3) of Lemma 5.1 is satisfied iff there exists an open set W = O(ฯฬƒ, Sฬƒ, a) โˆฉ Z โ€ฒ contained in U such that the stabilizer of a is the same for any two elements of W ; that is, if and only if there exist finite sets Sฬƒ1 , Sฬƒ2 โІ G, with Sฬƒ1 โЇ S1 and Sฬƒ2 โЇ S2 , and a subgroup Gโ€ฒa such that: โˆ€H โˆˆ Sub(G) (โˆ€g โˆˆ S1 g โˆˆ H and โˆ€g โˆˆ S2 g 6โˆˆ H) โ‡” (H = Gโ€ฒa ) . Thus H is an isolated point in Sub(G); since Ga was an arbitrary subgroup of G, and S1 , S2 encode an arbitrary open neighborhood of Ga , we just established that there exists a generic action in Hom(G, X!) if, and only if, G is solitary. One can try to use the same approach as above to understand when there exists generic conjugacy classes in Hom(G, P ) for other Polish groups P . But, as the structure of P becomes more complicated, the above analysis is harder to carry out (in particular, the reduction to transitive actions no longer works). One case when one can do it is when P = Aut(R) is the automorphism group of the random graph. Then, reasoning in much the same way as above, one obtains the following criterion, which probably can be further simplified. Proposition 5.2. Given G a countable group, there exists a generic element in Hom(G, Aut(R)) iff the following condition is satisfied: For any finitely-generated subgroups H1 , . . . , Hn of G, and any finite Ki,j โІ G with Hi Hj โˆฉ Ki,j = โˆ… for all i โ‰ค j, there exists finitely generated subgroups H1โ€ฒ , . . . , Hnโ€ฒ such that: โ€ข For all i Hiโ€ฒ contains Hi . โ€ข For all i, j the double coset space Hiโ€ฒ\G/Hjโ€ฒ is finite. โ€ข For all i โ‰ค j one has Hiโ€ฒHjโ€ฒ โˆฉ Ki,j = โˆ…. The above property is hard to grasp; it does imply that G is finitely generated, and that any finitely generated subgroup of G is an intersection of finitely generated subgroups with finite bi-index. Must a group satisfying the previous conditions be LERF? 6. A-separability Definition 6.1. An action G y X of a discrete, countable group G is called amenable if it satisfies any one of the following equivalent conditions: โ€ข For every ฮต > 0 and โ„ฆ โІ G finite, X admits an (ฮต, โ„ฆ)-Fรธlner subset, that is, a finite |gF โˆ†F | set F โІ X such that < ฮต for all g โˆˆ โ„ฆ. |F | โ€ข There exists a finitely additive G-invariant probability measure on X. When the action is transitive, of the form G y G/K, these conditions are further equivalent to the following: โ€ข If G acts continuously on a compact space and K admits an invariant Borel measure, then so does G. In the transitive case it is sometimes convenient to adopt group theoretic terminology as follows: Definition 6.2. A subgroup K of a group G is called co-amenable if the quasiregular action G y G/K is amenable. 16 The equivalence of these three conditions is classical. By definition, an amenable action always admits a Fรธlner-sequence. This is a sequence of finite subsets Fn โІ X such that for |gFn โ–ณFn | all g โˆˆ G we have lim = 0. We recall the following: nโ†’โˆž |Fn | Remark 6.3. A Fรธlner-sequence can be chosen to be increasing (with respect to inclusion). As defined in the introduction, a group G is A-separable if the set of co-amenable subgroups is dense in Sub(G). We now prove Theorem 1.12, giving a characterization of A-separability in the language of generic actions: Proof of Theorem 1.12. Denote by CoAm(G) the set of all co-amenable subgroups of G. Note For x โˆˆ X denote ฯƒ ฮฃ(x) = {ฯƒ โˆˆ Hom(G, X!) | G y (G)x is amenable} = {ฯƒ โˆˆ Hom(G, X!) | Gx (ฯƒ) โˆˆ CoAm(G)}. and ฮฃ = โˆฉxโˆˆX ฮฃ(x). If ฮฃ is generic then ฮฃ(x) is dense in Hom(G, X!) and by Lemma 2.5 the image of this set {Gx (ฯƒ) | ฯƒ โˆˆ ฮฃ(x)} is a dense subset of Sub(G) consisting of co-amenable subgroups. Conversely, assume that CoAm(G) is dense in Sub(G) and we wish to prove that the set ฮฃ is generic in Hom(G, X!). It is enough to show that ฮฃ(x) is generic in Hom(G, X!) for every x โˆˆ X. The density of ฮฃ(x) is assured by the hypothesis, the fact that ฮฃ(x) = Gโˆ’1 x (CoAm(G)) and Lemma 2.5. To show that ฮฃ(x) is Gฮด , it is enough to show that the condition that a specific finite set F โІ ฯƒ(G)x is (ฮต, โ„ฆ)-Fรธlner is open, where ฮต > 0 and โ„ฆ โІ G is finite. Assume this is the case for some ฯƒ โˆˆ Hom(G, X!) we seek an open neighborhood ฯƒ โˆˆ O โІ Hom(G, X!) such that F is still contained in the orbit, and is still Fรธlner for every ฯ• โˆˆ O. For every f โˆˆ F pick a group element gf โˆˆ G such that f = ฯƒ(gf )x. Let F โ€ฒ = F โˆช{x} and โ„ฆโ€ฒ = โ„ฆ โˆช {gf | f โˆˆ F } - the desired neighborhood is given by O = O(ฯƒ, F โ€ฒ , โ„ฆโ€ฒ ).  As mentioned in the introduction, LERF groups and amenable groups are A-separable but they are not the only examples of A-separable groups. In order to give an example of an Aseparable group which is neither LERF nor amenable, we will first prove that A-separability is closed under taking free products: Theorem 6.4. Let G and K be countable groups. If G and K are A-separable then so is G โˆ— K. Proof. Every element of Hom(G โˆ— K, X!) is of theform ฯ• โˆ— ฯˆ for ฯ• โˆˆ Hom(G, X!), ฯˆ โˆˆ Hom(K, X!); where ฯ• โˆ— ฯˆ is defined by setting ฯ• โˆ— ฯˆ (g) = ฯ•(g) and ฯ• โˆ— ฯˆ (k) = ฯˆ(k), โˆ€g โˆˆ G, k โˆˆ K and expanding the definition to the free product. For every x โˆˆ X, ฮต > 0 and finite subsets S โІ G, T โІ K let ฮฃ(x, ฮต, S, T ) = {ฯƒ โˆ— ฯ„ โˆˆ Hom(G โˆ— K, X!) | the (ฯƒ โˆ— ฯ„ )-orbit of x contains an (ฮต, S โˆช T )-Fรธlner set}.  We want to prove that ฮฃ = ฮฃ(x, n1 , S, T ) x โˆˆ X, n โˆˆ N, S โІ G, T โІ K finite is generic in Hom(G โˆ— K, X!). Since X, G and K are countable, it is enough to show that the sets ฮฃ(x, ฮต, S, T ) are open and dense for every x โˆˆ X, ฮต > 0 and finite subsets S โІ G, T โІ K. The argument that shows that ฮฃ(x, ฮต, S, T ) is open was given in the proof of Theorem 1.12. T 17 Fix x, ฮต, S and T as above. We prove that ฮฃ(x, ฮต, S, T ) is dense in Hom(G โˆ— K, X!). Let ฯ• โˆ— ฯˆ โˆˆ Hom(G โˆ— K, X!) and let A โІ X be finite. We will find ฯ•โ€ฒ โˆˆ Hom(G, X!) and ฯˆ โ€ฒ โˆˆ Hom(K, X!) such that ฯ•โ€ฒ (s)a = ฯ•(s)a, ฯˆ โ€ฒ (t)a = ฯˆ(t)a for all s โˆˆ S, t โˆˆ T, a โˆˆ A and such that ฯ•โ€ฒ โˆ— ฯˆ โ€ฒ โˆˆ ฮฃ(x, ฮต, S, T ). We can assume that x โˆˆ A. By A-separability, there exist ฯƒ โˆˆ Hom(G, X!) and ฯ„ โˆˆ Hom(K, X!) such that ฯƒ(s)a = ฯ•(s)a, ฯ„ (t)a = ฯˆ(t)a for all ฯƒ ฯ„ s โˆˆ S, t โˆˆ T, a โˆˆ A and such that the actions G y X and K y X are amenable on every orbit. Let L := ฯƒ โˆ— ฯ„ (G โˆ— K) = hฯƒ(G), ฯ„ (K)i. Case 1: all the ฯƒ and ฯ„ orbits which are contained S in Lx are finite. Let B โІ Lx be a finite, ฯƒ-invariant set containing AโˆฉLx and let C = bโˆˆB ฯ„ (K)b. We define a representation ฯ•โ€ฒ โˆˆ Hom(G, X!) by declaring every c โˆˆ C r B and every element in the ฯƒ-orbit of c to be a fixed point for ฯ•โ€ฒ and on every other element of X, ฯ•โ€ฒ (g) identifies with ฯƒ(g) for all g โˆˆ G. Notice that since B is ฯƒ-invariant, ฯ•โ€ฒ (g) is well defined and acts the same as ฯƒ(g) on B for all g โˆˆ G. In particular, ฯ•โ€ฒ (g) agrees with ฯ•(g) on A. We have that C is finite, invariant under both ฯ•โ€ฒ and ฯ„ and contains x. Setting ฯˆ โ€ฒ = ฯ„ , the (ฯ•โ€ฒ โˆ— ฯˆ โ€ฒ )-orbit of x is finite so the orbit itself is an (ฮต, S โˆช T )-Fรธlner set for ฯ•โ€ฒ โˆ— ฯˆ โ€ฒ . Case 2: Lx contains either an infinite ฯƒ-orbit or an infinite ฯ„ -orbit. Assume, S without loss of generality, that Lx contains an infinite ฯ„ -orbit Y . Denote B = A โˆช sโˆˆS ฯƒ(s)A and let Fn be an increasing Fรธlner-sequence in Y for the ฯ„ -action. Since the sets Fn are finite, none of them is ฯ„ -invariant and so the Fรธlner-sequence does not stabilize. This implies that |Fn | โ†’ โˆž and in particular, Y contains an (ฮต, T )-Fรธlner set F such that 2(|B| + 1) |F | > . Now, let z โˆˆ G โˆ— K be such that (ฯƒ โˆ— ฯ„ )(z)x โˆˆ F and such that z is of ฮต minimal length with respect to the canonical presentation: z = gn kn gnโˆ’1knโˆ’1 ยท ยท ยท g1 k1 (gi โˆˆ G, kj โˆˆ K, g1, . . . , gnโˆ’1 , k2 , . . . , kn 6= 1). Denote y = (ฯƒ โˆ— ฯ„ )(z)x. By Lemma 2.8, we can assume that ฯƒ has infinitely many fixed points. In particular, there exits a set C โІ X on which ฯƒ(G) acts trivially, such that |C| = |F r (B โˆช {y})| and such that C does not intersect the finite set B โˆช F โˆช trace(ฯƒโˆ—ฯ„ )(z) (x) where we think of (ฯƒ โˆ— ฯ„ )(z) as the word over X! corresponding to the given presentation of z. Denote D = F r (B โˆช {y}) and let ฮพ โˆˆ X! be a permutation of order 2 that takes C bijectively onto D and acts trivially on X r(C โˆชD). We define an action ฯ•โ€ฒ โˆˆ Hom(G, X!) by ฯ•โ€ฒ (g) = ฮพ โˆ’1 ฯƒ(g)ฮพ for all g โˆˆ G. Since ฮพ acts trivially on B we have that โˆ€s โˆˆ S, โˆ€a โˆˆ A : ฯ•โ€ฒ (s)a = ฯƒ(s)a = ฯ•(s)a and that every element of D is fixed under ฯ•โ€ฒ (s) for all s โˆˆ S. Hence: โˆ€s โˆˆ S : 2|F r D| 2(|B| + 1) |ฯ•โ€ฒ (s)F โˆ†F | โ‰ค โ‰ค < ฮต. |F | |F | |F | Thus F is (ฮต, S)-Fรธlner for ฯ•โ€ฒ and (ฮต, T )-Fรธlner for ฯˆ โ€ฒ := ฯ„ and thus F is (ฮต, S โˆชT )-Fรธlner for ฯ•โ€ฒ โˆ—ฯˆ โ€ฒ. Notice that by the minimality of the length of z we have that trace(ฯƒโˆ—ฯ„ )(z) (x)โˆฉF = {y} and so ฮพ acts trivially on trace(ฯƒโˆ—ฯ„ )(z) (x). This means that (ฯ•โ€ฒ โˆ— ฯˆ โ€ฒ )(z)x = y โˆˆ F and since F is contained in a ฯ„ -orbit this implies that F is contained in the (ฯ•โ€ฒ โˆ— ฯˆ โ€ฒ )-orbit of x, as required.  Recall that the (m, n) Baumslag-Solitar group is the group BS(m, n) = hs, t | tโˆ’1 sm t = sn i. It is well known that BS(m, n) is solvable (hence amenable) if and only if m = 1. Proposition 6.5. For every n, the group BS(1, n) is not LERF. 18 Proof. Write: BS(1, n) = hs, t | tโˆ’1 st = sn i and notice that tโˆ’1 hsit = hsn i $ hsi. Thus, an element of hsi r tโˆ’1 hsit cannot be separated from tโˆ’1 hsit by a homomorphism into a finite group.  Corollary 6.6. There exist non-LERF, non-amenable A-separable groups. Proof. Let G = BS(1, n) for some n. G is amenable hence A-separable and so, by Proposition 6.4, G โˆ— G is A-separable. On the other hand, G โˆ— G is not LERF since G is not LERF and the LERF property passes to subgroups. G โˆ— G is also not amenable since it contains a free subgroup on two generators.  In order to complete the proofs of all the statements promised in the introduction we prove the following: Proposition 6.7. A group G with Kazhdan property (T) is A-separable if and only if it is LERF. In particular the following groups are never A-separable: โ€ข Groups with property (T) that are not residually finite, and in particular any simple group with property (T). โ€ข Irreducible lattices in higher rank semi-simple Lie groups with no compact factors that satisfy the congruence subgroup property. Proof. This follows directly from the fact that a transitive action G y G/H is amenable if and only if G/H is finite. The argument for that follows from property (T). If this action is amenable and F โІ G/H is an (K, ฮต) Fรธlner set then 1F โˆˆ โ„“2 (G/H) is a (K, ฮต)-almost invariant vector. Taking (K, ฮต) to be Kazhdan constants for G we can deduce the existence of a non-zero invariant vector f โˆˆ โ„“2 (G/H). Since the action of G on G/H is transitive f must be a constant function. But a non-zero constant function is in โ„“2 if and only if G/H is finite. Now if ฮ“ is a lattice as in the statement of the theorem it cannot be LERF because by the strong approximation theorem [LS03, Window 9],[Nik11] every Zariski dense subgroup has a finite index closure in the pro-congruence topology; which coincides with the profinite topology by assumption. By Kazhdanโ€™s theorem such a lattice has property (T) and the statement follows.  Note that conjecturally the congruence subgroup property automatically holds for such higher rank lattices, and this is indeed proven in many different cases. In particular the groups SLn (Z), n โ‰ฅ 3 are good examples for generically finite groups that is not A-separable. We conjecture further that the LERF property can never occur in a nontrivial way for property (T) groups namely: Conjecture 6.8. A countable group G with Kazhdan property (T) is LERF if and only if it is finite. It was pointed out to us by Matthew Stover that A similar question was already asked by Long and Reid in [LR08, Question 4.5]. We are grateful to some very constructive comments on the previous version of this paper by Mikloฬs Abeฬrt, Eli Glasner, and Matthew Stover. J.M wishes to thank Romain Tessera for interesting conversations and suggestions about solitary groups. This work was written while the first author was on sabbatical at the University of Utah. I am grateful to the math department there for their hospitality. Y.G. acknowledges support 19 from U.S. National Science Foundation grants DMS 1107452, 1107263, 1107367 โ€œRNMS: Geometric structures And Representation varietiesโ€ (the GEAR Network) that enabled this visit. The first and second authors were both partially supported by the Israel Science Foundation grant ISF 2095/15, and the third author was partially supported by Agence Nationale de la Recherche grant Grupoloco (ANR-11-JS01-0008). References [Ago13] Ian Agol. The virtual Haken conjecture. Doc. Math., 18:1045โ€“1087, 2013. With an appendix by Agol, Daniel Groves, and Jason Manning. [Bur71] R. G. Burns. On finitely generated subgroups of free products. J. Austral. Math. Soc., 12:358โ€“364, 1971. [GK14] R. Grigorchuk and R. Kravchenko. On the lattice of subgroups of the lamplighter group. Internat. J. Algebra Comput., 24(6):837โ€“877, 2014. [GW03] R. I. Grigorchuk and J. S. Wilson. A structural property concerning abstract commensurability of subgroups. J. London Math. Soc. (2), 68(3):671โ€“682, 2003. [GW08] Eli Glasner and Benjamin Weiss. Topological groups with Rokhlin properties. Colloq. Math., 110(1):51โ€“80, 2008. [Hal49] Marshall Hall, Jr. Subgroups of finite index in free groups. Canadian J. Math., 1:187โ€“190, 1949. [HHLS93] Wilfrid Hodges, Ian Hodkinson, Daniel Lascar, and Saharon Shelah. The small index property for ฯ‰-stable ฯ‰-categorical structures and for the random graph. J. London Math. Soc. (2), 48(2):204โ€“ 218, 1993. [Kit15] Daniel Kitroser. Generic Actions of Countable Groups. PhD thesis, Ben-Gurion university of the Negev, 2015. [KR07] Alexander S. Kechris and Christian Rosendal. Turbulence, amalgamation, and generic automorphisms of homogeneous structures. Proc. Lond. Math. Soc. (3), 94(2):302โ€“350, 2007. [LR08] D. D. Long and A. W. Reid. Subgroup separability and virtual retractions of groups. Topology, 47(3):137โ€“159, 2008. [LS03] Alexander Lubotzky and Dan Segal. Subgroup growth, volume 212 of Progress in Mathematics. Birkhaฬˆuser Verlag, Basel, 2003. [MT13] Julien Melleray and Todor Tsankov. Generic representations of abelian groups and extreme amenability. Israel J. Math., 198(1):129โ€“167, 2013. [Nik11] Nikolay Nikolov. Strong approximation methods. In Lectures on profinite topics in group theory, volume 77 of London Math. Soc. Stud. Texts, pages 63โ€“97. Cambridge Univ. Press, Cambridge, 2011. [Rom69] N. S. Romanovskiฤฑฬ†. On the residual finiteness of free products with respect to subgroups. Izv. Akad. Nauk SSSR Ser. Mat., 33:1324โ€“1329, 1969. [Ros11a] Christian Rosendal. Finitely approximable groups and actions part I: The Ribes-Zalesskiฤฑฬ† property. J. Symbolic Logic, 76(4):1297โ€“1306, 2011. [Ros11b] Christian Rosendal. Finitely approximable groups and actions part II: Generic representations. J. Symbolic Logic, 76(4):1307โ€“1321, 2011. [RR74] M. Bhaskara Rao and K. P. S. Bhaskara Rao. A category analogue of the Hewitt-Savage zero-one law. Proc. Amer. Math. Soc., 44:497โ€“499, 1974. [Sco85] Peter Scott. Correction to: โ€œSubgroups of surface groups are almost geometricโ€ [J. London Math. Soc. (2) 17 (1978), no. 3, 555โ€“565; MR0494062 (58 #12996)]. J. London Math. Soc. (2), 32(2):217โ€“ 220, 1985. [Wil08] Henry Wilton. Hallโ€™s theorem for limit groups. Geom. Funct. Anal., 18(1):271โ€“303, 2008. Yair Glasner. Department of Mathematics. Ben-Gurion University of the Negev. P.O.B. 653, Beโ€™er Sheva 84105, Israel. [email protected] Daniel Kitroser. Department of Mathematics. Ben-Gurion University of the Negev. P.O.B. 653, Beโ€™er Sheva 84105, Israel. [email protected] 20 Julien Melleray. Universiteฬ Claude Bernard โ€“ Lyon 1 . Institut Camille Jordan, CNRS UMR 5208 . 43 boulevard du 11 novembre 1918, 69622 Villeurbanne Cedex, [email protected] 21
4math.GR
arXiv:1802.05662v1 [cs.DS] 15 Feb 2018 List Heaps Andrew Frohmaderโˆ— February 2018 Abstract This paper presents a simple extension of the binary heap, the List Heap. We use List Heaps to demonstrate the idea of adaptive heaps: heaps whose performance is a function of both the size of the problem instance and the disorder of the problem instance. We focus on the presortedness of the input sequence as a measure of disorder for the problem instance. A number of practical applications that rely on heaps deal with input that is not random. Even random input contains presorted subsequences. Devising heaps that exploit this structure may provide a means for improving practical performance. We present some basic empirical tests to support this claim. Additionally, adaptive heaps may provide an interesting direction for theoretical investigation. 1 Introduction A heap is a data structure which holds a finite set of items. Each item is associated with a key drawn from a totally ordered set. Heaps support the following operations: make heap (h): insert (h, x, k): find min (h): delete min (h): decrease key (h, x, k): delete (h, x): meld (h1 , h2 ): Create and return a new, empty heap h Insert item x with key k into heap h and return a reference to where x is stored in h Return a reference to where the item with the minimum key is stored in heap h Delete the item with the minimum key from heap h and return it Decrease the key of item x in heap h to k Delete item x from heap h Return a heap formed by taking the union of heaps h1 and h2 The binary heap was introduced by Williams in 1964 [14]. Its simplicity and speed have made it and its generalization, the d-array heap, a popular choice in โˆ— [email protected] 1 practice. It supports insert, delete min, and decrease key in O(log n) time. It can be used to sort n items in O(n log n), which matches the worst-case lower bound for a comparison sort. Vuilleminโ€™s introduction of the binomial queue in 1978 [13], added meld to the list of operations supported in O(log n). In 1984, Fibonacci heaps [8], an extension of the binomial queue, achieved O(1) amortized time for insert, decrease key, and meld. The decrease key result was particularly important in that it improved the worst-case bounds for a number of well-known graph algorithms. More recently, a few structures have achieved worst-case O(1) time for decrease key and meld, see [2] or [4]. While this work has produced interesting and important theoretical results, it has failed to yield a structure that consistently outperforms the original binary heap and its variants in practice [9]. In this paper, we return to the binary heap and develop a simple extension, the List Heap. This straightforward extension can be given adaptive operations: operations whose performance depends not only on the problem size, but also on the level of presortedness (disorder) in the problem instance. A bit of work has gone into developing the theory of adaptive sorting algorithms, see [7], but to our knowledge, this work has not migrated into the related work on heap data structures, [3]. We believe that adaptive heaps may provide an interesting angle for theoretical investigation. Additionally, they may provide a means of improving the empirical performance of current heap variants. The List Heap is a first step in this direction. List Heaps support decrease key, insert, and delete min in O(log k), where k is the number of lists in the List Heap. As we will show, the number of lists in a List Heap is a function of both the size of the problem instance and the disorder of the problem instance. We returned to the binary heap because of its simplicity and ubiquity, but this was not without costs. List Heaps lose the O(1) insert, decrease key, and meld of more sophisticated structures. 1.1 Preliminaries Here we present notational conventions and definitions used through the remainder of this paper. Let X = hx1 , ..., xn i be a sequence of n distinct elements xi from some totally ordered set. If x1 < x2 < ... < xn , X is monotonically increasing or just increasing. If x1 > x2 > ... > xn , X is monotonically decreasing or just decreasing. A sequence is monotonic if it is either increasing or decreasing. The head of a sequence X is x1 , the tail is xn . If A is a set, then ||A|| is its cardinality. If X is a sequence, then |X| is its length. For two sequences X = hx1 , ..., xn i and Y = hy1 , ..., ym i, their concatenation XY is the sequence hx1 , ..., xn , y1 , ..., ym i. If the sequence X contains no elements, we write X = โˆ…. A sequence obtained by deleting zero or more elements from X is called a subsequence of X. A subsequence Y = hxi , ..., xj i of X is consecutive if the indices i, ..., j are consecutive integers. Let Y = hxi , ..., xj i and Z = hxk , ..., xl i be subsequences of X. The intersection of Y and Z, Y โˆฉ Z, is the subsequence of X obtained by deleting from X all xh not in both Y and Z for 1 โ‰ค h โ‰ค n. Similarly, the union of Y and Z, 2 Y โˆช Z, is the subsequence of X obtained by deleting from X all xh not in either Y or Z for 1 โ‰ค h โ‰ค n. Y and Z are disjoint if Y โˆฉ Z = โˆ…. Let P = {X1 , ..., Xk } be a set of disjoint subsequences of X, if the union of all subsequences in P equals X, then P is a partition of X. 1.2 Adaptive Sorting This section gives a very brief review of adaptive sorting. Heaps solve a generalized sorting problem, so adaptive sorting provides some intuition for why adaptive heaps might be useful. For a more detailed survey of adaptive sorting, see [7] or [11]. Consider the sorting problem: take as input some arbitrary sequence X = hx1 , ..., xn i of elements from a totally ordered set and return a permutation of the sequence that is in increasing sorted order. Comparison based sorting has a well-know worst-case lower bound of โ„ฆ(n log n) [5]. However, it is clear that this lower bound must not always hold. What if our input sequence is already sorted? What if only one element is out of place? What if it is the concatenation of two sorted subsequences? The lower bound can be refined if we account for the disorder in the input sequence. The main achievements of the adaptive sorting literature are: proposing a variety of measures of disorder, proving new lower bounds with respect to these measures, developing sorting algorithms whose performance matches these new lower bounds, and developing a partial order on the set of measures. We stop here and again direct the reader to [7] or [11] for more information. 1.3 Outline of Paper The remainder of the paper is organized as follows. Section 2 discusses why adaptive heaps might be worth developing. Section 3 presents List Heaps their structure and operations. Section 4 presents the results of a series of brief empirical tests suggesting List Heaps may have promise in practice. Section 5 summarizes results obtained. 2 Adaptive Heaps This section presents a few reasons for developing adaptive heaps. We use the term adaptive heap loosely throughout this paper to refer to a heap whose performance is some function of the level of presortedness (disorder) of the input sequence. There are clearly complications we are glossing over, the largest of which is how to deal with decrease key. Further, heap problem instances can have disorder of different types, not just related to the presortedness of the input sequence. A starting point to formalize these notions is the adaptive sorting literature. It is fairly easy to extend the results of adaptive sorting to arbitrary sequences of insert and delete min; decrease key may prove more challenging. 3 Why build a heap whose performance adapts to the presortedness of the input sequence? Just as the lower bound for sorting can be restated as a function of the presortedness of the input sequence, the lower bound for an arbitrary heap problem can be restated as a function of the disorder of the problem instance. As delete min is the only operation for which O(1) performance is not available, the disorder of the problem directly impacts the bound on delete min. Thus, we can restate the bound on delete min as O(log k) where k is some measure of disorder less than or equal to the number of elements in the heap. Then, intuitively, the bound on delete min ranges from O(1) for sorted input to O(log n) for random input. The bounds on algorithms which rely on heaps, such as Dijkstraโ€™s shortest path algorithm [15], can similarly be adjusted to reflect disorder. For example, we can restate the Dijkstra bound as O(n log k + m) where n is the number of vertices, m is the number of edges, and k is a measure of disorder with k โ‰ค n. The discussion above suggests that heap-based applications that have input sequences with some level of presortedness could benefit from adaptivity. What is less obvious is that even heap-based applications that have random input sequence can benefit from adaptivity. Here, the benefit is not in asymptotic performance, but in constant factors. Let X be a random sequence of n elements. As n โ†’ โˆž, the minimum number of โˆš increasing subsequences into which X can be partitioned is approximately 2 n subsequences [1]. As we will show in Section 3.3, we can create an extension of the binary heap that is adaptive to the minimum number of increasing subsequences. Thus, where a binary heap constructed from X performs roughly 2 log n comparisons to delete min in the worst-case, an adaptive heap constructed from X can perform delete min in worst-case log n comparisons - cutting the constant factor in half. 3 List Heaps This section introduces the List Heap. The List Heap structure closely mirrors that of the binary heap. The hope is that this similarity makes the changes required to add adaptivity to heaps clear. Additionally, we believe adaptive variants of the binary heap have the greatest potential to be immediately useful in practice. However, binary heaps are flawed as a choice in that decrease key and insert take O(log n) time while O(1) implementations of these operations are clearly possible. Thus the List Heap cannot be optimal on all problem instances. We tolerate this flaw and show that we can construct a heap whose performance is a function of a number of measures of disorder. In particular, we will focus on developing heaps that are adaptive to runs, SU S, and Enc (defined later). These measures of disorder partition the input into monotonic subsequences which are particularly simple for a heap to use. This paper focuses only on insert, delete min, and decrease key and assumes all keys are unique. We first consider the structure of the heap. Next, we outline operations that are adaptive with respect to runs. Finally, we present operations that are adaptive with respect to SU S and Enc. 4 3.1 Structure A List Heap h is an array of circular doubly linked lists of nodes, h = hl1 , ..., lk i. Each node has a unique key associated with it. Throughout this paper we will refer to the node x and its key interchangeably. We use the notation x(i,j) to refer to the jth node in list li . List Heaps must maintain two invariants. 1. For any list li in heap h, the nodes of li are in increasing sorted order by key value, li = hx(i,1) , ..., x(i,j) i, with x(i,1) < x(i,2) < ... < x(i,j) . 2. The lists are arranged in heap order in the array, that is lโŒŠi/2โŒ‹ < li where we define li < lj if x(i,1) < x(j,1) . With the invariants above, we can view a List Heap as a standard binary heap of elements: each binary heap element is a list and the key for each list is the key of its head node. With this structure, the minimum node is x(1,1) - the head node of list l1 . We will refer to l1 as the root list of the heap. 0 1 l1 1 3 2 l2 4 14 15 3 l3 2 8 9 4 l4 5 13 5 l5 6 10 6 l6 11 7 l7 7 12 16 Figure 1: The List Heap Structure The sorted linked lists are the key feature of the List Heap. They enable us to capture some of the existing order in the input sequence. As a result, List Heaps can be given operations that are adaptive with respect to some measures of disorder. 3.2 A Runs Adaptive List Heap In this section, we present operations for a List Heap that is adaptive with respect to runs, abbreviated RA List Heap. We show that the performance of each heap operation is a function of the number of lists in the heap and that the insert operation partitions the sequence of inserted elements into L lists where L is less than or equal to the number of runs in the sequence. 5 Definition 1. A run is a consecutive decreasing subsequence of maximum length. A subsequence Xi = hxj , ..., xk i of X is a run if and only if j, ..., k are consecutive integers and xjโˆ’1 < xj > ... > xk < xk+1 . The total number of runs in a sequence gives a measure of disorder. For example, consider the following random sequence, h3, 15, 14, 4, 9, 13, 5, 12, 10, 6, 1, 11, 8, 16, 2, 7i. (1) This sequence of sixteen elements can be partitioned into eight runs, h3i, h15, 14, 4i, h9i, h13, 5i, h12, 10, 6, 1i, h11, 8i, h16, 2i, h7i. (2) A decreasing sequence will consist of just one run, an increasing sequence of n elements will contain n runs, each with only one element. We now outline operations for the RA List Heap. 3.2.1 Insert To insert a new item x into heap h = hl1 , ..., lk i, do the following. If x is less than the head node of lk , (recall that we denote this x < lk ), set i = k. Otherwise, set i = k + 1. Then, while x < lโŒŠi/2โŒ‹ , set i = โŒŠi/2โŒ‹ and repeat. Once the loop terminates, append x to the front of list li . Note that i might equal k + 1 in which case a new empty list lk+1 will need to be created before x is appended. Figure 1 shows the RA List Heap generated by inserting the random sequence (1) into an empty heap. 3.2.2 Delete Min To perform delete min on heap h, remove the head node x(1,1) from the root list l1 and set x(1,1) to the return value of the function. If l1 is now empty, replace it with the last list in the heap lk . If l1 is not empty, there is no need to swap it with lk . Either way, at this point l1 might be out of heap order. Restore heap order by calling heapify down. This is identical to the heapify operation of the binary heap except that it manipulates entire lists instead of individual nodes. To heapify down on a list li , compare li with its two children, l2i and l2i+1 . If li is less than both children, do nothing. Otherwise, swap li with its smallest child and repeat. 3.2.3 Decrease Key To perform decrease key on a node x(i,j) , set x(i,j) โ€™s key to the new value. Now there are two cases. 1. If x(i,j) is a head node, that is if x(i,j) = x(i,1) , decreasing x(i,1) โ€™s key maintains the sorted order of the list li but may destroy the heap order of the array. Call heapify up to restore the heap order. To heapify up a 6 list li , compare li to its parent lโŒŠi/2โŒ‹ . If li < lโŒŠi/2โŒ‹ swap the lists. Recurse until heap order is restored. 2. If x(i,j) is not a head node, li may no longer be sorted. If x(i,j) is less than its left sibling x(i,jโˆ’1) , then the list li is out of sorted order. Remove x(i,j) from li and reinsert x(i,j) into the List Heap using the insert routine. 3.2.4 Analysis It is clear from their descriptions that each of these functions run in O(log k) time, where k is the number of lists in the RA List Heap. Theorem 1. A sequence of consecutive insert operations partitions the inserted elements into L lists where L is less than or equal to the minimum number of runs in the input sequence. Proof. Say the consecutive sequence of elements inserted into heap h = hl1 , ...lk i is X = hx1 , ..., xi , xi+1 , ...i. We must show that if xi > xi+1 , then xi+1 is appended to an existing list. There are a couple of cases to consider. 1. If xi < lk , xi is appended to lk or one of lk โ€™s ancestors. Now, xi+1 < xi so xi+1 < lk and xi+1 is also appended to lk or one of lk โ€™s ancestors. 2. If xi > lk , xi is appended to lk+1 or one of its ancestors. If xi is appended to lk+1 , the new list lk+1 must be created. Now, xi+1 is compared first to lk+1 . Since xi+1 < xi , xi+1 < lk+1 , thus xi+1 is appended to lk+1 or one of lk+1 โ€™s ancestors. If instead xi was appended to an ancestor of lk+1 , lk+1 was not created. Then xi+1 is compared first to lk . If xi+1 > lk , xi+1 is compared to the ancestors of lk+1 . Since xi was appended to an ancestor of lk+1 , xi+1 must be less than one of the ancestors, so xi+1 is appended to an existing list. 3.3 An Enc Adaptive List Heap In this section we present operations for a List Heap that is adaptive with respect to runs, SU S, and Enc. We will abbreviate this EA List Heap. SU S is due to Levcopoulos and Petersson [10], Enc was proposed by Skiena [12]. Definition 2. SU S (Shuffled UpSubsequences) is the minimum number of increasing subsequences into which a sequence X can be partitioned. This differs from runs in that the subsequences are increasing and they are not required to be consecutive. For example, the sequence (1) can be partitioned into the following seven increasing subsequences, h3, 15, 16i, h14i, h4, 9, 13i, h5, 12i, h10, 11i, h6, 8i, h1, 2, 7i. (3) This is, in fact, an optimal partition, so SU S for the sequence (1) is seven. 7 Definition 3. An encroaching set is an ordered set of increasing sequences hE1 , ..., Ek i such that the head(Ei ) < head(Ei+1 ) and tail(Ei ) > tail(Ei+1 ) for 1 โ‰ค i < k. Thus, the increasing sequences nest or encroach upon one another. Skiena describes an encroaching set by an algorithm, melsort, that builds them. Given an input sequence Y = hy1 , ..., yn i that is a permutation of an ordered set, build the encroaching set E = hE1 , ..., Ek i as follows. If the item yi fits on either end of one of the increasing sequences Ej , put it there. Otherwise, form a new sequence Ek+1 . Place each item on the oldest Ej upon which it fits. We note that this strategy bears a lot of similarities to Patience Sorting, see [1]. The encroaching set for our example sequence (1) is, h1, 3, 15, 16i, h2, 4, 14i, h5, 9, 13i, h6, 10, 12i, h7, 8, 11i. (4) Thus, Enc for the sequence (1) is five. For adaptive sorting, an Enc optimal algorithm is also SU S optimal and runs optimal [11]. Therefore, we focus on developing a heap which is adaptive to Enc, thereby also achieving adaptivity with respect to SU S and runs. Again, we emphasize that this paper treats the notation of adaptivity informally. In order to achieve some level of adaptivity with respect to Enc, we only need to alter our insert function. The decrease key and delete min functions can remain the same as above. 3.3.1 Insert The insert function attempts to build an encroaching set. We adapt Skienaโ€™s strategy to the dynamic context of heaps where there is not a fixed input sequence. Let y be a new item to insert and h = hl1 , ..., lk i be the heap. In this context, lj is roughly equal to Ej of the encroaching list set. There are three cases. 1. Try to insert y at the front of a list in h. Use binary search on the lists to find the list that has y < li and minimizes |y โˆ’ li |. Note, the lists are maintained in heap order, not sorted order. As a result, this binary search may only be an approximate heuristic. Moreover, the binary search may have failed to consider li โ€™s direct parent. Appending y to the front of li without checking li โ€™s parent could destroy heap order. Thus, we must also compare y to li โ€™s ancestors. If y < lโŒŠi/2โŒ‹ , set i = โŒŠi/2โŒ‹ and repeat. If we find an li , we are done. Otherwise, we move on to Case 2. 2. Try to insert y at the tail of a list in h. Use binary search on the tail nodes to find the list li that has tail(li ) < y and minimizes |y โˆ’ tail(li )|. If no li is found, go to Case 3. 3. Create a new list lk+1 with the new node as its only element and insert the list after lk in the array. 8 3.3.2 Analysis It is easy to see that the insert routine described above runs in O(log k), where k is the number of lists in the EA List Heap. Theorem 2. A sequence of n consecutive inserts to an empty EA List Heap h partitions the input into an optimal encroaching set. Proof. Simply observe that the insert function reduces to the list creation phase of melsort if the heap starts empty. The only algorithmic difference between the insert routine above and Skienaโ€™s melsort is the addition of the heap order check. Corollary 2.1. Given an empty EA List Heap h, perform n consecutive insert operations of elements with uniformly random keys. Then, as n grows large, the expected worst-case number of comparisons to delete the minimum item from h is less than or equal to half the the number of comparisons required by a binary heap. Proof. By Theorem 2, h = hl1 , ..., lk i where the lists li form an optimal encroaching set. As mentioned above, an Enc optimal partition is also SU โˆš S optimal, [11], so k is less than or equal to SU S. Now, as nโˆšโ†’ โˆž, SU S โ†’ 2 n. [1] Thus, k approaches something less than or equal to 2 n. The worst-case number of comparisons for delete min on a standard binary heap is 2โŒˆlog n โˆ’ 1โŒ‰. For the Enc Adaptive List Heap, the worst-case number of comparisons is less than or โˆš equal to 2โŒˆlog k โˆ’ 1โŒ‰ โ‰ค 2โŒˆlog (2 n) โˆ’ 1โŒ‰ = โŒˆlog nโŒ‰. As n โ†’ โˆž, the binary heap bound approaches 2โŒˆlog nโŒ‰. 4 Empirical Results We implemented both the RA List Heap and the EA List Heap for testing purposes, but made no attempts to optimize the code. The results of a series of brief empirical tests against a similarly unoptimized binary heap are presented below. The tests were performed using a codebase written in C and workloads from the 5th DIMACS challenge [6] (with modifications) and a simple sorting routine. The results presented below are raw wallclock times divided by the minimum time attained by any heap. Thus, 1.00 is the minimum wallclock time and k is k times the minimum. RA List Heap EA List Heap Binary Heap Sorted Sorting 1.00 1.15 12.62 Random Sorting 2.29 1.00 2.52 Random Dijkstra 1.00 1.10 1.22 Table 1: Normalized Wallclock Times Sorted Sorting refers to the task of inserting an n-element decreasing sorted sequence into the heap, followed by n consecutive calls to delete min. Random 9 sorting refers to the task of inserting an n-element random sequence into the heap, followed by n consecutive calls to delete min. The results presented for sorting are for n = 10 million. Random Dijkstra refers to Dijkstra workloads from DIMACS. The results presented for Dijkstra are from a strongly connected randomly generated network with 2 million nodes and 8 million edges. These test results suggest that some variant of the List Heap may be useful in practice. We stress that the results presented above were derived from very simplistic testing. They are merely suggestive that List Heaps may have potential in practice. They are in no way the final word on the empirical performance of the List Heap. 5 Conclusion This paper introduced adaptive heaps - heaps whose performance is a function of both the size of the problem instance and the disorder of the problem instance. We introduced the List Heap as a generic structure that can be endowed with adaptive operations. Finally, we presented operations for the List Heap that are adaptive with respect to a number of measures of disorder on the input sequence. The discussion within this paper has been relatively informal and the List Heap introduced is far from theoretically optimal. If there is interest in this topic, there are a number of directions from here. Additional empirical testing of the List Heap is needed. We presented two insert functions for the List Heap, but there are clearly more (d-array, increasing/decreasing runs, etc.). The optimal choice likely depends on the intended application. If decrease key is not needed, List Heaps could be implemented entirely with arrays. On the theory side, the List Heap and discussion of adaptivity included in this paper leaves much to be desired. We are working on formalizing some notions of adaptivity and have developed a variant of the Fibonacci Heap that is closer to optimal from a theoretical perspective. Modification to other existing heap variants may provide even better results. References [1] David Aldous and Persi Diaconis. Longest increasing subsequences: From patience sorting to the baik-deift-johansson theorem. Bull. Amer. Math. Soc, 36:413โ€“432, 1999. [2] Gerth Stรธlting Brodal. Worst-case efficient priority queues. In Proceedings of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA โ€™96, pages 52โ€“58, Philadelphia, PA, USA, 1996. Society for Industrial and Applied Mathematics. [3] Gerth Stรธlting Brodal. A Survey on Priority Queues, pages 150โ€“163. Springer Berlin Heidelberg, Berlin, Heidelberg, 2013. 10 [4] Gerth Stรธlting Brodal, George Lagogiannis, and Robert E. Tarjan. Strict fibonacci heaps. In Proceedings of the Forty-fourth Annual ACM Symposium on Theory of Computing, STOC โ€™12, pages 1177โ€“1184, New York, NY, USA, 2012. ACM. [5] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms, Third Edition. The MIT Press, 3rd edition, 2009. [6] DIMACS. Dimacs 5th challenge: https://app.cs.amherst.edu/ ccmcgeoch/challenge5/. Priority queues. [7] Vladmir Estivill-Castro and Derick Wood. A survey of adaptive sorting algorithms. ACM Comput. Surv., 24(4):441โ€“476, December 1992. [8] Michael L. Fredman and Robert Endre Tarjan. Fibonacci heaps and their uses in improved network optimization algorithms. J. ACM, 34(3):596โ€“615, July 1987. [9] Daniel H. Larkin, Siddhartha Sen, and Robert E. Tarjan. A back-to-basics empirical study of priority queues. In Proceedings of the Meeting on Algorithm Engineering & Expermiments, pages 61โ€“72, Philadelphia, PA, USA, 2014. Society for Industrial and Applied Mathematics. [10] C. Levcopoulos and O. Petersson. Sorting shuffled monotone sequences. Information and Computation, 112(1):37 โ€“ 50, 1994. [11] Ola Petersson and Alistair Moffat. A framework for adaptive sorting. Discrete Applied Mathematics, 59(2):153 โ€“ 179, 1995. [12] Steven S. Skiena. Encroaching lists as a measure of presortedness. BIT Numerical Mathematics, 28(4):775โ€“784, Dec 1988. [13] Jean Vuillemin. A data structure for manipulating priority queues. Commun. ACM, 21(4):309โ€“315, April 1978. [14] John William Joseph Williams. Algorithm 232 - heapsort. Commun. ACM, 7(6):347โ€“349, June 1964. [15] Edsger Wybe. Dijkstra. A note on two problems in connexion with graphs. 1:269โ€“271, 12 1959. 11
8cs.DS
Balancing Explicability and Explanations Emergent Behaviors in Human-Aware Planning Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampatiโˆ— School of Computing, Informatics, and Decision Systems Engineering Arizona State University, Tempe, AZ 85281 USA tchakra2,ssreedh3,[email protected] arXiv:1708.00543v2 [cs.AI] 3 Feb 2018 ABSTRACT Human aware planning requires an agent to be aware of the intentions, capabilities and mental model of the human in the loop during its decision process. This can involve generating plans that are explicable to a human observer as well as the ability to provide explanations when such plans cannot be generated. In this paper, we bring these two concepts together and show how an agent can account for both these needs and achieve a trade-off during the plan generation process itself by means of a model-space search method MEGA. This in effect provides a comprehensive perspective of what it means for a decision-making agent to be โ€œhuman-awareโ€ by bringing together existing principles of planning under the umbrella of a single plan generation process. We situate our discussion in the context of recent work on explicable planning and explanation generation, and illustrate these concepts in modified versions of two well-known planning domains, as well as in a demonstration of a robot involved in a typical search and reconnaissance task with an external supervisor. Human factor studies in the latter highlight the usefulness of the proposed approaches. CCS CONCEPTS โ€ข Computing methodologies โ†’ Artificial intelligence; Planning and scheduling; Cognitive robotics; โ€ข Human-centered computing; โ€ข Computer systems organization โ†’ Robotics; KEYWORDS Human-Aware Planning, Explicable Planning, Plan Explanations, Explanation as Model Reconciliation, Minimal Explanations. 1 INTRODUCTION Mh first two authors contributed equally. Mh the robot instead attempts to update the humanโ€™s mental model to cR in which the robotโ€™s original plan is an intermediate model M h equivalent (with respect to a metric such as cost or similarity) to โˆ— โˆ— the optimal and hence explicable, i.e. ฯ€ M R โ‰ก ฯ€ cR . Mh Until now, these two processes of plan explanations and explicability have remained separate in so far as their role in an agentโ€™s deliberative process is considered - i.e. a planner either generates an explicable plan to the best of its ability or it produces explanations of its plans where they required. However, there may be situations where a combination of both provide a much better course of action โ€“ if the expected human plan is too costly in the plannerโ€™s model (e.g. the human might not be aware of some safety constraints) or the cost of communication overhead for explanations is too high (e.g. limited communication bandwidth). Consider, for example, a human working with a robot that has just received a software update allowing it to perform new complex maneuvers. Instead of directly trying to conceive all sorts of new interactions right away that might end up spooking the user, the robot could instead reveal only certain parts of the new model while still using its older model (even though suboptimal) for the rest of the interactions so as to slowly reconcile the drifted model of the user. This is the focus of the current paper where we try to attain the sweet spot between plan explanations and explicability. 1.1 It is often useful for a planning agent while interacting with a human in the loop to use, in the process of its deliberation, not only the model M R of the task it has on its own, but also the model MhR that the human thinks it has (refer to Figure 1a). This mental model of the human [9] is in addition to the physical model of the human. This is, in essence, the fundamental thesis of the recent works on plan explanations [10] and explicable planning [35], summarized under the umbrella of multi-model planning, and is in addition to the originally studied human-aware planning (HAP) problems where actions of the human (and hence the actual human model and the robotโ€™s belief of it) are also involved in the planning process. The need for explicable planning or plan explanations in fact occur when these two models โ€“ M R and MhR โ€“ diverge. This means that โˆ— โˆ— the optimal plans in the respective models โ€“ ฯ€ M R and ฯ€ R โ€“ may โˆ— The not be the same and hence optimal behavior of the robot in its own model is inexplicable to the human in the loop. In the explicable planning process, the robot produces a plan ฯ€b that is closer to the humanโ€™s expected plan, i.e. ฯ€b โ‰ˆ ฯ€ โˆ— R . In the explanation process, Related Work As AI agents become pervasive in our daily lives, the need for such agents to be cognizant of the beliefs and expectations of the humans in their environment has been well documented [21]. From the perspective of task planning, depending on the extent of involvement of the human in the life cycle of a plan, work in this direction has ranged on a spectrum of โ€œhuman-aware planningโ€ [2, 3, 8, 11โ€“13, 22, 33] where a robot passively tries to account for the plans of humans cohabiting its workspace, to โ€œexplicable planningโ€ [14, 23, 34, 35] where a robot generates plans that are explicable or predictable to a human observer, to โ€œplan explanationsโ€ [10, 17, 24] where the agent uses explanations to bring the human (who may have a different understanding of the agentโ€™s abilities) on to the same page, to โ€œhuman-in-the-loop planningโ€ [1, 4, 16, 25, 30] in general where humans and planners are participating in the plan generation and/or execution process together. Technical Report, 2018, ASU Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampati (a) The evolving scope of Human-Aware Planning (HAP) (b) A Subsumption Architecture for HAP Figure 1: The expanding scope of human-aware planning (HAP) acknowledging the need to account for the mental model of the human in the loop in the deliberative process of an autonomous agent. The planner can, for example, choose to bring the humanโ€™s model closer to the ground truth using explanations via a process called model reconciliation (MRP) so that an otherwise inexplicable plan makes sense in the humanโ€™s updated model or it can compute explicable plans which are closer to the humanโ€™s expectation. These capabilities can be stacked to realize more and more complex behavior โ€“ in this paper we will concentrate on the explicability versus explanation trade-off as a form of argumentation during human-aware planning. 1.1.1 The Evolving Scope of Human-Aware Planning. The ongoing efforts to make planning more โ€œhuman-awareโ€ is illustrated in Figure 1a โ€“ initial work on this topic had largely focused on incorporating an agentโ€™s understanding of the human model M H into its decision making process. Since then the importance of considering the humanโ€™s understanding MhR of the agentโ€™s actual model M R in the planning process has also been acknowledged, sometimes implicitly [3] and later explicitly [10, 35]. These considerations engender interesting behaviors both in the space of plans and models. For example, in the model space, the modifications to the human mental model MhR is used for explanations in [10] while reasoning over the actual model M H can reveal interesting behavior by affecting the belief state of the human, such as in planning for serendipity [8]. In the plan space, a human-aware agent can use M H and MhR to compute joint plans for teamwork [32] or generate behavior that conforms to the humanโ€™s preferences [11, 22] and expectations [23, 34, 35]. From the point of view of the planner, this is, in a sense, an asymmetric epistemic setting with single-level nested beliefs over its models. Indeed, existing literature on epistemic reasoning [19, 27, 28] can also provide interesting insights in the planning process of an agent in these settings. 1.1.2 A Subsumption Architecture for HAP. These different forms of behavior can be composed to form more and more sophisticated forms of human-aware behavior. This hierarchical composition of behaviors can be viewed in the form of a subsumption architecture for human-aware planning, similar in motivation to [7]. This is illustrated in Figure 1b. The basic reasoning engines are the Plan and MRP (Model Reconciliation) modules. The former accepts model(s) of planning problems and produces a plan, the latter accepts the same and an produces a new model. The former operates in plan space and gives rise to classical, joint and explicable planning depending on the models it is operating on, while the latter operates in model space to produce explanations and belief shaping behavior. These are then composed to form argumentation modules for trading of explanations and explicability (which is the topic of the current paper) and human-aware planning in general. 1.1.3 The Explicability-Explanation Trade-off. From the perspective of design of autonomy, this trade-off has two important implications โ€“ (1) the agent can now not only explain but also plan in the multi-model setting with the trade-off between compromise on its optimality and possible explanations in mind; and (2) the argumentation process is known to be a crucial function of the reasoning capabilities of humans [26], and now by extension of autonomous agents as well, as a result of algorithms we develop here to incorporate the explanation generation process into the agentโ€™s decision making process itself. General argumentation frameworks Balancing Explicability and Explanations for resolving disputes over plans have indeed been explored before [6, 15]. Our work can be seen as the specific case where the argumentation process is over a set of constraints that prove the correctness and quality of plans by considering the cost of the argument specifically as it relate to the trade-off in plan quality and the cost of explaining that plan. This is the first of its kind algorithm that can achieve this in the scope of plan explanations and explicable in presence of model differences with the human. HUMAN-AWARE PLANNING REVISITED The problem formulation closely follows that introduced in [10], reproduced here for clarity of methods built on the same definitions. A Classical Planning Problem. is a tuple M = โŸจD, I, GโŸฉ 1 with domain D = โŸจF , AโŸฉ - where F is a set of fluents that define a state s โІ F , and A is a set of actions - and initial and goal states I, G โІ F . Action a โˆˆ A is a tuple โŸจc a , pre(a), effยฑ (a)โŸฉ where c a is the cost, and pre(a), effยฑ (a) โІ F are the preconditions and add/delete effects, i.e. ฮด M (s, a) |= โŠฅ if s ฬธ |= pre(a); else ฮด M (s, a) |= s โˆช eff+ (a) \ effโˆ’ (a) where ฮด M (ยท) is the transition function. The cumulative transition function is ฮด M (s, โŸจa 1 , a 2 , . . . , an โŸฉ) = ฮด M (ฮด M (s, a 1 ), โŸจa 2 , . . . , an โŸฉ). The solution to the planning problem is a sequence of actions or a (satisficing) plan ฯ€ = โŸจa 1 , a 2 , . . . , an โŸฉ such that ฮด M (I, ฯ€ ) |= G. ร The cost of a plan ฯ€ is C(ฯ€ , M) = a โˆˆฯ€ c a if ฮด M (I, ฯ€ ) |= G; โˆž otherwise. The cheapest plan ฯ€ โˆ— = arg minฯ€ C(ฯ€ , M) is the (cost) optimal plan. We refer to this cost as M as C โˆ—M . A Human-Aware Planning (HAP) Problem. is given by the tuple ฮจ = โŸจM R , M H , MhR โŸฉ where M R = โŸจD R , I R , G R โŸฉ is the plannerโ€™s model of a planning problem, while M H = โŸจD H , I H , G H โŸฉ and MhR = โŸจDhR , IhR , GhR โŸฉ are respectively the plannerโ€™s estimate of the humanโ€™s model and the humanโ€™s understanding of its own model. The solution to the human-aware planning problem is a joint plan [8] ฯ€ = โŸจa 1 , a 2 , . . . , an โŸฉ; ai โˆˆ {D R โˆช D rH } such that ฮด ฮจ (I R โˆช IrH , ฯ€ ) |= G R โˆช GrH . The robotโ€™s component in the plan is referred to as ฯ€ (R) = โŸจai | ai โˆˆ ฯ€ โˆง D R โŸฉ. For the purposes of this paper, we ignore the robotโ€™s belief of the human model, i.e. MrH = โŸจ{}, {}, {}โŸฉ โ€“ in effect, making the human an observer only or a passive consumer of the plan โ€“ and focus instead on the challenges involves in planning with the humanโ€™s model of the planner. Planning with the human model has indeed been studied extensively in the literature, as noted above, and this assumption does not change in any way the relevance of the work here. Specifically, the following concepts are built on top of the joint planning problem โ€“ e.g. an explicable plan in this paper would, in the general sense, correspond to the robotโ€™s component in the joint plan being explicable to the human in the loop. Thus, for the purposes of this paper, we have ฯ€ (R) โ‰ก ฯ€ ; without loss of generality, we focus on the simplified setting with only the model of the planner and the humanโ€™s approximation of it. Explicable Planning In โ€œexplicable planning" a solution to the human-aware planning problem is a plan ฯ€ such that (1) it is executable (but may no longer Technical Report, 2018, ASU be optimal) in the robotโ€™s model but is (2) โ€œcloserโ€ to the expected plan in the humanโ€™s model, given a particular planning problem โ€“ (1) ฮด M R (I R , ฯ€ ) |= G R ; and (2) C(ฯ€ , MhR ) โ‰ˆ C โˆ— R . Mh โ€œClosenessโ€ or distance to the expected plan is modeled here in terms of cost optimality, but in general this can be any preference metric like plan similarity. In existing literature [23, 34, 35] this has been usually achieved by modifying the search process so that the heuristic that guides the search is driven by the robotโ€™s knowledge of the humanโ€™s mental model. Such a heuristic can be either derived directly [23] from the humanโ€™s model (if it is known) or learned [35] through interactions in the form of affinity functions between plans and their purported goals. Plan Explanations The other approach would be to (1) compute optimal plans in the plannerโ€™s model as usual, but also provide an explanation (2) in the form of a model update to the human so that (3) the same plan is now also optimal in the humanโ€™s updated model of the problem. Thus, a solution involves a plan ฯ€ and an explanation E such that โ€“ (1) C(ฯ€ , M R ) = C โˆ—M R ; cR โ†โˆ’ M R + E; and (2) M h Mh Note that here a model update, as indicated by the + operator may include a correction to the belief (goals or state information) as well as information pertaining to the action model itself. In [10] the authors explored various ways of generating such solutions โ€“ including methods to minimize the lengths of the explanations given as a result. However, this was done in an after-the-fact fashion, i.e. the optimal plan was already generated and it was just a matter of finding the best explanation for it. This not only ignores the possibility of finding better plans (that are equally optimal) with smaller explanations, but also avenues of compromise in a manner we discussed previously whereby the planner sacrifices its optimality to further reduce overhead in the explanation process. MEGA We bring the notions of explicability and explanations together in a novel planning technique MEGA (Multi-model Explanation Generation Algorithm) that trades off the relative cost of explicability to providing explanations during the plan generation process itself2 . The output of MEGA is a plan ฯ€ and an explanation E such that (1) ฯ€ is executable in the robotโ€™s model, and with the explanation (2) in the form of model updates it is (3) optimal in the updated human model while (4) the cost (length) of the explanations, and the cost of deviation from optimality in its own model to be explicable to the human, is traded off according to a constant ฮฑ โ€“ (1) ฮด M R (I R , ฯ€ ) |= G R ; cR โ†โˆ’ M R + E; (2) M h h cR ) = C โˆ— ; and (3) C(ฯ€ , M h 2 As 1 Note that the โ€œmodel of a planning problemโ€ includes the action model as well as the initial and goal states of an agent. h cR ) = C โˆ— . (3) C(ฯ€ , M h cR cR M h in [10] we assume that the human mental model is known and has the same computation power ([10] also suggests possible ways to address these issues, the same discussions apply here as well). Also refer to the discussion on model learning later. Technical Report, 2018, ASU Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampati (4) ฯ€ = arg minฯ€ { |E | + ฮฑ ร— | C(ฯ€ , M R ) โˆ’ C โˆ—M R | }. Clearly, with higher values of ฮฑ the planner will produce plans that require more explanation, with lower ฮฑ it will generate more explicable plans. Thus, with the help of this hyperparameter ฮฑ, an autonomous agent can deliberate over the trade-off in the costs it incurs in being explicable to the human (second minimizing term in (4)) versus explaining its decisions (first minimizing term in (4)). Note that this trade-off is irrespective of the cognitive burden of those decisions on the human in the loop. For example, for a robot in a collapsed building during a search and rescue task, or the rover on Mars, may have limited bandwidth for communication and hence prefer to be explicable instead instead. We employ a model space Aโˆ— search (Algorithm 1) to compute the expected plan and explanations for a given value of ฮฑ. Similar to [10] we define a state representation over planning problems with a mapping function ฮ“ : a M 7โ†’ F which represents a planning problem by transforming every condition in it into a predicate. The set ฮ› of actions contains unit model change actions ฮป : F โ†’ F which make a single change to a domain at a time. We start by initializing the min node tuple (N ) with the human mental model and an empty explanation. For each new possible model we come across during our model space search, we test if the objective value of the new node is smaller than the current min node. We stop the search once we identify a model that is capable of producing a plan that is also optimal in the robotโ€™s own model. This is different from the stopping condition used by the original MCE-search3 in [10], where the authors are just trying to identify the first node where the given plan is optimal. Algorithm 1 MEGA 1: 2: 3: 4: 5: 6: 7: 8: 9: Mh This is beyond what is offered by the model reconciliation search in [10], which only computes the smallest explanation given as a plan that is optimal in the plannerโ€™s model. Property 2. ฮฑ = | M R โˆ† MhR | yields the most optimal plan in the plannerโ€™s model along with the minimal explanation possible given a human-aware planning problem. This is easy to see, since with โˆ€E, |E | โ‰ค | M R โˆ† MhR |, the latter being the total model difference, the penalty for departure from explicable plans is high enough that the planner must choose from possible explanations only (note that the explicability penalty is cR ) = always positive until the search hits the nodes with C(ฯ€ , M h โˆ— C cR , at which point onwards the penalty is exactly zero). In general Mh this works for any ฮฑ โ‰ฅ |MCE| but since an MCE will only be known retrospectively after the search is complete, the above condition suffices since the entire model difference is known up front and is the largest possible explanation in the worst case. 3 An MCE or a minimally complete explanation is the shortest model update so that a given plan optimal in the robot model is also optimal in the updated human model. โ–ท Closed list โ–ท Node with minimum objective value โ–ท Optimal plan being explained โ–ท Plan expected by human Nmin โ† โŸจMhR , { }โŸฉ ฯ€ Rโˆ— โ† ฯ€ โˆ— ฯ€hR โ† ฯ€ s.t. C(ฯ€, MhR ) = C โˆ— R M h 10: fringe.push(โŸจM R , { }โŸฉ, priority = 0) 11: while True do h 12: c E โŸฉ, c โ† fringe.pop( M) c โŸจ M, 13: c E โŸฉ) โ‰ค OBJ_VAL(Nmin ) then if OBJ_VAL(โŸจ M, 14: 15: 16: 17: 18: 19: 20: 21: 22: โ–ท Update min node c EโŸฉ Nmin โ† โŸจ M, if C(ฯ€ โˆ— , M R ) = C โˆ— R then c M M โŸจMmin , Emin โŸฉ โ† Nmin , Emin โŸฉ min โ–ท If ฯ€ โˆ—c is optimal in M R return โŸจฯ€ M M else c c_list โ† c_list โˆช M c \ ฮ“(M R ) do for f โˆˆ ฮ“( M) c}, { }, {f }โŸฉ ฮป โ† โŸจ1, { M c ฮป) < c_list then if ฮด R (ฮ“( M), M , MR โ–ท Models that satisfy condition 1 c โ–ท Removes f from M h 23: fringe.push(โŸจฮด 24: c do for f โˆˆ ฮ“(M R ) \ ฮ“( M) 25: 26: MR , MR h c ฮป), E โˆช ฮป โŸฉ, c + 1) (ฮ“( M), c}, {f }, { }โŸฉ ฮป โ† โŸจ1, { M c ฮป) < c_list then if ฮด R (ฮ“( M), M , MR โ–ท Models that satisfy condition 2 c โ–ท Adds f to M h 27: 28: 29: Property 1. MEGA yields the smallest possible explanation for a given human-aware planning problem. This means that with a high enough ฮฑ (see below) the algorithm is guaranteed to compute the best possible plan for the planner as well as the smallest explanation associated with it. This is by construction of the search process itself, i.e. the search only terminates after cR ) = C โˆ— have been exhausted. the all the nodes that allow C(ฯ€ , M h cR procedure MEGA-Search Input: HAP ฮจ = โŸจM R , M R โŸฉ , ฮฑ h Output: Plan ฯ€ and Explanation E Procedure: fringe โ† Priority_Queue() c_list โ† {} fringe.push(โŸจฮด MR , MR h c ฮป), E โˆช ฮป โŸฉ, c + 1) (ฮ“( M), c E โŸฉ) procedure OBJ_VAL( โŸจ M, return | E | + ฮฑ ร— | C(ฯ€ โˆ— , M R ) โˆ’ C โˆ— R | c M M Property 3. ฮฑ = 0 yields the most explicable plan. Under this condition, the planner has to minimize the cost of explanations only. Of course, at this point it will produce the plan that requires the shortest explanation, and hence the most explicable plan. Note that this is distinct from just computing the optimal plan in the humanโ€™s model, since such a plan may not be executable in the plannerโ€™s model so that some explanations are required even in the worst case. This is also a welcome additions to the explicability only view of plan generation introduced in [23, 34, 35], where the human model only also guides the plan generation process instead of doing so directly, though none of these works provided any insight into how to make the remainder of the model reconciliation possible in such cases, as done here with the explanations associated with the generated plans. Property 4. MEGA-search is required only once per problem, and is independent of ฮฑ. Algorithm 1 terminates only after all the nodes containing a minimally complete explanation3 have been explored. This means that for different values of ฮฑ, the agent only needs to post-process the nodes with the new objective function in mind. Thus, a large part of the reasoning process for a particular problem can be pre-computed. 2 EVALUATIONS We will now provide internal evaluations of MEGA in modified versions of two well-known IPC domains Rover and Barman [20] Balancing Explicability and Explanations Domain Name Problem โˆ†=2 Technical Report, 2018, ASU โˆ†=7 โˆ† = 10 |E | Time (secs) |E | Time (secs) |E | Time (secs) Rover p1 p2 p3 0 1 0 1.22 1.79 8.35 1 5 2 5.83 125.64 10.46 3 6 3 143.84 1061.82 53.22 Barman p1 p2 p3 2 2 2 18.70 2.43 45.32 6 4 5 163.94 57.83 4183.55 6 6 6 5576.06 953.47 5061.50 Table 1: Computation time for human-aware plans in Rover and Barman domains along with the length of explanations. demonstrating the trade-off in the cost and computation time of plans with respect to varying size of the model difference and the hyper-parameter ฮฑ and follow it up with a demonstration of MEGA in action on a robot in a search and reconnaissance domain. Finally, we will report on human factor studies on how this trade-off is received by users. The code and the domain models will be available after the double-blind review process is over. 2.1 (a) The Rover (Meets a Martian) Domain Empirical Results: Cost Trade-off The value of ฮฑ determines how much an agent is willing to sacrifice its own optimality versus the cost of explaining a (perceived) suboptimal plan to the human. In the following, we illustrate this trade-off on modified versions of two well-known IPC domains. 2.1.1 The Rover (Meets a Martian) Domain. Here the Mars Rover has a model as described in the IPC domain, but has gone an update whereby it can carry all the rock and soil samples needed for a mission at the same time. This means that it does not need to empty the store before collecting new rock and soil samples anymore so that the new action definitions for sample_soil and sample_rock no longer contain the precondition (empty ?s). During its mission it runs across a Martian who is unaware of the robotโ€™s expanded storage capacity, and has an older, extremely cautious, model of the rover it has learned while spying on it from its cave. It believes that any time we collect a rock sample, we also need to collect a soil sample and need to communicate this information to the lander. It also believes that before the rover can perform take_image action, it needs to send the soil data and rock data of the waypoint from where it is taking the image. Clearly, if the rover was to follow this model in order not to spook the Martians, it will end up spending a lot of time performing unnecessary actions (like dropping old samples and collecting unnecessary samples). For example, if the rover is to communicate an image of an objective objective2, all it needs to do is move to a waypoint (waypoint3) from where objective2 is visible and perform the action โ€“ (take_image waypoint3 objective2 camera0 high_res) If the rover was to produce a plan that better represents the Martianโ€™s expectations, it would look like โ€“ (sample_soil store waypoint3) (communicate_soil_data general waypoint3 waypoint3 waypoint0) (drop_off store) (sample_rock store waypoint3) (communicate_rock_data general waypoint3 waypoint3 waypoint0) (take_image waypoint3 objective1 camera0 high_res) (b) The Barman (in a Bar) Domain Figure 2: Trade-off between explicability versus explanation cost for plans produced at different values of ฮฑ. Now if the rover chose to directly use an MCE it could end up explaining up to six different model differences based on the problem and the plan under execution. In some case, this may be acceptable, but in others, it may make more sense for the rover to bear the extra cost rather than laboriously walking through all the updates with an impatient Martian. MEGA lets us naturally model these scenarios through the use of the ฮฑ parameter โ€“ the rover would choose to execute the Martianโ€™s expected optimal plan when the ฮฑ parameter is set to zero (which means the rover does not care about the extra cost it needs to incur to ensure that the plan makes sense to the Martian with the least explaining involved). Figure 2 shows how the explicability cost and explanation cost varies for three typical problem instances in this domain. The algorithm starts converging to the smallest possible MCE, when ฮฑ is set to one. For smaller ฮฑ, MEGA chooses to save explanation costs by choosing more expensive (and explicable) plans. 2.1.2 The Barman (in a Bar) Domain. Here, the brand new twohanded Barman robot is wowing onlookers with its single-handed Technical Report, 2018, ASU Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampati skills, even as its admirers who may be unsure of its capabilities expect, much like in the original IPC domain, that it is required to have one hand free to perform actions like fill-shot, refill-shot, shake etc. This means that to make a single shot of a cocktail with two shots of the same ingredient with three shots and one shaker, the human expects the robot to execute the following plan โ€“ (fill-shot shot2 ingredient2 left right dispenser2) (pour-shot-to-used-shaker shot2 ingredient3 shaker1 left l1 l2) (refill-shot shot2 ingredient3 left right dispenser3) (pour-shot-to-used-shaker shot2 ingredient3 shaker1 left l1 l2) (leave left shot2) (grasp left shaker1) The robot can, however, directly start by picking both the shot and the shaker and does not need to put either of them down while making the cocktail. Similar to the Rover domain, we again illustrate on three typical problems from the barman domain (Figure 2) how at lower values of ฮฑ the robot choose to perform plans that require less explanation. As ฮฑ increases the algorithm produces plans that require larger explanations with the explanations finally converging at the smallest MCE required for that problem. 2.2 Empirical Results: Computation Time Contrary to classical notions of planning that occurs in state or plan space, we are now planning in the model space, i.e. every node in the search tree is a new planning problem. As seen in Table 1 this becomes quite time consuming with increasing number of model differences between the human and the robot, even as there are significant gains to be had in terms of minimality of explanations, and the reduction in cost of explicable plans as a result of it. This motivates the need for developing approximations and heuristics [10] for the search for multi-model explanations. 2.3 Demonstration: The USAR Domain We first demonstrate MEGA on a robot performing an Urban Search And Reconnaissance (USAR) task โ€“ here a remote robot is put into disaster response operation often controlled partly or fully by an external human commander. This is a typical USAR setup [5], where the robotโ€™s job is to infiltrate areas that may be otherwise harmful to humans, and report on its surroundings as and when required / instructed by the external. The external usually has a map of the environment, but this map is no longer accurate in a disaster setting - e.g. new paths may have opened up, or older paths may no longer be available, due to rubble from collapsed structures like walls and doors. The robot (internal) however may not need to inform the external of all these changes so as not to cause information overload of the commander who may be otherwise engaged in orchestrating the entire operation. This calls for an instantiation of the MEGA algorithm where the model differences are contributed to by changes in the map, i.e. the initial state of the planning problem (the human model has the original unaffected model of the world). Figure 3 shows a relevant section of the map of the environment where this whole scenario plays out. The orange marks indicate rubble that has blocked a passage, while the green marks indicate collapsed walls. The robot (Fetch), currently located at the position marked with a blue O, is tasked with taking a picture at location marked with an orange O in the figure. The external commanderโ€™s Figure 3: A typical search and reconnaissance scenario with an internal semi-autonomous agent (robot) and an external supervisor (human) โ€“ a video demonstration can be accessed at https://www.youtube.com/watch?v=u_t1TQotzo4. expects the robot to take the path shown in red, which is no longer possible. The robot armed with MEGA has two choices โ€“ it can either follow the green path and explain the revealed passageway due to the collapse, or compromise on its optimal path, clear the rubble and proceed along the blue path. A video demonstration of the scenario can be viewed at https:// www.youtube.com/ watch?v=u_t1TQotzo4. The first part of the video demonstrates the plan generated by MEGA for low ฮฑ values. As expected, it chooses the blue path that requires the least amount of explanation, and is thus the most explicable plan. In fact, the robot only needs to explain a single initial state change to make this plan optimal, namely โ€“ Explanation >> remove-has-initial-state-clear_path p1 p8 This is also an instance where the plan closest to the human expectation, i.e. the most explicable plan, still requires an explanation, Balancing Explicability and Explanations Technical Report, 2018, ASU which previous approaches in the literature cannot provide. Moreover, in order to follow this plan, the robot must perform the costly clear_passage p2 p3 action to traverse the corridor between p2 and p3, which it could have avoided in its optimal plan (shown in green on the map). Indeed, MEGA switches to the robotโ€™s optimal plan for higher values of ฮฑ along with the following explanation โ€“ Explanation >> add-has-initial-state-clear_path p6 p7 Explanation >> add-has-initial-state-clear_path p7 p5 Explanation >> remove-has-initial-state-clear_path p1 p8 By providing this explanation, the robot is able to convey to the human the optimality of the current plan as well as the infeasibility of the humanโ€™s expected plan (shown in red). 2.4 Human Factors Evaluations Finally, we will now use the above search and reconnaissance domain to analyze how humans respond to the explicability versus explanations trade-off. This is done by exposing the external commanderโ€™s interface to participants who get to analyze plans in a mock USAR scenario. The participants were incentivized to make sure that the explanation does indeed help them understand the optimality of the plans in question by formulating the interaction in the form of a game. This is to make sure that participants were sufficiently invested in the outcome as well as mimic the high-stakes nature of USAR settings to accurately evaluate the explanations. Figure 4 shows a screenshot of the interface which displays to each participant an initial map (which they are told may differ from the robotโ€™s actual map), the starting point and the goal. A plan is illustrated in the form of a series of paths through various waypoints highlighted on the map. The participant has to identify if the plan shown is optimal. If the player is unsure, they can ask for an explanation. The explanation is provided to the participant in the form of a set of model changes in the playerโ€™s map. The scoring scheme for the game is as follows. Each player is awarded 50 points for correctly identifying the plan as either optimal or satisficing. Incorrectly identification costs them 20 points. Every request for explanation further costs them 5 points, while skipping a map does not result in any penalty. The participants were additionally told that selecting an inexecutable plan as either feasible or optimal would result in a penalty of 400 points. Even though there were no actual incorrect plans in the dataset, this information was provided to deter participants from taking chances with plans they did not understand well. Each participant was paid $10 dollars and received additional bonuses based on the following payment scheme โ€“ - Scores higher than or equal to 540 were paid $10. Scores higher than 540 and 440 were paid $7. Scores higher than 440 and 340 were paid $5. Scores higher than 340 and 240 were paid $3. Scores below 240 received no bonuses. The scoring systems for the game was designed to make sure โ€“ โ€ข Participants should only ask for an explanation when they are unsure about the quality of the plan (due to small negative points on explanations). Figure 4: Interface to the external commander in a mock search and reconnaissance study. Figure 5: Responses to explicable plans versus balanced or robot optimal plans with explanations. Figure 6: Click-through rates for explanations. โ€ข Participants are incentivized to identify the feasibility and optimality of the given plan correctly (large reward and penalty on doing this wrongly). Each participant was shown a total of 12 maps. For 6 of the 12 maps, the participant was assigned the optimal robot plan, and when they asked for an explanation, they were randomly shown different types of explanations as introduced in [10]. For the rest of the maps, in place of the robotโ€™s optimal plan, participants could potentially be assigned a plan that is optimal in the human model (i.e. an explicable plan) with no explanation or somewhere in between (i.e. the balanced plan) with a shorter explanation. Note that out of the 6 maps, only 3 had both balanced plans as well as explicable plans, the other 3 either had a balanced plan or the optimal human plan. In total, we had 27 participants for the study, including 4 female and 22 male participants between the age range of 19-31 (1 participant did not reveal their demographic). Technical Report, 2018, ASU Optimal Plan | E | C(ฯ€, M R ) 2.5 5.5 Balanced Plan | E | C(ฯ€, M R ) 1 8.5 Tathagata Chakraborti, Sarath Sreedharan, Subbarao Kambhampati Explicable Plan | E | C(ฯ€, M R ) 16 Table 2: Statistics of explicability versus explanation tradeoff with respect to explanation length and plan cost. Figure 5 shows how people responded to the different kinds of explanations / plans. These results are from 382 problem instances that required explanations, and 25 and 40 instances that contained balanced and explicable plans respectively. From the perspective of the human, the balanced plan and the robot optimal plan do not make any difference since both of them appear suboptimal. This is evident from the fact that the click-through rate for explanations in these two conditions are similar. However, the rate of explanations is significantly less in case of explicable plans as desired. Table 2 shows the statistics of the explanations / plans. These results are from 124 problem instances that required minimal explanations as per [10], and 25 and 40 instances that contained balanced and explicable plans respectively, as before. As desired, the robot gains in length of explanations but loses out in cost of plans produced as it progresses along the spectrum of optimal to explicable plans. Thus, while Table 2 demonstrates the cost of explanation versus explicability trade-off from the robotโ€™s point of view, Figure 5 shows how this trade-off is perceived from the humanโ€™s perspective. It is interesting to see that in Figure 5 about a third of the time participants still asked for explanations even when the plan was explicable, and thus optimal in their map. This is an artifact of the risk-averse behavior incentivized by the gamification of the explanation process and indicative of the cognitive burden on the humans who are not (cost) optimal planners. Thus, going forward, the objective function should incorporate the cost or difficulty of analyzing the plans and explanations from the point of view of the human in addition to the current costs in equation MEGA(4) and Table 2 modeled from the perspective of the robot model. Finally, in Figure 6, we show how the participants responded to inexplicable plans, in terms of their click-through rate on the explanation request button. Such information can be used to model the ฮฑ parameter to situate the explicability versus explanation trade-off according to preferences of individual users. It is interesting to see that the distribution of participants (right inset) seem to be bimodal indicating that there are people who are particularly skewed towards risk-averse behavior and others who are not, rather than a normal distribution of response to the explanation-explicability trade-off. This further motivates the need for learning ฮฑ interactively with the particular human in the loop. 3 DISCUSSION AND FUTURE WORK In the following section, we will elaborate on some of the exciting avenues of future research borne out of this work. 3.1 Model learning and picking the right ฮฑ We assumed that the hyper-parameter ฮฑ is set by the designer in determining how much to trade-off the costs of explicability versus explanations on the part of the autonomous agent. However, the design of ฮฑ itself can be more adaptive and โ€œhuman-awareโ€ in the sense that the parameter can be learned in course of interactions with the human in the loop to determine what kind of plans are preferred (as seen in Figure 6) and how much information can be transmitted. This is also relevant in cases where the human mental model is not known precisely or if there is uncertainty towards what the new model is after an update or explanation. This is a topic of future work; existing literature on iterative model learning [18, 29] can provide useful guidance towards the same. Authors in [9] discuss a few useful representations for learning such models for the purposes of task planning at various levels of granularity. Note that search with uncertainty over a learned human (mental) model can often times be compiled to the same planning process as described in [31] by using annotated models, so the same techniques as introduced in this paper still apply. 3.2 Cost of explanations and cognitive load Currently, we only considered the cost of explanations and explicability from the point of view of the robot. However, there might be additional (cognitive) burden on the human โ€“ measured in terms of the complexity of interpreting an explanation and how far away the final plan is from the optimal plan in the humanโ€™s mental model. This again ties back to the assumptions on the cognitive abilities (i.e. optimality) of the human in the loop, and needs calibration [18, 29] based on repeated interactions (as seen in Figure 5). 4 CONCLUSION We saw how an agent can achieve human-aware behavior while at the same time keeping in mind the cost of departure from its own optimality which could otherwise have been explained away if given the opportunity. This raises several intriguing challenges in the plan generation process, most notably in finding better heuristics in speeding up the model space search process as well as dealing with model uncertainty and identifying the sweet spot of the algorithm in explicability-explanations trade-off. Indeed, the revised human-aware planning paradigm opens up exciting new avenues of research such as learning human mental models, providing explanations at different levels of abstractions, and so on. REFERENCES [1] Mitchell Ai-Chang, John Bresina, Len Charest, Adam Chase, JC-J Hsu, Ari Jonsson, Bob Kanefsky, Paul Morris, Kanna Rajan, Jeffrey Yglesias, et al. 2004. MAPGEN: Mixed-Initiative Planning and Scheduling for the Mars Exploration Rover Mission. IEEE Intelligent Systems (2004). [2] Rachid Alami, Aurรฉlie Clodic, Vincent Montreuil, Emrah Akin Sisbot, and Raja Chatila. 2006. Toward Human-Aware Robot Task Planning. In AAAI Spring Symposium: To Boldly Go Where No Human-Robot Team Has Gone Before. [3] Rachid Alami, Mamoun Gharbi, Benjamin Vadant, Raphaรซl Lallement, and Adolfo Suarez. 2014. On human-aware task and motion planning abilities for a teammate robot. In Human-Robot Collaboration for Industrial Manufacturing Workshop, RSS. [4] James F Allen. 1994. Mixed initiative planning: Position paper. In ARPA/Rome Labs Planning Initiative Workshop. [5] Cade Earl Bartlett. 2015. Communication between Teammates in Urban Search and Rescue. Thesis (2015). [6] Alexandros Belesiotis, Michael Rovatsos, and Iyad Rahwan. 2010. Agreeing on plans through iterated disputes. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1-Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 765โ€“772. [7] Rodney Brooks. 1986. A robust layered control system for a mobile robot. IEEE journal on robotics and automation 2, 1 (1986), 14โ€“23. [8] T. Chakraborti, G. Briggs, K. Talamadupula, Yu Zhang, M. Scheutz, D. Smith, and S. Kambhampati. 2015. Planning for serendipity. In IROS. Balancing Explicability and Explanations [9] Tathagata Chakraborti, Subbarao Kambhampati, Matthias Scheutz, and Yu Zhang. 2017. AI Challenges in Human-Robot Cognitive Teaming. arXiv preprint arXiv:1707.04775 (2017). [10] Tathagata Chakraborti, Sarath Sreedharan, Yu Zhang, and Subbarao Kambhampati. 2017. Plan Explanations as Model Reconciliation: Moving Beyond Explanation as Soliloquy. In IJCAI. [11] Tathagata Chakraborti, Yu Zhang, David Smith, and Subbarao Kambhampati. 2016. Planning with Resource Conflicts in Human-Robot Cohabitation. In AAMAS. [12] Marcello Cirillo. 2010. Planning in inhabited environments: human-aware task planning and activity recognition. Ph.D. Dissertation. ร–rebro university. [13] Marcello Cirillo, Lars Karlsson, and Alessandro Saffiotti. 2010. Human-aware Task Planning: An Application to Mobile Robots. ACM Transactions on Intelligent Systems and Technology (2010). [14] Anca Dragan, Kenton Lee, and Siddhartha Srinivasa. 2013. Legibility and Predictability of Robot Motion. In Human-Robot Interaction. [15] Chukwuemeka D Emele, Timothy J Norman, and Simon Parsons. 2011. Argumentation strategies for plan resourcing. In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3. International Foundation for Autonomous Agents and Multiagent Systems, 913โ€“920. [16] George Ferguson, James F Allen, Bradford W Miller, et al. 1996. TRAINS-95: Towards a Mixed-Initiative Planning Assistant. In AIPS. [17] Maria Fox, Derek Long, and Daniele Magazzeni. 2017. Explainable Planning. In IJCAI XAI Workshop. [18] Dylan Hadfield-Menell, Stuart J Russell, Pieter Abbeel, and Anca Dragan. 2016. Cooperative inverse reinforcement learning. In NIPS. [19] Marc Hanheide, Moritz Gรถbelbecker, Graham S Horn, Andrzej Pronobis, Kristoffer Sjรถรถ, Alper Aydemir, Patric Jensfelt, Charles Gretton, Richard Dearden, Miroslav Janicek, et al. 2015. Robot task planning and explanation in open and uncertain worlds. Artificial Intelligence (2015). [20] International Planning Competition. 2011. IPC Competition Domains. https: //goo.gl/i35bxc. (2011). [21] Subbarao Kambhampati and Kartik Talamadupula. 2014. Human-in-the-Loop Planning and Decision Support. http://rakaposhi.eas.asu.edu/hilp-tutorial/. (2014). [22] Uwe Koeckemann, Federico Pecora, and Lars Karlsson. 2014. Grandpa Hates Robots - Interaction Constraints for Planning in Inhabited Environments. In AAAI. [23] Anagha Kulkarni, Tathagata Chakraborti, Yantian Zha, Satya Gautam Vadlamudi, Yu Zhang, and Subbarao Kambhampati. 2016. Explicable Robot Planning as Minimizing Distance from Expected Behavior. CoRR abs/1611.05497 (2016). [24] Pat Langley, Ben Meadows, Mohan Sridharan, and Dongkyu Choi. 2017. Explainable Agency for Intelligent Autonomous Systems. In AAAI/IAAI. [25] Lydia Manikonda, Tathagata Chakraborti, Kartik Talamadupula, and Subbarao Kambhampati. 2017. Herding the Crowd: Using Automated Planning for Better Crowdsourced Planning. Journal of Human Computation (2017). [26] Hugo Mercier and Dan Sperber. 2010. Why Do Humans Reason? Arguments for an Argumentative Theory. Behavioral and Brain Sciences (2010). [27] Tim Miller, Jens Pfau, Liz Sonenberg, and Yoshihisa Kashima. 2017. Logics of common ground. Journal of Artificial Intelligence Research (2017). [28] Christian J Muise, Paolo Felli, Tim Miller, Adrian R Pearce, and Liz Sonenberg. 2016. Planning for a Single Agent in a Multi-Agent Environment Using FOND.. In IJCAI. [29] Stefanos Nikolaidis, Przemyslaw Lasota, Ramya Ramakrishnan, and Julie Shah. 2015. Improved humanโ€“robot team performance through cross-training, an approach inspired by human team training practices. International Journal of Robotics Research (2015). [30] Sailik Sengupta, Tathagata Chakraborti, Sarath Sreedharan, and Subbarao Kambhampati. 2017. RADAR - A Proactive Decision Support System for Human-inthe-Loop Planning. In AAAI Fall Symposium on Human-Agent Groups. [31] S. Sreedharan, T. Chakraborti, and S. Kambhampati. 2017. Explanations as Model Reconciliation - A Mutli-Agent Perspective. In AAAI Fall Symposium on HumanAgent Groups. [32] Kartik Talamadupula, Gordon Briggs, Tathagata Chakraborti, Matthias Scheutz, and Subbarao Kambhampati. 2014. Coordination in human-robot teams using mental modeling and plan recognition. In Intelligent Robots and Systems (IROS 2014), 2014 IEEE/RSJ International Conference on. IEEE, 2957โ€“2962. [33] Stevan Tomic, Federico Pecora, and Alessandro Saffiotti. 2014. Too Cool for School??? Adding Social Constraints in Human Aware Planning. In Workshop on Cognitive Robotics (CogRob). [34] Yu Zhang, Sarath Sreedharan, Anagha Kulkarni, Tathagata Chakraborti, Hankz Hankui Zhuo, and Subbarao Kambhampati. 2016. Plan Explicability for Robot Task Planning. In RSS Workshop on Planning for Human-Robot Interaction. [35] Yu Zhang, Sarath Sreedharan, Anagha Kulkarni, Tathagata Chakraborti, Hankz Hankui Zhuo, and Subbarao Kambhampati. 2017. Plan Explicability and Predictability for Robot Task Planning. In ICRA. Technical Report, 2018, ASU
2cs.AI
Action and perception for spatiotemporal patterns Martin Biehl1,2 and Daniel Polani 2 1 2 Araya, Tokyo, 151-0001 University of Hertfordshire, Hatfield, AL10 9AB arXiv:1706.03576v1 [cs.AI] 12 Jun 2017 [email protected] Abstract This is a contribution to the formalization of the concept of agents in multivariate Markov chains. Agents are commonly defined as entities that act, perceive, and are goal-directed. In a multivariate Markov chain (e.g. a cellular automaton) the transition matrix completely determines the dynamics. This seems to contradict the possibility of acting entities within such a system. Here we present definitions of actions and perceptions within multivariate Markov chains based on entitysets. Entity-sets represent a largely independent choice of a set of spatiotemporal patterns that are considered as all the entities within the Markov chain. For example, the entityset can be chosen according to operational closure conditions or complete specific integration. Importantly, the perceptionaction loop also induces an entity-set and is a multivariate Markov chain. We then show that our definition of actions leads to non-heteronomy and that of perceptions specialize to the usual concept of perception in the perception-action loop. 1 Introduction The perception-action loop (PA-loop) has been used to formalize, in mostly information theoretic terms, various properties associated to agents. These include empowerment Klyubin et al. (2005), autonomy (Bertschinger et al., 2008), decisions (Tishby and Polani, 2011), and embodiment (Zahedi and Ay, 2013). In the literature agents are usually seen as entities that act, perceive, and are in some way goal-directed (cmp. Barandiaran et al., 2009). The PA-loop assumes that the entities that make up agents as well as their environments can be captured by interacting stochastic processes. This is a convenient assumption since actions and perceptions can then be easily identified with the interactions (see Section 3). Further requirements (e.g. autonomy) can then be introduced to distinguish stochastic processes that actually constitute agents. It has not been formally established whether the assumption that the set of entities that contains agents can be represented by stochastic processes is justified. We have argued in previous work, that (naively) using stochastic processes to capture entities within a given multivariate Markov chain (for example cellular automata like the Game of Life) fails to account for essential proporties of agents irrespective of chosen additional conditions. Instead, we have argued for the use of spatiotemporal patterns (STPs, previously employed by Beer, 2014b,a) to represent entities. The immediate advantage is that STPs are a superset of structures like gliders in the game of life, spots in reaction diffusion systems (Virgo, 2011; Froese et al., 2014; Bartlett and Bullock, 2015), and particle based systems exhibiting individuation into multi-particle โ€œcellsโ€ (Schmickl et al., 2016). Formally capturing these structures then becomes a matter of selecting the according subsets of STPs i.e. the entity-sets (see below). A disadvantage of the STP based entities is that they lack the formal construction/interpretation of actions and perceptions that the PA-loop provides. As far as we know, no formal definitions of actions and perception exists for STP based entities. The first contribution of this paper are proposals of such formal definitions called entity action (Section 4) and entity perception (Section 5). The second contribution is a formal connection between the PA-loop and our STP-based entity actions and perceptions (Section 6). This connection is achieved via the notion of entity-sets. This is just the set of those STPs in a multivariate Markov chain that are considered as entities according to an independently specified criterion (e.g. organizational closure (Beer, 2014a) or complete local integration (Biehl et al., 2017, 2016)). Importantly, we can quite naturally identify an entity-set for the PA-loop and use our definitions of entity action and entity perception for this entity-set. The result is that our entity perception coincides with the standard notion of perceptions in the PA-loop and that entity actions are a necessary and sufficient condition for nonheteronomy. Non-heteronomy (i.e. not being determined by the environment) was proposed in Bertschinger et al. (2008) as part of an information theoretic measure of autonomy. The most closely related work is that of Beer (2014b). Apart from a generalization to stochastic systems our set of entity perceptions seems to be a straightforward (but surprisingingly tedious) formalization of the cognitive domain of STPs described for the glider in game of life. We use โ€œperceptionsโ€ instead of โ€œcognitive domainโ€ only because our motivation came more from the PA-loop and unlike Beer (2014b) not directly from autopoiesis. Concerning the entity actions we deviate from Beer (2014b) by requiring more from an action than just the continuation of the entity. We note that Ikegami and Taiji (1998) propose to use possible/compatible counterfactual trajectories of game players as signs of autonomy. We construct the capability to act from the counterfactual trajectories and find that they imply non-heteronomy which is a related to autonomy. E0 E1 E2 M0 M1 M2 Figure 1: First timesteps of the PA-loop BN. The processes represent environment tEt utPT , and agent memory tMt utPT . 2 Notation We restrict ourselves to finite, time-discrete, multivariate Markov chains. These are unrolled in time and can then be formally described as Bayesian networks (BNs). We index the random variables in the BN via the index set V โ€œ J ห† T where T is the set of all timesteps and J is the set of (spatial) degrees of freedom. If i P V is an index we also write i โ€œ pj, tq P J ห† T where convenient. The BN is then a set tXi uiPV of random variables together with a set of edges determining the parents papiq โ€œ papj, tq of each node i P V , and associated mechanisms ppj,tq pxj,t |xpapj,tq q. We assume that the parents of any node are a subset of the nodes at the previous timestep papj, tq ฤŽ pJ, tq :โ€œ tpj, tq|j P Ju. We write XA :โ€œ pXi qiPA for the joint random variable consisting of random variables indexed by elements of A ฤŽ V . We also sometimes write At :โ€œ tpj, tq|j P Au for the elements in A that correspond to indices at timestep t. We refer to At as the time-slice of A at t. The state space of random variable Xi is denoted as Xi and the specific values are denoted by lower case letters xi , yล› i , xฬ‚i , ... P Xi . For joint random variables we write XA :โ€œ iPA Xi and xA , yA , xฬ‚A , ... P XA . A spatiotemporal pattern (STP) is a value xA P XA of a joint random variable XA with A ฤŽ V . Since A ฤŽ V is an arbitrary subset of V a STP can specify the values of random variables at multiple timesteps ลค and multiple spatial locations. The set of all STPs is: AฤŽV XA โ€œ txA P XA |A ฤŽ V u . It is important to envision the difference between the set of all STPs and the set of all subsets of random variables of tXi uiPV . The latter ลค is isomorphic to the power set of V and can be written as AฤŽV tXA u โ€œ tXA |A ฤŽ V u and is a set of random variables not a set of values of random variables. A trajectory is a STP xV that occupies all random variables in the BN tXi uiPV . We then say that a STP yA P XA occurs within trajectory xV if yA โ€œ xA . An entity-set EptXi uiPV q is a subset of all STPs. One choice would be to use the entire set of STPs as the entity set. Other choices include using organizational closure conditions like in Beer (2014b) or the complete specific integration criterion (Biehl et al., 2016, 2017). The following definitions and theorems all assume that tXi uiPV is a multivariate Markov chain with V โ€œ J ห† T and E is a given entity-set. 3 Perception-action loop Given two interacting stochastic processes (e.g. Fig. 1) we can always extract random stochastic process that explicitly represent the interactions. If we see one of the processes as the agentโ€™s memory process tMt utPT and the other as the environment process tEt utPT then these extracted random variables can be seen as the perceptions and actions of the agent. Perceptions tSt utPT then capture exactly all the influence of the environment on the agent and actions tAt utPT capture the influence of the agent on the environment. This means we introduce another BN containing two more processes, the action process tAt utPT and the sensor process tSt utPT . The result of this extraction is an extended BN (Fig. 2) with identical joint probability distribution over the two initial stochastic processes tMt utPT and tEt utPT . This perception action loop is used for example in Bertschinger et al. (2008). The idea behind the extraction of perceptions tSt utPT (and conversely actions tAt utPT ) is to partition the state space Et of the environment at t into blocks having identical influence on the next memory state Mt`1 . These blocks are then the possible perceptions i.e. the states of St . Formally: Definition 1. For each time t P T and eฬ‚t , eฬ„t P Et let eฬ‚t โ€วซt eฬ„t รด @mt`1 P Mt`1 , mt P Mt : pMt`1 pmt`1 |mt , eฬ‚t q โ€œ pMt`1 pmt`1 |mt , eฬ„t q. (1) Then: (i) The sensor partition1 วซt is then defined as the set of equivalence classes of the equivalence relation โ€วซt . (ii) The set of sensor values is defined as St :โ€œ วซt and an element st P St (which is also a block in วซt is called a perception of a sensor value. In the symmetrical way we define actions via a partition of Mt and arrive at the extended PA-loop of Fig. 2. It is then straightforward to prove the following theorem: 1 The construction of the sensor partition is not new. It is also used for example in Balduzzi (2011) to obtain coarser states (alphabet) of joint random variables. The authors thank Benjamin Heuer for originally pointing them to this construction. E0 M0 E1 E2 S0 S1 A0 A1 M1 M2 Figure 2: First time-steps of the BN of the extended PA-loop. The processes tAt utPT and tSt utPT mediate all interactions between tMt utPT and tEt utPT without changing the probability distributions over the latter (see Theorem 1). Theorem 1 (Invariant extension theorem). Given a perception action loop tXi uiPV โ€œ tMt , Et utPT and its extended PA-loop tXi uiPW โ€œ tMt , At , St , Et utPN` . Let pV โ€œ pMT ,ET be the probability distribution over the entire perception action loop tXi uiPV and let pw MT ,ET be the marginal probability distribution over the memory and environment process obtained from the probability distribution pw W over the entire extended PA-loop. Then pMT ,ET โ€œ pw MT ,ET . (2) Proof. This is probably fairly well known but see Biehl (2017) for an explicit proof. This shows that the introduction of action and sensor process in the above way only makes the interactions between agent and environment processes explicit and does not introduce any additional dynamics. The theorem also shows that the sensor process (and conversely the actions) captures all influences from the environment on the agent. Else the dynamics of the original processes could not remain identical. In Section 5 we want to capture all influences of the environment on a set of STPs / entities instead of on a stochastic process like tMt utPT . This will require a generalization of the perception extraction procedure in Definition 1. 4 Entity action We now define a concept of actions for a given entity-set in a multivariate Markov chain. First we briefly sketch the main ideas behind the definition. Due to our setting of a given multivariate Markov chain that actions have to occur within our concept of actions differs from other approaches. Paraphrasing Wilson and Shpall (2012) only slightly, what distinguishes actions among events is that they do not merely happen to individuals but rather that they are made to happen by the individuals. This is problematic in our setting where STPs (as entities) take the role of individuals. What โ€œhappensโ€ in a multivariate Markov chain are the trajectories and the STPs occurring within them. The Markov chainโ€™s dynamics are determined by its mechanisms pj,t with j P J, t P T . These in turn determine (possibly stochastically) what is going to happen at all times anywhere within the chain. Therefore, it is impossible that a multivariate Markov chain contains an STP or entity that can make something happen beyond what happens anyway due to the mechanisms. This means we have to explain and define actions in a different way. We should also note that unlike other accounts of actions (Wilson and Shpall, 2012) we do not require actions to be necessarily purposeful or goal-directed in any way. The way we conceive agency an entity with actions will be considered goal-directed if its actions are goal-directed in some sense. To get to our own definition of actions we note that events called actions are usually attributed to a limited or bounded region or part of the universe e.g. the body of a living organism or sometimes just its brain if it has one. These parts usually contain mechanisms or configurations of matter that are either aq not directly observable to a human observer e.g. hidden in an opaque container, or bq not well understood by the human observer, or cq both. These factors inevitably lead to unpredictability of such events. In other words, events that are attributed to well understood and therefore predictable mechanisms, e.g. sunrises, are not considered actions. From this point of view actions are not, beyond their possibly complex and unobserved origin, special events but may appear as special to observers that lack the sensory and computational capacity to resolve or understand them. In our approach we construct actions as events in such a way that they are fundamentally unpredictable by any observer within the system. As we will see this can be done without the need for a definition of an observer. Note that this approach remains compatible with observer-dependent notions of apparent or as-if actions (cmp. McGregor, 2017). The โ€œfundamentalโ€ actions are apparent actions for every possible observer while other events are actions for some observers and plain, predictable events for others. Up to now we have ignored randomness. True randomness (in the sense of stochastic independence of the event from any other event in the universe), if it exists in a system, can never be explained, predicted, or understood. Combined with our reasoning above this suggests that all random events are actions and fundamentally so. This is against our intuition, random events should not be seen as actions of agents. However, we place the burden of ruling out random events from being interpreted as actions of agents on the entity-set and/or goal-directedness. We expect useful notions of entities not to consist of (completely) independent events which would prevent such events from becoming actions in our approach. Furthermore independent events seem not to be useful in order to achieve a particular goal. However, the usefulness of random number generators might be seen as a counterexample. As of now we have no formal definition of goal-directedness such that answering these questions is future work. When we want to define actions for entities the first issue we run into is that entities are already fixed STPs. Therefore each entity xA P E already consists of the consequences of whatever actions (if any) it took. It is in this sense the result of its own actions. There is no freedom left. In order to investigate the actions we therefore have to deconstruct the entity and see what other actions it could have taken time-slice by time-slice. For this we look for counterfactual entities yB whose time-slice at t can occur in exactly the same environment xVt zAt and has a different immediate future. Requiring the co-occurrence with the same environment makes the different futures unpredictable for anything part of that environment. No observer can therefore predict these futures either. Even an observer that distinguished the two entities in the past is in the same state at t independent of the entity it is faced with. Therefore it must have forgotten their difference. In this way we get a definition of actions as unpredictable events for observers without needing to formally define observers. For the formal definition we first define: Definition 2 (Environment of an STP). Let xA be a STP. Then the environment of xA at time t is the spatial pattern xVt zAt . We now state the definition of an action of an entity at a time t in a particular trajectory formally. Definition 3 (Action and co-action of an entity). Let xV P XV with pV pxV q ฤ… 0. Also let xA be an entity with nonempty time-slices at t, t ` 1. Then xA performs an action xAt`1 at time t in trajectory xV if there exists an entity yB with non-empty time-slices at t, t ` 1 such that (i) yB occurs in yV โ€ฐ xV with pV pyV q ฤ… 0, (ii) at t the entities xA and yB occupy the same random variables: Bt โ€œ At , (iii) at t the trajectories xV and yV are otherwise identical: xVt zAt โ€œ yVt zAt , (iv) at t ` 1 the entities are different: xAt`1 โ€ฐ yBt`1 . We also call yB a co-action entity, yV a co-action trajectory, and yBt`1 a co-action. Note that all requirements are symmetric. Therefore, if xA performs an action then its co-action also performs an action. Also, the notion of co-action entities can easily be extended to more than one co-action entity. We only have to make sure that all entities in a set of co-action entities are mutually different at t ` 1. Furthermore, it is easy to generalise the definition of actions to situations where xA and yB must occupy the same variables for an interval of time rt ยด m : ts before the action. In that case, the environment xVrtยดm:ts zArtยดm:ts must be identical during this interval. Finally, note that the condition that the two acting entities differ at time t ` 1 can be fulfilled in two ways. If At`1 โ€ฐ Bt`1 then we call these actions extent actions. Else, if the actions differ only in value i.e. we have At`1 โ€œ Bt`1 so that xAt`1 โ€ฐ yAt`1 then we call these actions value actions. The difference between value actions and extent actions is made possible due to our definition of entities as STPs. An intriguing question for the future is whether the capabilities of agents to act both in value and extent are truly superior to agents that only act in value such as those modelled by PA-loops. As we will see in Section 6 probabilistic and information theoretic expressions are easy to formulate for actions in value only. However, for actions in extent this has not been done yet. 5 Entity perception In this section we formally define perception for (STP-) entities. We make no distinction here between perception, experience, and sensory input. In the tradition of modelling agent-environment systems using dynamical systems or their probabilistic generalisations as stochastic processes in PA-loops we define perception as all effects that the environment has on an individual/agent (Beer, 1995). We run into a similar problem as with the actions. An entity is already a fixed STP that contains all influence that it may have been subjected to. It is in this sense the result of influence (or no influences) from its surroundings. In order to investigate these influences we therefore have to deconstruct the entity and see how it was โ€œformedโ€ by external influences / perceptions time-slice by time-slice. The idea is to fix the past of the entity up to t and use the set of counterfactual entities with the same past as the alternative futures. We can then partition the possible environments of these counterfactual entities according to their influence on the probability distribution over the entitiesโ€™ futures. This is done in basically the same way as we defined perception in the PA-loop in Definition 1. However, there are some technical issues to overcome. The set of entities with identical pasts up to time t can be interpreted as the set of entities that are the most like xA up to t. These are different entities but they only differ in the future. Their futures (including their next time-slices) are therefore a close analogue to the next states mt`1 of agent memories in the PA-loop. To make sure however that the entities have a next time-slice we also require that they have non-empty next time-slice. These requirements together define the notion of the co-perception entities of an entity xA at time t. These are entities that also perceive something (maybe the same thing) at t (in their trajectories) if xA perceives something at t. Definition 4 (Co-perception entities of an entity at t). Let xA P E be an entity with non-empty time-slices at t and t ` 1. The set of co-perception entities SpxA , tq of entity xA at t is the set of entities with non-empty time-slices at t and t ` 1, and that are identical up to t: SpxA , tq :โ€œ tyB P E : Bt , Bt`1 โ€ฐ H, yBฤบt โ€œ xAฤบt u. (3) Next we want to define a conditional probability distribution over these co-perception entities similar to pMt`1 pmt`1 |et , mt q. For this we need a random variable that ranges over all the possible futures of the co-perception entities. The naivest way to do this would be to use for xkAk P SpxA , tq: pS pxkAk |xVt zAt , xAฤบt q :โ€œ ฤ…t pAk ,Vt zAt pxkAk , xVt zAt , xAฤบt q ฤ…t pVt zAt ,Aฤบt pxVt zAt , xAฤบt q . (4) However, this has two problems. The first is that in general the denominator may vanish for some environments xVt zAt P XVt zAt . The second is that it is not a conditional probability since the sum over all co-perception indices is not necessarily one. These problems can be solved by restricting the set of environments and by introducing a mutual-exclusivity condition on the futures of the coperception entities. To restrict the environments we therefore define the coperception environments in the following way. Definition 5 (Co-perception environments). Let xA P E be an entity with non-empty time-slices at t and t ` 1 and SpxA , tq its co-perception entities. Then define the associated co-perception environments XVSt zAt ฤŽ XVt zAt by XVSt zAt :โ€œ txฬ„Vt zAt : DyB P SpxA , tq, pB,Vt zAt pyB , xฬ„Vt zAt q ฤ… 0u. (5) The co-perception environments of a co-perception set SpxA , tq are then the spatial patterns XVt zAt at t that can co-occur with at least one co-perception environment. By definition of the co-perception environments the denominator of Eq. (4) cannot vanish anymore if we require that the construction only allows co-perception environments. However, in order for the sum over all co-perception entities to equal one (for all co-perception environments) we need to have รฟ pAk ,XVt zAt pxkAk , xVt zAt , xAฤบt q ฤ…t k (6) โ€œ pVt zAt ,Aฤบt pxkAk , xVt zAt , xAฤบt q. ฤ…t This is the case in general if for all xVt zAt P XVSt bsAt and all co-perception entitiesโ€™ futures are mutually exclusive, i.e. for all xkAk โ€ฐ xlAl P SpxA , tq we have PrpxkAk , xlAl , xVt zAt , xAฤบt q โ€œ 0. (7) This condition can be guaranteed if we require a form of non-interpenetration. This condition on entity-sets states that there cannot be two different entities which are identical up to some point in time t and then, in the same single trajectory (with positive probability), at some point โ€œrevealโ€ their difference. If entities with identical pasts ever reveal their difference they must be in different trajectories i.e. they must be mutually exclusive. Definition ลค 6 (Non-interpenetration). An entity-set E ฤŽ BฤŽV XB satisfies non-interpenetration or is non-interpenetrating if for all yB , zC P E we have Dt P T : yBฤบt โ€œ zCฤบt and yBtฤƒ โ€ฐ zCtฤƒ รฑ PrpXBtฤƒ โ€œ yBtฤƒ , XBtฤƒ โ€œ zCtฤƒ |yBฤบt q โ€œ 0. (8) Non-interpenetration implies that co-perception entities are mutually exclusive: Theorem 2. Let xA P E be an entity with non-empty timeslices at t and t ` 1 and SpxA , tq its co-perception entities. If E satisfies non-interpenetration then SpxA , tq is mutually exclusive. Proof. Let yB , zC P SpxA , tq with yB โ€ฐ zC . Then they have identical pasts and so we have yBฤบt โ€œ zCฤบt . From non-interpenetration we then get PrpXB โ€œ yB , XC โ€œ zC q โ€œ 0. (9) This is stronger than Eq. (7). This means that under non-interpenetration Eq. (4) is a well defined conditional probability distribution . However, this conditional probability distribution is still quite different from pMt`1 pmt`1 |et , mt q since it ranges over the entire futures xkAk of the co-perception entities and not just next ฤ…t timesteps. At each transition from time-step t to t ` 1 the coperception entities SpxA , tq split up into sets of entities that are identical up to t`1 (we will call these sets the branches). Only one of these sets is the set SpxA , t ` 1q. For example an entity yB P SpxA , tq with the same past up to t but with a different time-slice at t ` 1 i.e. yBt`1 โ€ฐ xAt`1 is part of a different branch. In that case this branch is SpyB , t ` 1q and we have SpyB , t ` 1q X SpxA , t ` 1q โ€œ H. In summary then the dynamics of the system split up the co-perception entities of xA up to t into disjoint sets (the branches) of entities with identical pasts up to t ` 1. We can then interpret the branches at the time t ` 1 as the distinctions among the co-perception entities that are revealed at time t ` 1. Further distinctions among the co-perception entities are only revealed at later times. This also means that these are all differences that could possibly be due to the influence of the environment at t and that show their effect at t`1 (not later). In this way the perceptions at t should also be defined with respect to these branches. We call the partition that is defined via the identification of entities in SpxA , tq that are identical up to t ` 1 the branching partition. Definition 7 (Branching partition). Let xA P E be an entity with non-empty time-slices at t and t ` 1 and SpxA , tq its co-perception entities. Then define the branching partition ฮทpxA , tq of SpxA , tq as the partition induced by the equivalence classes of the equivalence relation yB โ€žzC รด yBt`1 โ€œ zCt`1 , (10) where yB , zC P SpxA , tq. We note that the definition of the branching partition can easily be generalised to more than one time-step into the future. Instead of requiring equality at t ` 1 we can require equality for the next r time-steps. Given the branching partition ฮทpxA , tq for a noninterpenetrating entity set we can then define a conditional probability distribution over the branches by just summing up the probabilities of all entities in each branch (remember that they are all mutually exclusive) to get the probability of a branch. This gives us the branch-morph defined below.2 Definition 8 (Branch-morph). Let tXi uiPV be a multivariate Markov chain with index set V โ€œ J ห† T and entity set E. Let xA P E be an entity with non-empty time-slices at t and t`1 and SpxA , tq its co-perception entities and ฮทpxA , tq the branching partition. Furthermore, let XVSt zAt ฤŽ XVt zAt be the associated co-perception environments. Also write for every block b P ฮทpxA , tq: รฟ ppb|xฬ‚Vt zAt , xAฤบt q :โ€œ pBtฤƒ ,Vt zAt pyBtฤƒ |xฬ‚Vt zAt , xAฤบt q. yB Pb (11) Then for each xฬ‚Vt zAt P XVSt zAt we define the branchmorph over ฮทpxA , tq as the probability distribution pฮทpxA ,tq p.|xฬ‚Vt zAt , xAฤบt q : ฮทpxA , tq ร‘ r0, 1s with pฮทpxA ,tq pb|xฬ‚Vt zAt , xAฤบt q :โ€œ ล™ ppb|xฬ‚Vt zAt , xAฤบt q , cPฮทpxA ,tq ppc|xฬ‚Vt zAt , xAฤบt q (12) for all b P ฮทpxA , tq. With the branch-morph we can then define, as expected, the perceptions as equivalence classes of the co-perception environments with respect to the associated branch-morph. First we define a partition of the co-perception environments called the co-perception environment partition. The perceptions are then the blocks of this partition. Definition 9. Let tXi uiPV be a multivariate Markov chain with index set V โ€œ J ห† T and entity set E. Let xA P E be an entity with non-empty time-slices at t and t`1 and SpxA , tq its co-perception entities and ฮทpxA , tq the branching partition. Furthermore, let XVSt zAt ฤŽ XVt zAt be the associated co-perception environments. Then define the co-perception environment partition ฯ€ S pxA , tq of XVSt zAt as the partition induced by the equivalence classes of the equivalence relation xฬ‚Vt zAt โ€ž xฬ„Vt zAt รด @b P ฮทpxA , tq : pฮทpxA ,tq pb|xฬ‚Vt zAt , xAฤบt q โ€œ pฮทpxA ,tq pb|xฬ„Vt zAt , xAฤบt q. (13) This means all associated co-perception environments in the same block of ฯ€ S pxA , tq have the same branch-morph. In other words they lead to the same branch of entity futures (i.e. the same future branch) with the same probabilities. Then all elements of these environment blocks have identical effects on the future branches and these branches cannot distinguish between environments within the blocks. Definition 10 (Perceptions). Let tXi uiPV be a multivariate Markov chain with index set V โ€œ J ห† T and entity set E. Let xA P E be an entity with non-empty time-slices at t and t ` 1 and SpxA , tq its co-perception entities. Furthermore, let XVSt zAt ฤŽ XVt zAt be the associated co-perception environments and ฯ€ S pxA , tq its co-perception environment partition. Then the blocks of ฯ€ S pxA , tq are called the perceptions of xA at t. 6 Entity action and perception in the PA-loop We now show that agent-environment systems as modelled by the PA-loop are multivariate Markov chains containing a specific choice of entity sets. In the PA-loop each trajectory xV is considered to consist of a time-evolution mT of the agent and a time-evolution of the environment eT . The agent therefore occurs in every trajectory and occupies the same degree of freedom in every trajectory. Each of the time-evolutions mT is a STP in the PA-loop. Since for us entities are STPs we define the entityset EP A of a PA-loop as the set of time-evolutions of the agent process i.e. ลบ EP A :โ€œ tmT P Mt u. (14) tPT Similarly, we can define entities for the environments and add them to EP A . 2 We note here that for entity-sets that exhibit interpenetration we can still define branch-morphs for mutually-exclusive subsets of the co-perception entities. Since the choice of these subsets is arbitrary however this does not lead to a uniquely defined notion of perception. For more details see Biehl (2017). Entity actions in the PA-loop We can write every trajectory as a pair pmT , eT q where mT is an entity. The entity mT then performs an entity action at time t in trajectory pmT , eT q with pMT ,ET pmT , eT q ฤ… 0 if there is an entity mฬ„t such that โ€ข mฬ„T occurs in pmฬ„T , eฬ„T q โ€ฐ pmT , eT q with pMT ,ET pmฬ„T , eฬ„T q ฤ… 0, โ€ข at t entities mT and mฬ„T occupy the same random variables, which is the case for all entities in EP A , โ€ข at t environments of mT and mฬ„T are identical: et โ€œ eฬ„t , โ€ข at t ` 1 the entities are different: mt`1 โ€ฐ mฬ„t`1 . Since all entities occupy the same random variables we can only have value actions in the PA-loop. If we assume that these conditions are fulfilled at some time t for two entities mT , mฬ„T we can derive that the conditional entropy HpMt`1 |Et q of the next agent state given the current environment state is greater than zero. To see this note that from pMT ,ET pmT , eT q ฤ… 0 and pMT ,ET pmฬ„T , eฬ„T q ฤ… 0 it directly follows that pMt`1 pmt`1 |et q ฤ… 0, pMt`1 pmฬ„t`1 |et q ฤ… 0 and pEt pet q ฤ… 0. Plugging this into the definition we get HpMt`1 |Et q ฤ… 0. It can also be seen that the more different co-action entities there are for a time t the higher the conditional entropy HpMt`1 |Et q can get. The final value of HpMt`1 |Et q depends on the actual probabilities but the maximum value for n co-actions is log n. Also note that if there are no actions at t i.e. no co-action entity in no co-action trajectory at t then HpMt`1 |Et q โ€œ 0. Entity actions of entities in EP A are therefore necessary and sufficient for HpMt`1 |Et q ฤ… 0. The conditional entropy HpMt`1 |Et q measures the uncertainty about the next agent state when the current environment state is known. It has been proposed as part of an autonomy measure as a measure of non-heteronomy in Bertschinger et al. (2008). Non-heteronomy means that the agent is not determined by the history of the environment. In this terminology entity actions are a necessary and sufficient condition for non-heteronomy. Entity perception in the PA-loop We now look at how entity perception as defined in Section 5 specialises to the case of the PA-loop. This argument in effect constitutes a proof that our Definition 8 of the branch-morph is a generalisation of the conditional probability distributions pMt`1 p.|mt , et q : Mt`1 ร‘ r0, 1s to non-interpenetrating arbitrary sets of co-perception entities This result is not surprising since we set out to do just this but it is also instructive to work through the recovery of the original expression of the conditional probability distribution starting from the general branch-morph. We pick an entity mT from the entity set EP A and consider its perceptions at an arbitrary time-step t P T . In order to get the perceptions at t we need 1. the co-perception entities SpmT , tq of mT at t, 2. the branching partition ฮทpmT , tq with its branches, 3. the co-perception environments, 4. the branch-morphs for each environment, 5. and the co-perception environment partition ฯ€ S pxA , tq with its blocks, the perceptions. These can be identified in the following way. 1. The co-perception entities SpmT , tq are the entities in EP A that have non-empty time-slices at t, t ` 1, and that are identical to mT up to t. All entities in EP A have non-empty time slices at all times. So we have: SpmT , tq โ€œ tmฬ„T P EP A : mฬ„ฤบt โ€œ mฤบt u (15) PA 2. First note that the entity set E satisfies noninterpenetration since they all occupy the same set tMt utPT of random variables. The branching partition ฮทpmT , tq is composed out of blocks (the branches) of co-perception entities that are identical up to t ` 1 i.e. mฬ‚T โ€žmฬ„T รด mฬ‚t`1 โ€œ mฬ„t`1 . (16) We can therefore identify the blocks of ฮทpmT , tq i.e. the future branches by the values that the entities take at t ` 1. Define the branch bpmฬ„t`1 q associated to mฬ„t`1 P Mt`1 via bpmฬ„t`1 q :โ€œ tmฬ‚T P SpmT , tq : mฬ‚t`1 โ€œ mฬ„t`1 u. (17) The branching partition is then: ฮทpmT , tq โ€œ tbpmฬ„t`1 q ฤŽ SpmT , tq : mฬ„t`1 P Mt`1 u. (18) 3. The co-perception environments are the STPs xVt zAt compatible with at least one co-perception entity. For the PA-loop and entity mT at t we have XVt zAt โ€œ Et and therefore XVSt zAt โ€œ EtS . Where EtS is EtS โ€œ tet P Et : Dmฬ„T P SpmT , tq, pMT ,Et pmฬ„T , et q ฤ… 0u. (19) If we marginalize over Mฤ…t we can see that this is equivalent to (20) EtS โ€œ tet P Et : pMt ,Et pmฬ„t , et q ฤ… 0u. 4. The branch-morphs are the probability distributions pฮทpmT ,tq p.|et , mฤบt q : ฮทpmT , tq ร‘ r0, 1s over the branches for each co-perception environment et P EtS . These are defined using Eq. (11) which for the perception-loop becomes รฟ ppbpmฬ„t`1 q, et |mฤบt q :โ€œ pMtฤƒ ,Et pmฬ‚tฤƒ , et |mฤบt q. mฬ‚T Pbpmฬ„t`1 q (21) We can rewrite the sum on the right hand side using Eq. (17) for bpmฬ„t`1 q and then SpmT , tqtฤƒ โ€œ Mtฤƒ : ppbpmฬ„t`1 q, et |mฤบt q โ€œ pMt`1 ,Et pmฬ„t`1 , et |mฤบt q. (22) The definition of the branch-morph for the PA-loop is ppbpmฬ„t`1 q, et |mฤบt q pฮทpmT ,tq pbpmฬ„t`1 q|et , mฤบt q : โ€œ ล™ bPฮทpmT ,tq ppb, et |mฤบt q (23) which can be rewritten (with some work) as pฮทpmT ,tq pbpmฬ„t`1 q|et , mฤบt q โ€œ pMt`1 pmฬ„t`1 |et , mฤบt q (24) โ€œ pMt`1 pmฬ„t`1 |et , mt q (25) where we used the BN of the PA-loop. 5.The co-perception environment partition ฯ€ S pmT , tq of S Et โ€œ is induced by Eq. (13) which, using the PA-loop and Eq. (24) becomes eฬ‚t โ€ž eฬ„t รด @mt`1 P Mt`1 : (26) pMt`1 pmt`1 |eฬ‚t , mt q โ€œ pMt`1 pmt`1 |eฬ„t , mt q which is just the equivalence relation of Eq. (1) used to extract the sensor-values in Section 3. So we have seen that our definitions of Section 5 specialise in the case of the PA-loop to the same concept of perception as in Section 3. 7 Conclusion We have defined actions and perceptions for entity-sets and therefore for sets of spatiotemporal patterns. This provides a formally defined way to associate gliders and similar spatiotemporal patterns in reaction-diffusion systems with actions and perceptions. This is a step towards a foramization of agency of such patterns. Here a notion of goaldirectedness is still missing and future work. We have also shown how our definitions specialize to a necessary and sufficient condition for non-heteronomy and the standard notion of perceptions of the agent process in the PAloop. For future research it is interesting to note that the branch-morphs are generalisations of the conditional probability distribution pMt`1 p.|et , mt q. These conditional probability distributions play a role in various information theoretic concepts formulated for the PA-loop. This suggests we might be able to translate bakc and forth between PA-loop concepts and those for spatiotemporal patterns in the future. We noted that a unique definition of entity perception is dependent on the condition of non-interpenetration of the entity-set. Beer, R. D. (1995). A dynamical systems perspective on agentenvironment interaction. Artificial Intelligence, 72(1-2):173โ€“ 215. Beer, R. D. (2014a). Characterizing autopoiesis in the game of life. Artificial Life, 21(1):1โ€“19. Beer, R. D. (2014b). The cognitive domain of a glider in the game of life. Artificial Life, 20(2):183โ€“206. Bertschinger, N., Olbrich, E., Ay, N., and Jost, J. (2008). Autonomy: An information theoretic perspective. Biosystems, 91(2):331โ€“345. Biehl, M., Ikegami, T., and Polani, D. (2016). Towards information based spatiotemporal patterns as a foundation for agent representation in dynamical systems. In Proceedings of the Artificial Life Conference 2016, pages 722โ€“729. The MIT Press. Biehl, M., Ikegami, T., and Polani, D. (2017). Specific and Complete Local Integration of Patterns in Bayesian Networks. Entropy, 19(5):230. Biehl, M. A. (2017). Formal Approaches to a Definition of Agents. PhD thesis, University of Hertfordshire, Hatfield. Froese, T., Virgo, N., and Ikegami, T. (2014). Motility at the origin of life: Its characterization and a model. Artificial Life, 20(1):55โ€“76. Ikegami, T. and Taiji, M. (1998). Uncertainty, possible worlds and coupled dynamical recognizers. http://sacral.c.u-tokyo.ac.jp/pdf/ikegami_polytechn Klyubin, A., Polani, D., and Nehaniv, C. (2005). Empowerment: a universal agent-centric measure of control. In The 2005 IEEE Congress on Evolutionary Computation, 2005, volume 1, pages 128โ€“135 Vol.1. McGregor, S. (2017). The Bayesian stance: Equations for โ€˜as-ifโ€™ sensorimotor agency. Adaptive Behavior, page 105971231770050. Schmickl, T., Stefanec, M., and Crailsheim, K. (2016). How a lifelike system emerges from a simplistic particle motion law. Scientific Reports, 6:37969. Tishby, N. and Polani, D. (2011). Information Theory of Decisions and Actions. In Cutsuridis, V., Hussain, A., and Taylor, J. G., editors, Perception-Action Cycle, Springer Series in Cognitive and Neural Systems, pages 601โ€“636. Springer New York. DOI: 10.1007/978-1-4419-1452-1 19. References Virgo, N. (2011). Thermodynamics and the Structure of Living Systems. University of Sussex. Unpublished PhD thesis. Balduzzi, D. (2011). Detecting emergent processes in cellular automata with excess information. Advances in Artificial Life, ECAL, abs/1105.0158. Wilson, G. and Shpall, S. (2012). Action. In Zalta, E. N., editor, The Stanford Encyclopedia of Philosophy. Summer 2012 edition. Barandiaran, X. E., Paolo, E. D., and Rohde, M. (2009). Defining agency: Individuality, normativity, asymmetry, and spatiotemporality in action. Adaptive Behavior, 17(5):367โ€“386. Zahedi, K. and Ay, N. (2013). Quantifying morphological computation. Entropy, 15(5):1887โ€“1915. arXiv:1301.6975 [cs, math]. Bartlett, S. and Bullock, S. (2015). Emergence of Competition between Different Dissipative Structures for the Same Free Energy Source. In Proceedings of the European Conference on Artificial Life, pages 415โ€“422. The MIT Press.
2cs.AI
GATED RECURRENT NETWORKS FOR SEIZURE DETECTION M. Golmohammadi, S. Ziyabari, V. Shah, E. Von Weltin, C. Campbell, I. Obeid and J. Picone Neural Engineering Data Consortium, Temple University, Philadelphia, Pennsylvania, USA {meysam, saeedeh, vinitshah, eva.vonweltin, christopher.campbell, obeid, picone}@temple.edu Abstractโ€” Recurrent Neural Networks (RNNs) with sophisticated units that implement a gating mechanism have emerged as powerful technique for modeling sequential signals such as speech or electroencephalography (EEG). The latter is the focus on this paper. A significant big data resource, known as the TUH EEG Corpus (TUEEG), has recently become available for EEG research, creating a unique opportunity to evaluate these recurrent units on the task of seizure detection. In this study, we compare two types of recurrent units: long short-term memory units (LSTM) and gated recurrent units (GRU). These are evaluated using a state of the art hybrid architecture that integrates Convolutional Neural Networks (CNNs) with RNNs. We also investigate a variety of initialization methods and show that initialization is crucial since poorly initialized networks cannot be trained. Furthermore, we explore regularization of these convolutional gated recurrent networks to address the problem of overfitting. Our experiments revealed that convolutional LSTM networks can achieve significantly better performance than convolutional GRU networks. The convolutional LSTM architecture with proper initialization and regularization delivers 30% sensitivity at 6 false alarms per 24 hours. I. INTRODUCTION Diagnosis of clinical conditions such as epilepsy are dependent on electroencephalography (EEG), the recording of the brainโ€™s electrical activity through electrodes placed on the scalp. Delivering a conclusive diagnosis of a brain-related illness without an EEG is often unfeasible [1]. The large amounts of time required by specialized neurologists to interpret these records, has created a workflow bottleneck โ€“ neurologists are overwhelmed with the amount of data that needs to be manually reviewed [2]. There is a great need for partial or complete automation of the EEG analysis process, and automated technology is slowly emerging to fill this void [3][4]. Automatic analysis of EEG scans reduces time to diagnosis, reduces error and enhances a neurologistโ€™s ability to administer medications. The ability to search EEG records symbolically greatly accelerates the review process. In this paper, we focus specifically on the problem of seizure detection. Many algorithms have been applied to this problem including timeโ€“frequency analysis methods [5][6], nonlinear statistical models [7] and more modern machine learning approaches such as neural networks and support vector machines [8]. Despite much progress, current EEG analysis methodologies are far from perfect with many being considered impractical due to high false detection rates [9]-[11]. The machine learning challenges of this application are described extensively in [1]. A significant big data resource, known as the TUH EEG Corpus (TUEEG) [12], has become available for EEG interpretation creating a unique opportunity to advance technology. Using a subset of this data that has been manually annotated for seizure events [13], a novel deep structure has been recently introduced which achieves a low false alarm rate on EEG signals [14]. This system integrates convolutional neural networks (CNNs) with recurrent neural networks (RNNs) to deliver state of the art performance. In this paper, our goal is to investigate the use of RNNs using the high-performance architecture described in [13]. We also explore improved initialization methods and regularization approaches. II. RECURRENT NEURAL NETWORKS A recurrent neural network (RNN) is an extension of a conventional feedforward neural network which can handle a variable-length input. The RNN handles the variable-length sequence by having a recurrent hidden state whose activation at each time is dependent on that of the previous time. Standard RNNs are hard to train due to the well-known vanishing or exploding gradient problems [15][16]. To address the vanishing gradient problem, the gated recurrent network architectures such as long short-term memory (LSTM) [17] unit and gated recurrent unit (GRU) were proposed [18]. LSTM was presented in [17]. The most commonly used architecture was described in [19], and is formulated as: +๐‘ ), = ๐œŽ(๐‘ˆ ๐‘ฅ + ๐‘Š ๐‘  + ๐‘ โˆ˜ ๐‘ + ๐‘ ) , = ๐‘“ โˆ˜ ๐‘ + ๐‘– โˆ˜ ๐‘”(๐‘ˆ ๐‘ฅ + ๐‘Š ๐‘  + ๐‘ ) , = ๐œŽ(๐‘ˆ ๐‘ฅ + ๐‘Š ๐‘  + ๐‘ โˆ˜ ๐‘ + ๐‘ ) , = ๐‘œ โˆ˜ ๐‘”(๐‘ ) . ๐‘– = ๐œŽ(๐‘ˆ ๐‘ฅ + ๐‘Š ๐‘  ๐‘“ ๐‘ ๐‘œ ๐‘  +๐‘ โˆ˜๐‘ (1) (2) (3) (4) (5) where ๐‘– , ๐‘“ , ๐‘ , ๐‘œ , and ๐‘  are the input gate, forget gate, cell state, output gate and block output at time instance t, respectively; ๐‘ฅ is the input at time t; ๐‘ˆ โˆ— , and ๐‘Š โˆ— are the weight matrices applied on input and recurrent hidden units, respectively; ๐œŽ(. ) and ๐‘”(. )are the sigmoid and tangent activation functions, respectively; ๐‘โˆ— and ๐‘ โˆ— are the peep-hole connections and biases, respectively; and โˆ˜ means element-wise product. As an alternative to the LSTM, the Gated Recurrent Unit (GRU) architecture was proposed in [20]. In [18], a GRU architecture was found to achieve better performance than LSTM on some tasks. A GRU is formulated as: ๐‘Ÿ ๐‘ง ๐‘ ฬƒ ๐‘  = = = = ๐œŽ(๐‘ˆ ๐‘ฅ ๐œŽ(๐‘ˆ ๐‘ฅ ๐‘”(๐‘ˆ ๐‘ฅ ๐‘ง โˆ˜๐‘  +๐‘Š ๐‘  +๐‘ ), +๐‘Š ๐‘  +๐‘ ), + ๐‘Ÿ โˆ˜ (๐‘Š ๐‘  ) + ๐‘ , + (1 โˆ’ ๐‘ง ) โˆ˜ ๐‘ ฬƒ . (6) (7) (8) (9) As one can see, a GRU architecture is similar to LSTM but without a separate memory cell. Unlike LSTM, a GRU does not include output activation functions and peep-hole connections. It also integrates the input and forget gates into an update gate, ๐‘ง , to balance between the previous activation, ๐‘  , and the candidate activation, ๐‘ ฬƒ . The reset gate, ๐‘Ÿ , allows it to forget the previous state [21]. III. EXPERIMENTAL DESIGN Our basic architecture, which employs a convolutional recurrent neural network, is presented in Figure 1. In this architecture, we integrate 2D CNNs, 1-D CNNs and LSTM networks to better exploit long-term dependencies. This structure currently uses LSTMs. However, we can easily replace LSTMs with GRUs. Feature extraction is performed using a fairly standard linear frequency cepstral coefficient-based feature extraction approach (LFCCs) popularized in applications such as speech recognition [22][23]. We also use first and second derivatives of the features since these provide a small improvement in performance [22]. Drawing on a video classification analogy, input data to the first layer of CNNs is composed of frames distributed in time where each frame is an image of width (W) equal to the length of a feature vector, the height (H) equals the number of EEG channels, and the number of image channels (N) equals one. Input data consists of T frames where T is equal to the window length multiplied by the number of samples per second. In our optimized system with a window duration of 21 seconds, the first 2D convolutional layer filters 210 frames (T = 21 ร— 10) of EEGs distributed in time with a size of 26 ร— 22 ร— 1 (W=26, H=22, N=1) using 16 kernels of size 3 ร— 3 and with a stride of 1. The first 2D max pooling layer takes as input a vector which is 260 frames distributed in time with a size of 26 ร— 22 ร— 16 and applies a pooling size of 2 ร— 2. This process is repeated two times with two 2D convolutional layers with 32 and 64 kernels of size 3 ร— 3 respectively and two 2D max pooling layers with a pooling size 2 ร— 2. The output of the third max pooling layer is flattened to 210 frames with size of 384 ร— 1. Then a 1D convolutional layer filters the output of the flattening layer using 16 kernels of size 3 which decreases the dimensionality in space to 210 ร— 16. Then we apply a 1D maxpooling layer with a size of 8 to decrease the dimensionality to 26 ร— 16. This is the input to a deep bidirectional LSTM network where the dimensionality of the output space is 128 and 256. The output of the last bidirectional LSTM layer is fed to a 2-way sigmoid function which produces a final classification of an epoch. Epochs are typically 1 sec in duration. Figure 1: A deep recurrent convolutional architecture for two-dimensional decoding of EEG signals that integrates 2D CNNs, 1-D CNNs and LSTM networks is shown. In this structure, LSTMs can be easily replaced by GRUs. To overcome the problem of overfitting and force the system to learn more robust features, regularizations are used in first two layers of CNNs. To increase nonlinearity, Exponential Linear Units (ELU) are used [24]. Adam is used in the optimization process along with a mean squared error loss function [14]. System CNN/GRU CNN/LSTM Sensitivity 30.83% 30.83% Specificity 91.49% 97.10% FA/24 Hrs. 21 6 Table 2. Recognition results for convolutional recurrent neural networks using GRU and LSTM architectures, for sensitivity in range of 30%. IV. RESULTS The lack of big data resources that can be used to train sophisticated statistical models compounds a major problem in automatic seizure detection. Inter-rater agreement for this task is low, especially when considering short seizure events [1]. Manual annotation of a large amount of data by a team of certified neurologists is extremely expensive and time consuming. It is difficult to employ large numbers of board-certified neurologists to perform this task. In this study, we are reporting results on the TUH EEG Seizure Corpus (TUSZ) [13]. This dataset, which is publicly available, is a subset of the TUH EEG Corpus that focuses on the problem of seizure detection. A summary of the corpus (v1.1.1) is shown in Table 1. A comparison of the performance of the convolutional recurrent neural networks using GRU and LSTM architectures, for sensitivity in range of 30%, are shown in Table 2 The related DET curve is illustrated in Figure 2 These systems were evaluated using a method of scoring popular in the EEG research community known as the overlap method [25]. True positives (TP) are defined as the number of epochs identified as a seizure in the reference annotations and correctly labeled as a seizure by the system. True negatives (TN) are defined as the number of epochs correctly identified as non-seizures. False positives (FP) are defined as the number of epochs incorrectly labeled as seizure while false negatives (FN) are defined as the number of epochs incorrectly labeled as non-seizure. Sensitivity shown in Table 2 is computed as TP/(TP+FN). Specificity is computed as TN/(TN+FP). The false alarm rate is the number of FPs per 24 hours. By comparing the results of CNN/LSTM with CNN/GRU, demonstrated in Figure 2, we find that in lower false positive rates, CNN/LSTM has significantly better performance from CNN/GRU, due to the fact that while GRU unit controls the flow of information like the LSTM unit, but it does not have a memory unit. LSTMs Description Patients Sessions Files Seizure (secs) Non-Seizure (secs) Total (secs) Train 196 456 1505 51,140 877,821 928,962 Eval 50 230 984 53,930 547,728 601,659 Table 1. An overview of the TUH EEG Seizure Corpus (v1.1.1) Figure 2. DET Curves for convolutional recurrent neural networks using GRU and LSTM architectures. can remember longer sequences better than GRUs and outperform it in this task, since seizure detection requires modeling long distance relationships. Additionally, the training time of CNN/GRU was 10% less than CNN/LSTM. Hence, the training time of these two systems is comparable, since most of the cycles are used for training of convolutional layers. In neural networks, determining the proper initialization strategy for the parameters in the model is part of the difficulty in training. Hence, we investigated a variety of initialization methods using the structure introduced in Figure 1. These results are presented in Table 4. The related DET curve is illustrated in Figure 4. In our experiments, we observed that the proper initialization of weights in a convolutional recurrent neural network is critical to convergence. For example, initialization with zeros or ones methods completely stalled the convergence process. Also, as we can see in Table 4, the performance of the system for the same sensitivity of 30% can change from 7 to 40, for different initialization methods. This decrease in performance and deceleration of convergence arises because some initializations can result in the deeper layers receiving inputs with small variances, which in turn slows down back propagation, and retards the overall convergence process. The best performance is achieved using orthogonal initialization. This method is a simple yet effective way of combatting exploding and vanishing gradients. Orthogonal matrices preserve the norm of a vector and their eigenvalues have absolute value of one. This means that, no matter how many times we perform repeated matrix multiplication, the resulting matrix doesn't explode or vanish [26]. Also in orthogonal matrices, columns and rows are all orthonormal to one another, which helps the weights to learn different input features. Initialization Orthogonal [26] Lecun Uniform [27] Glorot Uniform [28] Glorot Normal [28] Variance Scaling [26] Lecun Normal [27] He Normal [29] Random Uniform [26] Truncated Normal [26] He Uniform [29] Sensitivity Specificity FAs 30.8% 96.9% 7 30.3% 96.5% 8 31.0% 94.2% 13 29.5% 92.4% 18 31.8% 92.1% 19 31.8% 92.1% 19 31.3% 91.1% 22 30.2% 90.0% 25 31.6% 87.8% 31 29.2% 85.1% 40 Initialization L1/L2 Dropout Gaussian L2 L1 Sensitivity 30.8% 30.8% 30.8% 30.2% 30.0% Specificity FAs 97.1% 6 96.9% 7 95.8% 9 95.6% 10 43.7% 276 Table 3. Recognition results for convolutional LSTM architecture, for sensitivity in range of 30%, using different regularizations. Table 4. Results for CNN/LSTM, for sensitivity in the range of 30%, using different initialization methods. Figure 3. DET curves for the CNN/LSTM architecture using different regularizations. SUMMARY Figure 4. DET curves for the CNN/LSTM architecture using different initialization methods. Overfitting is a serious problem in deep neural nets with many parameters. In this study, we used five popular regularization methods to address this problem. By using L1, L2 and L1/L2 techniques, we apply penalties on layer parameters during optimization [30]. These penalties are incorporated in the loss function that the network optimizes. In an alternative approach, we used dropout to prevents units from co-adapting too much by randomly dropping units and their connections from the neural network during training [30]. Also, we studied the impact of introducing zero-centered Gaussian noise to the network [30]. The results of these experiments are presented in Table 3 along with a DET curve in Figure 3. While generally L1/L2 has the best performance, as we move towards a low FA rate, dropout delivers a lower FA rate. Additionally, we found that the primary error modalities observed were false alarms generated during brief delta range slowing patterns such as intermittent rhythmic delta activity. Our closed-loop experiments showed us that all the regularizing methods presented in Table 3 are playing an important role in increasing the false alarms of slowing patterns. Even though dropout is effective in CNNs, when dropout is placed over kernels it leads to diminished results. To solve this problem, in our future work, an efficient Bayesian convolutional neural network is being explored that places a probability distribution over the CNNโ€™s kernels [31]. This approach offers better robustness to overfitting on small data and show improve the robustness of our training process. In this paper, we investigated two deep learning architectures (LSTM and GRU) for automatic classification of EEGs using CNNs. LSTMs outperformed GRUs. We also studied initialization and regularizations of these networks. In future research, we are designing a more powerful architecture based on reinforcement learning concepts. We are also optimizing regularization and initialization algorithms for these approaches. Our goal is to approach human performance which is in the range of 75% sensitivity with a false alarm rate of 1 per 24 hours [11]. Robust training procedures are needed to make this technology relevant to a wide range of healthcare applications. ACKNOWLEDGEMENTS Research reported in this publication was most recently supported by the National Human Genome Research Institute of the National Institutes of Health under award number U01HG008468. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health. This material is also based in part upon work supported by the National Science Foundation under Grant No. IIP-1622765. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. The TUH EEG Corpus work was funded by (1) the Defense Advanced Research Projects Agency (DARPA) MTO under the auspices of Dr. Doug Weber through the Contract No. D13AP00065, (2) Temple Universityโ€™s College of Engineering and (3) Temple Universityโ€™s Office of the Senior Vice-Provost for Research. REFERENCES [1] I. Obeid and J. Picone, โ€œMachine Learning Approaches to Automatic Interpretation of EEGs,โ€ in Biomedical Signal Processing in Big Data, 1st ed., E. Sejdik and T. Falk, Eds. Boca Raton, Florida, USA: CRC Press, 2017, p. N/A. [2] Lopez, S., Suarez, G., Jungries, D., Obeid, I., & Picone, J. (2015). Automated Identification of Abnormal EEGs. In IEEE Signal Processing in Medicine and Biology Symposium (pp. 1โ€“4). Philadelphia, Pennsylvania, USA. B. Direito, C. Teixeira, B. Ribeiro, M. Castelo-Branco, F. Sales, and A. Dourado, โ€œModeling epileptic brain states using EEG spectral analysis and topographic mapping,โ€ J. Neurosci. Methods, vol. 210, no. 2, pp. 220โ€“229, 2012. [3] [4] [5] A. Temko, E. Thomas, W. Marnane, G. Lightbody, and G. Boylan, โ€œEEG-based neonatal seizure detection with Support Vector Machines,โ€ Clin. Neurophysiol., vol. 122, no. 3, pp. 464โ€“ 473, 2011. [20] [21] [22] [23] [24] J. Gotman, โ€œAutomatic recognition of epileptic seizures in the EEG,โ€ Electroencephalogr. Clin. Neurophysiol., vol. 54, no. 5, pp. 530โ€“540, Nov. 1982. [25] [6] J. Gotman, โ€œAutomatic detection of seizures and spikes.,โ€ J. Clin. Neurophysiol., vol. 16, no. 2, pp. 130โ€“140, 1999. [26] [7] C. J. Stam, โ€œNonlinear dynamical analysis of EEG and MEG: Review of an emerging field,โ€ Clinical Neurophysiology, vol. 116, no. 10. pp. 2266โ€“2301, 2005. [8] T. Alotaiby, S. Alshebeili, T. Alshawi, I. Ahmad, and F. Abd ElSamie, โ€œEEG seizure detection and prediction algorithms: a survey,โ€ EURASIP J. Adv. Signal Process., vol. 2014, no. 1, pp. 1โ€“21, 2014. S. Ramgopal, โ€œSeizure detection, seizure prediction, and closedloop warning systems in epilepsy,โ€ Epilepsy Behav., vol. 37, pp. 291โ€“307, 2014. A. Varsavsky and I. Mareels, โ€œPatient un-specific detection of epileptic seizures through changes in variance,โ€ in Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2006, pp. 3747โ€“3750. C. B. Swisher, C. R. White, B. E. Mace, and K. E. Dombrowski, โ€œDiagnostic Accuracy of Electrographic Seizure Detection by Neurophysiologists and Non-Neurophysiologists in the Adult ICU Using a Panel of Quantitative EEG Trends,โ€ J. Clin. Neurophysiol., vol. 32, no. 4, pp. 324โ€“330, Jan. 2015. I. Obeid and J. Picone, โ€œThe Temple University Hospital EEG Data Corpus,โ€ Front. Neurosci. Sect. Neural Technol., vol. 10, p. 196, 2016. M. Golmohammadi et al., โ€œThe TUH EEG Seizure Corpus,โ€ in Proceedings of the American Clinical Neurophysiology Society Annual Meeting, 2017, p. 1. M. Golmohammadi, S. Ziyabari, V. Shah, I. Obeid, and J. Picone, โ€œDeep Architectures for Automated Seizure Detection in Scalp EEGs,โ€ in Proceedings of the AAAI Conference on Artifical Intelligence, 2018, pp. 1โ€“8. Y. Bengio, P. Simard, and P. Frasconi, โ€œLearning Long-Term Dependencies with Gradient Descent is Difficult,โ€ IEEE Trans. Neural Networks, vol. 5, no. 2, pp. 157โ€“166, 1994. R. Pascanu, T. Mikolov, and Y. Bengio, โ€œOn the difficulty of training recurrent neural networks,โ€ in International Conference on Machine Learning, 2013, no. 2, pp. 1310โ€“1318. S. Hochreiter, S. Hochreiter, J. Schmidhuber, and J. Schmidhuber, โ€œLong short-term memory.,โ€ Neural Comput., vol. 9, no. 8, pp. 1735โ€“80, 1997. J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, โ€œEmpirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling,โ€ arXiv Prepr. arXiv1412.3555, pp. 1โ€“9, 2014. A. Graves and J. Schmidhuber, โ€œFramewise phoneme classification with bidirectional LSTM networks,โ€ in Proceedings [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [27] [28] [29] [30] [31] of the International Joint Conference on Neural Networks, 2005, vol. 4, pp. 2047โ€“2052. K. Cho et al., โ€œLearning phrase representations using rnn encoderdecoder for statistical machine translation,โ€ arXiv Prepr. arXiv1406.1078, 2014. Z. Wu and S. King, โ€œInvestigating gated recurrent networks for speech synthesis,โ€ in International Conference on Acoustics, Speech and Signal Processing, 2016. A. Harati, M. Golmohammadi, S. Lopez, I. Obeid, and J. Picone, โ€œImproved EEG Event Classification Using Differential Energy,โ€ in Proceedings of the IEEE Signal Processing in Medicine and Biology Symposium, 2015, pp. 1โ€“4. S. Lopez, M. Golammadi, I. Obeid, and J. Picone, โ€œAn Analysis of Two Common Reference Points for EEGs,โ€ in Proceedings of the IEEE Signal Processing in Medicine and Biology Symposium, 2016, pp. 1โ€“4. D. Clevert, T. Unterthiner, and S. Hochreiter, โ€œFast and Accurate Deep Network Learning by Exponential Linear Units (ELUs),โ€ arXiv Prepr. arXiv1511.07289, pp. 1โ€“14, 2016. S. B. Wilson, M. L. Scheuer, C. Plummer, B. Young, and S. Pacia, โ€œSeizure detection: correlation of human experts,โ€ Clin. Neurophysiol., vol. 114, no. 11, pp. 2156โ€“2164, Nov. 2003. A. M. Saxe, J. L. McClelland, and S. Ganguli, โ€œExact solutions to the nonlinear dynamics of learning in deep linear neural networks,โ€ in International Conference on Learning Representations, 2014, pp. 1โ€“22. Y. A. LeCun, L. Bottou, G. B. Orr, and K. R. Mulller, โ€œEfficient backprop,โ€ Lect. Notes Comput. Sci, 2012, pp. 1โ€“44. X. Glorot and Y. Bengio, โ€œUnderstanding the difficulty of training deep feedforward neural networks,โ€ Proc. 13th Int. Conf. Artif. Intell. Stat., pp. 1โ€“8, 2010. K. He, X. Zhang, S. Ren, and J. Sun, โ€œDelving deep into rectifiers: Surpassing human-level performance on imagenet classification,โ€ in Proceedings of the IEEE International Conference on Computer Vision, pp. 1โ€“11, 2015. N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, โ€œDropout: A Simple Way to Prevent Neural Networks from Overfitting,โ€ J. Mach. Learn. Res., vol. 15, pp. 1929โ€“1958, 2014. Y. Gal and Z. Ghahramani, โ€œBayesian convolutional neural networks with bernoulli approximate variational inference,โ€ arXiv Prepr. arXiv:1506.02158, pp. 1โ€“12, 2016.
2cs.AI
NodeTrix Planarity Testing with Small Clusters Emilio Di Giacomo1 , Giuseppe Liotta1 , Maurizio Patrignani2 , Alessandra Tappini1 arXiv:1708.09281v2 [cs.DS] 4 Sep 2017 1 Universitaฬ€ degli Studi di Perugia, Italy {emilio.digiacomo,giuseppe.liotta}@unipg.it [email protected] 2 Roma Tre University, Italy [email protected] Abstract. We study the NodeTrix planarity testing problem for flat clustered graphs when the maximum size of each cluster is bounded by a constant k. We consider both the case when the sides of the matrices to which the edges are incident are fixed and the case when they can be arbitrarily chosen. We show that NodeTrix planarity testing with fixed 3 sides can be solved in O(k3k+ 2 n3 ) time for every flat clustered graph that can be reduced to a partial 2-tree by collapsing its clusters into single vertices. In the general case, NodeTrix planarity testing with fixed sides can be solved in O(n3 ) time for k = 2, but it is NP-complete for any k โ‰ฅ 3. NodeTrix planarity testing remains NP-complete also in the free side model when k > 4. 1 Introduction Motivated by the need of visually exploring non-planar graphs, hybrid planarity is one of the emerging topics in graph drawing (see, e.g., [1,2,3,8]). A hybrid planar drawing of a non-planar graph suitably represents in restricted geometric regions those dense subgraphs for which a classical node-link representation paradigm would not be visually effective. These regions are connected by edges that do not cross each other. Different representation paradigms for the dense subgraphs give rise to different types of hybrid planar drawings. Angelini et al. [1] consider hybrid planar drawings where dense portions of the graph are represented as intersection graphs of sets of rectangles and study the complexity of testing whether a non-planar graph admits such a representation. In the context of social network analysis, Henry et al. [8] introduce NodeTrix representations, where the dense subgraphs are represented as adjacency matrices. Batagelj et al. [2] study the question of minimizing the size of the matrices in a NodeTrix representation of a graph while guaranteeing the planarity of the edges that connect different matrices. While Batagelj et al. can choose the subgraphs to be represented as matrices, Da Lozzo et al. [3] consider the problem of testing whether a flat clustered graph (i.e. a graph with clusters and no subclusters) admits a NodeTrix planar representation. In the paper of Da Lozzo et al. each cluster must be represented by a different adjacency matrix and the inter-cluster edges are represented as non-intersecting simple Jordan arcs. They prove that NodeTrix planarity testing for flat clustered graphs is NP-hard even in the constrained case where for each matrix it is specified which inter-cluster edges must be incident on the top, or on the left, or on the bottom, or on the right side. Motivated by these hardness results, in this paper we study whether NodeTrix planarity testing can be efficiently solved when the size of the clusters is not โ€œtoo bigโ€. More precisely, we consider flat clustered graphs whose clusters have size bounded by a fixed parameter k and we want to understand whether the NodeTrix planarity testing problem is fixed parameter tractable, i.e. it can be solved in time f (k)T (n), where T (n) is a polynomial in n and f (k) is a function that depends only on k. Our main results can be listed as follows: 3 โ€“ We describe an O(k 3k+ 2 ยทn3 )-time algorithm to test NodeTrix planarity with fixed sides for flat clustered graphs that are partial 2-trees. Informally, a flat clustered graph G is a partial 2-tree if the graph obtained by collapsing every cluster of G into a single vertex is a partial 2-tree. โ€“ When the flat clustered graph is not a partial 2-tree, NodeTrix planarity testing with fixed sides can still be solved in O(n3 ) time for k = 2, but it becomes NP-complete for any larger value of k. โ€“ Finally, we extend the above hardness result to the free sides model and show that NodeTrix planarity testing remains NP-complete when the maximum cluster dimension is larger than four. This is done by proving that NAE3SAT is NP-complete even for triconnected Boolean formulas, which may be a result of independent interest. Our polynomial-time solution solves a special type of the planarity testing problem where the order of the edges around each vertex is suitably constrained to take into account the fact that a vertex of a matrix M has four copies along the four sides of M . It may be worth recalling that Gutwenger et al. [6] have considered an apparently similar problem. Namely, they studied planarity testing where the order of the edges around the vertices may not be arbitrarily permuted. Unfortunately, not only our problem does not fall in any of the cases addressed by Gutwenger et al., but it does not seem solvable by introducing a gadget of polynomial size that models the embedding constraints at each vertex. This characteristic associates NodeTrix planarity testing with other known variants of planarity testing, including clustered planarity, where the use of gadgets of polynomial size has been so far an elusive goal. The rest of the paper is organized as follows. Preliminary definitions are in Section 2. Sections 3 and 4 describe a polynomial time algorithm for clustered 2-trees with bounded cluster-size. In Section 5 we show that for general flat clustered graphs and fixed sides NodeTrix planarity testing can be solved in polynomial time for k = 2 but it is NP-complete for k โ‰ฅ 3. In the same section we extend this completeness result to NodeTrix planarity testing of flat clustered graphs with free sides. Finally open problems can be found in Section 6. Some proofs can be found in the appendix. 2 Preliminaries We assume familiarity with basic definitions of graph theory and graph drawing and in particular with the notions of block-cut-vertex tree and of SPQR-tree (see, e.g., [4,7]). A flat clustered graph G = (V, E, C) is a simple graph with vertex set V , edge set E, and a partition C of V into sets V1 , . . . , Vh , called clusters. An edge (u, v) โˆˆ E with u โˆˆ Vi and v โˆˆ Vj is an intra-cluster edge if i = j and it is an inter-cluster edge if i 6= j. A NodeTrix representation of a flat clustered graph G is such that: (i) Each cluster Vi with |Vi | = 1 (called trivial cluster) is represented as a distinct point in the plane. (ii) Each cluster Vi with |Vi | > 1 (called non-trivial cluster) is represented by a symmetric adjacency matrix Mi (with |Vi | rows and columns), where Mi is drawn in the plane so that its boundary is a square with sides parallel to the coordinate axes. (iii) There is no intersection between two distinct matrices or between a point representing a vertex and a matrix. (iv) Each intracluster edge of a cluster Vi is represented by the adjacency matrix Mi . (v) Each inter-cluster edge (u, v) with u โˆˆ Vi and v โˆˆ Vj is represented by a simple Jordan arc connecting a point on the boundary of matrix Mi with a point on the boudary of matrix Mj , where the point on Mi (on Mj ) belongs to the column or to the row of Mi (resp. of Mj ) associated with u (resp. with v). A NodeTrix representation of a flat clustered graph G is planar if there is no intersection between any two inter-cluster edges (except possibly at common end-points) nor an intersection between an inter-cluster edge and a matrix. A flat clustered graph is NodeTrix planar if it admits a planar NodeTrix representation. Fig. 1(a) is an example of a NodeTrix planar representation. A formal definition of the problem investigated in the paper is as follows. Let G = (V, E, C) be a flat clustered graph with n vertices and let k be the maximum cardinality of a cluster in C. Clustered graph G is NodeTrix planar with fixed sides if it has a NodeTrix planar representation where for each inter-cluster edge, the sides of matrices it attaches to is specified as part of the input; G is NodeTrix planar with free sides if the sides of the matrices to which inter-cluster edges attach can be arbitrarily chosen. Let Mi be the matrix representing cluster Vi in a NodeTrix representation of G; let v be a vertex of Vi and let (u, v) be an inter-cluster edge. Edge (u, v) can intersect the boundary of Mi in four points pv,t , pv,b , pv,l , and pv,r since the row and column that represent v in Mi intersect the four sides of the boundary of Mi . We call such points the top copy, bottom copy, left copy, and right copy of v in Mi , respectively. A side assignment for Vi โˆˆ C specifies for each inter-cluster edge whether the edge must attach to the matrix Mi representing Vi in its top, S left, right, or bottom side. More precisely, a side assignment is a mapping ฯ†i : j6=i Ei,j โ†’ {t, b, l, r}, where Ei,j is the set of inter-cluster edges between the clusters Vi and Vj (Vi and Vj are adjacent if Ei,j 6= โˆ…). A side assignment for C is a set ฮฆ of side assignments for each Vi โˆˆ C. We denote as G = (V, E, C, ฮฆ) a flat clustered graph G = (V, E, C) with a given side assignment ฮฆ = {ฯ†1 , ฯ†2 , . . . , ฯ†|C| }. Let ฮ“ be a NodeTrix representation of G such that, for every inter-cluster edge e = (u, v) โˆˆ E with u โˆˆ Vi and v โˆˆ Vj , the incidence points of e with the matrices Mi and Mj representing Vi and Vj in ฮ“ are exactly the points pu,ฯ†i (e) and pv,ฯ†j (e) , respectively. We call ฮ“ a NodeTrix representation of G consistent with ฮฆ. We say that G = (V, E, C, ฮฆ) is NodeTrix planar if it admits a NodeTrix planar representation consistent with ฮฆ. An inter-cluster edge is heavy if both its end-vertices belong to non-trivial clusters. It is light otherwise. A flat clustered graph is light if every intercluster edge is light. A 1-subdivision of a heavy edge e = (u, v) of a flat clustered graph G = (V, E, C) replaces e with a path u0 = u, u1 , u2 = v and defines a new flat clustered graph G0 = (V 0 , E 0 , C 0 ), where V 0 = V โˆช {u1 }, E 0 = E/e โˆช {(u0 , u1 ), (u1 , u2 )}, and C 0 = C โˆช {u1 }. The light reduction of G is the flat clustered graph G0 obtained by performing a 1-subdivision of every heavy inter-cluster edge of G. A consequence of Theorem 1 in [5] about the edge density of NodeTrix planar graphs, is that the light reduction G0 of a NodeTrix planar flat clustered graph G has O(|V |) vertices and O(|V |) inter-cluster edges. Property 1. A flat clustered graph G is NodeTrix planar if and only if its light reduction G0 is NodeTrix planar. Based on Property 1, in the remainder we shall assume that flat clustered graphs are always light and we call them clustered graphs, for short. The frame of a clustered graph G = (V, E, C) is the graph F obtained by collapsing each cluster Vi โˆˆ C, with |Vi | > 1, into a single vertex ci of F , called the representative vertex of Vi in F . Let ci and cj be the two representative vertices of Vi and Vj in F , respectively. For every inter-cluster edge connecting a vertex of Vi to a vertex of Vj in G there is an edge in F connecting ci and cj . Observe that the frame graph F of G is in general a multigraph; however, F is simple when G is light. Since the NodeTrix planarity of a clustered graph implies the planarity of its frame graph, we will test NodeTrix planarity only on those clustered graphs that have a planar frame. A 2-tree is a graph recursively defined as follows: (i) an edge is a 2-tree; (ii) the graph obtained by adding a vertex v to a 2-tree G and by connecting v to two adjacent vertices of G is a 2-tree. A (planar) graph is a partial 2-tree if it is a subgraph of a (planar) 2-tree. A biconnected partial 2-tree is a series-parallel graph. A clustered graph is a partial 2-tree if its frame is a partial 2-tree. We will sometimes talk about series-parallel clustered graphs when their frames are series parallel. 3 NodeTrix Representations and Wheel Reductions The polynomial-time algorithms described in Sections 4 and 5 are based on decomposing the planar frame F of a clustered graph G = (V, E, C, ฮฆ) into its biconnected components and storing them into a block-cut-vertex tree. We process each block of F by using an SPQR decomposition tree that is rooted at a reference edge and visited from the leaves to the root. For each visited node ยต of the decomposition tree of a block of F we test whether the subgraph of G whose frame is the pertinent graph of ยต satisfies the planar constraints imposed by the side assignment on the inter-cluster edges. A key ingredient to efficiently perform the test at ยต is the notion of wheel replacement. Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ and let Vi โˆˆ C be a cluster with k > 1 vertices. Vi admits k! permutations of its vertices and we associate a suitable graph to each such permutation. Let ฯ€i = v0 , v1 , . . . , vkโˆ’1 be a permutation of the vertices of Vi . The wheel of Vi consistent with ฯ€i is the wheel graph consisting of a vertex v of degree 4k adjacent to the vertices of an oriented cycle v0,t , v1,t , . . . , vkโˆ’1,t , v0,r , v1,r , . . . , vkโˆ’1,r , vkโˆ’1,b , vkโˆ’2,b , . . . , v0,b , vkโˆ’1,l , vkโˆ’2,l , . . . , v0,l where each edge of the cycle is oriented forward. Intuitively, this oriented cycle will be embedded clockwise to encode the constraints induced by a matrix Mi representing Vi when its left-to-right order of columns is ฯ€i . More precisely, a wheel replacement of cluster Vi consistent with ฯ€i is the clustered graph obtained as follows: (i) remove Vi and all the inter-cluster edges incident to Vi ; (ii) insert the wheel Wi of Vi consistent with ฯ€i ; and (iii) for each inter-cluster edge e = (u, vj ), with vj โˆˆ Vi , insert edge (u, vj,ฯ†i (e) ) incident to Wi . We call edge (u, vj,ฯ†i (e) ) the image of edge e = (u, vj ). Let G = (V, E, C, ฮฆ, ฮ ) be a clustered graph with side assignment ฮฆ where ฮ  is a set of permutations {ฯ€1 , ฯ€2 , . . . , ฯ€|C| }, one for each cluster Vi (with i = 1, . . . , |C|). We call ฮ  the permutation assignment of G and we say that G is NodeTrix planar with side assignment ฮฆ and permutation assignment ฮ  if G admits a NodeTrix planar representation with side assignment ฮฆ where for each matrix Mi the permutation of its columns is ฯ€i . The wheel reduction of G consistent with ฮ  is the graph obtained by performing a wheel replacement of Vi โˆˆ C consistent with ฯ€i for each i = 1, . . . , |C|. Theorem 1. Let G = (V, E, C, ฮฆ, ฮ ) be a clustered graph with side assignment ฮฆ and permutation assignment ฮ . G is NodeTrix planar if and only if the planar wheel reduction of G admits a planar embedding where the external oriented cycle of each wheel Wi is embedded clockwise. Fig. 1(a) and Fig. 1(b) show respectively a NodeTrix planar representation of a clustered graph G and the corresponding wheel reduction with its planar embedding. Based on Theorem 1, we can test the graph G = (V, E, C, ฮฆ) for NodeTrix planarity by exploring the space of the possible permutation sets ฮ  and corresponding wheel reductions in search of a NodeTrix planar G = (V, E, C, ฮฆ, ฮ ). Note that, if the maximum size of a cluster is given as a parameter k, every cluster Vi can be replaced by k! wheel graphs, one for each possible permutation of the vertices of Vi . In order to test planarity, for any such wheel replacement Wi , the cyclic order of the inter-cluster edges incident to the same vertex of Wi can be arbitrarily permuted. While each wheel reduction yields an instance of constrained planarity testing that can be solved with the linear-time algorithm u2 v2,L u0,L v1,R u1,L v2,R u2,L vo id vo id vo id ,T ,T u2 ,T v0,R u1 u0 ,T ,T ,T v2 v v1,L u1 v2 Wtยต v0,L u0 v1 v1 v0 v0 u u0,R void u1,R void u2,R void Wtยต void v ext int-ext id vo t in id vo ,B ,B u2 ,B u1 u0 ,B ,B ,B v2 v1 v0 2, T 1, T w w w 0, T ยต w0,L w0 w0,R w w1,L w1 w2 w2,L w2,R ,B ,B ,B w2 w1 w0 (a) w1,R Ws ยต (b) (c) Fig. 1. (a) A NodeTrix planar representation of a clustered graph. (b) The planar embedding of the corresponding wheel reduction. (c) Labeling of the vertices of Wtยต ; the complete internal and external sequences are highlighted. described in [6], a brute-force approach that repeats this algorithm on each possible wheel reduction may lead to testing planarity on |C|k! different instances. Instead, for each visited node ยต of the decomposition tree T we compute a succinct description of the possible NodeTrix planar representations of the subgraph Gยต of G represented by the subtree of T rooted at ยต. This is done by storing for the poles of ยต those pairs of wheel graphs that are compatible with a NodeTrix planar representation of Gยต . How to efficiently compute such a succinct description will be the subject of the next sections. 4 Testing NodeTrix Planarity for Partial 2-Trees In this section we prove that NodeTrix planarity testing with fixed sides can be solved in polynomial time for a clustered graph G = (V, E, C, ฮฆ) when the maximum size of any cluster of C is bounded by a constant and the frame graph is a partial 2-tree. This contrasts with the NP-hardness of NodeTrix planarity testing with fixed sides proved in [3] in the case where the size of the clusters is unbounded. We first study the case of a clustered graph whose frame graph is a seriesparallel graph, i.e., it is biconnected and its SPQR decomposition tree only has Q-, P-, and S-nodes. We then consider the case of partial 2-trees, i.e., graphs whose biconnected components are series-parallel. 4.1 Series-Parallel Frame Graphs In this section we prove that NodeTrix planarity testing with fixed sides can 3 be solved in O(k 3k+ 2 ยท n2 ) time for clustered graphs whose frame graphs are series-parallel and have cluster size at most k. Let G = (V, E, C, ฮฆ) be a series-parallel clustered graph with side assignment ฮฆ and let F be its frame graph. Let T be the SPQ decomposition tree of F rooted at any Q-node. To simplify the description and without loss of generality, we assume that every S-node of T has exactly two children. Let ยต be a node of T , and let sยต , tยต be the poles of ยต. Consider the pertinent graph Fยต represented by the subtree of T rooted at ยต and let vยต be a pole of ยต (vยต โˆˆ {sยต , tยต }). Pole vยต in the frame graph F may correspond to a non-trivial cluster Vi of C. In this case, we call vยต a non-trivial pole of ยต and cluster Vi the pertinent cluster of vยต . The edges of Fยต incident to vยต are the intra-component edges of vยต . The other edges of F incident to vยต are the extra-component edges of vยต . Each intracomponent (extra-component) edge of vยต corresponds to an inter-cluster edge e0 of G incident to one vertex of the pertinent cluster Vยต of vยต . We call e0 an intracomponent edge (extra-component edge) of Vยต . We associate k! wheel graphs to each non-trivial pole vยต of ยต. Each of them is a wheel replacement of the pertinent cluster of vยต , consistent with one of the k! permutations of its vertices. Let vยต be a non-trivial pole of ยต, let Vยต be the pertinent cluster of vยต , let ฯ€ยต be a permutation of the vertices of Vยต , and let Wยต be the wheel replacement of Vยต consistent with ฯ€ยต . Every edge e incident to Wยต such that e is the image of an inter-cluster edge e0 of G is labeled either int or ext, depending on whether e0 is an intra-component or an extra-component edge of Vยต . A vertex w of the external cycle of Wยต is assigned one label of the set {void, int, ext, int-ext} as follows. Vertex w is labeled void if no edge incident to w is the image of an inter-cluster edge. Vertex w is labeled int (resp. ext) if we have a label int (resp. ext) on every edge e incident to w such that e is the image of an inter-cluster edge. Otherwise, vertex w is labeled int-ext. See Fig. 1(c) for an example concerning the wheel Wtยต of Fig. 1(b); the dashed curve of Fig. 1(b) shows the subgraph of the wheel reduction corresponding to Fยต . A clockwise sequence v0 , v1 , . . . , vj of vertices of the external cycle of Wยต is an external sequence of pole vยต consistent with ฯ€ยต if v0 and vj are labeled either ext or int-ext and all the other vertices of the sequence are labeled either void or ext. An external clockwise sequence of pole vยต is complete if it contains all the vertices of Wยต that are labeled ext and int-ext. Note that a complete external sequence may contain many void vertices but no int vertex. Internal and complete internal sequences of pole vยต are defined analogously. Observe that a complete internal sequence and a complete external sequence of vยต may not exist when vertices labeled int and vertices labeled ext alternate more than twice when traversing clockwise the external cycle of Wยต , or when three vertices are labeled int-ext. A special case is when Wยต has exactly two vertices w1 and w2 labeled int-ext and all other vertices are void. In this case, the clockwise sequence from w1 to w2 and the clockwise sequence from w2 to w1 are both complete internal and complete external sequences. In order to test G = (V, E, C, ฮฆ) for NodeTrix planarity, we implicitly take into account all possible permutation assignments ฮ  by considering, for each non-trivial pole wยต of each node ยต of T , its k! possible wheels and by computing their complete internal and complete external sequences. We visit the SP Q decomposition tree T from the leaves to the root and equip each node ยต of T with information regarding the complete internal and complete external sequences of its non-trivial poles. Let ยต be an internal node of T , let vยต be a non-trivial pole of ยต, let ฯ€vยต be a permutation of the pertinent cluster Vยต of vยต , and let Wยต be the wheel of Vยต consistent with ฯ€vยต . We denote as ISeq(ยต, vยต , ฯ€vยต ) the complete internal sequence of vยต consistent with ฯ€vยต in pole ยต and as ESeq(ยต, vยต , ฯ€vยต ) the complete external sequence of vยต consistent with ฯ€vยต in pole ยต. We distinguish between the different types of nodes of T . Node ยต is a Q-node. Since G is light, at most one of its poles is non-trivial. Let e be an edge of F that is the pertinent graph of ยต. One end-vertex of e is the representative vertex in F of the pertinent cluster of the non-trivial pole vยต . In fact, edge e corresponds to an edge e0 = (u, z) of G such that u โˆˆ Vยต and z is a trivial cluster. The side assignment ฯ†vยต defines whether e is incident to the top, bottom, left, or right copy uW of u in the wheel Wยต of Vยต . For any possible permutation ฯ€vยต we have ISeq(ยต, vยต , ฯ€vยต ) = uW . If uW is labeled int-ext, then ESeq(ยต, vยต , ฯ€vยต ) is the external cycle of Wยต starting at uW and ending at uW . Otherwise, traverse the external cycle of Wยต starting at uW and following the direction of the edges; ESeq(ยต, vยต , ฯ€vยต ) consists of all the encountered vertices from the first labeled ext to the last labeled ext. Node ยต is a P-node. Let ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 be the children of ยต. Observe that vยต is a non-trivial pole also for the children ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 of ยต. We consider every permutation ฯ€vยต such that ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 have both a complete internal sequence and a complete external sequence compatible with ฯ€vยต . The complete internal sequence of vยต consistent with ฯ€vยต is the union of the complete internal sequences of the children ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 , that is ISeq(ยต, vยต , ฯ€vยต ) = โˆชhโˆ’1 i=0 ISeq(ฮฝi , vยต , ฯ€vยต ). To determine the complete external sequence of vยต consistent with ฯ€vยต we consider the intersection of the complete external sequences of the children of ยต. If this intersection consists of exactly one sequence of consecutive vertices, hโˆ’1 then ESeq(ยต, vยต , ฯ€vยต ) = โˆฉi=0 ESeq(ฮฝi , vยต , ฯ€vยต ). Otherwise (i.e., the intersection is empty or it consists of more than one sequence of consecutive vertices), vยต does not have a complete external sequence consistent with ฯ€vยต . Node ยต is an S-node. Let ฮฝ be the child of ยต that shares the pole vยต with ยต. We consider every permutation ฯ€vยต such that ฮฝ has both ISeq(ฮฝ, vยต , ฯ€vยต ) and ESeq(ฮฝ, vยต , ฯ€vยต ). The complete internal (external) sequence of vยต consistent with ฯ€vยต is ISeq(ยต, vยต , ฯ€vยต ) = ISeq(ฮฝ, vยต , ฯ€vยต ) (ESeq(ยต, vยต , ฯ€vยต ) = ESeq(ฮฝ, vยต , ฯ€vยต )). To test G for NodeTrix planarity we execute a bottom-up traversal of T and, for each node ยต with poles sยต and tยต , we check whether each possible pair (ฯ€sยต , ฯ€tยต ) induces complete internal and external sequences for sยต and tยต that are โ€˜compatibleโ€™ with a planar embedding of the wheel reduction of G. If this is the case, by Theorem 1, G is NodeTrix planar, otherwise we reject G. More formally, let ฯ€sยต (ฯ€tยต , respectively) be a permutation such that sยต (tยต , respectively) has both a complete internal sequence and a complete external sequence compatible with ฯ€sยต (ฯ€tยต , respectively). We say that (ฯ€sยต , ฯ€tยต ) is a compatible pair of permutations for ยต if either one of the poles is a trivial pole or one of the following cases applies. Node ยต is a Q-node. In this case all k! possible pairs of permutations for sยต or tยต (recall that only one of them is non-trivial) are compatible for ยต. Node ยต is a P-node. Let ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 be the children of ยต. Consider a pair of permutations (ฯ€sยต , ฯ€tยต ); we recall that, for i = 0, . . . , hโˆ’1, each ฮฝi has poles sยต and tยต . A first condition for pair (ฯ€sยต , ฯ€tยต ) to be a compatible pair for ยต is that (ฯ€sยต , ฯ€tยต ) is also a compatible pair for ฮฝi , with i = 0, . . . , hโˆ’1. A second condition asks that the pair (ฯ€sยต , ฯ€tยต ) defines opposite orders on the poles of ยต. Namely, let Wยตs (resp., Wยตt ) be the wheel of Vsยต (resp., Vtยต ) consistent with ฯ€sยต (resp., ฯ€tยต ). Traversing clockwise the external cycle of Wยตs starting from the first vertex of ESeq(ยต, sยต , ฯ€sยต ), let ISeq(ฮฝ0 , sยต , ฯ€sยต ), ISeq(ฮฝ1 , sยต , ฯ€sยต ), . . . , ISeq(ฮฝhโˆ’1 , sยต , ฯ€sยต ) be the order by which the internal sequences are encountered. Pair (ฯ€sยต , ฯ€tยต ) defines opposite orders on the poles of ยต if, traversing clockwise the external cycle of Wยตt starting from the first vertex of ESeq(ยต, tยต , ฯ€sยต ), the order by which we encounter the internal sequences of ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 is the opposite one, i.e., the order is ISeq(ฮฝhโˆ’1 , tยต , ฯ€tยต ), ISeq(ฮฝhโˆ’2 , tยต , ฯ€tยต ), . . . , ISeq(ฮฝ0 , tยต , ฯ€tยต ). Node ยต is an S-node. Let ฮฝ0 and ฮฝ1 be the children of ยต such that sฮฝ0 = sยต , tฮฝ0 = sฮฝ1 , and tฮฝ1 = tยต . A pair (ฯ€sยต , ฯ€tยต ) is a compatible pair for ยต if there exists a permutation ฯ€tฮฝ0 such that the pair (ฯ€sยต , ฯ€tฮฝ0 ) is compatible for ฮฝ0 and the pair (ฯ€tฮฝ0 , ฯ€tยต ) is compatible for ฮฝ1 . Fig. 2 suggests that a NodeTrix planar representation of a clustered graph G defines a permutation assignment ฮ  such that, for every node ยต of T , pair (ฯ€sยต , ฯ€tยต ) is a compatible pair for ยต. Lemma 1. Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ and let T be the SPQ decomposition tree of the frame graph of G. Graph G is NodeTrix planar if and only if there exists a permutation assignment ฮ  such that, for every node ยต of T with poles sยต and tยต , we have that permutation ฯ€sยต โˆˆ ฮ  and permutation ฯ€tยต โˆˆ ฮ  form a compatible pair of permutations for ยต. Lemma 2. Let G = (V, E, C, ฮฆ) be a series-parallel clustered graph with side assignment ฮฆ. Let k be the maximum size of any cluster in C and let n be the 3 cardinality of V . There exists an O(k 3k+ 2 ยท n2 )-time algorithm that tests whether G is NodeTrix planar with side assignment ฮฆ and if so, it computes a NodeTrix planar representation of G consistent with ฮฆ. Proof. Let F be the frame graph of G; for any possible choice of an edge e of F we repeat the following procedure. We construct the SPQ decomposition tree of G rooted at the Q-node whose pertinent graph is e. We visit T from the leaves to the root and test whether G has a permutation assignment ฮ  such that G = (V, E, C, ฮฆ, ฮ ) is NodeTrix planar. We first equip each non-trivial pole vยต of every node ยต of T with its possible complete internal and complete external sequences. The maximum number of complete internal sequences of vยต is k!. The same is true for the complete external sequences. If each complete (internal or Wtยต ยต Wsยต (a) (b) Fig. 2. (a) A NodeTrix planar representation ฮ“ of G = (V, E, C, ฮฆ). (b) ฮ“ induces a permutation assignment and a planar embedding of a wheel reduction of G; the complete internal and external sequences for a pair of poles are also highlighted. external) sequence of pole vยต is encoded by means of its first and last vertex in the clockwise order around Wvยต , then each complete internal or external sequence needs constant space. It follows that the intersection or the union of two complete internal or external sequences can be computed in constant time. Therefore, all complete internal and external sequences for each non-trivial pole of T can be computed in O(k!) time. Hence, the whole bottom-up traversal to equip all non-trivial poles with every possible complete internal/external sequence can be executed in O(k! ยท n) time. We now test whether there exists a permutation assignment ฮ  such that any node ยต of T has a compatible pair of permutations. To this aim, we look at the complete internal and external sequences for the pair of poles of the children of ยต. For each pair (ฯ€sยต , ฯ€tยต ) of permutations of the poles of ยต we equip ยต with the information about whether such pair is compatible for ยต. This requires O(k!2 ) space. If ยต is a Q-node, every pair of permutations (ฯ€sยต , ฯ€tยต ) is compatible for ยต. It follows that all compatible pairs for ยต can be computed in O(k!) time (recall that one between sยต and tยต is non-trivial) and, hence, in O(k! ยท n) time for all the Q-nodes of T . If ยต is a P-node with children ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 , ฯ€sยต is one of the permutations that equip sยต , and ฯ€tยต is one of the permutations that equip tยต , testing whether the pair (ฯ€sยต , ฯ€tยต ) is a compatible pair for ยต can be executed in O(h) time. It follows that all compatible pairs for ยต can be computed in O(k!2 ยท h) time and, hence, in O(k!2 ยท n) time for all P-nodes of T . If ยต is an S-node with children ฮฝ0 and ฮฝ1 , ฯ€sยต is one of the permutations that equip sยต , and ฯ€tยต is one of the permutations that equip tยต , testing whether the pair (ฯ€sยต , ฯ€tยต ) is a compatible pair for ยต can be executed in O(k!) time, corresponding to choosing all possible permutations for the pole shared between ฮฝ0 and ฮฝ1 . It follows that all compatible pairs for ยต can be computed in O(k!3 ) time and, hence, in O(k!3 ยท n) time for all S-nodes of T . In conclusion, the time complexity of a bottom-up visit of T rooted at e is O(k!3 ยท n). By rooting T at all possible Q-nodes, we obtainโˆšan overall time complexity of O(k!3 ยท n2 ). By Stirlingโ€™s approximation, k! โˆผ 2ฯ€k( ke )k and thus a series-parallel clustered graph G with n vertices, side assignment ฮฆ, and maxi3 mum cluster size k can be tested for NodeTrix planarity in O(k 3k+ 2 ยท n2 ) time. Note that the compatible pair of permutations stored at each node ยต of T implicitly define a planar embedding of a wheel reduction of G. It can be shown that it is possible to construct a NodeTrix planar representation of G in time proportional to the number of edges of G, which is O(n ยท k) [5]. The statement of the lemma follows.  4.2 Partial 2-Trees We now consider clustered graphs whose cluster size is at most k and such that their frame graph is a partial 2-tree, i.e. it is a planar graph whose biconnected components are series-parallel. We handle this case by decomposing the frame graph into its blocks and we store them into a block-cut-vertex tree. The following theorem generalizes the result of Lemma 2. Theorem 2. Let G = (V, E, C, ฮฆ) be a partial 2-tree clustered graph with side assignment ฮฆ. Let k be the maximum size of any cluster in C and let n be the 3 cardinality of V . There exists an O(k 3k+ 2 ยท n3 )-time algorithm that tests whether G is NodeTrix planar with side assignment ฮฆ and if so, it computes a NodeTrix planar representation of G consistent with ฮฆ. 5 General Planar Frame Graphs In this section we study the problem of extending Theorem 2 to planar frame graphs that may not be partial 2-trees. We prove that NodeTrix planarity testing with fixed sides can be solved in polynomial time for maximum cluster size k = 2. However, the problem becomes NP-complete with fixed sides for k โ‰ฅ 3 and it remains NP-complete even in the free sides scenario for k โ‰ฅ 5. Every block of the frame graph can be decomposed into its triconnected components by means of an SPQR decomposition tree. For each block, we adopt the same approach as for series-parallel graphs and look for a permutation assignment ฮ  such that, for every pair of poles sยต and tยต , (ฯ€sยต , ฯ€tยต ) forms a compatible pair for ยต when ยต is either a Q-node, a P-node, or an S-node. We extend the definition of compatible pairs of permutations for an R-node as follows. Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ, let F be the frame graph of G, and let T be the SPQR decomposition tree of F . Let ยต be an R-node of T with poles sยต and tยต . A pair of permutations (ฯ€sยต , ฯ€tยต ) forms a compatible pair for ยต if there exists a planar embedding of the skeleton skel(ยต) of ยต for which the following conditions hold: (i) For each vertex v of skel(ยต), let e0 , e1 , . . . ehโˆ’1 be the virtual edges of skel(ยต) incident to v in clockwise order around v. Each such edge ei is associated with a child ฮฝi of ยต. There exists a permutation ฯ€v such that the complete internal sequences ISeq(ฮฝ0 , v, ฯ€v ), ISeq(ฮฝ1 , v, ฯ€v ), . . . , ISeq(ฮฝhโˆ’1 , v, ฯ€v ) appear in this clockwise order around v. (ii) Every vertex v of skel(ยต) can be assigned a permutation ฯ€v such that: ฯ€v = ฯ€sยต if v = sยต and ฯ€v = ฯ€sยต if v = tยต , and for each virtual edge e = (u, v) in skel(ยต) that corresponds to a child ฮฝ of ยต, the permutation pair (ฯ€u , ฯ€v ) is compatible for ฮฝ. Observe that, in the case of maximum cluster size k = 2, the possible permutations of the induced cluster Vv of a vertex v of skel(ยต) are exactly two, denoted by ฯ€v+ and ฯ€vโˆ’ . In order to test whether (ฯ€sยต , ฯ€tยต ) forms a compatible pair for ยต, we perform a traversal of skel(ยต) starting at sยต . Permutation ฯ€sยต and the clockwise order of the edges incident to sยต can impose to choose only one of + โˆ’ the two permutations ฯ€w o ฯ€w available for each vertex w adjacent to sยต and corresponding to a non-trivial cluster of G. Each such w and its incident edges, in turn, propagate constraints on the possible permutations to their neighbors, till tยต is reached. Therefore, testing whether ฯ€sยต and ฯ€tยต form a compatible pair for ยต can be reduced to a suitable problem of labeling the edges and vertices of skel(ยต) and verifying that at the end sยต and tยต are labeled with ฯ€tยต and ฯ€sยต . Theorem 3. Let G = (V, E, C, ฮฆ) be an n-vertex clustered graph with side assignment ฮฆ such that the maximum size of any cluster in C is two. There exists an O(n3 )-time algorithm that tests whether G is NodeTrix planar with the given side assignment and if so, computes a NodeTrix planar representation of G consistent with ฮฆ. The proof of the following theorem is based on a reduction from (non-planar) NAE3SAT. Theorem 4. NodeTrix planarity testing with fixed sides and cluster size at most k is NP-complete for any k โ‰ฅ 3. Now, we extend the above hardness result to the free sides model and show that NodeTrix planarity testing remains NP-complete when the maximum cluster dimension is larger than four. This is done by proving that NAE3SAT is NP-complete even for triconnected Boolean formulas, which may be a result of independent interest. Theorem 5. NAE3SAT is NP-complete for triconnected Boolean formulas. Theorem 6. NodeTrix planarity testing with free sides and cluster size at most k is NP-complete for any k โ‰ฅ 5. 6 Open Problems We conclude the paper by listing some open problems that, in our opinion, are worth investigating. (i) Study the complexity of NodeTrix planarity testing in the free sides scenario for values of k between 2 and 5. (ii) Study families of clustered graphs for which NodeTrix planarity testing is fixed parameter tractable in the free sides scenario. (iii) Determine whether the time complexity of the algorithms in Theorems 2 and 3 can be improved. References 1. Angelini, P., Da Lozzo, G., Di Battista, G., Frati, F., Patrignani, M., Rutter, I.: Intersection-link representations of graphs. In: Di Giacomo, E., Lubiw, A. (eds.) Proceedings of 23rd International Symposium on Graph Drawing and Network Visualization (GD โ€™15). Lecture Notes in Computer Science, vol. 9411, pp. 217โ€“ 230 (2015) 2. Batagelj, V., Brandenburg, F., Didimo, W., Liotta, G., Palladino, P., Patrignani, M.: Visual analysis of large graphs using (X,Y)-clustering and hybrid visualizations. IEEE Trans. Vis. Comput. Graph. 17(11), 1587โ€“1598 (2011) 3. Da Lozzo, G., Di Battista, G., Frati, F., Patrignani, M.: Computing NodeTrix representations of clustered graphs. In: Noฬˆllenburg, M., Hu, Y. (eds.) Graph Drawing and Network Visualization (GD โ€™16). Lecture Notes in Computer Science, vol. 9801, pp. 107โ€“120 (2016) 4. Di Battista, G., Eades, P., Tamassia, R., Tollis, I.G.: Graph Drawing. Prentice Hall, Upper Saddle River, NJ (1999) 5. Di Giacomo, E., Liotta, G., Patrignani, M., Tappini, A.: Planar k-NodeTrix Graphs - a new family of beyond planar graphs. In: Frati, F., Ma, K. (eds.) Graph Drawing and Network Visualization (GD 2017). LNCS, Springer, to appear 6. Gutwenger, C., Klein, K., Mutzel, P.: Planarity testing and optimal edge insertion with embedding constraints. J. Graph Algorithms Appl. 12(1), 73โ€“95 (2008) 7. Harary, F.: Graph Theory. Addison-Wesley Series in Mathematics, Addison Wesley (1969) 8. Henry, N., Fekete, J., McGuffin, M.J.: NodeTrix: a hybrid visualization of social networks. IEEE Trans. Vis. Comput. Graph. 13(6), 1302โ€“1309 (2007) 9. Kratochvฤฑฬl, J.: A special planar satisfiability problem and a consequence of its NP-completeness. Discrete Applied Mathematics 52(3), 233 โ€“ 252 (1994) 10. Moret, B.M.E.: Planar NAE3SAT is in P. SIGACT News 19(2), 51โ€“54 (1988) 11. Schaefer, T.J.: The complexity of satisfiability problems. In: Proceedings of the 10th Annual ACM Symposium on Theory of Computing. pp. 216โ€“226 (1978) A A.1 Omitted Proofs Proof of Theorem 1 Theorem 1. Let G = (V, E, C, ฮฆ, ฮ ) be a clustered graph with side assignment ฮฆ and permutation assignment ฮ . G is NodeTrix planar if and only if the planar wheel reduction of G admits a planar embedding where the external oriented cycle of each wheel Wi is embedded clockwise. Proof. If G is NodeTrix planar, we construct a planar embedding of a wheel reduction of G where the external oriented cycle of each wheel is embedded clockwise as follows. Let ฮ“ be a NodeTrix planar representation of G. We replace each matrix Mi representing a cluster Vi โˆˆ C with the wheel Wi of Vi consistent with the permutation ฯ€i โˆˆ ฮ  of Vi . Also Wi is embedded in such a way that a forward traversal of its external cycle is a clockwise traversal of the cycle. Every inter-cluster edge e = (u, vj ), with vj โˆˆ Vi , is incident to the vertex vj,ฯ†i (e) of the wheel Wi . Also, for all j = 0, 1, . . . , k โˆ’ 1 and for all x โˆˆ {t, b, l, r}, the cyclic order of the inter-cluster edges incident to vj,x in Wi is the same as the cyclic order of the inter-cluster edges incident to pvj ,x in Mi . It is immediate to see that, since no two inter-cluster edges cross in ฮ“ , no two edges cross in the constructed embedding of the wheel reduction of G. Conversely, suppose that we are given a planar embedding of the wheel reduction of G where the external oriented cycle of each wheel is embedded clockwise. We show how to construct a NodeTrix planar representation of G. For each wheel Wi we remove the center vertex of the wheel and insert a matrix Mi inside the created face. We now morph every vertex vj,ฯ†i (e) of the external cycle of Wi to point pvj ,ฯ†i (e) in Mi and maintain around pvj ,ฯ†i (e) the cyclic order of the inter-cluster edges incident to vj,ฯ†i (e) in the planar embedding of the wheel reduction.  A.2 Proof of Lemma 1 Lemma 1. Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ and let T be the SPQ decomposition tree of the frame graph of G. Graph G is NodeTrix planar if and only if there exists a permutation assignment ฮ  such that, for every node ยต of T with poles sยต and tยต , we have that permutation ฯ€sยต โˆˆ ฮ  and permutation ฯ€tยต โˆˆ ฮ  form a compatible pair of permutations for ยต. Proof. We prove first that, if G = (V, E, C, ฮฆ) is NodeTrix planar, then there exists a permutation assignment ฮ  such that, for every node ยต of T with poles sยต and tยต , the pair (ฯ€sยต , ฯ€tยต ) is compatible for ยต. Let ฮ“ be a NodeTrix planar representation of G with side assignment ฮฆ and let M0 , M1 , . . . , Mhโˆ’1 be the matrices representing the non-trivial clusters of G. For each matrix Mi (i = 0, . . . , h โˆ’ 1) of ฮ“ , let ฯ€i = v0 , v1 , . . . , vkโˆ’1 be the left to right order of the columns of Mi . We replace Mi with a wheel Wi consisting of a vertex wi of degree 4k adjacent to all vertices of a cycle v0,t , v1,t , . . . , vkโˆ’1,t , v0,r , v1,r , . . . , vkโˆ’1,r , vkโˆ’1,b , vkโˆ’2,b , . . . , v0,b , vkโˆ’1,l , vkโˆ’2,l , . . . , v0,l . For all j = 0, 1, . . . , k โˆ’ 1 and for all x โˆˆ {t, b, l, r}, vertex vj,x is drawn at the point pvj ,x , that represents the attachment of the inter-cluster edges incident to vertex vj on the side x of matrix Mi . The edges of the external cycle of Wi are drawn along the external boundary of Mi . Every inter-cluster edge e = (u, vj ), with vj โˆˆ Mi , is incident to the vertex vj,ฯ†i (e) of the wheel Wi . Also, for all j = 0, 1, . . . , k โˆ’ 1 and for all x โˆˆ {t, b, l, r}, the cyclic order of the inter-cluster edges incident to vj,x in Wi is the same as the cyclic order of the inter-cluster edges incident to pvj ,x in Mi . It is straightforward to verify that the computed drawing defines a planar embedding for the wheel reduction of G = (V, E, C, ฮฆ) consistent with ฮ  = {ฯ€1 , ฯ€2 , . . . , ฯ€|C| }. From the planarity of the wheel reduction of G it follows that each non-trivial pole vยต of the frame graph F has a complete internal and a complete external sequence consistent with ฯ€vยต and that for every node ยต of the SPQ decomposition tree of F having poles sยต and tยต , the pair (ฯ€sยต , ฯ€tยต ), with ฯ€sยต , ฯ€tยต โˆˆ ฮ , is compatible for ยต. An example of the above described procedure is illustrated in Fig. 2 We now show that, if there exists a permutation assignment ฮ  such that for every node ยต of T with poles sยต and tยต we have that permutation pair (ฯ€sยต , ฯ€tยต ) is compatible for ยต, then G = (V, E, C, ฮฆ) is NodeTrix planar with side assignment ฮฆ. We construct a planar embedding of the wheel reduction of G consistent with ฮ  such that all external cycles of the wheels are embedded clockwise which, by Theorem 1, implies that G is NodeTrix planar. Let Wsยต and Wtยต be the two wheels consistent with ฯ€sยต and ฯ€tยต of sยต and tยต , respectively. We visit T from the leaves to the root and incrementally construct the desired planar embedding of the wheel reduction of G. If the visited node ยต is a Q-node, at most one of its poles is non-trivial because G is light; assume, without loss of generality, that the non-trivial pole of ยต is sยต and let Vsยต be the cluster of G represented by sยต in the frame graph of G. We embed the wheel Wsยต of Vsยต consistent with ฯ€sยต โˆˆ ฮ  such that, when traversing the edges of the external cycle of Wsยต in the forward direction, the cycle is traversed clockwise. We embed tยต in the external face of Wsยต and planarly connect the top, bottom, left, or right copy of its end-vertex on Wsยต as specified by ฮฆ. Suppose now ยต is an S-node and let ฮฝ0 and ฮฝ1 be the children of ยต such that sฮฝ0 = sยต , tฮฝ0 = sฮฝ1 , and tฮฝ1 = tยต . The planar embedding of the wheel reduction at node ยต is obtained by composing the planar embedding of the wheel reduction at node ฮฝ0 with the planar embedding of the wheel reduction at ฮฝ1 . This is done by identifying the planar embedding of the wheel Wtฮฝ0 consistent with ฯ€tฮฝ0 with the planar embedding of the wheel Wsฮฝ1 consistent with ฯ€sฮฝ1 . Note that this is possible because ฯ€tฮฝ0 is the same as ฯ€sฮฝ1 , (ฯ€sยต , ฯ€tฮฝ0 ) is a compatible pair for ฮฝ0 , and (ฯ€sฮฝ1 , ฯ€tยต ) is a compatible pair for ฮฝ1 . Finally, assume ยต is a P-node and let ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 be the children of ยต. Similar to the case of the S-node, the planar embedding of the wheel reduction at node ยต is obtained by composing the planar embeddings of the wheel reductions at nodes ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 . Since pair (ฯ€sยต , ฯ€tยต ) is compatible for ยต, it defines opposite orders on the poles of ยต. These opposite circular orders correspond to a planar embedding of the wheel reduction at ยต obtained by combining the planarly embedded wheel reductions at its children ฮฝ0 , ฮฝ1 , . . . ฮฝhโˆ’1 . It follows that G = (V, E, C, ฮฆ) is NodeTrix planar with permutation assignment ฮ .  A.3 Proof of Theorem 2 Theorem 2. Let G = (V, E, C, ฮฆ) be a partial 2-tree clustered graph with side assignment ฮฆ. Let k be the maximum 3 size of any cluster in C and let n be the cardinality of V . There exists an O(k 3k+ 2 ยท n3 )-time algorithm that tests whether G is NodeTrix planar with side assignment ฮฆ and if so, it computes a NodeTrix planar representation of G consistent with ฮฆ. Proof. We compute a block-cut-vertex tree Tbcv of the frame graph of G, we root it at a block Broot and visit Tbcv bottom-up. Let Bi be the currently visited block and let c be the parent cut-vertex of Bi in Tbcv . We execute the testing algorithm of Lemma 2 by rooting the SPQ decomposition tree of Bi only at those Q-nodes that have c as one of their poles. If the test fails at any block of Tbcv , we conclude that G is not NodeTrix planar with the given side assignment for the chosen root Broot of Tbcv and we repeat the test by rooting Tbcv at a different block. Otherwise, we test whether, among the permutation assignments computed for the blocks B0 , B1 , . . . , Bhโˆ’1 that are children of a same cut-vertex c, there exists a set {ฮ 0 , ฮ 1 , . . . , ฮ hโˆ’1 } such that: (i) ฯ€0,c = ฯ€1,c = ยท ยท ยท = ฯ€hโˆ’1,c with ฯ€j,c โˆˆ ฮ j , for j = 0, 1, . . . , h โˆ’ 1, and (ii) the complete internal sequence of c for the block Bj and for the permutation assignment ฯ€j,c does not overlap with the complete internal sequence of c for the block Bi and the permutation assignment ฯ€i,c , with i 6= j, i, j = 0, . . . , h โˆ’ 1. We equip c with all the permutations that pass this test. Let B 0 be the block that is the parent of c in Tbcv . When testing B 0 for NodeTrix planarity, we consider for c only the permutations that have been computed when processing blocks B0 , B1 , . . . , Bhโˆ’1 and check that the complete internal sequences of c in Bj , j = 0, . . . , h โˆ’ 1, do not intersect with the complete internal sequences of c in B 0 . Let nB be the number of vertices of a block B. By using Lemma 2, the procedure described above can be executed in 3 3 time O(k 3k+ 2 ยท n2B ) per block. Therefore, a bottom-up visit of Tbcv can be computed in O(k 3k+ 2 ยท n2 ) time for each 3 root block. Since there are O(n) possible roots for Tbcv , it follows that the overall time complexity is O(k 3k+ 2 ยท n3 ).  A.4 Proof of Theorem 3 The lemmas and the discussion in this section prove Theorem 3. For completeness we report the statement of the theorem. Theorem 3. Let G = (V, E, C, ฮฆ) be an n-vertex clustered graph with side assignment ฮฆ such that the maximum size of any cluster in C is two. There exists an O(n3 )-time algorithm that tests whether G is NodeTrix planar with the given side assignment and if so, computes a NodeTrix planar representation of G consistent with ฮฆ. Let G = (V, E, C, ฮฆ) be a clustered graph with side assignment ฮฆ and let F be its frame graph. Assume first that the frame graph F of G is biconnected. Let T be the SPQR decomposition tree of F . Analogously to the case of series-parallel frame graph described in Section 4.1, we traverse T from the leaves to the root and compute, for each node ยต of T with poles sยต and tยต , all the pairs of permutations (ฯ€sยต , ฯ€tยต ) compatible for ยต (the formal definitions of pair of permutations compatible for a Q-node, an S-node, or a P-node can be found in Section 4.1; the formal definition of pair of permutations compatible for an R-node is in Section 5). Differently from the algorithm for series-parallel frame graphs, we have to handle the case of an R-node ยต, where the skeleton skel(ยต) is a triconnected graph. In fact, the cases of Q-node, S-node and P-node can be handled exactly as described in Section 4.1, with an overall time complexity O(n2 ) (Lemma 2). Let ยต be an R-node of T with poles sยต and tยต and with children ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 . Given a non-trivial vertex w of skel(ยต), since the maximum cluster size is two, the possible permutations of Vw are exactly two, that we denote by + โˆ’ ฯ€w and ฯ€w . For the sake of simplicity, we assume that each vertex w of skel(ยต) is labeled with one or two labels in + โˆ’ + โˆ’ the set {ฯ€w , ฯ€w } corresponding to the two possible permutations ฯ€w and ฯ€w of the pertinent cluster Vw of w. Also, we assume that each edge ei = (u, v) of skel(ยต), corresponding to child ฮฝi of ยต, is assigned one or more labels in the set {(ฯ€u+ , ฯ€v+ ), (ฯ€u+ , ฯ€vโˆ’ ), (ฯ€uโˆ’ , ฯ€v+ ), (ฯ€uโˆ’ , ฯ€vโˆ’ )} that are initialized based on the pairs of permutations compatible with child ฮฝi . In the first phase of the algorithm for node ยต we discard the edge and vertex labels that do not give rise to a planar embedding for skel(ยต). In particular, we consider each one of the two possible planar embeddings for ยต, one after the other. Let Eยต be the chosen embedding of ยต. We perform a Rotation Coherence Check, that + has the purpose of enforcing the compatibility with respect to the embedding Eยต of the two permutations ฯ€w โˆ’ and ฯ€w of each vertex w of skel(ยต). Namely, consider a vertex w of skel(ยต) and one of its possible permutations โˆ— + โˆ’ ฯ€w โˆˆ {ฯ€w , ฯ€w }. Let e0 , e1 , . . . ehโˆ’1 be the virtual edges of skel(ยต) as they appear in clockwise order around w in the embedding Eยต of skel(ยต) and let ฮฝ0 , ฮฝ1 , . . . , ฮฝhโˆ’1 be the corresponding nodes of T , respectively. If the complete โˆ— internal sequences ISeq(ฮฝi , w, ฯ€w ), with i = 0, 2, . . . , hโˆ’1, appear in a different clockwise order around w with respect to the corresponding virtual edges e0 , e1 , . . . , ehโˆ’1 , then G is not NodeTrix planar with permutation assignment ฮ  โˆ— โˆ— โˆ— when ฯ€w โˆˆ ฮ . Hence, label ฯ€w can be discarded for w (and, correspondingly, permutation ฯ€w can be discarded for cluster Vw ). If at the end of this phase a vertex or an edge remains without any label, then G is not NodeTrix planar with the given embedding Eยต . Now, we want to decide whether there are pairs of permutations that are compatible for ยต and, in the affirmative case, we want to compute them. The problem of deciding whether there are permutations pairs compatible with ยต is equivalent to the following Coherent-Labeling-Problem: Given a plane graph G where each vertex w has at + โˆ’ least a label in {ฯ€w , ฯ€w } and each edge (u, v) has at least one label in {(ฯ€u+ , ฯ€v+ ), (ฯ€u+ , ฯ€vโˆ’ ), (ฯ€uโˆ’ , ฯ€v+ ), (ฯ€uโˆ’ , ฯ€vโˆ’ )}, can โˆ— a label ฯ€w be selected for each vertex w in such a way that each edge (u, v) has the label (ฯ€uโˆ— , ฯ€vโˆ— )? We call a plane graph G with the described labeling for its vertices and edges an instance of the Coherent-Labeling-Problem and a solution for G a coherent labeling for G. Observe that the vertex and edge labels can be further filtered off based on the following obvious properties: โˆ’ + โˆ— } cannot be selected for vertex w if there , ฯ€w โˆˆ {ฯ€w Vertex Coherence: In any coherent labeling for G, label ฯ€w โˆ— exists a virtual edge ei = (w, v) of skel(ยต) that does not have any label (ฯ€w , ฯ€vร— ), with ฯ€vร— โˆˆ {ฯ€v+ , ฯ€vโˆ’ }. ร— โˆ— Edge Coherence: In any coherent labeling for G, label (ฯ€w , ฯ€v ) cannot be selected for the virtual edge e = (w, v) โˆ— or v does not admit label ฯ€vร— . of skel(ยต) if w does not admit label ฯ€w Hence, we can discard vertex and edge labels that do not satisfy the above properties. An instance of the Coherent-Labeling-Problem where each vertex label satisfies Property Vertex Coherence and each edge label satisfies Property Edge Coherence is said to be succinct. Observe that, each time a vertex label is discarded because of Property Vertex Coherence at vertex w, the labels of each virtual edge incident to w have to be checked against Property Edge Coherence. Also, each time an edge label is discarded because of Property Edge Coherence, Property Vertex Coherence has to be checked for the labels of one of its incident vertices. Due to the fact that at most one label per vertex and at most three labels per edge can be discarded (otherwise the instance is not NodeTrix planar), an instance of Coherent-Labeling-Problem can be reduced to a succinct instance in time linear in the number of edges of skel(ยต). A succinct instance G of the Coherent-Labeling-Problem is called reduced if each vertex of G has exactly two labels and each edge of G has exactly three labels. We use the following lemma to efficiently solve the problem. Lemma 3. Let G be an instance of the Coherent-Labeling-Problem. There exists a reduced instance Gโˆ— such that G admits a coherent labeling if and only if Gโˆ— admits a coherent labeling. Proof. Graph Gโˆ— can be found through a sequence of transformations starting from the original instance G. The first transformation is described in the proof of the following claim. Claim 1 Let G be a succinct instance of the Coherent-Labeling-Problem. There exists a succinct instance Gโˆ— + โˆ’ whose vertices have both the labels ฯ€w and ฯ€w and such that G admits a coherent labeling if and only if Gโˆ— admits a coherent labeling. Proof of claim. Let w be a vertex of G that has only one label and let Gโˆ’w be the graph obtained from G by removing w and all its incident edges. We show that Gโˆ’w admits a coherent labeling if and only if G admits one. One direction is easy to prove: Every solution for G is also a solution for Gโˆ’w , since all vertices and edges of Gโˆ’w + are also vertices and edges of G. We now prove the opposite direction. Suppose vertex w has only label ฯ€w (the โˆ’ case of ฯ€w being analogous) and consider any edge (v, w) incident to w. By Property Edge Coherence, (v, w) cannot โˆ’ โˆ’ + + ). It follows that edge (v, w) may have: (1) label (ฯ€v+ , ฯ€w ); (2) label (ฯ€vโˆ’ , ฯ€w ); or have labels (ฯ€v+ , ฯ€w ) and (ฯ€vโˆ’ , ฯ€w + + โˆ’ + (3) both labels (ฯ€v , ฯ€w ) and (ฯ€v , ฯ€w ). In turn, by Property Vertex Coherence for the labels of vertex v, we have the following three cases, respectively: (1) vertex v has only label ฯ€v+ ; (2) vertex v has only label ฯ€vโˆ’ ; and (3) vertex v has both labels ฯ€v+ and ฯ€vโˆ’ . Suppose Gโˆ’w admits a solution. You can easily obtain a solution for the original instance G by reinserting w + and all its incident edges and by selecting their labels as follows. (a) Select label ฯ€w for w. (b) Select, for each edge + โˆ’ + + + ), respectively. Depending e = (v, w) incident to w, depending on the label ฯ€v or ฯ€v of v, label (ฯ€v , ฯ€w ) or (ฯ€vโˆ’ , ฯ€w on the three cases above, we prove that G admits a coherent labeling. + + 1. Since any solution of Gโˆ’w selects label ฯ€v+ for vertex v, selecting label ฯ€w for vertex w and label (ฯ€v+ , ฯ€w ) for edge (v, w) yields a solution for G. + + 2. Since any solution of Gโˆ’w selects label ฯ€vโˆ’ for vertex v, selecting label ฯ€w for vertex w and label (ฯ€vโˆ’ , ฯ€w ) for edge (v, w) yields a solution for G. + 3. A solution of Gโˆ’w may select either label ฯ€v+ (Case A) or label ฯ€vโˆ’ (Case B) for vertex v. Selecting label ฯ€w for โˆ’ + โˆ’ + vertex w and label (ฯ€v , ฯ€w ) in Case A or (ฯ€v , ฯ€w ) in Case B for edge (v, w) yields a solution for G. By repeating this procedure for every vertex of G that has only one label, an equivalent instance Gโˆ— such that all vertices have both labels is obtained. Finally, observe that, since the removal of edges from an instance of Coherent-Labeling-Problem does not disrupt the properties of vertex coherence and edge coherence of its labels, when applying the transformation described above we obtain a succinct instance Gโˆ— whenever the original instance G was succinct.  Claim 1 has several important consequences. In order to explicit them, we need some further notation. We say that an edge (u, v) has label set x, with x โˆˆ {1, 2, . . . , 16}, if (u, v) has the following sets of labels: Label set (ฯ€u+ , ฯ€v+ ) (ฯ€u+ , ฯ€vโˆ’ ) (ฯ€uโˆ’ , ฯ€v+ ) (ฯ€uโˆ’ , ฯ€vโˆ’ ) 1 2 ร— 3 ร— 4 ร— 5 ร— 6 ร— ร— 7 ร— ร— 8 ร— ร— 9 ร— ร— 10 ร— ร— 11 ร— ร— 12 ร— ร— ร— 13 ร— ร— ร— 14 ร— ร— ร— 15 ร— ร— ร— 16 ร— ร— ร— ร— An immediate consequence of Claim 1 is the following property. + โˆ’ Claim 2 If each vertex w of an instance G of the Coherent-Labeling-Problem has both the labels ฯ€w and ฯ€w , then edges have exclusively label sets in {8, 9, 12, 13, 14, 15, 16}. Proof of claim. The proof is based on the observation that the remaining label sets either miss ฯ€u+ (label sets 1, 4, 5, and 11), or miss ฯ€uโˆ’ (among others, label sets 2, 3, and 6), or miss ฯ€v+ (among others, label set 10), or ฯ€vโˆ’ (among others, label set 7). However, by Property Vertex Coherence, u and v cannot have both labels if there is some edge that does not allow both of them.  Claim 3 Let G be a succinct instance of the Coherent-Labeling-Problem. There exists a succinct instance Gโˆ— such that no edge has label set 16 and such that Gโˆ— admits a coherent labeling if and only if G admits one. Further, a coherent labeling for G can be obtained from a coherent labeling for Gโˆ— in constant time. Proof of claim. If an edge (u, v) has all four labels (ฯ€u+ , ฯ€v+ ), (ฯ€u+ , ฯ€vโˆ’ ), (ฯ€uโˆ’ , ฯ€v+ ), and (ฯ€uโˆ’ , ฯ€vโˆ’ ), one could remove (u, v), compute a coherent labeling of the obtained instance Gโˆ— , and then insert back again (u, v) with a suitable label depending on the pair of labels selected for its end-vertices.  Claim 4 Let G be a succinct instance of the Coherent-Labeling-Problem. There exists a succinct instance Gโˆ— such that no edge has label set 8 and such that Gโˆ— admits a coherent labeling if and only if G admits one. Further, a coherent labeling for G can be obtained from a coherent labeling for Gโˆ— in constant time. Proof of claim. Suppose edge (u, v) only has labels (ฯ€u+ , ฯ€v+ ) and (ฯ€uโˆ’ , ฯ€vโˆ’ ). Contract edge (u, v) and merge vertices u and v into a new vertex w. Suppose that the obtained graph Gโˆ— admits a coherent labeling. Expand the vertex + w back into u and v. If w has label ฯ€w , select label ฯ€u+ for u, label ฯ€v+ for v, and label (ฯ€u+ , ฯ€v+ ) for edge (u, v). Otherwise, select label ฯ€uโˆ’ for u, label ฯ€vโˆ’ for v, and label (ฯ€uโˆ’ , ฯ€vโˆ’ ) for (u, v). It is easy to verify that the obtained selection of labels is a coherent labeling for G.  Claim 5 Let G be a succinct instance of the Coherent-Labeling-Problem. There exists a succinct instance Gโˆ— such that no edge has label set 9 and such that Gโˆ— admits a coherent labeling if and only if G admits one. Further, a coherent labeling for G can be obtained from a coherent labeling for Gโˆ— in constant time. Proof of claim. Suppose edge (u, v) only has labels (ฯ€u+ , ฯ€vโˆ’ ) and (ฯ€uโˆ’ , ฯ€v+ ). Replace ฯ€vโˆ’ with ฯ€v+ and ฯ€v+ with ฯ€vโˆ’ for the labels of v and for all the labels of the edges incident to v. Observe that the instance where the labels have been renamed admits a coherent labeling if and only if instance G admits one. In particular, edges with label set 9 (12, 13, 14, 15, respectively) have now label set 8 (13, 12, 15, 14, respectively). Hence, for edge (u, v) Claim 4 applies, and the edge can be contracted and reinserted after a coherent labeling for the resulting instance Gโˆ— is found.  Claims 1, 2, 3, 4, and 5, imply that we can assume that every vertex has both labels and every edge has a label set in {12, 13, 14, 15}. Hence, the obtained instance Gโˆ— is a reduced instance of the Coherent-Labeling-Problem equivalent to instance G, which concludes the proof of Lemma 3.  โˆ’ + } and every , ฯ€w Based on Lemma 3, we can assume that every vertex w of G has exactly two labels in {ฯ€w edge (u, v) of G has exactly three labels in {(ฯ€u+ , ฯ€v+ ), (ฯ€u+ , ฯ€vโˆ’ ), (ฯ€uโˆ’ , ฯ€v+ ), (ฯ€uโˆ’ , ฯ€vโˆ’ )}. Consider an edge (u, v) whose missing label is (ฯ€u+ , ฯ€v+ ). This implies that, if the instance G of the Coherent-Labeling-Problem has a coherent labeling in which label ฯ€u+ is selected for vertex u, then the label selected for vertex v in this solution must be ฯ€vโˆ’ . This consideration can be generalized as follows: Property 2. Let G be a reduced instance of the Coherent-Labeling-Problem and let e = (u, v) be an edge of G missing label {ฯ€uโˆ— , ฯ€vโˆ— }, with ฯ€uโˆ— โˆˆ {ฯ€u+ , ฯ€uโˆ’ } and ฯ€vโˆ— โˆˆ {ฯ€v+ , ฯ€vโˆ’ }. In any coherent labeling of G, if the label selected for u is ฯ€uโˆ— , then the label selected for v is the label different from ฯ€vโˆ— . Analogously, if the label selected for v is ฯ€vโˆ— , then the label selected for u is the label different from ฯ€uโˆ— . Property 2 shows that selecting a label for a vertex may have consequences on the label that have to be selected for the neighbor vertices, and a local choice may propagate in the graph. However, Property 2 also implies the following property. Property 3. If the missing label of edge (u, v) is such that the selection of a label ฯ€uโˆ— for vertex u, with ฯ€uโˆ— โˆˆ {ฯ€u+ , ฯ€uโˆ’ }, has no implication on the selection of the label for v, then any selection of a label ฯ€vโˆ— for vertex v, with ฯ€vโˆ— โˆˆ {ฯ€v+ , ฯ€vโˆ’ }, is compatible with the selection of label ฯ€uโˆ— for vertex u. This gives rise to the following procedure to compute all pairs of permutations (ฯ€sโˆ—ยต , ฯ€tโˆ—ยต ) compatible for R-node ยต. Since skel(ยต) has two possible planar embeddings, the procedure will be repeated twice, once for each embedding. Let Eยต be the current embedding of skel(ยต). โ€“ Build an instance G of Coherent-Labeling-Problem (if a vertex or edge has zero labels, then ยต does not admit any compatible pair when Eยต is the embedding chosen for skel(ยต)). โ€“ Obtain a reduced instance Gโˆ— of the Coherent-Labeling-Problem that admits a coherent labeling if and only if G admits one. Let sโˆ— and tโˆ— be the two vertices of Gโˆ— corresponding to the vertices sยต and tยต of the original instance G. โ€“ Consider one by one the four possible permutation pairs of ยต. To decide whether a permutation pair {ฯ€sโˆ—ยต , ฯ€tโˆ—ยต } is compatible for ยต, select for sโˆ— the label ฯ€sโˆ—โˆ— corresponding to ฯ€sโˆ—ยต and propagate the selection through G + according to Property 2. If a vertex w is reached two times, once by imposing the selection of label ฯ€w and โˆ’ โˆ— โˆ— once by imposing the selection of label ฯ€w , then the pair {ฯ€sยต , ฯ€tยต } is not compatible for ยต. Suppose this first propagation phase stops without any such contradiction. If a label for vertex tโˆ— has not been selected yet, start a second propagation by selecting for tโˆ— the label ฯ€tโˆ—โˆ— corresponding to ฯ€tโˆ—ยต . While there are vertices for which no label has been selected, start a new propagation phase selecting an arbitrary label for one of them. Property 3 guarantees that a vertex traversed during a propagation phase cannot be traversed in a successive propagation phase. Hence, the labels selected during one propagation phase cannot cause a contradiction with the labels selected in successive propagation phases. If no contradiction is found and if ฯ€tโˆ—โˆ— is the selected label for tโˆ— , permutation pair {ฯ€sโˆ—ยต , ฯ€tโˆ—ยต } is compatible for ยต. The proof of Theorem 3 is concluded by observing that each of the transformations described in the proof of Lemma 3 requires constant time and therefore the overall time complexity to compute all pairs of permutations (ฯ€sโˆ—ยต , ฯ€tโˆ—ยต ) is linear in the number of edges of skel(ยต). This observation, together with Lemma 2, implies that NodeTrix planarity with fixed sides can be tested in O(n2 ) time on a clustered graph whose maximum cluster size is two and such that the frame graph is biconnected. For the connected case we construct the block-cut-vertex tree Tbcv of the frame graph of G and apply the same strategy described in the proof of Theorem 2. Namely, for every node ยต that is either a Q-, or an S-, or a P-node, we test whether there exists a compatible pair for ยต by means of the procedure in Lemma 2; if ยต is an R-node we use the strategy described above. This gives rise to an O(n2 )-time procedure for each possible choice of the root of Tbcv . Since there are O(n) such possible choices, we have an overall time complexity of O(n3 ) if the frame graph is not biconnected. The statement of Theorem 3 follows. A.5 Proof of Theorem 4 Theorem 4. NodeTrix planarity testing with fixed sides and cluster size at most k is NP-complete for any k โ‰ฅ 3. Proof. NodeTrix planarity testing with fixed sides is trivially in NP. In fact, given a clustered graph G = (V, E, C, ฮฆ), all possible permutations assignments ฮ  could be non-deterministically computed and the problem of deciding whether a clustered graph G = (V, E, C, ฮฆ, ฮ ) admits a NodeTrix planar representation with side assignment ฮฆ and permutation assignment ฮ  is solvable in linear time [3]. In order to prove its NP-hardness, we reduce NAE3SAT to it. An instance of NAE3SAT consists of a collection of clauses on a set of Boolean variables, where each clause consists of exactly three literals. The problem asks whether there exists a truth assignment to the variables so that each clause has at least one true literal and at least one false literal. This problem has been shown to be NP-complete by Thomas J. Schaefer [11]. However, it is known to be polynomial when the graph of the adjacencies of the variables and clauses is planar [10]. Starting from a (non-planar) instance of NAE3SAT with variables x1 , x2 , . . . , xn and clauses C1 , C2 , . . . , Cm , we construct an instance G = (V, E, C, ฮฆ) of NodeTrix planarity testing with fixed sides as follows. First, we obtain a (non-planar) drawing ฮ“ of the graph of its variables and clauses like the one in Fig. 3: The clause vertices are vertically aligned, the variable vertices are horizontally aligned, and the edges are drawn with L-shapes. Clearly this drawing can be computed in polynomial time and has a polynomial number of crossings. โˆ’ C1 + + + C2 โˆ’ โˆ’ + C3 + + + C4 โˆ’ โˆ’ โˆ’ C5 โˆ’ โˆ’ x1 x2 x3 x4 Fig. 3. A non-planar drawing of an instance of NAE3SAT. The small circled plus signs and circled minus signs represent direct and negated occurrences of the variables in the clauses, respectively. Then, we replace each vertex representing a variable with a variable gadget. The variable gadget for a variable of degree h is composed by h size-two clusters connected together as depicted in Fig. 4(a) and 4(b). Namely, let Vv,1 , Vv,2 , . . . , Vv,h be the h clusters of C composing the variable gadget of variable v and let {ui,1 , ui,2 } be the nodes of Vv,i , with i = 1, . . . , h. We may encode a truth value with each one of the two possible representations of cluster Vi : if in the matrix Mi representing Vi the column corresponding to the vertex ui,1 precedes the column corresponding to the vertex ui,2 , we say that Mi is true. Otherwise, we say that Mi is false. Correspondingly, we say that ฯ€i = ui,1 , ui,2 is the true permutation of cluster Vi and that ฯ€i = ui,2 , ui,1 is its false permutation. In order to connect the clusters composing the variable gadget for v, we add to E, for i = 1, . . . , h โˆ’ 1, the inter-cluster edges ei,1 = (ui,1 , ui+1,1 ) and ei,2 = (ui,2 , ui+1,2 ) and set ฯ†i (ei,1 ) = r, ฯ†i+1 (ei,1 ) = b, ฯ†i (ei,2 ) = r, ฯ†i+1 (ei,2 ) = b. It is immediate that in any NodeTrix planar representation of G, all Mi , i = 1, . . . , h, are either simultaneously true or simultaneously false. Correspondingly, we say that the variable gadget is true or false. Fig. 4(a) and 4(b) show an example of a true and of a false drawing of a variable gadget. FALSE TRUE 2 1 1 2 1 2 1 2 2 1 2 1 TRUE (a) (b) FALSE (c) (d) Fig. 4. (a) The true configuration of a variable gadget for a variable of degree four. (b) The false configuration. (c) The not gadget transforming an encoded true value into a false value. (d) The not gadget transforming an encoded false value into a true value. Each edge e attaching to a variable v in the drawing ฮ“ (refer to Fig. 3) corresponds to two โ€˜parallelโ€™ inter-cluster edges e1 and e2 attached to one of the clusters composing the variable gadget of v. Let Vj be such a cluster. We set ฯ†j (e1 ) = t and ฯ†j (e2 ) = t. Observe that the order in which e1 and e2 exit Mj depends on the truth value encoded by Mj and, hence, on the truth value encoded by the variable gadget for v. Fig. 5 depicts the gadget we use to replace crossings in ฮ“ , consisting of a cluster Vx of size three. From the figure it is apparent that, in any representation of Vx , the left-to-right order of the edges entering Mx from the bottom side is the same as the left-to-right order of the edges exiting Mx from the top side. An analogous consideration holds for the top-to-bottom order of the edges entering Mx from the right side and the top-to-bottom order of the edges exiting Mx from the left side. This implies that the truth value encoded by the edges entering Mx is the same as the truth value encoded by the edges exiting it. FALSE TRUE 1 2 3 2 1 (a) 3 3 1 2 TRUE FALSE (b) (c) TRUE FALSE 3 2 1 FALSE TRUE FALSE TRUE FALSE FALSE TRUE TRUE FALSE TRUE TRUE TRUE 1 3 FALSE FALSE (d) 2 2 3 TRUE FALSE TRUE (e) 1 FALSE (f) Fig. 5. The six possible configurations of a crossing gadget. We now describe the clause gadget. We assume that three pairs of edges, encoding the truth value of the variables occurring in the clause, arrive to the clause gadget. Let v1 , v2 , and v3 be the three variables whose literals l1 , l2 , and l3 occur in clause C. Before entering the clause gadget, if literal li is a negated literal of variable v (i.e., if li = v i ) then we attach the edges coming from vi to a not gadget, depicted in Fig. 4(c) and 4(d), and use the edges exiting the not gadget instead of the edge coming directly from variable vi . This has the effect that all the three pairs of edges entering the clause gadget encode a truth value that is true if the literal is true and false if the literal is false. In the following, therefore, we will consider the truth values of the literals, rather than the truth values of the variables. The clause gadget, depicted in Fig. 6, is composed by three clusters V1 , V2 , and V3 of size three, each having vertices {ui,a , ui,b , ui,c , }, i = 1, 2, 3. The three clusters are connected together in such a way that, in any NodeTrix planar representation of G, their permutations ฯ€i , i = 1, 2, 3, always present the same sequence of the labels a, b, c. For example, if ฯ€1 = u1,c , u1,a , u1,b , then also ฯ€2 = u2,c , u2,a , u2,b and ฯ€3 = u3,c , u3,a , u3,b . For i = 1, . . . , 3, the edges encoding the truth value of literal li attach to cluster Vi , where the prescribed side is the right side of matrix Mi . The two edges e1,1 and e1,2 encoding the truth value of the literal l1 attach to u1,a and u1,b , respectively. The two edges e2,1 and e2,2 encoding the truth value of the literal l2 attach to u2,b and u2,c , respectively. Finally, the two edges e3,1 and e3,2 encoding the truth value of the literal l3 attach to u3,c and u3,a , respectively. Hence, if literal l1 is true, matrix M1 must have a permutation of its columns such that column a precedes column b, while if literal l1 is false, matrix M1 must have a permutation of its columns such that column a follows column b. Analogously, the truth value of literal l2 determines whether in matrix M2 column b precedes or follows column c, and the truth value of literal l3 determines whether in matrix M3 column c precedes or follows column a. TRUE if literal TRUE TRUE if literal TRUE TRUE if literal TRUE Fig. 6. The clause gadget. It follows that, if all three literals are true, then they induce unsatisfiable constraints on the ordering of the columns of the matrices, since column a should precede column b, b should precede column c, and c should precede a. The same holds if all three literals are false. It can be easily checked that, for any other combination of truth values of the literals, there exists an ordering of the columns of matrices M1 , M2 , and M3 that makes a planar drawing of the edges possible. Therefore, the constructed instance of NodeTrix planarity with fixed sides admits a planar NodeTrix representation if and only if the original instance of NAE3SAT admits a solution.  A.6 Proof of Theorem 5 Theorem 5. NAE3SAT is NP-complete for triconnected Boolean formulas. Proof. We use a reduction strategy that is similar to the one used in [9] to prove the hardness of Planar Triconnected 3SAT. Here, however, we do not have to worry about planarity, since we are searching for a non-planar triconnected instance of NAE3SAT. Let ฯ• be an instance of NAE3SAT such that the graph G that represents the occurrences of the variables into the clauses of ฯ• is not triconnected and, possibly, not biconnected and not connected. We show how to construct an instance ฯ•โˆ— such that its graph Gโˆ— is triconnected. The strategy consists of adding to ฯ• a suitable number of variables and clauses such that the obtained instance ฯ•โˆ— is triconnected and has a solution if and only if ฯ• has one. Consider an edge e = (x, C) in the graph G (refer to Fig. 7(a)). Suppose that variable x occurs in clause C with its direct literal (negated literal, respectively). We remove e (that is, we remove the occurrence of x into clause C) and replace it with the occurrence of the direct literal (negated literal, respectively) of a new variable x0 . Also we add a new variable y and the two clauses (x โˆจ x0 โˆจ y) and (x โˆจ x0 โˆจ y) (see Fig. 7(b)). It can be shown that, in any assigment of truth values to the variables such that all clauses are satisfied in the NAE3SAT sense, the truth value of x has to be the same as the truth value of x0 . In fact, whatever is the truth x0 x โˆ’ C 00 x + C C0 C1 C2 y + + x1 (a) + C1 0 + (b) C2 0 โˆ’ โˆ’ + x2 0 โˆ’ x2 โˆ’ y + โˆ’ + + โˆ’ + โˆ’ + C2 x1 0 C + C1 x1 x2 (c) โˆ’ + C1 00 + + C2 00 (d) Fig. 7. (a) A variable x occurring in a clause C of an instance of NAE3SAT. (b) The gadget that replaces edge (x, C). (c) A pair of edges (x1 , C1 ) and (x2 , C2 ) in the NAE3SAT graph. (c) The gadget that replaces edges (x1 , C1 ) and (x2 , C2 ). value of variable y, literals x and x0 occur in a clause with a negative literal and a positive literal. Hence, they cannot be both positive or both negative. This implies x = x0 . It follows that the obtained instance of NAE3SAT admits a solution if and only if the original instance admits one. Now, consider two edges e1 = (x1 , C1 ) and e2 = (x1 , C2 ) of G (see Fig. 7(c)). By replacing both edges with the above described gadget and by identifying the y variables of the two gadgets, one obtains a bridge gadget for e1 and e2 . The instance of NAE3SAT where e1 and e2 have been replaced by their bridge gadget is equivalent to the original instance and it has a path going from C1 to C2 and passing through y. Hence, suppose you have a non-connected graph G and let e1 and e2 be two edges belonging to two different connected components of G. Replacing e1 and e2 with their bridge gadget, the number of connected components of G is decreased. Assume now that G is connected. Let Tbcv be the block-cut-vertex tree of G and let e1 and e2 be two edges belonging to two different blocks of Tbcv . Replacing e1 and e2 with their bridge gadget, the number of blocks of G is decreased (see for example Fig. 8). The same holds if we replace two edges e1 and e2 belonging to two triconnected components of G. B1 B2 B4 B1 B6 B5 B3 B7 (a) B2 B8 B4 B6 B5 B3 B7 B8 (b) Fig. 8. (a) The block-cut-vertex tree Tbcv of a graph (green vertices are the leaves of Tbcv ). (b) A bridge gadget added to link two leaf blocks of Tbcv . Therefore, we obtain a NAE3SAT instance ฯ•โˆ— such that the graph that represents the occurrences of the variables into the clauses is triconnected and such that ฯ•โˆ— admits a solution if and only if ฯ• admits one. Furthermore, the size of the gadgets used in the replacement is constant and therefore the size of ฯ•โˆ— is polynomial in the size of ฯ•. This concludes the proof.  A.7 Proof of Theorem 6 Theorem 6. NodeTrix planarity testing with free sides and cluster size at most k is NP-complete for any k โ‰ฅ 5. Proof. The proof is based on a reduction from triconnected NAE3SAT. Starting from a triconnected instance ฯ• of NAE3SAT, we first build the instance Gfix of NodeTrix planarity with fixed sides, analogously to the proof of Theorem 4, but using the drawing strategy shown in Fig. 9 instead of that shown in Fig. 3. Observe that, since ฯ• is triconnected and because of the special planarization strategy we used, the frame graph of Gfix is also triconnected. In fact, inserting crossing gadgets is equivalent to planarizing the drawing of Fig. 9. x1 โˆ’ C1 + + + C2 โˆ’ โˆ’ + C3 + + + C4 โˆ’ โˆ’ โˆ’ โˆ’ C5 โˆ’ x2 x3 x4 Fig. 9. A non-planar drawing of an instance of NAE3SAT such that, by replacing crossings with dummy nodes, you would obtain a planar and triconnected graph. (a) (b) Fig. 10. (a) A cluster Vi of size three of the instance of NodeTrix planarity with fixed sides. (b) The gadget used to replace Vi in the instance of NodeTrix planarity with free sides. Second, we obtain an instance Gfree of NodeTrix planarity with free sides by replacing each cluster of maximum size three, with the gadget depicted in Fig. 10(b) that uses exclusively clusters of size 5. Such a gadget consists of nine clusters such that the corresponding nodes in the frame graph of Gfree form a wheel graph with an external cycle of eight nodes all connected to a central one. Since the wheel has only one embedding (up to a flip), the gadget admits a NodeTrix planar representation only if the hub of the wheel is drawn inside the cycle formed by the other eight clusters. Also, the edges that in the instance Gfix are constrained to attach to a specific side of a matrix due to the side assignment ฮฆ, are now all incident to the same cluster of the wheel. Since Gfree has a triconnected frame graph, the embedding of the frame graph is fixed, and a NodeTrix planar representation with fixed sides of Gfix can be immediately obtained from a NodeTrix planar representation with free sides of Gfree . 
8cs.DS
TC0 circuits for algorithmic problems in nilpotent groups Alexei Myasnikov1 and Armin WeiรŸ2 1 2 Stevens Institute of Technology, Hoboken, NJ, USA Universitรคt Stuttgart, Germany arXiv:1702.06616v2 [math.GR] 26 Jul 2017 Abstract Recently, Macdonald et. al. showed that many algorithmic problems for finitely generated nilpotent groups including computation of normal forms, the subgroup membership problem, the conjugacy problem, and computation of subgroup presentations can be done in LOGSPACE. Here we follow their approach and show that all these problems are complete for the uniform circuit class TC0 โ€“ uniformly for all r-generated nilpotent groups of class at most c for fixed r and c. In order to solve these problems in TC0 , we show that the unary version of the extended gcd problem (compute greatest common divisors and express them as linear combinations) is in TC0 . Moreover, if we allow a certain binary representation of the inputs, then the word problem and computation of normal forms is still in uniform TC0 , while all the other problems we examine are shown to be TC0 -Turing reducible to the binary extended gcd problem. Keywords and phrases nilpotent groups, TC0 , abelian groups, word problem, conjugacy problem, subgroup membership problem, greatest common divisors Contents 1 Introduction 2 2 Preliminaries 2.1 Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Nilpotent groups and Malโ€™cev coordinates . . . . . . . . . . . . . . . . . . . . 3 3 5 3 Presentation of subgroups 3.1 Quotient presentations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 7 4 Word problem and computation of Malโ€™cev coordinates 8 5 The extended gcd problem 9 6 Matrix reduction and subgroup membership problem 14 6.1 Subgroup membership problem . . . . . . . . . . . . . . . . . . . . . . . . . . 16 6.2 Subgroup presentations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 7 More algorithmic problems 18 7.1 Homorphisms and kernels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 7.2 Centralizers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 7.3 The conjugacy problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 8 Computing quotient presentations 20 9 Power problem and conjugacy in wreath products of nilpotent groups 21 10 Conclusion and Open Problem 22 ยฉ Alexei Myasnikov, Armin WeiรŸ; licensed under Creative Commons License CC-BY Leibniz International Proceedings in Informatics Schloss Dagstuhl โ€“ Leibniz-Zentrum fรผr Informatik, Dagstuhl Publishing, Germany 2 A. Myasnikov, A. WeiรŸ 1 Introduction The word problem (given a word over the generators, does it represent the identity?) is one of the fundamental algorithmic problems in group theory introduced by Dehn in 1911 [3]. While for general finitely presented groups all these problems are undecidable [23, 2], for many particular classes of groups decidability results have been established โ€“ not just for the word problem but also for a wide range of other problems. Finitely generated nilpotent groups are a class where many algorithmic problems are (efficiently) decidable (with some exceptions like the problem of solving equations โ€“ see e. g. [6]). In 1958, Malโ€™cev [18] established decidability of the word and subgroup membership problem by investigating finite approximations of nilpotent groups. In 1965, Blackburn [1] showed decidability of the conjugacy problem. However, these methods did not allow any efficient (e. g. polynomial time) algorithms. Nevertheless, in 1966 Mostowski provided โ€œpracticalโ€ algorithms for the word problem and several other problems [20]. In terms of complexity, a major step was the result by Lipton and Zalcstein [15] that the word problem of linear groups is in LOGSPACE. Together with the fact that finitely generated nilpotent groups are linear (see e. g. [7, 10]) this gives a LOGSPACE solution to the word problem of nilpotent groups, which was later improved to uniform TC0 by Robinson [24]. A typical algorithmic approach to nilpotent groups is using so-called Malโ€™cev (or Hallโ€“ Malโ€™cev) bases (see e. g. [7, 10]), which allow to carry out group operations by evaluating polynomials (see Lemma 3). This approach was systematically used in [11] and [20] or โ€“ in the more general setting of polycyclic presentations โ€“ in [25] for solving (among others) the subgroup membership and conjugacy problem of polycyclic groups. Recently in [21, 22] polynomial time bounds for the equalizer and subgroup membership problems in nilpotent groups have been given. Finally, in [16] the following problems were shown to be in LOGSPACE using the Malโ€™cev basis approach. Here, Nc,r denotes the class of nilpotent groups of nilpotency class at most c generated by at most r elements. The word problem: given G โˆˆ Nc,r and g โˆˆ G, is g = 1 in G? Given G โˆˆ Nc,r and g โˆˆ G, compute the (Malโ€™cev) normal form of g. The subgroup membership problem: Given G โˆˆ Nc,r and g, h1 , . . . , hn โˆˆ G, decide whether g โˆˆ hh1 , . . . , hn i and, if so, express g as a word over the subgroup generators h1 , . . . , hn (in [16] only the decision version was shown to be in LOGSPACE โ€“ for expressing g as a word over the original subgroup generators a polynomial time bound was given). Given G, H โˆˆ Nc,r and K = hg1 , . . . , gn i โ‰ค G, together with a homomorphism ฯ• : K โ†’ H specified by ฯ•(gi ) = hi , and some h โˆˆ Im(ฯ•), compute a generating set for ker(ฯ•) and find g โˆˆ G such that ฯ•(g) = h. Given G โˆˆ Nc,r and K = hg1 , . . . , gn i โ‰ค G, compute a presentation for K. Given G โˆˆ Nc,r and g โˆˆ G, compute a generating set for the centralizer of g. The conjugacy problem: Given G โˆˆ Nc,r and g, h โˆˆ G, decide whether or not there exists u โˆˆ G such that uโˆ’1 gu = h and, if so, find such an element u. These problems are not only of interest in themselves, but also might serve as building blocks for solving the same problems in polycyclic groups โ€“ which are of particular interest because of their possible application in non-commutative cryptography [4]. In this work we follow [16] and extend these results in several ways: We give a complexity bound of uniform TC0 for all the above problems. In order to derive this bound, we show that the extended gcd problem (given a1 , . . . , an โˆˆ Z, P compute x1 , . . . , xn โˆˆ Z with gcd(a1 , . . . , an ) = i ai xi ) with input and output in unary is in uniform TC0 . TC0 circuits for algorithmic problems in nilpotent groups Our description of circuits is for the uniform setting where G โˆˆ Nc,r is part of the input (in [16] the uniform setting is also considered; however, only in some short remarks). Since nilpotent groups have polynomial growth, it is natural to allow compressed inputs: we give a uniform TC0 solution for the word problem allowing words with binary exponents as input โ€“ this contrasts with the situation with straight-line programs (i. e., contextfree grammars which produces precisely one word โ€“ another method of exponential compression) as input: then the word problem is hard for C= L [12]. Thus, the difficulty of the word problem with straight-line programs is not due to their compression but rather due to the difficulty of evaluating a straight-line program. We show that the other of the above problems are uniform-TC0 -Turing-reducible to the (binary) extended gcd problem when the inputs (both the ambient group and the subgroup etc.) are given as words with binary exponents. We show how to solve the power problem in nilpotent groups. This allows us to apply a result from [19] in order to show that iterated wreath products of nilpotent groups have conjugacy problem in uniform TC0 . Thus, in the unary case we settle the complexity of the above problems completely. Moreover, it also seems rather difficult to solve the subgroup membership problem without computing gcds โ€“ in this case our results on binary inputs would be also optimal. Altogether, our results mean that many algorithmic problems are no more complicated in nilpotent groups than in abelian groups. Notice that while in [16] explicit length bounds on the outputs for all these problems are proven, we obtain polynomial length bounds simply by the fact that everything can be computed in uniform TC0 (for which in the following we only write TC0 ). Throughout the paper we follow the outline of [16]. For a concise presentation, we copy many definitions from [16]. Most of our theorems involve two statements: one for unary encoded inputs and one for binary encoded inputs. In order to have a concise presentation, we always put them in one result. We only consider finitely generated nilpotent groups without mentioning that further. Outline. We start with basic definitions on complexity as well as on nilpotent groups. In Section 3 we describe how subgroups of nilpotent groups can be represented and develop a โ€œniceโ€ presentation for all groups in Nc,r . Section 4 deals with the word problem and computation of normal forms. After that we solve the unary extended gcd problem in TC0 and introduce the so-called matrix reduction in order to solve the subgroup membership problem. In Section 7 we present our result for the remaining of the above problems, in Section 8 we explain how to compute โ€œniceโ€ presentations, and in Section 9 we apply the results of [19] in order to show that the conjugacy problem of iterated wreath products of nilpotent groups is in TC0 . Finally, we conclude with some open questions. 2 2.1 Preliminaries Complexity For a finite alphabet ฮฃ, the set of words over ฮฃ is denoted by ฮฃโˆ— . Computation or decision problems are given by functions f : โˆ†โˆ— โ†’ ฮฃโˆ— for some finite alphabets โˆ† and ฮฃ. A decision problem (= formal language) L is identified with its characteristic function ฯ‡L : โˆ†โˆ— โ†’ {0, 1} with ฯ‡L (x) = 1 if, and only if, x โˆˆ L. (In particular, the word and conjugacy problems can be seen as functions ฮฃโˆ— โ†’ {0, 1}.) We use circuit complexity as described in [26]. Circuit Classes. The class TC0 is defined as the class of functions computed by families of circuits of constant depth and polynomial size with unbounded fan-in Boolean gates (and, 3 4 A. Myasnikov, A. WeiรŸ or, not) and majority gates. A majority gate (denoted by Maj) returns 1 if the number of 1s in its input is greater or equal to the number of 0s. In the following we always assume that the alphabets โˆ† and ฮฃ are encoded over the binary alphabet {0, 1} such that each letter uses the same number of bits. We say a function f is TC0 -computable if f โˆˆ TC0 . In the following, we only consider Dlogtime-uniform circuit families and we simply write TC0 as shorthand for Dlogtime-uniform TC0 . Dlogtime-uniform means that there is a deterministic Turing machine which decides in time O(log n) on input of two gate numbers (given in binary) and the string 1n whether there is a wire between the two gates in the n-input circuit and also computes of which type some gates is. Note that the binary encoding of the gate numbers requires only O(log n) bits โ€“ thus, the Turing machine is allowed to use time linear in the length of the encodings of the gates. For more details on these definitions we refer to [26]. We have the following inclusions (note that even TC0 โІ P is not known to be strict): AC0 $ TC0 โІ LOGSPACE โІ P. Reductions. A function f is TC0 -Turing-reducible to a function g if there is a Dlogtimeuniform family of TC0 circuits computing f which, in addition to the Boolean and majority gates, also may use oracle gates for g (i. e., gates which on input x output g(x)). This is expressed by f โˆˆ TC0 (g). Note that if f1 , . . . , fk are in TC0 , then TC0 (f1 , . . . , fk ) = TC0 . In particular, if f and g are TC0 -computable functions, then also the composition g โ—ฆ f is TC0 -computable. We will extensively make use of this observation โ€“ which will also guarantee the polynomial size bound on the outputs of our circuits without additional calculations. We will also use another fact frequently without giving further reference: on input of two alphabets ฮฃ and โˆ† (coded over the binary alphabet), a list of pairs (a, va ) with a โˆˆ ฮฃ and va โˆˆ โˆ†โˆ— such that each a โˆˆ ฮฃ occurs in precisely one pair, and a word w โˆˆ ฮฃโˆ— , the image ฯ•(w) under the homomorphism ฯ• defined by ฯ•(a) = va can be computed in TC0 [13]. Encoding numbers: unary vs. binary. There are essentially two ways of representing integer numbers: the usual way as a binary number where a string a0 ยท ยท ยท an with ai โˆˆ {0, 1} represents P ai 2nโˆ’i , and as a unary number where k โˆˆ N is represented by 1k = 11 ยท ยท ยท 1} (respectively | {z k by 0nโˆ’k 1k if n is the number of input bits). We will state most results in this paper with both representations. The unary representation corresponds to group elements given as words over the generators, whereas the binary encoding will be used if inputs are given in a compressed form. I Example 1. The following problem Count is in TC0 : given a bit-string u of length n and a number j < n (we assume that it is given in unary as 0nโˆ’j 1j ), decide whether the number of ones |u|1 in u is exactly j. We have |u|1 โ‰ฅ j if, and only if, u0j 1nโˆ’j 1 โ‰ฅ n. Thus,  Count(u, j) = Maj(u0j 1nโˆ’j ) โˆง ยฌMaj(u0j 1nโˆ’j ) . In particular, the word problem of Z when 1 is encoded as 1 and โˆ’1 as 0, which is simply the question whether |u|1 = n/2 and n even, is in TC0 . Arithmetic in TC0 . Iterated Addition (resp. Iterated Multiplication) are the following computation problems: On input of n binary integers a1 , . . . , an each having n bits Pn (i. e., the input length is N = n2 ), compute the binary representation of the sum i=1 ai Qn (resp. product i=1 ai ). For Integer Division the input are two binary n-bit integers a, b; the binary representation of the integer c = ba/bc has to be computed. The first statement of Theorem 2 is a standard fact, see [26]; the other statements are due to Hesse, [8, 9]. TC0 circuits for algorithmic problems in nilpotent groups 5 I Theorem 2 ([8, 9, 26]). The problems Iterated Addition, Iterated Multiplication, Integer Division are all in TC0 no matter whether inputs are given in unary or binary. Note that if the numbers a and b are encoded in unary (as strings 1a and 1b ), division can be seen to be in TC0 very easily: just try for all 0 โ‰ค c โ‰ค a whether 0 โ‰ค a โˆ’ bc < b. Representing groups for algorithmic problems. We consider finitely generated groups G together with finite generating sets A. Group elements are represented as words over the generators and their inverses (i. e., as elements of (A โˆช Aโˆ’1 )โˆ— ). We make no distinction between words and the group elements they represent. Whenever it might be unclear whether we mean equality of words or of group elements, we write โ€œg = h in Gโ€ for equality in G. Words over the generators ยฑ1 of Z correspond to unary representation of integers. As a generalization of binary encoded integers, we introduce the following notion: a word with binary exponents is a sequence w1 , . . . , wn where the wi are from a fixed generating set of the group together with a sequence of exponents x1 , . . . , xn where the xi โˆˆ Z are encoded in binary. The word with binary exponents represents the word (or group element) w = w1x1 ยท ยท ยท wnxn . Note that in a fixed nilpotent group every word of length n can be rewritten as a word with binary exponents using O(log n) bits (this fact is well-known and also a consequence of Theorem 6 below); thus, words with binary exponents are a natural way of representing inputs for algorithmic problems in nilpotent groups. 2.2 Nilpotent groups and Malโ€™cev coordinates Let G be a group. For x, y โˆˆ G we write xy = y โˆ’1 xy (x conjugated by y) and [x, y] = xโˆ’1 y โˆ’1 xy (commutator of x and y). For subgroups H1 , H2 โ‰ค G, we have [H1 , H2 ] = h{[h1 , h2 ] | h1 โˆˆ H1 , h2 โˆˆ H2 }i. A group G is called nilpotent if it has central series, i.e. G = G1 โ‰ฅ G2 โ‰ฅ ยท ยท ยท โ‰ฅ Gc โ‰ฅ Gc+1 = 1 (1) such that [G, Gi ] โ‰ค Gi+1 for all i = 1, . . . , c. If G is finitely generated, so are the abelian quotients Gi /Gi+1 , 1 โ‰ค i โ‰ค c. Let ai1 , . . . , aimi be a basis of Gi /Gi+1 , i.e. a generating set such e that Gi /Gi+1 has a presentation ai1 , . . . , aimi aijij , [aik , ai` ], for j โˆˆ Ti , k, ` โˆˆ {1, . . . , mi } , where Ti โІ {1, . . . , mi } (here T stands for torsion) and eij โˆˆ Z>0 (be aware that we explicitly allow eij = 1, which is necessary for our definition of quotient presentations in Section 3). Formally put eij = โˆž for j โˆˆ / Ti . Note that A = (a11 , a12 , . . . , acmc ) is a so-called polycyclic generating sequence for G, and we call A a Malโ€™cev basis associated to the central series (1). Sometimes we use A interchangeably also for the set A = {a11 , a12 , . . . , acmc }. For convenience, we will also use a simplified notation, in which the generators aij and P exponents eij are renumbered by replacing each subscript ij with j + m` , so the generating `<j sequence A can be written as A = (a1 , . . . , am ). We allow the expression ij to stand for P j+ m` in other notations as well. We also denote `<j T = {i | ei < โˆž}. By the choice of {a1 , . . . , am }, every element g โˆˆ G may be written uniquely in the form ฮฑm 1 g = aฮฑ 1 ยท ยท ยท am , 6 A. Myasnikov, A. WeiรŸ where ฮฑi โˆˆ Z and 0 โ‰ค ฮฑi < ei whenever i โˆˆ T . The m-tuple (ฮฑ1 , . . . , ฮฑm ) is called the coordinate vector or Malโ€™cev coordinates of g and is denoted Coord(g), and the expression ฮฑm 1 aฮฑ 1 ยท ยท ยท am is called the (Malโ€™cev) normal form of g. We also denote ฮฑi = Coordi (g). To a Malโ€™cev basis A we associate a presentation of G as follows. For each 1 โ‰ค i โ‰ค m, let ni be such that ai โˆˆ Gni Gni +1 . If i โˆˆ T , then aei i โˆˆ Gni +1 , hence a relation aiei = aยต` i` ยท ยท ยท aยตmim (2) holds in G for ยตij โˆˆ Z and ` > i such that a` , . . . , am โˆˆ Gni +1 . Let 1 โ‰ค i < j โ‰ค m. Since the series (1) is central, relations of the form ฮฑ ijm aj ai = ai aj a` ij` ยท ยท ยท aฮฑ m (3) ฮฒij` ai aโˆ’1 j a` (4) aโˆ’1 j ai = ยท ยท ยท aฮฒmijm hold in G for ฮฑijk , ฮฒijk โˆˆ Z and l > j such that a` , . . . , am โˆˆ Gnj +1 . Now, G is the group with generators {a1 , . . . , am } subject to the relation of the the form (2)โ€“(4). A presentation with relations of the form (2)โ€“(4) for all i resp. i and j is called a nilpotent presentation. Indeed, any presentation of this form will define a nilpotent group. It is called consistent if the order of ai modulo hai+1 , . . . , am i is precisely ei for all i. While presentations of this form need not, in general, be consistent, those derived from a central series of a group G as above are consistent. Given a consistent nilpotent presentation, there is an easy way to solve the word problem: simply apply the rules of the form (3) and (4) to move all occurrences of aยฑ1 1 in the input word to the left, then apply the power relations (2) to reduce their number modulo e1 ; finally, continue with a2 and so on. Multiplication functions. An crucial feature of the coordinate vectors for nilpotent groups ฮฒ1 ฮฑm ฮฒm 1 is that the coordinates of a product (aฮฑ 1 ยท ยท ยท am )(a1 ยท ยท ยท am ) may be computed as a โ€œniceโ€ function (polynomial if T = โˆ…) of the integers ฮฑ1 , . . . , ฮฑm , ฮฒ1 , . . . , ฮฒm . I Lemma 3 ([7, 10]). Let G be a nilpotent group with Malโ€™cev basis a1 , . . . , am and T = โˆ…. There exist p1 , . . . , pm โˆˆ Z[x1 , . . . , xm , y1 , . . . , ym ] and q1 , . . . , qm โˆˆ Z[x1 , . . . , xm , z] such that for g, h โˆˆ G with Coord(g) = (ฮณ1 , . . . , ฮณm ) and Coord(h) = (ฮด1 , . . . , ฮดm ) and l โˆˆ Z we have (i) Coordi (gh) = pi (ฮณ1 , . . . , ฮณm , ฮด1 , . . . , ฮดm ), (ii) Coordi (g l ) = qi (ฮณ1 , . . . , ฮณm , l), (iii) Coord1 (gh) = ฮณ1 + ฮด1 and Coord1 (g l ) = lฮณ1 . Notice that an explicit algorithm to construct the polynomials pi , qi is given in [14]. For further background on nilpotent groups we refer to [7, 10]. 3 Presentation of subgroups Before we start with algorithmic problems, we introduce a canonical way how to represent subgroups of nilpotent groups. This is important for two reasons: first, of course we need it to solve the subgroup membership problem, and, second, for the uniform setting it allows us to represent nilpotent groups as free nilpotent group modulo a kernel which is represented as ฮฑim i1 a subgroup. Let h1 , . . . , hn be elements of G given in normal form by hi = aฮฑ 1 ยท ยท ยท am , for i = 1, . . . , n, and let H = hh1 , . . . , hn i. We associate the matrix of coordinates ๏ฃซ ๏ฃถ ฮฑ11 ยท ยท ยท ฮฑ1m ๏ฃฌ .. ๏ฃท , .. A = ๏ฃญ ... (5) . . ๏ฃธ ฮฑn1 ยทยทยท ฮฑnm TC0 circuits for algorithmic problems in nilpotent groups to the tuple (h1 , . . . , hn ) and conversely, to any n ร— m integer matrix, we associate an n-tuple of elements of G, whose Malโ€™cev coordinates are given as the rows of the matrix, and the subgroup H generated by the tuple. For each i = 1, . . . , n where row i is non-zero, let ฯ€i be the column of the first non-zero entry (โ€˜pivotโ€™) in row i. The sequence (h1 , . . . , hn ) is said to be in standard form if the matrix of coordinates A is in row-echelon form and its pivot columns are maximally reduced (similar to the Hermite normal form), more specifically, if A satisfies the following properties: (i) all rows of A are non-zero (i.e. no hi is trivial), (ii) ฯ€1 < ฯ€2 < ยท ยท ยท < ฯ€s (where s is the number of pivots), (iii) ฮฑiฯ€i > 0, for all i = 1, . . . , n, (iv) 0 โ‰ค ฮฑkฯ€i < ฮฑiฯ€i , for all 1 โ‰ค k < i โ‰ค s (v) if ฯ€i โˆˆ T , then ฮฑiฯ€i divides eฯ€i , for i = 1, . . . , s. The sequence (resp. matrix) is called full if in addition (vi) H โˆฉ hai , ai+1 , . . . , am i is generated by {hj | ฯ€j โ‰ฅ i}, for all 1 โ‰ค i โ‰ค m. Note that {hj | ฯ€j โ‰ฅ i} consists of those elements having 0 in their first i โˆ’ 1 coordinates. It is an easy exercise (see also [16]) to show that (vi) holds for a given i if, and only if, โˆ’1 for all 1 โ‰ค k < j โ‰ค s with ฯ€k < i, hโˆ’1 k hj hk and hk hj hk are elements of h hl | l > k i, and eฯ€ /ฮฑkฯ€ k for all 1 โ‰ค k โ‰ค s with ฯ€k < i and ฯ€k โˆˆ T , hk k โˆˆ h hl | l > k i. We will use full sequences and the associated matrices in full form interchangeably without mentioning it explicitly. For simplicity we assume that the inputs of algorithms are given as matrices. The importance of full sequences is described in the following lemma โ€“ a proof can be found in [25] Propositions 9.5.2 and 9.5.3. I Lemma 4 ([16, Lem. 3.1]). Let H โ‰ค G. There is a unique full sequence U = (h1 , . . . , hs ) that generates H. We have s โ‰ค m and H = {hฮฒ1 1 ยท ยท ยท hฮฒs s | ฮฒi โˆˆ Z and 0 โ‰ค ฮฒi < eฯ€i if ฯ€i โˆˆ T }. Thus, computing a full sequence will be the essential tool for solving the subgroup membership problem. Before we focus on subgroup membership, we will first solve the word problem and introduce how the nilpotent group can be part of the input. 3.1 Quotient presentations Let c, r โˆˆ N be fixed. The free nilpotent group Fc,r of class c and rank r is defined as Fc,r = h a1 , . . . , ar | [x1 , . . . , xc+1 ] = 1 for x1 , . . . , xc+1 โˆˆ Fc,r i where [x1 , . . . , xc+1 ] = [[x1 , . . . , xc ], xc+1 ], i. e., Fc,r is the r-generated group only subject to the relations that weight c + 1 commutators are trivial. Throughout, we fix a Malโ€™cev basis A = (a1 , . . . , am ) (which we call the standard Malโ€™cev basis) associated to the lower central series of Fc,r such that the associated nilpotent presentation consists only of relations of the form (3) and (4) (i. e., T = โˆ… โ€“ such a presentation exists since Fc,r is torsion-free), a1 , . . . , ar generates Fc,r , and all other Malโ€™cev generators are iterated commutators of a1 , . . . , ar . Denote by Nc,r the set of r-generated nilpotent groups of class at most c. Every group G โˆˆ Nc,r is a quotient of the free nilpotent group Fc,r , i. e., G = Fc,r /N for some normal subgroup N โ‰ค Fc,r . Assume that T = (h1 , . . . , hs ) is a full sequence generating N . Adding T to the set of relators of the free nilpotent group yields a new nilpotent presentation. This presentation will be called quotient presentation of G. For inputs of algorithms, we assume that a quotient presentation is always given as its matrix of coordinates in full form. Depending whether the entries of the matrix are encoded in unary or binary, we call the quotient presentation be given in unary or binary. 7 8 A. Myasnikov, A. WeiรŸ I Lemma 5 ([16, Prop. 5.1]). Let c and r be fixed integers and let A = (a1 , . . . , am ) be the standard Malโ€™cev basis of Fc,r . Moreover, denote by S the set of relators of Fc,r with respect to A. Let G โˆˆ Nc,r with G = Fc,r /N and let T be the full-form sequence for the subgroup N of Fc,r . Then, h A | S โˆช T i is a consistent nilpotent presentation of G. Proof. Clearly, we have G ' hA | S โˆช T i. Since hA | Si is a nilpotent presentation and the elements of T add relators of the form (2), the presentation is nilpotent. To prove that it is consistent, suppose some ai โˆˆ A has order ฮฑi modulo hai+1 , . . . , am i in hA | S โˆช T i. Since ฮฑm i ฮฑi+1 the order is infinite in F , there must be element of the form aฮฑ i ai+1 ยท ยท ยท am in N . But then, 0 ฮฑ0 ฮฑ ฮฑ0 i+1 by Lemma 4, T must contain an element ai i ai+1 ยท ยท ยท amm where ฮฑi0 divides ฮฑi . Hence ฮฑi cannot be smaller than ฮฑi0 and so the presentation is consistent. J For the following we always assume that a quotient presentation is part of the input, but c and r are fixed. Later, we will show how to compute quotient presentations from an arbitrary presentation. I Remark. Lemma 5 ensures that each group element has a unique normal form with respect to the quotient presentation; thus, it guarantees that all our manipulations of Malโ€™cev coordinates are well-defined. 4 Word problem and computation of Malโ€™cev coordinates In this section we deal with the word problem of nilpotent groups, which is well-known to be in TC0 [24]. Here, we generalize this result by allowing words with binary exponents (recall that word with binary exponents is a sequence w = w1x1 ยท ยท ยท wnxn where wi โˆˆ {a1 , . . . , am } and the xi โˆˆ Z). By using words with binary exponents the input can be compressed exponentially โ€“ making the word problem, a priori, harder to solve. Nevertheless, it turns out that the word problem still can be solved in TC0 when allowing the input to be given as a word with binary exponents. Note that this contrasts with the situation where the input is given as straight-line program (which like words with binary exponents allow an exponential compression) โ€“ then the word problem is complete for the counting class C= L [12]. I Theorem 6. Let c, r โ‰ฅ 1 be fixed and let (a1 , . . . , am ) be the standard Malโ€™cev basis of Fc,r . The following problem is TC0 -complete: on input of G โˆˆ Nc,r given as a binary encoded quotient presentation and a word with binary exponents w = w1x1 ยท ยท ยท wnxn , compute integers y1 , . . . , ym (in binary) such that w = ay11 ยท ยท ยท aymm in G and 0 โ‰ค yi < ei for i โˆˆ T . Moreover, if the input is given in unary (both G and w), then the output is in unary. Note that the statement for unary inputs is essentially the one of [24]. Be aware that in the formulation of the theorem, T and ei for i โˆˆ T depend on the input group G. These parameters can be read from the full matrix (ฮฑij )i,j of coordinates representing G (recall that ฯ€i denotes the column index of the i-th pivot and here s is the number of rows of the matrix): T = {ฯ€i | i โˆˆ {1, . . . , s}} (all columns which have a pivot) and ei = ฮฑji if ฯ€j = i. As an immediate consequence of Theorem 6, we obtain: I Corollary 7. Let c, r โ‰ฅ 1 be fixed. The uniform, binary version of the word problem for groups in Nc,r is TC0 -complete (where the input is given as in Theorem 6). TC0 circuits for algorithmic problems in nilpotent groups The proof of Theorem 6 follows the outline given in Section 2.2; however, we cannot apply the rules (2)โ€“(4) one by one. Instead we make only two steps for each generator: first apply all possible rules (3) and (4) in one step and then apply the rules (2) in one step. Proof of Theorem 6. The hardness part is clear since already the word problem of Z is TC0 -complete. For describing a TC0 circuit, we proceed by induction along the standard Malโ€™cev basis (a1 , . . . , am ) of the free nilpotent group Fc,r . If w does not contain any letter a1 , we have y1 = 0 and we can compute yi for i > 1 by induction. Otherwise, we rewrite w as ay11 uv (with 0 โ‰ค y1 < e1 if 1 โˆˆ T ) such that u and v are words with binary exponents not containing any a1 s. Once this is completed, uv can be rewritten as ay22 ยท ยท ยท aymm by induction. For computing y1 , u and v, we proceed in two steps: P First, we rewrite w as ayฬƒ11 v with yฬƒ1 = wi =a1 xi (this is possible by Lemma 3 (iii)). The exponent yฬƒ1 can be computed by iterated addition, which by Theorem 2 is in TC0 (in the unary case yฬƒ1 can be written down in unary). Now, v consists of what remains from w after a1 has been โ€œeliminatedโ€: for every position i in w with wi = 6 a1 , we compute P zi = xj using iterated addition. Let wi = ak . By Lemma 3 (i) there are fixed j>i wj =a1 polynomials pk,k+1 , . . . , pk,m โˆˆ Z[x, y] such that in the free nilpotent group holds p k,k+1 axk ay1 = ay1 axk ak+1 (x,y) p ยท ยท ยท amk,m (x,y) for all x, y โˆˆ Z. Hence, in order to obtain wฬƒ, it remains to replace every wixi with wi = a1 by the empty word pk,k+1 (xi ,zi ) p (x ,z ) and every wixi with wi = ak 6= a1 by axki ak+1 ยท ยท ยท amk,m i i , which is a word with binary exponents (resp. as a word of polynomial length in the unary case), for k = 2, . . . , m. The exponents can be computed in TC0 by Theorem 2. Since the pk,i are bounded by pk,k+1 (xi ,zi ) p (x ,z ) polynomials, in the unary case, axki ak+1 ยท ยท ยท amk,m i i can be written as a word without exponents. The second step is only applied if 1 โˆˆ T (as explained above, this can be decided and ei can be read directly from the quotient presentation by checking whether there is a pivot in the first column) โ€“ otherwise y1 = yฬƒ1 and u is the empty word. We rewrite ayฬƒ11 to ay11 u with y1 = yฬƒ1 mod e1 and a word with binary exponents u not containing any a1 . Again y1 can be computed in TC0 by Theorem 2. Let ae11 = aยต2 12 ยท ยท ยท aยตm1m be the power relation for a1 (which can be read from the quotient presentation โ€“ it is just the row where the pivot is in the first column) and write yฬƒ1 = s ยท e1 + y1 . Now, u should be equal to (aยต2 12 ยท ยท ยท aยตm1m )s in Fc,r . We use the fixed polynomials qi โˆˆ Z[x1 , . . . , xm , z] from Lemma 3 (ii) for Fc,r yielding q (0,ยต12 ,...,ยต1m ,s) u = a22 ยท ยท ยท aqmm (0,ยต12 ,...,ยต1m ,s) (which, in the binary setting, is a word with binary exponents, and in the unary setting a word without exponents of polynomial length). Now, we have w = ay11 uv in G as desired. J 5 The extended gcd problem Computing greatest common divisors and expressing them as a linear combination is an essential step for solving the subgroup membership problem. Indeed, consider the nilpotent group Z and let a, b, c โˆˆ Z. Then c โˆˆ ha, bi if, and only if, gcd(a, b) | c. Binary gcds. The (binary) extended gcd problem (ExtGCD) is as follows: on input of binary encoded numbers a1 , . . . , an โˆˆ Z, compute x1 , . . . , xn โˆˆ Z such that x1 a1 + ยท ยท ยท + xn an = gcd(a1 , . . . , an ). 9 10 A. Myasnikov, A. WeiรŸ Clearly this can be done in P using the Euclidean algorithm, but it is not known whether it is actually in NC. Since we need to compute greatest common divisors, we will reduce the subgroup membership problem to the computation of gcds. Unary gcds. Computing the gcd of numbers encoded in unary is straightforward in TC0 by an exhaustive search; yet, it is not obvious how to express gcd(a1 , . . . , an ) as x1 a1 +ยท ยท ยท+xn an in TC0 . By [17] such xi with |xi | โ‰ค 12 max{|a1 |, . . . , |an |} can be computed in LOGSPACE. However, that algorithm uses a logarithmic number of rounds each depending on the outcome of the previous one โ€“ so it does not work in TC0 . Note that for n = 2 the problem is easy: I Example 8. Let a, b โˆˆ Z. Then, there are x, y โˆˆ Z with |x| , |y| โ‰ค max {|a| , |b|} such that ax + by = gcd(a, b). This is easy to see: assume a, b > 0 (the other cases are similar) and we are given x, y with ax + by = gcd(a, b) and x โ‰ฅ b, then we can replace x with x โˆ’ b and y with y + a. This does not change the sum and by iterating this step, we can assure that 0 โ‰ค x < b. Then we have y = โˆ’ axโˆ’gcd(a,b) ; hence, โˆ’a < y โ‰ค 1. b If a and b are given in unary, the coefficients x, y can be computed in TC0 by simply checking all (polynomially many) values for x and y with |x| , |y| โ‰ค max {|a| , |b|}. However, if we want to express the gcd of unboundedly many numbers ai as a linear combination, we cannot check all possible values for x1 , . . . , xn in TC0 because there are max{|a1 |n , . . . , |an |n } (i. e., exponentially) many. Expressing the gcd as a linear combination can be viewed as a linear equation with integral coefficients. Recently, in [5, Thm. 3.14] it has been shown that, if all the coefficients are given in unary, it can be decided in TC0 whether such an equation or a system of a fixed number of equations has a solution. Since from the proof of [5, Thm. 3.14] it is not obvious how to find an actual solution, we prove the following result: I Theorem 9. The following problem is in TC0 : Given integers a1 , . . . , an as unary numbers, compute x1 , . . . , xn โˆˆ Z (either in unary or binary) such that x1 a1 + ยท ยท ยท + xn an = gcd(a1 , . . . , an ) 2 with |xi | โ‰ค (n + 1) (max{|a1 |, . . . , |an |}) . Proof. Let A = max{|a1 |, . . . , |an |}, which clearly can be computed in TC0 . W. l. o. g. we assume that all the ai are positive. We assume that all numbers which appear as intermediate results are encoded in binary (indeed, these numbers will grow too fast to encode them in unary). First observe that gcd(a1 , . . . , ai ) can be computed in TC0 for all i โˆˆ {1, . . . , n}. The reason is simply that there are only linearly many numbers less than each ai . In fact, for computing gcd(a1 , . . . , an ), the circuit just checks for all d โ‰ค A whether for every i there is some ci โ‰ค ai with dci = ai . If for some d there are such ci for all i, we have found a common divisor. The gcd is simply the largest one. Thus, it remains to compute the coefficients xi . Since we can compute gcd(a1 , . . . , an ) in 0 TC , we can divide all numbers ai by the gcd and henceforth assume that gcd(a1 , . . . , an ) = 1 (note that this does not change the coefficients xi ). The first step for computing the xi s, is to compute di = gcd(a1 , . . . , ai ) for i = 1, . . . , n and d0 = 0 (note that by our assumption, dn = 1). We have di = gcd(a1 , . . . , ai ) = gcd(gcd(a1 , . . . , aiโˆ’1 ), ai ) = gcd(diโˆ’1 , ai ). TC0 circuits for algorithmic problems in nilpotent groups 11 Using this observation, the next step computes for each i integers yi and zi such that di = yi diโˆ’1 + zi ai . For all i this can be done in parallel in TC0 by simply trying all possible values with |yi | , |zi | โ‰ค A as in Example 8. We set n Y xi = zi yj . j=i+1 These xi can be computed in TC0 using iterated multiplication [8] โ€“ see Theorem 2. Moreover, an easy induction shows that x1 a1 + ยท ยท ยท + xn an = gcd(a1 , . . . , an ). There is only one problem with the numbers xi : in general, they do not meet the bounds |xi | โ‰ค (n + 1)A2 . So, the next step will be to modify these xi in such a way that they meet the desired bound. The idea is to apply a sequence of operations as in Example 8 to make the coefficients small. The difficulty here is to find out where exactly to add/subtract a multiple of which ai . Let P = {i โˆˆ {1, . . . , n} | xi > 0} and N = {i โˆˆ {1, . . . , n} | xi < 0}. Note that P โˆฉN = โˆ… and w. l. o. g. we can assume that P โˆช N = {1, . . . , n}. For all i = 1, . . . n, we set     j x a k โˆ’xi ai i i 0 p0i = max 0, , n = max 0, . (6) i A2 A2 Obviously, we have p0i = 0 for i โˆˆ N and n0i = 0 for i โˆˆ P. The non-zero p0i correspond to those indices which have a too large positive xi and the non-zero n0i to those indices which have a too small negative xi (this is because we assumed the ai to be positive). Moreover, xi should be decreased (resp. increased) by A2 p0i /ai (resp. A2 n0i /ai ) in order to make it reasonably small. We will not be able to reach this aim completely, but with a sufficiently small error. Pi Pi Next, we set Pi0 = j=1 p0j and Ni0 = j=1 n0j . All the p0i , n0i , Pi0 , Ni0 and P and N can be computed in TC0 using iterated addition and division โ€“ see Theorem 2. I Lemma 10. Pn0 โˆ’ Nn0 โ‰ค |N | and Nn0 โˆ’ Pn0 โ‰ค |P| Proof. For i โˆˆ P, we have 0 โ‰ค xi ai โˆ’ p0i A2 < A2 by definition of p0i . Likewise, we have 0 โ‰ฅ xi ai + n0i A2 > โˆ’A2 for i โˆˆ N . Since P โˆฉ N = โˆ… and P โˆช N = {1, . . . , n}, we obtain (Pn0 โˆ’ Nn0 )A2 = X p0i A2 โˆ’ iโˆˆP X n0i A2 < iโˆˆN X xi ai + iโˆˆP X (xi ai + A2 ) iโˆˆN 2 = x1 a1 + ยท ยท ยท + xn an + |N | A = 1 + |N | A2 meaning that Pn0 โˆ’ Nn0 โ‰ค |N |. The same argument yields (Pn0 โˆ’ Nn0 )A2 > 1 โˆ’ |P| A2 , and thus Nn0 โˆ’ Pn0 < |P|. J Let D = Nn0 โˆ’ Pn0 . For i โˆˆ {1, . . . , n}, we set pi = ( p0i + 1 p0i if i โˆˆ P and i โ‰ค D, otherwise, ni = ( n0i + 1 n0i if i โˆˆ N and i โ‰ค โˆ’D, otherwise, (7) 12 A. Myasnikov, A. WeiรŸ Pi Pi and Pi = j=1 pj and Ni = j=1 nj for i โˆˆ {0, . . . , n}. Because of Lemma 10, we have Nn = Pn . Clearly, the pi , ni , Pi , Ni can be computed in TC0 and from now on we will work with these numbers. Also, as an immediate consequence of (6) and (7), we have โˆ’A2 โ‰ค xi ai โˆ’ pi A2 โ‰ค A2 2 2 โˆ’A โ‰ค xi ai + ni A โ‰ค A for i โˆˆ P, 2 for i โˆˆ N . (8) Now, for i โˆˆ P and j โˆˆ N , we define pj,i = ๏ฃฑ ๏ฃด pi ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃด ๏ฃฒNj โˆ’ Piโˆ’1 if Njโˆ’1 โ‰ค Piโˆ’1 < Pi โ‰ค Nj if Njโˆ’1 โ‰ค Piโˆ’1 < Nj โ‰ค Pi Pi โˆ’ Njโˆ’1 ๏ฃด ๏ฃด ๏ฃด ๏ฃด nj ๏ฃด ๏ฃด ๏ฃด ๏ฃณ0 if Piโˆ’1 โ‰ค Njโˆ’1 < Pi โ‰ค Nj if Piโˆ’1 โ‰ค Njโˆ’1 < Nj โ‰ค Pi otherwise. Note that the cases overlap. However, then the different definitions of pj,i agree. For i โˆˆ N and j โˆˆ P, we set pj,i = pi,j and for i, j โˆˆ P or i, j โˆˆ N we set pj,i = 0. X X I Lemma 11. We have pj,i = pi and pj,i = nj . j i P Proof. We only show j pj,i = pi ; the other statement follows by symmetry. First, assume that pi = pi,j for some j. Then pi,j 0 = 0 for all j 0 6= j; hence, the lemma holds. Now, let pi 6= pi,j for any j. We define ฮฑi = min {j โˆˆ {1, . . . , n} | Piโˆ’1 < Nj } , ฮฒi = max {j โˆˆ {1, . . . , n} | Njโˆ’1 < Pi } . In particular, we have pj,i = 0 for j < ฮฑi or j > ฮฒi . Notice that ฮฑi and ฮฒi exist for all i โˆˆ P (since Nn = Pn ). Also ฮฑi < ฮฒi because ฮฑi = ฮฒi = j implies Njโˆ’1 โ‰ค Piโˆ’1 < Nj and Njโˆ’1 < Pi โ‰ค Nj ; thus, pj,i = pi . Moreover, we have pฮฑi ,i = Nฮฑi โˆ’Piโˆ’1 and pฮฒi ,i = Pi โˆ’Nฮฒi โˆ’1 and pj,i = nj for ฮฑi < j < ฮฒi . Since Pi โˆ’ Piโˆ’1 = i X pi โˆ’ j=0 Nฮฒi โˆ’1 โˆ’ Nฮฑi โˆ’ iโˆ’1 X pi = pi and j=0 ฮฒX i โˆ’1 j=ฮฑi +1 nj = ฮฒX i โˆ’1 nj โˆ’ j=1 ฮฑi X nj โˆ’ j=1 ฮฒX i โˆ’1 nj = 0, j=ฮฑi +1 we obtain X pj,i = Nฮฑi โˆ’ Piโˆ’1 + Pi โˆ’ Nฮฒi โˆ’1 + j ฮฒX i โˆ’1 nj = p i . j=ฮฑi +1 J We set yj,i = j k 2 pj,i A ai aj for i, j = 1, . . . , n. Notice that, since ai aj โ‰ค A2 , this means that (pj,i โˆ’ 1)A2 < yj,i ai aj โ‰ค pj,i A2 . (9) TC0 circuits for algorithmic problems in nilpotent groups Finally, we define our new ๏ฃฑ P ๏ฃด ๏ฃดxi โˆ’ j yj,i aj ๏ฃฒ P xฬƒi = xi + j yi,j aj ๏ฃด ๏ฃด ๏ฃณx i 13 coefficients xฬƒi as follows: if i โˆˆ P, if i โˆˆ N , otherwise. It remains to show the following: (i) the numbers xฬƒi can be computed in TC0 , (ii) xฬƒ1 a1 + ยท ยท ยท + xฬƒn an = 1, (iii) |xฬƒi | โ‰ค (n + 1)A2 for all i. The first point is straightforward: we already remarked that the pi , ni , Pi , Ni and P and N can be computed in TC0 . Hence, also the pj,i can be computed in TC0 (as simple Boolean combination resp. addition of the previous numbers). Now, the yj,i can be computed using division [8]. Finally, the computation of the xฬƒi is simply another application of iterated addition. For the second point observe that X X xฬƒ1 a1 + ยท ยท ยท + xฬƒn an = xฬƒi ai + xฬƒi ai iโˆˆP iโˆˆN ๏ฃซ = X ๏ฃญxi โˆ’ = n X i=1 n X xi ai โˆ’ xi ai โˆ’ n X ๏ฃซ X ๏ฃถ ๏ฃญxi + j XX yj,i aj ai + iโˆˆN XX iโˆˆP jโˆˆN yj,i aj ai + X yi,j aj ๏ฃธ ai j iโˆˆN XX iโˆˆP i=1 = yj,i aj ๏ฃธ ai + j iโˆˆP = ๏ฃถ X yi,j aj ai j XX yi,j aj ai iโˆˆN jโˆˆP xi ai i=1 The last equality is due to the fact that yj,i = yi,j for all i, j and that yi,j = 0 if i and j are both in P or both in N . For the third point, let i โˆˆ P. Then, X X xฬƒi ai = xi ai โˆ’ yj,i aj ai โ‰ฅ xi ai โˆ’ pj,i A2 (by (9)) j = xi ai โˆ’ pi A โ‰ฅ โˆ’A j 2 (by Lemma 11) 2 (by (8)) and xฬƒi ai = xi ai โˆ’ X yj,i aj ai โ‰ค xi ai โˆ’ j = xi ai โˆ’ A2 pi + nA2 โ‰ค (n + 1)A X (pj,i โˆ’ 1)A2 (by (9)) j (by Lemma 11) 2 The case i โˆˆ N is completely symmetric. This concludes the proof of Theorem 9. (by (8)) J Notice that it is straightforward to improve the bounds of Theorem 9 further (e. g. getting rid of the factor n + 1). However, since there is no need for that in order to perform the matrix reduction, we do not do this additional effort. Also we could not find a TC0 circuit which yields the bound xi โ‰ค 12 A (which is achievable in LOGSPACE by [17]). 14 A. Myasnikov, A. WeiรŸ 6 Matrix reduction and subgroup membership problem In [16], the so-called matrix reduction procedure converts an arbitrary matrix of coordinates into its full form and, thus, is an essential step for solving the subgroup membership problem and several other problems. It was first described in [25] โ€“ however, without a precise complexity estimate. In this section, we repeat the presentation from [16] and show that for fixed c and r, it can be actually computed uniformly for groups in Nc,r in TC0 โ€“ in the case that the inputs are given in unary (as words). If the inputs are represented as words with binary exponents, then we still can show that it is TC0 -Turing-reducible to ExtGCD. In Section 3, we defined the matrix representation of subgroups of nilpotent groups. We adopt all notation from Section 3. As before, let c, r โˆˆ N be fixed and let (a1 , . . . , am ) be the standard Malโ€™cev basis of Fc,r . Let G โˆˆ Nc,r be given as quotient presentation, i. e., as a matrix in full form (either with unary or binary coefficients). We define the following operations on tuples (h1 , . . . , hn ) (our subgroup generators) of elements of G and the corresponding operations on the associated matrix, with the goal of converting (h1 , . . . , hn ) to a sequence in full form generating the same subgroup H = hh1 , . . . , hn i: (1) Swap hi with hj . This corresponds to swapping row i with row j. (2) Replace hi by hi hlj (i 6= j, l โˆˆ Z). This corresponds to replacing row i by Coord(hi hlj ). (3) Add or remove a trivial element from the tuple. This corresponds to adding or removing a row of zeros; or (3โ€™) a row of the form (0 . . . 0 ei ฮฑi+1 . . . ฮฑm ), where i โˆˆ T and ฮฑi+1 i m aโˆ’e = ai+1 ยท ยท ยท aฮฑ m . i โˆ’1 (4) Replace hi with hโˆ’1 i . This corresponds to replacing row i by Coord(hi ). (5) Append an arbitrary product hli11 ยท ยท ยท hlikk with i1 , . . . , ik โˆˆ {1, . . . , n} and l1 , . . . , lk โˆˆ Z to the tuple: add a new row with Coord(hli11 ยท ยท ยท hlikk ). Clearly, all these operations preserve H. I Lemma 12. On input of a quotient presentation of G โˆˆ Nc,r in unary (resp. binary) and a matrix of coordinates A given in unary (resp. binary), operations (1)โ€“(5) can be done in TC0 . The output matrix will be also encoded in unary (resp. binary). For operations (2) and (5), we require that the exponents l, l1 , . . . , lk are given in unary (resp. binary). Moreover, as long as the rows in the matrix which are changed are pairwise distinct, a polynomial number of such steps can be done in parallel in TC0 . Proof. Operations (1) and (3), clearly can be done in TC0 . Notice that operation (3โ€™) means simply that a row of the quotient presentation of G is appended to the matrix. In the unary case, it follows directly from Theorem 6 that operations (2), (4), and (5) are in TC0 because, since l, l1 , . . . , lk are given in unary, the respective group elements can be written down as words. In the case of binary inputs, (5) works as follows ((2) and (4) analogously): by Lemma 3 (ii), there are functions q1 , . . . , qm โˆˆ Z[x1 , . . . , xm , z] such that for every h โˆˆ Fc,r with Coord(h) = (ฮณ1 , . . . , ฮณm ) anda l โˆˆ Z, we have Coordi (hl ) = qi (ฮณ1 , . . . , ฮณm , l) in Fc,r . These l functions can be used to compute Coord(hijj ) for j = 1, . . . , k. After that, hli11 ยท ยท ยท hlikk can be written down as word with binary exponents and Theorem 6 can be applied. J Using the row operations defined above, in [16] it is shown how to reduce any coordinate matrix to its unique full form. Let us repeat these steps: Let A0 be a matrix of coordinates, as in (5) in Section 3. Recall that ฯ€k denotes the column index of the k-th pivot (of the full form of A0 ). We produce matrices A1 , . . . , As , where s is the number of pivots in the full form of A0 , such that for every k = 1, . . . , s the TC0 circuits for algorithmic problems in nilpotent groups 15 first ฯ€k columns of Ak form a matrix satisfying conditions (ii)-(v) of being a full sequence, condition (vi) is satisfied for all i < ฯ€k+1 , and As is the full form of A0 . Here we formally denote ฯ€s+1 = m + 1. Set ฯ€0 = 0 and assume that Akโˆ’1 has been constructed for some k โ‰ฅ 1. In the steps below we construct Ak . We let n and m denote the number of rows and columns, respectively, of Akโˆ’1 . At all times during the computation, hi denotes the group element corresponding to row i of Ak and ฮฑij denotes the (i, j)-entry of Ak , which is Coordj (hi ). These may change after every operation. Step 1. Locate the column ฯ€k of the next pivot, which is the minimum integer ฯ€kโˆ’1 < ฯ€k โ‰ค m such that ฮฑiฯ€k 6= 0 for at least one k โ‰ค i โ‰ค n. If no such integer exists, then k โˆ’ 1 = s and As is already constructed. Otherwise, set Ak to be a copy of Akโˆ’1 and denote ฯ€ = ฯ€k . Compute a linear expression of d = gcd(ฮฑkฯ€ , . . . , ฮฑnฯ€ ) = lk ฮฑkฯ€ + ยท ยท ยท + ln ฮฑnฯ€ . Let hn+1 = hlkk ยท ยท ยท hlnn and note that hn+1 has coordinates of the form Coord(hn+1 ) = (0, . . . , 0, d, . . .) with d occurring in position ฯ€. Perform operation (5) to append hn+1 as row n + 1 of Ak . โˆ’ฮฑ /d Step 2. For each i = k, . . . , n, perform operation (2) to replace row i by Coord(hi ยท hn+1iฯ€ ). โˆ’bฮฑ /dc and for each i = 1, . . . , k โˆ’ 1, use (2) to replace row i by Coord(hi ยท hn+1iฯ€ ). After that, swap row k with row n + 1 using (1). At this point, properties (ii)-(iv) hold on the first k columns of Ak . Step 3. If ฯ€ โˆˆ T , we additionally ensure condition (v) as follows. Perform row operation (3โ€™), with respect to ฯ€, to append a trivial element hn+2 with Coord(hn+2 ) = (0, . . . , 0, eฯ€ , . . .) to Ak . Let ฮด = gcd(d, eฯ€ ) and compute the linear expression ฮด = n1 d + n2 eฯ€ , with 2 |n1 |, |n2 | โ‰ค max{d, eฯ€ }. Let hn+3 = hnk 1 hnn+2 and append this row to Ak , as row n + 3. Note that Coord(hn+3 ) = (0, . . . , 0, ฮด, . . .), with ฮด in position ฯ€. Replace row k by โˆ’eฯ€ /ฮด โˆ’d/ฮด Coord(hk ยท hn+3 ) and row n + 2 by Coord(hn+2 ยท hn+3 ), producing zeros in column ฯ€ in these rows. Swap row k with row n + 3. At this point, (ii), (iii), and (v) hold (for the first ฯ€k columns) but (iv) need not, since the pivot entry is now ฮด instead of d. For each โˆ’bฮฑ /ฮดc j = 1, . . . , k โˆ’ 1, replace row j by Coord(hj ยท hk jฯ€ ), ensuring (iv). Step 4. Identify the next pivot ฯ€k+1 (like in Step 1). If ฯ€k is the last pivot, we set ฯ€k+1 = m + 1. We now ensure condition (vi) for i < ฯ€k+1 . Observe that Steps 1-3 preserve h hj | ฯ€j โ‰ฅ i i for all i < ฯ€k . Hence (vi) holds in Ak for i < ฯ€k since it holds in Akโˆ’1 for the same range. Now consider i in the range ฯ€k โ‰ค i < ฯ€k+1 . It suffices to establish (vi.i) for all j > k and (vi.ii) for ฯ€k only. To obtain (vi.i), notice that โˆ’1 ยฑ1 hโˆ’1 k hj hk , hk hj hk โˆˆ h h` | ` > k i if, and only if, [hj , hk ] โˆˆ h h` | ` > k i. Further, note that the subgroup generated by Sj = {1, hj , [hj , hk ], . . . , [hj , hk , . . . , hk ]}, where hk appears m โˆ’ ฯ€k times in the last commutator, is closed under commutation with hk since if hk appears more than mโˆ’ฯ€k times then the commutator is trivial. An inductive ` argument shows that the subgroup hSj i coincides with hhโˆ’` k hj hk | 0 โ‰ค ` โ‰ค m โˆ’ ฯ€k i. โˆ’1 Similar observations can be made for conjugation by hk . Therefore, appending via ` operation (5) rows Coord(hโˆ’` k hj hk ) for all 1 โ‰ค |`| โ‰ค m โˆ’ ฯ€k and all k < j โ‰ค n + 3 delivers (vi.i) for all j > k. Note that (vi.i) remains true for i < ฯ€k . ek /ฮฑkฯ€k To obtain (vi.ii), in the case ฯ€k โˆˆ T , we add row Coord(hk commutes with hk and therefore (vi.i) is preserved. ). Note that this element 16 A. Myasnikov, A. WeiรŸ Step 5. Using operation (3), eliminate all zero rows. The matrix Ak is now constructed. We have to show that each step can be performed in TC0 given that all Malโ€™cev coordinates are encoded in unary (resp. in TC0 (ExtGCD) if Malโ€™cev coordinates are encoded in binary). Since the total number of steps is constant (only depending on the nilpotency class and number of generators), this gives a TC0 (resp. TC0 (ExtGCD)) circuit for computing the full form of a given subgroup. Step 1. The next pivot can be found in TC0 since it is simply the next column in the matrix with a non-zero entry, which can be found as a simple Boolean combination of test whether the entries are zero. In the unary case, by Theorem 9, d = gcd(ฮฑkฯ€ , . . . , ฮฑnฯ€ ) can computed in TC0 together with lk , . . . , ln encoded in unary such that d = lk ฮฑkฯ€ + ยท ยท ยท + ln ฮฑnฯ€ . Now, by Lemma 12, Step 1 can be done in TC0 . In the binary case, d and lk , . . . , ln can be computed using ExtGCD. Hence, by Lemma 12, Step 1 can be done in TC0 (ExtGCD). Step 2. The numbers bฮฑiฯ€ /dc (either in unary or binary) can be computed in TC0 for all i in parallel by Theorem 2. After that one operation (2) is applied to each row of the matrix. By Lemma 12, this can be done in parallel for all rows in TC0 . Finally, swapping rows k and n + 1 can be done in TC0 . Step 3. As explained in Section 4, T and ei for i โˆˆ T can be read directly from the quotient presentation. Thus, it can be decided in TC0 whether Step 3 has to be executed. Appending a new row is in TC0 . Computing gcd(d, eฯ€ ) = d = n1 dn2 eฯ€ is in TC0 by Example 8 (in the unary case) and in TC0 (ExtGCD) in the binary case. After that one operation (5) is followed by two operations (2), one operation (1), and, finally, k โˆ’ 1 times operation (2), which all can be done in TC0 again by Lemma 12. Step 4. The next pivot can be found in TC0 as outlined in Step 1. After that, Step 4 consists of an application of a constant number (only depending on the nilpotency class and number of generators) of operations (5) and thus, by Lemma 12, is in TC0 . Step 5. Clearly that is in TC0 . Thus, we have completed the proof of our main result: I Theorem 13. Let c, r โˆˆ N be fixed. The following problem is in TC0 : given a unary encoded quotient presentation of G โˆˆ Nc,r and h1 , . . . , hn โˆˆ G, compute the full form of the associated matrix of coordinates encoded in unary and hence the unique full-form sequence (g1 , . . . , gs ) generating hh1 , . . . , hn i. Moreover, if the G and h1 , . . . , hn are given in binary, then the full-form sequence with binary coefficients can be computed in TC0 (ExtGCD). 6.1 Subgroup membership problem We can now apply the matrix reduction algorithm to solve the subgroup membership problem in TC0 . I Theorem 14. Let c, r โˆˆ N be fixed. The following problem is in TC0 (resp. TC0 (ExtGCD) for binary inputs): given a quotient presentation of G โˆˆ Nc,r , elements h1 , . . . , hn โˆˆ G and h โˆˆ G, decide whether or not h is an element of the subgroup H = hh1 , . . . , hn i. Moreover, if h โˆˆ H, the circuit computes the unique expression h = g1ฮณ1 ยท ยท ยท gsฮณs where (g1 , . . . , gs ) is the full-form sequence for H with the ฮณi encoded in unary (resp. binary). Alternatively, for unary inputs, the output can be given as word h = hi11 ยท ยท ยท hitt where ij โˆˆ {1, . . . , n} and j = ยฑ1. Note that we do not know whether there is an analog of the second type of output for binary inputs. A possible way of expressing the output would be as a word with binary exponents TC0 circuits for algorithmic problems in nilpotent groups over h1 , . . . , hn . However, simply applying the same procedure as for unary inputs will not lead to a word with binary exponents. Proof. The circuit works as follows: first, the the full form A of the coordinate matrix corresponding to H and the standard-form sequence (g1 , . . . , gs ) are computed in TC0 (resp. TC0 (ExtGCD)) using Theorem 13. As before, denote by ฮฑij the (i, j)-entry of A and by ฯ€1 , . . . , ฯ€s its pivots. By Lemma 4, any element of H can be written as g1ฮณ1 ยท ยท ยท gsฮณs . We show how to find these (j) (j) exponents. Denote h(1) = h and Coord(h(j) ) = (ฮฒ1 , . . . , ฮฒm ), with h(j) being defined below. (j) For j = 1, . . . , s, do the following. If ฮฒl 6= 0 for any 1 โ‰ค l < ฯ€j , then h โˆˆ / H. Otherwise, (j) check whether ฮฑjฯ€j divides ฮฒฯ€j . If not, then h โˆˆ / H. If yes, let ฮณj = ฮฒฯ€(j) /ฮฑjฯ€j j and โˆ’ฮณj h(j+1) = gj h(j) . If j < s, continue to j + 1. If j = s, then h = g1ฮณ1 ยท ยท ยท gsฮณs โˆˆ H if h(s+1) = 1 and h โˆˆ / H otherwise. Since s is bounded by a constant, there are only a constant number of steps. Each step can be done in TC0 by Theorem 2 (division) and Theorem 6 (computation of Malโ€™cev coordinates). For the second type of output in the unary case, while performing the matrix reduction, we store for every row of the matrix also how that row can be expressed as a word over the subgroup generators h1 , . . . , hn (here, we need the unary inputs, as otherwise the group elements cannot be expressed as words in polynomial space). In every operation on the matrix these words are updated correspondingly, which clearly can be done in TC0 . In the end after writing h = g1ฮณ1 ยท ยท ยท gsฮณs , every gi can be substituted by the respective word. J Since abelian groups are nilpotent, we obtain: I Corollary 15. Let r be fixed. The following problem is in TC0 : Given a list h1 , . . . , hn โˆˆ Zr and g โˆˆ Zr (all as words over the generators), decide whether g โˆˆ hh1 , . . . , hn i. Moreover, in the case of a positive answer, compute x1 , . . . , xn โˆˆ Z in unary such that g = x1 h1 +ยท ยท ยท+xn hn . In other words: for fixed r, given a unary encoded system of linear equations (A, b) with A โˆˆ Zrร—n and b โˆˆ Zr , a unary encoded solution x โˆˆ Zn with Ax = b can be computed in TC0 . 6.2 Subgroup presentations The full-form sequence associated to a subgroup H forms a Malโ€™cev basis for H. This allows us to compute a consistent nilpotent presentation for H. Note, however, that the resulting presentation is not a quotient presentation (although it can be transformed into one, see Proposition 20) โ€“ partly this is due to the fact that, in general, H โˆˆ / Nc,r . The following is the extended version of [16, Thm. 3.11]: I Theorem 16. Let c, r โˆˆ N be fixed. The following is in TC0 for unary inputs and in TC0 (ExtGCD) for binary inputs: Input: a quotient presentation for G โˆˆ Nc,r and elements h1 , . . . , hn โˆˆ G. Output: a consistent nilpotent presentation for H = hh1 , . . . , hn i given by a list of generators (g1 , . . . , gs ) and numbers ยตij , ฮฑijk , ฮฒijk โˆˆ Z encoded in unary (resp. binary) for 1 โ‰ค i < j < k โ‰ค s representing the relations (2)-(4). 17 18 A. Myasnikov, A. WeiรŸ Proof. First, the full sequence (g1 , . . . , gs ) for H is computed in TC0 (resp. TC0 (ExtGCD)) according to Theorem 13. Let Hi = hgi , gi+1 , . . . , gs i. In the proof of [16, Thm. 3.11], it is shown that (g1 , . . . , gs ) is a Malโ€™cev basis for H. Hence, it remains to compute the relators (2)-(4) in order to give a consistent nilpotent presentation of H. The order e0i of gi modulo Hi+1 is simply ei /Coordฯ€i (gi ) (as before T and ei for i โˆˆ T can be read from the quotient presentation). Each relation (2) can be computed using the TC0 (resp. TC0 (ExtGCD)) e0 e0 circuit of Theorem 14 with input gi i and Hi+1 = hgi+1 , . . . , gs i. Since gi i โˆˆ Hi+1 and (gi+1 , . . . , gs ) is the unique full sequence for Hi+1 , the membership algorithm returns the expression on the right side of (2). Relations (3) and (4) are established using the same method. Note that there are only a constant number of relations to establish โ€“ so everything can be done in TC0 (resp. TC0 (ExtGCD)). J 7 More algorithmic problems 7.1 Homorphisms and kernels Given nilpotent groups G and H and a subgroup K โ‰ค G and a generating set g1 , . . . , gn of K, a homomorphism ฯ• : K โ†’ H can be specified by a list of elements h1 , . . . , hn where ฯ•(gi ) = hi for i = 1, . . . , n. For a homomorphism, we consider the problem of finding a generating set for its kernel, and given h โˆˆ ฯ•(K) finding g โˆˆ G such that ฯ•(g) = h. Following [16], both problems are solved using matrix reduction in the group H ร— G. I Theorem 17 (Kernels and preimages). Let c, r โˆˆ N be fixed. The following is in TC0 for unary inputs and in TC0 (ExtGCD) for binary inputs: On input of G, H โˆˆ Nc,r given as quotient presentations, a subgroup K = hg1 , . . . , gn i โ‰ค G, a list of elements h1 , . . . , hn defining a homomorphism ฯ• : K โ†’ H via ฯ•(gi ) = hi , and optionally, an element h โˆˆ H guaranteed to be in the image of ฯ•, compute (i) a generating set X for the kernel of ฯ•, and (ii) an element g โˆˆ G such that ฯ•(g) = h. In case of unary inputs, X and g will be returned as words, and for binary inputs, as words with binary exponents. Proof. Let (a1 , . . . , am ) be the standard Malโ€™cev basis of Fc,r and (b1 , . . . , bm0 ) the standard Malโ€™cev basis of Fc,2r We have two embeddings of ฯ•H , ฯ•G : Fc,r โ†’ Fc,2r with ฯ•H (ai ) = bi and ฯ•G (ai ) = br+i for i = i, . . . , r. We can assume that the Malโ€™cev basis of Fc,2r is chosen in such a way that these embeddings send all Malโ€™cev generators of Fc,r to Malโ€™cev generators of Fc,2r . Note that we have ฯ•H (Fc,r ) โˆฉ ฯ•G (Fc,r ) = {1}. Thus, we can read all relators of H and G in Fc,2r via the embeddings ฯ•H and ฯ•G , respectively. To obtain a quotient presentation of H ร— G, we simply need to add the relations that H and G commute โ€“ that is we need to introduce additional relations bi = 1 for all Malโ€™cev generators which are not in the image of ฯ•G or ฯ•H . As the new quotient presentation is basically a copy of those of H and G, it can be computed in TC0 . From now on we work only in the direct product H ร— G โˆˆ Nc,2r and identify G and H with their images under ฯ•G and ฯ•H . Let Q = hhi gi | 1 โ‰ค i โ‰ค ni and let W = (v1 u1 , . . . , vs us ) be the sequence in full form for the subgroup Q, where ui โˆˆ G and vi โˆˆ H. Let 0 โ‰ค r โ‰ค s be the greatest integer such that vr = 6 1 (with r = 0 if all vi are 1). Set X = (ur+1 , . . . , un ) and Y = (v1 , . . . , vr ). In [16, Thm. TC0 circuits for algorithmic problems in nilpotent groups 4.1] it is shown that X is the full-form sequence for the kernel of ฯ• and Y is the full-form sequence for the image. Now, to solve (i), it suffices to compute W using Theorem 13 and return the corresponding X as defined above. For (ii), apply Theorem 14 to express h as h = v1ฮฒ1 ยท ยท ยท vrฮฒr โ€“ then return g = uฮฒ1 1 ยท ยท ยท uฮฒr r . J 7.2 Centralizers Before we focus on the conjugacy problem, we need one more preliminary result: the problem of computing centralizers. I Theorem 18 (Centralizers). Let c, r โˆˆ N be fixed. The following is in TC0 for unary inputs and in TC0 (ExtGCD) for binary inputs: On input of some G โˆˆ Nc,r given as quotient presentation and an element g โˆˆ G, compute a generating set X for the centralizer of g in G (in case of binary inputs, the generating set will be given as set of words with binary exponents). Proof. Let Fc,r = ฮ“0 โ‰ฅ ฮ“1 โ‰ฅ ยท ยท ยท โ‰ฅ ฮ“c+1 = 1 be the lower central series of Fc,r . Clearly this central series projects onto a central series of G and we simply write ฮ“i for its projection in G. Denote with A = (a1 , . . . am ) the standard Malโ€™cev basis of Fc,r , which is associated to the lower central series โ€“ in particular a1 , . . . , ar is a generating set for Fc,r . We proceed by induction on c. If c = 1, then Fc,r and G are abelian and C(g) = G so the output is {a1 , . . . , ar }. Assume that the theorem holds for groups in Ncโˆ’1,r โ€“ in particular, for G/ฮ“c (we obtain a quotient presentation of G/ฮ“c by simply forgetting about the Malโ€™cev generators in ฮ“c ). A generating set K = {k1 ฮ“c , . . . , kn ฮ“c } for the centralizer of gฮ“c in G/ฮ“c can be computed in TC0 (resp. TC0 (ExtGCD)) by induction. Let J = hk1 , . . . , kn , am0 , . . . , am i , where {am0 , . . . , am } = A โˆฉ ฮ“c . Then J is the preimage of hKi under the homomorphism G โ†’ G/ฮ“c . Define f : J โ†’ G by f (u) = [g, u]. Since u โˆˆ J, u commutes with g modulo ฮ“c ; hence, [g, u] โˆˆ ฮ“c and so Im(f ) โІ ฮ“c . Moreover, f is a homomorphism: we have f (g, u1 u2 ) = [g, u1 u2 ] = [g, u2 ][g, u1 ][[g, u1 ], u2 ], and [g, u1 ] โˆˆ ฮ“c ; therefore, [[g, u1 ], u2 ] โˆˆ ฮ“c+1 = 1, and [g, u1 ] and [g, u2 ] commute, both being elements of the abelian group ฮ“c . If h commutes with g, then hฮ“c โˆˆ hKi, i. e., h โˆˆ J. Thus, the centralizer of g is precisely the kernel of f : J โ†’ ฮ“c . A generating set can be computed in TC0 (resp. TC0 (ExtGCD)) using Theorem 17. J 7.3 The conjugacy problem Now, we can combine the previous theorems to solve the conjugacy problem in TC0 following [16, Thm. 4.6]. I Theorem 19 (Conjugacy Problem). Let c, r โˆˆ N be fixed. The following is in TC0 for unary inputs and in TC0 (ExtGCD) for binary inputs: On input of some G โˆˆ Nc,r given as quotient presentation and elements g, h โˆˆ G, either 19 20 A. Myasnikov, A. WeiรŸ produce some u โˆˆ G such that g = hu , or determine that no such element u exists. In case of unary inputs, u will be returned as a word, for binary inputs, as a word with binary exponents. Proof. Again we proceed by induction on c. If c = 1, then G is abelian and g is conjugate to h if and only if g = h. If so, we return u = 1. Now let us assume c > 1 and that the theorem holds for any nilpotent group of class c โˆ’ 1 โ€“ in particular, for G/ฮ“c . We use the notation as in the proof of Theorem 18. The first step of the circuit is to check conjugacy of gฮ“c and hฮ“c in G/ฮ“c which can be done in TC0 by induction. If these elements are not conjugate, then g and h are not conjugate and the overall answer is โ€˜Noโ€™. Otherwise, we obtain some vฮ“c โˆˆ G/ฮ“c such that gฮ“c = hv ฮ“c . Let ฯ• : G โ†’ G/ฮ“c be the canonical homomorphism, J = ฯ•โˆ’1 (C(gฮ“c )) (where C(gฮ“c ) denotes the centralizer of gฮ“c ), and define f : J โ†’ ฮ“c by f (x) = [g, x]. As in the proof of Theorem 18, the image of f is indeed in ฮ“c and f is a homomorphism. We claim that g and h are conjugate if and only if g โˆ’1 hv โˆˆ f (J). Indeed, if there exists w โˆˆ G such that g = hvw , then 1 ยท ฮ“c = g โˆ’1 wโˆ’1 hv w ยท ฮ“c = [g, w] ยท ฮ“c , hence w โˆˆ J, so wโˆ’1 โˆˆ J as well. Then g โˆ’1 hv = [g, wโˆ’1 ] โˆˆ f (J), as required. The converse is immediate. So it suffices to express, if possible, g โˆ’1 hv as [g, w] with w โˆˆ J, in which case the conjugator is u = vwโˆ’1 . Now, the circuit computes a generating set {w1 ฮ“c , . . . , wn ฮ“c } for C(gฮ“c ) using Theorem 18. Then J is generated by {w1 , . . . , wn , am0 , . . . , am }, where again {am0 , . . . , am } = Aโˆฉฮ“c . After that, Coord(g โˆ’1 hv ) is computed and Theorem 14 used to determine whether g โˆ’1 hv โˆˆ f (J). If so, Theorem 17 is applied to find some w โˆˆ G such that g โˆ’1 hv = f (w). Finally, u = vwโˆ’1 is returned in case all previous tests succeed. Since we only concatenate a fixed constant number of TC0 (resp. TC0 (ExtGCD)) computations, the whole computation is in TC0 (resp. TC0 (ExtGCD)) again. J I Remark. We want to outline briefly how in the unary case the bounds of [16, Thm. 4.6] can be used to directly solve the conjugacy problem of nilpotent groups in TC0 . Since [16, Thm. 4.6] is for a non-uniform setting, we fix a nilpotent group G with generating set A. Let g, h be words over Aยฑ1 as inputs for the conjugacy problem with of total length n. By [16, Thm. 4.6], the length of conjugators is polynomial in n. By using binary exponents, the conjugators can be written with respect to a Malโ€™cev basis of G using only C log n bits for some constant C which only depends on G (this is a well-known fact โ€“ see e. g. [16, Thm. 2.3]). In particular, for all possible conjugators u which have bit-length at most C log n, it can be checked in parallel by a uniform family of TC0 circuits whether g = hu in G by using the circuits for the word problem [24] (note that for this purpose each u can be written down in unary since it is of length at most nC ). 8 Computing quotient presentations The results in the previous sections always required that the group is given as a quotient presentation. However, we can use Theorem 13 to transform an arbitrary presentation with at most r generators of a group in Nc,r into a quotient presentation. TC0 circuits for algorithmic problems in nilpotent groups I Proposition 20. Let c and r be fixed integers. The following is in TC0 : given an arbitrary finite presentation with generators a1 , . . . , ar of a group G โˆˆ Nc,r (as a list of relators given ยฑ1 as words over {a1 , . . . , ar } ), compute a quotient presentation of G (encoded in unary) and an explicit isomorphism. Moreover, if the relators are given as words with binary exponents, then the binary encoded quotient presentation can be computed in TC0 (ExtGCD). Proof. Let A = {a1 , . . . , ar } and let R be the set of relators, i. e., G is presented as G = h A | R i. Let F = Fc,r = ha1 , . . . , ar i be the free nilpotent group of class c on generators A. Let B = {b1 , . . . , bm } be the standard Malโ€™cev basis of F such that bi = ai for i = 1, . . . , r and let S denote the set of relations such that h B | S i is a consistent nilpotent presentation for F . Consider the natural surjection ฯ• : F โ†’ G and let N = ker(ฯ•), which is the normal closure of R in F . Denoting R = {r1 , . . . , rk }, N is generated by iterated commutators [. . . [[ri , x1 ], x2 ], . . . , xj ], where i = 1, . . . , k, j โ‰ค c, and x1 , . . . , xj โˆˆ A โˆช Aโˆ’1 . The total length of these generators is linear since c and r are constant. Using Theorem 13 in the group F , we can produce the full-form sequence T for N in TC0 (resp. in TC0 (ExtGCD) for binary inputs). Now G ' hB | S โˆช T i and by Lemma 5 this is a (consistent) quotient presentation. J I Remark. Because of Proposition 20, in all theorems above where the input is a quotient presentation, we can also take an arbitrary r-generated presentation of a group in Nc,r as input. However, be aware that for the word problem (Theorem 6 and Corollary 7) the complexity changes from TC0 to TC0 (ExtGCD) in the binary case. 9 Power problem and conjugacy in wreath products of nilpotent groups In [19], the conjugacy problem in iterated wreath products of abelian is shown to be in TC0 (for a definition of iterated wreath products we refer to [19]). The crucial step there is the transfer result that the conjugacy problem in a wreath product A o B is TC0 -Turing-reducible to the conjugacy problems of A and B and the so-called power problem of B. The power problem of G is defined as follows: on input of g, h โˆˆ G (as words over the generators) decide whether h is a power of g that is whether there is some k โˆˆ Z such that g k = h in G. In the โ€œyesโ€ case compute this k in binary representation. If g has finite order in G, the computed k has to be the smallest non-negative such k. By [19], also the power problem of A o B is TC0 -Turing-reducible to the power problems of A and B given that torsion elements of B have uniformly bounded order. The latter condition is also preserved by wreath products. Thus, in the light of [19], it remains to show that the power problem of nilpotent groups is in TC0 and that the order of torsion elements is uniformly bounded, in order to establish the following theorem (note that [19] is only for fixed groups; therefore, we formulate also the following results in a non-uniform setting): I Theorem 21. Let A and B be finitely generated nilpotent groups and let d โ‰ฅ 1, then the conjugacy problem of the d-fold iterated wreath products A od B as well as A d o B is in TC0 . Proof. The following two lemmas together with a repeated application of Theorem 3, Lemma 5, and Theorem 5 of [19]. J I Lemma 22. Every finitely generated nilpotent group has a uniform bound on the order of torsion elements. 21 22 A. Myasnikov, A. WeiรŸ Proof. We proceed by induction along a Malโ€™cev basis (a1 , . . . , am ) of G. If a1 has infinite order, we are done by induction. Otherwise, let k be the order of a1 and M be such that g M = 1 for all torsion elements g โˆˆ ha2 , . . . , am i. Consider a torsion element h โˆˆ ha1 , . . . , am i. Then hk โˆˆ ha2 , . . . , am i. Thus, hkM = 1. Therefore, kM is an upper bound on the order of torsion elements in G. J I Lemma 23. For every finitely generated nilpotent group G, the power problem of G is in uniform TC0 . Proof. We show a slightly more general statement by induction along a Malโ€™cev basis (a1 , . . . , am ) of G: for every fixed arithmetic progression ฮฑ + ฮฒZ, the power problem restricted to ฮฑ + ฮฒZ is in TC0 , i. e., given g, h โˆˆ G it can be decided in TC0 whether there is some n โˆˆ ฮฑ + ฮฒZ with g n = h in G and, if so, that n can be computed in TC0 . We consider the input words g and h in the quotient G/ {a2 = ยท ยท ยท = am = 1}. Let g = ak1 and h = a`1 in this quotient. If k = ` = 0, it remains to solve the power problem in the subgroup ha2 , . . . , am i, which can be done by induction. Next, we distinguish the two cases that a1 has infinite order and that it has finite order (in G/ {a2 = ยท ยท ยท = am = 1}). In the case of infinite order, the only possible value for n can be computed as `/k (in TC0 by Theorem 2). If this is not an integer or not contained in the arithmetic progression (i. e., `/k 6โ‰ก ฮฑ mod ฮฒ), then h is not a power of g. Otherwise, one simply checks whether g `/k = h in G (i. e., solving the word problem). As ` is bounded by the input length by Lemma 3, this can be done in TC0 by Theorem 6. In the case of finite order, let d denote the order of a1 . It can be checked for all 0 โ‰ค i < d in parallel whether ki = ` mod d. In case that there is such an i, the answer to the power problem is the same as the answer to the power problem in the subgroup ha2 , . . . , am i restricted to the arithmetic progression i + dZ โˆฉ ฮฑ + ฮฒZ (the intersection can be hard-wired since there are only finitely many possibilities for a fixed group since the modulo is bounded by the least common multiple of the orders of finite order elements of the Malโ€™cev basis) โ€“ if there is no such i, the answer is โ€œnoโ€. J 10 Conclusion and Open Problem We have seen that most problems which in [16] were shown to be in LOGSPACE indeed are in TC0 even in the uniform setting where the number of generators and nilpotency class is fixed. Moreover, their binary versions are in TC0 (ExtGCD) meaning that nilpotent groups are no more complicated than abelian groups in many algorithmic aspects. This contrasts with the slightly larger class of polycyclic groups: while the word problem is still in TC0 [24, 12], the conjugacy problem is not even known to be in NP. We conclude with some possible generalizations of our results: I Question 24. Does a uniform version of Theorem 6 hold (i. e., is the uniform word problem still in TC0 ) for fixed nilpotency class but an arbitrary number of generators? What happens to the complexity if also the nilpotency class is part of the input? Note that in that case it is even not clear whether the word problem is still in polynomial time. I Question 25. Is there a way to solve the conjugacy problem for nilpotent groups with binary exponents in TC0 ? Notice that we needed to compute greatest common divisors for solving the subgroup membership problem. However, there might be a way of solving the conjugacy problem using another method. I Question 26. What is the complexity of the uniform conjugacy problem when the nilpotency class is not fixed? TC0 circuits for algorithmic problems in nilpotent groups On the way for proving that the subgroup membership problem of nilpotent groups is in TC0 , we established that the extended gcd problem with unary inputs and outputs is in TC0 . However, the computed solution is not as small as the one computed by the LOGSPACE algorithm from [17]: I Question 27. Is the following problem in TC0 : given unary encoded numbers a1 , . . . , an โˆˆ Z, compute x1 , . . . , xn โˆˆ Z with |xi | โ‰ค 12 max {|a1 | , . . . , |an |} such that x1 a1 + ยท ยท ยท + xn an = gcd(a1 , . . . , an )? References 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 N. Blackburn. Conjugacy in nilpotent groups. Proceedings of the American Mathematical Society, 16(1):143โ€“148, 1965. W. W. Boone. The Word Problem. Ann. of Math., 70(2):207โ€“265, 1959. M. Dehn. รœber unendliche diskontinuierliche Gruppen. Math. Ann., 71(1):116โ€“144, 1911. B. Eick and D. Kahrobaei. Polycyclic groups: A new platform for cryptology? ArXiv Mathematics e-prints, 2004. M. Elberfeld, A. Jakoby, and T. Tantau. Algorithmic meta theorems for circuit classes of constant and logarithmic depth. Electronic Colloquium on Computational Complexity (ECCC), 18:128, 2011. A. Garreta, A. Miasnikov, and D. Ovchinnikov. Properties of random nilpotent groups. ArXiv e-prints, Dec. 2016. P. Hall. The Edmonton notes on nilpotent groups. Queen Mary College Mathematics Notes. Mathematics Department, Queen Mary College, London, 1969. W. Hesse. Division is in uniform TC0 . In F. Orejas, P. G. Spirakis, and J. van Leeuwen, editors, ICALP, volume 2076 of Lecture Notes in Computer Science, pages 104โ€“114. Springer, 2001. W. Hesse, E. Allender, and D. A. M. Barrington. Uniform constant-depth threshold circuits for division and iterated multiplication. J. Comput. Syst. Sci., 65:695โ€“716, 2002. M. I. Kargapolov and J. I. Merzljakov. Fundamentals of the theory of groups, volume 62 of Graduate Texts in Mathematics. Springer-Verlag, New York, 1979. Translated from the second Russian edition by Robert G. Burns. M. I. Kargapolov, V. N. Remeslennikov, N. S. Romanovskii, V. A. Romanโ€™kov, and V. A. ฤŒurkin. Algorithmic questions for ฯƒ-powered groups. Algebra i Logika, 8:643โ€“659, 1969. D. Kรถnig and M. Lohrey. Evaluating matrix circuits. In Computing and combinatorics, volume 9198 of Lecture Notes in Comput. Sci., pages 235โ€“248. Springer, Cham, 2015. K. Lange and P. McKenzie. On the complexity of free monoid morphisms. In K. Chwa and O. H. Ibarra, editors, Algorithms and Computation, 9th International Symposium, ISAAC โ€™98, Taejon, Korea, December 14-16, 1998, Proceedings, volume 1533 of Lecture Notes in Computer Science, pages 247โ€“256. Springer, 1998. C. R. Leedham-Green and L. H. Soicher. Symbolic collection using Deep Thought. LMS J. Comput. Math., 1:9โ€“24 (electronic), 1998. R. J. Lipton and Y. Zalcstein. Word problems solvable in logspace. J. ACM, 24(3):522โ€“526, July 1977. J. MacDonald, A. G. Myasnikov, A. Nikolaev, and S. Vassileva. Logspace and compressedword computations in nilpotent groups. CoRR, abs/1503.03888, 2015. B. S. Majewski and G. Havas. The complexity of greatest common divisor computations. In Algorithmic number theory (Ithaca, NY, 1994), volume 877 of Lecture Notes in Comput. Sci., pages 184โ€“193. Springer, Berlin, 1994. A. Malโ€™cev. On homomorphisms onto finite groups. Transl., Ser. 2, Am. Math. Soc., 119:67โ€“79, 1983. Translation from Uch. Zap. Ivanov. Gos. Pedagog Inst. 18, 49-60 (1958). 23 24 A. Myasnikov, A. WeiรŸ 19 20 21 22 23 24 25 26 A. Miasnikov, S. Vassileva, and A. WeiรŸ. The conjugacy problem in free solvable groups and wreath product of abelian groups is in TC0 . In P. Weil, editor, Computer Science - Theory and Applications - 12th International Computer Science Symposium in Russia, CSR 2017, Kazan, Russia, June 8-12, 2017, Proceedings, volume 10304 of Lecture Notes in Computer Science, pages 217โ€“231. Springer, 2017. A. Mostowski. Computational algorithms for deciding some problems for nilpotent groups. Fundamenta Mathematicae, 59(2):137โ€“152, 1966. A. Myasnikov, A. Nikolaev, and A. Ushakov. The Post correspondence problem in groups. J. Group Theory, 17(6):991โ€“1008, 2014. A. Myasnikov, A. Nikolaev, and A. Ushakov. Non-commutative lattice problems. J. Group Theory, 19(3):455โ€“475, 2016. P. S. Novikov. On the algorithmic unsolvability of the word problem in group theory. Trudy Mat. Inst. Steklov, pages 1โ€“143, 1955. In Russian. D. Robinson. Parallel Algorithms for Group Word Problems. PhD thesis, University of California, San Diego, 1993. C. C. Sims. Computation with finitely presented groups, volume 48 of Encyclopedia of Mathematics and its Applications. Cambridge University Press, Cambridge, 1994. H. Vollmer. Introduction to Circuit Complexity. Springer, Berlin, 1999.
4math.GR
arXiv:1802.01730v1 [cs.MA] 5 Feb 2018 Local Wealth Redistribution Promotes Cooperation in Multiagent Systems Flรกvio L. Pinheiro Fernando P. Santos Collective Learning Group, The MIT Media Lab Massachusetts Institute of Technology, 22 Ames Street, Cambridge, Massachusetts [email protected] INESC-ID and Instituto Superior Tรฉcnico, Universidade de Lisboa 2744-016 Porto Salvo, Portugal [email protected] ABSTRACT Designing mechanisms that leverage cooperation between agents has been a long-lasting goal in Multiagent Systems. The task is especially challenging when agents are selfish, lack common goals and face social dilemmas, i.e., situations in which individual interest conflicts with social welfare. Past works explored mechanisms that explain cooperation in biological and social systems, providing important clues for the aim of designing cooperative artificial societies. In particular, several works show that cooperation is able to emerge when specific network structures underlie agentsโ€™ interactions. Notwithstanding, social dilemmas in which defection is highly tempting still pose challenges concerning the effective sustainability of cooperation. Here we propose a new redistribution mechanism that can be applied in structured populations of agents. Importantly, we show that, when implemented locally (i.e., agents share a fraction of their wealth surplus with their nearest neighbors), redistribution excels in promoting cooperation under regimes where, before, only defection prevailed. CCS CONCEPTS โ€ข Computing methodologies โ†’ Multi-agent systems; Cooperation and coordination; KEYWORDS Emergent behaviour; Social networks; Social simulation; Simulation of complex systems; Cooperation 1 INTRODUCTION Explaining cooperation among selfish and unrelated individuals has been a central topic in evolutionary biology and social sciences [23]. Simultaneously, the challenge of designing cooperative Multiagent Systems (MAS) has been a long standing goal of researchers in artificial intelligence (AI) [10, 19]. More than thirty years ago it was already clear that โ€Intelligent agents will inevitably need to interact flexibly with other entities. The existence of conflicting goals will Proc. of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2018), M. Dastani, G. Sukthankar, E. Andre, S. Koenig (eds.), July 2018, Stockholm, Sweden ยฉ 2018 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved. This is the authorโ€™s version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings of Proc. of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2018), M. Dastani, G. Sukthankar, E. Andre, S. Koenig (eds.), July 2018, https://doi.org/doi. need to be handled by these automated agents, just as it is routinely handled by humans.โ€œ [10]. In Cooperative multiagent interactions, agents need to collaborate towards common goals, which introduces challenges associated with coordination, communication and teamwork modeling [19, 28]. Self-interested interactions, in contrast, require the design of indirect incentive schemes that motivate selfish agents to cooperate in a sustainable way [7, 19]. Cooperation is often framed as an altruistic act that requires an agent to pay a cost (c) in order to generate a benefit (b) to another. Refusing to incur in such a cost is associated with an act of defection and results in no benefits generated. Whenever the benefit exceeds the cost (b > c) and plays occur simultaneously, agents face the Prisonerโ€™s Dilemma, a decisionmaking challenge that embodies a fundamental social dilemma within MAS [21]: rational agents pursuing their self-interests are expected to defect, while the optimal collective outcome requires cooperation. If defection is the likely decision of rational agents, however, how can we justify the ubiquity of cooperation in the real world? Evolutionary biology has pursued this fundamental question by searching for additional evolutionary mechanisms that might help to explain the emergence of cooperative behavior [22, 23]. Some of these mechanisms allowed to develop solutions that found applications in computer science, such as informing about ways of incentivizing cooperation in p2p networks [9, 11], wireless sensor networks [2], robotics [47] or resource allocation and distributed work systems [43] โ€“ to name a few. Network reciprocity is one of the most popular mechanisms to explain the evolution of cooperation in social and biological systems [24, 26, 30โ€“32, 38]. In this context, populations are structured and interactions among agents are constrained. These constraints are often modelled by means of a complex network of interactions. Applications of this mechanism have been explored in the design of MAS that reach high levels of cooperation [1, 17, 29, 34]. Despite these advances, cooperation on structured populations is still hard to achieve when considering social dilemmas with high levels of temptation to defect. Additional complementary mechanisms are required. Here we consider that agents contribute a percentage of their surplus (defined below), which is later divided among a Beneficiary Set of other agents. In this context, we aim at answering the following questions: โ€ข Does redistribution of wealth promote the evolution of cooperation? โ€ข How should Beneficiary Sets be selected? โ€ข What are the potential disadvantages of such a mechanism? AAMASโ€™18, July 2018, Stockholm, Sweden Using methods from Evolutionary Game Theory (EGT) [44] and resorting to computer simulations, we explore how wealth redistribution impacts the evolution of cooperation on a population of agents without memory (i.e. unable to recall past interactions) and rationally bounded (i.e. lacking full information on payoff structure of the game they are engaging). We assume that agents resort to social learning through peer imitation, which proves to be a predominant adaptation scheme employed by humans [36]. Also, we consider that strategies are binary โ€“ Cooperate and Defect โ€“ opting to focus our attention on the complexity provided by 1) heterogeneous populations, 2) the redistribution mechanism and 3) the self-organizing process of agents when adapting over time. The role of larger strategy spaces (such as in [29, 34, 41]) lies outside the scope of the present work. With redistribution, we show that cooperation emerges in a parameter region where previously it was absent. Moreover, we show that the optimal choice of redistributing groups consists in picking the nearest neighbors (local redistribution). This result fits with a local and polycentric view of incentive mechanisms [27, 46] in MAS, which may not only be easier to implement but, as we show, establish an optimal scale of interaction in terms of eliciting cooperation. 2 RELATED WORK The problem of Cooperation is a broad and intrinsically multidisciplinary topic, which has been part of the MAS research agenda for a long time [10, 19]. In the realm of evolutionary biology, several mechanisms were proposed to explain the evolution of cooperation [22]. Kin selection [13], direct reciprocity [45], indirect reciprocity [25, 42] and network reciprocity [26, 38] constitute some of the most important mechanisms proposed. Remarkably, these mechanisms have been applied in AI in order to design MAS in which cooperation emerges. For example, Waibel et al. associated kin selection with evolutionary robotics [47]; Griffiths employed indirect reciprocity to promote cooperation in p2p networks while Ho et al. investigated the social norms that, through a system of reputations and indirect reciprocity, promote cooperation in crowdsourcing markets [12, 16]. Similarly, Peleteiro et al. combined indirect reciprocity with complex networks to design a MAS where, again, cooperation is able to emerge [29]. On top of that, Han applied EGT โ€“ as performed in our study โ€“ in order to investigate the role of punishment and commitments in multiagent cooperation, both in pairwise [14] and group interactions [15]. Regarding alternative agent-oriented approaches to sustain cooperation in MAS, we shall underline the role of electronic institutions [4, 8] whereby agentsโ€™ actions are explicitly constrained so that desirable collective behaviors can be engineered. The role of population structure and network reciprocity is, in this context, a prolific area of research. In [31] it was shown that complex networks are able to fundamentally change the dilemma at stake, depending on the particular topology considered [18, 31]; Ranjbar-Sahraei et al. applied tools from control theory in order to study the role of complex networks on the evolution of cooperation [34]. Importantly, the role of dynamic networks โ€“ i.e., agents are able to rewire their links โ€“ was also shown to significantly improve the levels of cooperation, especially in networks with a high average Flรกvio L. Pinheiro and Fernando P. Santos degree of connectivity [32, 39]. A survey on the topic of complex networks and the emergence of cooperation in MAS can be accessed in [17]. Previous works found that cooperation in structured population substantially decreases when the temptation to defect increases (see Model for a proper definition of Temptation). Thereby, here we contribute with an additional mechanism of cooperation on structured populations. We consider a mechanism of redistribution, inspired in the wealth redistribution mechanisms that prevail in modern economic/political systems, mainly through taxation. We are particularly interested in understanding how to sample redistribution groups in an effective way. In this context, we shall underline the works of Salazar et al. and Burguillo-Rial, in which a system of taxes and coalitions was shown to promote cooperation on complex networks [37] and regular grids [5]. While [37] and [5] do an excellent job showing how coalitions โ€“ leaded by a single agent โ€“ emerge, here we consider a simpler/decentralized model (e.g. no leaders are considered and taxes are redistributed rather than centralized in a single entity) and focus our analysis on showing that local redistribution sets are optimal. Our approach does not require additional means of reciprocity, memory, leadership, punishment or knowledge about features of the network. We cover a wide range of dilemma strengths and explicitly show when the local redistribution promotes cooperation by itself. Notwithstanding, the analysis performed in [37] and [5] surely provides important insights to address in future works, on how to explicitly model the adherence to beneficiary sets and guarantee their stability. Also, while here we assume an egalitarian redistribution over each individual in the Beneficiary Set, we shall note that different redistribution heuristics may imply different levels of allocation fairness [33]. In this context, a recent work introduces the concept of Distributed Distributed Justice [20] and shows that local interactions may provide a reliable basis to build trust and reputation between agents, which can be used to regulate, in a decentralized way, the levels of justice in agentsโ€™ actions. This way, it is rewarding to note that local interactions not only constitute an optimal scale to form cooperative Beneficiary Sets (as we show, see below), but also provide the convenient interaction environment to allow justice in contributions to be sustained. 3 MODEL 3.1 Three Stage Redistribution Game Here we propose a sequential game dynamics made of three stages. Focusing on an arbitrary agent i, these stages can be described as follows: (1) Agent i participates in a one-shot game (here a Prisonerโ€™s Dilemma) with all his/her neighbors j. From each interaction j, he/she obtains a payoff ฯ€i, j . After all interactions, agent i ร accumulates a total payoff ฮ i = j ฯ€i, j ; (2) Next, agent i contributes a fraction ฮฑ of his/her payoff surplus (ฮ i โˆ’ ฮธ ) to be redistributed. The group that benefits from agent i contribution is called Beneficiary Set i (Bi ). (3) Finally, agent i receives his/her share from each Beneficiary Set that he/she is part of. We refer to ฮฑ as the level of taxation, as it defines the fraction of the surplus that agents contribute, while ฮธ is the threshold level of Local Wealth Redistribution Promotes Cooperation in Multiagent Systems critical level of taxation, โบ* 1.0 0.8 ๐œƒ=0 .99 AAMASโ€™18, July 2018, Stockholm, Sweden a) .90 ๐œƒ=0 ๐œƒ=0 0.6 .75 .50 ๐œƒ=0 5 .2 ๐œƒ=0 0 ๐œƒ = 0.0 0.4 0.2 b) homogeneous network c) 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Temptation parameter, T 1.8 1.9 2.0 Figure 1: Solutions for the two-person game with wealth redistribution. Each curve indicates the critical taxation levels (ฮฑ โˆ— ) above which the nature of the social dilemma changes, for different payoff thresholds (ฮธ ) and as a function of the Temptation parameter (T ). payoff that defines the surplus. By definition, agents with negative payoff cannot contribute (i.e., ฮธ > 0); they might, however, receive benefits from the Beneficiary Sets. Each agent i contributes only to one Beneficiary Set Bi from which they cannot be part of, that is, agents do not receive from the Beneficiary Set they contribute to. A central question of this work is how to select Bi for each i. As we show, this decision has a profound and non-trivial impact on the overall cooperation levels in the system. 3.2 single peak over hzi fraction of nodes 1.0 fraction of nodes 0.0 Heterogeneous Network d) degree (z) D(z) โ‡ก z degree (z) Figure 2: Graphical depiction of the specific structures used in this work. a) Homogeneous Networks correspond to a structure in which all nodes have the same degree. b) Heterogeneous Networks are characterized by a high variance among the degree of nodes. The color of each node indicates its degree: blue tones represent lower degree and red tones higher degree. Panel c) and d) show, respectively, the degree distributions of the Homogeneous and Heterogeneous networks under analysis. In particular, we use scale-free networks as representatives of heterogeneous structures; these have a degree distribution that decays as a power law. The Prisonerโ€™s Dilemma Game In general, all the possible outcomes of a two-strategy two-player game, in which two agents engage in a one-shot interaction that requires them to decide โ€“ independently and simultaneously โ€“ whether they wish to Cooperate (C) or to Defect (D), can be summarized in a payoff matrix, such as C D C R S D T P which reads as the payoff obtained by playing the row strategy when facing an opponent with the column strategy. Here, R represents the Reward payoff for mutual cooperation and P the Punishment for mutual defection. When one of the individuals Defects and the other Cooperates, the first receives the Temptation payoff (T ) while the second obtains the Suckerโ€™s payoff (S). In this manuscript we consider that agents interact according to the Prisonerโ€™s Dilemma (PD). Agents are said to face a PD whenever the relationship between the payoffs is such that T > R > P > S [44]. In such a scenario, rational agents seeking to optimize their self-returns are expected to always Defect. However, since the best aggregated outcome would have both players cooperating (2R > 2P), agents are said to face a social dilemma: optimizing self-returns clashes with optimizing the social outcome. In this sense, mutual cooperation is Pareto Optimal and contributes to increase both average payoff (over mutual defection) and egalitarian social welfare (over unilateral cooperation) [6]. It is noteworthy to mention that other situations โ€“ with different optimal rational responses โ€“ arise when the parameters take a different relationship [21]: the Stag Hunt game when R > T > P > S; the Snowdrift Game when T > R > S > P; the Harmony Game when R > T > S > P; or the Deadlock Game when T > P > R > S, to name a few. Notwithstanding, the PD is by far the most popular metaphor of social dilemmas [44] and the one that presents the biggest challenge for cooperation to emerge. For these reasons, PD shall be the main focus of study in this manuscript. We further simplify the parameter space by considering that R = 1, P = 0, S = 1 โˆ’ T and 1 < T โ‰ค 2 with the game being fully determined by the Temptation value (T). In that sense, higher temptation creates more stringent conditions for the emergence of cooperation. 3.3 Prisonerโ€™s Dilemma with Wealth Redistribution As an introductory example, let us start by analyzing the particular case of two interacting agents (i and j) in a one-shot event. In this case, the Beneficiary Sets of each agent (Bi and B j ) are composed only by the opponent. Wealth/payoff redistribution can thus be analyzed by considering a slightly modified payoff matrix, that takes into account the second and third stages. The resulting payoff matrix becomes C D C 1 1 โˆ’ T + ฮฑ(T โˆ’ ฮธ ) D T โˆ’ ฮฑ(T โˆ’ ฮธ ) 0 AAMASโ€™18, July 2018, Stockholm, Sweden Flรกvio L. Pinheiro and Fernando P. Santos (2) Hence, depending on the choice of ฮธ and for a given T , ฮฑ โˆ— is the minimum level of taxation required to observe a change in the nature of the game faced by agents. It is straightforward to notice that the nature of the game changes from a Prisonerโ€™s Dilemma to an Harmony Game as the relationship moves from T > R > P > S to R > T > S > P. Figure 1 shows ฮฑ โˆ— for different values of T and ฮธ . Clearly, in well-mixed populations and under the simple scenario of a MAS composed by two agents, the redistribution mechanism has the simple effect of reshaping the payoff matrix, trivially changing the nature of the dilemma. Such a trivial conclusion cannot be drawn with large populations playing on networks, where we will show that different ways of assigning the Beneficiary Sets have a profound impact on the ensuing levels of cooperation. 3.4 1.00 Structured Populations Let us consider a population of Z agents in which agents correspond to the nodes/vertices of a complex network, while links dictate who interacts with whom. The structure reflects the existence of constraints that limit interactions between agents. These constraints can arise from spatial or communication limitations. The number of interactions that each agent i participates in defines his/her degree zi . The distribution of degrees, D(z), describes the fraction of agents that has degree z. In this work we consider two structures: Homogeneous Random Graphs [40, 41] and ScaleFree Barabรกsi Networks [3]. Homogeneous Random Graphs are generated by successively randomizing the ends of pairs of links from an initially regular graph (e.g. Lattice or Ring). The resulting structure has a random interaction structure but all nodes in the network have the same degree. Figure 2a) depicts graphically an example of such structures and Figure 2c) the corresponding Degree distribution. Scale-free networks are generated by an algorithm of growth and preferential attachment [3]. This algorithm is as follows: 1) start from three fully connected nodes; 2) add, sequentially, each of the Z โˆ’ m remaining nodes; 3) each time a new node is added, it connects to m pre-existing nodes, selecting preferentially nodes level of cooperation 0.8 0.7 0.6 0.5 0.4 0.3 ๐œƒ = 1.00 0.2 0.1 0.0 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 0.75 0.50 0.25 0.00 1.8 1.9 2.0 Temptation Parameter, T b) Heterogeneous 1.0 0.9 1.00 0.8 level of cooperation T โˆ’1 ฮฑ > (T โˆ’ ฮธ ) 1.0 (1) which results in the critical values of ฮฑ, โˆ— Homogeneous 0.9 level of taxation, โบ T โˆ’ ฮฑ(T โˆ’ ฮธ ) < 1 a) level of taxation, โบ where ฮธ is the payoff threshold and ฮฑ is the level of taxation. The rationale to arrive at this payoff structure is the following: whenever both players choose to act the same way the payoff remains the same as their contributions (from taxes) and benefits (from receiving the contributions of their opponent) cancel out. A Defector playing against a Cooperator sees his payoff of T subtracted by an amount ฮฑ(T โˆ’ ฮธ ) while not receiving any benefit, since the Cooperator has negative payoff and does not contribute. Likewise, the Cooperator is exempt from contributing but receives an additional contribution of ฮฑ(T โˆ’ ฮธ ), which represents the amount taxed to the Defector. To inspect whether wealth redistribution changes the nature of the social dilemma (i.e. from a Prisonerโ€™s Dilemma to another type of game) we have to inspect whether there is a difference in the relationship between the payoffs R and T or P and S. This sums up to solving a single inequality, 0.7 0.6 0.5 0.4 0.3 ๐œƒ = 1.00 0.2 0.1 0.0 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 0.75 0.50 0.25 0.00 1.8 1.9 2.0 Temptation Parameter, T Figure 3: Level of Cooperation on Homogeneous Random Networks (a) and Heterogeneous (Scale-free) Networks (b). Each plot shows the level of cooperation under a different combination of taxation level, ฮฑ, and Temptation, T . In all cases the fitness threshold is fixed at ฮธ = R = 1.0. Blue indicates regions where Cooperation dominates, Red delimits regions dominated by Defectors. Top bars above each panel indicate the level of cooperation in the absence of wealth redistribution, as a function of the Temptation payoff parameter. The level of cooperation is computed by estimating the expected fraction of cooperators when the population reaches a stationary state. To that end we run 104 independent simulations that start with 50% cooperators and 50% defectors. Population size of Z = 103 and intensity of selection ฮฒ = 1.0. with higher degree. Here we have used m = 3 The resulting network is characterized by a heterogeneous degree distribution (one which decays as a power law), in which the majority of the nodes have few connections while a few have many. Figure 2b) shows a graphical example of such structure and Figure 2d) the degree distribution. In the following we explore the case of networks with Z = 103 ร nodes and average degree of โŸจzโŸฉ = z zD(z) = 4. During the Local Wealth Redistribution Promotes Cooperation in Multiagent Systems Heterogeneous a) AAMASโ€™18, July 2018, Stockholm, Sweden [๐œƒ = 0.80, โบ = 0.50] 1.0 1.0 0.8 0.8 level of cooperation Level of Cooperation Heterogeneous a) [โบ=0.5] 0.6 0.4 No Wealth Redistribution 0.2 Nearest Neighbors (d = 1) 0.6 Random Group 0.4 0.2 0.0 0.0 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.0 2.0 1.1 1.2 1.3 Homogeneous b) 1.4 1.5 1.6 1.7 1.8 1.9 2.0 1.9 2.0 Temptation parameter, T Temptation Parameter, T Homogeneous [๐œƒ = 1.00, โบ = 0.90] b) [โบ=0.8] 1.0 1.0 0.6 0.4 Nearest Neighbors (d = 1) 0.8 ๐œƒ = 0.0 ๐œƒ = 0.4 ๐œƒ = 0.8 ๐œƒ = 1.2 ๐œƒ = 1.6 ๐œƒ = 2.0 level of cooperation Level of Cooperation Legend 0.8 0.6 0.4 Random Group 0.2 0.2 0.0 0.0 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.0 2.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 Temptation parameter, T Temptation Parameter, T Figure 4: Level of cooperation on Heterogeneous (a) and Homogeneous (b) populations for different values of the payoff threshold (ฮธ ) as a function of the Temptation payoff parameter (T ). Gray Dashed line shows the results obtained in the absence of a wealth redistribution scheme. Population size of Z = 103 and intensity of selection ฮฒ = 1.0. Figure 5: Comparison between the effects of assigning the nearest neighbors of an agent i to the corresponding Beneficiary Set Bi (dark blue line) and when agents are assigned at random to Bi (light blue), on the level of cooperation in the domain of the Temptation payoff parameter, T. Panel a) shows the results on Heterogeneous populations and panel b) the impact on Homogeneous populations. Population size of Z = 103 and intensity of selection ฮฒ = 1.0. simulations we make use of 20 independently generated networks of each type. 3.5 Games on Networks We study the expected level of cooperation attained by the population. We estimate this quantity through computer simulations. The level of cooperation corresponds to the expected fraction of cooperators in a population that evolved after 2.5 ร— 106 iterations. We estimate this quantity by averaging the observed fraction of cooperators at the final of each simulation, over 104 independent simulations. Each simulation starts from a population with an equal composition of Cooperators and Defectors, which are randomly placed along the nodes of the network. In between each update round, each agent i plays once with all his/her zi nearest neighbors (i.e., agents they are directly connected with). The accumulated payoff over all interactions an agent i participates can be computed as D C ฮ  i = nC i T โˆ’ ฯƒi (1 โˆ’ T )(ni + ni ) (3) where niD (nC i ) is the number of neighbors of i that Defect (Cooperate) and ฯƒi is equal to 1 if i is a Cooperator and 0 otherwise. From the accumulated payoff, agents contribute to a pool a fraction ฮฑ of the surplus ฮ  โˆ’ ฮธ . The fitness fi of an agent i results from subtracting from his/her accumulated payoff his/her contributions plus the share he/she obtains from each of the Beneficiary Sets j he/she participates in. We shall underline that, while T is the same for all agents (that is, the dilemma is the same for everyone in the population), heterogeneous populations introduce an additional complexity layer by implying that different agents may vary in the maximum values of accumulated payoff that they are able to earn. This can be formalized as fi = (1 โˆ’ ฮฑ)(ฮ i โˆ’ ฮธ ) + Z ร• j ฮดi, j ฮฑ(ฮ  j โˆ’ ฮธ ) |B j | (4) where ฮดi, j is equal to one if i is part of the Beneficiary Set towards which j contributes and zero otherwise, while |B j | denotes the size of set B j . Evolution in the frequency of strategies adopted in the population happens through a process of imitation or social learning. At each iteration a random agent, say i, compares his fitness with the AAMASโ€™18, July 2018, Stockholm, Sweden Flรกvio L. Pinheiro and Fernando P. Santos fitness of a neighbor, say j. Depending on the fitness difference, i adopts the strategy of j with probability Heterogeneous [๐œƒ = 0.8, โบ = 0.50] a) p= 1 1 + Exp(โˆ’ฮฒ(f j โˆ’ fi )) level of cooperation 1.0 (5) The meaning of this sigmoid function can be understood as follows: if j is performing much better than i, then i updates his/her strategy, adopting the strategy of j. Conversely, if j is performing much worse, i does not update the strategy. The parameter ฮฒ, often called the intensity of selection and akin to a learning rate, dictates how sharp is the transition between these two regimes, as f j โˆ’ fi approaches zero. Large ฮฒ means that individuals act in a more deterministic way, updating strategies at the minimum difference; small ฮฒ means that individuals are prone to make imitation mistakes. Nearest Neighbors (d = 1) d=2 0.6 d=4 0.4 Legend d=1 d=2 d=3 d=4 0.2 0.0 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0 Temptation parameter, T Homogeneous [๐œƒ = 1.0, โบ = 0.90] b) level of cooperation 1.0 4 RESULTS 4.1 Wealth Redistribution and the Level of Cooperation in Structured Populations In this section we start by analyzing the scenario in which the Beneficiary Set of each agent i corresponds to his/her nearest neighbors. Hence, the size of the Beneficiary set of i is |Bi | = zi . These are also the agents from whom he/she interacts with and obtains a payoff from. Figure 3 shows the achieved levels of cooperation when the payoff threshold is set to ฮธ = R = 1.0, as a function of the Temptation payoff (T ) and the level of taxation (ฮฑ). Figure 3a shows the results on Homogeneous networks, and Figure 3b on Heterogeneous. We find that, for a fixed payoff threshold (ฮธ ), increasing the level of taxation results in an increase in the levels of cooperation. This effect diminishes with an increase in the Temptation (T ). That is, when increasing T the minimum value of ฮฑ necessary to promote cooperation increases as well. The same behavior is observed in both structures. However, there is a larger degree of cooperation on Heterogeneous networks, where there is always a level of taxation for a given Temptation that guarantees a 100% level of cooperation. Hence, in order for cooperation to be evolutionary viable on homogeneous networks, more stringent conditions are necessary, e.g. higher tax levels. Figure 4 shows how the level of cooperation depends on variations of the fitness threshold (0 โ‰ค ฮธ โ‰ค 2.0, in intervals of 0.4) while keeping a fixed level of taxation (ฮฑ = 0.5) under different levels of the Temptation payoff (T ). Figure 4a shows the results obtained for Heterogeneous networks and panel b) the results on Homogeneous structures. For a constant level of taxation, ฮฑ, decreasing the payoff threshold, ฮธ , increases the range of Temptation, T , under which cooperation can possibly evolve. This is the case in both types of structures. However, once again, the effect is more limited in homogeneous populations. Both Figure 3 and 4 highlight the positive impact of a local wealth redistribution mechanism in the enhancement of cooperation. It also puts in evidence that the success of such mechanism depends on the volume of payoff that is redistributed. Ultimately, this can be done by either increasing the level of taxation, ฮฑ or decreasing the payoff threshold, ฮธ , that defines the taxable payoff. 0.8 0.8 Nearest Neighbors (d = 1) d=2 0.6 Legend d=3 0.4 d=1 d=2 d=3 d=4 0.2 0.0 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0 Temptation parameter, T Figure 6: Panel a) compares how extending beneficiary sets, from the nearest neighbors (d = 1) to nodes at a distance up to d = 4 links away, impacts the level of cooperation on Heterogeneous networks. Panel b) shows how extended beneficiary sets impact the level of cooperation on Homogeneous networks. In both cases extending the set of beneficiaries has a negative a negative impact in the levels of cooperation. Population size of Z = 103 and intensity of selection ฮฒ = 1.0. 4.2 Randomized Beneficiary Set Next we explore to which extent the results obtained depend on the way agents are being assigned to each Beneficiary Set. To that end, we compare two cases: i) nearest set assignment โ€“ the Beneficiary Set of each agent corresponds to her/his nearest neighbors, as above; and ii) random set assignment โ€“ agents are assigned at random to each Beneficiary Set. The number of agents assigned to each set is equal to the degree of the contributing agent, in both cases, which guarantees that the collected payoffs from each agent are distributed among the same number of individuals in both i) and ii). Figure 5a and b show the results obtained, respectively, on Heterogeneous and Homogeneous networks. We consider ฮธ = 0.5, ฮฑ = 0.9 and explore the domain 1.0 โ‰ค T โ‰ค 2. Dark blue curves show the results obtained under the nearest set assignment and light blue curves the results obtained under a random set assignment. The results show that the ability of a wealth redistribution mechanism lies in the redistribution of the taxed payoff among the agents that are spatially related. A random assignment of agents Local Wealth Redistribution Promotes Cooperation in Multiagent Systems a) 1.0 Homogeneous 0.9 number of generations level of taxation, ฮฑ 0.8 0.7 0.6 0.5 0.4 0.3 0.2 =1.0 0.1 1000 316 100 32 10 0.0 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0 Temptation Parameter, T b) 1.0 Heterogeneous 0.9 level of taxation, ฮฑ 0.7 0.6 0.5 0.4 0.3 0.2 = 1.0 0.1 number of generations 316 0.8 100 32 10 0.0 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0 Temptation Parameter, T Figure 7: Panel a) shows the fixation times (in generations) on homogeneous networks. Panel b) shows the fixation times (in generations) in heterogeneous networks. A generation corresponds to Z iteration steps and the fixation times indicate the expected time that the population takes to arrive to a state dominated by Cooperators or Defectors when starting from a state with equal abundance of both strategies. Population size of Z = 103 and intensity of selection ฮฒ = 1.0. drastically decreases the levels of cooperation obtained in both networks. But to which extent do the Beneficiary Sets need to be constrained spatially? 4.3 Extended Beneficiary Set To answer the previous question, we explore the case in which all nodes (up to a distance of d links) are assigned to the Beneficiary Set of a focal agent i; when d = 1 the previous results are thereby obtained. Figure 6a and b show the results up to d = 4 on Heterogeneous and Homogeneous networks respectively. In both cases, we see that an expansion in the size of the Beneficiary Set leads to a decrease in the levels of cooperation. This result further reinforces the AAMASโ€™18, July 2018, Stockholm, Sweden conclusion that wealth redistribution is only efficient when agents return, in form of taxes, a share of the accumulated payoffs to the agents they have engaged with. We shall underline that here both distance and size of Bi play a role on the obtained results, while in the previous section the size of Bi was kept constant for each i across the different treatments, thus disambiguating the effect of Bi size and distance on the resulting cooperation levels. 4.4 What is the cost of wealth redistribution? Figure 7a and b shows the fixation times of populations when ฮธ = 1.0 along the domain bounded by 0.0 โ‰ค ฮฑ โ‰ค 1.0 and 1.0 โ‰ค T โ‰ค 2.0. The fixation times correspond to the expected number of generations (i.e., sets of Z potential imitation steps) for the population to reach a state in which only one strategy is present in the population. These plots map directly into Figure 3a and b, allowing to compare the relative fixation times of regions with high/low levels of cooperation. We observe that the evolution of cooperation is associated with an increase in the fixation times. This increase can be in some situations an order of magnitude higher. The regions that exhibit larger fixation times lie in the critical boundary that divides areas of defectors and cooperators dominance (Figure 3). Hence, promoting cooperation by redistributing wealth also requires a longer waiting time for the population to reach a state of full cooperation. However, setting higher taxation values than the bare minimum necessary for the emergence of cooperation allows populations to reach fixation quicker. 4.5 Multiple Contribution Brackets In the real world, taxes are unlikely to be defined by a single threshold (ฮธ ) that separates agents who contribute from those that do not. In reality taxes are progressive, in the sense that taxation levels (ฮฑ) increase with increasing level of income (in this case accumulated payoff). In this section we implement a similar approach and inspect the impact of increasing the number of taxation brackets. Let us consider that, instead of a single threshold we now have B taxation brackets divided by B โˆ’ 1 threshold levels. For each bracket we define ฮฑb as the effective tax and ฮธb as the bottom threshold of bracket b, where b โˆˆ {0, 1, 2, ..., B โˆ’ 1, B}. By definition B = 0 corresponds to the case in which no taxes are collected, and the redistribution of wealth is absent. Moreover, B = 1, implies the existence of a single bracket were all individuals would contribute, a case that we do not explore in this manuscript. B = 2, corresponds to the case in which there are two brackets, which is the scenario that we have explored until now. We consider the case in which taxation increases linearly with increasing brackets. Let us define ฮธb = bฮธ /B. Individuals in bracket b have their payoff surplus taxed by ฮฑb = (b โˆ’ 1)ฮฑ/B when their accumulated payoff falls into ฮธb < ฮ  โ‰ค ฮธb+1 for b < B โˆ’ 1. For b = B the tax level is ฮฑb = ฮฑ and affects all individuals with ฮ  > ฮธ . As an example, for B = 3 each bracket would be characterized by the following tax levels b b b b = 0) = 1) = 2) = 3) ฮฑb ฮฑb ฮฑb ฮฑb = 0 for all individuals with ฮ  โ‰ค ฮธ /3; = ฮฑ/3 for all individuals with ฮธ /3 < ฮ  โ‰ค 2ฮธ /3; = 2ฮฑ/3 for all individuals with 2ฮธ /3 < ฮ  โ‰ค ฮธ ; = ฮฑ for all individuals with ฮ  > ฮธ . AAMASโ€™18, July 2018, Stockholm, Sweden Flรกvio L. Pinheiro and Fernando P. Santos 4.0 5 3.5 To sum up, we show that wealth redistribution embodies an effective mechanism that significantly helps cooperation to evolve. It works by fundamentally changing the nature of the dilemma at stake: by appropriately choosing the level of taxation (ฮฑ) and payoff threshold (ฮธ ) it is possible to shift from a Defector dominance to a Cooperator dominance dynamics. Moreover, we find that in Heterogeneous populations allow us to ease the redistribution mechanism โ€“ that is, imposing lower taxation rates and/or lower taxable surplus values when compared with Homogeneously structured populations. Additionally, we show, for the first time, that different assignments of Beneficiary Sets significantly impact the ensuing levels of cooperation. Local Beneficiary Sets, where agents receive the contributions from their direct neighbors, constitute a judicious choice when compared with Beneficiary Sets that are formed by 1) agents randomly picked from the population or 2) by including agents at higher distances. Naturally, a Local wealth redistribution scheme may not only prove optimal in terms of achieved cooperation levels, but also reveal much simpler to implement, by exempting the need of central redistribution entities and by minimizing the number of peers that agents need to interact with. We shall highlight, however, that promoting cooperation through a wealth redistribution mechanism bears longer fixation times, in terms of the number of iterations required to achieve overall cooperation. Here we assume that the redistribution mechanism is externally imposed. Agents are not able to opt out from the taxation scheme. Given that this mechanism increases the overall cooperation and average payoff in the system, an argument for its acceptance - by rational agents - can be formulated based on the infamous veil of ignorance proposed by John Rawls [35]: Agents should decide the kind of society they would like to live in without knowing their social position. Agents would, this way, prefer a cooperative society where redistribution exists, provided that here average payoff is maximized. Notwithstanding, future research shall analyze the role of more complex strategies that give opportunity of agents to voluntarily engage (or not) in the proposed redistribution scheme. Alongside, effective mechanisms that discourage the second order free riding problem (i.e., free riding by not contributing to the redistribution pot, while expecting others to do so) shall be examined. Future works shall also evaluate whether alternative taxation schemes are prone to be more efficient than the one proposed here. In all these cases, an evolutionary game theoretic framework โ€“ such as the one here developed โ€“ constitutes a promising toolkit to employ. ๏ฟฝ๏ฟฝ๏ฟฝ ๏ฟฝ๏ฟฝ๏ฟฝ ๏ฟฝ๏ฟฝ๏ฟฝ re as in g 2.0 Varf / Varp in eq ua lit y ๏ฟฝ๏ฟฝ๏ฟฝ 2.5 1.5 de c payoff threshold, ๐œƒ 3.0 ๏ฟฝ๏ฟฝ๏ฟฝ 1.0 0.5 2.0 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 level of taxation, โบ 0.8 0.9 1.0 Figure 8: Relative wealth inequality after the redistribution step, in a heterogeneous population dominated by cooperators and for different combinations of taxation level (ฮฑ) and threshold (ฮธ ). We quantify the relative wealth inequality after the redistribution step as the ratio between the variance of the fitness distribution (V ar f , i.e. variance in gains across the population after redistribution) and the variance of the accumulated payoff distribution (V arp , i.e. variance in gains before redistribution). Population size of Z = 103 and intensity of selection ฮฒ = 1.0. In this way we use ฮธ and ฮฑ as the upper level bound and only parameters in this condition. We find that variations in the number of taxation brackets (B=3,4,5) have only a marginal impact in the overall levels of cooperation observed when compared with the scenarios studied so far (B=2). 4.6 Wealth Inequality Finally, we discuss the effect of wealth redistribution on fitness inequality. First, it is important to highlight that the observed levels of inequality depend, by default, on the distribution of strategies and network degree. In homogeneous structures, if every agent adopts the same strategy โ€“ either Defectors or Cooperators โ€“ everyone obtains the same fitness. In heterogeneous structures, a Cooperation dominance scenario bounds the feasible equality levels, given the degree distribution of the population. In fact, some agents engage in more interactions than others and Beneficiary Sets have different sizes, depending on the particular connectivity of agents. We shall focus on this scenario. We compare the variance of fitness (i.e. gains after the redistribution step) and the variance of accumulated payoff (i.e. gains before the redistribution step) in order to quantify the relative inequality after we apply the proposed redistribution mechanism. In particular, we use the ratio between the variance of fitness and the variance of accumulated payoff as a metric of resulting wealth inequality. Figure 8 shows how higher levels of ฮธ and ฮฑ reduce the resulting inequality. In fact, while increasing payoff threshold limits taxation to the richer agents, increasing level of taxation increases the flow of fitness from rich agents to their Beneficiary Sets. In the most strict case โ€“ high ฮธ and ฮฑ โ€“ the variance of the fitness distribution is reduced to as low as 7% of the accumulated payoff distribution. 6 CONCLUSION ACKNOWLEDGMENTS The authors acknowledge the useful discussions with Francisco C. Santos, Jorge M. Pacheco and Aamena Alshamsi. F.L.P. is thankful to the Media Lab Consortium for financial support. F.P.S. acknowledges the financial support of Fundaรงรฃo para a Ciรชncia e Tecnologia (FCT) through PhD scholarship SFRH/BD/94736/2013, multi-annual funding of INESC-ID (UID/CEC/50021/2013) and grants PTDC/EEISII/5081/2014, PTDC/MAT/STA/3358/2014. Local Wealth Redistribution Promotes Cooperation in Multiagent Systems REFERENCES [1] Stรฉphane Airiau, Sandip Sen, and Daniel Villatoro. 2014. Emergence of conventions through social learning. Autonomous Agents and Multi-Agent Systems 28, 5 (2014), 779โ€“804. [2] Ian F Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. 2002. Wireless sensor networks: a survey. Computer Networks 38, 4 (2002), 393โ€“422. [3] Rรฉka Albert and Albert-Lรกszlรณ Barabรกsi. 2002. Statistical mechanics of complex networks. Reviews of Modern Physics 74, 1 (2002), 47. [4] Josep Ll Arcos, Marc Esteva, Pablo Noriega, Juan A Rodrรญguez-Aguilar, and Carles Sierra. 2005. Engineering open environments with electronic institutions. Engineering Applications of Artificial Intelligence 18, 2 (2005), 191โ€“204. [5] Juan C Burguillo-Rial. 2009. A memetic framework for describing and simulating spatial prisonerโ€™s dilemma with coalition formation. In Proceedings of AAAIโ€™09. AAAI Press, 441โ€“448. [6] Ulle Endriss and Nicolas Maudet. 2003. Welfare engineering in multiagent systems. In International Workshop on Engineering Societies in the Agents World. Springer, 93โ€“106. [7] Eithan Ephrati and Jeffrey S Rosenschein. 1996. Deriving consensus in multiagent systems. Artificial Intelligence 87, 1-2 (1996), 21โ€“74. [8] Marc Esteva, Bruno Rosell, Juan A Rodriguez-Aguilar, and Josep Ll Arcos. 2004. AMELI: An agent-based middleware for electronic institutions. In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems. IEEE Computer Society, 236โ€“243. [9] Michal Feldman and John Chuang. 2005. Overcoming free-riding behavior in peer-to-peer systems. ACM SIGecom Exchanges 5, 4 (2005), 41โ€“50. [10] Michael R Genesereth, Matthew L Ginsberg, and Jeffrey S Rosenschein. 1986. Cooperation without communication. In Proceedings of AAAIโ€™86. AAAI Press. [11] Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, and Mark Lillibridge. 2001. Incentives for sharing in peer-to-peer networks. In Electronic Commerce. Springer, 75โ€“87. [12] Nathan Griffiths. 2008. Tags and image scoring for robust cooperation. In Proceedings of the 2008 International Conference on Autonomous Agents and Multi-agent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 575โ€“582. [13] William D Hamilton. 1964. The genetical evolution of social behaviour. Journal of Theoretical Biology 7, 1 (1964), 17โ€“52. [14] TA Han. 2016. Emergence of Social Punishment and Cooperation through Prior Commitments. In Proceedings of AAAIโ€™16. AAAI Press, 2494โ€“2500. [15] TA Han, Luรญs Moniz Pereira, Luis A Martinez-Vaquero, and Tom Lenaerts. 2017. Centralized vs. Personalized Commitments and their influence on Cooperation in Group Interactions. In Proceedings of AAAIโ€™17. AAAI Press. [16] Chien-Ju Ho, Yu Zhang, Jennifer Vaughan, and Mihaela Van Der Schaar. 2012. Towards social norm design for crowdsourcing markets. In AAAIโ€™12 Technical Report WS-12-08. AAAI Press. [17] Lisa-Maria Hofmann, Nilanjan Chakraborty, and Katia Sycara. 2011. The evolution of cooperation in self-interested agent societies: a critical study. In Proceedings of the 2011 International Conference on Autonomous Agents and Multi-agent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 685โ€“692. [18] Genki Ichinose, Yoshiki Satotani, and Hiroki Sayama. 2017. How mutation alters fitness of cooperation in networked evolutionary games. arXiv preprint arXiv:1706.03013 (2017). [19] Nicholas R Jennings, Katia Sycara, and Michael Wooldridge. 1998. A roadmap of agent research and development. Autonomous Agents and Multi-agent Systems 1, 1 (1998), 7โ€“38. [20] David Burth Kurka and Jeremy Pitt. 2016. Distributed distributive justice. In Self-Adaptive and Self-Organizing Systems (SASO), 2016 IEEE 10th International Conference on. IEEE, 80โ€“89. [21] Michael W Macy and Andreas Flache. 2002. Learning dynamics in social dilemmas. Proceedings of the National Academy of Sciences 99 (2002), 7229โ€“7236. [22] Martin A Nowak. 2006. Five rules for the evolution of cooperation. Science 314, 5805 (2006), 1560โ€“1563. [23] Martin A Nowak. 2012. Evolving cooperation. Journal of Theoretical Biology 299 (2012), 1โ€“8. [24] Martin A Nowak and Robert M May. 1992. Evolutionary games and spatial chaos. Nature 359, 6398 (1992), 826โ€“829. [25] Martin A Nowak and Karl Sigmund. 2005. Evolution of indirect reciprocity. Nature (2005). [26] Hisashi Ohtsuki, Christoph Hauert, Erez Lieberman, and Martin A Nowak. 2006. A simple rule for the evolution of cooperation on graphs. Nature 441, 7092 (2006), 502. [27] Elinor Ostrom. 2015. Governing the commons. Cambridge University Press. [28] Liviu Panait and Sean Luke. 2005. Cooperative multi-agent learning: The state of the art. Autonomous Agents and Multi-agent Systems 11, 3 (2005), 387โ€“434. [29] Ana Peleteiro, Juan C Burguillo, and Siang Yew Chong. 2014. Exploring indirect reciprocity in complex networks using coalitions and rewiring. In Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems. [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] AAMASโ€™18, July 2018, Stockholm, Sweden International Foundation for Autonomous Agents and Multiagent Systems, 669โ€“ 676. Flรกvio L. Pinheiro and Dominik Hartmann. 2017. Intermediate Levels of Network Heterogeneity Provide the Best Evolutionary Outcomes. Scientific Reports 7, 1 (2017), 15242. Flavio L Pinheiro, Jorge M Pacheco, and Francisco C Santos. 2012. From local to global dilemmas in social networks. PloS ONE 7, 2 (2012), e32114. Flรกvio L Pinheiro, Francisco C Santos, and Jorge M Pacheco. 2016. Linking individual and collective behavior in adaptive social networks. Physical Review Letters 116, 12 (2016), 128702. Jeremy Pitt, Julia Schaumeier, Didac Busquets, and Sam Macbeth. 2012. Selforganising common-pool resource allocation and canons of distributive justice. In Self-Adaptive and Self-Organizing Systems (SASO), 2012 IEEE Sixth International Conference on. IEEE, 119โ€“128. Bijan Ranjbar-Sahraei, Haitham Bou Ammar, Daan Bloembergen, Karl Tuyls, and Gerhard Weiss. 2014. Theory of cooperation in complex social networks. In Proceedings of AAAIโ€™14. AAAI Press. John Rawls. 2009. A theory of justice. Harvard University Press. Luke Rendell, Robert Boyd, Daniel Cownden, Marquist Enquist, Kimmo Eriksson, Marc W Feldman, Laurel Fogarty, Stefano Ghirlanda, Timothy Lillicrap, and Kevin N Laland. 2010. Why copy others? Insights from the social learning strategies tournament. Science 328, 5975 (2010), 208โ€“213. Norman Salazar, Juan A Rodriguez-Aguilar, Josep Ll Arcos, Ana Peleteiro, and Juan C Burguillo-Rial. 2011. Emerging cooperation on complex networks. In Proceedings of the 2011 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 669โ€“676. Francisco C Santos and Jorge M Pacheco. 2005. Scale-free networks provide a unifying framework for the emergence of cooperation. Physical Review Letters 95, 9 (2005), 098104. Francisco C Santos, Jorge M Pacheco, and Tom Lenaerts. 2006. Cooperation prevails when individuals adjust their social ties. PLoS Computational Biology 2, 10 (2006), e140. Francisco C Santos, JF Rodrigues, and Jorge M Pacheco. 2005. Epidemic spreading and cooperation dynamics on homogeneous small-world networks. Physical Review E 72, 5 (2005), 056128. Fernando P Santos, Jorge M Pacheco, Ana Paiva, and Francisco C Santos. 2017. Structural power and the evolution of collective fairness in social networks. PloS ONE 12, 4 (2017), e0175687. Fernando P. Santos, Jorge M. Pacheco, and Francisco C. Santos. 2018. Social norms of cooperation with costly reputation building. In AAAIโ€™18. AAAI Press. Sven Seuken, Jie Tang, and David C Parkes. 2010. Accounting Mechanisms for Distributed Work Systems. In AAAIโ€™10. AAAI Press. Karl Sigmund. 2010. The calculus of selfishness. Princeton University Press. Robert L Trivers. 1971. The evolution of reciprocal altruism. The Quarterly Review of Biology 46, 1 (1971), 35โ€“57. Vรญtor V Vasconcelos, Francisco C Santos, and Jorge M Pacheco. 2015. Cooperation dynamics of polycentric climate governance. Mathematical Models and Methods in Applied Sciences 25, 13 (2015), 2503โ€“2517. Markus Waibel, Dario Floreano, and Laurent Keller. 2011. A quantitative test of Hamiltonโ€™s rule for the evolution of altruism. PLoS Biology 9, 5 (2011), e1000615.
2cs.AI
I/O-Efficient Generation of Massive Graphs Following the LFR Benchmarkโˆ— Michael Hamannโ€  , Ulrich Meyerโ€ก , Manuel Penschuckโ€ก , Hung Tranโ€ก , and Dorothea Wagnerโ€  โ€  Institute of Theoretical Informatics, Karlsruhe Institute of Technology, Am Fasanengarten 5, 76131 Karlsruhe, Germany arXiv:1604.08738v3 [cs.DS] 14 Jun 2017 {michael.hamann, dorothea.wagner}@kit.edu โ€ก Institute for Computer Science, Goethe-University Frankfurt, Robert-Mayer-StraรŸe 11-15, 60325 Frankfurt am Main, Germany {umeyer, htran, mpenschuck}@ae.cs.uni-frankfurt.de June 15, 2017 Abstract LFR is a popular benchmark graph generator used to evaluate community detection algorithms. We present EM-LFR, the first external memory algorithm able to generate massive complex networks following the LFR benchmark. Its most expensive component is the generation of random graphs with prescribed degree sequences which can be divided into two steps: the graphs are first materialized deterministically using the Havel-Hakimi algorithm, and then randomized. Our main contributions are EM-HH and EM-ES, two I/Oefficient external memory algorithms for these two steps. We also propose EM-CM/ES, an alternative sampling scheme using the Configuration Model and rewiring steps to obtain a random simple graph. In an experimental evaluation we demonstrate their performance; our implementation is able to handle graphs with more than 37 billion edges on a single machine, is competitive with a massive parallel distributed algorithm, and is faster than a state-of-theart internal memory implementation even on instances fitting in main memory. EM-LFRโ€™s implementation is capable of generating large graph instances orders of magnitude faster than the original implementation. We give evidence that both implementations yield graphs with matching properties by applying clustering algorithms to generated instances. Similarly, we analyse the evolution of graph properties as EM-ES is executed on networks obtained with EM-CM/ES and find that the alternative approach can accelerate the sampling process. โˆ— This work was partially supported by the DFG under grants ME 2088/3-2, WA 654/22-2. Parts of this paper were published as [21]. 1 1 Introduction Complex networks, such as web graphs or social networks, are usually composed of communities, also called clusters, that are internally dense but externally sparsely connected. Finding these clusters, which can be disjoint or overlapping, is a common task in network analysis. A large number of algorithms trying to find meaningful clusters have been proposed (see [16, 22, 17] for an overview). Commonly synthetic benchmarks are used to evaluate and compare these clustering algorithms, since for most real-world networks it is unknown which communities they contain and which of them are actually detectable through structure [4, 17]. In the last years, the LFR benchmark [28, 27] has become a standard benchmark for such experimental studies, both for disjoint and for overlapping communities [14]. With the emergence of massive networks that cannot be handled in the main memory of a single computer, new clustering schemes have been proposed for advanced models of computation [9, 49]. Since such algorithms typically use hierarchical input representations, quality results of small benchmarks may not be generalizable to larger instances. To produce such large instances exceeding main memory, we propose a generator in the external memory (EM) model of computation that follows the LFR benchmark. The distributed CKB benchmark [11] is a step in a similar direction, however, it considers only overlapping clusters and uses a different model of communities. In contrast, our approach is a direct realization of the established LFR benchmark and supports both disjoint and overlapping clusters. 1.1 Random Graphs from a prescribed Degree Sequence In preliminary experiments, we identified the generation of random graphs with prescribed degree sequence as the main issue when transferring the LFR benchmark into an EM setting โ€” both in terms of algorithmic complexity and runtime. To do so, the LFR benchmark uses the fixed degree sequence model (FDSM), also known as edge-switching Markov-chain algorithm (e.g. [35]). It consists of a) generating a deterministic graph from a prescribed degree sequence and b) randomizing this graph using random edge switches. For each edge switch, two edges are chosen uniformly at random and two of the endpoints are swapped if the resulting graph is still simple (for details, see section 5). Each edge switch can be seen as a transition in a Markov chain. This Markov chain is irreducible [13], symmetric and aperiodic [18] and therefore converges to the uniform distribution. It also has been shown to converge in polynomial time if the maximum degree is not too large compared to the number of edges [19]. However, the analytical bound of the mixing time is impractically high even for comparably small graphs as it contains the sum of all degrees to the power of nine. Experimental results on the occurrence of certain motifs in networks [35] suggest that 100m steps should be more than enough where m is the number of edges. Further results for random connected graphs [18] suggest that the average and maximum path length and link load converge between 2m and 8m swaps. More recently, further theoretical arguments and experiments showed that 10m to 30m steps are enough [39]. A faster way to realize a given degree sequence is the Configuration Model. The problem here is that multi-edges and loops may be generated. In the Erased Configuration Model these illegal edges are deleted. However, doing so alters the graph properties since skewed degree distributions, necessary for the LFR benchmark, are not properly realized [43]. In this context the question arises whether edge switches starting from the Configuration Model can be used to uniformly sample simple graphs at random. 2 1.2 Our Contribution Our main contributions are the first external memory versions of the LFR benchmark and the FDSM. After defining our notation, we introduce the LFR benchmark in more detail and then focus on the FDSM. We describe the realization of the two steps of the classic FDSM, namely a) generating a deterministic graph from a prescribed degree sequence [EM-HH, section 4] and b) randomizing this graph using random edge switches [EM-ES, section 5]. These steps form a pipeline moving data from one algorithm to the next. In section 6, we describe the alternative approach EM-CM/ES generating uniform random simple graphs using the Configuration Model and edge rewiring. Sections 7, 8 and 9 describe algorithms for the remaining steps of the external memory LFR benchmark, EM-LFR. We conclude with an experimental evaluation of our algorithms and demonstrate that our EM version of the FDSM is faster than an existing internal memory implementation, scales well to large instances, and can compete with a distributed parallel algorithm. Further, we compare EM-LFR to the original LFR implementation and show that EM-LFR is significantly faster while producing equivalent networks in terms of community detection algorithm performance and graph properties. We also investigate the mixing time of EM-ES and EM-CM/ES, give evidence that our alternative sampling scheme quickly yields uniform samples and that the number of swaps suggested by the original LFR implementation can be kept for EM-LFR. 2 Preliminaries and Notation Define [k] := {1, . . . , k} for k โˆˆ N>0 . A graph G = (V, E) has n = |V | sequentially numbered nodes V = {v1 , . . . , vn } and m = |E| edges. Unless stated differently, graphs are assumed to be undirected and unweighted. It is called simple if it contains neither multi-edges nor self-loops. To obtain a unique representation of an undirected edge {u, v} โˆˆ E, we write [u, v] โˆˆ E where u โ‰ค v; in contrast to a directed edge, the ordering shall be used algorithmically but does not carry any meaning for the application. D = (d1 , . . . , dn ) is a degree sequence of graph G iff โˆ€vi {โˆˆ}V : deg(vi ) = di . We denote an integer powerlaw distribution with exponent โˆ’ฮณ โˆˆ R for ฮณ โ‰ฅ 1 and values between the limits a, b โˆˆ N>0 with a < b as Pld ([a, b), ฮณ). Let X be an integer random variable drawn from Pld ([a, b), ฮณ) then P[X=k] โˆ k โˆ’ฮณ (proportional to) if a โ‰ค k < b and P[X=k] = 0 otherwise. A statement depending on some number x > 0 is said to hold with high probability if it is satisfied with probability at least 1 โˆ’ 1/xc for some constant c โ‰ฅ 1. Also refer to Table 2 (Appendix) which contains a summary of commonly used definitions. 2.1 External-Memory Model We use the commonly accepted external memory model by Aggarwal and Vitter [1]. It features a two-level memory hierarchy with fast internal memory (IM) which may hold up to M data items, and a slow disk of unbounded size. The input and output of an algorithm are stored in EM while computation is only possible on values in IM. The measure of an algorithmโ€™s performance is the number of I/Os required. Each I/O transfers a block of B consecutive items between memory levels. Reading or writing n contiguous items from or to disk requires scan(n) = ฮ˜(n/B) I/Os. Sorting n consecutive items triggers sort(n) = ฮ˜((n/B) ยท logM/B (n/B)) I/Os. For all realistic values of n, B and M , scan(n) < sort(n)  n. Sorting complexity constitutes a lower bound for most intuitively non-trivial EM tasks [1, 34]. 3 Degrees, community sizes and memberships Sample intra- and inter-community edges Intra-community edge Inter-community edge Remove (rewire) illegal edges Community Figure 1: Left: Sample node degrees and community sizes from two powerlaw distributions. The mixing parameter ยต determines the fraction of the inter-community edges. Then, assign each node to sufficiently large communities. Center: Sample intra-community graphs and inter-community edges. Right: Lastly, remove illegal inter-community edges respective to the global graph. 2.2 Time Forward Processing Let A be an algorithm performing discrete events over time (e.g., iterations of a loop) that produce values which are reused by following events. The data dependencies of A can be modeled using a directed acyclic graph G=(V, E) where every node v โˆˆ V corresponds to an event [31]. The edge (u, v) โˆˆ E indicates that the value produced by u will be required by v. When computing a solution, the algorithm traverses G in some topological order. For simplicity, we assume G to be already ordered, i.e. โˆ€ (u, v) โˆˆ E : u < v. Then, the Time Forward Processing (TFP) technique uses a minimum priority queue (PQ) to provide the means to transport data as implied by G: iterate over the events in increasing order and receive for each u the messages sent to it by claiming and removing all items with priority u from the PQ. Inductively, these messages have minimal priority amongst all items stored in the PQ. The event then computes its result xu and sends it to every successor v by inserting xu into the PQ with priority v. Using a suited EM PQ [3, 42], TFP incurs O(sort(k)) I/Os, where k is the number of messages sent. 3 The LFR Benchmark The LFR benchmark [28] describes a generator for random graphs featuring a planted community structure, a powerlaw degree distribution, and a powerlaw community size distribution. A revised version [27] also introduces weighted and directed graphs with overlapping communities. We consider the most commonly used versions with unweighted, undirected graphs and possibly overlapping communities. All its parameters are listed in Table 1 and are fully supported by EM-LFR. The revised generator [27] changes the original algorithm [28] even for the initial scenario of unweighted, undirected graphs and non-overlapping communities. Here, we describe the more recent approach which is also used in the authorโ€™s implementation: initially, the degrees D=(d1 , . . . , dn ), the number (ฮฝ1 , . . . , ฮฝn ) of each node, and community sizes PC of memberships Pn S = (s1 , . . . , sC ) with ฮพ=1 sฮพ = i=1 ฮฝi are randomly sampled according to the supplied parameters. Observe that the number of communities C follows endogenously. For our analysis, we assume that nodes are members in ฮฝ=O(1) communities which implies C=O(n).1 Depending on the mixing parameter 0 < ยต < 1, every node vi โˆˆ V features dext = ยตdi interi community edges and din = (1โˆ’ยต)ยทd edges within its communities. The algorithm assigns every i i node vi to either ฮฝi =1 or ฮฝi = ฮฝ communities at random such that the requested community sizes and number of communities per node are realized. Further, the desired internal degree din i has to be strictly smaller than the size sฮพ of its community ฮพ. In the case of overlapping communities, the internal degree is evenly split among all communities the node is part of. Both the computation of din i and the splitting into several communities use non-deterministic rounding to avoid biases. 1 If the maximal community size grows with ฮ˜(n ) for  > 0, the number of communities is governed by C=o(n). 4 Parameter n Pld ([dmin , dmax ), ฮณ) 0โ‰คOโ‰คn, ฮฝโ‰ฅ1 Pld ([smin , smax ), ฮฒ) 0<ยต<1 Definition Number of nodes to be produced Degree distribution of nodes, typically ฮณ = 2 O random nodes belong to ฮฝ communities; remainder has one membership Size distribution of communities, typically ฮฒ=1 Mixing parameter: fraction of neighbors of every node u that shall not share a community with u Table 1: Parameters of overlapping LFR. The typical values follow suggestions by [27]. As illustrated in Fig. 1, the LFR benchmark then generates the inter-community graph using ext FDSM on the degree sequence (dext 1 , . . . , dn ). In order not to violate the mixing parameter ยต, rewiring steps are applied to the global inter-community graph to replace edges between two nodes sharing a community. Analogously, an intra-community network is sampled for each community. In the overlapping case, rewiring steps are used to remove edges that exist in multiple communities and would result in duplicate edges in the final graph. While for realistic parameters most intra-community graphs fit into main memory, we cannot assume the same for the global graph. For the global graph and large communities, an EM variant of the FDSM is applicable, which we implement using EM-HH and EM-ES described in sections 4 and 5. 4 EM-HH : Deterministic Edges from a Degree Sequence In this section, we introduce an EM-variant of the well-known Havel-Hakimi scheme that takes a positive non-decreasing degree sequence2 D=(d1 , . . . , dn ) and, if possible, outputs a graph GD which realizes these degrees. A sequence D is called graphical if a matching simple graph GD exists. Havel [23] and Hakimi [20] gave inductive characterizations of graphical sequences which directly lead to a graph generator: given D, connect the first node v1 with degree d1 (minimal among all nodes) to d1 -many high-degree vertices by emitting edges to nodes vn โˆ’ (d1 โˆ’1) , . . . , vn . Then remove d1 from D and decrement the remaining degree of every new neighbor which yields an updated sequence D0 .3 Subsequently, remove zero-entries and sort D0 while keeping track of the original positions to be able to output the correct node indices. Finally, recurse until no positive entries remain. After every iteration, the size of D is reduced by at least one resulting in O(n) rounds. For an implementation, it is non-trivial to keep the sequence ordered after decrementing the neighborsโ€™ degrees. Internal memory solutions typically employ priority queues optimized for integer keys, e.g., bucket-lists [44, 47]. This approach incurs ฮ˜(sort(n + m)) I/Os using a naฤฑฬˆve EM PQ since every edge triggers an update to the pending degree of at least one endpoint. We propose the Havel-Hakimi variant EM-HH which emits a stream of edges in lexicographical order. It can be fed to any single-pass streaming algorithm without a round-trip to disk. Additionally, EM-HH may be used in time O(n) to test whether a degree sequence D is graphical or to drop problematic edges yielding a graphical sequence (cf. section 6). Thus, we consider only internal I/Os and emphasize that storing the output โ€“ if necessary by the application โ€“ requires O(m) time and O(scan(m)) I/Os where m is the number of edges produced. 2 Within our pipeline, we generate a monotonic degree sequence by first sampling a monotonic uniform sequence online based on the ideas of [6, 48]. Applying the inverse sampling technique (carrying over the monotonicity) yields the required distribution. Thus, no additional sorting steps are necessary for the inter-community graph. 3 This variant is due to [20]; in [23], the node of maximal degree is picked and connected. 5 4.1 Data structure Instead of maintaining the degree of every node in D individually, EM-HH compacts nodes with equal degrees into a group, yielding DD := {di : 1โ‰คiโ‰คn} groups. Since D is monotonic, such nodes have consecutive ids and the compaction can be performed in a streaming fashion4 . The sequence is then stored as a doubly linked list L = [gj ]1โ‰คjโ‰คDD where group gj = (bj , nj , ฮดj ) assigns degree ฮดj to nodes vbj , . . . , vbj +(nj โˆ’1) . The algorithm is built around the following invariants holding at the begin of every iteration: (I1) ฮดj < ฮดj+1 โˆ€1 โ‰ค j < DD , i.e. the groups represent strictly monotonic degrees (I2) bj + nj = bj+1 โˆ€1 โ‰ค j < DD , i.e. there are no gaps in the node ids These invariants allow us to bound the memory P Dfootprint in two steps: first observe that a list L of size DD describes a graph with at least D i=1 i/2 edges due to (I1). Thus, graphs from an arbitrary L filling the whole IM have โ„ฆ(M 2 ) edges. Even under pessimistic assumptions this amounts to an edge list of more than 1 PB of size on realistic machines.5 Therefore, even in the worst case the whole data structure can be kept in IM for all practical scenarios. On top of this, a probabilistic argument applies: While there exist graphs with DD =ฮ˜(n) (cf. Fig. 2), Lemma 1 gives a sub-linear bound on DD if D is sampled from a powerlaw distribution (refer also to section 10.1 for experimental results). Lemma 1. Let D be a degree sequence with n nodes sampled from Pld ([1, n), ฮณ). Then, the number of unique degrees DD = {di : 1 โ‰ค i โ‰ค n} is bounded by O(n1/ฮณ ) with high probability. Proof. Consider random variables (X1 , . . . , Xn ) sampled i.i.d. from Pld ([1, n), ฮณ) as an unordered degree sequence. Fix an index 1โ‰คjโ‰คn. Due to the powerlaw distribution, Xj is likely to have a small degree. Even if all degrees 1, . . . , n1/ฮณ were realized, their occurrences would be covered by the claim. Thus, it suffices to bound the number of realized degrees larger than n1/ฮณ . We first show that their total probability mass is small. Then we can argue that DD is asymptotically unaffected by their rare occurrences: Pnโˆ’1 Pnโˆ’1 R nโˆ’1 โˆ’ฮณ nโˆ’1 X iโˆ’ฮณ (i) iโˆ’ฮณ (ii) dx i=n1/ฮณ +1 i=n1/ฮณ +1 1/ฮณ n1/ฮณRx Pโˆž โˆ’ฮณ โ‰ค P[Xj >n ] = P[Xj =i] = Pnโˆ’1 = โˆž โˆ’ฮณ โˆ’ฮณ ฮถ(ฮณ) โˆ’ i=n i ฮถ(ฮณ) โˆ’ n x dx i=1 i i=n1/ฮณ +1   1 1โˆ’ฮณ โˆ’ n1/ฮณ /n n1/ฮณ /n โˆ’ (n โˆ’ 1)1โˆ’ฮณ 1โˆ’ฮณ (nโˆ’1) = = = O(n1/ฮณ /n), 1 (ฮณ โˆ’ 1)ฮถ(ฮณ) โˆ’ n1โˆ’ฮณ ฮถ(ฮณ) + 1โˆ’ฮณ n1โˆ’ฮณ P โˆ’ฮณ is the Riemann zeta function which satisfies ฮถ(ฮณ) โ‰ฅ 1 for all ฮณโˆˆR, ฮณโ‰ฅ1. where (i) ฮถ(ฮณ) = โˆž i=1 i R b+1 In (ii) we exploit the sumโ€™s monotonicity to bound it between the two integrals a xโˆ’ฮณ dx โ‰ค R Pb โˆ’ฮณ โ‰ค b xโˆ’ฮณ dx. i=a i aโˆ’1 In order to bound the number of occurrences, define Boolean indicator variables Yi with Yi =1 iff Xi >n1/ฮณ . Observe that they modelPBernoulli trials Yi โˆˆB(p) with p=O(n1/ฮณ /n). Thus, P the expected number of high degrees is E[ ni=1 Yi ] = ni=1 P[Xi >n1/ฮณ ] = O(n1/ฮณ ). Chernoffโ€™s inequality gives an exponentially decreasing bound on the tail distribution of the sum which thus holds with high probability. Due to Lemma 1, a graph sampled from a powerlaw distribution with m = O(M 2ฮณ ) can be computed in IM with high probability. 4 While direct sampling of the groupโ€™s multinomial distribution is not beneficial in LFR, it may be used to omit the compaction phase for other applications. 5 A single item of L can be represented by its three values and two pointers, i.e. a total of 5ยท8=40 bytes per item (assuming 64 bit integers and pointers). Just 2 GB of IM suffice for storing 5 ร— 107 items, which result in at least 6.25 ร— 1014 edges, i.e. storing just two bytes per edge would require more than one Petabyte. Further, standard tricks (e.g., exploiting the redundancy due to (I2)) can be used to reduce the memory footprint of L. 6 v1 v3 v5 1 2 3 v2kโˆ’1 ยทยทยท k ยทยทยท k kโˆ’1 kโˆ’2 v2k v2(kโˆ’1) v2(kโˆ’2) ยทยทยท 1 v2 Figure 2: Materialization of the degree sequence Dk = (1, 1, 2, 2, . . . , k, k) with DDk = k = ฮ˜(n) which maximizes EM-HHโ€™s memory consumption asymptotically. A nodeโ€™s label corresponds to the vertexโ€™ degree. 4.2 Algorithm EM-HH works in n rounds, where every iteration corresponds to a recursion step of the original formulation. Each time it extracts vertex vb1 with the smallest available id and with minimal degree ฮด1 . The extraction is achieved by incrementing the lowest node id (b01 โ† b1 +1) of group g1 and decreasing its size (n01 โ† n1 โˆ’1). If the group becomes empty (n01 = 0), it is removed from L at the end of the iteration. We now connect node vb1 to ฮด1 nodes from the end of L. Let gj be the group of smallest index to which vb1 connects to. Then there are two cases:  (C1) If node vb1 connects to all nodes in gj , we directly emit the edges [u, x] | nโˆ’ฮด1 < x โ‰ค n and decrement the degrees of all groups gj , . . . , g|L| accordingly. Since degree ฮดjโˆ’1 remains unchanged, it may now match the decremented ฮดj . This violation of (I1) is resolved by merging both groups. Due to (I2), the union of gjโˆ’1 and gj contains consecutive ids and it suffices to grow njโˆ’1 โ† njโˆ’1 +nj and to delete group gj . (C2) If vb1 connects only to a number a < nj of nodes in group gj , we split gj into two groups gj0 and gj00 of sizes a and nj โˆ’a respectively. We then connect vertex u to all a nodes in the first fragment gj0 and hence need to decrease its degree. Thus, a merge analogous to (C1) may be required (see Fig. 3). Now, groups gj+1 , . . . , g|L| are consumed wholly as in (C1). P|L| If the requested degree ฮด1 cannot be met (i.e., ฮด1 > k=1 nk ), the input is not graphical [20]. Since the vast majority of nodes have low degrees, a sufficiently large random powerlaw degree sequence D contains at most very few nodes that cannot be materialized as requested. Therefore, we do not explicitly ensure that the sampled degree sequence is graphical and rather correct the negligible inconsistencies later on by ignoring the unsatisfiable requests. 4.3 Improving the I/O-complexity In the current formulation of EM-HH we perform constant work per edge which is already optimal. However, we introduce a simple optimization which improves constant factors and gives I/O-efficient accesses. It also allows EM-HH to test whether D is graphical in time O(n). Observe that only groups in the vicinity of gj can be split or merge; we call these the active frontier. In contrast, the so-called stable groups gj+1 , . . . , gDD keep their relative degree differences as the pending degrees of all their nodes are decremented by one in each iteration. Further, they will become neighbors to all subsequently extracted nodes until group gj+1 eventually becomes an active merge candidate. Thus, we do not have to update the stable degrees in every round, but rather maintain a single global iteration counter I and count how many iterations a group remained stable: when a group gk becomes stable in iteration I0 , we annotate it with I0 by adding ฮดk โ† ฮดk +I0 . If gk has to be activated again in iteration I > I0 , its updated degree follows as ฮดk โ† ฮดk โˆ’I. The degree ฮดk remains positive since (I1) enforces a timely activation. 7 List [(bi , ni , ฮดi )]i   (1, 2, 1), (3, 2, 2), (5, 2, 3)   (2, 1, 1), (3, 3, 2), (6, 1, 3)   (3, 4, 2)   (4, 2, 1), (6, 1, 2)   (5, 2, 1) Uncompressed Degree Sequence D merge split 1 1 2 2 โ‡” 3 2 3 extract edge-to merge 1 2 2 2 โ‡” 3 2 extract edge-to split 2 2 1 2 1 2 extract edge-to edge-to merge 1 1 โ‡” 2 1 extract edge-to 1 1 0 extract edge-to Initial situation group gj group gi dโˆ’1 Splitting at gi (front) group gj group gi dโˆ’1 dโˆ’1 d Splitting at gj (back) group gi dโˆ’1 dโˆ’1 d Before gi can be split, the degrees of groups gj with j > i are decreased group gj dโˆ’2 dโˆ’1 dโˆ’1 Figure 3: Left: EM-HH on D=(1, 1, 2, 2, 3, 3). Values of L and D in row i correspond to the state at the beginning of the i-th iteration. Groups are visualized directly after extraction of the head vertex. The number next to an edge-to symbol indicates the new degree. After these updates, splitting and merging takes place. Right: Consider two adjacent groups gi , gj with degrees dโˆ’1 and d. A split of gi (left) or gj (right) directly triggers a merge, so the number of groups remains the same. Lemma 2. The optimized variant of EM-HH requires O(scan(DD )) I/Os if L is stored in an external memory list. Proof. An external-memory list requires O(scan(k)) I/Os to execute any sequence of k sequential read, insertion, and deletion requests to adjacent positions (i.e. if no seeking is necessary) [38]. We will argue that EM-HH scans L roughly twice, starting simultaneously from the front and back. Every iteration starts by extracting a node of minimal degree. Doing so corresponds to accessing and eventually deleting the listโ€™s first element gi . If the listโ€™s head block is cached, we only incur an I/O after deleting ฮ˜(B) head groups, yielding O(scan(DD )) I/Os during the whole execution. The same is true for accesses to the back of the list: the minimal degree increases monotonically during the algorithmโ€™s execution until the extracted node has to be connected to all remaining vertices. In a graphical sequence, this implies that only one group remains and we can ignore the simple base case asymptotically. Neglecting splitting and merging, the distance between the listโ€™s head and the active frontier decreases monotonically triggering O(scan(DD )) I/Os. Merging. As described before, it may be necessary to reactivate stable groups, i.e. to reload the group behind the active frontier (towards Lโ€™s end). Thus, we not only keep the block F containing the frontier cached, but also block G behind it. It does not incur additional I/O, since we are scanning backwards through L and already read G before F . The reactivation of stable groups hence only incurs an I/O when the whole block G is consumed and deleted. Since this does not happen before โ„ฆ(B) merges take place, reactivations may trigger O(scan(DD )) I/Os in total. Splitting. Observe that L at most doubles in size as splitting a group with degree d, which has a neighbor of degree dยฑ1, directly triggers another merge (cf. Fig. 3). Since a split replaces one group by two adjacent fragments which differ in their degree by exactly one, a second split to one of the fragments does not increase the size of the list. 5 EM-ES: I/O-efficient Edge Switching EM-ES is a central building block of our pipeline and is used to randomize and rewire existing graphs. It applies a sequence S=[ฯƒs ]1โ‰คsโ‰คk of edge swaps ฯƒs to a simple graph G=(V, E), where typically k = c|E| for a constant c โˆˆ [1, 100]. The graph is represented by a lexicographically ordered edge list EL =[ei ]1โ‰คiโ‰คm which only stores the pair (u, v) and omits (v, u) for every ordered edge [u, v] โˆˆ E. As illustrated in Fig. 4, a swap ฯƒ(ha, bi, d) is encoded by a direction bit d and the edge ids a and b (i.e. the position in EL ) of the edges supposed to be swapped. The switched edges are denoted as eฯƒa and eฯƒb and are given by (eฯƒa , eฯƒb ) := ฯƒ(ha, bi, d) as defined in Fig. 4. 8 1 a a d c input a b 1 2 c b 2 d ฯƒ(h1, 2i, false) or b 2 c 1 d ฯƒ(h1, 2i, true) ( ({ฮฑ1 , ฮฒ1 }, {ฮฑ2 , ฮฒ2 }) if d = false ฯƒ(ha, bi, d) = , ({ฮฑ1 , ฮฒ2 }, {ฮฑ2 , ฮฒ1 }) if d = true where [ฮฑ1 , ฮฑ2 ] = ea and [ฮฒ1 , ฮฒ2 ] = eb are the edges at positions a and b in the edge list EL . illegal (creates multi-edge) Figure 4: A swap consists of two edge ids and a direction flag. The edge ids describe an induced subgraph (left); the flag indicates how the incident nodes are shuffled. We assume that the swapโ€™s constituents are drawn independently and uniformly at random. Thus, the sequence can contain illegal swaps that would introduce multi-edges or self-loops if executed. Such illegal swaps are simply skipped. In order to do so, the following tasks have to be addressed for each ฯƒ(ha, bi, d): (T1) (T2) (T3) (T4) Gather the nodes incident to edges ea and eb . Compute eฯƒa and eฯƒb and skip if a self-loop arises. Verify that the graph remains simple, i.e. skip if edge eฯƒa or eฯƒb already exist in EL . Update the graph representation EL . If the whole graph fits in IM, a hash set per node storing all neighbors can be used for adjacency queries and updates in expected constant time (e.g., VL-ES [47]). Then, (T3) and (T4) can be executed for each swap in expected time O(1). However, in the EM model this approach incurs โ„ฆ(1) I/Os per swap with high probability for a graph with m โ‰ฅ cM and any constant c > 1. To improve the situation, we split S into smaller runs of r = ฮ˜(|E|) swaps which are then batchwise processed. Note that two swaps within a run can depend on each other. If an edge is contained in more than one swap, the nodes incident to the edge may change after the first swap has been executed. We call this a source edge dependency. Since the resulting graph has to remain simple, there further is a dependency between two swaps ฯƒi , ฯƒj through target edges if executing ฯƒi creates or removes an edge created by ฯƒj . We model both types of dependencies explicitly and forward information between dependent swaps using Time Forward Processing. As illustrated in Fig. 5, EM-ES executes several phases for each run. They roughly correspond to the four tasks outlined above. For simplicityโ€™s sake, we first assume that all swaps are independent, i.e. that there are no two swaps that share any source edge id or target edge. We will then explain how dependencies are handled. 5.1 EM-ES for Independent Swaps During the request nodes phase, EM-ES requests for each swap ฯƒ(ha, bi, ยท) the endpoints of the two edges at positions a and b in EL . These requests are then executed in the load nodes phase. In combination, both implement task (T1). Subsequently, the step simulate swaps computes eฯƒa and eฯƒb which corresponds to (T2). In the fourth step, load existence, we check for each of these target edges whether it already exists. Then, the step perform swaps executes swaps iff the graph remains simple; this corresponds to (T3). To implement (T4), the state of all involved edges is materialized in the update graph phase. The communication between the different phases is mostly realized via external memory sorters6 . Independent swaps require only the communication shown at the top of Fig. 5. 6 The term sorter refers to a container with two modes of operation: in the first phase, items are pushed into the write-only sorter in an arbitrary order by some algorithm. After an explicit switch, the filled data structure becomes read-only and the elements are provided as a lexicographically non-decreasing stream which can be rewound at any time. While a sorter is functionally equivalent to filling, sorting and reading back an EM vector, the restricted access model reduces constant factors in the implementationโ€™s runtime and I/O-complexity [5]. 9 markers for edges that receive updates (InvalidEdge) edge state to first swap (EdgeMsg) request nodes incident to edge id (EdgeReq) basic edge switching dependency handling Sorter Stream request nodes EL (swap id) Priority Queue edge existence request (ExistReq) load nodes simulate swaps (edge id) (swap id) inform about successor swap (IdSucc) edge state updates to successor EL edge exist. info to first swap (ExistMsg) edges after processed swaps (EdgeUpdates) load existence perform swaps (edge) (swap id) inform about successor swap (ExistSucc) EL update graph EL (edge) edge state and existence updates to successor Figure 5: Data flow during an EM-ES run. Communication between phases is implemented via EM sorters, self-loops use a PQ-based TFP. Brackets within a phase represent the type of elements iterated over. If multiple input streams are used, they are joined with this key. 5.1.1 Request nodes and load nodes The goal of these two phases is to load every referenced edge. We iterate over the sequence S of swaps. For the s-th swap ฯƒ(ha, bi, d), we push the two messages edge req(a, s, 0) and edge req(b, s, 1) into the sorter EdgeReq. A messageโ€™s third entry encodes whether the request is issued for the first or second edge of a swap. This information only becomes relevant when we allow dependencies. EM-ES then scans in parallel through the edge list EL and the requests EdgeReq, which are now sorted by edge ids. If there is a request edge req(i, s, p) for an edge ei =[u, v], the edgeโ€™s node pair is sent to the requesting swap by pushing a message edge msg(s, p, (u, v)) into the sorter EdgeMsg. Additionally, for every edge we push a bit into the sequence InvalidEdge, which is asserted iff an edge received a request. These edges are considered invalid and will be deleted when updating the graph. Since both phases produce only a constant amount of data per input element, we obtain an I/O complexity of O(sort(r) + scan(m)). 5.1.2 Simulate swaps and load existence The two phases gather all information required to decide whether a swap is legal. EM-ES scans through the sequence S of swaps and EdgeMsg in parallel: For the s-th swap ฯƒ(ha, bi, d), there are exactly two messages edge msg(s, 0, ea ) and edge msg(s, 1, eb ) in EdgeMsg. This information suffices to compute the switched edges eฯƒa and eฯƒb , but not to test for multi-edges. To avoid these, it remains to check whether the switched edges already exist. Thus, we push existence requests exist req(eฯƒa , s) and exist req(eฯƒb , s) in the sorter ExistReq (in contrast to request nodes we use the node pairs rather than edge ids, which are not well defined here). Afterwards, a parallel scan through the edge list EL and ExistReq is performed to answer the requests. Only if an edge e requested by swap id s is found, the message exist msg(s, e) is pushed into the sorter ExistMsg. Both phases hence incur a total of O(sort(r) + scan(m)) I/Os. 5.1.3 Perform swaps We rewind the EdgeMsg sorter and jointly scan through the sequence of swaps S and the sorters EdgeMsg and ExistMsg. As described in the simulation phase, EM-ES computes the switched edges eฯƒa and eฯƒb from the original state ea and eb . The swap is marked illegal if a switched edge is a self-loop or if an existence info is received via ExistMsg. If ฯƒ is legal we push the switched edges eฯƒa and eฯƒb into the sorter EdgeUpdates, otherwise we propagate the unaltered source edges ea and eb . This phase requires O(sort(r)) I/Os. 5.1.4 Update edge list The new edge list EL0 is obtained by merging the original edge list EL and the updated edges EdgeUpdates, triggering O(scan(m)) I/Os. During this process, we skip all edges in EL that are flagged invalid in the bit stream InvalidEdge. 10 5.2 Inter-Swap Dependencies In contrast to the earlier over-simplification, swaps may share source ids or target edges. In this case, EM-ES produces the same result as a sequential processing of S. Two swaps containing the same source edges are detected during the load nodes phase. In such a case there arrive multiple requests for the same edge id. We record these dependencies as an explicit dependency chain (see below for details). In the simulation phase we do not know yet whether a swap can be executed. Therefore we need to consider both cases (i.e. a swap has been executed or an existing edge prevented its execution) and dynamically forward all possible edge states using a priority queue. In the load existence phase, we detect whether several swaps might produce the same outcome; in this case both issue an existence request for the same edge during simulation. Again, an explicit dependency chain is computed. During the perform swaps phase, EM-ES forwards the source edge states and existence updates to successor swaps using information from both dependency chains. 5.2.1 Target edge dependencies Consider the case where a swap ฯƒs1 (ha, bi, d) changes the state of edges ea and eb to eฯƒa 1 and ฯƒ1 eb respectively. Later, a second swap ฯƒ2 inquires about the existence of either of the four edges which has obviously changed compared to the initial state. We extend the simulation phase in order to track such edge modifications. Here, we not only push messages exist req(eฯƒa 1 , s1 ) and exist req(eฯƒb 1 , s1 ) into sorter EdgeReq, but also report that the original edges may change. This is achieved by using messages exist req(ea , s1 , may change) and exist req(eb , s1 , may change) that are pushed into the same sorter. If there are dependencies, multiple messages are received for the same edge e during the load existence phase. In this case, only the request of the first swap involved is answered as before. Also, every swap ฯƒs1 is informed about its direct successor ฯƒs2 (if any) by pushing the message exist succ(s1 , e, s2 ) into the sorter ExistSucc, yielding the aforementioned dependency chain. As an optimization, may change requests at the end of a chain are discarded since no recipient exists. During the perform swaps phase, EM-ES executes the same steps as described earlier. The swap may receive a successor for every edge it sent an existence request to, and it informs each successor about the state of the appropriate edge after the swap is processed. 5.2.2 Source edge dependencies Consider two swaps ฯƒs1 (ha1 , b1 i, d1 ) and ฯƒs2 (ha2 , b2 i, d2 ) with s1 <s2 which share a source edge id, i.e. {a1 , b1 } โˆฉ {a2 , b2 } is non-empty. This dependency is detected during the load nodes phase, where requests edge req(ei , s1 , p1 ) and edge req(ei , s2 , p2 ) arrive for the same edge id ei . In this case, we answer only the request of s1 and build a dependency chain as described before using messages id succ(s1 , p1 , s2 , p2 ) pushed into the sorter IdSucc. During the simulation phase, EM-ES cannot decide whether a swap is legal. Therefore, s1 sends for every conflicting edge its original state e as well as the updated state eฯƒ1 to the p2 -th slot of s2 using a PQ. If a swap receives multiple edge states per slot, it simulates the swap for every possible combination. During the perform swaps phase, EM-ES operates as described in the independent case: it computes the swapped edges and determines whether the swap has to be skipped. If a successor exists, the new state is not pushed into the EdgeUpdates sorter but rather forwarded to the successor in a TFP fashion. This way, every invalidated edge id receives exactly one update in EdgeUpdates and the merging remains correct. Due to the second modification, EM-ESโ€™s complexity increases with the number of swaps that target the same edge id. This number is quite low in case r = O(m). Let Xi be a random variable expressing the number of swaps that reference edge ei . Since every swap constitutes two independent Bernoulli trials towards ei , the indicator Xi is binomially distributed with p = 1/m, yielding an expected chain length of 2r/m. 11 Input Degree sequence D = (1, 1, 2, 2, 2, 4) Shuffled sequence [6, 6, 4, 5, 6, 1, 3, 2, 3, 6] 1 4 5 [3, 6] 6 3 2 Matched edges Materialized multi-set [1, 2, 3, 3, 4, 4, 5, 5, 6, 6, 6, 6] 4, 5, Resulting graph [6, 6] [4, 5] [4, 5] [1, 6] [2, 3] Figure 6: A Configuration Model run on degree sequence D = (1, 1, 2, 2, 2, 4). Also, for r = m/2 swaps, max1โ‰คiโ‰คn (Xi ) = O(ln(m)/ ln ln(m)) holds with high probability based on a balls-into-bins argument [36]. Thus, we can bound the largest number of edge states simulated with high probability by O(polylog(m)), assuming non-overlapping dependency chains. Further observe that Xi converges towards an independent Poisson distribution for large m. Then the expected state space per edge is O(1). Experiments suggest that this bound also holds for overlapping dependency chains (cf. section 10.2). In order to keep the dependency chains short, EM-ES splits the sequence of swaps S into runs of equal size. Our experimental results show that a run size of r = m/8 is a suitable choice. For every run, the algorithm executes the six phases as described before. Each time the graph is updated, the mapping between an edge and its id may change. The switching probabilities, however, remain unaltered due to the initial assumption of uniformly distributed swaps. Thus EM-ES triggers O(k/m sort(m)) I/Os in total with high probability. 6 EM-CM/ES: Sampling of random graphs from prescribed degree sequence In this section, we propose an alternative approach to generate a graph from a prescribed degree sequence. In contrast to EM-HH which generates a highly biased but simple graph, we use the Configuration Model to sample a random but non-simple graph. Thus, the resulting graph may contain self-loops and multi-edges which we then remove to obtain a simple graph. 6.1 Configuration Model Let D = [di ]1โ‰คiโ‰คn be a degree sequence with n nodes. The Configuration Model builds a multiset of node ids which can be thought of as half-edges (or stubs). It produces a total of di half-edges labelled vi for each node vi . The algorithm then chooses two half-edges uniformly at random and creates an edge according to their labels. It repeats the last step with the remaining half-edges until all are matched. In this naฤฑฬˆve implementation, the procedure requires โ„ฆ(m) I/Os with high probability for m โ‰ฅ cM and any constant c > 1. It is therefore impractical in the fully external setting. As illustrated in Fig. 6 and similar to [26], we instead materialize the multiset as a sequence in which each node appears di times. Subsequently, the sequence is shuffled to obtain a random permutation with O(sort(m)) I/Os by sorting the sequence by a uniform variate drawn for each half-edge7 . Finally, we scan over the shuffled sequence and match pairs of adjacent half-edges. We now give upper bounds for theP number of self-loops and P multi-edges introduced by the Configuration Model. Define hDi := v dv /n and hD2 i := v d2v /n to be the mean and the second moment of the sequence D. In [2] and [37] the expected number of self-loops and multi-edges has already been studied. The results are stated in the following two lemmata. 7 The random permutation can be obtained with O(scan(m)) I/Os in case M > which does not affect the complexity of our total pipeline. 12 โˆš mB(1 + o(1)) + O(B) [41] Lemma 3. Let D be a degree sequence with n nodes. The expected number of self-loops is given by hD2 i โˆ’ hDi hD2 i โˆ’ hDi โˆ’โ†’ for n โ†’ โˆž. 2(hDi โˆ’ 1/n) 2hDi Lemma 4. Let D be a degree sequence with n nodes. The expected number of multi-edges is bounded by    2 (hD2 i โˆ’ hDi)2 1 hD2 i โˆ’ hDi 1 โˆ’โ†’ for n โ†’ โˆž. 2 (D โˆ’ 1/n)(D โˆ’ 3/n) 2 hDi Let D be a degree sequence drawn from the powerlaw distribution Pld ([a, b), ฮณ). For fixed ฮณ = 2, we bound the number of illegal edges as a function of a and b. Since each entry in D is independently drawn, it suffices to give bounds for the expected value and the second moment of the underlying distribution. P P For general ฮณ, the expected value and second moment are given by bi=a iโˆ’ฮณ+1 and bi=a iโˆ’ฮณ+2 R b+1 โˆ’p Pb respectively. Both expressions are bound between the two integrals a x dx โ‰ค i=a iโˆ’p โ‰ค Rb โˆ’p dx where p = โˆ’ฮณ + 1 or p = โˆ’ฮณ + 2 respectively. In the case of ฮณ = 2, the secaโˆ’1 x P ond moment is hD2 i = bi=a 1 = bโˆ’a+1. Then, by using this identity and the lower bound R b+1 โˆ’1 x dx โ‰ค hDi, we obtain the two following lemmata: a Lemma 5. Let D be drawn from Pld ([a, b), 2). The expected number of self-loops is bounded by   1 bโˆ’a+1 . 2 ln(b + 1) โˆ’ ln(a) Lemma 6. Let D be drawn from Pld ([a, b), 2). The expected number of multi-edges is bounded by  2 1 bโˆ’a+1 . 2 ln(b + 1) โˆ’ ln(a) 6.2 Edge rewiring for non-simple graphs As a consequence of lemmata 5 and 6, graphs generated using the Configuration Model may contain multi-edges and self-loops. In order to detect them, we first sort the edge list lexicographically. Then both types of illegal edges can be detected in a single scan. For each self-loop we issue a swap with a randomly selected partner edge. Similarly, for each group of f > 1 of parallel edges, we generate f โˆ’1 swaps with random partner edges. Subsequently, we execute the provisioned swaps using a variant of EM-ES (see below). The process is repeated until all illegal edges have been removed. To accelerate the endgame, we double the number of swaps for each remaining illegal edge in every iteration. Since EM-ES is employed to remove parallel edges based on targeted swaps, it needs to process non-simple graphs. Analogous to the initial formulation, we forbid swaps that introduce multi-edges even if they would reduce the multiplicity of another edge (cf. [50]). Nevertheless, EM-ES requires slight modifications for non-simple graphs. Consider the case where the existence of a multi-edge is inquired several times. Since EL is sorted, the initial edge multiplicities can be counted while scanning EL during the load existence phase. In order to correctly process the dependency chain, we have to forward the (possibly updated) multiplicity information to successor swaps. We annotate the existence tokens exist msg(s, e, #(e)) with these counters where #(e) is the multiplicity of edge e. More precisely, during the perform swaps phase, swap ฯƒ1 = ฯƒ(ha, bi, d) is informed (amongst others) of multiplicities of edges ea , eb , eฯƒa 1 and eฯƒb 1 by incoming existence messages. If ฯƒ1 is legal, we send requested edges and multiplicities of the swapped state to any successor ฯƒ2 of ฯƒ1 provided in ExistSucc. 13 The swapped state consists of the same edges where multiplicities for eฯƒa 1 and eฯƒb 1 are incremented and decremented for ea and eb . Otherwise, we forward the edges and multiplicities of the unchanged initial state. As an optimization, edges which have been removed (i.e. have multiplicity zero) are omitted. 7 EM-CA: Community Assignment For the sake of simplicity, we first restrict the EM community assignment EM-CA to the nonoverlapping case, in which every node belongs P to exactly one community. Consider a sequence of community sizes S=[sฮพ ]1โ‰คฮพโ‰คC with n= C ฮพ=1 sฮพ and a sequence of intra-community degrees in D=[dv ]1โ‰คvโ‰คn . Let S and D be non-increasing and positive. The task is to find a random surjective assignment ฯ‡ : V โ†’[C] with: (R1) Every community ฮพ is assigned sฮพ nodes as requested, with sฮพ := {v | v โˆˆ V โˆง ฯ‡(v)=ฮพ} . (R2) Every node v โˆˆ V becomes member of a sufficiently large community ฯ‡(v) with sฯ‡(v) > din v . 7.1 Ignoring constraint on community size (R2) Without constraint (R2), the bipartite assignment graph8 ฯ‡ can be sampled in the spirit of the Configuration Model (cf. section 6): Draw a permutation ฯ€ of nodes uniformly at random P and assign nodes {vฯ€(xฮพ +1) , . . . , vฯ€(xฮพ +sฮพ ) } to community ฮพ where xฮพ := ฮพโˆ’1 i=1 si . To ease later modifications, we prefer an equivalent iterative formulation: while there exists a yet unassigned node u, draw a community X with probability proportional to the number of its remaining free slots (i.e. P[X=ฮพ] โˆ sฮพ ). Assign u to X, reduce the communityโ€™s probability mass by updating sX โ† sX โˆ’ 1 and repeat. By construction, the first scheme is unbiased and the equivalence of both approaches follows as a special case of Lemma 7. We implement the random selection process efficiently based on a binary tree where each community corresponds to a leaf with a weight equal to the number of free slots in the community. Inner nodes store the total weight of their left subtree. In order Pto draw a community, we sample an integer Y โˆˆ [0, WC ) uniformly at random where WC := C ฮพ=1 sฮพ is the treeโ€™s total weight. Following the tree according to Y yields the leaf corresponding to community X. An I/Oefficient data structure [32] based on lazy evaluation for such dynamic probability distributions enables a fully external algorithm with O(n/B ยท logM/B (C/B)) = O(sort(n)) I/Os. However, since C < M , we can store the tree in IM, allowing a semi-external algorithm which only needs to scan through D, triggering O(scan(n)) I/Os. 7.2 Enforcing constraint on community size (R2) To enforce (R2), we exploit the monotonicity of S and D. Define pv := max{ฮพ | sฮพ > din v } as the index of the smallest community node v may be assigned to. Since [pv ]v is therefore monotonic itself, it can be computed online with O(1) additional IM and O(scan(n)) I/Os in the fully external setting by scanning through S and D in parallel. In order to restrict the random sampling to the communities {1,P . . . , pv }, we reduce the aforementioned random interval pv โˆ’1 to [0, Wv ) where the partial sum Wv := ฮพ=1 sฮพ is available while computing pv . We generalize the notation of uniformity to assignments subject to (R2) as follows: Lemma 7. Given S={s1 , . . . , sC } and D, let u, v โˆˆ V be two nodes with the same constraints (pu = pv ) and let c be an arbitrary community. Further, let ฯ‡ be an assignment generated by EM-CA. Then, P[ฯ‡(u)=c] = P[ฯ‡(v)=c]. Proof. Without loss of generality, assume that pu = p1 , i.e. u is one of the nodes with the tightest constraints. If this is not the case, we just execute EM-CA until we reach a node u0 which has the same constraints as u does (i.e. pu0 = pu ), and apply the Lemma inductively. 8 Consider a bipartite graph where the partition classes are given by the communities [C] and nodes [n] respectively. Each edge then corresponds to an assignment. 14 This is legal since EM-CA streams through D in a single pass and is oblivious to any future values. In case c > p1 , neither u nor v can become a member of c. Therefore, P[ฯ‡(u)=c] = P[ฯ‡(v)=c] = 0 and the claim follows trivially. (i) Now consider the case c โ‰ค p1 . Let sc be the number of free slots in community c at the P (i) beginning of round i โ‰ฅ 1 and W (i) = C j=1 sj their sum at that time. By definition, EM-CA (u) assigns node u to community c with probability P[ฯ‡(u)=c] = sc /W (u) . Further, the algorithm has to update the number of free slots. Thus, for iteration i โˆˆ [n] it holds that s(i) c = ๏ฃฑ ๏ฃด ๏ฃฒsc if i = 1 (iโˆ’1) sc ๏ฃด ๏ฃณ (iโˆ’1) sc โˆ’1 if iโˆ’1 was assigned to c . otherwise The number of free slots is reduced by one in each step: ๏ฃซ ๏ฃถ C X W (i) = ๏ฃญ Sj ๏ฃธ โˆ’ (i โˆ’ 1) j=1 (u) (1) It remains to show P[ฯ‡(u)=c] = sc /W (u) = sc /W (1) and the claim follows by transitivity. For u=1 it is true by definition. Now, consider the induction step for u>1: (u) P[ฯ‡(u)=c] = s(u) c /W (uโˆ’1) = P[ฯ‡(uโˆ’1)=c] (uโˆ’1) = 7.3 sc sc โˆ’1 W (u) (uโˆ’1) (uโˆ’1) ยท W (uโˆ’1) โˆ’ sc W (uโˆ’1) ยท W (u) (uโˆ’1) (uโˆ’1) โˆ’1 sc sc sc + P[ฯ‡(uโˆ’1)6=c] (u) = (uโˆ’1) + (u) W W W (uโˆ’1) = (uโˆ’1) (W (uโˆ’1) โˆ’ 1) sc sc = (uโˆ’1) (uโˆ’1) W ยท (W (uโˆ’1) โˆ’ 1) W Ind. Hyp. = (uโˆ’1) sc 1 โˆ’ (uโˆ’1) W ! (uโˆ’1) sc W (u) (1) sc W (1) Assignment with overlapping communities In the overlapping case, the weight of S increases to account for nodes with multiple memberships. There is further an additional input sequence [ฮฝv ]1โ‰คvโ‰คn corresponding to the number of memberships a node v shall have, each of which has din v intra-community neighbors. We then sample not only one community per node v, but ฮฝv different ones. Since the number of memberships ฮฝv  M is small, a duplication check during the repeated sampling is easy in the semi-external case and does not change the I/O complexity. However, it is possible that near the end of the execution there are less free communities than memberships requested. We address this issue by switching to an offline strategy for the last ฮ˜(M ) assignments and keep them in IM. As ฮฝ = O(1), there are โ„ฆ(ฮฝ) communities with free slots for the last ฮ˜(M ) vertices and a legal assignment exists with high probability. The offline strategy proceeds as before until it is unable to find ฮฝ different communities for a node. In that case, it randomly picks earlier assignments until swapping the communities is possible. In the fully external setting, the I/O complexity grows linearly in the number of samples taken and is thus bounded by O(ฮฝ sort(n)). However, the community memberships are obtained lazily and out-of-order which may assign a node several times to the same community. This corresponds to a multi-edge in the bipartite assignment graph. It can be removed using the rewiring technique detailed in section 6.2. 15 8 8.1 Merging and repairing the intra- and inter-community graphs Global Edge Rewiring The global graph is materialized without taking the community structure into account. It therefore can contain edges between nodes that share a community. Those edges have to be removed as they increase the mixing parameter ยต. In accordance with LFR, we use rewiring steps to do so and perform an edge swap for each forbidden edge with a randomly selected partner. Since it is unlikely that such a random swap introduces another illegal edge (if sufficiently many communities exist), the probabilistic approach effectively removes forbidden edges. We apply this idea iteratively and perform multiple rounds until no forbidden edges remain. The community assignment step outputs a lexicographically ordered sequence ฯ‡ of (v, ฮพ)pairs containing the community ฮพ for each node v. For nodes that join multiple communities several such pairs exist. Based on this, we annotate every edge with the communities of both incident vertices by scanning through the edge list twice: once sorted by source nodes, once by target nodes. For each forbidden edge, a swap is generated by drawing a random partner edge id and a swap direction. Subsequently, all swaps are executed using EM-ES which now also emits the set of edges involved. It suffices to restrict the scan for illegal edges to this set since all edges not contained have to be legal. Complexity. Each round needs O(sort(m)) I/Os for selecting the edges and executing the swaps. The number of rounds is usually small but depends on the community size distribution: the smaller the communities, the less likely are edges inside them. 8.2 Community Edge Rewiring In the case of overlapping communities, an edge can be generated as part of multiple clusters. Similarly to section 6.2, we iteratively apply semi-random swaps to remove those parallel edges. Here, however, the selection of random partners is more involved. In order not to violate the community size distribution, both edges of a swap have to belong to the same community. While it is easy to achieve this by considering all communities independently, we need to consider the whole merged graph to detect forbidden edges. In order to do so, we annotate each edge with its community id and merge all communities together into one graph that possibly contains parallel edges. During a scan through all sorted edges, we select from each set of parallel edges all but one as candidates for rewiring. Then, a random partner from the same community is drawn for each of these edges. For this, we sort all edges and the selected candidates by community. By counting the edges per community, we can sample random partners, load them in a second scan, randomize their order, and assign them to the candidates of their community. For the execution, multi-edges need to be considered, i.e. we do not only need to know if an edge exists, but also how often, and update that information accordingly. Together with all loaded edges we also need to store community ids such that we can uniquely identify them and update the correct information. While these steps are possible in external memory, we exploit the fact that there are significantly less communities than nodes. Hence, storing some information per community in internal memory is possible. We assume further that all candidates can be stored in internal memory. If there were too many candidates, we would simply consider only some of them in each round. We can avoid the expensive step of sorting all edges by community for every round using the following observation: When scanning the edges, we can keep track of how many edges of each community we have seen so far. We sort the edge ids to be loaded for every community and keep a pointer on the current position in the list for every community. This allows us to load specific edges of all communities without the need to sort all edges by community. Complexity. The fully external rewiring requires O(sort(m)) I/Os for the initial step and each following round. The semi-external variant triggers only O(scan(m)) I/Os per round. The number of rounds is usually small and the overall runtime spend on this step is insignificant. 16 Nevertheless, the described scheme is a Las Vegas algorithm and there exist (unlikely) instances on which it will fail.9 To mitigate this issue, we allow a small fraction of edges (e.g., 10โˆ’3 ) to be removed if we detect a slow convergence. To speed up the endgame, we also draw additional swaps uniformly at random from communities which contain a multi-edge. 9 Implementation We implemented the proposed algorithms in C++ based on the STXXL library [12], providing implementations of EM data structures, a parallel EM sorter, and an EM priority queue. Among others, we applied the following optimizations for EM-ES: โ€ข Most message types contain both a swap id and a flag indicating which of the swapโ€™s edges is targeted. We encoded both of them in a single integer by using all but the least significant bit for the swap id and store the flag in there. This significantly reduces the memory volume and yields a simpler comparison operator since the standard integer comparison already ensures the correct lexicographic order. โ€ข Instead of storing and reading the sequence of swaps several times, we exploit the implementationโ€™s pipeline structure and directly issue edge id requests for every arriving swap. Since this is the only time edge ids are read from a swap, only the remaining direction flag is stored in an efficient EM vector, which uses one bit per flag and supports I/O-efficient writing and reading. Both steps can be overlapped with an ongoing EM-ES run. โ€ข Instead of storing each edge in the sorted external edge list as a pair of nodes, we only store each source node once and then list all targets of that vertex. This still supports sequential scan and merge operations which are the only operations we need. This almost halves the I/O volume of scanning or updating the edge list. โ€ข During the execution of several runs we can delay the updating of the edge list and combine it with the load nodes phase of the next run. This reduces the number of scans per additional run from three to two. โ€ข We use asynchronous stream adapters for tasks such as streaming from sorters or the generation of random numbers. These adapters run in parallel in the background to preprocess and buffer portions of the stream in advance and hand them over to the main thread. Besides parallel sorting and asynchronous pipeline stage, the current EM-LFR implementation facilitates parallelism only during the generation and randomization of intra-community graphs which can be computed pleasingly parallel. 10 Experimental Results The number of repetitions per data point (with different random seeds) is denoted with S. Errorbars correspond to the unbiased estimation of the standard deviation. For LFR we perform experiments based on two different scenarios: โ€ข (lin) โ€” In one setting, the maximal degrees and community sizes scale linearly as a function of n. For a n and ฮฝ the parameters are chosen as: ยต โˆˆ {0.2, 0.4, 0.6}, dmin =10ฮฝ, dmax =nฮฝ/20, ฮณ=2, smin =20, smax =n/10, ฮฒ=1, O=n. โ€ข (const) โ€” In the second setting, we keep the community sizes and the degrees constant and consider only non-overlapping communities. The parameters are chosen as: dmin =50, dmax =10,000, ฮณ=2, smin =50, smax =12,000, ฮฒ=1, O=n. Real-world networks have been shown to have increasing average degrees as they become larger [30]. Increasing the maximum degree as in our first setting (lin) increases the average 9 Consider a node which is a member of two communities in which it is connected to all other nodes. If only one of its neighbors also appears in both communities, the multi-edge cannot be rewired. 17 100 ฮณ = 1 : 0.379 ยท x1/1 ฮณ = 2 : 1.380 ยท x1/2 5 10 ฮณ = 3 : 1.270 ยท x1/3 Relative frequency Number of unique elements 106 104 103 102 Run size 0.05n Run size 0.125n Run size 0.5n 10โˆ’1 10โˆ’2 10โˆ’3 10โˆ’4 10โˆ’5 10โˆ’6 101 103 104 105 106 107 108 10 Number n of samples 100 Number of edge configuration received by swap Figure 7: Left: Number of distinct elements in n samples (i.e. node degrees in a degree sequence) taken from Pld ([1, n), ฮณ). Right: Overhead induced by tracing inter-swap dependencies. Fraction of swaps as function of the number of edge configurations they receive during the simulation phase. degree. Having a maximum community size of n/10 means, however, that a significant proportion of the nodes belongs to such huge communities which are not very tightly knit due to the large number of nodes of low degree. While a more limited growth is probably more realistic, the exact parameters depend on the network model. Our second parameter set (const) shows an example of much smaller maximum degrees and community sizes. We chose the parameters such that they approximate the degree distribution of the Facebook network in May 2011 when it consisted of 721 million active users as reported in [46]. Note however that strict powerlaw models are unable to accurately mimic Facebookโ€™s degree distribution [46]. Further, they show that the degree distribution of the U.S. users (removing connections to non-U.S. users) is very similar to the one of the Facebook users of the whole world, supporting our use of just one parameter set for different graph sizes. The actual minimum degree of the Facebook network is 1, but the smaller degrees are significantly less prevalent than a power law degree sequence would suggest, which is why we chose a larger value of 50. Our maximum degree of 10,000 is larger than the one reported for Facebook (5000), but the latter was also an arbitrarily enforced limit by Facebook. The expected average degree of this degree sequence is 264, which is slightly higher than the reported 190 (world) or 214 (U.S. only). Our parameters are chosen such that the median degree is approximately 99, which matches the worldwide Facebook network. Similar to the first parameter set, we chose the maximum community size slightly larger than the maximum degree of 12,000 nodes. 10.1 EM-HH โ€™s state size In Lemma 1, we bound the internal memory consumption of EM-HH by showing that a sequence of n numbers randomly sampled from Pld ([1, n), ฮณ) contains only O(n1/ฮณ ) distinct values with high probability. In order to support Lemma 1 and to estimate the hidden constants, samples of varying size between 103 and 108 are taken from distributions with exponents ฮณ โˆˆ {1, 2, 3}. Each time, the number of unique elements is computed and averaged over S = 9 runs with identical configurations but different random seeds. The results illustrated in Fig. 7 support the predictions โˆš with small constants. For the commonly used exponent 2, we find 1.38 n distinct elements in a sequence of length n. 10.2 Inter-Swap Dependencies Whenever multiple swaps target the same edge, EM-ES simulates all possible states to be able to retrieve conflicting edges. We argued that the number of dependencies (and thus the state size) remains manageable if the sequence of swaps is split into sufficiently short runs. We found that for m edges and k swaps, 8k/m runs minimize the runtime for large instances of (lin). As indicated in Fig. 7, in this setting 78.7 % of swaps do not receive additional edge configurations during the simulation phase and less than 0.4 % have to consider more than four additional states. Similarly, 78.6 % of existence requests remain without dependencies. 18 106 104 105 Runtime [s] Runtime [s] 105 103 102 101 100 104 106 107 103 ยฏ 100 VL-ES, d= ยฏ 1000 VL-ES, d= ยฏ 100 EM-ES, d= ยฏ 1000 EM-ES, d= 102 Original LFR EM-LFR 105 104 101 108 107 Number n of node 108 109 1010 Number m of edges Figure 8: Left: Runtime on (SysA) of the original LFR implementation and EM-LFR for ยต=0.2. Right: Runtime on (SysB) of IM VL-ES and EM-ES on a graph with m of edges and average degree dยฏ executing k=10m swaps. 10.3 Performance benchmarks Runtime measurements were conducted on the following systems: โ€ข (SysA) โ€” inexpensive compute server : Intel Xeon E5-2630 v3 (8 cores/16 threads, 2.40GHz), 64 GB RAM, 3ร— Samsung 850 PRO SATA SSD (1 TB). โ€ข (SysB) โ€” commodity hardware: Intel Core i7 CPU 970 (6 cores/12 threads, 3.2GHz), 12 GB RAM, 1ร— Samsung 850 PRO SATA SSD (1 TB). Since edge switching scales linearly in the number of swaps (in case of EM-ES in the number of runs), some of the measurements beyond 3 h runtime are extrapolated from the progress until then. We verified that errors stay within the indicated margin using reference measurements without extrapolation. 10.4 Performance of EM-HH Our implementation of EM-HH produces 180 ยฑ 5 million edges per second on (SysA) up to at least 2 ร— 1010 edges. Here, we include the computation of the input degree sequence, EM-HH โ€™s compaction step, as well as the writing of the output to external memory. 10.5 Performance of EM-ES Figure 8 presents the runtime required on (SysB) to process k=10m swaps in an input graph with m edges and an average degree dยฏ โˆˆ {100, 1000}. For reference, the performance of the existing internal memory edge swap algorithm VL-ES based on the authorsโ€™ implementation [47] is included. Here we report only on the edge swapping process excluding any precomputation. To achieve comparability, we removed connectivity tests, fixed memory management issues, and adopted the number of swaps. Further, we extended counters for edge ids and accumulated degrees to 64 bit integers in order to support experiments with more than 230 edges. VL-ES slows down by a factor of 25 if the data structure exceeds the available internal memory by less than 10 %. We observe an analogous behavior on machines with larger RAM. EM-ES is faster than VL-ES for all instances with m > 2.5 ร— 108 edges; those graphs still fit into main memory. FDSM has applications beyond synthetic graphs, and is for instance used on real data to assess the statistical significance of observations [43]. In that spirit, we execute EM-ES on an undirected version of the crawled ClueWeb12 graphโ€™s core [45] which we obtain by deleting all nodes corresponding to uncrawled URLs.10 Performing k = m swaps on this graph with n โ‰ˆ 9.8 ร— 108 nodes and m โ‰ˆ 3.7 ร— 1010 edges is feasible in less than 19.1 h on (SysB). 10 We consider such vertices unrealistically (simple) as they have only degree 1 and account for โ‰ˆ84 % of nodes in the original graph. 19 7.5 7.0 6.5 6.0 5.5 Nodes: 105 , Mixing: 1.0 ร—109 Mean after 5m swaps EM-ES, S = 1138 EM-CMES, S = 600 Degree assortativity Number of triangles 3.05 3.00 2.95 2.90 2.85 ร—108 0 1 2 3 Number of swaps per edge k/m 4 5 Nodes: 107 , Mixing: 0.2 1.00 0.98 0.96 0.94 0.92 0.90 Mean after 5m swaps EM-ES, S = 40 EM-CMES, S = 40 0.50 0.48 0.46 0.44 0.42 0 1 2 3 Number of swaps per edge k/m 4 5 Figure 9: Left: Number of triangles on (const) with n = 1 ร— 105 and ยต = 1.0. Right: Degree assortativity on (const) with n = 1 ร— 107 and ยต = 0.2. In order to factor in the increased runtime of EM-CM/ES compared to EM-HH, plots of EM-CM/ES are shifted by the runtime of this phase relative to the execution of EM-ES. As EM-CM/ES is a Las-Vegas algorithm, this incurs an additional error along the x-axis. Bhuiyan et al. propose a distributed edge switching algorithm and evaluate it on a compute cluster with 64 nodes each equipped with two Intel Xeon E5-2670 2.60GHz 8-core processors and 64GB RAM [7]. The authors report to perform k=1.15 ร— 1011 swaps on a graph with m=1010 generated in a preferential attachment process in less than 3 h. We generate a preferential attachment graph using an EM generator [32] matching the aforementioned properties and carried out edge swaps using EM-ES on (SysA). We observe a slow down of only 8.3 on a machine with 1/128 the number of comparable cores and 1/64 of internal memory. 10.6 Performance of EM-CM/ES and qualitative comparison with EM-ES In section 6, we describe an alternative graph sampling method. Instead of seeding EMES with a highly biased graph using EM-HH , we employ the Configuration Model to quickly generate a non-simple random graph. In order to obtain a simple graph, we then carry out several EM-ES runs in a Las-Vegas fashion. Since EM-ES scans through the edge list in each iteration, runs with very few swaps are inefficient. For this reason, we start the subsequent Markov Chain early: First identify all multi-edges and self-loops and generate swaps with random partners. In a second step, we then introduce additional random swaps until the run contains at least m/10 operations11 . For an experimental comparison between EM-ES and EM-CM/ES, we consider the runtime until both yield a sufficiently uniform random sample. Of course, the uniformity is hard to quantify; similarly to related studies (cf. section 1.1), we estimate the mixing times of both approaches as follows. Starting from a common seed graph G(0) , we generate an ensemble (k) (k) {G1 , . . . , GS } of S  1 instances by applying independent random sequences of k  m swaps (jm) each. During this process, we regularly export snapshots Gi of the intermediate instances j โˆˆ [k/m] of graph Gi . For EM-CM/ES, we start from the same seed graph, apply the algorithm and then carry out k swaps as described above. For each snapshot, we compute a number of metrics, such as the average local clustering coefficient (ACC), the number of triangles, and degree assortativity12 . We then investigate how the distribution of these measures evolves within the ensemble as we carry out an increasing number of swaps. We omit results for ACC since they are less sensitive compared to the other measures (cf. section 10.7). As illustrated in Fig. 9 and Appendix C, all proxy measures converge within 5m swaps with a very small variance. No statistically significant change can be observed compared to a Markov 11 We chose this number as it yields execution times similar to the m/8-setting of EM-ES on simple graphs In preliminary experiments, we also included spectral properties (such as extremal eigenvalues of the adjacency/laplacian matrix) and the closeness centrality of fixed nodes. As these measurement are more expensive to compute and yield qualitatively similar results, we decided not to include them in the larger trials. 12 20 5.0 Local cluster coeff. Degree assortativity Triangle count 4.5 4.0 Covergence after k/m steps Covergence after k/m steps 5.0 3.5 3.0 2.5 2.0 1.5 1.0 5 10 106 Number n of nodes 4.0 3.5 3.0 2.5 2.0 1.5 1.0 5 10 107 Local cluster coeff. Degree assortativity Triangle count 4.5 106 Number n of nodes 107 Figure 10: Number of swaps per edge after which ensembles of graphs with (const), 1 ร— 105 โ‰ค n โ‰ค 1 ร— 107 and ยต = 0.4 (left) and ยต = 0.6 (right) converge. Due to computation costs, the ensemble size is reduced from S > 100 to S > 10 for large graphs. chain with 30m operations (which was only computed for a subset of each ensemble). EMHH generates biased instances with special properties, such as a high number of triangles and correlated node degrees, while the features of EM-CM/ESโ€™s output nearly match the converged ensemble. This suggests that the number of swaps to obtain a sufficiently uniform sample can be reduced for EM-CM/ES. Due to computational costs, the study was carried out on multiple machines executing several tasks in parallel. Hence, absolute running times are not meaningful, and we rather measure the computational costs in units of time required to carry out 1m swaps by the same process. This accounts for the offset of EM-CM/ESโ€™s first data point. The number of rounds required to obtain a simple graph depends on the degree distribution. For (const) with n = 1 ร— 105 and ยต = 1, a fraction of 5.1 % of the edges produced by the Configuration Model are illegal. EM-ES requires 18 ยฑ 2 rewiring runs in case a single swap is used per round to rewire an illegal edge. In the default mode of operation, 5.0 ยฑ 0.0 rounds suffice as the number of rewiring swaps per illegal edge is doubled in each round. For larger graphs with n = 1 ร— 107 , only 0.07 % of edges are illegal and need 2.25 ยฑ 0.40 rewiring runs. 10.7 Convergence of EM-ES In a similar spirit to the previous section, we indirectly investigate the Markov chainโ€™s mixing time as a function of the number of nodes n. To do so, we generate ensembles as before with 1 ร— 105 โ‰ค n โ‰ค 1 ร— 107 and compute the same graph metrics. For each group and measure, we then search for the first snapshot p in which the measureโ€™s mean is within an interval of half the standard deviation of the final values and subsequently remains there for at least three phases. We then interpret p as a proxy for the mixing time. As depicted in Fig. 10, no measure shows a systematic increase over the two orders of magnitude considered. It hence seems plausible not to increase the number of swaps performed by EM-LFR compared to the original implementation. 10.8 Performance of EM-LFR Figure 8 reports the runtime of the original LFR implementation and EM-LFR as a function of the number of nodes n and ฮฝ = 1. EM-LFR is faster for graphs with n โ‰ฅ 2.5 ร— 104 nodes which feature approximately 5 ร— 105 edges and are well in the IM domain. Further, the implementation is capable of producing graphs with more than 1 ร— 1010 edges in 17 h.13 Using the same time budget, the original implementation generates graphs more than two orders of magnitude smaller. 13 Roughly 1.5 h are spend in the end-game of the Global Rewiring (at that point less than one edge out of 106 is invalid). In this situation, an algorithm using random I/Os may yield a speed-up. Alternatively, we could simply discard the few remaining invalid edges since they only constitute an insignificant fraction. 21 Mixing ยต = 0.6, Cluster: Louvain 1 1 0.8 0.8 0.6 0.6 0.4 0.2 0 AR AR Mixing ยต = 0.6, Cluster: Infomap 0.4 Orig NetworKit EM 103 0.2 104 0 105 Orig NetworKit EM 103 104 Number n of nodes 105 Number n of nodes Figure 11: Adjusted rand measure of Infomap/Louvain and ground truth at ยต = 0.6 with disjoint clusters, smin = 10, smax = n/20. Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 2 Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 4 Orig EM 1 0.8 NMI NMI 0.8 0.6 0.4 0.2 0 Orig EM 1 0.6 0.4 0.2 103 104 0 105 Number n of nodes 103 104 105 Number n of nodes Figure 12: NMI of OSLOM and ground truth at ยต = 0.4 with 2/4 overlapping clusters per node. 10.9 Qualitative Comparison of EM-LFR When designing EM-LFR, we made sure that it closely follows the LFR benchmark such that we can expect it to produce graphs following the same distribution as the original LFR generator. In order to show experimentally that we achieved this goal, we generated graphs with identical parameters using the original LFR implementation and EM-LFR. For disjoint clusters we also compare it with the implementation that is part of NetworKit [44]. Using NetworKit, we evaluate the results of Infomap [40], Louvain [8] and OSLOM [29], three state-of-the-art clustering algorithms [14, 9, 17], and compare them using the adjusted rand measure [24] and NMI [15]. Further, we examine the average local clustering coefficient, a measure for the percentage of closed triangles which shows the presence of locally denser areas as expected in communities [25]. We report these measures for graphs ranging from 103 to 106 nodes. In Fig. 11, 13 and 12 we present a selection of results; all of them can be found in Appendix B. There are only small differences within the range of random noise between the graphs generated by EMLFR and the other two implementations. Note that due to the computational costs above 105 edges, there is only one sample for the original implementation which explains the outliers in Fig. 11. Similar to the results in [14], we also observe that the performance of clustering algorithms drops significantly as the graphโ€™s size grows. This might be due to less clearly defined community structures since the parameters are scaled, and also due to limits of current clustering algorithms. Such behavior clearly demonstrates the necessity of EM-LFR for being able to study this phenomenon on even larger graphs and develop algorithms that are able to handle such instances. 11 Outlook and Conclusion We propose the first I/O-efficient graph generator for the LFR benchmark and the FDSM, which is the most challenging step involved: EM-HH materializes a graph based on a prescribed degree distribution without I/O for virtually all realistic parameters. Including the generation of a powerlaw degree sequence and the writing of the output to disk, our implementation generates 22 Avg. Local Clustering Coeff. Mixing: ยต = 0.6 Orig NetworKit EM 1 0.8 0.6 0.4 0.2 0 103 104 105 Number n of nodes Figure 13: Average local clustering coefficient at ยต = 0.6 with disjoint clusters. 1.8 ร— 108 edges per second for graphs exceeding main memory. EM-ES perturbs existing graphs with m edges based on k edge switches using O(k/m ยท sort(m)) I/Os for k = โ„ฆ(m). We demonstrate that EM-ES is faster than the internal memory implementation [47] even for large instances still fitting in main memory and scales well beyond the limited main memory. Compared to the distributed approach by [7] on a cluster with 128 CPUs, EM-ES exhibits a slow-down of only 8.3 on one CPU and hence poses a viable and cost-efficient alternative. Our EM-LFR implementation is orders of magnitude faster than the original LFR implementation for large instances and scales well to graphs exceeding main memory while the generated graphs are equivalent. We further gave evidence indicating that commonly accepted parameters to derive the length of the Edge Switching Markov Chain remain valid for graph sizes approaching the external memory domain and that EM-CM/ES can be used to accelerate the process. Currently, EM-ES does not yet fully exploit the parallelism offered by modern machines. While dependencies between swaps make a parallelization challenging, preliminary experiments indicate that an extension is possible: each run can be split further into smaller batches which can be parallelized in the spirit of [33]. Another possibility for a speedup could be to use the recently proposed Curveball sampling algorithm for graphs with fixed degree sequence [10]. Further studies are necessary to establish whether this really leads to a faster sampling in practice. While the underlying Markov chain seems to require less steps to converge in practice, each step is more expensive. Also, a combination of Curveball with EM-CM/ES seems possible. Further, this is just the starting point for clustering large graphs that exceed main memory using external memory. Not only are new clustering algorithms needed, but also the evaluation of the results needs to be investigated since existing evaluation measures might not be easily computable in external memory. Acknowledgment We thank Hannes Seiwert and Mark Ortmann for valuable discussions on EM-HH. 23 References [1] Alok Aggarwal and Jeffrey S. Vitter. The input/output complexity of sorting and related problems. Communications of the ACM, 31(9), pages 1116โ€“1127, 1988. [2] Omer Angel, Remco van der Hofstad, and Cecilia Holmgren. Limit laws for self-loops and multiple edges in the configuration model. CoRR, abs/1603.07172, 2017. URL: https: //arxiv.org/abs/1603.07172. [3] Lars Arge. The buffer tree: A new technique for optimal I/O-algorithms (extended abstract). In Algorithms and Data Structures, 4th International Workshop, WADS โ€™95, Kingston, Ontario, Canada, August 16-18, 1995, Proceedings, pages 334โ€“345, 1995. URL: http://dx.doi.org/10.1007/3-540-60220-8_74, doi:10.1007/3-540-60220-8_74. [4] David A. Bader, Henning Meyerhenke, Peter Sanders, Christian Schulz, Andrea Kappes, and Dorothea Wagner. Encyclopedia of Social Network Analysis and Mining, chapter Benchmarking for Graph Clustering and Partitioning, pages 73โ€“82. Springer New York, 2014. URL: http://dx.doi.org/10.1007/978-1-4614-6170-8_23, doi:10.1007/ 978-1-4614-6170-8_23. [5] Andreas Beckmann, Roman Dementiev, and Johannes Singler. Building a parallel pipelined external memory algorithm library. In 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pages 1โ€“10, 2009. URL: http://dx.doi.org/10.1109/IPDPS.2009.5161001, doi:10.1109/IPDPS. 2009.5161001. [6] Jon Louis Bentley and James B. Saxe. Generating sorted lists of random numbers. ACM Trans. Math. Softw., 6(3):359โ€“364, 1980. URL: http://doi.acm.org/10.1145/355900. 355907, doi:10.1145/355900.355907. [7] Hasanuzzaman Bhuiyan, Jiangzhuo Chen, Maleq Khan, and Madhav V. Marathe. Fast parallel algorithms for edge-switching to achieve a target visit rate in heterogeneous graphs. In 43rd International Conference on Parallel Processing, ICPP 2014, Minneapolis, MN, USA, September 9-12, 2014, pages 60โ€“69, 2014. URL: http://dx.doi.org/10.1109/ICPP. 2014.15, doi:10.1109/ICPP.2014.15. [8] Vincent Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10), 2008. URL: http://dx.doi.org/10.1088/1742-5468/2008/10/ P10008. [9] Nazar Buzun, Anton Korshunov, Valeriy Avanesov, Ilya Filonenko, Ilya Kozlov, Denis Turdakov, and Hangkyu Kim. Egolp: Fast and distributed community detection in billionnode social networks. In 2014 IEEE International Conference on Data Mining Workshop, pages 533โ€“540, Dec 2014. doi:10.1109/ICDMW.2014.158. [10] Corrie Jacobien Carstens, Annabell Berger, and Giovanni Strona. Curveball: a new generation of sampling algorithms for graphs with fixed degree sequence. ArXiv e-prints, September 2016. arXiv:1609.05137. [11] Kyrylo Chykhradze, Anton Korshunov, Nazar Buzun, Roman Pastukhov, Nikolay Kuzyurin, Denis Turdakov, and Hangkyu Kim. Distributed generation of billion-node social graphs with overlapping community structure. In Complex Networks V: Proceedings of the 5th Workshop on Complex Networks CompleNet, pages 199โ€“208. Springer International, 2014. URL: http://dx.doi.org/10.1007/978-3-319-05401-8_19, doi: 10.1007/978-3-319-05401-8_19. 24 [12] Roman Dementiev, Lutz Kettner, and Peter Sanders. STXXL: standard template library for XXL data sets. Softw., Pract. Exper., 38(6):589โ€“637, 2008. URL: http://dx.doi.org/ 10.1002/spe.844, doi:10.1002/spe.844. [13] Roger B. Eggleton and Derek Allan Holton. Simple and multigraphic realizations of degree sequences. In Proceedings of the Eighth Australian Conference on Combinatorial Mathematics, Lecture Notes in Mathematics, pages 155โ€“172. Springer, 1980. URL: http://dx.doi.org/10.1007/BFb0091817. [14] Scott Emmons, Stephen G. Kobourov, Mike Gallant, and Katy Boฬˆrner. Analysis of Network Clustering Algorithms and Cluster Quality Metrics at Scale. PLoS ONE, 11(7):1โ€“18, July 2016. URL: http://dx.doi.org/10.1371/journal.pone.0159161. [15] Alcides Viamontes Esquivel and Martin Rosvall. Comparing network covers using mutual information, 2012. arXiv:1202.0425. URL: http://arxiv.org/abs/1202.0425. [16] Santo Fortunato. Community detection in graphs. Physics Reports, 486(35):75 โ€“ 174, 2010. URL: http://www.sciencedirect.com/science/article/pii/ S0370157309002841, doi:10.1016/j.physrep.2009.11.002. [17] Santo Fortunato and Darko Hric. Community detection in networks: A user guide. Physics Reports, 659:1โ€“44, 2016. URL: https://dx.doi.org/10.1016/j.physrep.2016.09.002. [18] Christos Gkantsidis, Milena Mihail, and Ellen W. Zegura. The Markov Chain Simulation Method for Generating Connected Power Law Random Graphs. In Proceedings of the 5th Workshop on Algorithm Engineering and Experiments (ALENEXโ€™03), pages 16โ€“25. SIAM, 2003. [19] Catherine S. Greenhill and Matteo Sfragara. The switch markov chain for sampling irregular graphs and digraphs. CoRR, abs/1701.07101, 2017. URL: http://arxiv.org/abs/1701. 07101. [20] Seifollah L. Hakimi. On realizability of a set of integers as degrees of the vertices of a linear graph. i. Journal of the Society for Industrial and Applied Mathematics, 10(3):496โ€“506, 1962. doi:10.1137/0110037. [21] Michael Hamann, Ulrich Meyer, Manuel Penschuck, and Dorothea Wagner. I/O-efficient Generation of Massive Graphs Following the LFR Benchmark. In Proceedings of the 19th Meeting on Algorithm Engineering and Experiments (ALENEXโ€™17), pages 58โ€“72. SIAM, 2017. URL: http://dx.doi.org/10.1137/1.9781611974768.5. [22] Steve Harenberg, Gonzalo Bello, L. Gjeltema, Stephen Ranshous, Jitendra Harlalka, Ramona Seay, Kanchana Padmanabhan, and Nagiza Samatova. Community detection in largescale networks: a survey and empirical evaluation. Wiley Interdisciplinary Reviews: Computational Statistics, 6(6):426โ€“439, 2014. URL: http://dx.doi.org/10.1002/wics.1319, doi:10.1002/wics.1319. [23] Vaฬclav Havel. Poznaฬmka o existenci konecฬŒnyฬch grafuฬŠ. CฬŒasopis pro peฬŒstovaฬnฤฑฬ matematiky, 080(4):477โ€“480, 1955. URL: http://eudml.org/doc/19050. [24] Lawrence Hubert and Phipps Arabie. Comparing partitions. Journal of Classification, 2(1):193โ€“218, December 1985. URL: http://dx.doi.org/10.1007/BF01908075. [25] Marcus Kaiser. Mean clustering coefficients: the role of isolated nodes and leafs on clustering measures for small-world networks. New Journal of Physics, 10(8), 2008. URL: http: //dx.doi.org/10.1088/1367-2630/10/8/083042. 25 [26] Panqanamala Ramana Kumar, Martin J Wainwright, and Riccardo Zecchina. Mathematical Foundations of Complex Networked Information Systems: Politecnico Di Torino, Verreฬ€s, Italy 2009, volume 2141. Springer, 2015. [27] Andrea Lancichinetti and Santo Fortunato. Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities. Phys. Rev. E, 80:016118, Jul 2009. Source code available at https://sites.google.com/site/ santofortunato/inthepress2. URL: http://link.aps.org/doi/10.1103/PhysRevE. 80.016118, doi:10.1103/PhysRevE.80.016118. [28] Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. Benchmark graphs for testing community detection algorithms. Phys. Rev. E, 78:046110, Oct 2008. URL: http://link. aps.org/doi/10.1103/PhysRevE.78.046110, doi:10.1103/PhysRevE.78.046110. [29] Andrea Lancichinetti, Filippo Radicchi, Joseฬ J. Ramasco, and Santo Fortunato. Finding Statistically Significant Communities in Networks. PLoS ONE, 6(4):1โ€“18, April 2011. URL: http://dx.doi.org/10.1371/journal.pone.0018961. [30] Jure Leskovec, Jon M. Kleinberg, and Christos Faloutsos. Graphs Over Time: Densification Laws, Shrinking Diameters and Possible Explanations. In Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 177โ€“ 187. ACM Press, 2005. URL: http://portal.acm.org/citation.cfm?id=1081893. [31] Anil Maheshwari and Norbert Zeh. A survey of techniques for designing I/O-efficient algorithms. In Algorithms for Memory Hierarchies, pages 36โ€“61, 2003. URL: http: //dx.doi.org/10.1007/3-540-36574-5_3, doi:10.1007/3-540-36574-5_3. [32] Ulrich Meyer and Manuel Penschuck. Generating massive scale-free networks under resource constraints. In Proceedings of the Eighteenth Workshop on Algorithm Engineering and Experiments (ALENEX 2016), pages 39โ€“52, 2016. URL: http://epubs.siam.org/doi/ abs/10.1137/1.9781611974317.4, doi:10.1137/1.9781611974317.4. [33] Ulrich Meyer and Peter Sanders. Delta-stepping: A parallel single source shortest path algorithm. In Algorithms - ESA โ€™98, 6th Annual European Symposium, Venice, Italy, August 24-26, 1998, Proceedings, pages 393โ€“404, 1998. URL: http://dx.doi.org/10.1007/ 3-540-68530-8_33, doi:10.1007/3-540-68530-8_33. [34] Ulrich Meyer, Peter Sanders, and Jop F. Sibeyn, editors. Algorithms for Memory Hierarchies, Advanced Lectures [Dagstuhl Research Seminar, March 10-14, 2002], volume 2625 of Lecture Notes in Computer Science. Springer, 2003. [35] Ron Milo, Nadav Kashtan, Shalev Itzkovitz, Mark E. J. Newman, and Uri. Alon. On the uniform generation of random graphs with prescribed degree sequences. eprint arXiv:condmat/0312028, December 2003. arXiv:cond-mat/0312028. [36] Rajeev Motwani and Prabhakar Raghavan. Randomized algorithms. Chapman & Hall/CRC, 2010. [37] Mark Newman. Networks: An Introduction. Oxford University Press, Inc., New York, NY, USA, 2010. [38] Rasmus Pagh. Basic external memory data structures. In Algorithms for Memory Hierarchies, pages 14โ€“35. Springer, 2003. [39] Jaideep Ray, Ali Pinar, and C. Seshadhri. Are We There Yet? When to Stop a Markov Chain while Generating Random Graphs. In Algorithms and Models for the 26 Web-Graph, Proceedings of the 9th International Workshop, WAW 2012, Lecture Notes in Computer Science, pages 153โ€“164. Springer, 2012. URL: https://doi.org/10.1007/ 978-3-642-30541-2_12. [40] Martin Rosvall, Daniel Axelsson, and Carl T. Bergstrom. The map equation. The European Physical Journal Special Topics, 178(1):13โ€“23, 2009. URL: http://dx.doi.org/10.1140/ epjst/e2010-01179-1. [41] Peter Sanders. Random permutations on distributed, external and hierarchical memory. Inf. Process. Lett., 67(6):305โ€“309, 1998. URL: http://dx.doi.org/10.1016/S0020-0190(98) 00127-6, doi:10.1016/S0020-0190(98)00127-6. [42] Peter Sanders. Fast priority queues for cached memory. Journal of Experimental Algorithmics (JEA), 5, 2000. [43] Wolfgang E. Schlauch, Emoฬ‹ke Aฬgnes Horvaฬt, and Katharina A. Zweig. Different flavors of randomness: comparing random graph models with fixed degree sequences. Social Network Analysis and Mining, 5(1):1โ€“14, 2015. URL: http://dx.doi.org/10.1007/ s13278-015-0267-z, doi:10.1007/s13278-015-0267-z. [44] Christian Staudt, Aleksejs Sazonovs, and Henning Meyerhenke. Networkit: A tool suite for large-scale complex network analysis. Network Science, 4(4):508530, 2016. doi:10.1017/ nws.2016.20. [45] The Lemur Project. ClueWeb12 Web Graph, Nov 2013. http://www.lemurproject.org/ clueweb12/webgraph.php. [46] Johan Ugander, Brian Karrer, Lars Backstrom, and Cameron Marlow. The anatomy of the facebook social graph. CoRR, abs/1111.4503, 2011. URL: http://arxiv.org/abs/1111. 4503. [47] Fabien Viger and Matthieu Latapy. Fast generation of random connected graphs with prescribed degrees. CoRR, abs/cs/0502085, 2005. Source code available at https: //www-complexnetworks.lip6.fr/~latapy/FV/generation.html. URL: http://arxiv. org/abs/cs/0502085. [48] Jeffrey Scott Vitter. An efficient algorithm for sequential random sampling. ACM Trans. Math. Softw., 13(1):58โ€“67, 1987. URL: http://doi.acm.org/10.1145/23002.23003, doi: 10.1145/23002.23003. [49] Jianping Zeng and Hongfeng Yu. A study of graph partitioning schemes for parallel graph community detection. Parallel Computing, 2016. URL: http://dx.doi.org/10.1016/j. parco.2016.05.008. [50] James Y. Zhao. Expand and contract: Sampling graphs with given degrees and other combinatorial families. CoRR, abs/1308.6627, 2013. URL: http://arxiv.org/abs/1308. 6627. 27 A Summary of Definitions Symbol [k] [u, v] B dmin , dmax din v D DD n m ยต M Pld ([a, b), ฮณ) smin , smax scan(n) sort(n) Description [k] := {1, . . . , k} for k โˆˆ N+ (section 2) Undirected simple edge with implication u < v (section 2) Number of items in a block transferred between IM and EM (section 2.1) Min/max degree of nodes in LFR benchmark (section 3) din v = (1โˆ’ยต) ยท dv , intra-community degree of node v (section 3) D = (d1 , . . . , dn ) with di โ‰ค di+1 โˆ€i. Degree sequence of a graph (section 4) DD = {di : 1 โ‰ค i โ‰ค n} where D = (d1 , . . . , dn ), degree support (section 4) Number of vertices in a graph (section 2) Number of edges in a graph (section 2) Mixing parameter in LFR benchmark, i.e. ratio of neighbors that shall be in other communities (section 3) Number of items fitting into internal memory (section 2.1) Powerlaw distribution with exponent โˆ’ฮณ on the interval [a, b) (section 2) Min/max size of communities in LFR benchmark (section 3) scan(n) = ฮ˜(n/B) I/Os, scan complexity (section 2.1) sort(n) = ฮ˜((n/B) ยท logM/B (n/B)) I/Os, sort complexity (section 2.1) Table 2: Definitions used in this paper. 28 B Comparing LFR Implementations Mixing ยต = 0.4, Cluster: Infomap 0.8 0.8 0.8 0.6 0.6 0.2 0 0.4 Orig NetworKit EM 103 0.2 104 0 105 AR 1 0.4 103 104 0.8 Orig NetworKit EM 0.6 0.4 0.2 0 105 NMI 0.8 0.6 104 Orig NetworKit EM 103 0.4 0 105 Mixing ยต = 0.4, Cluster: Louvain 0.8 0.8 0.6 0.6 0.4 Orig NetworKit EM 0.2 104 0 105 AR 0.8 AR 1 103 103 0.2 104 0 105 Mixing ยต = 0.4, Cluster: Louvain 0.8 0.8 0.6 Orig NetworKit EM 0.6 0.4 0.2 104 0 105 NMI 0.8 NMI 1 103 Orig NetworKit EM 103 Number n of nodes 0.4 0.2 104 0 105 Mixing: ยต = 0.4 106 106 106 Orig NetworKit EM 105 Orig NetworKit EM 104 103 105 103 Mixing: ยต = 0.2 Orig NetworKit EM 1 0.8 0.6 0.4 0.2 0 103 104 Number n of nodes Orig NetworKit EM 104 103 105 103 105 Orig NetworKit EM 0.8 0.6 0.4 0.2 0 103 104 Number n of nodes 104 105 Number n of nodes Mixing: ยต = 0.4 1 105 105 Number n of nodes Avg. Local Clustering Coeff. Number n of nodes 104 105 Avg. Local Clustering Coeff. 104 Edges 107 Edges 108 107 105 104 Mixing: ยต = 0.6 108 103 103 Number n of nodes 107 103 Orig NetworKit EM Number n of nodes Mixing: ยต = 0.2 105 0.6 108 104 104 Mixing ยต = 0.6, Cluster: Louvain 1 0 103 Number n of nodes 1 0.2 Orig NetworKit EM Number n of nodes Mixing ยต = 0.2, Cluster: Louvain 105 0.6 0.4 Orig NetworKit EM Number n of nodes 0.4 104 Mixing ยต = 0.6, Cluster: Louvain 1 0 103 Number n of nodes 1 0.2 Orig NetworKit EM Number n of nodes Mixing ยต = 0.2, Cluster: Louvain 105 0.6 0.2 104 Number n of nodes 0.4 104 Mixing ยต = 0.6, Cluster: Infomap 0.8 103 103 Number n of nodes 1 0.4 Orig NetworKit EM Mixing ยต = 0.4, Cluster: Infomap NMI NMI 105 1 0 AR 0 1 0.2 NMI 0.2 Number n of nodes Mixing ยต = 0.2, Cluster: Infomap Edges 0.6 0.4 Orig NetworKit EM Number n of nodes Avg. Local Clustering Coeff. Mixing ยต = 0.6, Cluster: Infomap 1 AR AR Mixing ยต = 0.2, Cluster: Infomap 1 Mixing: ยต = 0.6 Orig NetworKit EM 1 0.8 0.6 0.4 0.2 0 103 104 105 Number n of nodes Comparison of the original LFR implementation, the NetworKit implementation and our EM solution for values of 103 โ‰ค n โ‰ค 106 , ยตโˆˆ{0.2, 0.4, 0.6}, ฮณ=2, ฮฒ= โˆ’ 1 dmin =10, dmax =n/20, smin =10, smax =n/20. Clustering is performed using Infomap and Louvain and compared to the ground-truth emitted by the generator using AdjustedRandMeasure (AR) and Normalized Mutual Information (NMI); S โ‰ฅ 8. Due to the computational costs, graphs with n โ‰ฅ 105 have a reduced multiplicity. In case of the original implementation it may be based on a single run which accounts for the few outliers. 29 Mixing: ยต = 0.2, Cluster: OSLOM, Overlap: ฮฝ = 2 Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 2 Orig EM 1 0.4 0.2 0.6 0.4 0.2 104 0 105 Orig EM 0.8 0.6 0.4 0.2 103 104 105 Orig EM 0.6 0.4 0.2 0 103 0.6 0.4 0.2 104 0.6 0.4 0.2 103 0 0 104 105 0.4 0.2 104 105 0.4 0.2 104 Orig EM 0.8 0.6 0.4 0.2 0 103 105 0.4 103 0.6 0.4 0.2 104 Mixing: ยต = 0.6 Orig EM 0.8 0.6 0.4 0.2 0 103 0.8 0.6 0.4 0.2 103 0.2 Orig EM 0.8 0.6 0.4 0 105 0.6 0.4 0.2 103 104 0 105 103 Number n of nodes Orig EM 0.8 0.6 0.4 0.2 105 Avg. Local Clustering Coeff. Number n of nodes Mixing: ยต = 0.2 Orig EM 0.8 0.6 0.4 0.2 103 104 Number n of nodes 30 104 105 Number n of nodes Mixing: ยต = 0.4 1 0 105 Mixing: ยต = 0.6, Cluster: OSLOM, Overlap: ฮฝ = 4 1 0.2 104 104 Number n of nodes NMI NMI 0.4 105 Orig EM 1 0 105 0.8 0.6 104 Mixing: ยต = 0.6, Degree Assortativity, Overlap: ฮฝ = 3 Orig EM 1 105 Number n of nodes Orig EM 103 104 1 Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 4 Orig EM 105 Orig EM Number n of nodes 0.8 NMI 105 0.8 Mixing: ยต = 0.2, Cluster: OSLOM, Overlap: ฮฝ = 4 Avg. Local Clustering Coeff. 104 1 0 104 Number n of nodes Mixing: ยต = 0.4 Number n of nodes Number n of nodes 103 0.6 0 105 Degree Assortativity 0.6 104 0.2 Mixing: ยต = 0.4, Degree Assortativity, Overlap: ฮฝ = 3 Degree Assortativity Degree Assortativity Orig EM 103 0.4 Number n of nodes 0.8 0 104 1 Mixing: ยต = 0.2, Degree Assortativity, Overlap: ฮฝ = 3 1 0.6 0.2 103 Number n of nodes 103 0.8 1 Avg. Local Clustering Coeff. 0.6 Avg. Local Clustering Coeff. Avg. Local Clustering Coeff. 0.8 0 Orig EM 1 Number n of nodes Orig EM 105 0.8 Number n of nodes Mixing: ยต = 0.2 104 Mixing: ยต = 0.6, Cluster: OSLOM, Overlap: ฮฝ = 3 Orig EM 0.4 0.2 1 103 Number n of nodes 0.6 0.2 103 0 0 105 NMI NMI NMI 0.4 1 0.2 Mixing: ยต = 0.6, Degree Assortativity, Overlap: ฮฝ = 2 0.8 0.6 0 104 1 0.8 103 0.4 Mixing: ยต = 0.4, Cluster: OSLOM, Overlap: ฮฝ = 3 Orig EM 1 0.6 Number n of nodes Mixing: ยต = 0.2, Cluster: OSLOM, Overlap: ฮฝ = 3 103 Orig EM 0.8 Number n of nodes Orig EM Number n of nodes 0 105 0.8 0 105 105 Mixing: ยต = 0.6 Mixing: ยต = 0.4, Degree Assortativity, Overlap: ฮฝ = 2 Degree Assortativity Degree Assortativity 0.8 1 104 1 104 1 Number n of nodes Orig EM 103 103 Number n of nodes 0.8 Mixing: ยต = 0.2, Degree Assortativity, Overlap: ฮฝ = 2 0 0 105 Mixing: ยต = 0.4 1 Number n of nodes 1 104 Avg. Local Clustering Coeff. Mixing: ยต = 0.2 0 0.4 Number n of nodes Avg. Local Clustering Coeff. Avg. Local Clustering Coeff. Number n of nodes 1 0.6 0.2 103 Degree Assortativity 103 105 Avg. Local Clustering Coeff. 0 0.8 NMI 0.6 Orig EM 1 0.8 NMI NMI 0.8 Mixing: ยต = 0.6, Cluster: OSLOM, Overlap: ฮฝ = 2 Orig EM 1 Mixing: ยต = 0.6 Orig EM 1 0.8 0.6 0.4 0.2 0 103 104 Number n of nodes 105 0.8 0.6 0.4 0.2 0 103 104 Number n of nodes Mixing: ยต = 0.4, Degree Assortativity, Overlap: ฮฝ = 4 105 Orig EM 1 0.8 0.6 0.4 0.2 0 103 104 Number n of nodes Mixing: ยต = 0.6, Degree Assortativity, Overlap: ฮฝ = 4 Degree Assortativity Orig EM Degree Assortativity Degree Assortativity Mixing: ยต = 0.2, Degree Assortativity, Overlap: ฮฝ = 4 1 105 Orig EM 1 0.8 0.6 0.4 0.2 0 103 104 105 Number n of nodes Comparison of the original LFR implementation and our EM solution for values values of 103 โ‰ค n โ‰ค 106 , ยตโˆˆ{0.2, 0.4, 0.6}, ฮฝโˆˆ{2, 3, 4}, O = n, ฮณ=2, ฮฒ= โˆ’ 1 dmin =10, dmax =n/20, smin =10ฮฝ, smax =ฮฝ ยท n/20. Clustering is performed using OSLOM and compared to the groundtruth emitted by the generator using a generalized Normalized Mutual Information (NMI); S โ‰ฅ 5. 31 Comparing EM-ES and EM-CM/ES Mean after 5m swaps EM-ES, S = 1170 EM-CMES, S = 600 ร—107 2 3 Number of swaps per edge k/m 4 3.05 3.00 2.95 2.90 2.85 7.5 7.0 6.5 6.0 5.5 5 Nodes: 105 , Mixing: 1.0 ร—109 Mean after 5m swaps EM-ES, S = 1138 EM-CMES, S = 600 ร—108 0 1 Nodes: 105 , Mixing: 0.2 0.90 0.88 0.86 0.84 0.82 0.80 0.50 0.48 0.46 0.44 0.42 0.40 1 4 1 2 3 Number of swaps per edge k/m 4 2.4 2.2 2.0 1.8 1.6 1.4 1.2 5 1 2 3 Number of swaps per edge k/m 4 5 Nodes: 107 , Mixing: 1.0 ร—1010 Mean after 5m swaps EM-ES, S = 20 EM-CMES, S = 20 ร—109 0 0.50 0.48 0.46 0.44 0.42 4 6.38 6.36 6.34 6.32 6.30 6.28 6.26 5 Mean after 5m swaps EM-ES, S = 40 EM-CMES, S = 40 2 3 Number of swaps per edge k/m 5 Mean after 5m swaps EM-ES, S = 1138 EM-CMES, S = 720 0 Nodes: 107 , Mixing: 0.2 1 4 0.39 0.38 0.37 0.36 0.35 0.34 0.33 0.32 5 Mean after 5m swaps EM-ES, S = 40 EM-CMES, S = 40 1.00 0.98 0.96 0.94 0.92 0.90 0 0.61 0.60 0.59 0.58 0.57 0.56 0.55 0.54 Nodes: 107 , Mixing: 0.2 ร—108 5.12 5.10 5.08 5.06 5.04 5.02 ร—107 2.0 1.8 1.6 1.4 1.2 1.0 0 2 3 Number of swaps per edge k/m 2 3 Number of swaps per edge k/m Nodes: 105 , Mixing: 1.0 Mean after 5m swaps EM-ES, S = 1170 EM-CMES, S = 600 0 Number of triangles 1 Number of triangles Degree assortativity 0 Degree assortativity Number of triangles 1.3 1.2 1.1 1.0 0.9 0.8 Nodes: 105 , Mixing: 0.2 ร—108 Degree assortativity 1.25 1.24 1.23 1.22 1.21 1.20 Degree assortativity Number of triangles C 1 2 3 Number of swaps per edge k/m 4 5 Nodes: 107 , Mixing: 1.0 1.00 0.98 0.96 0.94 0.92 0.90 Mean after 5m swaps EM-ES, S = 20 EM-CMES, S = 20 0.50 0.48 0.46 0.44 0.42 0 1 2 3 Number of swaps per edge k/m 4 5 Triangle count and degree assortativity of a graph ensemble obtained by applying random swaps/the Configuration Model to a common seed graph. Refer to section 10.6 for experimental details. 32
8cs.DS
arXiv:1510.08568v2 [cs.NE] 8 Apr 2016 Feature-Based Diversity Optimization for Problem Instance Classification Wanru Gao Optimisation and Logistics School of Computer Science The University of Adelaide Adelaide, Australia Samadhi Nallaperuma Department of Computer Science The University of Sheffield Sheffield,UK Frank Neumann Optimisation and Logistics School of Computer Science The University of Adelaide Adelaide, Australia April 11, 2016 Abstract Understanding the behaviour of heuristic search methods is a challenge. This even holds for simple local search methods such as 2-OPT for the Traveling Salesperson problem. In this paper, we present a general framework that is able to construct a diverse set of instances that are hard or easy for a given search heuristic. Such a diverse set is obtained by using an evolutionary algorithm for constructing hard or easy instances that are diverse with respect to different features of the underlying problem. Examining the constructed instance sets, we show that many combinations of two or three features give a good classification of the TSP instances in terms of whether they are hard to be solved by 2-OPT. 1 Introduction Heuristic search methods such as local search, simulated annealing, evolutionary algorithms and ant colony optimization have been shown to be very successful for various combinatorial optimization problems. Although they usually donโ€™t come with performance guarantees on their runtime and/or approximation behaviour, they often perform very well in several situations. Understanding the conditions under which optimization algorithms perform well is essential for automatic algorithm selection, configuration and effective algorithm design. In both the artificial intelligence (AI) [23, 9, 22, 5, 7] and operational research communities [17, 21], this topic has become a major point of interest. 1 The feature-based analysis of heuristic search algorithms has become an important part in understanding such type of algorithms [11, 18]. This approach characterizes algorithms and their performance for a given problem based on features of problem instances. Thereby, it provides an important tool for bridging the gap between pure experimental investigations and mathematical methods for analysing the performance of search algorithms [15, 10, 6]. Current methods for the feature-based analysis are based on constructing hard and easy instances for an investigated search heuristic and a given optimization problem by evolving instances using an evolutionary algorithm [11, 14, 13]. This evolutionary algorithm constructs problem instances where the examined algorithm either shows a bad (good) approximation behaviour and/or requires a large (small) computational effort to come up with good or optimal solutions. Although the evolutionary algorithm for constructing such instances is usually run several times to obtain a large set of hard (easy) instances, the question arises whether the results in terms of features of the instances obtained give a good characterization of problem difficulty. In the paper, we propose a new approach of constructing hard and easy instances. Following some recent work on using evolutionary algorithms for generating diverse sets of instances that are all of high quality [19, 20], we introduce an evolutionary algorithm which maximizes diversity of the obtained instances in terms of a given feature. Our approach allows to generate a set of instances that is much more diverse with respect to the problem feature at hand. Carrying out this process for several features of the considered problem and algorithm gives a much better classification of instances according to their difficulty of being solved by the considered algorithm. To show the benefit of our approach compared to previous methods, we consider the classical 2-OPT algorithm for the TSP. Previous feature-based analyses have already considered hard and easy instances in terms of approximation ratio and analyzed the features of such hard (easy) instances obtained by an evolutionary algorithm. The experimental results of our new approach show that diversity optimization of the features results in an improved coverage of the feature space over classical instance generation methods. In particular, the results show that for some combinations of two features it is possible to classify hard and easy instances into two clusters with a wider coverage of the feature space compared to the classical methods. Moreover, the three-feature combinations further improve the classification of hard and easy instances for most of the feature combinations. Furthermore, a classification model is built using these diverse instances that can classify TSP instances based on hardness for 2-OPT. The remainder of this paper is organized as follows. Firstly, we introduce the Euclidean TSP and the background on feature based analysis. Afterwards, we state our diversity optimization approach for evolving instances according to feature values and report on the impact of diversity optimization in terms of the range of feature values. As features value can be very diverse both for easy and hard instances, we consider the combinations of several features for instance classification afterwards. We then build a classification model that can classify instances based on hardness and finally finish with some conclusions. 2 2 Background We consider the classical NP-hard Euclidean Traveling Salesperson problem (TSP) as the example problem for evolving hard and easy instances which have a diverse set of features. Our methodology can be applied to any optimization problem, but using the TSP in our study has the advantage that it has already been investigated extensively from different perspectives including the area of feature-based analysis. The input of the problem is given by a set V = {v1 , ..., vn } of n cities in the Euclidean plane and Euclidean distances d : V ร—V โ†’ Rโ‰ฅ0 between the cities. The goal is to find a Hamiltonian cycle whose sum of distances is minimal. A candidate solution for the TSP is often represented by a permutation ฯ€ = (ฯ€1 , . . . , ฯ€n ) of the n cities and the goal is to find a permutation ฯ€ โˆ— which minimizes the tour length given by nโˆ’1 c(ฯ€) = d(ฯ€n , ฯ€1 ) + โˆ‘ d(ฯ€i , ฯ€i+1 ). i=1 For our investigations cities are always in the normalized plane [0, 1]2 , i. e. each city has an x- and y-coordinate in the interval [0, 1]. In following, a TSP instance always consists of a set of n points in [0, 1]2 and the Euclidean distances between them. Local search heuristics have been shown to be very successful when dealing with the TSP and the most prominent local search operator is the 2-OPT operator [4]. The resulting local search algorithm starts with a random permutation of the cities and repeatedly checks whether removing two edges and reconnecting the two resulting paths by two other edges leads to a shorter tour. If no improvement can be found by carrying out any 2-OPT operation, the tour is called locally optimal and the algorithm terminates. The key factor in the area of feature-based analysis is to identify the problem features and their contribution to the problem hardness for a particular algorithm and problem combination. This can be achieved through investigating hard and easy instances of the problem. Using an evolutionary algorithm, it is possible to evolve sets of hard and easy instances by maximizing or minimizing the fitness (tour length in the case of the TSP) of each instance [21, 17, 11, 18]. However, none of these approaches have considered the diversity of the instances explicitly. Within this study we expect to improve the evolutionary algorithm based instance generation approach by introducing diversity optimization. The structural features are dependent on the underlying problem. In [11], there are 47 features in 8 groups used to provide an understanding of algorithm performance for the TSP. The different feature classes established are distance features, mode features, cluster features, centroid features, MST features, angle features and convex hull features. The feature values are regarded as indicators which allow to predict the performance of a given algorithm on a given instance. 3 Feature-Based Diversity Optimization In this section, we introduce our approach of evolving a diverse set of easy or hard instances which are diverse with respect to important problem features. As in previous 3 Algorithm 1: (ยต + ฮป )-EAD 1 2 3 4 5 Initialize the population P with ยต TSP instances of approximation ratio at least ฮฑh . Let C โІ P where |C| = ฮป . For each I โˆˆ C, produce an offspring I 0 of I by mutation. If ฮฑA (I 0 ) > ฮฑh , add I 0 to P. While |P| > ยต, remove an individual I = arg minJโˆˆP d(J, P) uniformly at random. Repeat step 2 to 4 until termination criterion is reached. studies, we measure hardness of a given instance by the ratio of the solution quality obtained by the considered algorithm and the value of an optimal solution. The approximation ratio of an algorithm A for a given instance I is defined as ฮฑA (I) = A(I)/OPT (I) where A(I) is value of the solution produced by algorithm A for the given instance I, and OPT (I) is value of an optimal solution for instance I. Within this study, A(I) is the tour length obtained by 2-OPT for a given TSP instance I and OPT (I) is the optimal tour length which we obtain in our experiments by using the exact TSP solver Concorde [1]. We propose to use an evolutionary algorithm to construct sets of instances of the TSP that are quantified as either easy or hard in terms of approximation and are diverse with respect to underlying features of the produced problem instances. Our evolutionary algorithm (shown in Algorithm 1) evolves instances which are diverse with respect to given features and meet given approximation ratio thresholds. The algorithm is initialized with a population P consisting of ยต TSP instances which have an approximation ratio at least ฮฑh in the case of generating a diverse set of hard instances. In the case of easy instances, we start with a population where all instances have an approximation ratio of at most ฮฑe and only instances of approximation ratio at most ฮฑe can be accepted for the next iteration. In each iteration, ฮป โ‰ค ยต offspring are produced by selecting ฮป parents and applying mutation to the selected individuals. Offsprings that donโ€™t meet the approximation threshold are rejected immediately. The new parent population is formed by reducing the set consisting of parents and offsprings satisfying the approximation threshold until a set of ยต solutions is achieved. This is done by removing instances one by one based on their contribution to the diversity according to the considered feature. The core of our algorithm is the selection among individuals meeting the threshold values for the approximation quality according to feature values. Let I1 , . . . , Ik be the elements of P and f (Ii ) be their features values. Furthermore, assume that f (Ii ) โˆˆ [0, R], i.e. feature values are non-negative and upper bounded by R. We assume that f (I1 ) โ‰ค f (I2 ) โ‰ค . . . โ‰ค f (Ik ) holds. The diversity contribution of an instance I to a population of instances P is defined as d(I, P) = c(I, P) 4 where c(I, P) is a contribution based on other individuals in the population Let Ii be an individual for which f (Ii ) 6= f (I1 ) and f (Ii ) 6= f (Ik ). We set c(Ii , P) = ( f (Ii ) โˆ’ f (Iiโˆ’1 )) ยท ( f (Ii+1 ) โˆ’ f (Ii )) which assigns the diversity contribution of an individual based on the next smaller and next larger feature values. If f (Ii ) = f (I1 ) or f (Ii ) = f (Ik ), we set c(Ii , P) = R2 if there is no other individual I 6= Ii in P with f (I) = f (Ii ) and c(Ii , P) = 0 otherwise. This implies an individual Ii with feature value equal to any other instances in the population gains c(Ii , P) = 0. Furthermore, an individual with the unique smallest and largest feature value always stays in the population when working with ยต โ‰ฅ 2. In [11], 47 features of TSP instances for characterizing easy and hard TSP instances have been studied. We consider 7 features coming from different feature classes which have shown to be well suited for classification and prediction. These features are: โ€ข angle mean :- mean value of the angles made by each point with its two nearest neighbor points โ€ข centroid mean distance to centroid :- mean value of the distances from the points to the centroid โ€ข chull area : - area covered by the convex hull โ€ข cluster 10pct mean distance to centroid :- mean value of the distances to cluster centroids at 10% levels of reachability โ€ข mst depth mean :- mean depth of the minimum spanning tree โ€ข nnds mean :- mean distance between nearest neighbours โ€ข mst dists mean :- mean distance of the minimum spanning tree We refer the reader to [11] for a detailed explanation for each feature. We carry out our diversity optimization approach for these features and use the evolutionary algorithm to evolve for each feature a diverse population of instances that meets the approximation criteria for hard/easy instances given by the approximation ratio thresholds. All programs in our experiments are written in R and run in R environment [16]. We use the functions in tspmeta package to compute the feature values [11]. The setting of the evolutionary algorithm for diversity optimization used in our experiments is as follows. We use ยต = 30 and ฮป = 5 for the parent and offspring population size, respectively. The 2-OPT algorithm is executed on each instance I five times with different initial solutions and we set A(I) to the average tour length obtained. The examined instance sizes n are 25, 50 and 100, which are denoted by the number of cities in one instance. Based on previous investigations in [11] and initial experimental investigations, we set ฮฑe = 1 for instances of size 25 and 50, and ฮฑe = 1.03 for instances of size 100. Evolving hard instances, we use ฮฑh = 1.15, 1.18, 1.2 for instances of size n = 25, 50, 100, respectively. The mutation operator picks in each step one city for the 5 Figure 1: (left)The boxplots for centroid mean distance to centroid feature values of a population consisting of 100 different hard or easy TSP instances of different number of cities without or with diversity mechnism.(right)The boxplots for cluster 10% distance distance to centroid feature values of a population consisting of 100 different hard or easy TSP instances of different number of cities without or with diversity mechnism. Easy and hard instances from conventional approach and diversity optimization are indicated by e(a), h(a) and e(b), h(b) respectively. given parent uniformly at random and changes its x- and y-coordinator by choosing an offset according to the Normal-distribution with standard deviation ฯƒ . Coordinates that are out of the interval are reset to the value of the parent. Based on initial experiments we use two mutation operators with different values of ฯƒ . We use ฯƒ = 0.025 with probability 0.9 and ฯƒ = 0.05 with probability 0.1 in a mutation step. The evolutionary algorithm terminates after 10, 000 generations which allows to obtain a good diversity for the considered features. For each n = 25, 50, 100 and each of the 7 features, a set of easy and hard instances are generated, which results in 42 independent runs of the (ยต+ฮป )-EAD . 4 Range of Feature Values We first evaluate our diversity optimization approach in terms of the diversity that is obtained with respect to a single feature. Focusing on a single feature in each run provides the insight of the possible range of a certain feature value for hard or easy instances. The previous study [11], suggests that there are some differences in the possible range of feature values for easy and hard instances. We study the effect of the diversity optimization on the range of features by comparing the instances generated by diversity optimization to the instances generated by the conventional approach in [11]. Evolving hard instances based on the conventional evolutionary algorithm, the obtained instances have mean approximation ratios of 1.12 for n = 25, 1.16 for n = 50, and 1.18 for n = 100. For easy instances, the mean approximation ratios are 1 for n = 25, 50 and 1.03 for n = 100. Figure 1 (left) presents the variation of the mean distance of the distances between points and the centroid feature (centroid mean distance to centroid) for hard and easy instances of the three considered sizes 25, 50 and 100. Each set consists of 100 instances generated by independent runs [11]. As shown in Figure 1 (left) the hard in6 stances have higher feature values than for easy instances for all instance sizes. For example, for instance size 100 and for the hard instances the median value (indicated by the red line) is 0.4157 while its only 0.0.4032 for the easy instances. The respective range of the feature value is 0.0577 for the hard instances and 0.0645 for the easy instances. For the instances generated by diversity optimization (easy and hard instances are indicated by e (b) and h (b) respectively), there is a difference in the median feature values for the hard and easy instances similar to the instances generated by the conventional approach. Additionally, the range of the feature values for both the hard and easy instances has significantly increased. For example, for the instance size 100, the median value for easy instances is 0.4028 and the range is 0.2382. For the hard instances of the same size, the median is 0.04157 while the range is 0.1917 (see Figure 1 (left)). Similarly, Figure 1 (right) presents the variation of cluster 10% distance to centroid (cluster 10pct distance to centroid) feature for the hard and easy instances generated by the conventional approach (indicated by (e (a) and h (a)) and for the hard and easy instances generated by diversity optimization (indicated by (e (b) and h (b))). The general observations from these box plots are quite similar to the observations from the mst dist mean shown in Figure 1 (left). For the easy instances of size 100, the range of the feature value is 0.0919 for conventional instances and 0.3471 for the instances generated by diversity optimization. Similarly, for the hard instances the range of the feature values has increased from 0.0577 to 0.1776 by the diversity optimization approach. As shown in Figure 1 (right), there is a significant increase in the range for other instance sizes as well. Improved ranges in feature values are observed for all considered features however, due to space limitations these are not included in the paper. The above results suggest that the diversity optimization approach has resulted in a significant increase in the coverage over the feature space. Having the threshold for approximation ratios (ฮฑe and ฮฑh ) our method guarantees the hardness of the instances. These approximation thresholds are more extreme than the mean approximation values obtained by the conventional method. Furthermore, starting with initial population of duplicated instances and a hard coded threshold, the modified (ยต + ฮป )-EA is able to achieve hard instances with approximation ratio 1.347, 1.493 and 1.259, respectively for instance size 25, 50 and 100. The majority of the instances are clustered in a small region in the feature space while some other points are dispersed across the whole space. This is evident in the median values similar to the values for the instances with respect to conventional approach and with significantly larger range in feature value. The conventional approach has failed to explore certain regions in the feature space and missed some instances existing in those regions. Being able to discover all these instances spread in the whole feature space, our approach provides a strong basis for more effective feature based prediction. As a result of the increased ranges and the similar gap in median feature values for hard and easy instances compared to the conventional instances, there is a strong overlap in the ranges of the features for easy and hard instances generated by the diversity optimization. This is observed in the results for mst dist mean and cluster 10pct distance to centroid shown in Figure 1. Similar pattern holds for the other features as well. This prevents a good classification of problem instances based on single feature value. 7 Figure 2: 2D Plots of feature combinations which provide a separation between easy and hard instances. The blue dots and orange dots represent hard and easy instances respectively. 5 Classification Based on Multiple Features As a single feature is not capable in clearly classifying the hard/easy instances, combinations of two or three different features are examined in the following. Our analysis mainly focuses on combinations of the 7 previously introduced features. 5.1 Diversity Maximization over Single Feature Value Firstly, we represent the instances according to the combination of two different features in the 2-dimensional feature value space (see Figure 2 for an example). According to the observation and discussion in [11], the two features distance max and angle mean can be considered together to provide an accurate classification of the hard and easy instances. Whereas after increasing the diversity over the seven different feature values and a wider coverage of the 2D space is achieved, the separation of easy and hard instances is not so obvious. The clusters of dots representing hard and easy instances have some overlapping as shown in the left graphs of Figure 2. There are large overlapping areas lying between the two groups of instances. Another example of some separation given by two-feature combination is mst dists mean and chull area which measure the mean distance of the minimum spanning tree and the area of the convex hull. However, as the number of cities in an instance increases, the overlapping area becomes larger. It is hard to do classification based on this. 8 Figure 3: 2D Plots of feature combinations which does not provide a clear separation between easy and hard instances. The blue dots and orange dots represent hard and easy instances respectively. After examining the 21 different combinations of two features out of the seven features, we found out that some combinations of two features provide a fair separation between hard and easy instances after increasing the diversity over different feature values. As shown in Figure 2, taking both mst dists mean and chull area features into consideration, some separations can be spotted between hard and easy instances. However, most combinations are not able to give a clear classification between hard and easy instances, for example in Figure 3, neither the combination of features nnds mean and centroid mean distance to centroid nor features mst depth mean and chull area shows clear classification between instances of different hardness. Moreover, along with the instance size increment, the overlapping area of the dots standing for hard and easy instances grows. Since the majority of two-feature combinations are not capable of classifying easy and hard instances, the idea of combining three different feature is put forward. As in the analysis of two-feature combination, the values of the three selected features are plotted in 3D space. By considering a third feature in the combination, in the 35 different combinations, it is clear that there are some separations between the two groups of 210 instances from the 3D-plots. A good selection of features results in an accurate classification of the instances. The three-feature combinations with the features measuring statistics about minimum spanning tree always provide good separation between hard and easy instances as shown in Figure 4 and Figure 5. Although there is an overlapping in the 9 area between the two clusters of hard and easy instances, from the 3D-plots, we can spot some areas where there are only dots for instances of certain hardness. Taken another feature value into consideration, the two-feature combination that is not able to provide good separation can give some clear classification in hard and easy instances. An example illustrating this is included as Figure 6, where together with an additional feature mst dists mean, the two-feature combination of features mst depth mean and chull area shows a clear separation between easy and hard instances comparing to the results shown in the left graph in Figure 3. From the investigation of both the two-feature combination and three-feature combination, we found out that the range of feature values for larger TSP instances is smaller. Some of the good combinations for classifying the hardness of smaller instances may not work for larger instances, such as centroid features which performs well when combining with another feature in classifying the hardness of instances of 25 cities while does not show a clear separation with instance size 50 and 100 in our study. However, there exist some three-feature combinations that give good classification of easy and hard instances without regarding to the instance size, for example mst dists mean, chull area and nnds mean, and mst dists mean, chull area and mst depth mean. 5.2 Diversity Maximization over Multiple Feature Values In order to examine the relationship between feature combination and hardness of the instances, a weighted population diversity based on multiple features is introduced. The weighted population diversity for a certain set of features { f1 , f2 , ..., fk } is defined as the weighted sum of the normalised population diversity over these k features. The contribution of an instance I to the weighted population diversity is defined as k d 0 (I, P) = โˆ‘ (wi ยท d fi (I, P)), i=1 where d fi (I, P) denotes the normalised contribution to the population diversity d(I, P) over certain feature i and wi represents the weight of feature i. The contribution of an individual to the population diversity on certain feature is normalised based on the maximum population diversity on the feature, in order to reduce the bias among different features. This weighted population diversity is used in Algorithm 1 to gain some insight of the relationship between features combination and instance quality. The same parent and offspring population sizes are used for these experiments, which are ยต = 30 and ฮป = 5. The instance sizes examined are still 25, 50 and 100. The 2-OPT algorithm is executed five times to obtain the approximation quality. In the experiments, (ยต+ฮป )-EAD execute for 10, 000 generation as previous. Since it is shown in Section 4 that a combination of three features is able to provide a good separation between hard and easy instances, some of the good three-feature combinations are chosen for exploration. The weight distributions for { f1 , f2 , f3 } considered in the experiments are {1, 1, 1}, {2, 1, 1}, {1, 2, 1}, {1, 1, 2}, {2, 2, 1}, {2, 1, 2}, {1, 2, 2}. The same hardness thresholds are used in these experiments as previous. After the seven independent runs 10 Figure 4: 3D Plots of combining experiment results from maximizing the diversity over features mst dists mean, nnds mean and chull area, which provides a good separation of easy and hard instances. Hard and easy instances are represented as blue dots and orange dots respectively. 11 Figure 5: 3D Plots of combining experiment results from maximizing the diversity over features mst dists mean, chull area and centroid mean distance to centroid, which provides a good separation of easy and hard instances. Legend is the same as that in Figure 4. 12 Figure 6: 3D Plots of combining experiment results from maximizing the diversity over features mst dists mean, chull area and mst depth mean, which provides a good separation of easy and hard instances. Legend is the same as that in Figure 4. 13 Figure 7: 3D Plots of combining experiment results from maximizing the diversity over features mst dists mean, nnds mean and chull area with considering of weighting, which provides a good separation of easy and hard instances. Legend is the same as that in Figure 4. 14 for easy and hard instances, the final solution sets are put together. Therefore the results set has 210 instances for each instance size and hardness type, which is the same as previous experiments. The results are plotted in 3D space and compared to the previous experiments on single feature discussed in Section 3 and 4. The weighted population diversity offers a way to examine the overlapping area of hard and easy instances. With the weighting technique, it takes consideration about the relationship between the different features examined. Since most of these features are not independent from each others and the weighted population diversity considers multiple features at the same time, it is predictable that with the weighted population diversity the extreme value for each single feature may not reach. An example is shown in Figure 7 focusing on maximizing the weighted population diversity over the combination of features mst dists mean, nnds mean and chull area, which is shown to be a good combination for separating the hard and easy instances. From the comparison between Figure 4 and Figure 7, we can see that although the results from maximizing weighted population diversity does not cover a wider search space, it provides a detailed insight into the intersection between the hard and easy instances. The 3D plots of different instance sizes show that the combination of these three certain features provide a clear separation between hard and easy instances. There are some overlapping areas in the search space, but it is clear that this combination of features provide some hints for predicting of hard or easy instances. 6 Instances Classification Using Support Vector Machine Support vector machines (SVMs) are well-known supervised learning models in machine learning which can be used for classification, regression and outliers detection [3, 8]. In order to quantify the separation between instances of different hardness based on the feature values, SVM models are constructed for each combination of features. 6.1 Linear SVM The linear classifier is the first model tried in classifying the dataset. In SVM the linear classifiers that can separate the data with maximum margin is termed as the optimal separating hyper-plane. From the plots in Figure 2, 3, 4 and 5, it is clear that none of the datasets are linearly separable. Taken the trade-off between maximizing the margin and minimizing the number of misclassified data points into consideration, the soft-margin SVM is used for classification. Let ACCn be the training accuracy of a feature combination in separating the hard and easy instances of size n. We define ACCn as the ratio of number of instances which are correctly classified by the model to the total number of instances in the dataset. All classification experiments are done in R with library{e1071} [12]. The training data of the SVM models are the population of 420 instances generated as in Section 3 and the training accuracy is regarded as a quantified measurement of the separation between hard and easy instances. The feature combinations used for classification are the 21 two-feature combinations and 35 three-feature combinations discussed in Section 5. 15 From experiment results, ACC25 for two-feature combinations lie in the range of 0.5095 to 0.7548 with an average accuracy of 0.6672, while the ACC25 for three-feature combination lie between 0.6286 to 0.7786 with average value 0.7079. In the case of instances with city number of 50, two-feature combination results in ACC50 lying in the range of 0.5286 to 0.7738 with an average of 0.6544 while ACC50 of three-feature combinations are from 0.5381 to 0.85 with average accuracy equal to 0.6969. For larger instance size, ACC100 are in the range between 0.5738 and 0.8119 with average 0.6986 for two-feature combination, whereas those for three-feature combination lie in the scope of 0.6238 to 0.8524 with average 0.7382. Although three-feature combinations show better accuracy in separation of hard and easy instances than those two-feature combinations, there is no significant difference in ACC for two-feature combinations and three-feature combinations. Moreover, the general low accuracy implies the high possibility that the linear models are not suitable for separating the hard and easy instances based on most of the feature combinations. We then move to applying kernel function for non-linear mapping of the feature combination. 6.2 Nonlinear Classification with RBF Kernel The linearly non-separable features can become linearly separable after mapped to a higher dimension feature space. The Radial Basis Function (RBF) kernel is one of the well-known kernel function used in SVM classification. There are two parameters need to be selected when applying RBF, which are C(cost) and ฮณ. The parameter setting for RBF is crucial, since increasing C and ฮณ leads to accurate separation of the training data but at the same time causes over-fitting. The SVMs here are generated for quantifying the separation rate between hard and easy instances rather than classifying other instances. After some initial trials, (C, ฮณ) is set to (100, 2) in all the tests to avoid over-fitting. This parameter setting may not be the best parameters for the certain feature combination in SVM classifying, but it helps us to gain some understanding of the separation of hard and easy instances generated from previous experiments based on the same condition. Table 1 and 2 show the accuracy of different two features or three features combination in hard and easy instances separation. With RBF kernel, SVM with certain parameter setting can generate a model separating the dataset with average accuracy of 0.8170, 0.8244 and 0.8346 in 2D feature space for instance size 25, 50 and 100 respectively. Whereas with three features, SVM with the same parameter setting provides a separation with average accuracy of 0.9503, 0.9584 and 0.9422 for instance size 25, 50 and 100 respectively. From the results, it can be concluded that there are better separations between hard and easy instances in the 3D feature space. 16 Feature 1 angle mean angle mean angle mean angle mean angle mean angle mean centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid chull area chull area chull area chull area cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid mst depth mean mst depth mean nnds mean Feature 2 centroid mean distance to centroid chull area cluster 10pct mean distance to centroid mst depth mean nnds mean mst dists mean chull area cluster 10pct mean distance to centroid mst depth mean nnds mean mst dists mean cluster 10pct mean distance to centroid mst depth mean nnds mean mst dists mean mst depth mean nnds mean mst dists mean nnds mean mst dists mean mst dists mean ACC25 0.8476 0.7857 0.7810 0.7524 0.8167 0.8119 0.8619 0.8524 0.8381 0.8786 0.8905 0.8000 0.7429 0.8071 0.8619 0.7619 0.8190 0.8095 0.7786 0.8095 0.8500 ACC50 0.8071 0.7810 0.7786 0.7381 0.8833 0.8024 0.7667 0.8357 0.7643 0.9524 0.8571 0.7881 0.7429 0.8905 0.8643 0.7714 0.8833 0.8095 0.8595 0.8214 0.9143 ACC100 0.8071 0.7929 0.8000 0.8000 0.8452 0.8405 0.8381 0.7548 0.8095 0.8476 0.8762 0.8548 0.7571 0.8452 0.9024 0.7929 0.8643 0.8738 0.8405 0.8810 0.9024 Table 1: This table lists the accuracy of SVM with RBF kernel separating the hard and easy instances in 21 different two-feature space. Feature 1 angle mean angle mean angle mean angle mean angle mean angle mean angle mean angle mean angle mean angle mean angle mean angle mean angle mean angle mean angle mean centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid chull area chull area chull area chull area chull area chull area cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid mst depth mean Feature 2 centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid centroid mean distance to centroid chull area chull area chull area chull area cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid mst depth mean mst depth mean nnds mean chull area chull area chull area chull area cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid mst depth mean mst depth mean nnds mean cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid cluster 10pct mean distance to centroid mst depth mean mst depth mean nnds mean mst depth mean mst depth mean nnds mean nnds mean Feature 3 chull area cluster 10pct mean distance to centroid mst depth mean nnds mean mst dists mean cluster 10pct mean distance to centroid mst depth mean nnds mean mst dists mean mst depth mean nnds mean mst dists mean nnds mean mst dists mean mst dists mean cluster 10pct mean distance to centroid mst depth mean nnds mean mst dists mean mst depth mean nnds mean mst dists mean nnds mean mst dists mean mst dists mean mst depth mean nnds mean mst dists mean nnds mean mst dists mean mst dists mean nnds mean mst dists mean mst dists mean mst dists mean ACC25 0.9500 0.9405 0.9548 0.9452 0.9571 0.9524 0.9357 0.9405 0.9667 0.9214 0.9476 0.9571 0.9310 0.9476 0.9429 0.9476 0.9595 0.9667 0.9714 0.9476 0.9643 0.9500 0.9500 0.9548 0.9667 0.9286 0.9524 0.9595 0.9381 0.9476 0.9714 0.9214 0.9500 0.9643 0.9429 ACC50 0.9190 0.9357 0.9548 0.9952 0.9500 0.9310 0.9238 0.9714 0.9619 0.9143 0.9690 0.9143 0.9762 0.9262 0.9762 0.9333 0.8762 0.9881 0.9714 0.9286 0.9905 0.9595 0.9881 0.9548 1.0000 0.9524 0.9667 0.9595 0.9857 0.9738 0.9857 0.9857 0.9476 0.9833 0.9929 ACC100 0.9452 0.8214 0.9214 0.9833 0.9524 0.8881 0.9500 0.9571 0.9143 0.9810 0.9333 0.9405 0.9238 0.9476 0.8833 0.9310 0.9762 0.9929 0.8381 0.8571 0.8810 0.9190 0.9595 0.9595 0.9952 0.9333 0.9667 0.9929 0.9476 0.9833 0.9667 0.9738 0.9643 0.9976 0.9929 Table 2: This table lists the accuracy of SVM with RBF kernel separating the hard and easy instances in 35 different three-feature space. 17 7 Conclusions With this paper, we have introduced a new methodology of evolving easy/hard instances which are diverse with respect to feature sets of the optimization problem at hand. Using our diversity optimization approach we have shown that the easy and hard instances obtained by our approach covers a much wider range in the feature space than previous methods. The diversity optimization approach provides instances which are diverse with respect to the investigated features. The proposed population diversity measurements provide good evaluation of the diverse over single or multiple feature values. Our experimental investigations for 2-OPT and TSP have shown that our large set of diverse instances can be classified quite well into easy and hard instances when considering a suitable combination of multiple features which provide some guidance for predication as the next step. In particular, the SVM classification model built with the diverse instances that can classify TSP instances based on problem hardness provides a strong basis for future performance prediction models that lead to automatic algorithm selection and configuration. Building such models would require further experimentation to determine the minimal set of strong features that can predict performance accurately. References [1] D. Applegate, W. Cook, S. Dash, and A. Rohe. Solution of a min-max vehicle routing problem. INFORMS Journal on Computing, 14(2):132โ€“143, Apr. 2002. [2] B. Bonet and S. Koenig, editors. Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, January 25-30, 2015, Austin, Texas, USA. AAAI Press, 2015. [3] C. Cortes and V. Vapnik. Support-vector networks. Machine Learning, 20(3):273โ€“ 297, 1995. [4] G. A. Croes. A method for solving traveling-salesman problems. Operations Research, 6(6):791โ€“812, 1958. [5] K. Eggensperger, F. Hutter, H. H. Hoos, and K. Leyton-Brown. Efficient benchmarking of hyperparameter optimizers via surrogates. In Bonet and Koenig [2], pages 1114โ€“1120. [6] M. Englert, H. Roฬˆglin, and B. Voฬˆcking. Worst case and probabilistic analysis of the 2-opt algorithm for the TSP. Algorithmica, 68(1):190โ€“264, 2014. [7] M. Feurer, J. T. Springenberg, and F. Hutter. Initializing bayesian hyperparameter optimization via meta-learning. In Bonet and Koenig [2], pages 1128โ€“1135. [8] S. R. Gunn. Support vector machines for classification and regression, 1998. [9] F. Hutter, L. Xu, H. H. Hoos, and K. Leyton-Brown. Algorithm runtime prediction: Methods & evaluation. Artif. Intell., 206:79โ€“111, Jan. 2014. 18 [10] T. Koฬˆtzing, F. Neumann, H. Roฬˆglin, and C. Witt. Theoretical analysis of two ACO approaches for the traveling salesman problem. Swarm Intelligence, 6(1):1โ€“ 21, 2012. [11] O. Mersmann, B. Bischl, H. Trautmann, M. Wagner, J. Bossek, and F. Neumann. A novel feature-based approach to characterize algorithm performance for the traveling salesperson problem. Annals of Mathematics and Artificial Intelligence, 69(2):151โ€“182, 2013. [12] D. Meyer, E. Dimitriadou, K. Hornik, A. Weingessel, and F. Leisch. e1071: Misc Functions of the Department of Statistics, Probability Theory Group (Formerly: E1071), TU Wien, 2015. R package version 1.6-7. [13] S. Nallaperuma, M. Wagner, and F. Neumann. Parameter prediction based on features of evolved instances for ant colony optimization and the traveling salesperson problem. In PPSN XIII - 13th International Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings, pages 100โ€“109, 2014. [14] S. Nallaperuma, M. Wagner, F. Neumann, B. Bischl, O. Mersmann, and H. Trautmann. A feature-based comparison of local search and the christofides algorithm for the travelling salesperson problem. In FOGA โ€™13, pages 147โ€“160, 2013. [15] F. Neumann and C. Witt. Bioinspired Computation in Combinatorial Optimization:Algorithms and Their Computational Complexity. Springer-Verlag New York, Inc., New York, NY, USA, 1st edition, 2010. [16] R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2015. [17] K. Smith-Miles and L. Lopes. Measuring instance difficulty for combinatorial optimization problems. Computers & OR, 39(5):875โ€“889, 2012. [18] K. Smith-Miles, J. van Hemert, and X. Y. Lim. Understanding TSP difficulty by learning from evolved instances. In 4th International Conference on Learning and Intelligent Optimization (LION), LIONโ€™10, pages 266โ€“280. Springer, 2010. [19] T. Ulrich, J. Bader, and L. Thiele. Defining and optimizing indicator-based diversity measures in multiobjective search. In R. Schaefer, C. Cotta, J. Kolodziej, and G. Rudolph, editors, PPSN (1), volume 6238 of Lecture Notes in Computer Science, pages 707โ€“717. Springer, 2010. [20] T. Ulrich, J. Bader, and E. Zitzler. Integrating decision space diversity into hypervolume-based multiobjective search. In M. Pelikan and J. Branke, editors, GECCO, pages 455โ€“462. ACM, 2010. [21] J. I. van Hemert. Evolving combinatorial problem instances that are difficult to solve. Evolutionary Computation, 14(4):433โ€“462, Dec. 2006. [22] R. Vilalta and Y. Drissi. A perspective view and survey of meta-learning. Artificial Intelligence Review, 18(2):77โ€“95, Oct. 2002. 19 [23] L. Xu, F. Hutter, H. H. Hoos, and K. Leyton-Brown. Satzilla: portfolio-based algorithm selection for sat. Journal of Artificial Intelligence Research, 32(1):565โ€“ 606, June 2008. 20
9cs.NE
Variants of Plane Diameter Completionโˆ—โ€  Petr A. Golovachโ€ก Clment Requilยง Dimitrios M. Thilikosยถ arXiv:1509.00757v1 [cs.DS] 2 Sep 2015 Abstract The Plane Diameter Completion problem asks, given a plane graph G and a positive integer d, if it is a spanning subgraph of a plane graph H that has diameter at most d. We examine two variants of this problem where the input comes with another parameter k. In the first variant, called BPDC, k upper bounds the total number of edges to be added and in the second, called BFPDC, k upper bounds the number of additional edges per face. We prove that both problems are NP-complete, the first even for 3-connected graphs of face-degree at most 4 and the second even when k = 1 on 3-connected graphs of face-degree at most 5. In this paper we give parameterized algorithms for both problems that run in O(n3 ) + 22 1 O((kd)2 log d) ยท n steps. Introduction In 1987, Chung [3, Problem 5] introduced the following problem: find the optimum way to add q edges to a given graph G so that the resulting graph has minimum diameter. (Notice that in all problems defined in this paper we can directly assume that G is a simple graph as loops do not contribute to the diameter of a graph and the same holds if we take simple edges instead of multiple ones.) This problem was proved to be NP-hard if the aim is to obtain a graph of diameter at most 3 [19], and later the NP-hardness was shown even for the Diameter-2 Completion problem [14]. It is also know that Diameter-2 Completion is W[2]-hard when parameterized by q [9]. For planar graphs, Dejter and Fellows introduced in [5] the Planar Diameter Completion problem that asks whether it is possible to obtain a planar graph of โˆ— The first author was supported by the European Research Council under the European Unionโ€™s Seventh Framework Programme (FP/2007-2013) / ERC Grant Agreement n. 267959. The second author was supported by the FP7-PEOPLE-2013-CIG project CountGraph (ref. 630749), the collateral PROCOPE-DAAD project RanConGraph (ref. 57134837), and the Berlin Mathematical School. The research of the third author was co-financed by the European Union (European Social Fund ESF) and Greek national funds through the Operational Program โ€œEducation and Lifelong Learningโ€ of the National Strategic Reference Framework (NSRF), Research Funding Program: ARISTEIA II. โ€  Emails: [email protected], [email protected], [email protected]. โ€ก Department of Informatics, University of Bergen, Bergen, Norway. ยง Freie Universitaฬˆt Berlin, Institut fuฬˆr Mathematik und Informatik, Berlin, Germany. ยถ AlGCo project team, CNRS, LIRMM, France, Department of Mathematics, University of Athens, Athens, Greece, and Computer Technology Institute & Press โ€œDiophantusโ€, Patras, Greece. 1 diameter at most d from a given planar graph by edge additions. It is not known whether Planar Diameter Completion admits a polynomial time algorithm, but Dejter and Fellows showed that, when parameterized by d, Planar Diameter Completion is fixed parameter tractable [5]. The proof is based on the fact that the yes-instances of the problem are closed under taking minors. Because of the Robertson and Seymour theorem [18] and the algorithm in [16], this implies that, for each d, the set of graphs G for which (G, d) is a yes-instance can be characterized by a finite set of forbidden minors. This fact, along with the minor-checking algorithm in [17] implies that there exists an O(f (d) ยท n3 )-step algorithm (i.e. an FPT-algorithm) deciding whether a plane graph G has a plane completion of diameter at most d. Using the parameterized complexity, this means that Planar Diameter Completion is FPT, when parameterized by d. To make this result constructive, one requires the set of forbidden minors for each d, which is unknown. To find a constructive FPT-algorithm for this parameterized problem remains a major open problem in parameterized algorithm design. Our results. We denote by S0 the 3-dimensional sphere. By a plane graph G we mean a simple planar graph G with the vertex set V (G) and the edge set E(G) drawn in S0 such that no two edges of this embedding intersect. A plane graph H is a a plane completion (or, simply completion) of another plane graph G if H is a spanning subgraph of G. A q-edge completion of a plane graph G is a completion H of G where |E(H)| โˆ’ |E(G)| โ‰ค q. A k-face completion of a plane graph G is a completion H of G where at most k edges are added in each face of G. In this paper we consider the variants of the Plane Diameter Completion problem: Plane Diameter Completion (PDC) Input: a plane graph G and d โˆˆ Nโ‰ฅ1 . Output: is there a completion of G with diameter at most d? Notice that the important difference between PDC and the aforementioned problems is that we consider plane graphs, i.e., the aim is to reduce the diameter of a given embedding of a planar graph preserving the embedding. In particular we are interested in the following variants: Bounded Budget PDC (BPDC) Input: a plane graph G and q โˆˆ N, d โˆˆ Nโ‰ฅ1 Question: is there a completion H of G of diameter at most d that is also a q-edge completion? Bounded Budget/Face PDC (BFPDC) Input: a plane graph G and k โˆˆ N, d โˆˆ Nโ‰ฅ1 . Question: is there a completion H of G of diameter at most d that is also a k-face completion? We examine the complexity of the two above problems. Our hardness results are the following. 2 Theorem 1. Both BPDC and BFPDC are NP-complete. Moreover, BPDC is NP-complete even for 3-connected graphs of face-degree at most 4, and BFPDC is NP-complete even for k = 1 on 3-connected graphs of face-degree at most 5. The hardness results are proved in Section 6 using a series of reductions departing from the Planar 3-Satisfiability problem that was shown to be NP-hard by Lichtenstein in [15]. The results of Theorem 1 prompt us to examine the parameterized complexity1 of the above problems. For this, we consider the following general problem: Bounded Budget and Budget/Face BDC (BBFPDC) Input: a plane graph G, q โˆˆ N โˆช {โˆž}, k โˆˆ N, and d โˆˆ Nโ‰ฅ1 . Question: is there a completion H of G of diameter at most d that is also a q-edge completion and a k-face completion? Notice that when q = โˆž BBFPDC yields BFPDC and when q = k BBFPDC yields BPDC. Our main result is that BBFPDC is fixed parameter tractable (belongs in the parameterized class FPT) when parameterized by k and d. O((kd) log d) Theorem 2. It is possible to construct an O(n3 )+22 for BBFPDC. ยท(ฮฑ(q))2 ยทn-step algorithm (In the above statement and in the rest of this paper we use the function ฮฑ : N โˆช {โˆž} โ†’ N such that if q = โˆž, then ฮฑ(q) = 1, otherwise ฮฑ(q) = q.) The main ideas of the algorithm of Theorem 2 are the following. We first observe that yes-instances of PDC and all its variants have bounded branchwidth (for the definition of branchwidth, see Section 2). The typical approach in this case is to derive an FPT-algorithm by either expressing the problem in Monadic Second Order Logic โ€“ MSOL (using Courcelleโ€™s theorem [4]) or to design a dynamic programming algorithm for this problem. However, for completion problems, this is not really plausible as this logic can quantify on existing edges or vertices of the graph and not on the โ€œnon-existingโ€ completion edges. This also indicates that to design a dynamic programming algorithm for such problems is, in general, not an easy task. In this paper we show how to tackle this problem for BBFPDC (and its special cases BPDC and BFPDC). Our approach is to deal with the input G as a part of a more complicated graph with O(k 2 ยท n) additional edges, namely its cylindrical enhancement G0 (see Section 3 for the definition). Informally, sufficiently large cylindrical grids are placed inside the faces of G and then internally vertex disjoint paths in these grids can be used to emulate the edges of a solution of the original problem placed inside the corresponding faces. Thus, by the enhancement we reduce BBFPDC to a new problem on G0 certified by a suitable 3-partition of the additional edges. Roughly, this partition consists of the 1-weighted edges that should be added in the completion, the 0-weighted edges that should link these edges to the boundary of the face of G where they will be 1 For more on parameterized complexity, we refer the reader to [8]. 3 inserted, and the โˆž-weighted edges that will be the (useless) rest of the additional edges. The new problem asks for such a partition that simulates a bounded diameter completion. The good news is that, as long as the number of edges per face to be added is bounded, which is the case for BBFPDC, the new graph G0 has still bounded branchwidth and it is possible, in the new instance, to quantify this 3-partition of the graph G0 . However, even under these circumstances, to express the new problem in Monadic Second Order Logic is not easy. For these reasons we decided to follow the more technical approach of designing a dynamic programming algorithm that leads to the (better) complexity bounds of Theorem 2. This algorithm is quite involved due to the technicalities of the translation of the BBFPDC to the new problem. It runs on a sphere-cut decomposition of the plane embedding of G0 and its tables encode how a partial solution is behaving inside a closed disk whose boundary meets only (a few of) the edges of G0 . We stress that this encoding takes into account the topological embedding and not just the combinatorial structure of G0 . Sphere-cut decompositions as well as some necessary combinatorial structures for this encoding are presented in Section 4. The dynamic programming algorithms is presented in Section 5 and is the most technical part of this paper. 2 Definitions and preliminaries Given a graph G, we denote by V (G) (respectively E(G)) the set of vertices (respectively edges) of G. A graph G0 is a subgraph of a graph G if V (G0 ) โІ V (G) and E(G0 ) โІ E(G), and we denote this by G0 โІ G. Also, in case V (G) = V (G0 ), we say that H is a spanning subgraph of G. If S is a set of vertices or a set of edges of a graph G, the graph G \ S is the graph obtained from G after the removal of the elements of S. If S is a set of edges, we define G[E] as the graph whose vertex set consists of the endpoints of the edges of E and whose edge set of E. Distance and diameter. Let G be a graph and let w : E(G) โ†’ N โˆช {โˆž} (w is a weighting of the edges of G). Given two vertices x, x0 โˆˆ V (G) we call (x, x0 )-path every path of G with x and x0 as endpoints. We also define w-distG (x, x0 ) = min{w(E(P )) | P is an (x, x0 )-path in G} and w-diam(G) = max{w-distG (x, y) | x, y โˆˆ V (G)} (if G is not connected then w-diam(G) is infinite). When the graph is unweighted then we use distG and diam instead of w-distG and w-diam. Plane graphs. To simplify notations on plane graphs, we consider a plane graph G as the union of the points of S0 in its embedding corresponding to its vertices and edges. That way, a subgraph H of G can be seen as a graph H where H โІ G. The faces of a plane graph G, are the connected components of the set S0 \ G. A vertex v (an edge e resp.) of a plane graph G is incident to a face f and, vice-versa, f is incident to v (resp. e) if v (resp., e) lies on the boundary of f . Two faces f1 , f2 are adjacent if they have a common incident edges. We denote by F (G) the set of all faces of G. The degree of a face f โˆˆ F (G) is the number of edges incident to f where bridges of G 4 count double in this number. The face-degree of G is the maximum degree of a face in F (G). Given a face f of G, we define BG (f ) as the graph whose set of points is the boundary of f and whose vertices are the vertices incident to f . A set โˆ† โІ S0 is an open disc if it is homeomorphic to {(x, y) : x2 + y 2 < 1}. Also, โˆ† is a closed disk of S0 if it is the closure of some open disk of S0 . Branch decomposition. Given a graph H with n vertices, a branch decomposition of H is a pair (T, ยต), where T is a tree with all internal vertices of degree three and ยต : L โ†’ E(H) is a bijection from the set of leaves of T to the edges of H. For every edge e of T , we define the middle set mid(e) โІ V (H) as follows: if T \ {e} has two connected components T1 and T2 , and for i โˆˆ {1, 2}, let Hie = H[{ยต(f ) : f โˆˆ L โˆฉ V (Ti )], and set mid(e) = V (H1e ) โˆฉ V (H2e ). The width of (T, ยต) is the maximum order of the middle sets over all edges of T , i.e. max{|mid(e)| : e โˆˆ T }. The branchwidth of H is the minimum width of a branch decomposition of H and is denoted by bw(H). A grid annulus ฮ“k,h is the graph obtained by the cartesian product of a cycle of k vertices and a path of h vertices. We need the following result. Proposition 1 ([11]). Let G be a planar graph and k, h be integers with k โ‰ฅ 3 and h โ‰ฅ 1. Then G has either a minor isomorphic to ฮ“k,h or a branch decomposition of width at most k + 2h โˆ’ 2. An central feature of the PDC problem and its variants is that its yes-instances have bounded branchwidth. Lemma 1. There exists a constant c1 such that if (G, d) is a yes-instance of PDC, then bw(G) โ‰ค c1 ยท d. The same holds for the graphs in the yes-instances of BPDC, BFPDC, and BBFPDC. Proof. We examine only the case of PDC as a yes-instance of BPDC, BFPDC, and BBFPDC is also a yes-instance of PDC. Notice first that if G has a completion of diameter at most d and G0 is a minor2 of some G, then also G0 has a completion H of diameter at most d. Notice also that every completion of the grid annulus ฮ“r+2,r+2 has diameter > r, therefore, if (G, d) is a yes-instance of PDC, then G cannot contain a ฮ“r+2,r+2 as a minor. From Proposition 1, G has branchwidth bounded by a linear function of d and the lemma follows. 2A graph G0 is a minor of a graph G if it can obtained applying edge contractions to some subgraph of G. 5 3 3.1 The reduction cylindrical enhancements Grid-annulus. Let k and r be positive integers where k โˆˆ Nโ‰ฅ3 , r โˆˆ Nโ‰ฅ3 . We define the graph ฮ“k,r as the (k ร— r)-grid annulus, which is the Cartesian product of a path of k vertices and a cycle of r vertices. Notice that ฮ“k,r is uniquely embeddable (up to homeomorphism) in the plane and has exactly two non-square faces (i.e., faces incident to 4 edges) f1 and f2 that are incident only with vertices of degree 3. We call one of the faces f1 and f2 the interior of ฮ“k,r and the other the exterior of ฮ“k,r . We call the vertices incident to the interior (exterior) of ฮ“k,r base (roof ) of ฮ“k,r . Given an edge e in the base of ฮ“k,r , we define its ceilings as the set of edges of ฮ“k,r that contains e and whose dual edges in ฮ“โˆ—k,r form a minimum length path between the duals of the interior and the exterior face of ฮ“โˆ—k,r . Cylindrical enhancement of a plane graph. Let G be a plane graph. We next give the definition of the graph G(k) for k โˆˆ Nโ‰ฅ3 . Let fi โˆˆ F (G) and let C1i , . . . , Cฯi i be the connected components of BG (fi ). For each Cji , we denote by ฯƒji the number of its edges, agreeing that, in this number, bridge edges count twice and that if Cji consists of only one vertex, then ฯƒji = 1. We then add a copy ฮ“ij of ฮ“k,kยทฯƒji in the embedding of G i i such that Cji is contained in the interior of ฮ“ij and all C1i , . . . , Cjโˆ’1 , . . . , Cj+1 . . . , Cฯi i are contained in the exterior of ฮ“ij (In Figure 1 the edges of each ฮ“ij are colored red). We then add, for each v โˆˆ Cji , ฮบ(v) ยท k edges (those around the disks C1 , . . . , C4 in Figure 1) from v to the base of ฮ“ij , where ฮบ(v) is the number of connected components in Cji \ v (in the trivial case where Cji consists of only one vertex v, then ฮบ(v) = 1). We add these edges in a way that the resulting embedding remains plane and no more than a set Vv,i,j of k consecutive vertices of the base of Cji are connected with the same vertex v of Cji ; observe that there is only one way to add edges so to fulfill these restrictions. Notice that the set Vv,i,j always induces a path Pv,i,j in the resulting graph except in the case where Cji consists of a single vertex v where Vv,i,j induces a cycle. In the later case we pick a maximal path in this cycle and we denote it by Pv,i,j . In the example of Figure 1 the Pv,i,j โ€™s are the bold paths of the innermost cycle of each ฮ“ij . We apply this enhancement for each connected component of the boundary of each (k) face of G and we denote the resulting graph by RG . (k) We call a face fi of RG non-trivial if BR(k) (fi ) has more than one connected G components C1i , . . . , Cฯi i . Notice that if fi is non-trivial, each Cji is the roof of some previously added grid-annulus. For each such grid-annulus, let Jj be k consecutive vertices of its roof. We add inside fi a copy of ฮ“k,kยทฯi such that its base is a subset of fi and let {I1 , . . . , Iฯi } be a partition of its roof in ฯi parts, each consisting of k consecutive base vertices. In the example of Figure 1, the annulus ฮ“k,kยทฯi is the one with the edges in the middle of the figure and its base is its innermost cycle. For each j โˆˆ {1, . . . , ri } we add k edges (depicted as the โ€œinterconnectingโ€ edges in Figure 1) each connecting a vertex of Jj with some vertex of Ij in a way that the resulting 6 C4 C3 C1 C2 Figure 1: An example of a cylindrical enhancement for k = 3 inside a non-trivial face of a graph with 4 connected components (i.e., the boundaries of the disks C1 , . . . , C4 ). embedding remains plane (again, there is a unique way for this to be done). We apply (k) this enhancement for each non-trivial face of RG and we denote the resulting graph by G(k) . Notice that G(k) is not uniquely defined as its definition depends on the choice of the sets Jj . From now on, we always consider an arbitrary choice for G(k) and we call G(k) the k-th cylindrical enhancement of G. By the construction of G(k) , it directly follows that |V (G(k) )| = O(k 2 ยท n). We say that an edge of G(k) is an expansion edge if it is an edge of Pv,i,j for some i, j, and v โˆˆ V (Ci,j ). Also we denote by Gฬ„(k) the graph created by G(k) if we contract all its expansion edges and all their ceilings of the (k) grid-annuli that were added during the construction of RG . Primal-dual drawings. Let G be a connected plane graph. We denote by D(G) the graph obtained if we draw G together with its dual so that dual edges are intersecting to a single point and then introduce a vertex to each of these intersection points. We recursively define D(k) (G) such that D(0) (G) = G and D(k) (G) = Dkโˆ’1 (D(G)) for every k โ‰ฅ 1. The next proposition is a direct consequence of [13, Lemma 4]. Proposition 2. There exists some constant c such that for every connected plane graph G, it holds that bw(D(G)) โ‰ค 2 ยท bw(G). 7 Corollary 1. For every connected plane graph G and k โˆˆ Nโ‰ฅ1 , it holds that bw(D(k) (G)) โ‰ค 2k ยท bw(G). Lemma 2. If G is a connected plane graph and k โˆˆ Nโ‰ฅ3 , then Gฬ„(k) is a minor of D(dlog(k+1)e+1) (G). Proof. Notice first that Gฬ„(3) is a minor of D(3) (G). It is then enough to observe that for every i โ‰ฅ 3, if Gฬ„(i) is a minor of D(i) (G), then Gฬ„(2i+1) is a minor of D(i+1) (G). The following lemma indicates that cylindrical enhancements do not considerably increase the branchwidth of a graph. Lemma 3. There is a constant c2 such that if G is an n-vertex plane graph and k โˆˆ Nโ‰ฅ3 , then G(k) is 3-connected, bw(G(k) ) โ‰ค c2 ยท k ยท bw(G). Proof. Let H be the graph created from G if we add a vertex vf to each non trivial face f and for each of the connected components of BG (f ), we arbitrarily pick a vertex and make it adjacent to vf by a path of 2k internal vertices. As the branchwidth of a non-acyclic graph is the maximum branchwidth of its connected components, it follows that bw(H) = bw(G). It is also easy to see that G(k) is a minor of Hฬ„ (k) . From Lemma 2, Hฬ„ (k) is a minor of D(r) (H), where r = dlog(k + 1)e + 1. By Corollary 1, it follows that bw(D(r) (H)) โ‰ค 2r ยท bw(H) = O(k ยท bw(G)). 3.2 Edge colorings of new edges. Let G and H be two plane graphs such that G is a subgraph of H and let q โˆˆ N โˆช {โˆž}, k โˆˆ N, and d โˆˆ Nโ‰ฅ1 . Given a 3-partition p = {E 0 , E 1 , E โˆž } of E(H) \ E(G), we define the function wp : E(H) โ†’ N such that wp = {(e, 1) | e โˆˆ E(G)} โˆช {(e, 0) | E โˆˆ E 0 } โˆช {(e, 1) | e โˆˆ E 1 } โˆช {(e, d + 1) | E โˆˆ E โˆž }. We say that G has (q, k, d)-extension in H if there is a 3-partition p = {E 0 , E 1 , E โˆž } of E(H) \ E(G) such that the following conditions hold A. There is no path in H with endpoints in V (G) that consists of edges in E 0 , B. every face F of G contains at most k edges of E 1 , C. โˆ€x, y โˆˆ V (G), wp -distH (x, y) โ‰ค d, and D. |E 1 | โ‰ค q. Given a 3-partition p = {E 0 , E 1 , E โˆž } of E(H) \ E(G) we refer to its elements as the 0-edges, the 1-edges, and the โˆž-edges respectively. We also call the edges of G old-edges. Our first step towards our algorithm is to reduce BBFPDC to a problem about (q, k, d)-extensions of G. 8 Given a plane graph G and an open set ฮ› of S0 , we define Ghฮ›i as the graph whose edge set consists of the edges of G that are subsets of ฮ› and whose vertex set consists of their endpoints. Disjoint paths. Let G be a graph. We say that two paths in G are disjoint if none of the internal vertices of a path is a vertex of the other. Given a collection P of pairwise disjoint paths of G, we define L(P) = {{x, y} | x and y are the endpoints of a path in P}. The proofs of the following proposition can be found in [2]. Proposition 3. Let G be a graph k โˆˆ Nโ‰ฅ1 and let H be a k-face completion of G. For every face f โˆˆ F (G), there is a collection P of k disjoint paths in the graph G(max{3,k}) hf i such that E(Ghf i) = L(P). Lemma 4. Let G be a plane graph, with q โˆˆ N โˆช {โˆž}, k โˆˆ Nโ‰ฅ1 and d โˆˆ Nโ‰ฅ1 . Then (G, q, k, d) is a yes-instance of BBFPDC if and only if G has a (q, k, d)-extension in G(max{3,k}) . Proof. Assume first that (G, q, k, d) is a yes-instance of BBFPDC and let H be a completion H of G of diameter at most d that is also a q-edge completion and a k-face completion. This means that for every f โˆˆ F (G), the graph Hf = Hhf i contains at S most k edges and that the graph H new = f โˆˆF (H) Hf contains at most q edges. From Proposition 3, there is a collection Pf of yf = |E(Hf )| internally disjoint paths in P G(max{3,k}) . Let E 1 be a set of y = f โˆˆF (G) yf edges obtained if, for every f โˆˆ F (G), S S we pick one edge from each of the paths in Pf . Let E 0 = E( f โˆˆF (G) P โˆˆPf ) \ E 1 and let E โˆž = E(H new )\(E 0 โˆชE 1 ). We now observe that p = {E 0 , E 1 , E โˆž } is a 3-partition of E(H new ) = E(G(max{3,k}) ) \ E(G). By its construction, p satisfies conditions 1โ€“4 of the definition of a (q, k, d)-extension of G in G(max{3,k}) as required. Let now p = {E 0 , E 1 , E โˆž } is a 3-partition of E(H new ) = E(G(max{3,k}) ) \ E(G) that is a (q, k, d)-extension of G in G(max{3,k}) . We construct the graph H by removing from G(max{3,k}) all edges in E โˆž and then, in the resulting graph, contract all edges in E 0 . It is easy to observe that H is a completion of G that is also an q-edge completion and a k-face completion 4 Structures for dynamic programming For our dynamic programming algorithm we need a variant of branchwidth for plane graphs whose middle sets have additional topological properties. Sphere-cut decomposition. Let H be a plane graph. An arc is a subset O of the plane homeomorphic to a circle and is called a noose of H if it meets H only in vertices. We also set VO = V (H) โˆฉ O. An arc of a noose O is a connected component of O \ VO while in the trivial case where VO = โˆ…, O does not have arcs. A sphere-cut decomposition or sc-decomposition of H is a triple (T, ยต, ฯ€) where (T, ยต) is a branch decomposition of H and ฯ€ is a function mapping each e โˆˆ E(T ) to cyclic orderings 9 of vertices of H, such that for every e โˆˆ E(T ) there is a noose Oe of H where the following properties are satisfied. โ€ข Oe meets every face of H at most once, โ€ข H1e is contained in one of the closed disks bounded by Oe and H2e is contained in the other (H1e and H2e are as in the definition of branch decomposition). โ€ข ฯ€(e) is a cyclic ordering of VOe defined by a clockwise traversal of Oe in the embedding of H. We denote Xe = VOe and we always assume that its vertices are clockwise enumerated according to ฯ€(e). We denote by Ae the set containing the arcs of Oe . Also, if ฯ€(e) = [a1 , . . . , ak , a1 ], then we use the notation Ae = {a1,2 , a2,3 , . . . , akโˆ’1,k , ak,1 } where the boundary of the arc ai,i+1 consists of the vertices ai and ai+1 . We also define He+ = (V (H), E(H โˆช Ae )), i.e., He+ is the embedding occurring if we add in H the arcs of Oe as edges. A face of He+ is called internal if it is not incident to an arc in Ae , i.e., it is also a face of H. A face of He+ is marginal if it is a properly included is some face of H. For our dynamic programming we require to have in hand an optimal sphere-cut decomposition. This is done combining the main result of [10] and [20, (5.1)] (see also [7]) and is summarized to the following. Proposition 4. There exists an algorithm that, with input a 3-connected plane graph G and w โˆˆ N, outputs a sphere-cut decomposition of G of width at most w or reports that bw(G) > w. Our next step is to define a series of combinatorial structures that are necessary for our dynamic programming. Given two sets A and B we denote by AB the set of all functions from B to A. (d, k, q)-configurations. Given a set X and a non-negative integer t, we say that the pair (X , ฯ‡) is a t-labeled partition of X if X is a collection of pairwise disjoint non-empty subsets of X and ฯ‡ is a function mapping the integers in {1, . . . , |X |} to integers in {0, . . . , t}. In case X = โˆ…, a t-labeled partition corresponds to the pair {โˆ…, โˆ…} where โˆ… is the โ€œemptyโ€ function, i.e. the function whose domain is empty. Let X and A be two finite sets. Given d, k โˆˆ N and q โˆˆ N โˆช {โˆž}, we define a (d, k, q)-configuration of (X, A) as a quintuple ((X , ฯ‡), (A, ฮฑ), (F, E), ฮด, z) where 1. (X , ฯ‡) is a 1-labeled partition of X, 2. (A, ฮฑ) is a k-labeled partition of A, 3. (F, E) is a graph (possibly with loops) where F โІ {0, . . . , d + 1}X , 2 4. ฮด โˆˆ {0, . . . , d + 1}X , and 10 5. if q โˆˆ N, then z โ‰ค q, otherwise z = โˆž. Fusions and restrictions. Let (X1 , ฯ‡1 ) and (X2 , ฯ‡2 ) be two t-labeled partitions of the sets X1 and X2 respectively such that Xi = {X1i , . . . , Xฯi 1 }, i โˆˆ {1, 2}. We define X1 โŠ• X2 as follows: if x, x0 โˆˆ X1 โˆช X2 we say that x โˆผ x0 if there is a set in X1 โˆช X2 that contains both of them. Let โˆผT be the transitive closure of โˆผ. Then X1 โŠ•X2 contains the equivalence classes of โˆผT . We now define ฯ‡1 โŠ• ฯ‡2 as follows: let X1 โŠ• X2 = {Y1 , . . . , Yฯ }. Then for each i โˆˆ {1, . . . , ฯ}, we define P P ฯ‡1 โŠ• ฯ‡2 (i) = min{t, X 10 โІYi ฯ‡1 (i0 ) + X 20 โІYi ฯ‡2 (i0 )}. i i The fusion of the t-labeled partitions (X1 , ฯ‡1 ) and (X2 , ฯ‡2 ) is the pair (X1 โŠ• X2 , ฯ‡1 โŠ• ฯ‡2 ) that is a (t + 1)-labeled partition and is denoted by (X1 , ฯ‡1 ) โŠ• (X2 , ฯ‡2 ). Given a t-labeled partition (X , ฯ‡) of a set X and given a subset X 0 of X we define the restriction of (X , ฯ‡) to X 0 as the t-labeled partition (X 0 , ฯ‡0 ) of X 0 where X 0 = {Xi โˆฉ X 0 | Xi โˆˆ X } \ {โˆ…} and ฯ‡0 = {(i, ฯ‡(i)) | Xi โˆฉ X 0 6= โˆ…} and we denote it by (X , ฯ‡)|X 0 . We also define the intersection of (X , ฯ‡) with X 0 as the t-labeled partition (X 0 , ฯ‡0 ) where X 0 = {Xi โˆˆ X | Xi โˆฉ (X \ X 0 ) 6= โˆ…} and ฯ‡0 = {(i, ฯ‡(i)) | Xi โˆฉ X 00 6= โˆ…} where X 00 = โˆชXi0 โˆˆX 0 Xi and we denote it by (X , ฯ‡) โˆฉ X 0 . Notice that (X , ฯ‡)|X 0 and (X , ฯ‡) โˆฉ X 0 are not always the same. 5 Dynamic programming The following result is the main algorithmic contribution of this paper. Lemma 5. There exists an algorithm that, given (G, H, q, k, d, D, b) as input where G and H are plane graphs such that G is a subgraph of H, H is 3-connected, q โˆˆ N โˆช {โˆž}, k โˆˆ N, d โˆˆ Nโ‰ฅ1 , b โˆˆ N, and D = (T, ยต, ฯ€) is a sphere-cut decomposition of H with width at most b, decides whether G has (q, k, d)-extension in H in (ฮฑ(q))2 ยท 2 O(b log d) 2O(b log d)+2 ยท n steps. Proof. We use the notation E old = E(G) and E new = E(H) \ E(G), V old = V (G) and V new = V (H) \ V (G). We choose an arbitrary edge eโˆ— โˆˆ E(T ), subdivide it by adding a new vertex vnew and update T by adding a new vertex r adjacent to vnew . We then root T at this vertex r and we extend ยต by setting ยต(r) = โˆ…. In T we call leaf-edges all its edges that are incident to its leaves except from the edge er = {r, vnew }. An edge of T that is not a leaf-edge is called internal. We denote by L(T ) the set of the leaf-edges of T and we denote by I(T ) the internal edges of T . We also call er root-edge. For each e โˆˆ E(T ), let Te be the tree of the forest T \ {e} that does not contain r as a leaf and let Ee be the edges that are images, via ยต, of the leaves of T that are also leaves of Te . We denote He = H[Ee ] and Ve = V (He ) and observe that Her = H. For each edge e โˆˆ I(T ), we define its children as the two edges that both belong in the connected component of T \ e that does not contain the root r and that share a common endpoint with e. Also, for each edge e โˆˆ E(T ), we define โˆ†e as the closed disk bounded by 11 Oe such that G โˆฉ โˆ†e = He . Finally, for each edge e โˆˆ E(T ), we set Xe = mid(e), Venew = Ve โˆฉ V new , Veold = Ve โˆฉ V old , Eenew = Ee โˆฉ E new , and Eeold = Ee โˆฉ E old . Distance signatures and dependency graphs. Let p = {Ee0 , Ee1 , Eeโˆž } be a 3partition of Eenew . For each vertex v โˆˆ Ve , we define the (Xe , p)-distance vector of v as the function ฯ†v : Xe โ†’ {0, . . . , d + 1} such that if x โˆˆ Xe then ฯ†v (x) = min{wp -distGe (v, x), d + 1}. We define the (e, p)-dependency graph Ge,p = (Fe,p , Ee,p ) (that may contain loops) where Fe,p = {ฯ†v | v โˆˆ Ve } and such that two (not necessarily distinct) vertices ฯ† and ฯ†0 of Fe,p are connected by an edge in Ee,p if and only if there exist v, v 0 โˆˆ Ve such that ฯ† = ฯ†v , ฯ†0 = ฯ†v0 and wp -distHe (v, v 0 ) > d. Notice |Xe | that the set ฮฆe = {Ge,p | p is a 3-partition of Eenew } has at most 2(d+2) elements new Xe because {Fe,p | p is a 3-partition of Ee } โІ {0, . . . , d + 1} and, to each Fe,p , assign a unique edge set Ee,p . Intuitively, each Fe,p corresponds to a partition of the elements of Ve such that vertices in the same part have the same (Xe , p)-distance signature. Moreover the existence of an edge in the (e, p)-dependency graph between two such parts implies that they contain vertices, one from each part, whose wp -distance in He is bigger than d. The tables. Our aim is to give a dynamic programming algorithm running on the sc-decomposition T . For this, we describe, for each e โˆˆ E(T ), a table T(e) containing information on partial solutions of the problem for the graph Ge in a way that the table of an edge e โˆˆ E(T ) can be computed using the tables of the two children of e, the size of each table does not depend on G and the final answer can be derived by the table of the root-edge er . We define the function T mapping each e โˆˆ E(T ) to a collection T(e) of (d, k, q)configurations of (Xe , Ae ). In particular, Q = ((X , ฯ‡), (A, ฮฑ), (F, E), ฮด, z) โˆˆ T(e) iff there exists a 3-partition p = {Ee0 , Ee1 , Eeโˆž } of Eenew such that the following hold: 1. C1 , . . . , Ch are the connected components of (V (He ), Ee0 ), then โ€ข X = {V (C1 ) โˆฉ Xe , . . . , V (Ch ) โˆฉ Xe } and โ€ข โˆ€iโˆˆ{1,...,h} ฯ‡(i) = 1 if Ci contains some vertex of Veold , otherwise ฯ‡(i) = 0. (The pair (X , ฯ‡) encodes the connected components of the 0-edges that contain vertices of Xe and for each of them registers the number (0 or 1) of the vertices in Veold in them. This information is important to control Condition A.) 2. A is a partition of Ae such that two arcs A, A0 โˆˆ Ae belong in the same set, say Ai of A if and only if they are incident to the same marginal face fi of He+ . Moreover, for each i โˆˆ {1, . . . , |A|}, ฮฑ(i) is equal to the number of edges in Ee1 that are inside fi . (Here (A, ฮฑ) encodes the โ€œpartialโ€ faces of the embedding of Ge that are inside โˆ†e . To each of them we correspond the number of 1-edges that they contain in He . This is useful in order to guarantee that during the algorithm, faces that stop being marginal do not contain more than k 1-edges, as required by Condition B.) 12 3. (F, E) is the (e, p)-dependency graph, i.e., the graph Ge,p = (Fe,p , Ee,p ). (Recall that F is the collection of all the different distance vectors of the vertices of Ve . Notice also that there might be pairs of vertices x, x0 โˆˆ Ve whose wp -distance in Ge is bigger than d. In order for G to have a completion of diameter d, these two vertices should become connected, at some step of the algorithm, by paths passing outside โˆ†e . To check this possibility, it is enough to know the distance vectors of x and x0 and these are encoded in the set F. Moreover the fact that x and x0 are still โ€œfar awayโ€ inside Ge is certified by the existence of an edge (or a loop) between their distance vectors in F.) 4. For each pair x, x0 โˆˆ Xe , ฮด(x, x0 ) = min{wp -distHe (x, x0 ), d + 1}. (This information is complementary to the one stored in F and registers the distances of the vertices in Xe inside He . As we will see, F and ฮด will be used in order to compute the distance vectors as well as their dependencies during the steps of the algorithm. ) 5. There is no path in He with endpoints in Veold that consists of edges in Ee0 . (This ensures that Condition A is satisfied for the current graph Ge .) 1 6. Every internal face of G+ e contains at most k edges in Ee . (This ensures that Condition B holds for all the internal faces of Ge .) 7. โˆ€v, v 0 โˆˆ Ve , either wp -distHe (v, v 0 ) โ‰ค d or there are two vertices x, x0 โˆˆ Xe such that ฯ†v (x) + ฯ†v0 (x0 ) โ‰ค d. (Here we demand that if two vertices x1 , x2 of Ve are โ€œfar awayโ€ (have wp -distance > d) inside He then they have some chance to come โ€œcloseโ€ (obtain wp -distance โ‰ค d) in the final graph, so that Condition C is satisfied. This fact is already stored by an edge in E between the two distance vectors of x and x0 and the possibility that x1 and x2 may come close at some step of the algorithm, in what concerns the graph Ge , depends only on these distance vectors and not on the vertices x1 and x2 themselves.) 8. There are at most z edges of Ee1 inside the internal faces of G+ e (clearly, this last condition becomes void when q = โˆž). (This information helps us control Condition D during the algorithm.) Notice that in case Xe = โˆ… the only graph that can correspond to the 6th step is the graph ({โˆ…}, โˆ…) which, from now on will be denoted by Gโˆ… . Bounding the set of characteristics. Our next step is to bound T(e) for each e โˆˆ E(T ). Notice first that |Xe | = |Ae | โ‰ค b. This means that there are 2O(b log b) instantiations of (X , ฯ‡) and 2O(k+b log b) instantiations of (A, ฮฑ). As we previously O(b log d) noticed, the different instantiations of (F, E) are |ฮฆe | = 22 . Moreover, there 13 2 are 2O(b log d) instantiations of ฮด and ฮฑ(q) instantiations of z. We conclude that there exists a function f such that for each e โˆˆ V (T ), |T(e)| โ‰ค f (k, q, b, d). Moreover, 2 O(b log d) f (k, q, b, d) = ฮฑ(q) ยท 2O(b log d)+2 . The characteristic function on the root edge. Observe that Enew is (k, d, q, w)edge colorable in H if and only if T(er ) 6= โˆ…, i.e., ((โˆ…, โˆ…), (โˆ…, โˆ…), Gโˆ… ,โˆ…, z) โˆˆ T(er ) for some z โ‰ค q. Indeed, if this happens, conditions 1โ€“4 become void while conditions 5, 6, 7, and 8 imply that H = He satisfies the conditions A, B, C, and D respectively in the definition of the (k, d, q, w)-edge colorability of E new . The computation of the tables. We will now show how to compute T(e) for each e โˆˆ E(T ). We now give the definition of T(e) in the case where e is a leaf of T is the following: Given a q โˆˆ N โˆช {โˆž}, we define A(q) = {โˆž} if q = โˆž, otherwise A(q) = {z | z โ‰ค q}. Suppose now that el is a leaf-edge of T where ฯ€(el ) = [a1 , a2 , a1 ] and Ael = {a1,2 , a2,1 }. 1. If {a1 , a2 } โˆˆ Eeold , then T(el ) { ({{a1 }, {a2 }}, {(1, 1), (2, 1)}), = ({{a1,2 }, {a2,1 }}, {(1, 0), (2, 0)}),   {(a1 , 0), (a2 , w({a1 , a2 }))}, {(a1 , w({a1 , a2 })), (a2 , 0)} , โˆ… ,  {((a1 , a2 ), w({a1 , a2 }))}, z | z โˆˆ A(q)}, 2. if {a1 , a2 } โˆˆ Eenew and {a1 , a2 } โІ Veold , then T(el ) = Q1 โˆช Qโˆž where Q1 { = ({{a1 }, {a2 }}, {(1, 1), (2, 1)}) ({{a1,2 , a2,1 }}, {(1, 1)})  ( {(a1 , 0), (a2 , 1)}, {(a1 , 1), (a2 , 0)} , โˆ…)  {((a1 , a2 ), s)}, z | z โˆˆ A(q) โˆ’ {0}} Qโˆž { = ({{a1 }, {a2 }}, {(1, 1), (2, 1)}) ({{a1,2 , a2,1 }}, {(1, 0)})  ( {(a1 , 0), (a2 , d + 1)}, {(a1 , d + 1), (a2 , 0)} , K)  {((a1 , a2 ), d + 1)}, z | z โˆˆ A(q)} (the set K above contains a single edge that is not a loop), and if {a1 , a2 } โˆˆ Eenew and {a1 , a2 } * Veold , then T(el ) = Q1 โˆช Qโˆž โˆช Q0 where Q0 = { ({{a1 , a2 }}, {(1, 1 โˆ’ h{a1 , a2 } โІ Venew i)}) ({{a1,2 , a2,1 }}, {(1, 0)}) ({{(a1 , 0), (a2 , 0)}}, โˆ…)  {((a1 , a2 ), 0)}, z | z โˆˆ A(q)} 14 Assume now that e is a non-leaf edge of T with children el and er , the collection T(e) is given by join(T(e1 ), T(e2 )) where join is a procedure that is depicted below. Notice that Ae is the symmetric difference of Ael and Aer and Xe consists of the endpoints of the arcs in Ae . We also set XeF = (Xel โˆช Xer ) \ Xe . Procedure join Input: two collections Cel and Cer of (d, k, q)-configurations of (Xel , Ael ) and (Xer , Aer ). Output: a collection Cr of (d, k, q)-configurations of (Xe , Ae ) (1) set Ce = โˆ… (2) for every pair (Qel , Qer ) โˆˆ Cel ร— Cer , if merge(Qel , Qer ) 6= void, then let Ce โ† Ce โˆช {merge(Qel , Qer )}. (3) return Ce It remains to describe the routine merge. For this, assume that it receives as inputs the (d, k, q)-configurations Ql = ((Xl , ฯ‡l ), (Al , ฮฑl ), (Fl , El ), ฮดl , zl ) and Qr = ((Xr , ฯ‡r ), (Ar , ฮฑr ), (Fr , Er ), ฮดr , zr ) of (Xel , Ael ) and (Xer , Aer ) respectively. Procedure merge(Qel , Qer ) returns a (d, k, q)-configuration ((X , ฯ‡), (A, ฮฑ), (F, E), ฮด, z) of (Xe , Ae ) constructed as follows: 1. If zr + zr > q, then return void, otherwise z = zl + zr (This controls the number of 1-edges that are now contained in โˆ†e ) 2. Let (X 0 , ฯ‡0 ) = (Xl , ฯ‡l ) โŠ• (Xr , ฯ‡r ) and if ฯ‡0โˆ’1 (2) 6= โˆ… then return void. (This compute the โ€œfusionโ€ of the connected components of (V (Hel , Ee0l )) and (V (Her , Ee0r )) with vertices in Vel and Ver and makes sure that none of the created components contains 2 or more 0-vertices.) 3. Let (X , ฯ‡) = (Xl0 , ฯ‡0l )|Ve (This computes the fusion (Xl0 , ฯ‡0l ) is restricted on the boundary Oe of โˆ†e .) 4. Let (A0 , ฮฑ0 ) = (Al , ฮฑl ) โŠ• (Ar , ฮฑr ) and if ฮฑ0โˆ’1 (k + 1) 6= โˆ… then return void. 5. Let (A, ฮฑ) = (Al , ฮฑl ) โŠ• (Ar , ฮฑr )|Ae . 6. Compute the function ฮณ : (Fel โˆช Fer โˆช Xe ) ร— (Fel โˆช Fer โˆช Xe ) โ†’ {0, . . . , d + 1}, whose description is given latter. 7. Take the disjoint union of the graphs (Fl , El ) and (Fr , Er ) and remove from it every edge {ฯ†1 , ฯ†2 } for which ฮณ(ฯ†1 , ฯ†2 ) โ‰ค d. Let G + = (F + , E + ) be the obtained graph. 8. If for some edge {ฯ†1 , ฯ†2 } โˆˆ E + it holds that for every x1 , x2 โˆˆ Ve , ฮณ(ฯ†1 , x1 ) + ฮณ(ฯ†2 , x2 ) > d, then return void. 9. Consider the function ฮป : Fl โˆช Fr โ†’ {1, . . . , d}Xe such that ฮป(ฯ†) = {(x, ฮณ(ฯ†, x)) | x โˆˆ Xe }. 15 10. For every ฯ†0 โˆˆ ฮป(Fl โˆช Fr ), do the following for every set F = ฮปโˆ’1 (ฯ†0 ): identify in G + all vertices in F and if at least one pair of them is adjacent in G + , then add an loop on the vertex created after this identification. Let G = (F, E) be the resulting graph (notice that F = ฮป(Fl โˆช Fr )). 11. ฮด = {((x, x0 ), ฮณ(x, x0 )) | x, x0 โˆˆ Ve }. The definition of function ฮณ. We present here the definition of the function ฮณ used in the above description of the tables of the dynamic programming procedure. Given a non-empty set X and q โˆˆ {0, 1} we define ordq (X) = {ฯ€ | โˆƒX 0 โІ X : X 0 6= โˆ… โˆง |X 0 | mod 2 = q โˆง ฯ€ is an ordering of X 0 } Given ฮณl and ฮณr , we define ฮณ : (Fel โˆช Fer โˆช Xe ) ร— (Fel โˆช Fer โˆช Xe ) โ†’ {0, . . . , d + 1} by distinguishing the following cases: 1. If (x โˆˆ Xe \ Xer โˆง ฯ† โˆˆ Fel ) or (x โˆˆ Xe \ Xel โˆง ฯ† โˆˆ Fer ), then X  ฮดs(i) (pi , pi+1 ) + ฮณ(ฯ†, x) = min ฯ†(x), min{ฯ†(p1 ) + J1,ฯโˆ’1K ฮดs(ฯ) (pฯ , x) | [p1 , . . . , pฯ ] โˆˆ ord0 (XeF )} , where s(i) = โ€œlโ€ if hx โˆˆ Xe \ Xel i = (i mod 2), otherwise s(i) = โ€œrโ€. 2. If (x โˆˆ Xe \ Xel โˆง ฯ† โˆˆ Fel ) or (x โˆˆ Xe \ Xer โˆง ฯ† โˆˆ Fer ), then X  ฮณ(ฯ†, x) = min ฯ†(p1 ) + ฮดt(i) (pi , pi+1 ) + ฮดt(ฯ) (pฯ , x) J1,ฯโˆ’1K | [p1 , . . . , pฯ ] โˆˆ ord1 (XeF )} , where t(i) = โ€œlโ€ if hx โˆˆ Xe \ Xel i = 6 (i mod 2), otherwise t(i) = โ€œrโ€. 3. If x is one of the (at most two) vertices in (Xer โˆฉ Xer ) \ XeF and ฯ† โˆˆ Fel โˆช Fer , then  ฮณ(ฯ†, x) = min ฯ†(x), X min{ฯ†(p1 ) + ฮดu(i) (pi , pi+1 ) + ฮดu(q) (pฯ , x) J1,ฯโˆ’1K | [p1 , . . . , pฯ ] โˆˆ ordq (XeF )} | q โˆˆ {0, 1} where u(i) = โ€œrโ€ if hฯ† โˆˆ Fel i = (i mod 2), otherwise u(i) = โ€œlโ€. 4. If ฯ†, ฯ†0 โˆˆ Fl โˆช Fr , then ฮณ(ฯ†, ฯ†0 ) = X  min ฯ†(p1 ) + ฮดu(i) (pi , pi+1 ) + ฯ†0 (pฯ ) J1,ฯโˆ’1K | [p1 , . . . , pฯ ] โˆˆ ordq (XeF ) 16 In this equality, q = 1 if ฯ† and ฯ†0 belong in different sets in {Fl , Fr }, otherwise q = 0. The function u is the same as in the previous case. 5. If x1 , x2 โˆˆ Xe \ Xer or x1 , x2 โˆˆ Xe \ Xel , then ฮด(x1 , x2 ) =  min ฮดy(0,x1 ) (x1 , x2 ), min{ฮดy(0,x1 ) (x1 , p1 ) + X ฮดy(i,x1 ) (pi , pi+1 ) + iโˆˆJ1,ฯโˆ’1K ฮดy(0,x2 ) (pฯ , x2 ) | [p1 , . . . , pฯ ] โˆˆ ord0 (XeF )} In this equality y(i, x) = โ€œlโ€ if hx โˆˆ Xe \ Xer i = hi mod 2 = 0i otherwise y(i, x) = โ€œrโ€. 6. If x1 , x2 belong in different sets is {Xe \ Xer , Xe \ Xel }, then X  ฮด(x1 , x2 ) = min ฮดy(0,x1 ) (x1 , p1 ) + ฮดy(i,x1 ) (pi , pi+1 ) + J1,ฯโˆ’1K ฮดy(0,x2 ) (pฯ , x2 ) | [p1 , . . . , pฯ ] โˆˆ ord1 (XeF ) The function y is the same as in the previous case. 7. If exactly one, say x2 , of x1 , x2 belongs in Xer โˆฉ Xer ) \ XeF , then  ฮด(x1 , x2 ) = min ฮดy(0,x1 ) (x1 , x2 ), X  min min{ฮดy(0,x1 ) (x1 , p1 ) + ฮดy(i,x1 ) (pi , pi+1 ) + J1,ฯโˆ’1K ฮดy(0,x2 ) (pฯ , x2 ) | [p1 , . . . , pฯ ] โˆˆ ord q (XeF )} | q  โˆˆ {0, 1} The function y is the same as in the two previous cases. In case x1 belongs in Xer โˆฉ Xer ) \ XeF , then just swap the positions of x1 and x2 in the above equation. 8. If both x1 , x2 belong in Xer โˆฉ Xer ) \ XeF , then ฮด(x1 , x2 ) =  min ฮดl (x1 , x2 ), ฮดr (x1 , x2 ), min{min{ฮดz(0,j) (x1 , p1 ) + X J1,ฯโˆ’1K ฮดz(i,j) (pi , pi+1 ) + ฮดz(q,j) (pฯ , x2 ) | [p1 , . . . , pฯ ] โˆˆ ordq (XeF )} | (q, j) โˆˆ {0, 1}2 } In the previous equality, z(i, j) = โ€œlโ€ if (i + j mod 2) = 0, otehrwise z(i, x) = โ€œrโ€. Running time analysis. It now remains to prove that procedure join runs in 2 O(b log d) (ฮฑ(q))2 ยท 2O(k )+2 steps. Recall that there exists a function f such that |T(e)| โ‰ค f (k, q, b, d). Therefore merge will be called in Step (2) at most (f (k, q, b, d))2 times. 17 The first computationally non-trivial step of merge is Step 5, where function ฮณ is computed. Notice that ฮณ has at most ((d + 1)|Xel | + (d + 1)|Xer | + |Xe |)2 = 2O(bยทlog d) entries and each of their values require running over all permutations of the subsets of XeF that are at most b! = 2O(bยทlog b) . These facts imply that the computation of ฮณ takes 2O(bยทlog b) steps. As Steps 610 deal with graphs of 2O(bยทlog d) vertices, the running time of join is the claimed one. We are now in position to prove the main algorithmic result of this paper. Proof of Theorem 2. Given an input I = (G, q, k, d) of BBFPDC, we consider the graph H = G(max{3,k}) whose construction takes O(k 2 n) steps, because of Lemma 3. Then run the algorithm of Proposition 4 with (H, w) as input, where w = c1 ยท c2 ยท k ยท d. If the answer is that bw(H) > w, then, From Proposition 3, tw(G) > c1 ยท d, therefore, from Lemma 1, we can safely report that I is a no-instance. If the algorithm of Proposition 4 outputs a sphere-cut decomposition D = (T, ยต) of width at most w = O(k ยท d) then we call the dynamic programming algorithm of Lemma 5, with input (G, H, q, k, d, D, b). This, from Lemma 4, provides an answer to BBFPDC for the 2 O((kd) log d) O((kd) log d) instance I in (ฮฑ(q))2 ยท 2O((kd) log d)+2 ยท n = (ฮฑ(q))2 ยท 22 ยท n steps and this completes the proof of the theorem. 6 NP-hardness proofs In this section we show that the Bounded Budget Plane Diameter Completion and Bounded Budget/Face Plane Diameter Completion problems are NPcomplete. Here we consider R2 -plane graphs, i.e., graphs embedded in the plane R2 . Each 2 R -plane graph has exactly one unbounded face, called the outer face, and all other faces are called inner faces. Take in mind that every S0 -plane graph has as many embeddings in R2 as the number of its faces (each correspond on which face of the embedding in S0 will be chosen to be the outer face in R2 ). All our problems can be equivalently restated on R2 -plane graphs. We choose such embeddings because they facilitate the presentation of the result of this section. We also need some additional terminology. A walk in a graph G of is a sequence P = v0 , e1 , v1 , e2 , . . . , es , vs of vertices and edges of G such that v0 , . . . , vs โˆˆ V (G), e1 , . . . , es โˆˆ E(G), the edges e1 , . . . , es are pairwise distinct, and for i โˆˆ {1, . . . , s}, ei = {viโˆ’1 , vi }; v0 , vs are the end-vertices of the walk. A walk is closed if its end-vertices are the same. The length of a walk P is the number of edges in P . For a walk P with end-vertices u, v, we say that P is a (u, v)-walk. A walk is a path if v0 , . . . , vs and e1 , . . . , es are pairwise distinct with possible exception v0 = vs , and a cycle is a closed path. We write P = v0 . . . vs to denote a walk P = v0 , e1 , . . . , es , vs omitting edges. Recall that the 3-Satisfiability problem for a given Boolean formula ฯ† = C1 โˆง . . . โˆง Cm with clauses C1 , . . . , Cm with 3 literals each over variables x1 , . . . , xn , asks 18 whether x1 , . . . , xn have an assignment that satisfies ฯ†. We write that a literal xi โˆˆ Cj (xi โˆˆ Cj resp.) if this interval is in Cj . For an instance ฯ† of 3-Satisfiability, we define the graphs Gฯ† and G0ฯ† as follows. The vertex set of Gฯ† is {x1 , . . . , xn } โˆช {C1 , . . . , Cm }, and for i โˆˆ {1, . . . , n} and j โˆˆ {1, . . . , m}, {xi , Cj } โˆˆ E(Gฯ† ) if and only if Cj contains either xi or xi . Respectively, V (G0ฯ† ) = {x1 , x1 , . . . , xn , xn }โˆช{C1 , . . . , Cm } and E(G0ฯ† ) = {{xi , xi }|1 โ‰ค i โ‰ค n}โˆช{{xi , Cj }|xi โˆˆ Cj , 1 โ‰ค i โ‰ค n, 1 โ‰ค j โ‰ค m}โˆช{{xi , Cj }|xi โˆˆ Cj , 1 โ‰ค i โ‰ค n, 1 โ‰ค j โ‰ค m}. Let ฯ† over variables x1 , . . . , xn be an instance of 3-Satisfiability such that G0ฯ† is planar, and let G0 be a plane embedding of G0ฯ† . Let also Rฯ† = {{xi , xi }|1 โ‰ค i โ‰ค n} โІ E(G0 ). We define the bipartite graph H(G0 ) as the graph with the vertex set Rฯ† โˆช F (G0 ) and the edge set {{e, f }|e โˆˆ Rฯ† , f โˆˆ F (G0 ) such that e is incident to f }. We consider the following special variant of Satisfiability. Plane Satisfiability with Connectivity of Variables Input: A Boolean formula ฯ† = C1 โˆง . . . โˆง Cm with clauses C1 , . . . , Cm with at most 3 literals each over variables x1 , . . . , xn such that G0ฯ† is planar, and a plane embedding G0 of G0ฯ† such that H(G0 ) is connected. Output: Is it possible to satisfy ฯ†? We show that this problem is hard. Lemma 6. Plane Satisfiability with Connectivity of Variables is NPcomplete. Proof. It is straightforward to see that Plane Satisfiability with Connectivity of Variables is in NP. To show NP-hardness, we reduce Planar 3-Satisfiability, i.e. the 3-Satisfiability problem restricted to instances ฯ† such that Gฯ† is planar. This problem was shown to be NP-complete by Lichtenstein in [15]. Let ฯ† = C1 โˆง . . . โˆง Cm over variables x1 , . . . , xn be an instance of Planar 3Satisfiability. For the plane graph Gฯ† , we construct its plane embedding G. It is well known that it can be done in polynomial time, e.g., by the classical algorithm of Hopcroft and Tarjan [12] or by the algorithm of Boyer and Myrvold [1]. We consequently consider variables x1 , . . . , xn and modify ฯ† and G. Suppose that a variable xi occurs in the clauses Cj1 , . . . , Cjp(i) . Without loss of generality we assume that the edges {xi , Cj1 }, . . . , {xi , Cjp(i) } are ordered clockwise in G as shown in Fig. 2 a). We perform the following modifications of ฯ† and G. โ€ข Replace xi by 2p(i) new variables xi,1 , . . . , xi,2p(i) . โ€ข For k โˆˆ {1, . . . , p(i)}, replace xi in Cjk by xi,2kโˆ’1 . 2p(i) โ€ข Construct 2p(i) clauses Ci1 , . . . , Ci we assume that xi,0 = xi,2p(i) . where Cik = xi,kโˆ’1 โˆจxi,k for k โˆˆ {1, . . . 2p(i)}; โ€ข Modify the current plane graph as it is shown in Fig. 2.3 3 Here and further we demonstrate constructions of plane embeddings in figures instead of long technical formal descriptions. 19 Denote the obtained Boolean formula and plane graph by ฯ†ฬ‚ and Gฬ‚ respectively. By the construction, Gฬ‚ is a plane embedding of Gฯ†ฬ‚ . C j1 xi,1 Ci1 Cj1 Ci2 xi,2 xi,2p xi Ci2p xi,3 xi,2pโˆ’1 Cj2 Cjp C j2 Cjp a) b) Figure 2: Modification of ฯ† and G: a) before the modification and b) after; p = p(i). We show that ฯ† can be satisfied if and only if ฯ†ฬ‚ has a satisfying assignment. Suppose that the variables have assigned values such that ฯ† = true. For each i โˆˆ {1, . . . , n}, we assign the same value as xi for all the variables xi,1 , . . . , xi,2p(i) that replace xi in ฯ†ฬ‚. It is straightforward to verify that ฯ†ฬ‚ = true for this assignment. Assume now that ฯ†ฬ‚ = true for some values of the variables. Observe that for each i โˆˆ {1, . . . , n}, the variables 2p(i) xi,1 , . . . , xi,2p(i) that replace xi should have the same value to satisfy Ci1 , . . . , Ci . It remains to observe that if each xi has the same value as xi,1 , . . . , xi,2p(i) , then ฯ† = true by the construction of ฯ†ฬ‚. C j1 xi,1 xi,1 Ci2 Ci1 xi,2 xi,2p xi,2 xi,2p Ci2p fi xi,2pโˆ’1 xi,2pโˆ’1 xi,3 xi,3 C j2 Cjp Figure 3: Construction of Gฬ‚0 ; it is assumed that Cj1 contains xi , Cj2 contains xi and Cjp(i) contains xi , and p = p(i). Observe that each variable xi,k in ฯ†ฬ‚ occurs in at most 3 clauses, and it occurs at least once in positive and at least once with negation. It implies that a plane embedding Gฬ‚0 of G0ฯ†ฬ‚ can be constructed from Gฬ‚ by โ€œsplittingโ€ the variable vertices as shown in Fig. 3. Clearly, Gฬ‚0 can be constructed in polynomial time. We claim that H(Gฬ‚0 ) is connected. To see it, observe that Gฬ‚0 is constructed from G by replacing each variable-vertex xi by the cycle Li = Ci1 xi,1 xi,1 Ci2 . . . Ci1 (see Fig. 3). 20 Respectively, this graph has n new faces that are inner faces of these cycles. All other faces correspond to the faces of G. Denote by fi the inner face of Li for i โˆˆ {1, . . . , n}. Notice that Rฯ†ฬ‚ contains edges from the cycles Li . It follows that each vertex of Rฯ†ฬ‚ is adjacent to some vertex fi in H(Gฬ‚0 ). Hence, to prove the connectivity of H(Gฬ‚0 ), it is sufficient to show that for any two vertices h1 , h2 โˆˆ F (Gฬ‚0 ), H(Gฬ‚0 ) has a (h1 , h2 )-walk. Consider the dual Gโˆ— of Gฬ‚0 . Recall that V (Gโˆ— ) = F (Gฬ‚0 ) and two vertices of Gโˆ— are adjacent if and only if the corresponding faces of Gฬ‚0 are adjacent. It is straightforward to observe that the dual of any plane graph is always connected. Hence, to show that for any two vertices h1 , h2 โˆˆ F (Gฬ‚0 ) of H(Gฬ‚0 ), H(Gฬ‚0 ) has a (h1 , h2 )-walk, it is sufficient to prove that it holds for any two h1 , h2 that are adjacent vertices of Gโˆ— , i.e., adjacent faces of Gฬ‚0 . Suppose that h1 = fi for some i โˆˆ {1, . . . , n}. Then h2 is a face corresponding to a face h02 of G such that the vertex xi lies on the boundary of h02 . Then by the construction of Gฬ‚0 , there is an edge e = {xi,j , xi,j } of Gฬ‚0 that lies on the boundaries of h1 and h2 . Because e is a vertex of H(Gฬ‚0 ) adjacent to h1 , h2 , there is a (h1 , h2 )-walk in H(Gฬ‚0 ). Assume now that h1 , h2 are faces of Gฬ‚0 distinct from fi for i โˆˆ {1, . . . , n}. Because h1 , h2 are adjacent in Gโˆ— , the faces h1 , h2 correspond to faces h01 , h02 of G such that h01 , h02 has a common vertex xi on their boundaries. It implies that h1 , h2 are adjacent to fi in Gโˆ— . We already proved that H(Gฬ‚0 ) has (fi , h1 ) and (fi , h2 )-walks. Therefore, H(Gฬ‚0 ) has an (h1 , h2 )-walk. It completes the proof of connectedness of H(Gฬ‚0 ) and the proof of the lemma. For the proof of our main result, we need some special gadgets. We introduce them and prove their properties that will be useful further. Let r โ‰ฅ 3 be a positive integer. We construct the graph Wr (v1 , . . . , vr ) as follows (see Fig. 4). โ€ข Construct vertices v1 , . . . , vr and a vertex u. โ€ข For i โˆˆ {1, . . . , r}, construct a (vi , u) path xi0 . . . xir of length r, vi = xi0 , u = xir . โ€ข For j โˆˆ {1, . . . , r โˆ’ 1}, construct a cycle x1j . . . xrj x1j . i โ€ข For i โˆˆ {1, . . . , r} and j โˆˆ {1, . . . , r โˆ’ 1}, construct an edge {xiโˆ’1 jโˆ’1 , xj }; we assume that x0j = xrj for j โˆˆ {0, . . . , r}. We say that the vertices of V (Wr (v1 , . . . , vr )) \ {v1 , . . . , vr } are the inner vertices of the gadget. Let G be a plane graph with a face f , and let v1 . . . vr v1 , r โ‰ฅ 3, be a facial walk for f . We say that G0 is obtained from G by attaching a web to f if G0 is constructed by adding a copy of Wr (v1 , . . . , vr ), where the vertices v1 , . . . , vr of the gadget are identified with the vertices with the same names in the facial walk, and embedding Wr (v1 , . . . , vr ) if f as is shown in Fig. 5. Notice that some vertices in the facial walk can occur several times. Lemma 7. Let G be a plane graph with a face f that has a facial walk of length r โ‰ฅ 3, and let G0 be a plane graph obtained from G by attaching a web to f . 21 v1 v2 v5 v3 v4 Figure 4: Construction of W5 (v1 , . . . , v5 ). Wr (v1 , . . . , vr ) f Figure 5: Attachment of a web. i) For any two vertices u, v โˆˆ V (G), distG0 (u, v) = distG (u, v). Moreover, any shortest (u, v)-path in G0 has no inner vertices of Wr (v1 , . . . , vr ) attached to f . ii) For any vertex v โˆˆ V (Wr (v1 , . . . , vr )), there is a vertex u โˆˆ V (G) such that distG0 (u, v) โ‰ค r. Proof. Let v1 . . . vr v0 be a facial walk for f . To prove i), it is sufficient to observe that for all vi , vj , the length of any (vi , vj )-path in Wr (v1 , . . . , vr ) is greater that the length of a shortest (vi , vj )-path in G that lies on the boundary of f . The definition of Wr (v1 , . . . , vr ) immediately implies ii). Let h be a positive integer. The graph Mh (u1 , u2 , u3 ) is defined as follows (see Fig. 6). โ€ข Construct vertices u1 , u2 , u3 and v1 , v2 , v3 . โ€ข For i โˆˆ {1, 2, 3}, construct a (ui , vi ) path xi0 . . . xir of length `, ui = xi0 , vi = xih . โ€ข For j โˆˆ {1, . . . , h}, construct a cycle x1j . . . xrj x1j . โ€ข For j โˆˆ {1, . . . , h}, construct edges {x1jโˆ’1 , x2j }, {x1jโˆ’1 , x3j } and {x2jโˆ’1 , x3j }. We say that the vertices of V (Mh (u1 , u2 , u3 )) \ {u1 , u2 , u3 } are the inner vertices of the gadget. We also say that u1 is the root and v1 is the pole of M` (u1 , u2 , u3 ). Let G be a plane graph, and let u1 โˆˆ V (G) be a vertex incident to a face f with a triangle facial walk u1 u2 u3 u1 . Let also ` be a positive integer. We say that G0 is 22 u2 u3 v1 u1 Figure 6: Construction of M3 (u1 , u2 , u3 ). obtained from G by attaching a mast of height h rooted in u1 to f if G0 is constructed by adding a copy of Mh (u1 , u2 , u3 ), where the vertices u1 , u2 , u3 of the gadget are identified with the vertices with the same names in the facial walk, and embedding Mh (u1 , u2 , u3 ) in f . We need the properties summarized in the following straightforward lemma. Lemma 8. Let ` be a positive integer. Let G be a plane graph, and let u1 be a vertex of G incident to a face f with a triangle facial walk u1 u2 u3 u1 . Let also G0 be a plane graph obtained from G by attaching a mast of height h rooted in u1 to f . i) For any two vertices u, v โˆˆ V (G), distG0 (u, v) = distG (u, v). Moreover, any shortest (u, v)-path in G0 has no inner vertices of Mh (u1 , u2 , u2 ) attached to f . ii) For any vertex v โˆˆ V (Mh (u1 , u2 , u2 )), distG0 (u1 , v) โ‰ค h. iii) If v is the pole of Mh (u1 , u2 , u2 ), then distG0 (u1 , v) = h and distG0 (u2 , v) > h, distG0 (u3 , v) > h. iv) For any inner vertices x, y of Mh (u1 , u2 , u2 ), distG0 (x, y) โ‰ค h. Now we are ready to prove the main result of the section. Proof of Theorem 1. It is straightforward to see that BPDC and BFPDC are in NP. To show NP-hardness, we reduce Plane Satisfiability with Connectivity of Variables that was shown to be NP-complete in Lemma 6. First, we consider BPDC. Let (ฯ†, G0 ) be an instance of Plane Satisfiability with Connectivity of Variables, where ฯ† = C1 โˆง . . . โˆง Cm is a Boolean formula with clauses C1 , . . . , Cm with at most 3 literals each over variables x1 , . . . , xn such that G0ฯ† is planar, and G0 is a plane embedding of G0ฯ† such that H(G0 ) is connected. Recall that H(G0 ) is the bipartite graph with the bipartition of the vertex set (Rฯ† , F (G0 )), where Rฯ† = {{xi , xi }|1 โ‰ค i โ‰ค n} โІ E(G0 ), and F (G0 ) is the set of faces of G0 , and for e โˆˆ Rฯ† and f โˆˆ F (G0 ), {e, f } โˆˆ E(H(G0 )) if and only if the edge e is incident to the face f in G0 . Notice that degH(G0 ) (e) โ‰ค 2 for any e โˆˆ Rฯ† . We select an arbitrary vertex r โˆˆ F (G0 ) of H(G0 ). Using the connectedness of H(G0 ), we find in polynomial time a tree T of shortest (r, e)-paths for e โˆˆ Rฯ† by the 23 breadth-first search. We assume that T is rooted in r and it defines the parent-child relation on T . Let L โІ Rฯ† be the set of leaves of T , and let s = max{distT (r, e)|e โˆˆ L}. vp vp yi yi fi yi fi fi zi xi xi xi yi fi zi xi wi vc b) a) Figure 7: Construction of gadgets for {xi , xi }. We construct the plane graph Gฬ‚ as follows. i) Construct a copy of G0 . ii) For each vertex f โˆˆ V (T ) such that f โˆˆ F (G0 ), crate a vertex vf embedded in the face f . iii) For each e = {xi , xi } โˆˆ Rฯ† \ L, denote by p its parent and by c its child in T , construct vertices yi , y i , zi and edges {xi , yi }, {yi , vp }, {xi , vc }, {xi , zi }, {xi , y i }, {y i , vp }, {xi , vc }, {xi , zi }, {zi , vp } and embed them as is shown in Fig. 7 a). Denote by fi the inner face of the cycle xi yi vp zi xi and by f i the inner face of the cycle xi y i vp zi xi . iv) For each e = {xi , xi } โˆˆ L, denote by p its parent in T , construct vertices yi , y i , zi , wi and edges {xi , yi }, {yi , vp }, {xi , wi }, {xi , zi }, {xi , y i }, {y i , vp }, {xi , wi }, {xi , zi }, {zi , vp } and embed them as is shown in Fig 7 b). Denote by fi the inner face of the cycle xi yi vp zi xi and by f i the inner face of the cycle xi y i vp zi xi . v) For each i โˆˆ {1, . . . , n} and j โˆˆ {1, . . . , m}, if {xi , Cj } โˆˆ E(G0 ) ({xi , Cj } โˆˆ E(G0 ) resp.), replace this edge by a (xi , Cj )-path (by (xi , Cj )-path resp.) of length 2s โˆ’ distT (r, {xi , xi }). We denote the constructed at this stage graph by Gฬ‚1 . Observe that Gฬ‚1 is connected. Hence, each face has a facial walk. Denote by ` the length of a longest facial walk in Gฬ‚1 . Now we proceed with construction of Gฬ‚. vi) For each face f โˆˆ F (Gฬ‚1 ) distinct from the faces fi , f i for i โˆˆ {1, . . . , n}, attach a web to f . Denote the constructed at this stage graph by Gฬ‚2 . Notice that Gฬ‚2 is 3-connected due to attached webs. vii) For j โˆˆ {1, . . . , m}, select a face f of the obtained graph such that Cj is incident to f and attach a mast of height `+2s rooted in Cj to f (notice that the boundary of f is a triangle because of attached webs). 24 viii) For each e = {xi , xi } โˆˆ L, attach a mast of height ` + 4s โˆ’ 1 โˆ’ distT (r, e) rooted in wi to the face with the facial walk wi xi xi wi . ix) For the vertex vr , select a face f with a triangle boundary such that vr is incident to f (such a face always exists due to attached webs) and attach a mast of height ` + 8s rooted in vr to f . Notice that the obtained graph Gฬ‚ is 3-connected because Gฬ‚2 is 3-connected and attachments of masts cannot destroy 3-connectivity. Also only the faces fi , f i for i โˆˆ {1, . . . , n} have degree 4, and all other faces have degree 3. To complete the construction of an instance of BPDC, we set q = n and d = 2`+12s. We show that (ฯ†, G0 ) is a yes-instance of Plane Satisfiability with Connectivity of Variables if and only if (Gฬ‚, q, d) is a yes-instance of BPDC. Suppose that (ฯ†, G0 ) is a yes-instance of Plane Satisfiability with Connectivity of Variables. Assume that the variables x1 , . . . , xn have values such that ฯ† = true. For i โˆˆ {1, . . . , n}, if xi = true, then we add an edge {xi , vp } for the parent p of {xi , xi } in T and embed this edge in fi . Respectively, we add an edge {xi , vp } and embed this edge in f i if xi = f alse. Denote the obtained graph by Gฬ‚0 . We show that diam(Gฬ‚0 ) โ‰ค d. By the construction of Gฬ‚1 , for any vertex v โˆˆ V (Gฬ‚1 ), distGฬ‚1 (vr , v) โ‰ค 3s. By Lemma 7, any vertex v โˆˆ V (Gฬ‚2 ) is at distance at most ` from a vertex of Gฬ‚1 in Gฬ‚2 . Hence, for any vertex v โˆˆ V (Gฬ‚2 ), distGฬ‚2 (vr , v) โ‰ค ` + 3s. Observe also that for any e = {xi , xi } โˆˆ L, distGฬ‚0 (vr , wi ) = distT (r, e) + 1. To show that for any u, v โˆˆ V (Gฬ‚0 ), distGฬ‚0 (u, v) โ‰ค d, we consider five cases. Case 1. u, v โˆˆ V (Gฬ‚2 ). Because distGฬ‚2 (vr , u) โ‰ค ` + 3s and distGฬ‚2 (vr , v) โ‰ค ` + 3s, distGฬ‚0 (u, v) โ‰ค distGฬ‚2 (u, v) โ‰ค 2` + 6s โ‰ค d. Case 2. u, v are vertices of the same mast attached to a face of Gฬ‚2 . By Lemma 8, distGฬ‚0 (u, v) is at most the height of the mast, and we have that distGฬ‚0 (u, v) โ‰ค `+8s โ‰ค d. Case 3. u โˆˆ V (Gฬ‚2 ) and v is a vertex of a mast attached to a face of Gฬ‚2 . By Lemma 8, distGฬ‚0 (u, vr ) โ‰ค ` + 8s if the mast is rooted in vr . Suppose that this mast is rooted in some other vertex z, i.e., z = wi or z = Cj for some i โˆˆ {1, . . . , n}, j โˆˆ {1, . . . , m}. Then distGฬ‚0 (u, vr ) โ‰ค ` + 4s โˆ’ 1 + distGฬ‚1 (z, r) โ‰ค ` + 8s. Because distGฬ‚0 (vr , v) โ‰ค distGฬ‚2 (vr , v) โ‰ค ` + 3s, distGฬ‚0 (u, v) โ‰ค 2` + 11s โ‰ค d. Case 4. u, v are vertices of distinct masts attached to faces of Gฬ‚2 that are rooted in z, z 0 6= vr respectively. If z = wi for some i โˆˆ {1, . . . , n}, then distGฬ‚0 (u, vr ) โ‰ค ` + 4s โˆ’ 1 โˆ’ distT (r, e) + distGฬ‚0 (vr , wi ) โ‰ค (` + 4s โˆ’ 1 โˆ’ distT (r, e)) + (distT (r, e) + 1) โ‰ค ` + 4s where e = {xi , xi }. If z = Cj for some j โˆˆ {1, . . . , m}, then distGฬ‚0 (u, vr ) โ‰ค ` + 2s + distGฬ‚1 (Cj , vr ) โ‰ค ` + 5s. Clearly, the same bounds hold for distGฬ‚0 (v, vr ). We have that distGฬ‚0 (u, v) โ‰ค distGฬ‚0 (u, vr ) + distGฬ‚0 (vr , v) โ‰ค 2` + 10s โ‰ค d. It remains to consider the last case. Case 5. u, v are vertices of masts attached to faces of Gฬ‚2 such that u is in the mast rooted in vr and v is in a mast rooted in z 6= vr . Suppose that z = wi for some i โˆˆ {1, . . . , n}. Then e = {xi , xi } โˆˆ L. We have that distGฬ‚0 (u, v) โ‰ค distGฬ‚0 (u, vr ) + 25 distGฬ‚0 (vr , wi ) + distGฬ‚0 (wi , v) โ‰ค (` + 8s) + (distT (r, e) + 1) + (` + 4s โˆ’ 1 โˆ’ distT (r, e)) โ‰ค 2` + 12s โ‰ค d. Assume that z = Cj for j โˆˆ {1, . . . , m}. Then the clause Cj in ฯ† contains a literal that has the value true. Let xi be such a literal (the case when Cj contains some xi = true is symmetric). Notice that if xi = true, then for the vertex xi โˆˆ V (Gฬ‚0 ), distGฬ‚0 (xi , vr ) = distT (e, r) for e = {xi , xi } by the construction of Gฬ‚ and the selection of the added edges. Then, distGฬ‚0 (u, v) โ‰ค distGฬ‚0 (u, vr )+distGฬ‚0 (vr , xi )+distGฬ‚0 (xi , Cj )+ distGฬ‚0 (Cj , v) โ‰ค (` + 8s) + distT (r, e) + (2s โˆ’ distT (r, e)) + (` + 2s) โ‰ค 2` + 12s โ‰ค d. Suppose now that (Gฬ‚, q, d) is a yes-instance of BPDC. Let A be a set of at most q edges such that the graph Gฬ‚0 obtained from Gฬ‚ by the addition of A has diameter at most d. Because only the faces fi , f i for i โˆˆ {1, . . . , n} have degree 4 and all other faces have degree 3, each edge of A has its end-vertices in the boundary of some fi or f i and is embedded in this face. Using this observation, denote by Gฬ‚01 and Gฬ‚02 the graphs obtained from Gฬ‚1 and Gฬ‚2 respectively by the addition of A. Let vr0 be the pole of the mast rooted in vr . Because diam(Gฬ‚0 ) โ‰ค d, for any u โˆˆ V (Gฬ‚0 ), distGฬ‚0 (vr0 , u) โ‰ค d and, in particular, it holds for poles of other masts. Consider masts rooted in wi for e = {xi , xi } โˆˆ L. For a mast rooted in wi , denote by wi0 its pole. By Lemma 8, distGฬ‚0 (vr0 , wi0 ) = distGฬ‚0 (vr0 , vr ) + distGฬ‚0 (vr , wi ) + distGฬ‚0 (wi , wi0 ) = (` + 8s) + distGฬ‚0 (vr , wi ) + (` + 4s โˆ’ 1 โˆ’ distT (r, e)), and by Lemma 7, 2 distGฬ‚0 (vr , wi ) = distGฬ‚0 (vr , wi ). We conclude that distGฬ‚0 (vr , wi ) โ‰ค distT (r, e) + 1. 2 1 1 Because distT (r, e) + 1 โ‰ค s + 1, a shortest (vr , wi )-path in Gฬ‚01 does not contain the vertices Cj for j โˆˆ {1, . . . , m}. We obtain that for every edge e0 = {xh , xh } that lies on the unique (r, e)-path in T , {xi , vp } โˆˆ A or {xi , vp } โˆˆ A where p is the parent of e0 in T . This holds for each leaf of T . Because Rฯ† โІ V (T ) and k = n, we have that for each h โˆˆ {1, . . . , n}, either {xi , vp } โˆˆ A or {xi , vp } โˆˆ A where p is the parent of {xh , xh } in T . For h โˆˆ {1, . . . , n}, we let the variable xh = true if {xi , vp } โˆˆ A and xh = f alse otherwise. We show that this assignment satisfies ฯ†. Consider a clause Cj for j โˆˆ {1, . . . , m}. To simplify notations, assume that Cj contains literals xi1 , xi2 , xi3 (the cases when Cj contains two literals and/or some literals are negations of variables are considered in the same way). Let Cj0 be the pole of the mast rooted in the vertex Cj . We have that distGฬ‚0 (vr0 , Cj0 ) โ‰ค d. By Lemma 8,distGฬ‚0 (vr0 , Cj0 ) = distGฬ‚0 (vr0 , vr ) + distGฬ‚0 (vr , Cj ) + distGฬ‚0 (Cj , Cj0 ) = (` + 8s) + distGฬ‚0 (vr , Cj ) + (` + 2s), and by Lemma 7, distGฬ‚0 (vr , Cj ) = distGฬ‚0 (vr , Cj ). Therefore, 2 2 1 distGฬ‚0 (vr , Cj ) โ‰ค 2s. Let eh = {xih , xih } for h โˆˆ {1, 2, 3}. By the construction 1 of Gฬ‚0 , distGฬ‚0 (vr , Cj ) = min{distGฬ‚0 (vr , xih ) + (2s โˆ’ distT (r, eh ))|1 โ‰ค h โ‰ค 3}. Let 1 1 distGฬ‚0 (vr , Cj ) = distGฬ‚0 (vr , xih ) + (2s โˆ’ distT (r, eh )) for h โˆˆ {1, 2, 3}. It follows that 1 1 distGฬ‚0 (vr , xih ) โ‰ค distT (r, eh ), and this immediately implies that {vp , xih } โˆˆ A where 1 p is the parent of eh in T . By the definition, xih = true and, therefore, Cj = true. This holds for each Cj for j โˆˆ {1, . . . , m}, and we conclude that ฯ† = true. To complete the proof of the NP-hardness of BPDC, it remains to observe that Gฬ‚ can be constructed in polynomial time. To show NP-hardness of BFPDC, we use similar arguments. 26 Let (ฯ†, G0 ) be an instance of Plane Satisfiability with Connectivity of Variables, where ฯ† = C1 โˆง . . . โˆง Cm is a Boolean formula with clauses C1 , . . . , Cm with at most 3 literals each over variables x1 , . . . , xn such that G0ฯ† is planar, and G0 is a plane embedding of G0ฯ† such that H(G0 ) is connected. As before, we pick an arbitrary vertex r โˆˆ F (G0 ) of H(G0 ) and find a tree T rooted in r of shortest (r, e)-paths for e โˆˆ Rฯ† with the set of leaves L โІ Rฯ† . Let s = max{distT (r, e)|e โˆˆ L}. vp vp yi yi yi yi fi fi xi xi xi xi wi vc b) a) Figure 8: Construction of gadgets for {xi , xi }. We construct the plane graph Gฬƒ similarly to the construction of Gฬ‚ above. The only difference is that Steps iii) and iv) are replaced by the following steps iiiโˆ— ) and ivโˆ— ). iiiโˆ— ) For each e = {xi , xi } โˆˆ Rฯ† \ L, denote by p its parent and by c its child in T , construct vertices yi , y i and edges {xi , yi }, {yi , vp }, {xi , vc }, {xi , y i }, {y i , vp }, {xi , vc } and embed them as is shown in Fig. 8 a). Denote by fi the inner face of the cycle xi yi v p y i xi xi . ivโˆ— ) For each e = {xi , xi } โˆˆ L, denote by p its parent in T , construct vertices yi , y i , wi and edges {xi , yi }, {yi , vp }, {xi , wi }, {xi , y i }, {y i , vp }, {xi , wi } and embed them as is shown in Fig 8 b). Denote by fi the inner face of the cycle xi yi vp y i xi xi . Observe that Gฬƒ can be obtained from Gฬ‚ by the deletion of the vertices z1 , . . . , zn , and for any u, v โˆˆ V (Gฬƒ), distGฬƒ (u, v) = distGฬ‚ (u, v). Notice that the obtained graph Gฬƒ is 3-connected, the faces f1 , . . . , fn have degree 5, and all other faces have degree 3. To complete the construction of an instance of BFPDC, we set k = 1 and d = 2` + 12s. We show that (ฯ†, G0 ) is a yes-instance of Plane Satisfiability with Connectivity of Variables if and only if (Gฬƒ, k, d) is a yes-instance of BFPDC. Suppose that (ฯ†, G0 ) is a yes-instance of Plane Satisfiability with Connectivity of Variables. Assume that the variables x1 , . . . , xn have values such that ฯ† = true. For i โˆˆ {1, . . . , n}, if xi = true, then we add an edge {xi , vp } for the parent p of {xi , xi } in T and embed this edge in fi . Respectively, we add an edge {xi , vp } and embed this edge in fi if xi = f alse. Denote the obtained graph by Gฬƒ0 . By exactly the same arguments as for the proof of the inequality diam(Gฬ‚0 ) โ‰ค d, we have that diam(Gฬƒ0 ) โ‰ค d. Suppose now that (Gฬ‚, k, d) is a yes-instance of BFPDC. Let A be a set of edges such that the graph Gฬƒ0 obtained from Gฬƒ by the addition of A has diameter at most 27 d. Because only the faces f1 , . . . , fn have degree 5 and all other faces have degree 3, each edge of A has its end-vertices in the boundary of some fi and is embedded in this face. Because k = 1, at most one edge of A is embedded in fi for i โˆˆ {1, . . . , n}. Let vr0 be the pole of the mast rooted in vr . Because diam(Gฬƒ0 ) โ‰ค d, for any u โˆˆ V (Gฬƒ0 ), distGฬƒ0 (vr0 , u) โ‰ค d and, in particular, it holds for poles of other masts. Consider masts rooted in wi for e = {xi , xi } โˆˆ L. For a mast rooted in wi , denote by wi0 its pole. Because distGฬƒ0 (vr0 , wi0 ) โ‰ค d, by the same arguments that were used above in the proof of the NP-hardness of BPDC, we obtain that it implies that for each h โˆˆ {1, . . . , n}, either {xi , vp } โˆˆ A or {xi , vp } โˆˆ A where p is the parent of {xh , xh } in T . For h โˆˆ {1, . . . , n}, we let the variable xh = true if {xi , vp } โˆˆ A and xh = f alse otherwise. To prove that this assignment satisfies ฯ†, we again use the same arguments as above: it follows from the fact that for each clause Cj , distGฬƒ0 (vr0 , Cj0 ) โ‰ค d where Cj0 is the pole of the mast rooted in the vertex Cj . To complete the proof of the NP-hardness of BPDC, it remains to observe that Gฬƒ can be constructed in polynomial time. We proved that BPDC is NP-complete for 3-connected planar graphs. By the Whitneyโ€™s theorem (see, e.g., [6]), any two plane embeddings of a 3-connected plane graphs are equivalent. It gives the following corollary. Bounded Budget Planar Diameter Completion Input: A planar graph G, non-negative integers k and d. Output: Is it possible to obtain a planar graph G0 of diameter at most d from G by adding at most k edges? Corollary 2. Bounded Budget Planar Diameter Completion is NP-complete for 3-connected planar graphs. 7 Discussion We remark that our algorithm still works for the classic PDC problem when the face-degree of the input graph is bounded. For this we define the following problem: Bounded Face BDC (FPDC) Input: a plane graph G with face-degree at most k โˆˆ Nโ‰ฅ3 , and d โˆˆ N Question: is it possible to add edges in G such that the resulting embedding remains plane and has diameter at most d? We directly have the following corollary of Theorem 2. O((kd) log d) Theorem 3. It is possible to construct an O(n3 ) + 22 FPDC. ยท n-step algorithm for To construct an FPT-algorithm for PDC when parameterized by d remains an insisting open problem. The reason why our approach does not apply (at least directly) for PDC is that, as long as a completion may add an arbitrary number of edges in each 28 face, we cannot guarantee that our dynamic programming algorithm will be applied on a graph of bounded branchwidth. We believe that our approach and, in particular, the machinery of our dynamic programming algorithm, might be useful for further investigations on this problem. All the problems in this paper are defined on plane graphs. However, one may also consider the โ€œnon-embeddedโ€ counterparts of the problems PDC and BPDC by asking that their input is a planar combinatorial graphs (without a particular embedding). Similarly, such a counterpart can also be defined for the case of BFPDC if we ask whether the completion has an embedding with at most k new edges per face. Again, all these parameterized problems are known to be (non-constructively) in FPT, because of the results in [18, 16]. However, our approach fails to design the corresponding algorithms as it strongly requires an embedding of the input graph. For this reason we believe that even the non-embedded versions of BPDC and BFPDC are as challenging as the general Planar Diameter Completion problem. Acknowledgement. We would like to thank the anonymous referees of an earlier version of this paper for their remarks and suggestions that improved the presentation of the paper. References [1] John M. Boyer and Wendy J. Myrvold. On the cutting edge: Simplified O(n) planarity by edge addition. J. Graph Algorithms Appl., 8(2):241โ€“273, 2004. [2] Dimitris Chatzidimitriou, Archontia C. Giannopoulou, Spyros Maniatis, Clment Requil, Dimitrios M. Thilikos, and Dimitris Zoros. Fixed parameter algorithms for completion problems on planar graphs. Manuscript, 2015. [3] F. R. K. Chung. Diameters of graphs: Old problems and new results. Congressus Numerantium, 60, 1987. [4] Bruno Courcelle. The expression of graph properties and graph transformations in monadic second-order logic. Handbook of Graph Grammars, pages 313โ€“400, 1997. [5] Italo J. Dejter and Michael R. Fellows. Improving the diameter of a planar graph. Manuscript, may 1993. [6] Reinhard Diestel. Graph Theory, 4th Edition, volume 173 of Graduate texts in mathematics. Springer, 2012. [7] Frederic Dorn, Eelko Penninkx, Hans L. Bodlaender, and Fedor V. Fomin. Efficient exact algorithms on planar graphs: Exploiting sphere cut decompositions. Algorithmica, 58(3):790โ€“810, 2010. 29 [8] Rodney G. Downey and Michael R. Fellows. Fundamentals of Parameterized Complexity. Texts in Computer Science. Springer, 2013. [9] Yong Gao, Donovan R. Hare, and James Nastos. The parametric complexity of graph diameter augmentation. Disc. Appl. Math., 161(10-11):1626โ€“1631, 2013. [10] Qian-Ping Gu and Hisao Tamaki. Optimal branch-decomposition of planar graphs in O(n3 ) time. ACM Transactions on Algorithms, 4(3), 2008. [11] Qian-Ping Gu and Hisao Tamaki. Improved bounds on the planar branchwidth with respect to the largest grid minor size. In Algorithms and Computation - 21st International Symposium, (ISAAC 2010), pages 85โ€“96, 2010. [12] John E. Hopcroft and Robert Endre Tarjan. Efficient planarity testing. J. ACM, 21(4):549โ€“568, 1974. [13] Athanassios Koutsonas and Dimitrios M. Thilikos. Planar feedback vertex set and face cover: Combinatorial bounds and subexponential algorithms. Algorithmica, 60(4):987โ€“1003, 2011. [14] Chung-Lun Li, S. Thomas McCormick, and David Simchi-Levi. On the minimumcardinality-bounded-diameter and the bounded-cardinality-minimum-diameter edge addition problems. Oper. Res. Lett., 11(5):303โ€“308, 1992. [15] David Lichtenstein. Planar formulae and their uses. SIAM Journal on Computing, 11(2):329โ€“343, 1982. [16] Neil Robertson and Paul D. Seymour. Graph minors XIII. The disjoint paths problem. J. Comb. Theory, Ser. B, 63(1):65โ€“110, 1995. [17] Neil Robertson and Paul D. Seymour. Graph Minors. XIII. The disjoint paths problem. J. Combin. Theory, Ser. B, 63(1):65โ€“110, 1995. [18] Neil Robertson and Paul D. Seymour. Graph minors. XX. Wagnerโ€™s conjecture. J. Combin. Theory Ser. B, 92(2):325โ€“357, 2004. [19] Anneke A. Schoone, Hans L. Bodlaender, and Jan van Leeuwen. Diameter increase caused by edge deletion. Journal of Graph Theory, 11(3):409โ€“427, 1987. [20] Paul D. Seymour and Robin Thomas. Call routing and the ratcatcher. Combinatorica, 14(2):217โ€“241, 1994. 30
8cs.DS
A Centralized Local Algorithm for the Sparse Spanning Graph Problem Christoph Lenzen โˆ— Reut Levi โ€  arXiv:1703.05418v2 [cs.DS] 18 Jul 2017 July 20, 2017 Abstract Constructing a sparse spanning subgraph is a fundamental primitive in graph theory. In this paper, we study this problem in the Centralized Local model, where the goal is to decide whether an edge is part of the spanning subgraph by examining only a small part of the input; yet, answers must be globally consistent and independent of prior queries. Unfortunately, maximally sparse spanning subgraphs, i.e., spanning trees, cannot be constructed efficiently in this model. Therefore, we settle for a spanning subgraph containing at most (1 + )n edges (where n is the number of vertices and  is a given approximation/sparsity parameter). We achieve a query complexity of Oฬƒ(poly(โˆ†/ฮต)n2/3 ),1 where โˆ† is the maximum degree of the input graph. Our algorithm is the first to do so on arbitrary bounded degree graphs. Moreover, we achieve the additional property that our algorithm outputs a spanner, i.e., distances are approximately preserved. With high probability, for each deleted edge there is a path of O(log n ยท (โˆ† + log n)/) hops in the output that connects its endpoints. 1 Introduction When operating on very large graphs, it is often impractical or infeasible to (i) hold the entire graph in the local memory of a processing unit, (ii) run linear-time (or even slower) algorithms, or even (iii) have only a single processing unit perform computations sequentially. These constraints inspired the Centralized Local model [17], which essentially views the input as being stored in a (likely distributed) database that provides query access to external processing units. To minimize the coordination overhead of such a system, it is furthermore required that there is no shared memory or communication between the querying processes, except for shared randomness provided alongside the access to the input. The idea is now to run sublinear-time algorithms that extract useful global properties of the graph and/or to examine the input graph locally upon demand by applications. Studying graphs in this model leads to the need for query access to a variety of graph-theoretical structures like, e.g., independent or dominating sets. In such a case, it is crucial that locally evaluating whether a node participates in such a set is consistent with the same evaluation for other nodes. This is a non-trivial task, as local decisions can only be coordinated implicitly via the structure of the input (which is to be examined as little as possible) and the shared randomness. โˆ— MPI for Informatics, Saarbruฬˆcken 66123, Germany, [email protected] MPI for Informatics, Saarbruฬˆcken 66123, Germany, [email protected] 1 Oฬƒ-notation hides polylogarithmic factors in n. โ€  1 Nonetheless, this budding field brought forth a number of elegant algorithms solving, e.g., maximal independent set, hypergraph coloring, k-CNF, approximate maximum matching and approximate minimum vertex cover for bipartite graphs [1, 4, 5, 11, 12, 13, 17]. In this work, we consider another very basic graph structure: sparse spanning subgraphs. Here, the task is to select a subset of the edges of the (connected) input graph so that the output is still connected, but has only few edges. By โ€œfewโ€ we mean that, for some input parameter ฮต > 0, the number of selected edges is at most (1 + ฮต)n, where n denotes the number of nodes. One may see this as a relaxed version of the problem of outputting a spanning tree of the graph, which is a too rigid requirement when looking for fast algorithms: on a cycle, a single edge has to be deleted, but this necessitates to first verify that the input graph is not, in fact, a line. Definition 1 ([9]) An algorithm A is a Local Sparse Spanning Graph (LSSG) algorithm if, given n, โˆ† โ‰ฅ 1, a parameter  โ‰ฅ 0, and query access to the incidence list representation of a connected graph G = (V, E) over n vertices and of degree at most โˆ†, it provides oracle access to a subgraph G0 = (V, E 0 ) of G such that: 1. G0 is connected. 2. |E 0 | โ‰ค (1 + ) ยท n with high probability (w.h.p.),2 where E 0 is determined by G and the internal randomness of A. By โ€œproviding oracle access to G0 โ€ we mean that on input {u, v} โˆˆ E, A returns whether {u, v} โˆˆ E 0 , and for any sequence of edges, A answers consistently with respect to the same G0 . We are interested in LLSG algorithms that, for each given edge, perform as few queries as possible to G. Observe that Item 2 implies that the answers of an LLSG algorithm to queries cannot depend on previously asked queries. We note that relaxing from requiring a tree as output makes it possible to ask for additional guarantees that, in general, cannot be met by a spanning tree. Instead of merely preserving connectivity, it becomes possible to maintain distances up to small factors. Such subgraphs are known as (sparse, multiplicative) spanners [14, 15]. In fact, choosing ฮต โˆˆ o(1) then yields ultra-sparse spanners that are o(n) edges away from being trees. 1.1 Our Contribution We give the first non-trivial LSSG algorithm in the Centralized Local model that runs on arbitrary graphs. We achieve a query complexity of Oฬƒ(poly(โˆ†/ฮต)n2/3 ) per edge, w.h.p. Moreover, we guarantee that for each edge that is not selected into the spanner, w.h.p. there is a path of O(log n ยท (โˆ† + log n)/) hops consisting of edges that are selected into the spanner; this is referred to as a stretch of O(log n ยท (โˆ† + log n)/). For simplicity, assume for the moment that โˆ† and ฮต are constants. Our algorithm combines the following key ideas. โ€ข We classify edges as expanding if there are sufficiently many (roughly n1/3 ) nodes within O(log n) hops of their endpoints. For non-expanding edges, we can efficiently simulate a standard distributed spanner algorithm at small query complexity, as solutions of running time O(log n) are known (e.g. [3]). 2 That is, with probability at least 1 โˆ’ 1/nc for an arbitrary constant c > 0 that is chosen upfront. 2 โ€ข On the node set induced by expanding edges, we can construct a partition into Voronoi cells with respect to roughly n2/3 randomly sampled centers. The Voronoi cells are spanned by trees of depth O(log n), as expanding nodes have their closest center within O(log n) hops w.h.p. Finding the closest center has query complexity Oฬƒ(n1/3 ). โ€ข We refine the partition into Voronoi cells further into clusters of Oฬƒ(n1/3 ) nodes. We simply let a node be a singleton cluster if its subtree in the spanning tree of its cell contains more than Oฬƒ(n1/3 ) nodes. This construction has query complexity Oฬƒ(n2/3 ) for constructing a complete cluster, yet ensures that there are Oฬƒ(n2/3 ) clusters in total due to the low depth of the trees; moreover, each cluster is completely contained in some Voronoi cell. โ€ข It remains to select few edges to interconnect the Voronoi cells. This is the main challenge, for which the above properties of the partition are crucial. To keep the number of selected edges small in expectation, we mark a subset of expected size ฮ˜ฬƒ(n1/3 ) of the clusters by marking each Voronoi cell (and thereby its constituent clusters) with probability nโˆ’1/3 . We then try to ensure that (i) clusters select an edge to each adjacent marked Voronoi cell and (ii) for each marked Voronoi cell adjacent to an adjacent cluster, they select one edge connecting to some cluster adjacent to this cell. โ€ข The main issue with the previous step is that we cannot afford to construct each adjacent cluster, preventing us from guaranteeing (ii). We circumvent this obstacle by identifying for adjacent clusters in which cell they are and keeping an edge for the purpose of (ii) if it satisfies a certain minimality requirement with respect to the rank of the cell used for symmetry breaking purposes. This way, we avoid construction of adjacent clusters, instead needing to determine the rank of their Voronoi cells only. This way, we maintain query complexity Oฬƒ(n2/3 ). โ€ข However, this now entails an inductive argument for ensuring connectivity, which also affects stretch. By choosing Voronoi cell ranks uniformly at random, we ensure that the length of such an inductive chain is bounded by O(log n) w.h.p. Together with the depth of the Voronoi cell trees of O(log n) and the stretch of the spanner algorithm for non-expanding edges (also O(log n)), this yields the total bound of O(log2 n) on the stretch of our scheme. Finally, we note that we can place the above routine in a wrapper verifying that, w.h.p., the number of globally selected edges does not significantly exceed the expectation. If this is not the case, the wrapper starts the process all over. Since in each attempt the success probability is constant (and the verifier succeeds w.h.p.), we get within O(log n) attempts that the bound on the number of selected edges is satisfied w.h.p. and the routine terminates. Relation to Property Testing. As observed in [10], testing cycle-freeness with one sidederror in the bounded-degree model can be reduced to the LSSG problem. From this reduction it follows that we obtain a tester for cycle-freeness that works in Oฬƒ(n2/3 ) time. Czumaj et al. [2] studied the problem of Ck -minor freeness with one sided-error. For cycle-freeness (C3 -minor freeness) โˆš their complexity is Oฬƒ( n), therefore their complexity is better than ours. However, we would like to point out that an LSSG algorithm gives a stronger guarantee than a one-sided error tester for cycle-freeness. An LSSG algorithm can be used to find for all but at most (1 + )|V | edges e a cycle that e belongs to, i.e., a witness for the violation by e can be provided. In constrast, a one-sided error tester merely guarantees to find a single cycle in instances that are -far from being cycle-free. Perhaps more importantly, our approach proves useful when testing for other minors. Recently, Fichtenberger et al. [6] built on our work to construct one-sided error testers for each minor of the 3 (k ร— 2)-grid. 1.2 Related work The problem of finding a sparse spanning subgraph in the Centralized Local model was first studied โˆš in [9], where the authors show a lower bound of โ„ฆ( n) queries for constant  and โˆ† (see also survey by Rubinfeld [18]). They also present an upper bound with nearly tight query complexity for graphs that have very good expansion properties. However, for general (bounded degree) graphs their algorithm might query the entire graph for completing a single call to the oracle. They also provide an efficient algorithm for minor-free graphs that was later improved in [8]. The algorithm presented in [8] achieves a query complexity that is polynomial in โˆ† and 1/ and is independent of n. The stretch factor of this algorithm is also independent of n and depends only on โˆ†, 1/, and the size of the excluded minor. A characterization of the query complexity of the problem was presented in [7]. Specifically, this work provides an upper bound (which builds on an algorithm in [9]) that has a query complexity that is independent of n (however, super-exponential in 1/) for families of graphs which are, roughly speaking, sufficiently non-expanding everywhere. On the other hand, they show that, for a family of graphs with expansion properties that are slightly better, any local algorithm must have a query complexity that depends on n. In the (distributed) Local model, Ram and Vicari [16] study the same problem and provide an algorithm that runs in min{D, O(log n)} rounds, where D denotes the diameter of the input graph. Their algorithm achieves the sparsity property by breaking all short cycles. 2 Preliminaries The graphs we consider are undirected and have a known degree bound โˆ†, and we assume we have query access to their incidence list representation. Namely, for any vertex v and index 1 โ‰ค i โ‰ค โˆ†, it is possible to obtain the ith neighbor of v by performing a query to the graph (if v has less than i neighbors, then a special symbol is returned). Without loss of generality, we assume that graphs are simple, i.e., contain neither loops nor parallel edges.3 The number of vertices in the graph is n and we assume that each vertex v has a unique id, which for simplicity we also denote by v. There is a total order on the ids, i.e., given any two distinct ids u and v, we can decide whether u < v or v < u. Let G = (V, E) be a graph, where V = [n]. We denote the distance between two vertices u and v in G by dG (u, v). For vertex v โˆˆ V and an integer r, let ฮ“r (v, G) denote the set of vertices at distance at most r from v. When the graph G is clear from the context, we shall use the shorthands d(u, v) and ฮ“r (v) for dG (u, v) and ฮ“r (v, G), respectively. The total order on the vertices induces a total order r on the edges of the graph in the following straightforward manner: r({u, v}) < r({u0 , v 0 }) if and only if min{u, v} < min{u0 , v 0 } or min{u, v} = min{u0 , v 0 } and max{u, v} < max{u0 , v 0 }. The total order over the vertices also induces an order over those vertices visited by a Breadth First Search (BFS) starting from any given vertex v, and whenever we refer to a BFS, we mean that it is performed according to this order. 3 The answer on a self-loop can always be negative, and we can default to rejecting all but the first edge between two nodes. 4 Figure 1: Partition of a graph into cells and clusters, where k = 6. Black lines are the borders of Voronoi cells, whose centers have black fillings. Red edges belong to the BFS trees spanning the clusters, while dashed gray lines are non-tree edges. Red circles indicate singleton clusters (if the node has a red child) or the roots of subtrees that form a cluster (if the children are black). Whenever referring to one of the above orders, we may refer to the rank of an element in the respective order. This is simply the index of the respective element when listing all elements ascendingly with respect to the order. For a graph G = (V, E) and a pair of disjoint subsets of vertices A โŠ‚ V and B โŠ‚ V let def EG (A, B) = {(u, v) โˆˆ E | u โˆˆ A โˆง v โˆˆ B}. When it is clear from the context, we omit the subscript. We say that a pair of subsets of vertices A and B are adjacent if EG (A, B) 6= โˆ…. 3 An Algorithm that Works under a Promise We begin by describing an LSSG algorithm which works under the following promise on the input graph G = (V, E). Sample ` uniformly at random from [2 log n/ log(1 + ), 2 log n/ log(1 + ) + โˆ†/}], def and let k = cn1/3 ln n ยท `โˆ†/, where c is a constant that will be determined later. For every v โˆˆ V , def let iv = minr {|ฮ“r (v)| โ‰ฅ k}. We are promised that maxvโˆˆV {iv } โ‰ค `. In words, we assume that the `-hop neighborhood of every vertex in G contains at least k vertices. First, we fix a simple partition of V . 5 3.1 The Underlying Partition def Centers. Pick a set S โŠ‚ |V | of r = ฮ˜(n2/3 / ln n) vertices at random. We shall refer to the vertices in S as centers. For each vertex v โˆˆ V , its center, denoted by c(v), is the center which is closest to v amongst all centers (break ties between centers according to the id of the center). Voronoi cells. The Voronoi cell of a vertex v, denoted by Vor(v), is the set of all vertices u for which c(u) = c(v). Additionally, we assign to each cell a random rank, so that there is a uniformly random total order on the cells; note carefully that the rank of a cell thus differs from the rank of its center (which is given by its identifier, which is not assigned randomly). We remark that we can determine the rank of the cell from the shared randomness and the cellโ€™s identifier, for which we simply use the identifier of its center. Clusters. For each Voronoi cell, consider the BFS tree spanning it, which is rooted at the respective center. For every v โˆˆ V , let p(v) denote the parent of v in this BFS tree. If v is a center then p(v) = v. For every v โˆˆ V \ S, let T (v) denote the subtree of v in the above-mentioned BFS tree when we remove the edge {v, p(v)}; for v โˆˆ S, T (v) is simply the entire tree. Now consider a Voronoi cell. If the cell contains at most k vertices, then the cluster of all the vertices in the Voronoi cell is the cell itself. Otherwise, there are two cases. If T (v) contains at least k vertices, then the cluster of v is the singleton {v}. Otherwise, v has a unique ancestor u (including v) for which T (u) contains less than k vertices and T (p(u)) contains at least k vertices. The cluster of v is the set of vertices in T (u). For a cluster C, let c(C) denote the center of the vertices in C (all the vertices in the cluster have the same center). Let Vor(C) denote the Voronoi cell of the vertices in C. This describes a partition of V into Voronoi cells, and a refinement of this partition into clusters. See Figure 1 for an illustration. 3.2 The Edge Set Our spanner, H = (V, E 0 ), initially contains, for each Voronoi cell Vor the edges of the BFS tree that spans Vor, i.e., the BFS tree rooted at the center of Vor spanning the subgraph induced by Vor (see Section 2 for more details). Clearly, these edges also span the clusters. Next, we describe which edges we add to E 0 in order to connect the clusters. Marked Clusters and Clusters-of-Clusters def Each center is marked independently with probability p = 1/n1/3 . If a center is marked, then we say that its Voronoi cell is marked and all the clusters in this cell are marked as well. Cluster-of-clusters. For every marked cluster, C, define the cluster-of-clusters of C, denoted by C(C), to be the set of clusters which consists of C and all the clusters which are adjacent to C. A cluster B is participating in C(C) if B โˆˆ C(C) and the edge of minimum rank in E(B, Vor(C)) also belongs to E(B, C). Thus, if B is adjacent to Vor(C) and Vor(C) is marked, then there is a unique cluster D โІ Vor(C) such that B participates in C(D). See Figure 2 for a visualization. 6 E F C(C) D C Figure 2: Illustration of marked clusters and clusters of clusters. Thick red and black ovals are marked and unmarked cells, respectively. Thin circles are clusters, where cluster C comprises its entire cell. Thick edges are the ones of minimum rank between their incident clusters, while the dotted edges do not meet this criterion. The arrows of red edges indicate participation in the respective adjacent marked cluster; note that D does not participate in C(F ), as for each adjacent marked cell Vor it exclusively participates in the cluster-of-clusters connected to it by the edge of minimum rank in E(D, Vor). C(C) is marked in blue; all its constituent clusters also participate in C(C), as Vor(C) = C. The Edges between Clusters By saying that we connect two adjacent subsets of vertices A and B, we mean that we add the def minimum ranked edge in E(A, B) to E 0 . For a cluster A, define its adjacent centers Vor(โˆ‚A) = {Vor(v) | u โˆˆ A โˆง {u, v} โˆˆ E} \ {Vor(A)}, i.e., the set of Voronoi cells that are adjacent to A. This definition explicitly excludes Vor(A), as there is no need to connect A to its own Voronoi cell. We next describe how we connect the clusters. The high-level idea is to make sure that every marked cluster and the clusters that participate in the respective cluster-of-clusters remain connected. For clusters which are not adjacent to any marked cluster we make sure to keep them connected to all adjacent Voronoi cells. Formally: 1. We connect every cluster to every adjacent marked cluster. 2. Each cluster A that is not participating in any cluster-of-clusters (i.e., no cell adjacent to A is marked) we connect to each adjacent cell. 3. Suppose cluster A is adjacent to cluster B, where B is adjacent to a marked cell Vor. Denote by C the (unique) cluster in cell Vor for which B participates in C(C). We connect A with B if the following conditions hold: โ€ข Vor(B) has minimum rank amongst Vor(โˆ‚A) โˆฉ Vor(โˆ‚C) 7 C A B D Figure 3: Illustration of the third edge selection rule. In this example, the thick black edge has minimum rank in E(A, Vor(B)) and B has minimum rank in โˆ‚A โˆฉ โˆ‚C. However, the rank of Vor(D) is smaller than that of Vor(B), and hence the dashed edge is not selected. Here, A will select the direct edge connecting it to D, due to the first rule. โ€ข the minimum ranked edge in E(A, Vor(B)) is also in E(A, B) Figure 3 showcases the third rule. 3.3 Sparsity Lemma 1 The number of clusters, denoted by s, is at most |S| + n`(โˆ† + 1)/k. Proof: We first observe that, due to the promise on G, it follows that for every v โˆˆ V , d(v, c(v)) โ‰ค ` w.h.p. Recall the terminology from Subsection 3.1. Consider v for which |T (v)| โ‰ฅ k and therefore its cluster is the singleton {v}. We say that a vertex u is special if |T (u)| โ‰ฅ k and for every child of u in T (u), t, it holds that |T (t)| < k. By an inductive argument, it follows that v is an ancestor of a special vertex. Since for every pair of special vertices u and w, T (u) and T (w) are vertex disjoint, we obtain that there are at most n/k special vertices. Since for every special vertex, there are at most ` ancestors, the total number of vertices v with |T (v)| โ‰ฅ k is bounded by n`/k. Observe that any cluster either (i) is a singleton {v} with |T (v)| โ‰ฅ k, (ii) contains a node v such that |T (p(v))| โ‰ฅ k, or (iii) is an entire Voronoi cell. We just bounded the number of clusters of type (i) by n`/k, and immediately get a bound on the number of type (ii) clusters of n`โˆ†/k. The number of type (iii) clusters is bounded by the number of Voronoi cells |S|, showing the desired bound on s. Lemma 2 Exp(|E 0 |) โ‰ค (1 + O())|V |. 8 Proof: The number of edges we add due to the BFS trees of the Voronoi cells is at most |V | โˆ’ 1. The number of edges which are taken due to Condition 1 is at most s times the number of marked clusters. In expectation, there are s ยท p marked clusters, yielding at most s2 p edges in expectation. Since s = O(n2/3 / ln n) and p = 1/n1/3 we obtain that s2 p = O(n/ ln n). Let A be a cluster. The number of edges which are adjacent to A and are taken due to Condition 3 is bounded by the total number of clusters-of-clusters. The number of clusters-of-clusters is exactly the number of marked clusters. Thus, the total number of edges which are taken due to Condition 3 is bounded by s2 p. Observe that the probability that cluster A is not adjacent to a marked cell is (1 โˆ’ p)|Vor(โˆ‚A)| โ‰ค eโˆ’p|Vor(โˆ‚A)| . Hence, if |Vor(โˆ‚A)| โ‰ฅ 3pโˆ’1 ln n, A is adjacent to a marked cell w.h.p. Using a union bound over all clusters, it follows that w.h.p. each cluster A without an adjacent marked cell satisfies that |Vor(โˆ‚A)| โ‰ค 3pโˆ’1 ln n with probabilty at least 1 โˆ’ 1/n2 ; the probability at most 1/n2 event that this bound is violated cannot contribute more than |E|/n2 < 1 to the expectation. Therefore, the total number of edges which are taken due to Condition 2 is bounded by (3s ln n)/p + 1 = O(n). To conclude, the total number of edges in E 0 is at most |V |(1 + O()) in expectation, as desired. 3.4 Connectivity and Stretch Lemma 3 H is connected. Proof: Recall that H contains a spanning tree on every Voronoi cell, hence it suffices to show that we can connect any pair of Voronoi cells by a path between some of their vertices. Moreover, the facts that G is connected and the Voronoi cells are a partition of V imply that it is sufficient to prove this for any pair of adjacent Voronoi cells. Accordingly, let Vor and Vor1 be two cells such that E(Vor, Vor1 ) 6= โˆ…. Consider clusters A โІ Vor and B โІ Vor1 such that the edge e of minimum rank in E(Vor, Vor1 ) is in E(A, B). If B is not adjacent to a marked cell, then Condition 2 implies that e is selected into H. Thus, we may assume that B is adjacent to a marked cell Vor0 . Accordingly, there exists a marked cluster C โІ Vor0 such that B is participating in C(C). If the rank of Vor1 is minimum in Vor(โˆ‚C) โˆฉ Vor(โˆ‚A), then e is selected into H by Condition 3 and we are done. Otherwise, observe that Vor1 is connected to Vor0 , as the edge of minimum rank in E(B, C) is selected into H by Condition 1. Therefore, it suffices to show that Vor gets connected to Vor0 . Let Vor2 be the cell of minimum rank among Vor(โˆ‚C) โˆฉ Vor(โˆ‚A). Let D โІ Vor2 be the cluster satisfying that the edge e0 of minimum rank in E(A, Vor2 ) is in E(A, D). Note that Vor2 is connected to Vor0 (which we saw to be connected to Vor1 ), as there is some cluster D0 โІ Vor(D) that is adjacent to C and selects the edge of minimum rank in E(D0 , C) by Condition 1. Overall, we see that it is sufficient to show that Vor gets connected to Vor2 , where Vor2 has smaller rank than Vor1 . We now repeat the above reasoning inductively. In step i, we either succeed in establishing connectivity between Vor and Vori , or we determine a cell Vori+1 that has smaller rank than Vori and is connected to Vori . As any sequence of Voronoi cells of descending ranks must be finite, the induction halts after finitely many steps. Because the induction invariant is that Vori+1 is connected to Vori , this establishes connectivity between Vor and Vor1 , completing the proof. 9 Lemma 4 Denote by GVor the graph obtained from G by contracting Voronoi cells and by HVor its subgraph obtained when doing the same in H. If the cellsโ€™ ranks are uniformly random, w.h.p. HVor is a spanner of GVor of stretch O(log n). Proof: Recall the proof of Lemma 3. We established connectivity by an inductive argument, where each step increased the number of traversed Voronoi cells by two. Hence, it suffices to show that the induction halts after O(log n) steps w.h.p. To see this, observe first that GVor is independent of the ranks assigned to Voronoi cells and pick any pair of adjacent cells Vor, Vor1 , i.e., neighbors in GVor . We perform the induction again, assigning ranks from high to low only as needed in each step, according to the following process. In each step, we query the rank of some cells, and given an answer of rank r, the ranks of all cells of rank at least r are revealed as well. In step i, we begin by querying the rank of Vori . Consider the cluster Di โІ Vori adjacent to A satisfying that the edge with minimum rank in E(Vori , A) is also in E(Di , A). We can assume without loss of generality that Di is adjacent to a marked cluster Fi and that it is participating in C(Fi ) (as otherwise Di connects to A directly and we can terminate the process). If the ranks of all the cells adjacent to both Fi and A were already revealed, then the process terminates. Otherwise, we query the rank of all such cells whose rank is still unrevealed. We set the cell of the queried cluster that has minimum rank to be Vori+1 and we continue to the next step. We claim that, in each step i, either the process terminates, or the rank of Vori+1 is at most half of the rank of Vori with probability at least 1/2. To verify this, observe that in the beginning of step i, any cell center whose rank was not revealed so far has rank which is uniformly distributed in [ri โˆ’ 1], where ri is the rank of Vori .4 With probability at least 1/2, such a rank is at most ri /2. If Vori has no adjacent cells whose ranks have not been revealed yet, the process terminates. Hence, regardless of whether the process terminates or not, the claim holds. By Chernoffโ€™s bound, we conclude that the process terminates within O(log n) steps w.h.p., as r1 is bounded by the number of Voronoi cells, which itself is trivially bounded by n. By the union bound over all pairs of cells Vor and Vor1 , we get the desired guarantee. Corollary 1 W.h.p., H is a spanner of G of stretch O(log n ยท (โˆ† + log n)/). Proof: Due to the promise on G, w.h.p. the spanning trees on Voronoi cells have depth ` โˆˆ O((โˆ† + log n)/). Hence, for any edge within a Voronoi cell, the claim holds w.h.p. Moreover, for an edge connecting different Voronoi cells, by Lemma 4, w.h.p. there is a path of length O(log n) in HVor connecting the respective cells. Navigating with at most 2` โˆˆ O((โˆ† + log n)/) hops in each traversed cell, we obtain a suitable path of length O(log n ยท (โˆ† + log n)/) in H. 4 The Algorithm for General Graphs We use a combination of the algorithm in Section 3 with the algorithm by Elkin and Neiman for ultra-sparse spanners [3]. We call a vertex v remote, with respect to a set of centers, if the `-hop neighborhood of v does not include a center. Fix S, let R denote the set of remote vertices with def respect to S, and abbreviate Rฬ„ = V \ R. 4 In step 1, we first query Vor1 and then observe that this statement holds. 10 First Step. Run the algorithm from Section 3 on the subgraph induced by Rฬ„, i.e., {u, v} โˆˆ E with u, v โˆˆ Rฬ„ is added to E 0 if and only if the algorithm outputs the edge. Second Step. Run the algorithm of Elkin and Neiman [3] on the subgraph induced by R, i.e., {u, v} โˆˆ E with u, v โˆˆ R is added to E 0 if and only if the algorithm outputs the edge.5 Their algorithm proceeds as follows. Given an integer h, each vertex v draws rv according to the exponential distribution with parameter ฮฒ = ln(n/ฮด)/h, where ฮด is a parameter that controls the success probability of the algorithm. Each vertex v receives ru from every vertex u within distance h, and stores mu (v) = ru โˆ’d(u, v) and a neighbor on a shortest path between v and u, denoted by nu (v). The edges that are added to the spanner are C(v) = {{v, nu (v)} | mu (v) โ‰ฅ maxwโˆˆV {mw (v) โˆ’ 1}}, for every v โˆˆ R. With probability at least 1 โˆ’ ฮด, it holds that rv < h for all v โˆˆ V (Claim 2.3 in [3]). We choose ฮด = 1/nc (i.e., the algorithm succeeds w.h.p.) and h = `, where w.l.o.g. we require c โ‰ฅ 1. The following lemma implies that the total number of edges that we add to H in the second step is at most |R| ยท (n2 )1/` โ‰ค |R|(1 + ) in expectation. Lemma 5 (Proof of Lemma 2.2 in [3]) For every v โˆˆ R, Exp[C(v)] โ‰ค (n/ฮด)1/h . Third Step. Add to E 0 all edges e โˆˆ E(R, Rฬ„). The following lemma implies that the expected number of edges which are added in the third step is at most n. Lemma 6 Exp[|E(R, Rฬ„)|] โ‰ค n. Proof: Observe that for an edge {u, v} โˆˆ E, there is at most one integer r such that ฮ“r (u) โˆฉ S = โˆ… and ฮ“r (v) โˆฉ S 6= โˆ… (or vice versa). If there is no such r or ` 6= r, then the edge is not in E(R, Rฬ„). Over the random choice of `, the probability of the event that the edge is included is at most Pr[` = r] โ‰ค /โˆ†. The desired bound follows by linearity of expectation. 4.1 Stretch Factor Consider any edge e = {u, v} โˆˆ E \ E 0 we removed. If u, v โˆˆ Rฬ„, e was removed by the Algorithm from Section 3, which was applied to the subgraph induced by R. Applying Lemma 4 to the connected component of e, we get that w.h.p. there is a path of length O(log n ยท (โˆ† + log n)/) from u to v in H. If u, v โˆˆ R, by Lemma 5 and the choice of parameters, w.h.p. there is a path of length O(log n) from u to v in H. As e โˆˆ / E(R, Rฬ„) by the third step, we arrive at the following corollary. Corollary 2 The above algorithm guarantees stretch O(log n ยท (โˆ† + log n)/) w.h.p. and satisfies that Exp[|E 0 |] โˆˆ (1 + O())n. 5 The Local Algorithm In this section we prove the our main theorem. 5 The algorithm is described for connected graphs; we simply apply it to each connected component of R. 11 Algorithm 1 LSSG for general graphs Input: {u, v} โˆˆ E Output: whether {u, v} is in E 0 or not. 1. If u, v โˆˆ R, compute the output of algorithm of Elkin and Neiman at u and v when running it on the connected component of u and v in the subgraph induced by R. Return true if {u, v} โˆˆ C(u) โˆช C(v) and false otherwise. 2. If {u, v} โˆˆ E(R, Rฬ„), return true. 3. Otherwise, u, v โˆˆ Rฬ„ and we proceed according to Section 3, where all nodes in R are ignored: (a) If Vor(u) = Vor(v), return true if {u, v} is in the BFS tree of Vor(u) and false otherwise. (b) Otherwise, let Q and W denote the clusters of u and v, respectively. Return true if at least one of the following conditions hold for A = Q and B = W , or symmetrically, for A = W and B = Q, and false otherwise. i. A is a marked cluster and {u, v} has minimum rank amongst the edges in E(A, B). ii. A is not participating in any cluster-of-clusters. Namely, all the clusters which are adjacent to A are not marked. In this case, we take {u, v} if it has minimum rank amongst the edges in E(A, Vor(B)). iii. There exists a marked cluster C such that A is participating in C(C), and the following holds: โ€ข Vor(A) has minimum rank amongst Vor(โˆ‚B) โˆฉ Vor(โˆ‚C) โ€ข {u, v} has minimum rank amongst the edges in E(B, Vor(A)). Theorem 3 Algorithm 1 is an LSSG algorithm. For any graph G over n vertices of maximum degree at most โˆ† and  > 0, its query complexity, space complexity (length of the random seed), and running time are Oฬƒ(n2/3 ) ยท poly(1/, โˆ†). Proof: The correctness of the algorithm follows from the previous sections. We shall prove that its complexity is as claimed. We analyze the complexity in terms of n. There are additional factors that depend polynomially in โˆ† and 1/. The following claims hold w.h.p., simultaneously, for all vertices. Recall that a vertex u is remote if ฮ“` (u) does not contain a center. Due to the sampling probability for centers, a center is found after exploring Oฬƒ(n1/3 ) vertices. Therefore, we can decide for any vertex u whether it is in R with query and time complexity Oฬƒ(n1/3 ). Moreover, if u โˆˆ Rฬ„, without additional cost the respective subroutine can return c(u), the center of u, and d(u, c(u)) (as we explore in a BFS fashion). For Step 1, we need to determine ฮ“` (x) โˆฉ R. Since |ฮ“` (u)| = Oฬƒ(n1/3 ) for every vertex u โˆˆ R, we obtain that the query and time complexity of this step is Oฬƒ(n2/3 ), in total. Accordingly, Step 2 has query and time complexity Oฬƒ(n1/3 ). If u, v โˆˆ Rฬ„, the algorithm proceeds as in Section 3. We claim that reconstructing the clusters of u and v, determining the centers of all adjacent nodes, and deciding whether {u, v} is a BFS edge (i.e., Vor(u) = Vor(v) and u is the parent of v in the BFS of Vor(u) rooted at c(u) or vice versa) takes Oฬƒ(n2/3 ) queries and time. 12 We show first that we can reconstruct clusters efficiently. W.l.o.g., consider u. We determine c(u) and d(u, c(u)). For each neighbor w of u, we determine whether it is in Rฬ„ (if not, the node is discarded), its center c(w), and the distance d(w, c(w)). As u โˆˆ Rฬ„, and assuming that u = 6 c(u), it must have at least one neighbor w in distance d(u, c(u)) โˆ’ 1 of c(u); any such w satisfies that c(w) = c(u), as otherwise d(u, c(w)) = d(w, c(w)) and c(w) < c(u), a contradiction to the tiebreaking rule for centers. Among these candidates w, we know that the one with minimum rank is the parent of u in the BFS tree of Vor(u) rooted at c(u), due to the tie-breaking rule for the BFS construction. Otherwise, we can use this subroutine to partially explore the BFS of Vor(u): given any node w โˆˆ Rฬ„, we can determine its parent and children in Vor(w) at query and time complexity Oฬƒ(n1/3 ). We conclude that we can determine p(w) and whether T (w) < k or T (w) โ‰ฅ k at query complexity Oฬƒ(n2/3 ), by partially or completely exploring T (w); if T (w) < k, we determine T (w) completely. We collect this information for u and its ` โˆ’ 1 ancestors, and determine the cluster Q of u. Finally, we repeat the procedure to reconstruct the cluster W of v, and determine for all nodes adjacent to either cluster whether they are in Rฬ„ and, if so, their centers. The query and time complexity of this operation is Oฬƒ(n2/3 ) in total. For the cases A = Q, B = W and A = W , B = Q, respectively, with the above information we can determine โ€ข whether Vor(u) = Vor(v), โ€ข if Vor(u) = Vor(v), whether p(u) = v or p(v) = u, โ€ข if Vor(u) 6= Vor(v), โ€“ whether A is marked (i.e., c(A) has been marked) and whether {u, v} has minimum rank in E(A, B), โ€“ whether A is not adjacent to any marked cluster (i.e., none of the adjacent nodesโ€™ centers has been marked) and whether {u, v} has minimum rank in E(A, Vor(B)), and โ€“ whether there is a marked cluster C adjacent to A so that A participates in C(C), Vor(A) has minimum rank in Vor(โˆ‚B) โˆฉ Vor(โˆ‚C), and {u, v} has minimum rank in E(B, Vor(A)). We note that since we have degree bounded by โˆ†, the number of vertices in A is Oฬƒ(n1/3 ), and the probability that a cell is marked is nโˆ’1/3 , the number of cluster-of-clusters that A participates in is Oฬƒ(โˆ†) w.h.p. In other words, we can perform all necessary checks to decide whether {u, v} โˆˆ E 0 or not. The algorithm in Section 3 requires Oฬƒ(n2/3 ) random bits for the selection of centers and marked clusters. For the emulation of the algorithm of Elkin and Neiman it suffices that the random variables {ru } be Oฬƒ(n1/3 )-wise independent, because the outcome of the algorithm for a vertex v โˆˆ R depends only on the random variables of at most Oฬƒ(n1/3 ) vertices (the vertices in ฮ“` (v)). Thus, overall Oฬƒ(n2/3 ) random bits (up to poly(โˆ†/) factors) are sufficient. References [1] N. Alon, R. Rubinfeld, S. Vardi, and N. Xie. Space-efficient local computation algorithms. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1132โ€“1139, 2012. 13 [2] Artur Czumaj, Oded Goldreich, Dana Ron, C. Seshadhri, Asaf Shapira, and Christian Sohler. Finding cycles and trees in sublinear time. Random Structures and Algorithms, 45(2):139โ€“184, 2014. [3] Michael Elkin and Ofer Neiman. Efficient algorithms for constructing very sparse spanners and emulators. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017, Barcelona, Spain, Hotel Porta Fira, January 16-19, pages 652โ€“669, 2017. [4] G. Even, M. Medina, and D. Ron. Deterministic stateless centralized local algorithms for bounded degree graphs. In Algorithms - ESA 2014 - 22th Annual European Symposium, Wroclaw, Poland, September 8-10, 2014. Proceedings, pages 394โ€“405, 2014. [5] U. Feige, Y Mansour, and R. E. Schapire. Learning and inference in the presence of corrupted inputs. In Proceedings of The 28th Conference on Learning Theory, COLT 2015, Paris, France, July 3-6, 2015, pages 637โ€“657, 2015. [6] Hendrik Fichtenberger, Reut Levi, Yadu Vasudev, and Maximilian Woฬˆtzel. On testing minorfreeness in bounded degree graphs with one-sided error. Unpublished manuscript, 2017. [7] R. Levi, G. Moshkovitz, D. Ron, R. Rubinfeld, and A. Shapira. Constructing near spanning trees with few local inspections. Random Structures & Algorithms, pages n/aโ€“n/a, 2016. [8] R. Levi and D. Ron. A quasi-polynomial time partition oracle for graphs with an excluded minor. ACM Trans. Algorithms, 11(3):24:1โ€“24:13, 2015. [9] R. Levi, D. Ron, and R. Rubinfeld. Local algorithms for sparse spanning graphs. In Proceedings of the Eighteenth International Workshop on Randomization and Computation (RANDOM), pages 826โ€“842, 2014. [10] R. Levi, D. Ron, and R. Rubinfeld. Local algorithms for sparse spanning graphs. CoRR, abs/1402.3609, 2014. [11] R. Levi, R. Rubinfeld, and A. Yodpinyanee. Local computation algorithms for graphs of non-constant degrees. Algorithmica, pages 1โ€“24, 2016. [12] Y. Mansour, A. Rubinstein, S. Vardi, and N. Xie. Converting online algorithms to local computation algorithms. In Automata, Languages and Programming: Thirty-Ninth International Colloquium (ICALP), pages 653โ€“664, 2012. [13] Y. Mansour and S. Vardi. A local computation approximation scheme to maximum matching. In Proceedings of the Sixteenth International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX), pages 260โ€“273, 2013. [14] D. Peleg and A. A. Schaฬˆffer. Graph spanners. Journal of Graph Theory, 13:99โ€“116, 1989. [15] D. Peleg and J. D. Ullman. An optimal synchronizer for the hypercube. SIAM Journal on Computing, 18:229โ€“243, 1989. [16] L. S. Ram and E. Vicari. Distributed small connected spanning subgraph: Breaking the diameter bound. Technical report, Zuฬˆrich, 2011. 14 [17] R. Rubinfeld, G. Tamir, S. Vardi, and N. Xie. Fast local computation algorithms. In Proceedings of The Second Symposium on Innovations in Computer Science (ICS), pages 223โ€“238, 2011. [18] Ronitt Rubinfeld. Can we locally compute sparse connected subgraphs? In Computer Science Theory and Applications - 12th International Computer Science Symposium in Russia, CSR 2017, Kazan, Russia, June 8-12, 2017, Proceedings, pages 38โ€“47, 2017. 15
8cs.DS
An Adaptive Sampling Scheme to Efficiently Train Fully Convolutional Networks for Semantic Segmentation Lorenz Berger1,2 , Eoin Hyde1,2 , M. Jorge Cardoso1 , and Seฬbastien Ourselin1 arXiv:1709.02764v4 [cs.CV] 22 Dec 2017 1 TIG, CMIC, University College London, London, UK 2 Innersight Labs, London, UK Abstract Deep convolutional neural networks (CNNs) have shown excellent performance in object recognition tasks and dense classification problems such as semantic segmentation. However, training deep neural networks on large and sparse datasets is still challenging and can require large amounts of computation and memory. In this work, we address the task of performing semantic segmentation on large data sets, such as three-dimensional medical images. We propose an adaptive sampling scheme that uses a-posterior error maps, generated throughout training, to focus sampling on difficult regions, resulting in improved learning. Our contribution is threefold: 1) We give a detailed description of the proposed sampling algorithm to speed up and improve learning performance on large images. 2) We propose a deep dual path CNN that captures information at fine and coarse scales, resulting in a network with a large field of view and high resolution outputs. 3) We show that our method is able to attain new state-of-the-art results on the VISCERAL Anatomy benchmark. 1 Introduction This paper addresses the problem of efficiently training convolutional neural networks (CNNs) on large and imbalanced datasets. We propose a training strategy that adaptively samples the training data to effectively speed up training and avoid over-sampling data that contains little extra information. In this work, we investigate the problem of automatic segmentation from high resolution 3D CT scans. Several deep learning techniques [1โ€“4] have recently been proposed for 3D segmentation of medical datasets. To overcome the problem of dealing with these large datasets, such as Computed Tomography (CT) volumes, commonly of dimension 512 ร— 512 ร— 700, previous approaches train a CNN on a cropped region of interest which reduces the size of individual training images by around 100 fold [2, 4]. By reducing the size of training images, they can now be fit into memory and a network can be trained effectively on the selected data. However, identifying regions of interest requires an additional pre-processing step which may not be easy in many applications. Also, training CNNs on cropped images limits the field of view of the CNN and subsequently 2 Lorenz Berger et al. can introduce unwanted image boundary induced effects during testing. Other applications, where training CNNs on very large images is a problem, includes the segmentation of histology datasets [5] or the segmentation of aerial images. For example in aerial image segmentation, training a CNN to segment ships [6] can be difficult because large portions of the image contain water which provide little information during training, resulting in slow learning. Some ideas to address this have already been proposed, for example in [3] a fixed, handcrafted, pre-computed weight map is used to help learn small separation borders between touching cells for biomedical image segmentation. In this work the proposed sampling scheme ends up dynamically learning such a weight mapping, making it generally applicable to many applications. Curriculum learning [7] and derivative methods like self-paced learning [8] build on the intuition that, rather than considering all samples simultaneously, the algorithm should be presented with the training data in a meaningful order that facilitates learning. These ideas have already successfully been applied to image classification [9, 10], by ordering images from easy to hard during training. Also for the problem of weakly supervised semantic segmentation [11] similar ideas are applied, where predictions from previous training iterations are used to iteratively learn segmentation maps from just a single class label per image. The focus of this paper is fully supervised semantic segmentation where a representative training set is available with dense manual label annotations and the challenge lies in efficiently learning from this large datasets. We give a detailed account of the implementation, which is a straightforward extension to any existing CNN segmentation system, and present state-of-the-art segmentation results on the VISCERAL anatomy benchmark. 2 2.1 Methods Neural Network Architecture For the dual path network architecture we build on several previous ideas [1, 12, 13]. Compared to the 3D network outlined in [1], we further develop the architecture by replacing the standard convolution layers with popular resnet blocks [14], and increase the maximum network depth from 11 layers in [1] to 19 layers. By having a deeper network and a down sampled pathway with input resolution 1/4 of the original resolution, we obtain a large receptive field of size 1243 whilst maintaining a deep high resolution pathway that does not compromise the resolution through pooling layers. The architecture results in a total of 649,251 parameters. A sketch of the architecture is given in Figure 1a. In Figure 1a, numbers inside round brackets give the input dimensions of each block. For the training stage these dimensions have been chosen carefully to balance memory usage with processing speed. During testing the dimensions may be chosen as large as can be fit into memory, to take advantage of the fully convolutional inference. Numbers in square brackets refer to the number of feature maps used at each layer. The proposed configuration allows for a large number of samples isample: Adaptive Sampling for Fully Convolutional Networks 3 (3D patches) per batch to ensure balanced class sampling and effective optimization, whilst maintaining a deep and wide enough network to capture the high variability and spatial semantics of the data. The blocks labeled โ€˜Convโ€™ are standard convolutional layers with kernel size 3 ร— 3 ร— 3. The blocks labeled โ€˜Res blockโ€™ are standard and bottleneck resnet blocks, respectively, as detailed in [14]. Each fully connected layer is preceded by a dropout layer with probability 0.5, and a softmax non-linearity is used as a final classification layer. The rationale for having a deep low resolution path is to further increase the receptive field and allow for complex higher level features to be learned i.e where an organ is positioned in relation to other structures. To minimize the memory footprint, the high definition path is chosen to be slightly shorter than the low resolution path. This seems reasonable as this path should learn texture information which is likely to require fewer layers and non-linearites. Further details on training hyper-parameters are given in section 3.1. (a) (b) Fig. 1: (a) The proposed dual path CNN architecture. (b) Coronal slice of a CT scan with overlaid segmentation output, described in section 3.3. The organs visible in this slice are: lungs (green), liver (red), spleen (light blue), psoas major muscle (dark blue), kidneys (brown) and bladder (yellow). 4 Lorenz Berger et al. 2.2 Adaptive sampling strategy The problem of class imbalance as described in [1] can be dealt with by choosing small patch sizes and evenly sampling from each class [1], and through weighted loss functions [3, 15, 16]. Both of these methods either load the whole image into GPU memory, which is not feasible for large images, or select a small subset of patches, which can lead to inefficient training on sparse datasets. To overcome both of these issues we propose the simple sampling Algorithm 1. Algorithm 1 isample: adaptive sampling algorithm Initialize error maps for every image in the training data: E i (x) = 1. while CNN training do while training for 1 epoch do while filling batch with patches do Pick an image I j from the training set I โˆ— . Pick a class k from the corresponding label map Lj . Pick a patch in image I j , centered at location c, where Lj (c) = k. Accept patch into batch if E i (c) > U(0, 1) โˆ’ . end while Back-propagate loss of batch and update the current CNN weights: w. end while Select a subset of images, I โˆ— , and label maps, Lโˆ— , from the training set: for [I k , Lk ] โˆˆ [I โˆ— , Lโˆ— ] do Update error maps: E k (x) = 1 โˆ’ CNN(w, I k (x))Lk (x) end for end while In Algorithm 1, U(0, 1) is a random number drawn from the uniform distribution and E i refers to the error map of the ith training image. Error maps can easily be calculated, either after each epoch or concurrently to the training process, as E k (x) = 1 โˆ’ CNN(w, I k (x))Lk (x) , (1) where CNN(w, I k (x))Lk (x) is a map of the CNN predictions over the full training image I k , evaluated using the most current weights, w, and outputting the probability of the true class label Lk (x), at position x. Examples of error maps produced throughout training are show in Figure 3. The additional parameter  controls the strength of the isample scheme. Setting  = 0, corresponds to choosing patches based entirely on the amount of error that they currently produce by the network. When  = 1 the condition E i (c) > U(0, 1) โˆ’  is always satisfied and we are left with a standard sampling scheme that accepts every chosen patch. For all results shown in this paper we have chosen  = 0.01, since we are interested in using the isample scheme to full effect. Detailed investigations into how to best set this parameter for different datasets with varying amounts of sparsity is left for future work. The subset of images, I โˆ— , and label maps, Lโˆ— , of the training set may be chosen in line with how quickly to introduce the isample scheme during training and the amount of computational resources available. In isample: Adaptive Sampling for Fully Convolutional Networks 5 our experiments we had access to four GPUs, three were used to train the CNN continuously and one GPU was used in parallel to continuously perform full predictions of the validation dataset and the training dataset. From this, full dice scores of the validation dataset and full error maps of the training dataset could be calculated. A future extension of this work could log the loss of individual batches during training, and use this information to get an estimate of where the network is having difficulty. This modification would avoid the need for having to allocate additional resources for segmenting the training data, which instead could be used to speed up training. However for practical reasons, and the increasing availability of large multi-GPU cards, we have found this not to be an issue. Also, having access to dice scores calculated over the full images throughout training has been helpful in development since these true dice scores provide more meaningful information than dice scores calculated from individual batches which are biased by the sampling scheme and the size of patches. The error maps produced can also be useful for debugging purposes during development. 3 Results We trained, validated and tested the automatic segmentation method on contrast enhanced CT scans from the VISCERAL Anatomy 3 dataset, made up of 20 training scans, and 10 unseen testing scans (currently not available to download) [17]. The scans are form a heterogeneous dataset with various topological changes between patients, and manual segmentations are available for a number of different anatomical structures. We randomly split the training set into 16 scans for training (80%) and 4 scans for validation (20%), we also present results of our online submission on the unseen test dataset. For illustrative purposes, the first experiment, in section 3.2, focuses on segmenting only the kidneys from full body CT scans. In section 3.3 we present results on simultaneously segmenting multiple organs from the CT data. 3.1 CNN training setup During training we perform data augmentation by re-sampling the 3D patches to a [1mm, 1mm, 1.5mm] + U(โˆ’0.1, 0.1) resolution. We also rotate each patch by [U(โˆ’10, 10), U(โˆ’4, 4), U(โˆ’4, 4)] degrees. We set voxels with values greater than 1000 to 1000, and values less than โˆ’1000 to โˆ’1000, and divide all values by a constant factor of 218 (the standard deviation of the dataset). We use Glorot initializations [18] on all convolution layers. For batchnorm layers we use the initializations technique described in [19]. We impose L2 weight decay of size 0.0001, on all convolutional layers except on the last fully convolutional layer before the final softmax non-linearity. Using techniques described in [19] we make use of large batch sizes and large learning rates. We use SGD with Nestrov momentum set at 0.8 [20], the initial learning rate is 0.001, and each batch contains 12 patches, sampled from one randomly selected scans in the training set. We run each epoch for 100 batches. We also employ a learning rate 6 Lorenz Berger et al. warm up schedule as described in [19] for the first 5 epochs. We use a standard cross-entropy loss function. 3.2 Segmenting the kidneys from full body CT scans In this experiment we use labels for kidneys to train the CNN, resulting in a simple two class, foreground (kidneys) and background (everything else), segmentation problem. Figure 2 shows curves of the training loss (2a) and mean validation dice score (2b) for segmented kidneys throughout training, averaged over three separate runs. The blue curve represents training runs where patches are sampled randomly but evenly from background and kidney foreground, the red curve represents training runs where patches are sampled using the proposed sampling algorithm 1. Because isample adaptively selects more difficult patches as training progresses, the loss is higher, as seen in Figure 2a. In Figure 2b, the sampler achieves faster generalization, and our current results indicate that the final generalization of the CNN trained with the proposed sampling scheme is slightly improved for this sparse segmentation setup, where the kidneys only make up โˆผ 0.3% of the voxels within the whole scan. Table 4a shows the average dice scores achieved by the Dual CNN, with and without isample, throughout training. When using the isample scheme the CNN is able to achieve a dice score of 0.855 after only 5k training iterations. This is close to the end of training performance, a dice score of 0.899 after 40k, of the Dual CNN without isample in use. Fast training of CNNs using isample can be useful for debugging and evaluating changes in neural network architectures, as more experiments can be run using the same computational resources, that quickly estimate the end performance of the network. 1.4 Dual CNN Dual CNN + isample 1.0 0.8 0.6 0.4 0.9 Mean Validation Dice Training Loss 1.2 0 100 200 Epoch (a) 300 400 0.8 0.7 0.6 0.5 0.4 0 100 Dual CNN Dual CNN + isample 200 300 400 Epoch (b) Fig. 2: (a) Training loss (a) and mean validation dice scores (b), averaged over 3 runs. In Figure 3 we show coronal slices of a training error volume E k (x), calculated by the algorithm. As seen in Figure 3c, initially there is significant produced isample: Adaptive Sampling for Fully Convolutional Networks 7 by the CNN prediction at epoch 16, for example misclassifying the aorta (part of the background class) because it has similar intensity values to the kidneys. After more training, at epoch 50, Figure 3d shows that the error is much lower. The CNN has now learned that the aorta is part of the background class. However more subtle regions such as the collecting system and large vessels within the kidney (see small hole in the true segmentation of the left kidney in Figure 3b) still produce high errors, and further focused training is required to optimize the weights until they are correctly classified. There also remains a high error around the border of the kidneys, which will result in the sampling process selecting more patches from the border region, and thus ends up learning to train the network with a similar loss to the hand-crafted border weighted loss function designed in [3]. (a) (b) (c) (d) Fig. 3: Coronal slices: (a) Raw CT scan from the training set (b) Kidney segmentation overlaid onto scan (c) Error map, E k (x), of foreground and background classification on a training scan after 16 epochs. (d) E k (x) after 50 epochs. For the error maps, white corresponds to voxels that are incorrectly classified and black to correctly classified voxels. # its 5k 10k 20k 40k Dual CNN 0.797 0.849 0.905 0.899 (a) + isample 0.855 0.897 0.920 0.927 Method Kidney Dice scores Dual CNN (validation data) Left + Right 0.899 (0.058) Dual CNN + isample (validation data) Left + Right 0.927 (0.037) Dual CNN + isample + CRF (test data) Left 0.954 Right 0.96 Wang et al [21] (test data) Left 0.945 (0.027) Right 0.959 (0.011) Vincent et al [22] (test data) Left 0.943 (0.015) Right 0.927 (0.040) Gass et al [23] (test data) Left 0.913 (0.029) Right 0.914 (0.027) (b) Fig. 4: (a) Mean dice scores and standard deviations at different number of iterations, throughout training. (b) Dice scores and standard deviations, where available, for different methods automatically segmenting kidneys on the VISCERAL CT enhanced dataset. Table 4b shows dice scores for segmenting both kidneys using different methods. The proposed method with isample performs significantly better than without. We also submitted our method, with the addition of a CRF [24] as a postprocessing step, to segment the test dataset, and achieved the top score for 8 Lorenz Berger et al. segmenting the left and right kidneys. Inference on a full size CT scans takes โˆผ 65 seconds using four Tesla K50 GPU cards, each with 4GB of RAM. 3.3 Multi-organ segmentation We now extended the previously described algorithm to include a multi-class classification output and trained the model on the main organs available on the VISCERAL CT-enhanced dataset. We post-processes the output segmentation maps (maximum class probability at each voxel), by applying a filter that only retains the largest connected binary object within the segmentation, thus removing small objects. The segmentation output of one of the the validation scans is shown in Figure 1b. The results of our proposed method and other state-of-the-art methods, also summarized in [17], are given in Table 1. Method Dual CNN + isample (val) Dual CNN (val) Ga et al [23] Jimenez et al [25] Keฬchichian et al [26] Vincent et al [22] Inter-annotator agreement Aorta 0.893 0.843 0.785 0.762 0.681 0.838 0.859 Lung 0.980 0.985 0.963 0.961 0.966 0.972 0.973 Kidney 0.938 0.934 0.914 0.899 0.912 0.935 0.917 PMajor 0.824 0.779 0.813 0.797 0.802 0.869 0.823 Liver 0.941 0.927 0.908 0.887 0.933 0.942 0.965 Abdom 0.769 0.755 0.463 0.538 0.673 Spleen 0.951 0.946 0.781 0.730 0.895 0.934 Sternum 0.900 0.904 0.635 0.721 0.713 0.810 Trachea 0.926 0.926 0.847 0.855 0.824 0.877 Bladder 0.912 0.918 0.683 0.679 0.823 0.857 Table 1: Dice scores for different automatic multi-organ segmentation methods and inter-annotator agreement results [17] on the VISCERAL dataset. We note that because the cloud-based evaluation service [17] containing the test data was closed at the time of running these experiments, we were not able to evaluate our method on the test data, thus making direct comparisons to previous methods difficult. As previously mentioned, we trained our method on 80% of the data (16 scans) and validated it on the remaining 20% (4 scans). From having evaluated the kidney only CNN on the test data, we found that the testing dataset gave better dice scores than the validation set. We are therefore confident that our results in Table 1 are representative. As soon as the test data set is made available we will update our results. Also for organs โ€˜Lungโ€™, โ€˜Kidneyโ€™, โ€˜PMajorโ€™ (psoas major) and โ€˜Abdomโ€™ (rectus abdominis) we give mean dice scores of both the left and right organs. For this experiment we modified the training schedule such that the initial learning rate is 0.05, and each batch contains 24 patches, sampled from 2 randomly selected scans from the training set. We run each epoch for 200 batches, and halve the learning rate after every 25 epochs. The Dual CNN without using the isample scheme (average organ dice 0.8917) slightly underperformed compared to when using the isample (average organ dice 0.9034). However this difference is far less notable than during previous experiments, shown in Table 4b. We hypothesize this is because the background class in the multi-organ segmentation problem is split into background and other organs such as the Lung, Liver etc, thus making the dataset, isample: Adaptive Sampling for Fully Convolutional Networks 9 especially the background class, easier to sample from. The potential benefit of using the isample method is therefore problem dependent. 4 Conclusion We proposed and evaluated a sampling scheme to deal with very large images such as 3D CT scans. As shown in section 3 the sampler enables fast training, and our results indicate that the final generalization performance can be improved. This is inline with previous research that shows the positive effect of curriculum learning on optimization and end performance of machine learning systems [9, 8]. Our experimental results suggests our algorithm gives new state of the art performance for the aorta, lung, kidney, rectus abdominis, spleen, sternum, trachea and bladder, on the VISCERAL anatomy benchmark, and improves upon human inter-annotator agreement scores on the following organs: aorta, lung, kidney, psoas major, rectus abdominis, spleen, sternum, trachea and bladder. These encouraging results pave the way for using CNNs for robust automatic segmentation within clinical practice, such as surgical planning. References 1. K. Kamnitsas, C. Ledig, V. F. Newcombe, J. P. Simpson, A. D. Kane, D. K. Menon, D. Rueckert, and B. Glocker, โ€œEfficient multi-scale 3d cnn with fully connected crf for accurate brain lesion segmentation,โ€ Medical image analysis, vol. 36, pp. 61โ€“78, 2017. 2. P. F. Christ, M. E. A. Elshaer, F. Ettlinger, S. Tatavarty, M. Bickel, P. Bilic, M. Rempfler, M. Armbruster, F. Hofmann, M. DAnastasi, et al., โ€œAutomatic liver and lesion segmentation in ct using cascaded fully convolutional neural networks and 3d conditional random fields,โ€ in International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 415โ€“423, Springer, 2016. 3. O. Ronneberger, P. Fischer, and T. Brox, โ€œU-net: Convolutional networks for biomedical image segmentation,โ€ in International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 234โ€“241, Springer, 2015. 4. Q. Dou, H. Chen, Y. Jin, L. Yu, J. Qin, and P.-A. Heng, โ€œ3D deeply supervised network for automatic liver segmentation from CT volumes,โ€ in International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 149โ€“ 157, Springer, 2016. 5. Y. Xu, Z. Jia, L.-B. Wang, Y. Ai, F. Zhang, M. Lai, I. Eric, and C. Chang, โ€œLarge scale tissue histopathology image classification, segmentation, and visualization via deep convolutional activation features,โ€ BMC bioinformatics, vol. 18, no. 1, p. 281, 2017. 6. R. Zhang, J. Yao, K. Zhang, C. Feng, and J. Zhang, โ€œS-cnn-based ship detection from high-resolution remote sensing images.,โ€ International Archives of the Photogrammetry, Remote Sensing & Spatial Information Sciences, vol. 41, 2016. 7. Y. Bengio, J. Louradour, R. Collobert, and J. Weston, โ€œCurriculum learning,โ€ in Proceedings of the 26th annual international conference on machine learning, pp. 41โ€“48, ACM, 2009. 10 Lorenz Berger et al. 8. M. P. Kumar, B. Packer, and D. Koller, โ€œSelf-paced learning for latent variable models,โ€ in Advances in Neural Information Processing Systems, pp. 1189โ€“1197, 2010. 9. V. Avramova, โ€œCurriculum learning with deep convolutional neural networks,โ€ 2015. 10. X. Chen and A. Gupta, โ€œWebly supervised learning of convolutional networks,โ€ in Proceedings of the IEEE International Conference on Computer Vision, pp. 1431โ€“ 1439, 2015. 11. X. Qi, Z. Liu, J. Shi, H. Zhao, and J. Jia, โ€œAugmented feedback in semantic segmentation under image level supervision,โ€ in European Conference on Computer Vision, pp. 90โ€“105, Springer, 2016. 12. H. Zhao, X. Qi, X. Shen, J. Shi, and J. Jia, โ€œIcnet for real-time semantic segmentation on high-resolution images,โ€ arXiv preprint arXiv:1704.08545, 2017. 13. G. Lin, A. Milan, C. Shen, and I. Reid, โ€œRefinenet: Multi-path refinement networks with identity mappings for high-resolution semantic segmentation,โ€ arXiv preprint arXiv:1611.06612, 2016. 14. K. He, X. Zhang, S. Ren, and J. Sun, โ€œDeep residual learning for image recognition,โ€ in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770โ€“778, 2016. 15. L. Fidon, W. Li, L. C. Garcia-Peraza-Herrera, J. Ekanayake, N. Kitchen, S. Ourselin, and T. Vercauteren, โ€œGeneralised wasserstein dice score for imbalanced multi-class segmentation using holistic convolutional networks,โ€ arXiv preprint arXiv:1707.00478, 2017. 16. C. H. Sudre, W. Li, T. Vercauteren, S. Ourselin, and M. J. Cardoso, โ€œGeneralised dice overlap as a deep learning loss function for highly unbalanced segmentations,โ€ arXiv preprint arXiv:1707.03237, 2017. 17. O. Jimenez-del Toro, H. Muฬˆller, M. Krenn, K. Gruenberg, A. A. Taha, M. Winterstein, I. Eggel, A. Foncubierta-Rodrฤฑฬguez, O. Goksel, A. Jakab, et al., โ€œCloudbased evaluation of anatomical structure segmentation and landmark detection algorithms: Visceral anatomy benchmarks,โ€ IEEE transactions on medical imaging, vol. 35, no. 11, pp. 2459โ€“2475, 2016. 18. X. Glorot and Y. Bengio, โ€œUnderstanding the difficulty of training deep feedforward neural networks,โ€ in Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, pp. 249โ€“256, 2010. 19. P. Goyal, P. Dollaฬr, R. Girshick, P. Noordhuis, L. Wesolowski, A. Kyrola, A. Tulloch, Y. Jia, and K. He, โ€œAccurate, large minibatch sgd: Training imagenet in 1 hour,โ€ arXiv preprint arXiv:1706.02677, 2017. 20. Y. Nesterov, Introductory lectures on convex optimization: A basic course, vol. 87. Springer Science & Business Media, 2013. 21. C. Wang and Oฬˆ. Smedby, โ€œMulti-organ segmentation using shape model guided local phase analysis,โ€ in International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 149โ€“156, Springer, 2015. 22. G. Vincent, G. Guillard, and M. Bowes, โ€œFully automatic segmentation of the prostate using active appearance models,โ€ MICCAI Grand Challenge: Prostate MR Image Segmentation, vol. 2012, 2012. 23. T. Gass, G. Szekely, and O. Goksel, โ€œMulti-atlas segmentation and landmark localization in images with large field of view,โ€ in International MICCAI Workshop on Medical Computer Vision, pp. 171โ€“180, Springer, 2014. 24. P. Kraฬˆhenbuฬˆhl and V. Koltun, โ€œEfficient inference in fully connected crfs with gaussian edge potentials,โ€ in Advances in neural information processing systems, pp. 109โ€“117, 2011. isample: Adaptive Sampling for Fully Convolutional Networks 11 25. O. A. J. del Toro and H. Muฬˆller, โ€œHierarchic multiโ€“atlas based segmentation for anatomical structures: Evaluation in the visceral anatomy benchmarks,โ€ in International MICCAI Workshop on Medical Computer Vision, pp. 189โ€“200, Springer, 2014. 26. R. Keฬchichian, S. Valette, M. Sdika, and M. Desvignes, โ€œAutomatic 3d multiorgan segmentation via clustering and graph cut using spatial relations and hierarchicallyregistered atlases,โ€ in International MICCAI Workshop on Medical Computer Vision, pp. 201โ€“209, Springer, 2014.
1cs.CV
arXiv:1411.4691v3 [math.ST] 8 Nov 2016 Group Regularized Estimation under Structural Hierarchy Yiyuan She, Zhifeng Wang and He Jiang Department of Statistics, Florida State University Abstract Variable selection for models including interactions between explanatory variables often needs to obey certain hierarchical constraints. The weak or strong structural hierarchy requires that the existence of an interaction term implies at least one or both associated main effects to be present in the model. Lately, this problem has attracted a lot of attention, but existing computational algorithms converge slow even with a moderate number of predictors. Moreover, in contrast to the rich literature on ordinary variable selection, there is a lack of statistical theory to show reasonably low error rates of hierarchical variable selection. This work investigates a new class of estimators that make use of multiple group penalties to capture structural parsimony. We give the minimax lower bounds for strong and weak hierarchical variable selection and show that the proposed estimators enjoy sharp rate oracle inequalities. A general-purpose algorithm is developed with guaranteed convergence and global optimality. Simulations and real data experiments demonstrate the efficiency and efficacy of the proposed approach. Keywords: hierarchical variable selection, scalable computation, oracle inequality, minimax optimality 1 Introduction In statistical applications, it is often noticed that an additive model including main effects only is inadequate. Including some higher-order terms, such as 1 interactions, in particular, are often of great help in prediction and modeling. Sometimes, interactions may be of independent interest; one example is the moderation analysis in behavioral sciences (Cohen et al., 2013). In this paper, we focus on the full quadratic model with all two-term interactions taken into account. Let X = [x1 , x2 , . . . , xp ] โˆˆ Rnร—p be the (raw) predictor matrix and y โˆˆ Rn be the response vector. We assume the following nonlinear additive regression model X X y = bโˆ—0 1 + bโˆ—j xj + ฯ†โˆ—jk xj xk + ฮต, (1) 1โ‰คjโ‰คp 1โ‰คj,kโ‰คp where ฮต โˆผ N (0, ฯƒ 2 I) and denotes the Hadamard product. The num p ber of predictors is then p + 2 , posing a challenge in variable selection even when p is moderate. Moreover, in this scenario, statisticians are often interested in obtaining a model satisfying certain logical relations, such as the structural hierarchy discussed in Nelder (1977), McCullagh and Nelder (1989), and Hamada and Wu (1992). Hierarchy is a natural requirement in gene regulatory network studies (Davidson and Erwin, 2006), banded covariance matrix estimation (Bien et al., 2016) and lagged variable selection in time series. Hierarchical variable selection leads to reduced number of variables in measurement, referred to as practical sparsity (Bien et al., 2013). For instance, a model consisting of x1 , x2 , and x1 x2 may be more parsimonious to practitioners than a model involving x1 , x2 , and x3 x4 . In our setting, there are two types of hierarchy (Chipman, 1996; Bien et al., 2013): strong hierarchy (SH) and weak hierarchy (WH). Let ฯ†jk be the coefficient of xj xk and xk xj . SH means that if an interaction term exists in the model, then both of its associated main effects must be present, i.e., ฯ†jk 6= 0 โ†’ bj 6= 0 and bk 6= 0, while WH requires that the inclusion of an interaction implies at least one of its associated main effects to be added into the model, i.e., ฯ†jk 6= 0 โ†’ bj 6= 0 or bk 6= 0. We will show in Section 3 that WH is relatively easy to realize compared with SH. SH is invariant to linear transformations of predictors (Peixoto, 1990) and is the primary concern in this work. It is a nontrivial task to maintain hierarchy in model selection using conventional approaches. LASSO (Tibshirani, 1996) may violate SH and WH as well. We refer to Nelder (1977), Peixoto (1987), Bickel et al. (2010), Wu et al. (2010), and Hao and Zhang (2014) for some well-developed multi-step 2 procedures which, however, might be ad hoc and greedy. This paper focuses on regularization-based approaches. The past works in this direction include SHIM (Choi et al., 2010), VANISH (Radchenko and James, 2010) and HL (Bien et al., 2013). SHIM reparametrizes ฯ†jk as ฯjk bj bk and enforces sparsity in both b = [bj ] and ฯ = [ฯjk ]. The formulation is motivating, and we could also use ฯ†jk = ฯjk (b2j + b2k ) for WH. However, the corresponding optimization problem is nonconvex and the computational algorithm of SHIM is quite slow in large-scale problems. VANISH is one of the main motivations of our work and will be discussed in detail in Section 3. HL is a recent breakthrough in hierarchical variable selection. One of its key ideas is to enforce a magnitude constraint on the coefficients, kฯ†j k1 โ‰ค |bj |, to make hierarchy naturally hold. Here, ฯ†j is a vector of coefficients of the predictors xj xk , 1 โ‰ค k โ‰ค p. To handle the nonconvex constraint, Bien et al. (2013) rephrased it with the โˆ’ pesudo-positive and pesudo-negative parts b+ j , bj of bj but dropped all zero+ โˆ’ product constraints bj bj = 0, 1 โ‰ค j โ‰ค p. The quality of such a convex relaxation seems to have no theoretical justification in the literature. In our experience, HL has excellent performance when the main effects are strong and p is not very large. But it can miss some interaction effects and become computationally prohibitive on large datasets. For example, when p = 1000, HL can take days to obtain a 20-point solution path. In this work, we propose and study group regularized estimation under structural hierarchy (GRESH). In theory, we are able to establish nonasymptotic oracle inequalities to show the error rates of the proposed estimators are minimax optimal up to some logarithm factors. We come up with a new recipe to conquer the theoretical difficulties when analyzing overlapping regularization terms in pursuing structural parsimony. Moreover, we develop a computational algorithm which guarantees the convergences of iterates and function values; it is not only efficient but also simple to implement. The rest of the paper is organized as follows. Some notation and symbols are introduced in Section 2. Section 3 presents the general framework of GRESH. A fast computational algorithm with theoretical support is given in Section 4. Section 5 builds oracle inequalities for GRESH, and Section 6 shows the minimax optimal rates. In Section 7, simulation studies and real data analysis are conducted to show the prediction accuracy and computational efficiency of the proposed approach. All technical proofs are given in the Appendices. 3 2 Notation We introduce some convenient notation and symbols to be used through> out the paper. First, for any matrix A = [a1 , . . . , aP โˆˆ Rpร—n , define its p] p (2, 1)-norm, (2, โˆž)-norm and `1 -norm as kAk2,1 = i=1 kai k2 , kAk2,โˆž = max1โ‰คiโ‰คp kai k2 and kAk1 = k vec (A)k1 , respectively, where vec is the standard vectorization operator. The spectral norm and Frobenius norm of A are denoted by kAk2 and kAkF , respectively. For any p-dimensional vector a that is divided into K groups with aj representing the j-th subvector, its P (2, 1)-norm is defined by kak2,1 = K j=1 kaj k2 . The following two operators diag and dg are introduced for notational simplicity. For a square matrix A := [aij ]nร—n , diag(A) := [a11 , . . . , ann ]> , and for a vector a = [a1 , . . . , an ]> โˆˆ Rn , diag{a} is defined as an n ร— n diagonal matrix with diagonal entries given by a1 , . . . , an . Define dg(A) := diag{diag(A)} = diag{[a11 , . . . , ann ]> }. We use A[I, J ] to denote a submatrix of A with rows and columns indexed by I and J , respectively. For any arbitrary b โˆˆ Rp , ฮฆ โˆˆ Rpร—p , we define J 11 (b, ฮฆ) : = {j โˆˆ [p] : bj 6= 0, ฯ†j 6= 0}, J 10 (b, ฮฆ) : = {j โˆˆ [p] : bj 6= 0, ฯ†j = 0}, J 01 (b, ฮฆ) : = {j โˆˆ [p] : bj = 0, ฯ†j 6= 0}, J 00 (b, ฮฆ) : = {j โˆˆ [p] : bj = 0, ฯ†j = 0}, (2) Je (ฮฆ) : = {j โˆˆ [p2 ] : (vec (ฮฆ))j 6= 0}, JG (b, ฮฆ) : = {j โˆˆ [p] : b2j + kฯ†j k22 6= 0}, where [p] = {1, . . . , p}, and the coefficient vector ฯ†j denotes the j-th column of ฮฆ. With |ยท| standing for set cardinality, we define J 11 (b, ฮฆ) := |J 11 (b, ฮฆ)|, J 10 (b, ฮฆ) := |J 10 (b, ฮฆ)|, J 01 (b, ฮฆ) := |J 01 (b, ฮฆ)|, J 00 (b, ฮฆ) := |J 00 (b, ฮฆ)|, Je (ฮฆ) := |Je (ฮฆ)| and JG (b, ฮฆ) := |JG (b, ฮฆ)|. Clearly, J 11 +J 10 +J 01 +J 00 = p, and J 11 + J 10 + J 01 = JG . In addition, under SH, JG (b, ฮฆ) equals the number of nonzero elements of b. Given the true signal (bโˆ— , ฮฆโˆ— ), the following abbreviated symbols are used: J 11โˆ— = J 11 (bโˆ— , ฮฆโˆ— ), J 10โˆ— = J 10 (bโˆ— , ฮฆโˆ— ), J 01โˆ— = J 01 (bโˆ— , ฮฆโˆ— ), Jeโˆ— = Je (ฮฆโˆ— ), and JGโˆ— = JG (bโˆ— , ฮฆโˆ— ). In the paper, we frequently use the concatenated coefficient matrix for convenience โ„ฆ = [b, ฮฆ> ]> , (3) 4 > and its j-th column is denoted by โ„ฆj = [bj , ฯ†> j ] . Given โ„ฆ, โ„ฆb and โ„ฆฮฆ stand > for (โ„ฆ[1, :]) and โ„ฆ[2 : (p + 1), :], respectively. Let X = [x1 , . . . , xp ] โˆˆ Rnร—p be the raw predictor matrix. Define Xฬ„ = [x1 x1 , . . . , x1 Xฬ† = [x1 , x1 xp , . . . , xp x1 , . . . , x1 x1 , . . . , xp xp , . . . , xp , xp 2 xp ] โˆˆ Rnร—p , x1 , . . . , xp xp ] โˆˆ R (4) nร—(p2 +p) . (5) Then Xฬ„ consists of all interactions, and Xฬ† includes all p2 +p predictors in the quadratic model. Given any subset J โŠ‚ [p], we abbreviate X[:, J ] as X J . It is also easy to see that diag(XฮฆX > ) = Xฬ„ vec (ฮฆ) and Xb+diag(XฮฆX > ) = Xฬ† vec (โ„ฆ). For any two real numbers a and b, a . b means that a โ‰ค b holds up to a multiplicative numerical constant. For two equally sized matrices A = (aij ) and B = (bij ), A โ‰ฅ B means aij โ‰ฅ bij , for โˆ€ i, j. 3 Group regularized estimation under structural hierarchy For simplicity, we assume for now that there exists no intercept term in the model. Then (1) can be written as y = Xbโˆ— + diag(Xฮฆโˆ— X > ) + ฮต, (6) where ฮต โˆผ N (0, ฯƒ 2 I) with ฯƒ 2 > 0, y = [y1 , . . . , yn ]> โˆˆ Rn is the response vector, and X = [x1 , . . . , xp ] โˆˆ Rnร—p is the design matrix consisting of main effects only. We describe a general framework for hierarchical variable selection, referred to as group regularized estimation under structural hierarchy or GRESH. GRESH has two different types, depending on which objects to regularize. Denoting the squared error loss by `, i.e., 1 (7) `(b, ฮฆ) = ky โˆ’ Xb โˆ’ diag(XฮฆX > )k22 , 2 the first type is given by Type-A : min โ„ฆ=[b,ฮฆ> ]> โˆˆR(p+1)ร—p `(b, ฮฆ) + ฮป1 kฮฆk1 + ฮป2 p X j=1 s.t. ฮฆ = ฮฆ> (for SH only), 5 k[bj , z(ฯ†j )]kq (8) where ฮป1 , ฮป2 are regularization parameters, 1 < q โ‰ค +โˆž and z(x) is a function satisfying the property that z(x) = 0 implies x = 0 for any vector x โˆˆ Rp . For instance, z can take the `r -norm function (r > 0) z(x) = kxkr , (9) z(x) = x> . (10) or simply the identity function The first `1 penalty imposes elementwise sparsity on ฮฆ and the second group`1 penalty enforces column sparsity in โ„ฆ. We argue that with the two penalties and the constraint, (8) can be used for strong hierarchical variable selection. Indeed, the sparsity of b comes from the second group-penalty alone, i.e., bj = 0 implies k[bj , z(ฯ†j )]kq = 0 (with probability 1) or z(ฯ†j ) = 0. By the property of the z function, ฯ†j = 0, and thus ฯ†jk = 0. The symmetry condition indicates further that ฯ†kj = 0. Hence (ฯ†jk + ฯ†kj )/2, the coefficient for xj xk , is zero. Consequently, whenever bj = 0, xj xk will be removed from the model and SH is automatically obeyed. We can describe the reasoning as follows bj = 0 โ‡’ k[bj , z(ฯ†j )]kq = 0 โ‡’ z(ฯ†j ) = 0 โ‡’ ฯ†j = 0 โ‡’ ฯ†jk = 0 ฯ†jk + ฯ†kj = 0. โ‡’ ฯ†kj = 0 โ‡’ 2 (11) Without the symmetry constraint, we can only complete the argument in the first line of (11), and so SH dose not hold. But interestingly, WH is guaranteed, because from bj = bk = 0, we have (ฯ†jk + ฯ†kj )/2 = 0. Therefore, WH gives a relatively simpler problem. As pointed out by a reviewer, when the model contains an intercept, centering the response and the p raw predictors does not make it vanish due to the presence of nonlinear terms, and so 1b0 + Xb + diag(XฮฆX > ) should be used to approximate y. In the SH scenario, if at least one x-predictor is relevant, substituting X 0 = [1, X] for X in (7) suffices. We focus on convex forms of GRESH in this work. But surely the `1 penalty and the group-`1 penalty in (8) can be replaced by their nonconvex alternatives; see, e.g., She (2012). GRESH is related to some methods in the literature. HL makes a special case of (8) because one of its formulations corresponds to q = โˆž and r = 1, 6 with a single regularization parameter being used. Another instance is given by q = 2 and z(x) = x> : min โ„ฆ=[b,ฮฆ> ]> `(b, ฮฆ) + ฮป1 kฮฆk1 + ฮป2 kโ„ฆ> k2,1 s.t. ฮฆ = ฮฆ> . (12) Bien et al. (2013) incorrectly described VANISH (Radchenko and James, 2010) in this form, without the symmetry condition. We will focus on (12) in the theoretical and computational studies of Type-A GRESH. As a matter of fact, Radchenko and James (2010) defined VANISH in a different way, which motivates another type of GRESH X Type-B: min `(b, ฮฆ) + ฮป1 kฯ†jk xj xk k2 + โ„ฆ=[b,ฮฆ> ]> 1โ‰คj,kโ‰คp p ฮป2 X k[bj xj , z(ฯ†j1 xj x1 , . . . , ฯ†jp xj xp )]kq , s.t. ฮฆ = ฮฆ> (SH only), j=1 (13) where ฮป1 , ฮป2 , q, and z are defined as in (8). Similarly, we can argue that (13) keeps hierarchy. When q = 2 and z takes the form of (10), the penalty part in (13) become X X X 1 (14) kฯ†jk xj xk k22 ) 2 , ฮป1 kฯ†jk xj xk k2 + ฮป2 (kbj xj k22 + j,k j k as considered by Radchenko and James (2010). VANISH constructs main effects and interactions from two small sets of orthonormal basis functions in a functional regression setting. We do not pose such a restriction on the design matrix, and p can be arbitrarily large. The key difference between the two types of GRESH is that the penalties are imposed on the coefficients in (8), but on the terms in (13). A common practice before calling a shrinkage method is normalizing/standardizing all predictors, so that it is more reasonable to use a common regularization parameter in penalizing different coefficients. In this way, (8) builds a model on the normalized predictors and their interactions, while Type-B amounts to forming the overall design Xฬ† first and then performing the standardization. They are not equivalent because in general, (xj /kxj k2 ) (xk /kxk k2 ) 6= (xj xk )/kxj xk k2 . Then, which type of GRESH is preferable? An answer will be given in Section 5. 7 GRESH offers some general schemes for hierarchical variable selection. But it is no ordinary lasso or group lasso, since ฮฆ appears in both penalties as well as the symmetry constraint. The main goal of this paper is to tackle some computational and theoretical challenges arising from the overlapping regularization terms in high dimensions. In computation, we would like to develop fast and scalable algorithms (cf. Section 4); in theory, how to treat the penalties and the constraint jointly to derive a sharp error bound for GRESH is intriguing and challenging (cf. Sections 5, 6). 4 Computation It is perhaps natural to think of using the alternating direction method of multipliers (ADMM, cf. Boyd et al. (2011)) to deal with the computational challenge. ADMM recently gains its popularity among statisticians. In fact, Bien et al. (2016) designed an algorithm of HL based on ADMM, where one of the main ingredients is the augmented Lagrangian ฯ + โˆ’ โˆ’ 2 > + `(b โˆ’ b , ฮฆ) + ฮป1 (b + b ) + ฮปkฮฆk 1 + hฮฆ โˆ’ ฮจ, Li + kฮฆ โˆ’ ฮจkF , ยฑ p p 2 b โˆˆR ,ฮฆโˆˆR min โˆ’ + โˆ’ s.t. ฮจ = ฮจ> , kฯ†j k1 โ‰ค b+ j + bj , bj โ‰ฅ 0, bj โ‰ฅ 0, 1 โ‰ค j โ‰ค p. (15) Here, L is a Lagrange multiplier matrix, and ฯ > 0 is a given constant, sometimes referred as the penalty parameter. Although ADMM enjoys some nice convergence properties in theory, practically only when ฯ is large enough can we obtain a solution with good statistical accuracy. But often the larger the value of ฯ is, the slower the (primal) convergence is. For example, the R package HierNet (version 1.6) for computing HL recommends ฯ = n, but for p = 1000, the algorithm may take several days to compute a single solution path. There are some empirical schemes on how to vary ฯ during the iteration, but they are ad hoc and do not always behave well. In this section, we consider a slightly more general optimization problem which includes both types of GRESH as particular instances min โ„ฆ=[b,ฮฆ> ]> 1 ky โˆ’ Xb โˆ’ diag(ZฮฆZ > )k22 + kฮปb 2 +kฮ›ฮฆ ฮฆk1 + kฮ›> โ„ฆ > โ„ฆ k2,1 8 bk1 > s.t. ฮฆ = ฮฆ , (16) where X, Z โˆˆ Rnร—p , and ฮปb , ฮ›ฮฆ and ฮ›โ„ฆ are non-negative regularization vector and matrices. Let Zฬ„ = [z 1 z 1 , . . . , z 1 z p , . . . , z p z 1 , . . . , z p z p ], and Zฬ† = [x1 , z 1 z 1 , . . . , z 1 z p , . . . , xp , z p z 1 , . . . , z p z p ]. We assume p that ฮ›โ„ฆ = 1ฮป> โ„ฆ for some ฮปโ„ฆ โˆˆ R in developing the algorithm. (Since our 2 algorithm applies to a general Zฬ„ โˆˆ Rnร—p that is not necessarily symmetric, this is without loss of generality.) In (16), the `1 -type penalties are imposed on overlapping groups of variables. It is worth noting that the symmetry constraint considerably complicates the grouping structure. Without it, the variable groups can be shown to follow a tree structure, for which efficient algorithms can be developed on Jenatton et al. (2011) or Simon et al. (2013). Our algorithm follows a different track than ADMM. The details are presented in Algorithm 1. Step 1 updates ฮž and results from a linearizationbased surrogate function. Step 2 carries out a Dykstra-like splittingโ€”see, e.g., Bauschke and Combettes (2008) and She et al. (2014), by use of two ~ S and ฮ˜S . Concretely, for any real number a, ฮ˜S (a; ฮป) proximity operators, ฮ˜ is given by sgn(a)(|a| โˆ’ ฮป)+ with sgn(ยท) representing the sign function. For any vector a, ฮ˜S (a; ฮป) is defined componentwise and the multivariate version ~ S (a; ฮป) is given by aฮ˜S (kak2 ; ฮป)/kak2 if a 6= 0 and 0 otherwise. ฮ˜ The GRESH algorithm is easy to implement and involves no complicated matrix operations such as matrix inversion. Moreover, it does not contain sensitive algorithmic parameters like ฯ in ADMM, and needs no line search. Theorem 1 provides a universal theoretical choice for ฯ„ to guarantee the global optimality of โ„ฆฬ‚. In particular, strict iterate convergence, in addition to function-value convergence, can be established, which is considerably stronger than an โ€œevery accumulation pointโ€ type conclusion in many numerical studies. For clarity, we assume that the inner iteration runs till convergence, but this is unnecessary; see Remark 2 below. Theorem 1. Suppose ฮปb โ‰ฅ 0, ฮ›ฮฆ โ‰ฅ 0, ฮปโ„ฆ > 0. For any ฯ„ > kZฬ†k2 and any starting point โ„ฆ(0) , the sequence of iterates {โ„ฆ(i) } converges to a globally optimal solution of (16). Remark 1. The conclusion in the theorem holds for โ€œ`1 + `2 โ€ type penalties as well (Zou and Hastie, 2005; Owen, 2007). For the associated proximity operators, see He et al. (2013). In hierarchical variable selection, adding an `2 -type shrinkage is particularly helpful to compensate for model collinearity. Remark 2. Neither the convergence of iterates nor the optimality guarantee requires the full convergence of the inner loop; see Appendix A.1 for more 9 Algorithm 1 The GRESH algorithm for solving the general problem (16) Inputs: Data:X, Z, y. Regularization parameters: ฮปb , ฮ›ฮฆ , ฮปโ„ฆ . Initialization: i โ† 0, ฯ„ large enough (say ฯ„ = kZฬ†k2 ); 2 2 ฮปb โ† ฮปb /ฯ„ 2 , ฮ›ฮฆ โ† (ฮ›ฮฆ + ฮ›> ฮฆ )/(2ฯ„ ), ฮปโ„ฆ โ† ฮปโ„ฆ /ฯ„ . repeat 1. ฮžฮฆ โ† ฮฆ(i) + Z > diag{y โˆ’ Xb(i) โˆ’ Zฬ„ vec (ฮฆ(i) ))}Z/ฯ„ 2 , > ฮžb โ† b(i) + X > (y โˆ’ Xb(i) โˆ’ Zฬ„ vec (ฮฆ(i) ))/ฯ„ 2 , ฮž โ† [ฮžb , ฮž> ฮฆ] ; 2. P โ† 0, Q โ† 0; repeat ~ S (ฮž[:, k] + P [:, k]; ฮปโ„ฆ [k]), โˆ€k : 1 โ‰ค k โ‰ค p; (i) โ„ฆ[:, k] โ† ฮ˜ (ii) P โ† P + ฮž โˆ’ โ„ฆ; (iii) ฮž[1, :] โ† ฮ˜S (โ„ฆ[1, :] + Q[1, :]; ฮป> b ); (iv) โ„ฆ[2:end, :] โ† (โ„ฆ[2:end, :] + โ„ฆ[2:end, :]> )/2; (v) ฮž[2:end, :] โ† ฮ˜S (โ„ฆ[2:end, :] + Q[2:end, :]; ฮ›ฮฆ ); (vi) Q โ† Q + โ„ฆ โˆ’ ฮž; until convergence 3. โ„ฆ(i+1) โ† ฮž; 4. i โ† i + 1; until convergence Output โ„ฆฬ‚ detail. Various stopping criteria can be employed, e.g., Schmidt et al. (2011). In our experience, running (i)โ€“(vi) for a few steps (say 10) usually suffices. Remark 3. Algorithm 1 and Theorem 1 can be extended beyond quadratic loss functions. When ` takes the binomial deviance in classification problems, the first step of Algorithm 1 becomes ฮžb โ† b(i) + X > (y โˆ’ ฯ€(Xb(i) + Zฬ„ vec (ฮฆ(i) )))/ฯ„ 2 , ฮžฮฆ โ† ฮฆ(i) + Z > diag{y โˆ’ ฯ€(Xb(i) + Zฬ„ vec (ฮฆ(i) ))}Z/ฯ„ 2 , > ฮž โ† [ฮžb , ฮž> ฮฆ ] , where ฯ€(t) = 1/(1 + exp(โˆ’t)) and extends componentwise to vectors. We can show that theoretically, choosing ฯ„ > kZฬ†k2 /2 guarantees the convergence of the algorithm. Remark 4. We recommend applying Nesterovโ€™s first acceleration in implementations (Nesterov, 2007). In more detail, it uses a momentum update of ฮž in Step 1: If i = 0, ฮžb โ† b(i) + X > (y โˆ’ Xb(i) โˆ’ Zฬ„ vec (ฮฆ(i) ))/ฯ„ 2 , 10 ฮžฮฆ โ† ฮฆ(i) + Z > diag{y โˆ’ Xb(i) โˆ’ Zฬ„ vec (ฮฆ(i) ))}Z/ฯ„ 2 ; if i > 0, ฮžb โ† (1 โˆ’ ฯ‰i )ฮžb + ฯ‰i (b(i) + X > (y โˆ’ Xb(i) โˆ’ Zฬ„ vec (ฮฆ(i) ))/ฯ„ 2 ), ฮžฮฆ โ† (1 โˆ’ ฯ‰i )ฮžฮฆ + ฯ‰i (ฮฆ(i) +Z > diag{y โˆ’Xb(i) โˆ’ Zฬ„ vec (ฮฆ(i) )}Z/ฯ„ 2 ), where ฯ‰i = (2i+3)/(i+3). Empirically, the number of iterations can be reduced by about 40% in comparison to the non-relaxed form. 5 Non-asymptotic analysis In this section, given any โˆ† โˆˆ R(p+1)ร—p and JG โŠ‚ [p], we use โˆ†JG to denote the submatrix โˆ†[:, JG ]. Given any Je โŠ‚ [p2 ], k vec (โˆ†ฮฆ )Je k1 and k vec (โˆ†ฮฆ )Je k2 are abbreviated as k(โˆ†ฮฆ )Je k1 and k(โˆ†ฮฆ )Je k2 , respectively, when there is no ambiguity. In this multi-regularization setting, some standard treatments of the stochastic term do not give sharp error rates. In particular, applying hฮต, > > Xฬ„ vec (โˆ†ฮฆ )i โ‰ค kXฬ„ ฮตkโˆž kโˆ†ฮฆ k1 and hฮต, Xฬ† vec (โˆ†)i โ‰ค kXฬ† ฮตk2,โˆž kโˆ†> k2,1 as commonly used in the literature (Bickel et al., 2009; Lounici et al., 2011; Negahban et al., 2012; van de Geer, 2014) would yield a prediction error bound of the order ฯƒ 2 (Je log p + JG p), which is, ironically, much worse than the error rate of LASSO or Group LASSO (G-LASSO). Our analysis relies on two interrelated inequalities derived from the statistical and computational properties of GRESH estimators. See Appendix A.2 for more technical detail. First, letโ€™s consider the Type-A problem (12), with ฮป1 , ฮป2 redefined: 1 kyโˆ’Xbโˆ’Xฬ„ vec (ฮฆ)k22 +ฮป1 kXฬ†k2 kฮฆk1 +ฮป2 kXฬ†k2 kโ„ฆ> k2,1 s.t. ฮฆ = ฮฆ> . โ„ฆ=[b,ฮฆ> ]> 2 (17) > > Let โ„ฆฬ‚ = [bฬ‚, ฮฆฬ‚ ] be any global minimizer of (17). We are interested in its prediction accuracy measured by M (bฬ‚ โˆ’ bโˆ— , ฮฆฬ‚ โˆ’ ฮฆโˆ— ), where min M (b, ฮฆ) = kXb + Xฬ„ vec (ฮฆ)k22 . (18) The predictive learning perspective is always legitimate in evaluating the quality of the estimator regardless of the signal-to-noise ratio. To guarantee small predictor errors when using a convex method, the design matrix must satisfy certain incoherence conditions, one of the most popular being the restricted eigenvalue (RE) assumption (Bickel et al., 2009; Lounici et al., 2011). In the following, we give an extension of RE in the hierarchy setting, with the restricted cone defined with both `1 and group-`1 penalties. A less 11 intuitive but technically much less demanding condition is used in the proof. Assumption A(Je , JG , ฯ‘, ฮบ). Given Je โŠ‚ [p2 ], JG โŠ‚ [p], ฮบ โ‰ฅ 0 and a > (p+1)ร—p constant ฯ‘ โ‰ฅ 0, for any โˆ† = [โˆ†b , โˆ†> satisfying โˆ†ฮฆ = โˆ†> ฮฆ] โˆˆ R ฮฆ and > k(โˆ†ฮฆ )Jec k1 + k(โˆ†JGc ) k2,1 โ‰ค (1 + ฯ‘)(k(โˆ†ฮฆ )Je k1 + k(โˆ†JG )> k2,1 ), the following inequality holds ฮบkXฬ†k22 (k(โˆ†ฮฆ )Je k22 + kโˆ†JG k2F ) โ‰ค kXโˆ†b + Xฬ„ vec (โˆ†ฮฆ )k22 . (19) The rate choices of the regularization parameters play a major role in prediction. We choose ฮป1 and ฮป2 in (17) according to p p (20) ฮป1 = A1 ฯƒ log(ep), ฮป2 = A2 ฯƒ log(ep), where A1 , A2 are large constants. (20) is quite different from the typical choice in group-`1 penalization; see Remark 2 for more detail. The following theorem states a non-asymptotic oracle inequality as well as a model cardinality bound for GRESH estimators. For convenience, we use abbreviated symbols Jห†G = JG (bฬ‚, ฮฆฬ‚) and Jห†e = Je (ฮฆฬ‚) for the estimate, and JG = JG (b, ฮฆ) and Je = Je (ฮฆ) for the reference signal.  > > Theorem 2. Assume  โˆผ N (0, ฯƒ 2 I). Let โ„ฆฬ‚ = bฬ‚, ฮฆฬ‚ be a global minimizer of (17). Then under (20), for any sufficiently large constants A1 , A2 , the following oracle inequality holds for any (b, ฮฆ) โˆˆ Rp ร— Rpร—p 1 E[M (bฬ‚ โˆ’ bโˆ— , ฮฆฬ‚ โˆ’ ฮฆโˆ— )] . M (b โˆ’ bโˆ— , ฮฆ โˆ’ ฮฆโˆ— ) + (1 โˆจ )ฯƒ 2 (Je + JG ) log p + ฯƒ 2 , ฮบ (21) provided that (X, Xฬ„, Xฬ†) satisfies A(Je , JG , ฯ‘, ฮบ) for some ฮบ > 0 and some constant ฯ‘ โ‰ฅ 0. Furthermore, under the same regularity condition, the overall sparsity of the obtained model is controlled by E[Jห†e ] + E[Jห†G ] . {M (bโˆ— โˆ’ b, ฮฆโˆ— โˆ’ ฮฆ) + ฯƒ 2 }/{ฯƒ 2 log(ep)} + Je + JG . (22) Remark 1. Letting b = bโˆ— and ฮฆ = ฮฆโˆ— in (21), we obtain an error bound no larger than ฯƒ 2 (Jeโˆ— + JGโˆ— ) log p (omitting constant factors). This indicates that GRESH not only guarantees SH, but can give an error rate as low as that of LASSO. The existence of the bias term M (b โˆ’ bโˆ— , ฮฆ โˆ’ ฮฆโˆ— ) makes our results applicable to approximately sparse signals, which is of practical significance. The theorem does not require the spectral norms of the design 12 โˆš matrices X, Xฬ„ and Xฬ† to be bounded above by O( n) as assumed in, for example, Zhang and Huang (2008) and Bickel et al. (2009). In addition, the true signal โ„ฆโˆ— and the reference signal โ„ฆ in the theorem need not obey SH. Remark 2. It is widely acknowledged that the penalty parameter for a grouped `1 penalty should be adjusted โˆš by the group size (Yuan and Lin, 2006). In fact, ฮป2 would be of order ฯƒ p + log p from Lounici et al. (2011) and Wei and Huang (2010), in light of the fact that there are p groups of size (p + 1) in kโ„ฆk2,1 . Perhaps surprisingly, this parameter choice becomes suboptimal in hierarchical variable selection. In fact, due to the presence of multiple penalties, we show in the proof that (20) suffices to suppress the noise, which in turn leads to a reduced error rate. Such a novel finding is owing to the careful treatment of the stochastic term, which is generally applicable to overlap group lasso (Jenatton et al., 2011). The conclusion that ฮป1 and ฮป2 are of essentially the same rate also facilitates parameter tuning, since one just needs to search along a one-dimensional grid. Remark 3. Theorem 2 can be extended to sub-Gaussian vec (ฮต) with mean 0 and its ฯˆ2 -norm bounded by ฯƒ, which covers more noise distributions. High probability form results of the prediction error can be obtained as well: (21) and (22), without the expectation and the additive ฯƒ 2 term, hold with 2 2 probability at least 1 โˆ’ Cpโˆ’c min{A1 ,A2 } for some universal constants C and c, and so Jห†e + Jห†G . Jeโˆ— + JGโˆ— with high probability. Moreover, in Appendix B, we show how to adapt our proof to deliver a coordinatewise error bound which can be used for recovering the sparsity pattern of the true signal. Remark 4. For the WH version of (17) (without the symmetry condition), following the lines of the proof of Theorem 2, we can show its error rate is of the order ฯƒ 2 {Jew (ฮฆ)+JGw (โ„ฆ)} log p, where JGw (โ„ฆ) = JG (โ„ฆ0 ), Jew (ฮฆ) = Je (ฮฆ0 ), with โ„ฆ0 = [b, ฮฆ0> ]> and ฯ†0kj = ฯ†kj + ฯ†jk for k โ‰ฅ j and 0 otherwise. The associated regularity condition uses Jew , JGw , in place of Je , JG , respectively, and does not require โˆ†ฮฆ to be symmetric. Details are not reported in the paper. Similarly, we can derive an oracle inequality for GRESH estimators of Type-B. Let X s be the column-scaled X such that the `2 -norm of each of s s its columns equals 1. Xฬ„ and Xฬ† are similarly defined. The corresponding coefficients, denoted by bs and ฮฆs , satisfy Xb = X s bs , Xฬ„ vec (ฮฆ) = s s s Xฬ„ vec (ฮฆs ). Let (bฬ‚ , ฮฆฬ‚ ) be a global minimizer of the scaled Type-B s s problem: minโ„ฆs =[bs ,ฮฆs> ]> 21 ky โˆ’ X s bs โˆ’ Xฬ„ vec (ฮฆs )k22 + ฮป1 kXฬ† k2 kฮฆs k1 + 13 s ฮป2 kXฬ† k2 k(โ„ฆs )> k2,1 s.t. ฮฆs = (ฮฆs )> . As aforementioned, the problem can s not be reduced to (17) because Xฬ„ [:, jk] does not equal X s [:, j] X s [:, k] in general. Assumption A0 (Je , JG , ฯ‘, ฮบ0 ). Given Je โŠ‚ [p2 ], JG โŠ‚ [p], and positive > constants ฮบ0 and ฯ‘, for any โˆ† = [โˆ†b , โˆ†> satisfying โˆ†ฮฆ = โˆ†> ฮฆ] ฮฆ and > > c c k(โˆ†ฮฆ )Je k1 + k(โˆ†JG ) k2,1 โ‰ค (1 + ฯ‘)(k(โˆ†ฮฆ )Je k1 + k(โˆ†JG ) k2,1 ), the following inequality holds s s ฮบ0 kXฬ† k22 (k(โˆ†ฮฆ )Je k22 + kโˆ†JG k2F ) โ‰ค kX s โˆ†b + Xฬ„ vec (โˆ†ฮฆ )k22 . Theorem 2โ€™ Under the same conditions as in Theorem 2 and with A0 (Je , JG , ฯ‘, ฮดJ0 e ,JG ) in place of A(Je , JG , ฯ‘, ฮบ), (21) and (22) hold. The error bounds of the two types of GRESH are of the same order, but their regularity conditions place different requirements on the design. We performed extensive simulation studies to compare A and A0 , and found that for the same ฯ‘, ฮบ < ฮบ0 usually holds, which suggests the penalization on the basis of terms seems more appropriate than that on the coefficients. Therefore, we recommend Type-B regularization for hierarchical variable selection. 6 Minimax lower bound and error rate comparison In this section, we show that in a minimax sense, the error rate we obtained in Theorem 2 is minimax optimal up to some logarithmic factors. Consider two signal classes having hierarchy and joint sparsity: SH(JG , Je ) = {โ„ฆ = [b, ฮฆ> ]> : โ„ฆ obeys SH, ฮฆ = ฮฆ> , JG (โ„ฆ) โ‰ค JG , Je (ฮฆ) โ‰ค Je }, (23) WH(JG , Je ) = {โ„ฆ = [b, ฮฆ> ]> : โ„ฆ obeys WH, JGw (โ„ฆ) โ‰ค JG , Jew (ฮฆ) โ‰ค Je }, (24) where 1 โ‰ค JG โ‰ค p, 1 โ‰ค Je โ‰ค pJG . Recall the definitions of JGw and Jew in Remark 4 following Theorem 2. Let `(ยท) be a nondecreasing loss function with `(0) = 0, ` 6โ‰ก 0. Under some regularity assumptions, we study the 14 minimax lower bounds for strong and weak hierarchical variable selection. Assumption B S (JG , Je ). For any โ„ฆ = [b, ฮฆ> ]> โˆˆ R(p+1)ร—p satisfying that ฮฆ is symmetric, Je (ฮฆ) โ‰ค Je and JG (โ„ฆ) โ‰ค JG , ฮบkโ„ฆk2F โ‰ค kXฬ† vec (โ„ฆ)k22 โ‰ค ฮบkโ„ฆk2F holds, where ฮบ/ฮบ is a positive constant. Assumption B W (JG , Je ). For any โ„ฆ = [b, ฮฆ> ]> โˆˆ R(p+1)ร—p satisfying that Jew (ฮฆ) โ‰ค Je and JGw (โ„ฆ) โ‰ค JG , ฮบkโ„ฆk2F โ‰ค kXฬ† vec (โ„ฆ)k22 โ‰ค ฮบkโ„ฆk2F holds, where ฮบ/ฮบ is a positive constant. Theorem 3. (i) Strong hierarchy. Assume y = Xbโˆ— + Xฬ„ vec (ฮฆโˆ— ) + ฮต with ฮต โˆผ N (0, ฯƒ 2 I), JG โ‰ฅ 2, p โ‰ฅ 2, Je โ‰ฅ 1, n โ‰ฅ 1, JG โ‰ค p/2, Je โ‰ค JG2 /2, and B S (2JG , 2Je ) is satisfied. Then there exist positive constants C, c (depending on `(ยท) only) such that sup inf โˆ— โ„ฆฬ‚ โ„ฆ โˆˆSH(JG ,Je ) E[`(M (bฬ‚ โˆ’ bโˆ— , ฮฆฬ‚ โˆ’ ฮฆโˆ— )/(CPo (Je , JG )))] โ‰ฅ c > 0, (25) where โ„ฆฬ‚ denotes any estimator, and Po (Je , JG ) = ฯƒ 2 {Je log(eJG2 /Je ) + JG log(ep/JG )}. (26) (ii) Weak hierarchy. Let JG โ‰ฅ 1, Je โ‰ฅ 1, n โ‰ฅ 1, p โ‰ฅ 2, JG โ‰ค p/2, Je โ‰ค JG p/2. Under the same model assumption and B W (2JG , 2Je ), (25) holds if SH(JG , Je ) is replaced by WH(JG , Je ) and Po is replaced by Po0 (Je , JG ) = ฯƒ 2 {Je log(eJG p/Je ) + JG log(ep/JG )}. (27) We give some examples of ` to illustrate the conclusion. For SH, using the indicator function `(u) = 1uโ‰ฅ1 , we know that for any estimator (bฬ‚, ฮฆฬ‚),  M (bฬ‚ โˆ’ bโˆ— , ฮฆฬ‚ โˆ’ ฮฆโˆ— ) & ฯƒ 2 Je log(eJG2 /Je ) + JG log(ep/JG ) occurs with positive probability, under some mild conditions. For `(u) = u, Theorem 3 shows that the risk E[M (bฬ‚ โˆ’ bโˆ— , ฮฆฬ‚ โˆ’ ฮฆโˆ— )] is bounded from below by Po (Je , JG ) up to some multiplicative constant. Because JG โ‰ค Je โ‰ค JG p and JG โ‰ค p, it is easy to see that the minimax rates are no larger than the error rate obtained in Theorem 2. A comparison of some popular methods follows, where we can see the benefits of hierarchical variable selection. In our context, LASSO solves 15 minb,ฮฆ:ฮฆ=ฮฆ> `(b, ฮฆ) + ฮป(kbk1 + kฮฆk1 ). From Bickel et al. (2009), the estimator has a prediction error of the order ฯƒ 2 (Je + J 10 + J 11 ) log p. G-LASSO, with the optimization problem defined by minb,ฮฆ:ฮฆ=ฮฆ> `(b, ฮฆ) + ฮปkโ„ฆ> k2,1 , automatically maintains SH and has an error rate of ฯƒ 2 JG p (Lounici et al., 2011). In general, there is no clear winner between the two. Letโ€™s turn to a particularly interesting case where Jeโˆ—  JGโˆ— p, i.e., the existence of a main effect in the model does not indicate that all its associated interactions must be relevant. In this scenario, LASSO always outperforms G-LASSO, although it does not possess the SH property. GRESH achieves the same low error rate and guarantees hierarchy, because under SH, J 11 + J 10 = JG . The error rate proved in (21) does not always beat that of G-LASSO, because only large values of A are considered in Theorem 2. Yet, even in the worst case when Jeโˆ—  JGโˆ— p, GRESH is only a logarithmic factor worse. In practical data analysis, there will be no performance loss, because when ฮป1 = 0, GRESH degenerates to G-LASSO. Table 1: Error rate comparison between LASSO, G-LASSO, and GRESH, where ฯƒ 2 and other constant factors are omitted. LASSO G-LASSO GRESH Minimax: 7 7.1 (Je + J 11 + J 10 ) log p JG p (JG + Je ) log p 2 /J ) JG log(ep/JG ) + Je log(eJG e Experiments Simulations In this part, we perform some simulation studies to compare the performance of HL and GRESH (of Type B, cf. (14)) in terms of prediction accuracy, selection consistency, and computational efficiency. We use a Toeplitz design to generate all main predictors, with the correlation between xi and xj given by 0.5|iโˆ’j| . The true coefficients bโˆ— and ฮฆโˆ— (symmetric) are generated according to the following three setups.  Example 1. n = 40, p = 100 or 200 (and so p + p2 = 5050 or 20100). bโˆ— = [3, 1.5, 0, 0, 2, 2, 0, ยท ยท ยท , 0]> , ฮฆโˆ— = 0, ฯƒ 2 = 1. No interactions are relevant 16 to the response variable. SH is satisfied.  Example 2. n = 150, p = 50 or 100 (and so p + p2 = 1275 or 5050). bโˆ— = [3, 3, 3, 3, 3, 3, 3, 3, 3, 0, ยท ยท ยท , 0]> , ฮฆโˆ— [1, 2] = ฮฆโˆ— [1, 3] = ฮฆโˆ— [4, 5] = ฮฆโˆ— [4, 6] = ฮฆโˆ— [7, 8] = ฮฆโˆ— [7, 9] = 3, ฯƒ 2 = 1. The model involves both main and interaction effects and obeys SH.  Example 3. n = 100, p = 50 or 100 (and so p + p2 = 1275 or 5050). bโˆ— = [1, 1, 1, 1, 1, 1, 1, 0, ยท ยท ยท , 0]> , ฮฆโˆ— [i, j] = 5, 1 โ‰ค i, j โ‰ค 5, i 6= j, ฮฆโˆ— [4, 5] = ฮฆโˆ— [4, 6] = ฮฆโˆ— [4, 7] = 5, ฯƒ 2 = 1. The true model does not have very strong main effects but satisfies SH. All regularization parameters are tuned on a (separate) large validation dataset containing 10K observations. There is no need to perform a full twodimensional grid search to find the optimal parameters in GRESH. Rather, motivated by Theorem 2, we set ฮป2 = cฮป1 , and chose c = 0.5 according to experience. Because of the convex nature of the problem, pathwise computation with warm starts is used. After variable selection, a ridge regression model is always refitted to be used for prediction. The official R package for HL is HierNet, implemented in C. We set strong=TRUE and post-calibrate HL by a restricted ridge refitting, which substantially enhances its accuracy. To make a fair comparison between HL and GRESH, we use the same error tolerance (1e-5) and the same number of grid values (20). All other algorithmic parameters in HierNet are set to their default values. Given each setup, we repeat the experiment for 50 times and evaluate the performance of each algorithm according to the measures defined below. The test error (Err) is the mean squared error between the true mean of y and its estimate; for robustness and stability, we report the median test error from all runs. The joint detection (JD) rate is the fraction of |{(i, j) : โ„ฆโˆ—ij 6= 0}| โІ |{(i, j) : โ„ฆฬ‚ij 6= 0}| among all experiments. The missing (M) rate and the false alarm (FA) rate are the mean of |{(i, j) : โ„ฆโˆ—ij 6= 0, โ„ฆฬ‚ij = 0}|/|{(i, j) : โ„ฆโˆ—ij 6= 0}| and the mean |{(i, j) : โ„ฆโˆ—ij = 0, โ„ฆฬ‚ij 6= 0}|/|{(i, j) : โ„ฆโˆ—ij = 0}|, respectively. The path computational cost is the average running time of an algorithm in seconds. All the experiments were run on a PC with 3.2GHz CPU, 32GB memory and 64-bit Windows 8.1. Table 2 and Table 3 summarize the statistical and computational results. From Table 2, GRESH and HL behaved equally well in Example 1, the model of which contains main effects only, but GRESH is faster. In Example 2 and Example 3, the two methods show more differences; see their test errors 17 Table 2: Statistical performance of HL and GRESH, measured in test error, joint detection rate, missing rate, and false alarm rate on simulation data. All numbers are multiplied by 100. Ex 1 (p = 100) Ex 2 (p = 50) Ex 3 (p = 50) Err JD M FA Err JD M FA Err JD M FA HL 13.7 100 0.00 0.00 14.2 95 0.24 0.31 68.0 90 0.65 2.71 GRESH 13.6 100 0.00 0.00 11.6 100 0.00 0.12 26.2 100 0.00 0.23 Ex 1 (p = 200) Ex 2 (p = 100) Ex 3 (p = 100) Err JD M FA Err JD M FA Err JD M FA HL 13.8 100 0.00 0.00 17.3 90 0.48 0.11 92.2 15 24.03 1.44 GRESH 13.5 100 0.00 0.00 14.3 100 0.00 0.05 26.9 100 0.00 0.08 Table 3: Path computation costs of GRESH and HL when p = 200 and 1000. The computational times are in seconds unless otherwise specified. p = 200 HL GRESH p = 1000 Ex1 Ex2 Ex3 Ex1 Ex2 Ex3 574 110 3057 158 2.9 hours 128 7.6 hours 1066 โ€” 2.5 hours โ€” 3194 and joint identification rates, for example. We also noticed that GRESH often gave a more parsimonious model. When the main effects are weak as in Example 3, HL may miss some genuine interaction effects. Overall, GRESH showed comparable or better test errors. In fact, this is observed even when SH is not satisfied (results not shown in the table). We suspect that the performance differences between HL and GRESH largely result from the fact that HL compares |bj | with kฯ†j k1 , the `1 -norm of the overall ฯ†j , to realize SH, while (14) groups bj xj , ฯ†j1 xj x1 , . . ., and ฯ†jp xj xp , on the term basis, to select main effects. The computational times in Table 3 show the scalability of each algorithm as p varies. When p = 1000, there are 500500 variables in total, and so HL became computationally prohibitive, also evidenced by Lim and Hastie (2015). GRESH offered impressive computation gains in the experiment. 18 7.2 Comparison with ADMM This part shows that directly applying ADMM does not give a scalable algorithm for solving the optimization problem (16) which has a large number of groups with large group size. The detailed algorithm design is given in Appendix C. We set ฯ = 1 in ADMM and compared it to Algorithm 1. The results are reported in Table 4 and Table 5. The statistical performances of the two algorithms are close. This is reasonable because they solve the same optimization problem. However, ADMM is much slower. In the experiments, ADMM became infeasible when p = 200 or larger. Table 4: Statistical performance of GRESH and ADMM, measured in test error, joint detection rate, missing rate, and false alarm rate. Ex 1 (p = 50) Ex 2 (p = 50) Ex 3 (p = 50) Err JD M FA Err JD M FA Err JD M FA GRESH 11.6 100 0.00 0.02 11.6 100 0.00 0.12 26.2 100 0.00 0.23 ADMM 11.7 100 0.00 0.02 11.9 100 0.00 0.12 26.3 100 0.00 0.22 Ex 1 (p = 100) Ex 2 (p = 100) Ex 3 (p = 100) Err JD M FA Err JD M FA Err JD M FA GRESH 13.6 100 0.00 0.00 14.3 100 0.00 0.05 26.9 100 0.00 0.08 ADMM 16.8 100 0.00 0.01 14.5 100 0.00 0.06 27.1 100 0.00 0.09 Table 5: Path computation costs of GRESH and ADMM. p = 50 p = 100 Ex1 Ex2 Ex3 GRESH ADMM 7.3 8 66 11 70 9 60 Ex1 Ex2 Ex3 27 36 30 1027 1571 1439 Real data example We performed hierarchical variable selection on the California housing data (Pace and Barry, 1997). The dataset consists of 9 summary characteristics for 20640 neighborhoods in California. The response variable is the median 19 house value in each neighborhood. Following Hastie et al. (2009), we obtained eight household-related predictor variables: median income, housing median age, average number of rooms and bedrooms per household, population, average occupancy (population/households), latitude, and longitude, denoted by MedInc, Age, AvgRms, AvgBdrms, Popu, AvgOccu, Lat, and Long, respectively. Similar to Ravikumar et al. (2007) and Radchenko and James (2010), 50 nuisance features generated as standard Gaussian random variables were added, to make the problem more challenging. The full quadratic model on this enlarged dataset contains 3422 unknowns. To prevent from getting over-optimistic error estimates, we used a hierarchical cross-validation procedure where an outer 10-fold cross-validation (CV) is for performance evaluation and the inner 10-fold selective CVs (She, 2012) are for parameter tuning. We managed to run both HL and GRESH for hierarchical variable selection, with the estimates post-calibrated by a local ridge fitting as described in Section 7.1. It took us approximately one and half days to complete the CV experiment for HL, and about 1.6 hours for GRESH. The median and mean test errors of the models obtained by HL are 530.8 and 553.5, respectively, and the average number of selected variables is 31.2. GRESH gave 516.9 and 521.1 for the median and mean test errors, , respectively, and selected 17.1 variables on average, about half of the model size of HL. To help the reader get an intuition of the selection frequencies of all predictors, we display heat maps in Figure 1. The two heat maps in the top panel include all variables, and the bottom panel only shows the heat maps restricted to the original covariates and their interactions. According to the figure, both methods successfully removed most of the artificially added noisy features. On average, only 9.3 nuisance covariates exist in the models obtained by HL, and 5.4 in the GRESH models. The heat maps of GRESH are however neater. The HL selection results are less parsimonious and are perhaps more difficult to interpret. The nonlinear terms in GRESH include the interaction between MedInc and Age, in addition to the quadratic effects of MedInc, Age, and AvgBdrms. Popu and all its associated interaction terms never got selected by GRESH. The insignificance of Popu can be confirmed by more elaborate analysis based on gradient boosting (Hastie et al., 2009). 20 Main Main 5 5 10 10 15 15 20 20 25 25 30 30 35 35 40 40 45 45 50 50 55 55 5 10 15 20 25 30 35 40 45 50 55 5 Main Main 1 1 2 2 3 3 4 4 5 5 6 6 7 7 8 10 15 20 25 30 35 40 45 50 55 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Figure 1: Top panel: heat maps of HL (left) and GRESH (right) on California housing data. Bottom panel: heat maps of HL (left) and GRESH (right) restricted to the original 8 variables and their interactions. Appendices A A.1 Proofs of main theorems Proof of Theorem 1 Denote the object function of (16) by f (โ„ฆ; ฮปb , ฮ›ฮฆ , ฮปโ„ฆ ) = `(โ„ฆ) + P1 (โ„ฆ; ฮปb , ฮ›ฮฆ ) + P2 (โ„ฆ; ฮปโ„ฆ ), where P1 (โ„ฆ; ฮปb , ฮ›ฮฆ ) = kฮปb bk1 + kฮ›ฮฆ ฮฆk1 , and P2 (โ„ฆ; ฮปโ„ฆ ) = k(ฮปโ„ฆ 1> ) โ„ฆ> k2,1 . Define g(โ„ฆ, โ„ฆ0 ; ฮปb , ฮ›ฮฆ , ฮ›โ„ฆ ) = `(โ„ฆ0 ) + ฯ„2 kโ„ฆ0 โˆ’ โ„ฆk2F + hX > (y โˆ’ Xb0 โˆ’ Zฬ„ vec (ฮฆ0 )), b โˆ’ b0 i + hZ > diag{y โˆ’ Xb0 โˆ’ 2 Zฬ„ vec (ฮฆ0 )}Z, ฮฆโˆ’ฮฆ0 i+P1 (โ„ฆ; ฮปb , ฮ›ฮฆ )+P2 (โ„ฆ; ฮปโ„ฆ ). To simplify the notation, we sometimes write them as f (โ„ฆ) and g(โ„ฆ, โ„ฆ0 ) when there is no ambiguity. 21 Given โ„ฆ0 , by simple algebra, the minimization of g(โ„ฆ, โ„ฆ0 ; ฮปb , ฮ›ฮฆ , ฮปโ„ฆ ) subject to ฮฆ = ฮฆ> reduces to min โ„ฆโˆˆR(p+1)ร—p 1 kโ„ฆ โˆ’ ฮžk2F + P1 (โ„ฆ; ฮปb /ฯ„ 2 , ฮ›ฮฆ /ฯ„ 2 ) + P2 (โ„ฆ; ฮปโ„ฆ /ฯ„ 2 ) + ฮน{ฮฆ=ฮฆ> } , 2 (28) > where ฮž = [ฮžb , ฮž> with ฮžb = b0 + X > (y โˆ’ Xb0 โˆ’ Zฬ„ vec (ฮฆ0 ))/ฯ„ 2 and ฮฆ] ฮžฮฆ = ฮฆ0 + Z > diag{y โˆ’ Xb0 โˆ’ Zฬ„ vec (ฮฆ0 )}Z/ฯ„ 2 , and ฮน{ฮฆ=ฮฆ> } = 0 if ฮฆ = ฮฆ> and +โˆž otherwise, which is a lower semicontinuous convex function. Lemma 1. Let P โ† 0, Q โ† 0, ฮž โ† ฮž0 . Consider the following iterative procedure: ~ S (ฮž[:, k] + P [:, k]; ฮปโ„ฆ [k]), โˆ€k : 1 โ‰ค k โ‰ค p, โ„ฆ[:, k] โ† ฮ˜ P โ† P + ฮž โˆ’ โ„ฆ, ฮž[1, :] โ† ฮ˜S (โ„ฆ[1, :] + Q[1, :]; ฮปb ), โ„ฆ[2 : end, :] โ† (โ„ฆ[2 : end, :] + โ„ฆ[2 : end, :]> )/2, (29) ฮž[2 : end, :] โ† ฮ˜S (โ„ฆ[2 : end, :] + Q[2 : end, :]; (ฮ›ฮฆ + ฮ›> ฮฆ )/2), Q โ† Q + โ„ฆ โˆ’ ฮž, till convergence. Then both the sequence of ฮž and the sequence of โ„ฆ converge to the globally optimal solution to minโ„ฆโˆˆR(p+1)ร—p 12 kโ„ฆ โˆ’ ฮž0 k2F + kฮปb โ„ฆb k1 + kฮ›ฮฆ โ„ฆฮฆ k1 + k(ฮปโ„ฆ 1> ) โ„ฆ> k2,1 s.t. โ„ฆฮฆ = โ„ฆ> ฮฆ. Now we prove the convergence of โ„ฆ(i) in Algorithm 1. First, we notice the following fact. ~ S (ยท; ฮป) is non-expansive, that is, kฮ˜(a; ~ Lemma 2. Given any ฮป โ‰ฅ 0, ฮ˜ ฮป) โˆ’ p ~ ฮ˜(aฬƒ; ฮป)k2 โ‰ค ka โˆ’ aฬƒk2 for all a, aฬƒ โˆˆ R . Therefore, the mapping of the iteration in Algorithm 1 is non-expansive. We use the tool provided by Opial (1967) for nonexpansive operators to prove the strict convergence of โ„ฆ(i) . First, the fix point set of the mapping is non-empty due to the convexity and the KKT conditions. The mapping is also asymptotically regular in the sense that for any starting point โ„ฆ(0) , kโ„ฆ(i+1) โˆ’ โ„ฆ(i) k โ†’ 0 as i โ†’ โˆž. This property is implied by the following lemma with ฯ„ > kZฬ†k2 . 22 Lemma 3. For the sequence {โ„ฆ(i) } generated by Algorithm 1, 1 f (โ„ฆ(i) ; ฮปb , ฮ›ฮฆ , ฮปโ„ฆ ) โˆ’ f (โ„ฆ(i+1) ; ฮปb , ฮ›ฮฆ , ฮปโ„ฆ ) โ‰ฅ (ฯ„ 2 โˆ’ kZฬ†k22 )kโ„ฆ(i+1) โˆ’ โ„ฆ(i) k2F , 2 (30) (i) for any i โ‰ฅ 0. Moreover, {โ„ฆ } is uniformly bounded. (30) actually does not require the optimality of โ„ฆ(i+1) in minimizing g(ยท, โ„ฆ(i) ) (cf. (28)). From the proof of Lemma 3, any โ„ฆ(i+1) satisfying g(โ„ฆ(i+1) , โ„ฆ(i) ) โ‰ค g(โ„ฆ(i) , โ„ฆ(i) )(= f (โ„ฆ(i) )) makes (30) hold. There is no need to run the inner loop till convergence. Moreover, to get the asymptotic regularity and the uniform boundedness of {โ„ฆ(i) }, it suffices to terminate the inner loop when g(โ„ฆ(i+1) , โ„ฆ(i) ) โ‰ค g(โ„ฆ(i) , โ„ฆ(i) ) + ฮธkโ„ฆ(i+1) โˆ’ โ„ฆ(i) k2F /2 or g(โ„ฆ(i+1) , โ„ฆ(i) ) โˆ’ g(โ„ฆ(i) , โ„ฆ(i) ) โ‰ค ฮธ, kโ„ฆ(i+1) โˆ’ โ„ฆ(i) k2F /2 where ฮธ is a pre-specified constant satisfying โˆ’ฯ„ 2 โ‰ค ฮธ < ฯ„ 2 โˆ’ kZฬ†k22 . When โ„ฆ(i+1) exactly solves (28), ฮธ = โˆ’ฯ„ 2 is satisfied. With all Opialโ€™s conditions satisfied, the sequence {โ„ฆ(i) } has a unique limit point โ„ฆโˆ— = [bโˆ— , ฮฆโˆ—> ]> , and โ„ฆโˆ— is a fixed point of Algorithm 1. Next we prove the optimality of any fixed point โ„ฆโˆ— regarding problem (16). By Lemma 1, โ„ฆโˆ— satisfies the Karush-Kuhn-Tucker (KKT) conditions of (28): ( 0 โˆˆ โ„ฆโˆ— โˆ’ ฮž + โˆ‚P1 (โ„ฆ; ฮปb /ฯ„ 2 , ฮ›ฮฆ /ฯ„ 2 ) + โˆ‚P2 (โ„ฆ; ฮ›โ„ฆ /ฯ„ 2 ) + โˆ‚h(ฮฆโˆ— ), ฮฆโˆ— โˆ’ ฮฆโˆ—> = 0, where h(ฮฆ; L) = hL, ฮฆ โˆ’ ฮฆ> i. With the fixed point property established above, substituting ฮž with ฮžb = bโˆ— + X > (y โˆ’ Xbโˆ— โˆ’ Zฬ„ vec (ฮฆโˆ— ))/ฯ„ 2 and ฮžฮฆ = ฮฆโˆ— + Z > diag{y โˆ’ Xbโˆ— โˆ’ Zฬ„ vec (ฮฆโˆ— )}Z/ฯ„ 2 , we have ๏ฃฑ 0 โˆˆ X > (y โˆ’ Xbโˆ— โˆ’ Zฬ„ vec (ฮฆโˆ— )) + โˆ‚b P1 (โ„ฆ; ฮปb , ฮ›ฮฆ ) + โˆ‚b P2 (โ„ฆ; ฮ›โ„ฆ ), ๏ฃด ๏ฃด ๏ฃด ๏ฃฒ0 โˆˆ Z > diag{y โˆ’ Xbโˆ— โˆ’ Zฬ„ vec (ฮฆโˆ— )}Z + โˆ‚ (P (โ„ฆ; ฮป , ฮ› ) + P (โ„ฆ; ฮ› )) ฮฆ 1 b ฮฆ 2 โ„ฆ โˆ— 2 ๏ฃด +โˆ‚h(ฮฆ ; ฯ„ L), ๏ฃด ๏ฃด ๏ฃณ 0 = ฮฆโˆ— โˆ’ ฮฆโˆ—> , which are exactly the KKT conditions for the convex problem (16). Hence โ„ฆโˆ— is a global minimizer of problem (16). 23 Similarly, the global optimality of limiโ†’โˆž โ„ฆ(i) = โ„ฆโˆ— does not require solving (28) exactly. In the following, we use kAkฮฃ to denote {tr(A> ฮฃA)}1/2 . Let โ„ฆo be an arbitrary optimal solution to (16). From the proof of Lemma 3, 2 the optimal โ„ฆ(i+1) satisfies g(โ„ฆ(i+1) , โ„ฆ(i) ) + ฯ„2 kโ„ฆ(i+1) โˆ’ โ„ฆo k2F โ‰ค g(โ„ฆo , โ„ฆ(i) ). We can relax it to 1 g(โ„ฆ(i+1) , โ„ฆ(i) ) + kโ„ฆ(i+1) โˆ’ โ„ฆo k2ฯ„ 2 Iโˆ’ฮธX > X โ‰ค g(โ„ฆo , โ„ฆ(i) ) 2 for some ฮธ : 0 โ‰ค ฮธ โ‰ค 1. Then by the construction of g, we obtain 1 1 f (โ„ฆ(i+1) ) โˆ’ f (โ„ฆo ) โ‰ค kโ„ฆ(i) โˆ’ โ„ฆo k2ฯ„ 2 Iโˆ’X > X โˆ’ kโ„ฆ(i+1) โˆ’ โ„ฆo k2ฯ„ 2 Iโˆ’ฮธX > X 2 2 1 (i+1) โˆ’ kโ„ฆ โˆ’ โ„ฆ(i) k2ฯ„ 2 Iโˆ’X > X 2 1 โ‰ค kโ„ฆ(i) โˆ’ โ„ฆo k2ฯ„ 2 Iโˆ’X > X โˆ’ kโ„ฆ(i+1) โˆ’ โ„ฆo kฯ„ 2 Iโˆ’ฮธX > X 2 1 (i) 1 โ‰ค kโ„ฆ โˆ’ โ„ฆo k2ฯ„ 2 Iโˆ’ฮธX>X โˆ’ kโ„ฆ(i+1) โˆ’ โ„ฆo kฯ„ 2 Iโˆ’ฮธX>X . 2 2 It follows that fยฏi+1 โˆ’ f (โ„ฆo ) โ‰ค 1 kโ„ฆ(0) โˆ’ โ„ฆo k2ฯ„ 2 Iโˆ’ฮธX>X , 2(i + 1) (31) Pi+1 (k) โˆ— (i) 1 where fยฏi+1 = i+1 k=1 f (โ„ฆ ). Letting i โ†’ โˆž, we get f (โ„ฆ ) = f (limiโ†’โˆž โ„ฆ ) = limiโ†’โˆž fยฏi = f (โ„ฆo ), and so โ„ฆโˆ— must also be a global minimizer of (16). Proof of Lemma 1 First, we consider min โ„ฆ=[b,ฮฆ]> 1 kโ„ฆ โˆ’ ฮž0 k2F + kฮปb 2 bk1 + kฮ›ฮฆ ฮฆk1 + ฮน{ฮฆ=ฮฆ> } . Let ฮฆ0 = ฮž0ฮฆ , b0 = ฮž0b . By some simple algebra, kฮฆ โˆ’ ฮฆ0 k2F = kฮฆ โˆ’ (ฮฆ0 + ฮฆ0> )/2k2F + C(ฮฆ0 ), where the last term does not depend on ฮฆ. Based on Lemma 1 of She (2012), it is not difficult to show that the global minimizer is given by bo = ฮ˜S (b0 ; ฮปb ), ฮฆo = ฮ˜S ((ฮฆ0 + ฮฆ0> )/2; (ฮ›ฮฆ + ฮ›> ฮฆ )/2). 1 Similarly, the globally optimal solution to minโ„ฆ=[b,ฮฆ]> 2 kโ„ฆ โˆ’ ฮž0 k2F + ~ S (ฮž0 [:, k]; ฮปโ„ฆ [k]), 1 โ‰ค k(ฮปโ„ฆ 1> ) โ„ฆ> k2,1 is given by โ„ฆo with โ„ฆo [; , k] = ฮ˜ k โ‰ค p. Applying Theorem 3.2 and 3.3 in Bauschke and Combettes (2008) guarantees the strict convergence of the iterates and the global optimality of the limit point. 24 ~ is a Proof of Lemma 2 The conclusion follows from the fact that ฮ˜ proximity operator associated with a convex function. Proof of Lemma 3 From the optimality of โ„ฆ(i+1) and the convexity of the penalties in (28), it is easy to see that for any โ„ฆ, g(โ„ฆ(i+1) , โ„ฆ(i) ; ฮปb , ฮ›ฮฆ , ฮ›โ„ฆ ) + ฯ„ 2 (i+1) kโ„ฆ โˆ’ โ„ฆk2F โ‰ค g(โ„ฆ, โ„ฆ(i) ; ฮปb , ฮ›ฮฆ , ฮปโ„ฆ ). 2 (32) It follows from the construction of g that g(โ„ฆ(i+1) , โ„ฆ(i) ; ฮปb , ฮ›ฮฆ , ฮ›โ„ฆ ) โ‰ค g(โ„ฆ(i) , โ„ฆ(i) ; ฮปb , ฮ›ฮฆ , ฮปโ„ฆ ) = f (โ„ฆ(i) ; ฮปb , ฮ›ฮฆ , ฮปโ„ฆ ). On the other hand, noticing that the gradient of l with respect to ฮฆ is Z > diag{y โˆ’ Xb0 โˆ’ Zฬ„ vec (ฮฆ0 ))}Z, Taylor expansion yields g(โ„ฆ, โ„ฆ0 ; ฮปb , ฮ›ฮฆ , ฮ›โ„ฆ ) โ‰ฅ f (โ„ฆ; ฮปb , ฮ›ฮฆ , ฮปโ„ฆ ) + (ฯ„ 2 โˆ’ kZฬ†k22 ) 0 kโ„ฆ โˆ’ โ„ฆk2F 2 for any โ„ฆ, โ„ฆ0 . Furthermore, k(ฮปโ„ฆ 1> ) โ„ฆ(i)> k2,1 โ‰ค f (โ„ฆ(i) ; ฮปb , ฮ›ฮฆ ) โ‰ค f (โ„ฆ(0) ; ฮปb , ฮ›ฮฆ ). Because ฮปโ„ฆ > 0, the conclusion follows. A.2 Proof of Theorem 2 In this proof, we use C, c to denote universal constants. They are not necessarily the same at each occurrence. Throughout the proof, P (b, ฮฆ; ฮป1 , ฮป2 ) is short for ฮป1 kฮฆk1 + ฮป2 kโ„ฆ> k2,1 , ฮป01 is short for ฮป1 kXฬ†k2 , and ฮป02 is short for ฮป2 kXฬ†k2 . We prove the theorem under a less restrictive condition. First, because โ„ฆฬ‚ is a global minimizer of (8) and P is convex, for any (b, ฮฆ) โˆˆ Rp ร— Rpร—p with ฮฆ symmetric (not necessarily satisfying SH), we have 1 `(bฬ‚, ฮฆฬ‚) + P (bฬ‚, ฮฆฬ‚; ฮป01 , ฮป02 ) + M (b โˆ’ bฬ‚, ฮฆ โˆ’ ฮฆฬ‚) โ‰ค `(b, ฮฆ) + P (b, ฮฆ; ฮป01 , ฮป02 ). 2 Based on the model assumption, it is easy to see that 1 1 M (bโˆ— โˆ’ bฬ‚, ฮฆโˆ— โˆ’ ฮฆฬ‚) + P (bฬ‚, ฮฆฬ‚; ฮป01 , ฮป02 ) + M (โˆ†b , โˆ†ฮฆ ) 2 2 1 โˆ— โˆ— 0 0 โ‰ค M (b โˆ’ b, ฮฆ โˆ’ ฮฆ) + P (b, ฮฆ; ฮป1 , ฮป2 ) + hฮต, Xโˆ†b + diag(Xโˆ†ฮฆ X > )i, 2 25 where โˆ†b = bฬ‚ โˆ’ b, โˆ†ฮฆ = ฮฆฬ‚ โˆ’ ฮฆ. ห˜ = [โˆ†> , (vec (โˆ†ฮฆ ))> ]> and Jหœ = J โˆช Jห†, where J := {j : Introduce โˆ† b vec (โ„ฆ)j 6= 0}. and Jห† := {j : vec (โ„ฆฬ‚)j 6= 0}. Denote by P Jหœ the orthogonal projection matrix onto the column space of Xฬ† Jหœ . Then hฮต, Xโˆ†b + diag(Xโˆ†ฮฆ X > )i ห˜ =hฮต, Xฬ† โˆ†i ห˜ หœi =hฮต, P Jหœ Xฬ† Jหœ โˆ† J =hP Jหœ ฮต, Xโˆ†b + diag(Xโˆ†ฮฆ X > )i 1 a1 โ‰ค M (โˆ†b , โˆ†ฮฆ ) + kP Jหœ ฮตk22 , 2a1 2 for any a1 > 0. Representing kโ„ฆฬ‚k2,1 as k(โ„ฆฬ‚JG )> k2,1 + k(โ„ฆฬ‚JGc )> k2,1 and kฮฆฬ‚k1 as kฮฆฬ‚Je k1 + kฮฆฬ‚Jec k1 , respectively, and applying the triangle inequalities of k ยท k1 and k ยท k2,1 , we have 1 1 M (bโˆ— โˆ’ bฬ‚, ฮฆโˆ— โˆ’ ฮฆฬ‚) + ฮป01 k(โˆ†ฮฆ )Jec k1 + ฮป02 k(โˆ†JGc )> k2,1 + M (โˆ†b , โˆ†ฮฆ ) 2 2 1 1 M (โˆ†b , โˆ†ฮฆ ) + ฮป01 k(โˆ†ฮฆ )Je k1 + ฮป02 k(โˆ†JG )> k2,1 โ‰ค M (bโˆ— โˆ’ b, ฮฆโˆ— โˆ’ ฮฆ) + 2 2a1 a1 + kP Jหœ ฮตk22 . 2 (33) How to treat the key term kP Jหœ ฮตk22 is nontrivial. We derive two inequalities from statistical analysis and computational analysis. First, we bound kP Jหœ ฮตk22 with some cardinality measures. The goal of this step is to show for a large constant L, supJ โŠ‚[p(p+1)] {kP J ฮตk22 โˆ’LPo (JG (J ), Je (J ))} is negative with high probability, where Po (JG , Je ) = ฯƒ 2 {JG log(ep/JG ) + Je log(epJG /Je )}. (If the reference signal (b, ฮฆ) satisfies SH, so does Jหœ, for which Po can be strengthened to ฯƒ 2 {JG log(ep/JG ) + Je log(eJG2 /Je )} following the lines of the proof of Lemma 4.) For notational convenience, we extend the J -measures defined in (2) to an index set: Given any J โŠ‚ [p(p + 1)], with โ„ฆ = [b, ฮฆ> ]> a binary matrix satisfying (vec (โ„ฆ))J = 1 and (vec (โ„ฆ))J c = 0, define JG (J ) = JG (โ„ฆ), Je (J ) = Je (ฮฆ). Given J โŠ‚ [p(p + 1)], JG (J ) โŠ‚ [p] and Je (J ) โŠ‚ [p2 ]. 26 Lemma 4. Given 1 โ‰ค JG โ‰ค p and 0 โ‰ค Je โ‰ค p2 , for any t โ‰ฅ 0, ! sup P |JG |=JG ,|Je |=Je kP J ฮตk22 โ‰ฅ L0 Po (JG , Je ) + tฯƒ 2 โ‰ค C exp(โˆ’ct), (34) where L0 , C, c > 0 are universal constants. Here, we omit the dependence of JG and Je on J for brevity. Define ! RJG ,Je = sup |JG |=JG ,|Je |=Je kP J ฮตk22 โˆ’ Lฯƒ 2 {Je log(ep) + JG log(ep)} , + and R = sup1โ‰คJG โ‰คp,0โ‰คJe โ‰คp2 RJG ,Je (when JG (J ) = 0, P J ฮต = 0). Then kP Jหœ ฮตk22 โ‰คLฯƒ 2 {Jหœe log(ep) + JหœG log(ep)} + R โ‰คLฯƒ 2 (Je + JG ) log(ep) + Lฯƒ 2 {Jห†e log(ep) + Jห†G log(ep)} + R. (35) Set L > L0 . Then, by Lemma 4 and Je โ‰ฅ JG , P(R โ‰ฅ tฯƒ) 2 โ‰ค p p X X P(RJG ,Je โ‰ฅ tฯƒ) JG =1 Je =0 2 โ‰ค p p X X C exp(โˆ’ct) exp {โˆ’c (L โˆ’ L0 )(Je log(ep) + JG log(ep))} JG =1 Je =0 0 โ‰คC exp(โˆ’ct2 ), from which it follows that ER โ‰ค Cฯƒ 2 . It is also easy to see that for sufficiently large L, R โ‰ค 0 occurs with probability at least 1 โˆ’ Cpโˆ’cL . Next, we derive an inequality based on the computational optimality of (bฬ‚, ฮฆฬ‚). Due to the convexity of the problem, (bฬ‚, ฮฆฬ‚) is a stationary point of 1 ky โˆ’ Xb โˆ’ diag(XฮฆX > )k22 + ฮป01 kฮฆk1 2 X + ฮป02 kโ„ฆ> k2,1 + lj,k (ฯ†j,k โˆ’ ฯ†k,j ), j<k 27 where lj,k are Lagrangian multipliers. By the KKT conditions, for any j โˆˆ Jห†G , bฬ‚j is nonzero (with probability 1) and so satisfies ฮป02 bฬ‚j = โˆ’x> j (Xฬ† vec (โ„ฆฬ‚) โˆ’ y). kโ„ฆฬ‚j k2 (36) 0 Similarly, for any j 0 โˆˆ Jห†e , letting jc = d jp e, jr = j 0 โˆ’ (jc โˆ’ 1)p, ฯ†ฬ‚jr ,jc satisfies > ฯ†ฬ‚ ฮป01 sgn(ฯ†ฬ‚jr ,jc ) + ฮป02 kโ„ฆฬ‚jr ,jkc + ljr ,jc sgn(jr โˆ’ jc ) = โˆ’Xฬ„ j 0 (Xฬ† vec (โ„ฆฬ‚) โˆ’ y), where jc 2 sgn(t) = 1, 0, โˆ’1 for t > 0, = 0, < 0, respectively. Adding the equations for ฯ†ฬ‚jr ,jc and ฯ†ฬ‚jc ,jr can cancel ljr ,jc . So when jr 6= jc , we have 2ฮป01 sgn(ฯ†ฬ‚jr ,jc ) + ฮป02 ฯ†ฬ‚jr ,jc kโ„ฆฬ‚jc k2 + ฮป02 ฯ†ฬ‚jr ,jc kโ„ฆฬ‚jr k2 > = โˆ’2Xฬ„ j 0 (Xฬ† vec (โ„ฆฬ‚) โˆ’ y), (37) and when jc = jr , we have ฮป01 sgn(ฯ†ฬ‚jr ,jc ) + ฮป02 ฯ†ฬ‚jr ,jc > kโ„ฆฬ‚jc k2 = โˆ’Xฬ„ j 0 (Xฬ† vec (โ„ฆฬ‚) โˆ’ y). (38) Notice that sgn(ฯ†ฬ‚jr ,jc )ฯ†ฬ‚jr ,jc is always non-negative. Squaring both sides of (36), (37) and (38) and summing over all j โˆˆ Jห†G and j 0 โˆˆ Jห†e , we obtain ห† ฮป02 1 Je + ฮป02 2 X bฬ‚2j + jโˆˆJห†G P k:ฯ†ฬ‚k,j 6=0 ฯ†ฬ‚2k,j kโ„ฆฬ‚j k22 > โ‰ค 2kXฬ† Jห† (Xฬ† vec (โ„ฆฬ‚) โˆ’ y)k22 , > 02 ห† 2 ห† ห† หœ and so ฮป02 1 Je + ฮป2 JG โ‰ค 2kXฬ† Jห† (Xฬ† vec (โ„ฆฬ‚) โˆ’ y)k2 . It follows from J โŠ‚ J and the Cauchy-Schwarz inequality that ฮป21 Jห†e + ฮป22 Jห†G โ‰ค 3M (bโˆ— โˆ’ bฬ‚, ฮฆโˆ— โˆ’ ฮฆฬ‚) + 6kP Jหœ ฮตk22 . (39) Now, combining the optimization inequality (39) and the statistical inp equality (35) can yield a bound of kP Jหœ ฮตk22 . In fact, with ฮปo = ฯƒ log(ep), ฮป1 == A1 ฮปo , ฮป2 = A2 ฮปo , Ai โ‰ฅ A, A2 = A0 L for some A0 > 0, we get (1 โˆ’ 3 6 )kP Jหœ ฮตk22 โ‰ค Lฯƒ 2 (Je + JG ) log(ep) + M (bโˆ— โˆ’ bฬ‚, ฮฆโˆ— โˆ’ ฮฆฬ‚) + R. A0 A0 28 Plugging this into (33) gives 1 M (bโˆ— โˆ’ bฬ‚, ฮฆโˆ— โˆ’ ฮฆฬ‚) + Aฮปo kXฬ†k2 k(โˆ†ฮฆ )Jec k1 + Aฮปo kXฬ†k2 k(โˆ†JGc )> k2,1 2    3a1 1 1 1 โˆ— โˆ— 1+ M (b โˆ’ b, ฮฆ โˆ’ ฮฆ) + โˆ’ 1 M (โˆ†b , โˆ†ฮฆ ) โ‰ค 2 A0 โˆ’ 6 2 a1 a1 L + Aฮปo kXฬ†k2 k(โˆ†ฮฆ )Je k1 + Aฮปo kXฬ†k2 k(โˆ†JG )> k2,1 + ฯƒ 2 (Je + JG ) log(ep) 2(1 โˆ’ 6/A0 ) a1 + R. 2(1 โˆ’ 6/A0 ) Assume the following condition holds kXฬ†k2 (k(โˆ†ฮฆ )Je k1 + k(โˆ†JG )> k2,1 ) โ‰คkXฬ†k2 (k(โˆ†ฮฆ )Jec k1 + k(โˆ†JGc )> k2,1 ) + K p Je + JG kXโˆ†b + Xฬ„ vec (โˆ†ฮฆ )k2 , (40) for some K large enough. Then we have 1 M (bโˆ— โˆ’ bฬ‚, ฮฆโˆ— โˆ’ ฮฆฬ‚) 2    1 3a1 1 1 a1 R โˆ— โˆ— โ‰ค 1+ M (b โˆ’ b, ฮฆ โˆ’ ฮฆ) + โˆ’ 1 M (โˆ†b , โˆ†ฮฆ ) + 2 A0 โˆ’ 6 2 a1 2(1 โˆ’ 6/A0 ) p a L 1 + Aฮปo K Je + JG kXโˆ†b + Xฬ„ vec (โˆ†ฮฆ )k2 + ฯƒ 2 (Je + JG ) log(ep) 2(1 โˆ’ 6/A0 )     1 3a1 1 1 1 โˆ— โˆ— โ‰ค 1+ M (b โˆ’ b, ฮฆ โˆ’ ฮฆ) + + โˆ’ 1 M (โˆ†b , โˆ†ฮฆ ) 2 A0 โˆ’ 6 2 a1 a2   a1 a2 A0 2 a1 + K Lฯƒ 2 (Je + JG ) log(ep) + R. + 2(1 โˆ’ 6/A0 ) 2 2(1 โˆ’ 6/A0 ) Hence we get EM (bโˆ— โˆ’ bฬ‚, ฮฆโˆ— โˆ’ ฮฆฬ‚) . M (bโˆ— โˆ’ b, ฮฆโˆ— โˆ’ ฮฆ) + (1 โˆจ K 2 )ฯƒ 2 (Je + JG )ฯƒ 2 log(ep)+ฯƒ 2 if we choose the constants a1 , a2 , A0 satisfying, say, a1 = 2, a2 = 2, A0 โ‰ฅ 7. To complete the proof, we show that A(Je , JG , ฯ‘, ฮบ) with ฮบ > 0 and ฯ‘ โ‰ฅ 0 implies (40). Consider two cases. The case (1 + ฯ‘)(k(โˆ†ฮฆ )Je k1 + k(โˆ†JG )> k2,1 ) โ‰ค k(โˆ†ฮฆ )Jec k1 + k(โˆ†JGc )> k2,1 is trivial. Suppose the reverse 29 inequality holds. Then kXฬ†k2 (k(โˆ†ฮฆ )Je k1 + k(โˆ†JG )> k2,1 ) โ‰คkXฬ†k2 (Je + JG )1/2 (k(โˆ†ฮฆ )Je k22 + k(โˆ†JG )> k2F )1/2 โ‰ค(Je + JG )1/2 kXโˆ†kF /ฮบ1/2 , and so (40) holds with K = 1/ฮบ1/2 . Finally, we can also plug (35) into (39), resulting in ฮป21 E[Jห†e ] + ฮป22 E[Jห†G ] . M (bโˆ— โˆ’ b, ฮฆโˆ— โˆ’ ฮฆ) + ฮป21 Je + ฮป22 JG + ฯƒ 2 , (41) and so (22) follows. The proof for Theorem 2โ€™ follows the same lines; the details are omitted. Proof of Lemma 4 First, notice that for fixed J , kP J ฮตk22 /ฯƒ 2 โˆผ ฯ‡2 (D) with D โ‰ค J. The standard tail bound for X โˆผ ฯ‡2 (D) gives P(X โˆ’ D โ‰ฅ t) โ‰ค exp(โˆ’t2 /(4(D + t))), โˆ€t โ‰ฅ 0 (Laurent and Massart, 2000, Lemma 1). It is easy to see that sup |JG |=JG ,|Je |=Je kP J ฮตk22 โ‰ค sup sup sup J 11 +J 10 +J 01 =JG Q(J 11 ,J 10 ,J 01 ) (e) |Je |=Je ,Je โŠ‚JG kP J ฮตk22 , where Q(J 11 , J 10 , J 01 ) = {(J 11 , J 10 , J 01 ) โŠ‚ [p]3 : |J 11 | = J 11 , |J 10 | = (e) J 10 , |J 01 | = J 01 , J 11 โˆฉ J 10 = J 10 โˆฉ J 01 = J 11 โˆฉ J 01 = โˆ…} and JG denotes the index set {1 โ‰ค j โ‰ค p2 : d pj e โˆˆ JG }. Q(J 11 , J 10 , J 01 ) contains  p 11 10 01 J , J , J , p โˆ’ J 11 โˆ’ J 10 โˆ’ J 01   many elements. This multinomial coefficient is bounded by JpG , and by Stir lingโ€™s approximation, log JpG โ‰ค JG log(ep/JG ). Similarly, sup|Je |=Je ,Je โŠ‚J (e) G   (J 11 +J 01 )p JG +2 and supJ 11 +J 10 +J 01 =JG involve and 2 terms, respectively, and Je we have  11    J + J 01 )p JG + 2 log โ‰ค Je log(eJG p/Je ), log โ‰ค C log(eJG ). Je 2 Applying the union bound gives the desired result. 30 A.3 Proof of Theorem 3 The proof is based on the general reduction scheme in Chapter 2 of Tsybakov (2009). The key is to design proper least favorable signals in different situations. We consider two cases. (i) JG log(ep/JG ) โ‰ค Je log(eJG2 /Je ). Define a signal subclass  B 1 (JG , Je ) = โ„ฆ = [b, ฮฆ]> : bj = 1 if j โˆˆ [JG ] and 0 if JG < j โ‰ค p, ฯ†k,j = 0 or ฮณR if (k, j) โˆˆ [JG ] ร— [JG ] and 0 otherwise, ฮฆ = ฮฆ> , Je (ฮฆ) โ‰ค Je , ฯƒ where R = ฮบ1/2 (log(eJG2 /Je ))1/2 and ฮณ > 0 is a small constant to be chosen later. Because bj = 1 (1 โ‰ค j โ‰ค JG ), any โ„ฆ โˆˆ B 1 (JG , Je ) satisfies SH, and thus B 1 (JG , Je ) โŠ‚ SH(JG , Je ). By Stirlingโ€™s approximation,  2 J 1 log |B (JG , Je )| = log G โ‰ฅ Je log(JG2 /Je ) โ‰ฅ cJe log(eJG2 /Je ) Je for some universal constant c. Let ฯ(โ„ฆ1 , โ„ฆ2 ) = kโ„ฆ1 โˆ’ โ„ฆ2 k0 be the Hamming distance. By Lemma 8.3 in Rigollet and Tsybakov (2011), there exists a subset B 10 (JG , Je ) โŠ‚ B 1 (JG , Je ) such that log |B 10 (JG , Je )| โ‰ฅ c1 Je log(eJG2 /Je ), ฯ(โ„ฆ1 , โ„ฆ2 ) โ‰ฅ c2 Je , โˆ€โ„ฆ1 , โ„ฆ2 โˆˆ B 10 , โ„ฆ1 6= โ„ฆ2 for some universal constants c1 , c2 > 0. Then kโ„ฆ1 โˆ’โ„ฆ2 k2F = ฮณ 2 R2 ฯ(โ„ฆ1 , โ„ฆ2 ) โ‰ฅ c2 ฮณ 2 R2 Je . It follows from the restricted conditional number assumption that kXฬ† vec (โ„ฆ1 ) โˆ’ Xฬ† vec (โ„ฆ2 )k22 โ‰ฅ c2 ฮบฮณ 2 R2 Je (42) for any โ„ฆ1 , โ„ฆ2 โˆˆ B 10 , โ„ฆ1 6= โ„ฆ2 , where ฮบ/ฮบ is a positive constant. For Gaussian models, the Kullback-Leibler divergence of N (Xฬ† vec (โ„ฆ2 ), ฯƒ 2 I) (denoted by Pโ„ฆ2 ) from N (Xฬ† vec (โ„ฆ1 ), ฯƒ 2 I) (denoted by Pโ„ฆ1 ) is K(Pโ„ฆ1 , Pโ„ฆ2 ) = 1 kXฬ† vec (โ„ฆ1 ) โˆ’ Xฬ† vec (โ„ฆ2 )k22 . Let P0 be N (0, ฯƒ 2 I). By the assumption 2ฯƒ 2 again, for any โ„ฆ โˆˆ B 1 (JG , Je ), 1 ฮณ2 2 2 2 K(P0 , Pโ„ฆ ) โ‰ค 2 ฮบฮณ R ฯ(0, โ„ฆ) โ‰ค 2 ฮบR Je , 2ฯƒ ฯƒ 31 where we used ฯ(โ„ฆ1 , โ„ฆ2 ) = Je (ฮฆ1 โˆ’ ฮฆ2 ) โ‰ค 2Je . Therefore,  2 ฮณ2 J 1 X 2 2 log G . K(P0 , Pโ„ฆ ) โ‰ค ฮณ Je log(eJG /Je ) โ‰ค 10 |B | c Je 10 (43) โ„ฆโˆˆB Combining (42) and (43) and choosing a sufficiently small value for ฮณ, we can apply Theorem 2.7 of Tsybakov (2009) to get the desired lower bound. (ii) JG log(ep/JG ) > Je log(eJG2 /Je ). Define a signal subclass B 2 (JG ) = {โ„ฆ = [b, ฮฆ> ]> : bj โˆˆ {0, 1} โˆ€j โˆˆ [p], ฮฆ = 0, JG (โ„ฆ) โ‰ค JG }, ฯƒ where R = ฮบ1/2 {log(ep/JG )}1/2 and ฮณ > 0 is a small constant. The afterward treatment is similar to (i). The details are omitted. For WH, we redefine B 1 as B 1 (JG , Je ) = {โ„ฆ = [b, ฮฆ> ]> : bj = 1 if j โˆˆ [JG ] and 0 otherwise, ฯ†k,j = 0 or ฮณR if k โ‰ฅ j and 1 โ‰ค j โ‰ค JG , ฯƒ and 0 otherwise, Jew (ฮฆ) โ‰ค Je }, where R = ฮบ1/2 (log(eJG p/Je ))1/2 . Then B 1 (JG , Je ) โŠ‚ WH(JG , Je ). The rest follows the same lines as the proof for SH. B Coordinatewise error bound for support recovery In this part, we show that GRESH estimators can recover the sparsity pattern of the true signal, i.e., J โˆ— = {j : vec (โ„ฆโˆ— )j 6= 0}, with high probability. The result is of the type of Lounici (2008) and Ravikumar et al. (2010), but we do not have to assume the stringent irrepresentable conditions or mutual coherence conditions. For more discussions, see Zhang (2009). Assumption C(Je , JG , ฮถ, ฮป1 , ฮป2 ). Given Je โŠ‚ [p2 ], JG โŠ‚ [p], ฮถ โ‰ฅ 0, ฮป1 , ฮป2 > > 0, for any โˆ† = [โˆ†b , โˆ†> โˆˆ R(p+1)ร—p satisfying โˆ†ฮฆ = โˆ†> ฮฆ] ฮฆ , the following inequality holds kXฬ†k2 (k(โˆ†ฮฆ )Je k1 + k(โˆ†JG )> k2,1 ) + (Je + JG )k vec (โˆ†)k2โˆž /(2ฮป1 โˆง 2ฮป2 ) p โ‰ค kXฬ†k2 (k(โˆ†ฮฆ )Jec k1 + k(โˆ†JGc )> k2,1 ) + ฮถ Je + JG kXโˆ†b + Xฬ„ vec (โˆ†ฮฆ )k2 . (44) p Theorem 4. Assume  โˆผ N (0, ฯƒ 2 I). Take ฮป1 = A1 ฯƒ log(ep) and ฮป2 = p A2 ฯƒ log(ep) in (17)and suppose (X, Xฬ„, Xฬ†) satisfies C(Jeโˆ— , JGโˆ— , ฮถ, ฮป1 , ฮป2 ) for 32  > > be a some ฮถ โ‰ฅ 0, where Jeโˆ— = Je (ฮฆโˆ— ), JGโˆ— = JG (bโˆ— , ฮฆโˆ— ). Let โ„ฆฬ‚ = bฬ‚, ฮฆฬ‚ p global minimizer of (17). Define Jห† = {j : | vec (โ„ฆฬ‚)j | > 1 + ฮถ 2 (ฮป1 โˆง ฮป2 )}, and J โˆ— = {j : vec (โ„ฆโˆ— )j 6= 0}. Then for sufficiently large constants A1 and 2 2 A2 , with probability at least 1 โˆ’ Cpโˆ’c(A1 โˆงA2 ) , the estimate โ„ฆฬ‚ satisfies p k vec (โ„ฆฬ‚ โˆ’ โ„ฆโˆ— )kโˆž โ‰ค 1 + ฮถ 2 (ฮป1 โˆง ฮป2 ). If, in addition, the minimum signal strength satisfies p minโˆ— | vec (โ„ฆโˆ— )j | > 2 1 + ฮถ 2 (ฮป1 โˆง ฮป2 ), jโˆˆJ (45) 2 2 then Jห† = J โˆ— , with probability at least 1 โˆ’ Cpโˆ’c(A1 โˆงA2 ) . To recover the true support, signal strength conditions like (45) must be imposed. Interestingly, compared with Theorem 5.1 in Lounici et al. (2011), hierarchical variable selection can accommodate smaller signals than group variable selection. Proof. From the proof of Theorem 2, we get the following inequality with probability at least 1 โˆ’ Cpโˆ’cL 1 M (bโˆ— โˆ’ bฬ‚, ฮฆโˆ— โˆ’ ฮฆฬ‚) + Aฮปo ฯk(โˆ†ฮฆ )Jec k1 + Aฮปo ฯk(โˆ†JGc )> k2,1 2 1 3a1 1 1 โ‰ค (1 + )M (bโˆ— โˆ’ b, ฮฆโˆ— โˆ’ ฮฆ) + ( โˆ’ 1)M (โˆ†b , โˆ†ฮฆ ) 2 A0 โˆ’ 6 2 a1 a1 L + Aฮปo ฯk(โˆ†ฮฆ )Je k1 + Aฮปo ฯk(โˆ†JG )> k2,1 + ฯƒ 2 (Je + JG ) log(ep), 2(1 โˆ’ 6/A0 ) p where ฯ = kXฬ†k2 , L is a universal constant, ฮปo = ฯƒ log(ep), A2 = A0 L, and a1 , A0 are positive constants to be determined. Also recall that ฮป1 = A1 ฮปo , ฮป2 = A2 ฮปo , A = A1 โˆง A2 . 33 By the regularity condition, we have 1 1 (Je + JG )k vec (โˆ†)k2โˆž + M (bโˆ— โˆ’ bฬ‚, ฮฆโˆ— โˆ’ ฮฆฬ‚) 2 2 1 3a1 1 1 โˆ— โ‰ค (1 + )M (b โˆ’ b, ฮฆโˆ— โˆ’ ฮฆ) + ( โˆ’ 1)M (โˆ†b , โˆ†ฮฆ ) 2 A0 โˆ’ 6 2 a1 p a1 L + Aฮปo ฮถ Je + JG kXโˆ†b + Xฬ„ vec (โˆ†ฮฆ )k2 + ฯƒ 2 (Je + JG ) log(ep) 2(1 โˆ’ 6/A0 ) 1 3a1 1 1 1 )M (bโˆ— โˆ’ b, ฮฆโˆ— โˆ’ ฮฆ) + ( + โˆ’ 1)M (โˆ†b , โˆ†ฮฆ ) โ‰ค (1 + 2 A0 โˆ’ 6 2 a1 a2   a2 A0 2 a1 + ฮถ Lฯƒ 2 (Je + JG ) log(ep), + 2(1 โˆ’ 6/A0 ) 2 for any a2 > 0. Taking b = bโˆ— , ฮฆ = ฮฆโˆ— and choosing a1 = a2 = 1, A0 โ‰ฅ 7 give (Jeโˆ— +JGโˆ— )k vec (โ„ฆฬ‚โˆ’โ„ฆโˆ— )k2โˆž โ‰ค A0 (1 + ฮถ 2 )Lฯƒ 2 (Jeโˆ— +JGโˆ— ) log(ep). The conclusion follows. C An ADMM algorithm We describe an ADMM algorithm for solving problem (16). Recall Zฬ„ = [z 1 z 1 , ยท ยท ยท , z 1 z p , ยท ยท ยท , z p z 1 , ยท ยท ยท , z p z p ], Zฬ† = [x1 , z 1 z 1 , ยท ยท ยท , z 1 z p , ยท ยท ยท , xp , z p z 1 , ยท ยท ยท , z p z p ], and ฮ›โ„ฆ = 1ฮป> โ„ฆ . To apply ADMM, we rewrite (16) into 1 min ky โˆ’ Xb โˆ’ diag(ZฮฆZ > )k22 + kฮ›> โ„ฆ  + kฮปb ฮ“b k1 + kฮ›ฮฆ ฮ“ฮฆ k1 โ„ฆ,ฮ“,ฮฅ 2 ฮฅ> k2,1 (46) s.t. ฮ“ฮฆ = ฮ“> ฮฆ , ฮ“ = โ„ฆ, ฮฅ = โ„ฆ, 2 2 2 > p p ร—p where ฮฅ โˆˆ Rnร—(p +p) , ฮ“ = [ฮ“b , ฮ“> . The augฮฆ ] with ฮ“b โˆˆ R , ฮ“ฮฆ โˆˆ R mented Lagrangian of (46) can be formed by use of two Lagrangian multiplier matrices (L1 , L2 ) and a penalty parameter ฯ: Lฯ (โ„ฆ, ฮ“, ฮฅ, L1 , L2 )  1 = ky โˆ’ Zฬ†vec(โ„ฆ)k22 + kฮปb ฮ“b k1 + kฮ›ฮฆ ฮ“ฮฆ k1 + ฮน{ฮ“ฮฆ =ฮ“>ฮฆ } + kฮ›> ฮฅ> k2,1 โ„ฆ 2 ฯ + ฯ1> (L1 (โ„ฆ โˆ’ ฮ“) + L2 (โ„ฆ โˆ’ ฮฅ))1 + (kโ„ฆ โˆ’ ฮ“k2F + kโ„ฆ โˆ’ ฮฅk2F ). 2 34 Based on the proof of Theorem 1, we can solve the sub-optimization problems of ฮ“ and ฮฅ by some proximity operators; the details are omitted. The full ADMM algorithm is given as follows. Algorithm 2 An ADMM algorithm Inputs: Data: X, Z, y. Regularization parameters: ฮปb , ฮ›ฮฆ , ฮปโ„ฆ . repeat โˆ’1  >  > 1. vec(โ„ฆ) โ† Zฬ† Zฬ† + 2ฯI Zฬ† y + ฯ vec(ฮ“ + ฮฅ โˆ’ L1 โˆ’ L2 ) ; ~ S (โ„ฆ[:, k] + L2 [:, k]; ฮปโ„ฆ [k]/ฯ), โˆ€k : 1 โ‰ค k โ‰ค p; 2. ฮฅ[:, k] โ† ฮ˜ 3. โ„ฆ[2 : end, :] โ† (โ„ฆ[2 : end, :] + โ„ฆ[2 : end, :]> )/2; > 4. ฮ“ โ† ฮ˜S (โ„ฆ + L1 ; [ฮปb , ฮ›> ฮฆ ] /ฯ); 5. L2 โ† L2 + โ„ฆ โˆ’ ฮฅ; 6. L1 โ† L1 + โ„ฆ โˆ’ ฮ“; until convergence Output: โ„ฆ References Bauschke, H. H. and P. L. Combettes (2008). โ€œA Dykstra-like Algorithm for Two Monotone Operatorsโ€. Pacific Journal of Optimization 4 (3), 383โ€“ 391. Bickel, P. J., Y. Ritov, and A. B. Tsybakov (2009). โ€œSimultaneous Analysis of Lasso and Dantzig Selectorโ€. The Annals of Statistics, 1705โ€“1732. Bickel, P. J., Y. Ritov, and A. B. Tsybakov (2010). โ€œHierarchical Selection of Variables in Sparse High-Dimensional Regressionโ€. In Borrowing Strength: Theory Powering Applicationsโ€“A Festschrift for Lawrence D. Brown, pp. 56โ€“69. Institute of Mathematical Statistics. Bien, J., F. Bunea, and L. Xiao (2016). โ€œConvex Banding of the Covariance Matrixโ€. Journal of the American Statistical Association 111 (514), 834โ€“ 845. Bien, J., J. Taylor, and R. Tibshirani (2013). โ€œA Lasso for Hierarchical Interactionsโ€. The Annals of Statistics 41 (3), 1111โ€“1141. 35 Boyd, S., N. Parikh, E. Chu, B. Peleato, and J. Eckstein (2011). โ€œDistributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliersโ€. Foundations and Trends R in Machine Learning 3 (1), 1โ€“122. Chipman, H. (1996). โ€œBayesian Variable Selection with Related Predictorsโ€. Canadian Journal of Statistics 24 (1), 17โ€“36. Choi, N. H., W. Li, and J. Zhu (2010). โ€œVariable Selection With the Strong Heredity Constraint and its Oracle Propertyโ€. Journal of the American Statistical Association 105 (489), 354โ€“364. Cohen, J., P. Cohen, S. G. West, and L. S. Aiken (2013). Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. Routledge. Davidson, E. H. and D. H. Erwin (2006). โ€œGene Regulatory Networks and the Evolution of Animal Body Plansโ€. Science 311 (5762), 796โ€“800. Hamada, M. and C. J. Wu (1992). โ€œAnalysis of Designed Experiments With Complex Aliasingโ€. Journal of Quality Technology 24 (3), 130โ€“137. Hao, N. and H. H. Zhang (2014). โ€œInteraction Screening for Ultra-High Dimensional Dataโ€. Journal of the American Statistical Association 109 (1), 1285โ€“1301. Hastie, T., R. Tibshirani, and J. Friedman (2009). The Elements of Statistical Learning (2nd ed.). New York: Springer-Verlag. He, Y., Y. She, and D. Wu (2013). โ€œStationary-Sparse Causality Network Learningโ€. Journal of Machine Learning Research 14 (1), 3073โ€“3104. Jenatton, R., J. Mairal, G. Obozinski, and F. Bach (2011). โ€œProximal Methods for Hierarchical Sparse Codingโ€. Journal of Machine Learning Research 12, 2297โ€“2334. Laurent, B. and P. Massart (2000). โ€œAdaptive Estimation of a Quadratic Functional by Model Selectionโ€. The Annals of Statistics, 1302โ€“1338. Lim, M. and T. Hastie (2015). โ€œLearning Interactions via Hierarchical GroupLasso Regularizationโ€. Journal of Computational and Graphical Statistics 24 (3), 627โ€“654. 36 Lounici, K. (2008). โ€œSup-Norm Convergence Rate and Sign Concentration Property of Lasso and Dantzig Estimatorsโ€. Electronic Journal of Statistics 2, 90โ€“102. Lounici, K., M. Pontil, S. Van De Geer, and A. B. Tsybakov (2011). โ€œOracle Inequalities and Optimal Inference Under Group Sparsityโ€. The Annals of Statistics 39 (4), 2164โ€“2204. McCullagh, P. and J. A. Nelder (1989). Generalized Linear Models. London England Chapman and Hall. Negahban, S. N., P. Ravikumar, M. J. Wainwright, and B. Yu (2012). โ€œA Unified Framework for High-Dimensional Analysis of M -Estimators With Decomposable Regularizersโ€. Statistical Science 27 (4), 538โ€“557. Nelder, J. A. (1977). โ€œA Reformulation of Linear Modelsโ€. Journal of the Royal Statistical Society. Series A (General), 48โ€“77. Nesterov, Y. (2007). โ€œGradient Methods for Minimizing Composite Objective Functionโ€. Technical report, Universiteฬ catholique de Louvain, Center for Operations Research and Econometrics (CORE). Opial, Z. (1967). โ€œWeak Convergence of the Sequence of Successive Approximations for Nonexpansive Mappingsโ€. Bulletin of the American Mathematical Society 73 (4), 591โ€“597. Owen, A. B. (2007). โ€œA Robust Hybrid of Lasso and Ridge Regressionโ€. Contemporary Mathematics 443, 59โ€“72. Pace, R. K. and R. Barry (1997). โ€œSparse Spatial Autoregressionsโ€. Statistics & Probability Letters 33 (3), 291โ€“297. Peixoto, J. L. (1987). โ€œHierarchical Variable Selection in Polynomial Regression Modelsโ€. The American Statistician 41 (4), 311โ€“313. Peixoto, J. L. (1990). โ€œA Property of Well-Formulated Polynomial Regression Modelsโ€. The American Statistician 44 (1), 26โ€“30. Radchenko, P. and G. M. James (2010). โ€œVariable Selection Using Adaptive Nonlinear Interaction Structures in High Dimensionsโ€. Journal of the American Statistical Association 105 (492), 1541โ€“1553. 37 Ravikumar, P., M. J. Wainwright, and J. D. Lafferty (2010). โ€œHighDimensional Ising Model Selection Using `1 -Regularized Logistic Regressionโ€. The Annals of Statistics 38 (3), 1287โ€“1319. Ravikumar, P. D., H. Liu, J. D. Lafferty, and L. A. Wasserman (2007). โ€œSpAM: Sparse Additive Modelsโ€. In In Advances in Neural Information Processing Systems 20, pp. 1201โ€“1208. MIT Press. Rigollet, P. and A. Tsybakov (2011). โ€œExponential Screening and Optimal Rates of Sparse Estimationโ€. The Annals of Statistics 39 (2), 731โ€“771. Schmidt, M., N. L. Roux, and F. R. Bach (2011). โ€œConvergence Rates of Inexact Proximal-Gradient Methods for Convex Optimizationโ€. In J. ShaweTaylor, R. Zemel, P. Bartlett, F. Pereira, and K. Weinberger (Eds.), Advances in Neural Information Processing Systems 24, pp. 1458โ€“1466. She, Y. (2012). โ€œAn Iterative Algorithm for Fitting Nonconvex Penalized Generalized Linear Models With Grouped Predictorsโ€. Computational Statistics & Data Analysis 56 (10), 2976โ€“2990. She, Y., Y. He, and D. Wu (2014). Learning topology and dynamics of large recurrent neural networks. IEEE Transactions on Signal Processing 62, 5881โ€“5891. Simon, N., J. Friedman, T. Hastie, and R. Tibshirani (2013). โ€œA SparseGroup Lassoโ€. Journal of Computational and Graphical Statistics 22 (2), 231โ€“245. Tibshirani, R. (1996). โ€œRegression Shrinkage and Selection via the Lassoโ€. Journal of the Royal Statistical Society. Series B (Methodological), 267โ€“ 288. Tsybakov, A. (2009). Introduction to Nonparametric Estimation. Springer Series in Statistics. New York: Springer. van de Geer, S. (2014). โ€œWeakly Decomposable Regularization Penalties and Structured Sparsityโ€. Scandinavian Journal of Statistics 41 (1), 72โ€“86. Wei, F. and J. Huang (2010). โ€œConsistent Group Selection in HighDimensional Linear Regressionโ€. Bernoulli 16 (4), 1369โ€“1384. 38 Wu, J., B. Devlin, S. Ringquist, M. Trucco, and K. Roeder (2010). โ€œScreen and Clean: A Tool for Identifying Interactions in Genome-Wide Association Studiesโ€. Genetic epidemiology 34 (3), 275โ€“285. Yuan, M. and Y. Lin (2006). โ€œModel Selection and Estimation in Regression With Grouped Variablesโ€. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 68 (1), 49โ€“67. Zhang, C.-H. and J. Huang (2008). โ€œThe Sparsity and Bias of the Lasso Selection in High-Dimensional Linear Regressionโ€. The Annals of Statistics, 1567โ€“1594. Zhang, T. (2009). โ€œSome Sharp Performance Bounds for Least Squares Regression With L1 Regularizationโ€. The Annals of Statistics 37 (5A), 2109โ€“ 2144. Zou, H. and T. Hastie (2005). โ€œRegularization and Variable Selection via the Elastic Netโ€. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 67 (2), 301โ€“320. 39
10math.ST
Making up for the deficit in a marathon run Iztok Fister Jr.,1 DusฬŒan Fister,2 Suash Deb,3, 4 UrosฬŒ Mlakar,5 Janez Brest,5 and Iztok Fister5 1 University of Maribor, Faculty of Electrical Engineering and Computer Science, Smetanova 17, 2000 Maribor, Slovenia; Email: [email protected] 2 University of Maribor, Faculty of Mechanical Engineering, Smetanova 17, 2000 Maribor, Slovenia 3 arXiv:1705.03302v1 [cs.NE] 9 May 2017 4 IT & Educational Consultant, Ranchi, Jharkhand, India Distinguished Professorial Associate, Decision Sciences and Modelling Program, Victoria University, Melbourne, Australia 5 University of Maribor, Faculty of Electrical Engineering and Computer Science, Smetanova 17, 2000 Maribor, Slovenia (Dated: 10 February 2017) To predict the final result of an athlete in a marathon run thoroughly is the eternal desire of each trainer. Usually, the achieved result is weaker than the predicted one due to the objective (e.g., environmental conditions) as well as subjective factors (e.g., athleteโ€™s malaise). Therefore, making up for the deficit between predicted and achieved results is the main ingredient of the analysis performed by trainers after the competition. In the analysis, they search for parts of a marathon course where the athlete lost time. This paper proposes an automatic making up for the deficit by using a Differential Evolution algorithm. In this case study, the results that were obtained by a wearable sports-watch by an athlete in a real marathon are analyzed. The first experiments with Differential Evolution show the possibility of using this method in the future. 2 I. INTRODUCTION Running a marathon is a very challenging task for every athlete. Good and efficient preparation for a marathon is a very complex process that must be performed many time before the competition. The marathon is not just an ordinary running competition, but it is an epic distance having roots in ancient Greece. The marathon name was coined by the legend of soldier Philippides, who ran from the Battle of Marathon to Athens in order to announce the victory of the united Greeks against the Persian force. Nowadays, most of the big cities organize marathon competitions annually that attract a lot of people. Some athletes just want to finish a marathon, while others have higher goals. In line with this, the amateur athletes are satisfied with an achievement of around four hours, while more competitive amateur athletes try to beat the so-called magic line, the three hours. Although this magic result was set many years ago, running a marathon race sub three hours is still considered as a good result for a well-trained amateur athletes. However, those who would like to reach the result of sub three hours not only need the proper sports training, but also a lot of knowledge about a race course. Additionally, awareness of characteristics about an athleteโ€™s body is a crucial step in the evolution of runners, i.e., when to go faster, when to eat, when to slow down, how to pace on hills are some of the most significant questions that runners ask themselves when planning their running pace. Making up for the deficit time in a marathon run is a very demanding task4 that comes into play when the final results as predicted by sports trainers are slower than the achieved one by only a few seconds. Thus, more experienced athletes also calculate the pace for each kilometer of a race many weeks before the race start in order to predict their final achievement. However, the achieved result can distinguish from the predicted, because of objective, as well as subjective factors. The objective factors represent environmental conditions such as weather, temperature, wind position and even humidity, while the subjective factors refer to the athleteโ€™s psycho-physical conditions such as feelings on the race day. Nowadays, predicting the final result is a little bit easier using the modern mobile technology. In this group, we can count professional sports-watches that consist also of Global Positioning System (GPS) sensors3 , heart rate measuring sensors, cadence meters, etc. Additionally, there is a comprehensive software support and some intelligent systems have also been arisen recently. In this paper, we present a novel solution for making up for the deficit marathon run that is based on the data collected from sports-watches worn by the athlete during the run. The primary aim of 3 this study is to help athletes who did not achieve the predicted final results by a few seconds and show them on which parts of the predefined course they could improve the intermediate pace so that the predicted results could be reached. This solution is implemented using Differential Evolution (DE)6 , which calculates the improvement of the intermediate pace, based on the configuration of the running course. These improvements are considered as constraints in the DE and they base on the traditional rule of the marathon run, i.e., more seconds can be caught up when the running course is flat. The secondary aim of this approach is also to help athletes in their analysis of the already performed marathon race. In our case study, we focus on the situation where an athlete tries to achieve the magic marathon time of three hours. The paper is structured in the remainder as follows. In Section II, making up for the deficit in a marathon run is formulated as a Constraint Satisfaction Problem (CSP). Section III is devoted to Differential Evolution. Section IV illustrates the case study, in which the case of an athlete in the Three hearts marathon in 2012 is taken into consideration. Experiments are presented in the second part of Section IV. The paper is concluded with Section V, where the work done is reviewed and directions are outlined for further research. II. PROBLEM FORMULATION Making up for the deficit time can be formulated as a CSP2 , where the solution is specified as a vector p = (p1 , . . . , pn )T of n problem variables representing the intermediate pace deficit for each of the observed kilometer. Additionally, a variable bound constraint is attached to each problem (L) (U ) (L) variable that limits the proper values of each variable to the interval pi โˆˆ [pi , pi ], where pi (U ) and pi are lower and upper bounds, respectively. In the case of a marathon race, where the length of the whole course equals 42.195 km, the length of each vector is, consequently, n = 43 elements. Then, the problem is defined in generalized form as follows: n X max f (p) = pi โ‰ค Ta โˆ’ Tp , (1) i=1 subject to (L) pi โ‰ค pi โ‰ค (U ) pi , i = 1, . . . , n; where Ta โˆ’ Tp denotes the deficit time that must be made up and the relation Ta โ‰ฅ Tp is valid. Thus, the following inequality constraints must be satisfied: n X (L) pi โ‰ฅ Ta โˆ’ Tp , (2) i=1 which ensures that the problem is solvable. Although the upper bounds can be set as negation (U ) of the corresponding lower bounds (i.e., pi (L) = โˆ’pi in general, here the upper bounds are fixed to 4 (U ) zero (i.e., pi = 0). This mean that only negative values of intermediate pace deficits are allowed in our study. (L) The lower bound values pi are calculated from the configuration of the course according to the following assumptions: ๏ฃฑ ๏ฃด ๏ฃด = 0, flat, 7 โˆ’2 sec, โ†’ ๏ฃด ๏ฃฒ Alt i = < 0, downhill, โ†’ 7 โˆ’4 sec, ๏ฃด ๏ฃด ๏ฃด ๏ฃณ > 0, uphill, 7 0 sec, โ†’ (3) where Alt i is an average altitude obtained in the appropriate kilometer. The speculation behind the assumptions is to speed up, when the course is flat or downward and to retain the speed when running upward. The quantitative values for estimation of deficit time is also taken from the real marathon practice, where it holds that the deficit time can be a maximum of 4 seconds in one kilometer when the course is flat. III. DIFFERENTIAL EVOLUTION Differential Evolution (DE) is an Evolutionary Algorithm appropriate for continuous and combinatorial optimization that was introduced by Storn and Price in 19951,6 . DE is a population-based algorithm5 that consists of Np real-coded vectors representing the candidate solutions, as follows: (t) (t) (t) xi = (xi,1 , . . . , xi,n ), for i = 1, . . . , Np, (t) (L) (U ) (4) (L) where each element of the solution is in the interval xi,1 โˆˆ [xi , xi ], and xi (U ) and xi denote the lower and upper bounds of the i-th variable, respectively. The variation operator in DE supports a differential mutation and a differential crossover. In particular, the differential mutation selects two solutions randomly and adds a scaled difference between these to the third solution. This mutation can be expressed as follows: (t) (t) (t) (t) ui = xr1 + F ยท (xr2 โˆ’ xr3 ), for i = 1, . . . , Np, (5) where F denotes the scaling factor as a positive real number that scales the rate of modification while r1, r2, r3 are randomly selected values in the interval [1 . . . Np]. Note that, typically, the interval F โˆˆ [0.1, 1.0] is used in the DE community. As a differential crossover, uniform crossover is employed by the DE, where the trial vector is built from parameter values copied from two different solutions. Mathematically, this crossover 5 can be expressed as follows: (t+1) wi,j = ๏ฃฑ ๏ฃด ๏ฃฒu(t) i,j randj (0, 1) โ‰ค CR โˆจ j = jrand , ๏ฃด ๏ฃณx(t) i,j otherwise, (6) where CR โˆˆ [0.0, 1.0] controls the fraction of parameters that are copied to the trial solution. Note, (t) the relation j = jrand ensures that the trial vector is different from the original solution xi . A differential selection is, in fact, a generalized one-to-one selection that can be expressed mathematically as follows: (t+1) xi = ๏ฃฑ ๏ฃด ๏ฃฒw(t) i if f (wi ) โ‰ค f (xi ), ๏ฃด ๏ฃณx(t) i otherwise . (t) (t) (7) In a technical sense, crossover and mutation can be performed in several ways in Differential Evolution. Therefore, a specific notation is used to describe the varieties of these methods (also strategies) generally. For example, โ€™DE/rand/ 1/binโ€™ denotes that the base vector is selected randomly, 1 vector difference is added to it, and the number of modified parameters in the mutant vector follows binomial distribution. A. Making up for the deficit time using DE Modifying the original DE to solve a problem of making up for the deficit time in a marathon run (let us call a new variant marathon DE or simply mDE) is relatively simple, because DE implements the variable bounds implicitly. Therefore, the main problem remains how to set the appropriate variable bounds for elements of solution vectors. The answer to this question is given when intermediate pace of an athlete is taken into consideration. The intermediate paces are, nowadays obtained using the mobile sports-watches worn by the marathon runner during the run. There are four phases of modifying the original DE for making up for the deficit time in a marathon run, as follows: โ€ข defining the objective โ€ข preparing the bounds for problem variables โ€ข mapping the solution from decision space to problem space โ€ข evaluating the solution in problem space 6 Indeed, defining the objective refers to the expression Ta โˆ’ Tp in Eq. (2), where we define the total deficit of time that must be made up. Preparing the bounds for problem variables pi,j bases on tracked data from sports-watches referring to the information about altitude as overcome by the marathon runner in each kilometer (Eq. (3)). According to these data, the appropriate boundary (t) values are calculated according to Eq. (3). The mapping of solution from decision space xi to its (t) counterpart in the problem space pi is straightforward and obeys the following equation: & (t) pi,j = (U ) pj (U ) xj (L) โˆ’ pj โˆ’ (L) xj ' ยท (t) xi,j ยท 10 ยท 10โˆ’1 , (8) where multiplying by 10โˆ’1 ensures that the given result in seconds is extended with the most significant digit of milliseconds after decimal point. Finally, the fitness function presented in Eq. (1) is used in our study. (t) In order to simplify solving of the problem, the last element in vector pi that does not represent the whole kilometer is excluded from the optimization, i.e., it is taken as an uphill part, although it can be downhill in practice as is in our case. IV. CASE STUDY: THE THREE HEARTS MARATHON 2012 The Three Hearts marathon has been organized annually in the city of Radenci (Slovenia) since 1981. During the years, the organizers have changed the marathon course slightly. In 2012, the marathon course consisted of two 21.1 kilometer long laps as can be seen in Figure 1. The goal of FIG. 1. Three Hearts marathon course in 2012. an athlete in our study was to run the marathon sub 3:00 hours. However, to run the marathon in this time, the intermediate pace should be on average 4:15 minutes per kilometer (min/km) (Figure 2) or better (less than 4:15). The athleteโ€™s plan was to run the first kilometers a little bit faster than the others. Although the course was flat on average, he did not focus enough on 7 FIG. 2. Average pace for each kilometer. some ascents with a slight uphill that were large enough to lose a power, especially in bad weather conditions. After 30 km, the time was still good enough for achieving the result under 3:00 hours, but the last kilometers were pretty hard to overcome because of a formerly broken nail, abrasions from the heat and many blisters. Therefore, the athlete was one minute slower at the finish than planned. FIG. 3. Ascents and descents on the course of Three Hearts marathon at 2012. The proposed approach for making up for the deficit time works as follows. The objective is expressed as: 3 : 01 : 09.4 โˆ’ 3 : 00 : 00.0 = 1 : 09.4 min โ‰ˆ 70 sec. An altitude graph of the marathon course, from which problem variable bounds were prepared, is presented in Figure 3. 8 The graph in Figure 3 presents differences of altitudes in meters according to the run distances in kilometers that is divided into two parts denoting 21.1 km by a vertical line. Although both parts must be the same in theory, this assumption does not hold in practice, because GPS technology, used by sports-watches, is far from ideal for now. However, the tracked data are accurate enough for the purposes of our study. The results of an analysis of altitude data are as follows. The GPS receiver detected 4 flat parts, 22 uphillโ€˜s and 17 downhills. The last 195 meters were downward. Essentially, the difference between the number of uphillโ€˜s and downhills is a consequence of errors in the GPS receiver. On the other hand, there were no serious uphillโ€˜s and downhills on the marathon course as can be seen from the maximum and minimum differences of the altitude (i.e., ยฑ10 meters). In fact, the difference between average ascent and average descent values at the end of each kilometer higher than ยฑ1 meter is declared as uphill or downhill in the study. (t) Bounds for problem variables pi were prepared based on the analysis of the altitude data according to Eq. (3). The results of this phase are illustrated in Table I under columns โ€Lower P (L) boundsโ€ and โ€Upper boundsโ€. The sum of the lower bounds of all problem variables is nj=1 pi,j = 82, whereby a condition of the problem solvability in Eq. (2) was satisfied. The last two phases, i.e., mapping and evaluating the solution, were performed using the mDE. For our experiments, mDE was coded in Python programming language and the โ€™DE/rand/1/binโ€™ strategy was employed. The input of the algorithm were data obtained from the Three Hearts marathon. The dimension of the problem was n = 43, population size was set to Np = 100, scaling factor F = 0.5 and crossover rate CR = 0.9. Lower and upper bounds were set in the (t) interval xi,j โˆˆ [0, 1]. The algorithm terminated when either fitness function fulfilled the objective and, thus, all constraints were satisfied 100 times, or the number of fitness function evaluations exceeded 80,000. Only one run of the mDE was performed in this study. The obtained results of the mDE algorithm are presented in Table I that consists of six columns. The first column counts kilometers during the marathon run, while the second illustrates actual intermediate pace, as already presented in Figure 2. The third column depicts the predicted intermediate pace obtained after decrementing the actual intermediate pace by the intermediate pace deficit found in the first run that is presented in column four. The last values are obtained after conducting the mDE algorithm. As already mentioned, the last two columns present lower and upper bounds. 9 TABLE I. Results of making up for the deficit in the Three Hearts marathon Distance Actual pace (sec) Predicted pace (sec) Difference Lower bounds Upper bounds [km] [min/km] [min/km] [sec] [sec] [sec] 1 04:03.80 04:03.80 0 0 0 2 04:05.40 04:03.60 1.8 2 0 3 04:09.70 04:05.90 3.8 4 0 4 04:12.20 04:08.50 3.7 4 0 5 04:15.00 04:15.00 0 0 0 6 04:07.70 04:04.30 3.4 4 0 7 04:09.70 04:09.70 0 0 0 8 04:11.20 04:11.20 0 0 0 9 04:11.00 04:07.80 3.2 4 0 10 04:10.30 04:10.30 0 0 0 11 04:13.80 04:10.00 3.8 4 0 12 04:08.80 04:07.00 1.8 2 0 13 04:09.10 04:07.30 1.8 2 0 14 04:10.70 04:09.70 1 2 0 15 04:07.90 04:07.90 0 0 0 16 04:14.40 04:12.70 1.7 2 0 17 04:11.20 04:07.30 3.9 4 0 18 04:13.00 04:13.00 0 0 0 19 04:10.00 04:06.40 3.6 4 0 20 04:13.60 04:13.60 0 0 0 21 04:03.00 04:03.00 0 0 0 22 04:06.40 04:06.40 0 0 0 23 04:10.00 04:08.30 1.7 2 0 24 04:12.00 04:08.50 3.5 4 0 25 04:23.80 04:21.20 2.6 4 0 26 04:08.40 04:08.40 0 0 0 27 04:08.00 04:04.30 3.7 4 0 28 04:07.60 04:03.80 3.8 4 0 29 04:24.40 04:22.80 1.6 2 0 30 04:17.00 04:14.40 2.6 4 0 31 04:09.30 04:09.30 0 0 0 32 04:13.70 04:10.30 3.4 4 0 33 04:14.70 04:10.80 3.9 4 0 34 04:12.60 04:11.00 1.6 2 0 35 04:18.60 04:18.60 0 0 0 36 04:31.90 04:31.90 0 0 0 37 04:27.80 04:27.80 0 0 0 38 04:37.70 04:33.90 3.8 4 0 39 04:37.40 04:34.60 2.8 4 0 40 04:45.20 04:43.70 1.5 2 0 41 04:53.70 04:53.70 0 0 0 42 04:52.40 04:52.40 0 0 0 42.195 01:45.30 01:45.30 0 0 0 Total: 03:01:09.40 02:59:59.40 70 82 0 A. Discussion At a first glance, the conducted experiments are in contrast with the principles of stochastic population-based optimization, where we are interested in the mean values obtained after the number of runs. Strictly speaking, this is true, when the results are obtained from the aforementioned 10 point of view. However, the aim of our study was twofold: On the one hand, to show that the mDE algorithm can be employed for making up the deficit in a marathon race, while on the other hand, to prove that there are many solutions of this problem. Both assumptions were justified by finding numerous feasible solutions in just one run. Here, the question arises โ€Could we say, which of the solutions found is really optimal?โ€. However, the answer to the question must be answered by professionals, i.e., sports trainers and coaches together with athletes. V. CONCLUSION This paper reports the first successful application of the mDE for making up for the deficit in a marathon run based on the history data obtained by a sports-tracker on the corresponding marathon course. Making up for the deficit in a marathon run is a complex task that is usually performed by professional trainers and even athletes themselves. We defined this problem as a constraint problem and solved it by the mDE. Preliminary experiments shown that proposed approach may be used in the real-world. However, there are still many open directions for further research in this problem, e.g., to determine the most appropriate solution for a specific athlete from a huge set of solutions. In line with this, context dependent information need to be accumulated, on which basis such a solution can be proposed by the mDE algorithm automatically. However, extending input data with a heart rate monitor might also increase the prediction possibilities of the proposed algorithm. 1 S. Das, S. S. Mullick, and P. Suganthan. Recent advances in differential evolutionโ€“an updated survey. Swarm and Evolutionary Computation, 27:1โ€“30, 2016. 2 A. E. Eiben and J. E. Smith. Introduction to evolutionary computing, volume 53. Springer, 2003. 3 I. Fister, D. Fister, S. Fong, and I. Fister Jr. Widespread mobile devices in applications for real-time drafting detection in triathlons. Journal of emerging technologies in web intelligence, 5(3):310โ€“321, 2013. 4 I. Fister Jr., K. LjubicฬŒ, P. N. Suganthan, M. Perc, and I. Fister. Computational intelligence in sports: Challenges and opportunities within a new research domain. Applied Mathematics and Computation, 262:178โ€“186, 2015. 5 I. Fister Jr., X.-S. Yang, I. Fister, J. Brest, and D. Fister. A brief review of nature-inspired algorithms for optimization. ElektrotehnisฬŒki vestnik, 80(3):116โ€“122, 2013. 6 R. Storn and K. Price. Differential evolutionโ€“a simple and efficient heuristic for global optimization over continuous spaces. Journal of global optimization, 11(4):341โ€“359, 1997.
9cs.NE
1 Hybrid Precoder and Combiner Design with Low Resolution Phase Shifters in mmWave MIMO Systems arXiv:1710.06192v1 [cs.IT] 17 Oct 2017 Zihuan Wang, Student Member, IEEE, Ming Li, Senior Member, IEEE, Qian Liu, Member, IEEE, and A. Lee Swindlehurst, Fellow, IEEE Abstractโ€”Millimeter wave (mmWave) communications have been considered as a key technology for next generation cellular systems and Wi-Fi networks because of its advances in providing orders-of-magnitude wider bandwidth than current wireless networks. Economical and energy-efficient analog/digial hybrid precoding and combining transceivers have been often proposed for mmWave massive multiple-input multiple-output (MIMO) systems to overcome the severe propagation loss of mmWave channels. One major shortcoming of existing solutions lies in the assumption of infinite or high-resolution phase shifters (PSs) to realize the analog beamformers. However, low-resolution PSs are typically adopted in practice to reduce the hardware cost and power consumption. Motivated by this fact, in this paper, we investigate the practical design of hybrid precoders and combiners with low-resolution PSs in mmWave MIMO systems. In particular, we propose an iterative algorithm which successively designs the low-resolution analog precoder and combiner pair for each data stream, aiming at conditionally maximizing the spectral efficiency. Then, the digital precoder and combiner are computed based on the obtained effective baseband channel to further enhance the spectral efficiency. In an effort to achieve an even more hardware-efficient large antenna array, we also investigate the design of hybrid beamformers with one-bit resolution (binary) PSs, and present a novel binary analog precoder and combiner optimization algorithm with quadratic complexity in the number of antennas. The proposed low-resolution hybrid beamforming design is further extended to multiuser MIMO communication systems. Simulation results demonstrate the performance advantages of the proposed algorithms compared to existing lowresolution hybrid beamforming designs, particularly for the onebit resolution PS scenario. Index Termsโ€”Millimeter wave (mmWave) communications, hybrid precoder, multiple-input multiple-output (MIMO), phase shifters, one-bit quantization. I. I NTRODUCTION The past decade has witnessed the exponential growth of data traffic along with the rapid proliferation of wireless deZihuan Wang and Ming Li are with the School of Information and Communication Engineering, Dalian University of Technology, Dalian, Liaoning 116024, China, (e-mail: [email protected], [email protected]). Qian Liu is with the School of Computer Science and Technology, Dalian University of Technology, Dalian, Liaoning 116024, China (e-mail: [email protected]). A. L. Swindlehurst is with the Center for Pervasive Communications and Computing, University of California, Irvine, CA 92697 USA and also with the Institute for Advanced Study, Technical University of Munich,Munchen 80333, Germany (e-mail: [email protected]). This paper is supported by the National Natural Science Foundation of China (Grant No. 61671101 and 61601080) and the Fundamental Research Funds for the Central Universities (Grant No. DUT15RC(3)121 and DUT17JC10). vices. This flood of mobile traffic has significantly exacerbated spectrum congestion in current frequency bands, and therefore stimulated intensive interest in exploiting new spectrum bands for wireless communications. Millimeter wave (mmWave) wireless communications, operating in the frequency bands from 30-300 GHz, have been demonstrated as a promising candidate to fundamentally solve the spectrum congestion problem [1]-[3]. However, challenges always come along with opportunities. MmWave communications still need to overcome several technical difficulties before real-world deployment. As a negative result of the ten-fold increase of the carrier frequency, the propagation loss in mmWave bands is much higher than that of conventional frequency bands (e.g. 2.4 GHz) due to atmospheric absorption, rain attenuation, and low penetration [4]. From a positive perspective, the smaller wavelength of mmWave signals allows a large antenna array to be packed in a small physical dimension [5]. With the aid of pre/post-coding techniques in massive multiple-input multiple-output (MIMO) systems, the large antenna array can provide sufficient beamforming gain to overcome the severe propagation loss of mmWave channels. It also enables simultaneous transmission of multiple data streams resulting in significant improvements to spectral efficiency. For MIMO systems operating in conventional cellular frequency bands, the full-digital precoder and combiner are completely realized in the digital domain by adjusting both the magnitude and phase of the baseband signals. However, these conventional full-digital schemes require a large number of expensive and energy-intensive radio frequency (RF) chains, analog-to-digital converters (ADCs), and digital-toanalog converters (DACs). Since mmWave communication systems operate at much higher carrier frequencies and wider bandwidths, the enormous cost and power consumption of the required RF chains and ADCs/DACs make the adoption of full-digital precoding and combining schemes impractical for mmWave systems. Recently, economical and energy-efficient analog/digital hybrid precoders and combiners have been advocated as a promising approach to tackle this issue. The hybrid precoding approaches adopt a large number of phase shifters (PSs) to implement high-dimensional analog precoders to compensate for the severe path-loss at mmWave bands, and a small number of RF chains and DACs to realize lowdimensional digital precoders to provide the necessary flexibility to perform advanced multiplexing/multiuser techniques. The investigation of hybrid precoder and combiner design has attracted extensive attention in recent years because of its potential energy efficiency for mmWave MIMO communications. The major challenges in designing hybrid precoders are the practical constraints associated with the analog components, such as the requirement that the analog precoding be implemented with constant modulus PSs. Thus, hybrid precoder design typically requires the solution of various matrix factorization problems with constant modulus constraints. In particular, a popular solution to maximize the spectral efficiency of point-to-point transmission is to minimize the Euclidean distance between the hybrid precoder and the fulldigital precoder [6]-[10]. Hybrid precoder design for partiallyconnected architectures are also studied in [11]-[13]. Due to the special characteristics of mmWave channels, codebookbased hybrid precoder designs are commonly proposed [14][18], in which the columns of the analog precoder are selected from certain candidate vectors, such as array response vectors of the channel and discrete Fourier transform (DFT) beamformers. Extensions of the hybrid beamformer design to multiuser mmWave MIMO systems have also been investigated in [19]-[27]. The aforementioned existing hybrid precoder and combiner designs generally assume that infinite or high-resolution PSs are used for implementing the analog beamformers in order to achieve satisfactory performance close to the full-digital scheme. However, implementing infinite/high-resolution PSs at mmWave frequencies would significantly increase the energy consumption and complexity of the required hardware circuits [28], [29]. Obviously, it is impractical to employ infinite/high-resolution PSs for mmWave systems and realworld analog beamformers will be implemented with lowresolution PSs. Consequently, an important research direction is the exploration of signal processing techniques for hybrid analog/digital architectures that can mitigate the loss of beamforming accuracy due to the low-resolution PSs. A straightforward approach to obtain the finite-resolution beamformer is to design the infinite-resolution analog beamformer first, and then directly quantize each phase term to a finite set [30]. However, this solution becomes inefficient when the PSs have very low resolution. An alternative solution for hybrid beamforming with finite-resolution PSs is codebook-based design [14]-[18]. However, for low-resolution PSs, the size of the codebook is very small and the resulting performance is not satisfactory. In [31], [32], Sohrabi and Yu proposed to iteratively design the low-resolution hybrid precoder to maximize the spectral efficiency. However, the performance of this algorithm often suffers when one-bit quantized PSs are applied. In this paper, we first consider the problem of designing hybrid precoders and combiners with low-resolution PSs for a point-to-point mmWave MIMO system. The objective of the proposed algorithm is to minimize the performance loss caused by the low-resolution PSs while maintaining a low computational complexity. To achieve this goal, we propose to successively design the low-resolution analog precoder and combiner pair for each data stream, aiming at conditionally maximizing the spectral efficiency. An iterative phase match- ing algorithm is introduced to implement the low-resolution analog precoder and combiner pair. Then, the digital precoder and combiner are computed based on the obtained effective baseband channel to further enhance the spectral efficiency. Note that the power consumption and cost of the PS are proportional to its resolution. For example, a 4-bit (i.e. 22.5โ—ฆ) resolution PS at mmWave frequencies requires 45-106 mW, while a 3-bit (i.e. 45โ—ฆ ) resolution PS needs only 15 mW [29]. In an effort to achieve maximum hardware efficiency, we also investigate the design of hybrid beamformers with one-bit resolution (binary) PSs. Inspired by the findings in [33], we present a binary analog precoder and combiner optimization algorithm under a rank-1 approximation of the interference-included equivalent channel. This algorithm has quadratic complexity in the number of antennas and can achieve almost the same performance as the optimal exhaustive search method. Finally, our investigation of low-resolution hybrid precoders and combiners is extended to multiuser mmWave MIMO systems. Numerical results in the simulation section demonstrate that the proposed algorithms can offer a performance improvement compared with existing lowresolution hybrid beamforming schemes, especially for the one-bit resolution PS scenario. Notation: The following notation is used throughout this paper. Boldface lower-case and upper-case letters indicate column vectors and matrices, respectively. (ยท)T and (ยท)H denote the transpose and transpose-conjugate operations, respectively. E{ยท} represents statistical expectation. Re{ยท} extracts the real part of a complex number; sign(ยท) denotes the sign operator; angle{ยท} represents the phase of a complex number. IL indicates an L ร— L identity matrix. C denotes the set of complex numbers. |A| denotes the determinant of matrix A. |A| denotes the cardinality of set A. |a| and kak are the magnitude and norm of a scalar a and vector a, respectively. kAkF denotes the Frobenius norm of matrix A. Finally, we adopt a Matlab-like matrix indexing notation: A(:, i) denotes the i-th column of matrix A; A(i, j) denotes the element of the i-th row and the j-th column of matrix A; a(i) denotes the i-th element of vector a. II. S YSTEM M ODEL AND P ROBLEM F ORMULATION A. Point-to-Point mmWave MIMO System Model We first consider a point-to-point mmWave MIMO system using a hybrid precoder and combiner with low-resolution PSs, as illustrated in Fig. 1. The transmitter employs Nt antennas and NtRF RF chains to simultaneously transmit Ns data streams to the receiver which is equipped with Nr antennas and NrRF RF chains. To ensure the efficiency of the mmWave communication with a limited number of RF chains, the number of data streams and the number of RF chains are constrained as Ns = NtRF = NrRF . The transmitted symbols are first processed by a baseband RF digital precoder FBB โˆˆ CNt ร—Ns , then up-converted to the RF RF domain via Nt RF chains before being precoded with an analog precoder FRF of dimension Nt ร— NtRF . While the baseband digital precoder FBB enables both amplitude and phase modifications, the elements of the analog precoder Fig. 1. The point-to-point mmWave MIMO system using hybrid precoder and combiner. FRF , which are implemented by the PSs, have a constant amplitude โˆš1N and quantized phases: FRF (i, j) = โˆš1N ejฯ‘i,j , t t in which the phase ฯ‘i,j is quantized as ฯ‘i,j โˆˆ B , { 2ฯ€b 2B | b = 1, 2, . . . , 2B }, and B is the number of bits to control the phase. We denote the constraint set of the analog precoder as follows: 2ฯ€b FRF (i, j) โˆˆ F , { โˆš1N ej 2B | b = 1, 2, . . . , 2B }. Obviously, t a larger number of bits B leads to finer resolution for the PSs and potentially better performance, but also results in higher hardware complexity and power consumption. The discrete-time transmitted signal can be written in the following form โˆš (1) x = P FRF FBB s where s is the Ns ร— 1 symbol vector, E{ssH } = N1s INs , P represents transmit power and this power constraint is enforced by normalizing FBB such that kFRF FBB k2F = Ns . We consider a narrow-band slow-fading propagation channel, which yields the following received signal y = = Hx + n โˆš P HFRF FBB s + n R = log2 INs + P โˆ’1 H H R WBB WRF HFRF FBB ร— Ns n ! H H FH BB FRF H WRF WBB where WRF is the Nr ร— NrRF analog combiner whose elements have the same constraint as FRF , i.e. WRF (i, j) = โˆš1 ejฯ•i,j , ฯ•i,j โˆˆ B and thus WRF (i, j) โˆˆ W , N , (4) H H WRF WRF WBB is the noise covariwhere Rn , ฯƒn2 WBB ance matrix after combining. We aim to jointly design the digital beamformers FBB , WBB as well as the low-resolution analog beamformers FRF , WRF to maximize the spectral efficiency: o n โ‹† โ‹† = arg max R , WBB Fโ‹†RF , Fโ‹†BB , WRF s. t. (2) where y is the Nr ร— 1 received signal vector, H is the Nr ร— Nt channel matrix, and n โˆผ CN (0, ฯƒ 2 INr ) is the complex Gaussian noise vector corrupting the received signal. The receiver employs an analog combiner implemented by the PSs and a digital combiner using NrRF RF chains to process the received signal. The signal after the spatial processing has the form โˆš H H H H b WRF HFRF FBB s + WBB WRF n (3) s = P WBB r hardware constraint, we aim to jointly design the hybrid precoder and combiner for a mmWave MIMO system. When Gaussian symbols are transmitted over the mmWave MIMO channel, the achievable spectral efficiency is given by FRF (i, j) โˆˆ F , โˆ€i, j, WRF (i, j) โˆˆ W, โˆ€i, j, kFRF FBB k2F (5) = Ns , kWRF WBB k2F = Ns . Obviously, the optimization problem (5) is a non-convex NPhard problem. In the next section, we attempt to decompose the original problem into a series of sub-problems and seek a sub-optimal solution with low-complexity and satisfactory performance. III. L OW-R ESOLUTION H YBRID P RECODER C OMBINER D ESIGN AND 2ฯ€b { โˆš1N ej 2B | b = 1, 2, . . . , 2B }, WBB is the NrRF ร—Ns digital r baseband combiner and the combiner matrices are normalized such that kWRF WBB k2F = Ns . B. Problem Formulation We consider the practical and hardware-efficient scenario in which the PSs have very low-resolution (e.g. B = 1, 2) to reduce the power consumption and complexity. Under this To simplify the joint hybrid precoder and combiner design, the objective problem is decomposed into two separate optimizations. We first focus on the joint design of the analog precoder FRF and combiner WRF . Then, having the effective baseband channel associated with the obtained optimal analog precoder and combiner, the digital precoder FBB and combiner WBB are computed to further maximize the spectral efficiency. A. Low-Resolution Analog Precoder and Combiner Design We observe that under the assumption of high signal-tonoise-ratio (SNR), the achievable spectral efficiency in (4) can be approximated as R โ‰ˆ log2 P โˆ’1 H H R WBB WRF HFRF FBB ร— Ns n ! H H FH BB FRF H WRF WBB . (6) While the per-antenna SNR in mmWave systems is typically low, the post-combining SNR should be high enough to justify this approximation. In addition, it has been verified in [32] that for large-scale MIMO systems, the optimal analog beamformers are approximately orthogonal, i.e. FH RF FRF โˆ INtRF . RF 2 = โ‰ˆ ฮถ I This enables us to assume FBB FH N s when Nt BB 2 Ns , where ฮถ is a normalization factor. Similarly, we have H H H WRF WRF WBB โ‰ˆ INs . WBB WBB โ‰ˆ ฮพ 2 INs and WBB 2 2 2 Let ฮณ , ฮถ ฮพ , then (6) can be further simplified as ! P ฮณ2 H R โ‰ˆ log2 (7) WH HFRF FH RF H WRF Ns ฯƒ 2 RF !   P ฮณ2 (a) H (8) + 2 ร— log2 WRF HFRF = Ns log2 Ns ฯƒ 2 where (a) follows since |XY| = |X||Y| when X and Y are both square matrices. Therefore, the analog precoder and combiner design with low-resolution PSs can be approximately reformulated as:   โ‹† โ‹† H {FRF , WRF } = arg max log2 WRF HFRF s. t. FRF (i, j) โˆˆ F , โˆ€i, j, WRF (i, j) โˆˆ W, โˆ€i, j. (9) Unfortunately, the optimization problem (9) is still NP-hard RF RF and has exponential complexity O(|F |Nt Nt |W|Nr Nr ). Therefore, we propose to further decompose this difficult optimization problem into a series of sub-problems, in which each transmit/receive RF chain pair is considered one by one and the analog precoder and combiner for each pair are successively designed. In particular, we define the singular value decomposition (SVD) of H as H = UฮฃVH (10) where U is an Nr ร—Nr unitary matrix, V is an Nt ร—Nt unitary matrix, and ฮฃ is a rectangular diagonal matrix of singular values. Due to the sparse nature of the mmWave channel, the matrix H is typically low rank. In particular, the effective rank of the channel serves as an upper bound for the number of data streams Ns that the channel can support. Thus, we assume that the channel H can be well approximated by retaining only the bฮฃ bV b H , where U b , U(:, 1 : Ns strongest components H โ‰ˆ U b b Ns ), ฮฃ , ฮฃ(1 : Ns , 1 : Ns ), and V , V(:, 1 : Ns ). Then, the objective in (9) can be converted to     H b b bH H โ‰ˆ log2 WRF UฮฃV FRF .(11) log2 WRF HFRF Next, we write the analog precoding and combining matrices as FRF , [fRF,1 . . . fRF,Ns ] and WRF , [wRF,1 . . . wRF,Ns ], respectively, where fRF,l and wRF,l , l = 1, . . . , Ns , are the analog precoder and combiner pair for the l-th data stream. Furthermore, we denote FRF,\l as the precoding matrix excluding the l-th precoder vector fRF,l and WRF,\l as the combining matrix excluding the lth combiner vector wRF,l . Then, the formulation (11) can be further transformed to (12)-(16), which are presented at the top of following page, where ฮฑ is a very small scalar to assure invertibility. Thus, the objective in (9) can be reformulated as: log2  H WRF HFRF  โ‰ˆ log2 +log2 H HFRF,\l WRF,\l H wRF,l Ql fRF,l ! ! (17) where we define the interference-included channel matrix Ql as H b โˆ’1 ฮฃ bV b H. b bH b Ql , U(ฮฑI Ns + ฮฃV FRF,\l WRF,\l U) (18) According to (17), if FRF,\l and WRF,\l are known, the problem (9) can be reformulated as finding a corresponding precoder fRF,l and combiner wRF,l pair to conditionally maximize the achievable spectral efficiency:  โ‹† โ‹† H fRF ,l , wRF ,l = arg max wRF,l Ql fRF,l s. t. fRF ,l (i) โˆˆ F , i = 1, . . . , Nt , (19) wRF ,l (j) โˆˆ W, j = 1, . . . , Nr . This motivates us to propose an iterative algorithm, which starts with appropriate initial RF precoding and combining matrices then successively designs fRF ,l and wRF ,l according to (19) with an updated Ql as in (18) until the algorithm converges. The complexity of obtaining an optimal solution to (19) for each iteration is now reduced to O(|F |Nt |W|Nr ), which is still too high. To practically solve the problem (19), in what follows we present an iterative phase matching algorithm, which searches the conditionally optimal phase of each element of the analog precoder fRF ,l and combiner wRF ,l . Specifically, we first design the analog precoder fRF ,l assuming the analog combiner wRF,l is fixed. Let ฯ‘l,i be the phase of the i-th element of the analog precoder fRF ,l and let ฯ•l,j be the phase of the j-th element of the analog combiner wRF,l . If we temporarily remove the discrete phase constraint, the optimal continuous phase ฯ‘ฬƒl,i of the i-th element of the analog precoder fRF,l is given by the following proposition, whose proof is provided in Appendix A. Proposition 1: Given the phases ฯ•l,j of the analog combiner wRF,l and the phases ฯ‘l,u , u 6= i, of the analog precoder fRF,l , the optimal continuous phase ฯ‘ฬƒl,i of the i-th element of analog log2  H b b bH WRF UฮฃV FRF = log 2 โ‰ˆ log 2 = log 2 = log 2 precoder fRF,l is ฯ‘ฬƒl,i  bV b H FRF,\l ฮฃ    H b bV b H FRF WRF ฮฃ U !  H b fRF,l WRF,\l wRF,l U = log2  = log2 H bV b H FRF,\lWRF,\l b ฮฃ U H bV b H FRF,\l WRF,\l b ฮฃ U H bฮฃ bV b H FRF,\l WRF,\l U (12) H H bV b H FRF,\l WRF,\l b +ฮฃ bV b H fRF,l wRF,l b ฮฃ U U h  โˆ’1 i H H bV b H FRF,\l WRF,\l b bV b H fRF,l wRF,l b INs + ฮฑINs + ฮฃ U ฮฃ U ! ! + log 2 + log 2 ! h  โˆ’1 i H H bV b H FRF,\lWRF,\l b bV b H fRF,l wRF,l b INs + ฮฑINs + ฮฃ U ฮฃ U h  โˆ’1 i H H b ฮฑINs + ฮฃ bV b H fRF,l bV b H FRF,\l WRF,\l b 1 + wRF,l U ฮฃ U ๏ฃผ Nt ๏ฃฝ X ejฯ•l,j ejฯ‘l,u Ql (j, u) = angle ๏ฃพ ๏ฃณ j=1 u6=i ๏ฃผ ๏ฃฑ Nr ๏ฃฝ ๏ฃฒX ejฯ•l,j Ql (j, i) . (20) โˆ’angle ๏ฃพ ๏ฃณ ๏ฃฑ Nr ๏ฃฒX j=1  Then, after finding the optimal continuous phase ฯ‘ฬƒl,i by (20), we reconsider the discrete phase constraint and find the optimal low-resolution phase ฯ‘l,i by quantization: ฯ‘l,i = arg min ฯ‘ฬƒl,i โˆ’ ฯ‘ฬ‚l,i . (21) ฯ‘ฬ‚l,i โˆˆB Similarly, if the analog precoder fRF,l is determined, the optimal continuous phase ฯ•ฬƒl,j of the j-th element of wRF,l is ๏ฃผ ๏ฃฑ Nt Nt ๏ฃฝ ๏ฃฒX X ejฯ‘l,i ejฯ•l,u Ql (u, i) ฯ•ฬƒl,j = angle ๏ฃพ ๏ฃณ i=1 u6=j ) (N t X jฯ•l,i e Ql (j, i) , (22) โˆ’angle ! ! (13) (14) ! (15) (16) Algorithm 1 Iterative Phase Matching Algorithm for LowResolution Analog Precoder and Combiner Design Input: F , W, H. โ‹† Output: Fโ‹†RF and WRF . โ‹† โ‹† 1: Initialize FRF = 0, WRF = 0. 2: for l = 1 : Ns do โ‹† 3: Obtain FRF,\l from Fโ‹†RF and WRF,\l from WRF . โˆ’1 b b H H H b b b b 4: Update Ql =U(ฮฑINs+ฮฃV FRF,\l WRF,\l U) ฮฃV . 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: while no convergence of ฯ‘l,i and ฯ•l,j do for i = 1 : Nt do Obtain quantized phase ฯ‘l,i by (20) and (21). end for for j = 1 : Nr do Obtain quantized phase ฯ•l,j by (22) and (23). end for end while โ‹† โ‹† Construct fRF,l by ฯ‘l,i and wRF,l by ฯ•l,j . end for โ‹† โ‹† โ‹† and WRF by wRF,l . Construct Fโ‹†RF by fRF,l โ‹† โ‹† Goto Step 2 until convergence of FRF and WRF . i=1 and the optimal low-resolution phase ฯ•l,j is obtained by ฯ•l,j = arg min ฯ•ฬƒl,j โˆ’ ฯ•ฬ‚l,j . ฯ•ฬ‚l,j โˆˆB (23) Motivated by (20)-(23), the iterative procedure to design the precoder fRF ,l and combiner wRF ,l as in (19) is straightforward. With appropriate initial ฯ‘l,i , ฯ•l,j , we design the precoder fRF ,l by finding the conditionally optimal phases ฯ‘l,i as in (20) and (21). Then, with the obtained ฯ‘l,i , i = 1, . . . , Nt , we design the combiner wRF ,l by finding the conditionally optimal phases ฯ•l,j as in (22) and (23). We alternate the designs of fRF ,l and wRF ,l iteratively until the obtained phase of each element of fRF ,l and wRF ,l does not change and the convergence is achieved. Note that since in each precoder and combiner design step, the objective function of (19) is monotonically non-decreasing, and thus our proposed algorithm is guaranteed to converge to at least a locally optimal solution. We summarize the proposed joint low-resolution analog precoder and combiner design in Algorithm 1. B. Digital Precoder and Combiner Design After all analog precoder-combiner pairs have been detere as mined, we can obtain the effective baseband channel H e , (Wโ‹† )H HFโ‹† , H RF RF (24) e =U eฮฃ eV eH H (25) e Fโ‹†BB = V, โ‹† e W = U. (26) โ‹† โ‹† โ‹† where Fโ‹†RF , [fRF,1 , . . . , fRF,N ] and WRF , s โ‹† โ‹† [wRF,1 , . . . , wRF,Ns ]. For the baseband precoder and combiner design, we define the SVD of the effective e as baseband channel H e and V e are Ns ร— Ns unitary matrices, ฮฃ e is an where U Ns ร— Ns diagonal matrix of singular values. Then, to further enhance the spectral efficiency, an SVD-based baseband digital precoder and combiner are employed: BB (27) Finally, the baseband precoder and combiner are normalized Fโ‹†BB = โ‹† WBB = โˆš N s Fโ‹† BB โ‹† kFโ‹† RF FBB kF โˆš โ‹† Ns WBB โ‹† Wโ‹† kWRF BB kF , (28) . Now, the joint optimization problem (33) can be decoupled into individually designing the analog precoder fRF ,l and combiner wRF ,l : (29) โ‹† fRF ,l = arg max fRF ,l โˆˆ โˆš1 Nt IV. O NE -B IT R ESOLUTION A NALOG P RECODER C OMBINER D ESIGN AND โ‹† wRF ,l = arg {ยฑ1}Nt max 1 wRF ,l โˆˆ โˆšN {ยฑ1}Nr H fRF,l gl,1 , H wRF,l pl,1 . (34) (35) r In the previous section, we proposed a novel hybrid beamformer design for maximizing the spectral efficiency of a mmWave MIMO system, in which the analog precoder and combiner are implemented with low-resolution PSs. In order to achieve maximum hardware efficiency, in this section we focus on the design of analog precoders and combiners using โ€œone-bitโ€ resolution (binary) PSs, which can maximally reduce the power consumption and simplify the hardware complexity. Although the iterative phase matching algorithm proposed in the previous section can also be applied, a simpler approach is possible in the one-bit case. Therefore, in this section, we present an efficient one-bit resolution analog beamformer design, which can achieve good performance with much lower complexity. We follow the procedure of the hybrid beamforming design proposed in the previous section, but only modify the optimization problem (19), which attempts to determine the l-th analog precoder and combiner pair. Particularly, we reformulate this analog beamformer design problem (19) with the constraint of one-bit resolution PSs as  โ‹† H โ‹† wRF,l Ql fRF,l . max fRF ,l , wRF ,l = arg fRF ,l โˆˆ โˆš1 {ยฑ1}Nt Nt 1 wRF ,l โˆˆ โˆšN {ยฑ1}Nr r (30) The optimization problem (30) can be solved through exhaustive search with exponential complexity O(2Nt Nr ), which would not be possible with large antenna arrays. Therefore, in the following we attempt to develop an efficient one-bit resolution beamformer design with polynomial complexity in the number of antennas. We first define the SVD of Ql as Ql = Ns X H ฮปl,i pl,i gl,i , (31) i=1 where pl,i and gl,i are the i-th left and right singular vectors of Ql , respectively, and ฮปl,i is the i-th largest singular value, ฮปl,1 โ‰ฅ ฮปl,2 โ‰ฅ . . . โ‰ฅ ฮปl,Ns . Then, the objective in (30) can be rewritten as H Ql fRF,l | = |wRF,l Ns X H H ฮปl,i wRF,l pl,i gl,i fRF,l . (32) i=1 If we utilize a rank-1 approximation by keeping only the H strongest term, i.e. Ql โ‰ˆ ฮปl,1 pl,1 gl,1 , the optimization function in (30) can be approximated by  โ‹† โ‹† H H fRF ,l , wRF max wRF,l pl,1 gl,1 fRF,l . ,l = arg fRF ,l โˆˆ โˆš1 Nt 1 wRF ,l โˆˆ โˆšN r {ยฑ1}Nt {ยฑ1}Nr (33) These two optimization problems (34) and (35) require only the singular vectors pl,1 and gl,1 associated with the largest singular value, which can be quickly obtained by the power iteration algorithm [34] instead of the complete SVD calculation. However, solving (34) and (35) by exhaustive search still has exponential complexity in the number of antennas. In order to further reduce the complexity without a significant loss of performance, we propose to construct a smaller dimension candidate beamformer set, from which the optimal beamformer can be found with linear complexity. In the following, we present this algorithm for the precoder design (34) as an example, while the combiner design (35) follows the same procedure. We introduce an auxiliary variable ฯ† โˆˆ [โˆ’ฯ€, ฯ€) and we reformulate the optimization problem (34) as: o n o n H โ‹† (36) Re fRF,l gl,1 eโˆ’jฯ† = arg max ฯ†โ‹† , fRF,l ฯ†โˆˆ[โˆ’ฯ€,ฯ€) fRF ,l โˆˆ โˆš1 {ยฑ1}Nt Nt = arg max Nt P ฯ†โˆˆ[โˆ’ฯ€,ฯ€) i=1 fRF ,l โˆˆ โˆš1 {ยฑ1}Nt Nt fRF,l (i)|gl,1 (i)| cos(ฯ† โˆ’ ฯˆi ) (37) where ฯˆi denotes the phase of gl,1 (i). Obviously, given any ฯ† โˆˆ [โˆ’ฯ€, ฯ€), the corresponding binary precoder that maximizes (37) is 1 fRF,l (i) = โˆš sign (cos (ฯ† โˆ’ ฯˆi )) , i = 1, . . . , Nt . Nt (38) With the conditionally optimal fRF,l for any given ฯ† shown in (38), we will now show that we can always construct a set of Nt candidate binary precoders Fl , {fl,1 , . . . , fl,Nt } and โ‹† guarantee fRF ,l โˆˆ Fl . Then, the maximization in (34) can be carried out over a set of only Nt candidates without loss of performance. We first define the angles ฯˆbi , i = 1, . . . , Nt , as   ๏ฃฑ ฯ€ 3ฯ€ ๏ฃด ๏ฃฒ ฯˆi โˆ’ ฯ€, if ฯˆi โˆˆ , , 2 2 ฯˆbi , (39)  h ๏ฃด ฯ€ ฯ€ ๏ฃณฯˆ , , if ฯˆi โˆˆ โˆ’ , i 2 2 so that ฯˆbi โˆˆ [โˆ’ ฯ€2 , ฯ€2 ). Then, we map the angles ฯˆbi to ฯˆei , i = 1, . . . , Nt , which are rearranged in ascending order, i.e. ฯˆe1 โ‰ค ฯˆe2 โ‰ค . . . โ‰ค ฯˆeNt . Because of the periodicity of the cosine function, the maximization problem (37) with respect to ฯ† can be carried out over any interval of length ฯ€. If we construct Nt non-overlapping sub-intervals [ฯˆe1 โˆ’ ฯ€2 , ฯˆe2 โˆ’ ฯ€2 ), [ฯˆe2 โˆ’ ฯ€2 , ฯˆe3 โˆ’ ฯ€ e ฯ€ ฯ€ โ‹† e 2 ), . . . , [ฯˆNt โˆ’ 2 , ฯˆ1 + 2 ), then the optimal ฯ† must be located in one of Nt sub-intervals since the full interval is [ฯˆe1 โˆ’ ฯ€ e 2 , ฯˆ1 + ฯ€2 ) of length ฯ€. Therefore, the optimization problem (37) can be solved by examining each sub-interval separately. Assuming the optimal ฯ†โ‹† is in the k-th sub-interval, the corresponding optimal  binary can be obtained by (38)  precoder as e fl,k (i) = โˆš1N sign cos ฯ†โ‹† โˆ’ ฯˆei , i = 1, . . . , Nt , and t has the form 1 e . . 1} โˆ’1 . . . โˆ’ 1]T . (40) fl,k = โˆš [1| .{z | {z } Nt k Nt โˆ’k After that, given the inverse sorting that maps ฯˆei to ฯˆbi , we rearrange the corresponding elements of e fl,k and obtain b fl,k . Then, based on the relationship between ฯˆi and ฯˆbi defined in (39), we can achieve the conditionally optimal precoder fl,k by   ๏ฃฑ ฯ€ 3ฯ€ ๏ฃด b ๏ฃฒ โˆ’ fl,k (i), if ฯˆi โˆˆ , i = 1, . . . , Nt , , 2 2 fl,k (i) , h  ฯ€ ฯ€ ๏ฃด ๏ฃณ b fl,k (i), if ฯˆi โˆˆ โˆ’ , , i = 1, . . . , Nt , 2 2 (41) for the case that ฯ†โ‹† is in the k-th sub-interval. Since the optimal ฯ†โ‹† must be located in one of Nt subintervals, we can obtain Nt conditionally optimal precoders by examining all Nt sub-intervals and construct a candidate precoder set Fl as Fl , {fl,1 , . . . , fl,Nt }, (42) โ‹† which must contain the optimal precoder fRF,l . Therefore, without loss of performance, the problem in (34) can be transformed to an equivalent maximization task over only the set Fl H โ‹† fRF,l gl,1 , (43) fRF ,l = arg max fRF ,l โˆˆFl which has linear complexity O(Nt ). Similarly, we can also construct a candidate analog combiner set Wl and obtain โ‹† wRF ,l by the same procedure. The rank-1 solution returned by (43) is based on the rank-1 approximation of the interference-included equivalent channel Ql . The approximation of Ql may cause a performance degradation when we revisit the original problem (30). Therefore, in order to enhance the performance, we propose to jointly select the precoder and combiner over candidate sets Fl and Wl as n o โ‹† โ‹† H fRF , w (44) wRF,l Ql fRF,l ,l RF ,l = arg max fRF ,l โˆˆFl wRF ,l โˆˆWl which may return the rank-1 or a better solution with quadratic complexity O(Nt Nr ). This low-complexity analog beamformer design with one-bit resolution PSs is summarized in Algorithm 2. V. H YBRID P RECODER AND C OMBINER D ESIGN M ULTIUSER MM WAVE MIMO S YSTEMS FOR In this section, we consider a mmWave multiuser MIMO uplink system and extend the low-resolution hybrid precoder and combiner designs proposed in the previous sections to the multiuser system. Algorithm 2 One-Bit Resolution Analog Beamformer Design Input: Ql . โ‹† โ‹† Output: fRF ,l and wRF ,l . 1: Calculate pl,1 and gl,1 by an SVD of Ql . bi , i = 1, . . . , Nt , by (39). 2: Define the angles ฯˆ b e 3: Map ฯˆi to ฯˆi , i = 1, . . . , Nt , in an ascending order. 4: for k = 1 : Nt do 5: Obtain e fl,k by (40). 6: Obtain b fl,k from e fl,k based on inverse mapping from ฯˆei b to ฯˆi , i = 1, . . . , Nt . 7: Obtain fl,k from b fl,k by (41). 8: end for 9: Construct Fl = {fl,1 , . . . , fl,Nt }. 10: Construct Wl by a similar procedure as Steps 2-9. โ‹† โ‹† 11: Find the optimal fRF ,l and wRF ,l by (44). A. System Model and Problem Formulation We consider a multiuser mmWave MIMO uplink system as presented in Fig. 2, where a base-station (BS) is equipped with Nr antennas and NRF RF chains and simultaneously serves K mobile users. Due to power consumption and hardware limitations, each mobile user has Nt antennas and a single RF chain to transmit only one data stream to the BS. We further assume the number of RF chains at the BS is equal to the number of users, i.e. NRF = K. Let fRF,k be the analog precoder of the k-th user, where each element of fRF,k has a constant magnitude โˆš1N and lowt resolution discrete phases, i.e. fRF,k (i) โˆˆ F , โˆ€i = 1, . . . , Nt . The transmitted signal of the k-th user after precoding can be formulated as p xk = Pk fRF,k sk (45) 2 where sk is the symbol of the k-th user, E{|sk | } = 1, and Pk is the k-th userโ€™s transmit power. Let Hk โˆˆ CNr ร—Nt , k = 1, . . . , K, denote the uplink channel from the k-th user to the BS. The received signal at the BS can be written as r= K p X Pk Hk fRF,k sk + n (46) k=1 where n โˆผ CN (0, ฯƒ 2 INr ) is complex Gaussian noise. The BS first applies an Nr ร— K analog combining matrix WRF , [wRF ,1 . . . wRF ,K ] to process the received signal, in which the analog combiner wRF,k corresponding to the k-th user is also implemented by low-resolution PSs, i.e. wRF ,k (j) โˆˆ W, j = 1, . . . , Nr . Then, a baseband digital combiner wBB,k โˆˆ CKร—1 is employed to retrieve the information of the k-th user. Let wk , WRF wBB,k denote the hybrid combiner corresponding to the k-th user. After the combining process at the BS, the estimated symbol of the k-th user can be expressed as sฬ‚k = K p X p Pk wkH Hk fRF,k sk + wkH Pi Hi fRF,i si + wkH n. i=1 i6=k (47) Fig. 2. The multiuser mmWave MIMO system using hybrid precoder and combiner. Given the received signal at the BS in (47), the signal-tointerference-plus-noise ratio (SINR) of the k-th user can be expressed as โˆš | Pk wkH Hk fRF,k |2 ฮณk = K โˆš P (48) | Pi wkH Hi fRF,i |2 +ฯƒ 2 k wk k2 i=1,i6=k and the achievable sum-rate of the multiuser uplink system is Ru = K X log(1 + ฮณk ). (49) k=1 We aim to jointly design the analog precoders and combiners implemented by low-resolution PSs as well as the digital combiners to maximize the sum-rate of the uplink multiuser system: n โ‹† โ‹† โ‹† wRF ,k , wBB,k , fRF,k s. t. K k=1 o = arg max fRF,k (i) โˆˆ F , โˆ€k, i, K X log (1 + ฮณk ) k=1 wRF ,k (j) โˆˆ W, โˆ€k, j. (50) B. Low-Resolution Hybrid Precoder and Combiner Design Obviously, the optimization problem (50) cannot be directly solved. Thus, we adopt an approach similar to [26] and propose to successively design the low-resolution analog beamformer pair for each user, aiming at enhancing the channel gain as well as suppressing the inter-user interference. Then, the baseband combiner at the BS is calculated to further mitigate the interference and maximize the sum-rate. In particular, for the first user, the analog precoder and combiner pair is designed to maximize the corresponding channel gain, which can be formulated as follows:  โ‹† H โ‹† wRF ,1 , fRF ,1 = arg max wRF ,1 H1 fRF ,1 s. t. fRF ,1 (i) โˆˆ F , i = 1, . . . , Nt , wRF ,1 (j) โˆˆ W, j = 1, . . . , Nr . (51) This analog precoder and combiner design problem can be efficiently solved by the algorithm presented in Sec. III-A when low-resolution PSs are utilized, or the algorithm proposed in Sec. IV if only one-bit resolution PSs are available. Then, the analog precoders fRF,k and combiners wRF ,k , k = 2, 3, . . . , K, for the remaining K โˆ’ 1 users are successively designed by an iterative procedure. In each iteration, we attempt to find the analog beamformer pair that suppresses the interference from the users whose analog beamformers have already been determined. To achieve this goal, the channel of the user whose combiner is to be calculated is projected onto the space orthogonal to the collection of previously designed analog combiners. This approach leads to orthogonal analog combiners that suppress the inter-user interference. Specifically, to design the k-th userโ€™s analog beamformer pair, we first extract the orthonormal components di of the preโ‹† viously determined analog combiners wRF ,i , i = 1, . . . , k โˆ’ 1 by the Gram-Schmidt procedure: โ‹† qi = wRF ,i โˆ’ iโˆ’1 X โ‹† dH j wRF ,i dj , (52) j=1 di = qi /kqi k. (53) โ‹† โ‹† Note that d1 = wRF ,1 and wRF ,1 is the analog combiner calculated for the first user. Then, the combiner components are removed from the k-th userโ€™s channel to obtain the b k as modified channel H bk = H INr โˆ’ kโˆ’1 X i=1 di dH i ! Hk . (54) b k , the analog beamFinally, based on the modified channel H former pair for the k-th user is found by solving the following optimization using the algorithms proposed in the previous s. t. fRF,k (i) โˆˆ F , i = 1, . . . , Nt , 120 (55) wRF ,k (j) โˆˆ W, j = 1, . . . , Nr . After finding the analog beamformers for all users, the effective baseband channel for each user can be obtained โˆš H โ‹† โ‹† as hek , Pk (WRF ) Hk fRF ,k . Then, a minimum mean square error (MMSE) baseband digital combiner for the k-th user is employed to further suppress the interference: h iโˆ’1 โ‹† โ‹† โ‹† wBB,k = He (He )H + ฯƒ 2 (WRF )H WRF hek , (56) 100 where He , [he1 , . . . , heK ]. The proposed low-resolution hybrid precoder and combiner design for multiuser mmWave systems is summarized in Algorithm 3. wRF ,1 (i)โˆˆW fRF,1 (j)โˆˆF 3: 4: โ‹† d1 = wRF ,1 . for k = 2: K do  kโˆ’1 P H b di di H k . Hk = INr โˆ’ i=1 5: โ‹† โ‹† Obtain wRF ,k and fRF ,k for user-k by solving  โ‹† โ‹† H b max |wRF wRF ,k , fRF ,k = arg ,k Hk fRF,k |. wRF ,k (i)โˆˆW fRF,k (j)โˆˆF 6: 7: 8: 9: โ‹† qk = wRF ,k โˆ’ kโˆ’1 P i=1 โ‹† dH i wRF ,k di ; dk = qk /kqk k. end for โ‹† Obtain digital combiners wBB,k , k = 1, . . . , K, by h iโˆ’1 H โ‹† โ‹† โ‹† ) WRF wBB,k = He (He )H + ฯƒ 2 (WRF hek . VI. S IMULATION R ESULTS In this section, we provide simulation results for the proposed joint hybrid precoder and combiner designs with lowresolution PSs for point-to-point mmWave systems as well as multiuser mmWave systems. MmWave channels are expected to be sparse and have a limited number of propagation paths. In the simulations, we adopt a geometric channel model with L paths [32]. In particular, the discrete-time narrow-band mmWave channel H is formulated as r L Nt Nr X H= ฮฑi ar (ฮธir )at (ฮธit )H (57) L i=1 90 80 70 60 102 50 100 40 98 30 96 34 20 0 5 10 15 20 34.5 25 35 30 35.5 35 40 SNR (dB) Fig. 3. Spectral efficiency versus SNR (Nt = 64, Nr = 64, NtRF = NrRF = 6, Ns = 6). 65 60 Spectral Efficiency (b/s/Hz) Algorithm 3 Low-Resolution Hybrid Precoder and Combiner Design for Multiuser mmWave Systems Input: F , W, Hk , k = 1, . . . , K. โ‹† โ‹† โ‹† Output: fRF,k , wRF ,k , wBB,k , k = 1, . . . , K. โ‹† โ‹† 1: Obtain wRF ,1 and fRF ,1 for user-1 by solving  โ‹† โ‹† H = arg max |wRF wRF ,1 , fRF,1 ,1 H1 fRF,1 |. 2: Fullโˆ’digital PEโˆ’AltMin [6] (B=โˆž) CDM [30] (B=2) CDM [30] (B=1) HBF [32] (B=2) HBF [32] (B=1) Proposed (B=2) Proposed (B=1) 110 Spectral Efficiency (b/s/Hz) sections:  โ‹† H โ‹† b wRF ,k , fRF ,k = arg max wRF ,k Hk fRF,k 55 50 45 Fullโˆ’digital PEโˆ’AltMin [6] (B=โˆž) CDM [30] (B=2) CDM [30] (B=1) HBF [32] (B=2) HBF [32] (B=1) Proposed (B=2) Proposed (B=1) 40 35 30 25 20 40 60 80 100 120 140 Number of Antenna Fig. 4. Spectral efficiency versus number of antenna (NtRF = NrRF = 4, Ns = 4, SNR = 20dB). where ฮฑi โˆผ CN (0, L1 ) are the independent and identically distributed complex gains of the i-th propagation path (ray) ฮธit and ฮธir โˆˆ [โˆ’ ฯ€2 , ฯ€2 ] are the angles of departure (AoD) and the angles of arrival (AoA), respectively. Finally, the array response vectors at (ฮธt ) and ar (ฮธr ) depend on the antenna array geometry. We assume that the commonly used uniform linear arrays (ULAs) are employed, and the transmit antenna array response vector at (ฮธt ) and the receive antenna array response vector ar (ฮธr ) can be written as t t 2ฯ€ 2ฯ€ 1 at (ฮธt ) = โˆš [1, ej ฮป d sin(ฮธ ) , . . . , ej(Nt โˆ’1) ฮป d sin(ฮธ ) ]T , Nt (58) r r 2ฯ€ 1 j 2ฯ€ d sin(ฮธ ) j(N โˆ’1) d sin(ฮธ ) T r r ฮป ,...,e ] , ar (ฮธ ) = โˆš [1, e ฮป Nr (59) respectively, where ฮป is the signal wavelength, and d is the distance between antenna elements. In the following simulations, we consider an environment with L = 6 scatterers between the 60 20 58 18 Exhaustive search Proposed (B=1) Spectral Efficiency (b/s/Hz) Spectral Efficiency (b/s/Hz) 56 54 52 50 48 Fullโˆ’digital CDM [30] (B=2) CDM [30] (B=1) HBF [32] (B=2) HBF [32] (B=1) Proposed (B=2) Proposed (B=1) 46 44 42 40 38 1 2 3 4 5 6 7 8 9 10 52 Spectral Efficiency (b/s/Hz) 50 51.4 51.2 51 44 4.95 40 38 5 5.05 Fullโˆ’digital PEโˆ’AltMin [6] (B=โˆž) CDM [30] HBF [32] Proposed 42 1 2 3 4 12 10 8 6 2 โˆ’10 0 10 20 30 40 SNR (dB) Fig. 5. Spectral efficiency versus number of iteration (Nt = 64, Nr = 64, NtRF = NrRF = 4, Ns = 4, SNR = 20dB). 46 14 4 Number of Iterations 48 16 5 6 Resolution (bits) Fig. 6. Spectral efficiency versus resolution of PSs (Nt = 64, Nr = 64, NtRF = NrRF = 4, Ns = 4, SNR = 20dB). transmitter and the receiver. The antenna spacing is d = ฮป2 . A. Simulation Results of a Point-to-Point mmWave System We first consider a point-to-point mmWave communication system, in which the transmitter and receiver are both equipped with 64-antenna ULAs. The number of RF chains at the transmitter and receiver are NtRF = NrRF = 6, so the number of data streams is also assumed to be Ns = 6. Fig. 3 shows the average spectral efficiency versus SNR over 106 channel realizations. We evaluate the spectral efficiency of the algorithm proposed in Sec. III for the case of 2-bit (B = 2) resolution PSs and the algorithm proposed in Sec. IV for the case of 1-bit (B = 1) resolution PSs. For comparison purposes, we also plot the spectral efficiency of two state-of-the-art lowresolution hybrid beamformer designs: the coordinate descent method (CDM) algorithm in [30] and the hybrid beamforming (HBF) algorithm in [32]. To the best of our knowledge, the Fig. 7. Spectral efficiency versus SNR (Nt = 8, Nr = 8, Ns = 1, B = 1). algorithm in [32] achieves the best performance with lowresolution PSs in the existing literature. The performance of a fully digital approach using SVD-based beamforming and the hybrid beamforming scheme with infinite-resolution (B = โˆž) PSs using the phase extraction (PE-AltMin) algorithm in [6] are also included as performance benchmarks. Fig. 3 illustrates that the proposed algorithm outperforms the competitors, particularly for the case of 1-bit resolution PSs. Moreover, it can be observed that the proposed algorithm with B = 2 achieves performance close to optimal full-digital beamforming and hybrid beamforming with infinite-resolution PSs. For additional simulation validation, Fig. 4 illustrates the spectral efficiency versus the number of antennas and similar conclusions can be drawn. In order to illustrate the convergence of the proposed algorithm, we show the spectral efficiency versus the number of iterations in Fig. 5, which also includes other algorithms for comparison. It is observed that our proposed algorithms converge faster than the other two iterative schemes, which is a highly favorable property. In Fig. 6, we show the spectral efficiency as a function of B to illustrate the impact of the resolution of PSs on the spectral efficiency. As expected, increasing the PS resolution will improve the system performance, but using only B = 3 bits is sufficient to closely approach the performance of the ideal unquantized case. Beyond B = 3, the additional cost and complexity associated with using higher-resolution PSs is not warranted given the very marginal increase in spectral efficiency. Moreover, our proposed algorithms outperform the other two low-resolution beamforming methods for all PS resolutions. To examine the impact of the approximations used in deriving the proposed one-bit resolution hybrid beamformer scheme, in Fig. 7 we compare it with the optimal exhaustive search approach. The number of antennas at both transmitter and receiver is chosen to be 8 and the number of data streams is Ns = 1. A relatively simple case is examined here due to the exponential complexity of the exhaustive search method. We see from Fig. 7 that the spectral efficiency achieved by (I-HB) in [26]. All three algorithms are codebook-based approaches and the size of the beamsteering codebook is set at 32 (i.e. B = 5 quantization bits) for fairness of the comparison. It can be observed from Fig. 8 that our proposed lowresolution hybrid beamforming design outperforms the other three algorithms using only 2-bit resolution PSs. Moreover, the performance with 1-bit resolution PSs is also comparable. Fig. 9 further shows the sum-rate versus the number of users K. From Fig. 9, we see that our proposed algorithm with 2-bit resolution PSs always outperforms the other codebook-based algorithms. Furthermore, even with 1-bit resolution PSs, the proposed algorithm can still achieve competitive performance compared with the TS-HB and MMSE-HB approaches when K > 5. 60 Sumโˆ’rate (b/s/Hz) 50 40 Fullโˆ’digital TSโˆ’HB [24] MMSEโˆ’HB [25] Iโˆ’HB [26] Proposed (B=2) Proposed (B=1) 30 20 10 0 โˆ’20 โˆ’15 โˆ’10 โˆ’5 0 5 10 15 20 SNR (dB) VII. C ONCLUSIONS Fig. 8. Spectral efficiency versus SNR (Nt = 64, Nr = 16, K = 4). NtRF = 4, 100 90 Sumโˆ’rate (b/s/Hz) 80 70 Fullโˆ’digital TSโˆ’HB [24] MMSEโˆ’HB [25] Iโˆ’HB [26] Proposed (B=2) Proposed (B=1) 60 50 40 This paper considered the problem of hybrid precoder and combiner design for mmWave MIMO systems with lowresolution quantized PSs. We proposed an efficient iterative algorithm which successively designs the low-resolution analog precoder and combiner pair for each data stream. Then, the digital precoder and combiner were computed based on the obtained effective baseband channel to further enhance the spectral efficiency. The design of low-resolution hybrid beamformers for multiuser MIMO communication systems was also investigated. Simulation results verified the effectiveness of the proposed algorithms, particularly for scenarios in which onebit resolution phase shifters are used. 30 A PPENDIX A P ROOF OF P ROPOSITION 1 20 10 1 2 3 4 5 6 7 8 Number of users The optimization problem (19) can be equivalently formulated as Fig. 9. Spectral efficiency versus K (Nt = 64, Nr = 16, NtRF = K, SNR = 20dB). the proposed algorithm is the same as that of the optimal exhaustive search method, suggesting that the proposed hybrid beamforming algorithm with one-bit resolution PSs can provide optimal or near-optimal performance. B. Simulation Results of a Multiuser mmWave System Next, we evaluate the performance of the proposed lowresolution beamformer algorithm in a multiuser uplink system. We assume there are K = 4 users, each of which is equipped with Nt = 16 antennas and only one RF chain to transmit a single data stream. The BS has Nr = 64 antennas and NrRF = 4 RF chains. Fig. 8 illustrates the sum-rate versus SNR for various hybrid beamformer designs. In particular, we include three state-of-the-art multiuser hybrid beamforming approaches for comparison: i) two-stage hybrid beamforming (TS-HB) in [24], ii) MMSE-based hybrid beamforming (MMSE-HB) in [25], and iii) iterative hybrid beamforming Nt Nr X l l X 1 ejฯ‘i Ql (j, i) . ejฯ•j max โˆš Nt Nr j=1 i=1 (60) โˆš By discarding the constant coefficient 1/ Nt Nr , (60) can be further transformed as ๏ฃผ ๏ฃฑ Nt Nr ๏ฃฝ ๏ฃฒ X X l l l ejฯ‘u Ql (j, u) . (61) ejฯ•j ejฯ‘i Ql (j, i) + max ๏ฃพ ๏ฃณ u6=i j=1 l Since the term ejฯ‘i does not involve the summation index j, it can be put outside the first summation, resulting in max e jฯ‘li Nr X j=1 e jฯ•lj Ql (j, i) + Nr X j=1 e jฯ•lj Nt X l ejฯ‘u Ql (j, u) . u6=i (62) Obviously, the optimal value of ฯ‘li makes the phases of the first and second term equal to obtain the largest amplitude, and (20) is proved.  R EFERENCES [1] Z. Pi and F. Khan, โ€œAn introduction to millimeter-wave mobile broadband systems,โ€ IEEE Commun. Mag., vol. 49, no. 6, pp. 101-107, June 2011. [2] T. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. N. Wong, J. K. Schulz, M. Samimi, and F. Gutierrez โ€œMillimeter wave mobile communications for 5G cellular: It will work!โ€ IEEE Access, vol. 1, pp. 335-349, 2013. [3] A. Lee Swindlehurst, E. Ayanoglu, P. Heydari, and F. Capolino, โ€œMillimeter-wave massive MIMO: The next wireless revolution?โ€ IEEE Commun. Mag., vol. 52, no. 9, pp. 56-62, Sept. 2014. [4] T. S. Rappapport, G. R. MacCartney, M. K. Samimi, and S. Sun, โ€œWideband millimeter-wave propagation measurements and channel models for future wireless communication system designโ€, IEEE Trans. Commun., vol. 63, no. 9, pp. 3029-3056, Sept. 2015. [5] R. W. Heath Jr., N. Gonzaฬlez-Prelcic, S. Rangan, W. Roh, and A. M. Sayeed, โ€œAn overview of signal processing techniques for millimeter wave MIMO systems,โ€ IEEE J. Sel. Topics Signal Process., vol. 10, no. 3, pp. 436-453, April 2016. [6] X. Yu, J.-C. Shen, J. Zhang, and K. B. Letaief, โ€œAlternating minimization algorithms for hybrid precoding in millimeter wave MIMO systems,โ€ IEEE J. Sel. Topics Signal Process., vol. 10, no. 3, pp. 485-500, April 2016. [7] C. Rusu, R. Meฬndez-Rial, N. Gonzaฬlez-Prelcic, and R. W. Heath Jr., โ€œLow complexity hybrid precoding strategies for millimeter wave communication systems,โ€ IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 8380-8393, Sept. 2016. [8] R. Loฬpez-Valcarce, N. Gonzaฬlez-Prelcic, C. Rusu, and R. W. Heath Jr., โ€œHybrid precoders and combiners for mmWave MIMO systems with per-antenna power constraints.โ€ in Proc. IEEE Global Communication Conference (GLOBECOM), Washington, DC, Dec. 2016, pp. 1-6. [9] C.-E. Chen, โ€œAn iterative hybrid transceiver design algorithm for millimeter wave MIMO systems,โ€ IEEE Wireless Commun. Lett., vol. 4, no. 3, pp. 285-288, June 2015. [10] W. Ni, X. Dong, and W.-S. Lu, โ€œNear-optimal hybrid processing for massive MIMO systems via matrix decomposition,โ€ IEEE Trans. Signal Process., vol. 65, no. 15, pp. 3922-3933, Aug. 2017. [11] X. Gao, L. Dai, S. Han, C.-L. I, and R. W. Heath Jr., โ€œEnergy-efficient hybrid analog and digital precoding for mmWave MIMO systems with large antenna arrays,โ€ IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 998-1009, April 2016. [12] L. Dai, X. Gao, J. Quan, S. Han, and C.-L. I, โ€œNear-optimal hybrid analog and digital precoding for downlink mmWave massive MIMO systemsโ€, in Proc. IEEE Int. Conf. Commun. (ICC), London, UK, June 2015, pp. 1334-1339. [13] S. He, C. Qi, Y. Wu, and Y. Huang, โ€œEnergy-efficient transceiver design for hybrid sub-array architecture MIMO systems,โ€ IEEE Access, vol. 4, pp. 9895-9905, 2016. [14] O. E. Ayach, S. Rajagopal, S. Abu-Surra, Z. Pi, and R. W. Heath Jr., โ€œSpatially sparse precoding in millimeter wave MIMO systems,โ€ IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1499-1513, Mar. 2014. [15] A. Alkhateeb, O. El Ayach, G. Leus, and R. W. Heath Jr., โ€œChannel estimation and hybrid precoding for millimeter wave cellular systems,โ€ IEEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 831-846, Oct. 2014. [16] C. Rusu, R. Meฬndez-Rial, N. Gonzaฬlez-Prelcic, and R. W. Heath Jr., โ€œLow complexity hybrid sparse precoding and combining in millimeter wave MIMO systems,โ€ IEEE Int. Conf. on Commun. (ICC), London, UK, June 2015, pp. 1340-1345. [17] J.-C. Chen, โ€œEfficient codebook-based beamforming algorithm for millimeter-wave massive MIMO systems,โ€ IEEE Trans. Veh. Technol., to Appear. [18] X. Gao, L. Dai, C. Yuen, and Z. Wang, โ€œTurbo-like beamforming based on Tabu search algorithm for millimeter-wave massive MIMO systems,โ€ IEEE Trans. Veh. Technol., vol. 65, no. 7, pp. 5731-5737, July 2016. [19] S. Han, C.-L. I, Z. Xu, and C. Rowell, โ€œLarge-scale antenna systems with hybrid analog and digital beamforming for millimeter wave 5G,โ€ IEEE Commun. Mag., vol. 53, no. 1, pp. 186-194, Jan. 2015. [20] A. Li and C. Masouros, โ€œHybrid analog-digital millimeter-wave MUMIMO transmission with virtual path selection,โ€ IEEE Commun. Lett., vol. 21, no. 2, pp. 438-441, Feb. 2017. [21] L. Liang, W. Xu, and X. Dong, โ€œLow-complexity hybrid precoding in massive multiuser MIMO systems,โ€ IEEE Wireless Commun. Lett., vol. 3, no. 6, pp. 653-656, Dec. 2014. [22] A. Li and C. Masouros, โ€œHybrid precoding and combining design for millimeter-wave multi-user MIMO based on SVD,โ€ IEEE Int. Conf. on Commun. (ICC), Paris, France, May 2017, pp. 1-6. [23] M. Kim and Y. H. Lee, โ€œMSE-based hybrid RF/baseband processing for millimeter-wave communication systems in MIMO interference channels,โ€ IEEE Trans. Veh. Technol., vol. 64, no. 6, pp. 2714-2720, June 2015. [24] A. Alkhateeb, G. Leus, and R. W. Heath Jr., โ€œLimited feedback hybrid precoding for multi-user millimeter wave systems,โ€ IEEE Trans. Wireless Commun., vol. 14, no. 11, pp. 6481-6494, Nov. 2015. [25] D. H. N. Nguyen, L. B. Le, and T. Le-Ngoc, โ€œHybrid MMSE precoding for mmWave multiuser MIMO systems,โ€ IEEE Int. Conf. on Commun. (ICC), Kuala Lumpur, Malaysia, May 2016. [26] Z. Wang, M. Li, X. Tian, and Q. Liu, โ€œIterative hybrid precoder and combiner design for mmWave multiuser MIMO systems,โ€ IEEE Commun. Lett., vol. 21, no. 7, pp. 1581-1584, July 2017. [27] T. E. Bogale, L. B. Le, A. Haghighat, and L. Vandendorpe, โ€œOn the number of RF chains and phase shifters, and scheduling design with hybrid analog-digital beamforming,โ€ IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 3311-3326, May 2016. [28] A. S. Y. Poon and M. Taghivand, โ€œSupporting and enabling circuits for antenna arrays in wireless communications,โ€ Proc. IEEE, vol. 100, no. 7, pp. 2207-2218, July 2012. [29] R. Meฬndez-Rial, C. Rusu, N. Gonzaฬlez-Prelcic, and A. Alkhateeb, โ€œHybrid MIMO architectures for millimeter wave communications: Phase shifters or switches?โ€, IEEE Access, vol. 4, pp. 247-267, March 2016. [30] J.-C. Chen, โ€œHyrbrid beamforming with discrete phase shifters for millimeter-wave massive MIMO systems,โ€ IEEE Trans. Veh. Technol., to Appear. [31] F. Sohrabi and W. Yu, โ€œHybrid beamforming with finite-resolution phase shifters for large-scale MIMO systems,โ€ in Proc. IEEE Workshop Signal Process. Adv. Wireless Commun. (SPAWC), Stockholm, Sweden, June 2015, pp. 136-140. [32] F. Sohrabi and W. Yu, โ€œHybrid digital and analog beamforming design for large-scale antenna arrays,โ€ IEEE J. Sel. Topics Signal Process., vol. 10, no. 3, pp. 501-513, April 2016. [33] G. N. Karystinos and D. A. Pados, โ€œRank-2-optimal adaptive design of binary spreading codes,โ€ IEEE Trans. Inf. Theory, vol. 53, no. 9, pp. 3075-3080, Sept. 2007. [34] G. H. Golub and C. F. Van Loan, Matrix Computations. Baltimore, USA: JHU Press, 2012.
7cs.IT
Phaseless compressive sensing using partial support information arXiv:1705.04048v2 [cs.IT] 13 Dec 2017 Zhiyong Zhouโˆ—, Jun Yu Department of Mathematics and Mathematical Statistics, UmeaฬŠ University, UmeaฬŠ, 901 87, Sweden December 14, 2017 Abstract: We study the recovery conditions of weighted โ„“1 minimization for real-valued signal reconstruction from phaseless compressive sensing measurements when partial support information is available. A strong restricted isometry property condition is provided to ensure the stable recovery. Moreover, we present the weighted null space property as the sufficient and necessary condition for the success of k-sparse phaseless recovery via weighted โ„“1 minimization. Numerical experiments are conducted to illustrate our results. Keywords: Phaseless compressive sensing; Partial support information; Strong restricted isometry property; Weighted null space property. 1 Introduction Compressive sensing aims to recover an unknown signal from the underdetermined linear measurements (see [8, 9] for a comprehensive view). It is known as phase retrieval or phaseless compressive sensing when there is no phase information. The phaseless compressive sensing problem has recently attracted considerable research interests and many algorithms have been proposed to solve this problem. Existing literature include [2โ€“4,7,12,14,16], to name a few. Specifically, the goal of phaseless compressive sensing is to recover x โˆˆ RN up to a unimodular scaling constant from noisy magnitude measurements y = |Ax|+e โˆˆ Rm with the measurement matrix A = (a1 , ยท ยท ยท , am )T โˆˆ Rmร—N , |Ax| = (|ha1 , xi|, ยท ยท ยท , |ham , xi|)T and the noise term e โˆˆ Rm . When x is sparse or compressible, the stable recovery can be guaranteed by solving the following โ„“1 minimization problem min kzk1 subject to k|Az| โˆ’ yk2 โ‰ค ฮต, zโˆˆRN (1) provided that the measurement matrix A satisfies the strong restricted isometry property (SRIP) [11, 17]. In the noiseless case, the first sufficient and necessary condition was presented in [18] by proposing a new version of null space property for the phase retrieval problem. In this paper, we generalize the existing theoretical framework for phaseless compressive sensing to incorporate partial support information, where we consider the case that an estimate of the support of the signal is available. We follow the similar notations and arguments in [10, 20]. For an arbitrary signal x โˆˆ RN , let xk be its best k-term approximation, so that xk minimizes kx โˆ’ f k1 over all k-sparse vectors f . Let T0 be the support of xk , where T0 โŠ‚ {1, ยท ยท ยท , N } and |T0 | โ‰ค k. Let Tฬƒ , the support estimate, be a subset of {1, 2 ยท ยท ยท , N } with cardinality |Tฬƒ | = ฯk, where ฯ โ‰ฅ 0 and |Tฬƒ โˆฉ T0 | = ฮฑฯk with 0 โ‰ค ฮฑ โ‰ค 1. Here the parameter ฯ determines the ratio of the size of the estimated support to the size of the actual support of xk โˆ— Corresponding author, [email protected]. 1 (or the support of x if x is k-sparse), while the parameter ฮฑ determines the ratio of the number of indices in the support of xk that are accurately estimated in Tฬƒ to the size of Tฬƒ , i.e., ฮฑ = prior support information Tฬƒ , we adopt the weighted โ„“1 minimization N X ( ฯ‰ โˆˆ [0, 1] min wi |zi |, subject to k|Az| โˆ’ yk2 โ‰ค ฮต, where wi = N zโˆˆR 1 i=1 |Tฬƒ โˆฉT0 | . |Tฬƒ | To incorporate i โˆˆ Tฬƒ , i โˆˆ Tฬƒ c . (2) We present the SRIP condition and weighted null space property condition to guarantee the success of the recovery via the weighted โ„“1 minimization problem above. The paper is organized as follows. In Section 2, we introduce the definition of SRIP and present the stable recovery condition with this tool. In Section 3, the sufficient and necessary weighted null space property condition for the real sparse noise free phase retrieval is given. In Section 4, some numerical experiments are presented to illustrate our theoretical results. Finally, Section 5 is devoted to the conclusion. P Throughout the paper, for any vector x โˆˆ RN , we denote the โ„“p norm by kxkp = ( pi=1 |xi |p )1/p for P p > 0 and the weighted โ„“1 norm as kxk1,w = N i=1 wi |xi |. For any matrix X, kXk1 denotes the entry-wise โ„“1 norm. For any set T , we denote its cardinality as |T |. The vector x โˆˆ RN is called k-sparse if at most k of its entries are nonzero, i.e., if kxk0 = |supp(x)| โ‰ค k, where supp(x) denotes the index set of the nonzero entries. We denote the index set [N ] := {1, 2, ยท ยท ยท , N }. For a matrix A = (a1 , ยท ยท ยท , am )T โˆˆ Rmร—N and an index set I โŠ‚ [m], we denote AI the sub-matrix of A where only rows with indices in I are kept, i.e., AI = (aj , j โˆˆ I)T . 2 SRIP To recover sparse signals via โ„“1 minimization in the classical compressive sensing setting, [5] introduced the notion of restricted isometry property (RIP) and established a sufficient condition. We say a matrix A satisfies the RIP of order k if there exists a constant ฮดk โˆˆ [0, 1) such that for all k-sparse vectors x we have (1 โˆ’ ฮดk )kxk22 โ‰ค kAxk22 โ‰ค (1 + ฮดk )kxk22 . (3) q Cai and Zhang [1] proved that the RIP of order tk with ฮดtk < tโˆ’1 t where t > 1 can guarantee the exact recovery in the noiseless case and stable recovery in the noisy case via โ„“1 minimization. This condition is sharp when t โ‰ฅ 43 , see [1] for details. Very recently, Chen and Li [6] generalized this sharp RIP condition to the weighted โ„“1 minimization problem when partial support information was incorporated. We first present the following useful lemma, which is an extension of the result in [6]. N m Lemma 1 Let qx โˆˆ R , y = Ax + e โˆˆ R with kek2 โ‰ค ฮถ, and ฮทโˆšโ‰ฅ 0. Suppose that A satisfies RIP of order tโˆ’d 1 + ฯ โˆ’ 2ฮฑฯ and tk with ฮดtk < tโˆ’d+ฮณ 2 for some t > d, where ฮณ = ฯ‰ + (1 โˆ’ ฯ‰) d= ( 1, 1 โˆ’ ฮฑฯ + a, ฯ‰=1 0โ‰คฯ‰<1 (4) with a = max{ฮฑ, 1 โˆ’ ฮฑ}ฯ. Then for any xฬ‚ โˆˆ {z โˆˆ RN : kzk1,w โ‰ค kxk1,w + ฮท, kAz โˆ’ yk2 โ‰ค ฮต}, we have kxฬ‚ โˆ’ xk2 โ‰ค C1 (ฮถ + ฮต) + C2 2(ฯ‰kxT0c k1 + (1 โˆ’ ฯ‰)kxTฬƒ c โˆฉT c k1 ) ฮท 0 โˆš + C2 โˆš , k k 2 (5) where p 2(t โˆ’ d)(t โˆ’ d + ฮณ 2 )(1 + ฮดtk ) q , tโˆ’d (t โˆ’ d + ฮณ 2 )( tโˆ’d+ฮณ โˆ’ ฮด ) 2 tk r q โˆš tโˆ’d 2ฮดtk ฮณ + (t โˆ’ d + ฮณ 2 )( tโˆ’d+ฮณ 2 โˆ’ ฮดtk )ฮดtk 1 q +โˆš . C2 = tโˆ’d d (t โˆ’ d + ฮณ 2 )( tโˆ’d+ฮณ 2 โˆ’ ฮดtk ) C1 = Remark 1 Note that if xโ„“2 is the solution of the weighted โ„“1 minimization problem: min kzk1,w , subject to kAz โˆ’ yk2 โ‰ค ฮต, zโˆˆRN then xโ„“2 โˆˆ {z โˆˆ RN : kzk1,w โ‰ค kxk1,w + ฮท, kAz โˆ’ yk2 โ‰ค ฮต} with ฮท = 0. Therefore, this lemma is an extension of Theorem 3.1 in [6] by letting ฮถ = ฮต and ฮท = 0. The proof follows from almost the same procedure for the proof of Theorem 3.1 in Section 4 of [6] via replacing the P = 2(ฯ‰kxT c k1 +(1โˆ’ฯ‰)kxTฬƒ c โˆฉT c k1 ) 0 0 โˆš kฮณ 2(ฯ‰kxT c k1 +(1โˆ’ฯ‰)kxTฬƒ c โˆฉT c k1 )+ฮท 0 0 โˆš with P โ€ฒ = , and letting ฮถ = ฮต. In order not to repeat, we leave out all the kฮณ details. In addition, this result also generalizes the Lemma 2.1 in [11], which is the special case with the noise term e = 0, ฮถ = 0 and ฯ‰ = 1. This lemma will play a crucial role in establishing the stable phaseless recovery result via weighted โ„“1 minimization later on. To address the phaseless compressive sensing problem (2), a stronger version of RIP is needed. Its definition is provided as follows. Definition 1 (SRIP [11, 17]) We say a matrix A = (a1 , ยท ยท ยท , am )T โˆˆ Rmร—N has the Strong Restricted Isometry Property (SRIP) of order k with bounds ฮธโˆ’ , ฮธ+ โˆˆ (0, 2) if ฮธโˆ’ kxk22 โ‰ค min kAI xk22 โ‰ค IโІ[m],|I|โ‰ฅm/2 max kAI xk22 โ‰ค ฮธ+ kxk22 IโІ[m],|I|โ‰ฅm/2 (6) holds for all k-sparse vectors x โˆˆ RN , where [m] = {1, ยท ยท ยท , m}. We say A has the Strong Lower Restricted Isometry Property of order k with bound ฮธโˆ’ if the lower bound in (6) holds. Similarly, we say A has the Strong Upper Restricted Isometry Property of order k with bound ฮธ+ if the upper bound in (6) holds. Next, we present the conditions for the stable recovery via weighted โ„“1 minimization by using SRIP. Theorem 1 Let x โˆˆ RN , y = |Ax| + e โˆˆ Rm with kek2 โ‰ค ฮถ. Adopt the notations in Lemma 1 and assume that A โˆˆ Rmร—N satisfies the SRIP of order tk with bounds ฮธโˆ’ , ฮธ+ โˆˆ (0, 2) such that   ฮณ 2 (1 โˆ’ ฮธ+ )2 ฮณ 2 (1 โˆ’ ฮธโˆ’ )2 . (7) t โ‰ฅ max d + 2 , d + 2ฮธ โˆ’ ฮธ 2 2ฮธโˆ’ โˆ’ ฮธโˆ’ + + Then any solution xโ™ฏ of (2) satisfies min{kxโ™ฏ โˆ’ xk2 , kxโ™ฏ + xk2 } โ‰ค C1 (ฮถ + ฮต) + C2 where C1 and C2 are constants defined in Lemma 1. 3 2(ฯ‰kxT0c k1 + (1 โˆ’ ฯ‰)kxTฬƒ c โˆฉT c k1 ) 0 โˆš . k (8) Remark 2 As it has been proved in [17] that Gaussian matrices with m = O(tk log(N/k)) satisfy SRIP of order tk with high probability, thus the stable recovery result (8) can be achieved by using Gaussian measurement matrix with appropriate number of measurements m. Remark 3 Note that when the weight ฯ‰ = 1, we have ฮณ = d = 1. Then, by assuming ฮถ = ฮต = 0 and x is exactly k-sparse, our theorem reduces to Theorem 2.2 in [17]. That is, if A satisfies the SRIP of order tk with bounds ฮธโˆ’ , ฮธ+ and t โ‰ฅ max{ 2ฮธ 1โˆ’ฮธ2 , 2ฮธ 1โˆ’ฮธ2 }, then for any k-sparse signal x โˆˆ RN we have โˆ’ โˆ’ + + arg minzโˆˆRN {kzk1 : |Az| = |Ax|} = {ยฑx}. Similarly, if we let the noise term e = 0, ฮถ = 0 and ฯ‰ = 1, this theorem goes to Theorem 3.1 in [11]. Remark 4 If ฮฑ = 21 , we have ฮณ = d = 1. The sufficient condition (7) of Theorem 1 is identical to that โˆš 2(1+ฮดtk ) of Theorem 2.2 in [17] and that of Theorem 3.1 in [11]. And the constants C1 = c1 = โˆš , C2 = 1โˆ’ t/(tโˆ’1)ฮดtk q โˆš โˆš 2ฮดtk + ( t(tโˆ’1)โˆ’ฮดtk t)ฮดtk โˆš c2 = (see Theorem 3.1 in [11]). In addition, if 0 โ‰ค ฯ‰ < 1 and ฮฑ > 21 , then d = 1 t(tโˆ’1)โˆ’ฮดtk t and ฮณ < 1. The sufficient condition (7) in Theorem 1 is weaker than that of Theorem 2.2 in [17] and that of Theorem 3.1 in [11]. In this case, the constants C1 < c1 , C2 < c2 . o n 2 2 ฮณ 2 (1โˆ’ฮธ+ )2 โˆ’) . We illustrate how the constants tฯ‰ , C1 and C2 change , d + Set tฯ‰ = max d + ฮณ 2ฮธ(1โˆ’ฮธ โˆ’ฮธ 2 2ฮธ โˆ’ฮธ 2 โˆ’ โˆ’ + + with ฯ‰ for different values of ฮฑ in Figure 1. In all the plots, we set ฯ = 1. In the plot of tฯ‰ , we set ฮธโˆ’ = ฮณ2 1 2 and ฮธ+ = 23 , then tฯ‰ = d + 3 . In the plots of C1 and C2 , we fix t = 4 and ฮดtk = 0.3. Note that if ฯ‰ = 1 or ฮฑ = 0.5, then tฯ‰ โ‰ก 1 + 13 = 34 , C1 โ‰ก c1 and C1 โ‰ก c2 . And it shows that tฯ‰ decreases as ฮฑ increases, which means that the sufficient condition (7) becomes weaker as ฮฑ increases. For each ฮฑ > 0.5, the sufficient condition becomes stronger (tฯ‰ increases) as ฯ‰ increases. For instance, if 90% of the support estimate is accurate (ฮฑ = 0.9) and ฯ‰ = 0.6, we have tฯ‰ = 1.2022, while tฯ‰ = 1.3333 for standard โ„“1 minimization (ฯ‰ = 1). The opposite conclusion holds for the case ฮฑ < 0.5. In addition, as ฮฑ increases, the constant C1 decreases with t = 4 and ฮดtk = 0.3. Meanwhile, the constant C2 with ฮฑ 6= 0.5 is smaller than that with ฮฑ = 0.5. Proof of Theorem 1. For any solution xโ™ฏ of (2), we have kxโ™ฏ k1,w โ‰ค kxk1,w and k|Axโ™ฏ | โˆ’ |Ax| โˆ’ ek2 โ‰ค ฮต. If we divide the index set {1, 2, ยท ยท ยท , m} into two subsets T = {j : sign(haj , xโ™ฏ i) = sign(haj , xi)} and T c = {j : sign(haj , xโ™ฏ i) = โˆ’sign(haj , xi)}, then it implies that kAT xโ™ฏ โˆ’ AT x โˆ’ ek2 + kAT c xโ™ฏ + AT c x โˆ’ ek2 โ‰ค ฮต. (9) Here either |T | โ‰ฅ m/2 or |T c | โ‰ฅ m/2. If |T | โ‰ฅ m/2, we use the fact that kAT xโ™ฏ โˆ’ AT x โˆ’ ek2 โ‰ค ฮต. Then, we obtain xโ™ฏ โˆˆ {z โˆˆ RN : kzk1,w โ‰ค kxk1,w , kAT z โˆ’ AT x โˆ’ ek2 โ‰ค ฮต}. 4 (10) 2.4 2.75 1.56 ฮฑ=0.1 ฮฑ=0.3 ฮฑ=0.5 ฮฑ=0.7 ฮฑ=0.9 2.7 2.2 ฮฑ=0.1 ฮฑ=0.3 ฮฑ=0.5 ฮฑ=0.7 ฮฑ=0.9 2 1.54 2.65 1.52 2.6 1.8 1.5 2.5 1.6 ฮฑ=0.1 ฮฑ=0.3 ฮฑ=0.5 ฮฑ=0.7 ฮฑ=0.9 C2 tฯ‰ C1 2.55 1.48 2.45 1.4 1.46 2.4 1.2 1.44 2.35 1 2.3 0 0.2 0.4 0.6 0.8 1 1.42 0 0.2 Weights (ฯ‰) 0.4 0.6 0.8 1 0 0.2 Weights (ฯ‰) 0.4 0.6 0.8 1 Weights (ฯ‰) Figure 1: Comparison of the constants tฯ‰ , C1 and C2 for various of ฮฑ. In all the plots, we set ฯ = 1. In the plot of tฯ‰ , we set ฮธโˆ’ = 21 and ฮธ+ = 32 . In the plots of C1 and C2 , we fix t = 4 and ฮดtk = 0.3. Since A satisfies SRIP of order tk with bounds ฮธโˆ’ , ฮธ+ and   ฮณ 2 (1 โˆ’ ฮธโˆ’ )2 ฮณ 2 (1 โˆ’ ฮธ+ )2 t โ‰ฅ max d + > d, 2 , d + 2ฮธ โˆ’ ฮธ 2 2ฮธโˆ’ โˆ’ ฮธโˆ’ + + therefore, the definition of SRIP implies that AT satisfies the RIP of order tk with s tโˆ’d . ฮดtk โ‰ค max{1 โˆ’ ฮธโˆ’ , ฮธ+ โˆ’ 1} โ‰ค t โˆ’ d + ฮณ2 (11) Thus, by using Lemma 1 with ฮท = 0, we have kxโ™ฏ โˆ’ xk2 โ‰ค C1 (ฮถ + ฮต) + C2 2(ฯ‰kxT0c k1 + (1 โˆ’ ฯ‰)kxTฬƒ c โˆฉT c k1 ) 0 โˆš . k Similarly, if |T c | โ‰ฅ m/2, we obtain the other corresponding result kxโ™ฏ + xk2 โ‰ค C1 (ฮถ + ฮต) + C2 2(ฯ‰kxT0c k1 + (1 โˆ’ ฯ‰)kxTฬƒ c โˆฉT c k1 ) 0 โˆš . k The proof of Theorem 1 is now completed. 3 Weighted Null Space Property In this section, we consider the noiseless weighted โ„“1 minimization problem, i.e., ( ฯ‰ โˆˆ [0, 1], i โˆˆ Tฬƒ . min kzk1,w , subject to |Az| = |Ax|, where wi = N zโˆˆR 1, i โˆˆ Tฬƒ c 5 (12) We denote the kernel space of A by N (A) := {h โˆˆ RN : Ah = 0} and denote the k-sparse vector space N ฮฃN k := {x โˆˆ R : kxk0 โ‰ค k}. Definition 2 The matrix A satisfies the w-weighted null space property of order k if for any nonzero h โˆˆ N (A) and any T โŠ‚ [N ] with |T | โ‰ค k it holds that khT k1,w < khT c k1,w , (13) where T c is the complementary index set of T and hT is the restriction of h to T . Remark 5 Obviously, when the weight ฯ‰ = 1, the weighted null space property reduces to the classical null space property. And according to the specific setting of wi , the expression (13) is equivalent to ฯ‰khT โˆฉTฬƒ k1 + khT โˆฉTฬƒ c k1 < ฯ‰khT c โˆฉTฬƒ k1 + khT c โˆฉTฬƒ c k1 โ‡” ฯ‰khT k1 + (1 โˆ’ ฯ‰)khG k1 < khT c k1 , where G = (T โˆฉ Tฬƒ c ) โˆช (T c โˆฉ Tฬƒ ) (see [13] for more arguments). It is known that a signal x โˆˆ ฮฃN k can be recovered via the weighted โ„“1 minimization problem if and only if the measurement matrix A has the weighted null space property of order k. We state it as follows (see [19]): Lemma 2 Given A โˆˆ Rmร—N , for every k-sparse vector x โˆˆ RN it holds that arg min {kzk1,w : Az = Ax} = x zโˆˆRN if and only if A satisfies the w-weighted null space property of order k. Next, we extend Lemma 2 to the following theorem on phaseless compressive sensing for the real-valued signal reconstruction. Theorem 2 The following statements are equivalent: (a) For any k-sparse x โˆˆ RN , we have arg min{kzk1,w : |Az| = |Ax|} = {ยฑx}. (14) ku + vk1,w < ku โˆ’ vk1,w (15) zโˆˆRN (b) For every S โІ [m], it holds for all nonzero u โˆˆ N (AS ) and v โˆˆ N (AS c ) satisfying ku + vk0 โ‰ค k. Remark 6 If ฯ‰ = 1, then Theorem 2 reduces to Theorem 3.2 in [18]. Since wi = ฯ‰ when i โˆˆ Tฬƒ , and wi = 1 otherwise, the expression (15) is equivalent to ฯ‰ku + vk1 + (1 โˆ’ ฯ‰)k(u + v)Tฬƒ c k1 < ฯ‰ku โˆ’ vk1 + (1 โˆ’ ฯ‰)k(u โˆ’ v)Tฬƒ c k1 . 6 Proof of Theorem 2. The proof follows from the proof of Theorem 3.2 in [18] with minor modifications. First we show (a) โ‡’ (b). Assume (b) is false, that is, there exist nonzero u โˆˆ N (AS ) and v โˆˆ N (AS c ) such that ku + vk1,w โ‰ฅ ku โˆ’ vk1,w N and u + v โˆˆ ฮฃN k . Now set x = u + v โˆˆ ฮฃk , obviously for i = 1, ยท ยท ยท , m, we have |hai , xi| = |hai , u + vi| = |hai , u โˆ’ vi|, since either hai , ui = 0 or hai , vi = 0. In other words |Ax| = |A(uโˆ’ v)|. Note that uโˆ’ v 6= โˆ’x, for otherwise we would have u = 0, which is a contradiction. Then, it follows from (a) that we obtain kxk1,w = ku + vk1,w < ku โˆ’ vk1,w , This is a contradiction. Thus, (b) holds. T Next we prove (b) โ‡’ (a). Let b = (b1 , ยท ยท ยท , bm )T = |Ax| where x โˆˆ ฮฃN k . For a fixed ฯƒ = (ฯƒ1 , ยท ยท ยท , ฯƒm ) โˆˆ {โˆ’1, 1}m , we set bฯƒ = (ฯƒ1 b1 , ยท ยท ยท , ฯƒm bm )T . We now consider the following weighted โ„“1 minimization problem: min kzk1,w subject to Az = bฯƒ . (16) zโˆˆRN Its solution is denoted as xฯƒ . Then, we claim that for any ฯƒ โˆˆ {1, โˆ’1}m , if xฯƒ exists (it may not exist), we have kxฯƒ k1,w โ‰ฅ kxk1,w and the equality holds if and only if xฯƒ = ยฑx. โ‹† To prove the claim, we assume ฯƒ โ‹† โˆˆ {1, โˆ’1}m such that bฯƒ = Ax. First note that the statement (b) implies the classical weighted null space property of order k. To see this, for any nonzero h โˆˆ N (A) and T โІ [N ] with |T | โ‰ค k, we set u = h, v = hT โˆ’ hT c and S = [m]. Then, we have u โˆˆ N (AS ) and v โˆˆ N (AS c ). Therefore, the statement (b) now implies 2khT k1,w = ku + vk1,w < ku โˆ’ vk1,w = 2khT c k1,w . โ‹† As a consequence, we have xฯƒ = x by Lemma 2. And, ฯƒ โˆˆ {โˆ’1, 1}m 6= ยฑฯƒ โ‹† , if xฯƒ doesnโ€™t exist then we have Sโ‹† = {i : ฯƒi = ฯƒiโ‹† }. Then ( hai , xi hai , xฯƒ i = โˆ’hai , xi โ‹† similarly we have xโˆ’ฯƒ = โˆ’x. Next, for any nothing to prove. Assume it does exist, set i โˆˆ Sโ‹† , i โˆˆ Sโ‹†c . Set u = x โˆ’ xฯƒ and v = x + xฯƒ . Obviously, u โˆˆ N (ASโ‹† ) and v โˆˆ N (ASโ‹†c ). Furthermore, u + v = 2x โˆˆ ฮฃN k . Then, by the statement (b), we have 2kxk1,w = ku + vk1,w < ku โˆ’ vk1,w = 2kxฯƒ k1,w . This proves (a) and the proof is completed. 7 4 Simulations In this section, we present some simple numerical experiments to illustrate the benefits of using weighted โ„“1 minimization to recover sparse and compressible signals when partial prior support information is available in the phaseless compressive sensing case. In order to facilitate the computation, we follow a nonstandard noise model: b = |Ax|2 + e = {aTi xxT ai }1โ‰คiโ‰คm + e, where e โˆˆ Rm is a noise term with kek2 โ‰ค ฮต. Then the weighted โ„“1 minimization goes to ( N X ฯ‰ โˆˆ [0, 1] i โˆˆ Tฬƒ , 2 wi |zi |, subject to k|Az| โˆ’ bk2 โ‰ค ฮต, where wi = min zโˆˆRN 1 i โˆˆ Tฬƒ c . i=1 (17) (18) Here we adopt the compressive phase retrieval via lifting (CPRL) algorithm developed in [15] to solve this phaseless recovery problem. By using a lifting technique, this problem can be rewritten as a semidefinite program (SDP). More specifically, given the ground truth signal x โˆˆ RN , let X = xxT โˆˆ RN ร—N be an induced rank-1 semidefinite matrix. We further denote ฮฆi = ai aTi , a linear operator B of Z = zz T โˆˆ RN ร—N as B : Z 7โ†’ {Tr(ฮฆi Z)}1โ‰คiโ‰คm โˆˆ Rm and the weight matrix W = diag{wi , 1 โ‰ค i โ‰ค N } โˆˆ RN ร—N . Then the phaseless vector recovery problem (18) can be cast as the following rank-1 matrix recovery problem: min ZโˆˆRNร—N kW ZW T k1 , subject to kB(Z) โˆ’ bk2 โ‰ค ฮต, rank(W ZW T ) = 1, Z  0. This is of course still a non-convex problem due to the rank constraint. The lifting approach addresses this issue by replacing rank(W ZW T ) with Tr(W ZW T ). This leads to an SDP: min ZโˆˆRNร—N Tr(W ZW T ) + ฮปkW ZW T k1 , subject to kB(Z) โˆ’ bk2 โ‰ค ฮต, Z  0, (19) where ฮป > 0 is a design parameter. Then the estimate of x can be finally be found by computing the rank-1 decomposition of the recovered matrix via singular value decomposition. The recovery performance is assessed by the average reconstruction signal to noise ratio (SNR) over 10 experiments. The SNR is measured in dB and it is given by   kxk2 โ™ฏ , (20) SNR(x, x ) = 20 log10 min{kxโ™ฏ โˆ’ xk2 , kxโ™ฏ + xk2 } where x is the true signal and xโ™ฏ is the recovered signal. For all the experiments, we fix the parameter i.i.d ฮป = 1. In the experiments where the measurements are noisy, we set the noise {ei , 1 โ‰ค i โ‰ค m} โˆผ N (0, ฯƒ 2 ) with ฯƒ = 0.1 and ฮต = kek2 . 8 4.1 Sparse Case We first consider the case that x is exactly sparse with an ambient dimension N = 32 and fixed sparsity k = 4. The sparse signals are generated by choosing k nonzero positions uniformly at random, and then choosing the nonzero values from the standard normal distribution for these k nonzero positions. The recovery is done via (19) using a support estimate of size |Tฬƒ | = 4 (i.e., ฯ = 1). Figure 2 shows the recovery performances for different ฮฑ and ฯ‰ with an increasing number of measurements m, both in the noise free and noisy cases. It can be observed that when ฮฑ = 0.75 > 0.5, the best recovery is achieved for very small ฯ‰ whereas a ฯ‰ = 1 results in the lowest SNR for both cases. On the other hand, when ฮฑ = 0.25 < 0.5, the performance of the recovery algorithms is better for large ฯ‰ than that for small ฯ‰. The case ฯ‰ = 0 results in the lowest SNR. When ฮฑ = 0.5, the performance gaps for different ฯ‰ are not particularly large and it seems that a medium ฯ‰ (ฯ‰ = 0.5) achieves the best recovery. In the noise free case, a perfect recovery can be achieved as long as the number of measurements m is large enough. As is also expected that in all settings, comparing to the noise free case, we have a lower SNR in the noisy case. These findings are largely consistent with the theoretical results provided in Section 2. ฮฑ=0.75 ฮฑ=0.5 200 ฮฑ=0.25 200 120 100 150 100 0 10 100 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 50 14 18 22 26 80 30 40 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 50 0 10 60 SNR SNR SNR 150 14 18 22 26 number of measurements m number of measurements m ฮฑ=0.75 ฮฑ=0.5 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 20 0 30 -20 10 14 18 22 26 30 number of measurements m (a) ฮฑ=0.25 25 30 25 15 20 10 20 15 SNR SNR SNR 15 5 10 10 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 5 0 10 14 18 22 26 number of measurements m ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 5 30 0 10 14 18 22 26 number of measurements m ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 0 30 -5 10 14 18 22 26 30 number of measurements m (b) Figure 2: Performance of weighted โ„“1 recovery in terms of SNR averaged over 10 experiments for sparse signals x with N = 32, k = 4, while varying the number of measurements m. From left to right, ฮฑ = 0.75, ฮฑ = 0.5 and ฮฑ = 0.25. (a) Noise Free. (b) ฯƒ = 0.1. 4.2 Compressible Case Here we generate a signal x whose coefficients decay like j โˆ’ฮธ where j โˆˆ {1, ยท ยท ยท , N } and ฮธ = 4.5. This kind of signal itself is not sparse, but can be well approximated by an exactly sparse signal. For this experiment, we set k = 4, i.e., we use the best 4-term approximation. We fix ฯ = 1 as in the sparse case. The phaseless recovery results are presented in Figure 3. It shows that on average a mediate value of ฯ‰ (ฯ‰ = 0.5) results in the best recovery. In general, when ฮฑ > 0.5, smaller ฯ‰ favours better reconstruction results. The opposite conclusion holds for the case that ฮฑ < 0.5. Therefore, as is expected that the behaviors that occur in the exactly sparse case also occur in the compressible case. 9 ฮฑ=0.75 ฮฑ=0.5 ฮฑ=0.25 80 120 100 100 80 60 80 60 60 SNR SNR SNR 40 40 20 40 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 20 0 10 14 18 22 26 30 -20 10 20 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 0 14 18 22 26 number of measurements m number of measurements m ฮฑ=0.75 ฮฑ=0.5 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 0 30 -20 10 14 18 22 26 30 number of measurements m (a) 25 30 20 25 15 20 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 15 10 14 18 22 26 number of measurements m 30 30 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 20 10 15 10 5 5 0 0 -5 10 14 ฯ‰=0 ฯ‰=0.2 ฯ‰=0.5 ฯ‰=0.8 ฯ‰=1 25 SNR 35 5 10 ฮฑ=0.25 30 SNR SNR 40 18 22 26 number of measurements m 30 -5 10 14 18 22 26 30 number of measurements m (b) Figure 3: Performance of weighted โ„“1 recovery in terms of SNR averaged over 10 experiments for compressible signals x with N = 32, ฮธ = 4.5, while varying the number of measurements m. From left to right, ฮฑ = 0.75, ฮฑ = 0.5 and ฮฑ = 0.25. (a) Noise Free. (b) ฯƒ = 0.1. 5 Conclusion In this paper, we established the sufficient SRIP condition and the sufficient and necessary weighted null space property condition for phaseless compressive sensing using partial support information via weighted โ„“1 minimization, and we conducted some numerical experiments to illustrate the theoretical results. Some further problems are left for future work. As we only consider the real-valued signal reconstruction case, it will be challenging to generalize the present results to the complex-valued signal case. Besides it will be very interesting to construct the measurement matrix A โˆˆ Rmร—N satisfying the weighted null space property given in (15) directly. Acknowledgements This work is supported by the Swedish Research Council grant (Reg.No. 340-2013-5342). References [1] Cai, T. T. and Zhang, A. (2014). Sparse representation of a polytope and recovery of sparse signals and low-rank matrices. IEEE Transactions on Information Theory 60(1) 122โ€“132. [2] Candes, E. J., Eldar, Y. C., Strohmer, T. and Voroninski, V. (2015). Phase retrieval via matrix completion. SIAM review 57(2) 225โ€“251. [3] Candes, E. J., Li, X. and Soltanolkotabi, M. (2015). Phase retrieval via Wirtinger flow: Theory and algorithms. IEEE Transactions on Information Theory 61(4) 1985โ€“2007. 10 [4] Candes, E. J., Strohmer, T. and Voroninski, V. (2013). Phaselift: Exact and stable signal recovery from magnitude measurements via convex programming. Communications on Pure and Applied Mathematics 66(8) 1241โ€“1274. [5] Candes, E. J. and Tao, T. (2005). Decoding by linear programming. IEEE Transactions on Information Theory 51(12) 4203โ€“4215. [6] Chen, W. and Li, Y. (2016). Recovery of signals under the high order RIP condition via prior support information. arXiv preprint arXiv:1603.03464. [7] Chen, Y. and Candes, E. (2015). Solving random quadratic systems of equations is nearly as easy as solving linear systems. In Advances in Neural Information Processing Systems (pp. 739โ€“747). [8] Eldar, Y. C. and Kutyniok, G. (2012). Compressed Sensing: Theory and Applications. Cambridge University Press. [9] Foucart, S. and Rauhut, H. (2013). A Mathematical Introduction to Compressive Sensing. New York, NY, USA: Springer-Verlag. [10] Friedlander, M. P., Mansour, H., Saab, R. and Yilmaz, O. (2012). Recovering compressively sampled signals using partial support information. IEEE Transactions on Information Theory 58(2) 1122โ€“1134. [11] Gao, B., Wang, Y. and Xu, Z. (2016). Stable signal recovery from phaseless measurements. Journal of Fourier Analysis and Applications 22(4) 787โ€“808. [12] Gao, B. and Xu, Z. (2017). Phaseless recovery using the GaussNewton method. IEEE Transactions on Signal Processing 65(22) 5885โ€“5896. [13] Mansour, H. and Saab, R. (2017). Recovery analysis for weighted โ„“1 -minimization using the null space property. Applied and Computational Harmonic Analysis 43(1) 23โ€“38. [14] Netrapalli, P., Jain, P. and Sanghavi, S. (2015). Phase retrieval using alternating minimization. IEEE Transactions on Signal Processing 18(63) 4814โ€“4826. [15] Ohlsson, H., Yang, A. Y., Dong, R. and Sastry, S. S. (2011). Compressive phase retrieval from squared output measurements via semidefinite programming. arXiv preprint arXiv:1111.6323. [16] Shechtman, Y., Beck, A. and Eldar, Y. C. (2014). GESPAR: Efficient phase retrieval of sparse signals. IEEE Transactions on Signal Processing 62(4) 928โ€“938. [17] Voroninski, V. and Xu, Z. (2016). A strong restricted isometry property, with an application to phaseless compressed sensing. Applied and Computational Harmonic Analysis 40(2) 386โ€“395. [18] Wang, Y. and Xu, Z. (2014). Phase retrieval for sparse signals. Applied and Computational Harmonic Analysis 37(3) 531โ€“544. [19] Zhou, S., Xiu, N., Wang, Y. and Kong, L. (2013). Exact recovery for sparse signal via weighted โ„“1 minimization. arXiv preprint arXiv:1312.2358. [20] Zhou, Z. and Yu, J. (2017). Recovery analysis for weighted mixed โ„“2 /โ„“p minimization with 0 < p โ‰ค 1. arXiv preprint arXiv:1709.00257. 11
7cs.IT
Inferential results for a new measure of inequality Youri Davydova , Francesca Greselinb a Laboratoire Paul Painleveฬ, Universiteฬ des Sciences et Technologies de Lille (Lille 1), arXiv:1706.05576v1 [math.ST] 17 Jun 2017 Lille, France and Saint Petersburg State University, Saint Petersburg, Russia b Dipartimento di Statistica e Metodi Quantitativi, Universitaฬ€ di Milano Bicocca, Milan, Italy Abstract. In this paper we derive inferential results for a new index of inequality, specifically defined for capturing significant changes observed both in the left and in the right tail of the income distributions. The latter shifts are an apparent fact for many countries like US, Germany, UK, and France in the last decades, and are a concern for many policy makers. We propose two empirical estimators for the index, and show that they are asymptotically equivalent. Afterwards, we adopt one estimator and prove its consistency and asymptotic normality. Finally we introduce an empirical estimator for its variance and provide conditions to show its convergence to the finite theoretical value. An analysis of real data on net income from the Bank of Italy Survey of Income and Wealth is also presented, on the base of the obtained inferential results. Keywords and phrases: Income inequality, Lorenz curve, Gini Index, consistency, asymptotic normality, economic inequality, confidence interval, nonparametric estimator. 1 Introduction In view of measuring economic inequality in a society, suppose that we are interested, for instance, in incomes. Let X be an โ€™incomeโ€™ random variable with non negatively supported cdf F (x). 1 Next, define Q(p) = F โˆ’1 (p) = inf{x : F (x) โ‰ฅ p, p โˆˆ [0, 1]} as the p-th quantile of X, and suppose that X possesses a finite mean Z Z โˆž xF (dx) = ยตF = 0 1 F โˆ’1 (p)dp. 0 The Lorenz curve, introduced by Lorenz (1905), is an irreplaceable tool in this domain. It is defined by 1 lF (p) = ยตF Z p F โˆ’1 (t)dt. (1.1) 0 The curve lF (p) expresses the share of income possessed by the p% poorer part of population. It has been expressed firstly by Pietra (1915, with English translation now available as Pietra, 2014), and mathematically formulated as in (1.1) by Gastwirth (1971). In the following we will also employ mF (p) = 1 โˆ’ lF (1 โˆ’ p), which provides the share of income owned by the richer p% of the population. Obviously, mF (p) is the curve obtained by applying a central symmetry to lF (p), with respect to the center of the unit square, as R1 shown in Figure 1.1 and allows us also to rephrase the Gini into GF = 0 (mF (p)โˆ’lF (p))dp. 1.0 We recall that the Gini can be rephrased as the weighted average of all comparisons made 0.0 0.2 0.4 0.6 0.8 l F (t ) m F (t ) 0.0 0.2 0.4 0.6 0.8 1.0 Figure 1.1: Curves lF (p) and mF (p) among the mean income of the poorest and the overall mean (Greselin et al. 2012, Greselin 2014). When dealing with skewed distributions, as it is the case for many economic size distributions, the median should be preferred to the mean, in such a way that Gastwirth (2014) proposed to modify the Gini accordingly. Very recently, motivated by the observed shifts toward the extreme values in income distributions, a new focus is introduced in Gastwirth (2016), almost contemporarily to 2 Davydov and Greselin (2016). Policy makers are nowadays interested in understanding what happens in the more critical portions of the population, as significant changes have been observed both in the left and in the right tail of the income distributions in countries like US, Germany, UK, France in the last decades. Notice that the classical Lorenz curve provides useful pointwise information with reference to poorest people, while on the other hand, as L(p) approaches 1 as p approaches 1, it does not display the variation within the upper end (f.i., top 5% or 1%) of the distribution clearly. The novel approach is to consider equally sized and opposite groups of population, and compare their mean income. Aiming at contrasting the economic position of the group of the poorer p% to the one of the p% of the richest, the following inequality curve has been introduced DF (p) = mF (p) โˆ’ lF (p) . mF (p) (1.2) In the case of perfect equality, each fraction p of population has same mean income, hence DF (p) = 0 for all p โˆˆ [0, 1]. While the income distribution moves toward more variability, the mean income income ยตF lF (p) p ยตF mF (p) p of the p% of richest people will be moving far from the mean of the p% of poorest part of the population, and DF (p) raises toward 1. Hence, we can represent the pointwise measure of inequality in the population by plotting DF (p). Naturally, we can summarize all the information given by the curve DF (p) in a single measure of inequality DF , by taking the expected value Z 1 DF (p)dp. DF = (1.3) 0 Notice that DF is the area between the observed inequality curve DF (p) and the curve of perfect equality, which is the horizontal line passing through the origin of the axes. The structure of the paper is as follows. Section 2 introduces two estimators for the new inequality measure, and provide reasons for selecting them in view of their main purpose. The third section, which is the core of the paper, states the main inferential results, in more detail we will show the consistency of the estimators, state their asymptotical distribution, and the asymptotic negligibility of their difference. We also introduce an empirical estimator for the variance, and establish its convergence to the finite variance of the estimator. Some lemmas useful for the inferential theory have been presented in Section 4, along with their proof. Section 5 shows how the inferential results can be employed to develop an analysis on real income data. Final considerations are given in Section 6. 3 2 Estimators Economic data on the entire (or complete) population is rarely available, so most studies are based on data obtained from well-designed sample surveys. Hence we usually have to estimate summary measures from samples. We introduce here two empirical estimators, b n and D e n for estimating DF . The first one is derived, in a very natural way, say D by replacing the population cdf F (x) and mean value ยตF in (1.3) by their empirical  P P counterparts Fn (x) = n1 ni=1 1[0,x] Xi , and X n = n1 ni=1 Xi , and then considering the empirical Lorenz curve, say Z p 1 ln (p) = Fnโˆ’1 (s)ds, Xn 0 and its dual mn (p) = 1 Xn Z 1 Fnโˆ’1 (s)ds, 1โˆ’p as follows 1 mn (p) โˆ’ ln (p) dp mn (p) 0 Z 1 := 1 โˆ’ Gn (p)dp Z bn = D (2.1) 0 where we set Gn (p) = ln (p)/mn (p). Then, the second estimator is defined in terms of the order statistics X1:n โ‰ค ยท ยท ยท โ‰ค Xn:n of the i.i.d. sample X1 , X2 , ..., Xn drawn from X, therefore we define Pi n X X 1 en = 1 โˆ’ Pn k=1 k:n D n i=1 k=nโˆ’i+1 Xk:n n 1X := 1 โˆ’ Gn (i/n) n i=1 (2.2) where Gn (i/n) expresses the ratio between the mean income of the poorest i and of the richest i elements in the sample. b n and D e n are asympWe will show later, in Theorem 3.5, that the two estimators D b n is suitable for developing inferential results, totically equivalent. While the estimator D e n is much simpler when it comes to implement code for the analysis of real data. D 3 Inferential results In this Section we will present our main results, starting from the consistency of the b n , next we state its asymptotic normal distribution, and then we deal with estimator D its variance estimation. Finally, we will show the asymptotic equivalence of the two e n and D b n. estimators D 4 Unless explicitly stated otherwise, we assume throughout that the cdf F (x) of X is a continuous function. This is a natural choice when modeling income or wealth distributions, and for many other economic size distributions. 3.1 bn Consistency of D b n is a consistent estimator for DF . Theorem 3.1. D Proof. From the normalized definition of the empirical Lorenz curve and its dual, say ln (p) and mn (p), it is useful here to introduce their absolute versions, given by Ln (p) = R p โˆ’1 R1 b n as Fn (s)ds and Mn (p) = 1โˆ’p Fnโˆ’1 (s)ds. We may rephrase D 0 Z bn = D 0 1 Mn (p) โˆ’ Ln (p) dp Mn (p) (3.1) For all p โˆˆ [0, 1], we have that Ln (p) converges, with probability 1, uniformly to Rp L(p) = 0 F โˆ’1 (s)ds (see Goldie, 1977). With the same approach, we have that Mn (p) R1 converges, with probability 1, uniformly to M (p) = 1โˆ’p F โˆ’1 (s)ds. As L(p) โ‰ค M (p), due to the Lebesgue dominated convergence theorem we get the thesis. 3.2 bn Asympthotic normality of the estimator D Theorem 3.2. If the moment E|X|2+ฮด is finite for some ฮด > 0, then we have the asymptotic representation n  โˆš  1 X b n Dn โˆ’ D = โˆš h(Xi ) + oP (1), n i=1 (3.2) where oP (1) denotes a random variable that converges to 0 in probability when n โ†’ โˆž, and Z h(Xi ) = +โˆž    1[0,x] (Xi ) โˆ’ F (x) ฯ‰ F (x) dx 0 with the weight function ฯ‰(t) = ฯ‰1 (t) + ฯ‰2 (t), where Z t Z 1 1 L(1 โˆ’ s) ฯ‰1 (t) = ds and ฯ‰2 (t) = 2 ds. t M (s) 0 [M (1 โˆ’ s)] (3.3) b n is asymptotically Corollary 3.3. Under the conditions of Theorem 3.2, we have that D normally distributed, that is  โˆš  b n โˆ’ D =โ‡’ N (0, ฯƒ 2 ), n D F nโ†’โˆž 5 where ฯƒF2 โˆž Z Z = 0 y    F (x) ฯ‰ F (x) dx 1 โˆ’ F (y) ฯ‰ F (y) dy.  0 The proof follows immediately from (3.2) by applying the Central Limit Theorem of P. Leฬvy. Proof of Theorem 3.2 b n and D, we get From the definition of D  Z 1  โˆš  โˆš Ln (t) L(t) b n Dn โˆ’ D = โˆ’ n โˆ’ dt Mn (t) M (t) 0 Z 1 Z 1 โˆš โˆš Ln (t) โˆ’ L(t) L(t) [Mn (t) โˆ’ M (t)] =โˆ’ n dt + n dt + Rn (t) (3.4) M (t) [M (t)]2 0 0 (1) (2) where the remainder term is given by Rn (t) = Rn + Rn and   Z 1  โˆš 1 1 (1) Ln (t) โˆ’ L(t) โˆ’ dt, Rn = n M (t) Mn (t) 0   Z 1  โˆš L(t) 1 1 (2) Rn = n โˆ’ Mn (t) โˆ’ M (t) dt. Mn (t) M (t) 0 M (t) (1) (3.5) (3.6) (2) We will later show (Lemma 4.1 and 4.2, respectively) that Rn and Rn are of order oP (1). The proof follows the approach of Greselin, Pasquazzi and Zitikis (2010), to state the asymptotic normality for the Zenga inequality index (Zenga, 2007). Hence we now proceed our analysis of the first two terms in (3.4), by using the Vervaat process Z p Z F โˆ’1 (p)   โˆ’1 โˆ’1 Vn (p) = Fn (t) โˆ’ F (t) dt + Fn (x) โˆ’ F (x) dx 0 (3.7) 0 and its dual, Vnโˆ— (p) Z = 1 Fnโˆ’1 (t) โˆ’F โˆ’1  (t) dt + Z โˆž  Fn (x) โˆ’ F (x) dx (3.8) F โˆ’1 (p) p for which we know that Vnโˆ— (p) = โˆ’Vn (p). For mathematical and historical details on the Vervaat process, see Zitikis (1998), Davydov and Zitikis (2004), and Greselin et al. (2009). โˆš Now, denoting the uniform on [0, 1] empirical process by en (p) = n(Fn (F โˆ’1 (p)) โˆ’ p) and using one property of the Vervaat process, namely โˆš nVn (p) โ‰ค |en (p)||Fnโˆ’1 (p) โˆ’ F โˆ’1 (p)|, (3.9) we find a bound for the first term in (3.4) as follows "Z โˆ’1 # Z 1 Z 1 F (t)  โˆš โˆš Ln (t) โˆ’ L(t) 1 โˆ’ n dt = n Fn (x) โˆ’ F (x) dx dt + O(Rn(3) ) M (t) 0 0 M (t) 0 6 where Rn(3) โˆš =โˆ’ n 1 Z 0 1 Z 1 Vn (t) dt M (t) 1 |en (t)| Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) dt. M (t) โ‰ค 0 (3) We will later show (Lemma 4.3) that Rn = oP (1). Now we deal with the second term in (3.4), and we obtain, using similar arguments as before โˆš 1 Z n 0 L(t) [Mn (t) โˆ’ M (t)] dt [M (t)]2 Z +โˆž  Z 1  โˆš L(t) =โˆ’ n Fn (x) โˆ’ F (x) dx dt + O(Rn4 ), 2 โˆ’1 [M (t)] 0 F (1โˆ’t) where Rn(4) = โˆš Z 1 n Vnโˆ— (1 โˆ’ t) 0 Z L(t) dt [M (t)]2 1 |en (t)| Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) โ‰ค 0 L(t) dt. [M (t)]2 (4) In Lemma 4.4 we show that Rn = oP (1), therefore we have "Z โˆ’1 #  โˆš Z 1 1 F (t)  โˆš  bn โˆ’ D = n n D Fn (x) โˆ’ F (x) dx dt 0 M (t) 0 Z +โˆž  Z 1  โˆš L(t) โˆ’ n Fn (x) โˆ’ F (x) dx dt + oP (1). 2 0 [M (t)] F โˆ’1 (1โˆ’t) (3.10) We notice that the first term in the right hand side of equation (3.10) could be rewritten as โˆš n Z 0 1 1 M (t) "Z #  Fn (x) โˆ’ F (x) dx dt F โˆ’1 (t) 0 โˆš Z 1 Z +โˆž   Fn (x) โˆ’ F (x) 1[0,F โˆ’1 (t)] (x)dx 1 dt M (t) 0 0  Z +โˆž Z 1  โˆš 1 = n Fn (x) โˆ’ F (x) 1[F (x),1] (t) dt dx M (t) 0 0 Z 1  Z +โˆž  โˆš 1 = n Fn (x) โˆ’ F (x) dt dx 0 F (x) M (t) n 1 X =โˆš h1 (Xi ) n i=1 = n 7 where +โˆž Z  h1 (Xi ) =   1[0,x] (Xi ) โˆ’ F (x) ฯ‰1 F (x) dx, 0 and 1 Z ฯ‰1 (t) = t 1 ds. M (s) For the second term in the right hand side of equation (3.10), using the change of variable t = 1 โˆ’ s, we obtain: โˆš โˆ’ n Z 0 1 L(1 โˆ’ s) [M (1 โˆ’ s)]2 +โˆž Z F โˆ’1 (s) where Z  n  1 X Fn (x) โˆ’ F (x) dx ds = โˆ’ โˆš h2 (Xi ), n i=1 +โˆž  h2 (Xi ) =   1[0,x] (Xi ) โˆ’ F (x) ฯ‰2 F (x) dx, 0 and t L(1 โˆ’ s) ฯ‰2 (t) = 2 ds = 0 [M (1 โˆ’ s)] This completes the proof of Theorem 3.2. Z 3.3 Z 1 1โˆ’t L(s) ds. [M (s)]2 Convergence of the empirical variance  We deal here with the theoretical variance V ar h(X1 ) , that is  Z โˆž Z y    2 F (x) ฯ‰ F (x) dx 1 โˆ’ F (y) ฯ‰ F (y) dy ฯƒF = 0 and its empirical counterpart  Z โˆž Z y    2 Fn (x) ฯ‰ Fn (y) dx 1 โˆ’ Fn (y) ฯ‰ Fn (y) dy. ฯƒn = 0 (3.11) 0 (3.12) 0 Let x0 โ‰ฅ 0 be the minimum value in the support of F (x), i.e. the value such that F (y) = 0 for y < x0 and F (y) > 0 if y > x0 . Analogously, let T0 be maximum value in the support of F (x), i.e. such that F (x) < 1 โˆ€x < T0 and F (T0 ) = 1. Notice that we may have T0 = +โˆž. Then we have โ€ข Fn (x) = 0 โˆ€x < x0 because X โ‰ฅ x0 a.s., โ€ข ฯƒF2 = Rโˆž โ€ข ฯƒn2 = Rโˆž x0 x0 [. . .] . . . dy, [. . .] . . . dy. Therefore, without loss of generality, we can take x0 = 0. 8 Theorem 3.4. Assume that E|X|2+ฮด < +โˆž for some ฮด > 0. Then, we have a.s. ฯƒn2 โˆ’โ†’ ฯƒF2 . (3.13) nโ†’โˆž Proof. The proof is composed by three steps. Step 1 : For all , T such that 0 <  < T < T0 , we will show that, with probability 1, for almost all y โˆˆ [, T ], and with ฯ‰(t) = ฯ‰1 (t) + ฯ‰2 (t) given by (3.3) we have Z y Z y  Fn (x) ฯ‰ Fn (y) dx โˆ’โˆ’โˆ’โ†’ F (x) ฯ‰(F (x)) dx. nโ†’โˆž 0 (3.14) 0 We begin by the study of the first part of (3.14) related to ฯ‰1 (t), i.e. Z yZ 1 Z y Z yZ 1 1 Fn (x) ฯ‰1 (Fn (x)) dx = 1[Fn (x),1] (s)Fn (s) ฯˆn (x, s) ds dx. ds dx := Mn (s) 0 0 0 0 0 We know that โ€ข as Fn (x) โ†’ F (x) a.s. (uniformly), we have the convergence 1[Fn (x),1] (s) โ†’ 1[F (x),1] (s) with probability 1 for almost all s โˆˆ [0, 1] and x โˆˆ R+ , โ€ข โˆ€s โˆˆ [0, 1] and with probability 1, we have that Z 1 Z โˆ’1 Mn (s) = Fn (y)dy โˆ’โˆ’โˆ’โ†’ nโ†’โˆž 1โˆ’s โ€ข Mn (s) โ‰ฅ sX n 1 F โˆ’1 (y)dy = M (s), 1โˆ’s โˆ€s โˆˆ [0, 1]. As X n โ†’ ยตF a.s., with probability 1 there exists a constant C > 0 such that ฯˆn (x, s) โ‰ค 1[Fn (x),1] (s)Fn (x) 1 sX n โ‰ค C. Hence, Lebesgue theorem gives (3.14), with ฯ‰ replaced by ฯ‰1 . Now we consider the second part of (3.14), where ฯ‰2 (t) takes the place of ฯ‰: Z y Z yZ 1 Z yZ 1 Ln (1 โˆ’ s) Fn (x) ฯ‰2 (Fn (x)) dx = 1[0,Fn (x)] (s)Fn (x) ds dx := ฯˆen (x, s) ds dx [Mn (s)]2 0 0 0 0 0 and observe that โ€ข 1[0,Fn (x)] (s) โ†’ 1[0,F( x)] (s) with probability 1 for almost all s โˆˆ [0, 1] and x โˆˆ R+ , 9 โ€ข โˆ€s โˆˆ [0, 1], with probability 1, we have that Ln (1 โˆ’ s) โ†’ L(1 โˆ’ s), and Mn (1 โˆ’ s) โ†’ M (1 โˆ’ s), โ€ข Ln (1 โˆ’ s) โ‰ค M (1 โˆ’ s) โˆ€s โˆˆ [0, 1]. Therefore ฯˆen (x, s) โ‰ค 1[0,Fn (x)] (s)Fn (x) โ‰ค 1[0,Fn (x)] (s)Fn (x) โ‰ค Fn (x)  1 โˆ’ Fn (x) X n 1 Mn (1 โˆ’ s) 1 (1 โˆ’ s)X n 1 โ‰ค  1 โˆ’ Fn (T ) X n Once more using Lebesgue theorem we get โˆ€y โ‰ค T Z y Z a.s. Fn (x) ฯ‰2 (Fn (x)) dx โˆ’โ†’ 0 โ†’ 1  < +โˆž. 1 โˆ’ F (T ) ยตF y F (x) ฯ‰2 (F (x)) dx 0 which completes the proof of (3.14). Step 2 : For all , T such that 0 <  < T < T0 and given Z T 2 ฯƒn [, T ] = ฮจn (y)dy  where y Z  Fn (x)ฯ‰ Fn (x) dx ฮจn (y) =    1 โˆ’ Fn (y) ฯ‰ Fn (y) , 0 we will show that, with probability 1, ฯƒn2 [, T ] โˆ’โˆ’โˆ’โ†’ ฯƒ 2 [, T ]. (3.15) nโ†’โˆž Due to the previous step, for every y we know that ฮจn (y) converges, with probability 1, to Z y ฮจ(y) =  F (x) ฯ‰ F (x) dx    1 โˆ’ F (y) ฯ‰ F (y) . 0 We have shown that, with probability 1,     lim sup sup Fn (x) ฯ‰ Fn (x) โ‰ค 1 + n โ‰คxโ‰คT and using  ฯ‰1 Fn (y) = Z 1 Fn (y) 1 1 โˆ’ F (T ) 1 1 ds โ‰ค , Mn (s) Fn (y)X n 10  1 , ยตF it follows that we have a.s.   sup ฯ‰1 Fn (y) lim sup n  โ‰ค โ‰คyโ‰คT 1 . F ()ยตF Hence  lim sup n   sup ฮจn (y) โ‰ค y 1 + โ‰คxโ‰คT 1 1 โˆ’ F (T )  1 1 + F () 1 โˆ’ F (T )  1 . ยต2F (3.16) Observing now that the function at the right hand side in (3.16) is integrable on [, T ], we can apply Lebesgueโ€™s dominated convergence theorem and prove (3.15). Step 3 : To complete the proof of Theorem 3.4 we need to obtain a bound for the integrals ฯƒn2 [0, ] and ฯƒn2 [T, โˆž]. We use the following more delicate estimation of ฯ‰(t), for all ฮณ > 0: there exists a positive constant Cฮณ such that Cฮณ 1 . ฮณ ยตF t (1 โˆ’ t)ฮณ ฯ‰(t) โ‰ค (3.17) Indeed, as L(t) โ‰ค tยตF โ‰ค M (t), for t โˆˆ [0, 1], we have Z 1 1 1 1 ฯ‰1 (t) โ‰ค ds = | ln t|. ยตF t s ยตF and 1 ฯ‰2 (t) โ‰ค ยตF Z 0 t 1 1 | ln(1 โˆ’ t)|. ds = 1โˆ’s ยตF Hence, for every ฮณ > 0, there exists a constant 0 < Cฮณ < +โˆž, depending only on ฮณ, such that for all t โˆˆ (0, 1) ฯ‰1 (t) โ‰ค Cฮณ , ยตF tฮณ ฯ‰2 (t) โ‰ค which jointly give the estimation (3.17). 11 Cฮณ , ยตF (1 โˆ’ t)ฮณ For ฮณ โ‰ค 1/2, we have  Z  Z y    2 Fn (x) ฯ‰ Fn (x) dx 1 โˆ’ Fn (y) ฯ‰ Fn (y) dy ฯƒn [0, ] = 0 0 Z  "Z y # Cฮณ  Cฮณ dx 1 โˆ’ Fn (y) ฮณ dy ฮณ ฮณ 1 โˆ’ Fn (x) X n Fn (x) 1 โˆ’ Fn (x) X n 0 0  Z Z y 1โˆ’2ฮณ Cฮณ2  1โˆ’ฮณ โ‰ค Fn (x) dx 1 โˆ’ Fn (y) Fn (y)โˆ’ฮณ dy 2 0 Xn 0 Z 1โˆ’2ฮณ Cฮณ2  dy y Fn1โˆ’2ฮณ (y) 1 โˆ’ Fn (y) โ‰ค 2 Xn 0 Z Cฮณ2  โ‰ค y dy 2 Xn 0 โ‰ค = Fn (x) 2 Cฮณ2 2 Fnฮณ (x) . (3.18) 2 Xn We have similarly ฯƒn2 [T, โˆž] โ‰ค โ‰ค Cฮณ2 Z 2 Xn Cฮณ2 2 Xn Z โˆž 1โˆ’2ฮณ yFn1โˆ’2ฮณ (y) 1 โˆ’ Fn (y) dy T โˆž 1โˆ’2ฮณ y 1 โˆ’ Fn (y) dy. (3.19) T e and a new random variable Y , e F, e P) Let us introduce a new probability space (โ„ฆ,  e Y = Xi = 1 . Then taking the values Xi , for i = 1, . . . , n, such that P n e {Y > y} 1 โˆ’ Fn (y) = P e |2+p E|Y y 2+p ) ( n 1 1 X 2+p = 2+p X . y n i=1 i โ‰ค If p โ‰ค ฮด then, due to the strong law of large numbers, n 1 X 2+p X n i=1 i a.s. โˆ’โ†’ E|X|2+p < +โˆž, hence, with probability 1, we have lim sup n ฯƒn2 [T, โˆž] Cฮณ2 โ‰ค E(X 2+ฮด ) ยต2F 12 Z T โˆž y (1โˆ’(1โˆ’2ฮณ)(2+ฮด)) dy. (3.20) Rโˆž Observing now that, for ฮณ < ฮด/[2(2 + ฮด)], the integral T y (1โˆ’(1โˆ’2ฮณ)(2+ฮด)) dy converges,  and defining ฮฒ such that 1 โˆ’ (1 โˆ’ 2ฮณ)(2 + ฮด) = โˆ’(1 + ฮฒ), then (3.20) takes the form lim sup ฯƒn2 [T, โˆž] n Cฮณ2 1 โ‰ค E(X 2+ฮด ) . 2 ยตF ฮฒ Tฮฒ (3.21) Evidently, replacing Fn (x) by F (x) in (3.18) and (3.21), we obtain their theoretical counterparts ฯƒF2 [0, ] 2 Cฮณ2 , โ‰ค 2 ยต2F (3.22) and ฯƒF2 [T, โˆž] โ‰ค Cฮณ2 1 E(X 2+ฮด ) . 2 ยตF ฮฒ Tฮฒ (3.23) Now, collecting the bounds (3.18) and (3.22), the convergence stated in (3.15), and finally bounds (3.21) and (3.23) from the three steps lim sup ฯƒn2 โˆ’ ฯƒF2 n โ‰ค lim sup ฯƒn2 [0, ] โˆ’ ฯƒF2 [0, ] + lim sup ฯƒn2 [, T ] โˆ’ ฯƒF2 [, T ] + lim sup ฯƒn2 [T, โˆž] โˆ’ ฯƒF2 [T, โˆž] โ‰ค n C2 2 ฮณ  2 ยตF n + 2 ฮฒ Cฮณ2 ยต2F E(X 2+ฮด ) n 1 . Tฮฒ (3.24) Taking  โ†’ 0 and T โ†’ โˆž in (3.24), we arrive at (3.13). b n, Having established the consistency and asymptotic normality for the estimator D e n defined in (2.2). we would like to prove similar properties for the second estimator D bn โˆ’ D e n and prove its asymptotic To do this, we will focus on their difference โˆ†n := D negligibility. Theorem 3.5. If the moment E|X|2+ฮด is finite for some ฮด > 0, then we have โˆš p n|โˆ†n | โˆ’โ†’ 0. (3.25) Before proving Theorem 3.5, it is worth to state two useful Corollaries. Corollary 3.6. If the moment E|X|2+ฮด is finite for some ฮด > 0, then we have โˆš e n โˆ’ DF ) =โ‡’ N (0, ฯƒF2 ) n(D  where ฯƒF2 = V ar h(X1 ) is the theoretical variance. 13 (3.26) Corollary 3.7. Under the same assumptions, we have also e n โˆ’ DF ) โˆš (D n =โ‡’ N (0, 1) ฯƒn (3.27) where ฯƒn2 is the empirical counterpart for ฯƒF2 given by (3.12). e n by D b n. The same is true if we replace D Proof. (of Theorem 3.5). Let  := n = โˆผ nโˆ’ฮฑโˆ’1/2 , where 0 < ฮฑ < mn n ฮด . 2(2+ฮด) We have Z 1 mn n 1 X 1X Gn (t)dt โˆ’ Gn (t)dt โˆ’ Gn (i/n) + Gn (i/n) |โˆ†n | โ‰ค n i=1 n i=m +1  0 n Z i/n n X โ‰ค 2 + [Gn (t) โˆ’ Gn (i/n)] dt Z  i=mn +1 (iโˆ’1)/n [,1] โ‰ค 2 + ฯ‰Gn (1/n) (3.28) [,1] where ฯ‰Gn is the modulus of continuity of Gn on the interval [, 1] given by [,1] ฯ‰Gn (h) = |Gn (t) โˆ’ Gn (s)|. sup โ‰คt, sโ‰ค1, |tโˆ’s|โ‰คh Let t โˆˆ [(i โˆ’ 1)/n, i/n], then Ln (t) Ln (i/n) โˆ’ Mn (t) Mn (i/n) |Gn (t) โˆ’ Gn (i/n)| = 1 Ln (i/n) |Ln (t) โˆ’ Ln (i/n)| + |Mn (i/n) โˆ’ Mn (t)| Mn (t) Mn (t)Mn (i/n) โ‰ค 2 โ‰ค t Xn [,1] ฯ‰Ln (1/n), (3.29) where we used Mn (s) = 1 โˆ’ Ln (1 โˆ’ s) and the inequalities Ln (s) โ‰ค Mn (s), s X n โ‰ค Mn (s) that hold true โˆ€s โˆˆ [0, 1]. From the bounds in (3.28) and (3.29) we get |โˆ†n | โ‰ค 2 + 2 X n [,1] ฯ‰Ln (1/n). (3.30) As for t โˆˆ [(i โˆ’ 1)/n, i/n] Z |Ln (t) โˆ’ Ln (i/n)| = i/n Fnโˆ’1 (s)ds = Xi:n (i/n โˆ’ t) โ‰ค t 1 Xi:n , n we get [,1] ฯ‰Ln (1/n) โ‰ค 1 n max Xk:n โ‰ค mn โ‰คkโ‰คn 1 Mn n 14 where Mn = max Xk:n . kโ‰คn Therefore, due to (3.30), we obtain โˆš n|โˆ†n | โ‰ค 2 2Mn . + ฮฑ n X n n1/2โˆ’ฮฑ As 2/nฮฑ โ†’ 0 and X n โ†’ ยตF , it is sufficient to state the convergence in probability of Mn /n1/2โˆ’ฮฑ to 0. We have, for t > 0 :     Mn P โ‰ฅt = P Mn โ‰ฅ tn1/2โˆ’ฮฑ โ‰ค n P X โ‰ฅ tn1/2โˆ’ฮฑ 1/2โˆ’ฮฑ n E|X|2+ฮด โ‰ค n 1/2โˆ’ฮฑ 2+ฮด โˆ’โˆ’โˆ’โ†’ 0 nโ†’โˆž (tn ) as we have chosen ฮฑ < 4 ฮด . 2(2+ฮด) Proofs Lemma 4.1. Under the conditions of Theorem 3.2, we have that Rn(1) = oP (1). (1) Proof. We estimate Rn by splitting the integral in two parts, by choosing ฯ โˆˆ (0, 1)   Z 1  โˆš 1 1 (1) Ln (t) โˆ’ L(t) โˆ’ dt Rn = n M (t) Mn (t) 0 Z ฯ Z 1 โˆš โˆš = n . . . dt + n . . . dt 0 ฯ := Rn(1,1) + Rn(1,2) . (4.1) (1,1) We now look for getting a bound for Rn and initially deal with its first part, given by Z ฯ  1 โˆš n Ln (t) โˆ’ L(t) dt. (4.2) M (t) 0 Provided that t < ฯ, we have that M (t) โ‰ฅ t F โˆ’1 (1 โˆ’ ฯ), and Z ฯ โˆš 1 n Ln (t) โˆ’ L(t) dt 0 t  Z ฯ  Z F โˆ’1 (t)   โˆš 1 Vn (t) โˆ’ Fn (x) โˆ’ F (x) dx dt = n 0 t 0  Z ฯ Z ฯ  Z F โˆ’1 (t)   โˆš โˆš 1 1 = n Vn (t)dt โˆ’ n Fn (x) โˆ’ F (x) dx dt. 0 t 0 t 0 (4.3) Now we consider the lefthand term in (4.3), and set Kn = sup tโˆˆ(0,1) |en (t)| , 1/2โˆ’ t (1 โˆ’ t)1/2โˆ’ 15 (4.4) where en (t) = โˆš  n Fn (F โˆ’1 (t)) โˆ’ t . We know that (see (9.2) in Greselin et al. 2010) Kn = OP (1). (4.5) Therefore, employing the inequality in (3.9) related to the Vervaat process, and choosing  such that 0 <  < 21 , we obtain Z ฯ Z ฯ โˆš 1 1 n Vn (t)dt โ‰ค |en (t)||Fnโˆ’1 (t) โˆ’ F โˆ’1 (t)| dt t t 0 0 Z ฯ 1 1/2โˆ’ t (1 โˆ’ t)1/2โˆ’ Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) dt โ‰ค Kn t Z0 ฯ 1 โ‰ค Kn Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) dt. 1/2+ 0 t a.s. As |Fnโˆ’1 (t)โˆ’F โˆ’1 (t)| โ‰ค Fnโˆ’1 (ฯ)+F โˆ’1 (ฯ) โˆ’โ†’ 2 F โˆ’1 (ฯ), by Lebesgue dominated convergence theorem the integral Z ฯ 1 a.s. Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) dt โˆ’โ†’ 0 as n โ†’ โˆž. t1/2+ 0 Hence โˆš Z ฯ n 0 1 Vn (t)dt = oP (1). t The righthand term in (4.3) may be estimated as follows Z 0 ฯ 1 t F โˆ’1 (t) Z  โˆš n Fn (x) โˆ’ F (x) dx dt 0 Z  Z F โˆ’1 (t)  1/2โˆ’ 1 1/2โˆ’ F (x) 1 โˆ’ F (x) dx dt t 0  Z +โˆž  1/2โˆ’ 1 1/2โˆ’ t 1 โˆ’ F (x) dx dt t 0 ฯ โ‰ค Kn 0 Z ฯ โ‰ค Kn 0 Z โ‰ค C1 Kn ฯ tโˆ’1/2โˆ’ dt = C1 Kn ฯ†(ฯ) (4.6) 0 Z for all 0 <  < 1/2, where we set ฯ†(ฯ) = ฯ tโˆ’1/2โˆ’ dt, and C1 = 0 R +โˆž 0 1/2โˆ’ 1โˆ’F (x) dx < +โˆž. The latter quantity is finite, due to the existence of the 2 + ฮด moment of X. (1,1) To complete the analysis of Rn we have to deal now with its second part, given by Z ฯ  1 โˆš Ln (t) โˆ’ L(t) n dt. (4.7) Mn (t) 0 a.s. As Mn (t) โ‰ฅ tFnโˆ’1 (1 โˆ’ ฯ) for t โˆˆ [0, 1] and Fnโˆ’1 (1 โˆ’ ฯ) โˆ’โ†’ F โˆ’1 (1 โˆ’ ฯ), the bound for (4.7) can be found by following the same steps as for (4.2). 16 (1,2) We continue our proof now by finding a bound for the second term Rn ฯ โ‰ค t โ‰ค 1, then Z in (4.1). As 1 F โˆ’1 (s)ds > 0 M (t) โ‰ฅ 1โˆ’ฯ and 1 Z Fnโˆ’1 (s)ds Mn (t) โ‰ฅ Z โ‰ฅ 1โˆ’ฯ Therefore, setting Hn := F โˆ’1 (s)ds + oP (1). 1โˆ’ฯ 1 = OP (1), we have Mn (s) M (s) sup sโˆˆ[1โˆ’ฯ,1] โˆš 1 1 Z Ln (t) โˆ’ L(t) Mn (t) โˆ’ M (t) dt n ฯ โˆš 1 Z โ‰ค Hn n Ln (t) โˆ’ L(t) Mn (t) โˆ’ M (t) dt. (4.8) ฯ We observe that (4.8) is oP (1) if the following two equalities hold true: Z 1 โˆš n X n โˆ’ ยตF Ln (t) โˆ’ L(t) dt = oP (1), (4.9) ฯ and โˆš Z 1 Ln (t) โˆ’ L(t) n Ln (1 โˆ’ t) โˆ’ L(1 โˆ’ t) dt = oP (1), (4.10) ฯ by recalling that Mn (t) โˆ’ M (t) = (X n โˆ’ ยตF ) โˆ’ [Ln (1 โˆ’ t) โˆ’ L(1 โˆ’ t)] due to Z 1โˆ’t  โˆ’1  Fn (s) โˆ’ F โˆ’1 (s) ds + X n โˆ’ ยตF = Z 0 1   Fnโˆ’1 (s) โˆ’ F โˆ’1 (s) ds. 1โˆ’t To get (4.9), remark that โˆš Z n X n โˆ’ ยตF = OP (1), and 1 Ln (t) โˆ’ L(t) dt ฯ Z 1 Z โ‰ค Z0 1 โ‰ค t Fnโˆ’1 (s) โˆ’ F โˆ’1 (s) ds dt 0 Fnโˆ’1 (s) โˆ’ F โˆ’1 (s) ds = oP (1). 0 Finally, to get (4.10), we begin with the inequality Z 1 โˆš n Ln (t) โˆ’ L(t) Ln (1 โˆ’ t) โˆ’ L(1 โˆ’ t) dt ฯ โ‰ค โˆš Z n 1  2 Ln (t) โˆ’ L(t) dt, ฯ 17 (4.11) and use the following bound for the latter integrand 2 2 โˆš  โˆš  โˆš n Ln (t) โˆ’ L(t) โ‰ค 2 n Vn (t) + 2 n Z F โˆ’1 (t) 2 Fn (x) โˆ’ F (x) dx . 0 Recalling that โˆš Z n 1  2 Vn (t) dt = oP (1), ฯ and exploiting (4.4) we get โˆš Z F โˆ’1 (t) 2 Fn (x) โˆ’ F (x) dx n 0 1 =โˆš n Z F โˆ’1 (t) โˆš 2 n Fn (x) โˆ’ F (x) dx 0  Z F โˆ’1 (t) 2 1/2โˆ’ 1 1/2โˆ’ โ‰ค Kn โˆš F (x) 1 โˆ’ F (x) dx n 0 Z 1/2โˆ’ 2 1  +โˆž 1 โˆ’ F (x) dx = oP (1). โ‰ค Kn โˆš n 0 Integrating in dt on [ฯ, 1] we hence obtain the desired bound. From the previous estimates it follows that โˆ€ฯ : 0 < ฯ < 1 we have Rn(1) = Un (ฯ) + Tn (ฯ), where Un (ฯ) = oP (1), Tn (ฯ) โ‰ค C1 Kn ฯ†(ฯ), ฯโ†’0 with Kn = OP (1) and ฯ†(ฯ) โˆ’โ†’ 0. Fixing  > 0, let C > 0 be such that P {|Kn | > C} <  โˆ€n, and let ฯ > 0 be such that for ฯ < ฯ we have ฯ†(ฯ) < /2C1 C. Then, having  P Rn(1) >  โ‰ค P {Un (ฯ) > /2} + P {Tn (ฯ) > /2} , we get, for ฯ < ฯ ,  lim sup P {Tn (ฯ) > /2} โ‰ค P |Kn | > n  2C1 ฯ†(ฯ)  โ‰ค P {|Kn | > C} < , (1) which finally gives Rn = oP (1). Lemma 4.2. Under the conditions of Theorem 3.2, we have that Rn(2) = oP (1). 18 (2) Proof. We start from the definition of Rn in (3.6) here recalled for convenience   Z 1  โˆš L(t) 1 1 (2) Rn = n โˆ’ Mn (t) โˆ’ M (t) dt. Mn (t) M (t) 0 M (t)  Observing that L(t) โ‰ค M (t) for t โˆˆ [0, 1] and using (4.11) to rewrite Mn (t) โˆ’ M (t) , the proof can be established following the proof of Lemma (4.1) with minor modifications. Lemma 4.3. Under the conditions of Theorem 3.2, we have that Rn(3) = oP (1). (3) Proof. We estimate Rn by splitting it in two integrals as follows Z 1 1 (3) |en (t)| Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) dt Rn = M (t) 0 Z 1 Z 1/2 . . . dt . . . dt + = 0 Rn(3,1) := (3,1) Let us consider the first term Rn 1/2 + Rn(3,2) . (4.12) and observe that 1 1 โ‰ค โˆ’1 1 M (t) F (2) t where we assume that F โˆ’1 ( 12 ) > 0, otherwise we may replace F โˆ’1 ( 12 ) by F โˆ’1 (a) > 0, with a โˆˆ (0, 1) appropriately chosen. Hence, by choosing  โ‰ค   โˆš en (t) = n Fn F โˆ’1 (t) โˆ’ t , we arrive at Rn(3,1) 1 โ‰ค F โˆ’1 ( 12 ) Z Kn โˆ’1 F ( 12 ) Z โ‰ค 1/2 0 1 t 1/2 and recalling that โˆš n |Fn (F โˆ’1 (t)) โˆ’ t| |Fnโˆ’1 (t) โˆ’ F โˆ’1 (t)| 1/2โˆ’ t (1 โˆ’ t)1/2โˆ’ dt t1/2โˆ’ (1 โˆ’ t)1/2โˆ’ 1 Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) = oP (1). t1/2+ 0 1 , 2 a.s. as Kn = OP (1) and Fnโˆ’1 (t) โˆ’โ†’ F โˆ’1 (t) for t โˆˆ [0, 1]. (3,2) Now we deal with Rn , i.e. the second term in (4.12). Observing that M (t) = R1 R 1 โˆ’1 โˆ’1 F (s)ds โ‰ฅ F (s)ds = c > 0, we obtain 1โˆ’t 1/2 Rn(3,2) 1 โ‰ค c Z 1 |en (t)| Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) dt 1/2 Kn โ‰ค c Z 1 Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) dt = oP (1). 1/2 19 Lemma 4.4. Under the conditions of Theorem 3.2, we have that Rn(4) = oP (1). (4) Proof. We will deal with Rn , as for the previous Lemma, by splitting it as follows Z 1 L(t) (4) |en (1 โˆ’ t)| Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) Rn = dt [M (t)]2 0 Z 1 Z 1/2 . . . dt . . . dt + = 0 Rn(4,1) := 1/2 + Rn(4,2) (4.13) (4,1) . Observing that M (t) โ‰ฅ tF โˆ’1 (1/2) for t < 1/2, we have Z Kn 21/2โˆ’ 1 โ‰ค /2tโˆ’1/2โˆ’ Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) dt = oP (1). F โˆ’1 (1/2) 0 and we initially consider Rn Rn(4,1) (4,2) Finally, the result on Rn comes from observing that for t โˆˆ (1/2, 1) there exists a constant C such that M (t) โ‰ฅ C, and that suptโˆˆ(0,1) en (1 โˆ’ t) โ‰ค Kn , we have Rn(4,2) Kn โ‰ค C Z 1 Fnโˆ’1 (t) โˆ’ F โˆ’1 (t) dt = oP (1), 1/2 due to the assumption on the second (hence the first) moment finite on X. 5 The new inequality measure on real data The purpose of this section is to show, through a real data application, the theoretical results obtained in the previous sections. We employ the Bank of Italy Survey on Household Income and Wealth (hereafter named by its acronym, SHIW) dataset, published in 2016. This survey contains information on household post-tax income and wealth in the year 2014, covering 8,156 households, and 19,366 individuals. The sample is representative of the Italian population, which is composed of about 24,7 million households and 60,8 million individuals. The SHIW provides information on each individualโ€™s Personal Income Tax net income, but does not contain the corresponding gross income. We employ an updated version of the microsimulation model described in Morini and Pellegrino (2016) to estimate the latter for each taxpayer. A comparison of the results from the microsimulation model with the official statistics published by the Italian Ministry of Finance (2016) shows that the distribution of gross income and of net tax, according to bands of gross income and type of employment, are close to each other. The empirical 20 analysis we develop here is based on the observed net income from the SHIV, while tax data and gross income arise from the microsimulation model. e n , we To appreciate the asymptotic results of Section 3 on the empirical estimator D calculate four types of confidence intervals: the normal, the basic, the percentile and the BCa confidence intervals. After drawing the bootstrap samples, the empirical estimator is evaluated at each sample, and Figure 5.1 show the histograms of the obtained values when considering Gross Income in panel (a), Net Income in panel (b) and Taxes in panel (c). While inequality estimators have a skewed distribution in case of low sample size, here the accuracy of the normal approximation is apparent, due to the large sample size. As a further check of the quality of the first order approximation, Figure 5.2 shows the 0.655 0.660 0.665 0.670 0.675 0.680 0.685 0.690 1400 1000 400 0 0 0 200 200 400 500 600 600 800 800 1000 1000 1200 1200 1400 1500 Q-Q plots obtained for the three cases. 0.615 0.620 (a) 0.625 0.630 0.635 0.640 0.645 0.795 0.800 (b) 0.805 0.810 0.815 0.820 0.825 (c) e n on Gross Income in panel (a), on Net Income in panel (b) and on Taxes Figure 5.1: Histograms for D โˆ’2 0 2 4 Theoretical Quantiles (a) 0.825 0.820 0.815 0.810 Sample Quantiles 0.800 0.795 0.620 0.615 0.660 0.655 โˆ’4 0.805 0.635 0.630 Sample Quantiles 0.625 0.675 0.670 0.665 Sample Quantiles 0.680 0.640 0.685 0.645 in panel (c) โˆ’4 โˆ’2 0 Theoretical Quantiles (b) 2 4 โˆ’4 โˆ’2 0 2 4 Theoretical Quantiles (c) e n vs Gaussian quantiles on Gross Income in panel (a), on Net Income in Figure 5.2: Q-Q plots for D panel (b) and on Taxes in panel (c) 21 0.85 0.80 0.75 0.60 0.65 0.70 Normal CI Basic CI Percentile CI BCa CI Gross Income Net Income Taxes e n on Gross Income, on Net Income and on Taxes Figure 5.3: Confidence Intervals for D Finally, from Figure 5.3 we observe that the four methods for constructing Confidence Intervals have a substantial agreement. They all agree in assuring that there is a statistically significant increase in inequality when passing from Net Income to Gross Income (the redistributive effect of taxation) and from Gross Income to Taxes. We recall that adjusted percentile methods (also named BCa) for calculating confidence limits are inherently more accurate than the basic bootstrap and percentile methods (Davison and Hinkley, 1997). 6 Concluding remarks Moved from the considerations that nowadays, in many developed countries, the more critical (i.e the extremes) portions of the population are facing great reshaping of their economic situation, a new index for measuring inequality have been proposed in Davydov and Greselin (2016). In the cited paper, a discussion of the properties of the index has been given, to motivate its introduction in the literature and to show its descriptive features. Inferential results for the index were still missing, and this paper is a first contribution to fill the gap. After proposing two empirical estimators, we have shown their asymptotic 22 equivalence. Then, consistency and asymptotic normality for the first estimator have been derived. We also proved the convergence of the empirical estimator for the variance to its finite theoretical value. Finally, we used the new statistical inferential results to analyze data on Net Income from the Bank of Italy Survey on Household Income and Wealth, and to compare them with Gross Income and Taxes. References Atkinson A. B. 1970. On the Measurement of Inequality, Journal of Economic Theory, 2, 244โ€“263. Cobham A., Sumner A. 2013. Putting the Gini back in the bottle? The Palma as a Policy-Relevant Measure of Inequality, Technical report, Kings College London. Davydov Yu., Zitikis R. 2004. Convex rearrangements of random elements in Asymptotic Methods in Stochastics, vol. 44 of Fields Institute Communications, pp. 141โ€“171, American Mathematical Society, Providence, RI, USA. Davydov Yu., Greselin F. 2016. Comparisons between poorest and richest to measure inequality, (under revision) Davison A. C., Hinkley D. V. 1997. Bootstrap methods and their application (Vol. 1). Cambridge University Press. Gastwirth J.L. 2016. Measures of Economic Inequality Focusing on the Status of the Lower and Middle Income Groups, Statistics and Public Policy, 3:1, 1-9. Gastwirth J.L. 2014. Median-based measures of inequality: reassessing the increase in income inequality in the U.S. and Sweden, Journal of the International Association for Official Statistics, 30, 311โ€“320. Gini C. 1914. Sulla misura della concentrazione e della variabilitaฬ€ dei caratteri, Atti del Reale Istituto Veneto di Scienze, Lettere ed Arti, 73, 1203โ€“1248. (English translation in Gini, C. 2005. On the measurement of concentration and variability of characters. Metron, 63, 3โ€“38.) Greselin F. 2014. More equal and poorer, or richer but more unequal?, Economic Quality Control, 29, 2, 99โ€“117. Greselin F., Pasquazzi L., Zitikis R. 2010. Zengaโ€™s new index of economic inequality, its estimation, and an analysis of incomes in Italy, Journal of Probability and Statistics, 26 pp., DOI:10.1155/2010/718905. 23 Greselin F., Pasquazzi L., Zitikis R. 2012. Contrasting the Gini and Zenga indices of economic inequality, Journal of Applied Statistics, 40, 2, 282โ€“297. Greselin F., Puri M. L., Zitikis R. 2009. L-functions, processes, and statistics in measuring economic inequality and actuarial risks, Statistics and Its Interface, 2, 2, pp. 227โ€“245. Goldie C. M. 1977. Convergence theorems for empirical Lorenz curves and their inverses Advances in Applied Probability, 9, 765โ€“791. Lorenz M.C. 1905. Methods of measuring the concentration of wealth, Journal of the American Statistical Association, 9, 209โ€“219. Morini M., Pellegrino S. 2016. Personal income tax reforms: A genetic algorithm ap- proach, European Journal of Operational Research, first online, https://doi-org.proxy.unimib.it/10.1016/ Pietra G. 1915. Delle relazioni tra gli indici di variabilitaฬ€. Note I. Atti del Reale Istituto Veneto di Scienze, Lettere ed Arti, 74, 775โ€“792 Pietra G. 2014. On the relationships between variability indices. Note I. Metron, 72, 5โ€“16 Zenga M. 2007. Inequality curve and inequality index based on the ratios between lower and upper arithmetic means, Statistica & Applicazioni, 5, 3โ€“27. Zitikis R. 1998. The Vervaat process, in Szyszkowicz, B. (ed.), Asymptotic Methods in Probability and Statistics, Elsevier Science, Amsterdam, pp. 667-694. 24
10math.ST
1 Scalable Co-Optimization of Morphology and Control in Embodied Machines Nick Cheney1,2โˆ— , Josh Bongard3 , Vytas SunSpiral4 , and Hod Lipson5 Department of Computational Biology and Biological Statistics, Cornell University, Ithaca, NY 2 Department of Computer Science, University of Wyoming, Laramie, WY 3 Department of Computer Science, University of Vermont, Burlington, VT Intelligent Robotics Group, Intelligent Systems Division, NASA Ames/SGT Inc., Mountain View, CA 5 Department of Mechanical Engineering, Columbia University, New York, NY โˆ— [email protected] 1 arXiv:1706.06133v2 [cs.AI] 12 Dec 2017 4 Abstractโ€”Evolution sculpts both the body plans and nervous systems of agents together over time. In contrast, in AI and robotics, a robotโ€™s body plan is usually designed by hand, and control policies are then optimized for that fixed design. The task of simultaneously co-optimizing the morphology and controller of an embodied robot has remained a challenge. In psychology, the theory of embodied cognition posits that behavior arises from a close coupling between body plan and sensorimotor control, which suggests why co-optimizing these two subsystems is so difficult: most evolutionary changes to morphology tend to adversely impact sensorimotor control, leading to an overall decrease in behavioral performance. Here, we further examine this hypothesis and demonstrate a technique for โ€œmorphological innovation protectionโ€, which temporarily reduces selection pressure on recently morphologically-changed individuals, thus enabling evolution some time to โ€œreadaptโ€ to the new morphology with subsequent control policy mutations. We show the potential for this method to avoid local optima and converge to similar highly fit morphologies across widely varying initial conditions, while sustaining fitness improvements further into optimization. While this technique is admittedly only the first of many steps that must be taken to achieve scalable optimization of embodied machines, we hope that theoretical insight into the cause of evolutionary stagnation in current methods will help to enable the automation of robot design and behavioral training โ€“ while simultaneously providing a testbed to investigate the theory of embodied cognition. I. I NTRODUCTION Designing agile, autonomous machines has been a longstanding challenge in the field of robotics [31]. Animals, including humans, have served as examples of inspiration for many researchers, who meticulously and painstakingly attempt to reverse engineer the biological organisms that navigate even the most dynamic, rugged, and unpredictable environments with relative ease [11], [32], [38]. However, another competing approach is the use of evolutionary algorithms to search for robotic designs and behaviors without presupposing what those designs and behaviors may be. These methods often take inspiration from the evolutionary method itself, rather than the exact specifications of any given organism produced by it. The use of an evolutionary algorithm for automated design comes with many benefits: It removes the costly endeavour of determining which traits of a given organism are specific to its biological niche, and which are useful design features that can provide the same beneficial functions if instantiated in a machine. It can yield machines that do not resemble any animals currently found on earth [23], as it allows for machines that are specialized for behaviors and environments that differ from those of the model organism. Additionally, the optimization process can serve as a controlled and repeatable test-bed for the study of evolutionary, developmental, or behavioral theory [25], [26], [4]. However, the generalization of design automation to include both the optimization of robot neural controllers and body plans has proven to be problematic. While recent successes have demonstrated the potential of effective optimization for the control policies of agents with fixed morphologies [17], [13], [27] or โ€“ to a lesser extent โ€“ the optimization of morphologies (body plans) for agents with minimal and fixed control policies [12], [10], [1], the co-optimization of the two has seen very limited success [16], [8]. This inability to perform robot brain-body co-optimization at scale has been experienced and noted informally by many researchers involved with robot optimization, yet published rarely. Thus the lack of publication is presumably because the field lacks incentives for the publication of negative results [14], rather than a lack of negative results in unpublished works. Joachimczak et al. provide an anecdotal example of premature convergence in the co-optimization of robot brain and body plan (Fig. 19 of [22]). Cheney et al. [8] further analyze the phenomenon of premature convergence in embodied machines and suggest that traditional evolutionary algorithms are hindered in this setting primarily in their ability to perform continued optimization on the morphology of the robot. They hypothesized that the premature convergence may be due to an effect of embodied cognition, in which an individualโ€™s body plan and brain have an incentive to specialize their behaviors to complement one another. This specialization makes improvements to either subsystem difficult without complementary changes in the other (a highly unlikely event given current algorithms) and thus results in an embodied agent which is fragile with respect to design perturbations. II. BACKGROUND Attempts to solve this problem of fully-automated robot evolution are frequently traced back to the work of Sims [34]. 2 This work introduced the use of evolutionary algorithms to produce goal-directed behaviors and morphologies simultaneously. Despite the advance this work represented, the evolved robots tended to be composed of a small number of components (figures show a mean of 6.042 segments per robot, with each typically controlled by a few neurons). It has been suggested that current computational power should have vastly increased the scale and complexity of robots evolved using Simsโ€™ and similar methods. Yet surveys of evolved robots (e.g. [16], [5]) fail to exhibit any significant increase in size or complexity. A wide range of hypotheses for the lack of scalability have been proposed. Some focused on a lack of efficient evolutionary search algorithms [20], [24], [29] or genetic encodings [21], [6], [10], while others pointed to a lack of incentives for complexity in the simple tasks and environments [1], [7]. Yet attempts to evolve robots using methods designed to overcome these challenges have yet to obviously surpass Simsโ€™ work in terms of complexity and scale. This work investigates a different hypotheses, first suggested in [8], that considers the way in which an agentโ€™s brain and body plan interact during the optimization process. III. M ETHODS A. The Interdependency of Body and Brain We investigate the notion that the specialization of brain and body plan to one another during evolution creates a fragile co-dependent system that is not easily amenable to change. This specialization creates local optima in the search space and premature convergence to suboptimal designs. In this paper, we explore a direct solution to the problem of fragile coupled systems: explicitly readapting one subsystem (e.g. the body plan or the brain) after each evolutionary perturbation to the other. The proposed method differs from a traditional evolutionary algorithm, which evaluates the fitness of a newly proposed variation immediately (i.e. with no readaptation), and uses only this valuation of fitness to determine the long term potential of that variation. As a thought experiment, consider a hypothetical robot with a partially optimized body plan (for example a quadrupedal form) and a partially optimized controller (for example the legs swing forward and back through the sagittal plane). Suppose that this controller has co-adapted to the morphology during evolution such that for each step forward, the robot contracts a muscle near its hip with enough force to swing one of its legs forward with just enough force to land in front of the body and successfully take a step. Consider a variation of this morphology proposed by an evolutionary algorithm in which the new robot possesses longer legs but the controller has not changed. If this machine were being evolved for rapid locomotion, having longer legs and being able to take longer strides would be beneficial and this variation should be more successful than the original design. However, during evaluation of this new robot, the original controller applies the same amount of force to the now-longer leg, failing to move it, and thus frustrating the robotโ€™s ability to walk in a coordinated fashion. Current evolutionary methods would treat this robot as the recipient of a detrimental mutation and remove it from the population. If all such variations display an immediate detrimental fitness impact and are rejected (regardless of their long term potential), then the evolutionary algorithm has converged to a local optima in the search space. However, the newly proposed morphology would have resulted in a robot which outperformed its predecessor, if coupled with a controller suited to that morphology. We can determine that the newly proposed morphology is superior by suppressing mutations to that body plan and allowing readaptation of its controller to properly coordinate behavior. Herein lies the foundation for our proposed algorithm: readapt each controller until the new proposed morphology is more fit than its predecessor. B. Controller Readaptation The most obvious method for modeling controller readaptation would be to protect any lineage that has recently experienced a mutation to the body plan by allowing it to undergo several generations of evolutionary change restricted to the control subsystem. If any member of the lineage achieves higher fitness than the pre-mutation ancestor during that time period, the descendant is retained. Otherwise, the new morphological variant dies out. However, it is unclear how to set the time period for this protection a priori. Surely the amount of time a controller takes to readapt to a new morphology depends on many specific features of the complexity, genetic encoding, desired behavior, and current ability level of the robot (which changes over optimization time). Determining the correct value of this parameter would require a full parameter sweep over various values of readaptation time for each new combination of brain, body, and environment. If our goal is simply to optimize a robot, then searching for this value in each unique optimization scenario is intractable. C. Proposed Method: Morphological Innovation Protection In response to the unintuitive nature of the optimal value for readaptation length, our proposed approach is free of this parameter. Descendants of robots that experience morphological mutations are retained in the population and the number of generations that have elapsed since that mutation occurred are tracked (referred to as the โ€œmorphological ageโ€ of the robot). If two individuals are found in the population such that the latter robot exhibits better performance on the desired task and has experienced fewer generations since a morphological mutation than the former robot, this latter robot is said to โ€œdominateโ€ the former robot in this mutli-objective optimization (on โ€œageโ€ and โ€œfitnessโ€) โ€“ and the former robot is removed from the population. In effect, the latter robot has exhibited an ability to not only recover from its ancestorโ€™s morphological mutation but improve upon it (and others in the population). The concept of tracking age using it as an optimization objective are borrowed from [20], [33]. The major difference here being that the age refers to the length of time that a subsystem of the agent (e.g. the morphology) has remained unvaried, rather 3 than (the original definition of) the total time since a random individual was introduced to the population. This procedure has the effect of โ€œprotectingโ€ new morphologies with poorly adapted controllers, and thus we will henceforth refer to this procedure as โ€œmorphological innovation protection.โ€ This protection is a form a diversity maintenance, though reduced selection pressure for newly mutated morphologies. Various other methods exist for encouraging diversity (e.g. fitness sharing, crowding, random restart parallel hillclimbers [18], novelty [24], or speciation [36]), however age was chosen for its simplicity of implementation, its parallels to multi-timescale learning in biology, and because it helps to avoid the cost of extended control re-optimization for non-promising morphologies โ€“ since the the age-pareto optimization allows fitness comparisons between all new โ€œchildโ€ morphologies that have had equal readaptation time, even if they are not yet fully readapted (rather than making comparisons only after a predefined amount of readaptation). D. Evolutionary Algorithm All optimization is performed by a population-based evolutionary algorithm. All trials follow a (ยต, ฮป)-Evolutionary Strategy [3] with ยต = 25 parents and ฮป = 25 mutants for a population size of 50. Trials last for 5000 generations. Crossover was not considered in this work. Mutation had a 50% chance of creating a variation to either the morphology or the controller of a given robot, but not both. Other ratios of morphology:controller mutations were considered (1:99, 20:80, 50:50, 80:20, and 99:1), but none showed a significant effect on resolving the premature convergence and resulting fitness in preliminary trials without innovation protection. E. Genetic Encoding for Soft Robot Morphologies Consistent with prior work studying the co-optimization of robot morphologies [10] and controllers [8], we choose soft robots as our model system due to the open-ended complexity of deformable voxel-based morphologies and distributed controllers. The soft robot morphologies are encoded with a Compositional Pattern Producing Network (CPPN) [35]. The CPPN encoding produces the cell fate of each voxel in the robot through a type of neural network that takes each cellโ€™s geometric location (x, y, z Cartesian coordinates and r radial polar coordinate) and outputs a variety of โ€œmorphogensโ€ (in this work, there is one to determine whether a cell is present in that location and one to determine whether a present voxel should be a muscle or a passive tissue cell). Since nearby voxels tend to have similar coordinate inputs, they also tend to produce similar outputs from the network โ€“ creating continuous muscle or tissue patches. CPPNs also produce complex geometric patterns, as the activation functions at each node can take on a variety of functions (here: sigmoid, sine, absolute value, negative absolute value, square, negative square, square root, and negative square root). These functions tend to produce regular patterns and features across the coordinate inputs (for example: an absolute value node with an x input would produce left-right symmetry, or a sine node with a y input would produce front-to-back repetition). This network is optimized to produce high performing morphologies by iterating through various proposed perturbations to it. These include the addition or removal of a node, or edge to the network, as well as the mutation of the weight of any edge or the activation function at each node. F. Soft Robot Resolution As the CPPN genetic encoding is a continuous function (mapping the location of a cell to its cell fate) it may be discretized into a phenotype at any resolution (i.e. creating any number of voxels in the morphology, and a unique controller for each voxel), and in practice this resolution is only limited by computational resources (as more elements are more computationally expensive to simulate). In the default lower-resolution treatment, this discretization occurs over a 5 ร— 5 ร— 5 space. The higher-resolution robots use phenotypes created at a 10 ร— 10 ร— 10 resolution. Note that the distance values are noted in absolute number of voxels, so higher fitness values tend to be produced by phenotypes of higher resolution. G. Controllers and their Genetic Encoding A unique controller is optimized for each muscle cell in the robotโ€™s morphology. For each voxelโ€™s controller, two parameters are optimized (the outputs of a separate CPPN with the same inputs as before). One is the phase offset between each individual cellโ€™s muscle oscillations and that of the global sinusoidal oscillator (which acts as a central pattern generator), and the second is the frequency of this global clock (since CPPNs donโ€™t currently enable global parameters, this is done by averaging the local values at each cell to produce a single global value). All controllers output a value between โˆ’1 and 1 at each time step, which corresponds to a linear change in each dimension of a muscle cell (ยฑ14% of its original length, or ยฑ48% of its original volume), defining a robotโ€™s behavior. Passive tissue cells remain at their original size (though they also deform based on their intrinsic compliance). While this encoding is simple and straightforward, it has the ability to produce complex behaviors, such as multiple patches of muscle groups that are in sync, counter-sync, or any real valued phase offset from each other. It also has the ability to produce gradually varying sweeps of phase offset, resulting in propagating waves of excitation across large muscle groups. Furthermore, the optimization of the global frequency is able to produce oscillation speeds which are fine tuned to the properties of individual morphologies (such as optimizing to maximize the resonance of soft tissues in appendages). The encoding of the morphology and the controller of the robot into two separate CPPN networks emphasizes the false dichotomy of robot brains and body plans. However, this explicit separation allows us to make changes specific and isolated to either the brain or the body. This is necessary for the proposed algorithm, as controller readaptation requires iterating through controller changes without affecting the morphology. 4 H. Physics Simulation for Evaluation Once the morphology and controller for a given robot are specified, the fitness (locomotion distance) of that robot is determined by constructing and simulating that robot in the VoxCad soft-body physics simulator [19]. Simulations last for 20 actuation cycles (which may be a variable amount of time, depending on the length of the globally optimized frequency โ€“ though this method of normalizing for the number of โ€œstepsโ€ taken leads to a more fair comparison than normalizing by the amount of time per simulation). I. Morphological Innovation Protection In our newly proposed method we set the โ€œmorphological ageโ€ to zero for each new โ€œchildโ€ that was the result of a morphological mutation to a current individual in the population. This means that for an individual to have a large value in their age objective, that individual must have been the result of a large number of successive controller mutations without any change to that robotโ€™s body plan. This setup thus allows a simple comparison method for individuals who have had similar amounts of controller (re)adaptation to their current morphologies โ€“ as a dominated individual would have to have been out-competed in fitness ability by a morphology that is paired with a controller that is less-well adapted to it. This diversity maintenance mechanism encourages the exploration of new peaks in the rugged landscape of brain-body plans โ€“ with the implicit assumption that unique morphologies correspond to peaks in this landscape. The method of age resets corresponding to morphological mutations to existing individuals differs from the prior technique (e.g. [20], [33]) of inserting completely random individuals, as it allows the improvement in the fitness levels of age-zero individuals over time. In the case of traditional age-fitness optimization, age-zero individuals are drawn from the same distribution of fitness values for random genotypes regardless of when they are created. However, in the case of morphological innovation protection, age-zero individuals are not random and inherit many of the properties of their parents โ€“ meaning that they show higher fitness values over time. To demonstrate this empirically, we performed linear regression on the age-zero individuals from Fig. 2 (containing morphological innovation protection), which showed a significant (p < 0.001) increase in fitness over time (from 18.715 at generation 0 to 22.916 at generation 5000). This confirms a major difference between our proposed technique and the standard approach of age-based diversity maintenance through the introduction of random individuals. J. Statistical Analysis All treatments were performed for 30 independent trials, with random seeds consistent between treatments. All plots show mean values averaged across the most fit individual of 30 trials for each condition with shaded areas representing 95% bootstrapped confidence intervals of this average, and all p-values are generated by a Wilcoxon Rank-Sum Test [37]. IV. R ESULTS A. The Effect of Morphological Innovation Protection on Fitness For the task of locomotion ability (a standard task in evolutionary robotics [5]), we first optimize the robots using the traditional method of โ€œgreedyโ€ fitness evaluations for our selection criteria (where immediate locomotion ability determines survival in the population of candidate morphologies โ€“ i.e. with no โ€œinnovation protectionโ€). In this setup, the traditional method produces robots with an average fitness of 21.717 voxels (with 95% bootstrapped confidence (CI) interval of 19.457 to 22.426 voxels). Additionally, we optimized robots in the same task and environment setup, but this time using โ€œmorphological innovation protectionโ€ for our selection method โ€“ in which individuals can only be out-competed by those with equal or lesser amounts of controller (re)adaptation to their current morphologies. This treatment produces significantly more effective robots (p = 6.067 โˆ— 10โˆ’6 ), with a mean distance travelled of 31.953 voxels (and 95% CI of 28.157 to 36.511 voxels). The increase in fitness shows that morphological innovation protection is a more effective way of optimizing robots, yet it does not conclusively demonstrate that the intuition of [8] is correct, as that work demonstrated the asymmetric difficulty in optimizing the morphology of a robot (as compared to optimizing its controller) and drew the hypotheses that this because the morphology encapsulated the controller (acting as a translator between the โ€œlanguageโ€ of the โ€œcognitiveโ€ functions and the outside environment). While the above experiment does help to support the intuition that the controller must readapt to a new morphological encoding, it also introduces confounding effects, such as the added population diversity afforded by โ€œprotectionโ€ and the added dimensionality of the search space from its this protection age โ€“ moving search from a singleobjective to multi-objective optimization problem. To tease apart the influence of these two confounds, we present a treatment where the controllers of the robot undergo an equivalent protection to which the morphologies did in the above experiment. In this treatment, individuals can only be out-competed by others whose morphology has had equal or lesser amounts of readaptation to their newly mutated controllers โ€“ deemed โ€œcontroller innovation protectionโ€. This condition provides the potential advantages of multi-dimensional search and the added diversity from temporary reductions in selection pressure. Yet it does not rely on the idea of a broken โ€œmorphological language.โ€ In this treatment, robots locomote 22.049 voxels on average (95% CI of 20.726 to 22.641 voxels), which fails to show a significant improvement over the singleobjective case of no protection (p = 0.240), and performs significantly worse (p = 1.211 โˆ— 10โˆ’4 ) than the protection of morphological innovations. The fitness trajectories over evolutionary time (Fig. 1) demonstrate a typical logarithmic fitness improvement over the first 1000 generations or so, but then show a stagnation for the traditional optimization procedure without innovation protection. The mean fitness value of the treatment without protection shows no significant improvement (p = 0.085) 5 turnover of morphologies, with just 10.115 unique robot body plans doing so. Fig. 1. The fitness impact (distance travelled, in voxels) over optimization time (in generations) for various types of brain/body plan protection mechanisms. Values plotted represent the mean value of 30 independent trials, with 95% bootstrapped confidence intervals denoted by colorized regions. from generation 1000 to 5000 (with average fitness values of 20.988 and 21.717 voxels, respectively). Contrary to this, the treatment with morphological innovation protection shows significant improvements over this time (p = 0.013) from 25.925 at generation 1000 to 31.953 voxels at generation 5000. The rapid improvement in the controller innovation protection and no protection cases during the first 1000 generations does not contradict the hypotheses of a fragile โ€œmorphological language,โ€ as the coupling between the morphology and controller takes time to become established โ€“ and would not introduce fragility into the system before then. B. The Effect of Morphological Innovation Protection on Population Stagnation Perhaps more telling than the average locomotion ability at the end of optimization time is the examination of the optimization process within each individual run. Figs. 2 and 3 represent typical runs, and help to give an intuition of the optimization process. In these figures, each randomly colored line represents a unique morphology, plotted by its locomotion ability over optimization time. Note the continued improvement in performance of the most fit individual over optimization time in the case of morphological innovation protection (Fig. 2) โ€“ which is consistent with the trend seen on average in Fig. 1. This is not seen in the case without innovation protection (Fig. 3), where the best individual was found before generation 2000 โ€“ and by generation 1000, fitness has reached 99.6% of its final value. Consistent with the above observation, we see that the most fit individual in Fig 2 changes rapidly, continually turning over in the trial with morphological innovation protection. As each color in the figure represents a unique morphology, we notice that a wide variety of different morphologies hold the title of โ€œbest-so-farโ€. On average, in runs with morphological innovation protection, 24.179 unique morphologies are the best-so-far at some point in optimization, where the runs without protection show significantly (p = 1.555 โˆ— 10โˆ’6 ) less The question of how temporary reduced selection pressure (via the morphological-age dimension) of morphological innovation protection may help to improve overall fitness and continued optimization may be best demonstrated in the pop out box for Fig. 2. Here we see the current best morphology, in teal. This morphology was unable to improve on itself for some time, as we see its fitness value (y-xais) flatlining. This โ€œparentโ€ morphology has a โ€œchild,โ€ a new proposed variation of its morphology, highlighted in red. As the original fitness value of this morphology falls below its parent, this individual empirically shows worse performance than its parent โ€“ and thus would not be considered as a viable solution in a traditional evolutionary method. However, since this new morphology does not have a controller that is well adapted to it (as the controller is specialized for the previous morphology, in teal), morphological innovation protection does not expect this new robot to immediately outperform its parent, and keeps this individual in consideration as one which could hold long term potential but does not show immediate promise. Indeed, we see that after a number of controller optimization iterations later (occurring in equal amounts to both the parent and child during this intermediate period), the child morphology (in red) overtakes the parent morphology (in teal) โ€“ achieving higher fitness and demonstrating that it did indeed hold a better long term potential than its parent, despite the immediate drop in fitness. As the fitness of the parent is outperformed by the child (which has had less time to fine-tune its controller to its morphology), we assume that the parent is unlikely to be the most promising robot body plan in the long run, and thus remove it from the population. We see this trend of โ€œovertakesโ€ โ€“ where children start out with worse fitness than their parents, but eventually outperform them โ€“ continuing throughout this run (as the blue child then overtakes the red parent, and green overtakes blue in the pop out of Fig. 2). We see morphological overtakes significantly (p โ‰ค 6.939 โˆ— 10โˆ’10 ) more often in runs with morphological innovation protection (an average of 76.714 overtakes in the first 5000 generations) than without any innovation protection (where there are only 1.432 overtakes) or in the trials with controller innovation protection (where there are just 1.333 morphological overtakes on average). Interestingly, the number of morphological overtakes in the morphological innovation protection treatment is not significantly different (p = 0.533) than the number of controller overtakes in the controller innovation protection treatment (where a โ€œchildโ€ is a robot with a new controller variation, that readapts its morphology to catch back up to its โ€œparentโ€ controller โ€“ which happens 74.542 times on average). Combined with the finding in Fig. 1 that morphological innovation protection outperforms the other two treatments, this suggests a greater potential for the relative importance of morphological overtakes over controller overtakes โ€“ and again reinforces the asymmetry between morphologies and controllers from an optimization perspective. 6 Fig. 2. A single optimization trial featuring morphological innovation protection. Each unique morphology is represented by a random color. The pop out in this figure highlights an example of an โ€œovertakeโ€ where the new child morphology (in red) initially performs worse than its parent morphology (in teal), only to outperform that previous morphology after successive control optimization to both the parent and child. Fig. 3. The fitness over time of a single optimization trial with the same initial conditions as Fig. 2, but without any innovation protection. Again, each unique color represents a unique morphology. The prevalence of colored dots filling the space underneath the best performing individual, which represent new morphologies which initially performed worse than the current best individual and were thus rejected and thrown out of the population (as opposed to those individuals which were protected and eventually led to โ€œovertakesโ€ in Fig. 2). pronounced in Fig. 6. C. The Effects of Morphological Innovation Protection on the Progression of Morphologies over Evolutionary Time D. The Potential for Convergence Across Initial Conditions Visual inspection of actual morphologies over evolutionary time further supports the proposed methodโ€™s improved optimization efficiency and ability to escape local optima. Fig. 4 shows the current best individual at various points over evolutionary time for each of the top 10 runs in the treatment with morphological innovation protection. Note how the fitness values of the robots increase over time (from left to right, and indicated by the color of each robot). Also note how the final morphology of some robots (e.g. runs 24, 27, 18, 11, and 16) result in identical morphologies, despite starting from a range of starting morphologies and not finding this convergent morphology until hundreds or thousands of generations into the optimization process. In contrast to the sustained turnover of morphologies shown above, Fig. 5 shows the snapshots of the 10 best runs in the treatment without innovation protection. Notice how the colors of the robots tend to show little change over the evolutionary process, mirroring the stagnation shown in Fig. 1. While convergence of the final morphologies is present here as well, the gross morphologies found here (variants of the a full cube with no appendages) are found early on in the search โ€“ and often provided in the set of random initial morphologies. In this treatment, gross morphological changes tend to be absent after generation 50 (just 1% into the full 5000 generations). The differences between Figs. 4 and 5 suggests that the traditional method without morphological innovation protection tends to converge prematurely to morphologies early in the evolutionary search, while morphological innovation protection may allow search to escape these local optima and converge to โ€œmore globalโ€ optima. The convergence of morphologies across varied initial conditions is even further To explore the question of scale, we apply morphological innovation protection to the evolution of robots with higher resolution morphologies โ€“ up to 103 = 1000 voxels rather than the lower resolution morphologies (53 = 125 voxels) employed in the previous experiments. The increased number of voxel cells that make up each robot allows for greater expressiveness and finer details in its morphology. However this also presents a challenge for the above algorithm. As the number of cells increases, the effect of changing a single voxel (the minimum morphological variation) is reduced. In the extreme, the concept of readapting controllers since the last โ€œmorphological changeโ€ is less straightforward โ€“ as increasingly small changes can modify minor details of the morphology without affecting its overall function. To help address the problem of non-functional morphology changes, we introduce a parameter to represent the minimum percentage of voxels that must be varied in order to qualify as a โ€œgross morphological changeโ€. It is important to note that this parameter is specific to the voxel-based soft robot implementation employed in this work โ€“ and thus the optimal setting of this parameter is not of great importance for its generalization outside of this soft robot encoding. But the general concept of a threshold for the minimum morphological change is a universal concept that could be applied to any robot instantiation, as necessary. In the case of robots with higher-resolution morphologies, we find that resetting the โ€œmorphological ageโ€ of an individual only after a mutation that changes more than 20% of their voxels produces optimal results. The value was found via a parameter sweep (of minimum age-resets of 0%, 5%, 10%, 7 Fig. 4. The progression of morphologies over evolutionary time with morphological innovation protection. Rows represent the top 10 (out of 30) performing runs at generation 5000, while columns represent snapshots of the morphology at various points during the optimization process. Note how some of the runs converge upon the same morphology (a front and back โ€œleggedโ€ robot), despite starting from varying initial conditions. The color of the morphologies represent their fitness values. 20%, 30%, 40%, and 50% of voxels changed). We also investigated a minimum change threshold for controller innovation protection and found that its benefit falls as the threshold increases (showing optimal performance with no threshold), so we ignore the threshold for minimum controller change here. In this setting, basic morphological innovation protection (with no threshold) travels significantly farther (60.728 voxels) than both the case with no protection (32.575 voxels, p = 1.208 โˆ— 10โˆ’4 ) and the case with controller innovation protection (35.375 voxels, p = 0.018). While trials employing the threshold on morphological changes did achieve higher average fitness than the case of morphological innovation protection without a threshold (where robots traveled 43.340 voxels on average), this difference was not significant at the p = 0.05 level (p = 0.063). As a side note, in other more difficult trials (where the robots need to optimize a closed-loop neural network controller โ€“ not depicted visually due to space constraints), trials with the morphological change threshold significantly outperform all other treatments (as they travel 31.313 voxels โ€“ while trials with no protection, controller protection, and morphological innovation protection with no threshold travel 13.941, 15.356, and 17.224 voxels, respectively; all p โ‰ค 7.287 โˆ— 10โˆ’8 ). Fig. 5. The progression of morphologies over evolutionary time for the top 10 performing runs with no innovation protection. The color legend and column snapshots times are identical to Fig. 4. Visualization of these soft robot morphologies over time in the trials with a 20% morphological change threshold is depicted in Fig. 6 and compared to the case with no protection in Fig. 7. The ability of evolution to converge to the same high-performing morphology across many independent trials, despite starting from different initial conditions suggests that (in this particular soft robot implementation) the inclusion of thresholded morphological innovation protection is able to escape the local optima around these starting conditions and find โ€œmore globalโ€ optima in this search space. In the case without any protection, search stagnates quickly and again appears unable to escape the local optima near its initial conditions (Fig. 7). Interestingly, the low resolution soft robot implementation (in Figs. 4 and 5) does not benefit from the inclusion of a threshold. As presumably the more discrete construction of these robots mean that all mutations are large enough to create a meaningful โ€œmorphological changeโ€. V. D ISCUSSION The above results demonstrate a new method for entire robot evolution (i.e. both brain and body-plan) that is more scalable in terms of continued optimization for longer periods of time and better resulting fitness than the traditional evolutionary methods. This method for โ€œmorphological innovation protectionโ€ helps prevent premature convergence to the many local 8 Fig. 6. The progression of morphologies over evolutionary time in the setting with high-resolution morphologies and evolution with morphological innovation protection with a 20% threshold. The rows represent the top 10 (of 30) independent trials, while the columns represent the progression over evolutionary time. Color represent the fitness values of the robot (their locomotion speed), with warmer values depicting more fit individuals. Note the convergence of all 10 of these runs to the same final morphology. optima which appear to be present in the rugged search space of robot morphologies and controllers [8]. The hypothesis from [8] that the fragile co-optimization of brain and body plan caused by specialization of one subcomponent to the other is consistent with the findings above. This work also reveals that there is an asymmetry between the brain and body plan: protecting innovations to the morphology leads to more effective optimization that protecting innovations to the controller. The benefits of the temporarily reduced selection pressure provided by morphological innovation protection suggests that the long-term potential and immediate fitness impact of a morphological mutation are not always correlated. Thus, we require a form of diversity maintenance to help evolution to rate proposed solutions based on their long-term potential rather than on immediate fitness impact. As was shown here, using morphological innovation protection for this purpose can help to reduce premature convergence in the search space and stagnation at suboptimal values. We believe this to be the first example of a design automation algorithm for robotics that considers the interdependence of neural controllers and body plans arising from the psychological theory of embodied cognition [30] and uses this intuition to propose a method to escape local optima in the Fig. 7. The progression of high-resolution morphologies over evolutionary time for the top 10 performing runs with no innovation protection. The color legend and column snapshots times are identical to Fig. 6. fitness landscape. Despite the significant improvement to our ability to simultaneously optimize the brain and body plan of embodied robots, there is much work still to be done. Firstly, the proposed method was only applied to one class of robot. This class may actually represent the simplest form of brain-body co-optimization because the distributed sensing, actuation, and information processing that the cellular soft robot paradigm was designed to possess helps to blur the line between physical interactions of the morphology with the environment and information processing of a controller [10], [9]. In the case of centralized controllers and robots composed of rigid components, topological (rather than parametric) changes to the cognitive architecture would be required for control readaptation if morphological mutations add or remove physical components (e.g. limbs). Future work should explore the effect of morphological innovation protection in such a paradigm, where there is the potential for morphological changes to more drastically change the function of the robot โ€“ and thus for readaptation to those morphologies to play an even more critical role in optimization. In these experiments, the genotype encoding of the soft robots was modularized such that one part of the genome dictated the shape and material properties of the robot and a separate part encoded the actuations in the form of volumetric deformations of the voxels during behavior. In these robots (and those with even more complex phenotypes), one can 9 envision different splits as to what constitutes morphology and control โ€“ and what qualifies as a โ€œmorphological changeโ€ in this proposed algorithm. It would be of interest to investigate the effect of various splitting points of this dichotomy on the efficacy of morphological innovation protection. Furthermore, the very idea of a distinct split between body and brain is a false dichotomy, as information processing and physical processes happen throughout the agent [2]. Rather than various mutation operators which affect only the โ€œbrainโ€ or the โ€œbody-planโ€ of a robot, we desire agents that grown and develop as the result of rich crosstalk and feedback loops between the processes responsible for creating both of these components (creating complex adaptive systems like we see in biological organisms). How this proposed method relates to, and informs, biological analogs not entirely clear, but some rough analogies can be drawn. For example, the observation that brains learn and adapt at a much faster rate than bodies grow fits into this paradigm, as does the even slower change of gross morphological features over evolutionary time. In this way, the readaptation of controller strategies for varying body plans is built into the neuroplasticity of the brain. One could also imagine periods of evolutionary time when an entire species is under relatively little morphological selection pressure before an environmental shock suddenly reapplies that pressure. Also possible are periods of a single individualโ€™s lifetime when selection pressure varies: For example, human infants may not be selected highly for their locomotion speed, as their parents tend to physically carry and protect them early in life. We do not believe that the methods introduced here are restricted to this particular domain. The above algorithm is simple to implement (requiring only: an age counter, a check for variations in brain and/or body for each mutation, and โ€“ optionally โ€“ a criterion for the minimal gross morphological change), and thus we believe it will be widely applicable. Future work will test this supposition. Due to the recent interest in co-optimization of neural network topology and weights [15], [28], we should also note that this work โ€“ an agentโ€™s controller embodied within its morphology โ€“ is closely related to that of neural networkโ€™s weights embodied within its topology. Future work will show whether the method proposed here will show similar optimization gains in the design of neural network topologies as well. VI. C ONCLUSION We demonstrate an example of a robot design automation algorithm that considers the interdependence of neural controllers and body plans (due to the theory of embodied cognition) on the optimization process. We use this intuition to temporarily reduce selection pressure on newly mutated robot morphologies, thus allowing the agents to readapt their controllers and better escape local optima in the fitness landscape. We have shown that this technique โ€“ deemed โ€œmorphological innovation protectionโ€ โ€“ produces evolutionary optimization which delays premature convergence and stagnation, and results in more efficient evolved robots. We showcase the ability of this technique to escape local optima in the search space by demonstrating the convergence to a similar morphology across many independent trials from randomly initial conditions. While we hope that this technique will be surpassed in the future by a developmental process with feedback loops between the body and brain, we propose the above algorithm as a short term improvement over the current techniques for the co-optimization of morphology and control in virtual creatures. VII. ACKNOWLEDGMENT We thank NASA Space Technology Research Fellowship #NNX13AL37H and Army Research Office Contract #W911NF1610304 for support, Steve Strogatz for advice, Kathryn Miller for copy editing, and the UVM Morphology, Evolution & Cognition Lab for feedback. R EFERENCES [1] J. E. Auerbach and J. C. Bongard. Environmental influence on the evolution of morphological complexity in machines. PLoS Comput Biol, 10(1):e1003399, 2014. [2] F. Baluska and M. Levin. On having no head: Cognition throughout biological systems. Frontiers in Psychology, 7:902, 2016. [3] H.-G. Beyer and H.-P. Schwefel. Evolution strategiesโ€“a comprehensive introduction. Natural computing, 1(1):3โ€“52, 2002. [4] J. Bongard. Morphological change in machines accelerates the evolution of robust behavior. Proc. of the National Academy of Sciences, 108(4):1234โ€“1239, 2011. [5] J. C. Bongard. Evolutionary robotics. Comm. of the ACM, 56(8):74โ€“83, 2013. [6] J. C. Bongard and R. Pfeifer. Evolving complete agents using artificial ontogeny. In Morpho-functional Machines: The new species, pages 237โ€“ 258. Springer Japan, 2003. [7] N. Cheney, J. Bongard, and H. Lipson. Evolving soft robots in tight spaces. In Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, pages 935โ€“942. ACM, 2015. [8] N. Cheney, J. Bongard, V. SunSpiral, and H. Lipson. On the difficulty of co-optimizing morphology and control in evolved virtual creatures. In ALIFE XV, The Fifteenth International Conference on the Synthesis and Simulation of Living Systems, volume 15, pages 226โ€“233. MIT Press. [9] N. Cheney, J. Clune, and H. Lipson. Evolved electrophysiological soft robots. In ALIFE 14: The Fourteenth Conference on the Synthesis and Simulation of Living Systems, volume 14, pages 222โ€“229, 2014. [10] N. Cheney, R. MacCurdy, J. Clune, and H. Lipson. Unshackling evolution: evolving soft robots with multiple materials and a powerful generative encoding. In Proc. of the 15th Genetic and Evol. Comp. Conf., pages 167โ€“174. ACM, 2013. [11] J. Chestnutt, M. Lau, G. Cheung, J. Kuffner, J. Hodgins, and T. Kanade. Footstep planning for the honda asimo humanoid. In Robotics and Automation, 2005. ICRA 2005. Proceedings of the 2005 IEEE International Conference on, pages 629โ€“634. IEEE, 2005. [12] S. Collins, A. Ruina, R. Tedrake, and M. Wisse. Efficient bipedal robots based on passive-dynamic walkers. Science, 307(5712):1082โ€“ 1085, 2005. [13] A. Cully, J. Clune, D. Tarapore, and J.-B. Mouret. Robots that can adapt like animals. Nature, 521(7553):503โ€“507, 2015. [14] D. Fanelli. Negative results are disappearing from most disciplines and countries. Scientometrics, 90(3):891โ€“904, 2011. [15] C. Fernando, D. Banarse, C. Blundell, Y. Zwols, D. Ha, A. A. Rusu, A. Pritzel, and D. Wierstra. Pathnet: Evolution channels gradient descent in super neural networks. arXiv preprint arXiv:1701.08734, 2017. [16] T. Geijtenbeek and N. Pronost. Interactive character animation using simulated physics: A state-of-the-art review. In Computer Graphics Forum, volume 31, pages 2492โ€“2515. Wiley Online Library, 2012. [17] T. Geijtenbeek, M. van de Panne, and A. F. van der Stappen. Flexible muscle-based locomotion for bipedal creatures. ACM Transactions on Graphics (TOG), 32(6):206, 2013. [18] V. S. Gordon and D. Whitley. Serial and parallel genetic algorithms as function optimizers. In ICGA, pages 177โ€“183, 1993. [19] J. Hiller and H. Lipson. Dynamic simulation of soft multimaterial 3dprinted objects. Soft Robotics, 1(1):88โ€“101, 2014. 10 [20] G. S. Hornby. Alps: the age-layered population structure for reducing the problem of premature convergence. In Proceedings of the 8th annual conference on Genetic and evolutionary computation, pages 815โ€“822. ACM, 2006. [21] G. S. Hornby and J. B. Pollack. Body-brain co-evolution using lsystems as a generative encoding. In Proceedings of the 3rd Annual Conference on Genetic and Evolutionary Computation, pages 868โ€“875. Morgan Kaufmann Publishers Inc., 2001. [22] M. Joachimczak, R. Suzuki, and T. Arita. Artificial metamorphosis: evolutionary design of transforming, soft-bodied robots. Artificial life, 2016. [23] C. G. Langton et al. Artificial life. Addison-Wesley Publishing Company Redwood City, CA, 1989. [24] J. Lehman and K. O. Stanley. Evolving a diversity of virtual creatures through novelty search and local comp. In Proc. of 13th Genetic & Evol. Comp. Conf, pages 211โ€“8. ACM, 2011. [25] R. E. Lenski, C. Ofria, T. C. Collier, and C. Adami. Genome complexity, robustness and genetic interactions in digital organisms. Nature, 400(6745):661โ€“664, 1999. [26] R. E. Lenski, C. Ofria, R. T. Pennock, and C. Adami. The evolutionary origin of complex features. Nature, 423(6936):139โ€“144, 2003. [27] S. Levine, C. Finn, T. Darrell, and P. Abbeel. End-to-end training of deep visuomotor policies. Journal of Machine Learning Research, 17(39):1โ€“ 40, 2016. [28] R. Miikkulainen, J. Liang, E. Meyerson, A. Rawal, D. Fink, O. Francon, B. Raju, A. Navruzyan, N. Duffy, and B. Hodjat. Evolving deep neural networks. arXiv preprint arXiv:1703.00548, 2017. [29] J.-B. Mouret and J. Clune. Illuminating search spaces by mapping elites. arXiv preprint arXiv:1504.04909, 2015. [30] R. Pfeifer and J. C. Bongard. How the body shapes the way we think: a new view of intelligence. MIT press, 2006. [31] R. Pfeifer, M. Lungarella, and F. Iida. Self-organization, embodiment, and biologically inspired robotics. science, 318(5853):1088โ€“1093, 2007. [32] M. Raibert, K. Blankespoor, G. Nelson, R. Playter, and T. B. Team. Bigdog, the rough-terrain quadruped robot. In Proceedings of the 17th world congress, volume 17, pages 10822โ€“10825. Proceedings Seoul, Korea, 2008. [33] M. Schmidt and H. Lipson. Age-fitness pareto optimization. In Genetic Programming Theory and Practice VIII, pages 129โ€“146. Springer, 2011. [34] K. Sims. Evolving virtual creatures. In Proceedings of the 21st annual conference on Computer graphics and interactive techniques, pages 15โ€“ 22. ACM, 1994. [35] K. O. Stanley. Compositional pattern producing networks: A novel abstraction of development. Genetic Programming and Evolvable Machines, 8(2):131โ€“162, 2007. [36] K. O. Stanley and R. Miikkulainen. Evolving neural networks through augmenting topologies. Evolutionary computation, 10(2):99โ€“127, 2002. [37] F. Wilcoxon and R. A. Wilcox. Some rapid approximate statistical procedures. Lederle Laboratories, 1964. [38] R. J. Wood. The first takeoff of a biologically inspired at-scale robotic insect. IEEE transactions on robotics, 24(2):341โ€“347, 2008.
2cs.AI
Criteria for universality of quantum gates Adam Sawicki1 and Katarzyna Karnas1โˆ— 1 Center for Theoretical Physics PAS, Al. Lotnikรณw 32/46, 02-668, Warsaw, Poland arXiv:1610.00547v6 [quant-ph] 17 May 2017 We consider the problem of deciding if a set of quantum one-qudit gates S = {U1 , . . . , Un } is universal. We provide the compact form criteria leading to a simple algorithm that allows deciding universality of any given set of gates in a ๏ฌnite number of steps. Moreover, for a non-universal S our criteria indicate what type of gates can be added to S to turn it into a universal set. Universal quantum gates play an important role in quantum computing and quantum optics [15, 24, 30]. The ability to effectively manufacture gates operating on many modes, using for example optical networks that couple modes of light [9, 29], is a natural motivation to consider the universality problems not only for qubits but also for higher dimensional systems, i.e. qudits (see also [27, 28] for fermionic linear optics and quantum metrology). For quantum computing with qudits, a universal set of gates consists of all one-qudit gates together with an additional two-qudit gate that does not map separable states onto separable states [10] (see [11, 35โ€“37] for recent results in the context of universal Hamiltonians). The set of all one-qudit gates can be, however, generated using a finite number of gates [23]. We say that one-qudit gates S = {U1 , . . . , Un } โŠ‚ SU (d) are universal if any gate from SU (d) can be built, with an arbitrary precision, using gates from S. It is known that almost all sets of qudit gates are universal, i.e. non-universal sets S of the given cardinality are of measure zero and can be characterised by vanishing of a finite number of polynomials in the gates entries and their conjugates [17, 23]. Surprisingly, however, these polynomials are not known and it is hard to find operationally simple criteria that decide one-qudit gates universality. Some special cases of optical 3-mode gates have been recently studied in [5, 32] and the approach providing an algorithm for deciding universality of a given set of quantum gates that can be implemented on a quantum automata has been proposed [13] (see also [1, 2, 14] for algorithms deciding if a finitely generated group is infinite). The main obstruction in the problems considered in [5, 32] is the lack of classification of finite subgroups of SU (d) for d > 4. Nevertheless, as we show in this paper one can still provide some reasonable conditions for universality of one-qudit gates without this knowledge. The efficiency of universal sets is typically measured by the number of gates that are needed to approximate other gates with a given precision วซ. The Solovay-Kitaev theorem states that all universal sets are roughly the same efficient. More precisely, the number of gates needed to approximate any gate U โˆˆ SU (d) is bounded by O(logc (1/วซ)) [26], where c may depend only on d and c โ‰ฅ 1. Recently there has been a bit of flurry in the โˆ— E-mail: [email protected], [email protected] area of single qubit gates [3, 21, 22, 34] showing that using some number theoretic results and conjectures one can construct universal sets with c = 1. The approach presented in these contributions has been unified in [31] where the author pointed out the connection of these new results with the seminal work about distributing points on the sphere S 2 [25] that uses results concerning optimal spectral gap for the averaging operator. Moreover, the authors of [20] showed that the existence of the spectral gap implies c = 1 for all symmetric universal sets of single qudit gates, where by symmetric we mean the set S = {U1 , . . . , Un } with n = 2k and Uk+i = Uiโˆ’1 for i โˆˆ {1, . . . , k}. Although there are still some problems to solve in this area it seems that any further progress would require development of more advanced methods in pure mathematics rather than in quantum information. These developments should include verification of the spectral gap conjecture. Currently it is known to be true under the additional assumption that gates have algebraic entries [6, 7]. In this paper we present an approach that allows to decide universality of S by checking the spectra of the gates and solving some linear equations whose coefficients are polynomial in the entries of the gates and their complex conjugates. Moreover, for non-universal S, our method indicates what type of gates can be added to make S universal. The paper is organised as follows. We start from presenting basic facts concerning the adjoint representation of SU (d). The adjoint representations assigns to every matrix U โˆˆ SU (d) a matrix AdU โˆˆ SO(d2 โˆ’ 1). We give the explicit formula for AdU . The necessary condition for universality (Lemmas 1 and 2) is then formulated using matrices AdU and AdU โˆ’1 , where U โˆˆ S and boils down to checking the dimension of the kernel of the matrix MS given by (10). Next, we assume that the necessary condition for universality is satisfied and provide sufficient conditions for < S > to be infinite and thus dense in SU (d). More precisely, if < S > contains at least one element whose Hilbert-Schmidt distance from d Z(SU โˆš (d)) = {ฮฑI : ฮฑ = 1} is both nonzero and less than 1/ 2 then < S > is infinite. Combining this with basic results in number theory we arrive at our main results. In Theorem 1 we state that S is universal if S contains at least one matrix whose spectrum does not belong to some finite list of exceptional spectra. We also provide the algorithm which allows deciding universality of any given set of gates S (also when S contains matrices with exceptional spectra) in a finite number of steps. We discuss 2 the correctness of the algorithm and provide instructive examples for S โŠ‚ SU (2). I. THE NECESSARY CONDITION FOR UNIVERSALITY Let us begin with introducing the basic notation used in this paper and explaining the adjoint representation. The set of gates S = {U1 , . . . , Un } โŠ‚ SU (d) is called universal if the set generated by elements of S < S >:= {Ui1 ยท . . . ยท Uim : Uij โˆˆ S, m โˆˆ N} (1) is dense in SU (d), i.e. the closure < S > = SU (d). In fact < S > is always a Lie group [33]. If this this group is SU (d) we will say that S generates SU (d). Let us denote by su(d) the Lie algebra of SU (d). Recall that X โˆˆ su(d) iff X is an antihermitian traceless matrix. Moreover, the Lie algebra su(d) is a real vector space equipped with a nondegenerate positive inner product defined by (X|Y ) = โˆ’ 21 trXY . For U โˆˆ SU (d) and X โˆˆ su(d) we define AdU X := U XU โˆ’1 . One easily checks that AdU is a linear operator acting on su(d). It is also invertible as (AdU )โˆ’1 = AdU โˆ’1 and preserves the inner product as 1 (AdU X|AdU Y ) = โˆ’ trU XU โˆ’1 U Y U โˆ’1 = 2 1 = โˆ’ trXY = (X|Y ) 2 (2) Therefore AdU is an orthogonal transformation acting on d2 โˆ’ 1 dimensional vector space su(d). Upon a choice of d2 โˆ’1 an orthonormal basis {Xi }i=1 in su(d), i.e. basis that statisfies (Xi |Xj ) = ฮดij the transformation AdU can be expressed in this basis as a matrix belonging to SO(d2 โˆ’ 1), i.e AdtU AdU = I and det AdU = 1. The entries of this matrix, (AdU )ij , are real and defined by the identity: AdU Xj = U โˆ’1 Xj U = d X (AdU )ij Xi , (3) i=1 thus they are give by  1 (AdU )ij = โˆ’ tr Xi U Xj U โˆ’1 . 2 (4) Ad : SU (d) โ†’ SO(d2 โˆ’ 1), (5) Note that we also have AdU1 U2 = AdU1 AdU2 and this way we obtain the homomorphism that is known as the adjoint representation. For a set of d ร— d real matrices M , let us denote the set of all d ร— d matrices commuting with matrices from M by C(M ) = {L : [L, m] = 0, โˆ€m โˆˆ M }. (6) The adjoint representation of SU (d) is an absolutely irreducible real representation and therefore by the extended version of Schurโ€™s lemma [8, 19], the only (d2 โˆ’1)ร—(d2 โˆ’1) matrix that commutes with all matrices AdSU(d) = {AdU : U โˆˆ SU (d)} is proportional to the identity matrix, I. In other words C(AdSU(d) ) = {ฮปI : ฮป โˆˆ R}. Example 1. The adjoint representation for d = 2, i.e. Ad : SU (2) โ†’ SO(3) has a particularly nice form. Any matrix from SU (2) can be written in a form U (ฯ†, ~k) = I cos ฯ† + sin ฯ†(kx X + ky Y + kz Z), (7) where Y = iฯƒ1 , X = iฯƒ2 , Z = iฯƒ3 and ฯƒi are Pauli matrices, ~k = (kx , ky , kz )T satisfies kx2 + ky2 + kz2 = 1. Similarly, any matrix from SO(3) has a form O(ฯ†, ~k) = I + sin ฯ†(โˆ’kx X12 + ky X13 โˆ’ kz X23 )+ ฯ† +2 sin2 (โˆ’kx X12 + ky X13 โˆ’ kz X23 )2 , 2 (8) where Xij = Eij โˆ’ Eji , and Eij is a matrix whose only non vanishing entry is (i, j). One easily verifies that the adjoint representation is given by AdU(ฯ†,~k) = O(2ฯ†, ~k). (9) For U โˆˆ SU (d), where d > 2 calculation of matrices AdU can be done using formula (4) upon the choice of orthonormal basis in su(d). For d = 3 this basis is given by, for example, the Gell-Mann matrices multiplied by imaginary unit i. For higher d one can construct an orthonormal basis of su(d) in an analogous way as for d = 3. General considerations that can be found in [33] show that the group < S > can be either: 1. < S > = SU (d), or 2. < S > is infinite and connected, or 3. < S > is infinite and consists of k < โˆž connected components, where each component has the same dimension (as a manifold), or 4. < S > is finite. Note that in cases 1, 2, and 3 the group < S > has infinite number of elements. Thus we first provide criteria that distinguish between case 1 and cases 2 and 3. To this end we will use the adjoint representation. For S = {U1 , . . . , Un } โŠ‚ SU (d) let AdS = {AdU : U โˆˆ S}. Note that if [L, AdU1 ] = 0 and [L, AdU2 ] = 0 then [L, AdU1 U2 ] = [L, AdU1 ]AdU2 + AdU1 [L, AdU2 ] = 0. Thus if S generates SU (d) and L is a matrix that commutes with AdS then L commutes with AdSU(d) . Therefore for universal S we have C(AdS ) = C(AdSU(d) ) = {ฮปI : ฮป โˆˆ R}. It turns out (see [33]) that the converse is true under one additional assumption, namely that < S > is infinite. 3 Lemma 1. For a set of special unitary matrices S = {U1 , . . . , Un } assume that < S > is infinite and C(AdS ) = {ฮปI : ฮป โˆˆ R}. Then < S > = SU (d). The proof of this lemma is based on the structure theory for semisimple Lie groups and can be found in [33]. Here we only make some additional remarks regarding calculation of C(AdS ). Let vec(L) be the vectorisation of matrix L, i.e. the vector obtained by stacking the columns of the matrix L on top of one another. One easily calculates that [L, AdU ] = 0 โ‡” (I โŠ— AdU โˆ’ AdU โ€  โŠ— I) vec(L) = 0, where U โ€  is the complex conjugate and transpose of U , i.e. U โ€  = Uฬ„ t . Let ๏ฃถ ๏ฃซ I โŠ— AdU1 โˆ’ AdU โ€  โŠ— I 1 ๏ฃท ๏ฃฌ .. MS = ๏ฃญ (10) ๏ฃธ . I โŠ— AdUn โˆ’ AdUnโ€  โŠ— I Lemma 2. C(AdS ) = {ฮปI : ฮป โˆˆ R} if and only if the kernel of MS is one-dimensional. We emphasise the role of the adjoint representation which is crucial in Lemma 1. In particular there are infinite subgroups < S > such that C(S) = C(SU (d)) but < S > 6= SU (d). In Example 1 we provide such a subgroup for d = 2. We next characterise space C(AdS ) for SU (2). Let us recall that the composition of two unitary matrices U (ฮณ, ~k12 ) = U (ฯ†1 , ~k1 )U (ฯ†2 , ~k2 ) is a unitary matrix with ฮณ and ~k12 determined by: ~k12 cos ฮณ = cos ฯ†1 cos ฯ†2 โˆ’ sin ฯ†1 sin ฯ†2~k1 ยท ~k2 , 1 ~ = (k1 sin ฯ†1 cos ฯ†2 + ~k2 sin ฯ†2 cos ฯ†1 + sin ฮณ +~k1 ร— ~k2 sin ฯ†1 sin ฯ†2 ). (11) (12) Moreover, two unitary matrices U1 (ฯ†1 , ~k1 ), U2 (ฯ†2 , ~k2 ) commute iff ~k1 k ~k2 or ฯ† = kฯ€. Similarly two orthogonal matrices O1 (ฯ†1 , ~k1 ), O2 (ฯ†2 , ~k2 )) commute if ~k1 k ~k2 or one of ฯ†i โ€™s is an even multiple of ฯ€, or ฯ†1 = ยฑฯ€ = ฯ†2 and ~k1 โŠฅ ~k2 . Making use of these facts in [33] we show: Fact 1. For noncommuting U1 (ฯ†1 , ~k1 ), U2 (ฯ†2 , ~k2 ), the space C(AdU1 (ฯ†1 ,~k1 ) , AdU2 (ฯ†2 ,~k2 ) ) is larger than {ฮปI : ฮป โˆˆ R} if and only if: (1) ฯ†1 = kฯ€ 2 = ฯ†2 , (2) one of ฯ†i โ€™s is kฯ€ ~ ~ equal to 2 and k1 โŠฅ k2 , where k is an odd integer. II. WHEN IS < S > INFINITE? We next describe the conditions under which < S > is infinite. For U1 , U2 โˆˆ SU (d) the group commutator is defined as [U1 , U2 ]โ€ข = U1 U2 U1โˆ’1 U2โˆ’1 . Note that [U1 , U2 ] = 0 is equivalent to [U1 , U2 ]โ€ข = I. The distance between elements of SU (d) can be measured using the โˆš Hilbert-Schmidt norm ||U || = trU U โ€  . For two elements U1 , U2 we have the following relation between their distances from the identity and the distance of their group commutator from the identity [12]: โˆš ||[U1 , U2 ]โ€ข โˆ’ I|| โ‰ค 2||U1 โˆ’ I|| ยท ||U2 โˆ’ I||, (13) [U1 , [U1 , U2 ]โ€ข ]โ€ข = I and ||U2 โˆ’ I|| < 2 โ‡’ [U1 , U2 ]โ€ข = I. Let 1 Bฮฑ = {U โˆˆ SU (d) : kU โˆ’ ฮฑIk โ‰ค โˆš } โŠ‚ SU (d), 2 (14) be a ball of radius โˆš12 that is centred at elements ฮฑI. As det ฮฑI = 1 we need to assume ฮฑd = 1. Let [ B= Bฮฑ . (15) ฮฑd =1 It turns out that noncommuting elements belonging to B generate infinite subgroups of SU (d): Lemma 3. Assume that [U1 , U2 ]โ€ข โˆˆ / Z(SU (d)) and U1 , U2 โˆˆ B. Then < U1 , U2 > is infinite. One of the steps in the proof of lemma 3 uses relations (13) to show that the sequence g0 = U1 , g1 = [U1 , U2 ]โ€ข , gk = [gkโˆ’1 , U2 ]โ€ข converges to I and gn 6= I for any integer n [17] (see [33] for the full discussion). We next describe when U โˆˆ Bฮฑm , where ฮฑm = eiฮธm and ฮธm = 2m d ฯ€. To this end note that kU โˆ’ ฮฑm Ik2 = 2trI โˆ’ ฮฑm trU โ€  โˆ’ ฮฑโˆ—m trU. (16) As the trace of U is determined by its spectrum, the desired condition can be expressed in terms of the eigenvalues of U that are given by {eiฯ†1 , ..., eiฯ†d }, ฯ†i โˆˆ [0, 2ฯ€[ P and di=1 ฯ†i = 0 mod 2ฯ€. Direct calculations lead to: U โˆˆ Bฮฑm โ‡” d X i=1 sin2 ฯ†i โˆ’ ฮธm 1 < . 2 8 (17) Let us next assume that U โˆˆ SU (d) does not belong to B. Then one can show that there always exists an integer n such that U n belongs to some Bฮฑ [33], ฮฑI โˆˆ Z(SU (d)). For a given U , let nU be the smallest integer satisfying this condition. In [33] we prove the modified version of the Dirichletโ€™s approximation theorem and use it to find an upper bound for NSU(d) := maxU nU . This way, for every U โˆˆ SU (d) there is 1 โ‰ค n โ‰ค NSU(d) such that U n โˆˆ Bฮฑ for some ฮฑI โˆˆ Z(SU (d)). Thus by taking powers 1 โ‰ค n โ‰ค NSU(d) we can move every element of SU (d) into B. Assume next that the necessary condition for universality is satisfied, i.e. C(AdS ) = {ฮปI : ฮป โˆˆ R}. From Lemma 1 one can easily deduce that under the assumption that < S > is infinite the intersection < S > โˆฉB is dense in B. As we have shown in [33] the necessary condition for universality places significant constrains on the structure of < S > also in the case when < S > is a 4 finite group, namely we have that < S > โˆฉB is a subset of Z(SU (d)). Thus < S > is finite if and only if there are no elements in < S > that belong to B other than those in Z(SU (d)). The above discussion is summarised by: Lemma 4. Let S = {U1 , . . . , Un } and assume that C(AdS ) = {ฮปI : ฮป โˆˆ R}. Then < S > = SU (d) if and only if there is at least one matrix U โˆˆ< S > that belongs to B \ Z(SU (d)). We know that every element of S can be put to B by taking powers (that are bounded by NSU(d) ). Hence when < S > is finite introducing U โˆˆ< S > to B must be equivalent to introducing it to Z(G). This condition can be phrased in terms of specra of the matrices from S. Definition 1. Assume U โˆˆ / B. The spectrum of U is called exceptional if it consists of nth roots of ฮฑ โˆˆ C where ฮฑd = 1 and 1 โ‰ค n โ‰ค NSU(d) . The set of exceptional spectra is a finite set. To illustrate the above ideas we find NSU(d) and the list of exceptional spectra for d = 2. Note that for any U โˆˆ SU (2) the spectrum is given by {eiฯ† , eโˆ’iฯ† } and therefore is determined by one angle ฯ†. The angle corresponding to an exceptional spectrum will be called an exceptional angle. Moreover, the centre of SU (2) consists of two matrices Z(SU (2)) = {I, โˆ’I}. We start with recalling the Dirichlet approximation theorem [16]. Fact 2 (Dirichlet). For a given real number b and a positive integer N there exist integers 1 โ‰ค n โ‰ค N and p such, that nb differs from p by at most N1+1 , i.e. |nb โˆ’ p| โ‰ค 1 . N +1 (18) Let [0, 2ฯ€) โˆ‹ ฯ† = 2bฯ€ be the spectral angle of U . By Fact 2 for a given N there are integers p and 1 โ‰ค n โ‰ค N such that |nb โˆ’ p| โ‰ค N1+1 . Multiplying this inequality by ฯ€2 we obtain |n ฯ†2 โˆ’ p ฯ€2 | โ‰ค 2(Nฯ€+1) . Note that (17) 1 simplifies to | sin ฯˆ2 | < 14 or | sin ฯˆโˆ’ฯ€ 2 | < 4 . Thus for a ฯ† given ฯ† we search for n satisfying |n 2 โˆ’ p ฯ€2 | < arcsin 14 . ฯ€ < arcsin 41 and Thus 2(n+1) nโ‰ค ฯ€ 2 โˆ’ arcsin arcsin 14 1 4  = 6. (19) The above upper bound for NSU(d) is attained for ฯ† = arcsin 14 (see figure 17). Hence NSU(2) = 6. Exceptional spectra for SU (2), are determined by roots of 1 or โˆ’1 of order 1 โ‰ค n โ‰ค 6, or equivalently, by primitive roots of unity of order 1 โ‰ค n โ‰ค 6 and 8, 10, 12. More precisely, they are given by {eiฮธ , eโˆ’iฮธ }, where k2 ฯ€ k3 ฯ€ k4 ฯ€ k5 ฯ€ k6 ฯ€ , , , , }, ฮธ โˆˆ {kฯ€, 2 3 4 5 6 (20) 1 0.5 0 FIG. 1. Condition (17) for SU (2). The gray segments are determined by | sin ฯ†2 | < 14 and the white segments by | sin ฯ†โˆ’ฯ€ | < 14 . 2 and gcd(ki , i) = 1. The number of exceptional angles can be calculated using P6 P6 the Euler totient function, and is equal i=1 ฯ†(i) + i=4 ฯ†(2i) = 24. For higher dimensional groups, as we discuss in [33], the number NSU(d) grows exponentially with d. Our main result is: Theorem 1. Assume that C(AdU1 , . . . , AdUn ) = {ฮปI : ฮป โˆˆ R} and at least one matrix Ui has a nonexceptional spectrum. Then < U1 , . . . , Un > = SU (d). III. THE ALGORITHM FOR DECIDING UNIVERSALITY OF S = {U1 , . . . , Un } โŠ‚ SU (d) The case when all matrices {U1 , . . . , Un } have exceptional spectra requires an algorithm which we next present. Our algorithm allows deciding universality of any given set of SU (d) gates in a finite number of steps. The algorithm Step 1: Check if C(AdS ) = {ฮปI : ฮป โˆˆ R}. This can be done by checking the dimension of the kernel of the matrix MS (10) constructed from the entries of matrices {AdU1 , . . . , AdUn } and thus is a linear algebra problem. If the answer is NO stop as the set S is not universal. If YES, set l = 1 and go to step 2. Step 2: Check if there is a matrix U โˆˆ S for which U nU belongs to B but not to Z(SU (d)), where 1 โ‰ค nU โ‰ค NSU(d) . This can be done using formula (16). If the answer is YES S is universal. If the answer is NO, set l = l + 1. Step 3: Define the new set S by adding to S words of length l, i.e products of elements from S of length l. If the new S is equal to the old one, the group < S > is finite. Otherwise go to step 2. The major advantage of our approach is the fact that we can make decisions in steps 2 and 3 in finite โ€˜timeโ€™. It is also clear that for randomly chosen matrices S = 5 {U1 , . . . , Un } โŠ‚ SU (d) our algorithm terminates with probability 1 in Step 2 for l = 1. This is a direct consequence of the fact that exceptional spectra form a finite set. Let us next discuss the correctness of our algorithm. Assume that S passes positively the necessary condition for universality, i.e. the Step 1. If the group < S > is finite the algorithm terminates in Step 3 for some finite l. On the other hand, as a direct consequence of Lemma 4, for an infinite < S > the algorithm must terminate in Step 2 for some finite l. One can also argue that if all finite-length words have exceptional spectra then they cannot form a dense subset. Thus if < S > is dense then it must contain words of a finite length that have non-exceptional spectra. These words terminate the algorithm in Step 2. Moreover, we have the following: Fact 3. Assume < S > is dense in SU (d). The length of a word that gives termination of the universality algorithm is at most the length l such that words of length k โ‰ค l form an วซ-net that covers SU (d), where วซ = 2โˆš12+ฮด and ฮด > 0 is arbitrary small. Proof. Assume that words of the length k โ‰ค l built from elements S form an วซ-net for SU (d), where วซ = 2โˆš12+ฮด and ฮด > 0 is arbitrary small. Let U be an element of 1 SU (d) whose distance from the identity is exactly 2โˆš 2 (see Figure 2). Then by the definition of วซ-net there must be at least one word w โˆˆ< S > of length k โ‰ค l contained in the ball C of radius วซ = 2โˆš12+ฮด centred at U . But this ball is contained in B1 \ I. Hence w gives termination of the universality algorithm in Step 2. The result follows. both ฯ†1 and ฯ†2 are exceptional angles and the product U (ฯ†12 , ~k12 ) = U (ฯ†1 , ~k1 )U (ฯ†2 , ~k2 ) has exceptional ฯ†12 as otherwise the algorithm terminates in Step 2 with either l = 1 or l = 2. For each such pair (there are finitely many of them) we find the Step and l that gives termination of our algorithm. The detailed discussion of the results and their connection to finite subgroups of SU (2) can be found in [33]. In short words, it turns out that our algorithm terminates at Step 2 if and only if 1 โ‰ค l โ‰ค 4 and at Step 3 when 5 โ‰ค l โ‰ค 13. Fact 4. For S = {U (ฯ†1 , ~k1 ), U (ฯ†2 , ~k2 )} โŠ‚ SU (2) the algorithm for checking universality terminates for l โ‰ค 13. Moreover, the set S is universal if and only if the algorithm terminates for l โ‰ค 4. The main conclusion from Fact 4 is that one can decide universality of any two-element subset of SU (2) by looking at words of the length at most 4. IV. EXAMPLES FOR SU (2) In the remaining part of this paper we demonstrate our approach calculating a few examples. They are chosen particularly to elucidate the importance of the conditions given by Theorem 1. a. Example 1 Let S = {U (ฯ†, ~k1 ), U (ฯ€/2, ~k2 )}, where ~k1 โŠฅ ~k2 and ฯ†1 is an irrational multiple ฯ€. For example, when ~k1 = (0, 0, 1) and ~k2 = (1, 0, 0), we have   โˆ’iฯ†   e 0 0 1 ~ . U (ฯ†, ~k1 ) = , U (ฯ€/2, k ) = 2 โˆ’1 0 0 eiฯ† (21) U (ฯ†, ~k1 ) is of an infinite order and since U (ฯ†, ~k1 ) and U (ฯ€/2, k~2 ) do not commute we have that < S > is infinite and not abelian. By Fact 1, however, C(AdU(ฯ†,~k1 ) , AdU(ฯ€/2,~k2 ) ) 6= {ฮปI : ฮป โˆˆ C}, and hence < S > 6= SU (2). For example O(ฯ€, ~k1 ) โˆˆ SO(3) commutes with both AdU(ฯ†1 ,~k1 ) = O(2ฯ†1 , ~k1 ) and Ad = O(ฯ€, ~k2 ). Interestingly, however ~ U(ฯ€/2,k2 ) C(U1 , U2 ) = {ฮปI : ฮป โˆˆ C}. FIG. 2. The proof of Fact 3. The formulation of Fact 3 is related to the results contained in [18]. In order to demonstrate how efficient is our algorithm we determine the maximal l which gives its termination in Step 2 and Step 3 respectively for SU (2). For simplicity we consider S of the form S = {U (ฯ†1 , ~k1 ), U (ฯ†2 , ~k2 )} โŠ‚ SU (2). To this end it is enough to consider the case when To understand the structure of the group < S > note that U (ฯ€/2, k~2 )U (ฯ†1 , ~k1 )U โˆ’1 (ฯ€/2, k~2 ) = U โˆ’1 (ฯ†1 , ~k1 ). Hence U (ฯ€/2, k~2 ) is a normaliser of < U (ฯ†1 , ~k1 ) >. Thus the group < S > consists of two connected components. The first one is given by one-parameter group U (t, ~k1 ), where t โˆˆ R and the other one by elements of the form U (ฯ€/2, k~2 )U (t, ~k1 ). The adjoint representation is able to identify infinite disconnected subgroups whereas the defining representation is not. Moreover, we know exactly how to fix non-universality of the set S. For example, we can add one matrix U (ฮณ, ~kฮณ ) such that ฮณ 6= kฯ€ and ~kฮณ is neither parallel nor orthogonal to ~k1 and ~k2 . 6 non-exceptional spectrum and whose ~k is neither parallel nor orthogonal to ~kH and ~kTฯ€/2 . Case 3: For ฯ† 6= kฯ€ 2 , again by Fact 1, C(AdH , AdT (ฯ†) ) = {ฮปI : ฮป โˆˆ R} and we just need to check if < H, Tฯ† > is infinite. We distinguish three possibilities: 1. We first assume that ฯ† is not exceptional. Then by Theorem 1 hH, Tฯ† i = SU (2). Our algorithm for deciding universality terminates at step 2 with l = 1. 2. We next consider the exceptional angles. For ฯ†โˆˆ{ FIG. 3. Two component group generated by S {U (ฯ†, ~k1 ), U (ฯ€/2, ~k2 )}. = b. Example 2 Let H be the Hadamard gate and Tฯ† a phase gate with an arbitrary phase ฯ†: i H=โˆš 2  1 1 1 โˆ’1  , Tฯ† =  eโˆ’iฯ† 0 0 eiฯ†  . (22) Using our notation H = U (ฯ€/2, ~kH ), where ~kH = โˆš1 (0, 1, 1) and Tฯ† = U (ฯ†, ~ kTฯ† ), where ~kTฯ† = (0, 0, 1), 2 ~k1 ยท ~k2 = โˆš1 . 2 Our goal is to check for which ฯ†, < H, Tฯ† > = SU (2). Case 1: If ฯ† = kฯ€ then Tฯ† = ยฑI and the generated group is the finite cyclic group of the order 4 when ฯ† = 0 or the order 8 when ฯ† = ฯ€. Case 2: When ฯ† = kฯ€ 2 and k is odd, by Fact 1 we have that C(AdH , AdTฯ† ) is larger than {ฮปI : ฮป โˆˆ R} and hence < H, T kฯ€ > 6= SU (2). In fact it is the 2 finite dicyclic group of order 16 whose generators are HT and T . Fixing universality in this case requires, for example, adding a matrix that has a [1] L. Babai, Proceedings of the Third Annual ACM SIAM Symposium on Discrete Algorithms (Orlando, FL, 1992). ACM, New York, pp. 33-40, (1992). [2] L. Babai, R. Beals, D. N. Rockmore, Proc. of International Symposium on Symbolic and Algebraic Computation. ISSAC 93. ACM Press, pp. 117-126, (1993). [3] A. Bocharov et al., Phys. Rev. A 88, 012313 (2013). [4] A. Bรถttcher, D.Wenzel, Linear Algebra Appl. 429 (2008). k3 ฯ€ k5 ฯ€ k6 ฯ€ , , }, gcd(ki , i) = 1, 3 5 6 we look at the product U (ฮณ, ~kHT ) = HTฯ† = U (ฯ€/2, ~kH )U (ฯ†, ~kT ). Using formula (11) we calculate cos ฮณ, compare it with cos ฯˆ for all exceptional angles ฯˆ and find out they never agree. Hence ฮณ is not exceptional. Thus by Theorem 1 we get < HTฯ† > = SU (2). Our algorithm for deciding universality terminates in Step 2 with l = 2. 3. We are left with ฯ† = k44ฯ€ where gcd(k4 , 4) = 1. There are exactly four such angles. Calculations of U (ฮณ, ~kHTฯ† ) = HTฯ† shows that ฮณ is exceptional, i.e ฮณ = k33ฯ€ , where gcd(k3 , 3) = 1. Moreover, taking further products results in a finite subgroup consisting of 48 elements (all have exceptional spectra) known as the binary octahedral group. Our algorithm for deciding universality terminates in Step 3 with l = 8. Fixing non-universality can be accomplished by, for example, adding one gate U (ฯˆ, ~kฯˆ ) with a non-exceptional ฯˆ and an arbitrary ~kฯˆ . As we can see from the above example our algorithm requires at most words of length l = 8 to terminate for any H and Tฯ† . V. ACKNOWLEDGMENT We would like to thank the anonymous referees for suggestions that led to improvements of the paper. This work was supported by National Science Centre, Poland under the grant SONATA BIS: 2015/18/E/ST1/00200. [5] A. Bouland, S. Aaronson, Phys. Rev. A 89, 062316 (2014). [6] J. Bourgain and A. Gamburd , J. Eur. Math. Soc. 014.5, 1455-1511, (2012). [7] J. Bourgain and A. Gamburd, Invent. Math., 171, Issue 1, 83-12, (2008). [8] T. Brรถcker and T. Dieck, Representations of Compact Lie Groups, Springer-Verlag, New York, MR 86i:22023,(1985). 7 [9] Y. Bromberg et al., Phys. Rev. Lett. 102, 253904 (2009). [10] R. Bryliล„ski, G. Chen, Mathematics of Quantum Computation (Boca Raton, FL: Chapman and Hall/CRC Press, 2002) [11] A. M. Childs et al. Quantum Info. Comput. 11, (2011). [12] W. Curtis, I. Reiner, Representation theory of finite groups and associative algebras (Interscience Publishers, John Wiley and sons, 1962) [13] H. Derksen et al., J. Symb. Comput. 39, 357-371, (2005). [14] A. S. Detinko, D. L. Flannery, Journal of Symbolic Computation 44 1037-1043, (2009). [15] D. Deutsch, Proc. Roy. Soc. Lond. A 425 (1989). [16] G. H. Hardy, E.M. Wright, An introduction to the Theory of Numbers, Oxford at the Clarendon Press, (1960). [17] M. Field, Proc. Amer. Math. Soc. 127 (2011). [18] M. H. Freedman et al., Math. Res. Lett. 10, 11, (2003). [19] B. C. Hall, Lie Groups, Lie Algebras and Representations: An Elementary Introduction, (Springer, GTM, 2nd ed., 2015). [20] A. W. Harrow et al., J. Math. Phys. 43, 4445-4451, (2002). [21] V. Kliuchnikov et al., arXiv:1510.03888, (2015). [22] V. Kliuchnikov et al., IEEE Transactions on Computers, vol.65, no. 1, pp. 161-172, (2016). [23] M. Kuranishi, Nagoya Math. J. 2, (1951). [24] S. Lloyd Phys. Rev. Lett. 75, 2 (1995). [25] A. Lubotzky, et al., Comm. Pur. Appl. Math. 40, 4 401420, (1987). [26] M. Nielsen, I. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, 2000). [27] M. Oszmaniec et al., Phys. Rev. A, vol. 90, p. 020302, (2014). [28] M. Oszmaniec et al., Phys. Rev. X 6, 041044 (2016). [29] A. Politi et al., Science 320, (2008). [30] M. Reck et al., Phys. Rev. Lett. 73, 1 (1994). [31] P. Sarnak, Letter to Scott Aaronson and Andy Pollington on the Solovay-Kitaev theorem, (2015). [32] A. Sawicki, Quantum Info. Comput. 16, 3&4 (2016). [33] A. Sawicki, K. Karnas, Universality of single qudit gates, arXiv:1609.05780, (2016). [34] P. Selinger, Quant. Inf. Comp. 15, 159-180 (2015). [35] R. Zeier, T. Schulte-Herbrรผggen, J. Math. Phys. 52, 113510, (2011). [36] R. Zeier, Z. Zimborรกs, J. Math. Phys. 56, 081702, (2015). [37] Z. Zimborรกs et al., Phys. Rev. A 92, 042309 (2015).
4math.GR
Iterators, Recursors and Interaction Nets Ian Mackie1 , Jorge Sousa Pinto2 , and Miguel Vilacฬงa2 [email protected],{jsp,jmvilaca}@di.uminho.pt 1 arXiv:0910.3321v1 [cs.PL] 17 Oct 2009 2 LIX, CNRS UMR 7161, Eฬcole Polytechnique, 91128 Palaiseau Cedex, France Departamento de Informaฬtica / CCTC, Universidade do Minho, Braga, Portugal Abstract. We propose a method for encoding iterators (and recursion operators in general) using interaction nets (INs). There are two main applications for this: the method can be used to obtain a visual notation for functional programs; and it can be used to extend the existing translations of the ฮป-calculus into INs to languages with recursive types. 1 Introduction The use of visual notations for functional programs has long been an active research topic, whose main goal is to have a notation that can be used (i) to define functional programs visually, and (ii) to animate their execution. In this paper we propose a graphical system for functional programming, based on token-passing INs [9]. The system offers an adequate solution for classic problems of visual notations, including the treatment of higher-order functions, pattern-matching, and recursion (based on the use of recursion operators). The system implements a call-by-name semantics, with a straightforward correspondence between functional programs and graphical objects. Most approaches to visual programming simply propose a notation for programs. Program evaluation is animated by representing visually the intermediate programs that result from executing reduction steps on the initial program, using the operational semantics of the underlying functional language. Our approach is different in that we use a graph-rewriting formalism with its own semantics. The advantages of using INs for visual programming are: โ€“ โ€“ โ€“ โ€“ Both programs and data are represented in the same graphical formalism. Programs can be animated without leaving the interaction formalism. Pattern-matching for external constructors is in-built. Recursive definitions are expressed very naturally as interaction rules involving agents that are reintroduced on the right-hand side. But the interaction net formalism does not offer a satisfactory semantic interpretation for the behaviour of functional symbols. Moreover, many interaction net systems can be defined that do not have a functional reading. What is missing is a clear correspondence between functional definitions and interaction systems.In this paper we establish a correspondence between agents with โ€œobviously functionalโ€ interaction rules and functions defined with recursion operators. 2 The Token-passing Encoding of the ฮป-calculus The token-passing encodings [9] use an interaction system where two different symbols exist for application: one is the syntactic symbol @ introduced by the translation; the corresponding agents have their principal ports facing the root b exists that will of the term and will be depicted by triangles. A second symbol @ be used for computation; to simplify the figures, the corresponding agents will be depicted by circles equally labelled with @. Their principal ports face the net that represents the applied function, to make possible interaction with ฮป agents. The translation Ttp (ยท) encodes terms in the system (ฮฃtp , Rtp ) where ฮฃtp = b ฮป, c, ฮต, ฮด}. It generates nets containing no active pairs.The special sym{โ‡“, @, @, bol โ‡“ is used as an evaluation token: an agent โ‡“ traverses the net, transforming b The evaluation rules involving โ‡“ can be tailored to a occurrences of @ into @. specific evaluation strategy. For call-by-name, Rtp consists of the following rules which comprises evaluation rules involving โ‡“ and a computation rule involving @ and ฮป. Management (copying and erasing) rules are omitted here. To start the reduction a โ‡“ symbol must be connected to the root port of the term. Let โ‡“ N denote such net; then the following correctness result holds: t โ‡“ z iff โ‡“ Ttp (t) โˆ’โ†’โˆ— Ttp (z), where the evaluation relation ยท โ‡“ ยท is defined by the standard evaluation rules for call-by-name. The language used in this paper is the simply-typed ฮป-calculus extended with natural numbers, booleans, lists, and iterators for these types. BNL is defined by the following syntax for terms (x, y range over a set of variables): t, u, v ::= x | ฮปx.t | t u | tt | ff | iterbool(t, u, v) | 0 | suc(t) | iternat(ฮปx.t, u, v) | nil | cons(t, u) | iterlist(ฮปxy.t, u, v) 3 A Token-passing Encoding of BNL We extend to BNL the token-passing call-by-name translation of the ฮป-calculus into the interaction system (ฮฃtp , Rtp ). The novelty of this encoding is not the token-passing aspect, but rather the approach to recursion. We first consider data structures. In a token-passing implementation, there will be an interaction rule between the token agent and each constructor symbol that will stop evaluation. For BNL we define the system (ฮฃBNL , RBNL ) where ฮฃBNL consists of the symbols tt, ff, 0 and nil with arity 0; suc with arity 1; and cons with arity 2. Each recursive program will be encoded in an interaction system specifically generated for it. This is a major novelty of our approach. The interaction system for the ฮป-calculus will not be extended by introducing a fixed set of symbols; instead a new symbol will be introduced for each occurrence of a recursion operator, with an interaction rule for each different constructor, so a dedicated interaction system (ฮฃt0 , Rt0 ) is generated for each term t. This system is constructed by a recursive function (ฮฃt0 , Rt0 ) = S (t), defined as: . . . . . S (x) = S (tt) = S (ff) = S (0) = S (nil) = (โˆ…, โˆ…) . . S (ฮปx.t) = S (suc(t)) = S (t) . . S (t u) = S (cons(t, u)) = S (t) โˆช S (u) . d Bool S (iterbool(V, F, b)) = ({ItBool V,F , ItV,F } โˆช ฮฃ, RItBool โˆช R), V,F where (ฮฃ, R) = S (b) โˆช S (V ) โˆช S (F ). . Nat S (iternat(ฮปx.S, Z, n)) = ({ItNat , Itd } โˆช ฮฃ, R S,Z S,Z ItNat S,Z where (ฮฃ, R) = S (n) โˆช S (S) โˆช S (Z) . List S (iterlist(ฮปxy.C, N, l)) = ({ItList , Itd } โˆช ฮฃ, R C,N C,N โˆช R) ItList C,N โˆช R) where (ฮฃ, R) = S (l) โˆช S (C) โˆช S (N ) RItList consists of the following interaction rules (the others are similar). C,N ... c Iterator symbols are introduced in pairs (It... ... , It... ) where the first symbol is used for syntactic agents and the second for computation agents (similarly to b @, @). A BNL program t will be translated into a net defined in the system (ฮฃt , Rt ) = (ฮฃtp โˆช ฮฃBNL โˆช ฮฃt0 , Rtp โˆช RBNL โˆช Rt0 ) where (ฮฃtp , Rtp ) was defined in Section 2. Given a BNL program t, where t is iterbool(V, F, b), iternat(ฮปx.S, Z, n) or iterlist(ฮปxy.C, N, l), then the net T (t) is given as follows. In token-passing implementations, all terms are translated as syntax trees. Syntactic iterator agents i are turned into their computation counterparts bi by token agents. A first key aspect of our approach is that the interaction rules of the (computation) iterator agents internalise the iteratorโ€™s parameters. For instance the net T (iterlist(ฮปxy.C, N, cons(h, t))) reduces to โ‡“ T (C[h/x, iterlist(ฮปxy.C, N, t)/y]). A second key aspect is that each such new symbol will have auxiliary ports in a one-to-one correspondence with the free variables in the iterator term. We end the section with a correctness result. The proofs can be found in [1]. Proposition 1. (Correctness) If t is a closed BNL term and z a canonical form, then: t โ‡“ z โ‡โ‡’ โ‡“ T (t) โˆ’โ†’โˆ— T (z). 4 Conclusions and Future Work We have presented an approach to encoding in INs functional programs defined with recursion operators, and given the full details of the application of this approach to the token-passing implementation of a call-by-name language, which results in a very convenient visual notation for this language. The approach can be easily extended to richer sets of recursive types and other recursion operators and also to new strategies. The novel characteristics of the encoding are (i) the interaction system is generated dynamically from the program, and (ii) the internalisation of some of the parameters of the recursion operator in the interaction rules. With respect to previous work on encoding recursion in interaction nets, fixpoint operators have been studied elsewhere for interaction net implementations [4, 6], and we have shown elsewhere how a binding recursion operator (as in PCF) can be implemented in the token-passing setting [2]. A prototype system for visual functional programming has been developed, integrated in the tool INblobs [3, 10] for interaction net programming. The tool consists of an evaluator for interaction nets together with a visual editor and a compiler module that translates programs into nets. The latter module allows users to type in a functional program, visualize it, and then follow its evaluation visually step by step. The current compiler module automatically generates callby-name or call-by-value systems. Additionally, a visual editing mode is available that allows users to construct nets corresponding to functional programs. In the current implementation there is no way to convert visual programs back to textual ones. The token-passing translation is not however very representative of most work in this area, which has concentrated on designing efficient translations; [5, 7, 8] are some samples. Let T (ยท) be one such translation. Typically T (t u) is constructed from T (t) and T (u) by introducing an application symbol @ with its principal port connected to the root port of T (t). Our treatment of iterators can be adapted to this setting by removing the evaluator tokens and introducing the iterator agents with the principal port immediately facing the argument. When the iterated function is a closed term, a correctness result can be easily established. Let ฮปx.S be a closed term, then T (iternat(ฮปx.S, Z, 0)) โˆ’โ†’ T (Z) and T (iternat(ฮปx.S, Z, suc(n))) โˆ’โ†’ T (S[iternat(ฮปx.S, Z, n)/x]) References 1. J. B. Almeida, I. Mackie, J. S. Pinto, and M. Vilacฬงa. Encoding iterators in interaction nets. Available from http://www.di.uminho.pt/~jmvilaca. 2. J. B. Almeida, J. S. Pinto, and M. Vilacฬงa. Token-passing Nets for Functional Languages. In J. Giesl, editor, Proceedings of the 7th International Workshop on Reduction Strategies in Rewriting and Programming (WRSโ€™07), volume 204 of Electronic Notes in Theoretical Computer Science, pages 181โ€“198, 2007. 3. J. B. Almeida, J. S. Pinto, and M. Vilacฬงa. A Tool for Programming with Interaction Nets. In Proceedings of the The Eighth International Workshop on Rule-Based Programming (RULEโ€™07), 2007. To appear in Elsevier ENTCS. 4. A. Asperti and S. Guerrini. The Optimal Implementation of Functional Programming Languages, volume 45 of Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, 1998. 5. G. Gonthier, M. Abadi, and J.-J. Leฬvy. The geometry of optimal lambda reduction. In Proceedings of the 19th ACM Symposium on Principles of Programming Languages (POPLโ€™92), pages 15โ€“26. ACM Press, Jan. 1992. 6. I. Mackie. The geometry of interaction machine. In Proceedings of the 22nd ACM Symposium on Principles of Programming Languages (POPLโ€™95), pages 198โ€“208. ACM Press, January 1995. 7. I. Mackie. YALE: Yet another lambda evaluator based on interaction nets. In Proceedings of the 3rd International Conference on Functional Programming (ICFPโ€™98), pages 117โ€“128. ACM Press, 1998. 8. I. Mackie. Efficient ฮป-evaluation with interaction nets. In V. van Oostrom, editor, Proceedings of the 15th International Conference on Rewriting Techniques and Applications (RTAโ€™04), volume 3091 of Lecture Notes in Computer Science, pages 155โ€“169. Springer-Verlag, June 2004. 9. F.-R. Sinot. Call-by-name and call-by-value as token-passing interaction nets. In P. Urzyczyn, editor, TLCA, volume 3461 of Lecture Notes in Computer Science, pages 386โ€“400. Springer, 2005. 10. M. Vilacฬงa. Inblobs webpage. http://haskell.di.uminho.pt/jmvilaca/INblobs/.
6cs.PL
Generalization without Systematicity: On the Compositional Skills of Sequence-to-Sequence Recurrent Networks Brenden Lake 1 2 Marco Baroni 2 arXiv:1711.00350v2 [cs.CL] 11 Feb 2018 Abstract Humans can understand and produce new utterances effortlessly, thanks to their compositional skills. Once a person learns the meaning of a new verb โ€œdax,โ€ he or she can immediately understand the meaning of โ€œdax twiceโ€ or โ€œsing and dax.โ€ In this paper, we introduce the SCAN domain, consisting of a set of simple compositional navigation commands paired with the corresponding action sequences. We then test the zero-shot generalization capabilities of a variety of recurrent neural networks (RNNs) trained on SCAN with sequence-to-sequence methods. We find that RNNs can make successful zero-shot generalizations when the differences between training and test commands are small, so that they can apply โ€œmix-and-matchโ€ strategies to solve the task. However, when generalization requires systematic compositional skills (as in the โ€œdaxโ€ example above), RNNs fail spectacularly. We conclude with a proof-of-concept experiment in neural machine translation, suggesting that lack of systematicity might be partially responsible for neural networksโ€™ notorious training data thirst. 1. Introduction Human language and thought are characterized by systematic compositionality, the algebraic capacity to understand and produce a potentially infinite number of novel combinations from known components (Chomsky, 1957; Montague, 1970). For example, if a person knows the meaning and usage of words such as โ€œtwice,โ€ โ€œand,โ€ and โ€œagain,โ€ once she learns a new verb such as โ€œto daxโ€ she can immediately understand or produce instructions such as โ€œdax twice and then dax again.โ€ This type of compositionality is central to the human ability to make strong generalizations from very 1 Dept. of Psychology and Center for Data Science, New York University 2 Facebook Artificial Intelligence Research. Correspondence to: Brenden Lake <[email protected]>, Marco Baroni <[email protected]>. limited data (Lake et al., 2017). In a set of influential and controversial papers, Jerry Fodor and other researchers have argued that neural networks are not plausible models of the mind because they are associative devices that cannot capture systematic compositionality (Fodor & Pylyshyn, 1988; Marcus, 1998; Fodor & Lepore, 2002; Marcus, 2003; Calvo & Symons, 2014, a.o.). In the last few years, neural network research has made astounding progress in practical domains where success crucially depends on generalization. Perhaps most strikingly, end-to-end recurrent neural networks currently dominate the state-of-the-art in machine translation (Bojar et al., 2016; Wu et al., 2016). Since the overwhelming majority of sentences or even word sequences in a language only occur once, even in a large corpus (Baroni, 2009), this points to strong generalization abilities. Still, it is commonly observed that neural networks are extremely sample inefficient, requiring very large training sets, which suggests they may lack the same algebraic compositionality that humans exploit, and they might only be sensitive to broad patterns over lots of accumulated statistics (Lake et al., 2017). In this paper, we introduce a grounded navigation environment where the learner must translate commands given in a limited form of natural language into a sequence of actions. This problem is naturally framed as a sequence-to-sequence task, and, due to its simplicity, it is ideal to study systematic generalization to novel examples in a controlled setup. We thus use it to test a wide range of modern recurrent network architectures in terms of their compositional abilities. Our results suggest that standard architectures such as LSTMs with attention (Bahdanau et al., 2015) generalize very well when novel examples feature a mixture of constructions that have been observed in training. However, the models are catastrophically affected by systematic differences between training and test sentences, of the sort that would be trivial for an agent equipped with an โ€œalgebraic mindโ€ (Marcus, 2003). Generalization without Systematicity 2. The SCAN tasks We call our data set SCAN because it is a Simplified version of the CommAI Navigation tasks (Mikolov et al., 2016).1 For a learner, the goal is to translate commands presented in simplified natural language into a sequence of actions. Since each command is unambiguously associated to a single action sequence, SCAN (unlike the original CommAI tasks) can be straightforwardly treated as a supervised sequenceto-sequence semantic parsing task (Dong & Lapata, 2016; Jia & Liang, 2016; Herzig & Berant, 2017), where the input vocabulary is given by the set of words used in the commands, and the output by the set of actions available to the learner. Several examples from SCAN are presented in Fig. 1. Formally, SCAN consists of all the commands generated by a phrase-structure grammar (presented in the Appendix) and the corresponding sequence of actions, produced according to a semantic interpretation function (see Appendix). Intuitively, the SCAN grammar licenses commands denoting primitive actions such as JUMP (denoted by โ€œjumpโ€; Fig. 1), WALK (denoted by โ€œwalkโ€) and LTURN (denoted by โ€œturn leftโ€). We will refer to these as primitive commands.2 It also accepts a set of modifiers and conjunctions that compositionally build expressions referring to action sequences. The โ€œleftโ€ and โ€œrightโ€ modifiers take commands denoting undirected primitive actions as input and return commands denoting their directed counterparts (โ€œjump leftโ€; Fig. 1). The โ€œoppositeโ€ modifier produces an action sequence that turns the agent backward in the specified direction before executing a target action (โ€œjump opposite leftโ€), while โ€œaroundโ€ makes the agent execute the action at each step while turning around in the specified direction (โ€œjump around rightโ€; Fig. 1). The โ€œtwice/thriceโ€ modifiers trigger repetition of the command they take scope over, and โ€œand/afterโ€ combine two action sequences. Although the SCAN examples in Fig. 1 focus on the โ€œjumpโ€/JUMP primitive, each instance of JUMP can be replaced with either WALK, RUN, or LOOK to generate yet more commands. Many more combinations are possible as licensed by the grammar. The SCAN grammar, lacking recursion, generates a finite but large set of unambiguous commands (20,910, to be precise). Commands can be decoded compositionally by applying the corresponding interpretation function. This means that, if it discovers the right interpretation function, a learner can understand commands it has not seen during training. For example, the learner might have only observed the primitive โ€œjumpโ€ command during training, but if it has 1 SCAN available at: https://ANONYMIZED Introducing the primitive turning actions LTURN and RTURN considerably simplifies the interpretation function, compared to capturing orientation by specifying arguments to the movement actions (e.g., JUMP[L], JUMP[R]). 2 learned the meaning of โ€œafterโ€, โ€œtwiceโ€ and โ€œaround leftโ€ from other verbs, it should be able to decode, zero-shot, the complex command: โ€œjump around left after jump twiceโ€. 3. Models and setup We approach SCAN through the successful sequence-tosequence (seq2seq) framework, in which two recurrent networks work together to learn a mapping between input sequences and output sequences (e.g., Sutskever et al., 2014).3 Fig. 2 illustrates the application of the seq2seq approach to a SCAN example. First, a recurrent network encoder receives the input sequence word-by-word, forming a lowdimensional representation of the entire command. Second, the low-dimensional representation is passed to a recurrent network decoder, which then generates the output sequence action-by-action. The decoderโ€™s output is compared with the ground truth, and the backpropagation algorithm is used to update the parameters of both the encoder and decoder. Note that although the encoder and decoder share the same network structure (e.g., number of layers and hidden units), they do not otherwise share weights/parameters with each other. More details regarding the encoder-decoder RNN are provided in the Appendix. Using the seq2seq framework, we tested a range of standard recurrent neural network models from the literature: simple recurrent networks (SRNs; Elman, 1990), long short-term memory networks (LSTMs; Hochreiter & Schmidhuber, 1997), and gated recurrent units (GRUs; Chung et al., 2014). Recurrent networks with attention have become increasingly popular in the last few years, and thus we also tested each network with and without an attentional mechanism, using the model from Bahdanau et al. (2015) (see Appendix for more details). Finally, to make the evaluations as systematic as possible, a large-scale hyperparameter search was conducted that varied the number of layers (1 or 2), the number of hidden units per layer (25, 50, 100, 200, or 400), and the amount of dropout (0, 0.1, 0.5; applied to recurrent layers and word embeddings). Varying these hyperparameters leads to 180 different network architectures, all of which were run on each experiment and replicated 5 times each with different random initializations.4 In reporting the results, we focus on the overall-best architecture as determined by the extensive hyperparameter search. The winning architecture was a 2-layer LSTM with 200 hidden units per layer, no attention, and dropout applied at the 0.5 level. Although the detailed analyses to follow focus on this particular model, the top-performing ar3 Very recently, convolutional seq2seq networks have reached comparable or superior performance in machine translation (Gehring et al., 2017). We will investigate them in future work. 4 A small number of runs (23/3600) did not complete, and thus not every network had 5 runs. Generalization without Systematicity jump jump left jump around right turn left twice jump thrice jump opposite left and walk thrice jump opposite left after walk around left โ‡’ โ‡’ โ‡’ โ‡’ โ‡’ โ‡’ โ‡’ JUMP LTURN JUMP RTURN JUMP RTURN JUMP RTURN JUMP RTURN JUMP LTURN LTURN JUMP JUMP JUMP LTURN LTURN JUMP WALK WALK WALK LTURN WALK LTURN WALK LTURN WALK LTURN WALK LTURN LTURN JUMP Figure 1. Examples of SCAN commands (left) and the corresponding action sequences (right). JUMP jump twice and walk <EOS> <SOS> JUMP JUMP WALK JUMP <EOS> WALK Figure 2. The seq2seq framework is applied to SCAN. The symbols <EOS> and <SOS> denote end-of-sentence and start-ofsentence, respectively. The encoder (left) ends with the first <EOS> symbol, and the decoder (right) begins with <SOS>. 4. Experiments In each of the following experiments, the recurrent networks are trained on a large set of commands from the SCAN tasks to establish background knowledge as outlined above. After training, the networks are then evaluated on new commands designed to test generalization beyond the background set in systematic, compositional ways. In evaluating these new commands, the networks must make zero-shot generalizations and produce the appropriate action sequence based solely on extrapolation from the background training. Experiment 1: Generalizing to a random subset of commands chitecture for each experiment individually is also reported and analyzed. Networks were trained with the following specifications. Training consisted of 100,000 trials, each presenting an input/output sequence and then updating the networks weights.5 The ADAM optimization algorithm was used with default parameters, including a learning rate of 0.001 (Kingma & Welling, 2014). Gradients with a norm larger than 5.0 were clipped. Finally, the decoder requires the previous stepโ€™s output as the next stepโ€™s input, which was computed in two different ways. During training, for half the time, the networkโ€™s self-produced outputs were passed back to the next step, and for the other half of the time, the groundtruth outputs were passed back to the next step (teacher forcing; Williams & Zipser, 1989). The networks were implemented in PyTorch and based on a standard seq2seq implementation.6 Training accuracy was above 99.5% for the overall-best network in each of the key experiments, and it was at least 95% or above for the top-performers in each experiment specifically. 5 Note that, in all experiments, the number of distinct training commands is well below 100k: we randomly sampled them with replacement to reach the target size 6 The code we used is publicly available at the link: http://pytorch.org/tutorials/intermediate/ seq2seq_translation_tutorial.html In this experiment, the SCAN tasks were randomly split into a training set (80%) and a test set (20%). The training set provides broad coverage of the task space, and the test set examines how networks can decompose and recombine commands from the training set. For instance, the network is asked to perform the new command, โ€œjump opposite right after walk around right thrice,โ€ as a zero-shot generalization in the test set. Although the conjunction as a whole is novel, the parts are not: The training set features many examples of the parts in other contexts, e.g., โ€œjump opposite right after turn opposite rightโ€ and โ€œjump right twice after walk around right thriceโ€ (both bold sub-strings appear 83 times in the training set). To succeed, the network needs to generalize by recombining pieces of existing commands to interpret new ones. Overall, the networks were highly successful at generalization. The top-performing network for this experiment achieved 99.8% correct on the test set (accuracy values here and below are averaged over the five training runs). The topperforming architecture was a LSTM with no attention, 2 layers of 200 hidden units, and no dropout. The best-overall network achieved 99.7% correct. Interestingly, not every architecture was successful: Classic SRNs performed very poorly, and the best SRN achieved less than 1.5% correct at test time (performance on the training set was equally low). However, attention-augmented SRNs learned the commands much better, achieving 59.7% correct on average for the test set (with a range between 18.4% and 94.0% across SRN Generalization without Systematicity value of 4 times. Experiment 2: Generalizing to commands demanding longer action sequences Figure 3. Zero-shot generalization after training on a random subset of the SCAN tasks. The overall-best network was trained on varying proportions of the set of distinct tasks (x-axis) and generalization was measured on new tasks (y-axis). Each bar shows the mean over 5 training runs with corresponding ยฑ1 SEM. architectures). For LSTMs and GRUs, attention was not essential, since many of the highest performing architectures did not use it. As indicated above, the main split was quite generous, providing 80% of the commands at training time for a total of over 16,700 distinct examples (with strong combinatorial coverage). We next re-trained the best-overall network with varying numbers of distinct examples (the actual number of training presentations was kept constant at 100K). The results are shown in Fig. 3. With 1% of the commands shown during training (about 210 examples), the network performs poorly at about 5% correct. With 2% coverage, performance improves to about 54% correct on the test set. By 4% coverage, performance is about 93% correct. Our results show that not only can networks generalize to random subsets of the tasks, they can do so from relatively sparse coverage of the compositional command space. This is well in line with the success of seq2seq architectures in machine translation, where most test sentences are likely never encountered in training. Still, even with this sparser coverage, differences between training and test instances are not dramatic. Let us for example consider the set of all commands without a conjunction (e.g., โ€œwalk around thriceโ€, โ€œrunโ€, โ€œjump opposite left twiceโ€). All the commands of this sort that occur in the test set of the 2% training coverage split (either as components of a conjunction or by themselves) also occur in the corresponding training set, with an average of 8 occurrences. Even for the 1% split, there is only one conjunction-less test command that does not also occur in the training split, and the frequency of occurrence of such commands in the training set is at a non-negligible average We study next a more systematic form of generalization, where models must bootstrap to commands requiring longer action sequences than those seen in training.7 Now the training set contains all 16,990 commands requiring sequences of up to 22 actions, whereas the test set includes all remaining commands (3,920, requiring action sequences of lengths from 24 to 48). Under this split, for example, at test time the network must execute the command โ€œjump around left twice and walk opposite right thriceโ€, requiring a sequence of 25 actions. Although all the elements used in the command have been observed during training, the network has never been asked to produce a sequence of this length, nor it has ever seen an โ€œaround * twiceโ€ command conjoined with an โ€œopposite * thriceโ€ command (although it did observe both components conjoined with others). Thus, it must productively generalize familiar verbs, modifiers and conjunctions to generate longer action sequences. This is a fair task for a system that is correctly translating the input commands. If you know how to โ€œwalk around,โ€ how to โ€œjump,โ€ and the function of the โ€œandโ€ conjunction, you will be immediately able to โ€œwalk around and jump,โ€ even if you have never performed an action sequence of that length. This test turns out to be very challenging for all models. The best result (20.8% on average, again over 5 runs) is achieved by a GRU with attention, one 50-dimensional hidden layer, and dropout 0.5 (interestingly, a model with considerably less capacity than the best for the random-split setup). The overall-best model achieves 13.8% accuracy. Fig. 4 (top) shows partial success is almost entirely explained by generalization to the shortest action sequence lengths in the test set. Although we might not expect even humans to be able to generalize to very long action sequences, the sharp drop between extrapolating to 25 and 26 actions is striking. The bottom panel of Fig. 4 shows accuracy in the test set organized by command length (in word tokens). The model only gets right some of the longest commands (8 or 9 tokens). In the training set, the longest action sequences (โ‰ฅ20) are invariably associated to commands containing 8 or 9 tokens. Thus, the model is correctly generalizing only in those cases that are most similar to training instances. 7 We focus on action sequence length rather than command length since the former exhibits more variance (1-48 vs. 1-9). The longest commands (9 words) are given by the conjunction of two directed primitives both modified twice, e.g.: โ€œjump around left twice and run opposite right thrice.โ€ On the other hand, a relatively short command such as โ€œjump around left thriceโ€ demands 24 actions. Accuracy on new commands (%) Generalization without Systematicity a strong effect of action sequence length, with average accuracy ranging from 95.76% for commands requiring 24 actions to 22.8% for commands requiring 48 actions). 100 80 Experiment 3: Generalizing composition across primitive commands 60 40 20 0 24 25 26 27 28 30 32 33 36 40 48 Accuracy on new commands (%) Ground-truth action sequence length 100 80 60 40 20 0 4 6 7 8 Command length 9 Figure 4. Zero-shot generalization to commands with action sequence lengths not seen in training. Top: accuracy distribution by action sequence length. Bottom: accuracy distribution by command length (only lengths attested in the test set shown, in both cases). Bars show means over 5 runs of overall-best model with ยฑ1 SEM. Finally, we studied whether the difficulty with long sequences can be mitigated if the proper length was provided by an oracle at evaluation time.8 If this difficulty is a relatively straightforward issue of the decoder terminating too early, then this should provide an (unrealistic) fix. If this difficulty is symptomatic of deeper problems with generalization, then this change will have only a small effect. With the oracle, the overall-best network performance improved from 13.8% to 23.6% correct, which was notable but insufficient to master the long sequences. The top-performing model showed a more substantial improvement (20.8% to 60.2%). Although improved, the networks were far from perfect and still exhibited key difficulties with long sequences of output actions (again, even for the top model, there was 8 Any attempt from the decoder to terminate the action sequence with an <EOS> was ignored (and the second strongest action was chosen) until a sequence with proper length was produced. Our next test is closest to the โ€œdaxโ€ thought experiment presented in the introduction. In the training phase, the model is exposed to the primitive command only denoting a certain basic action (e.g., โ€œjumpโ€). The model is also exposed to all primitive and composed commands for all other actions (e.g., โ€œrunโ€, โ€œrun twiceโ€, โ€œwalkโ€, โ€œwalk opposite left and run twiceโ€, etc.). At test time, the model has to execute all composed commands for the action that it only saw in the primitive context (e.g., โ€œjump twiceโ€, โ€œjump opposite left and run twiceโ€, etc.). According to the classic thought experiments of Fodor and colleagues, this should be easy: if you know the meaning of โ€œrunโ€, โ€œjumpโ€ and โ€œrun twiceโ€, you should also understand what โ€œjump twiceโ€ means. We run two variants of the experiment generalizing from โ€œturn leftโ€ and โ€œjumpโ€, respectively. Since โ€œturn rightโ€ is distributionally identical to โ€œturn leftโ€ (in the sense that it occurs in exactly the same composed commands) and โ€œwalkโ€, โ€œrunโ€ and โ€œlookโ€ are distributionally identical to โ€œjumpโ€, it is redundant to test all commands. Moreover, to ensure the networks were highly familiar with the target primitive command (โ€œjumpโ€ or โ€œturn leftโ€), it was overrepresented in training such that roughly 10% of all training presentations were of the command.9 We obtain strikingly different results for โ€œturn leftโ€ and โ€œjumpโ€. For โ€œturn leftโ€, many models generalize very well to composed commands. The best performance is achieved by a GRU network with attention, one layer with 100 hidden units, and dropout of 0.1 (90.3% accuracy). The overallbest model achieved 90.0% accuracy. On the other hand, for โ€œjump,โ€ models are almost completely incapable to generalize to composed commands. The best performance was 1.2% accuracy (LSTM, attention, one layer, 100 hidden units, dropout 0.1). The overall-best model reached 0.08% accuracy. In the case of โ€œturn leftโ€, although models are only exposed to the primitive command during training, they will see the action it denotes (LTURN) many times, as it is used to accomplish many directed actions. For example, a training example is: โ€œwalk left and jump leftโ€, with ground-truth interpretation: LTURN WALK LTURN JUMP. Apparently, seeing action sequences containing LTURN suffices for the model to understand composed commands with โ€œturn leftโ€, probably because the model receives direct evidence 9 Without over-sampling, performance was consistently worse than what we report. Generalization without Systematicity Table 1. Nearest training commands for a sample of commands, with the respective cosines. Here, โ€œjumpโ€ was trained in isolation while โ€œrunโ€ was trained compositionally. Italics mark low similarities (cosine <0.2). run jump look walk .73 .65 run walk .15 .13 walk after run .55 turn right .12 run thrice after run run twice after run .50 look right twice after walk twice turn right after turn right .09 .49 .09 run twice look twice run twice and look opposite right thrice run twice and run right twice run twice and look opposite right twice walk twice and run twice about how LTURN is used in context. On the other hand, the action denoted by โ€œjumpโ€ (JUMP) only occurs with this primitive command in training, and the model does not generalize from this minimal context to new composed ones. We now take a closer look at the results, focusing on the median-performance run of the overall-best model (as the most representative run of this model). We observe that even in the successful โ€œturn leftโ€ case model errors are surprising. One would expect such errors to be randomly distributed, or perhaps to pertain to the longest commands or action sequences. Instead, all 45 errors made by the model are conjunctions where one of the components is simple โ€œturn leftโ€ (22 cases) or โ€œturn left thriceโ€ (23 cases). This is particularly striking because the network produced the correct mapping for โ€œturn leftโ€ during training, as well as for โ€œturn left thriceโ€ at test time, and it gets many more conjunctions right (ironically, including โ€œturn left thrice and turn leftโ€, โ€œturn left thrice after turn leftโ€ etc.). We conclude that, even when the network has apparently learned systematic composition almost perfectly, it got at it in a very non-human-like way. Itโ€™s hard to conceive of someone who understood the meaning of โ€œturn leftโ€, and โ€œjump right and turn left twiceโ€ (which the network gets right), but not that of โ€œjump right and turn leftโ€ (one of the examples the network missed). In the โ€œjumpโ€ experiment, the network could only correctly decode two composite cases, both starting with the execution of primitive โ€œjumpโ€, conjoined with a different action: โ€œjump and run opposite rightโ€, โ€œjump and walk around left thriceโ€. It is instructive to look at the representations that the network induced for various commands in the latter experiment. Table 1 reports the 5 nearest neighbours for a sample of commands. Command similarity is measured by the cosine between the final encoder hidden state vectors, and computed with respect to all commands present in the training set. โ€œRunโ€ is provided as an example primitive command for which the model has been exposed to the full composed paradigm in training. As one would expect, โ€œrunโ€ is close .72 .65 .64 jump twice walk and walk run and walk .19 .16 .12 .63 walk opposite right and walk look right and walk .63 walk right and walk .11 .12 to the other primitive commands (โ€œlookโ€, โ€œwalkโ€), as well as to short conjoined commands that contain primitive โ€œrunโ€ as one of the conjuncts (we observe a similar pattern for the non-degenerate โ€œjumpโ€ representation induced in Experiment 1). Instead, since โ€œjumpโ€ had a different training distribution than the other primitive commands, the model does not capture its similarity to them, as shown by the very low cosines of its nearest commands. Since it fails to establish a link to other basic commands, the model does not generalize modifier application from them to โ€œjumpโ€. Although โ€œrun twiceโ€ is similar to (conjunctions of) other primitive tasks composed with โ€œtwiceโ€, โ€œjump twiceโ€ is isolated in representational space, and its (far) nearest neighbours look arbitrary. We tested here systematicity in its purest form: the model was only exposed to โ€œjumpโ€ in isolation, and asked to bootstrap to its compositional paradigm based on the behaviour of other primitive commands such as โ€œwalkโ€, โ€œlookโ€ and โ€œrunโ€. Although we suspect humans would not have problems with this setup, it arguably is too opaque for a computational model, which could lack evidence for โ€œjumpingโ€ being the same sort of action as โ€œwalkingโ€. Suppose we give the network some evidence that โ€œjumpingโ€ composes like โ€œwalkingโ€ by showing a few composed โ€œjumpโ€ command during training. Is the network then able to generalize to the full composed paradigm? This question is answered in Figure 5. Again, the new primitive command (and its compositions) were over-sampled during training to make up 10% of all presentations. Here, even when shown 4 different composed commands with โ€œjumpโ€ at training time, the network does not generalize to other composed commands (4.1% correct). Weak generalization starts appearing when the network is presented 8 composed tasks in training (15.3%), and significant generalization (still far from perfect) shows up when the training set contains 16 and especially 32 distinct composed commands (70.2% and 89.9%, respectively). We conclude that the network is not failing to generalize simply because, in the original setup, it had no evidence that โ€œjumpโ€ should Generalization without Systematicity Figure 5. Zero-shot generalization after adding the primitive โ€œjumpโ€ and some compositional jump commands. The overall-best network was trained on different numbers of composed โ€œjumpโ€ commands (x-axis), and generalization was measured on new composed โ€œjumpโ€ commands (y-axis). Each bar shows the mean over 5 runs with varying training commands along with the corresponding ยฑ1 SEM. behave like the other commands. On the other hand, the runs with more composed examples confirm that, as we found in Experiment 1, the network does display powerful generalization abilities. Simply, they do not conform to the โ€œall-or-nothingโ€ rule-based behaviour we would expect from a systematically compositional deviceโ€“and, as a consequence, they require more positive examples to emerge. Experiment 4: Compositionality in machine translation Our final experiment is a proof-of-concept that our findings are more broadly applicable; that is, the limitations of recurrent networks with regards to systematic compositionality extend beyond SCAN to other sequence-to-sequence problems such as machine translation. First, we trained our standard seq2seq code on short (โ‰ค 9 words) English-French sentence pairs that begin with English phrases such as โ€œI am,โ€ โ€œhe is,โ€ โ€œthey are,โ€ and their contractions (randomly split with 10,000 for training and 1180 for testing).6 An informal hyperparameter search led us to pick a LSTM with attention, 2 layers of 400 hidden units, and 0.05 dropout. With these hyperparameters and the same training procedure used for the SCAN tasks (Section 3), the network reached a respectable 28.6 BLEU test score after 100,000 steps. Second, to examine compositionality with the introduction of a new word, we trained a fresh network after adding 1,000 repetitions of the sentence โ€œI am daxyโ€ (fr. โ€œje suis daxisteโ€) to the training data (the BLEU score on the original test set dropped less than 1 point).10 We tested this network by embedding โ€œdaxyโ€ into the following constructions: โ€œyou are daxyโ€ (โ€œtu es daxisteโ€), โ€œhe is daxyโ€ (โ€œil est daxisteโ€), โ€œI am not daxyโ€ (โ€œje ne suis pas daxisteโ€), โ€œyou are not daxyโ€ (โ€œtu nโ€™es pas daxisteโ€), โ€œhe is not daxyโ€ (โ€œil nโ€™est pas daxisteโ€), โ€œI am very daxyโ€ (โ€œje suis treฬ€s daxisteโ€), โ€œyou are very daxyโ€ (โ€œtu es treฬ€s daxisteโ€), โ€œhe is very daxyโ€ (โ€œil est treฬ€s daxisteโ€). During training, the model saw these constructions occurring with 22 distinct predicates on average (limiting the counts to perfect matches, excluding, e.g., โ€œyou are not very Xโ€). Still, the model could only get one of the 8 translations right (that of โ€œhe is daxyโ€). For comparison, for the adjective โ€œtiredโ€, which occurred in 80 different constructions in the training corpus, our network had 8/8 accuracy when testing on the same constructions as for โ€œdaxyโ€ (only one of which also occurred with โ€œtiredโ€ in the training set). Although this is a small-scale machine translation problem, our preliminary result suggests that models will similarly struggle with systematic compositionality in larger data sets, when adding a new word to their vocabulary, in ways that people clearly do not. 5. Discussion In the thirty years since the inception of the systematicity debate, many have tested the ability of neural networks to solve tasks requiring compositional generalization, with mixed results (e.g., Christiansen & Chater, 1994; Marcus, 1998; Phillips, 1998; Chang, 2002; van der Velde et al., 2004; Botvinick & Plaut, 2006; Wong & Wang, 2007; Bowers et al., 2009; Botvinick & Plaut, 2009; Brakel & Frank, 2009; Frank et al., 2009; Frank, 2014; Bowman et al., 2016). However, to the best of our knowledge, ours is the first study testing systematicity in modern seq2seq models, and our results confirm the mixed picture. On the one hand, Experiment 1 and the โ€œturn leftโ€ results in Experiment 3 show how standard recurrent models can reach very high zeroshot accuracy from relatively few training examples. We would like to stress that this is an important positive result, showing in controlled experiments that seq2seq models can make powerful zero-shot generalizations. Indeed, an interesting direction for future work is to understand what are, precisely, the generalization mechanisms that subtend the networksโ€™ success in these experiments. After all, human language does have plenty of generalization patterns that are not easily accounted for by algebraic compositionality (see, e.g., Goldberg, 2005). On the other hand, the same networks fail spectacularly when the link between training and testing data is dependent on the ability to extract systematic rules. This can 10 Results do not change if, instead of repeating โ€œI am daxyโ€ 1,000 times, we insert it 100 times; with just 1 or 10 occurrences of this sentence in the training data, we get 0/8 translations right. Generalization without Systematicity be seen as a trivial confirmation of the basic principle of statistical machine learning that your training and test data should come from the same distribution. But our results also point to an important difference in how humans and current seq2seq models generalize, since there is no doubt that human learners can generalize to unseen data when such data are governed by rules that they have learned before. Crucially, the training data of experiments 2 and 3 provide enough evidence to learn composition rules affording the correct generalizations. In Experiment 2, the training data contain examples of all modifiers and connectives that are needed at test time for producing longer action sequences. In Experiment 3, the usage of modifiers and connectives is illustrated at training time by their application to many combinations of different primitive commands, and, at test time, the network should apply them to a new command it encountered in isolation during training. We thus believe that the fundamental component that current models are missing is the ability to extract systematic rules from the training data. A model that can abstract away from surface statistical patterns and operate in โ€œrule spaceโ€ should extract rules such as: translate(x and y) = translate(x) translate(y); translate(x twice) = translate(x) translate(x). Then, if the meaning of a new command (translate(โ€œjumpโ€)) is learned at training time, and acts as a variable that rules can be applied to, no further learning is needed at test time. When represented in this more abstract way, the training and test distributions are quite similar, even if they differ in terms of shallower statistics such as word frequency. How can we encourage seq2seq models to extract rules from data rather than exploiting shallower pattern recognition mechanisms? We think there are several, non-mutually exclusive avenues to be explored. First, in a โ€œlearning-to-learnโ€ approach (Thrun & Pratt, 1997; Risi et al., 2009; Finn et al., 2017, a.o.), a network can be exposed to a number of different learning environments regulated by similar rules. An objective function requiring successful generalization to new environments might encourage learners to discover the shared general rules. Another promising approach is to add more structure to the neural networks. Taking inspiration from recent neural program induction and modular network models (e.g., Reed & de Freitas, 2016; Hu et al., 2017; Johnson et al., 2017), we could endow RNNs with a set of manually-encoded or (ideally) learned functions for interpreting individual modifiers, connectives, and primitives. The job of the RNN would be to learn how to apply and compose these functions as appropriate for interpreting a command. Similarly, differentiable stacks, tapes, or random-access memory (e.g., Joulin & Mikolov, 2015; Graves et al., 2016) could equip seq2seq models with quasi-discrete memory structures, enabling separate storage of variables, which in turn might encourage abstract rule learning. Other solutions, such as ad-hoc copying mechanisms or special ways to initialize the embeddings of novel words, might help to solve the SCAN tasks specifically. But they are unlikely to help with more general seq2seq problems. It remains to be seen, of course, if any of our proposed approaches offer a truly general solution. Nonetheless, we see all of the suggestions as directions worth pursuing, perhaps simultaneously and in complementary ways, with the goal of achieving human-like systematicity on SCAN and beyond. Given the astounding successes of seq2seq models in challenging tasks such as machine translation, one might argue that failure to generalize by systematic composition indicates that neural networks are poor models of some aspects of human cognition, but it is of little practical import. However, systematicity is an extremely efficient way to generalize. Once a person learns the new English adjective โ€œdaxyโ€, he or she can immediately produce and understand an infinity of sentences containing it. The SCAN experiments and a proof-of-concept machine translation experiment (Experiment 4) suggest that this ability is still beyond the grasp of state-of-the-art neural networks, likely contributing to their striking need for very large training sets. These results give us hope that neural networks capable of systematic compositionality could greatly benefit machine translation, language modeling, and other applications. ACKNOWLEDGMENTS We thank Germaฬn Kruszewski, Adam Liska, Tomas Mikolov, Kristina Gulordava, Gemma Boleda, Michael Auli, Matt Botvinick, Sam Bowman, Jeff Dean, Jonas Gehring, David Grangier, Angeliki Lazaridou, Gary Marcus, the CommAI team and the audiences at the Facebook Dialogue Summit, 2017 Paris Syntax and Semantics Colloquium and CLIC-it 2017 for feedback and advice. The SCAN tasks are based on the navigation tasks available at: https:// github.com/facebookresearch/CommAI-env References Bahdanau, Dzmitry, Cho, Kyunghyun, and Bengio, Yoshua. Neural machine translation by jointly learning to align and translate. In Proceedings of ICLR Conference Track, San Diego, CA, 2015. Published online: http://www. iclr.cc/doku.php?id=iclr2015:main. Baroni, Marco. Distributions in text. In Luฬˆdeling, Anke and Kytoฬˆ, Merja (eds.), Corpus Linguistics: An International Handbook, volume 2, pp. 803โ€“821. Mouton de Gruyter, Berlin, Germany, 2009. Bojar, OndrฬŒej, Chatterjee, Rajen, Federmann, Christian, Generalization without Systematicity Graham, Yvette, Haddow, Barry, Huck, Matthias, Jimeno Yepes, Antonio, Koehn, Philipp, Logacheva, Varvara, Monz, Christof, Negri, Matteo, Neveol, Aurelie, Neves, Mariana, Popel, Martin, Post, Matt, Rubino, Raphael, Scarton, Carolina, Specia, Lucia, Turchi, Marco, Verspoor, Karin, and Zampieri, Marcos. Findings of the 2016 Conference on Machine Translation. In Proceedings of the First Conference on Machine Translation, pp. 131โ€“198, Berlin, Germany, 2016. Botvinick, Matthew and Plaut, David. Short-term memory for serial order: A recurrent neural network model. Psychological Review, 113(2):201โ€“233, 2006. Dong, Li and Lapata, Mirella. Language to logical form with neural attention. In Proceedings of ACL, pp. 33โ€“43, Berlin, Germany, 2016. Elman, Jeffrey. Finding structure in time. Cognitive Science, 14:179โ€“211, 1990. Finn, Chelsea, Abbeel, Pieter, and Levine, Sergey. Modelagnostic meta-learning for fast adaptation of deep networks. In Proceedings of ICML, pp. 1126โ€“1135, Sydney, Australia, 2017. Fodor, Jerry and Lepore, Ernest. The Compositionality Papers. Oxford University Press, Oxford, UK, 2002. Botvinick, Matthew and Plaut, David. Empirical and computational support for context-dependent representations of serial order: Reply to Bowers, Damian, and Davis (2009). Psychological Review, 116(4):998โ€“1002, 2009. Fodor, Jerry and Pylyshyn, Zenon. Connectionism and cognitive architecture: A critical analysis. Cognition, 28: 3โ€“71, 1988. Bowers, Jeffrey, Damian, Markus, and David, Colin. A fundamental limitation of the conjunctive codes learned in PDP models of cognition: Comment on Botvinick and Plaut (2006). Psychological Review, 116(4):986โ€“997, 2009. Frank, Stefan. Getting real about systematicity. In Calvo, Paco and Symons, John (eds.), The architecture of cognition: Rethinking Fodor and Pylyshynโ€™s systematicity challenge, pp. 147โ€“164. MIT Press, Cambridge, MA, 2014. Bowman, Samuel R, Manning, Christopher D, and Potts, Christopher. Tree-Structured Composition in Neural Networks without Tree-Structured Architectures. arXiv preprint, 2016. Frank, Stefan, Haselager, Willem, and van Rooij, Iris. Connectionist semantic systematicity. Cognition, 110(3):358โ€“ 379, 2009. Brakel, Phileฬmon and Frank, Stefan. Strong systematicity in sentence processing by simple recurrent networks. In Proceedings of CogSci, pp. 1599โ€“1604, Amsterdam, the Netherlands, 2009. Calvo, Paco and Symons, John (eds.). The architecture of cognition: Rethinking Fodor and Pylyshynโ€™s systematicity challenge. MIT Press, Cambridge, MA, 2014. Chang, Frankilin. Symbolically speaking: a connectionist model of sentence production. Cognitive Science, 26: 609โ€“651, 2002. Chomsky, Noam. Syntactic Structures. Mouton, Berlin, Germany, 1957. Christiansen, Morten and Chater, Nick. Generalization and connectionist language learning. Mind & Language, 9(3): 273โ€“287, 1994. Chung, Junyoung, Gulcehre, Caglar, Cho, Kyunghyun, and Bengio, Yoshua. Empirical evaluation of gated recurrent neural networks on sequence modeling. In Proceedings of the NIPS Deep Learning and Representation Learning Workshop, Montreal, Canada, 2014. Published online: http://www.dlworkshop.org/ accepted-papers. Gehring, Jonas, Auli, Michael, Grangier, David, Yarats, Denis, and Dauphin, Yann. Convolutional sequence to sequence learning. https://arxiv.org/abs/1705. 03122, 2017. Goldberg, Adele. Constructions at work: The nature of generalization in language. Oxford University Press, Oxford, UK, 2005. Graves, Alex, Wayne, Greg, Reynolds, Malcolm, Harley, Tim, Danihelka, Ivo, Grabska-Barwinska, Agnieszka, Colmenarejo, Sergio Gomez, Grefenstette, Edward, Ramalho, Tiago, Agapiou, John, Badia, Adriaฬ€ Puigdomeฬ€nech, Hermann, Karl Moritz, Zwols, Yori, Ostrovski, Georg, Cain, Adam, King, Helen, Summerfield, Christopher, Blunsom, Phil, Kavukcuoglu, Koray, and Hassabis, Demis. Hybrid computing using a neural network with dynamic external memory. Nature, 538(7626): 471โ€“476, 2016. Herzig, Jonathan and Berant, Jonathan. Neural semantic parsing over multiple knowledge-bases. In Proceedings of ACL (Volume 2: Short Papers), pp. 623โ€“628, Vancouver, Canada, 2017. Hochreiter, S and Schmidhuber, J. Long short-term memory. Neural computation, 9:1735โ€“1780, 1997. Generalization without Systematicity Hu, Ronghang, Andreas, Jacob, Rohrbach, Marcus, Darrell, Trevor, and Saenko, Kate. Learning to reason: End-toend module networks for visual question answering. In Proceedings of ICCV, pp. 804โ€“813, Venice, Italy, 2017. Jia, Robin and Liang, Percy. Data recombination for neural semantic parsing. In Proceedings of ACL, pp. 12โ€“22, Berlin, Germany, 2016. Johnson, Justin, Hariharan, Bharath, van der Maaten, Laurens, Hoffman, Judy, Fei-fei, Li, Zitnick, C Lawrence, and Girshick, Ross. Inferring and Executing Programs for Visual Reasoning. In International Conference on Computer Vision, 2017. Joulin, Armand and Mikolov, Tomas. Inferring algorithmic patterns with stack-augmented recurrent nets. In Proceedings of NIPS, Montreal, Canada, 2015. Kingma, Diederik P and Welling, Max. Efficient GradientBased Inference through Transformations between Bayes Nets and Neural Nets. In International Conference on Machine Learning (ICML 2014), 2014. Lake, Brenden, Ullman, Tomer, Tenenbaum, Joshua, and Gershman, Samuel. Building machines that learn and think like people. Behavorial and Brain Sciences, 2017. In press. Marcus, Gary F. Rethinking Eliminative Connectionism. Cognitive Psychology, 282(37):243โ€“282, 1998. Marcus, Gary F. The Algebraic Mind: Integrating Connectionism and Cognitive Science. MIT Press, Cambridge, MA, 2003. Mikolov, Tomas, Joulin, Armand, and Baroni, Marco. A Roadmap towards Machine Intelligence. arXiv preprint, 2016. URL http://arxiv.org/abs/ 1511.08130. Montague, Richard. Universal Grammar. Theoria, 36:373โ€“ 398, 1970. Phillips, Steven. Are feedforward and recurrent networks systematic? analysis and implications for a connectionist cognitive architecture. Connection Science, 10:137โ€“160, 1998. Reed, Scott and de Freitas, Nando. Neural programmerinterpreters. In Proceedings of ICLR, San Juan, Puerto Rico, 2016. Published online: http://www.iclr. cc/doku.php?id=iclr2016:main. Risi, Sebastian, Vanderbleek, Sandy, Hughes, Charles, and Stanley, Kenneth. How novelty search escapes the deceptive trap of learning to learn. In Proceedings of GECCO, pp. 153โ€“160, Montreal, Canada, 2009. Sutskever, Ilya, Vinyals, Oriol, and Le, Quoc. Sequence to sequence learning with neural networks. In Proceedings of NIPS, pp. 3104โ€“3112, Montreal, Canada, 2014. Thrun, Sebastian and Pratt, Lorien (eds.). Learning to Learn. Kluwer, Dordrecht, 1997. van der Velde, Frank, , van der Voort van der Kleij, Gwendid, and de Kamps, Marc. Lack of combinatorial productivity in language processing with simple recurrent networks. Connection Science, 16(1):21โ€“46, 2004. Williams, Ronald J and Zipser, David. A Learning Algorithm for Continually Running Fully Recurrent Neural Networks. Neural Computation, 1:270โ€“280, 1989. Wong, Francis and Wang, William. Generalisation towards combinatorial productivity in language acquisition by simple recurrent networks. In Proceedings of KIMAS, pp. 139โ€“144, Waltham, MA, 2007. Wu, Yonghui, Schuster, Mike, Chen, Zhifeng, Le, Quoc, Norouzi, Mohammad, Macherey, Wolfgang, Krikun, Maxim, Cao, Yuan, Gao, Qin, Macherey, Klaus, Klingner, Jeff, Shah, Apurva, Johnson, Melvin, Liu, Xiaobing, Kaiser, Lukasz, Gouws, Stephan, Kato, Yoshikiyo, Kudo, Taku, Kazawa, Hideto, Stevens, Keith, Kurian, George, Patil, Nishant, Wang, Wei, Young, Cliff, Smith, Jason, Riesa, Jason, Rudnick, Alex, Vinyals, Oriol, Corrado, Greg, Hughes, Macduff, and Dean, Jeffrey. Googleโ€™s neural machine translation system: Bridging the gap between human and machine translation. http:// arxiv.org/abs/1609.08144, 2016.
2cs.AI
arXiv:1604.07227v1 [math.GR] 25 Apr 2016 Alternate modules are subsymplectic Cleฬment Gueฬrinโˆ— April 26, 2016 Abstract In this paper, an alternate module (A, ฯ†) is a finite abelian group A with a Z-bilinear application ฯ† : A ร— A โ†’ Q/Z which is alternate (i.e. zero on the diagonal). We shall prove that any alternate module is subsymplectic, i.e. if (A, ฯ†) has a Lagrangian of cardinal n then there exists an abelian group B of order n such that (A, ฯ†) is a submodule of the standard symplectic module B ร— B โˆ— . Keywords : alternate modules, symplectic modules, Lagrangians, finite abelian groups. Mathematics Subject Classification : 20K01. Contents 1 Definitions and statement of the result 2 2 Lagrangians in alternate modules 5 3 Any alternate module is subsymplectic 10 3.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.2 Proof of the fundamental lemma . . . . . . . . . . . . . . . . . 15 3.3 Proof of the theorem . . . . . . . . . . . . . . . . . . . . . . . 20 4 Remarks 20 IRMA Institut de Recherche Matheฬmatiques avanceฬe, University of Strasbourg, 7 rue Reneฬ Descartes, F-67084 Strasbourg , France, e-mail : [email protected] โˆ— 1 1 Definitions and statement of the result Before stating the result, we give some standard definitions along with some properties regarding the alternate modules. The concept is defined by Wall in [Wal64] and by Tignol, Amitsur in [AT86]. Among the results, we will establish here, some might be directly read in those references and also in [TW15]. Let A be an abelian group. If we are given an application ฯ† : A ร— A โ†’ Q/Z, then we say that (A, ฯ†) is a bilinear module if ฯ† is bilinear when A is seen as a Z-module. By definition, the underlying group of the bilinear module (A, ฯ†) is A and the associated bilinear form to (A, ฯ†) is ฯ†. In the sequel, all bilinear modules are assumed to be finite. Let (A, ฯ†) a bilinear module, we say that (A, ฯ†) is an alternate module if ฯ†(a, a) = 0 for all a โˆˆ A. If (A, ฯ†) is an alternate module, then for all a, b โˆˆ A : 0 = ฯ†(a + b, a + b) = ฯ†(a, a) + ฯ†(a, b) + ฯ†(b, a) + ฯ†(b, b) = ฯ†(a, b) + ฯ†(b, a) since (A, ฯ†) is alternate by โ€bilinearityโ€ since (A, ฯ†) is alternate Whence for all a, b โˆˆ A, ฯ†(a, b) = โˆ’ฯ†(b, a). We will sum up this by saying that if (A, ฯ†) is an alternate module then, in particular ฯ† is anti-symmetric. Let (A, ฯ†) be an alternate module and a, b โˆˆ A, we say that a is orthogonal to b if ฯ†(a, b) = 0. Since A is alternate, any element of A is orthogonal to itself and the relation of orthogonality is symmetric by anti-symmetry of the bilinear form ฯ†. Let (A, ฯ†) be an alternate module and S a subset of A. We define S โŠฅ the orthogonal of S as the subset of elements in A which are orthogonal to S. One can directly check that S โŠฅ is a subgroup of A. Let (A, ฯ†) be an alternate module and B a subgroup of A then the bilinear module induced by A on B : (B, ฯ†Bร—B ) is also an alternate module called the induced submodule on B by ฯ†. 2 Let (A1 , ฯ†1 ) and (A2 , ฯ†2 ) be two alternate modules, we define the orthogonal sum of those modules by : โŠฅ (A1 , ฯ†1 ) โŠ• (A2 , ฯ†2 ) := (A, ฯ†) With A := A1 โŠ• A2 and ฯ†((a1 , a2 ), (b1 , b2 )) := ฯ†1 (a1 , b1 ) + ฯ†2 (a2 , b2 ). It is a straightforward verification that (A, ฯ†) is an alternate module, verifying โŠฅ A1 โ‰ค AโŠฅ 2 , A2 โ‰ค A1 and the induced submodule by ฯ† on Ai is (Ai , ฯ†i ). Conversly, if (A, ฯ†) is an alternate module and B, C two subgroups of A such that A = B โŠ• C with B โ‰ค C โŠฅ , then (A, ฯ†) can be written as the orthogonal sum of the two induced modules on B and C by ฯ†. Let A be a finite module, we define Aโˆ— , the dual of A as the group Aโˆ— := Mor(A, Q/Z). A non-trivial result (direct consequence of the classification of finite abelian groups) states that A is isomorphic to Aโˆ— as a group. Remark that the isomorphism between A and Aโˆ— is not canonical. Let (A, ฯ†) be an alternate module, we define the dual application associated to (A, ฯ†) as : ฯ†โˆ— : A โˆ’โ†’ Aโˆ— a 7โˆ’โ†’ b 7โ†’ ฯ†(a, b) The kernel Kฯ† of (A, ฯ†) is, by definition, the kernel Ker(ฯ†โˆ— ) of the dual application ฯ†โˆ— . In other words, Kฯ† = AโŠฅ i.e. the set of elements in A which are orthogonal to any element of A. Let (A, ฯ†) be an alternate module, we say that (A, ฯ†) is a symplectic module if its kernel Kฯ† is trivial (i.e. the application ฯ† is non-degenerate). To any alternate module (A, ฯ†), we can associate a symplectic module (B, ฯ†B ) setting B := A/Kฯ† and : ฯ†B (a1 mod Kฯ† , a2 mod Kฯ† ) := ฯ†(a1 , a2 ) The fact that (B, ฯ†B ) is well defined and is a symplectic module is clear. This symplectic module will always be denoted (A/Kฯ† , ฯ†) and called the symplectic module associated to (A, ฯ†). An important example of symplectic module is the following : 3 Example 1. Let B be an abelian group. We define A := B ร— B โˆ— and : ฯ†: A ร— A โˆ’โ†’ Q/Z ((a1 , ฯˆ1 ), (a2 , ฯˆ2 )) 7โˆ’โ†’ ฯˆ2 (a1 ) โˆ’ ฯˆ1 (a2 ) Then (A, ฯ†) is a symplectic module. In the sequel, such symplectic module will always be denoted B ร— B โˆ— (the underlying bilinear form being the form ฯ† as above). Proof. Clearly (A, ฯ†) is an alternate module. Let (a, ฯˆ) be in Kฯ† then for all bโˆˆA: ฯ†((a, ฯˆ), (b, 0)) = 0 โ‡’ ฯˆ(b) = 0 This implies that ฯˆ is the trivial morphism, i.e. ฯˆ = 0. Furthermore for all ฯˆ โ€ฒ โˆˆ Mor(A, Q/Z) : ฯ†((a, 0), (0, ฯˆ โ€ฒ)) = 0 โ‡’ ฯˆ โ€ฒ (a) = 0 Since A is isomorphic to Mor(A, Q/Z) (although the isomorphism is not canonical) this implies that a = 0. Therefore Kฯ† is trivial and (A, ฯ†) is a symplectic module. Let (A, ฯ†) be an alternate module and S a subset of A. We say that S is isotropic if S โІ S โŠฅ . Furthermore, if S = S โŠฅ then S is a subgroup of A and is called a Lagrangian of (A, ฯ†). In general (see proposition 3) the cardinal of a Lagrangian of (A, ฯ†) only depends on |A| and |Kฯ† |. We shall p denote nA,ฯ† := |A||Kฯ† | the cardinal of any Lagrangian of (A, ฯ†). In the example 1, the subgroups B and B โˆ— of A are both Lagrangians of the module (A, ฯ†). Let (A, ฯ†) and (Aโ€ฒ , ฯ†โ€ฒ ) be alternate modules, we say that (A, ฯ†) and (Aโ€ฒ , ฯ†โ€ฒ ) are isometric if there exists a group isomorphism g : A โ†’ Aโ€ฒ verifying ฯ† = g โˆ—ฯ†โ€ฒ . The isometric relation is clearly an equivalence relation. Now, we come to the most important definition of this paper. Let (A, ฯ†) be an alternate module. We say that (A, ฯ†) is subsymplectic if there exists an abelian group B of order nA,ฯ† such that (A, ฯ†) is included in the standard symplectic module B ร— B โˆ— . The result we are going to prove here is : Theorem. Any alternate module is subsymplectic. 4 Whereas the classification of symplectic modules is easily delt with, it seems hopeless to do the same thing for alternate modules in general. The statement that alternate modules are subsymplectic appears as the closest possible result to a classification of alternate modules. In another paper, we will use this result to classify conjugacy classes of centralizers of irreducible subgroups in P SL(n, C). In the second section, we shall characterize and study the Lagrangians in alternate modules. In the third section we will prove the theorem. In the last section, we make some remarks about this proof and alternate modules in general. 2 Lagrangians in alternate modules Some results in this section have been proven in other papers, we shall only give the references. We begin with an elementary propoosition : Proposition 1. Let (A, ฯ†) be a symplectic module and B a subgroup of A then : 1. |B||B โŠฅ | = |A| and (B โŠฅ )โŠฅ = B. 2. If the induced submodule on B by (A, ฯ†) is a symplectic module then the induced submodule on B โŠฅ by (A, ฯ†) is also a symplectic module, Furthermore โŠฅ A = B โŠ• BโŠฅ Proof. See proposition 2.2 of [AT86] or lemma 1 in [Wal64]. Whereas, alternate modules are very hard to classify, the following property implies that any symplectic module is isometric to one constructed as in the example 1. In particular, the set of symplectic modules is quite rigid. Corollary 1. Let (A, ฯ†) be a symplectic module. There exists B โ‰ค A such that (A, ฯ†) is isomorphic to B ร— B โˆ— . 5 Proof. See lemma 7 in [Wal64] or theorem 4.1 in [AT86]. This construction can be seen as the analogous of a symplectic base for (A, ฯ†) (i.e. a โ€baseโ€ of B as a finite abelian group and its โ€dual baseโ€ in B โˆ— ). A direct consequence of this corollary is that any two symplectic modules (A, ฯ†) and (Aโ€ฒ , ฯ†โ€ฒ) are isometric if and only if A and Aโ€ฒ are isomorphic as groups. It is, somehow, surprising that such symplectic base exists for those finite modules (in a similar fashion than for bilinear forms on K-vector spaces). Whereas K-vector spaces endowed with an alternate form (not necessarily symplectic) are always the sum of the kernel of the form and a non-degenerate complementary, this is not the case for alternate modules in general. Indeed, one can consider the following counter-example : Counter-example 1. Let A := Z/2 ร— Z/4 ร— Z/8. We denote e1 := (1, 0, 0), e2 := (0, 1, 0) and e3 := (0, 0, 1). Then, on the base e1 , e2 , e3 , we define the alternate bilinear form ฯ† on A with its associated matrix : ๏ฃซ ๏ฃถ 0 1/2 1/2 Mฯ† := ๏ฃญ1/2 0 โˆ’1/4๏ฃธ 1/2 1/4 0 Then the kernel Kฯ† of (A, ฯ†) is not a direct factor of A, in particular, A is not the sum of a non-degenerate module and its kernel. Proof. With a straightforward computation, one can check that Kฯ† = he1 + 2e2 +2e3 i is isomorphic to Z/4. We remark that 2(e1 +2e2 +2e3 ) = 4e3 โˆˆ Kฯ† . Furthermore if (x, y, z) โˆˆ A then 4(x, y, z) = (0, 0, 4z) so any element a โˆˆ A of order 8 will verify that 4a = 4e3 โˆˆ Kฯ† . In particular, Kฯ† is not a direct factor of A. This little example shows that the kernel of (A, ฯ†) is not necessarily a direct factor of A. Furthermore, one can check that A cannot be written as the orthogonal sum of strictly smaller submodules. In some sense, it is irreducible, this suggests that if there is a classification of alternate modules (in some sense, we would like to have one in the sequel), it should be complicated. Another corollary of the proposition 1 : Corollary 2. Let p (A, ฯ†) be a symplectic module, then any Lagrangian L of A is of cardinal |A|. 6 Proof. By definition, L = LโŠฅ , applying the first point of proposition 1, we get |L|2 = |A|. In their paper, [AT86], J.-P. Tignol and S.A. Amitsur are interested in Lagrangian of symplectic modules, they apply this to division algebra (cf. [AT85]). We need to understand, Lagrangians of alternate modules. We recall some results about Lagrangians in this case : Proposition 2. Let (A, ฯ†) be an alternate module. The Lagrangians of A are exactly the maximal elements for the inclusion within the set of isotropic subsets of A. In other words a subset L in A is a Lagrangian of A if and only if for any K โ€ฒ isotropic subset of A containing L, K โ€ฒ = L. Proof. Let L be an isotropic subset of A. Assume that L is a Lagrangian, then if K โ€ฒ is an isotropic subset of A containing L, then LโŠฅ โЇ K โ€ฒ since K โ€ฒ is orthogonal to K โ€ฒ whence to L. Since L is a Lagrangian, L = LโŠฅ whence K โ€ฒ โІ L, since K โ€ฒ โЇ L by assumption L = K โ€ฒ and L is thus maximal among the isotropic subsets of A. Assume that L is not a Lagrangian. Since L is isotropic, L โ‰ค LโŠฅ and there exists a โˆˆ LโŠฅ which does not belong to L. We define K โ€ฒ := hL, ai, clearly L โ‰ค K โ€ฒ and K โ€ฒ 6= L, furthermore L being isotropic is orthogonal to a by assumption, whence K โ€ฒ is an isotropic subspace of A. Whence L is not maximal among the isotropic subsets of A. Let (A, ฯ†) be an alternate module then the set of isotropic subspaces of A is not empty (it contains the trivial group) and finite (since A is finite). Therefore, there exists a maximal element for the inclusion. Whence any alternate module admits a Lagrangian. Furthermore, if K is any isotropic subset, there will always be a maximal isotropic subset containing it, therefore any isotropic subset is contained in a Lagrangian. In particular, for any a โˆˆ A, there exists a Lagrangian containing a (applying what we have just done to K = hai). The next proposition is a generalization of corollary 2 : Proposition 3. Let (A, ฯ†) p be an alternate module. For any Lagrangian L of A, the cardinal of L is |A||Kฯ† |. 7 Proof. We define (A/Kฯ† , ฯ†) to be the associated symplectic module to (A, ฯ†) and ฯ€ be the projection of A onto A/Kฯ† . Clearly the application ฯ€ leads to a bijective correspondance between isotropic subgroups of A containing Kฯ† and isotropic subgroups of A/Kฯ† . Since maximal elements among isotropic subsets of A are isotropic subgroups of A containing Kฯ† , it follows that ฯ€ induces a bijective correspondance between Lagrangians in A and Lagrangians in A/Kฯ† (by sending L to ฯ€(L)). In particular, any Lagrangian L of A is of the form ฯ€ โˆ’1 (L) where L is a Lagrangian in A/Kฯ† . |L| = |ฯ€ โˆ’1 (L)| = |Kฯ† ||L| s = |Kฯ† | = q |A| by corollary 2 |Kฯ† | |A||Kฯ† | We see that the cardinal of Lagrangians is constant in alternate modules. However, the isomorphism class of Lagrangians may vary (see also [AT86]). Example 2. Let (A, ฯ†) be the alternate module defined in counter-example 1. Then A = Z/2 ร— Z/4 ร— Z/8, and if we denote e1 := (1, 0, 0), e2 = (0, 1, 0) and e3 = (0, 0, 1) in A then the subgroups L1 := he3 , e1 + 2e2 i and L2 := he1 , 2e2 , 2e3 i are Lagrangians in A and : L1 is isomorphic to Z/2 ร— Z/8 L2 is isomorphic to Z/2 ร— Z/2 ร— Z/4 In particular, L1 is not isomorphic to L2 . Proof. From the counter-example 1, |Kฯ† | = 4, hence the cardinal of a Laโˆš grangian in (A, ฯ†) is 2 ยท 4 ยท 8 ยท 4 = 16 using proposition 3. We directly check that both L1 and L2 are isotropic. 8 Furthermore e1 + 2e2 is of order 2 and not in he3 i, therefore L1 is isomorphic to he1 + 2e2 i ร— he3 i. Whence L1 is isomorphic to Z/2 ร— Z/8. In particular, L1 is isotropic and has the cardinal of a Lagrangian, by maximality of Lagrangians (proposition 2) it is Lagrangian. Finally, L2 is clearly isomorphic to Z/2 ร— Z/2 ร— Z/4. Likewise, the L2 is isotropic of cardinal 16, by maximality of Lagrangians (proposition 2) it is Lagrangian. In general, it is much more convenient to work with abelian p-groups than finite abelian groups. We remark that : Proposition 4. Let (A, ฯ†) be an alternate module such that (A, ฯ†) is isometric to the orthogonal sum of (A1 , ฯ†1 ) and (A2 , ฯ†2) : โŠฅ (A, ฯ†) = (A1 , ฯ†1 ) โŠ• (A2 , ฯ†2 ) If both (A1 , ฯ†1 ) and (A2 , ฯ†2 ) are subsymplectic then (A, ฯ†) is subsymplectic. Proof. We begin by showing that Kฯ† = Kฯ†1 โŠ• Kฯ†2 . Clearly, Kฯ† contains Kฯ†1 and Kฯ†2 and both are in direct sum. Finalely, if k = (l1 , l2 ) โˆˆ Kฯ† โ‰ค A1 โŠ• A2 then for all a1 โˆˆ A1 , we have : 0 = ฯ†(k, (a1 , 0)) = ฯ†1 (l1 , a1 ) + ฯ†2 (l2 , 0) = ฯ†1 (l1 , a1 ) This is true for any a1 โˆˆ A1 so l1 โˆˆ Kฯ†1 . Likewise, l2 โˆˆ Kฯ†2 , whence Kฯ† = Kฯ† 1 โŠ• K ฯ† 2 . It follows that |Kฯ† | = |Kฯ†1 ||Kฯ†2 |, since |A| = |A1 ||A2 |, we have : nA,ฯ† = nA1 ,ฯ†1 nA2 ,ฯ†2 (1) By hypothesis, for i = 1, 2, there exists Bi , an abelian gorup of order nAi ,ฯ†i such that (Ai , ฯ†i ) โ‰ค Bi ร— Biโˆ— . Whence : โŠฅ (A, ฯ†) = (A1 , ฯ†1 ) โŠ• (A2 , ฯ†2 ) โŠฅ โ‰ค (B1 ร— B1โˆ— ) โŠ• (B2 ร— B2โˆ— ) โ‰ค B ร— B โˆ— where B := B1 ร— B2 9 We have included (A, ฯ†) (as an alternate module) in B ร— B โˆ— , since |B| = |B1 ||B2 | = nA1 ,ฯ†1 nA2 ,ฯ†2 = nA,ฯ† by equation 1, it follows, by definition, that (A, ฯ†) is subsymplectic. As a result : Corollary 3. Let (A, ฯ†) be an alternate module then, we denote, for p any prime dividing |A|, Sp the unique p-Sylow of A. If for all p dividing |A|, the induced submodule on Sp by ฯ† is subsymplectic then (A, ฯ†) is subsymplectic. Proof. It is a well known result that if p1 , . . . , pr are the r distinct primes dividing |A| then, as a group, A is isomorphic to the product of its p-Sylows A = Sp 1 โŠ• ยท ยท ยท โŠ• Sp r Furthermore, if 1 โ‰ค i 6= j โ‰ค r and ai โˆˆ Spi , aj โˆˆ Spj then ฯ†(ai , aj ) is of order dividing some power of pi and some power of pj , it follows that ฯ†(ai , aj ) is of order 1, i.e. is trivial. In particular, for i 6= j, the induced modules Spi and Spj are orthogonal to each other. It follows that : โŠฅ โŠฅ (A, ฯ†) = Sp1 โŠ• ยท ยท ยท โŠ• Spr The corollary is a direct consequence of this decomposition and proposition 4. With those classical properties, we will show the theorem. 3 Any alternate module is subsymplectic Basically, the idea is to make an induction on the cardinal of the kernel. The following lemma is the major step of the proof : Fundamental lemma. Let p be a prime number and (A, ฯ†) an alternate module which is not symplectic with A a p-group. Then there exists an alternate module (Aฬ‚, ฯ†ฬ‚) such that (A, ฯ†) is a submodule of (Aฬ‚, ฯ†ฬ‚), |A| < |Aฬ‚| and nA,ฯ† = nAฬ‚,ฯ†ฬ‚ . 10 In the sequel, we will say that (Aฬ‚, ฯ†ฬ‚) is an extension of modules of (A, ฯ†) via the inclusion ฮนA if ฮนA : A โ†’ Aฬ‚ is an inclusion of alternate modules, i.e. ฮนAโˆ— ฯ†ฬ‚ = ฯ† and ฮนA is an inclusion of modules. The extension will be with constant Lagrangians if nAฬ‚,ฯ†ฬ‚ = nA,ฯ† . The first subsection gathers some preliminary results. The second subection is the proof of the fundamental lemma. For subsections 3.1 and 3.2, p is a fixed prime number and any alternate module (A, ฯ†) is assumed to have its underlying group A to be a p-group. In the third subsection, we prove the theorem. 3.1 Preliminaries The next lemma is interesting in itself, it generalizes the second point of proposition 1. Lemma 1. Let (A, ฯ†) be an alternate module. If there exists a submodule B of (A, ฯ†) such that B is a symplectic module then : โŠฅ (A, ฯ†) is isometric to B โŠ• B โŠฅ Proof. Let (A, ฯ†) be an alternate module and B be a submodule of A which is symplectic. Then B โŠฅ is also a submodule of (A, ฯ†). Since B is symplectic, B โŠฅ โˆฉ B is trivial. It follows that B โŠ• B โŠฅ is a subgroup of A. By definition, B is orthogonal to B โŠฅ it follows that : โŠฅ B โŠ• B โŠฅ is a submodule of (A, ฯ†) Let ฯ€ be the canonical projection of A on A/Kฯ† . Since B is symplectic, B โˆฉ Kฯ† is trivial and B is isomorphic to B := ฯ€(B). Using the first point of proposition 1 : โŠฅ |A/Kฯ† | |B| |A| = |Kฯ† ||B| B = 11 โŠฅ โŠฅ Clearly, ฯ€ โˆ’1 (B ) = B โŠฅ , it follows that |B โŠฅ | = |Kฯ† ||B |. Finally, we have that : โŠฅ |B โŠ• B โŠฅ | = |B||B โŠฅ | โŠฅ = |B||Kฯ† ||B | |A| = |B||Kฯ† | |Kฯ† ||B| = |A| โŠฅ Since B โŠ• B โŠฅ is a submodule of (A, ฯ†) and both modules have the same cardinal, we have that : โŠฅ (A, ฯ†) is isometric to B โŠ• B โŠฅ The next lemma gives a sufficient condition for an extension of modules to be with constant Lagrangians : Lemma 2. Let p be a prime number, (Aฬ‚, ฯ†ฬ‚) be an alternate module and A be a subgroup of Aฬ‚ of index p. We denote (A, ฯ†) the induced submodule on A by ฯ†ฬ‚. If Kฯ† is not included in Kฯ†ฬ‚ then nA,ฯ† = nAฬ‚,ฯ†ฬ‚ . Proof. Let eฬ‚ be an element of Aฬ‚ which is not in A. Since [Aฬ‚ : A] is of cardinal p, any element in aฬ‚ โˆˆ Aฬ‚ can uniquely be written as : Define : aฬ‚ = ฮปeฬ‚ + a where 0 โ‰ค ฮป โ‰ค p โˆ’ 1 and a โˆˆ A f: Then for all k โˆˆ Kฯ† : Kฯ† โˆ’โ†’ Q/Z k 7โˆ’โ†’ ฯ†ฬ‚(eฬ‚, k) p ยท f (k) = p ยท ฯ†ฬ‚(eฬ‚, k) = ฯ†ฬ‚(peฬ‚, k) = ฯ†(peฬ‚, k) since peฬ‚ and k are in A = 0 since k โˆˆ Kฯ† and peฬ‚ โˆˆ A 12 As a result Im(f ) is a finite subgroup of Q/Z of exponent dividing p. Whence Im(f ) is either trivial or the unique cyclic subgroup of order p in Q/Z. If Im(f ) is trivial, then Kฯ† is orthogonal to eฬ‚, since Kฯ† is orthogonal to A and Aฬ‚ is generated by eฬ‚ and A, it follows that Kฯ† is orthogonal to Aฬ‚, whence Kฯ† โ‰ค Kฯ†ฬ‚ . By assumption, this is a contradiction. It follows that Im(f ) is cyclic of cardinal p. Let x = ฮปeฬ‚ + a โˆˆ Kฯ†ฬ‚ where 0 โ‰ค ฮป โ‰ค p โˆ’ 1 and a โˆˆ A. Let k0 โˆˆ Kฯ† such that f (k0 ) is of order p. Since x โˆˆ Kฯ†ฬ‚ , we have ฯ†ฬ‚(x, k0 ) = 0. On the other hand : ฯ†ฬ‚(x, k0 ) = ฮปฯ†ฬ‚(eฬ‚, k0 ) + ฯ†ฬ‚(a, k0 ) = ฮปf (k0 ) + ฯ†(a, k0 ) = ฮปf (k0 ) + 0 since k0 โˆˆ Kฯ† It follows that ฮปf (k0 ) = 0. Since f (k0 ) is of order p, we have that p divides ฮป and since 0 โ‰ค ฮป โ‰ค p โˆ’ 1, we end up with ฮป = 0 which implies that x โˆˆ A. As a result, we have shown that Kฯ†ฬ‚ โ‰ค Kฯ† . Finally : nAฬ‚,ฯ†ฬ‚ = q |Aฬ‚||Kฯ†ฬ‚ | p p|A||Kฯ† | =q [Kฯ† : Kฯ†ฬ‚ ] s p nA,ฯ† = [Kฯ† : Kฯ†ฬ‚ ] Let L be a Lagrangian of A, then L is isotropic in Aฬ‚ and by proposition 2, there exists a Lagrangian Lฬ‚ of Aฬ‚ containing L. Using Lagrangeโ€™s theorem, we have that |L| divides |Lฬ‚| and using proposition 3, nA,ฯ† divides nAฬ‚,ฯ†ฬ‚ . It q follows that [Kฯ†p:K ] is a positive integer which cannot but be equal to one ฯ†ฬ‚ (because p is a prime number). In particular, we have that nAฬ‚,ฯ†ฬ‚ = nA,ฯ† . 13 The last lemma in those preleminaries allows us to construct extension of modules in a fairly simple way. Lemma 3. Let p be a prime number, (A, ฯ†) an alternate module where A is a p group. Assume that there exist r + 1 non-trivial elements e, e1 , . . . , er in A such that : A = hei ร— he1 i ร— ยท ยท ยท ร— her i Assume furthermore that for any 1 โ‰ค i โ‰ค r the order of ฯ†(e, ei ) is strictly lesser than the order of ei then there exists an alternate module (Aฬ‚, ฯ†ฬ‚) such that Aฬ‚ = heฬ‚i ร— he1 i ร— ยท ยท ยท ร— her i where eฬ‚ is of order p times the order of e and the inclusion : ฮนA : A โˆ’โ†’ Aฬ‚ e 7โˆ’โ†’ peฬ‚ ei 7โˆ’โ†’ ei for 1 โ‰ค i โ‰ค r is an inclusion of submodules. Proof. Let Aฬ‚ be heฬ‚i ร— he1 i ร— ยท ยท ยท ร— her i where eฬ‚ is of order p times the order of e. Clearly, the mapping : ฮนA : A โˆ’โ†’ Aฬ‚ e 7โˆ’โ†’ peฬ‚ ei 7โˆ’โ†’ ei for 1 โ‰ค i โ‰ค r defines an injective morphism of groups. In order to define the bilinear form ฯ†ฬ‚, it suffices to define it on a generating set of Aฬ‚ ร— Aฬ‚. Define : ฯ†ฬ‚(ei , ej ) := ฯ†(ei , ej ) for all 1 โ‰ค i, j โ‰ค r We also define ฯ†ฬ‚(eฬ‚, eฬ‚) := 0. Finally, remark that the group Q/Z is pdivisible (i.e. any element admits a p-th root). Then for any 1 โ‰ค i โ‰ค r, define ฮปi to be one element verifying pฮปi = ฯ†(e, ei ). Remark that the order of ฮปi thus defined divides p times the order of ฯ†(e, ei ). By assumption, this divides the order of ei and also divides the order of eฬ‚ which is p times the order of e. It follows that ฮปi divides both the order of eฬ‚ and ei . Whence the following equations : 14 ฯ†ฬ‚(ei , ej ) := ฯ†(ei , ej ) for all 1 โ‰ค i, j โ‰ค r ฯ†ฬ‚(eฬ‚, eฬ‚) := 0 ฯ†ฬ‚(eฬ‚, ei ) := ฮปi ฯ†ฬ‚(ei , eฬ‚) := โˆ’ฮปi allow us to define a group morphism on Aฬ‚ which is clearly an alternate module. Let ฯˆ be the induced module on A via ฮนA by ฯ†ฬ‚ : ฯˆ(ei , ej ) = ฯ†ฬ‚(ei , ej ) = ฯ†(ei , ej )for all 1 โ‰ค i, j โ‰ค r ฯˆ(e, ej ) = ฯ†ฬ‚(peฬ‚, ej ) = pฮปj = ฯ†(e, ej ) for all 1 โ‰ค j โ‰ค r Whence ฯˆ = ฯ† on A ร— A (since they are alternate forms). In particular we have shown that (A, ฯ†) is a submodule of (Aฬ‚, ฯ†ฬ‚) via ฮนA . We have the tools to prove the fundamental lemma. 3.2 Proof of the fundamental lemma We recall first the statement of the fundamental lemma : Fundamental lemma. Let p be a prime number and (A, ฯ†) an alternate module which is not symplectic with A a p-group. Then there exists an alternate module (Aฬ‚, ฯ†ฬ‚) such that (A, ฯ†) is a submodule of (Aฬ‚, ฯ†ฬ‚), |A| < |Aฬ‚| and nA,ฯ† = nAฬ‚,ฯ†ฬ‚ . Proof. We prove the lemma doing a strong induction on the cardinal of the module. Let pk be such that the lemma is true for any alternate module M with |M| < pk . Let (A, ฯ†) be an alternate module which is not symplectic and A be of cardinal pk . There are two different cases to consider : Case 1 : Kฯ† is not included in p ยท A 15 By the classification of abelian p-groups, decompose the group A as a product of cyclic subgroups : A = he0 i ร— he1 i ร— ยท ยท ยท ร— her i (2) Denote di the order of ei , then we may assume that diโˆ’1 divides di for 1 โ‰ค i โ‰ค r. Let k0 โˆˆ Kฯ† which is not in p ยท A. By the decomposition 2, we may write k0 = r X i=0 ฮฑi ei where ฮฑ0 , . . . , ฮฑr โˆˆ N Since k0 is not in p ยท A there exists at least one coefficient among the ฮฑ0 , . . . , ฮฑr which is not divisible by p. Denote i0 to be one index such that ฮฑi0 is not divisible by p. Define the group Aฬ‚ := Z/p ร— A. Let ฮณ be a generator of Z/p. Then we define an alternate form ฯ†ฬ‚ on Aฬ‚ by : ฯ†ฬ‚(ei , ej ) := ฯ†(ei , ej ) for 0 โ‰ค i, j โ‰ค r ฯ†ฬ‚(ฮณ, ei ) := 0 for 0 โ‰ค i โ‰ค r and i 6= i0 ฯ†ฬ‚(ei , ฮณ) := 0 for 0 โ‰ค i โ‰ค r and i 6= i0 ฯ†ฬ‚(ฮณ, ฮณ) := 0 1 ฯ†ฬ‚(ฮณ, ei0 ) := p ฯ†ฬ‚(ei0 , ฮณ) := โˆ’ 1 p Clearly, ฯ†ฬ‚ is an alternate form on Aฬ‚, furthermore, the inclusion of A in Aฬ‚ given by a is mapped to (0, a) clearly leads to an inclusion of modules. Finally : 16 ฯ†ฬ‚(ฮณ, k0 ) = r X ฮฑi ฯ†ฬ‚(ฮณ, ei ) i=0 = ฮฑi0 ฯ†ฬ‚(ฮณ, ei0 ) since ฮณ is orthogonal to ei where i 6= i0 ฮฑi = 0 6= 0 in Q/Z since p does not divide ฮฑi0 p Hence we found an element in Kฯ† which is not in the kernel of Kฯ†ฬ‚ . Applying lemma 2, we have nA,ฯ† = nAฬ‚,ฯ†ฬ‚ , hence (Aฬ‚, ฯ†ฬ‚) contains (A, ฯ†), has the same cardinality of Lagrangians and is strictly greater than A. In this case, we have constructed the extension with constant Lagrangians (without using the induction hypothesis). Case 2 : Kฯ† is included in p ยท A Write : A = hei ร— he1 i ร— ยท ยท ยท ร— her i (3) Denote d the order of e, di the order of ei , then we may assume that d divides d1 and di divides di+1 for 1 โ‰ค i โ‰ค r โˆ’ 1. Assume that there exists 1 โ‰ค i โ‰ค r such that the order of ฯ†(e, ei ) is equal to di (the order of ei ), since the order of ฯ†(e, ei ) divides d, the order of e (by bilinearity), it follows that di divides d. Since we also have d divides di by definition, we have two elements e and ei in A whose order is equal to d and such that ฯ†(e, ei ) is of order d. As a result, the submodule B generated by e and ei is isometric to Z/d ร— (Z/d)โˆ— . In particular B is a submodule of (A, ฯ†) which is symplectic, by lemma 1, it follows that : โŠฅ (A, ฯ†) = B โŠ• B โŠฅ Let (B โŠฅ , ฯˆ) be the induced submodule on B โŠฅ by ฯ†. By induction hypothesis, there exists a module (C, ฯˆฬ‚) such that nBโŠฅ ,ฯˆ = nC,ฯˆฬ‚ with |B โŠฅ | < |C| and (B โŠฅ , ฯˆ) is a submodule of (C, ฯˆฬ‚). Denote : โŠฅ (Aฬ‚, ฯ†ฬ‚) := B โŠ• (C, ฯˆฬ‚) 17 โŠฅ Clearly A = B โŠ• B โŠฅ is a submodule of (Aฬ‚, ฯ†ฬ‚) and |A| < |Aฬ‚|. Remark that Kฯ† = Kฯˆ and Kฯ†ฬ‚ = Kฯˆฬ‚ since B is symplectic. Whence : q |A||Kฯ† | p q = |B| |B โŠฅ ||Kฯˆ | p = |B|nBโŠฅ ,ฯˆ p = |B|nC,ฯˆฬ‚ by construction of (C, ฯˆฬ‚) p q = |B| |C||Kฯˆฬ‚ | q = |Aฬ‚||Kฯ†ฬ‚ | nA,ฯ† = = nAฬ‚,ฯ†ฬ‚ In this case we can also construct an extension (Aฬ‚, ฯ†ฬ‚) of (A, ฯ†) with constant Lagrangians. Assume now that for 1 โ‰ค i โ‰ค r, the order of ฯ†(e, ei ) strictly divides the order of di . Then we are in the condition of applications of lemma 3. Define Aฬ‚ = heฬ‚i ร— he1 i ร— ยท ยท ยท ร— her i where eฬ‚ is of order p times the order of e and the inclusion : ฮนA : A โˆ’โ†’ Aฬ‚ e 7โˆ’โ†’ peฬ‚ ei 7โˆ’โ†’ ei for 1 โ‰ค i โ‰ค r then we have defined on Aฬ‚ a bilinear form ฯ†ฬ‚ such that ฮนAโˆ— ฯ†ฬ‚ = ฯ†. We recall that we are in the second case where Kฯ† โ‰ค p ยท A. Denote ฯ€ the canonical projection of A onto A/Kฯ† . Since Kฯ† โ‰ค p ยท A, it follows that ฯ€ โˆ’1 (p ยท (A/Kฯ† )) = p ยท A. In particular (since e is clearly not an element of p ยท A) it follows that ฯ€(e) is not in p ยท (A/Kฯ† ). We know that A/Kฯ† is isomorphic to B ร— B โˆ— by corollary 1. Denote g1 , . . . , gs a โ€baseโ€ of B and g1โˆ— , . . . , gsโˆ— the corresponding โ€dual baseโ€ of B โˆ— and write : 18 ฯ€(e) = r X ฮณi gi + ฮณiโˆ— giโˆ— i=1 Since ฯ€(e) is not in p ยท (A/Kฯ† ), it follows that at least one of the ฮณi or ฮณiโˆ— is not divisible by p. Up to exchanging gi and giโˆ— , we may assume that ฮณiโˆ—0 is not divisible by p. Let pk (with k โ‰ฅ 1) be the order of gi0 and a0 โˆˆ A such that ฯ€(a0 ) = gi0 . Since gi0 is of order pk , pk ยท a0 โˆˆ Kฯ† . Furthermore : ฯ†(e, pkโˆ’1 ยท a0 ) = ฯ†(ฯ€(e), pkโˆ’1 ยท ฯ€(a0 )) by definition of (A/Kฯ† , ฯ†) = pkโˆ’1 ฯ†(ฯ€(e), gi0 ) r X kโˆ’1 ฮณi ฯ†(gi , gi0 ) + ฮณiโˆ— ฯ†(giโˆ—, gi0 ) =p = i=1 kโˆ’1 โˆ— p ฮณi0 ฯ†(giโˆ—0 , gi0 ) Remark that, by definition ฯ†(giโˆ—0 , gi0 ) is of order pk , since ฮณiโˆ—0 is not divisible by p : ฯ†(e, pkโˆ’1 ยท a0 ) = pkโˆ’1 ฮณiโˆ—0 ฯ†(giโˆ—0 , gi0 ) is of order p, whence not trivial. Remark now that, in (Aฬ‚, ฯ†ฬ‚) we have : ฯ†ฬ‚(eฬ‚, pk ยท a0 ) = ฯ†ฬ‚(p ยท eฬ‚, pkโˆ’1 ยท a0 ) by Z-bilinearity = ฯ†(e, pkโˆ’1 ยท a0 ) since p ยท eฬ‚ = ฮนA (e) and ฮนAโˆ— ฯ†ฬ‚ = ฯ† 6= 0 in Q/Z In particular, pk ยท a0 is an element of Kฯ† which is not in Kฯ†ฬ‚ . Applying lemma 2, we have that nA,ฯ† = nAฬ‚,ฯ†ฬ‚ . Now that the fundamental lemma is proven, we shall see that the theorem follows by an easy induction on the cardinal of the kernel of the alternate module. 19 3.3 Proof of the theorem Recalling that the result we want to prove is the following theorem : Theorem. Any alternate module is subsymplectic. Proof. By corollary 3, it suffices to prove it for alternate modules (A, ฯ†) where A is a p-group and p is a prime number. Let us show the following by induction on k : Let (A, ฯ†) be an alternate module which is a p-group with |Kฯ† | = pk then (A, ฯ†) is subsymplectic. If k = 0 then (A, ฯ†) ispsymplectic. Therefore, by corollary 1, it is isometric to B ร— B โˆ— where |B| = |A| = nA,ฯ† . It follows that (A, ฯ†) is subsymplectic by definition. If k > 0 then (A, ฯ†) is an alternate module which is not symplectic (its kernel is not trivial) whence, by the fundamental lemma, there exists an alternate module (Aฬ‚, ฯ†ฬ‚) such that (A, ฯ†) is a submodule of (Aฬ‚, ฯ†ฬ‚), |A| < |Aฬ‚| and nA,ฯ† = nAฬ‚,ฯ†ฬ‚ . We have n2A,ฯ† = n2Aฬ‚,ฯ†ฬ‚ so |A||Kฯ† | = |Aฬ‚||Kฯ†ฬ‚ |, since |A| < |Aฬ‚| we have that |Kฯ†ฬ‚ | < |Kฯ† | = pk . It follows that we can apply the induction hypothesis to (Aฬ‚, ฯ†ฬ‚) and there exists an abelian group B of order n := nAฬ‚,ฯ†ฬ‚ such that : (Aฬ‚, ฯ†ฬ‚) โ‰ค B ร— B โˆ— Since (A, ฯ†) is a submodule of (Aฬ‚, ฯ†ฬ‚), we finally have included the module (A, ฯ†) in B ร— B โˆ— where |B| = n = nAฬ‚,ฯ†ฬ‚ = nA,ฯ† . It follows that (A, ฯ†) is subsymplectic by definition. 4 Remarks The proof is constructive. Indeed, it explicitely gives the construction (by induction) of a symplectic module B ร— B โˆ— containing (A, ฯ†) with |B| = nA,ฯ† . Basically, in order to define an algorithm computing B, one needs an 20 algorithm that, given (A, ฯ†) computes its kernel and a โ€diagonalizationโ€ of its associated symplectic module (A/Kฯ† , ฯ†). Remark that, given (A, ฯ†), an alternate module, there might exist B1 6= B2 , both of cardinal nA,ฯ† such that (A, ฯ†) is included in Bi ร— Biโˆ— for i = 1, 2 : Counter-example 2. Let A be the abelian group Z/2ร—Z/4 endowed with the trivial bilinear form. It follows that nA,ฯ† = |A|. Let B1 := A and B2 := Z/8. Then we have two inclusions : ฮนA,1 : A โˆ’โ†’ B1 ร— B1โˆ— (u, v) 7โˆ’โ†’ ((u, v), (0, 0)) and ฮนA,2 : A โˆ’โ†’ B2 ร— B2โˆ— (u, v) 7โˆ’โ†’ (4u, 2v) Those two inclusions are inclusions of submodules (when Bi ร— Biโˆ— is endowed with its natural structure of symplectic form, defined in example 1). Furthermore, it is clear that they are extensions with constant Lagrangians. However B1 6= B2 . As we have stated in the introduction of this paper, the theorem will be used in another paper in order to give a classification of centralizer of irreducible subgroups of P SL(n, C). An interesting thing to have would be a classification of alternate modules. Let (A, ฯ†) be an alternate module, we say that (A, ฯ†) is indecomposable if, whenever (A, ฯ†) is the orthogonal sum of (A1 , ฯ†1 ) and (A2 , ฯ†2 ) then (A1 , ฯ†1 ) or (A2 , ฯ†2) is ({0}, 0). Since any alternate module is clearly the sum of indecomposable ones by induction, if we want to classify alternate modules, we only need to characterize indecomposable ones. This leads to the following question : Question. Let (A, ฯ†) be an indecomposable alternate module. Does it follow that rk(A) โ‰ค 3? Does it follow that rk(A/Kฯ† ) โ‰ค 2? We computed many examples and this conjecture seems to be verified. However we still do not have a proof for it. 21 Acknowledgements All computations performed on examples leading to this result have been performed using the GAP system [GAP]. I would like to thank my thesis advisor Olivier Guichard, whose suggestions have been very helpful. I would also like to thank Gaeฬˆl Collinet who encouraged me to fully investigate this topic and Jean-Pierre Tignol for pointing out some helpful references. Finally, I would like to thank my fellow Ph.D student, Mohamad Maassarani for carefully listening to my proofs and his helpful comments. References [AT85] S.A. Amitsur, J.-P. Tignol. Kummer subfields of Malcev-Neumann division algebras. Israel Journal of mathematics, Vol. 50, Nos 1-2, 1985. [AT86] S.A. Amitsur, J.-P. Tignol. Symplectic modules. Israel Journal of mathematics, Vol. 54, No 3, 1986. [GAP] The GAP Group, GAP โ€“ Groups, Algorithms, and Programming, Version 4.8.3 ; 2016, (http://www.gap-system.org). [TW15] J.-P. Tignol, A. Wadsworth. Value Functions on Simple Algebras, and Associated Graded Rings. Springer Monographs in Mathematics, 2015. [Wal64] C.T.C. Wall. Quadratic forms on finite groups, and related topics. Topology, Vol. 2:281-298, 1964. 22
4math.GR
arXiv:1206.5112v1 [cs.PL] 22 Jun 2012 Lucretia โ€” a type system for objects in languages with reflectionโˆ— Viviana Bono1 , Marcin Benke2 , and Aleksy Schubert2 1 Dipartimento di Informatica dellโ€™Universitร  di Torinoโ€  2 University of Warsawโ€ก May 1, 2012 Abstract Object-oriented scripting languages such as JavaScript or Python gain in popularity due to their flexibility. Still, the growing code bases written in the languages call for methods that make possible to automatically control the properties of the programs that ensure their stability in the running time. We propose a type system, called Lucretia, that makes possible to control the object structure of languages with reflection. Subject reduction and soundness of the type system with respect to the semantics of the language is proved. 1 Introduction Scripting object-oriented languages such as JavaScript, Python, Perl or Ruby became very popular [Sof12] due to their succinctness of program expressions and flexibility of idioms [WNV09]. These languages optimise the programmer time, rather than the machine time and are very effective when small programs are constructed [Pre00, WEF+ 09]. The advantages of the languages that help when a short programs are developed can be detrimental in case big applications are created. Short code that has clear advantages when small programs are constructed [Ous98] can provide less information for a person that looks for clues on what particualr piece of code is doing (and this is one of the most frequent activities โˆ— See http://www.youtube.com/watch?v=IuezNswtRfo This work was partly supported by the PRIN 12008 DISCO grant. โ€ก This work was partly supported by the Polish government grant no N N206 355836. โ€  1 1 INTRODUCTION 2 during software maintenance tasks, see e.g. [Sas96, KMCA06]). Moreover, the strong invariants a programmer can rely on in case of statically typed languages are no longer valid as type of a particular value can change with each instruction and mostly in an uncontrolled way with each function call in the program. Still, systems that handle complex and critical tasks such as Swedish premium pension system [Ste01] are deployed and continuously maintained. Therefore, it is desirable to study methods which help programmers in understanding their code and keeping it consistent. Therefore we propose a type system that handles dynamic features of scripting languages and can help in understanding of the existing code. The type system we propose is presented in the style where many type annotations must be present to guarantee correct typechecking. In particular, we require that function declarations as well as labelled instructions are decorated with their types. What is more, the type system is so strong that the reconstruction of the types is (most probably) undecidable. However, the system is designed in such a way that it will primarily be used on top of a type inference algorithm and admits a wide range of type inference heuristics that are not complete, but provide correct type annotations for wide range of programs. In addition, we would like to encourage programmers to add type annotations to their programs since the annotations can serve as an important documentation of the code invariants assumed by developers in the program construction phase. The inherent feature of the scripting languages is that a running time type of a particular variable may change in the course of program execution. This problem can be solved to some extent through introduction of single assignment form for local variables. Still, this cannot be applied to object fields. The natural semantics of programs is such that the fields change and the efforts to circumvent this principle will most probably result in a complicated solution. Therefore, the statement that statically describes evolution of the running time type of a variable cannot be just a type name, but must reflect the journey of the running time type throughout the control flow graf of the program. It would be very inconvenient to repeat the structure of the whole control flow graf at each variable in the program. Therefore, it makes more sense to describe the type of each visible variable at each statically available program point. This is the approach we follow in this paper and present a type system which is inspired by the works on type-and-effect systems [MM09, GL86]. However, we present our typing judgements in a slightly different manner, i.e. one where the effect is described by a pair of constraints that express the update performed by a particular instruction. In a sense the pair together with the typed expression can be viewed as a triple in a variant of Hoare logic. The constraints we use to express the type information for an object are approximations of the actual types by the matching constraints similar to the ones in [BB99]. 2 MODEL LANGUAGE AND ITS SEMANTICS 3 This paper is structured as follows. The language in which we model the scripting languages is presented in Section 2. The type system is presented in Section 3. Its properties are demonstrated in Section 4. At the end we present related work in Section 5 and conclude in Section 6. 2 Model language and its semantics The syntax of expressions we work with is presented in Fig 1. The figure presents not only the raw syntax of programs, but also the syntax of evaluation contexts that represent ifnormation on the particular point in the program the semantical reduction rules elaborate. Moreover, we present here the full syntax of the expressions that may show up in the evolution of the expression being reduced. This is reflected by the fact that we permit locations to occur in the expressions while the intent is they are not directly visible in programs in the source form. Definition 2.1 (Types) The type information associated with an expression of the language we consider here is combined of two items. One is a representation of the actual type and the second is the constraint expression which approximates the shape of the type. These components are generated with help of the following grammar: tb t tr ฮจ ::= ::= ::= ::= c | X | tb,1 โˆจ tb,2 | [t1 , . . . , tn ; ฮจ1 ] =โ‡’ [tn+1 ; ฮจ2 ] tb | t1 โˆจ t2 | โŠฅ {l : t} | {} X <# tr , ฮจ | โˆ… where c is a type constant from ConstT , X โˆˆ VT is a type variable. The set Types is the set of elements generated from t, the set Typesb is the set of elements generated from tb , the set Typesr is the set of elements generated from tr , and the set Constr is the set of elements generated from ฮจ. The set of objects O is the set of partial functions from identifiers to values. The set of stores H is the set of finite partial functions from the set of locations to the set of objects. The set of evaluation contexts EC is the set of sequences of basic evaluation contexts as presented in Figure 1. The set of expressions EX is the set of expressions as given in Figure 1. The semantics is defined by the relation ; which relates triples (ฯƒ, E, e) โˆˆ H ร— EC ร— EX . Let s be a (partial) function we write s[x/v] to denote function such that s[x/v](x) = v and s[x/v](y) = s(y) for y 6= x and y โˆˆ dom(s). When an evaluation context is a sequence E1 , E2 , . . . , En , we write it as E1 hE2 h. . . En hโ€ขi . . .ii. 2 MODEL LANGUAGE AND ITS SEMANTICS identifiers labels locations constants function value values objects fields list function expression expressions x n l c vf v o Lf ef e ::= . . . (identifiers). . . ::= . . . (identifiers). . . ::= . . . ::= func(x1 , ยท ยท ยท , xn ).t {e} ::= x | c | vf | l ::= {} | {Lf } ::= n : v | n : v, L ::= x | vf ::= v | let x = e1 in e2 | ef (e1 , ยท ยท ยท , en ) | opn (e1 , ยท ยท ยท , en ) | if (e1 ) then e2 else e3 | ifhasattr (x, a) then e1 else e2 | break n e | n.t {e} | new | x1 .x2 = v | x1 .x2 basic evaluation con- E ::= โ€ข | let x = E in e texts | vf (v1 , ยท ยท ยท , viโˆ’1 , E, ei+1 , ยท ยท ยท , en ) | opn (v1 , ยท ยท ยท , viโˆ’1 , E, ei+1 , ยท ยท ยท , en ) | if (E) then e2 else e3 | break n E | n.t {E} stores ฯƒ ::= ยท | (l, o)ฯƒ Figure 1: Syntax of ฮปM 4 2 MODEL LANGUAGE AND ITS SEMANTICS ~ ~ (Let-Enter) ฯƒ, Ehlet x = e1 in e2 i ; ฯƒ, Ehlet x = he1 i in e2 i ~ ~ (Let) ฯƒ, Ehlet x = hvi in ei ; ฯƒ, Ehe[x/v]i ~ (Op-Enter) ฯƒ, Ehop n (e1 , ยท ยท ยท , ek )i ; ~ ฯƒ, Ehop n (he1 i, ยท ยท ยท , ek )i ~ (Op-Prop) ฯƒ, Ehop (v , n 1 ยท ยท ยท , viโˆ’1 , hvi i, ei+1 , ยท ยท ยท , ek )i ; ~ ฯƒ, Ehop n (v1 , ยท ยท ยท , viโˆ’1 , vi , hei+1 i, ยท ยท ยท , vk )i ~ (Op-Back) ฯƒ, Ehopn (v1 , ยท ยท ยท , hvk i)i ; ~ ฯƒ, Ehop n (v1 , ยท ยท ยท , vk )i ~ ~ (Op-Eval) ฯƒ, Ehop (v , n 1 ยท ยท ยท , vk )i ; ฯƒ, Ehฮดn (opn , v1 , ยท ยท ยท , vk )i (ฮฒ-Enter) (ฮฒ-Prop) (ฮฒv) (If-Enter) (If-True) (If-False) ~ ฯƒ, Ehfunc(x 1 , ยท ยท ยท , xn ).t {e}(e1 , ยท ยท ยท , ek )i ; ~ ฯƒ, Ehfunc(x1 , ยท ยท ยท , xn ).t {e}(he1 i, ยท ยท ยท , ek )i ~ ฯƒ, Ehfunc(x 1 , ยท ยท ยท , xn ).t {e}(v1 , ยท ยท ยท , viโˆ’1 , hvi i, ei+1 , ยท ยท ยท , en )i ; ~ ฯƒ, Ehfunc(x 1 , ยท ยท ยท , xn ).t {e}(v1 , ยท ยท ยท , viโˆ’1 , vi , hei+1 i, ยท ยท ยท , en )i ~ ฯƒ, Ehfunc(x1 , ยท ยท ยท , xn ).t {e}(v1 , ยท ยท ยท , hvk i)i ; ~ ฯƒ, Ehe[x 1 /v1 , ยท ยท ยท , xn /vn ]i ~ (e1 ) then e2 else e3 i ; ฯƒ, Ehif ~ (he1 i) then e2 else e3 i ฯƒ, Ehif ~ (htruei) then e2 else e3 i ; ฯƒ, Ehe ~ 2i ฯƒ, Ehif ~ ~ 3i ฯƒ, Ehif (hfalsei) then e2 else e3 i ; ฯƒ, Ehe ~ ~ 1i (Ifhtr-True) ฯƒ, Ehifhasattr (l, a) then e1 else e2 i ; ฯƒ, Ehe when a โˆˆ dom(ฯƒ(l)) ~ ~ 2i (Ifhtr-False) ฯƒ, Ehifhasattr (l, a) then e1 else e2 i ; ฯƒ, Ehe when a 6โˆˆ dom(ฯƒ(l)) ~ ~ (Brk-Enter) ฯƒ, Ehn.t {e}i ; ฯƒ, Ehn.t {hei}i ~ 1 hn.t {E ~ 2 hbreak n vi}i ; ฯƒ, E ~ 1 hvi, (Brk-P) ฯƒ, E ~2 when n does not occur as label in E ~ ~ (Lbl-Pop) ฯƒ, Ehn.t {hvi}i ; ฯƒ, Ehvi (New) (SetRef) (Deref) ~ ~ ฯƒ, Ehnewi ; (l, โˆ…)ฯƒ, Ehli l fresh ~ ~ ฯƒ, Ehl.f = vi ; ฯƒ[l/ฯƒ(l)[f /v]], Ehvi ~ ~ ฯƒ, Ehl.f i ; ฯƒ, Ehฯƒ(l)(f )i when f โˆˆ dom(ฯƒ(l)) Figure 2: Semantic rules of ฮปM 5 3 THE TYPE SYSTEM 6 When the relation holds between triples (ฯƒ, E, e), (ฯƒ 0 , E 0 , e0 ) we write the relation as ฯƒ, Ehei ; ฯƒ 0 , E 0 he0 i. The precise semantical rules are given in Figure 2 We do not model inheritance and multiple inheritance of the scripting languages. We assume that this can be viewed as a notational shortcut for direct presentation of objects and therefore we cannot model all features of the class models (e.g. the method updates in classes in Python). Constructs of the language The language we propose has object-oriented features such as object creation (new), field reference (the dot notation x1 .x2 ), and field modification (x1 .x2 = v). In addition we have object introspetion operation available through ifhasattr (ยท, ยท) then ยท else ยท construct. The flow of information is controlled by let x = e1 in e2 expression that in addition to creation of a local variable x makes possible to execute e1 and e2 in sequence. The traditional split of control flow depending on a computed condition is realised by if (ยท) then ยท else ยท. The exceptional flow can be realised by our labelled instructions combined with break statements. At last loops can be organised by recursively defined functions. Notably we use types in labelled instructions and in function declarations. These types can in fact be omitted since they do not play part in the respective reduction rules. The possible errors that may result by execution of an operation on a value that the operation is not prepared to take are present in our system through appropriate definition of ฮดn that can check the types of the values supplied in the arguments. 3 The type system Typing judgements are of the form ฮจ1 ; ฮ“; ฮฃ ` e : tb ; ฮจ2 where ฮ“ is an environment (i.e. mapping from variables to tb ), ฮฃ is a mapping from locations to type variables VT , ฮจi for i = 1, 2 is a set of constraints of the form X <# t. The intended meaning of such a judgment is: evaluating e in the environment ฮ“ with types of locations that match the mapping ฮฃ and with the store satisfying ฮจ1 leads to a value of type tb and store satisfying ฮจ2 . Record update The information about the record being updated is represented by a constraint on a variable X. The rule for record update comes in two variants, depending on whether the constraint mentions the field being updated. ฮจ1 ; ฮ“; ฮฃ ` x : X; ฮจ1 ฮจ1 ; ฮ“; ฮฃ ` e : t2 ; ฮจ2 , X <# {a : t02 , l : s} ฮจ1 ; ฮ“; ฮฃ ` x.a = e : t2 ; ฮจ2 , X <# {a : t2 , l : s} (update-old) 3 THE TYPE SYSTEM 7 If (we know that) the record contains the field a that is to be updated, we forget the old value, hence its type (t02 ) is ignored; the store after the update reflects the new value of a. ฮจ1 ; ฮ“; ฮฃ ` x : X; ฮจ1 ฮจ1 ; ฮ“; ฮฃ ` e : t2 ; ฮจ2 , X <# {l : s} a 6โˆˆ l ฮจ1 ; ฮ“; ฮฃ ` x.a = e : t2 ; ฮจ2 , X <# {a : t2 , l : s} (update-fresh) otherwise the constraint for X is amended with information about the new value of a. Record access We can access a field a provided the constraint on the record guarantees that it has the field a and it is of a definite type (it cannot be โŠฅ). ` u ฮจ 3 X <# {a : u, l : t} (access) ฮจ; ฮ“, x : X; ฮฃ ` x.a : u; ฮจ A type is definite (` u) if it is a type constant, type variable, function type or a disjunction of definite types. This is defined inductively as follows: `c `X ` t1 ` t2 ` t1 โˆจ t2 ` [t1 , . . . , tn ; ฮจ1 ] =โ‡’ [u; ฮจ2 ] Conditional instruction The basic way to split the processing depending on some value is to use a conditional instruction. This instruction is typed in our system in the following way. ฮจ; ฮ“; ฮฃ ` e1 : bool ; ฮจ1 ฮจ1 ; ฮ“; ฮฃ ` e2 : u; ฮจ2 ฮจ1 ; ฮ“; ฮฃ ` e3 : u; ฮจ2 (if) ฮจ; ฮ“; ฮฃ ` if (e1 ) then e2 else e3 : u; ฮจ2 The typing of the branches need to be typable into the same type. However, the constraints in each of them can be in principle different. Therefore we need a rule to weaken the constraint so that they result in the same set. For this we need an operation that merges type constraint from two branches. This is defined in the following way. โ€ข ฮจ, X <# {l : t} ] ฮจ0 , X <# {l0 : t0 } = ฮจ ] ฮจ0 , X <# {l : t} ] {l0 : t0 } โ€ข ฮจ]โˆ…=ฮจ 3 THE TYPE SYSTEM 8 โ€ข โˆ…]ฮจ=ฮจ โ€ข {l0 : t0 , l : t} ] {l0 : t00 , l0 : t0 } = {l0 : t0 โˆจ t00 , l00 : t00 } where {l00 : t00 } = {l : t} ] {l0 : t0 } โ€ข {} ] {l0 : t0 } = {l0 : t0 โˆจ โŠฅ} โ€ข {l0 : t0 } ] {} = {l0 : t0 โˆจ โŠฅ} This combination of two sets of constraints need to be incorporated into type derivation and this can be done using the following weakening rule. ฮจ; ฮ“; ฮฃ ` e : t; ฮจ1 (weaken-]) ฮจ; ฮ“; ฮฃ ` e : t; ฮจ1 ] ฮจ2 Object structure introspection Dynamic languages split the processing not only depending on some condition defined in terms of the actual values, but also depending on types of expressions. Therefore, we introduce the construct that performs appropriate check and provide a typing rule that handles it. ฮจ[X โ† {a}]; ฮ“, x : X; ฮฃ ` e1 : t; ฮจ2 ฮจ; ฮ“, x : X; ฮฃ ` e2 : t; ฮจ02 (ifhasattr) ฮจ; ฮ“, x : X; ฮฃ ` ifhasattr (x, a) then e1 else e2 : t; ฮจ2 ] ฮจ02 The typing rule must update the typing information available in the branches of the instruction. Type information in one branch takes as granted that the attribute a is present. We need not pass the information that the attribute a is missing in the other branch since the case that the actual value does not have the field a must be expressed in the type description by an alternative with โŠฅ. โ€ข (ฮจ, X <# t)[X โ† {a}] = ฮจ, X <# (t[X โ† {a}]), โ€ข {a : t1 โˆจ ยท ยท ยท โˆจ tn , l : u}[X โ† {a}] = {a : ti1 โˆจ ยท ยท ยท โˆจ tik , l : u} where {ti1 , . . . , tik } = {ti | ti 6= โŠฅ and ti โˆˆ {t1 , . . . , tn }}. We assume that base types are implemented so that they have a distinguished field which makes possible to check for base type with ifhasattr (?, ?) then ? else ?. Variable and location access The information about a type of a variable is recorded in the type environment so we use it when a variable is referred in an expression. ฮจ; ฮ“, x : t; ฮฃ ` x : t; ฮจ (v-access) 3 THE TYPE SYSTEM 9 Similarly, the information about locations is stored in the location environment ฮฃ and we exploit it in an analogous way. ฮจ; ฮ“; ฮฃ, l : t ` l : t; ฮจ (l-access) Function definition and call Whenever we want to type a function definition we must rely on the type annotation that is associated with the function. We have to add the type decoration to functions since they can be used in a recursive way. The inference of a type in such circumstances must rely on some kind of a fixpoint computation which is a difficult task. We assume here that the type is given in the typechecking procedure either by hand with help of programmer or by some kind of automatic type inference algorithm. The type we obtain for a function definition is just the type that is explicitly given in the function. However, we have to check in addition that the body of the function indeed obeys the declared type. Therefore, we assume that the formal parameters have the types expressed in the precondition of the function type and obey the constraints noted in the constraint set from the same precondition. We expect then that the resulting type is equal to the one in the postcondition of the type and the constraints match the constraints in the postcondition. It is worth noting that the constraints in the precondition and postcondition should take into account not only the formal parameters, but also the global variables that are visible in the function body. Notably, we type the function body so that the typing does not interfere with the typing of the function definition. This reflects the dynamic character of the language. In particular the running time type of a global variable may differ at the function definition point from the expected one so that the typing is impossible at that particular moment. However, the situation may be different at the execution site. Therefore, we defer the check of the compatibility of global variables to the function call site. t โ‰ก [t1 , . . . , tn ; ฮจ1 ] =โ‡’ [u; ฮจ2 ] ฮจ1 ; ฮ“, x1 : t1 , . . . , xn : tn ; ฮฃ ` e : u; ฮจ2 ฮจ; ฮ“; ฮฃ ` func(x1 , ยท ยท ยท , xn ).t {e} : t; ฮจ (fdecl) In case a real application of a function expression is made to arguments we have to check that the application indeed does not lead to type error in this case. Therefore, the typing rule for application must check that the type information for global variables at the call site (i.e. after all actual parameters of the call are elaborated) is in accordance with the type information available in the functional type. This is checked with the relation c . 3 THE TYPE SYSTEM 10 Definition 3.1 (c ) The rules that operate on constraint sets are as follows. ฮจ c โˆ… ฮจ c ฮจ0 t c t0 ฮจ, X <# t c ฮจ0 , X <# t0 They reduce the problem to the one on record types where the relation is defined as follows. t c t {l : t} c {} {a : u, l : t} c {l : t} u c u0 {a : u, l : t} c {a : u0 , l : t} u c u u1 c u1 โˆจ u2 u2 c u1 โˆจ u2 u1 c u01 u2 c u02 u1 โˆจ u2 c u02 โˆจ u01 Proposition 3.2 The relation c is reflexive and transitive. Proposition 3.3 For any constraint sets ฮจ1 , ฮจ2 we have ฮจ1 c ฮจ1 ] ฮจ2 . Execution of a function body causes changes of values held in global variables. Such changes may give rise to changes in the types. This must by reflected and the type information must be updated accordingly. Therefore, we need an operation of such an update. Definition 3.4 (type information update โ†-) For two sets of constraints ฮจ1 , ฮจ2 we define inductively the set of constraints ฮจ1 โ†- ฮจ2 , in words constraints ฮจ1 updated with ฮจ2 , as follows. โ€ข ฮจ โ†- โˆ… = ฮจ, โ€ข ฮจ, X <# t โ†- ฮจ0 , X <# t0 = (ฮจ โ†- ฮจ0 ), X <# t0 , โ€ข ฮจ โ†- ฮจ0 , X <# t0 = (ฮจ โ†- ฮจ0 ), X <# t0 when X 6โˆˆ dom(ฮจ). It is important to observe that the update preserves at least the type information that is present in the constraint with which we make the update. Lemma 3.5 For any constraint sets ฮจ1 , ฮจ2 , ฮจ2 c ฮจ1 โ†- ฮจ2 3 THE TYPE SYSTEM 11 We can now present the rule for function application. This rule elaborates first all the expressions in the actual parameters and updates the constraints so that their side effects are taken into account and then weakens the result to match the constraints for the input part of the function type. Then the resulting set of constraint is just the set of constraints after the last argument updated with the constraint information contained in the result type of the function. ฮจi ; ฮ“; ฮฃ ` Ni : ti ; ฮจi+1 for i = 1, . . . , n ฮจn+1 c ฮจ01 0 ฮจ1 ; ฮ“; ฮฃ ` ef : [t1 , . . . , tn ; ฮจ1 ] =โ‡’ [u; ฮจ02 ]; ฮจ1 ฮจ1 ; ฮ“; ฮฃ ` ef (N1 , . . . , Nn ) : u; ฮจn+1 โ†- ฮจ02 (fapp) Control flow with break instructions The language we propose includes nonlocal control flow instructions that may be used to simulate exceptions or jumps out of loops (recursive calls in our case). The labelled instruction resembles a call to an anonymous function with no parameters. We only have to remember type information that we want to achieve as the result of the execution. Note that the prospective break instructions can reside inside of a recursive function call. Therefore, we cannot assume that the type we give here explicitely is a result of a finitary collecting of a non-local typing information from all the break statements inside e. ฮจ; ฮ“, n : [; โˆ…] =โ‡’ [t; ฮจ2 ]; ฮฃ ` e : t; ฮจ02 ฮจ02 c ฮจ2 (label) ฮจ; ฮ“; ฮฃ ` n.[; โˆ…] =โ‡’ [t; ฮจ2 ]{e} : t; ฮจ2 In case we encounter break instruction we have to check that the expression the value of which it given as the result indeed obeys the expected result type of the labelled instruction surrounding the break. ฮจ; ฮ“, n : [; โˆ…] =โ‡’ [t; ฮจ2 ]; ฮฃ ` e : t; ฮจ02 ฮจ02 c ฮจ2 (break) ฮจ; ฮ“, n : [; โˆ…] =โ‡’ [t; ฮจ2 ]; ฮฃ ` break n e : t0 ; ฮจ0 Let-expression The let expression is our language statement that does the instruction sequencing operation. Therefore, we have to compute the constraints for the first step, then for the second one and at last combine them together as in the logical cut rule that forgets the middle formula. ฮจ1 ; ฮ“; ฮฃ ` e1 : t1 ; ฮจ2 ฮจ2 ; ฮ“, x : t1 ; ฮฃ ` e0 : t; ฮจ3 (let) ฮจ1 ; ฮ“; ฮฃ ` let x = e1 in e0 : t; ฮจ3 4 PROPERTIES OF THE TYPE SYSTEM 12 Object creation The object creation rule should just introduce information that a new object is created. This is expressed by the fact the set of constraints is extended with information on an object that has no known to the type system fields. X fresh (new) ฮจ; ฮ“; ฮฃ ` new : X; X <# {}, ฮจ Disjunction We also add a rule to weaken the assumptions about an expression. This is primarily necessary to obtain the subject reduction property. In case an if instruction is reduced to one of its branches the type system infers only information from one of the branches and the information from the other one must be added artificially. ฮจ1 ; ฮ“; ฮฃ ` e : ti ; ฮจ2 i = 1 or 2 (weaken-โˆจ) ฮจ1 ; ฮ“; ฮฃ ` e : t1 โˆจ t2 ; ฮจ2 4 Properties of the type system Soundness and subject reduction need to take the store into account. Hence we need to express the fact that a store instance satisfies certain constraints: ฯƒ; ฮฃ |= ฮจ where ฯƒ is a store, ฮฃ a mapping between locations and types, and ฮจ a set of constraints of the form X <# t. Definition 4.1 (|=) If c is a constant of type tc : ฯƒ; ฮฃ |= c : tc For function values: ฮจ; โˆ…; ฯƒ ` f unc(~x).t{e} : t; ฮจ ฯƒ; ฮฃ |= ฮจ (|= fun) ฯƒ; ฮฃ |= f unc(~x).t{e} : t ฯƒ; ฮฃ |= โˆ… If l is a location: ฯƒ; ฮฃ |= ฮจ ฯƒ, ฮฃ |= v : t (|= obj) ฯƒ[l/{a : v, y : s}]; ฮฃ(l : X) |= X <# {a : t}, ฮจ 4 PROPERTIES OF THE TYPE SYSTEM 13 in particular, for every object o: ฯƒ(l/o); ฮฃ(l : X) |= X <# {} For any ฮจ, ฮจ0 ฯƒ; ฮฃ |= ฮจ (|= ]) ฯƒ; ฮฃ |= ฮจ ] ฮจ0 For any t1 , t2 , ฯƒ; ฮฃ |= v : ti (|= โˆจ) ฯƒ; ฮฃ |= v : t1 โˆจ t2 Lemma 4.2 (soundness of c ) For any ฯƒ, ฮฃ and constraint sets ฮจ1 , ฮจ2 , if ฯƒ, ฮฃ |= ฮจ1 and ฮจ1 c ฮจ2 then ฯƒ, ฮฃ |= ฮจ2 Proof: It is sufficient to prove that if ฯƒ, ฮฃ |= X <# o1 and o1 c o2 then ฯƒ, ฮฃ |= X <# o2 . We proceed first by induction on the derivation of |=. The only nontrivial rules are (|= obj) โ€” again, the only (marginally) nontrivial case is when o1 c o2 was derived via the disjunction rule: {l : t} c {l : t0 } {a : u, l : t} c {a : u โˆจ u0 , l : t0 } In this case we can derive ฯƒ, ฮฃ |= X <# o2 by inserting (|= โˆจ) before the โ€œa : uโ€ premise of the final (|= obj) rule in the original derivation. (|= ]) โ€” we have ฯƒ, ฮฃ |= X <# o1 , o2 = o1 ] o0 , o2 c o3 and need to prove ฯƒ, ฮฃ |= X <# o3 , which can be done by induction on the definition of o2 c o3 . Lemma 4.3 If ฯƒ; ฮฃ(l : X) |= X <# {a : t; f : s}, ฮจ0 and ` t (i.e. t contains no โŠฅ), then (i) ฯƒ(l)(a) is defined (ii) ฯƒ; ฮฃ |= ฯƒ(l)(a) : t (iii) ฯƒ; ฮฃ |= ฮจ0 4 PROPERTIES OF THE TYPE SYSTEM 14 Proof: By induction on the derivation of ฯƒ; ฮฃ(l : X) |= X <# {a : t; f : s}. If the last rule is (|= obj) then the thesis follows immediately. On the other hand, if the last rule is (|= ]), we have X <# {a : t, f : u}, ฮจ0 = ฮจ1 ] ฮจ2 ฯƒ; ฮฃ |= ฮจi (|= ]) ฯƒ; ฮฃ |= ฮจ1 ] ฮจ2 By the definition of ], one of the following holds: (a) ฮจ1 = X <# {a : t, f : u}, ฮจ01 , X 6โˆˆ dom(ฮจ2 ) (b) ฮจ2 = X <# {a : t, f : u}, ฮจ02 , X 6โˆˆ dom(ฮจ1 ) (c) ฮจ1 = X <# {l : s}, ฮจ01 , ฮจ2 = X <# {l0 : s0 }, ฮจ02 If (a) or (b) holds, the thesis follows directly from the induction hypothesis. In the (c) case, by the assumption that ` t, we have a โˆˆ l, a โˆˆ l0 as well as t = t1 โˆจ t2 with ` t1 and ` t2 . Moreover, either ฯƒ; ฮฃ |= X <# {a : t1 , f : u}, ฮจ01 or ฯƒ; ฮฃ |= X <# {a : t2 , f 0 : u0 }, ฮจ01 Then by the induction hypothesis ฯƒ(l)(a) is defined, and ฯƒ; ฮฃ |= ฮจ0i ฯƒ; ฮฃ |= ฯƒ(l)(a) : ti for appropriate i. Thus by the rule (|= โˆจ) we have ฯƒ; ฮฃ |= ฯƒ(l)(a) : t1 โˆจ t2 which completes the proof. 2 Lemma 4.4 (value completeness) For any ฯƒ, ฮฃ, ฮ“, ฮจ and value v if ฯƒ, ฮฃ |= ฮจ and ฯƒ, ฮฃ |= v : t then ฮจ; ฮ“; ฮฃ ` v : t; ฮจ 4 PROPERTIES OF THE TYPE SYSTEM 15 Proof: By induction on the derivation of ฯƒ, ฮฃ |= v : t. For the constant and function rules, the thesis follows directly. On the other hand if the last rule used was ฯƒ; ฮฃ |= v : ti (|= โˆจ) ฯƒ; ฮฃ |= v : t1 โˆจ t2 then by the induction hypothesis ฮจ; ฮ“; ฮฃ ` v : ti ; ฮจ, hence ฮจ; ฮ“; ฮฃ ` v : t1 โˆจ t2 ; ฮจ. Lemma 4.5 (Progress) If ฮจ1 ; ฮ“; ฮฃ ` e : t; ฮจ2 and ฯƒ; ฮฃ |= e : t; ฮจ1 then either e is a value, or ฯƒ, e ; ฯƒ 0 , e0 Proof: The only expressions which may get stuck are record access (in case of lack of a field) and function application (in case of arity mismatch). Reducibility of record access follows from the Lemma 4.3. Lemma 4.6 (value stability) If v is a value and ฮจ1 ; ฮฃ ` v : t; ฮจ2 then ฮจ1 c ฮจ2 . Moreover, for any ฮจ we have ฮจ; ฮฃ ` v : t; ฮจ Proof: By induction on the derivation. The thesis follows directly for axioms and the function definition. For the disjunction rule use the induction hypothesis. For the ] rule the thesis follows from Proposition 3.3. Since v is a value, no other rules can be used in the derivation. Lemma 4.7 (weakening) If ฮจ1 ; ฮ“; ฮฃ ` e : t; ฮจ2 and ฮ“ โІ ฮ“0 , ฮฃ โІ ฮฃ0 then ฮจ1 ; ฮ“; ฮฃ0 ` e : t; ฮจ2 Proof: By routine induction on derivation. Lemma 4.8 (subject reduction) Reduction preserves typings, i.e. if ฮจ1 ; ฮ“; ฮฃ ` e : t; ฮจ2 ฯƒ; ฮฃ |= ฮจ1 4 PROPERTIES OF THE TYPE SYSTEM 16 ~ ~ 0i ฯƒ, Ehei ; ฯƒ 0 , Ehe then there exist ฮฃ0 , ฮจ0 such that ฮฃ โІ ฮฃ0 and ฮจ0 ; ฮ“; ฮฃ ` e0 : t; ฮจ2 ฯƒ 0 ; ฮฃ0 |= ฮจ0 Moreover if ฯƒ = ฯƒ 0 then the thesis holds for ฮฃ0 = ฮฃ and ฮจ0 = ฮจ. Proof: By induction on the derivation. We now consider several cases depending on the last rule used Case e = new: ฮจ; ฮ“; ฮฃ ` new : X; X <# {}, ฮจ If ฯƒ; ฮฃ |= ฮจ1 then ฯƒ(l/{}); ฮฃ(l : X) |= X <# {}, ฮจ Case e = l.a: ` u ฮจ 3 X <# {a : u, f : t} ฮจ; ฮ“; l : X, ฮฃ ` l.a : u; ฮจ ~ hl.xi ; ฯƒ, ฯƒ(l)(a). Since ฯƒ; l : X, ฮฃ |= ฮจ then by Lemma 4.3, ฯƒ(l) We have ฯƒ, E has field a of type u: ฯƒ; ฮฃ |= ฯƒ(l)(a) : u Hence by Lemma 4.4 ฮจ; ฮ“; l : X, ฮฃ ` ฯƒ(l)(a) : u; ฮจ Case e = if (e1 ) then e2 else e3 : ฮจ; ฮ“; ฮฃ ` e1 : bool ; ฮจ1 ฮจ1 ; ฮ“; ฮฃ ` e2 : u; ฮจ2 ฮจ1 ; ฮ“; ฮฃ ` e3 : u; ฮจ2 ฮจ; ฮ“; ฮฃ ` if (e1 ) then e2 else e3 : u; ฮจ2 ~ hei reduces to ฯƒ, E ~ he0 i where e0 is either e2 or e3 . In If e1 is a value then ฯƒ, E both cases we have ฮจ1 ; ฮ“; ฮฃ ` e0 : t; ฮจ2 ฯƒ 0 ; ฮฃ |= ฮจ2 ~ he1 i ; ฯƒ 0 , E ~ he0 i. By induction hypothesis, there are ฮฃ0 , ฮจ0 Otherwise, ฯƒ, E 1 such that ฮจ0 ; ฮ“; ฮฃ ` e01 : t; ฮจ2 4 PROPERTIES OF THE TYPE SYSTEM 17 ฯƒ 0 ; ฮฃ0 |= ฮจ0 By the typing rule for if and Lemma 4.7, we have ฮจ0 ; ฮ“; ฮฃ0 ` if (e1 ) then e2 else e3 : t; ฮจ2 Case e = func(x1 , ยท ยท ยท , xn ).t {eb }(v1 , ยท ยท ยท , vk ) : ฮจ01 ; ฮ“, ~x : ~t; ฮฃ ` eb : u; ฮจ02 ฮจ1 ; ฮ“; ฮฃ ` func(~x).t {eb } : [t1 , . . . , tn ; ฮจ01 ] =โ‡’ [u; ฮจ02 ]; ฮจ1 ฮจi ; ฮ“; ฮฃ ` Ni : ti ; ฮจi+1 for i = 1, . . . , n ฮจn+1 c ฮจ01 ฮจ1 ; ฮ“; ฮฃ ` func(~x).t {eb }(~v ) : u; ฮจn+1 โ†- ฮจ02 For simplicity consider case when n = 1: ฮจ01 ; ฮ“, x : t1 ; ฮฃ ` eb : u; ฮจ02 ฮจ1 ; ฮ“; ฮฃ ` func(x).t {eb } : [t1 ; ฮจ01 ] =โ‡’ [u; ฮจ02 ]; ฮจ1 ฮจ1 ; ฮ“; ฮฃ ` v1 : t1 ; ฮจ2 ฮจ2 c ฮจ01 ฮจ1 ; ฮ“; ฮฃ ` func(x).t {eb }(v) : u; ฮจ2 โ†- ฮจ02 We have ~ hfunc(x).t {eb }(v)i ; ฯƒ, E ~ h(eb [x/v])i ฯƒ, E Consider an occurrence of a variable axiom for x in the type derivation for eb : ฮจx ; ฮ“0 ` x : t1 ; ฮจx By the stability lemma (4.6), ฮจx ; ฮ“0 ` v : t1 ; ฮจx . Hence by replacing all such occurrences by appropriate type derivations for v, we get ฮจ01 ; ฮ“, x : t1 ; ฮฃ ` eb [x/v] : u; ฮจ02 By the Lemma 4.6 ฮจ1 c ฮจ2 , and ฮจ2 c ฮจ01 is the side condition of the application. Hence by transitivity of c we have ฮจ1 c ฮจ01 . By Lemma 3.5, we have ฮจ02 c ฮจ2 โ†- ฮจ02 , hence ฮจ1 ; ฮ“, x : t1 ; ฮฃ ` eb [x/v] : u; ฮจ2 โ†- ฮจ02 . Which was to be proved. 5 RELATED WORK Structural rules (], โˆจ) 18 If the last rule used is ฮจ1 ; ฮ“; ฮฃ ` e : ti ; ฮจ2 ฮจ1 ; ฮ“; ฮฃ ` e : t1 โˆจ t2 ; ฮจ2 then by the induction hypothesis the thesis holds for ti , hence by reapplying the disjunction rule also for t1 โˆจ t2 . If the last rule used is ฮจ; ฮ“; ฮฃ ` e : t; ฮจ2 ฮจ; ฮ“; ฮฃ ` e : t; ฮจ2 ] ฮจ3 Then by the induction hypothesis ฮจ0 ; ฮ“; ฮฃ ` e0 : t; ฮจ2 ฯƒ 0 ; ฮฃ0 |= ฮจ0 And we can get the thesis by applying the ] rule. ~ Theorem 4.9 (soundness) If ฮจ1 ; ฮ“; ฮฃ ` |Ehei| : t; ฮจ2 and ฯƒ; ฮฃ |= ฮจ1 ~ then either ฯƒ, Ehei has an infinite reduction path, or it reduces to a value v, 0 0 i.e. there exist ฯƒ , ฮฃ and value v such that ~ ฯƒ, Ehei ;โˆ— ฯƒ 0 , v and ฯƒ 0 ; ฮฃ0 |= v : t, ฮจ2 . Proof: By the progress lemma (4.5), the reduction can stop only at a value. Required properties of the final value and state follow from lemmas 4.8 (by induction on the lreduction length) and 4.6. 5 Related work The starting point of our research is the paper by Guha et al [GSK11] where a type system for scripting languages is presented. The type system there does not address the types of objects and only infers the typing information concerning base types (including special type of references to take into account object in a very simple 6 CONCLUSIONS AND FUTURE WORK 19 way). We provide here a type system which in addition to the one by Guha et al can infer meaningful typing information for objects. In addition, the paper by Guha et al relies on runtime tags which are present in the semantics of dynamicly typed languages such as JavaScript. The checks over runtime type tags can be viewed as asserts that check if the particular value is of an expected type. This primitive has, however, one disadvantage. Namely, it does not reflect the split in the control flow that makes possible to use particular type. Still, the scripting languages have operators that check for the actual running time type of a value (e.g. typeof function and in operator in JavaScript, or hasattr, getattr, and getattr_static in Python). We consider it more natural to rely on these operators instead of the tagchecks. Our typing framework works in a fashion such that, in principle, all the typing information should be present. This scenario is not realistic when the expectations of the scripting languages programmers are taken into account. Each real effort to bring static information into the program development here must consider what was explicated in [WEF+ 09] and realised in a scpecific way in Thorn scripting language [BFN+ 09] and led to interesting type architecture [WNL+ 10a, WNL+ 10b]. 6 Conclusions and future work The type system presented in this paper gives an expressible framework for typing objects in dynamic languages such as Python or JavaScript. It follows the general view of type-and-effect systems where running time program property must be expressed as a dynamical change. We express this change by means of Hoarelike triples that describe the structure of relevant objects before an expression is executed and after the execution. The type system is presented in a fashion similar to Church-style. The necessary typing information must be provided by a programmer. We work now on helpful heuristics that will infer most of the type information to make the annotational effort of a programmer minimal and on the way a system with types can be integrated to real program development in scripting languages. References [BB99] Viviana Bono and Michele Bugliesi. Matching for the lambda calculus of objects. Theoretical Computer Science, 212(1โ€“2):101โ€“140, 1999. REFERENCES 20 [BFN+ 09] Bard Bloom, John Field, Nathaniel Nystrom, Johan ร–stlund, Gregor Richards, Rok Strniลกa, Jan Vitek, and Tobias Wrigstad. Thorn: robust, concurrent, extensible scripting on the jvm. In Proceedings of the 24th ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, pages 117โ€“136, New York, NY, USA, 2009. ACM. [GL86] David K. Gifford and John M. Lucassen. Integrating functional and imperative programming. In Proceedings of the 1986 ACM Conference on LISP and Functional Programming, LFP โ€™86, pages 28โ€“38, New York, NY, USA, 1986. ACM. [GSK11] Arjun Guha, Claudiu Saftoiu, and Shriram Krishnamurthi. Typing local control and state using flow analysis. In Proceedings of the 20th European conference on Programming languages and systems: part of the joint European conferences on theory and practice of software, ESOPโ€™11/ETAPSโ€™11, pages 256โ€“275, Berlin, Heidelberg, 2011. Springer-Verlag. [KMCA06] Andrew J. Ko, Brad A. Myers, Michael J. Coblenz, and Htet Htet Aung. An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Transactions on Software Engineering, 32(12):971โ€“987, December 2006. [MM09] Daniel Marino and Todd Millstein. A generic type-and-effect system. In Proceedings of the 4th International Workshop on Types in Language Design and Implementation, TLDI โ€™09, pages 39โ€“50, New York, NY, USA, 2009. ACM. [Ous98] John K. Ousterhout. Scripting: Higher-level programming for the 21st century. Computer, 31(3):23โ€“30, March 1998. [Pre00] Lutz Prechelt. An empirical comparison of seven programming languages. Computer, 33(10):23โ€“29, October 2000. [Sas96] William Sasso. Cognitive processes in program comprehension: An empirical analysis in the context of software reengineering. Journal of Systems and Software, 34(3):177โ€“189, September 1996. [Sof12] Tiobe Software. Tiobe programming community index for april 2012. Web page http://www.tiobe.com/index.php/ content/paperinfo/tpci/index.html, April 2012. REFERENCES 21 [Ste01] Ed Stephenson. A fallback application built in six months earns the prime role. a fallback application built in six months earns the prime role. http://oreilly.com/pub/a/oreilly/ perl/news/swedishpension_0601.html, June 2001. [WEF+ 09] Tobias Wrigstad, Patrick Eugster, John Field, Nate Nystrom, and Jan Vitek. Software hardening: a research agenda. In Proceedings for the 1st Workshop on Script to Program Evolution, STOP โ€™09, pages 58โ€“70, New York, NY, USA, 2009. ACM. [WNL+ 10a] Tobias Wrigstad, Francesco Zappa Nardelli, Sylvain Lebresne, Johan ร–stlund, and Jan Vitek. Integrating typed and untyped code in a scripting language. SIGPLAN Notices, 45(1):377โ€“388, January 2010. [WNL+ 10b] Tobias Wrigstad, Francesco Zappa Nardelli, Sylvain Lebresne, Johan ร–stlund, and Jan Vitek. Integrating typed and untyped code in a scripting language. In Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 377โ€“388, New York, NY, USA, 2010. ACM. [WNV09] Tobias Wrigstad, Nate Nystrom, and Jan Vitek, editors. STOP โ€™09: Proceedings for the 1st Workshop on Script to Program Evolution, New York, NY, USA, 2009. ACM.
6cs.PL
1 arXiv:1711.09305v2 [cs.PL] 28 Nov 2017 A Language for Probabilistically Oblivious Computation DAVID DARAIS, University of Maryland CHANG LIU, University of California, Berkeley IAN SWEET, University of Maryland MICHAEL HICKS, University of Maryland An oblivious computation is one that is free of direct and indirect information leaks, e.g., due to observable di๏ฌ€erences in timing and memory access patterns. This paper presents L obliv , a core language whose type system enforces obliviousness. Prior work on type-enforced oblivious computation has focused on deterministic programs. L obliv is new in its consideration of programs that implement probabilistic algorithms, such as those involved in cryptography. L obliv employs a substructural type system and a novel notion of probability region to ensure that information is not leaked via the distribution of visible events. The use of regions was motivated by a source of unsoundness that we discovered in the type system of ObliVM, a language for implementing state of the art oblivious algorithms and data structures. We prove that L obliv โ€™s type system enforces obliviousness and show that it is nevertheless powerful enough to check state-of-the-art, e๏ฌƒcient oblivious data structures, such as stacks and queues, and even tree-based oblivious RAMs. 1 INTRODUCTION Cloud computing allows clients to conveniently outsource computation, but they must trust that cloud providers do not exploit or mishandle sensitive information. To remove the provider from the trusted computing base, work in both industry and research has strived to realize a โ€œsecureโ€ abstract machine comprising an execution engine and protected memory: The adversary cannot see sensitive data as it is being operated on, nor can it observe such data at rest in memory. Such an abstract machine can be realized by encrypting the data in memory and then performing computations using cryptographic mechanisms (e.g., secure multi-party computation [Yao 1986]) or secure processors [Hoekstra 2015; Suh et al. 2003; Thekkath et al. 2000]. Unfortunately, a secure abstract machine does not defend against an adversary that can observe memory access patterns [Islam et al. 2012; Maas et al. 2013; Zhuang et al. 2004] and instruction timing [Brumley and Boneh 2003; Kocher 1996], among other โ€œsideโ€ channels of information. For cloud computing, such an adversary is the cloud provider itself, which has physical access to its machines, and so can observe tra๏ฌƒc on the memory bus. A countermeasure against an unscrupulous provider is to augment the secure processor to store code and data in oblivious RAM (ORAM) [Maas et al. 2013; Suh et al. 2003]. First proposed by Goldreich and Ostrovsky [Goldreich 1987; Goldreich and Ostrovsky 1996], ORAM obfuscates the mapping between addresses and data, in e๏ฌ€ect โ€œencryptingโ€ the addresses along with the data. Replacing RAM with ORAM solves (much of) the security problem but incurs a substantial slowdown in practical situations [Liu et al. 2015, 2013; Maas et al. 2013] as reads/writes add overhead that is polylogarithmic in the size of the memory. Recent work has explored methods for reducing the cost of programming with ORAM. Liu et al. [2015, 2013, 2014] developed a family of type systems to check when partial use of ORAM (alongside normal, encrypted RAM) results in no loss of security; i.e., only when the addresses of secret data could (indirectly) reveal sensitive information must the data be stored in ORAM. This optimization can provide order-of-magnitude (and asymptotic) performance improvements. Wang Working draft as of July 7, 2017. 1:2 David Darais, Chang Liu, Ian Sweet, and Michael Hicks et al. [2014] explored how to build oblivious data structures (ODSs), such as queues or stacks, that are more e๏ฌƒcient than their standard counterparts implemented on top of ORAM. Their technique involves specializing ideas from ORAM algorithms to particular data structures, resulting in asymptotic performance gains in common cases. In followup work, Liu et al. [2015] devised a programming language called ObliVM1 for implementing such oblivious data structures. While Liu et al.โ€™s earlier work treats ORAM as a black box, in ObliVM one can program ORAM algorithms as well as ODSs. A key feature of ObliVM is careful treatment of random numbers, which are at the heart of state-of-the-art ORAM and ODS algorithms. While the goal of ObliVM is that well-typed programs are secure, no formal argument to this e๏ฌ€ect is made. In this paper, we present L obliv , a core language for oblivious computation, inspired by ObliVM. L obliv extends a core imperative language equipped with an information ๏ฌ‚ow type system [Sabelfeld and Myers 2006] with primitives for generating and using uniformly distributed random numbers. We prove that L obliv โ€™s type system guarantees probabilistic memory trace obliviousness (MTO), i.e., that the possible distribution of adversary-visible execution traces is independent of the values of secret variables. This property generalizes the deterministic MTO property enforced by Liu et al. [2015, 2013], which did not consider the use of randomness. In carrying out this work, we discovered that the ObliVM type system is unsound, so an important contribution of L obliv is to address the problem without overly restricting or complicating the language. L obliv โ€™s type system aims to ensure that no probabilistic correlation forms between secrets and publicly revealed random choices. With oblivious computations it is frequently the case that a random choice is made (e.g., where to store a particular block in an ORAM), and eventually that choice is made visible to the adversary (e.g., when that or another block is later looked up). This visibility is OK as long as the revealed value does not communicate information about a secret, which L obliv ensures by guaranteeing the number is always (still) uniformly distributed. L obliv โ€™s type system, presented in Section 4, ensures uniform revelations in part by treating randomly generated numbers as a๏ฌƒne, meaning they cannot be freely copied. This prohibition prevents revealing the same number twice (where the second revelation will not be uniform). Unfortunately, a๏ฌƒnity is too strong for practical algorithms, which do make copies of random numbers. L obliv โ€™s type system thus allows random numbers to be coerced to merely-secret numbers but only so long as the secret version is never revealed. Moreover, L obliv requires that previously-random numbers not be allowed to in๏ฌ‚uence the choice of to-be-revealed random numbers, since such in๏ฌ‚uence might violate the latterโ€™s uniformity. For example, we should not be able to coerce a random number to a secret, look at the secret, and then decide to reveal that random number or some other one. The type system prevents this problem by using a new mechanism we call probability regions to track the transitive (in)dependence of numbers in one region from those in another. (That probability regions are missing in ObliVM is the source of its unsoundness.) Section 5 outlines proof that L obliv enjoys MTO, i.e., if a L obliv program is well typed, then its observable behavior is oblivious. Further details of the proof are in the Appendix. While we have not retro๏ฌtted L obliv โ€™s type system into ObliVM, we have implemented a type checker for L obliv . Section 6 presents a version of Tree ORAM [Shi et al. 2011], a state-of-the-art ORAM implementation, that our language type checks. We also show, in Section 3, that oblivious stacks, a kind of oblivious data structure [Wang et al. 2014], can be type checked when implemented on top of a non-recursive ORAM. As far as we are aware, our implementations constitute the ๏ฌrst automated proofs that these data structures are indeed oblivious. We believe L obliv is a promising step forward, generalizing the work that came before it (Section 7 discusses related work). 1 http://www.oblivm.com A Language for Probabilistically Oblivious Computation 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1:3 let add (mem : ( int S โˆ— int S) array ) (a : int S) (v : int S) = let len = length (m) in let rec iterate ( curr_idx : int P) ( pair : ( int S โˆ— int S) ) : unit = if curr_idx = len then () else (โˆ— WRONG code first โˆ—) (โˆ— let (_, curr_addr ) = mem[curr_idx] in โˆ—) (โˆ— if curr_addr = โˆ’1 then mem[curr_idx] โ† pair โˆ—) (โˆ— else iterate ( curr_idx + 1) pair โˆ—) (โˆ— CORRECT code below โˆ—) let (_, curr_addr) as curr_pair = mem[curr_idx] in let (_, addr) = pair in let ( t_pair , f_pair ) = mux (curr_addr = โˆ’1 && not(addr = โˆ’1)) pair curr_pair in mem[curr_idx] โ† t_pair ; iterate ( curr_idx + 1) f_pair in iterate 0 (v , a) Fig. 1. Adding to an โ€œassociation arrayโ€ obliviously (aka add for trivial ORAM) 2 BACKGROUND This section presents the de๏ฌnition of the threat model and background on type-enforced deterministic oblivious execution. The next section motivates and sketches our novel type system for enforcing probabilistic oblivious execution. 2.1 Threat Model We assume a powerful adversary that can make ๏ฌne-grained observations about a programโ€™s execution. In particular, we use a generalization of the program counter (PC) security model [Molnar et al. 2006]: The adversary knows the program being executed, can observe the PC during execution as well as the contents and patterns of memory accesses. Some secret memory contents may be encrypted (while public memory is not) but all memory addresses are still visible. As a relevant instantiation, consider an untrusted cloud provider using a secure processor, like SGX [Hoekstra 2015]. Reads/writes to/from memory can be directly observed, but secret memory is encrypted (using a key kept by the processor). The pattern of accesses, timing information, and other system features (e.g., instruction cache misses) provide information about the PC. Another instantiation is secure multi-party computation (MPC) using secret shares [Goldreich et al. 1987]. Here, two parties simultaneously execute the same program (and thus know the program and program counter), but certain values, once entered by one party or the other, are kept hidden from both using secret sharing. Our techniques can also handle weaker adversaries, such as those that can observe memory tra๏ฌƒc but not the PC, or can make timing measurements but cannot observe the PC or memory. 2.2 Oblivious execution Our goal is to ensure memory trace obliviousness (MTO), which is a kind of noninterference property [Goguen and Meseguer 1982; Sabelfeld and Myers 2006]. This property states that despite being able to observe each address (of instructions and data) as it is fetched, and each public value, the adversary will not be able to infer anything about manipulated secret values. To see how such an inference could occur, consider the program in Figure 1 (in OCaml-style syntax). This program takes an array of pairs of secret integers mem, a secret address a, and a secret value v and adds the 1:4 David Darais, Chang Liu, Ian Sweet, and Michael Hicks pair (v , a) to a free slot in the array, as de๏ฌned by its value having address โˆ’1. The commented out code on lines 6โ€“8 illustrate a non-oblivious implementation. The code works by (on line 6) extracting the current array element, (on line 7) checking if its address is โˆ’1 and updating the element if so, and otherwise (on line 8) continuing to consider the next array element. Notice that curr_index is designated as non-secret ( int P means โ€œpublic intโ€) because the index to an array is e๏ฌ€ectively revealed when the adversary can observe memory accesses. If the program executes mem[idx] then the adversary can observe some address a being read. Knowing the starting address s of array mem, the adversary can compute idx = a โˆ’ s. By watching the address trace, an adversary can learn something about the arrayโ€™s contents. In particular, a sequence of N reads followed by a write implies that the ๏ฌrst N โˆ’ 1 slots were not free while slot N was; no writes means no free slots. The adversary can also watch the program counter to notice when the true vs. the false branch of the conditional is taken, revealing the same information. The code on lines 10โ€“16 ๏ฌxes these problems. The mux on line 12 is the key part. It takes three arguments. The ๏ฌrst is a boolean condition, which here is whether the current slot is free and also whether pair โ€™s address is not โˆ’1. If so then the mux evaluates to a pair comprised of the muxโ€™s second and third arguments, in that order; otherwise the pairโ€™s contents are reversed. Line 13 updates memโ€™s current slot with the ๏ฌrst element of the pair, and recurses to consider the next element, passing the second element of the pair. This code is oblivious: it reads and writes every slot in the array, and always executes exactly the same statements, no matter the contents of the array, index, or value arguments. As such, observing the codeโ€™s execution reveals nothing about the secrets it manipulates. This code is actually the add operation of a โ€œtrivialโ€ oblivious RAM (ORAM) implementation [Goldreich 1987; Goldreich and Ostrovsky 1996]. ORAM provides an API that is like an array, but makes sure the address trace does not reveal the relationship between the index and the value. That is, for read oram i and write oram i v operations, the index i is e๏ฌ€ectively kept secret. We will later consider sophisticated ORAM algorithms, which use trivial ORAM as a building block. 2.3 Obliviousness by typing Liu et al. [2015, 2013] developed a type system that ensures programs are MTO. Types are extended to indicate where values are allocated; as per our above example data can be public or secret, but can also reside in ORAM. Liu et al.โ€™s small-step operational semantics ฯƒ ; e โˆ’โ†’t ฯƒ โ€ฒ; e โ€ฒ reduces an expression e in memory ฯƒ to heap ฯƒ โ€ฒ and expression e โ€ฒ while emitting trace event t. Trace events include fetched instruction addresses, public values, and the addresses of public and secret values, that are read and written, but not the addresses or values of data stored in ORAM, which is modeled as a black box: Basically it is treated as if it were an array whose accesses are opaque to the adversary (similar to the Dolev-Yao modeling of encrypted messages [Dolev and Yao 1981]). Under this model, the MTO property means that running e in two low-equivalent memories ฯƒ1 and ฯƒ2 โ€”meaning they agree on public valuesโ€”will produce the exact same memory trace, along with low-equivalent output heaps and results. More formally, if ฯƒ1 โˆผ ฯƒ2 then ฯƒ1 ; e โˆ’โ†’t1 ฯƒ1โ€ฒ; e 1 and ฯƒ2 ; e โˆ’โ†’t2 ฯƒ2โ€ฒ ; e 2 imply t 1 = t 2 , ฯƒ1โ€ฒ โˆผ ฯƒ2โ€ฒ , and e 1 โˆผ e 2 , where operator โˆผ denotes low-equivalence. 3 TYPE-BASED ENFORCEMENT OF PROBABILISTIC OBLIVIOUSNESS Liu et alโ€™s type system enforces obliviousness of deterministic programs that use ORAM. However, work on oblivious data structures [Wang et al. 2014] has shown that probabilistic uses of ORAM can be far more e๏ฌƒcient. In such uses, visible memory and traces need not be identical when computing with di๏ฌ€erent secrets, but rather they only must be identically distributed; i.e., all possible memory traces are equally likely, no matter the secrets used. Indeed, this is the same property that ORAM A Language for Probabilistically Oblivious Computation 1 2 3 4 5 6 7 8 1:5 let stackop (( oram,rid_r ) :' a Stack) (ispush : Bool S) (d :' a) : ' a = let rid = ! rid_r in let old_d = read oram rid in let (d ', _) = mux ispush d old_d in let ( id , _) = mux ispush (rid +1) rid in write oram id d '; let ( rid ', _) = mux ispush (rid+1) ( rid โˆ’1) in rid_r := rid '; d' Fig. 2. A deterministic oblivious stack built using a full (recursive) ORAM. algorithms, if we open up the black box, are actually providing. This section motivates the bene๏ฌts of probabilistic programming with ORAMs, and sketches our type system that enforces MTO for such programs. Section 6 shows this type system is actually powerful enough to implement ORAM algorithms directly, so they need not be treated as black boxes. 3.1 Motivation: naive oblivious stack is ine๏ฌ€icient The goal of an oblivious stack is to hide both its data and which operations (pushes or pops) are taking placeโ€”only the total number of operations should be revealed. An incorrect approach would be to implement the stack as usual but using a secret (encrypted) array. While doing this would hide the contents of the array, indexes into that array would be visible to the adversary (as discussed in Section 2.2), which would reveal the operationโ€”increasing indexes indicate pushes, and decreasing ones indicate pops. To hide the index we can store the stack in an ORAM instead of an array, and merge the code of the push and pop operations, as shown in the stackop function in Figure 2, so that observation of the PC does not reveal which operation is taking place. In the code, a stack consists of an ORAM of secret numbers and a reference storing the index of the root. Function stackop takes a stack, a ๏ฌ‚ag indicating whether the operation is a push or pop, and the value to push, and returns a value. The code reads the value at the root index (line 3). The next line copies that value to d' if the operation is pop, or else puts d there if it is a push. Line 5 determines the index of the write it will perform on line 6: this index ( id ) is one more than the root index if itโ€™s a push and itโ€™s the current root index if not. As such, the write on line 6 puts the given value in the next slot in case of a push, or writes back the value at the current root, if itโ€™s a pop. Finally, line 7 adjusts the root index, and line 8 returns the result, which is either the popped value or pushed value (if it was a push). While this code works perfectly well (and would typecheck in Liu et alโ€™s system) a probabilistic version of the stack, using a non-recursive ORAM, would be more space-e๏ฌƒcient. In particular, it will require only O(L) extra space where L is the current size of the stack, whereas this version requires O(N ) extra space, where N is the size of the ORAM. We will see why, next. 3.2 Recursive and non-recursive ORAM To understand the source of ine๏ฌƒciency, we now digress to consider features of state-of-the-art ORAM algorithms. In particular, consider a tree-based ORAM [Shi et al. 2011; Stefanov et al. 2013; Wang et al. 2015]. It has two parts: a tree-like structure for storing the actual data blocks, and a position map that maps logical data block indexes to position tags that indicate the blockโ€™s position in the tree. In the simplest instantiation, an ORAM of size N has a position map of size N which is hidden from the adversary; e.g., it could be stored in on-chip memory in a processor-based deployment of ORAM. The position tags mask the relationship between a logical index and the 1:6 David Darais, Chang Liu, Ian Sweet, and Michael Hicks location of its corresponding block in the tree. As blocks are read and written, they are shu๏ฌ„ed around in the data structure, and their new locations are recorded in the position map. Note that the position map need not be hidden on chip; rather, much of it can be stored recursively in ORAM itself, reducing the space overhead on the client. As such, the tree part that contains the data blocks is sometimes called a non-recursive ORAM (or NORAM for short). The ORAM read and write operations are implemented as a sequence of two NORAM operations, called readAndRemove (or rr , for short) and add. rr : ' a NOram โ†’ (idx:int S) โ†’ (tag : int P) โ†’ ' a add: ' a NOram โ†’ (idx:int S) โ†’ (tag : int S) โ†’ ( block :' a) โ†’ unit Here, the type ' a NORam designates the tree portion of the ORAM data structure, which stores data blocks of type ' a. Operation rr โ€™s int S argument is the desired blockโ€™s logical index, which is hidden from the adversary; the int P argument is its position tag extracted from the map; and the ' a is the returned data block. The add operation is similar except that its position tag can be secret, and it adds a block to the tree, rather than removing it. A full ORAM read at index i requires looking up the tag in the position map, performing an rr to read and remove the value at i, and adding back that value (updating the position map with a fresh tag). A write to i requires a rr to remove the old value at i, and an add to write the new value (again updating the position map). Depending on the details of the NORAM algorithm, rr and add may perform many reads and writes to/from the tree. For simplicity, we can think of a call to rr noram id pos as producing a single abstract event RR(noram,pos). The event indicates the operation, the NORAM it is performed on (there may be more than one), and the position tag, which is visible because it correlates with the actual memory addresses accessed to retrieve the requested block. The add operationโ€™s behavior does not depend on the position tag, so it simply generates event ADD(noram). The fact that rr โ€™s position tag is visible to the adversary means that traces involving rr operations might di๏ฌ€er not because of a dependence on particular secret values, but due to innocuous random variation. Hence we require a more general de๏ฌnition of obliviousness, discussed below. The running time of both rr and add are O(log N ). The position map requires O(N ) storage and O(1) access time when stored non-recursively on the client, hidden from the adversary. When stored recursively in ORAM, the position map imposes O(1) storage on the client, and O(log N access time; this is the standard deployment for (full, recursive) ORAM, and is necessary when the position map accesses are visible to the adversary (as in MPC-based deployments). It turns out that L obliv is powerful enough to implement tree-based ORAMs from scratch; we present more details about this in Section 6. 3.3 An optimized oblivious stack Returning to the question of how to more e๏ฌƒciently implement an oblivious stack, consider that we always access a stack via its head, using the root index. Thus, in the code in Figure 2, the full oram internally only ever uses one slot in its position map. Thus we can do better by using an NORAM directly, having the stack manage the position tag of the root. In short, we implement an oblivious stack as a triple comprising a NORAM, the index of the root element, and its position tag. The latter two act as a kind of pointer into the NORAM. Each block stored in the NORAM contains the data and the position tag of the next block in the stack. A Language for Probabilistically Oblivious Computation 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 1:7 type ' a OStack = (' a โˆ— rnd R) noram โˆ— int S ref โˆ— rnd R ref let stackop (( noram,rid_r , pos_r) :' a OStack) (ispush : Bool S) (d :' a) : ' a = let ( rid , pos) = ! rid_r ,! pos_r in let ( rid ', pos ', d ') = if ispush then let (d ', _) = rr noram (โˆ’1) (reveal (rnd () ) ) in let b = (d,pos) in let pos ' = rnd () in let _ = add noram (rid+1) (use pos ') b in ( rid +1,pos ', d ') else let (d ', pos ') = rr noram rid (reveal pos) in let b = (d,rnd () ) in let _ = add noram (โˆ’1) 0 b in ( rid โˆ’1,pos ', d ') in rid_r := rid '; rpos_r := pos '; d' Fig. 3. A probabilistic oblivious stack built using a non-recursive ORAM. (Does not use mux, for simplicity.) Code implementing the stack following this design is given in Figure 3. Note the code branches on the ispush variable to make it easier to read; the actual implementation must use muxs to conditionally execute each statement in both branches to ensure obliviousness.2 Line 3 extracts the current root index and position tag. Lines 6โ€“10 handle a push operation. Line 6 ๏ฌrst does a โ€œdummy readโ€ from the NORAM; just as we saw with the oblivious add in Figure 1, using index โˆ’1 results in a dummy block being returned (the position tag argument is unimportant in this case). Line 7 constructs a new block b to push: it consists of the given data d paired with the current rootโ€™s position tag pos, thus creating a โ€œpointerโ€ to that block. We then generate a fresh position tag pos' for this (the new rootโ€™s) block, add the block to the noram. Random numbers generated by rnd () have type rnd R; the coercion reveal ascribes a random number the type int P (per line 6), while use gives it type int S (line 9); we explain these constructs in the next subsection. The new root index (the old one plus one), the rootโ€™s tag, and the dummy block passed in are returned on line 10. Lines 12โ€“15 handle a pop. Here, the ๏ฌrst rr does real work, extracting the block that corresponds to the root index and position tag. We then generate a dummy block to โ€œaddโ€ to the ORAM. The updated root index (the old one minus one), its position tag (returned by the rr ) and the fetched block are returned. This version of an oblivious stack performs better than the version from Figure 2. The space overhead, due to the added pointers at the root and within the ORAM, is O(L) where L is the size of the current stack, not the size N of the ORAM. The running time is still O(loะด N ). The random numbers generated on lines 6 and 8 are eventually revealed by rr operations on lines 4 and/or 12. As such, there can be many possible RR(...) events for the same sequence of secret inputs. While this code is safe, there is the possibility that a di๏ฌ€erence in the visible trace reveals secret information. We need to ensure that traces are identically distributed. More formally, if ฯƒ1 โˆผ ฯƒ2 then for all traces t the probability that evaluating e under ฯƒ1 produces trace t is the 2 Notice that the structure of both branches is roughly parallel, which makes converting to the use of muxes straightforward. 1:8 David Darais, Chang Liu, Ian Sweet, and Michael Hicks same as the probability that evaluating e under ฯƒ2 also produces t. This property, which we call probabilistic trace obliviousness, is ensured by the underlying NORAM implementation, and we need to ensure that the programs that use it preserve it. It turns out this property holds for our stack, and is con๏ฌrmed by our type system, as described next. 3.4 L obliv : Obliviousness by typing for probabilistic programs The main contribution of this paper is L obliv , a core language for ensuring obliviousness of programs that use randomness. L obliv โ€™s type system establishes that programs like the one in Figure 3 are oblivious by employing two mechanisms: a๏ฌƒne treatment of random values, and probability regions to track dependences between random values that could leak information when a value is revealed. A๏ฌƒnity. Random numbers, produced by executing rnd () , are given type rnd R, where R is a probability region, explained shortly. Values of this type are, like secret values, invisible to the adversary. They can be converted to int S numbers with the use coercion and can be converted to int P numbers with the reveal coercion. For example, in Figure 3, line 8 creates a random value pos ' , which it converts to a secret number and passes to the add operation on line 9, and sets to be the position tag of the root on line 10. On line 12, the root position tag is converted to a public number which is passed as an argument to rr (e๏ฌ€ectively revealing it to the adversary). L obliv โ€™s type system enforces that a random number can be made public at most once. It does this by treating values of type Rnd R a๏ฌƒnely: they cannot be duplicated, e.g., through assignments, and they are consumed by operations other than use. For example, variable pos ' is not consumed on line 9 when passed to use, but is consumed when assigned to rpos_r on line 17; subsequent reference to n_rpos on line 18 would be illegal. Similarly, on line 3 variable pos is read from the root of the tree; it has type Rnd R. It is then consumed on line 6 when given to reveal. Why is a๏ฌƒnity important? Consider this example, in which variable s has type int S. 1 2 3 4 let ( r1 , r2 ) = (rnd () , rnd () ) in let (z , _) = mux (s = 0) r1 r2 in output (reveal z) ; (โˆ— OK โˆ—) output (reveal r1 ) ; (โˆ— Bad โˆ—) Lines 1โ€“3 in this code are safe: we generate two random numbers that are invisible to the adversary, and then store one of them in z depending on whether the secret s is zero or not. Revealing z at line 3 is safe: regardless of whether z contains the contents of r1 or r2, the fact that both are uniformly distributed means that whatever is revealed, nothing can be learned about s. However, revealing r1 on line 4, after having revealed z, is not safe. This is because seeing two zeroes in a row is more likely when z is r1, which happens when s is zero. So this violates obliviousness. A similar problem would arise in our oblivious stack if we changed line 8 in Figure 3 to be let pos ' = pos in ... This would set the position tag for the new root to the old rootโ€™s tag, pos, which has just been revealed. As a result, we will leak information about the secret ispush variable at the next operation, i.e., whether a push was previously performed, vs. a pop. With a๏ฌƒne revelation, the type system catches this mistake; assigning pos to b on line 7 consumes it, so reading it again on line 8 would be disallowed. Probability regions. Unfortunately, a๏ฌƒnity on its own is insu๏ฌƒcient. This is because, for reasons of needed expressiveness, use can convert random numbers to non-a๏ฌƒne, secret ones, and then computing on these can a๏ฌ€ect the distribution of revealed values. To see how, consider this program: A Language for Probabilistically Oblivious Computation 1 2 3 4 5 1:9 let (x , y) = (rnd () , rnd () ) in let s_x = use(x) in let ( r1 , r2 ) = mux (s_x = 0) x y in let (z , _) = mux (s = 0) r1 r2 in output (reveal z) ; (โˆ— Bad โˆ—) Line 1 generates two random numbers, and line 2 creates a secret copy of x, which does not consume it. Line 3 sets r1 to x if it is 0, and to y otherwise; the reverse is true for r2. The problem now is that r1 and r2 are not uniformly distributed: r1 is more likely to contain zero than any other number. As a result, outputting z on line 5 is dangerous: seeing a zero here is more likely if z was r1 and thus that says that s is more likely to be zero, than not. Notice that we have not violated a๏ฌƒnity here: no random number has been revealed publicly more than once. Our type system addresses this problem with a novel construct we call probability regions. Both normal and random number types are ascribed a region R. The region represents the set of random numbers generated at program points whose rnd instructions are annotated with R. (We have elided the region name so far, but normally should write rnd R () ). Regions allow the type system to reason that random numbers are probabilistically independent. In particular, regions follow a lattice ordering, and we can say that two regions R1 and R2 are independent if their meet is โŠฅ. Otherwise, regions may depend on one another, meaning that revelation of a random number in one region may compromise the uniformity of the distribution of a number in the other, which could result in a leak. We can see this in our example: the region of the number s_x = 0 is the same region as x, since s_x was derived from x. As such, the two are not independent. But this lack of independence is problematic when conditioning on s_x = 0 to return x; it means that the output is no longer uniform. On the other hand, if the guard of a mux has a region that is independent of the regions of its branches, then the uniformity of the output is not threatened. Normal numbers that never were (or were in๏ฌ‚uenced by) random numbers have region โŠฅ because they are independent of any random number; as a notational convenience, when we write only the secrecy label (e.g., int P or int S) this means the region is โŠฅ. Looking at our ๏ฌrst example, line 2 is perfectly safe assuming that s has type int S because then its region โŠฅ is independent of the region of r1 and r2. Allowing such safe code is critical for implementing e๏ฌƒcient oblivious algorithms. 4 FORMAL LANGUAGE This section presents L obliv : Its syntax, sampling semantics, and type system. The next section presents our main metatheoretic result, that typing ensures memory trace obliviousness. 4.1 Syntax Figure 4 shows the syntax for L obliv . The syntax for terms is strati๏ฌed into a kind of a-normal form to simplify the semantics. We have expressions e, which comprise let binding and conditionals; atomic expressions a, which comprise various computational forms discussed shortly; and pico expressions p, which comprise variables x or literals tagged with a security label โ„“. Literals are either bits b (which are either O or I) or natural numbers n, and security labels โ„“ are either public P or secret S. Semantically, literals labeled with S are invisible to the adversary while those labeled with P are not. (Think of S-labeled literals as encrypted.) Returning to atomic expressions, p โ—ฆ takes the complement of a bit; p โŠ™ p represents an arbitrary arithmetic operation; asnat(p) converts from bits to nats, and asbit(p) does the reverse. Expression flipฯ () randomly generates a bit of type flipฯ ; we call values of this type โ€œcoin ๏ฌ‚ips.โ€ The annotation ฯ is the coin ๏ฌ‚ipโ€™s probability region; we defer discussion of these to Section 4.3. Coin 1:10 David Darais, Chang Liu, Ian Sweet, and Michael Hicks โˆˆ label F P | S โˆˆ region F (parameter) โˆˆ BFO|I โˆˆ N F {0, 1, . . .} โˆˆ aop F (parameter) โˆˆ var โ‰” {x, y, z, . . .} โˆˆ lit โ‰” b | n โˆˆ pico F x | ฮน โ„“ โˆˆ atom F p | pโ—ฆ | p โŠ™p | asnat(p) | asbit(p) | flipฯ () | use(x) | reveal(x) | mux(p, p, p) | hp, pi | arrayN (p, . . . N , p) | p[p] | p[p] โ† p e โˆˆ expr F a | let x โ‰” a in e | let x, x โ‰” a in e | if p then e else e โ„“ ฯ b n โŠ™ x ฮน p a security label probability region bits natural numbers arithmetic ops lexical variables literals โ€œpicoโ€ expressions โ€œatomicโ€ expressions bit complement arithmetic ops bit-to-nat conversion nat-to-bit conversion coin ๏ฌ‚ip convert ๏ฌ‚ip to bit reveal ๏ฌ‚ip to public atomic conditional tuple creation array creation array read atomic array read+write โ€œcompoundโ€ expressions local variable binding local tuple binding conditional Fig. 4. Syntax for L obliv ๏ฌ‚ips are semantically secret, and have limited use; we can coerce one to public bit via reveal(p) and to a secret bit via use(p). Expression mux(p, p2, p3 ) unconditionally evaluates p2 and p3 and returns them as a pair in the given order if p evaluates to I, or in the opposite order if it evaluates to O. This operation is critical for obliviousness because its operation is atomic. By contrast, normal conditionals if p then e 1 else e 2 evaluate either e 1 or e 2 depending on p, never both, so the instruction trace communicates which branch is taken. The components of tuples constructed as hp1 , p2 i can be accessed via let x 1 , x 2 โ‰” a in e. Finally, the last three atomic expression forms are for (constant size-N ) array creation, read, and update, respectively. We designed L obliv to capture the key features used when programming oblivious data structures (notably, numbers, tuples, arrays, and random numbers), but it omits obviously useful features to avoid unimportant complexity. Many missing features can be added without di๏ฌƒculty (and we have them in our implementation). For example, we can easily encode random N-bit numbers as a tuple of bits, with ready conversions to/from nats, and we can allocate variable-sized arrays. We can support lambda terms with bounded recursion using standard ideas; we imagine L obliv programs as post inlining. Allowing non-termination (as opposed to bounded recursion) is A Language for Probabilistically Oblivious Computation 1:11 more technically delicate, but also doable. We further discuss implementation issues (including the support for richer types) in Section 6. 4.2 Sampling Semantics Figure 5 shows a small-step operational semantics for L obliv programs. The main judgment has q ฯ‚ โ€ฒ which states that a con๏ฌguration ฯ‚ steps to con๏ฌguration ฯ‚ โ€ฒ with probability q form ฯ‚ (a rational number). A con๏ฌguration contains an expression e, environment ฮณ , and a store ฯƒ ; a special HALT form indicates a terminated computation, with the expression replaced with a value v. A value is a labeled literal ฮน โ„“ , an address, or a pair of values hv, vi. The environment maps variables to values, while the store maps (array) addresses ฮฑ to sequences of values. The bottom of the ๏ฌgure gives rules for the main judgment, and are basically standard; notice that let-bound variables are put in the environment ฮณ , rather substituted into the target term. These rules inherit their probability annotation from subsidiary judgment ฮณ ; ฯƒ โŠข a ึ‰q v ; ฯƒ โ€ฒ , which states that an atomic expression a under ฮณ and ฯƒ steps to a value v and output store ฯƒ โ€ฒ with probability q. In turn, these rules invoke PJpK to evaluate pico expressionsโ€”variables x are looked up in the environment, and literals ฮน โ„“ are returned. All of the atomic expression rules have probability q = 1 except for the rules for flip, which return OS or IS with probability 1/2. The rules preceding these are for computing on bits and numbers, and are straightforward; we assume a given semantics function for operations โŠ™. The rules for mux evaluate both branches and their values as a pair; the order of these values depends on the bit to which the guard evaluates. Array allocation stores a sequence of the given values at fresh address ฮฑ in the store; array read extracts a value at the given index n P (notice it must be public), and array write returns the existing value before updating the appropriate position in the sequence present at ฮฑ in the store. Having array update return the old value is critical for coexisting with the type systemโ€™s a๏ฌƒne treatment of random numbers, as described below. Attempting to access an array out of bounds is unde๏ฌned; note that this does not represent an information leak because array indexes are public. Traces and adversary observations. An execution trace t is a sequence of con๏ฌgurations ฯ‚ 1 . . . ฯ‚ N q whereby each ฯ‚ i and ฯ‚ i +1 in the sequence is justi๏ฌed by proof of judgment ฯ‚ i i +1 , and ฯ‚ N is a halted con๏ฌguration. We de๏ฌne what parts of the trace the adversary can see according to the function obs. This function takes a sequence of con๏ฌgurations and produces a corresponding sequence of โ€œbulletedโ€ con๏ฌgurations. We omit this function for space reasons (it is given in the appendix, in Figure 21) but its operation is straightforward: a bullet con๏ฌguration is the same as its original except that all secret numbers (both random and non-random) have been replaced with โ€ข. As such, we capture the idea that the adversary can see the full instruction trace (the structure of expressions is visible) the address trace (addresses ฮฑ are not a๏ฌ€ected), and non-secret values (public literals are una๏ฌ€ected). Only speci๏ฌcally secret numbers are hidden. Our type system, given next, is able to ensure even when the adversary can see such a trace, he can learn nothing about the programโ€™s secret values. 4.3 Typing Figure 7 shows the type system for L obliv , which de๏ฌnes a judgment ฮ“ โŠข e : ฯ„ ; ฮ“ โ€ฒ, which states that under type environment ฮ“ expression e has type ฯ„ , and yields residual type environment ฮ“ โ€ฒ. Types ฯ ฯ„ and environments ฮ“ are de๏ฌned in Figure 6. Bits and numbers respectively have type bitโ„“ and ฯ natโ„“ , where โ„“ and ฯ are the label and probability region, respectively. As mentioned earlier, flipฯ characterizes a coin ๏ฌ‚ip in region ฯ; it implicitly has label S. Types array(ฯ„ ) and ฯ„ ร—ฯ„ characterize arrays and pairs, respectively. Environments map variables to either types ฯ„ or inaccessibility tags โ€ข; the latter is used to support a๏ฌƒnity, discussed shortly. 1:12 David Darais, Chang Liu, Ian Sweet, and Michael Hicks ฮณ โˆˆ env โ‰” var โ‡€ V ฯƒ โˆˆ store โ‰” addr โ‡€ V โˆ— ฯ‚ โˆˆ con๏ฌg F he, ฮณ , ฯƒ i | HALT(v, ฮณ , ฯƒ ) ฮฑ โˆˆ addr โ‰” N v โˆˆ V F ฮน โ„“ | ฮฑ | hv, vi PJยทK : pico โ†’ env โ‡€ val PJxK(ฮณ ) โ‰” ฮณ (x) PJxK(ฮน โ„“ ) โ‰” ฮน โ„“ ฮณ ; ฯƒ โŠข a ึ‰q v ; ฯƒ CompO CompI Aop AsNO AsNI AsB FlipO FlipI Use Rev MuxI MuxO Tup Arr Read Write โŠข po ึ‰1 Iโ„“ ; ฯƒ when Oโ„“ = PJpK(ฮณ ) o โŠขp ึ‰1 Oโ„“ ; ฯƒ when Iโ„“ = PJpK(ฮณ ) โŠข p1 โŠ™ p2 ึ‰1 JโŠ™K(PJp1 K(ฮณ ), PJp2 K(ฮณ )) ; ฯƒ โŠข asnat(p) ึ‰1 0โ„“ ; ฯƒ when Oโ„“ = PJpK(ฮณ ) โŠข asnat(p) ึ‰1 1โ„“ ; ฯƒ when Iโ„“ = PJpK(ฮณ ) โŠข asbit(p) ึ‰1 (n % 2)โ„“ ; ฯƒ when n โ„“ = PJpK(ฮณ ) ฯ โŠข flip ึ‰1/2 OS ; ฯƒ ฯ โŠข flip ึ‰1/2 IS ; ฯƒ โŠข use(x) ึ‰1 ฮณ (x) ; ฯƒ โŠข reveal(x) ึ‰1 ฮณ (x) ; ฯƒ โŠข mux(p1, p2 , p3 ) ึ‰1 hPJp2 K(ฮณ ), PJp3 K(ฮณ )i ; ฯƒ when Iโ„“ = PJp1 K(ฮณ ) โŠข mux(p1, p2 , p3 ) ึ‰1 hPJp3 K(ฮณ ), PJp2 K(ฮณ )i ; ฯƒ when Oโ„“ = PJp1 K(ฮณ ) โŠข hp1 , p2 i ึ‰1 hPJp1 K(ฮณ ), PJp2 K(ฮณ )i ; ฯƒ N โŠข array (p1, . . . , p N ) ึ‰1 ฮฑ ; ฯƒ [ฮฑ 7โ†’ PJp1 K(ฮณ ) . . . PJp N K(ฮณ )] when ฮฑ = fresh(ฯƒ ) ฮณ ; ฯƒ โŠข p1 [p2 ] ึ‰1 ฯƒ (ฮฑ)[n] ; ฯƒ when ฮฑ = PJp1 K(ฮณ ), n P = PJp2 K(ฮณ ) ฮณ ; ฯƒ โŠข p1 [p2 ] โ† p3 ึ‰1 ฯƒ (ฮฑ)[n] ; ฯƒ [ฮฑ 7โ†’ ฯƒ (ฮฑ)[n 7โ†’ PJp3 K(ฮณ )]] when ฮฑ = PJp1 K(ฮณ ), n P = PJp2 K(ฮณ ) ฮณ ฮณ ฮณ ฮณ ฮณ ฮณ ฮณ ฮณ ฮณ ฮณ ฮณ ฮณ ฮณ ฮณ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ;ฯƒ ฯ‚ q Atom ฮณ ;ฯƒ โŠขa ึ‰ v ;ฯƒ ha, ฮณ , ฯƒ i LetT q โ€ฒ q โ€ฒ HALT(v, ฮณ , ฯƒ ) Let ฮณ ;ฯƒ โŠขa ึ‰ v ;ฯƒ hlet x โ‰” a in e, ฮณ , ฯƒ i q IfI q he, ฮณ [x 7โ†’ v], ฯƒ โ€ฒi he, ฮณ [x 1 7โ†’ v 1 , x 2 7โ†’ v 2 ], ฯƒ โ€ฒi ฮณ ; ฯƒ โŠข a ึ‰q IP ; ฯƒ โ€ฒ hif p then e 1 else e 2 , ฮณ , ฯƒ i IfO q he 1 , ฮณ , ฯƒ โ€ฒi q he 2 , ฮณ , ฯƒ โ€ฒi ฮณ ; ฯƒ โŠข a ึ‰q OP ; ฯƒ โ€ฒ hif p then e 1 else e 2 , ฮณ , ฯƒ i Fig. 5. Sampling Semantics for L obliv ฯ‚ โ€ฒ ฮณ ; ฯƒ โŠข a ึ‰q hv 1 , v 2 i ; ฯƒ โ€ฒ hlet x 1 , x 2 โ‰” a in e, ฮณ , ฯƒ i q A Language for Probabilistically Oblivious Computation ฯ ฯ ฯ„ โˆˆ type F bitโ„“ | natโ„“ | flipฯ | array(ฯ„ ) | ฯ„ ร— ฯ„ โ€ข ฮ“ โˆˆ tenv โ‰” var โ‡€ type K : type โ†’ kind ฯ ฯ K(bitโ„“ ) โ‰” U K(natโ„“ ) โ‰” U โ€ข 1:13 โ€ข ฯ„ โˆˆ type F ฯ„ | โ€ข ฮบ โˆˆ kind F U | A โ€ข ฯ„ โŠโ€ข UโŠA K(ฯ„1 ร— ฯ„2 ) โ‰” K(ฯ„1 ) โŠ” K(ฯ„2 ) K(flipฯ ) โ‰” A K(array(ฯ„ )) โ‰” U Fig. 6. Type and Kind Language for L obliv At a high level, the type system is enforcing three properties: (1) No type errors occur at runtime (e.g., operating on an array as if it were a number). (2) No secrets can be inferred from adversary-visible information. (3) No probabilistic correlation forms between secrets and publicly revealed random numbers. Properties (1) and (2) are enforced using standard techniques. For example, no type-correct program can operate on an array as if it were a number because rule Aop only types expression p1 โŠ™ p2 when p1 and p2 are numbers (not arrays). Moreover, this operation correctly captures the in๏ฌ‚uence of secret information by annotating the result typeโ€™s security label with โ„“1 โŠ” โ„“2 , the join of the labels of p1 and p2 . (Recall that S โŠ” โ„“ = S for all โ„“.) Likewise, the rules ensure that array indexes and conditionals do not leak information improperly. Property (3) is the main novelty of this work, and its need arises from L obliv โ€™s support for random numbers that are used to enforce secrecy but can be later be seen by the adversary. A key invariant is that coin ๏ฌ‚ips, which have type flipฯ , always have the following properties: (1) Their distribution is independent of other ๏ฌ‚ip values. (2) Their distribution is stable, meaning the probability of each possible bit value O or I is 1/2. The type system only allows creating, manipulating, and eliminating values at ๏ฌ‚ip type in ways that preserve properties (1) and (2). In particular, property (1) is maintained by treating ๏ฌ‚ip values as a๏ฌƒne, which prevents their duplication, and property (2) is maintained by tracking probability regions of ๏ฌ‚ip values as they are combined and used in computations. A๏ฌƒnity. To enforce non-duplicability, when an a๏ฌƒne variable is used by the program, its type is removed from the output environment. Figure 6 de๏ฌnes kinding metafunction K that assigns a type either the kind U (freely duplicatable) or A (non-duplicatable). Arrays, nats, and bits are always universal, and ๏ฌ‚ips are always a๏ฌƒne; a pair is considered a๏ฌƒne if either of its components is. Rule VarU in Figure 7 types universally-kinded variables; the output environment ฮ“ is the same as the input environment. Rule VarA types an a๏ฌƒne variable by marking it โ€ข in the output environment. This rule is su๏ฌƒcient to rule out the ๏ฌrst problematic example in Section 3.4. There are a few other rules that are a๏ฌ€ected by a๏ฌƒnity. Rules Use and Reveal permit converting flipฯ types to bits via the use and reveal coercions, respectively. The ๏ฌrst converts a flipฯ to ฯ ฯ a bitS and does not make x inaccessible, while the second converts to a bitP and does make it inaccessible. In essence, the type system is enforcing that any random number is made adversaryvisible at most once; secret copies (that are never themselves revealed) are allowed. Arrays are permitted to contain a๏ฌƒne or universal values. Only in the latter case is it safe to read out an array element directly, since in the former it would become immediately inaccessible. Hence rule Read requires that array element type ฯ„ have kind U. Rule Write applies to all arrays: 1:14 David Darais, Chang Liu, Ian Sweet, and Michael Hicks ฮ“ โŠขe :ฯ„ ; ฮ“ VarU K(ฮ“(x)) = U VarA ฮ“ โŠข x : ฮ“(x) ; ฮ“ K(ฮ“(x)) = A LitB ฮ“ โŠข x : ฮ“(x) ; ฮ“[x 7โ†’ โ€ข] ฯ LitN AsN ฮ“ โŠข n โ„“ : natโŠฅ โ„“ ; ฮ“ Rev ฯ ฮ“(x) = flipฯ ฮ“ โŠข p1 : natโ„“11 ; ฮ“ โ€ฒ ฯ โŠ”ฯ ฯ ฮ“ โ€ฒ โŠข p2 : bitโ„“22 ; ฮ“ โ€ฒโ€ฒ ฮ“ โ€ฒโ€ฒ โŠข p3 : bitโ„“33 ; ฮ“ โ€ฒโ€ฒโ€ฒ ฯ โŠ”ฯ โŠ”ฯ U ฯ ฮ“ โ€ฒ โŠข p2 : natโ„“22 ; ฮ“ โ€ฒโ€ฒ ฮ“ โŠข p1 โŠ™ p2 : natโ„“11โŠ”โ„“22 ; ฮ“ โ€ฒโ€ฒ ฯ ฮ“ โŠข p1 : bitโ„“11 ; ฮ“ โ€ฒ ฯ ฮ“ โŠข use(x) : bitS ; ฮ“ ฯ ฯ ฯ โŠ”ฯ โŠ”ฯ ฮ“ โŠข mux(p1 , p2 , p3 ) : bitโ„“11โŠ”โ„“22โŠ”โ„“33 ร— bitโ„“11โŠ”โ„“22โŠ”โ„“33 ; ฮ“ โ€ฒโ€ฒโ€ฒ ฯ ฮ“ โŠข p1 : bitโ„“ 1 ; ฮ“ โ€ฒ MuxFlip ฮ“ โ€ฒ โŠข p2 : flipฯ 2 ; ฮ“ โ€ฒโ€ฒ ฯ1 โŠฅ โŠฅ ฯ2 ฯ1 โŠฅ โŠฅ ฯ3 ฮ“ โ€ฒโ€ฒ โŠข p3 : flipฯ 3 ; ฮ“ โ€ฒโ€ฒโ€ฒ A ฮ“ โŠข mux(p1, p2 , p3 ) : flipฯ 2 โŠ”ฯ 3 ร— flipฯ 2 โŠ”ฯ 3 ; ฮ“ โ€ฒโ€ฒโ€ฒ ฮ“ โŠข p1 : ฯ„1 ; ฮ“ โ€ฒ ฮ“ โ€ฒ โŠข p2 : ฯ„2 ; ฮ“ โ€ฒโ€ฒ ฮ“ โŠข hp1 , p2 i : ฯ„1 ร— ฯ„2 ; ฮ“ ฮ“ โŠข p1 : array(ฯ„ ) ; ฮ“ โ€ฒ โ€ฒโ€ฒ ฮ“ โ€ฒ โŠข p2 : natโŠฅ P ; ฮ“ โ€ฒโ€ฒ Arr K(ฯ„ ) = U Write ฮ“ โŠข p1 [p2 ] : ฯ„ ; ฮ“ โ€ฒโ€ฒ Let LetT ฯ ฮ“ โŠข asbit(p) : bitโ„“ ; ฮ“ โ€ฒ Use ฮ“ โŠข p โ—ฆ : flipฯ ; ฮ“ โ€ฒ Aop ฮ“ โŠข reveal(x) : bitโŠฅ P ; ฮ“[x 7โ†’ โ€ข] Read ฮ“ โŠข p : natโ„“ ; ฮ“ โ€ฒ ฮ“ โŠข p : flipฯ ; ฮ“ โ€ฒ Comp ฮ“(x) = flipฯ Tup AsB ฮ“ โŠข asnat(p) : natโ„“ ; ฮ“ โ€ฒ ฮ“ โŠข flipฯ () : flipฯ ; ฮ“ MuxBit ฯ ฮ“ โŠข p : bitโ„“ ; ฮ“ โ€ฒ ฯ,โŠฅ Flip ฮ“ โŠข b โ„“ : bitโŠฅ โ„“ ; ฮ“ ฮ“ โŠข a : ฯ„1 ; ฮ“ โ€ฒ ฮ“0 โŠข ฮ“nโˆ’1 โŠข pn : ฯ„ ; ฮ“n N array (p1, .., p N ) : array(ฯ„ ) ฮ“ โŠข p1 : array(ฯ„ ) ; ฮ“ โ€ฒ โ€ฒโ€ฒ ฮ“ โ€ฒ โŠข p2 : natโŠฅ P ; ฮ“ ฮ“ โ€ฒโ€ฒ โŠข p3 : ฯ„ ; ฮ“ โ€ฒโ€ฒโ€ฒ ฮ“ โŠข p1 [p2 ] โ† p3 : ฯ„ ; ฮ“ โ€ฒโ€ฒโ€ฒ ฮ“ โ€ฒ โŠŽ [x 7โ†’ ฯ„1 ] โŠข e : ฯ„2 ; ฮ“ โ€ฒโ€ฒ โŠŽ [x 7โ†’ ] ฮ“ โŠข let x โ‰” a in e : ฯ„2 ; ฮ“ โ€ฒโ€ฒ ฮ“ โŠข a : ฯ„1 ร— ฯ„2 ; ฮ“ โ€ฒ ฮ“ โ€ฒ โŠŽ [x 1 7โ†’ ฯ„1 , x 2 7โ†’ ฯ„2 ] โŠข e : ฯ„3 ; ฮ“ โ€ฒโ€ฒ โŠŽ [x 1 7โ†’ , x 2 7โ†’ ] ฮ“ โŠข let x 1 , x 2 โ‰” a in e : ฯ„3 ; ฮ“ โ€ฒโ€ฒ If ; ฮ“N โ€ฒ ฮ“ โŠข p : bitโŠฅ P ; ฮ“ ฮ“ โ€ฒ โŠข e 1 : ฯ„1 ; ฮ“1โ€ฒโ€ฒ ฮ“ โ€ฒ โŠข e 2 : ฯ„2 ; ฮ“2โ€ฒโ€ฒ ฮ“ โŠข if p then e 1 else e 2 : ฯ„1 โŠ” ฯ„2 ; ฮ“1โ€ฒโ€ฒ โŠ” ฮ“2โ€ฒโ€ฒ Fig. 7. Typing Judgment for L obliv A Language for Probabilistically Oblivious Computation 1:15 the returned value is the old one (just as with a read), and the written one serves as its immediate replacement, guaranteeing the store remains well-typed. Finally, note that di๏ฌ€erent variables could be made inaccessible in di๏ฌ€erent branches of a conditional, so If types each branch in the same initial context, but then joins their the output contents; if a variable is made inaccessible by one branch, it will be inaccessible in the joined environment. Probability regions. Now we consider the role of probability regions ฯ in the type system. Probability regions are a partially ordered set. The purpose of regions is to track ๏ฌne-grained, dynamic probabilistic dependencies between values. Regions must be a distributive lattice with a least element โŠฅ. A distributive lattice must support both join โŠ” and meet โŠ“ operations, and meets must distribute through joins, that is: ฯ 1 โŠ“ (ฯ 2 โŠ” ฯ 3 ) = (ฯ 1 โŠ“ ฯ 2 ) โŠ” (ฯ 1 โŠ“ ฯ 3 ). We notate the meet of two โŠฅ ฯ 2 , which we call region independence. Distributivity is regions being bottom ฯ 1 โŠ“ ฯ 2 = โŠฅ as ฯ 1 โŠฅ necessary for a conjunction of region independence to coincide with region independence for the join, that is: ฯ 1 โŠฅ โŠฅ ฯ2 โˆง ฯ1 โŠฅ โŠฅ ฯ 3 โ‡โ‡’ ฯ 1 โŠฅ โŠฅ (ฯ 2 โŠ” ฯ 3 ). Rule Flip types a coin ๏ฌ‚ip. The region annotation ฯ is a static name for coin ๏ฌ‚ips generated at this (so-annotated) program point. The region must not be โŠฅ because โŠฅ represents independence from all random values, and a coin ๏ฌ‚ip is dependent on itself. When created, a coin ๏ฌ‚ip is independent โŠฅ ฯ โ€ฒ, and that the distribution from any other value with an independent region, so ฯ โ€ฒ where ฯ โŠฅ is stable, meaning each possible bit value O and I has equal probability. Given this interpretation of the ๏ฌ‚ip type, we are able to typecheck the bit-complement of a value at ๏ฌ‚ip type as also having ๏ฌ‚ip type, given as rule Comp. Rules for literals LitB and LitN track the security label โ„“ of the literal, and are given probability region โŠฅ to signify they are probabilistically independent of all other random values. Rules Use and Reveal, mentioned above, crucially preserve the probability region ฯ from the input flipฯ on the output type. As such, the type system can track their potential dependence on other values. Rules AsN and AsB convert between bit and nat types, also preserving the region. Per rule Aop, the result type of an arithmetic operation is given the join of operand labels and the join of operand regions. In particular, joining the regions indicates that whatever correlates with p1 or p2 may also correlate with the result of the operation, which is a safe over-approximation of correlation for the result of any binary arithmetic operation which operates directly on values (i.e., not distributions of values). A critical feature of the type system is the handling of mux expressions, which are treated by rules MuxBit and MuxFlip for bit and ๏ฌ‚ip types, respectively. The mux rule for bits treats mux as a ternary bit operation, and takes the join of security labels and probability regions of each argument. The mux rule for ๏ฌ‚ip types is designed to avoid passing on any probabilistic dependence from the guard p1 to the resultsโ€”notice that the labels on the output pair of ๏ฌ‚ip types are ฯ 2 โŠ” ฯ 3 and not ฯ 1 โŠ” ฯ 2 โŠ” ฯ 3 . This is acceptable when the probability region ฯ 1 of the guard p1 is independent of the regions of the arguments, i.e., ฯ 1 โŠฅ โŠฅ ฯ 2 and ฯ 1 โŠฅ โŠฅ ฯ 3 . As such, any revelation of values in ฯ 1 will not a๏ฌ€ect the stability or independence of ฯ 2 or ฯ 3 . For example, the following program is well-typed: 1 2 3 4 5 6 let x = rndฯ0 in let y = rndฯ in let z = rndฯ in let s_x = use(x) in let ( r1 , r2 ) = mux (s_x = 0) y z in output (reveal x) ; 1:16 David Darais, Chang Liu, Ian Sweet, and Michael Hicks According to the MuxFlip rule, both r1 and r2 have type flipฯ โ€”there is no in๏ฌ‚uence from xโ€™s region ฯ 0 . This is as it should be: because y and z are probabilistically independent from x, the revelation of x on line 6 does not a๏ฌ€ect their stability. On other hand, rule MuxFlip prevents the second problematic example from Section 3.4 (page 9). In that example the mux on line 3 is disallowed because the region of the guard s_x = 0 is not independent of the region of its argument xโ€”they are the same. The remaining type rules handle tuples, arrays, let binding, and normal conditionals; we remark on a few important features of them. First, notice that Read and Write both require that the array index p2 has label P; this is important because we assume the adversary is able to observe array accesses. (It also avoids leaks due to programs accessing the array out of bounds.) Rule If similarly requires the guard p to have label P since the execution trace reveals which branch is taken. Second, both Let and LetT remove their bound variables from the output environment; we write ฮ“ โ€ฒโ€ฒ โŠŽ [x 7โ†’ ] to split a context into the part that binds x and ฮ“ โ€ฒโ€ฒ binds the rest; it is the latter part that is returned, dropping the x binding. 5 PROBABILISTIC MEMORY TRACE OBLIVIOUSNESS This section describes our proof of memory trace obliviousness for L obliv . We begin by presenting a model for distributions, probabilities, conditional probabilities, and probabilistic dependence. Next we give a denotational semantics based on this model, and which we prove coincides with the sampling semantics in Section 4.2. Equipped with a model for distributions and a denotational semantics we then state precisely the de๏ฌnition of memory trace obliviousness. To describe our proof approach, we proceed in more informal terms and describe the key semantic invariants which hold of the denotational semantics. These key invariants are su๏ฌƒcient to prove a strengthened memory trace obliviousness property, and this strengthened property implies the simpler property initially stated. Further details of the proof, including precise mathematical de๏ฌnitions and properties, are given in the Appendix. 5.1 Distributions We use a discrete model for distributions which are de๏ฌned over a ๏ฌxed universe with ๏ฌnite entropy. In our model, a distribution of elements x โˆˆ X in universe R is notated xฬƒ R . Here, R is the number of available coin ๏ฌ‚ips. So distributions are represented as a mapping from a bitvector bยฎ of length R to an element of X , that is: xฬƒ R โˆˆ BR โ†’ X . This domain supports modeling the result of a terminating computation which ๏ฌ‚ips an arbitrary, ๏ฌnite number of coins. Our model does not support nonterminating computations, especially those which may ๏ฌ‚ip an in๏ฌnite number of coins. As an example, suppose we want yฬƒ R to represent the distribution of the count of coin ๏ฌ‚ips that have come up O. Thus yฬƒ R is a function that takes a length-R vector of coin ๏ฌ‚ips and returns a natural number that sums the occurrences of O in the vector.   We de๏ฌne a probability measure for distributions p xฬƒ R = x by counting the occurrences of   x in xฬƒ R and dividing by 2R . So for our example, the probability p yฬƒ R = 2 when R = 2 would be 41 . The model BR โ†’ X for distributions is particularly useful for expressing a measure for   conditional probability. Conditional probabilities for distributions p xฬƒ R = x yฬƒ R = y are de๏ฌned by counting simultaneous occurrences of x in xฬƒ R and y in yฬƒ R and dividing by occurrences of y in yฬƒ R . Conditional probabilities are therefore a derived notion, as opposed to an axiomatic notion, as is typically the case when modeling distributions as xฬƒ โˆˆ X โ†’ [0..1]. When the universe R is not informative, we will omit it and just write xฬƒ. We notate joint probabilities as p [xฬƒ = x โˆง yฬƒ = y]. We notate point distributions โŒŠxโŒ‹ where p [โŒŠxโŒ‹ = x] = 1. A Language for Probabilistically Oblivious Computation 1:17 Key to our approach is careful bookkeeping of a set of coin ๏ฌ‚ips ฮธ โˆˆ โ„˜(N โ‰คR ) upon which all information observable to the adversary depends. We notate probabilistic dependency xฬƒ โ‹‰ ฮธ and prove that if two random variables xฬƒ and yฬƒ depend on disjoint sets of coin ๏ฌ‚ips ฮธ 1 โˆฉ ฮธ 2 = ยœ then they are probabilistically independent, written xฬƒ โŠฅ โŠฅ yฬƒ, which means their joint probability factors: p [xฬƒ = x โˆง yฬƒ = y] = p [xฬƒ = x] p [yฬƒ = y]. We will often notate a probability conditioned on some ฮธ as p [xฬƒ = x | ฮธ ] = q, which is the probability that xฬƒ = x no matter the values of each of the coin ๏ฌ‚ips in ฮธ . We notate probabilistic dependency conditioned on a set of coin ๏ฌ‚ips ฮธ modulo ฮธ โ€ฒ as xฬƒ โ‹‰ ฮธ โ€ฒ ฮธ , and probabilistic independence modulo ฮธ as xฬƒ โŠฅ โŠฅ ฮธ yฬƒ. We call two distributions xฬƒ 1 and xฬƒ 2 equivalent, notated xฬƒ 1 โ‰ˆ xฬƒ 2 , when their probability measures coincide for all elements, that is โˆ€x . p [xฬƒ 1 = x] = [xฬƒ 2 = x]. We call xฬƒ 1 and xฬƒ 2 equivalent modulo ฮธ , notated xฬƒ 1 โ‰ˆ ฮธ xฬƒ 2 , when their probability measures coincide for all elements conditioned on ฮธ , that is โˆ€x . p [xฬƒ 1 = x | ฮธ ] = p [xฬƒ 2 = x | ฮธ ]. Another key invariant in our proof will regard a distributionโ€™s stability, notated stable [xฬƒ]. Stability is the property that each outcome of a distribution is equally likely, that is โˆ€x 1 x 2 . p [xฬƒ = x 1 ] = p [xฬƒ = x 2 ]. We call a distribution xฬƒ stable modulo ฮธ , notated stable [xฬƒ | ฮธ ], when it is stable conditioned on ฮธ , that is โˆ€x 1 x 2 . p [xฬƒ = x 1 | ฮธ ] = p [xฬƒ = x 2 | ฮธ ]. 5.2 Denotational Semantics To facilitate the proof of memory trace obliviousness for L obliv , we de๏ฌne a denotational semantics over distributions, and which we prove corresponds with the sampling semantics de๏ฌned previously in Section 4. We de๏ฌne the denotational semantics in two parts, an evaluation semantics for expressions, notated EJยทK, and a trace semantics for expressions, notated T JยทK. The evaluation semantics EJยทK denotes an expression e to a partial function from distributions of environments ฮณฬƒ and stores ฯƒฬƒ to distributions of values vฬƒ, environments ฮณฬƒ โ€ฒ and stores ฯƒฬƒ โ€ฒ. Recall that a con๏ฌguration ฯ‚ is an expression, a (non-distributional) environment, and a store, while an execution trace t is a sequence of con๏ฌgurations. The trace semantics T JยทK then denotes an expression to a partial function from distributions of environments ฮณฬƒ and stores ฯƒฬƒ to distributions of traces tหœ. e ร— eg g โ‡€V g EJยทK : exp โ†’ eg nv ร— store nv ร— store โˆ— ยž g โ‡€ con๏ฌg T JยทK : exp โ†’ eg nv ร— store The semantics is partial due to the possibility of runtime type errors. However, type safety (proved later) guarantees that the denotational semantics is total for well-typed expressions. Theorem 5.1 (Sampling and Denotation Correspondence). The sampling semantics ฯ‚ q ฯ‚ and the denotational semantics T JยทK correspond, that is for ฯ‚ 1 โ‰” he 1 , ฮณ 1 , ฯƒ1 i and ฯ‚ N โ‰” HALT(v, ฮณ N , ฯƒ N ): If: Then: ฯ‚ 1 q1 ยท ยท ยท qN ฯ‚ N and tหœ โ‰” T Je 1 K(โŒŠฮณ 1 โŒ‹, โŒŠฯƒ1 โŒ‹) รŽ qn p tหœ = ฯ‚ 1 . . . ฯ‚ N = n โˆˆ{1..n } 5.3 Memory Trace Obliviousness The design of L obliv is such that well typed programs have the property of Memory Trace Obliviousness (MTO). We state and prove MTO with respect to an adversary that is able to observe the memory and instruction access pattern of the execution. The MTO theorem establishes that the adversary learns nothing from these observations. 1:18 David Darais, Chang Liu, Ian Sweet, and Michael Hicks Theorem 5.2 (Memory Trace Obliviousness (MTO)). Given a well typed L obliv expression e and two value environments ฮณ 1 and ฮณ 2 which are both well-formed and agree on public values, then the publicly observable traces of executing e using ฮณ 1 or ฮณ 2 yields equivalent distributions, that is: If: Then: ฮ“ โŠข e : ฯ„ ; ฮ“ โ€ฒ and ฮ“ โŠข ฮณ 1 and ฮ“ โŠข ฮณ 2 f JeK(โŒŠฮณ 1 โŒ‹, ยœ)) โ‰ˆ obs(T f JeK(โŒŠฮณ 2 โŒ‹, ยœ)) obs(T and obs(ฮณ 1 ) = obs(ฮณ 2 ) We de๏ฌne the public observations of a value, environment, store or con๏ฌguration using obs (see f Section 4.2), and notate its lifting to distributions as obs. 5.4 Proof outline This section outlines the key ideas and invariants required for the proof of MTO. We provide further mathematical detail of de๏ฌnitions and key properties in the Appendix. The ๏ฌrst property we prove is type safety, which shows that the partial denotation functions are actually total under the assumption that the term is well typed. Theorem 5.3 (Type Safety). Given a well-typed L obliv expression e, and distributions of value environments ฮณฬƒ and value stores ฯƒฬƒ which are well-formed, then the evaluation semantics EJeK is always de๏ฌned, and the result is well-formed, that is: If: Then there exists: Such that: ฮ“ โŠข e : ฯ„ ; ฮ“ โ€ฒ and ฮ“ ; ฮฃ โŠข ฮณฬƒ ฮฃ โ€ฒ, vฬƒ, ฮณฬƒ โ€ฒ and ฯƒฬƒ โ€ฒ EJeK(ฮณฬƒ , ฯƒฬƒ ) = hvฬƒ, ฮณฬƒ โ€ฒ, ฯƒฬƒ โ€ฒi and and ฮฃ โ€ฒ โŠข vฬƒ ฮฃ โŠข ฯƒฬƒ and ฮ“ โ€ฒ ; ฮฃ โ€ฒ โŠข ฮณฬƒ โ€ฒ and ฮฃ โ€ฒ โŠข ฯƒฬƒ โ€ฒ We then prove type safety for the trace semantics as a consequence of type safety for the evaluation semantics. The next step in the proof is to: (1) Give a semantics to regions which appear in types; and (2) Relate this semantics for regions to the evaluation semantics We achieve (1) by de๏ฌning a region semantics, notated RJยทK, which when applied to a con๏ฌguration ฯ‚, produces a map from regions ฯ to the concrete set of coin ๏ฌ‚ips ฮธ that occurred at a flipฯ () (i.e., with that region annotation) during the evaluation of ฯ‚. We call this map a region model, notated ฮพ . A key invariant of the region model is that disjoint regions map to disjoint sets, that is: โˆ€ฯ 1 ฯ 2 . ฯ 1 โŠ“ ฯ 2 = โŠฅ โ‡’ ฮพ (ฯ 1 ) โˆฉ ฮพ (ฯ 2 ) = ยœ. We achieve (2) in two parts. First, we ๏ฌrst de๏ฌne a dependency semantics, notated DJยทK, which maps con๏ฌgurations to (in the case of base types) a set of coin ๏ฌ‚ips ฮธ . This set over-approximates the ground-truth dependencies of the resulting value vฬƒ after conditioning on public revelations, which is given as a set of coin ๏ฌ‚ip dependencies ฮฆ, that is vฬƒ โ‹‰ ฮฆ ฮธ . The desired relationship between regions and values is that whenever an expression annotated with region ฯ evaluates to a value vฬƒ, then the dependency set ฮธ predicted by the dependency semantics DJยทK is included in the set of coin ๏ฌ‚ips associated with the region model, that is vฬƒ โ‹‰ ฮฆ ฮธ โІ ฮพ (ฯ). We make each of these steps precise as theorems used in the (๏ฌnal) proof. Theorem 5.4 (Dependency Soundness). Given a well-typed L obliv expression e and distributions of value environments ฮณฬƒ and value stores ฯƒฬƒ which are well-formed w.r.t. models for dependencies in the environment and store respectively, conditioned on the set of publicly revealed bits ฮฆ, then the result of the dependency semantics DJยทK is well-formed w.r.t. the results of the evaluation semantics EJยทK conditioned on some equal or larger set of publicly revealed bits ฮฆโ€ฒ . A Language for Probabilistically Oblivious Computation 1:19 Theorem 5.5 (Region Soundness). Given a well-typed L obliv expression e and distributions of value environments ฮณฬƒ and value stores ฯƒฬƒ which are well-formed w.r.t. a region model ฮพ conditioned on the set of publicly revealed bits ฮฆ, then the result of the region semantics RJยทK is well-formed w.r.t. the results of the dependency semantics DJยทK conditioned on some equal or larger set of publicly revealed bits ฮฆโ€ฒ . The primary purpose of the region semantics, the dependency semantics, and their soundness โŠฅ ฯ 2 , then their comproperties is to establish that when terms are typed at disjoint regions ฯ 1 โŠฅ โŠฅ vฬƒ 2 . We now turn to the two key invariants puted values will be probabilistically independent vฬƒ 1 โŠฅ that justify memory trace obliviousness in the presence of reveal(p) expressions: partitioning and stability. We say that evaluation contexts hฮณฬƒ , ฯƒฬƒ i are well-partitioned if and only if any two bit distribution values bฬƒ1 and bฬƒ2 at type flip occurring at di๏ฌ€erent positions in the evaluation context are guaranteed to be independent of each other, conditioned on publicly revealed information ฮฆ, that โŠฅ ฮฆ bฬƒ2 . We prove a theorem that the evaluation semantics preserves well partitioning, conis bฬƒ1 โŠฅ ditioned on public information. Theorem 5.6 (Well-partitioning). Given a well-typed L obliv expression e and distributions of value environments ฮณฬƒ and value stores ฯƒฬƒ where every contained flip value is well-partitioned w.r.t. other flip values conditioned on the set of publicly revealed bits ฮฆ, then the result of the evaluation semantics EJยทK is well-partitioned for some equal or larger set of publicly revealed bits ฮฆโ€ฒ . The key part of the proof of well-partitioning is for reveal(p) expressions. Before the revelation, it is assumed all ๏ฌ‚ip values are well partitioned. Immediately after the reveal expressions, ๏ฌ‚ip values will remain well-partitioned, but conditioned on a larger set of publicly revealed bits ฮฆโ€ฒ , to which the publicly revealed ๏ฌ‚ip is added. In subsequent execution, the publicly revealed bit may end up correlating with ๏ฌ‚ip values (e.g. as a result of a public if expression), however because partitioning is quotiented by publicly revealed bits, this correlation ends up being benign. The mechanism in the type system that enforces this semantic property of well-partitioning is the a๏ฌƒne treatment of values at type flip; because flip values cannot be duplicated, there will always only be one copy of each coin ๏ฌ‚ip in the context, and therefore each ๏ฌ‚ip value will be independent of other ๏ฌ‚ip values. We de๏ฌne stability also as a property of evaluation contexts hฮณฬƒ , ฯƒฬƒ i, such that any two bit distribution values bฬƒ at type flip in the evaluation context (either ฮณฬƒ or ฯƒฬƒ ) are hguaranteed to be stable distrii butions conditioned on publicly revealed information, that is: stable bฬƒ ฮฆ . We prove a theorem that the evaluation semantics EJยทK preserves stability, again conditioned on public information. Theorem 5.7 (Stability). Given a well-typed L obliv expression e and distributions of value environments ฮณฬƒ and value stores ฯƒฬƒ where every contained flip value is stable conditioned on the set of publicly revealed bits ฮฆ, then the result of the evaluation semantics EJยทK is stable conditioned for some equal or larger set of publicly revealed bits ฮฆโ€ฒ . The proof of stability uses the proof of partitioning as a lemma. The key part of the proof is for reveal(p) expressions. Before the revelation, it is assumed all ๏ฌ‚ip values are stable. Immediately after the revelation, it must be shown that all other coin ๏ฌ‚ips remain stable. This is a consequence of well-partitioning, which guarantees that the revealed coin ๏ฌ‚ip will not correlate with any other coin ๏ฌ‚ip, and therefore adding the revealed bit to the set of public information does not further perturb the remaining stable coin ๏ฌ‚ips in the context. The mechanism in the type system which enforces the semantic property of stability is the typing rules for bit complement and mux. Bit complement is safe w.r.t. stability, which we prove, 1:20 David Darais, Chang Liu, Ian Sweet, and Michael Hicks and the mux rule is stable under the conditions of region independence, which in turn imply that the underlying distributions of values are probabilistically independent. Other than public revelation, these are the only two language forms which manipulate coin ๏ฌ‚ips, and their typing rules guarantee that resulting coin ๏ฌ‚ips will remain stable. In order to prove the desired memory trace obliviousness property, we state a stronger property which implies the desired property, but which supports a direct proof by induction on the term. This stronger trace obliviousness property includes all of the assumptions for each of the above lemmas, so each lemma can be applied in each case of the proof by induction, for which we show the high-level details. Theorem 5.8 (Strong Memory Trace Obliviousness (SMTO)). Given a well-typed L obliv expression e and satisfying properties from the above lemmas applied to each of two sets of distribution value environments and stores hฮณฬƒ 1 , ฯƒฬƒ1 i and hฮณฬƒ 2 , ฯƒฬƒ2 i, and where each of ฮณฬƒ 1 and ฮณฬƒ 2 and ฯƒฬƒ1 and ฯƒฬƒ2 are distributed equally for publicly observable values conditioned on publicly revealed bits ฮฆ (i.e., f (ฮณฬƒ 1 ) โ‰ˆ ฮฆ obs f (ฮณฬƒ 2 ) and obs f (ฯƒฬƒ1 ) โ‰ˆ ฮฆ obs f (ฯƒฬƒ2 )), then the observable traces for e applied to either set obs of contexts hฮณฬƒ 1 , ฯƒฬƒ1 i or hฮณฬƒ 2 , ฯƒฬƒ2 i will yield identical distributions conditioned on publicly revealed bits ฮฆ f JeK(ฮณฬƒ 1 , ฯƒฬƒ1 )) โ‰ˆ ฮฆ obs(T f JeK(ฮณฬƒ 2 , ฯƒฬƒ2 ))). (i.e., obs(T Proof. We prove this theorem by induction on the syntax for terms, and by applying each other theorem developed thus far. For example, for let expressions, the proof goal is of the form: f Jlet x โ‰” a in eK(ฮณฬƒ 1 , ฯƒฬƒ1 )) โ‰ˆ obs(T ฮฆ f Jlet x โ‰” a in eK(ฮณฬƒ 2 , ฯƒฬƒ2 )) obs(T From the de๏ฌnition of the trace semantics T JยทK, this goal becomes: f ฮณฬƒ โ€ฒโ€ฒ ) โŠ— obs( f ฯƒฬƒ โ€ฒ) + f JeK(ฮณฬƒ โ€ฒโ€ฒ , ฯƒฬƒ โ€ฒ)) โ‰ˆ โŒŠeโŒ‹ โŠ— obs( + obs(T 1 1 e 1 1 ฮฆ f ฮณฬƒ โ€ฒโ€ฒ ) โŠ— obs( f ฯƒฬƒ โ€ฒ) + f JeK(ฮณฬƒ โ€ฒโ€ฒ , ฯƒฬƒ โ€ฒ)) โŒŠeโŒ‹ โŠ— obs( + obs(T 2 2 e 2 2 e where hvฬƒ, ฮณฬƒiโ€ฒ, ฯƒฬƒiโ€ฒi โ‰” EJaK(ฮณฬƒi , ฯƒฬƒi ), ฮณฬƒiโ€ฒโ€ฒ โ‰” ฮณฬƒiโ€ฒ [x 7โ†’ vฬƒ], and โŠ— and + + are product and concatenation operations respectively lifted to distributions. This goal is broken down using the product chain rule for distributions, which states, using our notation and in the case of three elements: p[xฬƒ โŠ— yฬƒ โŠ— zฬƒ = hx, y, zi] = p[xฬƒ = x]p[yฬƒ = y | xฬƒ = x]p[zฬƒ = z | xฬƒ = x โˆง yฬƒ = y] In the case that two elements of a tuple are independent, then it factors without conditioning, as per the de๏ฌnition of independence. Using the product chain rule, in order to show the two distributions in the goal are equivalent, it su๏ฌƒces to show each component of the three-tuple is independent of other elements of the threef ฮณฬƒ โ€ฒโ€ฒ ) โŠฅ f ฯƒฬƒ โ€ฒ)), that each element of the three-tuple is equivalent to its pairwise tuple (e.g. obs( โŠฅ obs( 1 1 โ€ฒโ€ฒ f f ฮณฬƒ โ€ฒโ€ฒ)), and that the recursive occurrence of the trace is equivalent element (e.g. obs(ฮณฬƒ 1 ) โ‰ˆ ฮฆ obs( 2 pairwise conditioned on the three-tuple. That is, after establishing independence of elements in the three-tuple, it su๏ฌƒces to show: h i h i f ฮณฬƒ โ€ฒโ€ฒ ) โ‰ˆ ฮฆ p obs( f ฮณฬƒ โ€ฒโ€ฒ ) (1) p obs( 1 2 h i h i f ฯƒฬƒ โ€ฒ) โ‰ˆ ฮฆ p obs( f ฮณฬƒ โ€ฒโ€ฒ ) (2) p obs( 1 2 h i h i โ€ฒโ€ฒ โ€ฒ f f f ฯƒฬƒ โ€ฒ) โ‰ˆ ฮฆ p obs(T f JeK(ฮณฬƒ โ€ฒโ€ฒ , ฯƒฬƒ โ€ฒ )) obs( f ฮณฬƒ โ€ฒโ€ฒ ) โˆง obs( f ฯƒฬƒ โ€ฒ) (3) p obs(T JeK(ฮณฬƒ 1 , ฯƒฬƒ1 )) obs(ฮณฬƒ 1โ€ฒโ€ฒ ) โˆง obs( 1 2 2 2 2 Goals (1) and (2) are consequences of partitioning and stability theorems. Goal (3) is further re๏ฌned based on the observation that the new contexts hฮณฬƒ 1โ€ฒโ€ฒ , ฯƒฬƒ1โ€ฒi and hฮณฬƒ 2โ€ฒโ€ฒ, ฯƒฬƒ2โ€ฒ i depend uniquely on an equal or larger set of publicly revealed bits ฮฆโ€ฒ under which the contexts remain well-partitioned and stable. It is therefore su๏ฌƒcient to condition on this (potentially) larger set of publicly revealed bits A Language for Probabilistically Oblivious Computation ฮฆโ€ฒ , and demonstrate equivalence of distributions module ฮฆโ€ฒ , that is: h i h f JeK(ฮณฬƒ โ€ฒโ€ฒ , ฯƒฬƒ โ€ฒ)) ฮฆโ€ฒ โ‰ˆ ฮฆโ€ฒ p obs(T f JeK(ฮณฬƒ โ€ฒโ€ฒ , ฯƒฬƒ โ€ฒ )) p obs(T 1 1 2 2 1:21 ฮฆโ€ฒ i At this point, the inductive hypothesis applies and the proof for let is complete. The proofs for let on tuples and public if statements follow the same structure, and are analogous.  After proving SMTO, we recover a proof of MTO as an instantiation of SMTO with the empty ฯƒ = โŒŠยœโŒ‹ and the empty set of publicly revealed bits ฮฆ = {}. store b 6 CASE STUDY We have implemented a type checker for an extension to L obliv that adds functions, (bounded) recursion, and various arithmetic operations. We have used it to check two classical probabilistically oblivious algorithms: non-recursive ORAM (NORAM) and tree-based ORAMs. These were ๏ฌrst mentioned in Section 3.2, where we used NORAM as a building block to implement an oblivious stack. In this section, we discuss the implementation of both NORAM and tree ORAM, where the latter makes use of the former. In what follows, we write nat S to be a secret number in region โŠฅ; nat P for a public number in โŠฅ; nat R to be a secret in some region R. We also write type rnd R to be a random natural number in region R; in our implementation we encode these using tuples of flip Rs. 6.1 Non-recursive ORAM A non-recursive ORAM (NORAM) is the foundation all tree-based ORAMs. Such NORAMs provide the state-of-the-art in performance, and enable e๏ฌƒcient oblivious data structures. A NORAM organizes data blocks as a complete tree of depth log N where N is the capacity of the ORAM. Each node on the tree is a bucket, which is essentially a trivial ORAM of size b, which we call the bucket size. A trivial ORAM is basically an array in which reads and writes require iterating through each element in the array; we showed the trivial ORAM add operation in Section 2.2. Each NORAM data block bucket associated with a randomly generated position tag, which is a log N -bit random number, corresponding to one leaf of the tree. A key invariant of a tree-based NORAM is that each data block always resides in a bucket somewhere on the path from the root to the leaf corresponding to its position tag. In particular, we have the following signature: type noram R R' = (bucket R R ') array type bucket = ( block R R ') array type block R R' = bit R โˆ— nat R โˆ— nat R โˆ— (rnd R' โˆ— rnd R ') where R โŠฅ โŠฅ R' A NORAM is an array of 2N โˆ’ 1 buckets which represent a complete tree in the style of a heap data structure: for the node at index i โˆˆ {0, ..., 2N โˆ’ 2}, its parents, left child, and right child correspond to the nodes at index (i โˆ’1)/2, 2i +1, and 2i +2, respectively. Each bucket is an array of blocks, each of which is a 4-tuple, where the last element is the actual data. Ideally, an NORAM should be able to store data of an arbitrary type ฮฑ, but since our language does not yet support polymorphism we ๏ฌx the data to type rnd R' โˆ— rnd R' where R and R' are independent. We choose this type to illustrate the a๏ฌƒne values can be stored in the NORAM, and to set up our implementation of Tree ORAM next. (In our actual interpreter, we duplicate the code for each type we wish to store.) The other three components of the block are all secret and in region R; they are (1) a bit indicating whether the block is dummy or not; (2) the index of the block; and (3) the position tag for the block. NORAM supports two primitives, rr and add, which we introduced (in greater generality) in Section 3.2. Their signatures for our implementation are: 1:22 David Darais, Chang Liu, Ian Sweet, and Michael Hicks rr : noram R R' โ†’ ( idx : nat R) โ†’ (tag :nat P) โ†’ (data :rnd R' โˆ— rnd R ') add: noram R R' โ†’ ( idx : nat R) โ†’ (tag : nat R) โ†’ (data :rnd R' โˆ— rnd R ') โ†’ unit Due to the NORAM invariant, when the position tag corresponding to a block is known, rr can be implemented as a linear scan through the path corresponding to the tag to ๏ฌnd the block with the given index. In doing so, log N buckets are accessed, each with b blocks. Therefore, the rr routine can be implemented in O(b log N ) time. In the state-of-the-art ORAM constructions, such as Circuit ORAM [Wang et al. 2015], b can be parameterized as a constant (e.g., 4), which renders the overall time complexity of rr to be O(log N ), which is much faster than linear scanning over a trivial ORAM. Here is the code: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 let rr (noram:noram R R') ( idx :nat R) (tag : nat P) : rnd R 'โˆ— rnd R' = let noram_cap = (length(noram) + 1) / 2 in let bucket_size = length(noram[0]) in let rec read_bucket bucket ( idx : nat R) ( i : nat P) (read : rnd R 'โˆ— rnd R ') = if i =bucket_size then read else (โˆ— read out the current block โˆ—) let isdummy, blk_idx, pos_tag, data = (bucket[i ] โ† ( true , 0, 0, mk_dummy())) in (โˆ— check if the current block is nonโˆ’dummy and its index matches the queried one โˆ—) let toswap:bit R = isdummy && blk_idx = idx in let data, read = mux toswap read data in let isdummy, _ = mux toswap false isdummy in (โˆ— when toswap is false , this is equivalent to writting the data back ; otherwise , read stores the found block ' s data field , and is passed into the next iteration โˆ—) let _ = (bucket[i ] โ† (isdummy, blk_idx, pos_tag, data) ) in read_bucket bucket idx ( i +1) read in let rec read_level ( level : nat P) (read : nat R) = let base :Nat P = (pow 2 level ) โˆ’ 1 in (โˆ— compute the first index into the bucket array at depth level โˆ—) if base >= length (noram) then read else let bucket_index:Nat P = base + (tag & base) in (โˆ— the bucket on the path to access โˆ—) let bucket = noram[bucket_index] in let read = readBucket bucket idx 0 read in read_level ( level + 1) read in let read = mk_dummy () in read_level 0 read The implementation involves two nested loops: read_level (line 18-26) implements the outer loop, which iterates through all buckets on the path from the root to the leaf corresponding to tag; and read_bucket (line 4-17) iterates through all blocks in a bucket (this is essentially a Trivial ORAM read). Here are some things to notice. First, the NORAM itself is an array of arrays, and since array addresses are non-a๏ฌƒne, we can read out noram[0] directly (line 3). On the other hand, buckets contain a๏ฌƒne blocks (the data part), so we must replace a read block with a dummy one, as shown on lines 8 and 15. On line 10, toswap is computed to determine whether to swap out the block, i.e., whether its index matches the queried one. Line 10 muxes on toswap and picks either the blockโ€™s data, or the argument read, which are each pairs of type rnd R' โˆ— rnd R' . While toswap is in region R, the pairs are in independent region R' , so rule MuxFlip ensures the returned value is still in R' . If we were to store non-random data in the NORAM, we would require it to be in region R for this code to type check. A Language for Probabilistically Oblivious Computation 1:23 The add routine of NORAM is also simple: it adds the data into the bucket corresponding to the root node of the tree, which is the bucket at index 0 in the array. This is similar to the read_bucket routine above, so we omit its implementation. To avoid over๏ฌ‚owing the rootโ€™s bucket due to repeated adds, a tree-based ORAM employs an additional eviction routine to evict blocks in the buckets of NORAM nodes closer to the leaf buckets. This routine should also maintain the key invariant: each data block should always reside on the path corresponding to its position tag. Di๏ฌ€erent tree-based ORAM implementations di๏ฌ€er only in their choices of b and the eviction strategies. One simple eviction strategy picks random nodes at each level of the tree, reads a single non-empty block from its bucket, and then writes that block one level further down either to the left or right; a dummy block is written in the opposite direction to make the operation oblivious. 6.2 Tree-based (recursive) ORAM To use tree-based NORAM we need a way to get the position tag for reads and writes. A tree-based recursive ORAM employs an additional position map to solve this issue. Such a map PM maps any index i โˆˆ 0..N , where N is the capacity of ORAM, to randomly generated position tag, which will be given to the rr and add routines of NORAM. The Tree ORAM tree_rr routine will ๏ฌrst access PM to get the position tag, and invoke NORAMโ€™s rr routine to retrieve the data block. As mentioned in Section 3.2, one way to implement the position map is to just use a regular array stored in hidden memory, e.g., on-chip in a secure processor deployment of ORAM. However, this is not possible for MPC-based deployments, the adversary can observe the access pattern on the map itself. To avoid this problem, we can use another smaller Tree-based ORAM to store PM. In particular, the ORAM PM has N /c blocks, where each block contain c elements, where c โ‰ฅ 2 is a parameter of the ORAM. Therefore, PM also contains another position map PM โ€ฒ , which can be stored as an ORAM of capacity N /c 2 . Such a construction can continue recursively, until the position map at the bottom is small enough to be constructed as a Trivial ORAM. Therefore, there are logc N NORAMs constructed to store those position maps, and thus the overall runtime of a recursive ORAM is logc N times of the runtime of a NORAM. In the following, we implement the ORAM with c = 2.3 A full ORAM thus has the type oram, given below. 1 2 3 type oram R R' = (( noram R R') array ) โˆ— trivial_oram R R' type trivial_oram R R' = ( to_block R R ') array type to_block R R' = bit R โˆ— nat R โˆ— (rnd R' โˆ— rnd R ') where R โŠฅ โŠฅ R' In short, an ORAM is a sequence of NORAMs, where the ๏ฌrst in the sequence contains the actual data, and the remainder serve as the position map, which eventually terminate with a trivial ORAM. A trivial ORAM is simply an array of blocks which contain the isdummy ๏ฌ‚ag, the index, and the data (recall that trivial ORAMs themselves do not use position tags in their implementations). The data is a pair (i.e., c = 2) of position tags. The main idea is to think of the position map as essentially an array of size N but โ€œstoredโ€ as a 2-D array: array[N/2][2]. In doing so, to access PM[idx], we essentially access PM[idx/2][idx mod 2]. We implement the tree_rr as a call to the function tree_rr_rec , which takes an additional public level argument, to indicate at which point in the list of NORAMs to start its work; itโ€™s initially called with level 0. 1 2 3 let rec tree_rr_rec (oram:oram R R') ( idx : nat R) ( level : nat P) : (rnd R' โˆ— rnd R ') = let (norams,tr_oram) = oram in let levels :nat P = length(norams) in 3 We present a readable, almost-correct version of the code ๏ฌrst, and give the full picture in Section 6.3. 1:24 4 5 6 7 8 9 10 11 David Darais, Chang Liu, Ian Sweet, and Michael Hicks if ( level >= levels ) then ... (โˆ— do trivial ORAM case, returning block (rnd R' โˆ— rnd R ') โˆ—) else let ( r0 , r1) : rnd R' โˆ— rnd R' = tree_rr_rec oram (idx /2) ( level +1) in let r0 ', tag = mux ((idx mod 2) = 0) (rnd R' () ) r0 in let r1 ', tag = mux ((idx mod 2 ) = 1) tag r1 in let _ = tree_add_rec oram (idx /2) ( level +1) ( r0 ', r1 ') in rr norams[level] idx (reveal tag) let tree_rr (oram:oram R R') ( idx : nat R) : (rnd R' โˆ— rnd R ') = tree_rr_rec oram idx 0 Line 4 checks whether we have hit the base case of the recursion, in which case we lookup idx in the tr_oram, returning back a rnd R' โˆ— rnd R' pair (code not shown). Otherwise, we enter the recursive case. Here, line 6 essentially reads out PM[idx/2], and lines 7 and 8 obliviously read out PM[idx/2][idx mod 2] into tag, replacing it with a freshly generated tag, to satisfy the a๏ฌƒnity requirement. Finally, line 8 writes the updated block PM[idx/2] back (i.e., ( r0 ', r1 ') ), using an analogous tree_add_rec routine, for which a level can be speci๏ฌed. Finally, line 9 reveals the retrieved position tag for index idx , so that it can be passed into the rr routine of NORAM. Level 0 corresponds to the actual data of the ORAM, which is returned to the client. The tree_add routine is similar so we do not show it all. As with tree_rr it recursively adds the corresponding bits of the position tag into the array of NORAMs. At each level of the recursion there is a snippet like the following: 1 2 3 4 5 6 7 let new_tag = rnd R' () in let sec_tag = use new_tag in (โˆ— does NOT consume new_tag โˆ—) let ( r0 , r1 ) : rnd R' โˆ— rnd R' = tree_rr_rec oram (idx /2) ( level +1) in let r0 ', tag = mux ((idx mod 2) = 0) new_tag r0 in (โˆ— replaces with new tag โˆ—) let r1 ', tag = mux ((idx mod 2 ) = 1) tag r1 in let _ = tree_add_rec oram (idx /2) ( level +1) ( r0 ', r1 ') in add norams[level] idx sec_tag data (โˆ— adds to Tree ORAM โˆ—) Lines 1 and 2 generate a new tag, and make a secret copy of it. The new tag is then stored in the recursive ORAMโ€”lines 3โ€“5 are similar to tree_add_rec but replace the found tag with new_tag, not some garbage value, at the appropriate level of the position map (line 6). Finally, sec_tag is used to store the data in the appropriate level of the NORAM. 6.3 Limitations The astute reader may have noticed that the code snippet for add will not type check. In particular, the sec_tag argument has type nat R' but add requires it to have type R. This is because the position tags for the NORAM at level are stored as the data of the NORAM at level +1, and these are in di๏ฌ€erent regions. We cannot put them in the same region because we require a single NORAMโ€™s metadata and data to reside in di๏ฌ€erent regions. We can solve this problem by having each level use the opposite pair of regions as the one above it. This solves the type error and does not compromise the NORAM independence requirement. Unfortunately, it means our oram type de๏ฌnition is made a bit more awkward, essentially it will be 1 type oram R R' = (( noram R R' โˆ— noram R' R) array) โˆ— trivial_oram R R' Basically, tree_rr_rec will have to operate two levels at a time in order to satisfy the type checker, but the basic logic will be the same. In addition, tree_rr_rec and tree_rr require the type of idx to be nat S, i.e., probability region โŠฅ rather than R. Because โŠฅ โŠ‘ R and โŠฅ โŠ‘ R' in the region lattice, idx can be passed to rr at both of the unrolled levels, one of which requires it to be R and the other, R' . A more unfortunate limitation is that we cannot implement an NORAM on which we can also implement an oblivious stack. To see why, consider the rr operation implemented above, but with A Language for Probabilistically Oblivious Computation 1:25 the data having type nat R โˆ— rnd R' , as required for an oblivious stack (the ๏ฌrst component is the stack elementโ€™s value, and the second is the position tag of the stackโ€™s next element). The issue is that the stack elementโ€™s position tag is from the same region as the position tags in the underlying NORAM, which violates the independence requirement of the mux on line 11 of rr . However, this violation is a false positive: While the tags happen to be in the same region, they are actually independentโ€”no tagโ€™s generation is conditioned on any otherโ€™s value, and the same tag is never stored in the same block. Indeed, using the more general NORAM signature presented in Section 3.2, L obliv โ€™s type system con๏ฌrms that the stack in Figure 3 is secure. Checking the implementation of the stack and the NORAM end-to-end likely requires a more ๏ฌne-grained, generative treatment of regions and the use of existential types. Such features may simplify the solution to recursion problem as well. We are pursuing them in ongoing work. 7 RELATED WORK Lampson ๏ฌrst pointed out various covert, or โ€œside,โ€ channels of information leakage during a programโ€™s execution [Lampson 1973]. Defending against side-channel leakage is challenging. Previous works have attempted to thwart such leakage from various angles: โ€ข Processor architectures that mitigate leakage through timing [Kocher et al. 2004; Liu et al. 2012], power consumption [Kocher et al. 2004], or memory-traces [Fletcher et al. 2014; Liu et al. 2015; Maas et al. 2013; Ren et al. 2013]. โ€ข Program analysis techniques that formally ensure that a program has bounded or no leakage through instruction traces [Molnar et al. 2006], timing channels [Agat 2000; Molnar et al. 2006; Russo et al. 2006; Zhang et al. 2012, 2015], or memory traces [Liu et al. 2015, 2013, 2014]. โ€ข Algorithmic techniques that transform programs and algorithms to their side-channel-mitigating or side-channel-free counterparts while introducing only mild costs โ€“ e.g., works on mitigating timing channel leakage [Askarov et al. 2010; Barthe et al. 2010; Zhang et al. 2011], and on preventing memory-trace leakage [Blanton et al. 2013; Eppstein et al. 2010; Goldreich 1987; Goldreich and Ostrovsky 1996; Goodrich et al. 2012; Shi et al. 2011; Stefanov et al. 2013; Wang et al. 2015, 2014; Zahur and Evans 2013]. Often, the most e๏ฌ€ective and e๏ฌƒcient is through a comprehensive co-design approach combining these areas of advances โ€“ in fact, several aforementioned works indeed combine (a subset of) algorithms, architecture, and programming language techniques [Fletcher et al. 2014; Liu et al. 2015; Ren et al. 2013; Zhang et al. 2012, 2015]. Our core language not only generalizes a line of prior works on timing channel security [Agat 2000], program counter security [Molnar et al. 2006], and memory-trace obliviousness [Liu et al. 2015, 2013, 2014], but also provides the ๏ฌrst distinct core language that captures the essence of memory-trace obliviousness without treating key mechanismsโ€”notably, the use of randomnessโ€” as a black box. Thus we can express state-of-the-art algorithmic results and formally reason about the security of their implementations, thus building a bridge between algorithmic and programming language techniques. ObliVM [Liu et al. 2015] is a language for programming oblivious algorithms intended to be run as secure multiparty computations [Yao 1986]. Its type system also employs a๏ฌƒne types to ensure random numbers are used at most once. However, there it provides no mechanism to disallow constructing a non-uniformly distributed random number. When such random numbers are generated, they can be distinguished by an attacker from uniformly distributed random numbers when being revealed. Therefore, the type system in ObliVM does not guarantee obliviousness. L obliv โ€™s use of probability regions enforces that all random numbers are uniformly random, and thus eliminates 1:26 David Darais, Chang Liu, Ian Sweet, and Michael Hicks this channel of information leakage. Moreover, we prove that this mechanism (and the others in L obliv ) are su๏ฌƒcient to prove PMTO. Our work belongs to a large category of work that aims to statically enforce noninterference, e.g., by typing [Sabelfeld and Myers 2006; Volpano et al. 1996]. Our probabilistic memory trace obliviousness property bears some resemblance to probabilistic notions of noninterference. Much prior work [Ngo et al. 2014; Russo and Sabelfeld 2006; Sabelfeld and Sands 2000; Smith 2003] is concerned with how random choices made by a thread scheduler could cause the distribution of visible events to di๏ฌ€er due to the values of secrets. Here, the source of nondeterminism is the (external) scheduler, rather than the program itself, as in our case. Smith and Alpรญzar [2006, 2007] consider how the in๏ฌ‚uence of random numbers may a๏ฌ€ect the likelihood of certain outcomes, mostly being concerned with termination channels. Their programming model is not as rich as ours, as a secret random number is never permitted to be made public; such an ability is the main source of complexity in L obliv , and is crucial for supporting oblivious algorithms. Some prior work aims to quantify the information released by a (possibly randomized) program (e.g., Kรถpf and Rybalchenko [2013]; Mu and Clark [2009]) according to entropy-based measures. Work on verifying the correctness of di๏ฌ€erentially private algorithms [Barthe et al. 2013; Zhang and Kifer 2017] essentially aims to bound possible leakage; by contrast, we enforce that no information leaks due to a programโ€™s execution. 8 CONCLUSIONS This paper has presented L obliv , a core language suitable for expressing computations whose execution should be oblivious to a powerful adversary who can observe an executionโ€™s trace of instructions and memory accesses, but not see private values. Unlike prior formalisms, L obliv can be used to express probabilistic algorithms whose security depends crucially on the use of randomness. To do so, L obliv tracks the use of randomly generated numbers via a substructural (a๏ฌƒne) type system, and employs a novel concept called probability regions. The latter are used to track a random numberโ€™s probabilistic (in)dependence on other random numbers. We have proved that together these mechanisms ensure that a random numberโ€™s revelation in the visible trace does not perturb the distribution of possible events so as to make secrets more likely. We have demonstrated that L obliv โ€™s type system is powerful enough to accept sophisticated algorithms, including forms of oblivious RAMs and oblivious data structures. Such data structures were out of the reach of prior type systems. As such, our proof-of-concept implementations represent the ๏ฌrst automated proofs that these algorithms are secure. We are currently pursuing two threads of ongoing work. First, we are working on a more powerful notion of probability region that is ๏ฌner grained so as to accept oblivious data structure algorithms, end to end. Second, we are working to expand the general expressiveness of the language. For example, to support containers requires some form of parametric polymorphism, and to support some deployments of ORAM requires bit-width polymorphism, implementable with dependent types. Ultimately we hope to integrate our ideas into ObliVM [Liu et al. 2015], a stateof-the-art compiler for oblivious algorithms, and thereby ensure that well-typed programs are indeed secure. ACKNOWLEDGMENTS We thank Aseem Rastogi and Kesha Heitala for comments on earlier drafts of this paper, and Elaine Shi for helpful suggestions and comments on the work while it was underway. This material is based upon work supported by the National Science Foundation under Grant Nos. CNS-1563722, A Language for Probabilistically Oblivious Computation 1:27 CNS-1314857, and CNS-1111599, and by DARPA under contracts FA8750-15-2-0104 and FA875016-C-0022. Any opinions, ๏ฌndings, and conclusions or recommendations expressed in this material are those of the author and do not necessarily re๏ฌ‚ect the views of the National Science Foundation. REFERENCES Johan Agat. 2000. Transforming out Timing Leaks. In POPL. Aslan Askarov, Danfeng Zhang, and Andrew C. Myers. 2010. Predictive black-box mitigation of timing channels. In CCS. Gilles Barthe, Boris Kรถpf, Federico Olmedo, and Santiago Zanella Bรฉguelin. 2013. Probabilistic Relational Reasoning for Di๏ฌ€erential Privacy. ACM Trans. Program. Lang. Syst. 35, 3 (2013), 9:1โ€“9:49. Gilles Barthe, Tamara Rezk, Alejandro Russo, and Andrei Sabelfeld. 2010. Security of multithreaded programs by compilation. ACM Transactions on Information and System Security (TISSEC) 13, 3 (2010), 21. Marina Blanton, Aaron Steele, and Mehrdad Alisagari. 2013. Data-oblivious Graph Algorithms for Secure Computation and Outsourcing. In ASIA CCS. David Brumley and Dan Boneh. 2003. Remote Timing Attacks Are Practical. In USENIX Security. D. Dolev and A. C. Yao. 1981. On the Security of Public Key Protocols. In Proceedings of the 22nd Annual Symposium on Foundations of Computer Science (SFCS). David Eppstein, Michael T. Goodrich, and Roberto Tamassia. 2010. Privacy-preserving data-oblivious geometric algorithms for geographic data. In GIS. Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Marten van Dijk, Omer Khan, and Srinivas Devadas. 2014. Suppressing the Oblivious RAM timing channel while making information leakage and program e๏ฌƒciency trade-o๏ฌ€s. In HPCA. J.A. Goguen and J. Meseguer. 1982. Security policy and security models. In IEEE S & P. O. Goldreich. 1987. Towards a theory of software protection and simulation by oblivious RAMs. In STOC. O. Goldreich, S. Micali, and A. Wigderson. 1987. How to play ANY mental game. In STOC. Oded Goldreich and Rafail Ostrovsky. 1996. Software protection and simulation on oblivious RAMs. J. ACM (1996). Michael T. Goodrich, Olga Ohrimenko, and Roberto Tamassia. 2012. Data-Oblivious Graph Drawing Model and Algorithms. CoRR abs/1209.0756 (2012). Matt Hoekstra. 2015. Intel SGX for Dummies (Intel SGX Design Objectives). https://software.intel.com/en-us/blogs/2013/09/26/protecting-application-secrets-with-intel-sgx. (2015). Mohammad Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Rami๏ฌcation, Attack and Mitigation. In Network and Distributed System Security Symposium (NDSS). Paul Kocher, Ruby Lee, Gary McGraw, and Anand Raghunathan. 2004. Security As a New Dimension in Embedded System Design. In Proceedings of the 41st Annual Design Automation Conference (DAC โ€™04). 753โ€“760. Moderator-Ravi, Srivaths. Paul C. Kocher. 1996. Timing Attacks on Implementations of Di๏ฌƒe-Hellman, RSA, DSS, and Other Systems. In CRYPTO. Boris Kรถpf and Andrey Rybalchenko. 2013. Automation of quantitative information-๏ฌ‚ow analysis. In Formal Methods for Dynamical Systems. Butler W. Lampson. 1973. A Note on the Con๏ฌnement Problem. Commun. ACM (1973). Chang Liu, Austin Harris, Martin Maas, Michael Hicks, Mohit Tiwari, and Elaine Shi. 2015. GhostRider: A HardwareSoftware System for Memory Trace Oblivious Computation. In ASPLOS. Chang Liu, Michael Hicks, and Elaine Shi. 2013. Memory Trace Oblivious Program Execution. In CSF. Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, and Michael Hicks. 2014. Automating E๏ฌƒcient RAM-Model Secure Computation. In IEEE S & P. Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, and Elaine Shi. 2015. ObliVM: A Programming Framework for Secure Computation. In IEEE S & P. Isaac Liu, Jan Reineke, David Broman, Michael Zimmer, and Edward A. Lee. 2012. A PRET microarchitecture implementation with repeatable timing and competitive performance. In ICCD. Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Kriste Asanovic, John Kubiatowicz, and Dawn Song. 2013. Phantom: Practical Oblivious Computation in a Secure Processor. In CCS. David Molnar, Matt Piotrowski, David Schultz, and David Wagner. 2006. The Program Counter Security Model: Automatic Detection and Removal of Control-๏ฌ‚ow Side Channel Attacks. In ICISC. Chunyan Mu and David Clark. 2009. An abstraction quantifying information ๏ฌ‚ow over probabilistic semantics. In Workshop on Quantitative Aspects of Programming Languages (QAPL). Tri Minh Ngo, Mariรซlle Stoelinga, and Marieke Huisman. 2014. E๏ฌ€ective veri๏ฌcation of con๏ฌdentiality for multi-threaded programs. Journal of computer security 22, 2 (2014). Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, and Srinivas Devadas. 2013. Design space exploration and optimization of path oblivious RAM in secure processors. In ISCA. 1:28 David Darais, Chang Liu, Ian Sweet, and Michael Hicks Alejandro Russo, John Hughes, David A. Naumann, and Andrei Sabelfeld. 2006. Closing Internal Timing Channels by Transformation. In Annual Asian Computing Science Conference (ASIAN). Alejandro Russo and Andrei Sabelfeld. 2006. Securing interaction between threads and the scheduler. In CSF-W. A. Sabelfeld and A. C. Myers. 2006. Language-based Information-๏ฌ‚ow Security. IEEE J.Sel. A. Commun. 21, 1 (Sept. 2006). Andrei Sabelfeld and David Sands. 2000. Probabilistic noninterference for multi-threaded programs. In CSF-W. Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, and Mingfei Li. 2011. Oblivious RAM with O ((log N )3 ) Worst-Case Cost. In ASIACRYPT. Geo๏ฌ€rey Smith. 2003. Probabilistic noninterference through weak probabilistic bisimulation. In CSF-W. Geo๏ฌ€rey Smith and Rafael Alpรญzar. 2006. Secure Information Flow with Random Assignment and Encryption. In Workshop on Formal Methods in Security (FMSE). Geo๏ฌ€rey Smith and Rafael Alpรญzar. 2007. Fast Probabilistic Simulation, Nontermination, and Secure Information Flow. In PLAS. Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. 2013. Path ORAM โ€“ an Extremely Simple Oblivious RAM Protocol. In CCS. G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. 2003. AEGIS: architecture for tamper-evident and tamper-resistant processing. In ICS. David Lie Chandramohan Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell, and Mark Horowitz. 2000. Architectural support for copy and tamper resistant software. SIGOPS Oper. Syst. Rev. 34, 5 (Nov. 2000). Dennis Volpano, Cynthia Irvine, and Geo๏ฌ€rey Smith. 1996. A Sound Type System for Secure Flow Analysis. J. Comput. Secur. 4, 2-3 (Jan. 1996). Xiao Wang, Hubert Chan, and Elaine Shi. 2015. Circuit ORAM: On tightness of the Goldreich-Ostrovsky lower bound. In CCS. Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang. 2014. Oblivious Data Structures. In CCS. Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In FOCS. Samee Zahur and David Evans. 2013. Circuit Structures for Improving E๏ฌƒciency of Security and Privacy Tools. In S & P. Danfeng Zhang, Aslan Askarov, and Andrew C. Myers. 2011. Predictive Mitigation of Timing Channels in Interactive Systems. In CCS. Danfeng Zhang, Aslan Askarov, and Andrew C. Myers. 2012. Language-based Control and Mitigation of Timing Channels. In PLDI. Danfeng Zhang and Daniel Kifer. 2017. LightDP: Towards Automating Di๏ฌ€erential Privacy Proofs. In POPL. Danfeng Zhang, Yao Wang, G. Edward Suh, and Andrew C. Myers. 2015. A Hardware Design Language for Timing-Sensitive Information-Flow Security. In ASPLOS. Xiaotong Zhuang, Tao Zhang, and Santosh Pande. 2004. HIDE: an infrastructure for e๏ฌƒciently protecting information leakage on the address bus. SIGARCH Comput. Archit. News 32, 5 (Oct. 2004). A Language for Probabilistically Oblivious Computation A APPENDIX 1:29 1:30 David Darais, Chang Liu, Ian Sweet, and Michael Hicks x xยฎN xยฎN xฬƒ R i ฮธ โˆˆX โˆˆ XN โˆˆ Xโˆ— eR โ‰” BR โ†’ X โˆˆX โˆˆ idxN โ‰” {1, .., N } โˆˆ dep โ‰” โ„˜(N) Notation for elements x of a parameterized set X Sequence of elements X of length N Sequence of elements X of some length N Distributions of elements X over R coin ๏ฌ‚ips Index into sequences of length N Probabilistic Dependency Set n   o bยฎ xฬƒ bยฎ = x c [xฬƒ = x] p [xฬƒ = x] โ‰” 2R eR X c [xฬƒ = x] โ‰” c[ยท = ยท] : โˆ€R X . ร—X โ†’ N eR ร— X โ†’ Q p[ยท = ยท] : โˆ€R X . X c[ยท = ยท โˆง ยท = ยท] : โˆ€R X 1 X 2 . p[ยท = ยท โˆง ยท = ยท] : โˆ€R X 1 X 2 . p[ยท = ยท | ยท = ยท] : โˆ€R X 1 X 2 . eR ร— X 1 ร— X eR ร— X 2 โ†’ N X 1 2 R e ร— X1 ร— X eR ร— X 2 โ†’ Q X 1 2 eR ร— X 1 ร— X eR ร— X 2 โ†’ Q X 1 2 o     xฬƒ 1 bยฎ = x 1 โˆง xฬƒ 2 bยฎ = x 2 c [xฬƒ 1 = x 1 โˆง xฬƒ 2 = x 2 ] p [xฬƒ 1 = x 1 โˆง xฬƒ 2 = x 2 ] โ‰” 2R c [xฬƒ 1 = x 1 โˆง xฬƒ 2 = x 2 ] p [xฬƒ 1 = x 1 | xฬƒ 2 = x 2 ] โ‰” c [xฬƒ 2 = x 2 ] c [xฬƒ 1 = x 1 โˆง xฬƒ 2 = x 2 ] โ‰” n bยฎ eR ร— N eR โ†’ N eR ยทe โŠ™ ยท : โˆ€R. N g : โˆ€R X . e eR ร— X eR โ†’ X eR cond BR ร— X R R R e e eR ร— X eR e mux g : โˆ€R X . B ร— X ร— X โ†’ X      ยฎ JโŠ™K nฬƒ 1 bยฎ , nฬƒ 2 bยฎ nฬƒ 1 e โŠ™ ยทnฬƒ 2 โ‰” ฮปb.     ๏ฃฑ ๏ฃด ๏ฃด ๏ฃฒxฬƒ 2 bยฎ if xฬƒ 1 bยฎ = O ยฎ g (xฬƒ 1 , xฬƒ 2 , xฬƒ 3 ) โ‰” ฮปb.     cond ๏ฃด ๏ฃดxฬƒ 3 bยฎ if xฬƒ 1 bยฎ = I ๏ฃณ D E g (xฬƒ 1 , xฬƒ 2 , xฬƒ 3 ) , cond g (xฬƒ 1 , xฬƒ 3 , xฬƒ 2 ) mux g (xฬƒ 1 , xฬƒ 2 , xฬƒ 3 ) โ‰” cond eR โŒŠยทโŒ‹ : โˆ€R X . X โ†’ X R eR sel[ยท] : โˆ€R X . idx โ†’ X eR โ†’ X eR+R โ€ฒ โ†‘หœ : โˆ€R R โ€ฒ X . X xฬƒ 1 โ‰ˆ xฬƒ 2 โ‰” xฬƒ 1 โ‰ˆ ฮธ xฬƒ 2 โ‰” stable [xฬƒ ฮธ ] โ‰” xฬƒ 1 โŠฅ โŠฅ xฬƒ 2 โ‰” xฬƒ โˆ ฮธ โ‰” โŒŠxโŒ‹ โ‰” sel[i] โ‰” โ†‘หœ xฬƒ R โ‰” ฮป . x ฮปbยฎR . bi โ€ฒ ฮปbยฎR+R . xฬƒ R (b1 . . . bR ) โˆ€x . p [xฬƒ 1 = x] = p [xฬƒ 2 = x] โˆ€x . p [xฬƒ 1 = x | ฮธ ] = p [xฬƒ 2 = x | ฮธ ] โˆ€x 1 x 2 . p [xฬƒ = x 1 | ฮธ ] = p [xฬƒ = x 2 | ฮธ ] โˆ€x 1 x 2 . p [xฬƒ 1 = x 1 โˆง xฬƒ 2 = x 2 ] = p [xฬƒ 1 = x 1 ] p [xฬƒ 2 = x 2 ] โˆ€i < ฮธ . xฬƒ โŠฅ โŠฅ sel[i] Fig. 8. Distributions A Language for Probabilistically Oblivious Computation ฮฑ โˆˆ addr โ‰” {0, 1, . . .} bR F ฮนฬƒ R ฮฑฬƒ R vbR โˆˆ V โ„“ b bR โ†’ V b โ†‘ : โˆ€R R โ€ฒ . V bR โŠŽ {โ€ข} ฮณbR โˆˆ env c R โ‰” var โ‡€ V   bR โˆ— ฯƒ R โˆˆ env b c R โ‰” addr โ‡€ V vbR , vbR b โ†‘ (หœฮน ) โ‰” โ†‘หœ (ฮนฬƒ) b โ†‘ (ฮฑฬƒ) โ‰” โ†‘Dหœ (ฮฑฬƒ) E b โ†‘ (hb v 1 , vb2 i) โ‰” b โ†‘b v1, b โ†‘b v2 R+R โ€ฒ โ€ฒ b โ†‘ : โˆ€R R โ€ฒ . env c R โ†’ env c R+R env b d R โ†’ store d R+R โ†‘ : โˆ€R R โ€ฒ . store store 1:31 โ€ฒ env  b โ†‘b ฮณ (x) โ‰” b โ†‘b ฮณ (x) ! store b โ†‘b ฯƒ (ฮฑ)n โ‰” b โ†‘b ฯƒ (ฮฑ)n d : โˆ€R. V bR ร— V bR ร— V bR โ‡€ V bR cond bR ร— V bR ร— V bR โ‡€ V bR ร— V bR mux d : โˆ€R. V   d bฬƒ โ„“ , ฮนหœ1 , ฮนหœ2 cond   d bฬƒ โ„“ , ฮฑฬƒ 1 , ฮฑฬƒ 2 cond   d bฬƒ โ„“ , hb cond v 11 , vb21 i , hb v 12 , vb22 i   mux d bฬƒ โ„“ , vb1, vb2 R g bR โ‡€ V bR join : โˆ€R. V   g bฬƒ, ฮนหœ1 , ฮนฬƒ 2 โ‰” cond   g bฬƒ, ฮฑฬƒ 1 , ฮฑฬƒ 2 โ‰” cond E D    d bฬƒ โ„“ , vb21, vb22 d bฬƒ โ„“ , vb11 , vb12 , cond โ‰” cond E D    d bฬƒ โ„“ , vb2, vb1 d bฬƒ โ„“ , vb1, vb2 , cond โ‰” cond     ยฎ ฮนหœหœ bยฎ bยฎ join ฮนหœหœ โ‰” ฮปb.      ยฎ ฮฑฬƒหœ bยฎ bยฎ join ฮฑฬƒหœ โ‰” ฮปb.   E  D   ยŸ join hb v 1 , vb2 i โ‰” join vbฬƒ1 , join vbฬƒ2 gR ร—N bR e R ร— store dR โ‡€ V read : โˆ€R. addr R g ร—N bR ร— store bR ร— store eR ร— V dR โ‡€ V dR read+write : โˆ€R. addr        ยฎ b read (ฮฑฬƒ, nฬƒ โ„“ , b ฯƒ ) โ‰” join ฮปb. ฯƒ ฮฑฬƒ bยฎ [nฬƒ bยฎ ] read+write (ฮฑฬƒ, nฬƒ โ„“ , vb, b ฯƒ ) โ‰” hread (ฮฑฬƒ, nฬƒ, b ฯƒ),b ฯƒ โ€ฒi     ๏ฃฑ ๏ฃด ยฎ = ฮฑ and nฬƒ bยฎ = n ฮฑฬƒ b v b if ๏ฃด ๏ฃฒ ยช ยฉ ยฎ     where b ฯƒ โ€ฒ(ฮฑ)[n] โ‰” join ยญฮปb. ยฎ ๏ฃด ยฎ ยฎ ฯƒ (ฮฑ)[n] if ฮฑฬƒ b , ฮฑ or nฬƒ b , n ๏ฃดb ยซ ยฌ ๏ฃณ Fig. 9. Domains 1:32 David Darais, Chang Liu, Ian Sweet, and Michael Hicks bR ร— env V cR โ€ฒ โ€ฒ bR โ€ฒ ร— env d R โ‡€ โˆƒR โ€ฒ . V dR EJยทK : atom โ†’ โˆ€R. env c R ร— store c R ร— store exp โ€ฒ โ€ฒ bR โ€ฒ ร— env d R โ‡€ โˆƒR โ€ฒ . V dR EJยทK : expr โ†’ โˆ€R. env c R ร— store c R ร— store EJยทK : pico โ†’ โˆ€R. env cR pico โ‡€ atom ฮณ ) โ‰” hb ฮณ (x), b ฮณi EJxK (b pico U EJxK (b ฮณ ) โ‰” hb ฮณ (x), b ฮณ [x 7โ†’ โ€ข]i pico EJpK (b ฮณ,b ฯƒ ) โ‰” hb v, b ฮณ โ€ฒ, b ฯƒ i where hb v, b ฮณ โ€ฒi โ‰” EJpK (b ฮณ) D   E D E pico atom โ—ฆ โ€ฒ g bฬƒ, โŒŠ0โŒ‹, โŒŠ1โŒ‹ , b EJp K (b ฮณ,b ฯƒ ) โ‰” cond ฮณ ,b ฯƒ ฮณ) bฬƒ, b ฮณ โ€ฒ โ‰” EJpK (b where atom EJp1 โŠ™ p2 K (b ฮณ,b ฯƒ ) โ‰” nฬƒ 1 e โŠ™ nฬƒ 2 , b ฮณ โ€ฒโ€ฒ, b ฯƒ atom EJฮน โ„“ K (b ฮณ ) โ‰” hโŒŠฮน โ„“ โŒ‹, b ฮณi pico L pico hnฬƒ 1 , b ฮณ โ€ฒi โ‰” EJp1 K (b ฮณ ) hnฬƒ 2 , b ฮณ โ€ฒโ€ฒ i โ‰” EJp2 K (b ฮณ โ€ฒ) D E D   E pico atom ย bฬƒ , b EJasnat(p)K (b ฮณ) bฬƒ, ฮณbโ€ฒ โ‰” EJpK (b ฮณ,b ฯƒ ) โ‰” asnat where ฮณ โ€ฒ, b ฯƒ D E pico atom g (nฬƒ) , b ฮณ,b ฯƒ ) โ‰” asbit where hnฬƒ, b ฮณ โ€ฒ i โ‰” EJpK (b ฮณ) ฮณ โ€ฒ, b ฯƒ EJasbit(p)K (b * + env store atom  ฯ EJflip K b ฮณ R, b ฯƒ R โ‰” sel[R + 1], b โ†‘b ฮณ R, b โ†‘b ฯƒR pico pico where โ„“ ฮณ,b ฯƒ ) โ‰” hb ฮณ (x), b ฮณ, b ฯƒi EJuse(x)K (b atom EJreveal(x)K (b ฮณ,b ฯƒ ) โ‰” hb ฮณ (x), b ฮณ [x 7โ†’ โ€ข], b ฯƒi atom ฮณ,b ฯƒ ) โ‰” hmux d (b v 1 , vb2, vb3 ) , b ฮณ โ€ฒโ€ฒโ€ฒ , b ฯƒi EJmux(p1, p2 , p3 )K (b atom hb v 1, b ฮณ โ€ฒ i โ‰” EJp1 K (b ฮณ) pico where hb v2, b ฮณ โ€ฒโ€ฒ i โ‰” EJp2 K (b ฮณ โ€ฒ) pico EJhp1 , p2 iK (b ฮณ,b ฯƒ ) โ‰” hhb v 1 , vb2 i , b ฮณ โ€ฒโ€ฒ, b ฯƒi atom where hb v1, b ฮณ โ€ฒi โ‰” EJp1 K (b ฮณ) pico hnฬƒ 1 , b ฮณ โ€ฒi โ‰” EJp1 K (b ฮณ) pico where hb v 2, b ฮณ โ€ฒโ€ฒโ€ฒ i โ‰” EJp2 K (b ฮณ โ€ฒโ€ฒ ) pico hb v2, b ฮณ โ€ฒโ€ฒ i โ‰” EJp2 K (b ฮณ โ€ฒ) pico hnฬƒ 2 , b ฮณ โ€ฒโ€ฒ i โ‰” EJp2 K (b ฮณ โ€ฒ) pico Fig. 10. Denotational Evaluation Semantics (1) A Language for Probabilistically Oblivious Computation 1:33 EJarrayN (p1 , . . . , p N )K (b ฮณ0, b ฯƒ ) โ‰” hโŒŠฮฑโŒ‹, b ฮณn , b ฯƒ [ฮฑ 7โ†’ [n 7โ†’ vbn ]]i atom hb vn , b ฮณn , i โ‰” EJpn K (b ฮณnโˆ’1 ) pico where ฮฑ โ‰” fresh (b ฯƒ) EJp1 [p2 ]K (b ฮณ,b ฯƒ ) โ‰” hread (b v 1 , vb2, b ฯƒ) ,b ฮณ โ€ฒโ€ฒ, b ฯƒi atom hb v1, b ฮณ โ€ฒi โ‰” EJp1 K (b ฮณ) pico where hb v2, b ฮณ โ€ฒโ€ฒ i โ‰” EJp2 K (b ฮณ โ€ฒ) pico EJp1 [p2 ] โ† p3 K (b ฮณ,b ฯƒ ) โ‰” hb v, b ฮณ โ€ฒโ€ฒโ€ฒ , b ฯƒ โ€ฒi atom hb v 1, b ฮณ โ€ฒ i โ‰” EJp1 K (b ฮณ ) hb v2, b ฮณ โ€ฒโ€ฒ i โ‰” EJp2 K (b ฮณ โ€ฒ ) hb v 3, b ฮณ โ€ฒโ€ฒโ€ฒ i โ‰” EJp2 K (b ฮณ โ€ฒโ€ฒ ) โ€ฒ hb v, b ฯƒ i โ‰” read+write (b v 1 , vb2, vb3, b ฯƒ) pico where pico pico EJaK (b ฮณ,b ฯƒ ) โ‰” EJaK (b ฮณ,b ฯƒ) exp atom EJlet x โ‰” a in eK (b ฮณ,b ฯƒ ) โ‰” EJeK (b ฮณ โ€ฒ [x 7โ†’ vb], b ฯƒ โ€ฒ) exp exp hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi โ‰” EJaK (b ฮณ, b ฯƒ) atom where ฮณ,b ฯƒ ) โ‰” EJeK (b ฮณ โ€ฒ [x 1 7โ†’ vb1 , x 2 7โ†’ vb2 ] , b ฯƒ โ€ฒ) EJlet x 1 , x 2 โ‰” a in eK (b exp exp hhb v 1, vb2 i , b ฮณ โ€ฒ, b ฯƒ โ€ฒ i โ‰” EJaK (b ฮณ,b ฯƒ) atom where EJif p then e 1 else e 2 K (b ฮณ,b ฯƒ ) โ‰” hb v, b ฮณ โ€ฒโ€ฒ, b ฯƒ โ€ฒi E D pico R vbR1 โŠ”R2 โ‰” ฮณ) vbR , ฮณbโ€ฒ โ‰” EJpK (b where E D exp R1 โŠ”R2 (x) โ‰” ฮณ โ€ฒ, b ฯƒ ) ฮณcโ€ฒโ€ฒ vb1R1 , b ฮณ 1R1 , b ฯƒ1R1 โ‰” EJe 1 K (b E D exp R โŠ”R โ€ฒ 1 2 (ฮฑ) โ‰” ฮณ โ€ฒ, b ฯƒ ) ฯƒb vb2R2 , b ฮณ 2R2 , b ฯƒ2R2 โ‰” EJe 2 K (b exp   d b cond โ†‘v, b โ†‘v 1 , b โ†‘v 2   d b cond โ†‘v, b โ†‘ฮณ 1 (x), b โ†‘ฮณ 2 (x)   d b cond โ†‘v, b โ†‘ฯƒ1 (ฮฑ), b โ†‘ฯƒ2 (ฮฑ) Fig. 11. Denotational Evaluation Semantics (2) 1:34 David Darais, Chang Liu, Ian Sweet, and Michael Hicks l โˆˆ loc F . . . source code locations . . . v โˆˆ V F ฮน โ„“ | ฮฑ | hv, vi ฮณ โˆˆ env โ‰” var โ‡€ V ฯƒ โˆˆ store โ‰” addr โ‡€ V โˆ— t โˆˆ trace โ‰” (loc ร— V ร— env ร— store)โˆ— R eR ร— X eR โ†’ XยŸ ยท โŠ— ยท : โˆ€R X 1 X 2 . X 1 ร— X2 1 2 fโˆ—R ร— X fโˆ— R โ†’ X fโˆ— e ยท+ + ยท : โˆ€R X . X  E D   ยฎ xฬƒ 1 bยฎ , xฬƒ 2 bยฎ xฬƒ 1 โŠ— xฬƒ 2 โ‰” ฮปb.     e ยฎ e e xยฎ2 bยฎ xยฎ1 + +e xยฎ2 โ‰” ฮปb. xยฎ1 bยฎ ++ e bR โ†’ V eR ฮด : โˆ€R. V V ฮด (หœฮน โ„“ ) โ‰” ฮนหœโ„“ ฮด (ฮฑฬƒ ) โ‰” ฮฑฬƒ ฮด (hb v 1 , vb2 i) โ‰” ฮด (b v 1 ) โŠ— ฮด (b v2) h  i xโ†’ 7 ฮด (b ฮณ (x)) bยฎ h h  ii store ยฎ ฮฑโ†’ ฮด (b ฯƒ ) โ‰” ฮปb. 7 n 7โ†’ ฮด (b ฯƒ (ฮฑ)[n]) bยฎ env ฮด : โˆ€R. env c R โ†’ eg nvR ยฎ ฮด (b ฮณ ) โ‰” ฮปb. env d R โ†’ store gR ฮด : โˆ€R. store store R d R โ‡€ โˆƒR โ€ฒ . tย T JยทK : expr โ†’ โˆ€R. env c R ร— store race โ€ฒ T Jal K (b ฮณ,b ฯƒ ) โ‰” โŒŠlโŒ‹ โŠ— ฮด (b v ) โŠ— ฮด (b ฮณ โ€ฒ) โŠ— ฮด (b ฯƒ โ€ฒ) env store where hb v, b ฮณ โ€ฒ,b ฯƒ โ€ฒ i โ‰” EJaK (b ฮณ,b ฯƒ) atom  env store e ฮณ,b ฯƒ ) โ‰” โŒŠlโŒ‹ โŠ— ฮด (b v ) โŠ— ฮด (b ฮณ โ€ฒ) โŠ— ฮด (b ฯƒ โ€ฒ) + +t T Jlet x โ‰” al in eK (b hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi โ‰” EJaK (b ฮณ, b ฯƒ ) t โ‰” T JeK (b ฮณ โ€ฒ [x 7โ†’ vb] , b ฯƒ โ€ฒ) env store e T Jlet x 1 , x 2 โ‰” al in eK (b ฮณ,b ฯƒ ) โ‰” โŒŠlโŒ‹ โŠ— ฮด (b v ) โŠ— ฮด (b ฮณ โ€ฒ) โŠ— ฮด (b ฯƒ โ€ฒ) + +t atom where where hhb v 1 , vb2 i , b ฮณ โ€ฒ, b ฯƒ โ€ฒi โ‰” EJaK (b ฮณ,b ฯƒ ) t โ‰” T JeK (b ฮณ โ€ฒ [x 1 7โ†’ vb1, x 2 7โ†’ vb2 ] , b ฯƒ โ€ฒ) โ€ฒ โ€ฒ T Jif p then e 1 else e 2 K (b ฮณ,b ฯƒ ) โ‰” cond (b v , T Je 1 K (b ฮณ ,b ฯƒ ) , T Je 2 K (b ฮณ ,b ฯƒ )) atom hb v, b ฮณ โ€ฒi โ‰” EJpK (b ฮณ,b ฯƒ) pico where Fig. 12. Denotational Trace Semantics A Language for Probabilistically Oblivious Computation w โˆˆ W F ฮธ | hw, wi pico ฯ‰ โˆˆ penv โ‰” var โ‡€ W n all (xฬƒ) โ‰” x eR โ†’ โ„˜(X ) all : โˆ€R X . X DJยทK : pico โ†’ 1:35 ฯˆ โˆˆ pstore โ‰” addr โ‡€ W   o ยฎ xฬƒ bยฎ = x โˆƒb. penv โ‡€ W d R ร— penv ร— pstore ร— dep โ‡€ W ร— pstore ร— dep DJยทK : atom โ†’ โˆ€R. env c R ร— store atom d R ร— penv ร— pstore ร— dep โ‡€ W ร— pstore ร— dep DJยทK : exp โ†’ โˆ€R. env c R ร— store exp pico pico DJxK(ฯ‰) โ‰” ฯ‰(x)  DJlK(ฯ‰) โ‰” ยœ  DJpK (b ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJpK(ฯ‰),ฯˆ , ฮธ  pico  atom โ—ฆ DJp K (b ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJpK(ฯ‰),ฯˆ , ฮธ  pico  pico atom DJp1 โŠ™ p2 K (b ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJp1 K(ฯ‰) โŠ” DJp2 K(ฯ‰),ฯˆ , ฮธ  pico  atom ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJpK(ฯ‰),ฯˆ , ฮธ DJasnat(p)K (b  pico  atom ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJpK(ฯ‰),ฯˆ , ฮธ DJasbit(p)K (b atom  ฯ ฯƒ R , ฯ‰,ฯˆ , ฮธ โ‰” h{R + 1},ฯˆ , ฮธ i DJflipโ„“ K ฮณbR , b atom pico DJuse(x)K (b ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” hฯ‰(x),ฯˆ , ฮธ i atom ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” hฯ‰(x),ฯˆ , ฮธ โŠ” ฯ‰(x)i DJreveal(x)K (b atom DJmux(p1 , p2, p3 )K (b ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” hhw, wi,ฯˆ , ฮธ i atom U pico pico pico where w โ‰” DJp1 K(ฯ‰) โŠ” DJp2 K(ฯ‰) โŠ” DJp3 K(ฯ‰) DJmux(p1 , p2, p3 )K (b ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” hhw, wi,ฯˆ , ฮธ i atom A pico pico where w โ‰” DJp2 K(ฯ‰) โŠ” DJp3 K(ฯ‰)  pico   pico atom DJhp1 , p2 iK (b ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJp1 K(ฯ‰), DJp2 K(ฯ‰) ,ฯˆ , ฮธ Fig. 13. Dependency Semantics (1) 1:36 David Darais, Chang Liu, Ian Sweet, and Michael Hicks     pico pico atom DJarrayN (p1 , . . . , p N )K (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” ยœ,ฯˆ ฮฑ โ†’ 7 DJp1 K(ฯ‰) โŠ” ยท ยท ยท โŠ” DJp N K(ฯ‰) , ฮธ ฮฑ โ‰” fresh(b ฯƒ)  รƒ DJp1 [p2 ]K (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” ฯˆ (ฮฑ),ฯˆ , ฮธ where atom ฮฑ hb v, b ฮณ i โ‰” EJp ฮณ ) ฮฑ โˆˆ all (b v)  1 K (b   pico รƒ DJp1 [p2 ] โ† p3 K (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” ฯˆ (ฮฑ),ฯˆ โŠ” ฮฑ 7โ†’ DJp3 K(ฯ‰) , ฮธ where atom where โ€ฒ hb v, b ฮณ โ€ฒi pico ฮฑ pico โ‰” EJp1 K (b ฮณ) ฮฑ โˆˆ all (b v) DJaK (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJaK (b ฮณ,b ฯƒ ,ฯˆ , ฯ‰, ฮธ ) exp atom ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJeK (b ฮณ โ€ฒโ€ฒ, b ฯƒ โ€ฒ, ฯ‰ โ€ฒโ€ฒ ,ฯˆ โ€ฒ, ฮธ โ€ฒ) DJlet x โ‰” a in eK (b exp exp hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi โ‰” EJaK (b ฮณ,b ฯƒ) ฮณbโ€ฒโ€ฒ โ‰” ฮณbโ€ฒ [x 7โ†’ vb] โ€ฒโ€ฒ โ€ฒ hw,ฯˆ โ€ฒ, ฮธ โ€ฒi โ‰” DJaK (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) ฯ‰ โ‰” ฯ‰ [x 7โ†’ w] atom where atom ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJeK (b ฮณ โ€ฒโ€ฒ, b ฯƒ โ€ฒ, ฯ‰ โ€ฒโ€ฒ ,ฯˆ โ€ฒ, ฮธ โ€ฒ) DJlet x 1 , x 2 โ‰” a in eK (b exp exp hhvb1 , vb2 i , b ฮณ โ€ฒ, b ฯƒ โ€ฒ i โ‰” EJaK (b ฮณ, b ฯƒ) ฮณbโ€ฒโ€ฒ โ‰” ฮณbโ€ฒ [x 1 7โ†’ vb1 , x 2 7โ†’ vb2 ] โ€ฒโ€ฒ โ€ฒ hhw 1 , w 2 i, ฯ‰ โ€ฒ,ฯˆ โ€ฒ, ฮธ โ€ฒ i โ‰” DJaK (b ฮณ, b ฯƒ , ฯ‰, ฮธ ) ฯ‰ โ‰” ฯ‰ [x 1 7โ†’ w 1 , x 2 7โ†’ w 2 ] atom where atom ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) โ‰” DJpK(ฯ‰) โŠ” w 1 โŠ” w 2 ,ฯˆ 1 โŠ” ฯˆ 2 , ฮธ 1 โŠ” ฮธ 2 DJif p then e 1 else e 2 K (b exp pico hw 1 ,ฯˆ 1 , ฮธ 1 i โ‰” DJe 1 K (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) exp where hw 2 ,ฯˆ 2 , ฮธ 2 i โ‰” DJe 2 K (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮธ ) exp Fig. 14. Dependency Semantics (2) A Language for Probabilistically Oblivious Computation 1:37 ฮพ โˆˆ renv โ‰” region โ†’ dep d ร— renv โ‡€ renv RJยทK : atom โ†’ โˆ€R. env c R ร— store atom R d ร— renv โ‡€ renv RJยทK : exp โ†’ โˆ€R. env c R ร— store exp R atom  ฯ ฯƒ R , ฯ‰,ฯˆ , ฮพ โ‰” ฮพ โŠ” [ฯ โ€ฒ 7โ†’ {R + 1} | ฯ โŠ‘ ฯ โ€ฒ ] RJflipโ„“ K ฮณbR , b RJ K (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮพ ) โ‰” ฮพ atom RJaK (b ฮณ,b ฯƒ , ฮพ ) โ‰” RJaK (b ฯƒ, ฮพ) ฮณ , b  exp exp atom โ€ฒโ€ฒ โ€ฒ ฮณ,b ฯƒ , ฮพ ) โ‰” RJeK b ฮณ ,b ฯƒ , RJaK (b ฮณ,b ฯƒ, ฮพ ) RJlet x โ‰” a in eK (b exp atom hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi โ‰” EJaK (b ฮณ,b ฯƒ ) ฮณbโ€ฒโ€ฒ โ‰” b ฮณ โ€ฒ [x 7โ†’ vb]  exp exp atom RJlet x 1 , x 2 โ‰” a in eK (b ฮณ,b ฯƒ , ฮพ ) โ‰” RJeK b ฮณ โ€ฒโ€ฒ, b ฯƒ โ€ฒ, RJaK (b ฮณ,b ฯƒ, ฮพ ) atom where hhvb1, vb2 i , b ฮณ โ€ฒ, b ฯƒ โ€ฒi โ‰” EJaK (b ฮณ,b ฯƒ ) ฮณbโ€ฒโ€ฒ โ‰” b ฮณ โ€ฒ [x 1 7โ†’ vb1 , x 2 7โ†’ vb2 ] atom where RJif p then e 1 else e 2 K (b ฮณ,b ฯƒ , ฮพ ) โ‰” RJe 1 K (b ฮณ,b ฯƒ , ฮพ ) โŠ” RJe 2 K (b ฮณ,b ฯƒ, ฮพ ) exp exp Fig. 15. Region Semantics exp 1:38 David Darais, Chang Liu, Ian Sweet, and Michael Hicks Bit Arr   โˆ€ฮฑ โˆˆ all ฮฑฬƒ R . ฮฃ(ฮฑ) = ฯ„ ฮนหœRโ„“ โ‹‰ ฮฆ ฮฆ ฮฑฬƒ R โˆ ฮธ ฮธ Arr R ฮฑฬƒ โ‹‰ Flip ฮฃ โŠข nฬƒ R : nat Tup ฮฃ โŠข ฮฑฬƒ R : array(ฯ„ ) ฮนฬƒ R โˆ Dist Nat ฮฃ โŠข bฬƒ R : bit ฮฆ ฮฆ ฮพ โŠข ฮฒ@hโ„“, ฯi โ‹‰ ฮธ Arr Tup vb1R โ‹‰ ฮฆ w1 R R vb1 , vb2 Tup ฮพ โŠข array(ฯ„ ) โ‹‰ ฮธ ฮฃ โŠข vb2R : ฯ„2 ฮฃ โŠข vb1R , vb2R : ฯ„1 ร— ฯ„2 ฮธ โІ ฮพ (ฯ) Base ฮฃ โŠข bฬƒ R : flip ฮฃ โŠข vb1R : ฯ„1 ฮธ ฮธ ฮฃ โŠข vbR : ฯ„ โ‹‰ ฮฆ vb2R โ‹‰ vbR โ‹‰ vbR โ‹‰ hw 1 , w 2 i ฮพ โŠขฯ„ โ‹‰w ฮพ โŠข ฯ„1 โ‹‰ w 1 ฮพ โŠข ฯ„ โ‹‰w ฮฆw ฮฃ ; ฮพ โŠข vb : ฯ„ โ‹‰ R ฮฆ w Fig. 16. Value Well-formedness w ฮฆ w2 ฮพ โŠข ฯ„2 โ‹‰ w 2 ฮพ โŠข hฯ„1 , ฯ„2 i โ‹‰ hw 1 , w 2 i ฮฃ ;ฮพ โŠขv :ฯ„ โ‹‰ ฮฃ โŠข vbR : ฯ„ ฮฆ ฮฆ w A Language for Probabilistically Oblivious Computation 1:39 ฮ“ ; ฮฃโŠขb ฮณ โ‰” โˆ€x . ฮฃ โŠข ฮณb(x) : ฮ“(x) ฮณ โ‹‰ ฯ‰ โ‰” โˆ€x . ฮณb(x) โ‹‰ b ฮฆ ฯ‰(x) ฮ“ ; ฮฃ โŠข ฮณb ฮณโ‹‰ b ฮฆ ฯ‰ ฮพ โŠข ฮ“ โ‹‰ฯ‰ ฮพ โŠข ฮ“ โ‹‰ ฯ‰ โ‰” โˆ€x . ฮพ โŠข ฮ“(x) โ‹‰ ฯ‰(x) ฮ“ ; ฮฃ โŠข ฮณb ฮณb โ‹‰ ฮฆ ฮพ โŠข ฮ“ โ‹‰ฯ‰ ฯ‰ ฮ“ ; ฮฃ;ฮพ โŠขb ฮณโ‹‰ ฯ‰ ฮฆ ฮฃโŠขb ฯƒ โ‰” โˆ€ฮฑ . ฮฃ โŠข b ฯƒ (ฮฑ) : ฮฃ(ฮฑ) b ฯƒ โ‹‰ ฯˆ โ‰” โˆ€ฮฑ . b ฯƒ (ฮฑ) โ‹‰ ฮฆ ฯˆ (ฮฑ) ฮพ โŠข ฮฃ โ‹‰ ฯˆ โ‰” โˆ€ฮฑ . ฮพ โŠข ฮฃ(ฮฑ ๏ฃพ โ‹‰ ฯˆ (ฮฑ) ฮฃโŠขb ฯƒ ฯƒโ‹‰ b ฮฆฯˆ ฮฃ;ฮพ โŠขb ฯƒโ‹‰ ฮพ โŠข ฮฃ โ‹‰ฯˆ ฮฆฯˆ Fig. 17. Env and Store Well-formedness ฮ“ ; ฮฃ;ฮพ โŠขb ฮณโ‹‰ ฮฆ ฯ‰ ฮฃโŠขb ฯƒ ฯƒโ‹‰ b ฮฆฯˆ ฮพ โŠข ฮฃ โ‹‰ฯˆ ฮฃ;ฮพ โŠขb ฯƒโ‹‰ ฮฆฯˆ 1:40 David Darais, Chang Liu, Ian Sweet, and Michael Hicks z ฯ• ฯ€ ฮฒ โˆˆ loc F โˆˆ cloc F โˆˆ rloc F โˆˆ btype F R cc xt R rc xt tcxt trxt  | hz, โ€ขi | hโ€ข, zi env (x, z) | store (ฮฑ, z) ret (z) | ฯ• bit | nat | flip eR bR ร— loc โ‡€ lit ยท@ยท : โˆ€R. V โ‰” โ‰” โ‰” โ‰” ฮนหœโ„“ @ โ‰” ฮนหœ vb, cxt hb ฮณ,b ฯƒ i @store (ฮฑ, z) โ‰” b ฯƒ (ฮฑ)@z cxt hb v, b ฮณ, b ฯƒ i @ret (z) โ‰” vb@z rxt R e ยท@ยท : โˆ€R. rc xt ร— rloc โ‡€ lit ฮณ (x)@z hb v, b ฮณ,b ฯƒ i @env (x, z) โ‰” b R rxt hb v, b ฮณ,b ฯƒ i @store (ฮฑ, z) โ‰” b ฯƒ (ฮฑ)@z rxt ฯ type bitโ„“ @ โ‰” bit type ยท@ยท : type ร— loc โ‡€ btype @hz, โ€ขi โ‰” vb@z , vb @hโ€ข, zi โ‰” vb@z hb ฮณ,b ฯƒ i @env (x, z) โ‰” ฮณb(x)@z R eR ยท@ยท : โˆ€R. cc xt ร— cloc โ‡€ lit cxt rxt dR env c R ร— store bR ร— env dR V c R ร— store tenv ร— tstore type ร— tenv ร— tstore ฯ type natโ„“ @ type flipฯ @ ฯ„, โ‰” nat type type type type @hz, โ€ขi โ‰” ฯ„ @z , ฯ„ @hโ€ข, zi โ‰” ฯ„ @z โ‰” flip type tcxt hฮ“, ฮฃi @env (x, z) โ‰” ฮ“(x)@z tcxt ยท@ยท : tcxt ร— cloc โ‡€ btype type tcxt hฮ“, ฮฃi @store (ฮฑ, z) โ‰” ฮฃ(ฮฑ)@z trxt trxt type hฯ„ , ฮ“, ฮฃi @ret (z) โ‰” ฯ„ @z ยท@ยท : โˆ€R. trxt ร— rloc โ‡€ btype trxt type hฯ„ , ฮ“, ฮฃi @env (x, z) โ‰” ฮ“(x)@z trxt type hฯ„ , ฮ“, ฮฃi @store (ฮฑ, z) โ‰” ฮฃ(ฮฑ)@z Fig. 18. Locations A Language for Probabilistically Oblivious Computation 1:41 ฮนฬƒ R :: ฮฒ # ฮนฬƒ R :: ฮฒ Flip bฬƒ1 โŠฅ โŠฅ bฬƒ2 ฮฆ bฬƒ1 :: flip # bฬƒ2 :: flip ฮ“ ; ฮฃ โŠข P(b ฮณ,b ฯƒ) Other ฮฒ 1 , flip โˆจ ฮฒ 2 , flip ฮฆ ฮนหœ1 :: ฮฒ 1 # ฮนหœ2 :: ฮฒ 2 ฮฆ ฮ“ ; ฮฃ โŠข P(b ฮณ,b ฯƒ) ฮฆโ‰” โˆ€ฯ• 1 , ฯ• 2 . hb ฮณ,b ฯƒ i @ฯ• 1 :: hฮ“, ฮฃi @ฯ• 1 # hb ฮณ,b ฯƒ i @ฯ• 2 :: hฮ“, ฮฃi @ฯ• 2 ฯ„ ; ฮ“ ; ฮฃ โŠข P(b v, b ฮณ,b ฯƒ) cxt tcxt cxt tcxt ฮฆโ‰” โˆ€ฯ€1 , ฯ€2 . hb v, b ฮณ, b ฯƒ i @ฯ€1 :: hฯ„ , ฮ“, ฮฃi @ฯ€1 # hv, b ฮณ, b ฯƒ i @ฯ€2 :: hฯ„ , ฮ“, ฮฃi @ฯ€2 trxt rxt ฮฆ ฮฆ ฯ„ ; ฮ“ ; ฮฃ โŠข P(b v, b ฮณ,b ฯƒ) rxt ฮฆ trxt ฮฆ ฮฆ Fig. 19. Partitioning S (หœฮน :: ฮฒ) h i stable bฬƒ ฮฆ Flip   ฮฆ S bฬƒ :: flip ฮ“ ; ฮฃ โŠข S(b ฮณ,b ฯƒ) ฮ“ ; ฮฃ โŠข S(b v, b ฮณ, b ฯƒ) ฮฒ , flip Other S (หœฮน :: ฮฒ)   cxt tcxt ฮฆ โ‰” โˆ€ฯ•. S hb ฮณ,b ฯƒ i @ฯ• :: hฮ“, ฮฃi @ฯ• ฮฆ ฮ“ ; ฮฃ โŠข S(b ฮณ,b ฯƒ) ฮฆ ฮฆ ฮ“ ; ฮฃ โŠข S(b v, b ฮณ,b ฯƒ)   cxt tcxt ฮฆ โ‰” โˆ€ฯ€ . S hb v, b ฮณ, b ฯƒ i @ฯ€ :: hฯ„ , ฮ“, ฮฃi @ฯ€ Fig. 20. Stability ฮฆ ฮฆ ฮฆ 1:42 David Darais, Chang Liu, Ian Sweet, and Michael Hicks l โ€ข ฮน โ€ข v โ€ข ฮณ โˆˆ โˆˆ โˆˆ โˆˆ loc F โ€ข lit F โ€ข VF โ€ข env โ‰” โ€ข โ€ข โ€ข . . . source code locations . . . bP | nP | โ€ข โ€ข โ€ข โ€ข ฮน | ฮฑ | hv , v i โ€ข var โ‡€ V  โˆ— ฯƒ โˆˆ store โ‰” addr โ‡€ V โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข โ€ข ฯ‚ โˆˆ con๏ฌg โ‰” he, ฮณ , ฯƒ i | HALT (v , ฮณ , ฯƒ ) โ€ข โˆ— โ€ข โ€ข t โˆˆ trace โ‰” con๏ฌg lit โ€ข โ€ขR bโ€ข R V F ฮนฬƒ lit lit โ€ข obs(ฮน P ) โ‰” ฮน obs : lit ร— label โ†’ lit obs : V โ†’ V D R RE โ€ข โ€ข b ฮฑฬƒ R v v ,b โ€ข R โ€ขR bโ€ข b c ฮณ โˆˆ env โ‰” var โ‡€ V  โ€ข R โ€ขR bโ€ข d b โ‰” addr โ‡€ V โˆ— ฯƒ โˆˆ store โ€ขR b v โˆˆ obs(ฮน S ) โ‰” โ€ข lit obs(ฮน โ„“ ) โ‰” obs(ฮน โ„“ ) env obs(hv 1 , v 2 i) โ‰” hobs(v 1 ), obs(v 2 )i obs(ฮฑ) โ‰” ฮฑ env โ€ข obs : env โ†’ env store obs(ฮณ )(ฮฝ ) โ‰” obs(ฮณ (ฮฝ )) store โ€ข obs : store โ†’ store obs(ฯƒ )(ฮฑ)[n] โ‰” obs(ฯƒ (ฮฑ)[n]) D env E env obs(he, ฮณ , ฯƒ i) โ‰” e, obs(ฮณ ), obs(ฯƒ )   con๏ฌg V env env obs(HALT (v, ฮณ , ฯƒ )) โ‰” HALT obs(v), obs(ฮณ ), obs(ฯƒ ) con๏ฌg con๏ฌg โ€ข obs : con๏ฌg โ†’ con๏ฌg trace โ€ข obs : con๏ฌgโˆ— โ†’ con๏ฌg โˆ— bโ€ข R c : โˆ€R. V bR โ†’ V obs c (ฮฑฬƒ ) โ‰” ฮฑฬƒ obs โ€ข R c c : โˆ€R. env obs c R โ†’ env env โ€ข R d c : โˆ€R. store d R โ†’ store obs store con๏ฌg trace con๏ฌg obs(ฯ‚ 1 . . . ฯ‚ N ) โ‰” obs(ฯ‚ 1 ) . . . obs(ฯ‚ N )   ๏ฃฑ ๏ฃด ๏ฃด ๏ฃฒฮน if ฮนหœโ„“ bยฎ = ฮน P ยฎ c (ฮนฬƒ โ„“ ) โ‰” ฮปb.   obs ๏ฃด ๏ฃด โ€ข if ฮนหœโ„“ bยฎ = ฮน S ๏ฃณ E D  E D   โ€ข โ€ข โ€ข โ€ข c b c b c b obs v2 v 1, b v 2 โ‰” obs v 1 , obs env     โ€ข โ€ข c b c b obs ฮณ (ฮฝ ) โ‰” obs ฮณ (ฮฝ ) store     โ€ข โ€ข c b c b obs ฯƒ (ฮฑ)n โ‰” obs ฯƒ (ฮฑ)n Fig. 21. Adversary Observations A Language for Probabilistically Oblivious Computation 1:43 B THEOREMS Theorem B.1 (Type Safety). If ฮ“ ; ฮฃ โŠข a : ฯ„ ; ฮ“โ€ฒ then ฮ“ ; ฮฃโŠขb ฮณ ฮฃโŠขb ฯƒ โˆƒฮฃ โ€ฒ vb b ฮณโ€ฒ b ฯƒ โ€ฒ. EJaK (b ฮณ, b ฯƒ ) = hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi โ€ฒ โ€ฒ โ€ฒ ฮฃ โŠข vb : ฯ„ ฮ“ ; ฮฃ โŠข ฮณb ฮฃ โ€ฒ โŠข b ฯƒโ€ฒ โ€ฒ De๏ฌnition B.2 (Well Typed Evaluation). ฮ“ ; ฮฃ โŠข a : ฯ„ ; ฮ“ โ€ฒ ; ฮฃ โ€ฒ ;; hb ฮณ,b ฯƒ i โ‡“ hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi ฮ“ ; ฮฃ โŠข a : ฯ„ ; ฮ“โ€ฒ ฮ“ ; ฮฃโŠขb ฮณ hb v, b ฮณ ,ฯƒ b i โ‰” EJaK (b ฮณ,b ฯƒ) ฮ“ โ€ฒ ; ฮฃ โ€ฒ โŠข vb : ฯ„ โ€ฒ โ€ฒ ฮฃโŠขb ฯƒ ฮ“ โ€ฒ ; ฮฃ โ€ฒ โŠข ฮณbโ€ฒ ฮ“ ; ฮฃ โŠข a : ฯ„ ; ฮ“ โ€ฒ ; ฮฃ โ€ฒ ;; hb ฮณ,b ฯƒ i โ‡“ hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi ฮฃโ€ฒ โŠข b ฯƒโ€ฒ Theorem B.3 (Dependency Soundness). If ฮ“ ; ฮฃ โŠข a : ฯ„ ; ฮ“ โ€ฒ ; ฮฃ โ€ฒ ;; hb ฮณ,b ฯƒ i โ‡“ hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi ฮณb โ‹‰ ฯ‰ c (b obs ฮณ) โ‹‰ ฮฆ vb โ‹‰ w env c (b b โ‹‰ฯˆ ฯƒ obs ฯƒ) โ‹‰ ฮฆ DJaK (b ฮณ, b ฯƒ , ฯ‰,ฯˆ , ฮฆ) = hw,ฯˆ โ€ฒ , ฮฆโ€ฒi store then bโ€ฒ โ‹‰ ฯˆ โ€ฒ ฯƒ c (b obs v ) โ‹‰ ฮฆโ€ฒ c (b obs ฯƒ โ€ฒ ) โ‹‰ ฮฆโ€ฒ store Theorem B.4 (Region Soundness). If ฮ“ ; ฮฃ โŠข a : ฯ„ ; ฮ“ โ€ฒ ; ฮฃ โ€ฒ ;; hb ฮณ,b ฯƒ i โ‡“ hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi ฮพ |= ฮ“ โ‹‰ ฯ‰ ฮณ โ‹‰ ฮฆฯ‰ b ฮพ |= ฮฃ โ‹‰ ฯˆ ฯƒ โ‹‰ ฮฆฯˆ b DJaK (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮฆ) = hw,ฯˆ โ€ฒ , ฮฆโ€ฒ i RJaK (ฮพ ) = ฮพ โ€ฒ then ฮพ โ€ฒ |= ฯ„ โ‹‰ w |= ฮฃ โ€ฒ โ‹‰ ฯˆ โ€ฒ ฮพโ€ฒ vb โ‹‰ ฮฆโ€ฒ w b ฯƒ โ€ฒ โ‹‰ ฮฆโ€ฒ ฯˆ โ€ฒ Theorem B.5 (Well-partitioning). If ฮ“ ; ฮฃ โŠข a : ฯ„ ; ฮ“ โ€ฒ ; ฮฃ โ€ฒ ;; hb ฮณ,b ฯƒ i โ‡“ hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi ฮ“ ; ฮฃ โŠข P (b ฮณ, b ฯƒ) ฮฆ DJaK (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮฆ) = hw,ฯˆ โ€ฒ , ฮฆโ€ฒ i then ฯ„ ; ฮ“ โ€ฒ ; ฮฃ โ€ฒ โŠข P (b v, b ฮณ โ€ฒ, b ฯƒ โ€ฒ) ฮฆโ€ฒ ฮ“ ; ฮฃ โŠข a : ฯ„ ; ฮ“ โ€ฒ ; ฮฃ โ€ฒ ;; hb ฮณ, b ฯƒ i โ‡“ hb v, b ฮณ โ€ฒ, b ฯƒ โ€ฒi ฮ“ ; ฮฃ โŠข S (b ฮณ, b ฯƒ) ฮฆ DJaK (b ฮณ,b ฯƒ , ฯ‰,ฯˆ , ฮฆ) = hw,ฯˆ โ€ฒ , ฮฆโ€ฒ i then ฯ„ ; ฮ“ โ€ฒ ; ฮฃ โ€ฒ โŠข S (b v, b ฮณ โ€ฒ, b ฯƒ โ€ฒ) ฮฆโ€ฒ Theorem B.6 (Stability). If 1:44 David Darais, Chang Liu, Ian Sweet, and Michael Hicks Theorem B.7 (Strong Memory Trace Obliviousness (SMTO)). ฮ“ โŠข e : ฯ„ ; ฮ“โ€ฒ If ฮ“ ; ฮฃ โŠข ฮณbi ฮฃโŠขb ฯƒi ฯƒi โ‹‰ b c (b obs ฮณ1) โ‰ˆ env ฮณbi โ‹‰ c (b obs ฮณi ) โ‹‰ ฮฆ env ฮฆฯ‰ ฮฆฯˆ c (b obs ฮณ2) P (b ฮณi , b ฯƒi ) env ฮฆ c (b obs ฯƒi ) โ‹‰ ฮฆ c (b obs ฯƒ1 ) โ‰ˆ S (b ฮณi , b ฯƒi ) ฮพ |= ฮฃ โ‹‰ ฯˆ then f (T JeK (b obs ฮณ2, b ฯƒ2 )) trace c (b obs ฯƒ2 ) store store ฮฆ f (T JeK (b obs ฮณ1, b ฯƒ1 )) โ‰ˆ ฮฆ trace ฮพ |= ฮ“ โ‹‰ ฯ‰ store Corollary B.8 (Memory Trace Obliviousness (MTO)). If ฮ“ โŠข e : ฯ„ ; ฮ“โ€ฒ ฮ“ ; [] โŠข โŒŠฮณi โŒ‹ env env obs (ฮณ 1 ) = obs (ฮณ 2 ) f (T JeK (โŒŠฮณ 1 โŒ‹ , [])) โ‰ˆ obs f (T JeK (โŒŠฮณ 2 โŒ‹ , [])) then obs trace trace C LEMMAS REGARDING DISTRIBUTION MODEL Lemma C.1 (Cond Probability Measure Semantics). p[cond(bฬƒ1, bฬƒ2 , bฬƒ3 ) = b] = p[bฬƒ1 = O โˆง bฬƒ2 = b] + p[bฬƒ1 = I โˆง bฬƒ3 = b] Proof. p[cond(bฬƒ1 , bฬƒ2, bฬƒ3 ) = b] = p[cond(bฬƒ1 , bฬƒ2, bฬƒ3 ) = b โˆง bฬƒ1 = O] + p[cond(bฬƒ1, bฬƒ2 , bฬƒ3 ) = b โˆง bฬƒ1 = I] = p[cond(bฬƒ1 , bฬƒ2, bฬƒ3 ) = b | bฬƒ1 = O]p[bฬƒ1 = O] + p[cond(bฬƒ1 , bฬƒ2, bฬƒ3 ) = b | bฬƒ1 = I]p[bฬƒ1 = I] = p[bฬƒ2 = b | bฬƒ1 = O]p[bฬƒ1 = O] + p[bฬƒ3 = b | bฬƒ1 = I]p[bฬƒ1 = I] = p[bฬƒ2 = b โˆง bฬƒ1 = O] + p[bฬƒ3 = b โˆง bฬƒ1 = I] = p[bฬƒ1 = O โˆง bฬƒ2 = b] + p[bฬƒ1 = I โˆง bฬƒ3 = b]  A Language for Probabilistically Oblivious Computation 1:45 Lemma C.2 (Cond Stability). Assume bฬƒ1 โŠฅ โŠฅ bฬƒ2 , bฬƒ1 โŠฅ โŠฅ bฬƒ3 and bฬƒ2 โ‰ˆ bฬƒ3 . Then: cond(bฬƒ1, bฬƒ2 , bฬƒ3 ) โ‰ˆ bฬƒ2 โ‰ˆ bฬƒ3 Proof. Given b, the goal is to show p[cond(bฬƒ1 , bฬƒ2, bฬƒ3 ) = b] = p[bฬƒ2 = b] = p[bฬƒ3 = b]. p[cond(bฬƒ1, bฬƒ2 , bฬƒ3 ) = b] = * Cond Probability Measure Semantics (Lemma (C.1)) + p[bฬƒ1 = O โˆง bฬƒ2 = b] + p[bฬƒ1 = I โˆง bฬƒ3 = b] = * Conditional independence bฬƒ1 โŠฅ โŠฅ bฬƒ2 and bฬƒ1 โŠฅ โŠฅ bฬƒ3 + p[bฬƒ1 = O]p[bฬƒ2 = b] + p[bฬƒ1 = I]p[bฬƒ3 = b] = * Distribution equivalence bฬƒ2 โ‰ˆ bฬƒ2 + p[bฬƒ1 = O]p[bฬƒ2 = b] + p[bฬƒ1 = I]p[bฬƒ2 = b] = * Common factor + p[bฬƒ2 = b](p[bฬƒ1 = O] + p[bฬƒ1 = I]) = * Proper Probability Measure (Lemma (C.5)) + p[bฬƒ2 = b] = p[bฬƒ3 = b]  Lemma C.3 (Probabilistic Independence). Assume bฬƒ1 โ‹‰ ฮธ 1 , bฬƒ2 โ‹‰ ฮธ 2 and ฮธ 1 โŠฅ โŠฅ ฮธ 2 . Then: bฬƒ1 โŠฅ โŠฅ bฬƒ2 Lemma C.4 (Cond Independence). Assume bฬƒ1 โ‹‰ฮธ 1 , bฬƒ2 โ‹‰ฮธ 2 , bฬƒ3 โ‹‰ฮธ 3 , ฮธ 1 โŠฅ โŠฅ ฮธ2, ฮธ1 โŠฅ โŠฅ ฮธ 3 and bฬƒ2 โ‰ˆ bฬƒ3 . Then: cond(bฬƒ1, bฬƒ2, bฬƒ3 ) โ‹‰ ฮธ 2 โˆช ฮธ 3 Our model for probability measures allows for proving the following lemmas. 1:46 David Darais, Chang Liu, Ian Sweet, and Michael Hicks Lemma C.5 (Proper Probability Measure). p[bฬƒ1 = O] + p[bฬƒ2 = I] = 1 Proof. p[bฬƒ1 = O] + p[bฬƒ2 = I] c[bฬƒ1 = O] c[bฬƒ1 = I] = + 2R 2R โ€ฒ {b | bฬƒ1 (b โ€ฒ) = O} + {b โ€ฒ | bฬƒ1 (b โ€ฒ) = I} = 2R โ€ฒ โ€ฒ {b | bฬƒ1 (b ) = O โˆจ bฬƒ1 (b โ€ฒ) = I} = 2R {b โ€ฒ | b โ€ฒ โˆˆ BR } = 2R 2R = R =1 2  Lemma C.6 (Joint Probability Symmetry). p[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] = p[bฬƒ2 = b2 โˆง bฬƒ1 = b1 ] Proof is immediate. Lemma C.7 (Chain Rule). p[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] = p[bฬƒ1 = b1 | bฬƒ2 = b2 ]p[bฬƒ2 = b2 ] Proof. p[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] = c[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] 2R = c[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] c[bฬƒ2 = b2 ] 2R c[bฬƒ2 = b2 ] = p[bฬƒ1 = b1 | bฬƒ2 = b2 ]p[bฬƒ2 = b2 ]  Corollary C.8 (Alt Chain Rule). p[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] = p[bฬƒ2 = b2 | bฬƒ1 = b1 ]p[bฬƒ1 = b1 ] Consequence of Lemma (C.6). A Language for Probabilistically Oblivious Computation 1:47 Lemma C.9 (Bayesโ€™s Rule). p[bฬƒ1 = b1 | bฬƒ2 = b2 ] = p[bฬƒ2 = b2 | bฬƒ1 = b1 ]p[bฬƒ1 = b1 ] p[bฬƒ2 = b2 ] Proof. p[bฬƒ1 = b1 | bฬƒ2 = b2 ] = = = c[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] c[bฬƒ2 = b2 ] c[bฬƒ2 = b2 โˆง bฬƒ1 = b1 ] c[bฬƒ1 = b1 ] 2R c[bฬƒ1 = b1 ] c[bฬƒ2 = b2 ] 2R p[bฬƒ2 = b2 | bฬƒ1 = b1 ]p[bฬƒ1 = b1 ] p[bฬƒ2 = b2 ]  Corollary C.10 (Alt Bayesโ€™s Rule). p[bฬƒ1 = b1 | bฬƒ2 = b2 ] = Consequence of Lemma (C.7). p[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] p[bฬƒ2 = b2 ] 1:48 David Darais, Chang Liu, Ian Sweet, and Michael Hicks Lemma C.11 (Total Probability). p[bฬƒ1 = b1 ] = ร• p[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] b 2 โˆˆB Proof. p[bฬƒ1 = b1 ] = c[bฬƒ1 = b1 ] 2R {b โ€ฒ | bฬƒ1 (b โ€ฒ) = b1 } = 2R {b โ€ฒ | bฬƒ1 (b โ€ฒ) = b1 โˆง (bฬƒ2 = O โˆจ bฬƒ2 = I)} = 2R {b โ€ฒ | bฬƒ1 (b โ€ฒ) = b1 โˆง bฬƒ2 = O โˆจ bฬƒ1 (b โ€ฒ) = b1 โˆง bฬƒ2 = I} = 2R {b โ€ฒ | bฬƒ1 (b โ€ฒ) = b1 โˆง bฬƒ2 (b โ€ฒ) = O} + {b โ€ฒ | bฬƒ1 (b โ€ฒ) = b1 โˆง bฬƒ2 (b โ€ฒ) = O} = = 2R c[bฬƒ1 = b1 โˆง bฬƒ2 = O] c[bฬƒ1 = b1 โˆง bฬƒ2 = I] + 2R 2R = p[bฬƒ1 = b1 โˆง bฬƒ2 = O] + p[bฬƒ1 = b1 โˆง bฬƒ2 = I] ร b 2 โˆˆB p[bฬƒ1 = b1 โˆง bฬƒ2 = b2 ] 
6cs.PL
arXiv:0809.3187v1 [cs.CE] 18 Sep 2008 A Control Variate Approach for Improving Efficiency of Ensemble Monte Carlo โ‹† Tarik Borogovac a,b,โˆ— Francis J. Alexander b Pirooz Vakili c a Electrical b CCS-3, c Division and Computer Engineering Department, Boston University, 8 Saint Maryโ€™s St. Boston, MA 02215, USA Los Alamos National Laboratory, MS-B256, Los Alamos, NM 87545, USA of Systems Engineering & Mechanical Engineering Department, Boston University, 15 Saint Maryโ€™s St. Brookline, MA 02446, USA Abstract In this paper we present a new approach to control variates for improving computational efficiency of Ensemble Monte Carlo. We present the approach using simulation of paths of a time-dependent nonlinear stochastic equation. The core idea is to extract information at one or more nominal model parameters and use this information to gain estimation efficiency at neighboring parameters. This idea is the basis of a general strategy, called DataBase Monte Carlo (DBMC), for improving efficiency of Monte Carlo. In this paper we describe how this strategy can be implemented using the variance reduction technique of Control Variates (CV). We show that, once an initial setup cost for extracting information is incurred, this approach can lead to significant gains in computational efficiency. The initial setup cost is justified in projects that require a large number of estimations or in those that are to be performed under real-time constraints. Key words: Monte Carlo, Variance Reduction, Control Variates PACS: S05.10.Ln, 02.70.Uu, 02.70.Tt โ‹† Portions of this work, LA-UR-08-05399, were carried out at Los Alamos National Laboratory under the auspices of the US National Nuclear Security Administration of the US Department of Energy. Tarik Borogovac and Pirooz Vakili were supported in part by the National Science Foundation grants CMMI-0620965 and DGE-0221680. โˆ— Corresponding author Email address: [email protected] (Tarik Borogovac). Preprint submitted to Elsevier 13 January 2018 1 Introduction The purpose of this paper is to present a novel approach for efficient estimation via the Monte Carlo (MC) method. The approach is very broadly applicable but here, to present the main ideas, we narrow the focus to Ensemble Monte Carlo where estimation is based on stochastically independent trajectories of a system. To illustrate, we use simulation of time-dependent nonlinear processes for which Monte Carlo is a particularly general and powerful numerical method compared to available alternatives. Time-dependent nonlinear processes are very general models used, among others, in statistical mechanics [1], data assimilation in climate, weather and ocean modeling [2], financial modeling [3], and quantitative biology [4]. Hence developing efficient MC methods may significantly impact a wide range of applications. A known weakness of MC is its slow rate of convergence. Assume Y is a random quantity defined on paths of a process and let ฯƒY denote its standard deviation. The โˆš convergence rate of MC for estimating the expected value of Y is โ‰ˆ ฯƒY / n where n is the number of independent paths of the process. In general the canonical nโˆ’1/2 rate of convergence cannot be improved upon, hence, since the inception of the MC method, a number of variance reduction (VR) techniques have been devised to reduce ฯƒY (see, [5] for an early account and [3] and [6] for more recent discussions). Most VR techniques lead to estimators of the form w1 Y1 + ยท ยท ยท + wn Yn , i.e., a weighted average of the samples. These techniques prescribe (i) a recipe for selecting samples Y1 , ยท ยท ยท , Yn and (ii) a set of weights w1 , ยท ยท ยท , wn . To arrive at these prescriptions, one must rely on the existence of specific problem features and the ability of the user of the method to discover and effectively exploit such features. This lack of generality has significantly limited the applicability of VR techniques. The point of departure of a new strategy, called DataBase Monte Carlo (DBMC), is to address this shortcoming and to devise generic VR techniques that can be generically applied [7]. All VR techniques bring additional information to bear on the estimation problem, however, as mentioned above, this information is problem specific and relies on exploiting special features of the problem at hand. By contrast, as will be clarified in this paper, DBMC adds a generic computational exploration phase to the estimation problem that relies on gathering information at one (or more) nominal model parameter(s) to achieve estimation efficiency at neighboring parameters. The advantage of this approach is its generality and wide applicability: it is quite easy to im2 plement and it can wrap existing ensemble MC codes. On the other hand, the computational exploration phase of the DBMC approach may require extensive simulations and can be computationally costly. Therefore, the initial setup cost needs justification. The setup cost may be justified in projects that involve estimations at many model parameters and/or in projects where there is a real-time computational constraint. In the first type of project, the setup cost may lead to efficiency gain for each subsequent estimation, and for a large enough number of subsequent estimations it can be easily justified. In projects with a real-time constraint the setup cost is an off-line โ€œpassiveโ€ cost that can lead to estimates of significantly higher quality (lower statistical error); the higher quality in many such projects more than justifies the setup cost. In this paper we limit ourselves to presenting the implementation of the VR technique of Control Variates (CV) in the DBMC setting (see [7] for discussion of other VR techniques). The CV technique, which compared to the VR technique of Importance Sampling is less utilized in computational physics, requires identifying a number of random variables called control variates, say X1 , ยท ยท ยท , Xk , that are correlated with Y and have known means. The correlation with Y implies that Xi โ€™s carry information about Y . The CV technique is a way of utilizing the information included in the controls (their known means) to help with the estimation of the mean of variable Y . In the DBMC setting we assume that Y = Y (ฮธ) depends on a model parameter ฮธ and use Xi = Y (ฮธi ) where ฮธi โ€™s are in a neighborhood of ฮธ (i = 1, ยท ยท ยท , k). In a departure from the classical CV technique, we use โ€œhigh qualityโ€ estimates of E[Xi ] rather than precise values of E[Xi ] to arrive at the controlled estimator of E[Y ]. As we argue in this paper (and elsewhere [8]) this departure allows for substantially broader choices of control variates and makes the CV technique significantly more flexible and effective. The DBMC method shares a similar intent as the well-known histogram reweighing method [9] from the Markov chain Monte Carlo literature (e.g. [1]), but with a very different setting and implementation, and with broader applicability. For example, it does not rely on having a Boltzmann distribution or exp(โˆ’H/kT ) structure. Given its generality, it has potential applications, among others, in ensemble weather prediction, hydrological source location, climate and ocean, optimal control, and stochastic simulations of biological systems. The remainder of the paper is organized as follows. In section 2 we discuss preliminaries, including the details of the example numerical study โ€“ the timedependent Ginzburg-Landau (TDGL) equation โ€“ as well as the method of control variates. Estimation of mean outcomes of the TDGL equation over a range of temperatures is of interest, especially considering the large difference in behavior below and above the coexistence curve. In section 3 we describe the DBMC methodology and motivation in a general context. Section 4 discusses 3 the implementation and results of DBMC as applied to estimation of quantities generated by the TDGL equation, and the results of that numerical study. We conclude in section 5. 2 Preliminaries We present aspects of our approach and numerical results in the context of the time-dependent Ginzburg Landau (TDGL) model. It is worth noting that this model is chosen for illustrative purposes only and we do not make use of any of its specific features. 2.1 Time-Dependent Ginzburg Landau We use a canonical equation of phase-ordering kinetics [10,11] the stochastic TDGL equation in two spatial dimensions. This is written as โˆ‚ฯ†(x, t) = Dโˆ†ฯ†(x, t) โˆ’ V โ€ฒ (ฯ†(x, t)) + ฮท(x, t) โˆ‚t (1) where ฯ†(x, t) represents a local order parameter, e.g. a magnetization at point x = (x1 , x2 )โŠค and time t (โŠค denotes transpose). The noise has mean zero and covariance hฮท(x, t)ฮท(xโ€ฒ, tโ€ฒ )i = 2ฮด(x โˆ’ xโ€ฒ )ฮด(t โˆ’ tโ€ฒ ). We choose a double-well potential V (ฯ†) = โˆ’ 2ฮธ ฯ†2 + ฯ‡4 ฯ†4 . As in [11] ฯ‡ is a constant, and ฮธ is a function of temperature such that a high ฮธ corresponds to a low temperature. We use a discrete form of (1) using a forward Euler-Maruyama stochastic integrator and a 5-point stencil for the Laplacian (denoted โˆ†L ) for simulation: ฯ†(x, t + ฮดt) = ฯ†(x, t) + Dฮดtโˆ†L ฯ†(x, t) โˆ’ ฮดt[โˆ’ฮธฯ†(x, t) + ฯ‡ฯ†3 (x, t)] q + 2(ฮดt/ฮดx)N(x, t) with time step ฮดt and lattice spacing ฮดx, and where N(x, t) are independent and identically distributed standard normal random variables for each spacetime point (x, t). What follows applies to other discretization schemes as well. 2.2 Estimation problem To cover a broad range of estimation problems, we consider the estimation of quantities related to a specific space-time point, quantities that are global (en4 tire lattice at a particular time) and quantities that depend on the entire time evolution of the system. Specifically, we consider the following representative quantities: (P1) Point magnetization: ฯ†(x, t), P (P2) Total magnetization at a specific time t: x ฯ†(x, t), and P P (P3) Total space-time magnetization: t x ฯ†(x, t). The problem of estimating the expected value of any one of the above quantities can be represented by: J(ฮธ) = E[Y (ฯ‰; ฮธ))] where ฯ‰ is a vector of random numbers representing all the noise/uncertainty in a single complete path ฯ† of the dynamics; ฮธ is the temperature related parameter; Y (ฯ‰; ฮธ) is the random sample of a quantity of interest (e.g., the magnetization from a single sample path), and E[ยท] denotes expectation. Note that knowing the noise ฯ‰ and parameter ฮธ completely determines the path ฯ† and the sample quantity of interest Y (ฯ‰; ฮธ). 2.3 The control variate technique Here we give a brief review of the classical control variate (CV) technique for variance reduction (see [3] [12]). Let Y = Y (ฯ‰; ฮธ), J = E[Y ]. Assume X1 , ยท ยท ยท , Xk are random variables (called control variates) that are correlated with Y and assume their means E[Xi ] are known. Let X = (X1 , ยท ยท ยท , Xk )โŠค , E[X] = (E[X1 ], ยท ยท ยท , E[Xk ])โŠค , and ฮฒ = (ฮฒ1 , ยท ยท ยท , ฮฒk )โŠค . Then Z, defined below, is a controlled estimator of E[Y ] Z=Y + k X i=1 ฮฒi (Xi โˆ’ E[Xi ]) = Y + ฮฒ โŠค (X โˆ’ E[X]) The estimator Z uses information included in samples of the controls (the degree of their deviation from their known means) to โ€œcorrect/adjustโ€ the estimator Y and bring it closer to its unknown mean. This is the key idea of CV. (Alternatively, Z can be viewed as the fitted value of Y when Y is linearly regressed on variables X1 , ยท ยท ยท , Xk . In other words, Z includes the part of the variation in Y that cannot be โ€œexplainedโ€ by Xi โ€™s.) Z is an unbiased estimator of E[Y ] for all vectors ฮฒ. The coefficient vector 5 that minimizes the variance of Z is: ฮฒ o = ฮฃโˆ’1 X ฮฃXY where ฮฃX is the k ร— k covariance matrix of X and ฮฃXY is the k ร— 1 vector of covariances of Y and Xi โ€™s. When ฮฒ o is used, the variance of Z is given by โˆ’1 2 (1 โˆ’ R2 )ฯƒY2 where R2 = ฮฃโŠค XY ฮฃX ฮฃXY /ฯƒY . Therefore, V ar(Y ) = (1 โˆ’ R2 )โˆ’1 V ar(Z) (2) and hence (1 โˆ’ R2 )โˆ’1 is precisely the theoretical degree of variance reduction if the controlled estimator Z = Y + ฮฒ oโŠค (X โˆ’ E[X]) is used to estimate J as opposed to the crude MC estimator Y , and it is called the Variance Reduction Ratio (VRR) statistic for control variates. Note that there is no upper limit to the degree of achievable variance reduction since R2 can potentially be very close to 1 when the controls are highly correlated with the estimation variable Y . In other words, the CV technique can potentially be very effective leading to orders of magnitude of variance reduction. In practice and in general, ฮฃX and ฮฃXY (i.e. ฮฒ o ) are not known exactly and need to be estimated from samples of Xi โ€™s and Y . Typically, ฮฒ o is estimated from the same samples used to construct the controlled estimator Z. While this practice adds some bias for small sample sizes, and thus makes the effective decrease in estimator mean squared error not precisely equal to the variance reduction ratio (1 โˆ’ R2 )โˆ’1 , this bias converges to zero faster than the standard error of Z. Thus, expending computational resources into generating separate pilot samples for estimating ฮฒ o is not considered to be justifiable. For an insightful and detailed discussion of the CV technique, see [3]. 2.4 Challenges in using the CV technique The critical task for using the CV technique is in finding effective controls. Once the controls are selected, the rest of the procedure is fairly routine. An effective control, say X, needs to satisfy two requirements (to simplify the discussion we consider a scalar control): (R1) X needs to be correlated with Y , and (R2) E[X] needs to be available to the user, i.e., known. The main barrier to finding effective controls is the second requirement, namely the requirement of a known mean E[X]. A modification of the CV technique called Biased Control Variate (BCV) reduces the burden of requirement (R2) 6 by allowing for a good approximation of E[X] when E[X] cannot be evaluated analytically [13]. While BCV lowers the requirement barrier and expands the range of available choices for effective controls, it nonetheless limits its potential scope by implicitly assuming an analytic path to arriving at the approximate value. As we describe in the next section, in the DBMC approach we turn the second requirement into a computational task; in other words, we use statistical estimation to obtain a good estimate of E[X]. Therefore, barrier (R2) is completely removed and the range of choices of controls is dramatically expanded. The relevant question now becomes whether the computational investment in estimating E[X] pays enough dividends to make the investment worthwhile. 3 DBMC & Control Variate The starting point of the DBMC approach is the observation that in many parametric estimation settings, including in the example considered in this paper, quantities Y (ฮธ) and Y (ฮธโ€ฒ ) are highly correlated when the same random input ฯ‰ is used to generate them and when ฮธ and ฮธโ€ฒ are close 1 . This suggests using control variates Xi = Y (ฮธi ), i = 1, ยท ยท ยท , k, when estimating Y (ฮธ) where ฮธi โ€™s are โ€œcloseโ€ to ฮธ. While we have identified potentially effective controls, we do not have sufficient information about them, i.e., J(ฮธi ) = E[Xi ] is not known and needs to be evaluated. This brings us to the second feature of the DBMC method that corresponds to its initial computational information gathering/setup stage. This stage corresponds to statistical estimation of J(ฮธi ). Details are given below. 3.1 DBMC + CV algorithm The DBMC approach consists of a setup stage and an estimation stage. 3.1.1 Setup stage The DBMC setup phase involves generating a โ€œlargeโ€ number of input random vectors ฯ‰ and obtaining โ€œhigh qualityโ€ estimates of J(ฮธi ). Let DB = 1 A similar observation is the basis for the histogram re-weighting methods: โ€œfrom a simulation at a single state point (characterized in an Ising model by choice of temperature T and magnetic field H) one does not gain information on properties at that point only, but also in the neighboring region,โ€ ([1], page 116) 7 {ฯ‰1 , ฯ‰2 , ยท ยท ยท , ฯ‰N } (N โ€œlargeโ€) denote a large set of random inputs. This set represents the database. Given the database, the averages of the controls are precisely calculated. A schematic of this stage is given in Figure 1. (1) For j = 1, ยท ยท ยท , N (a) Generate ฯ‰j according to the distribution of the inputs; (b) For i = 1, ยท ยท ยท , k (i) Simulate the path ฯ†(ฯ‰j ; ฮธi ) (ii) Evaluate the value of the control Xi (ฯ‰j ) = Y (ฯ‰j ; ฮธi ) (2) For i = 1, ยท ยท ยท , k (a) Find JDB (ฮธi ), the average of the ith control on the datebase, as JDB (ฮธi ) = N 1 X Y (ฯ‰j ; ฮธi ) N j=1 Fig. 1. DBMC setup stage 3.1.2 Estimation stage To estimate J(ฮธ), at a ฮธ close to ฮธi โ€™s (i = 1, ยท ยท ยท , k) select a โ€œsmallโ€ sample (say of size n โ‰ช N) uniformly from the database. For each sample ฯ‰j resimulate the equation using ฯ‰j and ฮธ to obtain Y (ฯ‰j ; ฮธ). For these samples the values of the controls Xi (ฯ‰j ) are available in the database. Using these evaluate a controlled estimate of J(ฮธ). A schematic version of these steps is given in Figure 2. (1) For (a) (b) (c) j = 1, ยท ยท ยท , n Select ฯ‰j uniformly from the database; Simulate the path ฯ†(ฯ‰j ; ฮธ); Evaluate the estimation variable Y (ฯ‰j ; ฮธ). (2) Find the controlled estimator of J(ฮธ): Jbcv (ฮธ) = n k X 1X [Y (ฯ‰j ; ฮธ) + ฮฒio (Xi (ฯ‰j ) โˆ’ JDB (ฮธi ))] n j=1 i=1 Fig. 2. DBMC estimation stage 8 (3) 3.2 Implementation choices There are two general schemes for implementation of our CV approach: (I1) corresponding to what is described above, requires storing simulation inputs {ฯ‰j } and outputs {Xi (ฯ‰j )} in a database for later resampling; (I2) does not utilize resampling, so there is no storage of data beyond recording the calculated control means. Both implementations are feasible, the first is preferable in most cases; the second may be preferred in some cases. We elaborate below. Implementation (I1). โ€ข The database of random inputs, i.e., ฯ‰j โ€™s, are either directly stored or enough information about them (e.g. input seeds of a pseudo-random number generator) is stored to be able to regenerate ฯ‰j โ€™s precisely. โ€ข The k paths corresponding to ฮธi , i = 1, ยท ยท ยท , k, i.e., ฯ†(ฯ‰j ; ฮธi ) are generally simulated โ€œin parallelโ€ as elements of a random vector, ฯ‰i , are progressively generated. โ€ข For each random input, say ฯ‰j , the value of the controls, Xi (ฯ‰j ), j = 1, . . . , N, i = 1, . . . , k are stored. Implementation (I2). โ€ข Once the setup stage is completed, the only values stored are the โ€œhigh qualityโ€ estimates of the means of J(ฮธi )โ€™s, i.e., the k values JDB (ฮธi ), i = 1, ยท ยท ยท , k. โ€ข At the estimation phase, n random input vectors ฯ‰j , j = 1, . . . , n, are generated anew; paths at ฮธ and ฮธi , i = 1, ยท ยท ยท , k, are simulated using new random inputs and for each path Xi (ฯ‰j ) and Y (ฯ‰j ; ฮธ) are calculated; finally, using these values, the controlled estimator is evaluated. 3.3 Statistical properties & computational efficiency The promise of the approach is the following: by anchoring estimation via CV at a few high quality estimates (at ฮธ1 , ยท ยท ยท , ฮธk ), it is possible to obtain high quality estimates at other locations in the parameter space (at other ฮธ) with far fewer samples. The actual statistical properties of the resulting estimators, and the computational efficiency of generating them, reflect choices made in implementing each given problem. For example, how much computation should be โ€œinvestedโ€ in the exploration phase, and which points ฮธi in the parameter space should be explored are two important questions that need further investigation. Such choices generally involve problem dependent tradeoffs, and we leave them to future studies. 9 Instead, the analysis that follows is meant to provide a general and qualitative understanding of the statistical properties, computational efficiency and the tradeoffs involved. The discussion is as general as possible, but consistent with the numerical study described in section 4, where such implementation choices were made utilizing only a basic familiarity with the problem. For further discussion, see [8]. 3.3.1 Statistical properties We give the analysis for implementation (I1). In other words, assume we are re-sampling from the database. Analysis of implementation (I2) shows similar estimator statistical properties. To simplify the discussion consider a single control, say X1 . Let J(ฮธ) = E[Y ], 2 J(ฮธ1 ) = E[X1 ], ฯƒY2 = Var(Y ), ฯƒX = Var(X1 ). Assume a database of input 1 โˆ— variables are generated and let Y and X1โˆ— be random variables corresponding to Y and X1 that are generated by re-sampling (uniformly, with replacement) 2 from the database. Let J โˆ— (ฮธ), ฯƒY2 โˆ— , J โˆ— (ฮธ1 ), ฯƒX โˆ— denote the means and variances 1 โˆ— โˆ— of the re-sampled variables Y and X . Conditioned on the database, the controlled estimator is exactly the classical CV estimator and all results from classical CV apply. For example, for any scalar ฮฒ, Z โˆ— = Y โˆ— + ฮฒ(X โˆ— โˆ’ J โˆ— (ฮธ1 )) is an unbiased estimator of J โˆ— (ฮธ), J โˆ— (ฮธ1 ) is known, and the optimal ฮฒ o is what is prescribed by classical CV if we take all random variables as those defined on the database. A measure of variance reduction due to using a controlled estimator is V RR = ฯƒY2 โˆ— ฯƒZ2 โˆ— (4) We use the controlled estimator Z โˆ— as an estimator for J(ฮธ). Assume optimal ฮฒ o is used to define Z โˆ— and assume E[Z โˆ— ] = J โˆ— (ฮธ) 2 . In general J โˆ— (ฮธ) 6= J(ฮธ). Therefore, Z โˆ— is a biased estimator of J(ฮธ) where the bias is introduced by sampling from the database, i.e., from Y โˆ— , as opposed to from Y . We have some probabilistic assessment of this bias and we can reduce it by increasing the size of the database. Specifically, for this bias we can obtain an approximate 1 โˆ’ ฮฑ probability confidence interval: zฮฑ/2 ฯƒY P (|J โˆ— (ฮธ) โˆ’ J(ฮธ)| โ‰ค โˆš )โ‰ˆ1โˆ’ฮฑ N 2 i.e. we ignore the low order bias that results from the typical CV procedure of estimating the optimal ฮฒ o e.g. [3], not to be confused with the resampling bias discussed in this section 10 where zฮฑ/2 is the 1 โˆ’ ฮฑ/2 quantile from the standard normal distribution. In other words, with high probability the bias is of the order of O(N โˆ’1/2 ). We assume that for large N the bias is sufficiently small to be disregarded and that we can focus on V RR in (4) as the key measure of computational gain in using the controlled estimator to estimate J(ฮธ). 3.3.2 Computational efficiency Generating the above large database, as we pointed out earlier, corresponds to an initial โ€œsetupโ€ cost. Let C be the computational cost of generating a sample of Y (ฮธ). This cost involves generating an ฯ‰, simulating the path, and evaluating Y (ฯ‰, ฮธ). A reasonable assumption for many problems is that this cost is about the same for all ฮธ and ฯ‰. Then the set-up cost of generating the database and obtaining averages of the controls is approximately N ร—kร—C. Let V RR(ฮธ) denote the variance reduction ratio at ฮธ, i.e., the ratio of the variance of an uncontrolled sample and that of a controlled sample at ฮธ. Then, the statistical error of a controlled estimator based on n samples is approximately the same as that of n ร— V RR(ฮธ) samples of an uncontrolled estimator. Thus, the ratios of the computational costs of the two estimators (to arrive at the same statistical accuracy) is (nร—V RR(ฮธ)ร—C)/(nร—C) = V RR(ฮธ). Therefore, V RR(ยท) can serve as a measure of benefit of the DBMC approach. The setup cost of the DBMC approach can be justified in two types of applications. The first type are those applications that require solving many instances of the estimation problem, at many ฮธโ€™s. If the total number of instances is sufficiently large, and some variance reduction is achieved on the average on those instances, then the large fixed set-up cost can be dwarfed by the total computational savings from the many estimations. The second type are real-time applications where the setup cost can be viewed as an off-line cost enabling significant efficiency gains in the critical task of real-time estimation. Typically, the โ€œcostโ€ of delay in such real-time estimation is higher and not merely computational, justifying even a much larger computational effort off-line. 4 Numerical results The numerical results in this section are intended to give a qualitative illustration of the efficiency gains that can be achieved using the DBMC approach. Specifically, we estimate the variance reduction that can be achieved over regular (crude) sampling, when estimating the three quantities of interest (a point magnetization, total magnetization at a specific time t and the total time-space magnetization) at a range of the parameter ฮธ. Our choices of the 11 size of the database, number of samples used for estimation, range of parameter values, and the controls are simply for illustration purposes. However, we expect that the numerical results are, qualitatively, quite representative. We simulate the TDGL dynamics on a 40 ร— 40 lattice (lattice spacing ฮดxk = 1, k = 1, 2) with fixed ฯ‡ = 1. On each path, we evolve the system for a total of 5000 time steps (ฮดt = 0.01) which is sufficient for the system to exhibit behavior that is specific to its temperature region. The critical point for this system is ฮธc = 1.265 [11], and our parameter range of interest (1.0 to 1.5) extends to both sides of that critical point. To build a database, we simulate N = 214 = 16384 paths and evaluate point magnetization, total magnetization at a specific time, and total space-time magnetization at two nominal values of ฮธ, 1.2 and 1.35. For each quantity of interest, we consider three control variate estimators. The first two estimators, CV1.2 and CV1.35, use single controls corresponding to ฮธ = 1.2 and ฮธ = 1.35, respectively. We chose to anchor our estimators at those two nominal values for ฮธ because they are located on opposite sides of the phase transition line ฮธc . The third estimator, CV2C, uses both controls simultaneously. We use n = 28 = 256 samples for crude and CV estimators. To estimate the variance of these estimators, following the micro-macro simulation approach (see, e.g., [14]), we use 40 independent macro simulations consisting of 256 independent micro simulations. We obtain variance estimates from each macro simulation and average the resulting 40 values to obtain an overall variance estimate. We report the ratios of the variance estimates (crude/controlled, as in (4)) as V RR. A sampling of VRR results for the total space-time magnetization (problem P3) is given in Table 1 and the corresponding graph is given in Figure 3. The graph for point magnetization (problem P1) are given in Fig. 4, and the results for the total magnetization at a time t (problem P2) are quite similar and are excluded. Table 1 Variance reduction ratios of the estimators applied to space-time integral of the P P magnetization, x t ฯ†(x, t), at several values of ฮธ. Estimator\ฮธ 1.150 1.175 1.225 1.250 1.265 1.300 1.325 1.375 1.400 CV1.2 63 236 219 55 33 15 10 6 5 CV1.35 5 6 11 16 21 59 231 245 67 CV2C 170 709 947 332 259 300 761 513 129 Based on these results, we draw the following conclusions: โ€ข Controlled estimators produce dramatic variance reduction for parameter 12 Variance Reduction Ratios for the time integral of the magnetization CV12 CV135 CV2C 2 VRR 10 1 10 1 1.05 1.1 1.15 1.2 1.25 ฮธ 1.3 1.35 1.4 1.45 1.5 Fig. 3. VarianceP reduction ratios of the estimators of the space-time integral of the P magnetization, x t ฯ†(x, t), over a range of values of ฮธ (log scale). values very close to the nominal parameters and substantial variance reduction at values moderately close to the nominal. โ€ข For all the estimation problems, adding the second control consistently improves performance, in some cases leading to substantial reduction in variance (compared to single controls). Of course, by incorporating information from points on both sides of the critical temperature, CV2C is expected to give better coverage than either of the single control estimators. However, CV2C does better than either of the single control estimators even in their own regions, which suggests that each control provides relevant information to the estimation problem in the opposite region. โ€ข VRR values for the total space-time magnetization are somewhat larger than those for the point and total magnetization at a specific time t โ€“ we expect this to be true more generally for path integrals when compared with values at specific time instances. 13 Variance Reduction Ratios for the point magnetization CV12 CV135 CV2C 2 VRR 10 1 10 1 1.05 1.1 1.15 1.2 1.25 ฮธ 1.3 1.35 1.4 1.45 1.5 Fig. 4. Variance reduction ratios of the estimators of the point magnetization over a range of values of ฮธ, in log scale. 5 Conclusions In this paper we described a new strategy, DataBase Monte Carlo (DBMC), for improving computational efficiency of Ensemble Monte Carlo. For a specific time-dependent nonlinear dynamics we showed that the approach can lead to significant efficiency gains for a range of estimation problems. Our selection of the controls has been ad-hoc and for illustration purposes. Further work is required to better understand the options available and the computational tradeoffs involved. To this end, our current research is focused on (i) derivation of more specific guidelines for the selection of effective control variates, (ii) implementation of the DBMC strategy in conjunction with other variance reduction techniques, for example, stratification and importance sampling, and (iii) application of the method in some specific domains, for example, estimation problems in geophysical fluids and biochemical systems. 14 References [1] K. K. Binder, D. Heermann, Monte Carlo Simulation in Statistical Physics: An Introduction, Springer, 2002. [2] G. Evensen, Data Assimilation, The Ensemble Kalman Filter, Springer, 2006. [3] P. Glasserman, Monte Carlo Methods in Financial Engineering, Springer-Verlag New York, Inc, 2004. [4] D. J. Wilkinson, Stochastic Modelling for Systems Biology, CRC Press, 2006. [5] J. M. Hammersley, D. C. Handscomb, Monte Carlo Methods, John Wiley, 1964. [6] S. Asmussen, P. W. Glynn, Stochastic Simulation: Algorithms and Analysis, Springer, 2007. [7] P. Vakili, G. Zhao, T. Borogovac, Database monte carlo: A new strategy for efficient simulation, Tech. rep., Boston University College of Engineering (2008). [8] T. Borogovac, P. Vakili, Database monte carlo approach to effective control variates, Tech. rep., Boston University College of Engineering (2008). [9] A. M. Ferrenberg, R. H. Swendsen, New monte carlo technique for studying phase transitions, Phys. Rev. Lett. 61 (23) (1988) 2635โ€“2638. [10] N. Gulbahce, F. J. Alexander, G. Johnson, Statistical mechanics of histories: A cluster monte carlo algorithm, Phys. Rev. E 73 (2006) 026701. [11] A. L. Ferreira, R. Toral, Hybrid monte carlo method for conserved-orderparameter systems, Phys. Rev. E 47 (6) (1993) R3848โ€“R3851. [12] C. P. Robert, G. Casella, Monte Carlo Statistical Methods, Springer Science & Business Media Inc., 2004. [13] B. Schmeiser, M. R. Taaffe, J. Wang, Biased control-variate estimation, IIE Transactions 33 (2001) 219โ€“228. [14] B. Schmeiser, Chapter 7: Simulation experiments, in: D. P. Heyman, M. J. Sobel (Eds.), Handbooks in OR and MS 2: Stochastic Models, Elsevier B. V., 1990, Ch. 7, pp. 295โ€“330. 15
5cs.CE
Threshold Selection for Multivariate Heavy-Tailed Data Phyllis Wan and Richard A. Davis arXiv:1707.00464v2 [math.ST] 26 Mar 2018 Department of Statistics Columbia University 1255 Amsterdam Avenue, MC 4690 New York, NY 10027 e-mail: [email protected]; [email protected] Abstract: Regular variation is often used as the starting point for modeling multivariate heavy-tailed data. A random vector is regularly varying if and only if its radial part R is regularly varying and is asymptotically independent of the angular part ฮ˜ as R goes to infinity. The conditional limiting distribution of ฮ˜ given R is large characterizes the tail dependence of the random vector and hence its estimation is the primary goal of applications. A typical strategy is to look at the angular components of the data for which the radial parts exceed some threshold. While a large class of methods has been proposed to model the angular distribution from these exceedances, the choice of threshold has been scarcely discussed in the literature. In this paper, we describe a procedure for choosing the threshold by formally testing the independence of R and ฮ˜ using a measure of dependence called distance covariance. We generalize the limit theorem for distance covariance to our unique setting and propose an algorithm which selects the threshold for R. This algorithm incorporates a subsampling scheme that is also applicable to weakly dependent data. Moreover, it avoids the heavy computation in the calculation of the distance covariance, a typical limitation for this measure. The performance of our method is illustrated on both simulated and real data. Keywords and phrases: distance covariance, heavy-tailed data, multivariate regular variation, threshold selection. 1. Introduction For multivariate heavy-tailed data, the principal objective is often to study dependence in the โ€˜tailโ€™ of the distribution. To achieve this goal, the assumption of multivariate regular variation is typically used as a starting point. A random vector X โˆˆ Rd is said to be multivariate regularly varying if the polar coordinates (R, ฮ˜) = (kXk, X/kXk), where k ยท k is some norm, satisfy the conditions (a) R is univariate regularly varying, i.e., P(R > r) = L(r)rโˆ’ฮฑ , where L(ยท) is a slowly varying function at infinity; (b) P(ฮ˜ โˆˆ ยท|R > r) converges weakly to a measure S(ยท) as r โ†’ โˆž. The ฮฑ is referred to as the index of the regular variation, while the S is called the angular distribution and characterizes the limiting tail dependence. There are other equivalent definitions of regular variation (Resnick, 2002), but this one is the most convenient for our purposes. Given observations {Xi }ni=1 and their corresponding polar coordinates {(Ri , ฮ˜i )}ni=1 , a straightforward procedure for estimating S is to look at angular components of the data for which the radii are greater than a large threshold r0 , that is, ฮ˜i for which Ri > r0 . In most studies, one takes r0 to be a large empirical quantile of R. While there has been extensive research on choosing a threshold for which the distribution of R is regularly varying (i.e., limit condition (a)), little research has been devoted to ensuring the threshold is large enough for the independence of ฮ˜ and R to be reasonable (i.e., limit condition (b)). To this end, de Haan and de Ronde (1998) fit a parametric extreme value distribution model to each marginal and examined the parameter stability plot of each coordinate. The StaฬŒricaฬŒ plot (StaฬŒricaฬŒ, 1999) looked at the joint tail empirical measure, but was, in some way, equivalent to only examining the extremal behavior of R. Resnick (2007) suggested an automatic threshold selection from the StaฬŒricaฬŒ plot but observed that the thresholds were sometimes systematically underestimated. In their study of the threshold based inference for parametric max-stable processes, Jeon and Smith (2014) suggested choosing the threshold by minimizing the MSE of the estimated parameters. In this paper, we propose an algorithm which selects the threshold for modeling S. Our motivation is the implied property that R and ฮ˜ given R > r become independent as r โ†’ โˆž. Given a sequence of candidate 1 imsart-generic ver. 2014/10/16 file: thres_arxiv.tex date: March 28, 2018 2 Wan and Davis threshold levels, we test the degree of dependence between R and ฮ˜ for the truncated data above each level. The dependence measure we use is the distance covariance introduced by Szeฬkely et al. (2007). This measure has the ability to account for various types of dependence and to be applicable to data in higher dimensions. The resulting test statistics are given in the form of p-values and are compared across all levels through a subsampling scheme. This enables us to extract more accurate information from the test statistics while not overloading the computational burden. The remainder of this paper is organized as follows. We first provide some theoretical backgrounds on multivariate regular variation in Section 2. The distance covariance and its theoretical properties are introduced in Section 3. Applying this dependence measure in our conditioning setting, we propose a test statistic and prove relevant theoretical results in Section 4. Our proposed algorithm for threshold selection is presented in Section 5, and illustrated on simulated and real examples in Section 6. The paper concludes with a discussion. 2. Multivariate regular variation and problem set-up One way to approach multivariate heavy-tailed data is through the notion of multivariate regular variation. For a detailed review, see, for example, Chapter 6 of Resnick (2007). Let X = (X1 , . . . , Xd ) be a d-dimensional random variable defined on the cone Rd+ = [0, โˆž)\{0}. Define the polar coordinate transformation T (X) = (kXk, X/kXk) =: (R, ฮ˜), (2.1) where k ยท k denotes some norm. Then X is regularly varying if and only if there exists a probability measure S(ยท) on Sdโˆ’1 , the unit sphere in Rd , and a function b(t) โ†’ โˆž, such that v tP [(R/b(t), ฮ˜) โˆˆ ยท] โ†’ ฮฝฮฑ ร— S, t โ†’ โˆž, (2.2) v where โ†’ denotes vague convergence, and ฮฝฮฑ is a measure defined on (0, โˆž] such that ฮฝฮฑ (x, โˆž] = xโˆ’ฮฑ , x > 0. Here b(t) can be chosen as the 1 โˆ’ tโˆ’1 -quantile, i.e., b(t) = inf{s|P(R โ‰ค s) โ‰ฅ 1 โˆ’ tโˆ’1 }. The convergence (2.2) implies that    R w , ฮ˜ โˆˆ ยท R > r โ†’ ฮฝฮฑ ร— S, P r r โ†’ โˆž, on [1, โˆž) ร— Sdโˆ’1 , (2.3) w where โ†’ denotes weak convergence. In other words, given that R > r for r large, the conditional distribution of R/r and ฮ˜ are independent in the limit. In view of (2.3), we restrict the measure ฮฝฮฑ to [1, โˆž) throughout the remainder of the paper. The angular measure S characterizes the tail dependence structure of X. If S is concentrated on {ei , i = 1, . . . d}, where ei = (0, . . . , 0, 1, 0, . . . , 0), then the components of X are asymptotically independent in the tail, a case known as asymptotic independence. If S has mass lying in the subspace {(t1 , . . . , td ) โˆˆ Sdโˆ’1 |ti > 0, tj > 0, i 6= j}, then an extreme observation in the Xi direction implicates a positive probability of an extreme observation in the Xj direction, a case known as asymptotic dependence. Hence the estimation of S from observations is an important problem, and often the primary goal, in multivariate heavy-tailed modeling. The following convergence is implied from (2.3): w P(ฮ˜ โˆˆ ยท|R > r) โ†’ S(ยท), r โ†’ โˆž. (2.4) This suggests estimating S using the angular data (ฮ˜i ) whose radial parts satisfy Ri > r0 for r0 large. The motivation behind our method is to seek r0 such that when R > r0 , R and ฮ˜ are virtually independent. Given a candidate threshold sequence {rk }, we formally test the independence between (Ri , ฮ˜i ) on the index set {i|Ri > rk }. The use of Pearsonโ€™s correlation as the dependence measure is unsuitable in this case, for two reasons. First, correlation is only applicable to univariate random variables, whereas ฮ˜ lies on the sphere of dimension d โˆ’ 1. Second, correlation only describes the linear relationship between two random variables, thus having zero correlation is not a sufficient condition for independence. Instead, we use a more powerful dependence measure, the distance covariance, which is introduced in the next section. Threshold Selection for Multivariate Heavy-Tailed Data 3 3. Distance covariance In this section, we briefly review the definition and some properties of the distance covariance. More detailed descriptions and proofs can be found in Szeฬkely et al. (2007) and Davis et al. (2017). Let X โˆˆ Rp and Y โˆˆ Rq be two random vectors, then the distance covariance between X and Y is defined as Z 2 T (X, Y ; ยต) = ฯ•X,Y (s, t) โˆ’ ฯ•X (s) ฯ•Y (t) ยต(ds, dt) , (s, t) โˆˆ Rp+q (3.1) Rp+q where ฯ•X,Y (s, t), ฯ•X (s), ฯ•Y (t) denote the joint and marginal characteristic functions of (X, Y ) and ยต is a suitable measure on Rp+q . In order to ensure that T (X, Y ; ยต) is well-defined, one of the following conditions is assumed to be satisfied throughout the paper (Davis et al., 2017): 1. ยต is a finite measure on Rp+q ; 2. ยต is an infinite measure on Rp+q such that Z (1 โˆง |s|ฮฑ )(1 โˆง |t|ฮฑ )ยต(ds, dt) < โˆž Rp+q and E[|XY |ฮฑ + |X|ฮฑ + |Y |ฮฑ ] < โˆž for some ฮฑ โˆˆ (0, 2]. One advantage of distance covariance over, say, Pearsonโ€™s covariance, is that, if ยต has a positive Lebesgue density on Rp+q , then X and Y are independent if and only if T (X, Y ; ยต) = 0. Another attractive property of this dependence measure is that it readily applies to random vectors of different dimensions. To estimate T (X, Y ; ยต) from observations (X1 , Y1 ), . . . , (Xn , Yn ), define the empirical distance covariance Z 2 ฯ•ฬ‚X,Y (s, t) โˆ’ ฯ•ฬ‚X (s) ฯ•ฬ‚Y (t) ยต(ds, dt) , Tn (X, Y ; ยต) = Rp+q 1 Pn e i hs,Xj i+i ht,Yj i and ฯ•ฬ‚X (s) = ฯ•ฬ‚X,Y (s, 0), ฯ•ฬ‚Y (t) = ฯ•ฬ‚X,Y (0, t) are the respective where ฯ•ฬ‚X,Y (s, t) = n j=1 empirical characteristic functions. If we assume that ยต = ยต1 ร— ยต2 and is symmetric about the origin, then under the conditions where T (X, Y ; ยต) exists, Tn (X, Y ; ยต) also has the computable form Tn (X, Y ; ยต) = n 1 X ยตฬƒ1 (Xi โˆ’ Xj ) ยตฬƒ2 (Yi โˆ’ Yj ) n2 i,j=1 + 1 n4 n X ยตฬƒ1 (Xi โˆ’ Xj )ยตฬƒ2 (Yk โˆ’ Yl ) โˆ’ i,j,k,l=1 2 n3 n X ยตฬƒ1 (Xi โˆ’ Xj )ยตฬƒ2 (Yi โˆ’ Yk ), i,j,k=1 R where ยตฬƒ(x) = (1 โˆ’ coshs, xi) ยต(ds) (Davis et al., 2017). The most popular choice of ยต, first mentioned by Feuerverger (1993) and then more extensively studied by Szeฬkely et al. (2007), is ยต(ds, dt) = cp,q |s|โˆ’ฮบโˆ’p |t|โˆ’ฮบโˆ’q ds dt . (3.2) where cp,q is as defined in Lemma 1 of Szeฬkely et al. (2007). This choice of ยต gives ยตฬƒ(x)ยตฬƒ(y) = |x|ฮบ |y|ฮบ . Moreover, this is the only choice of ยต for which the distance covariance is invariant relative to scale and orthogonal transformations. Note that in order for the integral (3.1) to exist, it is required that E[|X|ฮบ |Y |ฮบ + |X|ฮบ + |Y |ฮบ ] < โˆž. We will utilize the described weight measure (3.2) with ฮบ = 1 in our simulations and data analyses in Section 6, but applied to the log transformation on R to ensure that the moment condition is satisfied. As detailed in Davis et al. (2017), if the sequence {(Xi , Yi )} is stationary and ergodic, then a.s. Tn (X, Y ; ยต) โ†’ T (X, Y ; ยต). (3.3) 4 Wan and Davis Further, if X and Y are independent, then under an ฮฑ-mixing condition, Z d n Tn (X, Y ; ยต) โ†’ |G(s, t)|2 ยต(s, t) (3.4) Rp+q for some centered Gaussian field G. On the other hand, if X and Y are dependent, then โˆš d n(Tn (X, Y ; ยต) โˆ’ T (X, Y ; ยต)) โ†’ G0ยต for some non-trivial limit G0ยต , implying that n Tn (X, Y ; ยต) diverges as n โ†’ โˆž. Naturally one can devise a test of independence between X and Y using the statistic n Tn (X, Y ; ยต): the null R hypothesis of independence is rejected at level ฯ‡ if n Tn (X, YR; ยต) > c, where c is the upper ฯ‡-quantile of Rp+q |G(s, t)|2 ยต(s, t). In practice, the distribution Rp+q |G(s, t)|2 ยต(s, t) is intractable and is typically approximated through bootstrap. Hence the main drawback of using distance covariance is the computation burden it brings for large sample size: the computation of a single distance covariance statistic requires O(n2 ) operations, while finding the cut-off values via resampling requires much more additional computation. Our method, however, overcomes this problem through subsampling the data, as will be described in Section 5. 4. Theoretical results Let {Xi }ni=1 be iid observations in Rd from a multivariate regularly varying distribution X satisfying (2.1) and (2.3), and {(Ri , ฮ˜i )}ni=1 be their polar coordinate transformations. Given a threshold rn , we measure the dependence between R/rn and ฮ˜ conditional on R > rn by the empirical distance covariance of (R/rn , ฮ˜) on the set {R > rn }: Z |Cn (s, t)|2 ยต(ds, dt), Tn := (4.1) Rd+1 with Cn (s, t) := ฯ•ฬ‚ R ,ฮ˜|rn (s, t) โˆ’ ฯ•ฬ‚ R |rn (s)ฯ•ฬ‚ฮ˜|rn (t), rn rn where ฯ•ฬ‚ R ,ฮ˜|rn is the conditional empirical characteristic function of (R/rn , ฮ˜), rn n X T 1 eisRj /rn +it ฮ˜j 1{Rj >rn } , s โˆˆ R, t = (t1 , . . . , td )T โˆˆ Rd , j=1 1{Rj >rn } j=1 ฯ•ฬ‚ R ,ฮ˜|rn (s, t) = Pn rn and ฯ•ฬ‚ R |rn , ฯ•ฬ‚ฮ˜|rn are the corresponding empirical conditional marginal characteristic functions, rn ฯ•ฬ‚ R |rn (s) = ฯ•ฬ‚ R ,ฮ˜|rn (s, 0), rn rn ฯ•ฬ‚ฮ˜|rn (t) = ฯ•ฬ‚ R ,ฮ˜|rn (0, t). rn In this section, we establish the limiting results (3.3) and (3.4) adapted to the conditional distance covariance. For ease of notation, let n pn := P(R > rn ) , pฬ‚n := 1X 1{Rj >rn } n j=1 be the theoretical and empirical probability of exceedance, and let i h isR/rn +itT ฮ˜ h i E e 1 R>r n T ฯ• R ,ฮ˜|rn (s, t) := E eisR/rn +it ฮ˜ |R > rn = , rn pn and ฯ• R |rn (s) := ฯ• R ,ฮ˜|rn (s, 0), rn rn ฯ•ฮ˜|rn (t) := ฯ• R ,ฮ˜|rn (0, t), rn be the theoretical conditional joint and marginal characteristic functions. Threshold Selection for Multivariate Heavy-Tailed Data 5 Recall from (2.3) that as n โ†’ โˆž, R/rn and ฮ˜ become asymptotically independent and converge to ฮฝฮฑ and S respectively. Denote the characteristic functions of the corresponding limit distributions by Z โˆž ฯ•R (s) := exp(isr)ฮฑrโˆ’ฮฑโˆ’1 dr = lim ฯ• R |rn (s), (4.2) nโ†’โˆž rn 1 Z ฯ•ฮ˜ (t) := exp(itฮธ)S(dฮธ) = lim ฯ•ฮ˜|rn (t). (4.3) nโ†’โˆž Sdโˆ’1 We have the following results. Theorem 4.1. 1. Let X1 , . . . , Xn be iid observations generated from X, where X is multivariate regularly varying with index ฮฑ > 1. Let Tn be the conditional empirical distance covariance between the angular and radial component defined in (4.1). Further assume that npn โ†’ โˆž and the weight measure ยต satisfies Z (1 โˆง |s|ฮฒ )(1 โˆง |t|2 )ยต(ds, dt) < โˆž, (4.4) Rd+1 for some 1 < ฮฒ < 2 โˆง ฮฑ. Then p Tn โ†’ 0. 2. In addition, if {rn } satisfies Z npn Rd+1 |ฯ• R ,ฮ˜|rn (s, t) โˆ’ ฯ• R |rn (s)ฯ•ฮ˜|rn (t)|2 ยต(ds, dt) โ†’ 0, rn rn then d Z npฬ‚n Tn โ†’ |Q(s, t)|2 ยต(ds, dt), (4.5) (4.6) Rd+1 where Q is a centered Gaussian process with covariance function cov(Q(s, t), Q(s0 , t0 )) = (ฯ•R (s โˆ’ s0 ) โˆ’ ฯ•R (s)ฯ•R (โˆ’s0 ))(ฯ•ฮ˜ (t โˆ’ t0 ) โˆ’ ฯ•ฮ˜ (t)ฯ•ฮ˜ (โˆ’t0 )) (4.7) with ฯ•R , ฯ•ฮ˜ as defined in (4.2) and (4.3). Remark 4.2. In the case where X is regularly varying with index ฮฑ โ‰ค 1, similar results hold if we replace R/rn with log(R/rn ) for which all moments exist. The proof of the theorem is delayed to Appendix A. In the following remark, we discuss certain sufficient conditions for assumption (4.5). Remark 4.3. Assume that ยต = ยต1 ร—ยต2 , where ยต1 , ยต2 are measures on R and Rd , respectively, and symmetric about the origin. From Section 2.2 of Davis et al. (2017), condition (4.5) is equivalent to  R R0 npn E[ยตฬƒ1 ( โˆ’ ) ยตฬƒ2 (ฮ˜ โˆ’ ฮ˜0 )|R, R0 > rn ] rn rn R R0 +E[ยตฬƒ1 ( โˆ’ )|R, R0 > rn ] E[ยตฬƒ2 (ฮ˜ โˆ’ ฮ˜0 )|R, R0 > rn ] rn rn  R R0 โˆ’2 E[ยตฬƒ1 ( โˆ’ )ยตฬƒ2 (ฮ˜ โˆ’ ฮ˜00 )|R, R0 > rn ] โ†’ 0, (4.8) rn rn where Z ยตฬƒi (x) = (1 โˆ’ cos(xT s)) ยตi (ds), i = 1, 2. Let P R ,ฮ˜|rn denote the conditional joint distribution of (R/rn , ฮ˜) given R > rn and P R |rn , Pฮ˜|rn be the rn rn respective conditional marginals. Then (4.8) can be expressed as Z Z npn ยตฬƒ1 (T โˆ’ T 0 ) ยตฬƒ2 (ฮ˜ โˆ’ ฮ˜0 ) (1,โˆž)ร—Sdโˆ’1 (1,โˆž)ร—Sdโˆ’1 6 Wan and Davis  P R ,ฮ˜|rn (dT, dฮ˜)P R ,ฮ˜|rn (dT 0 , dฮ˜0 ) rn rn +P R |rn (dT )Pฮ˜|rn (dฮ˜)P R |rn (dT 0 )Pฮ˜|rn (dฮ˜0 ) rn rn  โˆ’2P R ,ฮ˜|rn (dT, dฮ˜)P R |rn (dT 0 )Pฮ˜|rn (dฮ˜0 ) r rn Zn ยตฬƒ1 (T โˆ’ T 0 ) ยตฬƒ2 (ฮ˜ โˆ’ ฮ˜0 ) Z = (1,โˆž)ร—Sdโˆ’1 โˆš (1,โˆž)ร—Sdโˆ’1   npn P R ,ฮ˜|rn (dT, dฮ˜) โˆ’ P R |rn (dT )Pฮ˜|rn (dฮ˜) r rn n  โˆš 0 0 npn P R ,ฮ˜|rn (dT , dฮ˜ ) โˆ’ P R |rn (dT 0 )Pฮ˜|rn (dฮ˜0 ) โ†’ 0, rn rn (4.9) where (R0 , ฮ˜0 ), (R00 , ฮ˜00 ) are iid copies of (R, ฮ˜). One way to verify (4.9) is to assume a second-order like condition on the distribution of (R, ฮ˜). For example, assume that P R ,ฮ˜|rn โˆ’ ฮฝฮฑ ร— S w rn โ†’ ฯ‡, A(rn ) where ฯ‡ is a signed measure such that ฯ‡([r, โˆž] ร— B) is finite for all r โ‰ฅ 1 and B Borel set in Sdโˆ’1 , the unit sphere in Rd , and the scalar function A(t) โ†’ 0 as t โ†’ โˆž. When the components of X are asymptotically independent, this is equivalent to the second order condition for multivariate regular variation (Resnick, โˆš โˆš 2002). If we choose the sequence rn such that npn โ†’ โˆž and npn A(rn ) โ†’ 0, then โˆš = โˆš npn A(rn ) npn A(rn ) P R ,ฮ˜|rn ((ยท, ยท)) โˆ’ P R |rn (ยท) ร— Pฮ˜|rn (ยท) rn rn A(rn ) P R ,ฮ˜|rn ((ยท, ยท)) โˆ’ ฮฝฮฑ ร— S((ยท, ยท)) rn A(rn )  ฮฝฮฑ (ยท) ร— (Pฮ˜|rn (ยท) โˆ’ S(ยท)) w โ†’ 0 โˆ’ A(rn ) โˆ’   P R |rn (ยท) โˆ’ ฮฝฮฑ (ยท) ร— Pฮ˜|rn (ยท) rn A(rn ) on [1, โˆž] ร— Sdโˆ’1 . In the case where ยต1 , ยต2 are finite measures, ยตฬƒ1 , ยตฬƒ2 are bounded and (4.9) is satisfied since the integrand can be written as "Z Z ยตฬƒ1 (T โˆ’ T 0 ) ยตฬƒ2 (ฮ˜ โˆ’ ฮ˜0 ) npn A2 (rn ) (1,โˆž)ร—Sdโˆ’1 (1,โˆž)ร—Sdโˆ’1 P R ,ฮ˜|rn (dT, dฮ˜) โˆ’ P R |rn (dT )Pฮ˜|rn (dฮ˜) rn # rn A(rn ) 0 P R ,ฮ˜|rn (dT , dฮ˜0 ) โˆ’ P R |rn (dT 0 )Pฮ˜|rn (dฮ˜0 ) rn rn A(rn ) โ†’ 0. In the special case that |A| โˆˆ RVฯ for ฯ < 0, (4.9) is met provided rn is chosen such that 1 1 O(n ฮฑ+2|ฯ| + ) โ‰ค rn โ‰ค o(n ฮฑ ), for some  > 0. When the measures ยต1 , ยต2 are infinite, (4.5) can be verified in specific cases. This is illustrated in the following example. Example 4.4. Let X follow a bivariate logistic distribution, i.e., X has cdf โˆ’1/ฮณ P(X1 < x1 , X2 < x2 ) = exp(โˆ’(x1 โˆ’1/ฮณ ฮณ + x2 ) ), ฮณ โˆˆ (0, 1). (4.10) Then X has asymptotically independent components if and only if ฮณ = 1. It can be shown that X is regularly varying with index ฮฑ = 1, i.e., pn = P(R > rn ) โˆผ rnโˆ’1 as rn โ†’ โˆž. Using the L1 -norm, k(x1 , x2 )k = |x1 |+|x2 |, Threshold Selection for Multivariate Heavy-Tailed Data 7 the pseudo-polar coordinate transform is (R, ฮ˜) = (X1 + X2 , X1 /(X1 + X2 ))โˆˆ (0, โˆž) ร— [0, 1] and the pdf of (R, ฮ˜) is fR,ฮ˜ (r, ฮธ) = r โˆ’ ฮณ+1 ฮณ โˆ’2  โˆ’ ฮณ1 โˆ’ ฮณ1 ฮณโˆ’2 ฮธ (ฮธ(1 โˆ’ ฮธ)) + (1 โˆ’ ฮธ)   1 ฮณ ฮณ โˆ’ 1  1 โˆ’ rโˆ’1 ฮธโˆ’ ฮณ + (1 โˆ’ ฮธ)โˆ’ ฮณ . ฮณ e  ฮณ โˆ’1 โˆ’1 โˆ’r โˆ’1 ฮธ ฮณ +(1โˆ’ฮธ) ฮณ We now consider the case of the infinite weight measure ยต given in (3.2) with ฮบ = 1 and derive the condition on the sequence {rk } for which the conditions of Theorem 4.1 hold. First observe that f R ,ฮ˜|rn (t, ฮธ) rn โˆ’ ฮณ+1 ฮณ โˆ’2  โˆ’ ฮณ1 โˆ’ ฮณ1  ฮณ โˆ’1 โˆ’1 โˆ’1 โˆ’1 โˆ’rn t ฮธ ฮณ +(1โˆ’ฮธ) ฮณ ฮณโˆ’2 (ฮธ(1 โˆ’ ฮธ)) ฮธ + (1 โˆ’ ฮธ) e   ฮณ ฮณ โˆ’ 1  1 1 โˆ’ rnโˆ’1 tโˆ’1 ฮธโˆ’ ฮณ + (1 โˆ’ ฮธ)โˆ’ ฮณ ฮณ  1 ฮณโˆ’2 ฮณ+1 1 1 โˆ’ ฮณ โˆ’ โ†’ tโˆ’2 (ฮธ(1 โˆ’ ฮธ)) ฮณ ฮธโˆ’ ฮณ + (1 โˆ’ ฮธ)โˆ’ ฮณ , ฮณ =: fT (t)fฮ˜ (ฮธ), = t as n โ†’ โˆž, (4.11) and rn f R ,ฮ˜|rn (t, ฮธ) โˆ’ fT (t)fฮ˜ (ฮธ) rn โ‰ค fT (t)fฮ˜ (ฮธ) rn e  ฮณ โˆ’1 โˆ’1 โˆ’1 โˆ’1 โˆ’rn t ฮธ ฮณ +(1โˆ’ฮธ) ฮณ ฮณ  โˆ’1 โˆ’1 โˆ’1 โˆ’1 โˆ’rn t ฮธ ฮณ +(1โˆ’ฮธ) ฮณ +e  tโˆ’1 ฮธ โˆ’ ฮณ1 โˆ’1 โˆ’ ฮณ1 + (1 โˆ’ ฮธ) ฮณ ฮณ 1โˆ’ฮณ ! โ‰ค   1 ฮณ ฮณ  1 1 1 fT (t)fฮ˜ (ฮธ) tโˆ’1 ฮธโˆ’ ฮณ + (1 โˆ’ ฮธ)โˆ’ ฮณ + tโˆ’1 ฮธโˆ’ ฮณ + (1 โˆ’ ฮธ)โˆ’ ฮณ โ‰ค  1 2ฮณโˆ’2 1 tโˆ’3 ฮธโˆ’ ฮณ + (1 โˆ’ ฮธ)โˆ’ ฮณ โ‰ค ctโˆ’3 , ฮณ 1โˆ’ฮณ  1 1โˆ’ฮณ for t โ‰ฅ 1 and ฮธ โˆˆ [0, 1], where c denotes a generic a constant whose value may change from line to line throughout the paper, and the last inequality comes from the facts that 1 ฮธ(1 โˆ’ ฮธ) โ‰ค 4  and ฮธ โˆ’ ฮณ1 โˆ’ ฮณ1 + (1 โˆ’ ฮธ) 2ฮณโˆ’2   2โˆ’2ฮณ ฮณ 1 โ‰ค < โˆž. 2 Letting hn (t, ฮธ) := f R ,ฮ˜|rn (t, ฮธ) โˆ’ f R |rn (t)fฮ˜|rn (ฮธ) rn rn rnโˆ’1 , we have 1 Z Z โˆž Z 1 Z |hn (t, ฮธ)|dtdฮธ, max 0 Z 1 1Z โˆž โ‰ค โˆž  | log(t)hn (t, ฮธ)|dtdฮธ 0 1 |thn (t, ฮธ)|dtdฮธ 0 Z 1 1 Z โ‰ค 0 1 โˆž f R ,ฮ˜|rn (t, ฮธ) โˆ’ fT (t)fฮ˜ (ฮธ) rn tโˆ’1 rnโˆ’1 dtdฮธ 8 Wan and Davis 1 Z โˆž Z fT (t) + dtdฮธ tโˆ’1 rnโˆ’1 f R |rn (t) โˆ’ fT (t) fฮ˜|rn (ฮธ) rn โˆ’1 โˆ’1 dtdฮธ, t rn 1 0 1 Z โˆž Z + 1 0 fฮ˜|rn (ฮธ) โˆ’ fฮ˜ (ฮธ) where the first term can be bounded by 1 Z 0 Z โˆž ctโˆ’2 dtdฮธ < โˆž, 1 and the other terms can be bounded in the same way. Since R has infinite first moment, we apply the distance correlation to log R and ฮ˜. The integral in (4.9) is bounded by npn rn2 Z n c 3 rn Z 1 0 1 Z Z โˆž 1 โˆž Z Z 1 0 1 Z Z โˆž | log t โˆ’ log t0 ||ฮธ โˆ’ ฮธ0 ||hn (t, ฮธ)||hn (t0 , ฮธ0 )|dtdฮธdt0 dฮธ0 1 โˆž (| log t| + | log t0 |)|hn (t, ฮธ)||hn (t0 , ฮธ0 )|dtdฮธdt0 dฮธ0 1 0 1 0 Z 1 Z โˆž  Z 1 Z โˆž  n n โ‰ค c 3 | log(t)hn (t, ฮธ)|dtdฮธ |hn (t, ฮธ)|dtdฮธ โ‰ค c 3 , rn r 0 1 0 1 n โ‰ค which converges to zero if n = o(rn3 ). Therefore if {rn } is chosen such that rn = o(n) and n = o(rn3 ), then Theorem 4.1 holds. The result in Theorem 4.1 can be generalized from iid to a regularly varying time series setting, which we present in the next theorem. For a multivariate stationary time series {Xt } and h โ‰ฅ 1, set Yh = (X0 , . . . , Xh ). Then {Xt } is regularly varying if P(xโˆ’1 Yh โˆˆ ยท) v โˆ— โ†’ ยตh (ยท), P(xโˆ’1 kX0 k > 1) (h+1)d for some non-null measure ยตโˆ—h on R0 =R (h+1)d x โ†’ โˆž, \{0}, R = R โˆช {ยฑโˆž}, with the property that ยตโˆ—h (tC) = (h+1)d tโˆ’ฮฑ ยตโˆ—h (C) for any t > 0 and Borel set C โŠ‚ R0 . See, for example, page 979 of Davis and Mikosch (2009). It follows easily that P(xโˆ’1 (X0 , Xh ) โˆˆ ยท) v โ†’ ยตh (ยท), (4.12) P(kX0 k > x) where ยตh (D) = C ยท ยตโˆ—h ({s โˆˆ R (h+1)d : (s1 , sh ) โˆˆ D}). Assume that {Xt } is ฮฑ-mixing. We assume the following conditions between {Xt } and the sequence of threshold {rn }, which can be verified for various time series models (Davis and Mikosch, 2009). โˆ’1 (M) Assume pโˆ’1 (kX1 k > rn ) = o(n1/3 ) and that there exists a sequence {ln } such that ln โ†’ โˆž, n =P ln pn โ†’ 0, and i)  ฮด X โˆž 1 ฮฑhฮด โ†’ 0 for some ฮด โˆˆ (0, 1); (4.13) pn h=ln ii) lim lim sup hโ†’โˆž nโ†’โˆž ln 1 X P(kX0 k > rn , kXj k > rn ) = 0; pn (4.14) j=h iii) npn ฮฑln โ†’ 0. (4.15) Threshold Selection for Multivariate Heavy-Tailed Data 9 Theorem 4.5. Let {Xt } be a multivariate regularly varying time series with tail index ฮฑ > 1 and ฮฑmixing with coefficients {ฮฑh }hโ‰ฅ0 . Assume the same conditions for the weight measure ยต and the sequence of thresholds {rn } in Theorem 4.1, i.e., (4.4), (4.5) hold, and that condition (M) holds. Then Z d npฬ‚n Tn โ†’ |Q0 (s, t)|2 ยต(ds, dt), Rd+1 where Q0 is a centered Gaussian process. In particular, p Tn โ†’ 0. The proof of Theorem 4.5 is given in Appendix B. Note that the limiting distributions Q in Theorem 4.1 and Q0 in Theorem 4.5 are both intractable. In practice, quantiles of the distributions are calculated using resampling methods. While in the iid case this can be done straightforwardly, in the weakly dependent case one needs to apply the block bootstrap or stationary bootstrap to obtain the desired result (see Davis et al. (2012)). In the following section, we present a threshold selection framework with a subsampling scheme that does not require independence between the observations. 5. Threshold selection In this section, we propose a procedure to select the threshold for estimating the spectral measure S from observations X1 , ยท ยท ยท , Xn . Let us first consider the case where a specific threshold rn is given. Then (4.1) specifies the empirical distance covariance between R/rn and ฮ˜ conditional on R > rn . Under the assumption (4.5), we have from Theorem 4.1, Z npฬ‚n Tn โ†’ |Q(s, t)|2 ยต(ds, dt), Rd+1 R where npฬ‚n is the number of observations such that Ri > rn . In practice, the limit distribution |Q|2 ยต(s, t) is intractable, but one can resort to bootstrapping. Consider the hypothesis testing framework: H0 : R/rn and ฮ˜ are independent given R > rn H1 : R/rn and ฮ˜ are not independent given R > rn . Define the p-value for testing H0 versus H1 to be Z  2 pv = P |Q(s, t)| ยต(ds, dt) > u Rd+1 . (5.1) u=npฬ‚n Tn Then under H0 , pv follows U (0, 1), while under H1 , pv should be sufficiently small. Now consider a decreasing sequence of candidate thresholds {rk }. From (5.1), a sequence of p-values {pvk }, each corresponding to a threshold rk , can be obtained. Our goal is to find the smallest threshold rโˆ— such that conditional on R > rโˆ— , ฮ˜ can reasonably be considered independent of R. Note that the pvk โ€™s are not independent for each k since they are computed from the same set of data. Conventional multiple testing procedures, such as Bonferroni correction, are problematic to implement for dependent p-values. To counter these limitations, we propose an intuitive and direct method based on subsampling. The idea is outlined as follows: For a fixed level rk , we choose a subsample of size nk from the conditional empirical cdf Fฬ‚ R ,ฮ˜|rk of (Ri /rk , ฮ˜i ) with Ri > rk , i = 1, . . . , n. For this subsample, we compute the rn distance covariance Tn,k . To compute a p-value of Tn,k under the assumption that the conditional empirical distribution is a product of the conditional marginals, we take a large number (L) of subsamples of size nk from Fฬƒ R ,ฮ˜|rk (dฮธ, dr) = Fฬ‚ฮ˜|rk (dฮธ)Fฬ‚ R |rk (dr), rn rn (l) and calculate the value Tฬƒn,k , l = 1, . . . , L for each subsample. The p-value of Tn,k , pvk , is then the empirical p(l) value of Tn,k relative the {Tฬƒn,k }l=1,...,L . This process, starting with an initial subsample of nk from Fฬ‚ R ,ฮ˜|rk is rn 10 Wan and Davis (j) repeated m times, which produces m estimates {pvk }j=1,...,m of the pvk , which are independent conditional on the original sample. These are then averaged m pv k = 1 X (j) pv . m j=1 k So for the sequence of levels {rk }, we produce a sequence of independent p-values {pv k }. Our choice of threshold r at which (ฮ˜, R)|R > r are independent (and dependent otherwise) will be based on an examination of the path of the mean p-values, {pv k }. Note the following two observations: (1) (m) โ€ข If R and ฮ˜ are independent given R > rk , then the pvk , . . . , pvk will be iid and approximately U (0, 1)-distributed, so that pv k should center around 0.5. (j) โ€ข If R and ฮ˜ are dependent given R > rk , then the pvk โ€™s will be well below 0.5 (closer to 0), and so will pv k . By studying the sequence {pv k }, which we call the mean p-value path, we choose the threshold to be the smallest rk such that pv l is around 0.5 for l < k. A well-suited change-point method for our situation is the CUSUM algorithm, by Page (1954), which detects the changes in mean in a sequence by looking at mean-corrected partial sums. In our algorithm, we use a spline fitting method that is based on the CUSUM approach called wild binary segmentation (WBS), proposed by Fryzlewicz (2014). The WBS procedure uses the CUSUM statistics of subsamples and fits a piecewise constant spline to {pv k }. In our setting, we may choose rk to be the knot of the spline after which the fitted value is comfortably below 0.5. There are several advantages to using the subsampling scheme. First, recall that the p-value path {pvk }, which is obtained from the whole data set, has complicated serial structure and varies greatly from each realization. In contrast, the mean p-values pv k from subsampling are conditionally independent and will center around 0.5 with small variance when the total sample size n and the number of subsample m is large. This, in turns, helps to present a justifiable estimation for the threshold. Second, the calculation of distance covariance can be extremely slow for moderate sample size. Using smaller sample sizes for the subsamples, our computational burden is greatly reduced. In addition, this procedure is amenable to parallel computing, reducing the computation time even further. Third, the subsampling makes it possible to accommodate stationary but dependent data, waiving the stringent independent assumption. The idea of looking at the mean p-value path is inspired by Mallik et al. (2011), which used the mean of p-values from multiple independent tests to detect change points in population means. 6. Data Illustration In this section, we demonstrate our threshold selection method through simulated and real data examples. In practice, we set the sequence of thresholds {rk } to be the corresponding upper quantiles to {qk }, a pre-specified sequence of quantile levels. The subsample size nk at each threshold rk is set as nk = n0 ยท qk for some n0 << n. This is designed such that for any rk , each subsample is a n0 /n fraction of all the eligible data points with R > rk . Then the choice of {nk } boils down to the choice of n0 , which should reflect the following considerations: i) n0 should be large enough to ensure good resolution of p-values at all levels; ii) n0 /n should be sufficient small such that the subsamples do not contain too much overlap in observations; iii) larger n0 requires heavier computation for the distance correlation. In our examples, where the total sample size n ranges from 3000 to 20000, we find n0 between 500 and 1000 to be a suitable choice. The number of subsamples m can be set as large as computation capacity allows. In our examples, we take m = 60. For all the examples, we choose the weight function ยต for distance covariance to be (3.2) with ฮบ = 1, and the number of replications used to calculate each p-value is L = 200. To ensure that the moment conditions are met, the distance correlation is applied to the log of the radial part R in all examples. 6.1. Simulated data with known threshold To illustrate our methodology, we simulate observations from a distribution with a known threshold for which R and ฮ˜ become independent. Threshold Selection for Multivariate Heavy-Tailed Data 11 Let R be the absolute value of a t-distribution with 2 degrees of freedom and ฮ˜1 , ฮ˜2 be independent random variables such that ฮ˜1 โˆผ U (0, 1), ฮ˜2 โˆผ Beta(3, 3). Set ( ฮ˜1 , if R > r0.2 , ฮ˜|R = ฮ˜2 , if R โ‰ค r0.2 , where r0.2 is the upper 20%-quantile of R. Then R and ฮ˜ are independent given R > r if and only if r โ‰ฅ r0.2 . Let (Xi1 , Xi2 ) = (Ri ฮ˜i , Ri (1 โˆ’ ฮ˜i )), i = 1, . . . , n, be the simulated observations. We generate n = 10000 iid observations from this distribution. Figures 1(a), 1(b) and 1(c) show the data in Cartesian and polar coordinates. Our goal is to recover the tail angular distribution by choosing the appropriate threshold. A sequence of candidate thresholds {rk } is selected to be the empirical upper quantiles of R corresponding to {qk }, 150 equidistant points between 0.01 and 0.4. We apply the procedure described in Section 5 to the data. For each rk , the mean p-value pv k is calculated using m = 60 random subsamples, each of size nk = 500 ยท qk , from the observations with Ri > rk . Figure 1(d) shows the mean p-value path. For the WBS algorithm, we set the threshold to be the largest rk such that for all thresholds r (quantile level q) such that r < rk (q > qk ), the fitted spline of the p-value stays below 0.451 . The threshold levels chosen is 20.4%, which are in good agreement with the true independence level 0.2. The empirical cdfs of the truncated ฮ˜i โ€™s corresponding to the chosen thresholds is shown in Figure 1(e). We can see that the true tail angular cdf (i.e., U (0, 1)) is accurately recovered. 6.2. Simulated logistic data We simulate data from a bivariate logistic distribution, which is bivariate regularly varying. Recall from Example 4.4 that (X1 , X2 ) follows a bivariate logistic distribution if it has cdf (4.10). In this example, we set ฮณ = 0.8 and generate n = 10000 iid observations from this distribution. Similar to the previous example, for each threshold rk corresponding to the upper qk quantile, where {qk } is chosen to be the 150 equidistant points between 0.01 and 0.3. The mean p-value pv k is calculated using m = 60 random subsamples of size nk = 500 ยท qk from the observations with Ri > rk . Figures 2(a) , 2(b) and 2(c) show the scatterplots of the data. Here the L1 -norm is used to transform the data into polar coordinates. Our algorithms suggests using 7.4% of the data to estimate the angular distribution. The estimated cdf of the angular distribution is shown with the theoretical limiting cdf, derived from (4.11), in Figure 2(e). So even though R and ฮ˜ are not independent for any threshold rk , our procedures produce good estimates of the limiting distribution of ฮ˜. 6.3. Real data In this example, we look at the following exchange rate returns relative to the US dollar: Deutsche mark (DEM), British pound (GBP), Canadian dollar (CAD), and Swiss franc (CHF). The time spans for the data are 1990-01-01 to 1998-12-31 with a total of 3287 days of observations. We examine the pairs GBP/CHF, CAD/CHF, DEM/CHF and estimate the angular density in the tail for each pair. Figures 3(a)โ€“3(c) present the scatter plots of the data. The marginals of the observations are standardized using the rank transformation proposed in Joe et al. (1992): Zi = 1/ log{n/(Rank(Xi ) โˆ’ .5)}, i = 1, . . . , n. Again {qk } is chosen to be the 150 equidistant points between 0.01 and 0.3, and the mean p-value pv k is calculated using m = 60 random subsamples of size nk = 500 ยท qk from the observations with Ri > rk . Note that while it may not be reasonable to view the observations as iid, the subsampling scheme can still be applied to choose the threshold of independence between R and ฮ˜. 1 Of course, other selection rules can be used. For example, a more conservative approach would be choosing the threshold as the largest rk such that for r > rk , the fitted spline of the p-value stays above 0.45. โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— 0 โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— 20 โ— 40 60 80 โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— radius โ— โ— โ— โ— โ— โ— 1eโˆ’04 1eโˆ’02 1e+00 โ— 1e+02 โ— โ— โ— 0.0 0.2 โ— โ— โ— โ— โ— 0.6 0.8 1.0 angle (c) 1.0 1.0 โ— โ— 0.4 (b) estimated truth 0.2 0.2 0.4 0.4 cdf 0.6 0.6 0.8 meanโˆ’pv change point fitted spline 0.8 โ— โ— โ— โ— x1 (a) โ— 0.0 0.0 โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ—โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ—โ— โ—โ—โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ—โ—โ—โ—โ— โ— โ—โ—โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ—โ— โ—โ—โ—โ— โ— โ—โ—โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ—โ— โ—โ—โ— โ— โ—โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ—โ—โ— โ—โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ—โ— โ—โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ—โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ—โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ—โ—โ—โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ—โ— โ— โ—โ—โ—โ— โ—โ— โ— โ—โ—โ—โ—โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— 1e+01 โ— โ— โ— โ— โ— โ— 1eโˆ’01 โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ—โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ—โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— x1 pโˆ’value โ— โ— 1eโˆ’03 x2 300 0 100 x2 500 โ— 1e+03 Wan and Davis 1eโˆ’04 1eโˆ’02 1e+00 1e+02 12 0.0 0.1 0.2 0.3 0.4 0.0 upper quantile 0.2 0.4 0.6 0.8 1.0 Theta (d) (e) Fig 1. Example 6.1. (a) scatterplot of (Xi1 , Xi2 ); (b) scatterplot of (Xi1 , Xi2 ) in log-log scale; (c) scatterplot of (Ri , ฮ˜i ); (d) mean p-value path (black triangles), fitted WBS spline (blue line), and the chosen threshold quantile (red vertical line); (e) estimated cdf of ฮ˜ using the threshold chosen, compared with the truth (black dotted). The mean p-value paths are shown in Figures 4(a)โ€“4(c). The threshold levels selected for the three pairs are 9.6%, 7.4%, 16%, respectively. Figures 3(d)โ€“3(f) show the shape of the estimated angular densities for each pairs. As expected, the tails of the two central European exchange rates, DEM and CHF, are highly dependent. In contrast, that of CAD and CHF are almost independent. 6.4. Simulated non-regularly varying data In this example, we generate data from a model which is not regularly varying. Let R be a random variable from the standard Pareto distribution: P(R > r) = rโˆ’1 , r โ‰ฅ 1. Let ฮ˜1 , ฮ˜2 be independent random variables such that ฮ˜1 โˆผ U (0, 0.5), ฮ˜2 โˆผ U (0.5, 1). Set ( ฮ˜1 , if log R โˆˆ (2k, 2k + 1] for some integer k, ฮ˜|R โˆผ ฮ˜2 , if log R โˆˆ (2k + 1, 2k + 2] for some integer k. For any positive integer k, it can be verify that P(ฮ˜ โˆˆ (0, 0.5)|R > e2k ) = 1 โˆ’ eโˆ’1 , 1 โˆ’ eโˆ’2 โ— โ— โ— โ— โ— โ— โ— โ— โ— 5000 15000 25000 โ— โ— 1eโˆ’01 โ— โ— โ— โ— โ— โ— โ— 1e+01 โ— โ— โ— โ— โ— โ— 1e+03 0.0 0.2 0.4 1.0 0.8 0.6 estimated truth cdf 0.6 0.6 0.4 0.4 0.2 0.2 0.0 0.10 0.15 0.20 0.25 โ— 0.8 1.0 (c) 1.0 (b) โ— 0.05 โ— angle meanโˆ’pv change point fitted spline 0.00 โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ—โ—โ—โ— โ—โ—โ—โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ—โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ—โ—โ—โ—โ—โ—โ—โ—โ— โ—โ—โ— โ— โ—โ— โ—โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ—โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ—โ— โ—โ—โ—โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ—โ— โ—โ—โ—โ— โ— โ—โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ—โ—โ— โ—โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ—โ—โ—โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ—โ— โ—โ—โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ—โ— โ—โ—โ—โ— โ— โ—โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— x1 (a) 0.0 โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— x1 pโˆ’value โ— โ— โ— โ—โ— โ— โ— 10 โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ—โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ—โ—โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ—โ—โ—โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ—โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— 100 โ— radius โ— โ— โ— 0.8 0 โ— โ— โ— โ— โ— 1 โ— 1eโˆ’01 0 โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— 1e+01 x2 10000 x2 1e+03 25000 โ— 13 10000 Threshold Selection for Multivariate Heavy-Tailed Data โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ—โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ—โ— โ—โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— 0.30 0.0 upper quantile (d) 0.2 0.4 0.6 0.8 1.0 Theta (e) Fig 2. Example 6.2. (a) scatterplot of (Xi1 , Xi2 ); (b) scatterplot of (Xi1 , Xi2 ) in log-log scale; (c) scatterplot of (Ri , ฮ˜i ); (d) mean p-value path (black triangles), fitted WBS spline (blue line), and the chosen threshold quantile (red vertical line); (e) estimated cdf of ฮ˜ using the threshold chosen, compared with the theoretical limiting cdf (black dotted). while eโˆ’1 โˆ’ eโˆ’2 . 1 โˆ’ eโˆ’2 Hence P(ฮ˜ โˆˆ ยท|R > r) does not convergence as r โ†’ โˆž and X = (Rฮ˜, R(1 โˆ’ ฮ˜)) is not regularly varying. Let (Xi1 , Xi2 ) = (Ri ฮ˜i , Ri (1 โˆ’ ฮ˜i )), i = 1, . . . , n, be iid observations from this distribution, where n = 20000. Figures 5(a), 5(b) and 5(c) show the data in Cartesian and polar coordinates. We apply our threshold selection algorithm to the data, with the threshold upper quantile levels qk chosen as the 150 equidistant points between 0.01 and 0.2. The mean p-value pv k is calculated using m = 60 random subsamples of size nk = 500 ยท qk from the observations with Ri > rk . This is shown in Figure 5(d). In this model, the radial part R is regularly varying, but ฮ˜ and R are dependent given R > r for any r. We expect the mean p-values to be well below 0.5, as are observed. No threshold is selected by the algorithm. This suggests that our technique can potentially be used to detect misspecified models from the regular variation assumption, especially in the scenario where the heavy-tailedness of R is observed but dependence between R and ฮ˜ is suspected. P(ฮ˜ โˆˆ (0, 0.5)|R > e2k+1 ) = 7. Discussion In this paper, we propose a threshold selection procedure for multivariate regular variation, for which R and ฮ˜ are approximately independent for R beyond the threshold. While our problem is set in the multivariate heavy-tailed setting and we utilize distance covariance as our measure of dependence, our algorithm is 14 Wan and Davis โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ—โ—โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— 0.00 0.01 0.02 0.01 โ— โ— โ— 0.03 0.04 0.05 โ— โ— โ— โ— โ— โ— 0.03 โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— 0.005 GBP โ— โ— โ— โ— โ— 0.010 โ— โ— 0.000 โ— โ— 0.010 0.020 โ— 0.030 DEM (c) DEM/CHF 5 1.2 CAD/CHF 0.8 Density 0.4 3 2 0.0 0 0.0 1 0.5 1.0 Density 4 1.5 โ— โ— โ— โ— (b) GBP/CHF โ—โ— โ— โ— โ— 0.015 โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ—โ—โ— โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ—โ—โ— โ—โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— CAD (a) Density โ— โ— โ— โ— โ— 0.000 โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— 0.02 โ— โ— โ— โ— โ— CHF โ— 0.02 โ— 0.00 0.02 0.01 โ— โ— CHF โ— โ— โ— โ— โ— โ— โ— โ— 0.00 โ— โ— โ— โ— โ— 0.01 โ— โ— โ— 0.00 โ— โ— โ— CHF โ— 0.03 0.03 โ— โ— โ— โ— 0.0 0.5 1.0 Theta (d) 1.5 0.0 0.5 1.0 Theta (e) 1.5 0.0 0.5 1.0 1.5 Theta (f) Fig 3. Example 6.3. Analysis of the paired exchange rate returns: CHF/DEM, CHF/GBP, CHF/CAD with respect to USD between 1990-01-01 to 1998-12-31. (a)โ€“(c): Scatter plots of the standardized paired exchange rate returns; (d)โ€“(f ): Estimated angular densities using the estimated thresholds chosen. essentially a change point detection method based on p-values generated through subsampling schemes. Hence this may be generalized to other problem settings and potentially incorporates other dependence measures. Though we have proposed an automatic selection for the threshold based on the fitted mean p-value path, we would like to emphasize that, like the Hill plot, this should be viewed as a visual tool rather than an optimal selection criterion. The final threshold should be based on the automatic procedure in conjunction with visual inspection of the p-value path. We note that the choice of norm in the polar coordinate transformation (2.1) may result in significant differences in the choice of thresholds, which indicates the rate of convergence to the limit spectral density. This is especially evident in the near โ€˜asymptotic independenceโ€™ case, where the mass of the angular distribution concentrates on the axes. As an illustration, we simulated iid observations {(Xi1 , Xi2 )}i=1,...,n from the bivariate logistic distribution, where the cdf is given in (4.10), with ฮณ = 0.95 and n = 10000. We apply the polar coordinate transformation with respect to the Lp -norm for p = 0.2, 1, 5. Note that in the case of p = 0.2, Lp is only a quasi-norm as it does not satisfy the triangular inequality. However, it can be shown that (2.4) holds and the limiting angular distribution exists for bivariate logistic distribution. We compare the threshold selection results in Figure 6. Note that in the cases of the L1 and L5 -norms, the threshold levels are chosen to be upper 5% and 12%, respectively, while in the case of the L0.2 -norm, it is not possible to select the threshold as the dependence between R and ฮ˜ at all levels were shown to be significant. Indeed, this can be seen in Figure 7, where we compare the histogram of X1p /(X1p + X2p ) given kXkp is large across three levels of truncations, 2%, 5% and 12%, together with the theoretical limiting density curve. For the L0.2 -norm, the limiting angular density is poorly approximated by the truncated data for all levels. For the other two norms, the truncated Threshold Selection for Multivariate Heavy-Tailed Data 15 1.0 GBP/CHF 0.6 0.4 0.0 0.2 pโˆ’value 0.8 meanโˆ’pv change point fitted spline โ— 0.00 0.05 0.10 0.15 0.20 0.25 0.30 upper quantile (a) 1.0 CAD/CHF 0.6 0.4 0.0 0.2 pโˆ’value 0.8 meanโˆ’pv change point fitted spline โ— 0.00 0.05 0.10 0.15 0.20 0.25 0.30 upper quantile (b) 1.0 DEM/CHF 0.6 0.4 0.0 0.2 pโˆ’value 0.8 meanโˆ’pv change point fitted spline โ— 0.00 0.05 0.10 0.15 0.20 0.25 0.30 upper quantile (c) Fig 4. Example 6.3 (cont.). Analysis of the paired exchange rate returns: CHF/DEM, CHF/GBP, CHF/CAD with respect to USD between 1990-01-01 to 1998-12-31. (a)โ€“(c): mean p-value paths (black triangles), fitted WBS splines (blue lines) and the chosen threshold quantiles (red vertical line). โ— โ— โ— โ— โ— โ— 0 2000 4000 6000 โ— โ— โ— โ— โ—โ— โ— โ— โ— 8000 โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— 1eโˆ’04 1eโˆ’02 1e+00 1e+02 1e+04 โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ—โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ—โ— โ—โ— โ— โ—โ— โ—โ— โ—โ—โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ—โ—โ—โ—โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ—โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ—โ—โ— โ—โ— โ—โ— โ— โ—โ—โ—โ—โ— โ—โ—โ—โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ—โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ—โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ—โ— โ—โ— โ— โ— โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— 00 x1 โ— 02 04 06 08 10 ang e (b) (c) 10 (a) โ— โ— โ— โ— โ— โ— x1 โ— โ— โ— ad us โ— โ— โ— โ— 1eโˆ’04 โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— 1 โ— โ—โ— โ— โ— โ— โ— โ—โ— 100 1e+00 x2 5000 x2 โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ—โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ—โ— โ—โ— โ—โ— โ— โ—โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ—โ— โ—โ—โ— โ—โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ—โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ—โ— โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ—โ— โ— โ— โ— โ— โ— โ— โ— โ— โ— โ—โ— โ— โ— โ— โ— โ— โ—โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ— โ— โ—โ— โ—โ— โ— โ—โ—โ— โ—โ— โ—โ— โ—โ— โ— โ—โ—โ—โ— โ— โ—โ— โ—โ—โ— โ—โ— โ— โ— โ—โ— โ— โ— โ— โ—โ— โ— โ—โ— 0 โ— โ—โ— โ— โ— โ— 10 โ— 15000 โ— 10000 Wan and Davis 1e+04 16 06 04 00 02 pโˆ’va ue 08 m 0 00 0 05 0 10 0 15 0 20 uppe quan e (d) F g 5 Examp e 6 1 (a) sca erp o o (X 1 X 2 ) (b) sca erp o o (X 1 X 2 ) n og- og sca e (c) sca erp o o (R ฮ˜ ) (d) mean p-va ue pa h (b ack r ang es) fi ed WBS sp ne (b ue ne) and he chosen hresho d quan e (red ver ca ne) observat ons accord ng to the se ected thresho d prov de decent approx mat ons to the true m t ng dens ty of the angu ar component One poss b e exp anat on for th s s that under the L0 2 -norm the thresho d s concave and hence observat ons on the d agona are much eas er to be c ass fied as โ€œextremesโ€ than those near the ax s As a resu t the est mator of the angu ar dens ty uses more observat ons near the d agona wh ch may not be n fact c ose enough to the m t Th s cho ce of norm s an nterest ng top c and s the subject of ongo ng research Acknowledgement The fore gn exchange rate data are obta ned from OANDA from through R-package qrmtoo s We wou d ke to thank Bodh sattva Sen for he pfu d scuss ons We wou d a so ke to thank the ed tor and referees for the r many construct ve and ns ghtfu comments References P J B cke and M J W chura Convergence cr ter a for mu t parameter stochast c processes and some app cat ons Ann. Statist. 42 1656โ€“1670 1971 P B ngs ey Probabi ity and measure. W ey-Intersc ence 3rd ed t on 1995 R A Dav s and T M kosch The extremogram A corre ogram for extreme events Bernou i 15(4) 977 โ€“ 1009 2009 Threshold Selection for Multivariate Heavy-Tailed Data 17 1.0 L0.2โˆ’norm 0.6 0.4 0.0 0.2 pโˆ’value 0.8 meanโˆ’pv change point fitted spline โ— 0.00 0.05 0.10 0.15 0.20 upper quantile 1.0 L1โˆ’norm 0.6 0.4 0.0 0.2 pโˆ’value 0.8 meanโˆ’pv change point fitted spline โ— 0.00 0.05 0.10 0.15 0.20 upper quantile 1.0 L5โˆ’norm 0.6 0.4 0.0 0.2 pโˆ’value 0.8 meanโˆ’pv change point fitted spline โ— 0.00 0.05 0.10 0.15 0.20 upper quantile Fig 6. Simulated logistic data of sample size n = 10000 with ฮณ = 0.95. Threshold selection algorithm applied under the L0.2 -, L1 - and L5 -norms: mean p-value paths (black triangles), fitted WBS splines (blue lines) and the chosen threshold quantiles (red vertical line). R.A. Davis, T. Mikosch, and I. Cribben. Towards estimating extremal serial dependence via the bootstrapped extremogram. J. Econometrics, 170(1):142โ€“152, 2012. R.A. Davis, M. Matsui, T. Mikosch, and P. Wan. Applications of distance covariance to time series. arXiv:1606.05481, 2017. L. de Haan and J. de Ronde. Sea and wind: Multivariate extremes at work. Extremes, 1:7โ€“46, 1998. P. Doukhan. Mixing: Properties and Examples. Springer-Verlag, New York, 1994. A. Feuerverger. A consistent test for bivariate dependence. Internat. Statis. Rev., 61(3):419โ€“433, 1993. P. Fryzlewicz. Wild binary segmentation for multiple change-point detection. Ann. Statist., 42(6):2243โ€“2281, 2014. S. Jeon and R.L. Smith. Dependence structure of spatial extremes using threshold approach. arXiv:1209.6344v1, 2014. H. Joe, R.L. Smith, and I. Weissman. Bivariate threshold methods for extremes. JRSS. B., 54(1):171โ€“183, 1992. A. Mallik, B. Sen, M. Banerjee, and G. Michailidis. Threshold estimation based on a p-value framework in dose-response and regression settings. Biometrika, 98(4):887โ€“900, 2011. E.S. Page. Continuous inspection schemes. Biometrika, 41(1):100โ€“115, 1954. S.I. Resnick. Hidden regular variation, second order regular variation and asymptotic independence. Ex- 18 Wan and Davis L0.2โˆ’norm, 95% L0.2โˆ’norm, 88% 2.5 0.4 0.6 0.8 1.0 2.0 1.0 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 Theta Theta Theta L1โˆ’norm, 98% L1โˆ’norm, 95% L1โˆ’norm, 88% 0.8 1.0 0.8 1.0 0.8 1.0 3 4 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 Theta Theta Theta L5โˆ’norm, 98% L5โˆ’norm, 95% L5โˆ’norm, 88% 0.2 0.4 0.6 0.8 1.0 Density 5 0 5 0 0.0 10 15 20 15 Density 10 20 15 10 0 5 Density 20 25 25 0.0 0 0 0 2 1 2 4 2 4 Density 6 Density 8 6 Density 10 8 5 12 10 14 6 0.2 0.0 0.5 0.5 0.0 0.5 0.0 0.0 1.5 Density 1.5 Density 1.0 1.5 1.0 Density 2.0 2.0 2.5 2.5 L0.2โˆ’norm, 98% 0.0 0.2 Theta 0.4 0.6 0.8 1.0 0.0 Theta 0.2 0.4 0.6 Theta Fig 7. Simulated logistic data of sample size n = 10000 with ฮณ = 0.95. Histogram of X1p /(X1p + X2p ) for truncated levels 2%, 5% and 12% for p = 0.2, 1, 5. tremes, 5:303โ€“336, 2002. S.I. Resnick. Heavy-tail phenomena: probabilistic and statistical modeling. Springer-Verlag, New York, 2007. C. StaฬŒricaฬŒ. Multivariate extremes for models with constant conditional correlations. J. Empir. Finan., 6: 515โ€“553, 1999. G.J. Szeฬkely, M.L. Rizzo, and N.K. Bakirov. Measuring and testing dependence by correlation of distances. Ann. Statist., 35:2769โ€“2794, 2007. Appendix A: Proof of Theorem 4.1 Note from the definition of the empirical distance covariance in (4.1), the integrand can be expressed as Cn (s, t) = n 1 X isRj /rn +itT ฮ˜j e 1{Rj >rn } npฬ‚n j=1 โˆ’ n n 1 X isRj /rn 1 X itT ฮ˜k e 1{Rj >rn } e 1{Rk >rn } npฬ‚n j=1 npฬ‚n k=1 = n  T  1 X  isRj /rn e โˆ’ ฯ• R |rn (s) eit ฮ˜j โˆ’ ฯ•ฮ˜|rn (t) 1{Rj >rn } rn npฬ‚n j=1 โˆ’ n n   1 X  isRj /rn 1 X  itT ฮ˜k e โˆ’ ฯ• R |rn (s) 1{Rj >rn } e โˆ’ ฯ•ฮ˜|rn (t) 1{Rk >rn } . rn npฬ‚n j=1 npฬ‚n k=1 Threshold Selection for Multivariate Heavy-Tailed Data    T  Writing Ujn = eisRj /rn โˆ’ ฯ• R |rn (s) 1{Rj >rn } , Vjn = eit ฮ˜j โˆ’ ฯ•ฮ˜|rn (t) 1{Rj >rn } , we have 19 rn n pn 1 X Ujn Vjn Cn (s, t) = โˆ’ pฬ‚n n j=1 pn  pn pฬ‚n 2 n n 1 X Ujn 1 X Vkn . n j=1 pn n pn k=1 Since EUjn = EVjn = 0 and EUjn Vjn /pn = ฯ• R ,ฮ˜|rn (s, t) โˆ’ ฯ• R |rn (s)ฯ•ฮ˜|rn (t), it is convenient to mean rn rn correct the summands and obtain n  n n   p  2 1 X pn 1 X Ujn Vjn  Ujn 1 X Vkn n โˆ’ Cn (s, t) = โˆ’ ฯ• R ,ฮ˜|rn (s, t) โˆ’ ฯ• R |rn (s)ฯ•ฮ˜|rn (t) rn rn pฬ‚n n j=1 pn pฬ‚n n j=1 pn n pn k=1 pn + (ฯ• R ,ฮ˜|rn (s, t) โˆ’ ฯ• R |rn (s)ฯ•ฮ˜|rn (t)) rn pฬ‚n rn    2   pn pn pn =: Eฬƒ1 โˆ’ Eฬƒ3 Eฬƒ21 Eฬƒ22 + pฬ‚n pฬ‚n pฬ‚n  2     pn pn pn Eฬƒ1 โˆ’ Eฬƒ3 =: Eฬƒ2 + pฬ‚n pฬ‚n pฬ‚n Note that Eฬƒ1 , Eฬƒ21 , Eฬƒ22 are averages of iid zero-mean random variables and Eฬƒ3 is non-random. We first prove the second part of Theorem 4.1. The first part of Theorem 4.1 follows easily in a similar fashion. Proof of Theorem 4.1(2). In order to show (4.6), it suffices to establish that  2 Z Z pn d npฬ‚n |Eฬƒ1 |2 ยต(ds, dt) โ†’ |Q(s, t)|2 ยต(ds, dt), pฬ‚ d+1 d+1 n R R and  Z npฬ‚n Tn โˆ’ npฬ‚n Rd+1 pn pฬ‚n 2 p |Eฬƒ1 |2 ยต(ds, dt) โ†’ 0, where (A.2) can be implied by  2  2 Z Z pn pn p npฬ‚n |Eฬƒ2 |2 ยต(ds, dt) + npฬ‚n |Eฬƒ3 |2 ยต(ds, dt) โ†’ 0. pฬ‚n pฬ‚n Rd+1 Rd+1 (A.1) (A.2) (A.3) Notice that pฬ‚n E โˆ’1 pn 2 n 1X =E n j=1 2  1{Rj >rn } โˆ’1 pn  = 1 1{R1 >rn } E โˆ’1 n pn 2 โ‰ค 1 1 O(1) + O(1) โ†’ 0. npn n p Hence pฬ‚n /pn โ†’ 1 and for (A.1) and (A.3), it is equivalent to prove that Z Z d npn |Eฬƒ1 |2 ยต(ds, dt) โ†’ |Q(s, t)|2 ยต(ds, dt) Rd+1 and Z Z 2 |Eฬƒ2 | ยต(ds, dt) + npn npn (A.4) Rd+1 Rd+1 p |Eฬƒ3 |2 ยต(ds, dt) โ†’ 0. (A.5) Rd+1 We will show the convergence (A.4) in Proposition A.1. By (4.5), Z npn |Eฬƒ3 |2 ยต(ds, dt) โ†’ 0. Rd+1 So that (A.5) holds provided Z npn p |Eฬƒ2 |2 ยต(ds, dt) โ†’ 0, Rd+1 which follows in a similar fashion as Proposition A.1. (A.6) 20 Wan and Davis Proposition A.1. Assume ยต satisfies Z (1 โˆง |s|ฮฒ )(1 โˆง |t|2 )ยต(ds, dt) < โˆž, Rd+1 and that npn โ†’ โˆž as n โ†’ โˆž, then Z npn d |Eฬƒ1 |2 ยต(ds, dt) โ†’ Z Rd+1 |Q(s, t)|2 ยต(ds, dt), Rd+1 where Q is a centered Gaussian process with covariance function (4.7). Proof of Proposition A.1. We first show that โˆš d npn Eฬƒ1 โ†’ Q(s, t), on C(Rd+1 ) (A.7) โˆš which can be implied by the finite distributional convergence of npn Eฬƒ1 (s, t) and its tightness on C(Rd+1 ). Write  n  n 1 X 1 X Ujn Vjn โˆš โˆš npn Eฬƒ1 = โˆš Yjn , โˆ’ pn (ฯ• R ,ฮ˜|rn (s, t) โˆ’ ฯ• R |rn (s)ฯ•ฮ˜|rn (t)) =: โˆš โˆš rn rn pn n j=1 n j=1 where Yjn โ€™s are iid random variables with mean 0. For fixed (s, t), note that Var(Y1n ) = E|Y1n |2 = E1{R1 >rn } E|U1n V1n |2 (1 + o(1)) = O(1) < โˆž. pn pn On the other hand, any ฮด > 0, E|Y1n |2+ฮด = E|U1n V1n |2+ฮด 1+ฮด/2 pn (1 + o(1)) โ‰ค c E1{R1 >rn } 1+ฮด/2 pn (1 + o(1)) = O(pโˆ’ฮด/2 ) n Then we can apply the central limit theorem for triangular arrays by checking the Lyapounov condition (see, e.g., Billingsley (1995)) for the Yjn โ€™s: ฮด Pn โˆ’ E|Yjn |2+ฮด O(npn 2 ) โˆ’ ฮด2 = ) โ†’ 0. ฮด ฮด = O((npn )  P  2+ฮด 1+ 1+ 2 2 2 n Var(Y1n ) n Var Y jn j=1 j=1 It follows easily that for fixed (s, t), โˆš d npn Eฬƒ1 โ†’ Q(s, t). The finite-dimensional distribution can be obtained using the Crameฬr-Wold device and the covariance function can be verified through calculations. โˆš We now show the tightness of npn Eฬƒ1 . Note that   T  isRj /rn it ฮ˜j n R e โˆ’ ฯ• (s) e โˆ’ ฯ• (t) 1{Rj >rn } X ฮ˜|r |r n 1 n rn Eฬƒ1 (s, t) = n j=1 pn   โˆ’ ฯ• R ,ฮ˜|rn (s, t) โˆ’ ฯ• R |rn (s)ฯ•ฮ˜|rn (t) rn rn ๏ฃซ ๏ฃถ T n isRj /rn +it ฮ˜j X e 1 1 {Rj >rn } โˆ’ ฯ• R ,ฮ˜|rn (s, t)๏ฃธ = ๏ฃญ rn n j=1 pn ๏ฃซ ๏ฃถ n isRj /rn X e 1 1 {Rj >rn } โˆ’๏ฃญ โˆ’ ฯ• R |rn (s)๏ฃธ ฯ•ฮ˜|rn (t) rn n j=1 pn Threshold Selection for Multivariate Heavy-Tailed Data ๏ฃซ ๏ฃถ T n X eit ฮ˜j 1{Rj >rn } 1 pฬ‚ n โˆ’๏ฃญ โˆ’ ฯ•ฮ˜|rn (t) ๏ฃธ ฯ• R |rn (s) rn n j=1 pn pn 21 =: Eฬƒ11 + Eฬƒ12 + Eฬƒ13 . โˆš โˆš โˆš Without loss of generality, we show the tightness for npn Eฬƒ11 and that of npn Eฬƒ12 and npn Eฬƒ13 follows from the same argument. First we introduce some notation following that from Bickel and Wichura (1971). Fix (s, t), (s0 , t0 ) โˆˆ Rd+1 where s < s0 and t < t0 . Let B be the subset of Rd+1 of the form B := ((s, t), (s0 , t0 )] = (s, s0 ] ร— d Y (tk , t0k ] โŠ‚ Rd+1 . k=1 For ease of notation, we suppress the dependence of B on (s, t), (s0 , t0 ). Define the increment of the stochastic process Eฬƒ11 on B to be n Eฬƒ11 (B) P X 1X X X (โˆ’1)d+1โˆ’ j zj ยทยทยท n j=1 z =0,1 z =0,1 z =0,1 := 0 1 d 0 Eฬƒ11 (s + z0 (s โˆ’ s), t1 + z1 (t01 โˆ’ t1 ), . . . , td + zd (t0d โˆ’ td )) . From a sufficient condition of Theorem 3 of Bickel and Wichura (1971), the tightness of if the following statement holds for any (s, t), (s0 , t0 ) and corresponding B, d Y โˆš |tk โˆ’ t0k |ฮฒ , E| npn Eฬƒ11 (B)|2 โ‰ค c|s โˆ’ s0 |ฮฒ โˆš npn Eฬƒ1 is implied for some ฮฒ > 1. k=1 It follows that โˆš E   npn Eฬƒ11 (B) = npn E X ยทยทยท z0 =0,1 2 X (โˆ’1)d+1โˆ’ P j n d 1 X i(s+z0 (s0 โˆ’s))Rj /r Y i(tk +zk (t0k โˆ’tk ))ฮ˜jk 1{Rj >rn } e e n j=1 pn zj zd =0,1 k=1 " โˆ’ X X ยทยทยท z0 =0,1 (โˆ’1) d+1โˆ’ P j zj E  e i(s+z0 (s0 โˆ’s))R/r d Y zd =0,1 k=1 n e i(tk +zk (t0k โˆ’tk ))ฮ˜k 1{R>rn } pn # 2 d Y 1{Rj >rn } 0 0 1 X isRj /rj = npn E (e โˆ’ eis Rj /rj ) (eitk ฮ˜jk โˆ’ eitk ฮ˜jk ) n j=1 pn k=1 " โˆ’E (e isR/r โˆ’e is0 R/r ) d Y (e k=1 0 = pn Var (eisR/rj โˆ’ eis R/rj ) d Y (eitk ฮ˜k k=1 ๏ฃฎ 0 โ‰ค E ๏ฃฐ (eisR/r โˆ’ eis R/r ) d Y 1{R>rn } โˆ’e ) pn ! it0k ฮ˜k 1{R>rn } ) โˆ’e pn ๏ฃน 2 itk ฮ˜k 0 (eitk ฮ˜k โˆ’ eitk ฮ˜k ) # 2 it0k ฮ˜k (A.8) R > rn ๏ฃป . k=1 From a Taylor series argument, 0 |eix โˆ’ eix |2 โ‰ค c1 โˆง |x โˆ’ x0 |2 โ‰ค c1 โˆง |x โˆ’ x0 |ฮฒ โ‰ค c|x โˆ’ x0 |ฮฒ , for any ฮฒ โˆˆ (0, 2]. 22 Wan and Davis Hence for any ฮฒ โˆˆ (1, 2 โˆง ฮฑ), โˆš E 2 โ‰ค npn Eฬƒ11 (B) d Y 0 ฮฒ c|s โˆ’ s | " |ti โˆ’ t0i |ฮฒ E ฮฒ (R/rn ) k=1 d Y c|s โˆ’ s0 |ฮฒ < d Y # ฮฒ |ฮ˜k | |R > rn k=1 |ti โˆ’ t0i |ฮฒ , k=1 since |ฮ˜k |ฮฒ โ€™s are bounded and supn E[(R/rn )ฮฒ |R > rn ] < โˆž by the regular variation assumption. This proves the tightness. Define the bounded set Kฮด = {(s, t)| ฮด < |s| < 1/ฮด, ฮด < |t| < 1/ฮด}, for ฮด < .5. Then, using (A.7), we have from the continuous mapping theorem, Z Z d npn |Eฬƒ1 |2 ยต(ds, dt) โ†’ |Q(s, t)|2 ยต(ds, dt). Kฮด (A.9) Kฮด On the other hand, for any ฮฒ < 2 โˆง ฮฑ, we have โˆš E| npn Eฬƒ1 |2 2 n 1X = npn E n j=1 โ‰ค โ‰ค    Ujn Vjn Ujn Vjn โˆ’E pn pn E|Ujn Vjn โˆ’ EUjn Vjn |2 pn c E|Ujn Vjn |2 p  n c E eisRj /rn โˆ’ ฯ• R |rn (s) (A.10) 2 rn = T eit ฮ˜j  2 โˆ’ ฯ•ฮ˜|rn (t) 1{Rj >rn } pn  cE eisRj /rn โˆ’ 1 2 2 + ฯ• R |rn (s) โˆ’ 1 rn โ‰ค  cE 1 โˆง sRj rn 2  +E 1โˆง ฮฒ  +E 1โˆง sRj rn 2 sRj rn sRj rn 1 โˆง |s| cE โ‰ค โ‰ค cE   ฮฒ  Rj rn  ฮฒ +E R rn ฮ˜j 2 + ฯ•ฮ˜|rn (t) โˆ’ 1 โˆ’1 2   1{Rj >rn } | rRn | rRn p   n  h i >1 1 โˆง |tฮ˜j |2 + E 1 โˆง |tฮ˜j |2 | rRn > 1 1{Rj >rn } | rRn p   n  2 >1 1 โˆง |t| 1{Rj >rn } ฮฒ โ‰ค  T eit p  n  h i >1 1 โˆง |tฮ˜j |2 + E 1 โˆง |tฮ˜j |2 | rRn > 1 1{Rj >rn } โ‰ค  cE 1 โˆง  ฮฒ pn    1 โˆง |s|ฮฒ (|Rj /rn |ฮฒ + E[|R/rn |ฮฒ |R > rn ]) 1 โˆง |t|2 |R > rn โ‰ค c(1 โˆง |s|ฮฒ )(1 โˆง |t|2 ). Therefore for any  > 0, " Z lim lim sup P npn ฮดโ†’0 nโ†’โˆž # 2 |Eฬƒ1 | ยต(ds, dt) >  Kฮดc โ‰ค 1 lim lim sup  ฮดโ†’0 nโ†’โˆž Z Kฮดc โˆš E| npn Eฬƒ1 |2 ยต(ds, dt) Threshold Selection for Multivariate Heavy-Tailed Data 23 1 lim lim sup  ฮดโ†’0 nโ†’โˆž โ‰ค Z c(1 โˆง |s|ฮฒ )(1 โˆง |t|2 )ยต(ds, dt) โ†’ 0 Kฮดc by Rthe dominated convergence theorem. This combined with (A.9) shows the convergence of npn to |Q(s, t)|2 ยต(ds, dt), and hence completes the proof of the proposition. R |Eฬƒ1 |2 ยต(ds, dt) Proof of Theorem 4.1(2) (cont.). Now it remains to show (A.6). Similar to the proof of Proposition A.1, we can show that โˆš d npn Eฬƒ21 โ†’ Q0 for a centered Gaussian process Q0 , and p Eฬƒ22 โ†’ 0. Hence โˆš npn Eฬƒ2 = โˆš p npn Eฬƒ21 Eฬƒ22 โ†’ 0. The argument then follows similarly from the continuous mapping theorem and bounding the tail integrals. Proof of Theorem 4.1(1). Similar to the proof of Theorem 4.1(2), it suffices to show that Z p |Eฬƒi |2 ยต(ds, dt) โ†’ 0, i = 1, 2, 3. (A.11) The convergence (A.11) for i = 1, 2 follows trivially from the more general results (A.4) and (A.6) in the proof of Theorem 4.1(2). Hence it suffices to show Z |Eฬƒ3 |2 ยต(ds, dt) โ†’ 0, (A.12) where we recall that Eฬƒ3 := ฯ• R ,ฮ˜|rn (s, t) โˆ’ ฯ• R |rn (s)ฯ•ฮ˜|rn (t) is non-random. h rn  irn Let P R ,ฮ˜|rn (ยท) = P rRn , ฮ˜ โˆˆ ยท| rRn > 1 and P R |rn , Pฮ˜|rn be the corresponding marginal measures. rn rn Then from (2.3), v P R ,ฮ˜|rn โˆ’ P R |rn Pฮ˜|rn โ†’ ฮฝฮฑ ร— S โˆ’ ฮฝฮฑ ร— S = 0, rn rn and hence for fixed (s, t), Z Eฬƒ3 (s, t) = T eisT +it ฮ˜ (P R ,ฮ˜|rn โˆ’ P R |rn Pฮ˜|rn )(dT, dฮ˜) โ†’ 0. rn rn For any ฮฒ < 2 โˆง ฮฑ, using the same argument in (A.10), |Eฬƒ3 |2 =  E|Ujn Vjn | pn 2 โ‰ค c(1 โˆง |s|ฮฒ )(1 โˆง |t|2 ). Then (A.12) follows from (4.4) and dominated convergence. This concludes the proof. Appendix B: Proof of Theorem 4.5 Following the same notation and steps as the proof of Theorem 4.1 in Appendix A, it suffices to prove the following convergences for the mixing case: pฬ‚n p โ†’ 1, (B.1) pn Z Z d npn |Eฬƒ1 |2 ยต(ds, dt) โ†’ |Q0 (s, t)|2 ยต(ds, dt) (B.2) Rd+1 Rd+1 24 Wan and Davis and Z npn p |Eฬƒ2 |2 ยต(ds, dt) โ†’ 0. (B.3) Rd+1 We prove (B.1) and (B.2) in Propositions B.2 and B.3, respectively. The proof of (B.3) follows in a similar fashion. The proofs of both propositions rely on the following lemma. Throughout this proof we make use of the results that if {Zt } is stationary and ฮฑ-mixing with coefficient {ฮฑh }, then 1โˆ’ฮด  , for any ฮด โˆˆ (0, 1), (B.4) |cov(Z0 , Zh )| โ‰ค cฮฑhฮด E|Z0 |2/(1โˆ’ฮด) see Section 1.2.2, Theorem 3(a) of Doukhan (1994). Lemma B.1. Let {Xt } be a multivariate stationary time series that is regularly varying and ฮฑ-mixing with mixing coefficient {ฮฑh }. For a sequence rn โ†’ โˆž, set pn = P(kX0 k > rn ). Let f1 , f2 be bounded functions d which vanish outside R \B1 (0), where B1 (0) is the unit open ball {x|kxk < 1}, with sets of discontinuity of measure zero. Set,    n   X X0 Xt (i) Sn = โˆ’ Efi , i = 1, 2. fi rn rn t=1 Assume that condition (M) holds for {ฮฑh } and {rn }. Then โˆš 1 d (S (1) , Sn(2) )T โ†’ N (0, ฮฃ), npn n (B.5) where the covariance matrix [ฮฃij ]i,j=1,2 = [ฯƒ 2 (fi , fj )]i,j=1,2 with ฯƒ 2 (f1 , f2 ) := ฯƒ02 (f1 , f2 ) + 2 โˆž X ฯƒh2 (f1 , f2 ) (B.6) h โ‰ฅ 0. (B.7) h=1 and ฯƒh2 (f1 , f2 ) = Z f1 f2 dยตh , In particular, 1 p (Sn(1) , Sn(2) )T โ†’ 0. npn The proof of Lemma B.1 is provided after the proofs of the propositions. Proposition B.2. Assume that condition (M) holds, then pฬ‚n p โ†’ 1, pn Proof. We have n pฬ‚n 1X โˆ’1= pn n j=1   n 1{Rj >rn } 1 X โˆ’1 = (1{Rj >rn } โˆ’ pn ). pn npn j=1 Apply Lemma B.1 to f (x) = 1{kxk>1} and the result follows. Proposition B.3. Assume that condition (M) holds, and that ยต and {rn } satisfies (4.4) and (4.5), respectively, then Z Z d npn |Eฬƒ1 |2 ยต(ds, dt) โ†’ |Q0 (s, t)|2 ยต(ds, dt), Rd+1 0 where Q is a centered Gaussian process. Rd+1 Threshold Selection for Multivariate Heavy-Tailed Data 25 โˆš Proof. Let us first establish the convergence of npn Eฬƒ1 (s, t) for fixed (s, t). Take n   o f1 (x) = Re eiskxk โˆ’ E[eiskxk |kxk > 1] eitx/kxk โˆ’ E[eitx/kxk |kxk > 1] 1kxk>1 n   o f2 (x) = Im eiskxk โˆ’ E[eiskxk |kxk > 1] eitx/kxk โˆ’ E[eitx/kxk |kxk > 1] 1kxk>1 . Then from Lemma B.1, โˆš 1 โˆš d (Sn(1) , Sn(2) )T = npn (Re{Eฬƒ1 (s, t)}, Im{Eฬƒ1 (s, t)}) โ†’ N (0, ฮฃ), npn where the covariance structure ฮฃ can be derived from (B.6) and (B.7). This implies that โˆš d npn Eฬƒ1 (s, t) โ†’ Q0 (s, t), where Q0 (s, t) is a zero-mean complex normal process with covariance matrix ฮฃ11 + ฮฃ22 and relation matrix ฮฃ11 โˆ’ ฮฃ22 + i(ฮฃ12 + ฮฃ21 ). โˆš The finite-dimensional distributional convergence of npฬ‚n Eฬƒ1 to a Q0 (s, t) can be generalized using the Crameฬr-Wold device and we omit the calculation of the covariance structure. The tightness condition for the functional convergence follows the same arguments in the proof of Proposition A.1 from Bickel and Wichura (1971), with equality (A.8) replaced by a variance calculation of the sum of ฮฑ-mixing components using the inequality (B.4) and condition (A.9) is verified through the same argument. This completes the proof of Proposition B.3. of Lemma B.1. The proof follows from that of Theorem 3.2 in Davis and Mikosch (2009). Here we outline the sketch of the proof and detail only the parts that differ from their proof. By the vague convergence in (4.12), we have i)       Z Z 1 1 X0 X0 2 E fi โ†’ fi dยต0 and E fi โ†’ fi2 dยต0 ; pn rn pn rn ii)         2  Z 1 X0 1 X0 1 X0 2 Var fi = E fi โˆ’ pn E fi โ†’ fi2 dยต0 = ฯƒ02 (fi , fi ); pn rn pn rn pn rn iii)      1 X0 Xh cov fi , fj pn rn rn Z โ†’ fi fj dยตh = ฯƒh2 (fi , fj ). (i) 1 Sn for i = 1, 2. Without loss of generality, we suppress Let us first consider the marginal convergence of โˆšnp n the dependency on i and set     Xt X0 Ytn := f โˆ’ Ef . rn rn Then 1 Var [Y1n ] โ†’ ฯƒ02 (f, f ) pn and  1 cov Y1n , Y(h+1)n โ†’ ฯƒh2 (f, f ). pn We also have the following two results for |cov(Y1n , Y(h+1)n )|: lim lim sup hโ†’โˆž nโ†’โˆž ln X 1 |cov(Y1n , Y(j+1)n )| pn j=h        2 ln ln X X 1 X0 Xj 1 X0 โ‰ค lim lim sup E f f + E f hโ†’โˆž nโ†’โˆž pn rn rn pn rn j=h j=h 26 Wan and Davis ln ln X   X 2 c c โ‰ค lim lim sup E 1{kX0 k>rn } 1{kXj k>rn } + E1{kX0 k>rn } hโ†’โˆž nโ†’โˆž pn pn j=h j=h ln X c P (kX0 k > rn , kXj k > rn ) + cln pn โ‰ค lim lim sup hโ†’โˆž nโ†’โˆž pn j=h = 0 (B.8) from condition (4.14), and lim nโ†’โˆž โˆž X 1 |cov(Y1n , Y(j+1)n )| pn      โˆž X 1 X0 Xj cov f ,f nโ†’โˆž pn rn rn j=ln   2/(1โˆ’ฮด) !1โˆ’ฮด โˆž X 1 ฮด X0 lim ฮฑ E f nโ†’โˆž pn j rn โ‰ค lim j=ln โ‰ค โ‰ค j=ln โˆž X lim nโ†’โˆž โ‰ค lim nโ†’โˆž = j=ln โˆž X 2/(1โˆ’ฮด) 1โˆ’ฮด c ฮด ฮฑj E 1{kX0 k>rn } pn cฮฑjฮด pโˆ’ฮด n j=ln 0 (B.9) from condition (4.13). We apply the same technique of small/large blocks as used in Davis and Mikosch (2009). Let mn and ln be the sizes of big and small blocks, respectively, where ln  mn  n. Let Ikn = {(k โˆ’ 1)mn + 1, . . . , kmn } and Jkn = {(k โˆ’ 1)mn + 1, . . . , (k โˆ’ 1)mn + ln }, k = 1, . . . , n/mn , be the index sets of big and small blocks respectively. Set Iหœkn = Ikn \Jkn , i.e., Iหœkn are the big blocks with the first ln observations removed. For simplicity, we set mn := 1/pn and assume that the number of big blocks n/mn = npn is integer-valued. The non-integer case can be generalized without additional difficulties. Denote X Sn (B) := Ytn , tโˆˆB then n X Ytn = Sn (1 : n) = t=1 npn X Sn (Ikn ) = k=1 npn X Sn (Iหœkn ) + k=1 npn X Sn (Jkn ). k=1 Let {Sฬƒn (Iหœkn )}k=1,...,npn be iid copies of Sฬƒn (Iหœ1n ). To prove the convergence of show the following: โˆš 1 Sn (1 npn : n), it suffices to npn npn 1 X 1 X หœ Sฬƒ ( I ) and Sn (Iหœkn ) has the same limiting distribution, โˆš โˆš n kn npn npn (B.10) npn 1 X p Sn (Jkn ) โ†’ 0, โˆš npn (B.11) k=1 k=1 k=1 and โˆš npn 1 X d Sฬƒn (Iหœkn ) โ†’ N (0, ฯƒ 2 (f, f )). npn (B.12) k=1 The statement (B.10) holds if npn ฮฑln โ†’ 0, as n โ†’ โˆž. This follows from the same argument in equation (6.2) in Davis and Mikosch (2009). (B.13) Threshold Selection for Multivariate Heavy-Tailed Data 27 For condition (B.11), it suffices to show that ! npn X 1 Sn (Jkn ) โ†’ 0. Var npn k=1 Note that ! npn np n โˆ’1 X X 1 h Sn (Jkn ) โ‰ค Var(Sn (J1n )) + 2 Var )|cov(Sn (J1n ), Sn (J(h+1)n ))| =: P1 + P2 . (1 โˆ’ npn npn k=1 h=1 We have lim sup P1 = nโ†’โˆž ๏ฃซ ๏ฃถ ln X lim sup Var ๏ฃญ Yjn ๏ฃธ nโ†’โˆž j=1 ๏ฃซ ๏ฃถ |cov(Y , Y )| Var(Y1n ) j 1n (j+1)n ๏ฃธ โ‰ค lim sup ln pn ๏ฃญ +2 (1 โˆ’ ) pn l p nโ†’โˆž n n j=1 โ‰ค lim sup ln pn nโ†’โˆž lX n โˆ’1 hโˆ’1 X |cov(Y1n , Y(j+1)n )| Var(Y1n ) + lim lim sup 2ln pn hโ†’โˆž nโ†’โˆž pn pn j=1 + lim lim sup 2ln pn hโ†’โˆž nโ†’โˆž = lX n โˆ’1 |cov(Y1n , Y(j+1)n )| pn j=h 0 where the last step follows from dominated convergence and (B.8). And for the other term, P2 โ‰ค 2 np n โˆ’1 X X X |cov(Ysn , Ytn )| h=1 sโˆˆJ1n tโˆˆJ(h+1)n โ‰ค 2 np n โˆ’1 X h/pn X ln โˆž X โ‰ค 2ln pn k=1/pn โˆ’ln +1 โˆž X โ‰ค 2ln pn cov(Y1n , Y(k+1)n ) k=h/pn โˆ’ln +1 h=1 cov(Y1n , Y(k+1)n ) pn cov(Y1n , Y(k+1)n ) โ†’ 0. pn k=ln +1 Note that 1/pn = mn is the size of big blocks Ikn โ€™s and 1/pn โˆ’ ln + 1 = mn โˆ’ ln + 1 is the distance between consecutive small blocks (Jkn , J(k+1)n )โ€™s. The last limit follows from (B.9). To finish the proof, we need to establish the central limit theorem in (B.12). Note the Sฬƒn (Iหœln )โ€™s are iid with ESฬƒn (Iหœln ) = 0. We now calculate its variance. Recall that 1/pn โˆ’ ln is the size of Iหœ1n , the big block with small block removed. Then ๏ฃซ ๏ฃถ 1/pn โˆ’ln   X Var Sฬƒn (Iหœ1n ) = Var ๏ฃญ Yjn ๏ฃธ j=1 = ( 1 โˆ’ ln )Var(Yjn ) + 2 pn 1/pn โˆ’ln โˆ’1 X ๏ฃซ = ( (1/pn โˆ’ ln โˆ’ k)cov(Y1n , Y(k+1)n ) k=1 1 โˆ’ ln )Var(Yjn ) + 2 ๏ฃญ pn h X k=1 + ln X k=h+1 ๏ฃถ 1/pn โˆ’ln โˆ’1 + X k=ln +1   ๏ฃธ 1 โˆ’ ln + k 1 cov(Y1n , Y(k+1)n ) 1/pn pn 28 Wan and Davis := I0 + I1 + I2 + I3 . Here lim I0 = lim (1 โˆ’ ln pn ) nโ†’โˆž nโ†’โˆž 1 Var(Yjn ) = ฯƒ02 (f, f ), pn and lim I1 = lim 2 nโ†’โˆž nโ†’โˆž h X h (1 โˆ’ pn (ln + k)) k=1 X cov(Y1n , Y(k+1)n ) =2 ฯƒk2 (f, f ). pn k=1 We also have lim lim sup |I2 | โ‰ค lim lim sup hโ†’โˆž nโ†’โˆž hโ†’โˆž nโ†’โˆž ln X |cov(Y1n , Y(k+1)n )| =0 pn k=h+1 from (B.8), and lim |I3 | โ‰ค lim nโ†’โˆž nโ†’โˆž โˆž X |cov(Y1n , Y(k+1)n )| =0 pn k=ln from (B.9). Therefore โˆž   X lim Var Sฬƒn (Iหœ1n ) = lim I0 + lim lim I1 = ฯƒ02 (f, f ) + 2 ฯƒk2 (f, f ) =: ฯƒ 2 (f, f ) nโ†’โˆž nโ†’โˆž hโ†’โˆž nโ†’โˆž k=1 as defined. To show that this infinite sum converges, it suffices to show that โˆž X ยตh ({(x, x0 )|kxk > 1, kx0 k > 1}) < โˆž. h=1 This follows from (4.14) in condition (M), for if โˆž X ยตh ({(x, x0 )|kxk > 1, kx0 k > 1}) = โˆž, h=1 then lim sup nโ†’โˆž ln ln X 1 X P(kX0 k > rn , kXj k > rn ) โ‰ฅ lim inf P(kX0 k > rn , kXj k > rn |kX0 k > rn ) nโ†’โˆž pn j=h j=h โ‰ฅ โˆž X ยตj ({(x, x0 )|kxk > 1, kx0 k > 1}) = โˆž, j=h which leads to a contradiction. To apply the central limit theorem, we verify the Lindebergโ€™s condition, ๏ฃฎ๏ฃซ ๏ฃน ๏ฃถ2 1/pn โˆ’ln h i X ๏ฃฏ ๏ฃบ โ‰ค E ๏ฃฐ๏ฃญ Yjn ๏ฃธ 1{|Sฬƒn (Iหœ1n )|>โˆšnpn } ๏ฃป E (Sฬƒn (Iหœ1n ))2 1{|Sฬƒn (Iหœ1n )|>โˆšnpn } j=1 h i โ‰ค E c(1/pn โˆ’ ln )2 1{|Sฬƒn (Iหœ1n )|>โˆšnpn } i 1 h โˆš โ‰ค c 2 P |Sฬƒn (Iหœ1n )| >  npn pn h i หœ Var Sฬƒ ( I ) n 1n 1 1 = O( 3 ) โ†’ 0. โ‰ค c 2 2 pn  npn npn This completes the proof for the convergence of โˆš 1 Sn (1 npn : n). Threshold Selection for Multivariate Heavy-Tailed Data (1) 29 (2) 1 The joint convergence of โˆšnp (Sn , Sn )T follows from the same line of argument together with the n Craฬmer-Wold device. In particular,   1 cov Sn(i) , Sn(j) = ฯƒ 2 (fi , fj ), npn i, j = 1, 2. This completes the proof of the lemma. Remark B.4. Lemma B.1 itself is a more general result of independent interest. The result can be generalized d for functions fi defined on R \{0} with compact support. In this case, condition (4.14) should be modified to lim lim sup hโ†’โˆž nโ†’โˆž d ln 1 X P(kX0 k > rn , kXj k > rn ) = 0 pn j=h for some  > 0, where support(f ) โІ R \B (0). Also, as seen during the proof of the lemma, the conditions on pn , ln , and ฮฑt can be further relaxed.
10math.ST